The current leaking_addresses.pl script only supports showing "leaked"
64-bit kernel virtual addresses. This patch modifies the "help" screen in the
following manner:
- the '--raw', '--suppress-dmesg', '--squash-by-path' and '--squash-by-filename'
  option switches are only meaningful when the '--input-raw=' option switch is
  used. So, indent the 'Help' screen lines to reflect the fact.
- an additional example demonstrating usage of the new '--page-offset'
  parameter.


Feedback welcome..


Signed-off-by: Kaiwan N Billimoria <kaiwan.billimo...@gmail.com>
---
diff --git a/scripts/leaking_addresses.pl b/scripts/leaking_addresses.pl
index 7ca218221486..3832abb743d7 100755
--- a/scripts/leaking_addresses.pl
+++ b/scripts/leaking_addresses.pl
@@ -105,10 +105,10 @@ Options:
 
        -o, --output-raw=<file>  Save results for future processing.
        -i, --input-raw=<file>   Read results from file instead of scanning.
-       --raw                    Show raw results (default).
-       --suppress-dmesg         Do not show dmesg results.
-       --squash-by-path         Show one result per unique path.
-       --squash-by-filename     Show one result per unique filename.
+             --raw                    Show raw results (default).
+             --suppress-dmesg         Do not show dmesg results.
+             --squash-by-path         Show one result per unique path.
+             --squash-by-filename     Show one result per unique filename.
        --page-offset=<hex>      PAGE_OFFSET value (for 32-bit kernels).
        -d, --debug              Display debugging output.
        -h, --help, --version    Display this help and exit.
@@ -124,6 +124,10 @@ Examples:
        # View summary report.
        $0 --input-raw scan.out --squash-by-filename
 
+       # (On a 32-bit system with a 2GB:2GB VMSPLIT), pass PAGE_OFFSET value
+       # as a parameter
+       $0 --page-offset=0x80000000
+
 Scans the running (32 or 64 bit) kernel for potential leaking addresses.
 
 EOM

Reply via email to