lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Tue, 19 Oct 2021 19:43:49 +0000 From: "Bae, Chang Seok" <chang.seok.bae@...el.com> To: Thomas Gleixner <tglx@...utronix.de> CC: LKML <linux-kernel@...r.kernel.org>, "x86@...nel.org" <x86@...nel.org>, "Liu, Jing2" <jing2.liu@...el.com>, Paolo Bonzini <pbonzini@...hat.com>, Dave Hansen <dave.hansen@...ux.intel.com>, Arjan van de Ven <arjan@...ux.intel.com>, "kvm@...r.kernel.org" <kvm@...r.kernel.org>, "Nakajima, Jun" <jun.nakajima@...el.com>, Sean Christopherson <seanjc@...gle.com> Subject: Re: [patch 0/4] x86/fpu/kvm: Sanitize the FPU guest/user handling On Oct 17, 2021, at 10:03, Thomas Gleixner <tglx@...utronix.de> wrote: > > The latter builds, boots and runs KVM guests, but that reallocation > functionality is obviously completely untested. Compiled and booted on bare-metal and KVM (guest with the same kernel). No dmesg regression. No selftest regression. Tested-by Chang S. Bae <chang.seok.bae@...el.com> Thanks, Chang
Powered by blists - more mailing lists