Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751251Ab3HTKja (ORCPT ); Tue, 20 Aug 2013 06:39:30 -0400 Received: from mail-pa0-f52.google.com ([209.85.220.52]:54609 "EHLO mail-pa0-f52.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750913Ab3HTKj3 (ORCPT ); Tue, 20 Aug 2013 06:39:29 -0400 MIME-Version: 1.0 In-Reply-To: References: From: Catalin Marinas Date: Tue, 20 Aug 2013 11:39:08 +0100 X-Google-Sender-Auth: g9-j7qC2k0AG3cBwKecNnrZTNxI Message-ID: Subject: Re: About perf,arm -- oops in validate_event To: P J P Cc: Linux Kernel Mailing List , vincent.weaver@maine.edu Content-Type: text/plain; charset=ISO-8859-1 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 534 Lines: 14 On 20 August 2013 11:03, P J P wrote: > -> https://lkml.org/lkml/2013/8/7/259 > > I wanted to confirm if this above fix should also go into ARM64 build Or is > ARM64 platform not vulnerable? It is and I'll push patches to mainline (Will is preparing them). Catalin -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/