Searched hist:b9e34d14c954a9af21deb70acc4579b4494824fb (Results 1 – 2 of 2) sorted by relevance
| /rk3399_ARM-atf/plat/renesas/common/include/ |
| H A D | rcar_def.h | b9e34d14c954a9af21deb70acc4579b4494824fb Sun Jun 02 19:09:59 UTC 2024 Marek Vasut <marek.vasut+renesas@mailbox.org> feat(rcar3): populate kaslr-seed in next stage DT
The SCEG CC6.3S which contains TRNG is only accessible from secure world. Pull 8 random bytes out of the TRNG and pass them to the next stage via DT fragment as /chosen/kaslr-seed property, so Linux can use those random bytes to initialize KASLR in case it is compiled with CONFIG_RANDOMIZE_BASE .
Linux before this patch prints early on boot: KASLR disabled due to lack of seed
Linux after this patch prints early on boot: KASLR enabled
Signed-off-by: Marek Vasut <marek.vasut+renesas@mailbox.org> Change-Id: Ie05473e4e15d348febaca208247541e8a1532534
|
| /rk3399_ARM-atf/plat/renesas/rcar/ |
| H A D | bl2_plat_setup.c | b9e34d14c954a9af21deb70acc4579b4494824fb Sun Jun 02 19:09:59 UTC 2024 Marek Vasut <marek.vasut+renesas@mailbox.org> feat(rcar3): populate kaslr-seed in next stage DT
The SCEG CC6.3S which contains TRNG is only accessible from secure world. Pull 8 random bytes out of the TRNG and pass them to the next stage via DT fragment as /chosen/kaslr-seed property, so Linux can use those random bytes to initialize KASLR in case it is compiled with CONFIG_RANDOMIZE_BASE .
Linux before this patch prints early on boot: KASLR disabled due to lack of seed
Linux after this patch prints early on boot: KASLR enabled
Signed-off-by: Marek Vasut <marek.vasut+renesas@mailbox.org> Change-Id: Ie05473e4e15d348febaca208247541e8a1532534
|