Received: by 2002:a05:6a11:4021:0:0:0:0 with SMTP id ky33csp1547976pxb; Thu, 16 Sep 2021 09:40:43 -0700 (PDT) X-Google-Smtp-Source: ABdhPJw5AowaEM8i1I7nrTlFkGu7j2fY1oAKyAF/M1S7A2tFjq0hV5bLwgxIiZ9C1/qN22o2+6+n X-Received: by 2002:a5d:9051:: with SMTP id v17mr1550116ioq.134.1631810442912; Thu, 16 Sep 2021 09:40:42 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1631810442; cv=none; d=google.com; s=arc-20160816; b=a2PqHJk0F86+4hO7TbSLiAoXutYTF4FD9/uPa/xmYLSWdb5tNRTSUqncyDRa1eHf0h aFoFHknp2NxbDraM+0D5tKu93tULQyIccQUDyQHeCPP4quWdFo/k5o5hKTLH7MNKaiC3 0Uen7i0slfSycyKPjkP9ApSJgxQsX513E7R3pG52ws8+ukwP1lP8cVoi87xz7CGG9n1E Y1/h+mrZRpS3ttE5wvCPtSTfNKHHB/Z247xkny+prVWHF1S+BywTEJk8EKaT4/mjd7bn R+s1XmNe2AGCbIJhX9Dt8fuvQs9KVN9Vy6TPne0TvNWIOjSVUvkwVOymOEGQ2CqP0kon Njig== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=EWaEUklt/zos5ti6nIOwywfpfTjr4UGi6PksgDx/6D0=; b=dg9YGlsDlIBYfnbIZIhzU1bbSYuqgwXXGtDo4LHYm28QWTy9LHlrewWOfkuaCA4UCC xemxIampGiuTGXLoEz/ocXVqSiRvnpJOkVcrEmp2WgloWZI29A1KkmlQ99zFhXS1qySb RgBqqZBS/8rFz8BWPYiPlB5AFJoyFN0d2WaZRuEJRzt6m9eo0KZje9FHWdtg+O8yjg7/ nZZzTUt881jy6QgKrhZ6Ikndg+xsJnIeqVKxFuh7xCf/TyQrZB4t6CDGyfR6EXwKzAS4 Z4eLCyslHPvvxwbHGy5evtP1GSlA7Qnsf6Iedm+EFPGHYjjCkHYQIK8w2kBiRkJZiXWg bLAg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=xNO2nPHU; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id d27si2962450jaa.121.2021.09.16.09.40.31; Thu, 16 Sep 2021 09:40:42 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=xNO2nPHU; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S243526AbhIPQh4 (ORCPT + 99 others); Thu, 16 Sep 2021 12:37:56 -0400 Received: from mail.kernel.org ([198.145.29.99]:37898 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S242647AbhIPQ3X (ORCPT ); Thu, 16 Sep 2021 12:29:23 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id F3B58613AB; Thu, 16 Sep 2021 16:18:27 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1631809108; bh=aIZTJcZ34DYC/I8CV3ny8Vd4ai6sNEM4V4adrAWU5vQ=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=xNO2nPHUxekNggkTCI7mHBO5p18R9xX0EmbjfZAKMmkmkyYOMtPPTe/WnyZ9pZfma D9I8YXsR+AQ/qUshqL8d0BWwBV9E5bMXiPhF+lUhUakrplNKdtnlhDoMCgPgtpGFBo LY671DORIgLdv9MVkL9DdM9upNyIoXzI7udm2d+8= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Mark Rutland , Anshuman Khandual , Ard Biesheuvel , Steve Capper , Will Deacon , Catalin Marinas Subject: [PATCH 5.13 032/380] arm64: head: avoid over-mapping in map_memory Date: Thu, 16 Sep 2021 17:56:29 +0200 Message-Id: <20210916155805.057693947@linuxfoundation.org> X-Mailer: git-send-email 2.33.0 In-Reply-To: <20210916155803.966362085@linuxfoundation.org> References: <20210916155803.966362085@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Mark Rutland commit 90268574a3e8a6b883bd802d702a2738577e1006 upstream. The `compute_indices` and `populate_entries` macros operate on inclusive bounds, and thus the `map_memory` macro which uses them also operates on inclusive bounds. We pass `_end` and `_idmap_text_end` to `map_memory`, but these are exclusive bounds, and if one of these is sufficiently aligned (as a result of kernel configuration, physical placement, and KASLR), then: * In `compute_indices`, the computed `iend` will be in the page/block *after* the final byte of the intended mapping. * In `populate_entries`, an unnecessary entry will be created at the end of each level of table. At the leaf level, this entry will map up to SWAPPER_BLOCK_SIZE bytes of physical addresses that we did not intend to map. As we may map up to SWAPPER_BLOCK_SIZE bytes more than intended, we may violate the boot protocol and map physical address past the 2MiB-aligned end address we are permitted to map. As we map these with Normal memory attributes, this may result in further problems depending on what these physical addresses correspond to. The final entry at each level may require an additional table at that level. As EARLY_ENTRIES() calculates an inclusive bound, we allocate enough memory for this. Avoid the extraneous mapping by having map_memory convert the exclusive end address to an inclusive end address by subtracting one, and do likewise in EARLY_ENTRIES() when calculating the number of required tables. For clarity, comments are updated to more clearly document which boundaries the macros operate on. For consistency with the other macros, the comments in map_memory are also updated to describe `vstart` and `vend` as virtual addresses. Fixes: 0370b31e4845 ("arm64: Extend early page table code to allow for larger kernels") Cc: # 4.16.x Signed-off-by: Mark Rutland Cc: Anshuman Khandual Cc: Ard Biesheuvel Cc: Steve Capper Cc: Will Deacon Acked-by: Will Deacon Link: https://lore.kernel.org/r/20210823101253.55567-1-mark.rutland@arm.com Signed-off-by: Catalin Marinas Signed-off-by: Greg Kroah-Hartman --- arch/arm64/include/asm/kernel-pgtable.h | 4 ++-- arch/arm64/kernel/head.S | 11 ++++++----- 2 files changed, 8 insertions(+), 7 deletions(-) --- a/arch/arm64/include/asm/kernel-pgtable.h +++ b/arch/arm64/include/asm/kernel-pgtable.h @@ -65,8 +65,8 @@ #define EARLY_KASLR (0) #endif -#define EARLY_ENTRIES(vstart, vend, shift) (((vend) >> (shift)) \ - - ((vstart) >> (shift)) + 1 + EARLY_KASLR) +#define EARLY_ENTRIES(vstart, vend, shift) \ + ((((vend) - 1) >> (shift)) - ((vstart) >> (shift)) + 1 + EARLY_KASLR) #define EARLY_PGDS(vstart, vend) (EARLY_ENTRIES(vstart, vend, PGDIR_SHIFT)) --- a/arch/arm64/kernel/head.S +++ b/arch/arm64/kernel/head.S @@ -176,7 +176,7 @@ SYM_CODE_END(preserve_boot_args) * to be composed of multiple pages. (This effectively scales the end index). * * vstart: virtual address of start of range - * vend: virtual address of end of range + * vend: virtual address of end of range - we map [vstart, vend] * shift: shift used to transform virtual address into index * ptrs: number of entries in page table * istart: index in table corresponding to vstart @@ -213,17 +213,18 @@ SYM_CODE_END(preserve_boot_args) * * tbl: location of page table * rtbl: address to be used for first level page table entry (typically tbl + PAGE_SIZE) - * vstart: start address to map - * vend: end address to map - we map [vstart, vend] + * vstart: virtual address of start of range + * vend: virtual address of end of range - we map [vstart, vend - 1] * flags: flags to use to map last level entries * phys: physical address corresponding to vstart - physical memory is contiguous * pgds: the number of pgd entries * * Temporaries: istart, iend, tmp, count, sv - these need to be different registers - * Preserves: vstart, vend, flags - * Corrupts: tbl, rtbl, istart, iend, tmp, count, sv + * Preserves: vstart, flags + * Corrupts: tbl, rtbl, vend, istart, iend, tmp, count, sv */ .macro map_memory, tbl, rtbl, vstart, vend, flags, phys, pgds, istart, iend, tmp, count, sv + sub \vend, \vend, #1 add \rtbl, \tbl, #PAGE_SIZE mov \sv, \rtbl mov \count, #0