summaryrefslogtreecommitdiffstats
path: root/drivers/s390/cio/vfio_ccw_cp.h
diff options
context:
space:
mode:
authorIlya Leoshkevich <iii@linux.ibm.com>2019-10-31 18:25:16 +0100
committerVasily Gorbik <gor@linux.ibm.com>2019-11-12 11:24:10 +0100
commit544f1d62e3e6c6e6d17a5e56f6139208acb5ff46 (patch)
tree982dad55439969c54d81286a6338bbfc642faa19 /drivers/s390/cio/vfio_ccw_cp.h
parent72fbcd057fa1d25da70e33312a0c8401d4295599 (diff)
downloadlinux-544f1d62e3e6c6e6d17a5e56f6139208acb5ff46.tar.bz2
s390/disassembler: don't hide instruction addresses
Due to kptr_restrict, JITted BPF code is now displayed like this: 000000000b6ed1b2: ebdff0800024 stmg %r13,%r15,128(%r15) 000000004cde2ba0: 41d0f040 la %r13,64(%r15) 00000000fbad41b0: a7fbffa0 aghi %r15,-96 Leaking kernel addresses to dmesg is not a concern in this case, because this happens only when JIT debugging is explicitly activated, which only root can do. Use %px in this particular instance, and also to print an instruction address in show_code and PCREL (e.g. brasl) arguments in print_insn. While at present functionally equivalent to %016lx, %px is recommended by Documentation/core-api/printk-formats.rst for such cases. Signed-off-by: Ilya Leoshkevich <iii@linux.ibm.com> Reviewed-by: Vasily Gorbik <gor@linux.ibm.com> Signed-off-by: Vasily Gorbik <gor@linux.ibm.com>
Diffstat (limited to 'drivers/s390/cio/vfio_ccw_cp.h')
0 files changed, 0 insertions, 0 deletions