From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id E94C47B3E1; Thu, 8 Feb 2024 15:35:48 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1707406549; cv=none; b=FV56CAGP45xSoqluT3/PQCKL2lRuLmTUo0KlV5lf/WNto+GXij6PS88NNB83LA3KW/NwYZyEU4qTi/AuYVrWh/o1J99CVThzz3HfRSOCPittg/+RyymIC9Kvu0YySZD9rnMIhGj6/B6f2Q6M9pkYKh/NXyLJrqe6KDxBqintrj4= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1707406549; c=relaxed/simple; bh=Oyd+0UxjHh1jKnK11zlznPLxJVZq1YhY3TWT2JBQK4I=; h=Date:From:To:Cc:Subject:Message-ID:References:MIME-Version: Content-Type:Content-Disposition:In-Reply-To; b=ES4wRzeksWQoN14x9VG5yafU0nrRUNSWBhf/WVulSSULDRJbJ6bzcgkRpagQe9xrEzlQEgdl1U9p8rrBrN2Qp2FoJI8yoIqJGoksQjRwKUmthhB0hMVKg6py87qSVCVCmbzK/CgCiI56e0+v+wYM1xGy+H2s7bS3g3aAeIT1i/8= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b=KQl0RuAM; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b="KQl0RuAM" Received: by smtp.kernel.org (Postfix) with ESMTPSA id C68F7C433F1; Thu, 8 Feb 2024 15:35:47 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1707406548; bh=Oyd+0UxjHh1jKnK11zlznPLxJVZq1YhY3TWT2JBQK4I=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=KQl0RuAMe+WdOE/LDDy3xatZEz8RXFLJ2liVNPHOOif2Ui/V0aymQ7CZRV2jT1OQ4 beAM6RNDfy49jWgzm09Plsu7hram53aUgPfAOmrMdLTy4y5qPfb2PUkZuPWA05JgMP 07+IOiEeobpR363RjzTmorEP9HVwp8jiipWIWjI0= Date: Thu, 8 Feb 2024 15:35:45 +0000 From: Greg Kroah-Hartman To: Alice Ryhl Cc: Trevor Gross , Miguel Ojeda , Alex Gaynor , Wedson Almeida Filho , Boqun Feng , Gary Guo , =?iso-8859-1?Q?Bj=F6rn?= Roy Baron , Benno Lossin , Andreas Hindborg , Kees Cook , Al Viro , Andrew Morton , Arve =?iso-8859-1?B?SGr4bm5lduVn?= , Todd Kjos , Martijn Coenen , Joel Fernandes , Carlos Llamas , Suren Baghdasaryan , Arnd Bergmann , linux-mm@kvack.org, linux-kernel@vger.kernel.org, rust-for-linux@vger.kernel.org, Christian Brauner Subject: Re: [PATCH 1/3] rust: add userspace pointers Message-ID: <2024020859-lusty-ladylike-29d4@gregkh> References: <20240124-alice-mm-v1-0-d1abcec83c44@google.com> <20240124-alice-mm-v1-1-d1abcec83c44@google.com> Precedence: bulk X-Mailing-List: rust-for-linux@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: On Thu, Feb 08, 2024 at 01:53:20PM +0100, Alice Ryhl wrote: > > Is some sort of `Debug` implementation useful? > > Leaking pointer addresses in logs is frowned upon in the kernel, so I > don't think we should include that. s/frowned upon/forbidden/ :) Along those lines, you all are tieing in the "I want to print a pointer, so hash it properly before I do so" logic from rust like we have in c, right? Ideally you'd use the same logic if at all possible. If not, that probably needs to be done so that you don't accidentally start leaking things. thanks, greg k-h