lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  PHC 
Open Source and information security mailing list archives
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Mon, 4 Mar 2019 11:15:29 +0300
From:   "Kirill A. Shutemov" <>
To:     Baoquan He <>
Subject: Re: [PATCH v2 0/2] x86/mm/KASLR: Change the granularity of
 randomization to PUD size in 5-level

On Fri, Mar 01, 2019 at 10:45:02PM +0800, Baoquan He wrote:
> Hi Kirill,
> I updated patch per your comments. While I kept the 'paddr' variable and
> the '0' initilization stuffs. My thought is there are two kinds of mapping
> in the handling, so keeping these names from old codes can make it more
> understandable. What do you think?
> Kind               Physical address            Virtual address
> ----------------------------------------------------------------
> Direct mapping     paddr                vaddr = paddr+PAGE_OFFSET
> 1:1 mapping        paddr                    paddr

I agree with your logic and patch looks good to me. But maybe you should
exmplain this in the comments too?


Acked-by: Kirill A. Shutemov <>

 Kirill A. Shutemov

Powered by blists - more mailing lists