lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <4848DFEC.1010800@movial.fi> Date: Fri, 06 Jun 2008 09:57:48 +0300 From: Dmitri Vorobiev <dmitri.vorobiev@...ial.fi> To: Thiemo Seufer <ths@...workno.de> CC: Theodore Tso <tytso@....EDU>, Martin Michlmayr <tbm@...ius.com>, Ralf Baechle <ralf@...ux-mips.org>, Dmitri Vorobiev <dmitri.vorobiev@...il.com>, linux-mips@...ux-mips.org, linux-ext4@...r.kernel.org Subject: Re: ext4dev build failure on mips: "empty_zero_page" undefined Thiemo Seufer wrote: > Vorobiev Dmitri wrote: >> Theodore Tso wrote: >>> If you really insist I suppose we could have a MIPS specific patch >>> where we allocate a 4k page and zero it, so we can use it from our >>> kernel code because you don't want to export and make available the >>> ZERO_PAGE that gets used by the rest of the kernel, but that seems >>> awfully silly, and would be a waste of 4k of memory..... Someone from >>> MIPS land would have to test it, as well, as I dont think any of the >>> ext4 developers have access to a MIPS platform. >> Ted, Ralf seems to be unwilling to accept the ZERO_PAGE() export. If you >> send the MIPS-specific patch, I can do the testing for you as I have a >> MIPS Malta board at my disposal. > > AFAIU the problematic case are systems with R4000/R4400 SC/MC CPUs > since they use 8 zero pages of different color. Have a look at > arch/mips/mm/init.c:setup_zero_pages. OK, thanks for the info. However, I won't be able to tackle into the issue during this and the next week as I'm having a business trip. Therefore, if the issue is urgent, I'd be grateful if someone could take over. Thanks, Dmitri -- To unsubscribe from this list: send the line "unsubscribe linux-ext4" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists