[PATCH] riscv: mm: Don't use %pK through printk
patchwork-bot+linux-riscv at kernel.org
patchwork-bot+linux-riscv at kernel.org
Wed Mar 26 20:24:34 PDT 2025
Hello:
This patch was applied to riscv/linux.git (for-next)
by Alexandre Ghiti <alexghiti at rivosinc.com>:
On Mon, 17 Feb 2025 08:37:58 +0100 you wrote:
> Restricted pointers ("%pK") are not meant to be used through printk().
> It can unintentionally expose security sensitive, raw pointer values.
>
> Use regular pointer formatting instead.
>
> Link: https://lore.kernel.org/lkml/20250113171731-dc10e3c1-da64-4af0-b767-7c7070468023@linutronix.de/
> Signed-off-by: Thomas Weißschuh <thomas.weissschuh at linutronix.de>
>
> [...]
Here is the summary with links:
- riscv: mm: Don't use %pK through printk
https://git.kernel.org/riscv/c/eb8db421ce83
You are awesome, thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/patchwork/pwbot.html
More information about the linux-riscv
mailing list