lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <baebee60-3d5d-ed7a-ecb8-09a8b2d61ede@bytedance.com>
Date:   Thu, 21 Jan 2021 10:12:14 +0800
From:   zhenwei pi <pizhenwei@...edance.com>
To:     Greg KH <gregkh@...uxfoundation.org>, pbonzini@...hat.com
Cc:     arnd@...db.de, linux-kernel@...r.kernel.org
Subject: Re: Re: PING: [PATCH v5 0/2] misc: pvpanic: introduce capability &
 event attribute

On 1/21/21 1:53 AM, Greg KH wrote:
> X-Gm-Spam: 0
> X-Gm-Phishy: 0
> 
> On Mon, Jan 18, 2021 at 09:42:57AM +0800, zhenwei pi wrote:
>> Hi, Greg
>>
>> What's the next step I should take?
> 
> I need some reviews by the people who will be doing the qemu portion of
> this, or someone else, please.
> 
> thanks,
> 
> greg k-h
> 

Paolo has already fixed QEMU side compat stuff.
https://github.com/qemu/qemu/commit/b1b0393c3c58c0e96c7c44e2e98baa252d6c6813

And I realized that guest side also needs to test capability, so I 
always CC Paolo in this patch series.

-- 
zhenwei pi

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ