diff options
author | Christian Borntraeger <borntraeger@de.ibm.com> | 2017-11-23 21:26:20 +0300 |
---|---|---|
committer | Martin Schwidefsky <schwidefsky@de.ibm.com> | 2017-11-24 16:28:34 +0300 |
commit | 860ec7c6e21cecca8c508a66ee211b56d87f5bd7 (patch) | |
tree | 375847e608aa9dbe1c10abcd1a143a5bbb1c1b98 /include | |
parent | 53c4ab70c11c3ba1b9e3caa8e8c17e9c16d9cbc0 (diff) | |
download | linux-860ec7c6e21cecca8c508a66ee211b56d87f5bd7.tar.xz |
s390/debug: use pK for kernel pointers
the s390 debug feature (/sys/kernel/debug/s390dbf/) shows the kernel
pointer of the calling function even for kptr_restrict == 2. Let us
use pK instead of p.
This hides the kernel addresses for kptr_restrict == 2:
root@host $ echo 2 > /proc/sys/kernel/kptr_restrict
root@host $ tail -n1 /sys/kernel/debug/s390dbf/cio_msg/sprintf
00 01511461280:386645 2 - 00 0000000000000000 snsid: device 0.0.3f68: rc=0 3990/e9 3390/0c
root@host $ echo 1 > /proc/sys/kernel/kptr_restrict
root@host $ tail -n1 /sys/kernel/debug/s390dbf/cio_msg/sprintf
00 01511461280:386645 2 - 00 000000000071171c snsid: device 0.0.3f68: rc=0 3990/e9 3390/0c
root@host $ echo 0 > /proc/sys/kernel/kptr_restrict
root@host $ tail -n1 /sys/kernel/debug/s390dbf/cio_msg/sprintf
00 01511461280:386645 2 - 00 000000000071171c snsid: device 0.0.3f68: rc=0 3990/e9 3390/0c
Signed-off-by: Christian Borntraeger <borntraeger@de.ibm.com>
Acked-by: Heiko Carstens <heiko.carstens@de.ibm.com>
Signed-off-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
Diffstat (limited to 'include')
0 files changed, 0 insertions, 0 deletions