lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Mon, 6 Nov 2017 10:18:12 -0600
From:   Brijesh Singh <brijesh.singh@....com>
To:     Borislav Petkov <bp@...en8.de>
Cc:     brijesh.singh@....com, kvm@...r.kernel.org,
        linux-kernel@...r.kernel.org, Thomas Gleixner <tglx@...utronix.de>,
        Ingo Molnar <mingo@...hat.com>,
        "H. Peter Anvin" <hpa@...or.com>,
        Paolo Bonzini <pbonzini@...hat.com>,
        Radim Krčmář <rkrcmar@...hat.com>,
        Joerg Roedel <joro@...tes.org>,
        Tom Lendacky <thomas.lendacky@....com>, x86@...nel.org
Subject: Re: [Part2 PATCH v7 23/38] KVM: SVM: Reserve ASID range for SEV guest



On 11/06/2017 04:34 AM, Borislav Petkov wrote:
...

>>   	int cpu;
>> @@ -1084,6 +1095,16 @@ static __init int svm_hardware_setup(void)
>>   		kvm_tsc_scaling_ratio_frac_bits = 32;
>>   	}
>>   
>> +	if (sev) {
>> +		if (boot_cpu_has(X86_FEATURE_SEV) &&
>> +		    IS_ENABLED(CONFIG_KVM_AMD_SEV)) {
>> +			sev_hardware_setup();
>> +			pr_info("SEV supported\n");
>> +		} else {
>> +			sev = false;
>> +		}
>> +	}
> 
> Btw, upon a second look, this hunk should go with the previous patch.
> This patch deals with ASID ranges, as the commit message states.
> 


I will see if I can move the hunk in previous patch. thanks

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ