Other than for the main mappings, don't even do this in release builds,
as there are no huge page shattering concerns here.
Note that since we don't run on the restructed page tables while HVM
guests execute, the non-present mappings won't trigger the triple fault
issue AMD SVM is susceptible to with our current placement of STGI vs
TR loading.
Signed-off-by: Jan Beulich <jbeulich@suse.com>
Acked-by: Andrew Cooper <andrew.cooper3@citrix.com>
STACK_SIZE - PRIMARY_STACK_SIZE - IST_MAX * PAGE_SIZE);
}
+bool memguard_is_stack_guard_page(unsigned long addr)
+{
+ addr &= STACK_SIZE - 1;
+
+ return addr >= IST_MAX * PAGE_SIZE &&
+ addr < STACK_SIZE - PRIMARY_STACK_SIZE;
+}
+
void arch_dump_shared_mem_info(void)
{
printk("Shared frames %u -- Saved frames %u\n",
/* Install direct map page table entries for stack, IDT, and TSS. */
for ( off = rc = 0; !rc && off < STACK_SIZE; off += PAGE_SIZE )
- rc = clone_mapping(__va(__pa(stack_base[cpu])) + off, rpt);
+ if ( !memguard_is_stack_guard_page(off) )
+ rc = clone_mapping(__va(__pa(stack_base[cpu])) + off, rpt);
if ( !rc )
rc = clone_mapping(idt_tables[cpu], rpt);
void memguard_guard_stack(void *p);
void memguard_unguard_stack(void *p);
+bool __attribute_const__ memguard_is_stack_guard_page(unsigned long addr);
struct mmio_ro_emulate_ctxt {
unsigned long cr2;