On Fri, Aug 23, 2019 at 02:24:51PM +0800, Hsin-Yi Wang wrote: > Introducing a chosen node, rng-seed, which is an entropy that can be > passed to kernel called very early to increase initial device > randomness. Bootloader should provide this entropy and the value is > read from /chosen/rng-seed in DT. > > Obtain of_fdt_crc32 for CRC check after early_init_dt_scan_nodes(), > since early_init_dt_scan_chosen() would modify fdt to erase rng-seed. > > Add a new interface add_bootloader_randomness() for rng-seed use case. > Depends on whether the seed is trustworthy, rng seed would be passed to > add_hwgenerator_randomness(). Otherwise it would be passed to > add_device_randomness(). Decision is controlled by kernel config > RANDOM_TRUST_BOOTLOADER. > > Signed-off-by: Hsin-Yi Wang <hsi...@chromium.org> > Reviewed-by: Stephen Boyd <swb...@chromium.org> > Reviewed-by: Rob Herring <r...@kernel.org> > --- > Change from v9: > * reword kconfig > * use IS_ENABLED for config
Given that these aren't functional changes, I've kept Ted's ack from v9 and I'll queue these via arm64 assuming they pass testing. Ted -- please shout if you're not happy about that, and I'll drop the series. Thanks, Will