lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <SJ0PR11MB586613B64EB5DFF057332B33E5B32@SJ0PR11MB5866.namprd11.prod.outlook.com>
Date: Mon, 14 Apr 2025 16:16:04 +0000
From: "Loktionov, Aleksandr" <aleksandr.loktionov@...el.com>
To: Thomas Weißschuh <thomas.weissschuh@...utronix.de>,
	Jeff Johnson <jjohnson@...nel.org>, Loic Poulain <loic.poulain@...aro.org>,
	Brian Norris <briannorris@...omium.org>, Francesco Dolcini
	<francesco@...cini.it>, "Nguyen, Anthony L" <anthony.l.nguyen@...el.com>,
	"Kitszel, Przemyslaw" <przemyslaw.kitszel@...el.com>, Andrew Lunn
	<andrew+netdev@...n.ch>, "David S. Miller" <davem@...emloft.net>, "Dumazet,
 Eric" <edumazet@...gle.com>, Jakub Kicinski <kuba@...nel.org>, Paolo Abeni
	<pabeni@...hat.com>, Saeed Mahameed <saeedm@...dia.com>, Leon Romanovsky
	<leon@...nel.org>, Tariq Toukan <tariqt@...dia.com>
CC: "ath10k@...ts.infradead.org" <ath10k@...ts.infradead.org>,
	"linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>,
	"ath11k@...ts.infradead.org" <ath11k@...ts.infradead.org>,
	"ath12k@...ts.infradead.org" <ath12k@...ts.infradead.org>,
	"wcn36xx@...ts.infradead.org" <wcn36xx@...ts.infradead.org>,
	"linux-wireless@...r.kernel.org" <linux-wireless@...r.kernel.org>,
	"intel-wired-lan@...ts.osuosl.org" <intel-wired-lan@...ts.osuosl.org>,
	"netdev@...r.kernel.org" <netdev@...r.kernel.org>,
	"linux-rdma@...r.kernel.org" <linux-rdma@...r.kernel.org>
Subject: RE: [Intel-wired-lan] [PATCH net-next 3/7] wifi: ath12k: Don't use
 %pK through printk



> -----Original Message-----
> From: Intel-wired-lan <intel-wired-lan-bounces@...osl.org> On Behalf Of
> Thomas Weißschuh
> Sent: Monday, April 14, 2025 10:26 AM
> To: Jeff Johnson <jjohnson@...nel.org>; Loic Poulain
> <loic.poulain@...aro.org>; Brian Norris <briannorris@...omium.org>;
> Francesco Dolcini <francesco@...cini.it>; Nguyen, Anthony L
> <anthony.l.nguyen@...el.com>; Kitszel, Przemyslaw
> <przemyslaw.kitszel@...el.com>; Andrew Lunn <andrew+netdev@...n.ch>;
> David S. Miller <davem@...emloft.net>; Dumazet, Eric
> <edumazet@...gle.com>; Jakub Kicinski <kuba@...nel.org>; Paolo Abeni
> <pabeni@...hat.com>; Saeed Mahameed <saeedm@...dia.com>; Leon
> Romanovsky <leon@...nel.org>; Tariq Toukan <tariqt@...dia.com>
> Cc: ath10k@...ts.infradead.org; linux-kernel@...r.kernel.org;
> ath11k@...ts.infradead.org; ath12k@...ts.infradead.org;
> wcn36xx@...ts.infradead.org; linux-wireless@...r.kernel.org; intel-wired-
> lan@...ts.osuosl.org; netdev@...r.kernel.org; linux-rdma@...r.kernel.org;
> Thomas Weißschuh <thomas.weissschuh@...utronix.de>
> Subject: [Intel-wired-lan] [PATCH net-next 3/7] wifi: ath12k: Don't use %pK
> through printk
> 
> In the past %pK was preferable to %p as it would not leak raw pointer values
> into the kernel log.
> Since commit ad67b74d2469 ("printk: hash addresses printed with %p") the
> regular %p has been improved to avoid this issue.
> Furthermore, restricted pointers ("%pK") were never meant to be used
> through printk(). They can still unintentionally leak raw pointers or acquire
> sleeping looks in atomic contexts.
> 
> Switch to the regular pointer formatting which is safer and easier to reason
> about.
> There are still a few users of %pK left, but these use it through seq_file, for
> which its usage is safe.
> 
> Signed-off-by: Thomas Weißschuh <thomas.weissschuh@...utronix.de>
Reviewed-by: Aleksandr Loktionov <aleksandr.loktionov@...el.com>
> ---
>  drivers/net/wireless/ath/ath12k/testmode.c | 4 ++--
>  1 file changed, 2 insertions(+), 2 deletions(-)
> 
> diff --git a/drivers/net/wireless/ath/ath12k/testmode.c
> b/drivers/net/wireless/ath/ath12k/testmode.c
> index
> 18d56a976dc74c4f6eab87e358c14d4faea648e2..fb6af7ccf71f44ae4bd01cd
> e53fba3527eed0d2d 100644
> --- a/drivers/net/wireless/ath/ath12k/testmode.c
> +++ b/drivers/net/wireless/ath/ath12k/testmode.c
> @@ -97,7 +97,7 @@ void ath12k_tm_process_event(struct ath12k_base
> *ab, u32 cmd_id,
>  	u8 const *buf_pos;
> 
>  	ath12k_dbg(ab, ATH12K_DBG_TESTMODE,
> -		   "testmode event wmi cmd_id %d ftm event msg %pK
> datalen %d\n",
> +		   "testmode event wmi cmd_id %d ftm event msg %p datalen
> %d\n",
>  		   cmd_id, ftm_msg, length);
>  	ath12k_dbg_dump(ab, ATH12K_DBG_TESTMODE, NULL, "", ftm_msg,
> length);
>  	pdev_id = DP_HW2SW_MACID(le32_to_cpu(ftm_msg-
> >seg_hdr.pdev_id));
> @@ -227,7 +227,7 @@ static int ath12k_tm_cmd_process_ftm(struct ath12k
> *ar, struct nlattr *tb[])
>  	buf_len = nla_len(tb[ATH_TM_ATTR_DATA]);
>  	cmd_id = WMI_PDEV_UTF_CMDID;
>  	ath12k_dbg(ar->ab, ATH12K_DBG_TESTMODE,
> -		   "testmode cmd wmi cmd_id %d buf %pK buf_len %d\n",
> +		   "testmode cmd wmi cmd_id %d buf %p buf_len %d\n",
>  		   cmd_id, buf, buf_len);
>  	ath12k_dbg_dump(ar->ab, ATH12K_DBG_TESTMODE, NULL, "", buf,
> buf_len);
>  	bufpos = buf;
> 
> --
> 2.49.0

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ