From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752975Ab3KKUIA (ORCPT ); Mon, 11 Nov 2013 15:08:00 -0500 Received: from mail-ee0-f49.google.com ([74.125.83.49]:35950 "EHLO mail-ee0-f49.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752726Ab3KKUHw (ORCPT ); Mon, 11 Nov 2013 15:07:52 -0500 Date: Mon, 11 Nov 2013 21:07:49 +0100 From: Ingo Molnar To: "H. Peter Anvin" Cc: Kees Cook , LKML , Thomas Gleixner , "H. Peter Anvin" , "linux-tip-commits@vger.kernel.org" Subject: Re: [tip:x86/kaslr] x86, kaslr: Provide randomness functions Message-ID: <20131111200748.GB17408@gmail.com> References: <1381450698-28710-4-git-send-email-keescook@chromium.org> <20131111182046.GA14961@gmail.com> <20131111183101.GA16051@gmail.com> <528131E7.2060509@zytor.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <528131E7.2060509@zytor.com> User-Agent: Mutt/1.5.21 (2010-09-15) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org * H. Peter Anvin wrote: > Of course, perhaps we could just hash struct boot_params as a starting > point? Yeah, that would be a good first step, before trying to parse DMI or ACPI. Anything that is reasonably system dependent and gives at least some amount of unpredicability. Thanks, Ingo