lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 9 Jul 2014 16:16:31 +0200
From: Peter Zijlstra <peterz@...radead.org>
To: kan.liang@...el.com
Cc: andi@...stfloor.org, linux-kernel@...r.kernel.org,
kvm@...r.kernel.org
Subject: Re: [PATCH V4 1/2] perf ignore LBR and extra_regs.
On Tue, Jul 08, 2014 at 09:49:40AM -0700, kan.liang@...el.com wrote:
> +/*
> + * Under certain circumstances, access certain MSR may cause #GP.
> + * The function tests if the input MSR can be safely accessed.
> + */
> +static inline bool check_msr(unsigned long msr)
> +{
> + u64 value;
> +
> + if (rdmsrl_safe(msr, &value) < 0)
> + return false;
> + if (wrmsrl_safe(msr, value) < 0)
> + return false;
> + return true;
> +}
What does this thing return after patch 2? does the write still fault or
will KVM silently take writes too?
Content of type "application/pgp-signature" skipped
Powered by blists - more mailing lists