Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp2853548pxj; Mon, 31 May 2021 12:39:22 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwkSzrnHAi826jgpCmtQPQnrgcy3AQVj1YzqGAFWUdDAk9MeRDrce0TuHxRg59SaWKQPPt6 X-Received: by 2002:a5d:8481:: with SMTP id t1mr18630954iom.39.1622489962682; Mon, 31 May 2021 12:39:22 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1622489962; cv=none; d=google.com; s=arc-20160816; b=P5017SBoavP+E6KZ19IA3nYsirGPiCY2DFL00H0NFiOpf7wTVa6knM8+eT6VfJjNec 415ITxMnHvJN/7+NwQXzSCloQqAPvongXBYs9UKMhQopf1kjb04/JLM753iGJQ5VF4ar 3y8Cuzrrvga6MRVIQFwLScUnMnWj+qUbF7ql/gp97NlPpYpJag6vVoSYw2OUobrh4BR+ YleLsZmbGgq8UQ/7VNzPWsSfInIIZGlm9mQRz+v7bNKwH6x/9uwC2ftTmZNfTnc4d8bP yYcEtgcwdlvu+mOO6ej96Cm+ReLe4DMncPilJ4HSptsTWx+fVTCMc8ARrhSu0/IKNMQj 5hXg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=PF+A3dsI8FBZ+HWCaJOLaA9870AYfrFQ+AqoKQ0Wt7s=; b=BnVlVjkY+dSgtyVi6fSW1MoJ5wheFjPxZ3DZ+dok5vyy+UOzzsD2ezqXGkTMsSH0tT WLM1Mq2zkFSQY/UxagkyRqX0q7FHjaTU/HjZWaMpkNmYxqcKsOinrsaGig7BjH4+lmhp 7l3q661fKPu4ToG6bEdxWNMZpagcnd2oGA7xaASHk2VI/mlooeHvqz58MmWX8W1kJTKv 3LtKFZeJ9afgDVj2I87UxXvGTGh87F8b5iqqMA2E6+cdJOvv/5xtTPIsll0TXLGxUUtX +LxVQA/1+hg7b0TJJu6MHyhjvzbjYqNhxir+vKhBKK754KJ6C0I3iRwSZt1zpnE6yxyv M/kw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=QBl6dcmn; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id l17si16184530jaj.81.2021.05.31.12.39.08; Mon, 31 May 2021 12:39:22 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=QBl6dcmn; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232064AbhEaTjl (ORCPT + 99 others); Mon, 31 May 2021 15:39:41 -0400 Received: from mail.kernel.org ([198.145.29.99]:46308 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231144AbhEaTjk (ORCPT ); Mon, 31 May 2021 15:39:40 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 8D9716135C; Mon, 31 May 2021 19:38:00 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1622489880; bh=DxmToG3L31wIR+9AdgK9OhgVLZyRMZ/xTbCfSGTuyhQ=; h=References:In-Reply-To:From:Date:Subject:To:Cc:From; b=QBl6dcmn1Rx7zOlV2n2Nl+2g6JAtjkgqPcHvclhsLlHustjWEFdadRTHjjlkqK4qs +M3oZt+zsuDljk+HeIXVQJEnHucadsgqqhkWNgG2qgZjxfautiQTmjDPUv80T0lG5v Sw1owFkPyCbIyUm99iqkdEEA6vaz4J8WT49k3k5IC5sMAN1GUJEgXyFXSdrHRJ0h1Z Q7AsdsrxL5OXBH2I6b/kFwevlUu1upQVPfZ3jmof8zEdjFv/x6zGEh7t4NuEp3SNsM EuBD7uOZyXO0LDJcnF/LNhm/mU4kutwi0vpzUKB/ZI/Do3GIuteNLPXUg1rcVFxH7R AgIgYEy/jzx3w== Received: by mail-ot1-f54.google.com with SMTP id i23-20020a9d68d70000b02902dc19ed4c15so12049102oto.0; Mon, 31 May 2021 12:38:00 -0700 (PDT) X-Gm-Message-State: AOAM531BSksz8cNSHRD2+QDz3ong4/7uykjHW+M4RKHh0PmCOLEeAyn9 BwhUZDejimT4zrt0FN7Q3dgM8XnYIUrMMwiveu0= X-Received: by 2002:a9d:69c5:: with SMTP id v5mr17902553oto.108.1622489879945; Mon, 31 May 2021 12:37:59 -0700 (PDT) MIME-Version: 1.0 References: <20210531095720.77469-1-maz@kernel.org> <20210531095720.77469-2-maz@kernel.org> In-Reply-To: <20210531095720.77469-2-maz@kernel.org> From: Ard Biesheuvel Date: Mon, 31 May 2021 21:37:49 +0200 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: [PATCH v2 1/5] arm64: kexec_file: Forbid non-crash kernels To: Marc Zyngier Cc: kexec@lists.infradead.org, Linux ARM , Linux Kernel Mailing List , Catalin Marinas , Will Deacon , Mark Rutland , James Morse , Lorenzo Pieralisi , Hanjun Guo , Sudeep Holla , Eric Biederman , Bhupesh SHARMA , AKASHI Takahiro , Dave Young , Andrew Morton , Moritz Fischer , Android Kernel Team , "# 3.4.x" Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, 31 May 2021 at 11:57, Marc Zyngier wrote: > > It has been reported that kexec_file doesn't really work on arm64. > It completely ignores any of the existing reservations, which results > in the secondary kernel being loaded where the GICv3 LPI tables live, > or even corrupting the ACPI tables. > > Since only crash kernels are imune to this as they use a reserved > memory region, disable the non-crash kernel use case. Further > patches will try and restore the functionality. > > Reported-by: Moritz Fischer > Signed-off-by: Marc Zyngier > Cc: stable@vger.kernel.org # 5.10 Acked-by: Ard Biesheuvel ... but do we really only need this in 5.10 and not earlier? > --- > arch/arm64/kernel/kexec_image.c | 20 ++++++++++++++++++++ > 1 file changed, 20 insertions(+) > > diff --git a/arch/arm64/kernel/kexec_image.c b/arch/arm64/kernel/kexec_image.c > index 9ec34690e255..acf9cd251307 100644 > --- a/arch/arm64/kernel/kexec_image.c > +++ b/arch/arm64/kernel/kexec_image.c > @@ -145,3 +145,23 @@ const struct kexec_file_ops kexec_image_ops = { > .verify_sig = image_verify_sig, > #endif > }; > + > +/** > + * arch_kexec_locate_mem_hole - Find free memory to place the segments. > + * @kbuf: Parameters for the memory search. > + * > + * On success, kbuf->mem will have the start address of the memory region found. > + * > + * Return: 0 on success, negative errno on error. > + */ > +int arch_kexec_locate_mem_hole(struct kexec_buf *kbuf) > +{ > + /* > + * For the time being, kexec_file_load isn't reliable except > + * for crash kernel. Say sorry to the user. > + */ > + if (kbuf->image->type != KEXEC_TYPE_CRASH) > + return -EADDRNOTAVAIL; > + > + return kexec_locate_mem_hole(kbuf); > +} > -- > 2.30.2 >