On 06/21/2018 04:15 PM, Tobin C. Harding wrote:
> Currently printing [hashed] pointers requires enough entropy to be
> available.  Early in the boot sequence this may not be the case
> resulting in a dummy string '(____ptrval____)' being printed.  This
> makes debugging the early boot sequence difficult.  We can relax the
> requirement to use cryptographically secure hashing during debugging.
> This enables debugging while keeping development/production kernel
> behaviour the same.
> 
> If new command line option debug_boot_weak_hash is enabled use
> cryptographically insecure hashing and hash pointer value immediately.
> 
> Reviewed-by: Steven Rostedt (VMware) <rost...@goodmis.org>
> Signed-off-by: Tobin C. Harding <m...@tobin.cc>

Acked-by: Randy Dunlap <rdun...@infradead.org>

Thanks.

> ---
>  Documentation/admin-guide/kernel-parameters.txt |  8 ++++++++
>  lib/vsprintf.c                                  | 17 +++++++++++++++++
>  2 files changed, 25 insertions(+)


-- 
~Randy

Reply via email to