"H. Peter Anvin" <h...@linux.intel.com> writes: > Supervisor Mode Access Prevention (SMAP) is a new security feature > disclosed by Intel in revision 014 of the IntelĀ® Architecture > Instruction Set Extensions Programming Reference: > > http://software.intel.com/sites/default/files/319433-014.pdf > > When SMAP is active, the kernel cannot normally access pages that are > user space (U=1). Since the kernel does have the need to access user > space pages under specific circumstances, an override is provided: the > kernel can access user space pages if EFLAGS.AC=1. For system data > structures, e.g. descriptor tables, that are accessed by the processor > directly, SMAP is active even in CPL 3 regardless of EFLAGS.AC. > > SMAP also includes two new instructions, STAC and CLAC, to flip the AC > flag more quickly.
Have you tested kexec in this environment? This is the kind of cpu feature that when we enable it, frequently we have to do something on the kexec path. At a quick skim it looks like the kexec path is using kernel page table entries and clearing all bits from cr4 except X86_CR4_PAE so I don't actually expect this change will require anything on the kexec path. Eric -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/