From mboxrd@z Thu Jan 1 00:00:00 1970 From: Avi Kivity Subject: Re: [Patch v5 0/4] Enable SMEP feature support for kvm Date: Mon, 30 May 2011 11:52:27 +0300 Message-ID: <4DE35ACB.9000503@redhat.com> References: <5D8008F58939784290FAB48F5497519844E92781DD@shsmsx502.ccr.corp.intel.com> Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Cc: "kvm@vger.kernel.org" To: "Yang, Wei Y" Return-path: Received: from mx1.redhat.com ([209.132.183.28]:11088 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752563Ab1E3Iwb (ORCPT ); Mon, 30 May 2011 04:52:31 -0400 In-Reply-To: <5D8008F58939784290FAB48F5497519844E92781DD@shsmsx502.ccr.corp.intel.com> Sender: kvm-owner@vger.kernel.org List-ID: On 05/30/2011 06:01 AM, Yang, Wei Y wrote: > This patchset enables a new CPU feature SMEP (Supervisor Mode Execution > Protection) in KVM. SMEP prevents kernel from executing code in application. > Updated Intel SDM describes this CPU feature. The document will be > published soon. > > This patchset is based on Fenghua's SMEP patch series, as referred by: > https://lkml.org/lkml/2011/5/17/523 Looks good. I'll post the cr0.wp=0 fixup soon. Please update x86/access.c in http://git.kernel.org/?p=virt/kvm/kvm-unit-tests.git;a=summary to cover smep; it should be similar to nx. Note: in the future, please use git-send-email to post all patches as one thread. This way, when people post their replies, the thread sticks together as a unit in the reader rather than breaking up. -- error compiling committee.c: too many arguments to function