linux/Documentation
Marco Elver 35beccf092 kfence: report sensitive information based on no_hash_pointers
We cannot rely on CONFIG_DEBUG_KERNEL to decide if we're running a "debug
kernel" where we can safely show potentially sensitive information in the
kernel log.

Instead, simply rely on the newly introduced "no_hash_pointers" to print
unhashed kernel pointers, as well as decide if our reports can include
other potentially sensitive information such as registers and corrupted
bytes.

Link: https://lkml.kernel.org/r/20210223082043.1972742-1-elver@google.com
Signed-off-by: Marco Elver <elver@google.com>
Cc: Timur Tabi <timur@kernel.org>
Cc: Alexander Potapenko <glider@google.com>
Cc: Dmitry Vyukov <dvyukov@google.com>
Cc: Andrey Konovalov <andreyknvl@google.com>
Cc: Jann Horn <jannh@google.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2021-02-26 09:41:02 -08:00
..
2020-12-20 10:44:05 -08:00
2021-02-22 09:05:28 -08:00
2021-02-25 10:17:31 -08:00
2020-12-22 13:34:27 -08:00
2021-02-23 13:39:45 -08:00
2021-01-21 14:06:00 -07:00
2021-02-25 10:17:31 -08:00
2021-02-22 10:24:58 -08:00
2021-02-23 16:09:23 -08:00
2021-02-01 16:29:12 -07:00
2021-02-01 10:37:19 +09:00