lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20090831190024.fadc3b50.kamezawa.hiroyu@jp.fujitsu.com>
Date:	Mon, 31 Aug 2009 19:00:24 +0900
From:	KAMEZAWA Hiroyuki <kamezawa.hiroyu@...fujitsu.com>
To:	"linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>
Cc:	benh@...nel.crashing.org, ralf@...ux-mips.org,
	xiyou.wangcong@...il.com,
	"akpm@...ux-foundation.org" <akpm@...ux-foundation.org>,
	jirislaby@...il.com
Subject: [PATCH 0/8][mmotm] kcore clean-up and enhance (retry).

Hi, sorry for messes previous version. This is renewed one onto mmotm-Aug27.

Changes from prerious one are
 - merged compile fix etc. 
 - support module's vaddr range
 - support vmemmap.

Following is kcore's program header. after this patch applied.
This x86-64 host's memory layout is
[root@...extal mmotm-2.6.31-Aug27]# grep RAM /proc/iomem
00010000-0009e7ff : System RAM
00100000-bfedffff : System RAM
bff00000-bff7ffff : System RAM
100000000-63fffffff : System RAM

Kcore header is.
[root@...extal mmotm-2.6.31-Aug27]# readelf -l /proc/kcore | grep LOAD
  LOAD           0x00007fffff602000 0xffffffffff600000 0x0000000000000000 (0)
  LOAD           0x00007fff8100b000 0xffffffff81009000 0x0000000000000000 (1)
  LOAD           0x0000490000002000 0xffffc90000000000 0x0000000000000000 (2)
  LOAD           0x00007fffa0002000 0xffffffffa0000000 0x0000000000000000 (3)
  LOAD           0x0000080000012000 0xffff880000010000 0x0000000000000000 (4)
  LOAD           0x00006a0000002000 0xffffea0000000000 0x0000000000000000 (5)
  LOAD           0x0000080000102000 0xffff880000100000 0x0000000000000000 (6)
  LOAD           0x00006a0000008000 0xffffea0000006000 0x0000000000000000 (7)
  LOAD           0x00000800bff02000 0xffff8800bff00000 0x0000000000000000 (8)
  LOAD           0x00006a0004dfb000 0xffffea0004df9000 0x0000000000000000 (9)
  LOAD           0x0000080100002000 0xffff880100000000 0x0000000000000000 (10)
  LOAD           0x00006a0006802000 0xffffea0006800000 0x0000000000000000 (11)

(0) is NOTE section.
(1) is text.
(2) is VMALLOC area
(3) is MODULE area
(4)(6)(8)(10) is physical memory
(5)(7)(9)(11) is vmemmap for ranges.

Thanks,
-Kame


--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ