Received: by 2002:a4a:3008:0:0:0:0:0 with SMTP id q8-v6csp3623987oof; Mon, 10 Sep 2018 18:15:32 -0700 (PDT) X-Google-Smtp-Source: ANB0VdZqyeFyFCQ32P78mmHYxpWqLGFadAt7UhoP7kYel/hjtY87FE5aX5FyW+uT7U9AfPTZL8PE X-Received: by 2002:a63:8e4a:: with SMTP id k71-v6mr25422667pge.45.1536628532060; Mon, 10 Sep 2018 18:15:32 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1536628532; cv=none; d=google.com; s=arc-20160816; b=lNnWWikebTZgeXeIrXgt+Hq8pk1j/JuWAgI4ePLvR64nCLTyUfQOccG7bmW6kgIrak ELd1/cUjLakwjl1Re184PF4hSArEMGmNZlAcuK/3c2nACnq5N8XUPC7b6n/1yEsRZNBD 8LBQ+sYiKRS+uyHmuui3bfudwHr8q2FVtD6SRIn47F1gd04fJZcCmjnBhgKAhSzAvDjx L1WeDGeA+xaAYZ2EVLxHNvmj9g30YAuGtLprfKTSk+BGJSTmYQ65vvSeJLPlmDTH79z9 T5IzSPHbhcaQZ69dYcy6/3Zz1U8F3BkLBznNp8vgb62faa2tumxhVJAzGStZQIewyViA SGvg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=sJoHjuKXRJ5rCkR+JT+IWmeaq2OlbW2eYNIyzd9aDJ0=; b=YSwmWOLCasZ0Px29HqrZUcuJguet/7Nuqsr9RYLlpHriaWN2pGyENc/r0ti6gwlOQP veq+UymiYgXVxkPC/doGw3pB5BOfDx1YAYLhvKg19NXfcA8P9DeaGlM68ZuGtucbBUhS DiIWYZaZFPBWRo2EHcGn/7L6fazis7HKZwrTD6B5Bh3wFuyS7hTdjURBRNUBlVLPa8Z8 lk8vwdbxGZEC80hZVnCjBMD6q+d8P35CTmZPguxWqsJZbe+62ogs70GqdCZCQ2YSUPLT dtyLBuEJ5ZuZDjtA7CnCDWOKlsfjMHh0x3qMShSKPBVlJtExYRRYHA/Z91ur6eCgBqgB ozKQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id p66-v6si18803426pfp.237.2018.09.10.18.15.16; Mon, 10 Sep 2018 18:15:32 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726556AbeIKGKj (ORCPT + 99 others); Tue, 11 Sep 2018 02:10:39 -0400 Received: from mail.cn.fujitsu.com ([183.91.158.132]:2243 "EHLO heian.cn.fujitsu.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726244AbeIKGKi (ORCPT ); Tue, 11 Sep 2018 02:10:38 -0400 X-IronPort-AV: E=Sophos;i="5.43,368,1503331200"; d="scan'208";a="44748684" Received: from unknown (HELO cn.fujitsu.com) ([10.167.33.5]) by heian.cn.fujitsu.com with ESMTP; 11 Sep 2018 09:13:54 +0800 Received: from G08CNEXCHPEKD01.g08.fujitsu.local (unknown [10.167.33.80]) by cn.fujitsu.com (Postfix) with ESMTP id 542944B6EC75; Tue, 11 Sep 2018 09:13:52 +0800 (CST) Received: from localhost.localdomain (10.167.225.56) by G08CNEXCHPEKD01.g08.fujitsu.local (10.167.33.89) with Microsoft SMTP Server (TLS) id 14.3.408.0; Tue, 11 Sep 2018 09:13:56 +0800 Date: Tue, 11 Sep 2018 09:13:31 +0800 From: Chao Fan To: , , , , , , , CC: , , Subject: Re: [PATCH v6 0/3] x86/boot/KASLR: Parse ACPI table and limit kaslr in immovable memory. Message-ID: <20180911011331.GB8519@localhost.localdomain> References: <20180910124015.18073-1-fanc.fnst@cn.fujitsu.com> MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Disposition: inline In-Reply-To: <20180910124015.18073-1-fanc.fnst@cn.fujitsu.com> User-Agent: Mutt/1.10.1 (2018-07-13) X-Originating-IP: [10.167.225.56] X-yoursite-MailScanner-ID: 542944B6EC75.AA3F4 X-yoursite-MailScanner: Found to be clean X-yoursite-MailScanner-From: fanc.fnst@cn.fujitsu.com X-Spam-Status: No Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org sorry, the cover letter forwand to rafael. Thanks, Chao Fan On Mon, Sep 10, 2018 at 08:40:12PM +0800, Chao Fan wrote: >***Background: >People reported that kaslr may randomly chooses some positions >which are located in movable memory regions. This will break memory >hotplug feature and make the movable memory chosen by KASLR can't be >removed. > >***Solutions: >There should be a method to limit kaslr to choosing immovable memory >regions, so there are 2 solutions: >1) Add a kernel parameter to specify the memory regions. >2) Get the information of memory hot-remove, then kaslr will know the > right regions. >In method 2, information about memory hot-remove is in ACPI >tables, which will be parsed after start_kernel(), kaslr can't get >the information. >In method 1, users should know the regions address and specify in >kernel parameter. > >In the earliest time, I tried to dig ACPI tabls to solve this problem. >But I didn't splite the code in 'compressed/' and ACPI code, so the patch >is hard to follow so refused by community. >Somebody suggest to add a kernel parameter to specify the >immovable memory so that limit kaslr in these regions. Then I make >a new patchset. After several versions, Ingo gave a suggestion: >https://www.mail-archive.com/linux-kernel@vger.kernel.org/msg1634024.html >Follow Ingo's suggestion, imitate the ACPI code to parse the acpi >tables, so that the kaslr can get necessary memory information in >ACPI tables. >I think ACPI code is an independent part, so copy the codes >and functions to 'compressed/' directory, so that kaslr won't >influence the initialization of ACPI. > >PATCH 1/3 Add acpitb.c to provide functions to parse ACPI code. >PATCH 2/3 If CONFIG_MEMORY_HOTREMOVE enabled, walk all nodes and > store the information of immovable memory regions. >PATCH 3/3 According to the immovable memory regions, filter the > immovable regions which KASLR can choose. > >***Test results: > - I did a very simple test, and it can get the memory information in > bios and efi KVM guest machine, and put it by early printk. But no > more tests, so it's with RFC tag. > >v1->v2: > - Simplify some code. >Follow Baoquan He's suggestion: > - Reuse the head file of acpi code. > >v2->v3: > - Test in more conditions, so remove the 'RFC' tag. > - Change some comments. > >v3->v4: >Follow Thomas Gleixner's suggetsion: > - Put the whole efi related function into #define CONFIG_EFI and return > false in the other stub. > - Simplify two functions in head file. > >v4->v5: >Follow Dou Liyang's suggestion: > - Add more comments about some functions based on kernel code. > - Change some typo in comments. > - Clean useless variable. > - Add check for the boundary of array. > - Add check for 'movable_node' parameter > >v5->v6: >Follow Baoquan He's suggestion: > - Change some log. > - Add the check for acpi_rsdp > - Change some code logical to make code clear > >Any comments will be welcome. > > >Chao Fan (3): > x86/boot: Add acpitb.c to parse acpi tables > x86/boot/KASLR: Walk srat tables to filter immovable memory > x86/boot/KASLR: Limit kaslr to choosing the immovable memory > > arch/x86/boot/compressed/Makefile | 4 + > arch/x86/boot/compressed/acpitb.c | 382 ++++++++++++++++++++++++++++++ > arch/x86/boot/compressed/kaslr.c | 76 +++++- > arch/x86/boot/compressed/misc.h | 8 + > 4 files changed, 459 insertions(+), 11 deletions(-) > create mode 100644 arch/x86/boot/compressed/acpitb.c > >-- >2.17.1 >