aboutsummaryrefslogtreecommitdiff
path: root/arch/x86/lib/kaslr.c
diff options
context:
space:
mode:
authorGravatar Kees Cook <keescook@chromium.org> 2021-10-13 10:57:40 -0700
committerGravatar Peter Zijlstra <peterz@infradead.org> 2021-10-27 11:07:58 +0200
commit0d054d4e82072bcfd5eb961536b09a9b3f5613fb (patch)
tree020a40b38042c6ab1f58e47df57a432b1cf0f12c /arch/x86/lib/kaslr.c
parentx86/tools/relocs: Support >64K section headers (diff)
downloadlinux-0d054d4e82072bcfd5eb961536b09a9b3f5613fb.tar.gz
linux-0d054d4e82072bcfd5eb961536b09a9b3f5613fb.tar.bz2
linux-0d054d4e82072bcfd5eb961536b09a9b3f5613fb.zip
x86/boot: Allow a "silent" kaslr random byte fetch
Under earlyprintk, each RNG call produces a debug report line. To support the future FGKASLR feature, which will fetch random bytes during function shuffling, this is not useful information (each line is identical and tells us nothing new), needlessly spamming the console. Instead, allow for a NULL "purpose" to suppress the debug reporting. Signed-off-by: Kees Cook <keescook@chromium.org> Signed-off-by: Peter Zijlstra (Intel) <peterz@infradead.org> Reviewed-by: Nick Desaulniers <ndesaulniers@google.com> Link: https://lore.kernel.org/r/20211013175742.1197608-3-keescook@chromium.org
Diffstat (limited to 'arch/x86/lib/kaslr.c')
-rw-r--r--arch/x86/lib/kaslr.c18
1 files changed, 12 insertions, 6 deletions
diff --git a/arch/x86/lib/kaslr.c b/arch/x86/lib/kaslr.c
index a53665116458..2b3eb8c948a3 100644
--- a/arch/x86/lib/kaslr.c
+++ b/arch/x86/lib/kaslr.c
@@ -56,11 +56,14 @@ unsigned long kaslr_get_random_long(const char *purpose)
unsigned long raw, random = get_boot_seed();
bool use_i8254 = true;
- debug_putstr(purpose);
- debug_putstr(" KASLR using");
+ if (purpose) {
+ debug_putstr(purpose);
+ debug_putstr(" KASLR using");
+ }
if (has_cpuflag(X86_FEATURE_RDRAND)) {
- debug_putstr(" RDRAND");
+ if (purpose)
+ debug_putstr(" RDRAND");
if (rdrand_long(&raw)) {
random ^= raw;
use_i8254 = false;
@@ -68,7 +71,8 @@ unsigned long kaslr_get_random_long(const char *purpose)
}
if (has_cpuflag(X86_FEATURE_TSC)) {
- debug_putstr(" RDTSC");
+ if (purpose)
+ debug_putstr(" RDTSC");
raw = rdtsc();
random ^= raw;
@@ -76,7 +80,8 @@ unsigned long kaslr_get_random_long(const char *purpose)
}
if (use_i8254) {
- debug_putstr(" i8254");
+ if (purpose)
+ debug_putstr(" i8254");
random ^= i8254();
}
@@ -86,7 +91,8 @@ unsigned long kaslr_get_random_long(const char *purpose)
: "a" (random), "rm" (mix_const));
random += raw;
- debug_putstr("...\n");
+ if (purpose)
+ debug_putstr("...\n");
return random;
}