diff options
6 files changed, 11 insertions, 0 deletions
diff --git a/drivers-uio-un-restrict-sysfs-pointers-for-uio.patch b/drivers-uio-un-restrict-sysfs-pointers-for-uio.patch index d8d5bc825222e6..d41a2a46aec82c 100644 --- a/drivers-uio-un-restrict-sysfs-pointers-for-uio.patch +++ b/drivers-uio-un-restrict-sysfs-pointers-for-uio.patch @@ -4,6 +4,8 @@ Subject: drivers: uio: Un-restrict sysfs pointers for UIO The addr and size on the UIO devices are required by userspace to function properly. Let's unrestrict these by adding the 'P' modifier to %p and %pa. +Cc: William Roberts <william.c.roberts@intel.com> +Cc: Dave Weinstein <olorin@google.com> Signed-off-by: Chris Fries <cfries@google.com> Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org> --- diff --git a/lib-vsprintf-add-pap-padp-options.patch b/lib-vsprintf-add-pap-padp-options.patch index a34cdf978b52d9..5c7a20e5cbb046 100644 --- a/lib-vsprintf-add-pap-padp-options.patch +++ b/lib-vsprintf-add-pap-padp-options.patch @@ -4,6 +4,8 @@ Subject: lib: vsprintf: Add "%paP", "%padP" options Add %paP and %padP for physical address that need to always be shown regardless of kptr restrictions. +Cc: William Roberts <william.c.roberts@intel.com> +Cc: Dave Weinstein <olorin@google.com> Signed-off-by: Chris Fries <cfries@google.com> Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org> --- diff --git a/lib-vsprintf-additional-kernel-pointer-filtering-options.patch b/lib-vsprintf-additional-kernel-pointer-filtering-options.patch index b7d93ff4d63cd9..638776dde9e2dc 100644 --- a/lib-vsprintf-additional-kernel-pointer-filtering-options.patch +++ b/lib-vsprintf-additional-kernel-pointer-filtering-options.patch @@ -11,6 +11,7 @@ This patch is based on work by William Roberts <william.c.roberts@intel.com> Cc: William Roberts <william.c.roberts@intel.com> +Cc: Chris Fries <cfries@google.com> Signed-off-by: Dave Weinstein <olorin@google.com> Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org> diff --git a/lib-vsprintf-default-kptr_restrict-to-the-maximum-value.patch b/lib-vsprintf-default-kptr_restrict-to-the-maximum-value.patch index 7b2dafe2edd075..ccf50b0e069912 100644 --- a/lib-vsprintf-default-kptr_restrict-to-the-maximum-value.patch +++ b/lib-vsprintf-default-kptr_restrict-to-the-maximum-value.patch @@ -5,6 +5,8 @@ Set the initial value of kptr_restrict to the maximum setting rather than the minimum setting, to ensure that early boot logging is not leaking information. +Cc: William Roberts <william.c.roberts@intel.com> +Cc: Chris Fries <cfries@google.com> Signed-off-by: Dave Weinstein <olorin@google.com> Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org> --- diff --git a/lib-vsprintf-physical-address-kernel-pointer-filtering-options.patch b/lib-vsprintf-physical-address-kernel-pointer-filtering-options.patch index dfc85e37c2fe6d..eeaf8e39464300 100644 --- a/lib-vsprintf-physical-address-kernel-pointer-filtering-options.patch +++ b/lib-vsprintf-physical-address-kernel-pointer-filtering-options.patch @@ -4,6 +4,8 @@ Subject: lib: vsprintf: physical address kernel pointer filtering options Add the kptr_restrict setting of 4 which results in %pa and %p[rR] values being replaced by zeros. +Cc: William Roberts <william.c.roberts@intel.com> +Cc: Chris Fries <cfries@google.com> Signed-off-by: Dave Weinstein <olorin@google.com> Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org> --- diff --git a/lib-vsprintf-whitelist-stack-traces.patch b/lib-vsprintf-whitelist-stack-traces.patch index 392cea6c493fab..83e8ae151798df 100644 --- a/lib-vsprintf-whitelist-stack-traces.patch +++ b/lib-vsprintf-whitelist-stack-traces.patch @@ -4,6 +4,8 @@ Subject: lib: vsprintf: whitelist stack traces Use the %pP functionality to explicitly allow kernel pointers to be logged for stack traces +Cc: William Roberts <william.c.roberts@intel.com> +Cc: Chris Fries <cfries@google.com> Signed-off-by: Dave Weinstein <olorin@google.com> Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org> |
