From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1756204AbdKGNz5 convert rfc822-to-8bit (ORCPT ); Tue, 7 Nov 2017 08:55:57 -0500 Received: from smtp-out6.electric.net ([192.162.217.181]:61801 "EHLO smtp-out6.electric.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752924AbdKGNzz (ORCPT ); Tue, 7 Nov 2017 08:55:55 -0500 From: David Laight To: "'Tobin C. Harding'" , "kernel-hardening@lists.openwall.com" CC: "Jason A. Donenfeld" , "Theodore Ts'o" , Linus Torvalds , Kees Cook , Paolo Bonzini , Tycho Andersen , "Roberts, William C" , Tejun Heo , Jordan Glover , Greg KH , Petr Mladek , "Joe Perches" , Ian Campbell , "Sergey Senozhatsky" , Catalin Marinas , Will Deacon , Steven Rostedt , Chris Fries , Dave Weinstein , Daniel Micay , Djalal Harouni , "linux-kernel@vger.kernel.org" , Network Development , David Miller Subject: RE: [PATCH v4] scripts: add leaking_addresses.pl Thread-Topic: [PATCH v4] scripts: add leaking_addresses.pl Thread-Index: AQHTV7PJsX9bAgtDwEGwI6njM7SrB6MI74kA Date: Tue, 7 Nov 2017 13:56:05 +0000 Message-ID: <063D6719AE5E284EB5DD2968C1650D6DD00B3BD1@AcuExch.aculab.com> References: <1510050731-32446-1-git-send-email-me@tobin.cc> In-Reply-To: <1510050731-32446-1-git-send-email-me@tobin.cc> Accept-Language: en-GB, en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-originating-ip: [10.202.99.200] Content-Type: text/plain; charset="Windows-1252" Content-Transfer-Encoding: 8BIT MIME-Version: 1.0 X-Outbound-IP: 156.67.243.126 X-Env-From: David.Laight@ACULAB.COM X-Proto: esmtps X-Revdns: X-HELO: AcuExch.aculab.com X-TLS: TLSv1:AES128-SHA:128 X-Authenticated_ID: X-PolicySMART: 3396946, 3397078 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Tobin C. Harding > Sent: 07 November 2017 10:32 > > Currently we are leaking addresses from the kernel to user space. This > script is an attempt to find some of those leakages. Script parses > `dmesg` output and /proc and /sys files for hex strings that look like > kernel addresses. ... Maybe the %p that end up in dmesg (via the kernel message buffer) should be converted to text in a form that allows the code that reads them to substitute alternate text for non-root users? Then the actual addresses will be available to root (who can probably get most by other means) but not to the casual observer. David From mboxrd@z Thu Jan 1 00:00:00 1970 From: David Laight Subject: RE: [PATCH v4] scripts: add leaking_addresses.pl Date: Tue, 7 Nov 2017 13:56:05 +0000 Message-ID: <063D6719AE5E284EB5DD2968C1650D6DD00B3BD1@AcuExch.aculab.com> References: <1510050731-32446-1-git-send-email-me@tobin.cc> Mime-Version: 1.0 Content-Type: text/plain; charset="Windows-1252" Content-Transfer-Encoding: 8BIT Cc: "Jason A. Donenfeld" , Theodore Ts'o , Linus Torvalds , Kees Cook , Paolo Bonzini , Tycho Andersen , "Roberts, William C" , Tejun Heo , Jordan Glover , Greg KH , Petr Mladek , "Joe Perches" , Ian Campbell , "Sergey Senozhatsky" , Catalin Marinas , Will Deacon , Steven Rostedt , Chris Fries , Dave Weinstein , Daniel Micay , "kernel-hardening@lists.openwall.com" Return-path: In-Reply-To: <1510050731-32446-1-git-send-email-me@tobin.cc> Content-Language: en-US Sender: linux-kernel-owner@vger.kernel.org List-Id: netdev.vger.kernel.org From: Tobin C. Harding > Sent: 07 November 2017 10:32 > > Currently we are leaking addresses from the kernel to user space. This > script is an attempt to find some of those leakages. Script parses > `dmesg` output and /proc and /sys files for hex strings that look like > kernel addresses. ... Maybe the %p that end up in dmesg (via the kernel message buffer) should be converted to text in a form that allows the code that reads them to substitute alternate text for non-root users? Then the actual addresses will be available to root (who can probably get most by other means) but not to the casual observer. David From mboxrd@z Thu Jan 1 00:00:00 1970 From: David Laight Date: Tue, 7 Nov 2017 13:56:05 +0000 Message-ID: <063D6719AE5E284EB5DD2968C1650D6DD00B3BD1@AcuExch.aculab.com> References: <1510050731-32446-1-git-send-email-me@tobin.cc> In-Reply-To: <1510050731-32446-1-git-send-email-me@tobin.cc> Content-Type: text/plain; charset="Windows-1252" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 Subject: [kernel-hardening] RE: [PATCH v4] scripts: add leaking_addresses.pl To: "'Tobin C. Harding'" , "kernel-hardening@lists.openwall.com" Cc: "Jason A. Donenfeld" , Theodore Ts'o , Linus Torvalds , Kees Cook , Paolo Bonzini , Tycho Andersen , "Roberts, William C" , Tejun Heo , Jordan Glover , Greg KH , Petr Mladek , Joe Perches , Ian Campbell , Sergey Senozhatsky , Catalin Marinas , Will Deacon , Steven Rostedt , Chris Fries , Dave Weinstein , Daniel Micay , Djalal Harouni , "linux-kernel@vger.kernel.org" , Network Development , David Miller List-ID: From: Tobin C. Harding > Sent: 07 November 2017 10:32 > > Currently we are leaking addresses from the kernel to user space. This > script is an attempt to find some of those leakages. Script parses > `dmesg` output and /proc and /sys files for hex strings that look like > kernel addresses. ... Maybe the %p that end up in dmesg (via the kernel message buffer) should be converted to text in a form that allows the code that reads them to substitute alternate text for non-root users? Then the actual addresses will be available to root (who can probably get most by other means) but not to the casual observer. David