Ard Biesheuvel
4de18b705d
UPSTREAM: arm64: efi: invoke EFI_RNG_PROTOCOL to supply KASLR randomness
...
Since arm64 does not use a decompressor that supplies an execution
environment where it is feasible to some extent to provide a source of
randomness, the arm64 KASLR kernel depends on the bootloader to supply
some random bits in the /chosen/kaslr-seed DT property upon kernel entry.
On UEFI systems, we can use the EFI_RNG_PROTOCOL, if supplied, to obtain
some random bits. At the same time, use it to randomize the offset of the
kernel Image in physical memory.
Reviewed-by: Matt Fleming <matt@codeblueprint.co.uk >
Signed-off-by: Ard Biesheuvel <ard.biesheuvel@linaro.org >
Signed-off-by: Catalin Marinas <catalin.marinas@arm.com >
Bug: 30369029
Patchset: kaslr-arm64-4.4
(cherry picked from commit 2b5fe07a78 )
Signed-off-by: Jeff Vander Stoep <jeffv@google.com >
Change-Id: I9cb7ae5727dfdf3726b1c9544bce74722ec77bbd
2016-09-22 13:38:22 -07:00
..
2016-01-08 01:01:41 +01:00
2016-07-18 22:21:12 +00:00
2015-12-07 10:25:57 -05:00
2015-10-12 19:56:27 -07:00
2016-06-28 10:30:33 -07:00
2015-12-28 13:07:09 -07:00
2015-11-10 18:11:41 -08:00
2015-12-22 11:42:30 -08:00
2016-05-26 23:53:27 +05:30
2015-12-12 16:43:44 -08:00
2015-12-10 19:37:18 +01:00
2016-01-04 21:46:45 -05:00
2016-09-09 15:15:38 -07:00
2016-09-08 17:07:42 -07:00
2015-12-05 10:46:44 -08:00
2015-10-02 11:05:58 +09:00
2016-01-07 11:09:36 +05:30
2016-02-16 13:53:25 -08:00
2015-11-06 14:22:15 -08:00
2015-10-26 14:48:22 +00:00
2015-11-11 10:21:34 -08:00
2016-09-22 13:38:22 -07:00
2015-11-24 15:25:46 -08:00
2015-12-17 15:48:29 +01:00
2016-01-07 17:18:45 +10:00
2016-09-08 16:36:18 +00:00
2015-10-30 16:10:40 +01:00
2015-11-04 16:24:33 +01:00
2015-12-18 08:19:52 -08:00
2015-11-13 20:04:17 -08:00
2015-12-19 12:00:37 +01:00
2015-11-06 17:50:42 -08:00
2015-11-21 18:24:44 +00:00
2015-12-28 11:45:54 -05:00
2016-09-20 17:39:47 +00:00
2016-01-07 13:36:41 +01:00
2015-12-01 22:50:16 +01:00
2015-12-15 13:24:21 -05:00
2015-11-05 13:15:12 -08:00
2015-12-29 08:28:32 -07:00
2015-10-15 20:31:59 +11:00
2015-11-04 14:03:04 +05:30
2015-10-29 09:02:16 +09:00
2016-08-25 15:59:13 +00:00
2016-09-01 16:08:12 -07:00
2015-12-16 00:16:58 +01:00
2015-11-12 07:06:18 -05:00
2015-11-06 14:22:15 -08:00
2016-08-03 15:45:47 -07:00
2016-09-06 17:43:28 +00:00
2016-02-16 13:51:01 -08:00
2016-09-20 10:38:01 -07:00
2015-11-10 18:11:41 -08:00
2015-11-08 16:24:43 -05:00
2015-11-12 09:55:23 -08:00
2015-12-22 10:12:04 -07:00
2015-10-12 10:29:36 -07:00
2016-09-22 13:38:22 -07:00
2015-12-12 16:07:25 +01:00
2016-01-09 14:44:44 -08:00
2015-10-05 04:47:09 +01:00
2015-11-04 14:47:13 -08:00
2015-12-07 18:44:02 +05:30
2015-12-14 11:31:20 +01:00
2016-02-16 13:54:22 -08:00
2016-02-16 13:53:37 -08:00
2015-12-12 02:31:11 +01:00
2015-10-01 09:59:16 -07:00
2015-11-11 09:16:10 -08:00
2015-11-05 13:15:12 -08:00
2015-11-26 17:44:28 +02:00
2016-02-16 13:54:18 -08:00
2015-12-22 15:43:18 -08:00
2016-09-06 17:43:28 +00:00
2015-11-17 02:12:46 +09:00
2015-11-25 23:48:12 +01:00
2015-12-16 13:28:32 +00:00
2015-11-04 22:15:15 -08:00
2015-10-28 21:05:21 +02:00
2016-09-20 12:54:48 -07:00
2015-11-28 21:23:13 -08:00
2015-11-23 16:38:40 -08:00
2016-09-07 21:25:35 +00:00
2015-10-04 12:32:25 +01:00
2016-09-16 19:50:06 +00:00
2015-11-04 21:50:37 -08:00
2015-12-04 08:38:42 -07:00
2015-12-07 17:28:10 +02:00
2016-03-03 09:30:33 -08:00
2015-12-07 17:28:11 +02:00
2015-11-04 22:15:15 -08:00
2016-02-16 13:54:18 -08:00
2015-11-23 09:00:09 +01:00
2015-12-18 12:24:52 -08:00
2016-04-20 10:38:12 -07:00
2016-04-20 10:38:12 -07:00