Re: [PATCH] fdt: add kaslr-seed if DM_RNG is enabled

2024-05-15 Thread Marek Vasut
On 5/15/24 9:57 PM, Tim Harvey wrote: [...] The kaslrseed command similarly becomes obsolete with your patch and should be removed. 'git grep -n CMD_KASLR' indicates which defconfigs would be impacted. There are several users of this command currently: $ git grep CMD_KASLR configs/ configs/e

Re: [PATCH] fdt: add kaslr-seed if DM_RNG is enabled

2024-05-15 Thread Tim Harvey
On Tue, May 14, 2024 at 10:17 PM Heinrich Schuchardt wrote: > > On 5/15/24 02:50, Marek Vasut wrote: > > On 5/15/24 2:22 AM, Tim Harvey wrote: > >> If RANDOMIZE_BASE is enabled in the Linux kernel instructing it to > >> randomize the virtual address at which the kernel image is loaded, it > >> exp

Re: [PATCH] fdt: add kaslr-seed if DM_RNG is enabled

2024-05-15 Thread Marek Vasut
On 5/15/24 6:29 PM, Tim Harvey wrote: On Tue, May 14, 2024 at 5:50 PM Marek Vasut wrote: On 5/15/24 2:22 AM, Tim Harvey wrote: If RANDOMIZE_BASE is enabled in the Linux kernel instructing it to randomize the virtual address at which the kernel image is loaded, it expects entropy to be provide

Re: [PATCH] fdt: add kaslr-seed if DM_RNG is enabled

2024-05-15 Thread Tim Harvey
On Tue, May 14, 2024 at 5:50 PM Marek Vasut wrote: > > On 5/15/24 2:22 AM, Tim Harvey wrote: > > If RANDOMIZE_BASE is enabled in the Linux kernel instructing it to > > randomize the virtual address at which the kernel image is loaded, it > > expects entropy to be provided by the bootloader by popu

Re: [PATCH] fdt: add kaslr-seed if DM_RNG is enabled

2024-05-14 Thread Heinrich Schuchardt
On 5/15/24 02:50, Marek Vasut wrote: On 5/15/24 2:22 AM, Tim Harvey wrote: If RANDOMIZE_BASE is enabled in the Linux kernel instructing it to randomize the virtual address at which the kernel image is loaded, it expects entropy to be provided by the bootloader by populating /chosen/kaslr-seed wi

Re: [PATCH] fdt: add kaslr-seed if DM_RNG is enabled

2024-05-14 Thread Marek Vasut
On 5/15/24 2:22 AM, Tim Harvey wrote: If RANDOMIZE_BASE is enabled in the Linux kernel instructing it to randomize the virtual address at which the kernel image is loaded, it expects entropy to be provided by the bootloader by populating /chosen/kaslr-seed with a 64-bit value from source of entro

[PATCH] fdt: add kaslr-seed if DM_RNG is enabled

2024-05-14 Thread Tim Harvey
If RANDOMIZE_BASE is enabled in the Linux kernel instructing it to randomize the virtual address at which the kernel image is loaded, it expects entropy to be provided by the bootloader by populating /chosen/kaslr-seed with a 64-bit value from source of entropy at boot. If we have DM_RNG enabled p