Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751464AbbEGIX6 (ORCPT ); Thu, 7 May 2015 04:23:58 -0400 Received: from mga01.intel.com ([192.55.52.88]:32078 "EHLO mga01.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750841AbbEGIXz (ORCPT ); Thu, 7 May 2015 04:23:55 -0400 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.13,384,1427785200"; d="scan'208";a="490473056" From: Xiao Guangrong To: pbonzini@redhat.com Cc: gleb@kernel.org, mtosatti@redhat.com, kvm@vger.kernel.org, linux-kernel@vger.kernel.org, Xiao Guangrong Subject: [PATCH 0/3] KVM: MMU: fix SMAP virtualization Date: Thu, 7 May 2015 16:20:14 +0800 Message-Id: <1430986817-6260-1-git-send-email-guangrong.xiao@linux.intel.com> X-Mailer: git-send-email 2.1.0 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1115 Lines: 31 There are some bugs in current code: - the PFEC.RSVD is not always true and KVM reuses this bit to cache CPL and flags.AC bit - the shadow page will be resued for SMAP enabled and SMAP disabled, however, user page will be turned to kernel page under some cases so that SMAP check is missed on that entry This patchset fixes these bugs and a test case will be posted out soon Xiao Guangrong (3): KVM: MMU: fix smap permission check KVM: MMU: fix SMAP virtualization KVM: MMU: document smap_andnot_wp Documentation/virtual/kvm/mmu.txt | 18 ++++++++++++++---- arch/x86/include/asm/kvm_host.h | 1 + arch/x86/kvm/mmu.c | 7 +++++-- arch/x86/kvm/mmu.h | 4 ++-- arch/x86/kvm/paging_tmpl.h | 7 +++++++ arch/x86/kvm/x86.c | 8 +++----- 6 files changed, 32 insertions(+), 13 deletions(-) -- 2.1.0 -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/