lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 27 May 2022 17:06:56 +0000 From: Sean Christopherson <seanjc@...gle.com> To: Paolo Bonzini <pbonzini@...hat.com> Cc: Sean Christopherson <seanjc@...gle.com>, Vitaly Kuznetsov <vkuznets@...hat.com>, Wanpeng Li <wanpengli@...cent.com>, Jim Mattson <jmattson@...gle.com>, Joerg Roedel <joro@...tes.org>, kvm@...r.kernel.org, linux-kernel@...r.kernel.org, Chenyi Qiang <chenyi.qiang@...el.com>, Lei Wang <lei4.wang@...el.com> Subject: [PATCH v2 0/2] KVM: VMX: Sanitize VM-Entry/VM-Exit pairs during setup Sanitize the VM-Entry/VM-Exit load+load and load+clear pairs when kvm_intel is loaded instead of checking both controls at runtime. Not sanitizing means KVM ends up setting non-dynamic bits in the VMCS. Add an on-by-default knob to reject kvm_intel if an inconsistent VMCS config is detected instead of using a degraded and/or potentially broken setup. v2: - Drop the macros. [Paolo] - Tweak the module param name to try to capture that KVM doesn't check for all possible inconsistencies. [Jim] - Enable the knob by default. [Paolo] v1: https://lore.kernel.org/all/20220525210447.2758436-1-seanjc@google.com Sean Christopherson (2): KVM: VMX: Sanitize VM-Entry/VM-Exit control pairs at kvm_intel load time KVM: VMX: Reject kvm_intel if an inconsistent VMCS config is detected arch/x86/kvm/vmx/capabilities.h | 13 +++------ arch/x86/kvm/vmx/vmx.c | 52 +++++++++++++++++++++++++++++++-- 2 files changed, 53 insertions(+), 12 deletions(-) base-commit: 90bde5bea810d766e7046bf5884f2ccf76dd78e9 -- 2.36.1.255.ge46751e96f-goog
Powered by blists - more mailing lists