lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Thu, 18 Jul 2013 16:55:44 +0200 From: Oleg Nesterov <oleg@...hat.com> To: Masami Hiramatsu <masami.hiramatsu.pt@...achi.com> Cc: Steven Rostedt <rostedt@...dmis.org>, "zhangwei(Jovi)" <jovi.zhangwei@...wei.com>, Jiri Olsa <jolsa@...hat.com>, Peter Zijlstra <a.p.zijlstra@...llo.nl>, Arnaldo Carvalho de Melo <acme@...stprotocols.net>, Srikar Dronamraju <srikar@...ux.vnet.ibm.com>, Frederic Weisbecker <fweisbec@...il.com>, Ingo Molnar <mingo@...hat.com>, Andrew Morton <akpm@...ux-foundation.org>, linux-kernel@...r.kernel.org Subject: Re: Re: [RFC PATCH 3/4] tracing: Kill tracing_open/release_generic_file On 07/18, Masami Hiramatsu wrote: > > (2013/07/18 4:19), Oleg Nesterov wrote: > > Once again, this is just RFC to know your and Masami's opinion. If > > you think this can work, I'll try to resend this series with the > > additional bits to cover instance_delete() too. _Afaics_ this needs > > some temporary uglifications "in between". > > I think your proposal goes a good direction, but it also requires > completeness, because, as I pointed, we have to take care of all > operations are correctly checked except for open/close. > > So, I agree with Steven, I'd like to see a complete patchset. OK. In fact _I think_ it is almost complete, just this series should remove tracing_open_generic_file() in the last patch, after we change __trace_remove_event_dirs() to use invalidate_event_files(). I'll try to finish this series and resend, probably tomorrow. Oleg. -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists