Received: by 2002:a05:7412:bb8d:b0:d7:7d3a:4fe2 with SMTP id js13csp2806630rdb; Fri, 18 Aug 2023 11:00:55 -0700 (PDT) X-Google-Smtp-Source: AGHT+IHJbKbOgrlel74W2H2tO1HXz+Wj3p0I7chV7QWwzVANRfrL9/QZecsXAQ3EsEi9Tia4CSXW X-Received: by 2002:a17:90b:1d03:b0:26d:1e39:faae with SMTP id on3-20020a17090b1d0300b0026d1e39faaemr3147575pjb.22.1692381654720; Fri, 18 Aug 2023 11:00:54 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1692381654; cv=none; d=google.com; s=arc-20160816; b=WA+WZxrIYdB/MsXyAhmg2gD2dt2rHYacxsg+/n5jhOGYFlyldvVfcd42P1P3f6S0Jx pW1kxrue0zPDLUrkY5HBuKohEEy/Mdy8fxAsJZqPqNjc2TAf58Q9m4hmHksL0OjCP3Sv OyjcT2OLV+Q12WLpXy1U5xDD+b4nvksMJxwDDI1qysWAxdCRBSVGGT1GMgaHYL6kolRV aNHSIMXPgeek2CsvRBfMoMMJmkz6QVxWV2yL0QLOKY8P0H+PSc86Fxu4Zy1x4+sXLJk6 9YBDq6h00+A3EIW5Mw9y4jyzF28XRkoHgJmvdWHIUwE4ngkeNjfT93KFrce9A8d5aJNj PnNQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=bCcDh6mKX9WtjkF3QOdIzp6xIhJmOsyDzq6xZtLGu5k=; fh=2K0cnVWNN/lSoXOQ2Jt2UifFp/1e7O4elwn57wGf9gU=; b=NV13i4s8VZZd6b4hfiOP7LEz6IFyHuMzkEoLh3OBRQ6Ah3mFf0UeBOnGpmFVgu2Ewz qxC0Zaq8Q3zYFh5XAyP7yjemmz5H2L0cWZn0Z4BSd+vvtaLBLRTNkgunOTME59Eee/Mp zZMv7uP+6Hf8Wlvccn739dfPSpzk0gnGJCfPnCs0z7GUYC6w2eD1+dBp5+L6Wb9GAmda ATZ1ed/Nt6ysbOQVPNkcadhF2C3gOlwpapvA1RxYABDVg2EG0QHhz6yAhpcs8gjYq87h i6DFwtNKM7w3rwaJlNbVRQq8xuAe+gF+v/xjVfqNEEf5Dy6+OVhlG0W4GI1zi+VjLr3X nR6A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=X54fwvXA; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id c5-20020a170903234500b001b045d65aedsi1868038plh.228.2023.08.18.11.00.41; Fri, 18 Aug 2023 11:00:54 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=X54fwvXA; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1377255AbjHRNov (ORCPT + 99 others); Fri, 18 Aug 2023 09:44:51 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:55100 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1357417AbjHRNoo (ORCPT ); Fri, 18 Aug 2023 09:44:44 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id B58CB3589; Fri, 18 Aug 2023 06:44:42 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 5473666572; Fri, 18 Aug 2023 13:44:42 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id CAC4BC433C8; Fri, 18 Aug 2023 13:44:38 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1692366281; bh=m4kdhoIm71fqmT8MrBnTq3U3pdgSRr+oKh3NxokiMAc=; h=From:To:Cc:Subject:Date:From; b=X54fwvXA11/su1VMB+pIIHIaiTlfQa+hG4io26pTGccAhG7M8zkzpGZSZVKJD9DeL 679APaqelPYvNZxQWb5c/MNee+eILwVO5A9RZtnLJTJDfpXsxH4T3XlowLmDcaL7fA J43j0DlQ5T4RIhwc8iq/dp5L1zEtLP8UZm1WYyhcICK4jd+A6NVkrywhoPLF0mBvk2 bSkOxlHv335ClkS9ls/Dyn/LP7CPgmL1ZLOG4DnKgQ5H8t4BUG3N0wks45VGiCp9tA lCSVcO3EguFwdz0yDT9aDpts3Ow8LK+eATBkK1DndOXMOwcx2cAsyAmp3MWoiec09E 32TVNpMU2hnxQ== From: Ard Biesheuvel To: linux-efi@vger.kernel.org Cc: linux-kernel@vger.kernel.org, Ard Biesheuvel , Evgeniy Baskov , Borislav Petkov , Dave Hansen , Ingo Molnar , Thomas Gleixner , Peter Jones , Matthew Garrett , Gerd Hoffmann , Kees Cook , "H. Peter Anvin" , =?UTF-8?q?Marvin=20H=C3=A4user?= Subject: [PATCH 00/17] x86/boot: Rework PE header generation Date: Fri, 18 Aug 2023 15:44:05 +0200 Message-Id: <20230818134422.380032-1-ardb@kernel.org> X-Mailer: git-send-email 2.39.2 MIME-Version: 1.0 X-Developer-Signature: v=1; a=openpgp-sha256; l=4106; i=ardb@kernel.org; h=from:subject; bh=m4kdhoIm71fqmT8MrBnTq3U3pdgSRr+oKh3NxokiMAc=; b=owGbwMvMwCFmkMcZplerG8N4Wi2JIeV+6ZQ/+w5YTjl2+95+u2sXM5nteLyTPzxj7xO8xce0b auN8Iy0jlIWBjEOBlkxRRaB2X/f7Tw9UarWeZYszBxWJpAhDFycAjCRPSEM/xPEptc+KnzStkiX uS8t9kPql+33P/JovXbIZpX6VzT5pQojw/3zQmkqoVl5i5+LVq+e9fXE0tI7Uz7XJeQn6/znlQ5 +wAcA X-Developer-Key: i=ardb@kernel.org; a=openpgp; fpr=F43D03328115A198C90016883D200E9CA6329909 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-7.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Now that the EFI stub boot flow no longer relies on memory that is executable and writable at the same time, we can reorganize the PE/COFF view of the kernel image and expose the decompressor binary's code and r/o data as a .text section and data/bss as a .data section, using 4k alignment and limited permissions. Doing so is necessary for compatibility with hardening measures that are being rolled out on x86 PCs built to run Windows (i.e., the majority of them). The EFI boot environment that the Linux EFI stub executes in is especially sensitive to safety issues, given that a vulnerability in the loader of one OS can be abused to attack another. In true x86 fashion, this is more complicated than on other architectures, which have implemented this code/data split with 4k alignment from the beginning. The complicating factor here is that the boot image consists of two different parts, which are stitched together and fixed up using a special build tool. The first three patches simplify the x86 EFI stub code so it does not even bother reading the setup header from the image - passing arguments this way is not supported by EFI boot anyway. Then, the bzImage is simplified and reorganized, primarily by: - dropping the ancient 'bugger off' message occupying much of the header space - using a fixed size of 16k for the setup block - setting header values from asm instead of via the build tool Finally, the payload is split into .text and .data, and the section and file alignment increased to 4k/512 respectively. The only remaining task performed by the build tool is generating the CRC-32 that is fundamentally broken in practice and never used, so that is dropped entirely at the end. This supersedes the work proposed by Evgeniy last year, which did a major rewrite of the build tool in order to clean it up, before updating it to generate the new 4k aligned image layout. As this series proves, the build tool is mostly unnecessary, and we have too many of those already. Cc: Evgeniy Baskov Cc: Borislav Petkov Cc: Dave Hansen Cc: Ingo Molnar Cc: Thomas Gleixner Cc: Peter Jones Cc: Matthew Garrett Cc: Gerd Hoffmann Cc: Kees Cook Cc: "H. Peter Anvin" Cc: Marvin Häuser Ard Biesheuvel (17): x86/efi: Drop EFI stub .bss from .data section x86/efi: Disregard setup header of loaded image x86/efi: Drop alignment flags from PE section headers x86/boot: Remove the 'bugger off' message x86/boot: Omit compression buffer from PE/COFF image memory footprint x86/boot: Drop redundant code setting the root device x86/boot: Grab kernel_info offset from zoffset header directly x86/boot: Drop references to startup_64 x86/boot: Set EFI handover offset directly in header asm x86/boot: Drop workaround for binutils 2.14 in linker script ASSERTs x86/boot: Use fixed size of 16k for setup block x86/boot: Derive file size from _edata symbol x86/boot: Construct PE/COFF .text section from assembler x86/boot: Drop PE/COFF .reloc section x86/boot: Split off PE/COFF .data section x86/boot: Increase section and file alignment to 4k/512 x86/boot: Drop CRC-32 checksum and the build tool that generates it Documentation/arch/x86/boot.rst | 10 - arch/x86/boot/Makefile | 12 +- arch/x86/boot/compressed/vmlinux.lds.S | 5 +- arch/x86/boot/header.S | 217 ++++----- arch/x86/boot/setup.ld | 21 +- arch/x86/boot/tools/.gitignore | 2 - arch/x86/boot/tools/build.c | 502 -------------------- drivers/firmware/efi/libstub/Makefile | 7 - drivers/firmware/efi/libstub/x86-stub.c | 46 +- 9 files changed, 113 insertions(+), 709 deletions(-) delete mode 100644 arch/x86/boot/tools/.gitignore delete mode 100644 arch/x86/boot/tools/build.c -- 2.39.2