lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date:	Tue, 26 Apr 2016 20:44:12 +0000 (UTC)
From:	Mathieu Desnoyers <mathieu.desnoyers@...icios.com>
To:	lttng-dev@...ts.lttng.org,
	Linux Kernel Mailing List <linux-kernel@...r.kernel.org>
Subject: [RELEASE] LTTng modules 2.7.3 (Linux kernel tracer)

Hi,

This is a bugfix release (2.7.3) of the LTTng modules Linux kernel
tracer. It mainly consists of fixing kernel instrumentation
quirks with older kernels, and adapting to some new distribution
kernels (e.g. RHEL), and adapting to the 4.6 Linux kernels.

The two issues about ctf_user_integer and lib_ring_buffer_copy_from_user_inatomic
that are fixed here are harmless, because they were unused in the code base
so far.

Mathieu

Project website: http://lttng.org
Documentation: http://lttng.org/docs
Download link: http://lttng.org/download

Changelog:
2016-04-26 LTTng modules 2.7.3
        * Fix: writeback probe on RHEL >= 3.10.0-327.10.1
        * Fix: RHEL kernel 3.10.0-327.13.1 compat
        * Fix: ctf_user_integer should not trigger page fault
        * Fix: lib_ring_buffer_copy_from_user_inatomic error handling
        * Fix: remove unused gfpflags.h from btrfs and compaction instrumentation
        * Fix: Remove dead code from filter interpreter
        * Fix: x86 kvm mmutrace instrumentation for kernel < 3.6
        * Fix: mm_vmscan instrumentation: remove unused gfpflags.h include
        * Fix: use of uninitialized ret value in lttng_abi_create_event
        * Fix: kmem instrumentation: remove unused gfpflags.h include
        * Fix: 4.6 kernel: use in_compat_syscall
        * Fix: use BUG_ON instead of accessing array subscript above array bounds
        * Fix: Add granularity to RHEL kernel version checks

-- 
Mathieu Desnoyers
EfficiOS Inc.
http://www.efficios.com

Powered by blists - more mailing lists