lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Mon, 18 May 2015 11:52:49 +0800 From: "long.wanglong" <long.wanglong@...wei.com> To: Steven Rostedt <rostedt@...dmis.org> CC: <jkosina@...e.cz>, <gregkh@...uxfoundation.org>, <stable@...r.kernel.org>, <wanglong@...qinren.net>, <peifeiyue@...wei.com>, <linux-kernel@...r.kernel.org>, <morgan.wang@...wei.com>, <paulmck@...ux.vnet.ibm.com>, <pmladek@...e.cz>, <dzickus@...hat.com>, <x86@...nel.org>, <sasha.levin@...cle.com> Subject: Re: [RFC PATCH 00/17][request for stable 3.10 inclusion] x86/nmi: Print all cpu stacks from NMI safely On 2015/5/14 21:55, Steven Rostedt wrote: > On Thu, 14 May 2015 11:34:47 +0000 > Wang Long <long.wanglong@...wei.com> wrote: > >> The patch 1-13 backport the "seq_buf" infrastructures. in detail, patch 1, 2 >> and 6 only backport "seq_buf" related code. >> > > Ah, so basically you just backported the seq_buf.c code without > modifying the trace_seq code. That's a good approach. I don't have much > time to look at these but I'll try to skim them to see if I find > anything broken. > > I may pull all of them into a test branch and run my tests to make sure > they don't break anything else. > > -- Steve > Hi Steve, Thank you for your review and test. Does your testcases run OK with this series patches? Best Regards Wang Long > >> arch/x86/kernel/apic/hw_nmi.c | 86 +++++++++- >> include/linux/percpu.h | 4 + >> include/linux/printk.h | 2 + >> include/linux/seq_buf.h | 136 ++++++++++++++++ >> kernel/printk.c | 41 +++-- >> lib/Makefile | 2 +- >> lib/seq_buf.c | 359 ++++++++++++++++++++++++++++++++++++++++++ >> 7 files changed, 617 insertions(+), 13 deletions(-) >> create mode 100644 include/linux/seq_buf.h >> create mode 100644 lib/seq_buf.c >> > > > . > -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists