From mboxrd@z Thu Jan 1 00:00:00 1970 From: Dan Rosenberg Subject: Re: [PATCH 2/10] Fix leaking of kernel heap addresses in net/ Date: Thu, 11 Nov 2010 20:22:34 -0500 Message-ID: <1289524954.5167.80.camel@dan> References: <1289524019.5167.66.camel@dan> <20101111171754.0198e151@nehalam> Mime-Version: 1.0 Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: 7bit Cc: "David S. Miller" , Oliver Hartkopp , Alexey Kuznetsov , Urs Thuermann , Hideaki YOSHIFUJI , Patrick McHardy , James Morris , Remi Denis-Courmont , "Pekka Savola (ipv6)" , Sridhar Samudrala , Vlad Yasevich , Tejun Heo , Eric Dumazet , Li Zefan , Joe Perches , Jamal Hadi Salim , "Eric W. Biederman" , Alexey Dobriyan , Jiri Pirko , Johannes Berg , Daniel Lezcano , Pavel Emelyanov , socketcan-core@l To: Stephen Hemminger Return-path: Received: from mx1.vsecurity.com ([209.67.252.12]:52549 "EHLO mx1.vsecurity.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1757305Ab0KLBWr (ORCPT ); Thu, 11 Nov 2010 20:22:47 -0500 In-Reply-To: <20101111171754.0198e151@nehalam> Sender: netdev-owner@vger.kernel.org List-ID: > > Printing different data based on security state seems like an ABI > nightmare. > I can't remove the data entirely, because that would seriously break the ABI. I deliberately kept the same format so as not to break any userspace programs relying on consistent output - are there really programs that would break when they read a 0 instead of an address? -Dan