Received: by 2002:a25:1985:0:0:0:0:0 with SMTP id 127csp599219ybz; Fri, 24 Apr 2020 06:09:41 -0700 (PDT) X-Google-Smtp-Source: APiQypLdl3YP8xf27FxAf2WT7OYgg46OnWi0scjSR8ixsrKnDZO7cC1B3Vtex3bKNadOB//7AqDT X-Received: by 2002:a05:6402:8ca:: with SMTP id d10mr6534130edz.167.1587733781749; Fri, 24 Apr 2020 06:09:41 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1587733781; cv=none; d=google.com; s=arc-20160816; b=aGUZgUVkGzoroyge+teO2vWpZRJV2VXRzHV+X8fmWZCgWgC7utLg4jm2B+8oV5V4jy rJV0mqAnu4fRg5f2UrLEXpSF91gXeSFI1H2A7EXwgpN7vXPsSKTohIq4dBYMqypw/YZI wDcQ0tXM39DgDzq5rP4BWSzRy6TauV43l+kZ3hqzZAMVa0Z0Q0eIiyrFhYymm/h4qF4e W45oc93UAF/G0/aMWFBDi4AiVgj2SBVZ3keDz6iDol+Pwofbs2WXqn2jhosifKHD8bAy 3uW8ZSvfa10DWd7J5YTP64cCgZ0PR1cOlbmrQRsz4pwW2Xsi7b3xgpb4lpUukQYYOd60 559Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:dkim-signature; bh=qV49epjD3DR/x6P35dAskYND0C6ev7NnRQdFAoVoH5A=; b=GBA/qZlhL7Qmc+7FRyIObOrzDU0vDXzbcuaeur9v0O7Wf2sUZVvKckyiuFjcci6O3e j/CM00YtMamaFkb4ItRwxiNd98dteSyWX++anpYRTf+IdIEpZoYsNt/fEVN/H9RsU3RC AkzgJpRS0HV5POcQAuDGMfsWBFtJ6m+swxq0ZY1uFt5Q2W4S7kYaHMwrG5ER9DcX0w+i ZHwEMohPEoQrNHeW4k1UrpA7g+hCoeMD31TVUyznsfe3eZW+HbRD99j+1ULixziTR51b NqiWFt0XSZ9AInpUWtR6vwBWxm3cVFBWD21JXVDHZqBJFsEg9MY/OVgcje7rKxznTUeB ffNQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=uaD36U46; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id j13si3127872edt.371.2020.04.24.06.09.11; Fri, 24 Apr 2020 06:09:41 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=uaD36U46; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727906AbgDXNHD (ORCPT + 99 others); Fri, 24 Apr 2020 09:07:03 -0400 Received: from mail.kernel.org ([198.145.29.99]:57676 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728124AbgDXNHA (ORCPT ); Fri, 24 Apr 2020 09:07:00 -0400 Received: from e123331-lin.home (amontpellier-657-1-18-247.w109-210.abo.wanadoo.fr [109.210.65.247]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 3DABF20776; Fri, 24 Apr 2020 13:06:58 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1587733620; bh=dv+ZaFhzeEqvKSGnInxiwWTt/ioK6J793NdZ5ogNnHw=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=uaD36U46EHROKfyL42WnWW2saO3W2GOheB+ccWVAlZWgwB7kWcLZ2wF6Zk6rYZcSU 7fctkjDj2iHGJ7xZSopyyjXj9JbLPN6bz+u0/dW93kyBRHsnz85/59ZgagZ2EZbkLL d+qQkZ35AcVW6tvnPcq1q1HV3RZ5eW4DPLntaabc= From: Ard Biesheuvel To: linux-efi@vger.kernel.org, Ingo Molnar , Thomas Gleixner Cc: Ard Biesheuvel , linux-kernel@vger.kernel.org, Arvind Sankar , Atish Patra , Palmer Dabbelt , Zou Wei Subject: [PATCH 22/33] efi/libstub/arm64: Simplify randomized loading of kernel image Date: Fri, 24 Apr 2020 15:05:20 +0200 Message-Id: <20200424130531.30518-23-ardb@kernel.org> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20200424130531.30518-1-ardb@kernel.org> References: <20200424130531.30518-1-ardb@kernel.org> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The KASLR code path in the arm64 version of the EFI stub incorporates some overly complicated logic to randomly allocate a region of the right alignment: there is no need to randomize the placement of the kernel modulo 2 MiB separately from the placement of the 2 MiB aligned allocation itself - we can simply follow the same logic used by the non-randomized placement, which is to allocate at the correct alignment, and only take TEXT_OFFSET into account if it is not a round multiple of the alignment. Signed-off-by: Ard Biesheuvel --- drivers/firmware/efi/libstub/arm64-stub.c | 32 ++++------------------- 1 file changed, 5 insertions(+), 27 deletions(-) diff --git a/drivers/firmware/efi/libstub/arm64-stub.c b/drivers/firmware/efi/libstub/arm64-stub.c index cfd535c13242..6fc3bd9a56db 100644 --- a/drivers/firmware/efi/libstub/arm64-stub.c +++ b/drivers/firmware/efi/libstub/arm64-stub.c @@ -52,7 +52,7 @@ efi_status_t handle_kernel_image(unsigned long *image_addr, { efi_status_t status; unsigned long kernel_size, kernel_memsize = 0; - u64 phys_seed = 0; + u32 phys_seed = 0; if (IS_ENABLED(CONFIG_RANDOMIZE_BASE)) { if (!nokaslr()) { @@ -74,36 +74,15 @@ efi_status_t handle_kernel_image(unsigned long *image_addr, kernel_size = _edata - _text; kernel_memsize = kernel_size + (_end - _edata); + *reserve_size = kernel_memsize + TEXT_OFFSET % min_kimg_align; if (IS_ENABLED(CONFIG_RANDOMIZE_BASE) && phys_seed != 0) { - /* - * Produce a displacement in the interval [0, MIN_KIMG_ALIGN) - * that doesn't violate this kernel's de-facto alignment - * constraints. - */ - u32 mask = (MIN_KIMG_ALIGN - 1) & ~(EFI_KIMG_ALIGN - 1); - u32 offset = (phys_seed >> 32) & mask; - - /* - * With CONFIG_RANDOMIZE_TEXT_OFFSET=y, TEXT_OFFSET may not - * be a multiple of EFI_KIMG_ALIGN, and we must ensure that - * we preserve the misalignment of 'offset' relative to - * EFI_KIMG_ALIGN so that statically allocated objects whose - * alignment exceeds PAGE_SIZE appear correctly aligned in - * memory. - */ - offset |= TEXT_OFFSET % EFI_KIMG_ALIGN; - /* * If KASLR is enabled, and we have some randomness available, * locate the kernel at a randomized offset in physical memory. */ - *reserve_size = kernel_memsize + offset; - status = efi_random_alloc(*reserve_size, - MIN_KIMG_ALIGN, reserve_addr, - (u32)phys_seed); - - *image_addr = *reserve_addr + offset; + status = efi_random_alloc(*reserve_size, min_kimg_align, + reserve_addr, phys_seed); } else { status = EFI_OUT_OF_RESOURCES; } @@ -119,7 +98,6 @@ efi_status_t handle_kernel_image(unsigned long *image_addr, return EFI_SUCCESS; } - *reserve_size = kernel_memsize + TEXT_OFFSET % min_kimg_align; status = efi_low_alloc(*reserve_size, min_kimg_align, reserve_addr); @@ -128,9 +106,9 @@ efi_status_t handle_kernel_image(unsigned long *image_addr, *reserve_size = 0; return status; } - *image_addr = *reserve_addr + TEXT_OFFSET % min_kimg_align; } + *image_addr = *reserve_addr + TEXT_OFFSET % min_kimg_align; memcpy((void *)*image_addr, _text, kernel_size); return EFI_SUCCESS; -- 2.17.1