lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20150609102302.GA32447@gmail.com>
Date:	Tue, 9 Jun 2015 12:23:02 +0200
From:	Ingo Molnar <mingo@...nel.org>
To:	Dave Hansen <dave@...1.net>
Cc:	linux-kernel@...r.kernel.org, x86@...nel.org, tglx@...utronix.de,
	dave.hansen@...ux.intel.com
Subject: Re: [PATCH 18/19] x86, mpx: do not count MPX VMAs as neighbors when
 unmapping


* Dave Hansen <dave@...1.net> wrote:

> diff -puN arch/x86/mm/mpx.c~mpx-dont-count-mpx-vmas-as-neighbors arch/x86/mm/mpx.c
> --- a/arch/x86/mm/mpx.c~mpx-dont-count-mpx-vmas-as-neighbors	2015-06-01 10:24:10.037992968 -0700
> +++ b/arch/x86/mm/mpx.c	2015-06-01 10:24:10.040993104 -0700
> @@ -937,16 +937,30 @@ static int try_unmap_single_bt(struct mm
>  	void __user *bde_vaddr;
>  	int ret;
>  	/*
> +	 * We already unliked the VMAs from the mm's rbtree so 'start'
> +	 * is guaranteed to be in a hole. This gets us the first VMA
> +	 * before the hole in to 'prev' and the next VMA after the hole
> +	 * in to 'next'.

Hey, I didn't know VMAs were on Facebook ;-)

I fixed it up to 'unlinked'.

Thanks,

	Ingo
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ