diff options
| author | Dave Weinstein <olorin@google.com> | 2017-01-11 16:02:44 -0800 |
|---|---|---|
| committer | Mister Oyster <oysterized@gmail.com> | 2017-09-14 17:24:45 +0200 |
| commit | d808b73c6007df3f6fc3a72b8144b6028c7d6dfb (patch) | |
| tree | c53c0e7d62fd009c9928915b5b5987b407422301 /arch | |
| parent | 2a8070b5db6723e223f610377acc014811d49f1d (diff) | |
lib: vsprintf: whitelist stack traces
Use the %pP functionality to explicitly allow kernel
pointers to be logged for stack traces
BUG: 30368199
Change-Id: I495915465565293e9e4da5aa28fbd1d14538d99b
Signed-off-by: Dave Weinstein <olorin@google.com>
Diffstat (limited to 'arch')
| -rw-r--r-- | arch/arm64/kernel/traps.c | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/arch/arm64/kernel/traps.c b/arch/arm64/kernel/traps.c index a38990183..b138934fc 100644 --- a/arch/arm64/kernel/traps.c +++ b/arch/arm64/kernel/traps.c @@ -136,7 +136,7 @@ static void dump_backtrace(struct pt_regs *regs, struct task_struct *tsk) struct stackframe frame; const register unsigned long current_sp asm ("sp"); - pr_debug("%s(regs = %p tsk = %p)\n", __func__, regs, tsk); + pr_debug("%s(regs = %pP tsk = %pP)\n", __func__, regs, tsk); if (!tsk) tsk = current; @@ -205,7 +205,7 @@ static int __die(const char *str, int err, struct thread_info *thread, print_modules(); __show_regs(regs); - pr_emerg("Process %.*s (pid: %d, stack limit = 0x%p)\n", + pr_emerg("Process %.*s (pid: %d, stack limit = 0x%pP)\n", TASK_COMM_LEN, tsk->comm, task_pid_nr(tsk), thread + 1); if (!user_mode(regs) || in_interrupt()) { |
