From mboxrd@z Thu Jan 1 00:00:00 1970 From: "Tobin C. Harding" Subject: Re: [kernel-hardening] [PATCH 0/3] kallsyms: don't leak address Date: Mon, 18 Dec 2017 20:17:15 +1100 Message-ID: <20171218091715.GF4627@eros> References: <1513554812-13014-1-git-send-email-me@tobin.cc> <87o9mwa9g2.fsf@concordia.ellerman.id.au> <20171218060048.GD4627@eros> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Cc: kernel-hardening@lists.openwall.com, Steven Rostedt , Tycho Andersen , Linus Torvalds , Kees Cook , Andrew Morton , Daniel Borkmann , Masahiro Yamada , Alexei Starovoitov , linux-kernel@vger.kernel.org, Network Development To: Michael Ellerman Return-path: Content-Disposition: inline In-Reply-To: <20171218060048.GD4627@eros> Sender: linux-kernel-owner@vger.kernel.org List-Id: netdev.vger.kernel.org On Mon, Dec 18, 2017 at 05:00:48PM +1100, Tobin C. Harding wrote: > On Mon, Dec 18, 2017 at 04:31:25PM +1100, Michael Ellerman wrote: > > "Tobin C. Harding" writes: > > > > > This set plugs a kernel address leak that occurs if kallsyms symbol > > > look up fails. This set was prompted by a leaking address found using > > > scripts/leaking_addresses.pl on a PowerPC machine in the wild. > > > > Any details on that? I haven't heard about it. > > I have an account on a server in USA. I'm not sure how much detail I > should give on the mailing list in case it is sensitive information. I > will email you off list. Responding here for the benefit of the list. Geez I'm a goose. Here is the details with a sanitized address. /proc/8025/task/8025/stack: [<0000000000000000>] 0xc0000001XXXXXXXX $ uname -r 4.4.0-79-powerpc64-smp thanks, Tobin.