lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Tue, 19 Jan 2021 09:53:01 +0900 From: Sergey Senozhatsky <sergey.senozhatsky@...il.com> To: Timur Tabi <timur@...nel.org> Cc: Matthew Wilcox <willy@...radead.org>, Andrew Morton <akpm@...ux-foundation.org>, linux-kernel@...r.kernel.org, torvalds@...ux-foundation.org, Sergey Senozhatsky <sergey.senozhatsky@...il.com>, Petr Mladek <pmladek@...e.com>, roman.fietze@...na.com, keescook@...omium.org, Steven Rostedt <rostedt@...dmis.org>, John Ogness <john.ogness@...utronix.de>, linux-mm@...ck.org, Akinobu Mita <akinobu.mita@...il.com> Subject: Re: [PATCH 0/2] introduce DUMP_PREFIX_UNHASHED for hex dumps On (21/01/18 13:03), Timur Tabi wrote: > On 1/18/21 12:26 PM, Matthew Wilcox wrote: > > Don't make it easy. And don't make it look like they're doing > > something innocent. DUMP_PREFIX_SECURITY_HOLE would be OK > > by me. DUMP_PREFIX_LEAK_INFORMATION would work fine too. > > DUMP_PREFIX_MAKE_ATTACKERS_LIFE_EASY might be a bit too far. > > It's already extremely easy to replace %p with %px in your own printks, so I > don't really understand your argument. I like the idea of a more radical name, e.g. DUMP_PREFIX_RAW_POINTERS or something similar. > Seriously, this patch should not be so contentious. If you want hashed > addresses, then nothing changes. If you need unhashed addresses while > debugging, then use DUMP_PREFIX_UNHASHED. Just like you can use %px in > printk. I never use %p in my printks, but then I never submit code upstream > that prints addresses, hashed or unhashed. So maybe DUMP_PREFIX_UNHASHED can do the unhashed dump only when CONFIG_DEBUG_KERNEL=y and fallback to DUMP_PREFIX_ADDRESS otherwise? -ss
Powered by blists - more mailing lists