lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Mon, 25 Jan 2021 11:16:29 -0500 From: Joe Lawrence <joe.lawrence@...hat.com> To: Arnaldo Carvalho de Melo <acme@...nel.org>, Jiri Olsa <jolsa@...nel.org> Cc: Alexei Starovoitov <ast@...nel.org>, Daniel Borkmann <daniel@...earbox.net>, Andrii Nakryiko <andriin@...com>, dwarves@...r.kernel.org, netdev@...r.kernel.org, bpf@...r.kernel.org, Yonghong Song <yhs@...com>, Hao Luo <haoluo@...gle.com>, Martin KaFai Lau <kafai@...com>, Song Liu <songliubraving@...com>, John Fastabend <john.fastabend@...il.com>, KP Singh <kpsingh@...omium.org>, Mark Wielaard <mjw@...hat.com> Subject: Re: [PATCH 2/2] bpf_encoder: Translate SHN_XINDEX in symbol's st_shndx values On 1/22/21 2:52 PM, Arnaldo Carvalho de Melo wrote: > > Who originally reported this? Joe? Also can someone provide a Tested-by: > in addition to mine when I get this detailed set of steps to test? > As Jiri noted, we tested v2 I think, so if there is a v4 build we could give a spin, just let us know. In the meantime, for kpatch, we figured that we could just temporarily disable CONFIG_DEBUG_INFO_BTF in the scripts/link-vmlinux.sh file during kpatch builds ... that would leave kernel code intact, but skip the BTF generation step (for which kpatch doesn't need anyway). Thanks, -- Joe
Powered by blists - more mailing lists