lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 28 Oct 2020 01:47:49 +0000 From: Sherry Sun <sherry.sun@....com> To: Vincent Whitchurch <vincent.whitchurch@...s.com> CC: "sudeep.dutt@...el.com" <sudeep.dutt@...el.com>, "ashutosh.dixit@...el.com" <ashutosh.dixit@...el.com>, Christoph Hellwig <hch@...radead.org>, "gregkh@...uxfoundation.org" <gregkh@...uxfoundation.org>, "arnd@...db.de" <arnd@...db.de>, "kishon@...com" <kishon@...com>, "lorenzo.pieralisi@....com" <lorenzo.pieralisi@....com>, "linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>, dl-linux-imx <linux-imx@....com> Subject: RE: [PATCH V3 2/4] misc: vop: do not allocate and reassign the used ring Hi Vincent, > Subject: Re: [PATCH V3 2/4] misc: vop: do not allocate and reassign the used > ring > > On Tue, Oct 27, 2020 at 08:05:43AM +0100, Sherry Sun wrote: > > Can you help test the patch about removing the codes of reassign used > > ring, and comment on the impact for Intel MIC platform? Thanks for > > any help. > > I don't have access to MIC hardware myself, either. > > But this patch is quite certainly going to break it since guests using a kernel > without the patch will not work with hosts with a kernel with the patch. Thanks for your reply. This patch can be used by both guests and hosts. I have tested it on imx8qm platform(both guest and host are ARM64 architecture), and it works well. So I guess Intel MIC won't meet big problems when both guest and host apply this patch. But it is best if it can be tested. Best regards Sherry
Powered by blists - more mailing lists