diff options
author | Ard Biesheuvel <ard.biesheuvel@linaro.org> | 2019-01-15 20:47:07 +0100 |
---|---|---|
committer | Will Deacon <will.deacon@arm.com> | 2019-01-16 12:00:46 +0000 |
commit | 1598ecda7b239e9232dda032bfddeed9d89fab6c (patch) | |
tree | 78c54037deb5db99e883d9981562b3c4b140bd5d /Makefile | |
parent | 2f97967503df8e45bc256a348b6f050abd2a38ed (diff) | |
download | linux-stable-1598ecda7b239e9232dda032bfddeed9d89fab6c.tar.gz linux-stable-1598ecda7b239e9232dda032bfddeed9d89fab6c.tar.bz2 linux-stable-1598ecda7b239e9232dda032bfddeed9d89fab6c.zip |
arm64: kaslr: ensure randomized quantities are clean to the PoC
kaslr_early_init() is called with the kernel mapped at its
link time offset, and if it returns with a non-zero offset,
the kernel is unmapped and remapped again at the randomized
offset.
During its execution, kaslr_early_init() also randomizes the
base of the module region and of the linear mapping of DRAM,
and sets two variables accordingly. However, since these
variables are assigned with the caches on, they may get lost
during the cache maintenance that occurs when unmapping and
remapping the kernel, so ensure that these values are cleaned
to the PoC.
Acked-by: Catalin Marinas <catalin.marinas@arm.com>
Fixes: f80fb3a3d508 ("arm64: add support for kernel ASLR")
Cc: <stable@vger.kernel.org> # v4.6+
Signed-off-by: Ard Biesheuvel <ard.biesheuvel@linaro.org>
Signed-off-by: Will Deacon <will.deacon@arm.com>
Diffstat (limited to 'Makefile')
0 files changed, 0 insertions, 0 deletions