lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <9f39e539-3216-4f5d-819f-9500f76a0154@linux.microsoft.com>
Date: Mon, 21 Jul 2025 10:27:07 -0700
From: Roman Kisel <romank@...ux.microsoft.com>
To: Will Deacon <will@...nel.org>, Marc Zyngier <maz@...nel.org>
Cc: Jack Thomson <jackabt.amazon@...il.com>, mark.rutland@....com,
 lpieralisi@...nel.org, sudeep.holla@....com, arnd@...db.de,
 wei.liu@...nel.org, mhklinux@...look.com,
 linux-arm-kernel@...ts.infradead.org, linux-kernel@...r.kernel.org,
 oliver.upton@...ux.dev, kvmarm@...ts.linux.dev, roypat@...zon.com,
 Jack Thomson <jackabt@...zon.com>
Subject: Re: [PATCH] arm64: kvm, smccc: Fix vendor uuid



On 7/21/2025 10:14 AM, Will Deacon wrote:
> On Mon, Jul 21, 2025 at 04:59:36PM +0100, Marc Zyngier wrote:

[...]

>>
>> Irk. This is remarkably embarrassing, and needs to be addressed ASAP,
>> before 6.16 ships. FWIW, I've just posted a quickly whipped selftest
>> that shows the problem[1].
>>
>> Will, is there a chance you can pick this up and ferry it to Linus?
>> If you do, please add:
>>
>> Reviewed-by: Marc Zyngier <maz@...nel.org>
>> Tested-by: Marc Zyngier <maz@...nel.org>
> 
> Sure, I'll grab it. Thanks!
> 

I'm sorry for that, apologies for screwing things up :(
Very much appreciate the fix and the test. I clearly missed testing
backward compat. with the old kernels.

> Will

-- 
Thank you,
Roman


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ