diff options
author | Ard Biesheuvel <ard.biesheuvel@linaro.org> | 2016-01-26 13:48:29 (GMT) |
---|---|---|
committer | Catalin Marinas <catalin.marinas@arm.com> | 2016-02-24 14:57:29 (GMT) |
commit | 2b5fe07a78a09a32002642b8a823428ade611f16 (patch) | |
tree | db8929655f2d9de7827d68fbfad1ea08d1cd0e29 /.gitignore | |
parent | 48fcb2d0216103d15306caa4814e2381104df6d8 (diff) | |
download | linux-2b5fe07a78a09a32002642b8a823428ade611f16.tar.xz |
arm64: efi: invoke EFI_RNG_PROTOCOL to supply KASLR randomness
Since arm64 does not use a decompressor that supplies an execution
environment where it is feasible to some extent to provide a source of
randomness, the arm64 KASLR kernel depends on the bootloader to supply
some random bits in the /chosen/kaslr-seed DT property upon kernel entry.
On UEFI systems, we can use the EFI_RNG_PROTOCOL, if supplied, to obtain
some random bits. At the same time, use it to randomize the offset of the
kernel Image in physical memory.
Reviewed-by: Matt Fleming <matt@codeblueprint.co.uk>
Signed-off-by: Ard Biesheuvel <ard.biesheuvel@linaro.org>
Signed-off-by: Catalin Marinas <catalin.marinas@arm.com>
Diffstat (limited to '.gitignore')
0 files changed, 0 insertions, 0 deletions