tracing/user_events: Don't use %pK through printk
authorThomas Weißschuh <thomas.weissschuh@linutronix.de>
Mon, 17 Feb 2025 13:16:12 +0000 (14:16 +0100)
committerSteven Rostedt (Google) <rostedt@goodmis.org>
Thu, 6 Mar 2025 18:35:26 +0000 (13:35 -0500)
Restricted pointers ("%pK") are not meant to be used through printk().
It can unintentionally expose security sensitive, raw pointer values.

Use regular pointer formatting instead.

Cc: Mathieu Desnoyers <mathieu.desnoyers@efficios.com>
Link: https://lore.kernel.org/20250217-restricted-pointers-trace-v1-1-bbe9ea279848@linutronix.de
Link: https://lore.kernel.org/lkml/20250113171731-dc10e3c1-da64-4af0-b767-7c7070468023@linutronix.de/
Signed-off-by: Thomas Weißschuh <thomas.weissschuh@linutronix.de>
Acked-by: Masami Hiramatsu (Google) <mhiramat@kernel.org>
Signed-off-by: Steven Rostedt (Google) <rostedt@goodmis.org>
kernel/trace/trace_events_user.c

index 97325fbd62836f4fb477c4a2b2936eff544291ec..3effc6fce20e65a8077de5221eb69db04fb1a775 100644 (file)
@@ -455,7 +455,7 @@ static void user_event_enabler_fault_fixup(struct work_struct *work)
        if (ret && ret != -ENOENT) {
                struct user_event *user = enabler->event;
 
-               pr_warn("user_events: Fault for mm: 0x%pK @ 0x%llx event: %s\n",
+               pr_warn("user_events: Fault for mm: 0x%p @ 0x%llx event: %s\n",
                        mm->mm, (unsigned long long)uaddr, EVENT_NAME(user));
        }