lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Fri, 31 Mar 2017 13:13:06 +0200
From:   Paolo Bonzini <pbonzini@...hat.com>
To:     linux-kernel@...r.kernel.org, kvm@...r.kernel.org
Subject: Re: [PATCH v2 0/6] KVM: nVMX: nested EPT improvements and A/D bits,
 RDRAND and RDSEED exits



On 30/03/2017 11:55, Paolo Bonzini wrote:
> Patches 1-4 implement nested EPT A/D bits and GB pages.  As a side effect,
> this fixes one vmx.flat failure on machines with EPT A/D bits.
> It should be possible to implement PML on top of this with host
> support for A/D bits only.
> 
> Patches 5-6 implement nested RDRAND and RDSEED exiting.
> 
> Paolo
> 
> v1->v2: simplified patch 2 further
> 	removed magic 0x100 from patch 4
> 
> Paolo Bonzini (6):
>   KVM: nVMX: we support 1GB EPT pages
>   KVM: VMX: remove bogus check for invalid EPT violation
>   kvm: x86: MMU support for EPT accessed/dirty bits
>   kvm: nVMX: support EPT accessed/dirty bits
>   KVM: VMX: add missing exit reasons
>   KVM: nVMX: support RDRAND and RDSEED exiting
> 
>  arch/x86/include/asm/kvm_host.h |  5 ++--
>  arch/x86/include/asm/vmx.h      |  4 +++
>  arch/x86/include/uapi/asm/vmx.h | 25 +++++++++++++------
>  arch/x86/kvm/mmu.c              |  4 ++-
>  arch/x86/kvm/mmu.h              |  3 ++-
>  arch/x86/kvm/paging_tmpl.h      | 54 +++++++++++++++++++++++------------------
>  arch/x86/kvm/vmx.c              | 54 ++++++++++++++++++++++++++---------------
>  7 files changed, 95 insertions(+), 54 deletions(-)
> 

I'm merging patches 1, 2, 5 and 6.

Paolo

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ