From patchwork Sat Jul 15 00:38:36 2017 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Kees Cook X-Patchwork-Id: 788831 Return-Path: X-Original-To: incoming-dt@patchwork.ozlabs.org Delivered-To: patchwork-incoming-dt@bilbo.ozlabs.org Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by ozlabs.org (Postfix) with ESMTP id 3x8VzQ4z4qz9sNd for ; Sat, 15 Jul 2017 10:38:42 +1000 (AEST) Authentication-Results: ozlabs.org; dkim=fail reason="signature verification failed" (1024-bit key; unprotected) header.d=chromium.org header.i=@chromium.org header.b="QTkH2bSw"; dkim-atps=neutral Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751115AbdGOAik (ORCPT ); Fri, 14 Jul 2017 20:38:40 -0400 Received: from mail-pf0-f173.google.com ([209.85.192.173]:33010 "EHLO mail-pf0-f173.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751035AbdGOAij (ORCPT ); Fri, 14 Jul 2017 20:38:39 -0400 Received: by mail-pf0-f173.google.com with SMTP id e7so52323096pfk.0 for ; Fri, 14 Jul 2017 17:38:39 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=chromium.org; s=google; h=date:from:to:cc:subject:message-id:mime-version:content-disposition; bh=4i5kypRrkhpbSyZ8IJSM5W5PmoskRXgACJoZug3qgGQ=; b=QTkH2bSwJPyzYeA+d2AC5ykp4ncXWDZHzEOvY+O9llOyOrTqXEtDGjgQ7wtPA/xRt+ 2CcdtUYOsOsjn5NkpMI/OVm/+Da9yIUfFkVZ0WZqpA0G8dDVXNhzc7fMuzIoCFc/39TV /mo008Ek2GEpIN4XRAdAq9oosXwYJhrUSArOM= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:mime-version :content-disposition; bh=4i5kypRrkhpbSyZ8IJSM5W5PmoskRXgACJoZug3qgGQ=; b=igYyyx/x4pnqLJlKMMIzTt3lqidb4IYiYe14a2/sucDTYpNlSYM2zv2u9gDRu0jKLx TU2kF1haCdGXa2t+qN7ppwEX701ePf7wMSdEGrfDrTbbkbioUmH43U+tOtNGEIlBysZh CigU3Paalg5MaYnDRkShkcRcYyC4p3QKyekRHUm86E18l8gwSZcHUiMeljLLPgIkiDS7 eXLZZxcwd93JFT/cqDf7tL5T818vOCTTmEYIFCTDtAlIxyMh8+0hp3V6ussZUQzNfXre Gr/Ynzh7XglxplADgvKzyRa0Pxtt2PqWtxQSWRISbJdgYdNPHryLbYXWff38bg3rYPpJ xZ/g== X-Gm-Message-State: AIVw112gfBSHTZyT4ZPsomeOwXek4oDqF8n5CxyBhj2eUI8F8BMejVDq my33ByljtBEu5p8o X-Received: by 10.99.115.2 with SMTP id o2mr17565602pgc.48.1500079119163; Fri, 14 Jul 2017 17:38:39 -0700 (PDT) Received: from www.outflux.net (173-164-112-133-Oregon.hfc.comcastbusiness.net. [173.164.112.133]) by smtp.gmail.com with ESMTPSA id d185sm15874787pgc.39.2017.07.14.17.38.37 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Fri, 14 Jul 2017 17:38:37 -0700 (PDT) Date: Fri, 14 Jul 2017 17:38:36 -0700 From: Kees Cook To: linux-kernel@vger.kernel.org Cc: devicetree@vger.kernel.org, Rob Herring , Ard Biesheuvel , Matt Redfearn Subject: [PATCH] Documentation: dt: chosen property for kaslr-seed Message-ID: <20170715003836.GA113132@beast> MIME-Version: 1.0 Content-Disposition: inline Sender: devicetree-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: devicetree@vger.kernel.org Document then /chosen/kaslr-seed property (and its interaction with the EFI_RNG_PROTOCOL API). Signed-off-by: Kees Cook Acked-by: Ard Biesheuvel Acked-by: Mark Rutland Acked-by: Will Deacon --- Documentation/devicetree/bindings/chosen.txt | 22 ++++++++++++++++++++-- 1 file changed, 20 insertions(+), 2 deletions(-) diff --git a/Documentation/devicetree/bindings/chosen.txt b/Documentation/devicetree/bindings/chosen.txt index dee3f5d9df26..0cdb43b268e5 100644 --- a/Documentation/devicetree/bindings/chosen.txt +++ b/Documentation/devicetree/bindings/chosen.txt @@ -5,9 +5,27 @@ The chosen node does not represent a real device, but serves as a place for passing data between firmware and the operating system, like boot arguments. Data in the chosen node does not represent the hardware. +The following properties are recognized: -stdout-path property --------------------- + +kaslr-seed +----------- + +This property is used when booting with CONFIG_RANDOMIZE_BASE to seed +the entropy used to randomize the kernel image base address location. It +is parsed as a u64 value, e.g. + +/ { + chosen { + kaslr-seed = <0xfeedbeef 0xc0def00d>; + }; +}; + +Note that when booting through EFI when EFI_RNG_PROTOCOL is supported, +this value will be overwritten by the EFI stub. + +stdout-path +----------- Device trees may specify the device to be used for boot console output with a stdout-path property under /chosen, as described in the Devicetree