Received: by 2002:a05:6520:4d:b0:139:a872:a4c9 with SMTP id i13csp2566338lkm; Mon, 20 Sep 2021 18:53:12 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzDDIAafr7B9SbDryAwZxhU4DxKoX7RSHKxnGdRKYa9dsbYaRQzPZhzopseWkjaiKF4CDLK X-Received: by 2002:a05:6602:1543:: with SMTP id h3mr20686618iow.123.1632189191890; Mon, 20 Sep 2021 18:53:11 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1632189191; cv=none; d=google.com; s=arc-20160816; b=xkRunIohCYfGQz6YSbD1Tx0yRIoDizlsUgJS5JyeTnzY9Ow2Eo0O73dJVMS9iDOZWw 7C7/RSUiD7f20vn3TNvEfi+0x1DEWHk1lNAft374fMX4LGKZ9fIpRzLdq0dnkz3d6U3G HEHjbHVsMcaS953XtawSDccyLAKH8uXgDEgfYxQBDu6XJR6Q9680DgIsJJhAq4Ye2en8 Cwodq4IZKbndCRajJvj8f+8RK2nLFWTJ5oaEiAjK34QjPn0sYSDGQPAAv97GU2VuKD0K RpWwtTsz3QkPky1YvJ3abedmgrdjSDu5gAbjmsiv6jQZbKgjTEvxp77596zY2rft4rpK aiRg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=bGlxqCWP2KaT8kNzPwd35LYMhZjzqxqsCyod6NhxaO8=; b=V/2mq1QwOgmbj6E8rFwT7SbxI5FJtz4bdP9qiYZiRL0tjjhFcvWALD7pGGTLVptCEe SSFltyO4tAoI/Dm5JGRjMu8A4SAxD4ZzU4q518DvOAIC4tMkmTqsV4iMAzOYmXTsXMTY vSsG7H2A0wU1AdEBP0VSZlwQlqT6u9/dLg6MjI+KitQx8Ob/3kHhixuxyJrc71k6cARO MfoOSvc1JEclfPGwRhElX8ZsLlYLRDhZbJUQ7vkwi/hRlBK1WBnHYa/20xt1iauReMKF zWJMc2UfcnRrojyNjnNEyAZ5mlt0IJbk9+bCLqbSHJnDEgmSOKSVOVUDQg35HFhOhrfM kcYQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b="lpZ3/p/F"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id m62si12439323ioa.15.2021.09.20.18.53.00; Mon, 20 Sep 2021 18:53:11 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b="lpZ3/p/F"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1359302AbhITSJ1 (ORCPT + 99 others); Mon, 20 Sep 2021 14:09:27 -0400 Received: from mail.kernel.org ([198.145.29.99]:60800 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1357156AbhITSDH (ORCPT ); Mon, 20 Sep 2021 14:03:07 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 544F163239; Mon, 20 Sep 2021 17:16:48 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1632158208; bh=PNsr4l2QLKO7OXVrIePbzd3ml2mdCWcOXpf8nbgZ0G4=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=lpZ3/p/FVgCdQ7cMV6EPkmp74826vMSRSIX1CriovbkQQbY5cb2wLU+fDURPzkbks r/08E2szZd4kW5tCgqUjkhIy4dNVGlRGZaAO9idaVkRVUhGmEIFPaoBbz7MbrboQ9x GsbtnI6FcVmgpxVtnXRtnGbDHKJawdhf553fJoGA= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Mark Rutland , Anshuman Khandual , Ard Biesheuvel , Steve Capper , Will Deacon , Catalin Marinas Subject: [PATCH 5.4 017/260] arm64: head: avoid over-mapping in map_memory Date: Mon, 20 Sep 2021 18:40:35 +0200 Message-Id: <20210920163931.704232693@linuxfoundation.org> X-Mailer: git-send-email 2.33.0 In-Reply-To: <20210920163931.123590023@linuxfoundation.org> References: <20210920163931.123590023@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Mark Rutland commit 90268574a3e8a6b883bd802d702a2738577e1006 upstream. The `compute_indices` and `populate_entries` macros operate on inclusive bounds, and thus the `map_memory` macro which uses them also operates on inclusive bounds. We pass `_end` and `_idmap_text_end` to `map_memory`, but these are exclusive bounds, and if one of these is sufficiently aligned (as a result of kernel configuration, physical placement, and KASLR), then: * In `compute_indices`, the computed `iend` will be in the page/block *after* the final byte of the intended mapping. * In `populate_entries`, an unnecessary entry will be created at the end of each level of table. At the leaf level, this entry will map up to SWAPPER_BLOCK_SIZE bytes of physical addresses that we did not intend to map. As we may map up to SWAPPER_BLOCK_SIZE bytes more than intended, we may violate the boot protocol and map physical address past the 2MiB-aligned end address we are permitted to map. As we map these with Normal memory attributes, this may result in further problems depending on what these physical addresses correspond to. The final entry at each level may require an additional table at that level. As EARLY_ENTRIES() calculates an inclusive bound, we allocate enough memory for this. Avoid the extraneous mapping by having map_memory convert the exclusive end address to an inclusive end address by subtracting one, and do likewise in EARLY_ENTRIES() when calculating the number of required tables. For clarity, comments are updated to more clearly document which boundaries the macros operate on. For consistency with the other macros, the comments in map_memory are also updated to describe `vstart` and `vend` as virtual addresses. Fixes: 0370b31e4845 ("arm64: Extend early page table code to allow for larger kernels") Cc: # 4.16.x Signed-off-by: Mark Rutland Cc: Anshuman Khandual Cc: Ard Biesheuvel Cc: Steve Capper Cc: Will Deacon Acked-by: Will Deacon Link: https://lore.kernel.org/r/20210823101253.55567-1-mark.rutland@arm.com Signed-off-by: Catalin Marinas Signed-off-by: Greg Kroah-Hartman --- arch/arm64/include/asm/kernel-pgtable.h | 4 ++-- arch/arm64/kernel/head.S | 11 ++++++----- 2 files changed, 8 insertions(+), 7 deletions(-) --- a/arch/arm64/include/asm/kernel-pgtable.h +++ b/arch/arm64/include/asm/kernel-pgtable.h @@ -65,8 +65,8 @@ #define EARLY_KASLR (0) #endif -#define EARLY_ENTRIES(vstart, vend, shift) (((vend) >> (shift)) \ - - ((vstart) >> (shift)) + 1 + EARLY_KASLR) +#define EARLY_ENTRIES(vstart, vend, shift) \ + ((((vend) - 1) >> (shift)) - ((vstart) >> (shift)) + 1 + EARLY_KASLR) #define EARLY_PGDS(vstart, vend) (EARLY_ENTRIES(vstart, vend, PGDIR_SHIFT)) --- a/arch/arm64/kernel/head.S +++ b/arch/arm64/kernel/head.S @@ -194,7 +194,7 @@ ENDPROC(preserve_boot_args) * to be composed of multiple pages. (This effectively scales the end index). * * vstart: virtual address of start of range - * vend: virtual address of end of range + * vend: virtual address of end of range - we map [vstart, vend] * shift: shift used to transform virtual address into index * ptrs: number of entries in page table * istart: index in table corresponding to vstart @@ -231,17 +231,18 @@ ENDPROC(preserve_boot_args) * * tbl: location of page table * rtbl: address to be used for first level page table entry (typically tbl + PAGE_SIZE) - * vstart: start address to map - * vend: end address to map - we map [vstart, vend] + * vstart: virtual address of start of range + * vend: virtual address of end of range - we map [vstart, vend - 1] * flags: flags to use to map last level entries * phys: physical address corresponding to vstart - physical memory is contiguous * pgds: the number of pgd entries * * Temporaries: istart, iend, tmp, count, sv - these need to be different registers - * Preserves: vstart, vend, flags - * Corrupts: tbl, rtbl, istart, iend, tmp, count, sv + * Preserves: vstart, flags + * Corrupts: tbl, rtbl, vend, istart, iend, tmp, count, sv */ .macro map_memory, tbl, rtbl, vstart, vend, flags, phys, pgds, istart, iend, tmp, count, sv + sub \vend, \vend, #1 add \rtbl, \tbl, #PAGE_SIZE mov \sv, \rtbl mov \count, #0