On Wed, Oct 29, 2014 at 1:48 AM, Sudip Mukherjee
wrote:
> On Wed, Oct 29, 2014 at 11:38 AM, Scott Lovenberg
> wrote:
>> On Wed, Oct 29, 2014 at 12:05 AM, Sudip Mukherjee
>> wrote:
>>>
>>> On Wed, Oct 29, 2014 at 7:31 AM, nick wrote:
>>> > Greg,
On Wed, Oct 29, 2014 at 12:05 AM, Sudip Mukherjee
wrote:
>
> On Wed, Oct 29, 2014 at 7:31 AM, nick wrote:
> > Greg,
> > That's fine, I was wondering how long Greg KH takes to get around to
> > picking this up as he is very busy with
> > other kernel work.
>
> it might take a long long time. i th
On Tue, Jun 10, 2014 at 10:29 PM, Greg KH wrote:
> On Wed, Jun 11, 2014 at 07:23:08AM +0530, Raghavendra wrote:
>> Hello,
>>
>> I am new to the kernel development community and I started off by fixing
>> small coding style errors in the drivers/staging directory. I've created
>> a patch for the sa
On Wed, Oct 3, 2012 at 5:13 AM, Matthew Walster wrote:
>
>
> On 2 October 2012 17:16, Scott Lovenberg wrote:
>>
>> Looks good to me.
>
>
> Maintainer didn't think so :(
>
> On 2 October 2012 19:46, David Miller wrote:
>>
>> That comment and t
On Tue, Oct 2, 2012 at 6:56 AM, wrote:
> From: Matthew Walster
>
> Remove an old commented out piece of code.
> Remove an if(true) statement.
> Remove a set of braces that weren't strictly necessary.
>
> All found by running checkpatch.pl against the code.
>
> Signed-off-by: Matthew Walster
> -
On Wed, Sep 26, 2012 at 4:21 PM, Constantine Shulyupin
wrote:
> Hi
>
> I am experienced embedded Linux driver developer. I have some spare
> time which I want to contribute to mainstream Linux kernel.
> Unfortunately http://kernelnewbies.org/KernelJanitors/Todo is very old.
> Can you please sugge
On Mon, Jan 16, 2012 at 18:45, Jonathan Neuschäfer wrote:
> On Mon, Jan 16, 2012 at 01:19:22PM -0500, Scott Lovenberg wrote:
> > Let me walk you guys through how this bug could be exploited.
> > The file that you want to access is blocked from you by file system
> > permis
On Tue, Jan 17, 2012 at 20:53, Fredrick wrote:
> When you malloc a memory or mmap a MAP_ANON memory, it is virtually
> allocated. When you read or write to it, the process takes a page fault.
> The page fault handler zeroes those memory and hands it to the process.
> So I think there is no leak.
On Mon, Jan 16, 2012 at 13:45, Greg Freemyer wrote:
> On Thu, Jan 12, 2012 at 12:00 PM, Jonathan Neuschäfer
> wrote:
> > On Wed, Jan 11, 2012 at 12:52:33PM -0500, Scott Lovenberg wrote:
> >> Real world example in C; I fixed a security bug in Samba that dealt with
&g
On Thu, Jan 12, 2012 at 12:00, Jonathan Neuschäfer wrote:
> On Wed, Jan 11, 2012 at 12:52:33PM -0500, Scott Lovenberg wrote:
> > Real world example in C; I fixed a security bug in Samba that dealt with
> > this exact problem. Credential files were read to memory as the root
>
On Wed, Jan 11, 2012 at 11:45, Dave Hylands wrote:
> Hi,
>
> On Wed, Jan 11, 2012 at 4:53 AM, 夏业添 wrote:
> > Hi,
> >My tutor asked me to test whether one process leaves information in
> > memory after it is dead. I tried to search some article about such thing
> on
> > the Internet but there
11 matches
Mail list logo