lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Sat, 5 Feb 2022 05:16:57 -0300 From: Leonardo Bras <leobras@...hat.com> To: Paolo Bonzini <pbonzini@...hat.com>, Sean Christopherson <seanjc@...gle.com>, Vitaly Kuznetsov <vkuznets@...hat.com>, Wanpeng Li <wanpengli@...cent.com>, Jim Mattson <jmattson@...gle.com>, Joerg Roedel <joro@...tes.org>, Thomas Gleixner <tglx@...utronix.de>, Ingo Molnar <mingo@...hat.com>, Borislav Petkov <bp@...en8.de>, Dave Hansen <dave.hansen@...ux.intel.com>, x86@...nel.org, "H. Peter Anvin" <hpa@...or.com> Cc: Leonardo Bras <leobras@...hat.com>, kvm@...r.kernel.org, linux-kernel@...r.kernel.org Subject: [PATCH v1 0/2] x86/kvm/fpu: Fix guest migration bugs that can crash guest This patchset comes from a bug I found during qemu guest migration from a host with newer CPU to a host with an older version of this CPU, and thus having less FPU features. When the guests were created, the one with less features is used as config, so migration is possible. Patch 1 fix a bug that always happens during this migration, and is related to the fact that xsave saves all feature flags, but xrstor does not touch the PKRU flag. Patch 2 comes from a concearn I have of the same bug as above hapenning through different means, such as a future bug in qemu, and rendering a lot of VMs unmigratable. Also, I think it makes sense to limit the fatures to what the vcpu supports, as if it were baremetal it would crash. Please let me know of anything to improve! Best regards, Leo Leonardo Bras (2): x86/kvm/fpu: Mask guest fpstate->xfeatures with guest_supported_xcr0 x86/kvm/fpu: Limit setting guest fpu features based on guest_supported_xcr0 arch/x86/kvm/cpuid.c | 3 +++ arch/x86/kvm/x86.c | 3 ++- 2 files changed, 5 insertions(+), 1 deletion(-) -- 2.35.1
Powered by blists - more mailing lists