The format specifier %p can leak kernel addresses
while not valuing the kptr_restrict system settings.
Use %pK instead of %p, which also evaluates whether
kptr_restrict is set.

Signed-off-by: Divya Ponnusamy <pdi...@codeaurora.org>
Signed-off-by: Daniel Rosenberg <dro...@google.com>
Cc: stable <sta...@vger.kernel.org>
---
 drivers/dma-buf/sync_debug.c | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/drivers/dma-buf/sync_debug.c b/drivers/dma-buf/sync_debug.c
index c4c8ecb24aa9..d8d340542a79 100644
--- a/drivers/dma-buf/sync_debug.c
+++ b/drivers/dma-buf/sync_debug.c
@@ -133,7 +133,7 @@ static void sync_print_sync_file(struct seq_file *s,
        char buf[128];
        int i;
 
-       seq_printf(s, "[%p] %s: %s\n", sync_file,
+       seq_printf(s, "[%pK] %s: %s\n", sync_file,
                   sync_file_get_name(sync_file, buf, sizeof(buf)),
                   sync_status_str(dma_fence_get_status(sync_file->fence)));
 
-- 
2.17.0.441.gb46fe60e1d-goog

Reply via email to