lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Wed, 20 Jun 2007 19:53:53 +0200
From:	Andi Kleen <ak@...e.de>
To:	Mathieu Desnoyers <mathieu.desnoyers@...ymtl.ca>
Cc:	linux-kernel@...r.kernel.org, akpm@...ux-foundation.org,
	mingo@...hat.com, mbligh@...gle.com
Subject: Re: Problem with global_flush_tlb() on i386 (x86_64? too) in 2.6.22-rc4-mm2

On Wednesday 20 June 2007 18:46, Mathieu Desnoyers wrote:
> * Andi Kleen (ak@...e.de) wrote:
> > On Tuesday 19 June 2007 22:01:36 Mathieu Desnoyers wrote:
> > > Looking more closely into the code to find the cause of the
> > > change_page_addr()/global_flush_tlb() inconsistency, I see where the
> > > problem could be:
> >
> > Yes it's a known problem. I have a hack queued for .22 and there
> > are proposed patches for .23 too.
> >
> > ftp://ftp.firstfloor.org/pub/ak/x86_64/late-merge/patches/cpa-flush
> >
> > -ANdi
>
> Hi Andi,
>
> Although I cannot find it at the specified URL, I suspect it is already
> in Andrew's tree, in 2.6.22-rc4-mm2, under the name

Try again

> "x86_64-mm-cpa-cache-flush.patch"

No, that's a different patch with also at least one known bug.

-Andi
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ