On Wed, 2018-04-18 at 11:29 +0200, Maarten Lankhorst wrote: > Op 18-04-18 om 11:24 schreef Alexey Brodkin: > > After commit ad67b74 ("printk: hash addresses printed with %p") > > pointers are being hashed when printed. However, this makes > > debug output completely useless. Switch to %px in order to see the > > unadorned kernel pointers. > > > > This was done with the following one-liner: > > find drivers/gpu/drm -type f -name "*.c" -exec sed -r -i '/DRM_DEBUG|KERN_DEBUG|pr_debug/ s/%p\b/%px/g' {} + > > So first we plug a kernel information leak hole, then we introduce it again? Seems like a terrible idea.. Well security concerns are good but what about us poor kernel developers? Those debug prints are supposed to help us to deal with stuff we develop or fix. Frankly I was quite surprised when first saw what was "unique hashed ID" instead of real pointer value. And what's worse there's no way to get previous behavior back. So now we have to manually patch sources here and there to get meaningful data, right? I wouldn't bother sending this patch if there was Kconfig option reverting %p behavior but that was never implemented. -Alexey