lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Thu, 23 Sep 2021 10:10:01 +0200 From: Juergen Gross <jgross@...e.com> To: Mike Rapoport <rppt@...nel.org>, Linus Torvalds <torvalds@...ux-foundation.org> Cc: Andrew Morton <akpm@...ux-foundation.org>, devicetree@...r.kernel.org, iommu@...ts.linux-foundation.org, kasan-dev@...glegroups.com, kvm@...r.kernel.org, linux-alpha@...r.kernel.org, linux-arm-kernel@...ts.infradead.org, linux-efi@...r.kernel.org, linux-kernel@...r.kernel.org, linux-mips@...r.kernel.org, linux-mm@...ck.org, linux-riscv@...ts.infradead.org, linux-s390@...r.kernel.org, linux-sh@...r.kernel.org, linux-snps-arc@...ts.infradead.org, linux-um@...ts.infradead.org, linux-usb@...r.kernel.org, linuxppc-dev@...ts.ozlabs.org, sparclinux@...r.kernel.org, xen-devel@...ts.xenproject.org, Mike Rapoport <rppt@...ux.ibm.com> Subject: Re: [PATCH 2/3] xen/x86: free_p2m_page: use memblock_free_ptr() to free a virtual pointer On 23.09.21 09:43, Mike Rapoport wrote: > From: Mike Rapoport <rppt@...ux.ibm.com> > > free_p2m_page() wrongly passes a virtual pointer to memblock_free() that > treats it as a physical address. > > Call memblock_free_ptr() instead that gets a virtual address to free the > memory. > > Signed-off-by: Mike Rapoport <rppt@...ux.ibm.com> Reviewed-by: Juergen Gross <jgross@...e.com> Juergen Download attachment "OpenPGP_0xB0DE9DD628BF132F.asc" of type "application/pgp-keys" (3092 bytes) Download attachment "OpenPGP_signature" of type "application/pgp-signature" (496 bytes)
Powered by blists - more mailing lists