Linus Torvalds writes: (Summary) Things like that.
So I think that if people worry about leaking pointers, they should primarily go for:
primarily go for:
- just use %p and now get the hashed value
- just use %p and now get the hashed value
- if the hashed value is pointless, ask yourself whether the pointer itself is important. Maybe it should be removed?
- as a last option, if you really think the true pointer value is important, why is root so special, and maybe you should use %px and make sure you have proper sensible permissions.
make sure you have proper sensible permissions.
..and %pK just isn't really the answer in any of those cases.
So I think that if people worry about leaking pointers, they should primarily go for:
primarily go for:
- just use %p and now get the hashed value
- just use %p and now get the hashed value
- if the hashed value is pointless, ask yourself whether the pointer itself is important. Maybe it should be removed?
- as a last option, if you really think the true pointer value is important, why is root so special, and maybe you should use %px and make sure you have proper sensible permissions.
make sure you have proper sensible permissions.
..and %pK just isn't really the answer in any of those cases.