lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Mon, 11 Apr 2022 12:55:27 +0800 From: "SU Hang" <darcy.sh@...group.com> To: seanjc@...gle.com, pbonzini@...hat.com Cc: <bp@...en8.de>, "SU Hang" <darcy.sh@...group.com>, <dave.hansen@...ux.intel.com>, <hpa@...or.com>, "Lai Jiangshan" <jiangshan.ljs@...group.com>, <jmattson@...gle.com>, <joro@...tes.org>, <kvm@...r.kernel.org>, <linux-kernel@...r.kernel.org>, <mingo@...hat.com>, <tglx@...utronix.de>, <vkuznets@...hat.com>, <wanpengli@...cent.com>, <x86@...nel.org> Subject: Re: [PATCH v2 2/2] KVM: x86/mmu: Derive EPT violation RWX bits from EPTE RWX bits I sincerely apologize to you and Palo for making this mistake due to my negligence and lack of testing. Since the patches only care about macro substitutions and no function changes, this makes me sloppy. Now I realize my mistake. Ashamed Hang
Powered by blists - more mailing lists