summaryrefslogtreecommitdiff
path: root/lib/test_fortify/write_overflow-strncpy-src.c
diff options
context:
space:
mode:
authorThomas Weißschuh <thomas.weissschuh@linutronix.de>2025-02-17 10:39:06 +0300
committerCatalin Marinas <catalin.marinas@arm.com>2025-03-20 18:34:53 +0300
commit892d20acf36c3f633a1320610f3327acd28e90de (patch)
tree5a54985dc432ac8e2f80147382f53a676cd21c25 /lib/test_fortify/write_overflow-strncpy-src.c
parent31208bad39372cd301c6fe2a1c23829073f46eb9 (diff)
downloadlinux-892d20acf36c3f633a1320610f3327acd28e90de.tar.xz
arm64: mm: Don't use %pK through printk
Restricted pointers ("%pK") are not meant to be used through printk(). It can unintentionally expose security sensitive, raw pointer values. Use regular pointer formatting instead. Link: https://lore.kernel.org/lkml/20250113171731-dc10e3c1-da64-4af0-b767-7c7070468023@linutronix.de/ Signed-off-by: Thomas Weißschuh <thomas.weissschuh@linutronix.de> Link: https://lore.kernel.org/r/20250217-restricted-pointers-arm64-v1-1-14bb1f516b01@linutronix.de Signed-off-by: Catalin Marinas <catalin.marinas@arm.com>
Diffstat (limited to 'lib/test_fortify/write_overflow-strncpy-src.c')
0 files changed, 0 insertions, 0 deletions