From mboxrd@z Thu Jan 1 00:00:00 1970 From: "Tobin C. Harding" Subject: Re: [kernel-hardening] [PATCH 0/3] kallsyms: don't leak address Date: Mon, 18 Dec 2017 17:00:48 +1100 Message-ID: <20171218060048.GD4627@eros> References: <1513554812-13014-1-git-send-email-me@tobin.cc> <87o9mwa9g2.fsf@concordia.ellerman.id.au> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Cc: kernel-hardening@lists.openwall.com, Steven Rostedt , Tycho Andersen , Linus Torvalds , Kees Cook , Andrew Morton , Daniel Borkmann , Masahiro Yamada , Alexei Starovoitov , linux-kernel@vger.kernel.org, Network Development To: Michael Ellerman Return-path: Content-Disposition: inline In-Reply-To: <87o9mwa9g2.fsf@concordia.ellerman.id.au> Sender: linux-kernel-owner@vger.kernel.org List-Id: netdev.vger.kernel.org On Mon, Dec 18, 2017 at 04:31:25PM +1100, Michael Ellerman wrote: > "Tobin C. Harding" writes: > > > This set plugs a kernel address leak that occurs if kallsyms symbol > > look up fails. This set was prompted by a leaking address found using > > scripts/leaking_addresses.pl on a PowerPC machine in the wild. > > Any details on that? I haven't heard about it. I have an account on a server in USA. I'm not sure how much detail I should give on the mailing list in case it is sensitive information. I will email you off list. Responding here for the benefit of the list. If this is not the correct way to handle this please say so. thanks, Tobin.