Hi,
On Thu, 30 May 2024 at 09:17, Tim Harvey wrote:
>
> On Wed, May 29, 2024 at 6:39 PM Marek Vasut wrote:
> >
> > On 5/29/24 7:05 PM, Simon Glass wrote:
> >
> > [...]
> >
> > that is not yet implemented as DM_RNG. We also skip this if
> > MEASURED_BOOT is enabled as in that case any
On Wed, May 29, 2024 at 6:39 PM Marek Vasut wrote:
>
> On 5/29/24 7:05 PM, Simon Glass wrote:
>
> [...]
>
> that is not yet implemented as DM_RNG. We also skip this if
> MEASURED_BOOT is enabled as in that case any modifications to the
> dt will cause measured boot to fail
On 5/29/24 7:05 PM, Simon Glass wrote:
[...]
that is not yet implemented as DM_RNG. We also skip this if
MEASURED_BOOT is enabled as in that case any modifications to the
dt will cause measured boot to fail (although there are many other
places the dt is altered).
As this fdt node is added
Hi Tim,
On Wed, 29 May 2024 at 10:51, Tim Harvey wrote:
>
> On Wed, May 29, 2024 at 9:30 AM Simon Glass wrote:
> >
> > Hi Tim,
> >
> > On Sat, 25 May 2024 at 14:02, Tim Harvey wrote:
> > >
> > > If RANDOMIZE_BASE is enabled in the Linux kernel instructing it to
> > > randomize the virtual
On Wed, May 29, 2024 at 9:30 AM Simon Glass wrote:
>
> Hi Tim,
>
> On Sat, 25 May 2024 at 14:02, Tim Harvey wrote:
> >
> > If RANDOMIZE_BASE is enabled in the Linux kernel instructing it to
> > randomize the virtual address at which the kernel image is loaded, it
> > expects entropy to be
Hi Tim,
On Sat, 25 May 2024 at 14:02, Tim Harvey wrote:
>
> If RANDOMIZE_BASE is enabled in the Linux kernel instructing it to
> randomize the virtual address at which the kernel image is loaded, it
> expects entropy to be provided by the bootloader by populating
> /chosen/kaslr-seed with a
On Mon, May 27, 2024 at 1:30 AM Michal Simek wrote:
>
>
>
> On 5/25/24 22:02, Tim Harvey wrote:
> > If RANDOMIZE_BASE is enabled in the Linux kernel instructing it to
> > randomize the virtual address at which the kernel image is loaded, it
> > expects entropy to be provided by the bootloader by
On 5/25/24 22:02, Tim Harvey wrote:
If RANDOMIZE_BASE is enabled in the Linux kernel instructing it to
randomize the virtual address at which the kernel image is loaded, it
expects entropy to be provided by the bootloader by populating
/chosen/kaslr-seed with a 64-bit value from source of
If RANDOMIZE_BASE is enabled in the Linux kernel instructing it to
randomize the virtual address at which the kernel image is loaded, it
expects entropy to be provided by the bootloader by populating
/chosen/kaslr-seed with a 64-bit value from source of entropy at boot.
If we have DM_RNG enabled
9 matches
Mail list logo