* David Laight <David.Laight@xxxxxxxxxx> wrote: > From: Alexei Starovoitov > > Debugging of BPF programs needs some form of printk from the program, > > so let programs call limited trace_printk() with %d %u %x %p modifiers only. > > Should anyone be allowed to use BPF programs to determine the kernel > addresses of any items? > Looks as though it is leaking kernel addresses to userspace. > Note that the problem is with the arguments, not the format string. All of these are privileged operations - inherent if you are trying to debug the kernel. Thanks, Ingo -- To unsubscribe from this list: send the line "unsubscribe linux-api" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html