Skip to content
Commit 9849c7d3 authored by Andrew Boie's avatar Andrew Boie Committed by Anas Nashif
Browse files

x86: don't use privilege stack areas as a guard



This is causing problems, as if we create a thread in
a system call we will *not* be using the kernel page
tables if CONFIG_KPTI=n, resulting in a crash when
the later call to copy_page_tables() tries to initialize
the PDPT (which is in the same page as the privilege
stack).

Just don't fiddle with this page's permissions; we don't
need it as a guard area anyway since we have a stack
guard placed immediately before it, and this page
is unused if user mode isn't active.

Signed-off-by: default avatarAndrew Boie <andrew.p.boie@intel.com>
parent 6cfd8113
Loading
Loading
Loading
Loading
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Please to comment