lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <b92e535f-1683-e7f6-2bb4-da873605274f@wanadoo.fr>
Date:   Sun, 31 Jul 2022 22:00:42 +0200
From:   Christophe JAILLET <christophe.jaillet@...adoo.fr>
To:     Deepak Rawat <drawat.floss@...il.com>,
        David Airlie <airlied@...ux.ie>,
        Daniel Vetter <daniel@...ll.ch>,
        Thomas Zimmermann <tzimmermann@...e.de>
Cc:     linux-kernel@...r.kernel.org, kernel-janitors@...r.kernel.org,
        linux-hyperv@...r.kernel.org, dri-devel@...ts.freedesktop.org
Subject: Re: [PATCH] hyperv_setup_vram() calls vmbus_allocate_mmio(). This
 must be undone in the error handling path of the probe, as already done in
 the remove function.

Le 31/07/2022 à 21:57, Christophe JAILLET a écrit :
> This patch depends on	commit a0ab5abced55 ("drm/hyperv : Removing the
> restruction of VRAM allocation with PCI bar size").
> Without it, something like what is done in commit e048834c209a
> ("drm/hyperv: Fix device removal on Gen1 VMs") should be done.

I forgot the subject :(
Will resend.

CJ

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ