lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Tue, 16 Nov 2010 18:56:44 +0200 From: Avi Kivity <avi@...hat.com> To: Peter Zijlstra <a.p.zijlstra@...llo.nl> CC: Martin Schwidefsky <schwidefsky@...ibm.com>, Michael Holzheu <holzheu@...ux.vnet.ibm.com>, Shailabh Nagar <nagar1234@...ibm.com>, Andrew Morton <akpm@...ux-foundation.org>, Venkatesh Pallipadi <venki@...gle.com>, Suresh Siddha <suresh.b.siddha@...el.com>, Ingo Molnar <mingo@...e.hu>, Oleg Nesterov <oleg@...hat.com>, John stultz <johnstul@...ibm.com>, Thomas Gleixner <tglx@...utronix.de>, Balbir Singh <balbir@...ux.vnet.ibm.com>, Heiko Carstens <heiko.carstens@...ibm.com>, Roland McGrath <roland@...hat.com>, linux-kernel@...r.kernel.org, linux-s390@...r.kernel.org, "jeremy.fitzhardinge" <jeremy.fitzhardinge@...rix.com> Subject: Re: [RFC][PATCH v2 4/7] taskstats: Add per task steal time accounting On 11/16/2010 06:43 PM, Peter Zijlstra wrote: > >> No. Hypercalls are voluntary and known, but most exits are involuntary >> and unknown to the guest. Any memory access can generate a page fault, >> and any host interrupt will exit the guest. > Right, but we could not make the guest jump to a special stub on vcpu > enter? I guess we could simply because we have the hypervisor under > control. No, some entries inject an interrupt or exception, so the next rip value is unknown (without doing a lot of extra slow calculations). -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists