Received: by 2002:a25:ad19:0:0:0:0:0 with SMTP id y25csp4560919ybi; Tue, 30 Jul 2019 04:15:23 -0700 (PDT) X-Google-Smtp-Source: APXvYqx9hey/Rr2gdhVoOQ2KyI263AwWfX5+1MB9I6HXf0QZH8dLWoBKWRnC/giKCCRgfhDnVgGf X-Received: by 2002:a63:5920:: with SMTP id n32mr104698509pgb.352.1564485322671; Tue, 30 Jul 2019 04:15:22 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1564485322; cv=none; d=google.com; s=arc-20160816; b=YKIEPT+I3yjsoOEidC2i+79tcJ6/CJ3tNhM2mD8BPGjMEwN7p5c3KVt/ePksPdmmzy WI19dNM71QLHjzgLVv8swlkbe0y4g4qlzJ66rjgD6VjZeDe9Dn4rWxRNjkF3AbML87wD c9KxiCZm1YHiZUK5m/n0Mm0ufQTy7mFxbdy0qGmoo4vXw2iWROdt5k3n5xg5pEwtQ35Y mwoHscnlAJf01BcGJJUPEDf3HM5SQSLc78jV9+3pur4yk3WfknB3nbUjA6adBsLkqaTZ 3L3/8Nw2QznfbDJjxo/ABoTz4aNuYosksI5iEElqP0fKNVRAWuzVkX8VYsarNPSwPmSM Fajg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:dkim-signature; bh=MUkkUg/neBJwuToQkIgmMNBNZtebcs1oggovJrMzfXQ=; b=qpFMccYFV1rsym8/IkRhc+M3CqZSszI+d6RSHp+hD1hnPX73xahoA8MvepwkRx7Vaw gSFUklmiXPBfUyGiIFF9JNDFJz04coDGjdyao6MbnbusDKcXnhgeH3cW7qa7EeR56937 HPMU3VKU/qK0KSfkpqbmgu9yQzEOPCMYJ4bTDKXJrCh4RA7LO9alNe4TYosT2yPcIBNe CigywgcELm400x6AhUApaQiO9nC92SYEhZgi3LAY6+XXcEVYn2Vggizs2f2bMnmCb5I1 7pk54+S+mxPkV3zNL/oqW+i7GKajOZc3r8+k7hOifw+ZP4ksV/9ayuGUOSrOMrP0iAAl MbMQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@c-s.fr header.s=mail header.b=IxoOOtWa; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id i36si26253978plb.365.2019.07.30.04.15.08; Tue, 30 Jul 2019 04:15:22 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@c-s.fr header.s=mail header.b=IxoOOtWa; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730957AbfG3Je1 (ORCPT + 99 others); Tue, 30 Jul 2019 05:34:27 -0400 Received: from pegase1.c-s.fr ([93.17.236.30]:8708 "EHLO pegase1.c-s.fr" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728269AbfG3Je1 (ORCPT ); Tue, 30 Jul 2019 05:34:27 -0400 Received: from localhost (mailhub1-int [192.168.12.234]) by localhost (Postfix) with ESMTP id 45yWbh2wSVz9v9MB; Tue, 30 Jul 2019 11:34:24 +0200 (CEST) Authentication-Results: localhost; dkim=pass reason="1024-bit key; insecure key" header.d=c-s.fr header.i=@c-s.fr header.b=IxoOOtWa; dkim-adsp=pass; dkim-atps=neutral X-Virus-Scanned: Debian amavisd-new at c-s.fr Received: from pegase1.c-s.fr ([192.168.12.234]) by localhost (pegase1.c-s.fr [192.168.12.234]) (amavisd-new, port 10024) with ESMTP id Dg-4lD7X1MXi; Tue, 30 Jul 2019 11:34:24 +0200 (CEST) Received: from messagerie.si.c-s.fr (messagerie.si.c-s.fr [192.168.25.192]) by pegase1.c-s.fr (Postfix) with ESMTP id 45yWbh1pPmz9v9Lm; Tue, 30 Jul 2019 11:34:24 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=c-s.fr; s=mail; t=1564479264; bh=MUkkUg/neBJwuToQkIgmMNBNZtebcs1oggovJrMzfXQ=; h=Subject:To:Cc:References:From:Date:In-Reply-To:From; b=IxoOOtWan0MoBdT7slKbIPpZHvm3872NuH7OGPkTjhFsJnQlAtqBkon/PqBuWiT9A uEkDHPbC+tcJxndas0gto5JQyUjKLmZcbtqhz99eBA4oXZRtAiYqKfV1lfKecNVQBt 4/NAe+BeLhsixBUwZGGHS5iNSF6St2Q7cRQLwjf0= Received: from localhost (localhost [127.0.0.1]) by messagerie.si.c-s.fr (Postfix) with ESMTP id 5F4AA8B800; Tue, 30 Jul 2019 11:34:25 +0200 (CEST) X-Virus-Scanned: amavisd-new at c-s.fr Received: from messagerie.si.c-s.fr ([127.0.0.1]) by localhost (messagerie.si.c-s.fr [127.0.0.1]) (amavisd-new, port 10023) with ESMTP id Kb4-rX279cTJ; Tue, 30 Jul 2019 11:34:25 +0200 (CEST) Received: from [172.25.230.101] (po15451.idsi0.si.c-s.fr [172.25.230.101]) by messagerie.si.c-s.fr (Postfix) with ESMTP id 1DCA98B74F; Tue, 30 Jul 2019 11:34:25 +0200 (CEST) Subject: Re: [PATCH v2 06/10] powerpc/fsl_booke/32: implement KASLR infrastructure To: Jason Yan , mpe@ellerman.id.au, linuxppc-dev@lists.ozlabs.org, diana.craciun@nxp.com, benh@kernel.crashing.org, paulus@samba.org, npiggin@gmail.com, keescook@chromium.org, kernel-hardening@lists.openwall.com Cc: linux-kernel@vger.kernel.org, wangkefeng.wang@huawei.com, yebin10@huawei.com, thunder.leizhen@huawei.com, jingxiangfeng@huawei.com, fanchengyang@huawei.com, zhaohongjiang@huawei.com References: <20190730074225.39544-1-yanaijie@huawei.com> <20190730074225.39544-7-yanaijie@huawei.com> From: Christophe Leroy Message-ID: Date: Tue, 30 Jul 2019 11:34:25 +0200 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:60.0) Gecko/20100101 Thunderbird/60.8.0 MIME-Version: 1.0 In-Reply-To: <20190730074225.39544-7-yanaijie@huawei.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: fr Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Le 30/07/2019 à 09:42, Jason Yan a écrit : > This patch add support to boot kernel from places other than KERNELBASE. > Since CONFIG_RELOCATABLE has already supported, what we need to do is > map or copy kernel to a proper place and relocate. Freescale Book-E > parts expect lowmem to be mapped by fixed TLB entries(TLB1). The TLB1 > entries are not suitable to map the kernel directly in a randomized > region, so we chose to copy the kernel to a proper place and restart to > relocate. > > The offset of the kernel was not randomized yet(a fixed 64M is set). We > will randomize it in the next patch. > > Signed-off-by: Jason Yan > Cc: Diana Craciun > Cc: Michael Ellerman > Cc: Christophe Leroy > Cc: Benjamin Herrenschmidt > Cc: Paul Mackerras > Cc: Nicholas Piggin > Cc: Kees Cook > --- > arch/powerpc/Kconfig | 11 +++ > arch/powerpc/kernel/Makefile | 1 + > arch/powerpc/kernel/early_32.c | 2 +- > arch/powerpc/kernel/fsl_booke_entry_mapping.S | 13 ++- > arch/powerpc/kernel/head_fsl_booke.S | 15 +++- > arch/powerpc/kernel/kaslr_booke.c | 84 +++++++++++++++++++ > arch/powerpc/mm/mmu_decl.h | 6 ++ > arch/powerpc/mm/nohash/fsl_booke.c | 7 +- > 8 files changed, 126 insertions(+), 13 deletions(-) > create mode 100644 arch/powerpc/kernel/kaslr_booke.c > [...] > diff --git a/arch/powerpc/kernel/head_fsl_booke.S b/arch/powerpc/kernel/head_fsl_booke.S > index 2083382dd662..a466c0f0d028 100644 > --- a/arch/powerpc/kernel/head_fsl_booke.S > +++ b/arch/powerpc/kernel/head_fsl_booke.S > @@ -155,6 +155,8 @@ _ENTRY(_start); > */ > > _ENTRY(__early_start) > + LOAD_REG_ADDR_PIC(r20, kimage_vaddr) > + lwz r20,0(r20) > > #define ENTRY_MAPPING_BOOT_SETUP > #include "fsl_booke_entry_mapping.S" > @@ -277,8 +279,8 @@ set_ivor: > ori r6, r6, swapper_pg_dir@l > lis r5, abatron_pteptrs@h > ori r5, r5, abatron_pteptrs@l > - lis r4, KERNELBASE@h > - ori r4, r4, KERNELBASE@l > + lis r3, kimage_vaddr@ha > + lwz r4, kimage_vaddr@l(r3) > stw r5, 0(r4) /* Save abatron_pteptrs at a fixed location */ > stw r6, 0(r5) > > @@ -1067,7 +1069,14 @@ __secondary_start: > mr r5,r25 /* phys kernel start */ > rlwinm r5,r5,0,~0x3ffffff /* aligned 64M */ > subf r4,r5,r4 /* memstart_addr - phys kernel start */ > - li r5,0 /* no device tree */ > +#ifdef CONFIG_RANDOMIZE_BASE Is that #ifdef really necessary ? Wouldn't it also work as expected when CONFIG_RANDOMIZE_BASE is not selected ? > + lis r7,KERNELBASE@h > + ori r7,r7,KERNELBASE@l > + cmpw r20,r7 /* if kimage_vaddr != KERNELBASE, randomized */ > + beq 2f > + li r4,0 > +#endif > +2: li r5,0 /* no device tree */ > li r6,0 /* not boot cpu */ > bl restore_to_as0 > > diff --git a/arch/powerpc/kernel/kaslr_booke.c b/arch/powerpc/kernel/kaslr_booke.c > new file mode 100644 > index 000000000000..960bce4aa8b9 > --- /dev/null > +++ b/arch/powerpc/kernel/kaslr_booke.c > @@ -0,0 +1,84 @@ > +// SPDX-License-Identifier: GPL-2.0-only > +/* > + * Copyright (C) 2019 Jason Yan > + * > + * This program is free software; you can redistribute it and/or modify > + * it under the terms of the GNU General Public License version 2 as > + * published by the Free Software Foundation. > + */ > + > +#include > +#include > +#include > +#include > +#include > +#include > +#include > +#include > +#include > +#include > +#include > +#include > +#include > +#include > +#include > +#include > +#include > +#include > +#include > +#include > +#include > +#include > +#include > +#include > +#include > +#include > +#include > +#include > + > +extern int is_second_reloc; Couldn't the above be a bool ? > + > +static unsigned long __init kaslr_choose_location(void *dt_ptr, phys_addr_t size, > + unsigned long kernel_sz) > +{ > + /* return a fixed offset of 64M for now */ > + return 0x4000000; 64 << 20 would maybe be more explicit than 0x4000000. Or return SZ_64M ? Christophe > +} > + > +/* > + * To see if we need to relocate the kernel to a random offset > + * void *dt_ptr - address of the device tree > + * phys_addr_t size - size of the first memory block > + */ > +notrace void __init kaslr_early_init(void *dt_ptr, phys_addr_t size) > +{ > + unsigned long tlb_virt; > + phys_addr_t tlb_phys; > + unsigned long offset; > + unsigned long kernel_sz; > + > + kernel_sz = (unsigned long)_end - KERNELBASE; > + > + offset = kaslr_choose_location(dt_ptr, size, kernel_sz); > + > + if (offset == 0) > + return; > + > + kimage_vaddr += offset; > + kernstart_addr += offset; > + > + is_second_reloc = 1; > + > + if (offset >= SZ_64M) { > + tlb_virt = round_down(kimage_vaddr, SZ_64M); > + tlb_phys = round_down(kernstart_addr, SZ_64M); > + > + /* Create kernel map to relocate in */ > + create_tlb_entry(tlb_phys, tlb_virt, 1); > + } > + > + /* Copy the kernel to it's new location and run */ > + memcpy((void *)kimage_vaddr, (void *)KERNELBASE, kernel_sz); > + > + reloc_kernel_entry(dt_ptr, kimage_vaddr); > +} > diff --git a/arch/powerpc/mm/mmu_decl.h b/arch/powerpc/mm/mmu_decl.h > index 804da298beb3..9332772c8a66 100644 > --- a/arch/powerpc/mm/mmu_decl.h > +++ b/arch/powerpc/mm/mmu_decl.h > @@ -148,6 +148,12 @@ void reloc_kernel_entry(void *fdt, int addr); > extern void loadcam_entry(unsigned int index); > extern void loadcam_multi(int first_idx, int num, int tmp_idx); > > +#ifdef CONFIG_RANDOMIZE_BASE > +void kaslr_early_init(void *dt_ptr, phys_addr_t size); > +#else > +static inline void kaslr_early_init(void *dt_ptr, phys_addr_t size) {} > +#endif > + > struct tlbcam { > u32 MAS0; > u32 MAS1; > diff --git a/arch/powerpc/mm/nohash/fsl_booke.c b/arch/powerpc/mm/nohash/fsl_booke.c > index 556e3cd52a35..8d25a8dc965f 100644 > --- a/arch/powerpc/mm/nohash/fsl_booke.c > +++ b/arch/powerpc/mm/nohash/fsl_booke.c > @@ -263,7 +263,8 @@ void setup_initial_memory_limit(phys_addr_t first_memblock_base, > int __initdata is_second_reloc; > notrace void __init relocate_init(u64 dt_ptr, phys_addr_t start) > { > - unsigned long base = KERNELBASE; > + unsigned long base = kimage_vaddr; > + phys_addr_t size; > > kernstart_addr = start; > if (is_second_reloc) { > @@ -291,7 +292,7 @@ notrace void __init relocate_init(u64 dt_ptr, phys_addr_t start) > start &= ~0x3ffffff; > base &= ~0x3ffffff; > virt_phys_offset = base - start; > - early_get_first_memblock_info(__va(dt_ptr), NULL); > + early_get_first_memblock_info(__va(dt_ptr), &size); > /* > * We now get the memstart_addr, then we should check if this > * address is the same as what the PAGE_OFFSET map to now. If > @@ -316,6 +317,8 @@ notrace void __init relocate_init(u64 dt_ptr, phys_addr_t start) > /* We should never reach here */ > panic("Relocation error"); > } > + > + kaslr_early_init(__va(dt_ptr), size); > } > #endif > #endif >