lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Sun, 5 Oct 2008 19:22:30 +0200 From: Vegard Nossum <vegard.nossum@...il.com> To: Ingo Molnar <mingo@...e.hu> Cc: Pekka Enberg <penberg@...helsinki.fi>, linux-kernel@...r.kernel.org Subject: [PATCH -tip] kmemcheck: use set_memory_4k() on x86_64 only >From 5bce9b1674e84ff36ba8f5a390b2ad30cd42b29a Mon Sep 17 00:00:00 2001 From: Vegard Nossum <vegard.nossum@...il.com> Date: Wed, 1 Oct 2008 18:36:42 +0200 Subject: [PATCH] kmemcheck: use set_memory_4k() on x86_64 only x86_32 already disables PSE capabilities and is fine. We need this to avoid the BUG in cache-flushing SMP call. Signed-off-by: Vegard Nossum <vegard.nossum@...il.com> --- arch/x86/mm/kmemcheck/kmemcheck.c | 2 ++ 1 files changed, 2 insertions(+), 0 deletions(-) diff --git a/arch/x86/mm/kmemcheck/kmemcheck.c b/arch/x86/mm/kmemcheck/kmemcheck.c index 5a08a70..d649aa7 100644 --- a/arch/x86/mm/kmemcheck/kmemcheck.c +++ b/arch/x86/mm/kmemcheck/kmemcheck.c @@ -295,7 +295,9 @@ void kmemcheck_hide_pages(struct page *p, unsigned int n) { unsigned int i; +#ifdef CONFIG_X86_64 set_memory_4k((unsigned long) page_address(p), n); +#endif for (i = 0; i < n; ++i) { unsigned long address; -- 1.5.5.1 -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists