From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S934935AbcIFUgY (ORCPT ); Tue, 6 Sep 2016 16:36:24 -0400 Received: from mga09.intel.com ([134.134.136.24]:61069 "EHLO mga09.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S934511AbcIFUgW (ORCPT ); Tue, 6 Sep 2016 16:36:22 -0400 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.30,293,1470726000"; d="scan'208";a="1046468494" Subject: Re: [PATCH V3] mm: Add sysfs interface to dump each node's zonelist information To: Anshuman Khandual , linux-mm@kvack.org, linux-kernel@vger.kernel.org References: <1473140072-24137-2-git-send-email-khandual@linux.vnet.ibm.com> <1473150666-3875-1-git-send-email-khandual@linux.vnet.ibm.com> Cc: akpm@linux-foundation.org, Kees Cook From: Dave Hansen Message-ID: <57CF28C5.3090006@intel.com> Date: Tue, 6 Sep 2016 13:36:21 -0700 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:38.0) Gecko/20100101 Thunderbird/38.8.0 MIME-Version: 1.0 In-Reply-To: <1473150666-3875-1-git-send-email-khandual@linux.vnet.ibm.com> Content-Type: text/plain; charset=windows-1252 Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 09/06/2016 01:31 AM, Anshuman Khandual wrote: > [NODE (0)] > ZONELIST_FALLBACK > (0) (node 0) (zone DMA c00000000140c000) > (1) (node 1) (zone DMA c000000100000000) > (2) (node 2) (zone DMA c000000200000000) > (3) (node 3) (zone DMA c000000300000000) > ZONELIST_NOFALLBACK > (0) (node 0) (zone DMA c00000000140c000) Don't we have some prohibition on dumping out kernel addresses like this so that attackers can't trivially defeat kernel layout randomization?