lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 12 Sep 2008 23:19:21 +0200 (CEST) From: Thomas Gleixner <tglx@...utronix.de> To: Andi Kleen <andi@...stfloor.org> cc: Yinghai Lu <yhlu.kernel@...il.com>, Andrew Morton <akpm@...ux-foundation.org>, mingo@...e.hu, hpa@...or.com, linux-kernel@...r.kernel.org Subject: Re: [PATCH] apci: dump slit On Fri, 12 Sep 2008, Andi Kleen wrote: > "Yinghai Lu" <yhlu.kernel@...il.com> writes: > > > > to see how wrong could be set by BIOS. > > Just dump it from user space then. There are plenty of tools > to access ACPI tables. 1.) what guarantees that we reach user space ? 2) If it is _valuable_ information which we can gather via kernel output, then it is much more conveniant than asking the user to type whatevercryptictoolcommandline and provide the output. Nervertheless the changelog of the patch needs some useful information why we actually need this information. Thanks, tglx -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists