lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Thu, 17 Dec 2020 16:31:35 -0800 From: Sean Christopherson <seanjc@...gle.com> To: Paolo Bonzini <pbonzini@...hat.com> Cc: Sean Christopherson <seanjc@...gle.com>, Vitaly Kuznetsov <vkuznets@...hat.com>, Wanpeng Li <wanpengli@...cent.com>, Jim Mattson <jmattson@...gle.com>, Joerg Roedel <joro@...tes.org>, kvm@...r.kernel.org, linux-kernel@...r.kernel.org, Ben Gardon <bgardon@...gle.com>, Richard Herbert <rherbert@...patico.ca> Subject: [PATCH 0/4] KVM: x86/mmu: Bug fixes and cleanups in get_mmio_spte() Two fixes for bugs that were introduced along with the TDP MMU (though I strongly suspect only the one reported by Richard, fixed in patch 2/4, is hittable in practice). Two additional cleanup on top to try and make the code a bit more readable and shave a few cycles. Sean Christopherson (4): KVM: x86/mmu: Use -1 to flag an undefined spte in get_mmio_spte() KVM: x86/mmu: Get root level from walkers when retrieving MMIO SPTE KVM: x86/mmu: Use raw level to index into MMIO walks' sptes array KVM: x86/mmu: Optimize not-present/MMIO SPTE check in get_mmio_spte() arch/x86/kvm/mmu/mmu.c | 53 +++++++++++++++++++++----------------- arch/x86/kvm/mmu/tdp_mmu.c | 9 ++++--- arch/x86/kvm/mmu/tdp_mmu.h | 4 ++- 3 files changed, 39 insertions(+), 27 deletions(-) -- 2.29.2.684.gfbc64c5ab5-goog
Powered by blists - more mailing lists