lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 11 Dec 2013 12:12:40 +0100 From: Borislav Petkov <bp@...en8.de> To: Matt Fleming <matt@...sole-pimps.org> Cc: Dave Young <dyoung@...hat.com>, "H. Peter Anvin" <hpa@...or.com>, Ingo Molnar <mingo@...nel.org>, linux-kernel@...r.kernel.org, linux-efi@...r.kernel.org, x86@...nel.org, mjg59@...f.ucam.org, James.Bottomley@...senPartnership.com, vgoyal@...hat.com, ebiederm@...ssion.com, horms@...ge.net.au, kexec@...ts.infradead.org, greg@...ah.com, toshi.kani@...com Subject: Re: [PATCH v5 01/14] x86/mm: sparse warning fix for early_memremap On Wed, Dec 11, 2013 at 10:20:25AM +0000, Matt Fleming wrote: > This needs reviewing by at least one of the x86 folks, but it > certainly makes sense to me. Ingo told me yesterday, it makes sense too. I'd guess we can try it. FWIW, all callers of early_memremap use the memory they get remapped as normal memory so we should be safe. Maybe this whole discussion should be noted down in the commit message so that people know. -- Regards/Gruss, Boris. Sent from a fat crate under my desk. Formatting is fine. -- -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists