lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date:	Wed, 30 Nov 2011 09:57:29 +0000
From:	Tvrtko Ursulin <tvrtko.ursulin@...lan.co.uk>
To:	Jason Baron <jbaron@...hat.com>
Cc:	linux-kernel@...r.kernel.org, jim.cromie@...il.com
Subject: Re: Enabling dynamic debug at module load

On Tuesday 29 Nov 2011 18:29:16 Jason Baron wrote:
> On Tue, Nov 29, 2011 at 09:47:03AM +0000, Tvrtko Ursulin wrote:
> > Hi Jason,
> > 
> > What happened to the proposed patch to enable dynamic debug lines at
> > module load time?
> > 
> > After hitting this problem when trying to figure out why w83627ehf does
> > not load I found that apparently there is no way to enable pr_debug's
> > called from its module_init and googling discovered this thread:
> > https://lkml.org/lkml/2010/5/26/192
> > 
> > Thanks,
> > 
> > Tvrtko
> 
> Hi Tvrtko,
> 
> Jim Cromie and I have been working on a set of patches to address this
> issue. I'm aware this is an important issue (And yes, it's taken far too
> long to address it). We are trying to post something shortly.

It's not a regular nuisance for me, I just spotted the flaw and wanted to bring 
it up in case it slipped form everyone radars. If it was actively bugging me I 
would be happy to offer a hand. This way it is good to know it's being worked 
on so thanks for letting us know.

Regards,

Tvrtko
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ