lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20221006004512.666529-1-seanjc@google.com>
Date:   Thu,  6 Oct 2022 00:45:05 +0000
From:   Sean Christopherson <seanjc@...gle.com>
To:     Paolo Bonzini <pbonzini@...hat.com>
Cc:     kvm@...r.kernel.org, linux-kernel@...r.kernel.org,
        Sean Christopherson <seanjc@...gle.com>
Subject: [PATCH 0/7]KVM: selftests: Clean up x86 page walker utilities

Clean up and dedup x86 utilities that walk page tables, e.g. to insert new
mappings or to retrieve existing mappings.  There's no end user that
benefits from the refactoring; I did all the work thinking that I needed
some super fancy test to hit an NX huge page bug...

Patch 1 has been posted by Vitaly (at my request)[*], but should be
identical, i.e. the order shouldn't matter.

[*] https://lore.kernel.org/all/20221004123956.188909-37-vkuznets@redhat.com

Sean Christopherson (7):
  KVM: selftests: Drop helpers to read/write page table entries
  KVM: selftests: Drop reserved bit checks from PTE accessor
  KVM: selftests: Remove useless shifts when creating guest page tables
  KVM: selftests: Verify parent PTE is PRESENT when getting child PTE
  KVM: selftests: Use virt_get_pte() when getting PTE pointer
  KVM: selftests: Use vm_get_page_table_entry() in addr_arch_gva2gpa()
  KVM: selftests: Play nice with huge pages when getting PTEs/GPAs

 .../selftests/kvm/include/x86_64/processor.h  |  19 ++-
 .../selftests/kvm/lib/x86_64/processor.c      | 159 ++++++------------
 .../kvm/x86_64/emulator_error_test.c          |   8 +-
 3 files changed, 70 insertions(+), 116 deletions(-)


base-commit: e18d6152ff0f41b7f01f9817372022df04e0d354
-- 
2.38.0.rc1.362.ged0d419d3c-goog

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ