lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  PHC 
Open Source and information security mailing list archives
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Tue, 10 Aug 2021 08:49:37 +0100
From:   Marc Zyngier <>
To:     Thomas Gleixner <>
Cc:     LKML <>,
        Alex Williamson <>,
        "Raj, Ashok" <>,
        "David S. Miller" <>,
        Bjorn Helgaas <>,,
        Kevin Tian <>,
        Ingo Molnar <>,,,
        Niklas Schnelle <>,
        Gerald Schaefer <>,
        Heiko Carstens <>,
        Christian Borntraeger <>
Subject: Re: [patch V2 00/19] PCI/MSI, x86: Cure a couple of inconsistencies

On 2021-07-29 22:51, Thomas Gleixner wrote:
> A recent discussion about the PCI/MSI management for virtio unearthed a
> violation of the MSI-X specification vs. writing the MSI-X message: 
> under
> certain circumstances the entry is written without being masked.
> While looking at that and the related violation of the x86 non-remapped
> interrupt affinity mechanism a few other issues were discovered by
> inspection.
> The following series addresses these.
> Note this does not fix the virtio issue, but while staring at the above
> problems I came up with a plan to address this. I'm still trying to
> convince myself that I can get away without sprinkling locking all over 
> the
> place, so don't hold your breath that this will materialize tomorrow.

For the patches I haven't acked yet, and with the fix on patch 18:

Reviewed-by: Marc Zyngier <>
Tested-by: Marc Zyngier <>



Powered by blists - more mailing lists