lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20251126123147.GI724103@e132581.arm.com>
Date: Wed, 26 Nov 2025 12:31:47 +0000
From: Leo Yan <leo.yan@....com>
To: James Clark <james.clark@...aro.org>
Cc: Kuan-Wei Chiu <visitorckw@...il.com>, suzuki.poulose@....com,
	mike.leach@...aro.org, alexander.shishkin@...ux.intel.com,
	pratikp@...eaurora.org, mathieu.poirier@...aro.org,
	gregkh@...uxfoundation.org, jserv@...s.ncku.edu.tw,
	marscheng@...gle.com, ericchancf@...gle.com, milesjiang@...gle.com,
	nickpan@...gle.com, coresight@...ts.linaro.org,
	linux-arm-kernel@...ts.infradead.org, linux-kernel@...r.kernel.org
Subject: Re: [PATCH] coresight: etm3x: Fix buffer overwrite in cntr_val_show()

On Wed, Nov 26, 2025 at 12:11:05PM +0000, James Clark wrote:

[...]

> > This fix can still be applied to older kernels, but seems to me that
> > now might be an appropriate time to consider removing the ETMv3 driver
> > from the mainline kernel?
> 
> Yeah, if anyone is using it it would be on an old kernel surely?

We can confirm this in another way: if I don't miss anything, over the
past several years (since 2017), we have not received any questions or
bug reports based on hands-on practice regarding ETMv3 on the Coresight
or perf mailing lists.

Thanks,
Leo

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ