lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Tue, 8 Feb 2022 07:50:40 +0000
From:   Christophe Leroy <christophe.leroy@...roup.eu>
To:     Aaron Tomlin <atomlin@...hat.com>
CC:     Aaron Tomlin <atomlin@...mlin.com>,
        Luis Chamberlain <mcgrof@...nel.org>,
        Michal Suchanek <msuchanek@...e.de>,
        "cl@...ux.com" <cl@...ux.com>,
        "pmladek@...e.com" <pmladek@...e.com>,
        "mbenes@...e.cz" <mbenes@...e.cz>,
        "akpm@...ux-foundation.org" <akpm@...ux-foundation.org>,
        "jeyu@...nel.org" <jeyu@...nel.org>,
        "linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>,
        "linux-modules@...r.kernel.org" <linux-modules@...r.kernel.org>,
        "live-patching@...r.kernel.org" <live-patching@...r.kernel.org>,
        "ghalat@...hat.com" <ghalat@...hat.com>,
        "allen.lkml@...il.com" <allen.lkml@...il.com>,
        "void@...ifault.com" <void@...ifault.com>,
        "joe@...ches.com" <joe@...ches.com>
Subject: RE: [RFC PATCH v4 00/13] module: core code clean up



> -----Message d'origine-----
> De : Aaron Tomlin <atomlin@...hat.com>
> Envoyé : lundi 7 février 2022 19:02
> À : Christophe Leroy <christophe.leroy@...roup.eu>
> Cc : Aaron Tomlin <atomlin@...mlin.com>; Luis Chamberlain
> <mcgrof@...nel.org>; Michal Suchanek <msuchanek@...e.de>; cl@...ux.com;
> pmladek@...e.com; mbenes@...e.cz; akpm@...ux-foundation.org;
> jeyu@...nel.org; linux-kernel@...r.kernel.org; linux-modules@...r.kernel.org;
> live-patching@...r.kernel.org; ghalat@...hat.com; allen.lkml@...il.com;
> void@...ifault.com; joe@...ches.com
> Objet : Re: [RFC PATCH v4 00/13] module: core code clean up
> 
> On Mon 2022-02-07 17:17 +0000, Christophe Leroy wrote:
> > Yes and that's the purpose of the patch I proposed at
> > https://patchwork.kernel.org/project/linux-
> modules/patch/203348805c9ac9851d8939d15cb9802ef047b5e2.1643919758.gi
> t.christophe.leroy@...roup.eu/
> 
> I see.
> 
> > Allthough I need to find out what's the problem reported by the robot.
> 
> I'll have a look too.
> 
> > As suggested by Luis, this fix should go once all ongoing work is done.
> > But it would be nice if you could just remove patch 5 from you series,
> > otherwise we would have to revert it later.
> 
> Perhaps it might be easier if I keep the patch within the series; once
> merged into module-next, by Luis, you can rebase and then add the "Fixes:"
> tag to resolve the issue, no?

I don't think it is easier.

If we do that it means we'll move some code from main.c to arch_strict_rwx.c with your series, then move it back to main.c and remove arch_strict_rwx.c when we do the fix. That's not good for history tracking because the code we move back and forth will appear as new code in main.c whereas it's code that has been there for years.

As we know the code will be back in main.c at the end, I looks easier to me to not move it at all by not applying your patch 5.

Thanks
Christophe

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ