OSDN Git Service

arm64/vdso: don't leak kernel addresses
authorMatteo Croce <mcroce@redhat.com>
Mon, 1 Apr 2019 10:44:47 +0000 (12:44 +0200)
committerWill Deacon <will.deacon@arm.com>
Wed, 3 Apr 2019 12:22:20 +0000 (13:22 +0100)
Since commit ad67b74d2469d9b8 ("printk: hash addresses printed with %p"),
two obfuscated kernel pointer are printed at every boot:

    vdso: 2 pages (1 code @ (____ptrval____), 1 data @ (____ptrval____))

Remove the the print completely, as it's useless without the addresses.

Fixes: ad67b74d2469d9b8 ("printk: hash addresses printed with %p")
Acked-by: Mark Rutland <mark.rutland@arm.com>
Signed-off-by: Matteo Croce <mcroce@redhat.com>
Signed-off-by: Will Deacon <will.deacon@arm.com>
arch/arm64/kernel/vdso.c

index 2d41900..9fb0c0c 100644 (file)
@@ -146,8 +146,6 @@ static int __init vdso_init(void)
        }
 
        vdso_pages = (vdso_end - vdso_start) >> PAGE_SHIFT;
-       pr_info("vdso: %ld pages (%ld code @ %p, %ld data @ %p)\n",
-               vdso_pages + 1, vdso_pages, vdso_start, 1L, vdso_data);
 
        /* Allocate the vDSO pagelist, plus a page for the data. */
        vdso_pagelist = kcalloc(vdso_pages + 1, sizeof(struct page *),