lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 08 May 2020 16:10:03 -0500 From: Babu Moger <babu.moger@....com> To: corbet@....net, tglx@...utronix.de, mingo@...hat.com, bp@...en8.de, hpa@...or.com, pbonzini@...hat.com, sean.j.christopherson@...el.com Cc: x86@...nel.org, vkuznets@...hat.com, wanpengli@...cent.com, jmattson@...gle.com, joro@...tes.org, dave.hansen@...ux.intel.com, luto@...nel.org, peterz@...radead.org, mchehab+samsung@...nel.org, babu.moger@....com, changbin.du@...el.com, namit@...are.com, bigeasy@...utronix.de, yang.shi@...ux.alibaba.com, asteinhauser@...gle.com, anshuman.khandual@....com, jan.kiszka@...mens.com, akpm@...ux-foundation.org, steven.price@....com, rppt@...ux.vnet.ibm.com, peterx@...hat.com, dan.j.williams@...el.com, arjunroy@...gle.com, logang@...tatee.com, thellstrom@...are.com, aarcange@...hat.com, justin.he@....com, robin.murphy@....com, ira.weiny@...el.com, keescook@...omium.org, jgross@...e.com, andrew.cooper3@...rix.com, pawan.kumar.gupta@...ux.intel.com, fenghua.yu@...el.com, vineela.tummalapalli@...el.com, yamada.masahiro@...ionext.com, sam@...nborg.org, acme@...hat.com, linux-doc@...r.kernel.org, linux-kernel@...r.kernel.org, kvm@...r.kernel.org Subject: [PATCH v2 3/3] KVM: SVM: Add support for MPK feature on AMD The Memory Protection Key (MPK) feature provides a way for applications to impose page-based data access protections (read/write, read-only or no access), without requiring modification of page tables and subsequent TLB invalidations when the application changes protection domains. This feature is already available in Intel platforms. Now enable the feature on AMD platforms. AMD documentation for MPK feature is available at "AMD64 Architecture Programmer’s Manual Volume 2: System Programming, Pub. 24593 Rev. 3.34, Section 5.6.6 Memory Protection Keys (MPK) Bit". Documentation can be obtained at the link below. Link: https://bugzilla.kernel.org/show_bug.cgi?id=206537 Signed-off-by: Babu Moger <babu.moger@....com> --- arch/x86/kvm/svm/svm.c | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/arch/x86/kvm/svm/svm.c b/arch/x86/kvm/svm/svm.c index 2f379bacbb26..37fb41ad9149 100644 --- a/arch/x86/kvm/svm/svm.c +++ b/arch/x86/kvm/svm/svm.c @@ -818,6 +818,10 @@ static __init void svm_set_cpu_caps(void) if (boot_cpu_has(X86_FEATURE_LS_CFG_SSBD) || boot_cpu_has(X86_FEATURE_AMD_SSBD)) kvm_cpu_cap_set(X86_FEATURE_VIRT_SSBD); + + /* PKU is not yet implemented for shadow paging. */ + if (npt_enabled && boot_cpu_has(X86_FEATURE_OSPKE)) + kvm_cpu_cap_check_and_set(X86_FEATURE_PKU); } static __init int svm_hardware_setup(void)
Powered by blists - more mailing lists