lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 29 Sep 2017 07:51:27 +0200 From: Borislav Petkov <bp@...e.de> To: Brijesh Singh <brijesh.singh@....com> Cc: kvm@...r.kernel.org, linux-kernel@...r.kernel.org, x86@...nel.org, Thomas Gleixner <tglx@...utronix.de>, Ingo Molnar <mingo@...hat.com>, "H. Peter Anvin" <hpa@...or.com>, Paolo Bonzini <pbonzini@...hat.com>, Radim Krčmář <rkrcmar@...hat.com>, Tom Lendacky <thomas.lendacky@....com> Subject: Re: [Part1 PATCH v5 16/17] X86/KVM: Decrypt shared per-cpu variables when SEV is active On Wed, Sep 27, 2017 at 10:13:28AM -0500, Brijesh Singh wrote: > When SEV is active, guest memory is encrypted with a guest-specific key, a > guest memory region shared with the hypervisor must be mapped as decrypted > before we can share it. > > Cc: Thomas Gleixner <tglx@...utronix.de> > Cc: Ingo Molnar <mingo@...hat.com> > Cc: "H. Peter Anvin" <hpa@...or.com> > Cc: Borislav Petkov <bp@...e.de> > Cc: Paolo Bonzini <pbonzini@...hat.com> > Cc: "Radim Krčmář" <rkrcmar@...hat.com> > Cc: Tom Lendacky <thomas.lendacky@....com> > Cc: x86@...nel.org > Cc: linux-kernel@...r.kernel.org > Cc: kvm@...r.kernel.org > Signed-off-by: Brijesh Singh <brijesh.singh@....com> > --- > arch/x86/kernel/kvm.c | 41 ++++++++++++++++++++++++++++++++++++++--- > 1 file changed, 38 insertions(+), 3 deletions(-) Reviewed-by: Borislav Petkov <bp@...e.de> -- Regards/Gruss, Boris. SUSE Linux GmbH, GF: Felix Imendörffer, Jane Smithard, Graham Norton, HRB 21284 (AG Nürnberg) --
Powered by blists - more mailing lists