lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Thu, 25 Jul 2019 08:20:21 +0200
From:   Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To:     Steve French <smfrench@...il.com>
Cc:     LKML <linux-kernel@...r.kernel.org>,
        Stable <stable@...r.kernel.org>,
        Namjae Jeon <namjae.jeon@...sung.com>,
        "Eric W. Biederman" <ebiederm@...ssion.com>,
        Sasha Levin <sashal@...nel.org>,
        Jeff Layton <jlayton@...chiereds.net>
Subject: Re: [PATCH 5.2 038/413] signal/cifs: Fix cifs_put_tcp_session to
 call send_sig instead of force_sig

On Wed, Jul 24, 2019 at 03:49:32PM -0500, Steve French wrote:
> Note that this patch causes a regression (removing cifs module fails,
> due to unmount leaking a thread with this change).
> 
> We are testing a workaround to cifs.ko which would be needed if this
> patch were to be backported.

I've now dropped this from all of the stable queues.  If you all figure
this out, please let us know and we will be glad to queue this up, along
with the fix.

thanks,

greg k-h

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ