LoongArch: Don't use %pK through printk() in unwinder
authorThomas Weißschuh <thomas.weissschuh@linutronix.de>
Sun, 3 Aug 2025 14:49:47 +0000 (22:49 +0800)
committerHuacai Chen <chenhuacai@loongson.cn>
Sun, 3 Aug 2025 14:49:47 +0000 (22:49 +0800)
commit2362e8124ed21445c6886806e5deaee717629ddd
tree083f6d39117bb8cc12a770527a8904f4f130f954
parent70a2365e18affc5ebdaab1ca6a0b3c4f3aac2ee8
LoongArch: Don't use %pK through printk() in unwinder

In the past %pK was preferable to %p as it would not leak raw pointer
values into the kernel log.

Since commit ad67b74d2469 ("printk: hash addresses printed with %p")
the regular %p has been improved to avoid this issue.

Furthermore, restricted pointers ("%pK") were never meant to be used
through printk(). They can still unintentionally leak raw pointers or
acquire sleeping locks in atomic contexts.

Switch to the regular pointer formatting which is safer and easier to
reason about.

Cc: stable@vger.kernel.org
Signed-off-by: Thomas Weißschuh <thomas.weissschuh@linutronix.de>
Signed-off-by: Huacai Chen <chenhuacai@loongson.cn>
arch/loongarch/kernel/unwind_orc.c