Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932871AbeALCcA (ORCPT + 1 other); Thu, 11 Jan 2018 21:32:00 -0500 Received: from mx1.redhat.com ([209.132.183.28]:60496 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932538AbeALCb7 (ORCPT ); Thu, 11 Jan 2018 21:31:59 -0500 Date: Fri, 12 Jan 2018 10:31:52 +0800 From: Baoquan He To: Kees Cook Cc: Luiz Capitulino , Chao Fan , LKML , X86 ML , "H. Peter Anvin" , Thomas Gleixner , Ingo Molnar , yasu.isimatu@gmail.com, indou.takao@jp.fujitsu.com, caoj.fnst@cn.fujitsu.com, Dou Liyang Subject: Re: KASLR may break some kernel features (was Re: [PATCH v5 1/4] kaslr: add immovable_mem=nn[KMG]@ss[KMG] to specify extracting memory) Message-ID: <20180112023152.GB9648@localhost.localdomain> References: <20180104080219.23893-1-fanc.fnst@cn.fujitsu.com> <20180104080219.23893-2-fanc.fnst@cn.fujitsu.com> <20180104103057.GC7235@x1> <20180104112104.67b88e2d@redhat.com> <20180111090006.GA9648@localhost.localdomain> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.9.1 (2017-09-22) X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.26]); Fri, 12 Jan 2018 02:31:59 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Return-Path: On 01/11/18 at 10:04am, Kees Cook wrote: > On Thu, Jan 11, 2018 at 1:00 AM, Baoquan He wrote: > > Hi Luiz, > > > > On 01/04/18 at 11:21am, Luiz Capitulino wrote: > >> Having a generic kaslr parameter to control where the kernel is extracted > >> is one solution for this problem. > >> > >> The general problem statement is that KASLR may break some kernel features > >> depending on where the kernel is extracted. Two examples are hot-plugged > >> memory (this series) and 1GB HugeTLB pages. > >> > >> The 1GB HugeTLB page issue is not specific to KVM guests. It just happens > >> that there's a bunch of people running guests with up to 5GB of memory and > >> with that amount of memory you have one or two 1GB pages and is easier for > >> KASLR to extract the kernel into a 1GB region and split a 1GB page. So, > >> you may not get any 1GB pages at all when this happens. However, I can also > >> reproduce this on bare-metal with lots of memory where I can loose a 1GB > >> page from time to time. > >> > >> Having a kaslr_range= parameter solves both issues, but two major drawbacks > >> is that it breaks existing setups and I guess users will have a very hard > >> time choosing good ranges. > >> > >> Another idea would be to have a CONFIG_KASLR_RANGES, where each arch > >> could have a list of ranges known to contain holes and/or immovable > >> memory and only extract the kernel into those ranges. > > > > If add CONFIG_KASLR_RANGES, then a distro like RHEL will have this range > > always, whether people need hugetlb or not. > > > > So in this case, what range do we need to avoid? Only [1G, 2G]? > > Any ranges like that that need to be avoided should be known at build > time, so they should simply be added to the mem_avoid list that is > already present in the KASLR code... Seems KASLR doesn't have an solution which allow user to specify avoided range for kernel text KASLR stage only. The memmap="!#$" can add range to mem_avoid, while it will make them not added to e820. Here like this hugetlb case, Luiz wants kernel to avoid the [2G, 3G) candidate position for hugetlb allocation, meanwhile wants it to be added to mm subsystem later. Thanks Baoquan