You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/secure-boot.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,8 +22,8 @@ Secure-boot uses cryptographic signing to ensure the OS kernel and all required
22
22
If any signature or hash verification fails, the current boot mode is aborted and the firmware advances to the next boot mode.
23
23
24
24
See also:-
25
-
* Secure boot BCM2711 [chain of trust diagram](docs/secure-boot-chain-of-trust-2711.pdf).
26
-
* Secure boot BCM2712 [chain of trust diagram](docs/secure-boot-chain-of-trust-2712.pdf).
25
+
* Secure boot BCM2711 [chain of trust diagram](secure-boot-chain-of-trust-2711.pdf).
26
+
* Secure boot BCM2712 [chain of trust diagram](secure-boot-chain-of-trust-2712.pdf).
27
27
28
28
## boot.img files
29
29
Secure-boot requires a self-contained ramdisk (`boot.img`) FAT image containing the GPU firmware, kernel and any other dependencies that would normally be loaded from the boot partition.
* Please see the [secure boot EEPROM guide](secure-boot-recovery/README.md) to enable via rpiboot `recovery.bin`.
73
-
* Please see the [secure boot MSD guide](mass-storage-gadget64/README.md) for instructions about how to mount the eMMC via USB mass-storage once secure-boot has been enabled.
72
+
* Please see the [secure boot EEPROM guide](../secure-boot-recovery/README.md) to enable via rpiboot `recovery.bin`.
73
+
* Please see the [secure boot MSD guide](../mass-storage-gadget64/README.md) for instructions about how to mount the eMMC via USB mass-storage once secure-boot has been enabled.
74
74
75
75
### Disk encryption
76
76
Secure-boot is responsible for loading the Kernel + initramfs and loads all of the data
0 commit comments