From mboxrd@z Thu Jan 1 00:00:00 1970 From: Razvan Cojocaru Subject: Re: [PATCH V5 1/3] xen/mem_access: Support for memory-content hiding Date: Mon, 13 Jul 2015 20:36:41 +0300 Message-ID: <55A3F729.4020302@bitdefender.com> References: <1436807687-9826-1-git-send-email-rcojocaru@bitdefender.com> <1436807687-9826-2-git-send-email-rcojocaru@bitdefender.com> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Return-path: In-Reply-To: List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: xen-devel-bounces@lists.xen.org Errors-To: xen-devel-bounces@lists.xen.org To: "Lengyel, Tamas" Cc: Jun Nakajima , Wei Liu , kevin.tian@intel.com, tamas@tklengyel.com, keir@xen.org, Ian Campbell , Stefano Stabellini , George Dunlap , Andrew Cooper , eddie.dong@intel.com, Xen-devel , Aravind.Gopalakrishnan@amd.com, Jan Beulich , suravee.suthikulpanit@amd.com, boris.ostrovsky@oracle.com, Ian Jackson List-Id: xen-devel@lists.xenproject.org On 07/13/2015 08:32 PM, Lengyel, Tamas wrote: > > > On Mon, Jul 13, 2015 at 1:14 PM, Razvan Cojocaru > > wrote: > > This patch adds support for memory-content hiding, by modifying the > value returned by emulated instructions that read certain memory > addresses that contain sensitive data. The patch only applies to > cases where VM_FLAG_ACCESS_EMULATE has been set to a vm_event > response. > > Signed-off-by: Razvan Cojocaru > > > > You seem to have missed my Acked-by I gave on v4 of this patch. Right, sorry :) In this case there's your ack and possibly George's for 1/3, so all the patches in the series have at least one ack. Thanks, Razvan