lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <3fdd1acd-8c8b-4381-aca4-def1a032737c@intel.com>
Date: Fri, 12 Jan 2024 18:58:40 +0100
From: "Wilczynski, Michal" <michal.wilczynski@...el.com>
To: Sean Christopherson <seanjc@...gle.com>
CC: <pbonzini@...hat.com>, <tglx@...utronix.de>, <mingo@...hat.com>,
	<bp@...en8.de>, <dave.hansen@...ux.intel.com>, <x86@...nel.org>,
	<hpa@...or.com>, <kvm@...r.kernel.org>, <linux-kernel@...r.kernel.org>,
	<zhi.a.wang@...el.com>, <artem.bityutskiy@...ux.intel.com>,
	<yuan.yao@...el.com>, Zheyu Ma <zheyuma97@...il.com>, Maxim Levitsky
	<mlevitsk@...hat.com>
Subject: Re: [PATCH v1] KVM: nVMX: Fix handling triple fault on RSM
 instruction



On 1/2/2024 8:57 PM, Sean Christopherson wrote:
> +Maxim

> Anyways, before we do anything, I'd like to get Maxim's input on what exactly was
> addressed by 759cbd59674a.

I think enough time has passed, and it's safe to say that this e-mail
got lost somewhere in Maxim inbox. I think I'll go ahead and post next
revision of this patch next week.

Thanks,
MichaƂ

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ