[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [PATCH 06/16] x86/traps: Implement #CP handler and extend #PF for shadow stacks
On 11.05.2020 19:20, Andrew Cooper wrote: > On 04/05/2020 15:10, Jan Beulich wrote: >> On 02.05.2020 00:58, Andrew Cooper wrote: >>> @@ -1457,6 +1451,10 @@ void do_page_fault(struct cpu_user_regs *regs) >>> { >>> enum pf_type pf_type = spurious_page_fault(addr, regs); >>> >>> + /* Any fault on a shadow stack access is a bug in Xen. */ >>> + if ( error_code & PFEC_shstk ) >>> + goto fatal; >> Not going through the full spurious_page_fault() in this case >> would seem desirable, as would be at least a respective >> adjustment to __page_fault_type(). Perhaps such an adjustment >> could then avoid the change (and the need for goto) here? > > This seems to do a lot of things which have little/nothing to do with > spurious faults. > > In particular, we don't need to disable interrupts to look at > PFEC_shstk, or RSVD for that matter. Perhaps even more so a reason to make spurious_page_fault() return a new enum pf_type enumerator? In any event your reply looks more like a "yes" to my suggestion than an objection, but I may be getting it entirely wrong ... Jan
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |