Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Thu, 02 Aug 2012 04:11:41 -0700
From: ebiederm@...ssion.com (Eric W. Biederman)
To: richard -rw- weinberger <richard.weinberger@...il.com>
Cc: Kees Cook <keescook@...omium.org>,  Thomas Gleixner <tglx@...utronix.de>,  linux-kernel@...r.kernel.org,  Randy Dunlap <rdunlap@...otime.net>,  Darren Hart <dvhart@...ux.intel.com>,  Peter Zijlstra <a.p.zijlstra@...llo.nl>,  Andrew Morton <akpm@...ux-foundation.org>,  Jiri Kosina <jkosina@...e.cz>,  David Howells <dhowells@...hat.com>,  "Serge E. Hallyn" <serge.hallyn@...onical.com>,  linux-doc@...r.kernel.org,  kernel-hardening@...ts.openwall.com,  spender@...ecurity.net
Subject: Re: [PATCH v2] futex: mark get_robust_list as deprecated

richard -rw- weinberger <richard.weinberger@...il.com> writes:

> On Fri, Mar 23, 2012 at 8:08 PM, Kees Cook <keescook@...omium.org> wrote:
>> Notify get_robust_list users that the syscall is going away.
>>
>> Suggested-by: Thomas Gleixner <tglx@...utronix.de>
>> Signed-off-by: Kees Cook <keescook@...omium.org>
>> ---
>
> I'm using this system call in an application and noticed that's marked
> as deprecated now.
> My application collects all kind of information from crashing programs.
> It's installed in /proc/sys/kernel/core_pattern.
>
> If program X is crashing it executes get_robust_list(X) to get the
> address of the robust list
> and reads the list from /proc/X/mem.
>
> Is there another way to get the robust list from another program (by it's pid)?

The folks doing checkpoint/restart claim to not need this, so there
might be a way either that or they just haven't hit this problem yet.

What you are doing sounds like a reasonable use of get_robust_list to me.

Eric

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.