lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <20061105133421.6cea9734.pj@sgi.com> Date: Sun, 5 Nov 2006 13:34:21 -0800 From: Paul Jackson <pj@....com> To: balbir@...ibm.com Cc: menage@...gle.com, sekharan@...ibm.com, ckrm-tech@...ts.sourceforge.net, akpm@...l.org, jlan@....com, mbligh@...gle.com, rohitseth@...gle.com, winget@...gle.com, Simon.Derr@...l.net, linux-kernel@...r.kernel.org Subject: Re: [ckrm-tech] [PATCH 6/6] Resource Groups over generic containers Balbir wrote: > This should be kmalloc(nbytes), an echo ".." has a "\n" associated > with it. But a: write(1, "..", 2); does not have a trialing newline. If some consumer of this kernel buffer copy of what the user wrote cannot handle the possible trailing whitespace, they will have to chomp (Perl phrase) it off. You can't just whack one byte blindly. At least for the kernel/cpuset.c code, from whence this came, the consumers of this kernel buffer copy are such routines as simple_strtoul() and cpulist_parse(), both of which cope with trailing newlines. -- I won't rest till it's the best ... Programmer, Linux Scalability Paul Jackson <pj@....com> 1.925.600.0401 - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists