lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 4 Oct 2013 15:44:21 +0200 From: Andi Kleen <andi@...stfloor.org> To: Janani Venkataraman <jananive@...ibm.com> Cc: linux-kernel@...r.kernel.org, amwang@...hat.com, rdunlap@...otime.net, andi@...stfloor.org, aravinda@...ux.vnet.ibm.com, hch@....de, mhiramat@...hat.com, jeremy.fitzhardinge@...rix.com, xemul@...allels.com, suzuki@...ux.vnet.ibm.com, kosaki.motohiro@...fujitsu.com, adobriyan@...il.com, tarundsk@...ux.vnet.ibm.com, vapier@...too.org, roland@...k.frob.com, tj@...nel.org, ananth@...ux.vnet.ibm.com, gorcunov@...nvz.org, avagin@...nvz.org, oleg@...hat.com, eparis@...hat.com, d.hatayama@...fujitsu.com, james.hogan@...tec.com, akpm@...ux-foundation.org, torvalds@...ux-foundation.org Subject: Re: [RFC] [PATCH 00/19] Non disruptive application core dump infrastructure using task_work_add() On Fri, Oct 04, 2013 at 04:00:12PM +0530, Janani Venkataraman wrote: > Hi all, > > The following series implements an infrastructure for capturing the core of an > application without disrupting its process. The problem is that gcore et.al. have to stop the process briefly to attach and then use the pid mmap ptrace interfaces, right? Couldn't they just use the new process_vm_readv() syscalls instead? AFAIK those do not require ptrace. Then this could be all done in user space. Or are there some specific races with this approach? -Andi -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists