diff options
author | 2025-02-17 08:43:35 +0100 | |
---|---|---|
committer | 2025-02-18 09:48:02 +0100 | |
commit | ec5fd50aeff9c9156304853c6d75eda852d4a2c8 (patch) | |
tree | 0472f3ff7f36b8a65eacb566650aef89f8583a84 /scripts/generate_rust_analyzer.py | |
parent | Merge tag 'vfs-6.14-rc4.fixes' of git://git.kernel.org/pub/scm/linux/kernel/git/vfs/vfs (diff) | |
download | wireguard-linux-ec5fd50aeff9c9156304853c6d75eda852d4a2c8.tar.xz wireguard-linux-ec5fd50aeff9c9156304853c6d75eda852d4a2c8.zip |
uprobes: Don't use %pK through printk
Restricted pointers ("%pK") are not meant to be used through printk().
It can unintentionally expose security sensitive, raw pointer values.
Use regular pointer formatting instead.
For more background, see:
https://lore.kernel.org/lkml/20250113171731-dc10e3c1-da64-4af0-b767-7c7070468023@linutronix.de/
Signed-off-by: Thomas Weißschuh <thomas.weissschuh@linutronix.de>
Signed-off-by: Ingo Molnar <mingo@kernel.org>
Cc: Masami Hiramatsu <mhiramat@kernel.org>
Cc: Oleg Nesterov <oleg@redhat.com>
Cc: Peter Zijlstra <peterz@infradead.org>
Link: https://lore.kernel.org/r/20250217-restricted-pointers-uprobes-v1-1-e8cbe5bb22a7@linutronix.de
Diffstat (limited to 'scripts/generate_rust_analyzer.py')
0 files changed, 0 insertions, 0 deletions