Received: by 2002:a05:6358:3188:b0:123:57c1:9b43 with SMTP id q8csp36561822rwd; Tue, 11 Jul 2023 02:40:31 -0700 (PDT) X-Google-Smtp-Source: APBJJlH+x27T1fYLP0y94tB4WgPuVGPI4KrISqdgSfOgFa5x8NEy0bCTzD+XQP9yd/zCQPZvAC8d X-Received: by 2002:a05:6a00:cc6:b0:680:98c:c593 with SMTP id b6-20020a056a000cc600b00680098cc593mr20845708pfv.7.1689068431295; Tue, 11 Jul 2023 02:40:31 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1689068431; cv=none; d=google.com; s=arc-20160816; b=RE9g0upVS6COA4C5PXxYa0iH39Dml98ew04TNXAZVDaO5VPgahwvdE8RKQ7e2g04ja muuFPccvkbB7cOJ0vs3ifHICwj03KVjDWmH5FugUcJzyKGq4kp4u4Ub24LGHuUt7i1T3 lT593GRulfgk/UeyztHSRgVHDHXNW9lXTLFh5RXbRa0sr+Rn2w6me6xfBOOGQtzBsuBN sIl8K7LMmyVJTI0/MBwnHPc+IXGyC6UDvrXQfHfMfNlG4GsR4/iFIUE+ardvph/duN5g LMVEuBqA2m9bOZXEFvD4FVYU2L+PAliOUlsm6etpi4I+FRGtleUgSoVdFupRMktTF8bT XL0A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=IQL49+wkBQCrsk56hKhP7yDvFPKBFHJ/K6FeWsnjjXc=; fh=UoPnrMfWVKGOqsML3Cwqzr4dYAyNRBpPmY/ITnBmPi0=; b=TlqKmJMlyXE+ZUzhM8hWIH1ksUW/mwpiII4dXdu31Dz4c934UMjhVC/wnOsJQFScF2 roc5PJWBlxYs139Ir/OSKbHICV81IZjTdgd1hjdJyxsToLfnrLVjkcEcFLN52r+W7baY bOYOzkryRTkxq0UBLIxp/GuTPHNNLZNYIhFYUjOWRcG0v/dIp8skdGlKeKDOMliFnBpn Uj85rH53F+NBf63Ia5vTzFcR9AknpwLsdKzHiulu1q/L7S5wLQ8yJK+meIfUPPGXB9H2 KxW6wJKi9tT0C/Y5U23rTkfAiROAuQY8bG/+LpK/pbBRJZz9BjnDic84HPvgXu9Ddh2F YBaQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=j4vhaTiY; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id cb13-20020a056a00430d00b006819405e9d9si1212976pfb.145.2023.07.11.02.40.19; Tue, 11 Jul 2023 02:40:31 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=j4vhaTiY; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232142AbjGKJSj (ORCPT + 99 others); Tue, 11 Jul 2023 05:18:39 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:43258 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232138AbjGKJRk (ORCPT ); Tue, 11 Jul 2023 05:17:40 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 792ED10E5; Tue, 11 Jul 2023 02:16:25 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 5997E61419; Tue, 11 Jul 2023 09:16:25 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id E9341C433C9; Tue, 11 Jul 2023 09:16:20 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1689066984; bh=Os+OvcWXVTEgn4GvlOd4rs76sb2kuX0zlm0OhlZtKNw=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=j4vhaTiY4m3joYd8Ki5Wtq0h6rPlc7RkiIKhurjq5DuiOHIITiXKscZyLxG4Ui0eW j2Uj7wBRx7ieq4konR8ULmCobwFyaPnwOp/4pvkJsJTHICZcsWjRRiR3g/mKP/cQt+ aWhag3GbnvQJVT9ftiMuoh4DHXGq8tVh5UPqSjPC/2jeQxt3fzGJxInNCQDI9nrYeh 0hGWlP+/fIWyZP3tzJ3oVCa0dL77ePjfzs/rZ7dMkJ0L2LujgNnxt3F1RRi774VEwc lX+v+zMZPWL/u+Q7Ehpg3qf1s4pyKjqjylKV+UCY53cxj54bO4nx9/IyyyUlbzpiNW hlxOimYz3M1Cw== From: Ard Biesheuvel To: linux-efi@vger.kernel.org Cc: linux-kernel@vger.kernel.org, Ard Biesheuvel , Evgeniy Baskov , Borislav Petkov , Andy Lutomirski , Dave Hansen , Ingo Molnar , Peter Zijlstra , Thomas Gleixner , Alexey Khoroshilov , Peter Jones , Gerd Hoffmann , Dave Young , Mario Limonciello , Kees Cook , Tom Lendacky , "Kirill A . Shutemov" , Linus Torvalds , Joerg Roedel Subject: [PATCH v6 19/21] efi/libstub: Add limit argument to efi_random_alloc() Date: Tue, 11 Jul 2023 11:14:51 +0200 Message-Id: <20230711091453.2543622-20-ardb@kernel.org> X-Mailer: git-send-email 2.39.2 In-Reply-To: <20230711091453.2543622-1-ardb@kernel.org> References: <20230711091453.2543622-1-ardb@kernel.org> MIME-Version: 1.0 X-Developer-Signature: v=1; a=openpgp-sha256; l=3943; i=ardb@kernel.org; h=from:subject; bh=Os+OvcWXVTEgn4GvlOd4rs76sb2kuX0zlm0OhlZtKNw=; b=owGbwMvMwCFmkMcZplerG8N4Wi2JIWWtbNcS5do7oTpWZ7leH79/4ptb9c/JjLeZVQWF+MS2F e86L23UUcrCIMbBICumyCIw+++7nacnStU6z5KFmcPKBDKEgYtTACayrY+RYcUh56DF51d1/NVe EVh6Ofxv0bectw90pggF85zafFD5rBsjw6IXfktX30r4d37SxWmrfXcwKitICXcuC9WNdkxd8yn kEDMA X-Developer-Key: i=ardb@kernel.org; a=openpgp; fpr=F43D03328115A198C90016883D200E9CA6329909 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF, RCVD_IN_DNSWL_BLOCKED,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org x86 will need to limit the kernel memory allocation to the lowest 512 MiB of memory, to match the behavior of the existing bare metal KASLR physical randomization logic. So in preparation for that, add a limit parameter to efi_random_alloc() and wire it up. Signed-off-by: Ard Biesheuvel --- drivers/firmware/efi/libstub/arm64-stub.c | 2 +- drivers/firmware/efi/libstub/efistub.h | 2 +- drivers/firmware/efi/libstub/randomalloc.c | 10 ++++++---- drivers/firmware/efi/libstub/zboot.c | 2 +- 4 files changed, 9 insertions(+), 7 deletions(-) diff --git a/drivers/firmware/efi/libstub/arm64-stub.c b/drivers/firmware/efi/libstub/arm64-stub.c index 770b8ecb73984c61..8c40fc89f5f99209 100644 --- a/drivers/firmware/efi/libstub/arm64-stub.c +++ b/drivers/firmware/efi/libstub/arm64-stub.c @@ -106,7 +106,7 @@ efi_status_t handle_kernel_image(unsigned long *image_addr, */ status = efi_random_alloc(*reserve_size, min_kimg_align, reserve_addr, phys_seed, - EFI_LOADER_CODE); + EFI_LOADER_CODE, EFI_ALLOC_LIMIT); if (status != EFI_SUCCESS) efi_warn("efi_random_alloc() failed: 0x%lx\n", status); } else { diff --git a/drivers/firmware/efi/libstub/efistub.h b/drivers/firmware/efi/libstub/efistub.h index 06b7abc92ced9e18..9823f6fb3e01f718 100644 --- a/drivers/firmware/efi/libstub/efistub.h +++ b/drivers/firmware/efi/libstub/efistub.h @@ -956,7 +956,7 @@ efi_status_t efi_get_random_bytes(unsigned long size, u8 *out); efi_status_t efi_random_alloc(unsigned long size, unsigned long align, unsigned long *addr, unsigned long random_seed, - int memory_type); + int memory_type, unsigned long alloc_limit); efi_status_t efi_random_get_seed(void); diff --git a/drivers/firmware/efi/libstub/randomalloc.c b/drivers/firmware/efi/libstub/randomalloc.c index 32c7a54923b4c127..674a064b8f7adc68 100644 --- a/drivers/firmware/efi/libstub/randomalloc.c +++ b/drivers/firmware/efi/libstub/randomalloc.c @@ -16,7 +16,8 @@ */ static unsigned long get_entry_num_slots(efi_memory_desc_t *md, unsigned long size, - unsigned long align_shift) + unsigned long align_shift, + u64 alloc_limit) { unsigned long align = 1UL << align_shift; u64 first_slot, last_slot, region_end; @@ -29,7 +30,7 @@ static unsigned long get_entry_num_slots(efi_memory_desc_t *md, return 0; region_end = min(md->phys_addr + md->num_pages * EFI_PAGE_SIZE - 1, - (u64)EFI_ALLOC_LIMIT); + alloc_limit); if (region_end < size) return 0; @@ -54,7 +55,8 @@ efi_status_t efi_random_alloc(unsigned long size, unsigned long align, unsigned long *addr, unsigned long random_seed, - int memory_type) + int memory_type, + unsigned long alloc_limit) { unsigned long total_slots = 0, target_slot; unsigned long total_mirrored_slots = 0; @@ -76,7 +78,7 @@ efi_status_t efi_random_alloc(unsigned long size, efi_memory_desc_t *md = (void *)map->map + map_offset; unsigned long slots; - slots = get_entry_num_slots(md, size, ilog2(align)); + slots = get_entry_num_slots(md, size, ilog2(align), alloc_limit); MD_NUM_SLOTS(md) = slots; total_slots += slots; if (md->attribute & EFI_MEMORY_MORE_RELIABLE) diff --git a/drivers/firmware/efi/libstub/zboot.c b/drivers/firmware/efi/libstub/zboot.c index e5d7fa1f1d8fd160..bdb17eac0cb401be 100644 --- a/drivers/firmware/efi/libstub/zboot.c +++ b/drivers/firmware/efi/libstub/zboot.c @@ -119,7 +119,7 @@ efi_zboot_entry(efi_handle_t handle, efi_system_table_t *systab) } status = efi_random_alloc(alloc_size, min_kimg_align, &image_base, - seed, EFI_LOADER_CODE); + seed, EFI_LOADER_CODE, EFI_ALLOC_LIMIT); if (status != EFI_SUCCESS) { efi_err("Failed to allocate memory\n"); goto free_cmdline; -- 2.39.2