Re: [stable] KVM security fixes

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Mon, 2013-04-15 at 15:05 -0700, Andrew Honig wrote:
> As they are these patches will cause issues for some guests
> (particular RHEL5) which uses non 32-byte aligned addresses.  The
> documentation specified the alignment requirement, but guests got away
> with ignoring that requirement and through random luck it never caused
> an issue before.
> 
> https://git.kernel.org/cgit/virt/kvm/kvm.git/commit/?id=8f964525a121f2ff2df948dac908dcc65be21b5b
> Adds support for cross page reads and writes and allows for dropping
> alignment checks entirely, which will work with any guests regardless
> of alignment issues.  I'd recommend picking up this patch as well,
> although it isn't as widely tested.
[...]

Thanks, I've added this to the queue for 3.2 along with the other fixes.

In 3.2, kvm_gfn_to_hva_cache_init() used __gfn_to_memslot() so I've
maintained that when backporting the cross-page support.

Ben.

-- 
Ben Hutchings
Klipstein's 4th Law of Prototyping and Production:
                                    A fail-safe circuit will destroy others.

Attachment: signature.asc
Description: This is a digitally signed message part


[Index of Archives]     [Linux Kernel]     [Kernel Development Newbies]     [Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Yosemite Hiking]     [Linux Kernel]     [Linux SCSI]