Skip to content
  • Andy Lutomirski's avatar
    x86-64: Map the HPET NX · d319bb79
    Andy Lutomirski authored
    
    
    Currently the HPET mapping is a user-accessible syscall
    instruction at a fixed address some of the time.
    
    A sufficiently determined hacker might be able to guess when.
    
    Signed-off-by: default avatarAndy Lutomirski <luto@mit.edu>
    Cc: Jesper Juhl <jj@chaosbits.net>
    Cc: Borislav Petkov <bp@alien8.de>
    Cc: Linus Torvalds <torvalds@linux-foundation.org>
    Cc: Arjan van de Ven <arjan@infradead.org>
    Cc: Jan Beulich <JBeulich@novell.com>
    Cc: richard -rw- weinberger <richard.weinberger@gmail.com>
    Cc: Mikael Pettersson <mikpe@it.uu.se>
    Cc: Andi Kleen <andi@firstfloor.org>
    Cc: Brian Gerst <brgerst@gmail.com>
    Cc: Louis Rilling <Louis.Rilling@kerlabs.com>
    Cc: Valdis.Kletnieks@vt.edu
    Cc: pageexec@freemail.hu
    Link: http://lkml.kernel.org/r/ab41b525a4ca346b1ca1145d16fb8d181861a8aa.1307292171.git.luto@mit.edu
    
    
    Signed-off-by: default avatarIngo Molnar <mingo@elte.hu>
    d319bb79