lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Tue, 29 Jan 2008 16:20:50 -0800 (PST) From: Christoph Lameter <clameter@....com> To: Andrea Arcangeli <andrea@...ranet.com> cc: Robin Holt <holt@....com>, Avi Kivity <avi@...ranet.com>, Izik Eidus <izike@...ranet.com>, Nick Piggin <npiggin@...e.de>, kvm-devel@...ts.sourceforge.net, Benjamin Herrenschmidt <benh@...nel.crashing.org>, Peter Zijlstra <a.p.zijlstra@...llo.nl>, steiner@....com, linux-kernel@...r.kernel.org, linux-mm@...ck.org, daniel.blueman@...drics.com, Hugh Dickins <hugh@...itas.com> Subject: Re: [patch 2/6] mmu_notifier: Callbacks to invalidate address ranges On Wed, 30 Jan 2008, Andrea Arcangeli wrote: > > invalidate_range after populate allows access to memory for which ptes > > were zapped and the refcount was released. > > The last refcount is released by the invalidate_range itself. That is true for your implementation and to address Robin's issues. Jack: Is that true for the GRU? -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists