Received: by 2002:a05:6a10:a0d1:0:0:0:0 with SMTP id j17csp1798722pxa; Thu, 6 Aug 2020 16:40:28 -0700 (PDT) X-Google-Smtp-Source: ABdhPJytqV6JXei4Dbq8lvYdVRMSj6JYpcNBFkey4gtYAKcq3HxYP2PmGE9O2bh1/4QbjKmRoyWV X-Received: by 2002:aa7:c382:: with SMTP id k2mr6206044edq.249.1596757228555; Thu, 06 Aug 2020 16:40:28 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1596757228; cv=none; d=google.com; s=arc-20160816; b=d6NN0SP38FR49WP7cj/3g0k6c7W2+6QrGtwq7R5evdJ1Dy2RutC9ivqOKN00YfnNOq bMYy1UYfvBwI3DJu7N+LXwqCHQE6c4W3Mp7goaswZG7m8o/u9mqGxRT+3nJyckg0D5bW ktsIYSzuqROF6ziQt2RXoExplujGirrX+dIGSj50DoIoqXSQX+ASzZvp4pjFcIiSYANp vV/u6pj/xDSaSgKhlUMfrSKHpz58DHuvFmIxt6bsmtwomjDWk3081gXkhZ/3rMpEv3Q3 WuAbFce9y+JFfANGQDChhY7PYoimIjRhGXTpoyA5l8QQ76plrve2CR+e569PVKDY67f/ b7uA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :robot-unsubscribe:robot-id:message-id:mime-version:references :in-reply-to:cc:subject:to:reply-to:from:dkim-signature :dkim-signature:date; bh=GObTcxkYeeWPsuk8EnT0A9ji8Yeirjyge93RlQM5H6o=; b=JEbTjYzPqKl7jmiOngBDLFBFMFXqrkfHIDLwFrK/1tnNVA7dIZJZP9drMOtanxxrzh FBkokV8y16kLx15EaEanO9BFffMMt7X8py9RmfgghMUyp74LGn2L7DjXGttR2RQo0f81 00ln/uhpyhGVqRIePrUmQqF0DoKzlc0izJuxIfUYDBM4//S0uC38vAHQPMvc6WnxNapz uZill0nakqax9/yIQjtXw9PdUYgHSACHBl8viBn8OxpH9YZa/U4lYGsCCNKPQlCAb3DA UwNJ4a0kJei2VlgH3dde2ZybCLqUuyA42ivrdoNdAnghQ5q9k5+G9TtAuX+RFK0nkHn1 eosw== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@linutronix.de header.s=2020 header.b=g3UI425I; dkim=neutral (no key) header.i=@vger.kernel.org; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=QUARANTINE dis=NONE) header.from=linutronix.de Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id q18si4368167ejz.135.2020.08.06.16.40.05; Thu, 06 Aug 2020 16:40:28 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=fail header.i=@linutronix.de header.s=2020 header.b=g3UI425I; dkim=neutral (no key) header.i=@vger.kernel.org; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=QUARANTINE dis=NONE) header.from=linutronix.de Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726844AbgHFXjQ (ORCPT + 99 others); Thu, 6 Aug 2020 19:39:16 -0400 Received: from Galois.linutronix.de ([193.142.43.55]:60972 "EHLO galois.linutronix.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726713AbgHFXjD (ORCPT ); Thu, 6 Aug 2020 19:39:03 -0400 Date: Thu, 06 Aug 2020 23:39:01 -0000 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linutronix.de; s=2020; t=1596757142; h=from:from:sender:sender:reply-to:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=GObTcxkYeeWPsuk8EnT0A9ji8Yeirjyge93RlQM5H6o=; b=g3UI425I/ddzq2465FZqpsunCzuZ59tFRLn/n2FPsAXn/aSqkWlcaq7G1I3Cly6DAZ+vfj LLdRR7oZNJY0BE3CQZzXhIBiVlh+5LSyxGpR1kq0d/y4427xsUR9xgNixC5f7O6QLmW5/U 6Ty0wuFTjP7OQE/XMdINAvEDONqpdtEDRAFqXxDlPdtcpXcYCOLp/wp7QP6j00ka28GspQ ACLqotGozWWVPlMCzoI/vhTVPlSux0TgnrL2T/jvmvEddRLw2Avtw+yY18WkZNrBIBvuid 5DPaUubiXYFZz36UKfOUVqHGutSuhI0mGM13uNOPsj81o5xHsYjBLOO+Mqfe+Q== DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=linutronix.de; s=2020e; t=1596757142; h=from:from:sender:sender:reply-to:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=GObTcxkYeeWPsuk8EnT0A9ji8Yeirjyge93RlQM5H6o=; b=aBwwDN4oEVnAK6G77MSVRTr8ZJ1scYADEfNQHzdoElrzbSEeu4Z4PcGanpPE7K71HLeG8J sxmwsIv19eVDNJBg== From: "tip-bot2 for Arvind Sankar" Reply-to: linux-kernel@vger.kernel.org To: linux-tip-commits@vger.kernel.org Subject: [tip: x86/kaslr] x86/kaslr: Initialize mem_limit to the real maximum address Cc: Arvind Sankar , Ingo Molnar , Kees Cook , x86 , LKML In-Reply-To: <20200727230801.3468620-5-nivedita@alum.mit.edu> References: <20200727230801.3468620-5-nivedita@alum.mit.edu> MIME-Version: 1.0 Message-ID: <159675714154.3192.13657935466821504995.tip-bot2@tip-bot2> Robot-ID: Robot-Unsubscribe: Contact to get blacklisted from these emails Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The following commit has been merged into the x86/kaslr branch of tip: Commit-ID: 451286940d95778e83fa7f97006316d995b4c4a8 Gitweb: https://git.kernel.org/tip/451286940d95778e83fa7f97006316d995b4c4a8 Author: Arvind Sankar AuthorDate: Mon, 27 Jul 2020 19:07:57 -04:00 Committer: Ingo Molnar CommitterDate: Fri, 31 Jul 2020 11:08:17 +02:00 x86/kaslr: Initialize mem_limit to the real maximum address On 64-bit, the kernel must be placed below MAXMEM (64TiB with 4-level paging or 4PiB with 5-level paging). This is currently not enforced by KASLR, which thus implicitly relies on physical memory being limited to less than 64TiB. On 32-bit, the limit is KERNEL_IMAGE_SIZE (512MiB). This is enforced by special checks in __process_mem_region(). Initialize mem_limit to the maximum (depending on architecture), instead of ULLONG_MAX, and make sure the command-line arguments can only decrease it. This makes the enforcement explicit on 64-bit, and eliminates the 32-bit specific checks to keep the kernel below 512M. Check upfront to make sure the minimum address is below the limit before doing any work. Signed-off-by: Arvind Sankar Signed-off-by: Ingo Molnar Acked-by: Kees Cook Link: https://lore.kernel.org/r/20200727230801.3468620-5-nivedita@alum.mit.edu --- arch/x86/boot/compressed/kaslr.c | 41 ++++++++++++++++--------------- 1 file changed, 22 insertions(+), 19 deletions(-) diff --git a/arch/x86/boot/compressed/kaslr.c b/arch/x86/boot/compressed/kaslr.c index 1ab67a8..da45e66 100644 --- a/arch/x86/boot/compressed/kaslr.c +++ b/arch/x86/boot/compressed/kaslr.c @@ -94,8 +94,11 @@ static unsigned long get_boot_seed(void) static bool memmap_too_large; -/* Store memory limit specified by "mem=nn[KMG]" or "memmap=nn[KMG]" */ -static unsigned long long mem_limit = ULLONG_MAX; +/* + * Store memory limit: MAXMEM on 64-bit and KERNEL_IMAGE_SIZE on 32-bit. + * It may be reduced by "mem=nn[KMG]" or "memmap=nn[KMG]" command line options. + */ +static unsigned long long mem_limit; /* Number of immovable memory regions */ static int num_immovable_mem; @@ -221,7 +224,7 @@ static void mem_avoid_memmap(enum parse_mode mode, char *str) if (start == 0) { /* Store the specified memory limit if size > 0 */ - if (size > 0) + if (size > 0 && size < mem_limit) mem_limit = size; continue; @@ -311,7 +314,8 @@ static void handle_mem_options(void) if (mem_size == 0) break; - mem_limit = mem_size; + if (mem_size < mem_limit) + mem_limit = mem_size; } else if (!strcmp(param, "efi_fake_mem")) { mem_avoid_memmap(PARSE_EFI, val); } @@ -322,7 +326,9 @@ static void handle_mem_options(void) } /* - * In theory, KASLR can put the kernel anywhere in the range of [16M, 64T). + * In theory, KASLR can put the kernel anywhere in the range of [16M, MAXMEM) + * on 64-bit, and [16M, KERNEL_IMAGE_SIZE) on 32-bit. + * * The mem_avoid array is used to store the ranges that need to be avoided * when KASLR searches for an appropriate random address. We must avoid any * regions that are unsafe to overlap with during decompression, and other @@ -620,10 +626,6 @@ static void __process_mem_region(struct mem_vector *entry, unsigned long start_orig, end; struct mem_vector cur_entry; - /* On 32-bit, ignore entries entirely above our maximum. */ - if (IS_ENABLED(CONFIG_X86_32) && entry->start >= KERNEL_IMAGE_SIZE) - return; - /* Ignore entries entirely below our minimum. */ if (entry->start + entry->size < minimum) return; @@ -656,11 +658,6 @@ static void __process_mem_region(struct mem_vector *entry, /* Reduce size by any delta from the original address. */ region.size -= region.start - start_orig; - /* On 32-bit, reduce region size to fit within max size. */ - if (IS_ENABLED(CONFIG_X86_32) && - region.start + region.size > KERNEL_IMAGE_SIZE) - region.size = KERNEL_IMAGE_SIZE - region.start; - /* Return if region can't contain decompressed kernel */ if (region.size < image_size) return; @@ -845,15 +842,16 @@ static void process_e820_entries(unsigned long minimum, static unsigned long find_random_phys_addr(unsigned long minimum, unsigned long image_size) { + /* Bail out early if it's impossible to succeed. */ + if (minimum + image_size > mem_limit) + return 0; + /* Check if we had too many memmaps. */ if (memmap_too_large) { debug_putstr("Aborted memory entries scan (more than 4 memmap= args)!\n"); return 0; } - /* Make sure minimum is aligned. */ - minimum = ALIGN(minimum, CONFIG_PHYSICAL_ALIGN); - if (process_efi_entries(minimum, image_size)) return slots_fetch_random(); @@ -866,8 +864,6 @@ static unsigned long find_random_virt_addr(unsigned long minimum, { unsigned long slots, random_addr; - /* Make sure minimum is aligned. */ - minimum = ALIGN(minimum, CONFIG_PHYSICAL_ALIGN); /* Align image_size for easy slot calculations. */ image_size = ALIGN(image_size, CONFIG_PHYSICAL_ALIGN); @@ -914,6 +910,11 @@ void choose_random_location(unsigned long input, /* Prepare to add new identity pagetables on demand. */ initialize_identity_maps(); + if (IS_ENABLED(CONFIG_X86_32)) + mem_limit = KERNEL_IMAGE_SIZE; + else + mem_limit = MAXMEM; + /* Record the various known unsafe memory ranges. */ mem_avoid_init(input, input_size, *output); @@ -923,6 +924,8 @@ void choose_random_location(unsigned long input, * location: */ min_addr = min(*output, 512UL << 20); + /* Make sure minimum is aligned. */ + min_addr = ALIGN(min_addr, CONFIG_PHYSICAL_ALIGN); /* Walk available memory entries to find a random address. */ random_addr = find_random_phys_addr(min_addr, output_size);