On Wed, Mar 14, 2018 at 11:10:53AM +0900, AKASHI Takahiro wrote: > If kaslr-seed has a critical value in terms of security, is kexec-tools > a right place? It is exposed to user space albeit for a short time of period. The kernel zeroes the seed in the DT at boot time, so the current seed isn't visible to userspace. If kexec-tools generates a seed, and inserts it into the DTB that it loads, this is only visible to kexec tools or other applications which can inspect its memory, so I don't think this is much of a concern. Anything with such privilege can presumably kexec() to arbitrary code anyhow. The next kernel will then zero its seed in the DT at boot time, so similarly this won't be visible to userspace on the new kernel. FWIW, having kexec tools generate a seed for the kexec_load() case makes sense to me. Thanks, Mark. _______________________________________________ kexec mailing list kexec@xxxxxxxxxxxxxxxxxxx http://lists.infradead.org/mailman/listinfo/kexec