lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Thu, 28 Apr 2022 14:22:02 +0000
From:   Wei Liu <wei.liu@...nel.org>
To:     "Andrea Parri (Microsoft)" <parri.andrea@...il.com>
Cc:     KY Srinivasan <kys@...rosoft.com>,
        Haiyang Zhang <haiyangz@...rosoft.com>,
        Stephen Hemminger <sthemmin@...rosoft.com>,
        Wei Liu <wei.liu@...nel.org>, Dexuan Cui <decui@...rosoft.com>,
        Michael Kelley <mikelley@...rosoft.com>,
        Stefano Garzarella <sgarzare@...hat.com>,
        David Miller <davem@...emloft.net>,
        Jakub Kicinski <kuba@...nel.org>,
        Paolo Abeni <pabeni@...hat.com>, linux-hyperv@...r.kernel.org,
        virtualization@...ts.linux-foundation.org, netdev@...r.kernel.org,
        linux-kernel@...r.kernel.org
Subject: Re: [PATCH v2 0/5] hv_sock: Hardening changes

On Wed, Apr 27, 2022 at 03:12:20PM +0200, Andrea Parri (Microsoft) wrote:
> Changes since v1[1]:
>   - Expand commit message of patch #2
>   - Coding style changes
> 
> Changes since RFC[2]:
>   - Massage changelogs, fix typo
>   - Drop "hv_sock: Initialize send_buf in hvs_stream_enqueue()"
>   - Remove style/newline change
>   - Remove/"inline" hv_pkt_iter_first_raw()
> 
> Applies to v5.18-rc4.
> 
> Thanks,
>   Andrea
> 
> [1] https://lkml.kernel.org/r/20220420200720.434717-1-parri.andrea@gmail.com
> [2] https://lkml.kernel.org/r/20220413204742.5539-1-parri.andrea@gmail.com
> 
> Andrea Parri (Microsoft) (5):
[...]
>   Drivers: hv: vmbus: Accept hv_sock offers in isolated guests

This patch does not apply cleanly to hyperv-next.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ