Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753616AbcDFVTZ (ORCPT ); Wed, 6 Apr 2016 17:19:25 -0400 Received: from mail-ig0-f175.google.com ([209.85.213.175]:33059 "EHLO mail-ig0-f175.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751937AbcDFVTX (ORCPT ); Wed, 6 Apr 2016 17:19:23 -0400 MIME-Version: 1.0 In-Reply-To: References: <1459947782-5071-1-git-send-email-ed@abdsec.com> Date: Wed, 6 Apr 2016 14:19:22 -0700 X-Google-Sender-Auth: OlSChHvCCQg-tdnsTabJK4DUwy8 Message-ID: Subject: Re: [PATCH] KERNEL: resource: Fix bug on leakage in /proc/iomem file From: Linus Torvalds To: Emrah Demir Cc: Linux Kernel Mailing List , Kees Cook , Dan Rosenberg , "kernel-hardening@lists.openwall.com" , Dave Jones Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 388 Lines: 11 On Wed, Apr 6, 2016 at 10:54 AM, Linus Torvalds wrote: > > So I'd find a patch like the attached to be perfectly acceptable (in > fact, we should have done this long ago). I just committed it, let's see if some odd program uses the iomem data. I doubt it, and I always enjoy improvements that remove more lines of code than they add. Linus