lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Tue, 17 Apr 2012 11:55:59 +0800 From: Xiao Guangrong <xiaoguangrong@...ux.vnet.ibm.com> To: Avi Kivity <avi@...hat.com> CC: Marcelo Tosatti <mtosatti@...hat.com>, LKML <linux-kernel@...r.kernel.org>, KVM <kvm@...r.kernel.org> Subject: Re: [PATCH v2 10/16] KVM: MMU: fask check whether page is writable On 04/16/2012 07:47 PM, Avi Kivity wrote: > On 04/16/2012 01:20 PM, Xiao Guangrong wrote: >>>> >>>> It is used to avoid the unnecessary overload >>> >>> It's overloading me :( >>> >> >> >> Sorry. >> > > The trick is to send those in separate patchset so the maintainer > doesn't notice. > Thanks for your suggestion, i will pay more attention on it in the further. For this patch, what did you mean of "those"? You mean the whole rmap.PTE_LIST_WP_BIT (fast check for shadow page table write protection and host write protection) or just about host_page_write_protect (for KSM only)? If we do not have rmap.PTE_LIST_WP_BIT, there may have regression on shadow mmu. Hmm, do i need implement rmap.PTE_LIST_WP_BIT, then fast page fault? -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists