lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <d23deb4c-c1dc-4ba8-a1dc-27b7c49085f7@redhat.com>
Date: Thu, 16 May 2024 21:52:12 +0200
From: David Hildenbrand <david@...hat.com>
To: Guillaume Morin <guillaume@...infr.org>
Cc: oleg@...hat.com, linux-kernel@...r.kernel.org,
 linux-trace-kernel@...r.kernel.org, muchun.song@...ux.dev
Subject: Re: [RFC][PATCH] uprobe: support for private hugetlb mappings

On 16.05.24 19:44, Guillaume Morin wrote:
> On 02 May  5:59, Guillaume Morin wrote:
>>
>> On 30 Apr 21:25, David Hildenbrand wrote:
>>>> I tried to get the hugepd stuff right but this was the first I heard
>>>> about it :-) Afaict follow_huge_pmd and friends were already DTRT
>>>
>>> I'll have to have a closer look at some details (the hugepd writability
>>> check looks a bit odd), but it's mostly what I would have expected!
>>
>> Ok in the meantime, here is the uprobe change on your current
>> uprobes_cow trying to address the comments you made in your previous
>> message. Some of them were not 100% clear to me, so it's a best effort
>> patch :-) Again lightly tested
> 
> David, have you had a chance to take a look at both patches?

Not in detail, last weeks were busy (currently traveling back home from 
LSF/MM). I'll try to find time within the next two weeks to polish my 
changes and send them out. It would be great if you could send your 
stuff based on top of that then.

(the merge window just opened on Saturday, so we have plenty of time to 
make it to the next one :) )

-- 
Cheers,

David / dhildenb


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ