aboutsummaryrefslogtreecommitdiffstats
diff options
-rw-r--r--drivers-uio-un-restrict-sysfs-pointers-for-uio.patch2
-rw-r--r--lib-vsprintf-add-pap-padp-options.patch2
-rw-r--r--lib-vsprintf-additional-kernel-pointer-filtering-options.patch1
-rw-r--r--lib-vsprintf-default-kptr_restrict-to-the-maximum-value.patch2
-rw-r--r--lib-vsprintf-physical-address-kernel-pointer-filtering-options.patch2
-rw-r--r--lib-vsprintf-whitelist-stack-traces.patch2
6 files changed, 11 insertions, 0 deletions
diff --git a/drivers-uio-un-restrict-sysfs-pointers-for-uio.patch b/drivers-uio-un-restrict-sysfs-pointers-for-uio.patch
index d8d5bc825222e6..d41a2a46aec82c 100644
--- a/drivers-uio-un-restrict-sysfs-pointers-for-uio.patch
+++ b/drivers-uio-un-restrict-sysfs-pointers-for-uio.patch
@@ -4,6 +4,8 @@ Subject: drivers: uio: Un-restrict sysfs pointers for UIO
The addr and size on the UIO devices are required by userspace to function
properly. Let's unrestrict these by adding the 'P' modifier to %p and %pa.
+Cc: William Roberts <william.c.roberts@intel.com>
+Cc: Dave Weinstein <olorin@google.com>
Signed-off-by: Chris Fries <cfries@google.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
---
diff --git a/lib-vsprintf-add-pap-padp-options.patch b/lib-vsprintf-add-pap-padp-options.patch
index a34cdf978b52d9..5c7a20e5cbb046 100644
--- a/lib-vsprintf-add-pap-padp-options.patch
+++ b/lib-vsprintf-add-pap-padp-options.patch
@@ -4,6 +4,8 @@ Subject: lib: vsprintf: Add "%paP", "%padP" options
Add %paP and %padP for physical address that need to always be shown
regardless of kptr restrictions.
+Cc: William Roberts <william.c.roberts@intel.com>
+Cc: Dave Weinstein <olorin@google.com>
Signed-off-by: Chris Fries <cfries@google.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
---
diff --git a/lib-vsprintf-additional-kernel-pointer-filtering-options.patch b/lib-vsprintf-additional-kernel-pointer-filtering-options.patch
index b7d93ff4d63cd9..638776dde9e2dc 100644
--- a/lib-vsprintf-additional-kernel-pointer-filtering-options.patch
+++ b/lib-vsprintf-additional-kernel-pointer-filtering-options.patch
@@ -11,6 +11,7 @@ This patch is based on work by William Roberts
<william.c.roberts@intel.com>
Cc: William Roberts <william.c.roberts@intel.com>
+Cc: Chris Fries <cfries@google.com>
Signed-off-by: Dave Weinstein <olorin@google.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
diff --git a/lib-vsprintf-default-kptr_restrict-to-the-maximum-value.patch b/lib-vsprintf-default-kptr_restrict-to-the-maximum-value.patch
index 7b2dafe2edd075..ccf50b0e069912 100644
--- a/lib-vsprintf-default-kptr_restrict-to-the-maximum-value.patch
+++ b/lib-vsprintf-default-kptr_restrict-to-the-maximum-value.patch
@@ -5,6 +5,8 @@ Set the initial value of kptr_restrict to the maximum
setting rather than the minimum setting, to ensure that
early boot logging is not leaking information.
+Cc: William Roberts <william.c.roberts@intel.com>
+Cc: Chris Fries <cfries@google.com>
Signed-off-by: Dave Weinstein <olorin@google.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
---
diff --git a/lib-vsprintf-physical-address-kernel-pointer-filtering-options.patch b/lib-vsprintf-physical-address-kernel-pointer-filtering-options.patch
index dfc85e37c2fe6d..eeaf8e39464300 100644
--- a/lib-vsprintf-physical-address-kernel-pointer-filtering-options.patch
+++ b/lib-vsprintf-physical-address-kernel-pointer-filtering-options.patch
@@ -4,6 +4,8 @@ Subject: lib: vsprintf: physical address kernel pointer filtering options
Add the kptr_restrict setting of 4 which results in %pa and
%p[rR] values being replaced by zeros.
+Cc: William Roberts <william.c.roberts@intel.com>
+Cc: Chris Fries <cfries@google.com>
Signed-off-by: Dave Weinstein <olorin@google.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
---
diff --git a/lib-vsprintf-whitelist-stack-traces.patch b/lib-vsprintf-whitelist-stack-traces.patch
index 392cea6c493fab..83e8ae151798df 100644
--- a/lib-vsprintf-whitelist-stack-traces.patch
+++ b/lib-vsprintf-whitelist-stack-traces.patch
@@ -4,6 +4,8 @@ Subject: lib: vsprintf: whitelist stack traces
Use the %pP functionality to explicitly allow kernel
pointers to be logged for stack traces
+Cc: William Roberts <william.c.roberts@intel.com>
+Cc: Chris Fries <cfries@google.com>
Signed-off-by: Dave Weinstein <olorin@google.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>