lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Thu, 3 Nov 2022 16:27:47 +0100 From: Paolo Bonzini <pbonzini@...hat.com> To: Christian Borntraeger <borntraeger@...ux.ibm.com>, Sean Christopherson <seanjc@...gle.com>, Marc Zyngier <maz@...nel.org>, Huacai Chen <chenhuacai@...nel.org>, Aleksandar Markovic <aleksandar.qemu.devel@...il.com>, Anup Patel <anup@...infault.org>, Paul Walmsley <paul.walmsley@...ive.com>, Palmer Dabbelt <palmer@...belt.com>, Albert Ou <aou@...s.berkeley.edu>, Janosch Frank <frankja@...ux.ibm.com>, Claudio Imbrenda <imbrenda@...ux.ibm.com>, Matthew Rosato <mjrosato@...ux.ibm.com>, Eric Farman <farman@...ux.ibm.com>, Vitaly Kuznetsov <vkuznets@...hat.com> Cc: James Morse <james.morse@....com>, Alexandru Elisei <alexandru.elisei@....com>, Suzuki K Poulose <suzuki.poulose@....com>, Oliver Upton <oliver.upton@...ux.dev>, Atish Patra <atishp@...shpatra.org>, David Hildenbrand <david@...hat.com>, kvm@...r.kernel.org, linux-arm-kernel@...ts.infradead.org, kvmarm@...ts.linux.dev, kvmarm@...ts.cs.columbia.edu, linux-mips@...r.kernel.org, linuxppc-dev@...ts.ozlabs.org, kvm-riscv@...ts.infradead.org, linux-riscv@...ts.infradead.org, linux-s390@...r.kernel.org, linux-kernel@...r.kernel.org, Isaku Yamahata <isaku.yamahata@...el.com>, Fabiano Rosas <farosas@...ux.ibm.com>, Michael Ellerman <mpe@...erman.id.au>, Chao Gao <chao.gao@...el.com>, Thomas Gleixner <tglx@...utronix.de>, Yuan Yao <yuan.yao@...el.com> Subject: Re: [PATCH 00/44] KVM: Rework kvm_init() and hardware enabling On 11/3/22 13:08, Christian Borntraeger wrote: >> There are bug fixes throughout this series. They are more scattered than >> I would usually prefer, but getting the sequencing correct was a gigantic >> pain for many of the x86 fixes due to needing to fix common code in order >> for the x86 fix to have any meaning. And while the bugs are often fatal, >> they aren't all that interesting for most users as they either require a >> malicious admin or broken hardware, i.e. aren't likely to be encountered >> by the vast majority of KVM users. So unless someone _really_ wants a >> particular fix isolated for backporting, I'm not planning on shuffling >> patches. >> >> Tested on x86. Lightly tested on arm64. Compile tested only on all >> other architectures. > > Some sniff tests seem to work ok on s390. Thanks. There are just a couple nits, and MIPS/PPC/RISC-V have very small changes. Feel free to send me a pull request once Marc acks. Paolo
Powered by blists - more mailing lists