On 06/21/2018 04:15 PM, Tobin C. Harding wrote: > Currently printing [hashed] pointers requires enough entropy to be > available. Early in the boot sequence this may not be the case > resulting in a dummy string '(____ptrval____)' being printed. This > makes debugging the early boot sequence difficult. We can relax the > requirement to use cryptographically secure hashing during debugging. > This enables debugging while keeping development/production kernel > behaviour the same. > > If new command line option debug_boot_weak_hash is enabled use > cryptographically insecure hashing and hash pointer value immediately. > > Reviewed-by: Steven Rostedt (VMware) <rost...@goodmis.org> > Signed-off-by: Tobin C. Harding <m...@tobin.cc>
Acked-by: Randy Dunlap <rdun...@infradead.org> Thanks. > --- > Documentation/admin-guide/kernel-parameters.txt | 8 ++++++++ > lib/vsprintf.c | 17 +++++++++++++++++ > 2 files changed, 25 insertions(+) -- ~Randy