Andrew Morton a écrit :
But I'm inclined to drop the whole patch - I don't see how it can detect
any bugs which CONFIG_DEBUG_PAGEALLOC won't find.
If CONFIG_DEBUG_PAGEALLOC is selected, does a page freed by free_page(addr);
guaranted not being reused later ?
Anyway, the CONFIG_DEBUG_INITDATA was a temporary patch in order to track the
accesses to non possible cpus percpu data. So if you feel all such accesses
were cleaned, we can drop the patch...
Eric
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [email protected]
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
- References:
- [PATCH] i386: Add a temporary to make put_user more type safe.
- Re: [PATCH] i386: Add a temporary to make put_user more type safe.
- Re: [PATCH] i386: Add a temporary to make put_user more type safe.
- Re: [PATCH] i386: Add a temporary to make put_user more type safe.
- [PATCH] i386: instead of poisoning .init zone, change protection bits to force a fault
- Re: [PATCH] i386: instead of poisoning .init zone, change protection bits to force a fault
- [PATCH, V2] i386: instead of poisoning .init zone, change protection bits to force a fault
- Re: [PATCH, V2] i386: instead of poisoning .init zone, change protection bits to force a fault
- Re: [PATCH, V2] i386: instead of poisoning .init zone, change protection bits to force a fault
- Re: [PATCH, V2] i386: instead of poisoning .init zone, change protection bits to force a fault
[Index of Archives]
[Kernel Newbies]
[Netfilter]
[Bugtraq]
[Photo]
[Stuff]
[Gimp]
[Yosemite News]
[MIPS Linux]
[ARM Linux]
[Linux Security]
[Linux RAID]
[Video 4 Linux]
[Linux for the blind]
[Linux Resources]