On Tue, May 21, 2024 at 11:59 AM Ilias Apalodimas
wrote:
>
> On Tue, 21 May 2024 at 21:05, Tim Harvey wrote:
> >
> > On Tue, May 21, 2024 at 10:29 AM Ilias Apalodimas
> > wrote:
> > >
> > > On Tue, 21 May 2024 at 20:06, Tim Harvey wrote:
> > > >
> > > > On Tue, May 21, 2024 at 9:54 AM Ilias Apa
On Tue, 21 May 2024 at 21:05, Tim Harvey wrote:
>
> On Tue, May 21, 2024 at 10:29 AM Ilias Apalodimas
> wrote:
> >
> > On Tue, 21 May 2024 at 20:06, Tim Harvey wrote:
> > >
> > > On Tue, May 21, 2024 at 9:54 AM Ilias Apalodimas
> > > wrote:
> > > >
> > > > Hi Tim,
> > > >
> > > > On Tue, 21 May
On Tue, May 21, 2024 at 10:29 AM Ilias Apalodimas
wrote:
>
> On Tue, 21 May 2024 at 20:06, Tim Harvey wrote:
> >
> > On Tue, May 21, 2024 at 9:54 AM Ilias Apalodimas
> > wrote:
> > >
> > > Hi Tim,
> > >
> > > On Tue, 21 May 2024 at 19:37, Tim Harvey wrote:
> > > >
> > > > On Tue, May 21, 2024 a
On Mon, May 20, 2024 at 09:37:21AM -0700, Tim Harvey wrote:
> On Mon, May 20, 2024 at 1:29 AM Michal Simek wrote:
> >
> > Hi Tim,
> >
> > On 5/16/24 17:58, Tim Harvey wrote:
> > > On Wed, May 15, 2024 at 1:50 PM Tim Harvey wrote:
> > >>
> > >> If RANDOMIZE_BASE is enabled in the Linux kernel inst
On Tue, 21 May 2024 at 20:06, Tim Harvey wrote:
>
> On Tue, May 21, 2024 at 9:54 AM Ilias Apalodimas
> wrote:
> >
> > Hi Tim,
> >
> > On Tue, 21 May 2024 at 19:37, Tim Harvey wrote:
> > >
> > > On Tue, May 21, 2024 at 5:05 AM Ilias Apalodimas
> > > wrote:
> > > >
> > > > Hi Tim
> > > >
> > > >
On Tue, May 21, 2024 at 9:54 AM Ilias Apalodimas
wrote:
>
> Hi Tim,
>
> On Tue, 21 May 2024 at 19:37, Tim Harvey wrote:
> >
> > On Tue, May 21, 2024 at 5:05 AM Ilias Apalodimas
> > wrote:
> > >
> > > Hi Tim
> > >
> > > On Wed, 15 May 2024 at 23:50, Tim Harvey wrote:
> > > >
> > > > If RANDOMIZE
Hi Tim,
On Tue, 21 May 2024 at 19:37, Tim Harvey wrote:
>
> On Tue, May 21, 2024 at 5:05 AM Ilias Apalodimas
> wrote:
> >
> > Hi Tim
> >
> > On Wed, 15 May 2024 at 23:50, Tim Harvey wrote:
> > >
> > > If RANDOMIZE_BASE is enabled in the Linux kernel instructing it to
> > > randomize the virtual
On Tue, May 21, 2024 at 5:05 AM Ilias Apalodimas
wrote:
>
> Hi Tim
>
> On Wed, 15 May 2024 at 23:50, Tim Harvey wrote:
> >
> > If RANDOMIZE_BASE is enabled in the Linux kernel instructing it to
> > randomize the virtual address at which the kernel image is loaded, it
> > expects entropy to be pro
Hi Tim
On Wed, 15 May 2024 at 23:50, Tim Harvey wrote:
>
> If RANDOMIZE_BASE is enabled in the Linux kernel instructing it to
> randomize the virtual address at which the kernel image is loaded, it
> expects entropy to be provided by the bootloader by populating
> /chosen/kaslr-seed with a 64-bit
On 5/20/24 18:37, Tim Harvey wrote:
On Mon, May 20, 2024 at 1:29 AM Michal Simek wrote:
Hi Tim,
On 5/16/24 17:58, Tim Harvey wrote:
On Wed, May 15, 2024 at 1:50 PM Tim Harvey wrote:
If RANDOMIZE_BASE is enabled in the Linux kernel instructing it to
randomize the virtual address at whic
On Mon, May 20, 2024 at 1:29 AM Michal Simek wrote:
>
> Hi Tim,
>
> On 5/16/24 17:58, Tim Harvey wrote:
> > On Wed, May 15, 2024 at 1:50 PM Tim Harvey wrote:
> >>
> >> If RANDOMIZE_BASE is enabled in the Linux kernel instructing it to
> >> randomize the virtual address at which the kernel image i
Hi Tim,
On 5/16/24 17:58, Tim Harvey wrote:
On Wed, May 15, 2024 at 1:50 PM Tim Harvey wrote:
If RANDOMIZE_BASE is enabled in the Linux kernel instructing it to
randomize the virtual address at which the kernel image is loaded, it
expects entropy to be provided by the bootloader by populating
On Thu, May 16, 2024 at 08:58:09AM -0700, Tim Harvey wrote:
> On Wed, May 15, 2024 at 1:50 PM Tim Harvey wrote:
> >
> > If RANDOMIZE_BASE is enabled in the Linux kernel instructing it to
> > randomize the virtual address at which the kernel image is loaded, it
> > expects entropy to be provided by
On Wed, May 15, 2024 at 1:50 PM Tim Harvey wrote:
>
> If RANDOMIZE_BASE is enabled in the Linux kernel instructing it to
> randomize the virtual address at which the kernel image is loaded, it
> expects entropy to be provided by the bootloader by populating
> /chosen/kaslr-seed with a 64-bit value
On 5/15/24 11:11 PM, Tim Harvey wrote:
On Wed, May 15, 2024 at 2:06 PM Marek Vasut wrote:
On 5/15/24 10:50 PM, Tim Harvey wrote:
[...]
diff --git a/boot/fdt_support.c b/boot/fdt_support.c
index 874ca4d6f5af..3455d60d69dc 100644
--- a/boot/fdt_support.c
+++ b/boot/fdt_support.c
@@ -8,6 +8,7
On Wed, May 15, 2024 at 2:06 PM Marek Vasut wrote:
>
> On 5/15/24 10:50 PM, Tim Harvey wrote:
>
> [...]
>
> > diff --git a/boot/fdt_support.c b/boot/fdt_support.c
> > index 874ca4d6f5af..3455d60d69dc 100644
> > --- a/boot/fdt_support.c
> > +++ b/boot/fdt_support.c
> > @@ -8,6 +8,7 @@
> >
> > #in
On 5/15/24 10:50 PM, Tim Harvey wrote:
[...]
diff --git a/boot/fdt_support.c b/boot/fdt_support.c
index 874ca4d6f5af..3455d60d69dc 100644
--- a/boot/fdt_support.c
+++ b/boot/fdt_support.c
@@ -8,6 +8,7 @@
#include
#include
+#include
#include
#include
#include
@@ -300,6 +301,1
If RANDOMIZE_BASE is enabled in the Linux kernel instructing it to
randomize the virtual address at which the kernel image is loaded, it
expects entropy to be provided by the bootloader by populating
/chosen/kaslr-seed with a 64-bit value from source of entropy at boot.
If we have DM_RNG enabled p
18 matches
Mail list logo