All of lore.kernel.org
 help / color / mirror / Atom feed
* [PATCH v2] arm64: warn on incorrect placement of the kernel by the bootloader
@ 2020-06-11 12:43 Ard Biesheuvel
  2020-06-11 13:23 ` Will Deacon
  0 siblings, 1 reply; 5+ messages in thread
From: Ard Biesheuvel @ 2020-06-11 12:43 UTC (permalink / raw)
  To: linux-arm-kernel; +Cc: mark.rutland, maz, will, Ard Biesheuvel, jonathan

Commit cfa7ede20f133c ("arm64: set TEXT_OFFSET to 0x0 in preparation for
removing it entirely") results in boot failures when booting kernels that
are built without KASLR support on broken bootloaders that ignore the
TEXT_OFFSET value passed via the header, and use the default of 0x80000
instead.

To work around this, turn CONFIG_RELOCATABLE on by default, even if KASLR
itself (CONFIG_RANDOMIZE_BASE) is turned off, and require CONFIG_EXPERT
to be enabled to deviate from this. Then, emit a warning into the kernel
log if we are not booting via the EFI stub (which is permitted to deviate
from the placement restrictions) and the kernel base address is not placed
according to the rules as laid out in Documentation/arm64/booting.rst.

Signed-off-by: Ard Biesheuvel <ardb@kernel.org>
---
v2: use pr_warn() instead of WARN()

 arch/arm64/Kconfig        | 3 ++-
 arch/arm64/kernel/setup.c | 4 ++++
 2 files changed, 6 insertions(+), 1 deletion(-)

diff --git a/arch/arm64/Kconfig b/arch/arm64/Kconfig
index 7f9d38444d6d..16c3f158c80e 100644
--- a/arch/arm64/Kconfig
+++ b/arch/arm64/Kconfig
@@ -1740,8 +1740,9 @@ config ARM64_DEBUG_PRIORITY_MASKING
 endif
 
 config RELOCATABLE
-	bool
+	bool "Build a relocatable kernel image" if EXPERT
 	select ARCH_HAS_RELR
+	default y
 	help
 	  This builds the kernel as a Position Independent Executable (PIE),
 	  which retains all relocation metadata required to relocate the
diff --git a/arch/arm64/kernel/setup.c b/arch/arm64/kernel/setup.c
index 3fd2c11c09fc..5d7d6ac034fd 100644
--- a/arch/arm64/kernel/setup.c
+++ b/arch/arm64/kernel/setup.c
@@ -319,6 +319,10 @@ void __init setup_arch(char **cmdline_p)
 
 	xen_early_init();
 	efi_init();
+
+	if (!efi_enabled(EFI_BOOT) && ((u64)_text % MIN_KIMG_ALIGN) != 0)
+	     pr_warn(FW_BUG "Kernel image misaligned at boot, please fix your bootloader!");
+
 	arm64_memblock_init();
 
 	paging_init();
-- 
2.26.2


_______________________________________________
linux-arm-kernel mailing list
linux-arm-kernel@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/linux-arm-kernel

^ permalink raw reply related	[flat|nested] 5+ messages in thread

* Re: [PATCH v2] arm64: warn on incorrect placement of the kernel by the bootloader
  2020-06-11 12:43 [PATCH v2] arm64: warn on incorrect placement of the kernel by the bootloader Ard Biesheuvel
@ 2020-06-11 13:23 ` Will Deacon
  2020-06-13  8:45   ` Ard Biesheuvel
  0 siblings, 1 reply; 5+ messages in thread
From: Will Deacon @ 2020-06-11 13:23 UTC (permalink / raw)
  To: Ard Biesheuvel, linux-arm-kernel
  Cc: mark.rutland, catalin.marinas, Will Deacon, jonathan, maz

On Thu, 11 Jun 2020 14:43:30 +0200, Ard Biesheuvel wrote:
> Commit cfa7ede20f133c ("arm64: set TEXT_OFFSET to 0x0 in preparation for
> removing it entirely") results in boot failures when booting kernels that
> are built without KASLR support on broken bootloaders that ignore the
> TEXT_OFFSET value passed via the header, and use the default of 0x80000
> instead.
> 
> To work around this, turn CONFIG_RELOCATABLE on by default, even if KASLR
> itself (CONFIG_RANDOMIZE_BASE) is turned off, and require CONFIG_EXPERT
> to be enabled to deviate from this. Then, emit a warning into the kernel
> log if we are not booting via the EFI stub (which is permitted to deviate
> from the placement restrictions) and the kernel base address is not placed
> according to the rules as laid out in Documentation/arm64/booting.rst.

Applied to arm64 (for-next/core), thanks!

[1/1] arm64: warn on incorrect placement of the kernel by the bootloader
      https://git.kernel.org/arm64/c/dd4bc6076587

Cheers,
-- 
Will

https://fixes.arm64.dev
https://next.arm64.dev
https://will.arm64.dev

_______________________________________________
linux-arm-kernel mailing list
linux-arm-kernel@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/linux-arm-kernel

^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: [PATCH v2] arm64: warn on incorrect placement of the kernel by the bootloader
  2020-06-11 13:23 ` Will Deacon
@ 2020-06-13  8:45   ` Ard Biesheuvel
  2020-06-15  9:51     ` Will Deacon
  0 siblings, 1 reply; 5+ messages in thread
From: Ard Biesheuvel @ 2020-06-13  8:45 UTC (permalink / raw)
  To: Will Deacon
  Cc: Mark Rutland, Catalin Marinas, Jonathan Marek, Linux ARM, Marc Zyngier

On Thu, 11 Jun 2020 at 15:23, Will Deacon <will@kernel.org> wrote:
>
> On Thu, 11 Jun 2020 14:43:30 +0200, Ard Biesheuvel wrote:
> > Commit cfa7ede20f133c ("arm64: set TEXT_OFFSET to 0x0 in preparation for
> > removing it entirely") results in boot failures when booting kernels that
> > are built without KASLR support on broken bootloaders that ignore the
> > TEXT_OFFSET value passed via the header, and use the default of 0x80000
> > instead.
> >
> > To work around this, turn CONFIG_RELOCATABLE on by default, even if KASLR
> > itself (CONFIG_RANDOMIZE_BASE) is turned off, and require CONFIG_EXPERT
> > to be enabled to deviate from this. Then, emit a warning into the kernel
> > log if we are not booting via the EFI stub (which is permitted to deviate
> > from the placement restrictions) and the kernel base address is not placed
> > according to the rules as laid out in Documentation/arm64/booting.rst.
>
> Applied to arm64 (for-next/core), thanks!
>
> [1/1] arm64: warn on incorrect placement of the kernel by the bootloader
>       https://git.kernel.org/arm64/c/dd4bc6076587
>

This test

((u64)_text % MIN_KIMG_ALIGN) != 0

should have been written as

((u64)_text % MIN_KIMG_ALIGN) != TEXT_OFFSET

because now, we are throwing the warning when
CONFIG_ARM64_RANDOMIZE_TEXT_OFFSET is enabled :-(

I was reluctant to add another Makefile rule to add a
-DTEXT_OFFSET=... GCC option when compiling this source file, but it
appears we need it after all.

_______________________________________________
linux-arm-kernel mailing list
linux-arm-kernel@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/linux-arm-kernel

^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: [PATCH v2] arm64: warn on incorrect placement of the kernel by the bootloader
  2020-06-13  8:45   ` Ard Biesheuvel
@ 2020-06-15  9:51     ` Will Deacon
  2020-06-15  9:53       ` Ard Biesheuvel
  0 siblings, 1 reply; 5+ messages in thread
From: Will Deacon @ 2020-06-15  9:51 UTC (permalink / raw)
  To: Ard Biesheuvel
  Cc: Mark Rutland, Catalin Marinas, Jonathan Marek, Linux ARM, Marc Zyngier

On Sat, Jun 13, 2020 at 10:45:10AM +0200, Ard Biesheuvel wrote:
> On Thu, 11 Jun 2020 at 15:23, Will Deacon <will@kernel.org> wrote:
> >
> > On Thu, 11 Jun 2020 14:43:30 +0200, Ard Biesheuvel wrote:
> > > Commit cfa7ede20f133c ("arm64: set TEXT_OFFSET to 0x0 in preparation for
> > > removing it entirely") results in boot failures when booting kernels that
> > > are built without KASLR support on broken bootloaders that ignore the
> > > TEXT_OFFSET value passed via the header, and use the default of 0x80000
> > > instead.
> > >
> > > To work around this, turn CONFIG_RELOCATABLE on by default, even if KASLR
> > > itself (CONFIG_RANDOMIZE_BASE) is turned off, and require CONFIG_EXPERT
> > > to be enabled to deviate from this. Then, emit a warning into the kernel
> > > log if we are not booting via the EFI stub (which is permitted to deviate
> > > from the placement restrictions) and the kernel base address is not placed
> > > according to the rules as laid out in Documentation/arm64/booting.rst.
> >
> > Applied to arm64 (for-next/core), thanks!
> >
> > [1/1] arm64: warn on incorrect placement of the kernel by the bootloader
> >       https://git.kernel.org/arm64/c/dd4bc6076587
> >
> 
> This test
> 
> ((u64)_text % MIN_KIMG_ALIGN) != 0
> 
> should have been written as
> 
> ((u64)_text % MIN_KIMG_ALIGN) != TEXT_OFFSET
> 
> because now, we are throwing the warning when
> CONFIG_ARM64_RANDOMIZE_TEXT_OFFSET is enabled :-(
> 
> I was reluctant to add another Makefile rule to add a
> -DTEXT_OFFSET=... GCC option when compiling this source file, but it
> appears we need it after all.

FWIW, I'd be in favour of removing CONFIG_ARM64_RANDOMIZE_TEXT_OFFSET at
this stage as I don't really see the point in it, especially now that
TEXT_OFFSET is on the way out and we've practically forced the use of a
relocatable image.

What do you think?

Will

_______________________________________________
linux-arm-kernel mailing list
linux-arm-kernel@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/linux-arm-kernel

^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: [PATCH v2] arm64: warn on incorrect placement of the kernel by the bootloader
  2020-06-15  9:51     ` Will Deacon
@ 2020-06-15  9:53       ` Ard Biesheuvel
  0 siblings, 0 replies; 5+ messages in thread
From: Ard Biesheuvel @ 2020-06-15  9:53 UTC (permalink / raw)
  To: Will Deacon
  Cc: Mark Rutland, Catalin Marinas, Jonathan Marek, Linux ARM, Marc Zyngier

On Mon, 15 Jun 2020 at 11:51, Will Deacon <will@kernel.org> wrote:
>
> On Sat, Jun 13, 2020 at 10:45:10AM +0200, Ard Biesheuvel wrote:
> > On Thu, 11 Jun 2020 at 15:23, Will Deacon <will@kernel.org> wrote:
> > >
> > > On Thu, 11 Jun 2020 14:43:30 +0200, Ard Biesheuvel wrote:
> > > > Commit cfa7ede20f133c ("arm64: set TEXT_OFFSET to 0x0 in preparation for
> > > > removing it entirely") results in boot failures when booting kernels that
> > > > are built without KASLR support on broken bootloaders that ignore the
> > > > TEXT_OFFSET value passed via the header, and use the default of 0x80000
> > > > instead.
> > > >
> > > > To work around this, turn CONFIG_RELOCATABLE on by default, even if KASLR
> > > > itself (CONFIG_RANDOMIZE_BASE) is turned off, and require CONFIG_EXPERT
> > > > to be enabled to deviate from this. Then, emit a warning into the kernel
> > > > log if we are not booting via the EFI stub (which is permitted to deviate
> > > > from the placement restrictions) and the kernel base address is not placed
> > > > according to the rules as laid out in Documentation/arm64/booting.rst.
> > >
> > > Applied to arm64 (for-next/core), thanks!
> > >
> > > [1/1] arm64: warn on incorrect placement of the kernel by the bootloader
> > >       https://git.kernel.org/arm64/c/dd4bc6076587
> > >
> >
> > This test
> >
> > ((u64)_text % MIN_KIMG_ALIGN) != 0
> >
> > should have been written as
> >
> > ((u64)_text % MIN_KIMG_ALIGN) != TEXT_OFFSET
> >
> > because now, we are throwing the warning when
> > CONFIG_ARM64_RANDOMIZE_TEXT_OFFSET is enabled :-(
> >
> > I was reluctant to add another Makefile rule to add a
> > -DTEXT_OFFSET=... GCC option when compiling this source file, but it
> > appears we need it after all.
>
> FWIW, I'd be in favour of removing CONFIG_ARM64_RANDOMIZE_TEXT_OFFSET at
> this stage as I don't really see the point in it, especially now that
> TEXT_OFFSET is on the way out and we've practically forced the use of a
> relocatable image.
>
> What do you think?
>

I agree. TEXT_OFFSET now always deviates from the default value of
0x80000, and we are only now catching issues that
CONFIG_ARM64_RANDOMIZE_TEXT_OFFSET was intended to catch.

I'll prepare a patch.

_______________________________________________
linux-arm-kernel mailing list
linux-arm-kernel@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/linux-arm-kernel

^ permalink raw reply	[flat|nested] 5+ messages in thread

end of thread, other threads:[~2020-06-15  9:54 UTC | newest]

Thread overview: 5+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2020-06-11 12:43 [PATCH v2] arm64: warn on incorrect placement of the kernel by the bootloader Ard Biesheuvel
2020-06-11 13:23 ` Will Deacon
2020-06-13  8:45   ` Ard Biesheuvel
2020-06-15  9:51     ` Will Deacon
2020-06-15  9:53       ` Ard Biesheuvel

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.