From: Andre Heider <a.heider@gmail.com>
To: u-boot@lists.denx.de
Subject: [PATCH] defconfig: espressobin: enable NET_RANDOM_ETHADDR
Date: Fri, 11 Sep 2020 17:52:26 +0200 [thread overview]
Message-ID: <1da8d6e3-dc10-2aa2-ce4f-26edf25bd74d@gmail.com> (raw)
In-Reply-To: <20200911135505.4e902304@dellmb.labs.office.nic.cz>
Hi Marek,
On 11/09/2020 13:55, Marek Beh?n wrote:
> On Wed, 9 Sep 2020 00:38:31 +0200 Pali Roh?r <pali@kernel.org> wrote:
>> On Tuesday 08 September 2020 08:52:56 Tom Rini wrote:
>>> Note that when CONFIG_NET_RANDOM_ETHADDR is set, we only use a
>>> random MAC address when we haven't found one either on the hardware
>>> or environment.
>>
>> I know.
>>
>>> It also prints a warning that you are using a random MAC,
>>> so if it's documented on how to recover the real MAC a user should
>>> see that warning and fix it.
>>
>> In case you did backup of MAC address or you have MAC address printed
>> on sticker, you can restore it. If you loaded distribution U-Boot
>> which erase MAC address and you have not did any backup, then your
>> MAC address is forever lost.
>
> On Turris MOX we write the MAC address into OTP of the SOC during
> manufacturing.
>
> It is possible to write code that burns the MAC address into OTP, I
> consider this a better option than enabling random MAC address.
>
> Maybe we can enable random MAC address, and if MAC address is not found
> in environment nor OTP, issue a warning, something like
> "WARNING: MAC address lost, please burn the MAC address of your device
> to OTP with command xyz"
>
> What do you think?
if there's a mac stored in otp during manufacturing, that's of course
the best solution. There's no need for CONFIG_NET_RANDOM_ETHADDR then.
But globalscale does not do that.
Doing it afterwards, so u-boot claiming some otp space for itself, and
instructing the user how to write to it sounds too dangerous/error-prone.
For me CONFIG_NET_RANDOM_ETHADDR is a knob that should be enabled if
there's no mac address stored in a sane way (where saving it just to an
u-boot env during manufacturing doesn't count as sane, especially if the
vendor moves the spi env offset around in a firmware update).
So I think CONFIG_NET_RANDOM_ETHADDR is enough.
But it would be nice if e.g. a board could set specific env vars as
indestructible/unwipeable/precious/whatever, which instructs `env
default -a` to keep those (which is common after updating the
bootloader). Maybe that's an idea worth pursuing?
Thanks,
Andre
next prev parent reply other threads:[~2020-09-11 15:52 UTC|newest]
Thread overview: 19+ messages / expand[flat|nested] mbox.gz Atom feed top
2020-09-08 6:35 [PATCH] defconfig: espressobin: enable NET_RANDOM_ETHADDR Andre Heider
2020-09-08 7:42 ` Pali Rohár
2020-09-08 8:14 ` Andre Heider
2020-09-08 12:52 ` Tom Rini
2020-09-08 22:38 ` Pali Rohár
2020-09-11 11:55 ` Marek Behún
2020-09-11 15:52 ` Andre Heider [this message]
2020-09-11 16:22 ` Marek Behún
2020-09-11 16:47 ` Andre Heider
2020-09-11 17:10 ` Tom Rini
2020-09-11 17:16 ` Dennis Gilmore
2020-09-13 9:21 ` [EXT] " Kostya Porotchkin
2020-09-21 7:50 ` Stefan Roese
2020-09-21 13:05 ` Pali Rohár
2020-09-21 13:21 ` Marek Behun
2020-09-21 13:31 ` Pali Rohár
2020-09-21 15:03 ` Tom Rini
2020-09-21 15:10 ` [EXT] " Kostya Porotchkin
2020-09-24 10:36 ` Stefan Roese
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=1da8d6e3-dc10-2aa2-ce4f-26edf25bd74d@gmail.com \
--to=a.heider@gmail.com \
--cc=u-boot@lists.denx.de \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox