From: Baoquan He <bhe@redhat.com>
To: Kees Cook <keescook@chromium.org>
Cc: LKML <linux-kernel@vger.kernel.org>,
"x86@kernel.org" <x86@kernel.org>,
"H. Peter Anvin" <hpa@zytor.com>,
Thomas Gleixner <tglx@linutronix.de>,
Ingo Molnar <mingo@kernel.org>,
Thomas Garnier <thgarnie@google.com>,
caoj.fnst@cn.fujitsu.com, izumi.taku@jp.fujitsu.com
Subject: Re: [PATCH v2 1/2] x86/boot/KASLR: Adapt process_e820_entry for any type of memory entry
Date: Thu, 6 Jul 2017 09:21:01 +0800 [thread overview]
Message-ID: <20170706012101.GH19994@x1> (raw)
In-Reply-To: <CAGXu5jJ2QYZNE2CgpU-CWWrMOR7KmvSPS1SF0cdYPZ_2vLg6=w@mail.gmail.com>
On 07/05/17 at 03:06pm, Kees Cook wrote:
> On Tue, Jul 4, 2017 at 1:04 AM, Baoquan He <bhe@redhat.com> wrote:
> > Now function process_e820_entry is only used to process e820 memory
> > entries. Adapt it for any type of memory entry, not just for e820.
> > Later we will use it to process efi mirror regions.
> >
> > So rename the old process_e820_entry to process_mem_region, and
> > extract and wrap the e820 specific processing code into process_e820_entry.
>
> This mixes changing the structure internals (.addr vs .start) with
> changing the processing logic (adding a wrapper). I would prefer this
> was done in several stages to make review easier:
OK, will do following below steps. Thanks!
>
> 1) lift e820 walking into a new function process_e820_entries(), and
> move TYPE_RAM logic there.
>
> 2) switch process_e820_entry() from struct boot_e820_entry to struct mem_vector.
>
> 3) rename (and adjust comments!) of process_e820_entry() into
> process_mem_region().
>
> -Kees
>
> >
> > Signed-off-by: Baoquan He <bhe@redhat.com>
> > ---
> > arch/x86/boot/compressed/kaslr.c | 60 ++++++++++++++++++++++------------------
> > 1 file changed, 33 insertions(+), 27 deletions(-)
> >
> > diff --git a/arch/x86/boot/compressed/kaslr.c b/arch/x86/boot/compressed/kaslr.c
> > index 91f27ab970ef..85c360eec4a6 100644
> > --- a/arch/x86/boot/compressed/kaslr.c
> > +++ b/arch/x86/boot/compressed/kaslr.c
> > @@ -479,35 +479,31 @@ static unsigned long slots_fetch_random(void)
> > return 0;
> > }
> >
> > -static void process_e820_entry(struct boot_e820_entry *entry,
> > +static void process_mem_region(struct mem_vector *entry,
> > unsigned long minimum,
> > unsigned long image_size)
> > {
> > struct mem_vector region, overlap;
> > struct slot_area slot_area;
> > unsigned long start_orig, end;
> > - struct boot_e820_entry cur_entry;
> > -
> > - /* Skip non-RAM entries. */
> > - if (entry->type != E820_TYPE_RAM)
> > - return;
> > + struct mem_vector cur_entry;
> >
> > /* On 32-bit, ignore entries entirely above our maximum. */
> > - if (IS_ENABLED(CONFIG_X86_32) && entry->addr >= KERNEL_IMAGE_SIZE)
> > + if (IS_ENABLED(CONFIG_X86_32) && entry->start >= KERNEL_IMAGE_SIZE)
> > return;
> >
> > /* Ignore entries entirely below our minimum. */
> > - if (entry->addr + entry->size < minimum)
> > + if (entry->start + entry->size < minimum)
> > return;
> >
> > /* Ignore entries above memory limit */
> > - end = min(entry->size + entry->addr, mem_limit);
> > - if (entry->addr >= end)
> > + end = min(entry->size + entry->start, mem_limit);
> > + if (entry->start >= end)
> > return;
> > - cur_entry.addr = entry->addr;
> > - cur_entry.size = end - entry->addr;
> > + cur_entry.start = entry->start;
> > + cur_entry.size = end - entry->start;
> >
> > - region.start = cur_entry.addr;
> > + region.start = cur_entry.start;
> > region.size = cur_entry.size;
> >
> > /* Give up if slot area array is full. */
> > @@ -522,7 +518,7 @@ static void process_e820_entry(struct boot_e820_entry *entry,
> > region.start = ALIGN(region.start, CONFIG_PHYSICAL_ALIGN);
> >
> > /* Did we raise the address above this e820 region? */
> > - if (region.start > cur_entry.addr + cur_entry.size)
> > + if (region.start > cur_entry.start + cur_entry.size)
> > return;
> >
> > /* Reduce size by any delta from the original address. */
> > @@ -562,12 +558,31 @@ static void process_e820_entry(struct boot_e820_entry *entry,
> > }
> > }
> >
> > -static unsigned long find_random_phys_addr(unsigned long minimum,
> > - unsigned long image_size)
> > +static void process_e820_entry(unsigned long minimum, unsigned long image_size)
> > {
> > int i;
> > - unsigned long addr;
> > + struct mem_vector region;
> > + struct boot_e820_entry *entry;
> > +
> > + /* Verify potential e820 positions, appending to slots list. */
> > + for (i = 0; i < boot_params->e820_entries; i++) {
> > + entry = &boot_params->e820_table[i];
> > + /* Skip non-RAM entries. */
> > + if (entry->type != E820_TYPE_RAM)
> > + continue;
> > + region.start = entry->addr;
> > + region.size = entry->size;
> > + process_mem_region(®ion, minimum, image_size);
> > + if (slot_area_index == MAX_SLOT_AREA) {
> > + debug_putstr("Aborted e820 scan (slot_areas full)!\n");
> > + break;
> > + }
> > + }
> > +}
> >
> > +static unsigned long find_random_phys_addr(unsigned long minimum,
> > + unsigned long image_size)
> > +{
> > /* Check if we had too many memmaps. */
> > if (memmap_too_large) {
> > debug_putstr("Aborted e820 scan (more than 4 memmap= args)!\n");
> > @@ -577,16 +592,7 @@ static unsigned long find_random_phys_addr(unsigned long minimum,
> > /* Make sure minimum is aligned. */
> > minimum = ALIGN(minimum, CONFIG_PHYSICAL_ALIGN);
> >
> > - /* Verify potential e820 positions, appending to slots list. */
> > - for (i = 0; i < boot_params->e820_entries; i++) {
> > - process_e820_entry(&boot_params->e820_table[i], minimum,
> > - image_size);
> > - if (slot_area_index == MAX_SLOT_AREA) {
> > - debug_putstr("Aborted e820 scan (slot_areas full)!\n");
> > - break;
> > - }
> > - }
> > -
> > + process_e820_entry(minimum, image_size);
> > return slots_fetch_random();
> > }
> >
> > --
> > 2.5.5
> >
>
>
>
> --
> Kees Cook
> Pixel Security
next prev parent reply other threads:[~2017-07-06 1:21 UTC|newest]
Thread overview: 11+ messages / expand[flat|nested] mbox.gz Atom feed top
2017-07-04 8:04 [PATCH v2 0/2] x86/boot/KASLR: Restrict kernel to be randomized in mirror regions Baoquan He
2017-07-04 8:04 ` [PATCH v2 1/2] x86/boot/KASLR: Adapt process_e820_entry for any type of memory entry Baoquan He
2017-07-05 22:06 ` Kees Cook
2017-07-06 1:21 ` Baoquan He [this message]
2017-07-04 8:04 ` [PATCH v2 2/2] x86/boot/KASLR: Restrict kernel to be randomized in mirror regions Baoquan He
2017-07-04 14:00 ` Thomas Gleixner
2017-07-04 14:30 ` Baoquan He
2017-07-04 14:46 ` Thomas Gleixner
2017-07-04 15:36 ` Matt Fleming
2017-07-04 15:46 ` Thomas Gleixner
2017-07-04 23:16 ` Baoquan He
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20170706012101.GH19994@x1 \
--to=bhe@redhat.com \
--cc=caoj.fnst@cn.fujitsu.com \
--cc=hpa@zytor.com \
--cc=izumi.taku@jp.fujitsu.com \
--cc=keescook@chromium.org \
--cc=linux-kernel@vger.kernel.org \
--cc=mingo@kernel.org \
--cc=tglx@linutronix.de \
--cc=thgarnie@google.com \
--cc=x86@kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox