diff options
| author | Tobin C. Harding <[email protected]> | 2018-06-21 23:15:34 +0000 |
|---|---|---|
| committer | Theodore Ts'o <[email protected]> | 2018-07-18 01:32:48 +0000 |
| commit | 3672476edaa0660eb833f54fa9edeb505417b75c (patch) | |
| tree | d60f9e1875ca9fe64a831be8ec83bebcc416257a /tools/perf/scripts/python/event_analyzing_sample.py | |
| parent | vsprintf: Use hw RNG for ptr_key (diff) | |
| download | kernel-3672476edaa0660eb833f54fa9edeb505417b75c.tar.gz kernel-3672476edaa0660eb833f54fa9edeb505417b75c.zip | |
vsprintf: Add command line option debug_boot_weak_hash
Currently printing [hashed] pointers requires enough entropy to be
available. Early in the boot sequence this may not be the case
resulting in a dummy string '(____ptrval____)' being printed. This
makes debugging the early boot sequence difficult. We can relax the
requirement to use cryptographically secure hashing during debugging.
This enables debugging while keeping development/production kernel
behaviour the same.
If new command line option debug_boot_weak_hash is enabled use
cryptographically insecure hashing and hash pointer value immediately.
Reviewed-by: Steven Rostedt (VMware) <[email protected]>
Signed-off-by: Tobin C. Harding <[email protected]>
Signed-off-by: Theodore Ts'o <[email protected]>
Diffstat (limited to 'tools/perf/scripts/python/event_analyzing_sample.py')
0 files changed, 0 insertions, 0 deletions
