sta...@vger.kernel.org; xen-
> de...@lists.xenproject.org; Boris Ostrovsky
> Subject: Re: [Xen-devel] [PATCH] x86/xen: allow userspace access during
> hypercalls
>
> On Mon, Jun 26, 2017 at 01:09:58PM +, Paul Durrant wrote:
> > > -Original Message-
> > > From: Xen-deve
drew Cooper ; x...@kernel.org; linux-
> > ker...@vger.kernel.org; sta...@vger.kernel.org; xen-
> > de...@lists.xenproject.org; Boris Ostrovsky
> > Subject: Re: [Xen-devel] [PATCH] x86/xen: allow userspace access during
> > hypercalls
> >
> > On Mon, Jun 26, 20
kernel.org; xen-
> de...@lists.xenproject.org; Boris Ostrovsky
> Subject: Re: [Xen-devel] [PATCH] x86/xen: allow userspace access during
> hypercalls
>
> On Mon, Jun 26, 2017 at 02:05:48PM +0200, Juergen Groß wrote:
> > On 06/23/2017 02:47 PM, Marek Marczykowski-Górecki wrote:
> > &g
On Mon, Jun 26, 2017 at 02:05:48PM +0200, Juergen Groß wrote:
> On 06/23/2017 02:47 PM, Marek Marczykowski-Górecki wrote:
> > Userspace application can do a hypercall through /dev/xen/privcmd, and
> > some for some hypercalls argument is a pointers to user-provided
> > structure. When SMAP is suppo
On 06/23/2017 02:47 PM, Marek Marczykowski-Górecki wrote:
Userspace application can do a hypercall through /dev/xen/privcmd, and
some for some hypercalls argument is a pointers to user-provided
structure. When SMAP is supported and enabled, hypervisor can't access.
So, lets allow it.
What about
Userspace application can do a hypercall through /dev/xen/privcmd, and
some for some hypercalls argument is a pointers to user-provided
structure. When SMAP is supported and enabled, hypervisor can't access.
So, lets allow it.
Cc: sta...@vger.kernel.org
Signed-off-by: Marek Marczykowski-Górecki
-