diff options
author | Tobin C. Harding <me@tobin.cc> | 2018-06-22 09:15:34 +1000 |
---|---|---|
committer | Theodore Ts'o <tytso@mit.edu> | 2018-07-17 21:32:48 -0400 |
commit | 3672476edaa0660eb833f54fa9edeb505417b75c (patch) | |
tree | d60f9e1875ca9fe64a831be8ec83bebcc416257a /lib/ts_bm.c | |
parent | 1c4facb846c7f863bc65483394e80acdbacf671b (diff) | |
download | linux-3672476edaa0660eb833f54fa9edeb505417b75c.tar.gz linux-3672476edaa0660eb833f54fa9edeb505417b75c.tar.bz2 linux-3672476edaa0660eb833f54fa9edeb505417b75c.zip |
vsprintf: Add command line option debug_boot_weak_hash
Currently printing [hashed] pointers requires enough entropy to be
available. Early in the boot sequence this may not be the case
resulting in a dummy string '(____ptrval____)' being printed. This
makes debugging the early boot sequence difficult. We can relax the
requirement to use cryptographically secure hashing during debugging.
This enables debugging while keeping development/production kernel
behaviour the same.
If new command line option debug_boot_weak_hash is enabled use
cryptographically insecure hashing and hash pointer value immediately.
Reviewed-by: Steven Rostedt (VMware) <rostedt@goodmis.org>
Signed-off-by: Tobin C. Harding <me@tobin.cc>
Signed-off-by: Theodore Ts'o <tytso@mit.edu>
Diffstat (limited to 'lib/ts_bm.c')
0 files changed, 0 insertions, 0 deletions