lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Thu, 11 Nov 2021 01:44:56 +0000 From: Sean Christopherson <seanjc@...gle.com> To: Ben Gardon <bgardon@...gle.com> Cc: Paolo Bonzini <pbonzini@...hat.com>, linux-kernel@...r.kernel.org, kvm@...r.kernel.org, Peter Xu <peterx@...hat.com>, Peter Shier <pshier@...gle.com>, David Matlack <dmatlack@...gle.com>, Mingwei Zhang <mizhang@...gle.com>, Yulei Zhang <yulei.kernel@...il.com>, Wanpeng Li <kernellwp@...il.com>, Xiao Guangrong <xiaoguangrong.eric@...il.com>, Kai Huang <kai.huang@...el.com>, Keqian Zhu <zhukeqian1@...wei.com>, David Hildenbrand <david@...hat.com> Subject: Re: [RFC 11/19] KVM: x86/mmu: Factor shadow_zero_check out of make_spte On Thu, Nov 11, 2021, Sean Christopherson wrote: > These are all related to guest context: > int (*page_fault)(struct kvm_vcpu *vcpu, struct kvm_page_fault *fault); > void (*inject_page_fault)(struct kvm_vcpu *vcpu, > struct x86_exception *fault); That's incorrect, page_fault() and inject_page_fault() could be per-VM. Neither is particularly interesting though.
Powered by blists - more mailing lists