zephyr/arch/x86
Andrew Boie 9849c7d3e7 x86: don't use privilege stack areas as a guard
This is causing problems, as if we create a thread in
a system call we will *not* be using the kernel page
tables if CONFIG_KPTI=n, resulting in a crash when
the later call to copy_page_tables() tries to initialize
the PDPT (which is in the same page as the privilege
stack).

Just don't fiddle with this page's permissions; we don't
need it as a guard area anyway since we have a stack
guard placed immediately before it, and this page
is unused if user mode isn't active.

Signed-off-by: Andrew Boie <andrew.p.boie@intel.com>
2019-12-09 12:40:31 -05:00
..
core x86: don't use privilege stack areas as a guard 2019-12-09 12:40:31 -05:00
include
CMakeLists.txt
gen_gdt.py
gen_idt.py
ia32.cmake
intel64.cmake
Kconfig kconfig: Remove redundant 'default n' and 'prompt' properties 2019-12-09 16:14:50 +01:00