From patchwork Thu Dec 7 22:27:55 2017 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Tobin Harding X-Patchwork-Id: 10101185 Return-Path: Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork.web.codeaurora.org (Postfix) with ESMTP id B0D1160360 for ; Thu, 7 Dec 2017 22:28:45 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id A2C0728713 for ; Thu, 7 Dec 2017 22:28:45 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id 978A42882F; Thu, 7 Dec 2017 22:28:45 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-4.1 required=2.0 tests=BAYES_00,DKIM_SIGNED, RCVD_IN_DNSWL_MED,T_DKIM_INVALID autolearn=ham version=3.3.1 Received: from mother.openwall.net (mother.openwall.net [195.42.179.200]) by mail.wl.linuxfoundation.org (Postfix) with SMTP id AFD4B28713 for ; Thu, 7 Dec 2017 22:28:44 +0000 (UTC) Received: (qmail 30428 invoked by uid 550); 7 Dec 2017 22:28:31 -0000 Mailing-List: contact kernel-hardening-help@lists.openwall.com; run by ezmlm Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-ID: Delivered-To: mailing list kernel-hardening@lists.openwall.com Received: (qmail 30316 invoked from network); 7 Dec 2017 22:28:28 -0000 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=tobin.cc; h=cc :date:from:in-reply-to:message-id:references:subject:to :x-me-sender:x-me-sender:x-sasl-enc; s=fm1; bh=j7z1WqCyAJy2+951l kilh1H127KmZ+ql/C1kS5OC2wM=; b=hO1aUQXXe6DSFRvDCpXi3ttmlKz4wSIKH jjORM6efKKawD4pJVr9ygbQ3aT/TaYQ6od1SiL4Nc9XQEr27ALrkgV3aYlQNtMBC NPu5RBiRgZj8fWBsRYau10sOsa2GnojdbGdNJXY9M0TgnpKfyhiCy1dzzLPwuEbK Zt4LJNuG84qWqEIWjswUPpE4QbvPVljKiVhcfZQdHm3nM2HnCTSPofj39e8Dk2Vg YXW6xeCw4++JQPL/YN7hB0oj1wNTtlnOiY+XIl/3VnqaQrZzR7TuCLkXR1Nkq+RW Sq6EL8G4yNNRk4eydtOC84iDoqGhqlhUfLPUcQIa7stCrl//tUtQQ== DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=cc:date:from:in-reply-to:message-id :references:subject:to:x-me-sender:x-me-sender:x-sasl-enc; s= fm1; bh=j7z1WqCyAJy2+951lkilh1H127KmZ+ql/C1kS5OC2wM=; b=Sv40ZlzD Pcze7MTgdi6zngQo2ZyJGrt0qy8w6oF02wr8VaZhTMZotVaPX8Wvn5D4cU8P1PFB qS3vc/QNjiSw2hER91QEDoLgALwzYd8+QitnceVxT7j45WQ0Frhofyn40mZlREBD rQpFrghM40FsrZj29rqpGPeLkVj/kTgObdCzHAjmDWspEQ7iGL0x7QokS1X2AVZ3 wYwsdB4FV6WwCpnokK9fB4kcP+5HjkctbGqLd70r7CqU9ec6ASrJw3fypM1V0Kiv 8kdlsv94QGn4Ufs8x9k17QD2nyCUV7cAA7ZtBKf+HBbw1zPsN1vmiBXRDfEyxclw QUCk1e3/bnSzQw== X-ME-Sender: From: "Tobin C. Harding" To: Jonathan Corbet Cc: "Tobin C. Harding" , Randy Dunlap , linux-doc@vger.kernel.org, linux-kernel@vger.kernel.org, Kees Cook , Alexander Popov , kernel-hardening@lists.openwall.com Date: Fri, 8 Dec 2017 09:27:55 +1100 Message-Id: <1512685676-21933-3-git-send-email-me@tobin.cc> X-Mailer: git-send-email 2.7.4 In-Reply-To: <1512685676-21933-1-git-send-email-me@tobin.cc> References: <1512685676-21933-1-git-send-email-me@tobin.cc> Subject: [kernel-hardening] [PATCH 2/3] doc: update kpt_restrict documentation X-Virus-Scanned: ClamAV using ClamSMTP Recently the behaviour of printk specifier %pK was changed. The documentation does not currently mirror this. Update documentation for sysctl kpt_restrict. Reported-by: Alexander Popov Signed-off-by: Tobin C. Harding --- Documentation/sysctl/kernel.txt | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/Documentation/sysctl/kernel.txt b/Documentation/sysctl/kernel.txt index 694968c7523c..1698cd2ef16b 100644 --- a/Documentation/sysctl/kernel.txt +++ b/Documentation/sysctl/kernel.txt @@ -377,7 +377,8 @@ kptr_restrict: This toggle indicates whether restrictions are placed on exposing kernel addresses via /proc and other interfaces. -When kptr_restrict is set to (0), the default, there are no restrictions. +When kptr_restrict is set to (0), the default, the address is hashed before +printing. (This is the equivalent to %p.) When kptr_restrict is set to (1), kernel pointers printed using the %pK format specifier will be replaced with 0's unless the user has CAP_SYSLOG