Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed, 31 Oct 2018 18:02:59 +0200
From: Ahmed Soliman <>
Cc: Paolo Bonzini <>, Radim Krčmář <>, 
	nathan Corbet <>, Thomas Gleixner <>, Ingo Molnar <>, 
	Borislav Petkov <>, "H. Peter Anvin" <>, "the arch/x86 maintainers" <>,,,, 
	김인겸 <>, 
	Kernel Hardening <>,, 
	Boris Lukashev <>, Hossam Hassan <>, 
	Ahmed Lotfy <>
Subject: Re: gRe: [PATCH V5 1/5] KVM: X86: Memory ROE documentation

On Mon, 29 Oct 2018 at 18:42, Sean Christopherson
<> wrote:
> On Fri, Oct 26, 2018 at 05:12:19PM +0200, Ahmed Abd El Mawgood wrote:
> > Following up with my previous threads on KVM assisted Anti rootkit
> > protections.
> All of the changelogs in this series need to be rewritten to adhere to
> Documentation/process[1].  In particular, use imperative mood and
> describe why/what is being done in a self-contained manner, e.g. the
> above line isn't very helpful without a lot of prior context.
> [1]
> > The current version doesn't address the attacks involving pages
> > remapping. It is still design in progress, nevertheless, it will be in
> > my later patch sets.
> This series should be tagged RFC if its design is a WIP.
Ops my bad, the current description is obsolete and I forgot to remove
it. I will have this fixed as well as your other comments in the next
patch series.

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.