diff options
author | Samuel Thibault <samuel.thibault@ens-lyon.org> | 2024-03-03 23:52:10 +0100 |
---|---|---|
committer | Samuel Thibault <samuel.thibault@ens-lyon.org> | 2024-03-03 23:52:42 +0100 |
commit | 759acbf16bc9215e0ae29dde84d223eaa8b1678e (patch) | |
tree | e3f5c853e974d36c85850e0e9ac9411ec78482c5 /x86_64 | |
parent | 43f2a52a6a00904f90a19fb178935cd16a7ced23 (diff) | |
download | gnumach-759acbf16bc9215e0ae29dde84d223eaa8b1678e.tar.gz gnumach-759acbf16bc9215e0ae29dde84d223eaa8b1678e.tar.bz2 gnumach-759acbf16bc9215e0ae29dde84d223eaa8b1678e.zip |
pmap: Avoid leaking USER bit in page tables
We should only set USER
- for user processes maps
- for 32bit Xen support
This was not actually posing problem since in 32bit segmentation
protects us, and in 64bit the l4 entry for the kernel is already set.
But better be safe than sorry.
Diffstat (limited to 'x86_64')
0 files changed, 0 insertions, 0 deletions