lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 08 Sep 2010 09:19:03 +0300 From: Avi Kivity <avi@...hat.com> To: Paul Mackerras <paulus@...ba.org> CC: Ingo Molnar <mingo@...e.hu>, Pekka Enberg <penberg@...helsinki.fi>, Tom Zanussi <tzanussi@...il.com>, Frédéric Weisbecker <fweisbec@...il.com>, Steven Rostedt <rostedt@...dmis.org>, Arnaldo Carvalho de Melo <acme@...hat.com>, Peter Zijlstra <peterz@...radead.org>, linux-perf-users@...r.kernel.org, linux-kernel <linux-kernel@...r.kernel.org> Subject: Re: disabling group leader perf_event On 09/08/2010 04:44 AM, Paul Mackerras wrote: > > So... I would be interested to see you add the case for the MOV > instruction. :) x86 32-bit segmentation. Unfortunately those are limited to i386. With some care we could use them on x86_64 (temporarily switch the address space to include the "bytecode" and its data at the lower 4G, execute a far call to the bytecode, etc. It's cumbersome though, and will make context switches to the bytecode quite slow. -- I have a truly marvellous patch that fixes the bug which this signature is too narrow to contain. -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists