lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 3 Nov 2017 11:50:53 -0400 From: Pavel Tatashin <pasha.tatashin@...cle.com> To: Andrey Ryabinin <aryabinin@...tuozzo.com> Cc: Will Deacon <will.deacon@....com>, mhocko@...nel.org, akpm@...ux-foundation.org, linux-kernel@...r.kernel.org, sparclinux@...r.kernel.org, linux-mm@...ck.org, linuxppc-dev@...ts.ozlabs.org, linux-s390@...r.kernel.org, linux-arm-kernel@...ts.infradead.org, x86@...nel.org, kasan-dev@...glegroups.com, borntraeger@...ibm.com, heiko.carstens@...ibm.com, davem@...emloft.net, willy@...radead.org, ard.biesheuvel@...aro.org, mark.rutland@....com, catalin.marinas@....com, sam@...nborg.org, mgorman@...hsingularity.net, steven.sistare@...cle.com, daniel.m.jordan@...cle.com, bob.picco@...cle.com Subject: Re: [PATCH v12 08/11] arm64/kasan: add and use kasan_map_populate() >> 1. Replace these two patches: >> >> arm64/kasan: add and use kasan_map_populate() >> x86/kasan: add and use kasan_map_populate() >> >> With: >> >> x86/mm/kasan: don't use vmemmap_populate() to initialize >> shadow >> arm64/mm/kasan: don't use vmemmap_populate() to initialize >> shadow >> > > Pavel, could you please send the patches? These patches doesn't interfere with rest of the series, > so I think it should be enough to send just two patches to replace the old ones. > Hi Andrey, I asked Michal and Andrew how to proceed but never received a reply from them. The patches independent from the deferred page init series as long as they come before the series. Anyway, I will post these two patches to the mailing list soon. But, not really sure if they will be taken into mm-tree. Pavel
Powered by blists - more mailing lists