lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20171204233613.GI21565@eros>
Date:   Tue, 5 Dec 2017 10:36:13 +1100
From:   "Tobin C. Harding" <me@...in.cc>
To:     kbuild test robot <fengguang.wu@...el.com>
Cc:     LKML <linux-kernel@...r.kernel.org>
Subject: running leaking_addresses.pl

Hi,

Recently scripts/leaking_addresses.pl was merged into the mainline with
the hope of catching leaking kernel addresses.

Would it be in scope for this script to be run by the kbuild test robot?
Excuse my very little knowledge of the kbuild test robot but would this
lead to the script being run on a number of kernels with varying
configuration?

In the event that this may be a possibility can I add that I do not have
a suggestion for what to do with the output, can it go to LKML? I'm
happy to be CC'd on the output to help investigate.

thanks,
Tobin.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ