Received: by 2002:ac0:8c9a:0:0:0:0:0 with SMTP id r26csp2779211ima; Sun, 3 Feb 2019 06:36:46 -0800 (PST) X-Google-Smtp-Source: AHgI3IY+C/uYRcU5TTpXhGQrlIUpj0Q+cmVrO0PD55gjRjtlf+2ilQVskbvg7+QJ14KBGgU02AEh X-Received: by 2002:a17:902:bf43:: with SMTP id u3mr3837489pls.57.1549204606581; Sun, 03 Feb 2019 06:36:46 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1549204606; cv=none; d=google.com; s=arc-20160816; b=j23vlValy2C/8JSKA2oKudelFZNK057G3RociLRC4HMmf2O+u8Qnab71LSSQfGb7EB 9H3LxMDPr00S96KKyk+XP9MV36YcdJGgy9SsaSW5A0Kjo0dXkqQ/H2iTkUW8h8inAIi6 tiqG91z+yrRmCGY83c94AbuXEsOAiS3KjJ0UB/KGmMePxgLDXmtP7wrZ1bKXrfY7QSo6 68Z+Kd8DTrLj6KnJ/E9QoMtOEyrFQxumfmrhhLVAjHaUG5mwDD/WlpptGNH1QXEn3ANS SRNnkFx58X5vBDR3kPD2Nd7AfTNzSuG3cRzUjeD8TIFrdzKp0l6IYcwWsDERAKizDucV 6/qg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=/iBEBfWkUDwpNtrxot96T3rUpmHlMOViZpcbO8iGfkU=; b=0DaBkZ7uZozmJTXf8pmy6GgqWMGqAJskFNQPnVu9Y3HNbJ2jJujOQZIKYh6xqO8yYB 3L2d0FbvBsD0l75oImt+LRindLxQgA8X2n2n6kGCh5Xjvck1nayzb3pnFUbmeP37ii4e GyVU3rnqxuEAkiWXoepJ1jGWTuvkmlN7w67u6bxGtJkZhFfGIQnAd4+6O39FqH2+bVvj gPRZKD8YQBj+I5nv2wOgIaOuazt9s10XFLze5F2wBvBhqPs/CtJB5m1bScF+O5lDqd2e 7SL0pft3yqNYDyESuAtiRfYOfsHbKywEgnFW6IiZMy/DS344QX+gsXHHFcBltaLWli1w +fDw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@tomli.me header.s=1490979754 header.b="kcRSkV/p"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=tomli.me Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id c15si11412837pgg.446.2019.02.03.06.36.30; Sun, 03 Feb 2019 06:36:46 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@tomli.me header.s=1490979754 header.b="kcRSkV/p"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=tomli.me Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728014AbfBCOgZ (ORCPT + 99 others); Sun, 3 Feb 2019 09:36:25 -0500 Received: from tomli.me ([153.92.126.73]:45658 "EHLO tomli.me" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726905AbfBCOgZ (ORCPT ); Sun, 3 Feb 2019 09:36:25 -0500 Received: from tomli.me (localhost [127.0.0.1]) by tomli.me (OpenSMTPD) with ESMTP id 81e8da4f; Sun, 3 Feb 2019 14:36:21 +0000 (UTC) X-HELO: localhost.localdomain Authentication-Results: tomli.me; auth=pass (login) smtp.auth=tomli Received: from Unknown (HELO localhost.localdomain) (123.117.70.80) by tomli.me (qpsmtpd/0.95) with ESMTPSA (DHE-RSA-CHACHA20-POLY1305 encrypted); Sun, 03 Feb 2019 14:36:21 +0000 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed; d=tomli.me; h=date:from:to:cc:subject:message-id:references:mime-version:content-type:in-reply-to; s=1490979754; bh=/iBEBfWkUDwpNtrxot96T3rUpmHlMOViZpcbO8iGfkU=; b=kcRSkV/psMNJMCpbYD1YoMxI49ILEN+x6DSQV1NbbGEpP/XC1iATkQ67ZmK3YhainjaBaZBy26qrS1zzJ8BAYZKG5ux9p0Xnini8XV5w9nBf729O/+WJr8ZbiFU9mdW6NQLL/M6x6f790gTIjLJMon5NMLlqjNrjpMrRxzmZMP31Q5iQaB1jty/hlhV5uayZNToifiFA2UhJgsxekwcZ1uXhygeJQF32+rncgbRHFoIExElf7wDfNS+kiEzL7IOUC7g54JMumznOLAHyklC2o8+lmdwTuXe92XrnsotD2yVIKOYNZV2wrKSgTT8w33LeeQs72l+qG/+k1aEe6VJKJA== Date: Sun, 3 Feb 2019 22:35:44 +0800 From: Tom Li To: Chris Rankin Cc: linux-kernel@vger.kernel.org Subject: Re: [BUG] What is "__ptrval__" in my dmesg logs? Bad "%p" expansion? Message-ID: <20190203143544.GA24267@localhost.localdomain> References: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This is not a bug, rather, this is a security feature that fixes the original behavior, which is now considered an infoleak vul- nerability. Currently, the address of internal data structures are protected by Kernel Address Space Layout Randomization (KASLR), it forces attackers to bruteforce the location they need to overwrite, thus together with W^X mappings, increases the difficulty of exploiting the kernel. However, showing values of raw pointers will reveal an address of a known internal data structure, allowing an attacker to calculate the location of critical data structure within the kernel, therefore completely defeating the protection by ASLR. This is why disallowing normal users to "dmesg" used to considered a way to improve system security. As a security measure, the value of "%p" is now hidden by default. Happy Hacking, Tom Li