lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID:
 <TY1PPFCDFFFA68A6B6DC1935A24DE9A3319F330A@TY1PPFCDFFFA68A.apcprd02.prod.outlook.com>
Date: Tue, 19 Aug 2025 17:30:32 +0800
From: "Nutty.Liu" <nutty.liu@...mail.com>
To: guoren@...nel.org, paul.walmsley@...ive.com, anup@...infault.org,
 atish.patra@...ux.dev, fangyu.yu@...ux.alibaba.com
Cc: linux-riscv@...ts.infradead.org, linux-kernel@...r.kernel.org,
 kvm@...r.kernel.org, kvm-riscv@...ts.infradead.org
Subject: Re: [PATCH] RISC-V: KVM: Prevent HGATP_MODE_BARE passed


On 8/19/2025 8:46 AM, guoren@...nel.org wrote:
> From: "Guo Ren (Alibaba DAMO Academy)" <guoren@...nel.org>
>
> urrent kvm_riscv_gstage_mode_detect() assumes H-extension must
s/urrent/Current
> have HGATP_MODE_SV39X4/SV32X4 at least, but the spec allows
> H-extension with HGATP_MODE_BARE alone. The KVM depends on
> !HGATP_MODE_BARE at least, so enhance the gstage-mode-detect
> to block HGATP_MODE_BARE.
>
> Move gstage-mode-check closer to gstage-mode-detect to prevent
> unnecessary init.
>
> Signed-off-by: Guo Ren (Alibaba DAMO Academy) <guoren@...nel.org>
> ---
>   arch/riscv/kvm/gstage.c | 27 ++++++++++++++++++++++++---
>   arch/riscv/kvm/main.c   | 35 +++++++++++++++++------------------
>   2 files changed, 41 insertions(+), 21 deletions(-)
Reviewed-by: Nutty Liu <nutty.liu@...mail.com>

Thanks,
Nutty

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ