On Mon, Mar 11, 2013 at 12:25:19PM -0700, Kees Cook wrote: > Masks kernel address info-leak in object dumps with the %pK suffix, > so they cannot be used to target kernel memory corruption attacks if > the kptr_restrict sysctl is set. > > Signed-off-by: Kees Cook <keescook at chromium.org> > Cc: stable at vger.kernel.org Picked up for -fixes, thanks for the patch. -Daniel -- Daniel Vetter Software Engineer, Intel Corporation +41 (0) 79 365 57 48 - http://blog.ffwll.ch
- [PATCH] drm/i915: restrict kernel address leak in debugfs Kees Cook
- [PATCH] drm/i915: restrict kernel address leak in debug... Daniel Vetter