On 3/10/26 12:54 PM, Simona Toaca (OSS) wrote:
From: Simona Toaca <[email protected]>

This patch series adds support for saving DDR training
data to non-volatile memory on iMX94 and iMX95 platforms.
The purpose is running DDR Quickboot flow on next reboot.

The process is as follows:
- OEI runs Training flow for the DDRPHY
- OEI saves the data from training to volatile memory
- U-Boot can then save it to non-volatile memory (e.g. SD)
- OEI loads the data from NVM at cold reboot and runs Quickboot flow

By skipping training, a much lower boot time is achieved.
How does this interact with authenticated boot ? I wonder if, in case the entire bootloader stack is authenticated, the attacker can tamper with the saved QB data (which do not seem to be authenticated) and cause bitflips to occur in DRAM, which could then allow them to bypass authentication in follow up stages which execute from DRAM ?

Are the QB data protected/authenticated in any way against tampering ?

Reply via email to