lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Thu, 23 Sep 2021 10:09:55 -0400 From: Boris Ostrovsky <boris.ostrovsky@...cle.com> To: Juergen Gross <jgross@...e.com>, xen-devel@...ts.xenproject.org, x86@...nel.org, linux-kernel@...r.kernel.org Cc: peterz@...radead.org, Stefano Stabellini <sstabellini@...nel.org>, Thomas Gleixner <tglx@...utronix.de>, Ingo Molnar <mingo@...hat.com>, Borislav Petkov <bp@...en8.de>, "H. Peter Anvin" <hpa@...or.com> Subject: Re: [PATCH v2 1/2] x86/xen: remove xen_have_vcpu_info_placement flag On 9/23/21 12:44 AM, Juergen Gross wrote: > > Hmm, maybe I should have been more explicit saying that the hypercall > was introduced in Xen 3.4, and only reason of failure is either an > illegal vcpu, an invalid mapping specification, or a try to reissue the > hypercall for a vcpu. None of those should ever happen. > That last sentence -- famous last words ;-) But yes, sure. Assuming both patches adjust their commit messages and the typo Reviewed-by: Boris Ostrovsky <boris.ostrovsky@...cle.com>
Powered by blists - more mailing lists