HI Bryan,

On 11/07/25 17:47, Bryan Brattlof wrote:
On July 11, 2025 thus sayeth Gokul Praveen:
Hi Bryan,

On 10/07/25 19:47, Bryan Brattlof wrote:
On July 10, 2025 thus sayeth Gokul:
From: Gokul Praveen <g-prav...@ti.com>

KASLR, or Kernel Address Space Layout Randomization, is a security
feature in the Linux kernel that randomizes the memory location
where the kernel is loaded during boot.

OP-TEE RNG is a Random Number Generator (RNG) component within the
Open Portable Trusted Execution Environment (OP-TEE) which provides
a random number to U-BOOT and U-BOOT provides this random number
as seed value to the LINUX kernel for KASLR.

Add KASLR OPTEE RNG support across K3 devices by enabling the required
configs.

Signed-off-by: Gokul Praveen <g-prav...@ti.com>
---
v2<==> v1
===========
* Added 'if' condition for configs to avoid enabling this feature
    in R5.

Works for me.

Reviewed-by: Bryan Brattlof <b...@ti.com>


Boot logs Link :

https://gist.github.com/GokulPraveen2001/44aa8c0962438c12ffc55e6ed67742e5

Just curious are you enabling the kaslrseed command for this build? It
looks like you're using TI's evil vendor scripts but I assumed the
kaslrseed command was disabled.

Can you elaborate more on this,Bryan?

Actually, we are not using the kaslrseed device tree property. Is that what
you meant,Bryan?

Everything in this boot log is tagged as dirty. So I'm just trying to
ensure I've got everything setup correctly.

I was curious what you are doing to generate the line:

    KASLR SEED OPTEE SET SUCCESSFULLY

before we jump to the kernel.

Oh,got it Bryan. Those were just small debug prints I added in the "kaslr.c" file during the testing phase to check the offsets at which it was loading.So,the boot logs in the link are the ones I got during the testing phase,which I have not included in the patch provided as it is not needed.

Regards
Gokul


Reply via email to