Received: by 2002:a05:6a10:f347:0:0:0:0 with SMTP id d7csp4642855pxu; Thu, 10 Dec 2020 01:35:59 -0800 (PST) X-Google-Smtp-Source: ABdhPJwNp6HktyZftSyP42e0pLd5aLzR/vBgHgQqbeIWLZxMpEmTCb2piHnN63DiMLph4EAv1ZsC X-Received: by 2002:a05:6402:456:: with SMTP id p22mr5835424edw.26.1607592958980; Thu, 10 Dec 2020 01:35:58 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1607592958; cv=none; d=google.com; s=arc-20160816; b=z9pv1tjbb2MLV1AtOygv5XFM4SF2exVvMCqsj15DAr4p8AHRi8J94IZsB13VUg/boy LeHF3XVg+KDmeoNbgCb/sM1KqYk8n6ydq/OVe7CTRWzMuZvlaXMI/+3NKWXQhrpCc3ac w5N+/Php4AsbvfvRZcllycyzN/xCtzBpjxMYvRz/uZV+Ag5sEZyieDPKfgXws2afyWZB X2ay7BIAHnB8Ye8Zz3rR7sISZ/Gj7G5h5zg396QtnCnvUETVc4UBR70Zx2A6e9/XeMkl eE4WGVFkXHKxSya7lpK6Y51AKnaKTbrqafaS/yVf+rX0VosxwOB8lPMZ6lkBq7LraLnf R48A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=HaVOtfqNTfzTK4qkqjLRXuM2M98ou37Qrd5tz7imbFQ=; b=agvCX/udRk9Rrju73aqTNHAn67DI0tGzecS5qlZFNwYvhugA5r88rXlSW0Drff9DBU UzbMo0o7ZgW1XeJ8801ZEkpsuUnC1ppDkZjRh7na0xsIvzFOKv4kDLA+0WpDbQcrcZpu f3WQBRM7TeT9/4YrYh/VL0+iKtB0ic3aQjXssCQvGOSaEgwP9LLi4cha80WqHFBJbcaE zK2NtS93ToW8mxvH3iTuB/1PVzSxfCXlFxqckgwBy8lCDDv/iWKm4Ej4i7vb+u5AQ5+F 18bC2i83MvY5z53iLGC+xaFhOwgaXK86B6HFg7AcnG9bphxYn9AYTzKsBiOydoUVsJb/ Xh9g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id x25si2494660edi.388.2020.12.10.01.35.36; Thu, 10 Dec 2020 01:35:58 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727249AbgLJJc7 (ORCPT + 99 others); Thu, 10 Dec 2020 04:32:59 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:43088 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731098AbgLJJc4 (ORCPT ); Thu, 10 Dec 2020 04:32:56 -0500 Received: from baptiste.telenet-ops.be (baptiste.telenet-ops.be [IPv6:2a02:1800:120:4::f00:13]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id F22D8C06179C for ; Thu, 10 Dec 2020 01:32:15 -0800 (PST) Received: from ramsan.of.borg ([84.195.186.194]) by baptiste.telenet-ops.be with bizsmtp id 2ZY62400G4C55Sk01ZY6Sk; Thu, 10 Dec 2020 10:32:14 +0100 Received: from rox.of.borg ([192.168.97.57]) by ramsan.of.borg with esmtps (TLS1.3) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.93) (envelope-from ) id 1knIIw-009MGS-Jx; Thu, 10 Dec 2020 10:32:06 +0100 Received: from geert by rox.of.borg with local (Exim 4.93) (envelope-from ) id 1knIIv-00A9Un-Sg; Thu, 10 Dec 2020 10:32:05 +0100 From: Geert Uytterhoeven To: Russell King , Nicolas Pitre , Ard Biesheuvel , Marek Szyprowski , Dmitry Osipenko , Linus Walleij Cc: Arnd Bergmann , Eric Miao , =?UTF-8?q?Uwe=20Kleine-K=C3=B6nig?= , Lukasz Stelmach , Stephen Boyd , Chris Brandt , linux-arm-kernel@lists.infradead.org, linux-renesas-soc@vger.kernel.org, linux-kernel@vger.kernel.org, Geert Uytterhoeven Subject: [PATCH v11] ARM: uncompress: Validate start of physical memory against passed DTB Date: Thu, 10 Dec 2020 10:32:01 +0100 Message-Id: <20201210093201.2419737-1-geert+renesas@glider.be> X-Mailer: git-send-email 2.25.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Currently, the start address of physical memory is obtained by masking the program counter with a fixed mask of 0xf8000000. This mask value was chosen as a balance between the requirements of different platforms. However, this does require that the start address of physical memory is a multiple of 128 MiB, precluding booting Linux on platforms where this requirement is not fulfilled. Fix this limitation by validating the masked address against the memory information in the passed DTB. Only use the start address from DTB when masking would yield an out-of-range address, prefer the traditional method in all other cases. Note that this applies only to the explicitly passed DTB on modern systems, and not to a DTB appended to the kernel, or to ATAGS. The appended DTB may need to be augmented by information from ATAGS, which may need to rely on knowledge of the start address of physical memory itself. This allows to boot Linux on r7s9210/rza2mevb using the 64 MiB of SDRAM on the RZA2MEVB sub board, which is located at 0x0C000000 (CS3 space), i.e. not at a multiple of 128 MiB. Suggested-by: Nicolas Pitre Suggested-by: Ard Biesheuvel Signed-off-by: Geert Uytterhoeven Reviewed-by: Ard Biesheuvel Acked-by: Nicolas Pitre --- I plan to submit this to Russell's patch tracker after v5.11-rc1. v11: - Add Reviewed-by, Acked-by, - Document GOT fixup caveat, v10: - Update for commit 9443076e4330a14a ("ARM: p2v: reduce p2v alignment requirement to 2 MiB"), - Use OF_DT_MAGIC macro, - Rename fdt_get_mem_start() to fdt_check_mem_start(), - Skip validation if there is an appended DTB, - Pass mem_start to fdt_check_mem_start() to streamline code, - Optimize register allocation, - Update CONFIG_AUTO_ZRELADDR help text, - Check all memory nodes and ranges (not just the first one), and "linux,usable-memory", similar to early_init_dt_scan_memory(), - Drop Reviewed-by, Tested-by tags, v9: - Add minlen parameter to getprop(), for better validation of memory properties, - Only use start of memory from the DTB if masking would yield an out-of-range address, to fix kdump, as suggested by Ard. v8: - Rebase on top of commit 893ab00439a45513 ("kbuild: remove cc-option test of -fno-stack-protector"), v7: - Rebase on top of commit 161e04a5bae58a65 ("ARM: decompressor: split off _edata and stack base into separate object"), v6: - Rebase on top of commit 7ae4a78daacf240a ("ARM: 8969/1: decompressor: simplify libfdt builds"), - Include instead of , v5: - Add Tested-by, Reviewed-by, - Round up start of memory to satisfy 16 MiB alignment rule, v4: - Fix stack location after commit 184bf653a7a452c1 ("ARM: decompressor: factor out routine to obtain the inflated image size"), v3: - Add Reviewed-by, - Fix ATAGs with appended DTB, - Add Tested-by, v2: - Use "cmp r0, #-1", instead of "cmn r0, #1", - Add missing stack setup, - Support appended DTB. --- arch/arm/Kconfig | 7 +- arch/arm/boot/compressed/Makefile | 5 +- .../arm/boot/compressed/fdt_check_mem_start.c | 131 ++++++++++++++++++ arch/arm/boot/compressed/head.S | 36 ++++- 4 files changed, 172 insertions(+), 7 deletions(-) create mode 100644 arch/arm/boot/compressed/fdt_check_mem_start.c diff --git a/arch/arm/Kconfig b/arch/arm/Kconfig index 97f9d004e6d03108..cd980b070f8a99fd 100644 --- a/arch/arm/Kconfig +++ b/arch/arm/Kconfig @@ -1909,9 +1909,10 @@ config AUTO_ZRELADDR help ZRELADDR is the physical address where the decompressed kernel image will be placed. If AUTO_ZRELADDR is selected, the address - will be determined at run-time by masking the current IP with - 0xf8000000. This assumes the zImage being placed in the first 128MB - from start of memory. + will be determined at run-time, either by masking the current IP + with 0xf8000000, or, if invalid, from the DTB passed in r2. + This assumes the zImage being placed in the first 128MB from + start of memory. config EFI_STUB bool diff --git a/arch/arm/boot/compressed/Makefile b/arch/arm/boot/compressed/Makefile index fb521efcc6c20a4f..fd94e27ba4fa3d12 100644 --- a/arch/arm/boot/compressed/Makefile +++ b/arch/arm/boot/compressed/Makefile @@ -87,10 +87,13 @@ libfdt_objs := fdt_rw.o fdt_ro.o fdt_wip.o fdt.o ifeq ($(CONFIG_ARM_ATAG_DTB_COMPAT),y) OBJS += $(libfdt_objs) atags_to_fdt.o endif +ifeq ($(CONFIG_USE_OF),y) +OBJS += $(libfdt_objs) fdt_check_mem_start.o +endif # -fstack-protector-strong triggers protection checks in this code, # but it is being used too early to link to meaningful stack_chk logic. -$(foreach o, $(libfdt_objs) atags_to_fdt.o, \ +$(foreach o, $(libfdt_objs) atags_to_fdt.o fdt_check_mem_start.o, \ $(eval CFLAGS_$(o) := -I $(srctree)/scripts/dtc/libfdt -fno-stack-protector)) # These were previously generated C files. When you are building the kernel diff --git a/arch/arm/boot/compressed/fdt_check_mem_start.c b/arch/arm/boot/compressed/fdt_check_mem_start.c new file mode 100644 index 0000000000000000..e58c3a79c8a31ec4 --- /dev/null +++ b/arch/arm/boot/compressed/fdt_check_mem_start.c @@ -0,0 +1,131 @@ +// SPDX-License-Identifier: GPL-2.0-only + +#include +#include +#include + +static const void *get_prop(const void *fdt, const char *node_path, + const char *property, int minlen) +{ + const void *prop; + int offset, len; + + offset = fdt_path_offset(fdt, node_path); + if (offset < 0) + return NULL; + + prop = fdt_getprop(fdt, offset, property, &len); + if (!prop || len < minlen) + return NULL; + + return prop; +} + +static uint32_t get_cells(const void *fdt, const char *name) +{ + const fdt32_t *prop = get_prop(fdt, "/", name, sizeof(fdt32_t)); + + if (!prop) { + /* default */ + return 1; + } + + return fdt32_ld(prop); +} + +static uint64_t get_val(const fdt32_t *cells, uint32_t ncells) +{ + uint64_t r = 0; + + r = fdt32_ld(cells); + if (ncells > 1) + r = (r << 32) | fdt32_ld(cells + 1); + + return r; +} + +/* + * Check the start of physical memory + * + * Traditionally, the start address of physical memory is obtained by masking + * the program counter. However, this does require that this address is a + * multiple of 128 MiB, precluding booting Linux on platforms where this + * requirement is not fulfilled. + * Hence validate the calculated address against the memory information in the + * DTB, and, if out-of-range, replace it by the real start address. + * To preserve backwards compatibility (systems reserving a block of memory + * at the start of physical memory, kdump, ...), the traditional method is + * always used if it yields a valid address. + * + * Return value: start address of physical memory to use + */ +uint32_t fdt_check_mem_start(uint32_t mem_start, const void *fdt) +{ + uint32_t addr_cells, size_cells, base; + uint32_t fdt_mem_start = 0xffffffff; + const fdt32_t *reg, *endp; + uint64_t size, end; + const char *type; + int offset, len; + + if (!fdt) + return mem_start; + + if (fdt_magic(fdt) != FDT_MAGIC) + return mem_start; + + /* There may be multiple cells on LPAE platforms */ + addr_cells = get_cells(fdt, "#address-cells"); + size_cells = get_cells(fdt, "#size-cells"); + if (addr_cells > 2 || size_cells > 2) + return mem_start; + + /* Walk all memory nodes and regions */ + for (offset = fdt_next_node(fdt, -1, NULL); offset >= 0; + offset = fdt_next_node(fdt, offset, NULL)) { + type = fdt_getprop(fdt, offset, "device_type", NULL); + if (!type || strcmp(type, "memory")) + continue; + + reg = fdt_getprop(fdt, offset, "linux,usable-memory", &len); + if (!reg) + reg = fdt_getprop(fdt, offset, "reg", &len); + if (!reg) + continue; + + for (endp = reg + (len / sizeof(fdt32_t)); + endp - reg >= addr_cells + size_cells; + reg += addr_cells + size_cells) { + size = get_val(reg + addr_cells, size_cells); + if (!size) + continue; + + if (addr_cells > 1 && fdt32_ld(reg)) { + /* Outside 32-bit address space, skipping */ + continue; + } + + base = fdt32_ld(reg + addr_cells - 1); + end = base + size; + if (mem_start >= base && mem_start < end) { + /* Calculated address is valid, use it */ + return mem_start; + } + + if (base < fdt_mem_start) + fdt_mem_start = base; + } + } + + if (fdt_mem_start == 0xffffffff) { + /* No usable memory found, falling back to default */ + return mem_start; + } + + /* + * The calculated address is not usable. + * Use the lowest usable physical memory address from the DTB instead, + * and make sure this is a multiple of 2 MiB for phys/virt patching. + */ + return round_up(fdt_mem_start, SZ_2M); +} diff --git a/arch/arm/boot/compressed/head.S b/arch/arm/boot/compressed/head.S index d9cce7238a365081..04f6b7bb7c43b66c 100644 --- a/arch/arm/boot/compressed/head.S +++ b/arch/arm/boot/compressed/head.S @@ -282,10 +282,40 @@ not_angel: * are already placing their zImage in (eg) the top 64MB * of this range. */ - mov r4, pc - and r4, r4, #0xf8000000 + mov r0, pc + and r0, r0, #0xf8000000 +#ifdef CONFIG_USE_OF + adr r1, LC1 +#ifdef CONFIG_ARM_APPENDED_DTB + /* + * Look for an appended DTB. If found, we cannot use it to + * validate the calculated start of physical memory, as its + * memory nodes may need to be augmented by ATAGS stored at + * an offset from the same start of physical memory. + */ + ldr r2, [r1, #4] @ get &_edata + add r2, r2, r1 @ relocate it + ldr r2, [r2] @ get DTB signature + ldr r3, =OF_DT_MAGIC + cmp r2, r3 @ do we have a DTB there? + beq 1f @ if yes, skip validation +#endif /* CONFIG_ARM_APPENDED_DTB */ + + /* + * Make sure we have some stack before calling C code. + * No GOT fixup has occurred yet, but none of the code we're + * about to call uses any global variables. + */ + ldr sp, [r1] @ get stack location + add sp, sp, r1 @ apply relocation + + /* Validate calculated start against passed DTB */ + mov r1, r8 + bl fdt_check_mem_start +1: +#endif /* CONFIG_USE_OF */ /* Determine final kernel image address. */ - add r4, r4, #TEXT_OFFSET + add r4, r0, #TEXT_OFFSET #else ldr r4, =zreladdr #endif -- 2.25.1