Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751936AbbGaIKr (ORCPT ); Fri, 31 Jul 2015 04:10:47 -0400 Received: from mail-wi0-f169.google.com ([209.85.212.169]:34444 "EHLO mail-wi0-f169.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751368AbbGaIKh (ORCPT ); Fri, 31 Jul 2015 04:10:37 -0400 Date: Fri, 31 Jul 2015 10:10:31 +0200 From: Ingo Molnar To: Andy Lutomirski , =?iso-8859-1?Q?Fr=E9d=E9ric?= Weisbecker Cc: Peter Zijlstra , linux-kernel@vger.kernel.org, Brian Gerst , Steven Rostedt , Borislav Petkov , Thomas Gleixner , Linus Torvalds , X86 ML , Masami Hiramatsu Subject: Re: [PATCH 0/3] perf: hw_breakpoint safety improvements Message-ID: <20150731081031.GA13438@gmail.com> References: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.5.23 (2014-03-12) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 965 Lines: 29 * Andy Lutomirski wrote: > Hi, Peter- > > Here are some baby steps toward eliminating nested NMIs. What do > you think? > > Andy Lutomirski (3): > x86/perf/hw_breakpoint: Disallow kernel breakpoints unless kprobe-safe > x86/perf/hw_breakpoint: Improve range breakpoint validation > x86/perf/hw_breakpoint: Fix check for kernelspace breakpoints > > arch/x86/kernel/hw_breakpoint.c | 31 ++++++++++++++++++++++++++++++- > include/linux/kprobes.h | 2 ++ > kernel/kprobes.c | 2 +- > 3 files changed, 33 insertions(+), 2 deletions(-) Looks good to me at first glance. Cc:-ed Frederic who wrote and maintains these bits. Frederic, what do you think? Thanks, Ingo -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/