lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <AANLkTinP3Kh4Gjnkx2ycr34W6SVqLsBh7yMsGuoU7pAD@mail.gmail.com>
Date:	Sat, 14 Aug 2010 14:56:58 -0700
From:	Linus Torvalds <torvalds@...ux-foundation.org>
To:	Ed Tomlinson <edt@....ca>
Cc:	sedat.dilek@...il.com, Greg KH <gregkh@...e.de>,
	LKML <linux-kernel@...r.kernel.org>, penberg@...nel.org,
	arthur@....ro, wylda@...ny.cz
Subject: Re: Linux 2.6.35.2

On Sat, Aug 14, 2010 at 12:47 PM, Ed Tomlinson <edt@....ca> wrote:
> On Saturday 14 August 2010 14:47:45 Linus Torvalds wrote:
>>
>> Just to verify: you have CONFIG_HIGHPTE enabled on a x86-32 kernel,
>> right? I'd have expected this to not ever show up anywhere else, and
>> I'm just verifying that there isn't anything else going on. I'm
>> appending the commit message, the patch hasn't changed.
>
> No.  I have a x86-64 based kernel (amd64).

Hmm. On x86-64, pte_unmap() is a no-op. So moving it around should not
matter one whit. We don't even have a debug mode to turn it into some
kind of "check that we use it properly in an atomic region" which we
_could_ do.

Can you send me the messages you saw without that patch? There's
something odd going on here. I don't like the fact that the patch
apparently makes a difference for you. It shouldn't.

                     Linus
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ