]> xenbits.xensource.com Git - unikraft/unikraft.git/commit
plat/common/x86: Sanitize the ECTX slot on syscall entry
authorSergiu Moga <sergiu@unikraft.io>
Mon, 3 Jun 2024 10:57:23 +0000 (13:57 +0300)
committerUnikraft Bot <monkey@unikraft.io>
Wed, 5 Jun 2024 07:35:10 +0000 (07:35 +0000)
commitaa92bb7745c92dc19b207d08c699e70e32430882
tree1a03495a8e113f82344d31862fc6e0f64eddb3f5
parent4abdbfd4461870c776538c0f39173328a984346b
plat/common/x86: Sanitize the ECTX slot on syscall entry

Commit c716bcca4822 ("{lib,arch,plat}: Redo syscall ctx's and swapgs logic"),
following a rework of architecture specific contexts and syscall entries,
by mistake removed the ECTX sanitization at the beginning of system calls.
This can result in #GP on x86 if the XSAVE header happens to be dirty.
Thus, bring this sanitization back.

Signed-off-by: Sergiu Moga <sergiu@unikraft.io>
Reviewed-by: Radu Nichita <radunichita99@gmail.com>
Approved-by: Razvan Deaconescu <razvand@unikraft.io>
GitHub-Closes: #1444
plat/common/x86/syscall.S