lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Tue, 17 Nov 2015 00:59:30 +0000 From: "Zhang, Yang Z" <yang.z.zhang@...el.com> To: Paolo Bonzini <pbonzini@...hat.com>, "linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>, "kvm@...r.kernel.org" <kvm@...r.kernel.org> CC: Takuya Yoshikawa <yoshikawa_takuya_b1@....ntt.co.jp> Subject: RE: [PATCH] KVM: x86: always set accessed bit in shadow PTEs Paolo Bonzini wrote on 2015-11-13: > Commit 7a1638ce4220 ("nEPT: Redefine EPT-specific link_shadow_page()", > 2013-08-05) says: > > Since nEPT doesn't support A/D bit, we should not set those bit > when building the shadow page table. > but this is not necessary. Even though nEPT doesn't support A/D > bits, and hence the vmcs12 EPT pointer will never enable them, > we always use them for shadow page tables if available (see > construct_eptp in vmx.c). So we can set the A/D bits freely > in the shadow page table. > > This patch hence basically reverts commit 7a1638ce4220. > > Cc: Yang Zhang <yang.z.zhang@...el.com> > Cc: Takuya Yoshikawa <yoshikawa_takuya_b1@....ntt.co.jp> > Signed-off-by: Paolo Bonzini <pbonzini@...hat.com> Looks good to me. Best regards, Yang -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists