lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Thu, 23 Sep 2021 18:22:31 +0200 From: Paolo Bonzini <pbonzini@...hat.com> To: Sean Christopherson <seanjc@...gle.com> Cc: Vitaly Kuznetsov <vkuznets@...hat.com>, Wanpeng Li <wanpengli@...cent.com>, Jim Mattson <jmattson@...gle.com>, Joerg Roedel <joro@...tes.org>, kvm@...r.kernel.org, linux-kernel@...r.kernel.org, syzbot+200c08e88ae818f849ce@...kaller.appspotmail.com Subject: Re: [PATCH 0/3] KVM: x86: guest.MAXPHYADDR fix and related cleanup On 31/08/21 18:42, Sean Christopherson wrote: > Fix a bug exposed by syzkaller where running with guest.MAXPHYADDR < 32 > leads KVM injecting a garbage exception due to mishandling an illegal GPA > check when "translating" a non-nested GPA. > > Clean up tangentially related code in load_pdptrs() to discourage reading > guest memory using a potentially-nested GPA. > > Sean Christopherson (3): > Revert "KVM: x86: mmu: Add guest physical address check in > translate_gpa()" > KVM: x86: Subsume nested GPA read helper into load_pdptrs() > KVM: x86: Simplify retrieving the page offset when loading PDTPRs > > arch/x86/include/asm/kvm_host.h | 3 -- > arch/x86/kvm/mmu/mmu.c | 6 ---- > arch/x86/kvm/x86.c | 56 +++++++++++---------------------- > 3 files changed, 18 insertions(+), 47 deletions(-) > Queued 2 and 3 too now, thanks. Paolo
Powered by blists - more mailing lists