From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932831AbeARUDK (ORCPT ); Thu, 18 Jan 2018 15:03:10 -0500 Received: from mail-qt0-f196.google.com ([209.85.216.196]:46065 "EHLO mail-qt0-f196.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932297AbeARUDJ (ORCPT ); Thu, 18 Jan 2018 15:03:09 -0500 X-Google-Smtp-Source: ACJfBovBOzAHiWpKYU2cNFkXHl0yc9KXgsPBdAOVDJvzf3hyGRZQm/dYEZyh0GFHe0d3j9tBOcI6bQ== Subject: Re: [PATCH 11/14] MIPS: memblock: Print out kernel virtual mem layout To: Serge Semin , ralf@linux-mips.org, miodrag.dinic@mips.com, jhogan@kernel.org, goran.ferenc@mips.com, david.daney@cavium.com, paul.gortmaker@windriver.com, paul.burton@mips.com, alex.belits@cavium.com, Steven.Hill@cavium.com Cc: alexander.sverdlin@nokia.com, matt.redfearn@mips.com, kumba@gentoo.org, marcin.nowakowski@mips.com, James.hogan@mips.com, Peter.Wotton@mips.com, Sergey.Semin@t-platforms.ru, linux-mips@linux-mips.org, linux-kernel@vger.kernel.org References: <20180117222312.14763-1-fancer.lancer@gmail.com> <20180117222312.14763-12-fancer.lancer@gmail.com> From: Florian Fainelli Message-ID: Date: Thu, 18 Jan 2018 12:03:03 -0800 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.5.0 MIME-Version: 1.0 In-Reply-To: <20180117222312.14763-12-fancer.lancer@gmail.com> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 01/17/2018 02:23 PM, Serge Semin wrote: > It is useful to have the kernel virtual memory layout printed > at boot time so to have the full information about the booted > kernel. In some cases it might be unsafe to have virtual > addresses freely visible in logs, so the %pK format is used if > one want to hide them. > > Signed-off-by: Serge Semin I personally like having that information because that helps debug and have a quick reference, but there appears to be a trend to remove this in the name of security: https://patchwork.kernel.org/patch/10124007/ maybe hide this behind a configuration option? -- Florian