lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20221024193336.1233616-1-peterx@redhat.com>
Date:   Mon, 24 Oct 2022 15:33:34 -0400
From:   Peter Xu <peterx@...hat.com>
To:     linux-mm@...ck.org, linux-kernel@...r.kernel.org
Cc:     Axel Rasmussen <axelrasmussen@...gle.com>, peterx@...hat.com,
        Andrew Morton <akpm@...ux-foundation.org>,
        Andrea Arcangeli <aarcange@...hat.com>,
        Nadav Amit <nadav.amit@...il.com>
Subject: [PATCH 0/2] mm/uffd: Fix vma check

I just got time to have a closer look on the uffd-wp triggering of the
warning here:

https://lore.kernel.org/all/YzeR+R6b4bwBlBHh@x1n/T/#u

It turns out to be a wrong check on vma, and with the fix attached we
should be able to remove the ugly macro checks.  Sorry for the bothersome.

Please have a look, thanks.

Peter Xu (2):
  mm/uffd: Fix vma check on userfault for wp
  Revert "mm/uffd: fix warning without PTE_MARKER_UFFD_WP compiled in"

 include/linux/userfaultfd_k.h | 6 +++---
 mm/hugetlb.c                  | 4 ----
 mm/memory.c                   | 2 --
 mm/mprotect.c                 | 2 --
 4 files changed, 3 insertions(+), 11 deletions(-)

-- 
2.37.3

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ