kernel: Add security.ptr_restrict sysctl

Operating Systems / DragonFlyBSD - zrj [gmail.com] - 14 February 2018 08:14 EST

Allow to prevent leaking kernel addresses back to the userland (intentionally or not). We have quite a lot debug prints already and by default we allow unprivileged processes to read kernel message buffers.

5b0aa8b642 kernel: Add security.ptr_restrict sysctl.
sys/kern/subr_prf.c | 21 +++++++++++++++++++++
1 file changed, 21 insertions(+)

Upstream: gitweb.dragonflybsd.org


  • Share