[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <ed7e0656-9271-3ccf-ef88-153da1ee31c9@kernel.org>
Date: Mon, 18 Jan 2021 13:03:49 -0600
From: Timur Tabi <timur@...nel.org>
To: Matthew Wilcox <willy@...radead.org>
Cc: Andrew Morton <akpm@...ux-foundation.org>,
linux-kernel@...r.kernel.org, torvalds@...ux-foundation.org,
Sergey Senozhatsky <sergey.senozhatsky@...il.com>,
Petr Mladek <pmladek@...e.com>, roman.fietze@...na.com,
keescook@...omium.org, Steven Rostedt <rostedt@...dmis.org>,
John Ogness <john.ogness@...utronix.de>, linux-mm@...ck.org,
Akinobu Mita <akinobu.mita@...il.com>
Subject: Re: [PATCH 0/2] introduce DUMP_PREFIX_UNHASHED for hex dumps
On 1/18/21 12:26 PM, Matthew Wilcox wrote:
> Don't make it easy. And don't make it look like they're doing
> something innocent. DUMP_PREFIX_SECURITY_HOLE would be OK
> by me. DUMP_PREFIX_LEAK_INFORMATION would work fine too.
> DUMP_PREFIX_MAKE_ATTACKERS_LIFE_EASY might be a bit too far.
It's already extremely easy to replace %p with %px in your own printks,
so I don't really understand your argument.
Seriously, this patch should not be so contentious. If you want hashed
addresses, then nothing changes. If you need unhashed addresses while
debugging, then use DUMP_PREFIX_UNHASHED. Just like you can use %px in
printk. I never use %p in my printks, but then I never submit code
upstream that prints addresses, hashed or unhashed.
Powered by blists - more mailing lists