From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753385AbdK2Vg3 (ORCPT ); Wed, 29 Nov 2017 16:36:29 -0500 Received: from mail-io0-f176.google.com ([209.85.223.176]:42501 "EHLO mail-io0-f176.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753241AbdK2Vg0 (ORCPT ); Wed, 29 Nov 2017 16:36:26 -0500 X-Google-Smtp-Source: AGs4zMZSHLpdd0AIUeH992rrp9+qTgPwk2G07s+KLGmdHwd8K1b65Bg+hyiGN+4ySeI3XhepMrpKlNPVNJFVejsHwEk= MIME-Version: 1.0 In-Reply-To: References: <20171129045927.GA6217@eros> <20171129210848.GF6217@eros> From: Linus Torvalds Date: Wed, 29 Nov 2017 13:36:25 -0800 X-Google-Sender-Auth: 3ogn8Z_aqrvBgLNO23TWHy_TQH0 Message-ID: Subject: Re: [GIT PULL] hash addresses printed with %p To: "Tobin C. Harding" , Matt Fleming , Ard Biesheuvel , Greg Kroah-Hartman Cc: LKML , "linux-efi@vger.kernel.org" Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Nov 29, 2017 at 1:14 PM, Linus Torvalds wrote: > > Not because %pK itself changed, but because the semantics of %p did. > The baseline moved, and the "safe" version did not. Btw, that baseline for me is now that I can do ./scripts/leaking_addresses.pl | wc -l 18 and of those 18 hits, six are false positives (looks like bitmaps in the uevent keys). The remaining 12 are from the EFI runtime map files (/sys/firmware/efi/runtime-map/*). They should presumably not be world-readable, but sadly the kset_create_and_add() helper seems to do that by default. I think the sysfs code makes it insanely too easy to make things world-readable. You try to be careful, and mark things read-only etc, but __ATTR_RO() jkust means S_IRUGO, which means world-readable. There seems to be no convenient model for kobjects having better permissions. Greg? Linus