Hi Bryan,

On 10/07/25 19:47, Bryan Brattlof wrote:
On July 10, 2025 thus sayeth Gokul:
From: Gokul Praveen <g-prav...@ti.com>

KASLR, or Kernel Address Space Layout Randomization, is a security
feature in the Linux kernel that randomizes the memory location
where the kernel is loaded during boot.

OP-TEE RNG is a Random Number Generator (RNG) component within the
Open Portable Trusted Execution Environment (OP-TEE) which provides
a random number to U-BOOT and U-BOOT provides this random number
as seed value to the LINUX kernel for KASLR.

Add KASLR OPTEE RNG support across K3 devices by enabling the required
configs.

Signed-off-by: Gokul Praveen <g-prav...@ti.com>
---
v2<==> v1
===========
* Added 'if' condition for configs to avoid enabling this feature
   in R5.

Works for me.

Reviewed-by: Bryan Brattlof <b...@ti.com>


Boot logs Link :

https://gist.github.com/GokulPraveen2001/44aa8c0962438c12ffc55e6ed67742e5

Just curious are you enabling the kaslrseed command for this build? It
looks like you're using TI's evil vendor scripts but I assumed the
kaslrseed command was disabled.

Can you elaborate more on this,Bryan?

Actually, we are not using the kaslrseed device tree property. Is that what you meant,Bryan?

~Bryan

Regards Gokul.

Reply via email to