lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Fri, 16 Sep 2016 11:11:58 -0400
From:   Luiz Capitulino <lcapitulino@...hat.com>
To:     Paolo Bonzini <pbonzini@...hat.com>
Cc:     kvm@...r.kernel.org, linux-kernel@...r.kernel.org,
        rkrcmar@...hat.com, rostedt@...dmis.org, mhiramat@...nel.org,
        mtosatti@...hat.com
Subject: Re: [PATCH v2 0/6] kvm: x86: export TSC information to user-space

On Fri, 16 Sep 2016 16:59:55 +0200
Paolo Bonzini <pbonzini@...hat.com> wrote:

> On 16/09/2016 16:59, Luiz Capitulino wrote:
> > On Fri, 16 Sep 2016 16:56:34 +0200
> > Paolo Bonzini <pbonzini@...hat.com> wrote:
> >   
> >> On 16/09/2016 16:27, Luiz Capitulino wrote:  
> >>> [Introduction will follow]
> >>>
> >>> Changelog
> >>> ---------
> >>>
> >>> v2
> >>>
> >>>  - add tsc_offset field to struct kvm_vcpu_arch
> >>>  - drop read_tsc_offset()
> >>>  - add per-vcpu dir entries in debugfs
> >>>  - export TSC scaling info (besides TSC offset)
> >>>  - export the TSC offset as a signed number
> >>>  - drop patch that wrongly tried to improve error
> >>>    handling in kvm_create_vm_debugfs()    
> >>
> >> I've tested this patch on an AMD machine with TSC scaling, so I'm
> >> pushing it shortly to kvm/queue.  
> > 
> > Thanks for the testing! Btw, I don't mind letting it sit on the
> > list for a few days for review (well, no submitter should mind
> > this).  
> 
> That's what kvm/queue is for. :)

Makes sense.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ