[Query] ARM64 kaslr support - randomness, seeding and kdump
mark.rutland at arm.com
Wed Mar 14 11:24:48 PDT 2018
On Wed, Mar 14, 2018 at 11:10:53AM +0900, AKASHI Takahiro wrote:
> If kaslr-seed has a critical value in terms of security, is kexec-tools
> a right place? It is exposed to user space albeit for a short time of period.
The kernel zeroes the seed in the DT at boot time, so the current seed
isn't visible to userspace.
If kexec-tools generates a seed, and inserts it into the DTB that it
loads, this is only visible to kexec tools or other applications which
can inspect its memory, so I don't think this is much of a concern.
Anything with such privilege can presumably kexec() to arbitrary code
The next kernel will then zero its seed in the DT at boot time, so
similarly this won't be visible to userspace on the new kernel.
FWIW, having kexec tools generate a seed for the kexec_load() case makes
sense to me.
More information about the kexec