lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Sat, 31 Mar 2012 21:31:11 +0000 From: Florian Tobias Schandinat <FlorianSchandinat@....de> To: Alan Cox <alan@...rguk.ukuu.org.uk> CC: Wang YanQing <udknight@...il.com>, linux-fbdev@...r.kernel.org, linux-kernel@...r.kernel.org, spock@...too.org Subject: Re: [PATCH] video:uvesafb: Fix oops that uvesafb try to execute NX-protected page On 03/27/2012 01:32 PM, Alan Cox wrote: > On Tue, 27 Mar 2012 18:01:36 +0800 > Wang YanQing <udknight@...il.com> wrote: > >> >> Ok! I try to check pcibios_enabled first, but get some opposition by Alan Cox, >> but I want to make thing work and fix the oops, so I choice the simple way to >> check the (__supported_pte_mask & _PAGE_NX) instead of to check this variable plus >> pci kernel boot parameter, pci mmconfig works or not, and more, and more. It is not >> the best method, but it works and maybe all will feel happy. Wang, could you please write a better commit message, at least you could include the oops that your patch fixes. > Apart from adding a helper in the includes for the arch code of > > static inline is_nx_enabled(void) > { > return !!(__supported_pte_mask & _PAGE_NX); > } As this check is already done in a few other places I think there should be a separate patch that adds this helper and ports all existing code to use it. So, does anyone have any objection against me taking this patch as is? Thanks, Florian Tobias Schandinat -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists