From mboxrd@z Thu Jan 1 00:00:00 1970 From: Marcelo Tosatti Subject: Re: KVM: MMU: handle invalid root_hpa at __direct_map Date: Sun, 22 Dec 2013 12:56:49 -0200 Message-ID: <20131222145649.GA6611@amt.cnet> References: Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Cc: Muli Ben-Yehuda , kvm@vger.kernel.org, pbonzini@redhat.com, xiaoguangrong@linux.vnet.ibm.com, Benoit Hudzia , Abel Gordon , Dan Aloni To: Rom Freiman Return-path: Received: from mx1.redhat.com ([209.132.183.28]:58056 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753412Ab3LVO5h (ORCPT ); Sun, 22 Dec 2013 09:57:37 -0500 Content-Disposition: inline In-Reply-To: Sender: kvm-owner@vger.kernel.org List-ID: On Sun, Dec 22, 2013 at 11:17:21AM +0200, Rom Freiman wrote: > Hello everyone, > > I've been chasing this bug for a while. > > According to my research, this bug fix is works fine for > 3.11.9-200.fc19.x86_64 kernel version (and I also came to almost similar > solution and really solved the crash). > > But, the problem is, that it seems that this patch does not work on 3.13.0-rc2+ > - it looks like the code flow is different and it crashes in ept_page_fault > and does not reach __direct_map: Yep, similar problem, care to send a patch against FNAME(page_fault), kvm_mmu_get_spte_hierarchy Maybe there are more vulnerable sites, should secure them all.