lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 29 May 2019 04:39:16 +0200 From: Paolo Bonzini <pbonzini@...hat.com> To: Tao Xu <tao3.xu@...el.com> Cc: rkrcmar@...hat.com, corbet@....net, tglx@...utronix.de, mingo@...hat.com, bp@...en8.de, hpa@...or.com, sean.j.christopherson@...el.com, x86@...nel.org, kvm@...r.kernel.org, linux-doc@...r.kernel.org, linux-kernel@...r.kernel.org, jingqi.liu@...el.com Subject: Re: [PATCH v2 3/3] KVM: vmx: handle vm-exit for UMWAIT and TPAUSE On 29/05/19 04:25, Tao Xu wrote: >> > OK, but should we just drop this patch? > Or add the VMX_EXIT_REASONS bits of UMWAIT and TPAUSE and handle like > XSAVES/XRSTORS: > "kvm_skip_emulated_instruction(vcpu);" > "WARN(1, "this should never happen\n");" Yes, this sounds good to me. Paolo
Powered by blists - more mailing lists