lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Thu, 19 Dec 2013 17:37:25 +0800 From: Jovi Zhangwei <jovi.zhangwei@...il.com> To: Masami Hiramatsu <masami.hiramatsu.pt@...achi.com> Cc: Ingo Molnar <mingo@...nel.org>, linux-arch@...r.kernel.org, Ananth N Mavinakayanahalli <ananth@...ibm.com>, Sandeepa Prabhu <sandeepa.prabhu@...aro.org>, x86@...nel.org, lkml <linux-kernel@...r.kernel.org>, "Steven Rostedt (Red Hat)" <rostedt@...dmis.org>, Ingo Molnar <mingo@...hat.com>, systemtap@...rceware.org, "H. Peter Anvin" <hpa@...or.com>, Thomas Gleixner <tglx@...utronix.de>, "David S. Miller" <davem@...emloft.net> Subject: Re: [PATCH -tip v6 06/22] [BUGFIX] x86: Prohibit probing on memcpy/memset Hi Masami, On Thu, Dec 19, 2013 at 5:04 PM, Masami Hiramatsu <masami.hiramatsu.pt@...achi.com> wrote: > memcpy/memset functions are fundamental functions and > those are involved in kprobe's exception handling. > Prohibit probing on them to avoid kernel crash. > Would you please let me know the LKML link of that bugfix, I cannot find it in my LKML fold. No objection on this patch. :) just want to know more, It seems there have no problem to probe memcpy in my box, maybe I didn't hit the crash code path. Thanks. Jovi -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists