lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:	Tue,  2 Aug 2016 16:32:34 -0400
From:	Bandan Das <bsd@...hat.com>
To:	kvm@...r.kernel.org
Cc:	pbonzini@...hat.com, rkrcmar@...hat.com,
	linux-kernel@...r.kernel.org
Subject: [PATCH v2 0/3] vmx: miscellaneous cleanups

v1 posted here https://lkml.org/lkml/2016/7/20/605

v2:
1/3 : Replacing BUG_ONs with WARN_ONs is not necessary
2/3 : No change
3/3 : Remove the kvm parameter from two other functions
4/3 : Removed, although the spec says to do it, it can't be triggered

These are some very minor vmx cleanups.
2/4 is necessary for nested esx to be able to
successfully launch a guest of its own. Without single context
invalidation present, it just disables ept altogether.

Bandan Das (3):
  nvmx: remove comment about missing nested vpid support
  nvmx: mark ept single context invalidation as supported
  mmu: don't pass *kvm to spte_write_protect and spte_*_dirty

 arch/x86/kvm/mmu.c | 12 ++++++------
 arch/x86/kvm/vmx.c | 15 +++++++--------
 2 files changed, 13 insertions(+), 14 deletions(-)

-- 
2.5.5

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ