Hi Mark,
On Wed, Apr 18, 2018 at 5:22 PM, Mark Rutland wrote:
> On Sun, Apr 15, 2018 at 01:44:16AM +0530, Bhupesh Sharma wrote:
>> 4. Accordingly, I wanted to get opinions on whether arm64 timer count is a
>> good
>> entropy source on platforms which indeed support
Hello Akashi,
On Tue, Apr 17, 2018 at 12:35 AM, Bhupesh Sharma wrote:
> Hello Akashi,
>
> Thanks for the review comments.
>
> On Mon, Apr 16, 2018 at 8:00 AM, AKASHI Takahiro
> wrote:
>> Bhupesh,
>>
>> On Sun, Apr 15, 2018 at 01:49:40AM +0530,
On Tue, Apr 17, 2018 at 10:47 AM, Dave Young wrote:
> On 04/16/18 at 08:39pm, Bhupesh Sharma wrote:
>> Hi Dave,
>>
>> On Mon, Apr 16, 2018 at 1:43 PM, Dave Young wrote:
>> > Hi Bhupesh,
>> >
>> > On 04/03/18 at 07:28pm, Bhupesh Sharma wrote:
>> >> Hi James,
>>> On 23.04.18 at 12:25, wrote:
> On Mon, Apr 23, 2018 at 12:55:45AM -0600, Jan Beulich wrote:
>> >>> On 20.04.18 at 21:12, wrote:
>> > Two options for signature verification in Xen
>> >
>> > This proposal outlines two options under
At several occasions it would be useful to dump the fdt
blob being passed to the second (kexec/kdump) kernel
when '-d' flag is specified while invoking kexec/kdump.
This allows one to look at the device-tree fields that
is being passed to the secondary kernel and accordingly
debug issues.
This
Since during the arm64 kexec_load()/kdump invocation,
the dtb is passed to the second kernel, it is sometimes useful
to dump the dtb contents (to verify the correctness
of the same).
This patch adds this feature which is enabled when '-d' flag is
used with kexec command line invocation.
Changes since v1:
- v1 can be viewed here:
http://lists.infradead.org/pipermail/kexec/2018-April/020407.html
- No functional changes: Just added a cover letter to explain the
background better and also capture some details on where I found this
patchset handy. Also added
On Mon, Apr 23, 2018 at 12:55:45AM -0600, Jan Beulich wrote:
> >>> On 20.04.18 at 21:12, wrote:
> > Two options for signature verification in Xen
> >
> > This proposal outlines two options under consideration for enhancing
> > Xen to support signature verification of
>>> On 20.04.18 at 21:12, wrote:
> Two options for signature verification in Xen
>
> This proposal outlines two options under consideration for enhancing
> Xen to support signature verification of kexec loaded images. The
> first option is essentially to mirror Linux