diff options
author | Kees Cook <keescook@chromium.org> | 2017-02-25 10:56:48 +0100 |
---|---|---|
committer | Tejun Heo <tj@kernel.org> | 2017-03-06 21:16:03 +0100 |
commit | b6a6759daf55dade2b65089957832759d502acfb (patch) | |
tree | a9b626dbfbc8ee6ec731b42101855a5ae554a88f /kernel/cgroup | |
parent | cgroup/pids: remove spurious suspicious RCU usage warning (diff) | |
download | linux-b6a6759daf55dade2b65089957832759d502acfb.tar.xz linux-b6a6759daf55dade2b65089957832759d502acfb.zip |
cgroups: censor kernel pointer in debug files
As found in grsecurity, this avoids exposing a kernel pointer through
the cgroup debug entries.
Signed-off-by: Kees Cook <keescook@chromium.org>
Signed-off-by: Tejun Heo <tj@kernel.org>
Diffstat (limited to 'kernel/cgroup')
-rw-r--r-- | kernel/cgroup/cgroup-v1.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/kernel/cgroup/cgroup-v1.c b/kernel/cgroup/cgroup-v1.c index 56eba9caa632..1dc22f6b49f5 100644 --- a/kernel/cgroup/cgroup-v1.c +++ b/kernel/cgroup/cgroup-v1.c @@ -1329,7 +1329,7 @@ static int cgroup_css_links_read(struct seq_file *seq, void *v) struct task_struct *task; int count = 0; - seq_printf(seq, "css_set %p\n", cset); + seq_printf(seq, "css_set %pK\n", cset); list_for_each_entry(task, &cset->tasks, cg_list) { if (count++ > MAX_TASKS_SHOWN_PER_CSS) |