From patchwork Sun Dec 17 22:30:06 2017 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Tobin Harding X-Patchwork-Id: 10117959 Return-Path: Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork.web.codeaurora.org (Postfix) with ESMTP id 8A88A60327 for ; Sun, 17 Dec 2017 22:31:08 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 7D642291B5 for ; Sun, 17 Dec 2017 22:31:08 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id 704D129226; Sun, 17 Dec 2017 22:31:08 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-4.1 required=2.0 tests=BAYES_00,DKIM_SIGNED, RCVD_IN_DNSWL_MED,T_DKIM_INVALID autolearn=ham version=3.3.1 Received: from mother.openwall.net (mother.openwall.net [195.42.179.200]) by mail.wl.linuxfoundation.org (Postfix) with SMTP id 7C75929226 for ; Sun, 17 Dec 2017 22:31:07 +0000 (UTC) Received: (qmail 26017 invoked by uid 550); 17 Dec 2017 22:30:55 -0000 Mailing-List: contact kernel-hardening-help@lists.openwall.com; run by ezmlm Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-ID: Delivered-To: mailing list kernel-hardening@lists.openwall.com Received: (qmail 25865 invoked from network); 17 Dec 2017 22:30:54 -0000 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=tobin.cc; h=cc :date:from:in-reply-to:message-id:references:subject:to :x-me-sender:x-me-sender:x-sasl-enc; s=fm1; bh=lREZMccO1kt5JIch4 LXXwSh8UYXttBd6h2G2acxCoXI=; b=WIbw2SgoGLI56pDYp3JupuR9V8s7QXcFj IZePabrcjdyCrtupgeTqCHsqc0TpV2xwcG9RWliE4dnz7Sx1aIVN5hRzNhk7ZIsw JrzdV4Wp/1vAwmI0NZlhtzfT9t6GwReFU7Ok0Zr5Oas4iHYTun/3t3iKHvIvGmre uf0ap3PtiscHDKyNZTBbHJk/sMiJ8JfXaaxxfwavz5BvCI9uhWUwU0sGE/aQ2o8E En5u/CYnVfV51YTf76u9AS8/cORaTQ6hjUtO6Fetb+5kpIVpm1Eej3oajP1Baf5X /GUsM+qu7smo6y+xPomBE0pvwIQJFMrlReqkYi1pa2loMIwvecBcQ== DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=cc:date:from:in-reply-to:message-id :references:subject:to:x-me-sender:x-me-sender:x-sasl-enc; s= fm1; bh=lREZMccO1kt5JIch4LXXwSh8UYXttBd6h2G2acxCoXI=; b=AgWqra4Y Lud0wSCUTFvaDZwVoe3LoaH83s7IbwHe30pVlMyeGK4gB3FQ+yvcQbJRfXOMNXal X4JAaEzYFtj44fR6tCetmOdQFF7FFXojFRKNFo5Y6iyiyr3IsYOf0a+wQoZlF34f 2jcDFGEqgOyURjiXLxlhlV9AUjAESFGEpFCsBPsORWzxeH6r8tZKnZ1w/ww5erfh NlvK3E3SBkpgx9Foil16QO0AHrsyGjVi78dWxm3CPsiJmzp3D4vVSItmRbTs/IRj teLE9p/41PceFSKfAoyUA7alrL2m3+a0/tzA0WG87mExPsAofZsh7ngvFFM5Uox9 nqlWu4VeT5UtjQ== X-ME-Sender: From: "Tobin C. Harding" To: Jonathan Corbet Cc: "Tobin C. Harding" , Randy Dunlap , linux-doc@vger.kernel.org, linux-kernel@vger.kernel.org, Kees Cook , Alexander Popov , kernel-hardening@lists.openwall.com Date: Mon, 18 Dec 2017 09:30:06 +1100 Message-Id: <1513549807-20287-3-git-send-email-me@tobin.cc> X-Mailer: git-send-email 2.7.4 In-Reply-To: <1513549807-20287-1-git-send-email-me@tobin.cc> References: <1513549807-20287-1-git-send-email-me@tobin.cc> Subject: [kernel-hardening] [PATCH v2 2/3] doc: update kpt_restrict documentation X-Virus-Scanned: ClamAV using ClamSMTP Recently the behaviour of printk specifier %pK was changed. The documentation does not currently mirror this. Update documentation for sysctl kpt_restrict. Signed-off-by: Tobin C. Harding --- Documentation/sysctl/kernel.txt | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/Documentation/sysctl/kernel.txt b/Documentation/sysctl/kernel.txt index 63663039acb7..6b039aa1427a 100644 --- a/Documentation/sysctl/kernel.txt +++ b/Documentation/sysctl/kernel.txt @@ -391,7 +391,8 @@ kptr_restrict: This toggle indicates whether restrictions are placed on exposing kernel addresses via /proc and other interfaces. -When kptr_restrict is set to (0), the default, there are no restrictions. +When kptr_restrict is set to (0), the default, the address is hashed before +printing. (This is the equivalent to %p.) When kptr_restrict is set to (1), kernel pointers printed using the %pK format specifier will be replaced with 0's unless the user has CAP_SYSLOG