lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Sat, 8 Feb 2014 14:12:09 -0500 From: Richard Yao <ryao@...too.org> To: Linus Torvalds <torvalds@...ux-foundation.org> Cc: Eric Van Hensbergen <ericvh@...il.com>, Ron Minnich <rminnich@...dia.gov>, Latchesar Ionkov <lucho@...kov.net>, "David S. Miller" <davem@...emloft.net>, V9FS Develooper Mailing List <v9fs-developer@...ts.sourceforge.net>, Linux Netdev Mailing List <netdev@...r.kernel.org>, Linux Kernel Mailing List <linux-kernel@...r.kernel.org>, "Aneesh Kumar K.V" <aneesh.kumar@...ux.vnet.ibm.com>, Will Deacon <will.deacon@....com>, Christopher Covington <cov@...eaurora.org>, Matthew Thode <mthode@...ode.org> Subject: [PATCH 1/2] mm/vmalloc: export is_vmalloc_or_module_addr 9p-virtio needs is_vmalloc_or_module_addr exported before a patch can be merged to prevent the virtio zero-copy routines from triggering a hypervisor page fault when loading kernel modules: https://groups.google.com/forum/#!topic/linux.kernel/eRR7AyLE29Y Without this export, the kernel build breaks with that patch applied and CONFIG_NET_9P_VIRTIO=m. With this export in place, all is well. Signed-off-by: Richard Yao <ryao@...too.org> --- mm/vmalloc.c | 1 + 1 file changed, 1 insertion(+) diff --git a/mm/vmalloc.c b/mm/vmalloc.c index 0fdf968..8a2e54f 100644 --- a/mm/vmalloc.c +++ b/mm/vmalloc.c @@ -218,6 +218,7 @@ int is_vmalloc_or_module_addr(const void *x) #endif return is_vmalloc_addr(x); } +EXPORT_SYMBOL(is_vmalloc_or_module_addr); /* * Walk a vmap address to the struct page it maps. -- 1.8.3.2 -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists