summaryrefslogtreecommitdiff
path: root/scripts/leaking_addresses.pl
diff options
context:
space:
mode:
authorKees Cook <keescook@chromium.org>2021-09-29 15:02:13 -0700
committerPeter Zijlstra <peterz@infradead.org>2021-10-15 11:25:13 +0200
commit54354c6a9f7fd5572d2b9ec108117c4f376d4d23 (patch)
tree1d22cf0cdb4c60371387f17d2f4eabdaef7806cb /scripts/leaking_addresses.pl
parent804bccba71a57e7e5deb507a4c8ebbab730909c0 (diff)
Revert "proc/wchan: use printk format instead of lookup_symbol_name()"
This reverts commit 152c432b128cb043fc107e8f211195fe94b2159c. When a kernel address couldn't be symbolized for /proc/$pid/wchan, it would leak the raw value, a potential information exposure. This is a regression compared to the safer pre-v5.12 behavior. Reported-by: kernel test robot <oliver.sang@intel.com> Reported-by: Vito Caputo <vcaputo@pengaru.com> Reported-by: Jann Horn <jannh@google.com> Signed-off-by: Kees Cook <keescook@chromium.org> Signed-off-by: Peter Zijlstra (Intel) <peterz@infradead.org> Cc: stable@vger.kernel.org Link: https://lkml.kernel.org/r/20211008111626.090829198@infradead.org
Diffstat (limited to 'scripts/leaking_addresses.pl')
0 files changed, 0 insertions, 0 deletions