2
0
mirror of https://github.com/edk2-porting/linux-next.git synced 2024-12-19 10:44:14 +08:00
linux-next/mm/kfence
Marco Elver 35beccf092 kfence: report sensitive information based on no_hash_pointers
We cannot rely on CONFIG_DEBUG_KERNEL to decide if we're running a "debug
kernel" where we can safely show potentially sensitive information in the
kernel log.

Instead, simply rely on the newly introduced "no_hash_pointers" to print
unhashed kernel pointers, as well as decide if our reports can include
other potentially sensitive information such as registers and corrupted
bytes.

Link: https://lkml.kernel.org/r/20210223082043.1972742-1-elver@google.com
Signed-off-by: Marco Elver <elver@google.com>
Cc: Timur Tabi <timur@kernel.org>
Cc: Alexander Potapenko <glider@google.com>
Cc: Dmitry Vyukov <dvyukov@google.com>
Cc: Andrey Konovalov <andreyknvl@google.com>
Cc: Jann Horn <jannh@google.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2021-02-26 09:41:02 -08:00
..
core.c kfence: report sensitive information based on no_hash_pointers 2021-02-26 09:41:02 -08:00
kfence_test.c kfence: report sensitive information based on no_hash_pointers 2021-02-26 09:41:02 -08:00
kfence.h kfence: report sensitive information based on no_hash_pointers 2021-02-26 09:41:02 -08:00
Makefile kfence: add test suite 2021-02-26 09:41:02 -08:00
report.c kfence: report sensitive information based on no_hash_pointers 2021-02-26 09:41:02 -08:00