Re: [PATCH v2] xen: Fix possible user space selector corruption

2013-10-07 Thread Andrew Cooper
On 07/10/13 10:48, Frediano Ziglio wrote: > Due to the way kernel is initialized under Xen is possible that the > ring1 selector used by the kernel for the boot cpu end up to be copied > to userspace leading to segmentation fault in the userspace. > > Xen code in the kernel initialize no-boot cpus

[PATCH v2] xen: Fix possible user space selector corruption

2013-10-07 Thread Frediano Ziglio
Due to the way kernel is initialized under Xen is possible that the ring1 selector used by the kernel for the boot cpu end up to be copied to userspace leading to segmentation fault in the userspace. Xen code in the kernel initialize no-boot cpus with correct selectors (ds and es set to __USER_DS)