lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 11 Jan 2019 09:52:29 +0900 From: Masami Hiramatsu <mhiramat@...nel.org> To: Steven Rostedt <rostedt@...dmis.org> Cc: Greg KH <gregkh@...uxfoundation.org>, Ingo Molnar <mingo@...hat.com>, peterz@...radead.org, Mathieu Desnoyers <mathieu.desnoyers@...icios.com>, linux-kernel <linux-kernel@...r.kernel.org>, Andrea Righi <righi.andrea@...il.com>, stable@...r.kernel.org Subject: Re: [PATCH 1/9] x86/kprobes: Prohibit probing on optprobe template code On Thu, 10 Jan 2019 12:10:34 -0500 Steven Rostedt <rostedt@...dmis.org> wrote: > On Thu, 10 Jan 2019 23:57:10 +0900 > Masami Hiramatsu <mhiramat@...nel.org> wrote: > > > > Same for all patches in this series... > > > > Oops, sorry. I'll fix the format again. > > BTW, I'm still considering I should make it other patches in this series > > as improvement instead of fix, since those are just adding blacklist, and > > usually user can avoid it with KPROBE_EVENTS_ON_NOTRACE=n (which is default). > > The issue is that the other patches Cc stable, which they should not > unless they are to go to stable. Yes, I miss-Cc'd to stable the whole series. Thank you, -- Masami Hiramatsu <mhiramat@...nel.org>
Powered by blists - more mailing lists