Lee, Chun-Yi
Lee, Chun-Yi
What I knew is that the check CA is for avoiding the limited space of NVRAM be wasted. Because the CA of kernel signkey maybe is already embedded in shim....
> > Which means you should not be able to kexec official kernel from non-official one, for example. The official kernels are signed by a key that passes the CA...
Hi, Baseo n the CI result, does that mean `printenv SOURCE_DATE_EPOCH || date +%s` command not be supported by azure-pipelines's shell? How can I debug it? On azure? Thanks a...
Thanks for Leif's suggestion. I will send a new push request.
> @joeyli No need to close the PR - you can simply force-push the new version to the branch the PR was created from. Thanks for your reminder! But I...
jonmason's patch works to me if I run 'export SOURCE_DATE_EPOCH=`date +%s`' before buliding RISC-V image.
> We should revert that change if it causes regresssions. Then, perhaps [@mikkorapeli-linaro](https://github.com/mikkorapeli-linaro) can help us find a solution that works with OpenEmbedded/yocto as well? I would prefer a solution...
I agree with mdkinney's solution: [BuildOptions] *_*_*_CC_FLAGS = -DBUILD_EPOCH=$(EDK_SOURCE_DATE_EPOCH) On Linux, I can expose EDK_SOURCE_DATE_EPOCH environment manually before building image: export EDK_SOURCE_DATE_EPOCH=date +%s