x86/xpti: don't map stack guard pages
authorJan Beulich <jbeulich@suse.com>
Tue, 6 Mar 2018 15:46:57 +0000 (16:46 +0100)
committerJan Beulich <jbeulich@suse.com>
Tue, 6 Mar 2018 15:46:57 +0000 (16:46 +0100)
commitd303784b68237ff3050daa184f560179dda21b8c
treee10802fd1fca098e2f37ef48298dda5bd957023a
parentd1d6fc97d66cf56847fc0bcc2ddc370707c22378
x86/xpti: don't map stack guard pages

Other than for the main mappings, don't even do this in release builds,
as there are no huge page shattering concerns here.

Note that since we don't run on the restructed page tables while HVM
guests execute, the non-present mappings won't trigger the triple fault
issue AMD SVM is susceptible to with our current placement of STGI vs
TR loading.

Signed-off-by: Jan Beulich <jbeulich@suse.com>
Acked-by: Andrew Cooper <andrew.cooper3@citrix.com>
xen/arch/x86/mm.c
xen/arch/x86/smpboot.c
xen/include/asm-x86/mm.h