lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20251121223444.355422-1-seanjc@google.com>
Date: Fri, 21 Nov 2025 14:34:39 -0800
From: Sean Christopherson <seanjc@...gle.com>
To: Sean Christopherson <seanjc@...gle.com>, Paolo Bonzini <pbonzini@...hat.com>
Cc: kvm@...r.kernel.org, linux-kernel@...r.kernel.org, 
	Fred Griffoul <fgriffo@...zon.co.uk>
Subject: [PATCH v3 0/5] KVM: nVMX: Mark APIC page dirty on VM-Exit

Extended version of Fred's patch to mark the APIC access page dirty on
VM-Exit (KVM already marks it dirty when it's unmapped).

v3:
 - Fix a benign memslots bug in __kvm_vcpu_map().
 - Mark vmcs12 pages dirty if and only if they're mapped (out-of-band).
 - Don't mark the APIC access page dirty when deliver nested posted IRQ.

v2: https://lore.kernel.org/all/20250910085156.1419090-1-griffoul@gmail.com

Fred Griffoul (1):
  KVM: nVMX: Mark APIC access page dirty when syncing vmcs12 pages

Sean Christopherson (4):
  KVM: Use vCPU specific memslots in __kvm_vcpu_map()
  KVM: x86: Mark vmcs12 pages as dirty if and only if they're mapped
  KVM: nVMX: Precisely mark vAPIC and PID maps dirty when delivering
    nested PI
  KVM: VMX: Move nested_mark_vmcs12_pages_dirty() to vmx.c, and rename

 arch/x86/kvm/vmx/nested.c | 25 ++-----------------------
 arch/x86/kvm/vmx/vmx.c    | 11 ++++++++++-
 include/linux/kvm_host.h  |  9 ++++++++-
 virt/kvm/kvm_main.c       |  2 +-
 4 files changed, 21 insertions(+), 26 deletions(-)


base-commit: 115d5de2eef32ac5cd488404b44b38789362dbe6
-- 
2.52.0.rc2.455.g230fcf2819-goog


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ