diff options
| author | Dave Weinstein <olorin@google.com> | 2017-01-11 15:39:07 -0800 |
|---|---|---|
| committer | Moyster <oysterized@gmail.com> | 2019-05-03 18:09:53 +0200 |
| commit | 2fe065dee79d9eb3525116a262083bc71a9b5c73 (patch) | |
| tree | 4c22139f6f48e4554f9af846ea42414054fbaa3b /Documentation/sysctl/kernel.txt | |
| parent | 171a24bc4ba9e1aa4606303dc372799f20e74010 (diff) | |
ANDROID: lib: vsprintf: additional kernel pointer filtering options
Add the kptr_restrict setting of 3 which results in both
%p and %pK values being replaced by zeros.
Add an additional %pP value inspired by the Grsecurity
option which explicitly whitelists pointers for output.
This patch is based on work by William Roberts
<william.c.roberts@intel.com>
[CV: fixed GCC warning on 32 bit targets]
BUG: 30368199
Change-Id: Ic5cef86617f7758514271edd67199683d2c4e2bb
Signed-off-by: Dave Weinstein <olorin@google.com>
Diffstat (limited to 'Documentation/sysctl/kernel.txt')
| -rw-r--r-- | Documentation/sysctl/kernel.txt | 3 |
1 files changed, 3 insertions, 0 deletions
diff --git a/Documentation/sysctl/kernel.txt b/Documentation/sysctl/kernel.txt index a8e65f559..3c28e6436 100644 --- a/Documentation/sysctl/kernel.txt +++ b/Documentation/sysctl/kernel.txt @@ -309,6 +309,9 @@ values to unprivileged users is a concern. When kptr_restrict is set to (2), kernel pointers printed using %pK will be replaced with 0's regardless of privileges. +When kptr_restrict is set to (3), kernel pointers printed using +%p and %pK will be replaced with 0's regardless of privileges. + ============================================================== kstack_depth_to_print: (X86 only) |
