diff options
author | Tobin C. Harding <me@tobin.cc> | 2018-06-22 01:15:34 +0200 |
---|---|---|
committer | Theodore Ts'o <tytso@mit.edu> | 2018-07-18 03:32:48 +0200 |
commit | 3672476edaa0660eb833f54fa9edeb505417b75c (patch) | |
tree | d60f9e1875ca9fe64a831be8ec83bebcc416257a /drivers/char/random.c | |
parent | vsprintf: Use hw RNG for ptr_key (diff) | |
download | linux-3672476edaa0660eb833f54fa9edeb505417b75c.tar.xz linux-3672476edaa0660eb833f54fa9edeb505417b75c.zip |
vsprintf: Add command line option debug_boot_weak_hash
Currently printing [hashed] pointers requires enough entropy to be
available. Early in the boot sequence this may not be the case
resulting in a dummy string '(____ptrval____)' being printed. This
makes debugging the early boot sequence difficult. We can relax the
requirement to use cryptographically secure hashing during debugging.
This enables debugging while keeping development/production kernel
behaviour the same.
If new command line option debug_boot_weak_hash is enabled use
cryptographically insecure hashing and hash pointer value immediately.
Reviewed-by: Steven Rostedt (VMware) <rostedt@goodmis.org>
Signed-off-by: Tobin C. Harding <me@tobin.cc>
Signed-off-by: Theodore Ts'o <tytso@mit.edu>
Diffstat (limited to 'drivers/char/random.c')
0 files changed, 0 insertions, 0 deletions