Received: by 2002:a25:1506:0:0:0:0:0 with SMTP id 6csp1212932ybv; Fri, 7 Feb 2020 16:54:43 -0800 (PST) X-Google-Smtp-Source: APXvYqyHnos9X1u8HtS5jtjFKzBJMPiGrEa39TY2jtkgGRjFnnQ6NTKogkfW2qwtZCVFtdd77Q9m X-Received: by 2002:a9d:7757:: with SMTP id t23mr1669675otl.315.1581123283195; Fri, 07 Feb 2020 16:54:43 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1581123283; cv=none; d=google.com; s=arc-20160816; b=De8HQgnVvMFaE2c63eomzgiX7/Cd1EkoofIfEYWvYEsvCDgB4IQkx/O44pOzK+g66G KlI2gz++1J6uEwlkBEK7PoBTGfuwa6jerspMCSX+V+cHnmCLls+y6iUk9AJvwsIC6dob /bijrW28bme/IVe1keGHY+zSX7hYIyNgt3I6cJ5d8GZnTs1x8La6WvftTOuDfEOjLFcl 6oEt+jqF0+uR43DSoc1kKNNpC+h7Kt58RV9JIKXFBw9GPQTcnmt/PSNeaHF1/GGUC5RY HmBP4RG4gvhOiVKR6nSfMheQCjSm49iad+ZqUIG570bdlPxJkjQ1f3ksrftKZdfmmEBG +ZyQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date; bh=F+FrOX3ELtRQ2ix5gJ1jQWD/d06Nfi5Ruot4Lx75BNY=; b=YONPdmBPuCclOpRCIU5PWb3XE6BBRxKPgl11cJvABBp95QqL1DcV9NlptvB6ItVORb t7IL31TqPhPaV3NP4pnFRpEMeAtZ9YnAwZ6lDldccWwxo1mpeAX0fOwyMnLsQ4P8LV/d cWOyhoIS/vyLneIhFfeuHdSnMNDZql+n8VtdT1g/vT0a8cAw8AR1D5A/F+Rvoyg8ho6F +C5K4R8wiJoEHpmiGCvLpFCc2DHDe0ac+hFAcH4dHTttBbKPBmGBiZiBLCMvUbwmiYXd 0+nkD5NGe7dbL2zmvSzWDuIZB0ubTNxa/BcRcS7KNPk14g474N3TGDmozd6uY0t3NkXJ rpDQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id m24si561799otf.101.2020.02.07.16.54.30; Fri, 07 Feb 2020 16:54:43 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727118AbgBHAxa (ORCPT + 99 others); Fri, 7 Feb 2020 19:53:30 -0500 Received: from mail.kernel.org ([198.145.29.99]:33416 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726995AbgBHAx3 (ORCPT ); Fri, 7 Feb 2020 19:53:29 -0500 Received: from oasis.local.home (unknown [12.174.139.122]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id E9750206CC; Sat, 8 Feb 2020 00:53:27 +0000 (UTC) Date: Fri, 7 Feb 2020 19:53:26 -0500 From: Steven Rostedt To: "Theodore Y. Ts'o" Cc: Mark Salyzyn , linux-kernel@vger.kernel.org, kernel-team@android.com, Arnd Bergmann , Greg Kroah-Hartman , Richard Henderson , Mark Brown , Kees Cook , Hsin-Yi Wang , Vasily Gorbik , Andrew Morton , Masami Hiramatsu , Mike Rapoport , Arvind Sankar , Dominik Brodowski , Thomas Gleixner , Alexander Potapenko Subject: Re: [PATCH] random: add rng-seed= command line option Message-ID: <20200207195326.0344ef82@oasis.local.home> In-Reply-To: <20200208004922.GE122530@mit.edu> References: <20200207150809.19329-1-salyzyn@android.com> <20200207155828.GB122530@mit.edu> <20200208004922.GE122530@mit.edu> X-Mailer: Claws Mail 3.17.3 (GTK+ 2.24.32; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, 7 Feb 2020 19:49:22 -0500 "Theodore Y. Ts'o" wrote: > My preference would be to pass in the random seed *not* on the > command-line at all, but as a separate parameter which is passed to > the bootloader, just as we pass in the device-tree, the initrd and the > command-line as separate things. The problem is that how we pass in > extra boot parameters is architecture specific, and how we might do it > for x86 is different than for arm64. So yeah, it's a bit more > inconvenient to do things that way; but I think it's also much > cleaner. Hmm, if the boot loader could add on to the bootconfig that Masami just added, then it could add some "random" seed for each boot! The bootconfig is just an appended file at the end of the initrd. -- Steve