From: WANG Rui <r@hev.cc>
To: Huacai Chen <chenhuacai@kernel.org>, Ard Biesheuvel <ardb@kernel.org>
Cc: WANG Xuerui <kernel@xen0n.name>,
Ilias Apalodimas <ilias.apalodimas@linaro.org>,
loongarch@lists.linux.dev, linux-efi@vger.kernel.org,
linux-kernel@vger.kernel.org, WANG Rui <r@hev.cc>
Subject: [RFC PATCH 3/3] LoongArch: Remove KASLR handling from relocate_kernel
Date: Sun, 26 Apr 2026 20:02:31 +0800 [thread overview]
Message-ID: <20260426120231.532644-4-r@hev.cc> (raw)
In-Reply-To: <20260426120231.532644-1-r@hev.cc>
With KASLR address selection handled earlier in the boot flow, the
in-kernel relocation logic is no longer needed.
Remove the code that determines a randomized relocation address and
copies the kernel image at runtime. relocate_kernel() is simplified
to apply relocation fixups only, and its return type is updated to
void since no offset is returned anymore.
Signed-off-by: WANG Rui <r@hev.cc>
---
arch/loongarch/include/asm/setup.h | 2 +-
arch/loongarch/kernel/head.S | 12 --
arch/loongarch/kernel/relocate.c | 182 +----------------------------
3 files changed, 6 insertions(+), 190 deletions(-)
diff --git a/arch/loongarch/include/asm/setup.h b/arch/loongarch/include/asm/setup.h
index f81375e5e89c..7e427484834d 100644
--- a/arch/loongarch/include/asm/setup.h
+++ b/arch/loongarch/include/asm/setup.h
@@ -42,7 +42,7 @@ extern long __relr_dyn_begin;
extern long __relr_dyn_end;
#endif
-extern unsigned long __init relocate_kernel(void);
+extern void __init relocate_kernel(void);
#endif
diff --git a/arch/loongarch/kernel/head.S b/arch/loongarch/kernel/head.S
index 4eed7bc312a8..e134f8b084a9 100644
--- a/arch/loongarch/kernel/head.S
+++ b/arch/loongarch/kernel/head.S
@@ -84,18 +84,6 @@ SYM_CODE_START(kernel_entry) # kernel entry point
bl relocate_kernel
-#ifdef CONFIG_RANDOMIZE_BASE
- /* Repoint the sp into the new kernel */
- PTR_LI sp, (_THREAD_SIZE - PT_SIZE)
- PTR_ADD sp, sp, tp
- set_saved_sp sp, t0, t1
-
- /* Jump to the new kernel: new_pc = current_pc + random_offset */
- pcaddi t0, 0
- PTR_ADD t0, t0, a0
- jirl zero, t0, 0xc
-#endif /* CONFIG_RANDOMIZE_BASE */
-
#endif /* CONFIG_RELOCATABLE */
#ifdef CONFIG_KASAN
diff --git a/arch/loongarch/kernel/relocate.c b/arch/loongarch/kernel/relocate.c
index 16f6a9b39659..a9273c80a9bf 100644
--- a/arch/loongarch/kernel/relocate.c
+++ b/arch/loongarch/kernel/relocate.c
@@ -18,7 +18,6 @@
#include <asm/setup.h>
#define RELOCATED(x) ((void *)((long)x + reloc_offset))
-#define RELOCATED_KASLR(x) ((void *)((long)x + random_offset))
static unsigned long reloc_offset;
@@ -58,13 +57,13 @@ static inline void __init relocate_relative(void)
#endif
}
-static inline void __init relocate_absolute(long random_offset)
+static inline void __init relocate_absolute(void)
{
void *begin, *end;
struct rela_la_abs *p;
- begin = RELOCATED_KASLR(&__la_abs_begin);
- end = RELOCATED_KASLR(&__la_abs_end);
+ begin = &__la_abs_begin;
+ end = &__la_abs_end;
for (p = begin; (void *)p < end; p++) {
long v = p->symvalue;
@@ -90,190 +89,19 @@ static inline void __init relocate_absolute(long random_offset)
}
}
-#ifdef CONFIG_RANDOMIZE_BASE
-static inline __init unsigned long rotate_xor(unsigned long hash,
- const void *area, size_t size)
+void __init relocate_kernel(void)
{
- size_t i, diff;
- const typeof(hash) *ptr = PTR_ALIGN(area, sizeof(hash));
-
- diff = (void *)ptr - area;
- if (size < diff + sizeof(hash))
- return hash;
-
- size = ALIGN_DOWN(size - diff, sizeof(hash));
-
- for (i = 0; i < size / sizeof(hash); i++) {
- /* Rotate by odd number of bits and XOR. */
- hash = (hash << ((sizeof(hash) * 8) - 7)) | (hash >> 7);
- hash ^= ptr[i];
- }
-
- return hash;
-}
-
-static inline __init unsigned long get_random_boot(void)
-{
- unsigned long hash = 0;
- unsigned long entropy = random_get_entropy();
-
- /* Attempt to create a simple but unpredictable starting entropy. */
- hash = rotate_xor(hash, linux_banner, strlen(linux_banner));
-
- /* Add in any runtime entropy we can get */
- hash = rotate_xor(hash, &entropy, sizeof(entropy));
-
- return hash;
-}
-
-static int __init nokaslr(char *p)
-{
- return 0; /* Just silence the boot warning */
-}
-early_param("nokaslr", nokaslr);
-
-#define KASLR_DISABLED_MESSAGE "KASLR is disabled by %s in %s cmdline.\n"
-
-static inline __init bool kaslr_disabled(void)
-{
- char *str;
- const char *builtin_cmdline = CONFIG_CMDLINE;
-
- str = strstr(builtin_cmdline, "nokaslr");
- if (str == builtin_cmdline || (str > builtin_cmdline && *(str - 1) == ' ')) {
- pr_info(KASLR_DISABLED_MESSAGE, "\'nokaslr\'", "built-in");
- return true;
- }
-
- str = strstr(boot_command_line, "nokaslr");
- if (str == boot_command_line || (str > boot_command_line && *(str - 1) == ' ')) {
- pr_info(KASLR_DISABLED_MESSAGE, "\'nokaslr\'", "bootloader");
- return true;
- }
-
-#ifdef CONFIG_HIBERNATION
- str = strstr(builtin_cmdline, "nohibernate");
- if (str == builtin_cmdline || (str > builtin_cmdline && *(str - 1) == ' '))
- return false;
-
- str = strstr(boot_command_line, "nohibernate");
- if (str == boot_command_line || (str > boot_command_line && *(str - 1) == ' '))
- return false;
-
- str = strstr(builtin_cmdline, "noresume");
- if (str == builtin_cmdline || (str > builtin_cmdline && *(str - 1) == ' '))
- return false;
-
- str = strstr(boot_command_line, "noresume");
- if (str == boot_command_line || (str > boot_command_line && *(str - 1) == ' '))
- return false;
-
- str = strstr(builtin_cmdline, "resume=");
- if (str == builtin_cmdline || (str > builtin_cmdline && *(str - 1) == ' ')) {
- pr_info(KASLR_DISABLED_MESSAGE, "\'resume=\'", "built-in");
- return true;
- }
-
- str = strstr(boot_command_line, "resume=");
- if (str == boot_command_line || (str > boot_command_line && *(str - 1) == ' ')) {
- pr_info(KASLR_DISABLED_MESSAGE, "\'resume=\'", "bootloader");
- return true;
- }
-#endif
-
- str = strstr(boot_command_line, "kexec_file");
- if (str == boot_command_line || (str > boot_command_line && *(str - 1) == ' ')) {
- pr_info(KASLR_DISABLED_MESSAGE, "\'kexec_file\'", "bootloader");
- return true;
- }
-
- return false;
-}
-
-/* Choose a new address for the kernel */
-static inline void __init *determine_relocation_address(void)
-{
- unsigned long kernel_length;
- unsigned long random_offset;
- void *destination = _text;
-
- if (kaslr_disabled())
- return destination;
-
- kernel_length = (unsigned long)_end - (unsigned long)_text;
-
- random_offset = get_random_boot() << 16;
- random_offset &= (CONFIG_RANDOMIZE_BASE_MAX_OFFSET - 1);
- if (random_offset < kernel_length)
- random_offset += ALIGN(kernel_length, 0xffff);
-
- return RELOCATED_KASLR(destination);
-}
-
-static inline int __init relocation_addr_valid(void *location_new)
-{
- if ((unsigned long)location_new & 0x00000ffff)
- return 0; /* Inappropriately aligned new location */
-
- if ((unsigned long)location_new < (unsigned long)_end)
- return 0; /* New location overlaps original kernel */
-
- return 1;
-}
-#endif
-
-static inline void __init update_reloc_offset(unsigned long *addr, long random_offset)
-{
- unsigned long *new_addr = (unsigned long *)RELOCATED_KASLR(addr);
-
- *new_addr = (unsigned long)reloc_offset;
-}
-
-unsigned long __init relocate_kernel(void)
-{
- unsigned long kernel_length;
- unsigned long random_offset = 0;
- void *location_new = _text; /* Default to original kernel start */
char *cmdline = early_memremap_ro(fw_arg1, COMMAND_LINE_SIZE); /* Boot command line is passed in fw_arg1 */
strscpy(boot_command_line, cmdline, COMMAND_LINE_SIZE);
-#ifdef CONFIG_RANDOMIZE_BASE
- location_new = determine_relocation_address();
-
- /* Sanity check relocation address */
- if (relocation_addr_valid(location_new))
- random_offset = (unsigned long)location_new - (unsigned long)(_text);
-#endif
reloc_offset = (unsigned long)_text - VMLINUX_LOAD_ADDRESS;
early_memunmap(cmdline, COMMAND_LINE_SIZE);
- if (random_offset) {
- kernel_length = (unsigned long)(_end) - (unsigned long)(_text);
-
- /* Copy the kernel to it's new location */
- memcpy(location_new, _text, kernel_length);
-
- /* Sync the caches ready for execution of new kernel */
- __asm__ __volatile__ (
- "ibar 0 \t\n"
- "dbar 0 \t\n"
- ::: "memory");
-
- reloc_offset += random_offset;
-
- /* The current thread is now within the relocated kernel */
- __current_thread_info = RELOCATED_KASLR(__current_thread_info);
-
- update_reloc_offset(&reloc_offset, random_offset);
- }
-
if (reloc_offset)
relocate_relative();
- relocate_absolute(random_offset);
-
- return random_offset;
+ relocate_absolute();
}
/*
--
2.54.0
prev parent reply other threads:[~2026-04-26 12:02 UTC|newest]
Thread overview: 6+ messages / expand[flat|nested] mbox.gz Atom feed top
2026-04-26 12:02 [RFC PATCH 0/3] LoongArch: Move KASLR to EFI stub to avoid initrd overlap WANG Rui
2026-04-26 12:02 ` [RFC PATCH 1/3] LoongArch: Allow rdtime_h and rdtime_l in 64-bit builds WANG Rui
2026-04-26 12:02 ` [RFC PATCH 2/3] efi/loongarch: Randomize kernel preferred address for KASLR WANG Rui
2026-04-27 5:07 ` Lisa Robinson
2026-04-27 7:49 ` hev
2026-04-26 12:02 ` WANG Rui [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20260426120231.532644-4-r@hev.cc \
--to=r@hev.cc \
--cc=ardb@kernel.org \
--cc=chenhuacai@kernel.org \
--cc=ilias.apalodimas@linaro.org \
--cc=kernel@xen0n.name \
--cc=linux-efi@vger.kernel.org \
--cc=linux-kernel@vger.kernel.org \
--cc=loongarch@lists.linux.dev \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox