diff options
| author | Dave Weinstein <olorin@google.com> | 2017-01-11 15:39:07 -0800 |
|---|---|---|
| committer | Moyster <oysterized@gmail.com> | 2019-05-03 18:09:53 +0200 |
| commit | 2fe065dee79d9eb3525116a262083bc71a9b5c73 (patch) | |
| tree | 4c22139f6f48e4554f9af846ea42414054fbaa3b /Documentation | |
| parent | 171a24bc4ba9e1aa4606303dc372799f20e74010 (diff) | |
ANDROID: lib: vsprintf: additional kernel pointer filtering options
Add the kptr_restrict setting of 3 which results in both
%p and %pK values being replaced by zeros.
Add an additional %pP value inspired by the Grsecurity
option which explicitly whitelists pointers for output.
This patch is based on work by William Roberts
<william.c.roberts@intel.com>
[CV: fixed GCC warning on 32 bit targets]
BUG: 30368199
Change-Id: Ic5cef86617f7758514271edd67199683d2c4e2bb
Signed-off-by: Dave Weinstein <olorin@google.com>
Diffstat (limited to 'Documentation')
| -rw-r--r-- | Documentation/printk-formats.txt | 5 | ||||
| -rw-r--r-- | Documentation/sysctl/kernel.txt | 3 |
2 files changed, 8 insertions, 0 deletions
diff --git a/Documentation/printk-formats.txt b/Documentation/printk-formats.txt index 230153498..cd9798fa2 100644 --- a/Documentation/printk-formats.txt +++ b/Documentation/printk-formats.txt @@ -45,6 +45,11 @@ Kernel Pointers: users. The behaviour of %pK depends on the kptr_restrict sysctl - see Documentation/sysctl/kernel.txt for more details. + %pP 0x01234567 or 0x0123456789abcdef + + For printing kernel pointers which should always be shown, even to + unprivileged users. + Struct Resources: %pr [mem 0x60000000-0x6fffffff flags 0x2200] or diff --git a/Documentation/sysctl/kernel.txt b/Documentation/sysctl/kernel.txt index a8e65f559..3c28e6436 100644 --- a/Documentation/sysctl/kernel.txt +++ b/Documentation/sysctl/kernel.txt @@ -309,6 +309,9 @@ values to unprivileged users is a concern. When kptr_restrict is set to (2), kernel pointers printed using %pK will be replaced with 0's regardless of privileges. +When kptr_restrict is set to (3), kernel pointers printed using +%p and %pK will be replaced with 0's regardless of privileges. + ============================================================== kstack_depth_to_print: (X86 only) |
