Re: [PATCH v10 13/17] mm: vmalloc: add flag preventing guard hole allocation

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Thu, 29 Jan 2015 18:11:57 +0300 Andrey Ryabinin <a.ryabinin@xxxxxxxxxxx> wrote:

> For instrumenting global variables KASan will shadow memory
> backing memory for modules. So on module loading we will need
> to allocate shadow memory and map it at exact virtual address.

I don't understand.  What does "map it at exact virtual address" mean?

> __vmalloc_node_range() seems like the best fit for that purpose,
> except it puts a guard hole after allocated area.

Why is the guard hole a problem?

More details needed in this changelog, please.


--
To unsubscribe, send a message with 'unsubscribe linux-mm' in
the body to majordomo@xxxxxxxxx.  For more info on Linux MM,
see: http://www.linux-mm.org/ .
Don't email: <a href=mailto:"dont@xxxxxxxxx";> email@xxxxxxxxx </a>




[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Bugtraq]     [Linux]     [Linux OMAP]     [Linux MIPS]     [ECOS]     [Asterisk Internet PBX]     [Linux API]