The patch titled proc: hide kernel addresses via %pK in /proc/<pid>/stack has been added to the -mm tree. Its filename is proc-hide-kernel-addresses-via-%pk-in-proc-pid-stack.patch Before you just go and hit "reply", please: a) Consider who else should be cc'ed b) Prefer to cc a suitable mailing list as well c) Ideally: find the original patch on the mailing list and do a reply-to-all to that, adding suitable additional cc's *** Remember to use Documentation/SubmitChecklist when testing your code *** See http://userweb.kernel.org/~akpm/stuff/added-to-mm.txt to find out what to do about this The current -mm tree may be found at http://userweb.kernel.org/~akpm/mmotm/ ------------------------------------------------------ Subject: proc: hide kernel addresses via %pK in /proc/<pid>/stack From: Konstantin Khlebnikov <khlebnikov@xxxxxxxxxx> This file is readable for the task owner. Hide kernel addresses from unprivileged users, leave them function names and offsets. Signed-off-by: Konstantin Khlebnikov <khlebnikov@xxxxxxxxxx> Acked-by: Kees Cook <kees.cook@xxxxxxxxxxxxx> Cc: Alexey Dobriyan <adobriyan@xxxxxxxxx> Signed-off-by: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx> --- fs/proc/base.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff -puN fs/proc/base.c~proc-hide-kernel-addresses-via-%pk-in-proc-pid-stack fs/proc/base.c --- a/fs/proc/base.c~proc-hide-kernel-addresses-via-%pk-in-proc-pid-stack +++ a/fs/proc/base.c @@ -340,7 +340,7 @@ static int proc_pid_stack(struct seq_fil save_stack_trace_tsk(task, &trace); for (i = 0; i < trace.nr_entries; i++) { - seq_printf(m, "[<%p>] %pS\n", + seq_printf(m, "[<%pK>] %pS\n", (void *)entries[i], (void *)entries[i]); } kfree(entries); _ Patches currently in -mm which might be from khlebnikov@xxxxxxxxxx are proc-hide-kernel-addresses-via-%pk-in-proc-pid-stack.patch -- To unsubscribe from this list: send the line "unsubscribe mm-commits" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html