x86/exceptions: Enable IST guard pages
authorThomas Gleixner <tglx@linutronix.de>
Sun, 14 Apr 2019 15:59:56 +0000 (17:59 +0200)
committerBorislav Petkov <bp@suse.de>
Wed, 17 Apr 2019 13:05:32 +0000 (15:05 +0200)
commit1bdb67e5aa2d5d43c48cb7d93393fcba276c9e71
tree871ff0cb4efb160ba8ecf9f82c2cc977659abf9d
parent3207426925d2b4da390be8068df1d1c2b36e5918
x86/exceptions: Enable IST guard pages

All usage sites which expected that the exception stacks in the CPU entry
area are mapped linearly are fixed up. Enable guard pages between the
IST stacks.

Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
Signed-off-by: Borislav Petkov <bp@suse.de>
Cc: "H. Peter Anvin" <hpa@zytor.com>
Cc: Andy Lutomirski <luto@kernel.org>
Cc: Ingo Molnar <mingo@redhat.com>
Cc: Josh Poimboeuf <jpoimboe@redhat.com>
Cc: Sean Christopherson <sean.j.christopherson@intel.com>
Cc: Thomas Gleixner <tglx@linutronix.de>
Cc: x86-ml <x86@kernel.org>
Link: https://lkml.kernel.org/r/20190414160145.349862042@linutronix.de
arch/x86/include/asm/cpu_entry_area.h