From: Arvind Sankar <nived...@alum.mit.edu>

[ Upstream commit 67d631b7c05eff955ccff4139327f0f92a5117e5 ]

This currently leaks kernel physical addresses into userspace.

Signed-off-by: Arvind Sankar <nived...@alum.mit.edu>
Signed-off-by: Borislav Petkov <b...@suse.de>
Acked-by: Kees Cook <keesc...@chromium.org>
Acked-by: Dave Hansen <dave.han...@intel.com>
Link: https://lkml.kernel.org/r/20200229231120.1147527-1-nived...@alum.mit.edu
Signed-off-by: Sasha Levin <sas...@kernel.org>
---
 arch/x86/mm/init.c | 2 --
 1 file changed, 2 deletions(-)

diff --git a/arch/x86/mm/init.c b/arch/x86/mm/init.c
index ce092a62fc5d..bc2455c2fcab 100644
--- a/arch/x86/mm/init.c
+++ b/arch/x86/mm/init.c
@@ -110,8 +110,6 @@ __ref void *alloc_low_pages(unsigned int num)
        } else {
                pfn = pgt_buf_end;
                pgt_buf_end += num;
-               printk(KERN_DEBUG "BRK [%#010lx, %#010lx] PGTABLE\n",
-                       pfn << PAGE_SHIFT, (pgt_buf_end << PAGE_SHIFT) - 1);
        }
 
        for (i = 0; i < num; i++) {
-- 
2.25.1

Reply via email to