lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 17 May 2013 19:25:21 +0100 From: Catalin Marinas <Catalin.Marinas@....com> To: Linus Torvalds <torvalds@...ux-foundation.org> Cc: "linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org> Subject: [GIT PULL] kmemleak patches for 3.10-rc2 Hi Linus, Please pull the kmemleak patches below. Thanks. The following changes since commit f722406faae2d073cc1d01063d1123c35425939e: Linux 3.10-rc1 (2013-05-11 17:14:08 -0700) are available in the git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/cmarinas/linux-aarch64.git tags/kmemleak-fixes for you to fetch changes up to 89c837351db0b9b52fd572ec8b0445a42e59b75c: kmemleak: No need for scanning specific module sections (2013-05-17 09:53:36 +0100) ---------------------------------------------------------------- Kmemleak now scans all the writable and non-executable module sections to avoid false positives (previously it was only scanning specific sections and missing .ref.data). ---------------------------------------------------------------- Steven Rostedt (2): kmemleak: Scan all allocated, writeable and not executable module sections kmemleak: No need for scanning specific module sections kernel/module.c | 21 ++++----------------- 1 file changed, 4 insertions(+), 17 deletions(-) -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists