lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Tue, 26 Jan 2010 12:03:38 +0900 From: Paul Mundt <lethal@...ux-sh.org> To: Steven Rostedt <rostedt@...dmis.org> Cc: Mike Frysinger <vapier@...too.org>, linux-kernel@...r.kernel.org, Frederic Weisbecker <fweisbec@...il.com>, Ingo Molnar <mingo@...hat.com>, Hendrik Brueckner <brueckner@...ux.vnet.ibm.com>, "David S. Miller" <davem@...emloft.net>, Heiko Carstens <heiko.carstens@...ibm.com> Subject: Re: [PATCH] ftrace: unify arch_syscall_addr() implementations On Fri, Jan 22, 2010 at 09:36:17AM -0500, Steven Rostedt wrote: > [ Added Heiko Carstens and Paul Mundt to Cc ] > > On Fri, 2010-01-22 at 08:43 -0500, Mike Frysinger wrote: > > also, does the arch_syscall_addr() even really need to be weak ? or can > > we assume that everyone is going to be sane and do it the same way ... > > > > Documentation/trace/ftrace-design.txt | 6 +++++- > > arch/s390/kernel/ftrace.c | 10 ---------- > > arch/sh/kernel/ftrace.c | 9 --------- > > arch/sparc/kernel/ftrace.c | 11 ----------- > > arch/x86/kernel/ftrace.c | 10 ---------- > > include/linux/ftrace.h | 6 ++++++ > > kernel/trace/trace_syscalls.c | 6 +++++ > > Actually for this patch to be accepted, we need to get the acks from the > maintainers of s390, sh, and sparc since it touches their code. Doesn't > matter if it is just removing duplicate code. Still need their acks. > Acked-by: Paul Mundt <lethal@...ux-sh.org> -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists