Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp2168984pxb; Fri, 5 Feb 2021 10:32:53 -0800 (PST) X-Google-Smtp-Source: ABdhPJw6oI3QRC3uO54YELWjuRbBPe6qYjA0wXporZCBqhYP+CZKn4mjT0zSmHhrPLuo21tZdzoa X-Received: by 2002:aa7:c78e:: with SMTP id n14mr4809092eds.31.1612549972849; Fri, 05 Feb 2021 10:32:52 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1612549972; cv=none; d=google.com; s=arc-20160816; b=xWw3KnDm8nJeKRnGnJlFWXqhXeF6r08fixBLvi+cxkeQXJDFppw8smht04OmYaIB1p uzYxsSUm+fxaCj/rjiycKjOkI7jNU2cHAjELSCkYh3Szr6Q/fn+qFpK9J62/xn7HtqBq adZ3tcqGrY2IjcBcrIvh+B35zJRRGGncpysaZx/vzcrPcKzKaNe9nSxl3ze0jBBKk2aM Elt5mADWp6XXoT6dJHhbsGlPkv52MiIMKcGMCAD0Z1ht7dK4lb0i8hO+dFoI6wbhMJqE a5GrsWwfMiJ6Fr72/rI+NQuASrQ+4a3uTXe/d11Al7C25BKc6ykQDHGJc4TRySMqtS9e tKIQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :to:subject:dkim-signature; bh=C6/3IWcScBYKcmb4Wuc9EkW2fWbbpkjGoHqoMB05lzc=; b=YtmI0fgw/jPlJIPAJUkx62FCQJQUbtwN8wO340W44O9PxiUkLpqJFEiuURCXUFVyvt YQcwMC+7suqx3KN+7NspynJv4sxToK45cRnfZ9Sf7s0Cgve6p2kHgr6uKApzcZPWoKXZ ru9X9R6gsedDNAgSYHwNu2GG0CQXhNetpo6dCmztu0Z5nxd1p8QjaPxKfIUKj6MyhLGW h3NP1lbgnf41y/RJ/2P5X46T36SnauqDDaLW0uvFwhyHNiBWJFpTnxVmFZsHXbiSEMrn xnjUm3QHKAX1hSP7YyQhHoUU7GgCCHdaccgA53CphZoU7tcEI3NrD4jFGuD1cbz3Jhmx X33A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b="PP/2qv0e"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id ku8si6007429ejc.25.2021.02.05.10.32.25; Fri, 05 Feb 2021 10:32:52 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b="PP/2qv0e"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233431AbhBEQqB (ORCPT + 99 others); Fri, 5 Feb 2021 11:46:01 -0500 Received: from mail.kernel.org ([198.145.29.99]:45156 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233294AbhBEQnn (ORCPT ); Fri, 5 Feb 2021 11:43:43 -0500 Received: by mail.kernel.org (Postfix) with ESMTPSA id 62B4D64E4D; Fri, 5 Feb 2021 18:25:23 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1612549524; bh=hb309p839a18x47275kXH8RdkKDWYDg5Qa7e2tIfzIU=; h=Subject:To:References:From:Date:In-Reply-To:From; b=PP/2qv0ejvMgDlya0fseiY1tFEzYeNhIgoz2v+eezRT1XWzBYyjXcEICJm8sun0kQ aSi59nceGXXXGoj4w4mG4ZYipqkso3wM8Wpb9AOeGReZI+iP9cz73lozokotMkju6f mkcnrMgEhT9vuowqgW8VHdUByJb+SOMtWCcYTdTu6RSEYHZutHEr2wEaGl63bnkefa cAHibiZPqBznjlN6ge11tK2orMz+XjWsUerZswaMzxDb9+YRMkh9qHfSOzVDQMOjOf Yh8Unu4ucUnxv6cEJ4SleeSrWn1cgwOFVv6mbh2veyyaKljuXo6SI6z4W9oJP8TVKR 0HK075rWG8bkA== Subject: Re: [PATCH][RESEND] lib/vsprintf: make-printk-non-secret printks all addresses as unhashed To: Vlastimil Babka , Petr Mladek , Steven Rostedt , Sergey Senozhatsky , linux-kernel@vger.kernel.org, linux-mm@kvack.org, willy@infradead.org, akpm@linux-foundation.org, torvalds@linux-foundation.org, roman.fietze@magna.com, keescook@chromium.org, john.ogness@linutronix.de, akinobu.mita@gmail.com References: <20210202213633.755469-1-timur@kernel.org> <3baace45-38af-a59b-c376-9a4c39a17b2d@suse.cz> From: Timur Tabi Message-ID: Date: Fri, 5 Feb 2021 12:25:22 -0600 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.10.0 MIME-Version: 1.0 In-Reply-To: <3baace45-38af-a59b-c376-9a4c39a17b2d@suse.cz> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2/5/21 4:59 AM, Vlastimil Babka wrote: > Thanks a lot. Should this also affect %pK though? IIUC, there's currently no way > to achieve non-mangled %pK in all cases, even with the most permissive > kptr_restrict=1 setting: > - in IRQ, there's "pK-error" instead > - in a context of non-CAP_SYSLOG process, nulls are printed Hmmm.. I thought %pK prints an unhashed pointer when the user is root, at least in situations where the user can be known (e.g. during an ioctl call). > Yes, neither should matter if %pK were only used for prints that generate > content of some kind of /proc file read by a CAP_SYSLOG process, but that > doesn't seem to be the case and there are %pK used for printing to dmesg too... I thought about that. On one hand, people who use %pK probably really wanted a hashed pointer printed. On the other hand, I agree that %pK should not be used for dmesg prints. I get the feeling that some (most?) people who use %pK don't really understand how it's supposed to be used. I can extend make-printk-non-secret to %pK if everyone agrees.