Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp6095352imu; Wed, 30 Jan 2019 08:43:34 -0800 (PST) X-Google-Smtp-Source: ALg8bN7xFy7l65mssxQWbMRh+x6qurrHTlHs2Hbp1FfetkjQQ2r1oazAwbJ9ihWXPw7xsjpKJTQY X-Received: by 2002:a63:a002:: with SMTP id r2mr27827574pge.212.1548866614161; Wed, 30 Jan 2019 08:43:34 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1548866614; cv=none; d=google.com; s=arc-20160816; b=X9u0MrgKeOw+AZMUfq6TAdCJTyyVNSOT3Uiq2vEFHDKekpvGNVJCronp0vsXyVWofP 7kxqozNveEVELVFQ6tZhoCVCty+QuAOBAnVXUpqt2PKttF27yyPFRGEfV5Rdow+H0VOL K+UA4Fa9CFhgNL9GS66i5bGh1THoAml7OweI4lZ7bO5WjKQxgBnkB0S0U5R0+3ul31HX LaDz0axvmRmT0alcWT/NaP2gRljZm7Qpf9o29LaoS2PHO5LFPM8LLlhiDfTr27oKXB+j MTE3gGRQ1cs+IqtKZxsRhg9CShRtX2dGnrvtZUfAJeGQRqOb9IoqKU3uwkjzz7m4h6Pw ZLXA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from; bh=Z3huXevMFJ4vaNQXbBS0Evb9UpeGMYZf3bFL/Yzy/1E=; b=giqtqXskU9aO0ftQAGPkZzE1DOhhof8yLNs1aNaPoBkrmqIK0/r2Yy32dFFlsJMnm1 TLJ4bSNbpBqOJ+9D3qc2weWBApg8kF5WdNp432qk2V7R9TJp3wTX9TgHJ3ztl13ars7u A2Xd7wXgvZiYURFBDAP5R5fm2PGFPvqrhPAFB3snyW9Sgfh9RTExsR5zrreofXkyEeJh WLk2IdzPlYxDSfDomADEaVyGY/LPayOpGErraOFBK8SfnUdI81k7FGa60lvLDpa5xRmX PPeGZzdq9+q8QDs0gA7NORvIWGcx1SwO3/z832NW5iop/R/YwlH3j0TIwOOwrsZ0eUBk W40g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alien8.de Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id p4si1816173pga.514.2019.01.30.08.43.18; Wed, 30 Jan 2019 08:43:34 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alien8.de Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732057AbfA3Qkz (ORCPT + 99 others); Wed, 30 Jan 2019 11:40:55 -0500 Received: from smtp-fw-6002.amazon.com ([52.95.49.90]:27370 "EHLO smtp-fw-6002.amazon.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1732089AbfA3Qkv (ORCPT ); Wed, 30 Jan 2019 11:40:51 -0500 X-IronPort-AV: E=Sophos;i="5.56,541,1539648000"; d="scan'208";a="384274779" Received: from iad6-co-svc-p1-lb1-vlan3.amazon.com (HELO email-inbound-relay-1d-2c665b5d.us-east-1.amazon.com) ([10.124.125.6]) by smtp-border-fw-out-6002.iad6.amazon.com with ESMTP/TLS/DHE-RSA-AES256-SHA; 30 Jan 2019 16:40:49 +0000 Received: from u54ee758033e858cfa736 (iad7-ws-svc-lb50-vlan3.amazon.com [10.0.93.214]) by email-inbound-relay-1d-2c665b5d.us-east-1.amazon.com (8.14.7/8.14.7) with ESMTP id x0UGehEJ057109 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Wed, 30 Jan 2019 16:40:45 GMT Received: from u54ee758033e858cfa736.ant.amazon.com (localhost [127.0.0.1]) by u54ee758033e858cfa736 (8.15.2/8.15.2/Debian-3) with ESMTP id x0UGegQA013454; Wed, 30 Jan 2019 17:40:42 +0100 Received: (from jsteckli@localhost) by u54ee758033e858cfa736.ant.amazon.com (8.15.2/8.15.2/Submit) id x0UGefPX013451; Wed, 30 Jan 2019 17:40:41 +0100 From: Julian Stecklina To: x86@kernel.org Cc: Thomas Gleixner , Ingo Molnar , Borislav Petkov , hpa@zytor.com, linux-kernel@vger.kernel.org, jschoenh@amazon.de, Julian Stecklina Subject: [PATCH 2/2] x86/boot: increase maximum number of avoided KASLR regions Date: Wed, 30 Jan 2019 17:40:03 +0100 Message-Id: <1548866403-13390-2-git-send-email-js@alien8.de> X-Mailer: git-send-email 2.7.4 In-Reply-To: <1548866403-13390-1-git-send-email-js@alien8.de> References: <1548866403-13390-1-git-send-email-js@alien8.de> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Julian Stecklina The boot code has a limit of 4 "non-standard" regions to avoid for KASLR. This limit is easy to reach when supplying memmap= parameters to the kernel. In this case, KASLR would be disabled. Increase the limit to avoid turning off KASLR even when the user is heavily manipulating the memory map. Signed-off-by: Julian Stecklina --- arch/x86/boot/compressed/kaslr.c | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/arch/x86/boot/compressed/kaslr.c b/arch/x86/boot/compressed/kaslr.c index 5657e34..f078d60 100644 --- a/arch/x86/boot/compressed/kaslr.c +++ b/arch/x86/boot/compressed/kaslr.c @@ -92,8 +92,8 @@ struct mem_vector { unsigned long long size; }; -/* Only supporting at most 4 unusable memmap regions with kaslr */ -#define MAX_MEMMAP_REGIONS 4 +/* Only supporting at most this many unusable memmap regions with kaslr */ +#define MAX_MEMMAP_REGIONS 16 static bool memmap_too_large; @@ -213,7 +213,7 @@ static void mem_avoid_memmap(char *str) i++; } - /* More than 4 memmaps, fail kaslr */ + /* Can't store all regions, fail kaslr */ if ((i >= MAX_MEMMAP_REGIONS) && str) memmap_too_large = true; } -- 2.7.4