From: Baoquan He <bhe@redhat.com>
To: linux-kernel@vger.kernel.org
Cc: yinghai@kernel.org, keescook@chromium.org, hpa@zytor.com,
vgoyal@redhat.com, mingo@redhat.com, bp@alien8.de,
luto@kernel.org, lasse.collin@tukaani.org,
akpm@linux-foundation.org, dyoung@redhat.com
Subject: Re: [PATCH v3 00/19] x86, boot: kaslr cleanup and 64bit kaslr support
Date: Sat, 5 Mar 2016 19:35:24 +0800 [thread overview]
Message-ID: <20160305113524.GA10570@x1.redhat.com> (raw)
In-Reply-To: <1457108717-12191-1-git-send-email-bhe@redhat.com>
Forget mentioning this patchset is based on v4.5-rc6 of Linus's tree.
On 03/05/16 at 12:24am, Baoquan He wrote:
> ***Background:
> Previously a bug is reported that kdump didn't work when kaslr is enabled. During
> discussing that bug fix, we found current kaslr has a limilation that it can
> only randomize in 1GB region.
>
> This is because in curent kaslr implementaion only physical address of kernel
> loading is randomized. Then calculate the delta of physical address where
> vmlinux was linked to load and where it is finally loaded. If delta is not
> equal to 0, namely there's a new physical address where kernel is actually
> decompressed, relocation handling need be done. Then delta is added to offset
> of kernel symbol relocation, this makes the address of kernel text mapping move
> delta long. Though in principle kernel can be randomized to any physical address,
> kernel text mapping address space is limited and only 1G, namely as follows on
> x86_64:
> [0xffffffff80000000, 0xffffffffc0000000)
>
> In one word, kernel text physical address and virtual address randomization is
> coupled. This causes the limitation.
>
> Then hpa and Vivek suggested we should change this. To decouple the physical
> address and virtual address randomization of kernel text and let them work
> separately. Then kernel text physical address can be randomized in region
> [16M, 64T), and kernel text virtual address can be randomized in region
> [0xffffffff80000000, 0xffffffffc0000000).
>
> ***Problems we need solved:
> - For kernel boot from startup_32 case, only 0~4G identity mapping is built.
> If kernel will be randomly put anywhere from 16M to 64T at most, the price
> to build all region of identity mapping is too high. We need build the
> identity mapping on demand, not covering all physical address space.
>
> - Decouple the physical address and virtual address randomization of kernel
> text and let them work separately.
>
> ***Parts:
> - The 1st part is Yinghai's identity mapping building on demand patches.
> This is used to solve the first problem mentioned above.
> (Patch 09-10/19)
> - The 2nd part is decoupling the physical address and virtual address
> randomization of kernel text and letting them work separately patches
> based on Yinghai's ident mapping patches.
> (Patch 12-19/19)
> - The 3rd part is some clean up patches which Yinghai found when he reviewed
> my patches and the related code around.
> (Patch 01-08/19)
>
> ***Patch status:
> This patchset went through several rounds of review.
>
> - The first round can be found here:
> https://lwn.net/Articles/637115/
>
> - In 2nd round Yinghai made a big patchset including this kaslr fix and another
> setup_data related fix. The link is here:
> http://lists-archives.com/linux-kernel/28346903-x86-updated-patches-for-kaslr-and-setup_data-etc-for-v4-3.html
> You can get the code from Yinghai's git branch:
> git://git.kernel.org/pub/scm/linux/kernel/git/yinghai/linux-yinghai.git for-x86-v4.3-next
>
> - This post is the 3rd round. It only takes care of the kaslr related patches.
> For reviewers it's better to discuss only one issue in one thread.
> * I take off one patch as follows from Yinghai's because I think it's unnecessay.
> - Patch 05/19 x86, kaslr: rename output_size to output_run_size
> output_size is enough to represen the value:
> output_len > run_size ? output_len : run_size
>
> * I add Patch 04/19, it's a comment update patch. For other patches, I just
> adjust patch log and do several places of change comparing with 2nd round.
> Please check the change log under patch log of each patch for details.
>
> * I adjust sequence of several patches to make review easier. It doesn't
> affect codes.
>
> - You can also get this patchset from my github:
> https://github.com/baoquan-he/linux.git kaslr-above-4G
>
> Any comments and suggestions are welcome. Code changes, code comments, patch logs,
> anything you think it's unclear, please add your comment.
>
> Baoquan He (8):
> x86, kaskr: Update the description for decompressor worst case
> x86, kaslr: Fix a bug that relocation can not be handled when kernel
> is loaded above 2G
> x86, kaslr: Introduce struct slot_area to manage randomization slot
> info
> x86, kaslr: Add two functions which will be used later
> x86, kaslr: Introduce fetch_random_virt_offset to randomize the kernel
> text mapping address
> x86, kaslr: Randomize physical and virtual address of kernel
> separately
> x86, kaslr: Add support of kernel physical address randomization above
> 4G
> x86, kaslr: Remove useless codes
>
> Yinghai Lu (11):
> x86, kaslr: Remove not needed parameter for choose_kernel_location
> x86, boot: Move compressed kernel to end of buffer before
> decompressing
> x86, boot: Move z_extract_offset calculation to header.S
> x86, boot: Fix run_size calculation
> x86, kaslr: Clean up useless code related to run_size.
> x86, kaslr: Get correct max_addr for relocs pointer
> x86, kaslr: Consolidate mem_avoid array filling
> x86, boot: Split kernel_ident_mapping_init to another file
> x86, 64bit: Set ident_mapping for kaslr
> x86, boot: Add checking for memcpy
> x86, kaslr: Allow random address to be below loaded address
>
> arch/x86/boot/Makefile | 13 +-
> arch/x86/boot/compressed/Makefile | 19 ++-
> arch/x86/boot/compressed/aslr.c | 258 +++++++++++++++++++++++----------
> arch/x86/boot/compressed/head_32.S | 14 +-
> arch/x86/boot/compressed/head_64.S | 15 +-
> arch/x86/boot/compressed/misc.c | 94 +++++++-----
> arch/x86/boot/compressed/misc.h | 34 +++--
> arch/x86/boot/compressed/misc_pgt.c | 91 ++++++++++++
> arch/x86/boot/compressed/mkpiggy.c | 28 +---
> arch/x86/boot/compressed/string.c | 29 +++-
> arch/x86/boot/compressed/vmlinux.lds.S | 1 +
> arch/x86/boot/header.S | 22 ++-
> arch/x86/include/asm/boot.h | 19 +++
> arch/x86/include/asm/page.h | 5 +
> arch/x86/kernel/asm-offsets.c | 1 +
> arch/x86/kernel/vmlinux.lds.S | 1 +
> arch/x86/mm/ident_map.c | 74 ++++++++++
> arch/x86/mm/init_64.c | 74 +---------
> arch/x86/tools/calc_run_size.sh | 42 ------
> 19 files changed, 543 insertions(+), 291 deletions(-)
> create mode 100644 arch/x86/boot/compressed/misc_pgt.c
> create mode 100644 arch/x86/mm/ident_map.c
> delete mode 100644 arch/x86/tools/calc_run_size.sh
>
> --
> 2.5.0
>
prev parent reply other threads:[~2016-03-05 11:35 UTC|newest]
Thread overview: 51+ messages / expand[flat|nested] mbox.gz Atom feed top
2016-03-04 16:24 [PATCH v3 00/19] x86, boot: kaslr cleanup and 64bit kaslr support Baoquan He
2016-03-04 16:24 ` [PATCH v3 01/19] x86, kaslr: Remove not needed parameter for choose_kernel_location Baoquan He
2016-03-07 22:28 ` Kees Cook
2016-03-04 16:25 ` [PATCH v3 02/19] x86, boot: Move compressed kernel to end of buffer before decompressing Baoquan He
2016-03-07 22:35 ` Kees Cook
2016-03-08 4:50 ` Baoquan He
2016-03-04 16:25 ` [PATCH v3 03/19] x86, boot: Move z_extract_offset calculation to header.S Baoquan He
2016-03-04 16:25 ` [PATCH v3 04/19] x86, kaskr: Update the description for decompressor worst case Baoquan He
2016-03-04 16:25 ` [PATCH v3 05/19] x86, boot: Fix run_size calculation Baoquan He
2016-03-07 23:10 ` Kees Cook
2016-03-08 4:57 ` Baoquan He
2016-03-08 18:05 ` Kees Cook
2016-03-04 16:25 ` [PATCH v3 06/19] x86, kaslr: Clean up useless code related to run_size Baoquan He
2016-03-07 23:12 ` Kees Cook
2016-03-08 5:00 ` Baoquan He
2016-03-04 16:25 ` [PATCH v3 07/19] x86, kaslr: Get correct max_addr for relocs pointer Baoquan He
2016-03-07 23:16 ` Kees Cook
2016-03-08 5:13 ` Baoquan He
2016-03-08 18:16 ` Kees Cook
2016-03-09 13:46 ` Baoquan He
2016-03-04 16:25 ` [PATCH v3 08/19] x86, kaslr: Consolidate mem_avoid array filling Baoquan He
2016-03-07 23:28 ` Kees Cook
2016-03-08 5:21 ` Baoquan He
2016-03-08 18:17 ` Kees Cook
2016-03-09 13:42 ` Baoquan He
2016-03-04 16:25 ` [PATCH v3 09/19] x86, boot: Split kernel_ident_mapping_init to another file Baoquan He
2016-03-04 16:25 ` [PATCH v3 10/19] x86, 64bit: Set ident_mapping for kaslr Baoquan He
2016-03-07 23:34 ` Kees Cook
2016-03-08 5:25 ` Baoquan He
2016-03-21 7:50 ` Baoquan He
2016-03-21 19:48 ` Kees Cook
2016-03-04 16:25 ` [PATCH v3 11/19] x86, boot: Add checking for memcpy Baoquan He
2016-03-07 23:36 ` Kees Cook
2016-03-08 5:30 ` Baoquan He
2016-03-04 16:25 ` [PATCH v3 12/19] x86, kaslr: Fix a bug that relocation can not be handled when kernel is loaded above 2G Baoquan He
2016-03-07 23:30 ` Kees Cook
2016-03-08 5:22 ` Baoquan He
2016-03-04 16:25 ` [PATCH v3 13/19] x86, kaslr: Introduce struct slot_area to manage randomization slot info Baoquan He
2016-03-04 16:25 ` [PATCH v3 14/19] x86, kaslr: Add two functions which will be used later Baoquan He
2016-03-04 16:25 ` [PATCH v3 15/19] x86, kaslr: Introduce fetch_random_virt_offset to randomize the kernel text mapping address Baoquan He
2016-03-04 16:25 ` [PATCH v3 16/19] x86, kaslr: Randomize physical and virtual address of kernel separately Baoquan He
2016-03-07 23:51 ` Kees Cook
2016-03-08 5:34 ` Baoquan He
2016-03-08 18:24 ` Kees Cook
2016-03-09 13:40 ` Baoquan He
2016-03-09 18:07 ` Kees Cook
2016-03-10 15:15 ` Baoquan He
2016-03-04 16:25 ` [PATCH v3 17/19] x86, kaslr: Add support of kernel physical address randomization above 4G Baoquan He
2016-03-04 16:25 ` [PATCH v3 18/19] x86, kaslr: Remove useless codes Baoquan He
2016-03-04 16:25 ` [PATCH v3 19/19] x86, kaslr: Allow random address to be below loaded address Baoquan He
2016-03-05 11:35 ` Baoquan He [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20160305113524.GA10570@x1.redhat.com \
--to=bhe@redhat.com \
--cc=akpm@linux-foundation.org \
--cc=bp@alien8.de \
--cc=dyoung@redhat.com \
--cc=hpa@zytor.com \
--cc=keescook@chromium.org \
--cc=lasse.collin@tukaani.org \
--cc=linux-kernel@vger.kernel.org \
--cc=luto@kernel.org \
--cc=mingo@redhat.com \
--cc=vgoyal@redhat.com \
--cc=yinghai@kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).