Received: by 2002:a05:6602:18e:0:0:0:0 with SMTP id m14csp2515889ioo; Mon, 23 May 2022 22:35:42 -0700 (PDT) X-Google-Smtp-Source: ABdhPJypyUrNU+wo3J42j5mdCfQkB/ezJaXlCXn/5iewkoTEma/h9kUntPclftqCEsE3XCgnElqJ X-Received: by 2002:a05:6402:4386:b0:42b:6b76:8fde with SMTP id o6-20020a056402438600b0042b6b768fdemr8214061edc.45.1653370542549; Mon, 23 May 2022 22:35:42 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1653370542; cv=none; d=google.com; s=arc-20160816; b=zetJ+C8srZY8qe0L6QqNKCAObvEA/f6qC14t75F+J+Z3pmgmtWhP6cVddhcOZcd9rv d35R2Wv7wW+8mtG1wsen+LTZS+uwHw/9nWWhFunh30oVKbuiMTfsz2AxT/MkI5r9HDJE nQw4U4KVZ6X4EGgCyKf1E0VeZS1uayyidLzK7X9OW1g6n2qEJylxauS7HXDhrD24hRMC 5rzWm9EPhWRmsZBsmnWntGEIFCKxI3BrAbsy9yfjho9qOjQUrL13b+PG6fKgTq+UL2T4 SUptc1Ux02ozggTbv0Ndp5MN6H5TEiwyvRqdoHaz8mXDWf+5nFf/BRKSau3PilZsKgyY LLFg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:subject:user-agent:mime-version:date:message-id; bh=YKnBG/HpzkRLj7XkKMtrGtg178nJbsRq6ldtzTHjMIY=; b=uKrcP80dB32yZN1aE+LC76RM97LqGFDjPboj2ixcTl2WECsmWu7wXngyHw8EKWrVgO +EAyybTWHbLNMWO2fK6h1OIRu95YsBMHnIdDroswzMHGt4aAp6a89FLCSN8c/sGwD9JF fJVThArDj6cr2ULrCrzaGF155PEnjTiAO8A6hmW9pwR+UdSPzNqB2qr1HBNBhOKkXsSI hQrx8yxzdms6p+Vyd9RH515iv3tNoJiv/ptq5v0WYRDwuUDz/ButpkmJ651J/B+XiWIk ol0T9bPKguKE8J1oiuyFQNR4iK3vVAnGZwdi3LOu+0KDc0KU55cYM6/xeo8L1yaABu0O BgTg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id w6-20020aa7cb46000000b0041d7dba939asi729311edt.170.2022.05.23.22.35.16; Mon, 23 May 2022 22:35:42 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232414AbiEXBMH (ORCPT + 99 others); Mon, 23 May 2022 21:12:07 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:40900 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229470AbiEXBME (ORCPT ); Mon, 23 May 2022 21:12:04 -0400 Received: from szxga02-in.huawei.com (szxga02-in.huawei.com [45.249.212.188]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 604A86A409; Mon, 23 May 2022 18:12:03 -0700 (PDT) Received: from dggpemm500021.china.huawei.com (unknown [172.30.72.54]) by szxga02-in.huawei.com (SkyGuard) with ESMTP id 4L6bgf2Ms7zQkHB; Tue, 24 May 2022 09:09:02 +0800 (CST) Received: from dggpemm500014.china.huawei.com (7.185.36.153) by dggpemm500021.china.huawei.com (7.185.36.109) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.24; Tue, 24 May 2022 09:12:01 +0800 Received: from [10.174.178.120] (10.174.178.120) by dggpemm500014.china.huawei.com (7.185.36.153) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.24; Tue, 24 May 2022 09:12:00 +0800 Message-ID: <262cab19-0bca-a088-77a5-6a41f475f4a4@huawei.com> Date: Tue, 24 May 2022 09:11:59 +0800 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Thunderbird/91.8.0 Subject: Re: [PATCH 0/2] Add support to relocate kernel image to mirrored region To: CC: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , References: <20220419070150.254377-1-mawupeng1@huawei.com> <7058b8d8-c0cb-108e-0db9-2fdf5fb154cf@huawei.com> <7a1ce182-343a-75f9-5447-f7ca12cb0c36@huawei.com> From: mawupeng In-Reply-To: Content-Type: text/plain; charset="UTF-8"; format=flowed Content-Transfer-Encoding: 8bit X-Originating-IP: [10.174.178.120] X-ClientProxiedBy: dggems703-chm.china.huawei.com (10.3.19.180) To dggpemm500014.china.huawei.com (7.185.36.153) X-CFilter-Loop: Reflected X-Spam-Status: No, score=-7.5 required=5.0 tests=BAYES_00,NICE_REPLY_A, RCVD_IN_DNSWL_MED,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 在 2022/5/23 22:41, Ard Biesheuvel 写道: > On Mon, 23 May 2022 at 03:18, mawupeng wrote: >> >> >> >> 在 2022/5/20 14:52, Ard Biesheuvel 写道: >>> On Thu, 19 May 2022 at 13:09, mawupeng wrote: >>>> >>>> >>>> >>>> 在 2022/5/7 17:28, mawupeng 写道: >>>>> >>>>> >>>>> 在 2022/5/3 17:58, Ard Biesheuvel 写道: >>>>>> On Tue, 19 Apr 2022 at 08:43, Wupeng Ma wrote: >>>>>>> >>>>>>> From: Ma Wupeng >>>>>>> >>>>>>> Now system image will perfer to be located to mirrored regions both KASLR >>>>>>> on and off. >>>>>>> >>>>>> >>>>>> Hello Ma Wupeng, >>>>>> >>>>>> I wonder if we could simplify this as follows: >>>>>> - ignore the non-KASLR case for now, and rely on the bootloader > load the image into mirrored memory if it exists; >>>>> >>>>> In grub, memory for static image is allocated via the following path: >>>>> >>>>> grub_cmd_linux >>>>> kernel = grub_malloc(filelen) >>>>> kernel_alloc_addr = grub_efi_allocate_any_pages (kernel_alloc_pages) >>>>> grub_memcpy (kernel_addr, kernel, grub_min(filelen, kernel_size)) >>>>> grub_loader_set (grub_linux_boot, grub_linux_unload, 0) >>>>> >>>>> Can we get memory from mirrored region by the following steps: >>>>> 1. get memory map by calling grub_efi_get_memory_map() >>>>> 2. iter all memory map to find a suitable mirrored memory area >>>>> 3. locate kernel image to this area >>>>> >>>>> So, if kaslr is not enabled >>>>> - grub will load kernel into mirrored region >>>>> else >>>>> - arm64-stub.c will relocate kernel image to mirrored region >>>>> >>>>> Is this feasible? >>>> >>>> Is this a feasible proposal to relocate the static kernel image itself >>>> into more reliable memory? >>>> >>> >>> I'm not sure, it all depends on the firmware. >>> >>> When GRUB calls LoadImage(), the firmware will reallocate the image >>> and unpack it there. So it is really the firmware's job to ensure that >>> the image is loaded into a suitable location. >>> >>> I have some code here that implements a EFI based decompressor, and >>> which loads the kernel image into mirrored memory if it exists, >>> without the need to move it again. It could trivially be modified to >>> deal with non-randomized loads as well. >>> >>> But the bottom line is that UEFI should expose the ability to target >>> mirrored memory, hacking around it like this is not a sustainable >>> approach. >> >> Since firmware is responsible for put kernel static image into mirrored >> region and kernel is responsible for relocate this image into mirrored >> region if kaslr is enabled. There is no conflict between these two. >> >> Can we integrate the kernel part(introduce mirrored support to arm64) first? >> > > Yes. If you drop the changes related to fake memmap and rebase, please > resend them after -rc1 is released. Ok, I will drop the changes related to fake memmap and rebase and then resend them after -rc1 is released. Thanks for reviewing. > .