Re: [PATCH v3] x86/pv: inject #UD for entirely missing SYSCALL callbacks

2020-10-29 Thread Jan Beulich
On 29.10.2020 09:53, Jan Beulich wrote: > On 28.10.2020 22:31, Andrew Cooper wrote: >> On 26/10/2020 09:40, Jan Beulich wrote: >>> In the case that no 64-bit SYSCALL callback is registered, the guest >>> will be crashed when 64-bit userspace executes a SYSCALL instruction, >>> which would be a user

Re: [PATCH v3] x86/pv: inject #UD for entirely missing SYSCALL callbacks

2020-10-29 Thread Jan Beulich
On 28.10.2020 22:31, Andrew Cooper wrote: > On 26/10/2020 09:40, Jan Beulich wrote: >> In the case that no 64-bit SYSCALL callback is registered, the guest >> will be crashed when 64-bit userspace executes a SYSCALL instruction, >> which would be a userspace => kernel DoS. Similarly for 32-bit >>

Re: [PATCH v3] x86/pv: inject #UD for entirely missing SYSCALL callbacks

2020-10-28 Thread Andrew Cooper
On 26/10/2020 09:40, Jan Beulich wrote: > In the case that no 64-bit SYSCALL callback is registered, the guest > will be crashed when 64-bit userspace executes a SYSCALL instruction, > which would be a userspace => kernel DoS. Similarly for 32-bit > userspace when no 32-bit SYSCALL callback was re

Re: [PATCH v3] x86/pv: inject #UD for entirely missing SYSCALL callbacks

2020-10-26 Thread Jan Beulich
On 26.10.2020 10:40, Jan Beulich wrote: And of course this should have From: Andrew Cooper right here, sorry. Jan > In the case that no 64-bit SYSCALL callback is registered, the guest > will be crashed when 64-bit userspace executes a SYSCALL instruction, > which would be a userspace => kern