Re: [PATCH 2/2] mm: Abstract moving to the next PFN

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Wed, 20 Sep 2023 05:09:58 +0100 "Matthew Wilcox (Oracle)" <willy@xxxxxxxxxxxxx> wrote:

> In order to fix the L1TF vulnerability, x86 can invert the PTE bits for
> PROT_NONE VMAs, which means we cannot move from one PTE to the next by
> adding 1 to the PFN field of the PTE.  Abstract advancing the PTE to
> the next PFN through a pte_next_pfn() function/macro.
> 
> Signed-off-by: Matthew Wilcox (Oracle) <willy@xxxxxxxxxxxxx>
> Fixes: bcc6cc832573 ("mm: add default definition of set_ptes()")
> Reported-by: syzbot+55cc72f8cc3a549119df@xxxxxxxxxxxxxxxxxxxxxxxxx

Is it just me, or is it a pain hunting down things via message IDs?

I tweaked the changelog thusly, pointing out that this fixes a BUG.


: In order to fix the L1TF vulnerability, x86 can invert the PTE bits for
: PROT_NONE VMAs, which means we cannot move from one PTE to the next by
: adding 1 to the PFN field of the PTE.  This results in the BUG reported at
: [1].
: 
: Abstract advancing the PTE to the next PFN through a pte_next_pfn()
: function/macro.
: 
: Link: https://lkml.kernel.org/r/20230920040958.866520-1-willy@xxxxxxxxxxxxx
: Signed-off-by: Matthew Wilcox (Oracle) <willy@xxxxxxxxxxxxx>
: Fixes: bcc6cc832573 ("mm: add default definition of set_ptes()")
: Reported-by: syzbot+55cc72f8cc3a549119df@xxxxxxxxxxxxxxxxxxxxxxxxx
: Closes: https://lkml.kernel.org/r/000000000000d099fa0604f03351@xxxxxxxxxx [1]

 




[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Bugtraq]     [Linux OMAP]     [Linux MIPS]     [eCos]     [Asterisk Internet PBX]     [Linux API]

  Powered by Linux