From 2de7d6ef8eb95191ea3cf756be75514c1a9295f5 Mon Sep 17 00:00:00 2001 From: jitiphil Date: Thu, 7 Jun 2018 18:32:45 +0530 Subject: [PATCH] qcacld-3.0: Use of %p in htt_t2h_tx_ppdu_log_print() Introducing integer overflow checks in htt_t2h_tx_ppdu_log_print() contained use of %p which violates security guidelines. Change %p to %pK. Change-Id: I9e886e9b065ea6902aeedc3d9c25aac76a07d6de CRs-Fixed: 2252217 --- core/dp/htt/htt_fw_stats.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/core/dp/htt/htt_fw_stats.c b/core/dp/htt/htt_fw_stats.c index 8418c19e45..59644fcb93 100644 --- a/core/dp/htt/htt_fw_stats.c +++ b/core/dp/htt/htt_fw_stats.c @@ -968,7 +968,7 @@ htt_t2h_tx_ppdu_log_print(struct ol_fw_tx_dbg_ppdu_msg_hdr *hdr, p8 = (uint8_t *) record; calculated_p8 = p8 + sizeof(struct ol_fw_tx_dbg_ppdu_base); if (calculated_p8 < p8) { - qdf_err("Overflow due to record %p", p8); + qdf_err("Overflow due to record %pK", p8); continue; } p8 = calculated_p8;