lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Tue, 5 Dec 2017 11:39:12 +0800
From:   Fengguang Wu <fengguang.wu@...el.com>
To:     "Tobin C. Harding" <me@...in.cc>
Cc:     LKML <linux-kernel@...r.kernel.org>,
        "Roberts, William C" <william.c.roberts@...el.com>,
        "Schaufler, Casey" <casey.schaufler@...el.com>,
        "Reshetova, Elena" <elena.reshetova@...el.com>,
        Philip Li <philip.li@...el.com>
Subject: Re: running leaking_addresses.pl

Hi Tobin,

On Tue, Dec 05, 2017 at 10:36:13AM +1100, Tobin C. Harding wrote:
>Hi,
>
>Recently scripts/leaking_addresses.pl was merged into the mainline with
>the hope of catching leaking kernel addresses.
>
>Would it be in scope for this script to be run by the kbuild test robot?
>Excuse my very little knowledge of the kbuild test robot but would this
>lead to the script being run on a number of kernels with varying
>configuration?

Yes it's in our plan. Bill Roberts also requested testing leaking_addresses.pl
and Philip has scheduled it to next quarter.

>In the event that this may be a possibility can I add that I do not have
>a suggestion for what to do with the output, can it go to LKML? I'm
>happy to be CC'd on the output to help investigate.

That'd be great! In general we are mainly responsible for catching
regressions. Due to limit of time and expertise, we leave the analyze
and bug fixing works to the first bad commit's authors and anyone who
are interested in looking into a class of problems. For example, we'll
CC some smatch and coccinelle regressions (possibly false positive) to
Dan and Julia.

Thanks,
Fengguang

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ