lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <alpine.LFD.1.10.0809122313440.13819@apollo.tec.linutronix.de>
Date:	Fri, 12 Sep 2008 23:19:21 +0200 (CEST)
From:	Thomas Gleixner <tglx@...utronix.de>
To:	Andi Kleen <andi@...stfloor.org>
cc:	Yinghai Lu <yhlu.kernel@...il.com>,
	Andrew Morton <akpm@...ux-foundation.org>, mingo@...e.hu,
	hpa@...or.com, linux-kernel@...r.kernel.org
Subject: Re: [PATCH] apci: dump slit

On Fri, 12 Sep 2008, Andi Kleen wrote:
> "Yinghai Lu" <yhlu.kernel@...il.com> writes:
> >
> > to see how wrong could be set by BIOS.
> 
> Just dump it from user space then.  There are plenty of tools
> to access ACPI tables.

1.) what guarantees that we reach user space ?

2) If it is _valuable_ information which we can gather via kernel
   output, then it is much more conveniant than asking the user to type
   whatevercryptictoolcommandline and provide the output.

Nervertheless the changelog of the patch needs some useful information
why we actually need this information.

Thanks,

	tglx
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ