Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Tue, 7 Nov 2017 13:56:05 +0000
From: David Laight <David.Laight@...LAB.COM>
To: "'Tobin C. Harding'" <>, ""
CC: "Jason A. Donenfeld" <>, Theodore Ts'o <>,
	Linus Torvalds <>, Kees Cook
	<>, Paolo Bonzini <>, Tycho Andersen
	<>, "Roberts, William C" <>, Tejun
 Heo <>, Jordan Glover <>, Greg KH
	<>, Petr Mladek <>, "Joe Perches"
	<>, Ian Campbell <>, "Sergey Senozhatsky"
	<>, Catalin Marinas <>,
	Will Deacon <>, Steven Rostedt <>,
	Chris Fries <>, Dave Weinstein <>, Daniel
 Micay <>, Djalal Harouni <>,
	"" <>, Network
 Development <>, David Miller <>
Subject: RE: [PATCH v4] scripts: add

From: Tobin C. Harding
> Sent: 07 November 2017 10:32
> Currently we are leaking addresses from the kernel to user space. This
> script is an attempt to find some of those leakages. Script parses
> `dmesg` output and /proc and /sys files for hex strings that look like
> kernel addresses.

Maybe the %p that end up in dmesg (via the kernel message buffer) should
be converted to text in a form that allows the code that reads them to
substitute alternate text for non-root users?

Then the actual addresses will be available to root (who can probably
get most by other means) but not to the casual observer.


Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.