summaryrefslogtreecommitdiff
path: root/security/security.c
diff options
context:
space:
mode:
authorKees Cook <keescook@chromium.org>2021-09-30 01:02:13 +0300
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>2021-11-12 17:05:48 +0300
commitec7c20d417145449e992e549e17a015364a6c47d (patch)
tree08217e232d6e05049399fcb6300599879224e42a /security/security.c
parent2e93afda05203a35531b10955999a485c2233a88 (diff)
downloadlinux-ec7c20d417145449e992e549e17a015364a6c47d.tar.xz
Revert "proc/wchan: use printk format instead of lookup_symbol_name()"
commit 54354c6a9f7fd5572d2b9ec108117c4f376d4d23 upstream. This reverts commit 152c432b128cb043fc107e8f211195fe94b2159c. When a kernel address couldn't be symbolized for /proc/$pid/wchan, it would leak the raw value, a potential information exposure. This is a regression compared to the safer pre-v5.12 behavior. Reported-by: kernel test robot <oliver.sang@intel.com> Reported-by: Vito Caputo <vcaputo@pengaru.com> Reported-by: Jann Horn <jannh@google.com> Signed-off-by: Kees Cook <keescook@chromium.org> Signed-off-by: Peter Zijlstra (Intel) <peterz@infradead.org> Cc: stable@vger.kernel.org Link: https://lkml.kernel.org/r/20211008111626.090829198@infradead.org Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Diffstat (limited to 'security/security.c')
0 files changed, 0 insertions, 0 deletions