lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Sat, 9 Feb 2008 10:33:43 +0100 From: Ingo Molnar <mingo@...e.hu> To: Andi Kleen <andi@...stfloor.org> Cc: Vegard Nossum <vegard.nossum@...il.com>, Linux Kernel Mailing List <linux-kernel@...r.kernel.org>, Pekka Enberg <penberg@...helsinki.fi>, Richard Knutsson <ricknu-0@...dent.ltu.se>, Christoph Lameter <clameter@....com> Subject: Re: [PATCH 1/2] kmemcheck v3 * Andi Kleen <andi@...stfloor.org> wrote: > > Yes, this is true. Then our task is to make sure that this memory is > > never allocated from tracked caches. We do have some changes in this > > area, for instance we never track task structs. Keep in mind that > > only slab objects are tracked currently, so things like stacks never > > catch page faults. I am not sure if this is exactly what you had in > > mind, but I don't know other kernel code very well enough to come up > > with perhaps more relevant examples :-) > > Given that you don't seem to handle networking yet I wonder how many > cases you really tested so far. you are wrong about no networking support: i have booted up a full distro config on real hardware with full networking, etc. Ingo -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists