[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id:
<174304587475.1549280.18045684973860315790.git-patchwork-notify@kernel.org>
Date: Thu, 27 Mar 2025 03:24:34 +0000
From: patchwork-bot+linux-riscv@...nel.org
To: Thomas Weißschuh <thomas.weissschuh@...utronix.de>@codeaurora.org
Cc: linux-riscv@...ts.infradead.org, paul.walmsley@...ive.com,
palmer@...belt.com, aou@...s.berkeley.edu, linux-kernel@...r.kernel.org
Subject: Re: [PATCH] riscv: mm: Don't use %pK through printk
Hello:
This patch was applied to riscv/linux.git (for-next)
by Alexandre Ghiti <alexghiti@...osinc.com>:
On Mon, 17 Feb 2025 08:37:58 +0100 you wrote:
> Restricted pointers ("%pK") are not meant to be used through printk().
> It can unintentionally expose security sensitive, raw pointer values.
>
> Use regular pointer formatting instead.
>
> Link: https://lore.kernel.org/lkml/20250113171731-dc10e3c1-da64-4af0-b767-7c7070468023@linutronix.de/
> Signed-off-by: Thomas Weißschuh <thomas.weissschuh@...utronix.de>
>
> [...]
Here is the summary with links:
- riscv: mm: Don't use %pK through printk
https://git.kernel.org/riscv/c/eb8db421ce83
You are awesome, thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/patchwork/pwbot.html
Powered by blists - more mailing lists