Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753951Ab3HAJOK (ORCPT ); Thu, 1 Aug 2013 05:14:10 -0400 Received: from userp1040.oracle.com ([156.151.31.81]:35007 "EHLO userp1040.oracle.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751108Ab3HAJOH (ORCPT ); Thu, 1 Aug 2013 05:14:07 -0400 Date: Thu, 1 Aug 2013 12:13:22 +0300 From: Dan Carpenter To: Kees Cook Cc: "linux-arm-kernel@lists.infradead.org" , ksummit-2013-discuss@lists.linuxfoundation.org, LKML Subject: Re: [Ksummit-2013-discuss] [ARM ATTEND] catching up on exploit mitigations Message-ID: <20130801091322.GA5302@mwanda> References: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.5.21 (2010-09-15) X-Source-IP: acsinet21.oracle.com [141.146.126.237] Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 477 Lines: 12 I was just reading http://faultlinux.lip6.fr/ which says that in 2011 the static checker fault rate in arch/ and fs/ was worse than in drivers/. I suspect that there are some security vulnerabilities there. regards, dan carpenter -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/