lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20240927185211.729207-1-jeffxu@chromium.org> Date: Fri, 27 Sep 2024 18:52:08 +0000 From: jeffxu@...omium.org To: akpm@...ux-foundation.org, keescook@...omium.org, corbet@....net Cc: jeffxu@...gle.com, jorgelo@...omium.org, groeck@...omium.org, linux-kernel@...r.kernel.org, linux-kselftest@...r.kernel.org, linux-mm@...ck.org, jannh@...gle.com, sroettger@...gle.com, pedro.falcato@...il.com, linux-hardening@...r.kernel.org, willy@...radead.org, gregkh@...uxfoundation.org, torvalds@...ux-foundation.org, deraadt@...nbsd.org, usama.anjum@...labora.com, surenb@...gle.com, merimus@...gle.com, rdunlap@...radead.org, lorenzo.stoakes@...cle.com, Liam.Howlett@...cle.com, enh@...gle.com, Jeff Xu <jeffxu@...omium.org> Subject: [PATCH v1 0/1] update mseal.rst From: Jeff Xu <jeffxu@...omium.org> Pedro Falcato's optimization [1] for checking sealed VMAs, which replaces the can_modify_mm() function with an in-loop check, necessitates an update to the mseal.rst documentation to reflect this change. Furthermore, the document has received offline comments regarding the code sample and suggestions for sentence clarification to enhance reader comprehension. [1] https://lore.kernel.org/linux-mm/20240817-mseal-depessimize-v3-0-d8d2e037df30@gmail.com/ Jeff Xu (1): mseal: update mseal.rst Documentation/userspace-api/mseal.rst | 290 ++++++++++++-------------- 1 file changed, 136 insertions(+), 154 deletions(-) -- 2.46.1.824.gd892dcdcdd-goog
Powered by blists - more mailing lists