| From: Clément Léger <clement.leger@bootlin.com> |
| Subject: mm/kmemleak: use %pK to display kernel pointers in backtrace |
| Date: Tue, 8 Nov 2022 10:43:22 +0100 |
| |
| Currently, %p is used to display kernel pointers in backtrace which result |
| in a hashed value that is not usable to correlate the address for debug. |
| Use %pK which will respect the kptr_restrict configuration value and thus |
| allow to extract meaningful information from the backtrace. |
| |
| Link: https://lkml.kernel.org/r/20221108094322.73492-1-clement.leger@bootlin.com |
| Signed-off-by: Clément Léger <clement.leger@bootlin.com> |
| Cc: Alexandre Belloni <alexandre.belloni@bootlin.com> |
| Cc: Catalin Marinas <catalin.marinas@arm.com> |
| Cc: Thomas Petazzoni <thomas.petazzoni@bootlin.com> |
| Signed-off-by: Andrew Morton <akpm@linux-foundation.org> |
| --- |
| |
| mm/kmemleak.c | 2 +- |
| 1 file changed, 1 insertion(+), 1 deletion(-) |
| |
| --- a/mm/kmemleak.c~mm-kmemleak-use-%pk-to-display-kernel-pointers-in-backtrace |
| +++ a/mm/kmemleak.c |
| @@ -361,7 +361,7 @@ static void print_unreferenced(struct se |
| |
| for (i = 0; i < nr_entries; i++) { |
| void *ptr = (void *)entries[i]; |
| - warn_or_seq_printf(seq, " [<%p>] %pS\n", ptr, ptr); |
| + warn_or_seq_printf(seq, " [<%pK>] %pS\n", ptr, ptr); |
| } |
| } |
| |
| _ |