lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 23 Mar 2022 15:24:16 +0100 From: Paolo Bonzini <bonzini@....org> To: Thomas Gleixner <tglx@...utronix.de>, dave.hansen@...ux.intel.com Cc: yang.zhong@...el.com, ravi.v.shankar@...el.com, mingo@...hat.com, "Chang S. Bae" <chang.seok.bae@...el.com>, bp@...en8.de, x86@...nel.org, linux-kernel@...r.kernel.org, KVM list <kvm@...r.kernel.org> Subject: Re: ping Re: [PATCH v4 0/2] x86: Fix ARCH_REQ_XCOMP_PERM and update the test On 3/23/22 13:55, Thomas Gleixner wrote: > --- a/arch/x86/kernel/fpu/xstate.c > +++ b/arch/x86/kernel/fpu/xstate.c > @@ -1625,6 +1625,8 @@ static int __xstate_request_perm(u64 per > > /* Calculate the resulting kernel state size */ > mask = permitted | requested; > + /* Take supervisor states into account */ > + mask |= xfeatures_mask_supervisor(); > ksize = xstate_calculate_size(mask, compacted); > This should be only added in for the !guest case. Paolo
Powered by blists - more mailing lists