Home
last modified time | relevance | path

Searched hist:b9e34d14c954a9af21deb70acc4579b4494824fb (Results 1 – 2 of 2) sorted by relevance

/rk3399_ARM-atf/plat/renesas/common/include/
H A Drcar_def.hb9e34d14c954a9af21deb70acc4579b4494824fb Sun Jun 02 19:09:59 UTC 2024 Marek Vasut <marek.vasut+renesas@mailbox.org> feat(rcar3): populate kaslr-seed in next stage DT

The SCEG CC6.3S which contains TRNG is only accessible from secure
world. Pull 8 random bytes out of the TRNG and pass them to the next
stage via DT fragment as /chosen/kaslr-seed property, so Linux can
use those random bytes to initialize KASLR in case it is compiled
with CONFIG_RANDOMIZE_BASE .

Linux before this patch prints early on boot:
KASLR disabled due to lack of seed

Linux after this patch prints early on boot:
KASLR enabled

Signed-off-by: Marek Vasut <marek.vasut+renesas@mailbox.org>
Change-Id: Ie05473e4e15d348febaca208247541e8a1532534
/rk3399_ARM-atf/plat/renesas/rcar/
H A Dbl2_plat_setup.cb9e34d14c954a9af21deb70acc4579b4494824fb Sun Jun 02 19:09:59 UTC 2024 Marek Vasut <marek.vasut+renesas@mailbox.org> feat(rcar3): populate kaslr-seed in next stage DT

The SCEG CC6.3S which contains TRNG is only accessible from secure
world. Pull 8 random bytes out of the TRNG and pass them to the next
stage via DT fragment as /chosen/kaslr-seed property, so Linux can
use those random bytes to initialize KASLR in case it is compiled
with CONFIG_RANDOMIZE_BASE .

Linux before this patch prints early on boot:
KASLR disabled due to lack of seed

Linux after this patch prints early on boot:
KASLR enabled

Signed-off-by: Marek Vasut <marek.vasut+renesas@mailbox.org>
Change-Id: Ie05473e4e15d348febaca208247541e8a1532534