[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <f9280995-942a-baad-7d67-db4f1a3015de@redhat.com>
Date: Thu, 12 Mar 2020 16:00:40 +0100
From: Paolo Bonzini <pbonzini@...hat.com>
To: Xiaoyao Li <xiaoyao.li@...el.com>,
Sean Christopherson <sean.j.christopherson@...el.com>
Cc: Thomas Gleixner <tglx@...utronix.de>,
Ingo Molnar <mingo@...hat.com>, Borislav Petkov <bp@...en8.de>,
Andy Lutomirski <luto@...capital.net>, x86@...nel.org,
kvm@...r.kernel.org, linux-kernel@...r.kernel.org,
David Laight <David.Laight@...lab.com>
Subject: Re: [PATCH v2 3/6] kvm: x86: Emulate split-lock access as a write
On 12/03/20 12:42, Xiaoyao Li wrote:
>> I completely agree that poorly emulating the instruction from the
>> (likely) malicious guest is a hack, but it's a simple and easy to
>> maintain hack.
>
> What's your opinion about above?
That's okay, I suppose.
Paolo
Powered by blists - more mailing lists