lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <200711282222.30004.casus@casus.us>
Date:	Wed, 28 Nov 2007 22:22:29 +0100
From:	Anton Petrusevich <casus@...us.us>
To:	linux-kernel@...r.kernel.org
Subject: [PATCH] mm/page-writeback - highmem_is_dirtyable option (replacesdirty_highmem patch)

> Well, it was quick enough to just do - here's the patch. I've
> also updated the documentation a bit to clarify the intention and
>  the reasons why you might want to use it (based in part on the 
>  comments to the original change that made highmem uncountable for
>  dirtyness purposes)
 
>  Tested and applied against 2.6.23.9 (our build script makes Debian
>  packages from a clean unpack of kernel major plus patch minor plus
>  svn checkout of out quilt series and apply regardless, so it was
>  just as easy to bump the version number while I was at it).
 
>  Builds, boots, passes a quick run of the test program I used last
>  time around.
 
>  Bron.
 
Thanks Bron! I can use vmware again!
-- 
Anton Petrusevich
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ