lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20220722224409.1336532-1-seanjc@google.com>
Date:   Fri, 22 Jul 2022 22:44:04 +0000
From:   Sean Christopherson <seanjc@...gle.com>
To:     Sean Christopherson <seanjc@...gle.com>,
        Paolo Bonzini <pbonzini@...hat.com>
Cc:     kvm@...r.kernel.org, linux-kernel@...r.kernel.org
Subject: [PATCH 0/5] KVM: VMX: PERF_GLOBAL_CTRL fixes

This is intended as a replacement for commit 00590a384408 ("Revert "KVM:
nVMX: Expose load IA32_PERF_GLOBAL_CTRL VM-{Entry,Exit} control"").

The basic idea is the same, except instead of skipping the load if
the desired value is the same, skip the load if the MSR doesn't exist.
AFAICT, that plugs all holes where a mischievious usersepace can get
KVM to WARN.

I dropped the CR4 changes for now.  I'd still prefer to give userspace
control, but AFAIK it doesn't cause problems, yet...

Paolo Bonzini (1):
  Revert "KVM: nVMX: Expose load IA32_PERF_GLOBAL_CTRL VM-{Entry,Exit}
    control"

Sean Christopherson (4):
  Revert "Revert "KVM: nVMX: Expose load IA32_PERF_GLOBAL_CTRL
    VM-{Entry,Exit} control""
  KVM: VMX: Mark all PERF_GLOBAL_(OVF)_CTRL bits reserved if there's no
    vPMU
  KVM: VMX: Add helper to check if the guest PMU has PERF_GLOBAL_CTRL
  KVM: nVMX: Attempt to load PERF_GLOBAL_CTRL on nVMX xfer iff it exists

 arch/x86/kvm/vmx/nested.c    |  6 +++---
 arch/x86/kvm/vmx/pmu_intel.c |  6 ++++--
 arch/x86/kvm/vmx/vmx.h       | 12 ++++++++++++
 3 files changed, 19 insertions(+), 5 deletions(-)


base-commit: 1a4d88a361af4f2e91861d632c6a1fe87a9665c2
-- 
2.37.1.359.gd136c6c3e2-goog

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ