Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp4113692pxb; Tue, 26 Jan 2021 12:46:52 -0800 (PST) X-Google-Smtp-Source: ABdhPJxg+cbuZxLpgDyrzCQDgSpPHdIahHvDrVtOiZtfbh27slI5PlrZNUsfrqAca7hkBVhiQYTn X-Received: by 2002:a17:906:7f83:: with SMTP id f3mr4426420ejr.282.1611694012384; Tue, 26 Jan 2021 12:46:52 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1611694012; cv=none; d=google.com; s=arc-20160816; b=ShEzFILuLuhmQUP/0W4BwLE9P8ltfup8DY6k9/afx+Rtt+t74Dc1cu5TmhVT8blZdH dZ7udJka6kzI3CblWV2vN3mcntoa6hFuvLbj1A7502qncGvv4dyI25u7B9dGqfgVhmhJ mPFvfCeS2ZDdAvXqoT8lst9amoWm1FQNzMA8DUdWmvjQKXLcQtqQchS14XKJ3rGukBB5 r7XTYzlokYQOLyXT51RaMivoJSrlVXrkFMZ26SskIJC7nSXuzO/byyXt8GJ01XYlYMRu /fq9crcKKGfpoAPayrLXKncWe8f1fcU+hs1STxA1BzcKtWIPoyZrLkhmKg/Rb1QVfWOQ L7TA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date; bh=D1IpNyGAPJkDaaQJRuzhTap0SKj7wDpIUBItbv157wA=; b=qV6+18IV5xlWTrsZlSxPHs910cBVkrfwqgTru6O8Y9NOm7aj3M24D4ohrzBxngE6kg ovpZyijj/PD0agcgOOxIeSNjTF40ONip9/7kk78Vea8cVjNbwo2T3Wdit4cEFbjyNmwQ u/CXJNgOXfYQIZpHzWL1tGDC3kj4dqsnd8Uzmn9e1Ko+2T/o/aBmK2pSllrPUYit5m9R vHdDz0yo7vxMQwPvhMUmSMXpl+uppeQ8kDQ1HymAupiavJ3r6OaRjFSTVe+9mAPiiXFL I4hfi2GGKOkiUugqkxeV+Do5u1LYwjmb11FITHCOeEK+WvwP0Y0R8jVxzwSfA4qQiO0L dqag== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id s7si9029789edw.47.2021.01.26.12.46.26; Tue, 26 Jan 2021 12:46:52 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2394271AbhAZSO1 (ORCPT + 99 others); Tue, 26 Jan 2021 13:14:27 -0500 Received: from mail.kernel.org ([198.145.29.99]:39030 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2392965AbhAZRlP (ORCPT ); Tue, 26 Jan 2021 12:41:15 -0500 Received: from gandalf.local.home (cpe-66-24-58-225.stny.res.rr.com [66.24.58.225]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 889A02228A; Tue, 26 Jan 2021 17:40:33 +0000 (UTC) Date: Tue, 26 Jan 2021 12:40:32 -0500 From: Steven Rostedt To: Timur Tabi Cc: Vlastimil Babka , Sergey Senozhatsky , Matthew Wilcox , Andrew Morton , linux-kernel@vger.kernel.org, torvalds@linux-foundation.org, Petr Mladek , roman.fietze@magna.com, keescook@chromium.org, John Ogness , linux-mm@kvack.org, Akinobu Mita Subject: Re: [PATCH 0/2] introduce DUMP_PREFIX_UNHASHED for hex dumps Message-ID: <20210126124032.0915f408@gandalf.local.home> In-Reply-To: <20210126123912.23a5c3a1@gandalf.local.home> References: <20210116220950.47078-1-timur@kernel.org> <20210118182635.GD2260413@casper.infradead.org> <20210119014725.GH2260413@casper.infradead.org> <09c70d6b-c989-ca23-7ee8-b404bb0490f0@suse.cz> <083dd940-60c1-4cc8-fc89-8815b253d5c5@suse.cz> <20210126123912.23a5c3a1@gandalf.local.home> X-Mailer: Claws Mail 3.17.8 (GTK+ 2.24.33; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, 26 Jan 2021 12:39:12 -0500 Steven Rostedt wrote: > On Tue, 26 Jan 2021 11:30:02 -0600 > Timur Tabi wrote: > > > On 1/26/21 11:14 AM, Vlastimil Babka wrote: > > > If it was a boot option, I would personally be for leaving hashing enabled by > > > default, with opt-in boot option to disable it. > > > > A boot option would solve all my problems. I wouldn't need to recompile > > the kernel, and it would apply to all variations of printk. > > Should it be called "make-printk-insecure" > > ? And even if we make this a boot time option, perhaps we should still include that nasty dmesg notice, which will let people know that the kernel has unhashed values. -- Steve