[PATCH] arm64: mm: Don't use %pK through printk

Will Deacon will at kernel.org
Fri Feb 21 06:55:14 PST 2025


On Mon, Feb 17, 2025 at 08:39:06AM +0100, Thomas Weißschuh wrote:
> Restricted pointers ("%pK") are not meant to be used through printk().
> It can unintentionally expose security sensitive, raw pointer values.
> 
> Use regular pointer formatting instead.
> 
> Link: https://lore.kernel.org/lkml/20250113171731-dc10e3c1-da64-4af0-b767-7c7070468023@linutronix.de/
> Signed-off-by: Thomas Weißschuh <thomas.weissschuh at linutronix.de>
> ---
>  arch/arm64/mm/physaddr.c | 2 +-
>  1 file changed, 1 insertion(+), 1 deletion(-)
> 
> diff --git a/arch/arm64/mm/physaddr.c b/arch/arm64/mm/physaddr.c
> index cde44c13dda1bc0924d2d50369ad87f544a0a802..7d94e09b01b35094e883875a46b979666549095c 100644
> --- a/arch/arm64/mm/physaddr.c
> +++ b/arch/arm64/mm/physaddr.c
> @@ -10,7 +10,7 @@
>  phys_addr_t __virt_to_phys(unsigned long x)
>  {
>  	WARN(!__is_lm_address(__tag_reset(x)),
> -	     "virt_to_phys used for non-linear address: %pK (%pS)\n",
> +	     "virt_to_phys used for non-linear address: %p (%pS)\n",
>  	      (void *)x,
>  	      (void *)x);

This is part of a WARN() and knowing the actual address may well be
useful in debugging. I suspect it also ends up being dumped as part of
the register dump _anyway_.

Will



More information about the linux-arm-kernel mailing list