From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1757187Ab3EWH4s (ORCPT ); Thu, 23 May 2013 03:56:48 -0400 Received: from mail-ie0-f181.google.com ([209.85.223.181]:42595 "EHLO mail-ie0-f181.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1755390Ab3EWH4r (ORCPT ); Thu, 23 May 2013 03:56:47 -0400 MIME-Version: 1.0 In-Reply-To: <1368797744-13737-2-git-send-email-oliver+list@schinagl.nl> References: <1368797744-13737-1-git-send-email-oliver+list@schinagl.nl> <1368797744-13737-2-git-send-email-oliver+list@schinagl.nl> Date: Thu, 23 May 2013 09:56:46 +0200 Message-ID: Subject: Re: [PATCH 1/2] Initial support for Allwinner's Security ID fuses From: Linus Walleij To: Oliver Schinagl Cc: Maxime Ripard , Arnd Bergmann , Greg KH , Oliver Schinagl , "linux-kernel@vger.kernel.org" , "linux-arm-kernel@lists.infradead.org" Content-Type: text/plain; charset=ISO-8859-1 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, May 17, 2013 at 3:35 PM, Oliver Schinagl wrote: (...) > While initially these fuses are used to somewhat determin the chipID, these > appear to be writeable by the user and thus can be used for other purpouses. > For example storing a 128 bit root key, a unique serial number, which could > then even be used as a MAC address. (...) Then follows some code to read out the keys from sysfs I guess.. > +static int __init sid_probe(struct platform_device *pdev) It's really simple to actually make the kernel use this to seed the entropy pool. #include add_device_randomness(u8 *, num); If you know after probe that you can read out a number of bytes of device-unique data, I think you should add those bytes to the entropy pool like this. Yours, Linus Walleij