diff options
author | Thomas Weißschuh <thomas.weissschuh@linutronix.de> | 2025-02-17 14:16:12 +0100 |
---|---|---|
committer | Steven Rostedt (Google) <rostedt@goodmis.org> | 2025-03-06 13:35:26 -0500 |
commit | effd1059c448e2b982f4de5d3b03deca2714b2a9 (patch) | |
tree | 3472dfcad8e855e98ecf7ca3069eaecc1e1c2fd9 /tools/perf/scripts/python/syscall-counts.py | |
parent | ca29a0bf1221451f566f19999f2eda8adf116ff9 (diff) |
tracing/user_events: Don't use %pK through printk
Restricted pointers ("%pK") are not meant to be used through printk().
It can unintentionally expose security sensitive, raw pointer values.
Use regular pointer formatting instead.
Cc: Mathieu Desnoyers <mathieu.desnoyers@efficios.com>
Link: https://lore.kernel.org/20250217-restricted-pointers-trace-v1-1-bbe9ea279848@linutronix.de
Link: https://lore.kernel.org/lkml/20250113171731-dc10e3c1-da64-4af0-b767-7c7070468023@linutronix.de/
Signed-off-by: Thomas Weißschuh <thomas.weissschuh@linutronix.de>
Acked-by: Masami Hiramatsu (Google) <mhiramat@kernel.org>
Signed-off-by: Steven Rostedt (Google) <rostedt@goodmis.org>
Diffstat (limited to 'tools/perf/scripts/python/syscall-counts.py')
0 files changed, 0 insertions, 0 deletions