diff options
author | Will Deacon <will.deacon@arm.com> | 2017-10-19 15:19:20 +0300 |
---|---|---|
committer | Will Deacon <will.deacon@arm.com> | 2017-10-27 18:26:53 +0300 |
commit | a25ffd3a6302a67814280274d8f1aa4ae2ea4b59 (patch) | |
tree | e43de23d0bb5b050ffbd88a67959104b69e340d2 /arch/arm64/kernel/process.c | |
parent | 42dbf54e88906ffb8ee992c14e45dd36483f5011 (diff) | |
download | linux-a25ffd3a6302a67814280274d8f1aa4ae2ea4b59.tar.xz |
arm64: traps: Don't print stack or raw PC/LR values in backtraces
Printing raw pointer values in backtraces has potential security
implications and are of questionable value anyway.
This patch follows x86's lead and removes the "Exception stack:" dump
from kernel backtraces, as well as converting PC/LR values to symbols
such as "sysrq_handle_crash+0x20/0x30".
Tested-by: Laura Abbott <labbott@redhat.com>
Signed-off-by: Will Deacon <will.deacon@arm.com>
Diffstat (limited to 'arch/arm64/kernel/process.c')
-rw-r--r-- | arch/arm64/kernel/process.c | 8 |
1 files changed, 3 insertions, 5 deletions
diff --git a/arch/arm64/kernel/process.c b/arch/arm64/kernel/process.c index 2dc0f8482210..c20896b8fb2d 100644 --- a/arch/arm64/kernel/process.c +++ b/arch/arm64/kernel/process.c @@ -186,11 +186,9 @@ void __show_regs(struct pt_regs *regs) } show_regs_print_info(KERN_DEFAULT); - print_symbol("PC is at %s\n", instruction_pointer(regs)); - print_symbol("LR is at %s\n", lr); - printk("pc : [<%016llx>] lr : [<%016llx>] pstate: %08llx\n", - regs->pc, lr, regs->pstate); - printk("sp : %016llx\n", sp); + print_symbol("pc : %s\n", regs->pc); + print_symbol("lr : %s\n", lr); + printk("sp : %016llx pstate : %08llx\n", sp, regs->pstate); i = top_reg; |