On Tue, 20 Jul 2021 at 15:10, Benjamin Herrenschmidt <benh@xxxxxxxxxxxxxxxxxxx> wrote: > > On Tue, 2021-07-20 at 14:57 +0200, Ard Biesheuvel wrote: > > On Tue, 20 Jul 2021 at 13:14, Benjamin Herrenschmidt > > <benh@xxxxxxxxxxxxxxxxxxx> wrote: > > > If efi_random_alloc() fails, we still try to use EFI_KIMG_ALIGN > > > instead of MIN_KIMG_ALIGN to check the kernel image alignment, > > > which is incorrect, we need to fallback to MIN_KIMG_ALIGN (2M). > > > > > > > Why? Relocatable kernels can happily execute from any 64k aligned > > address, and the PE/COFF header carries this value of 64k as the > > minimum alignment. > > This is not what I'm changing. If you look at the code before the > patch, it was *already* only allowing 64k alignment with kaslr enabled > (commit 7c116db24d94). There's even a big fat comment explaining why > though it could use more details. > But that only takes effect if efi_nokaslr is true, which is the default if CONFIG_RANDOMIZE_BASE is not set > In any case, the code isn't even testing for CONFIG_RELOCATABLE today, No, it tests for CONFIG_RANDOMIZE_BASE, which implies CONFIG_RELOCATABLE. > it makes its decisions entirely based on kaslr and doesn't properly > handle the case where efi_random_alloc() fails. > > This fixes it. > You are replacing min_kimg_align() with MIN_KIMG_ALIGN in a place where it could return either value: efi_nokaslr will be false by default on relocatable kernels, in which case min_kimg_align() will return EFI_KIMG_ALIGN, unless you specifically request KASLR to be disabled. The result is that relocatable kernels that would not require to be moved will now be moved to a 2 MB aligned offset before booting them. Similarly for the efi_allocate_pages_aligned() call: that call would only request 64k alignment before on a relocatable kernel if booting without randomization. > > > This removes the not-that-useful min_kimg_align helper and instead > > > uses the appropriate aligment in the respective call sites: > > > > > > efi_random_alloc() always wants EFI_KIMG_ALIGN as this is only > > > used when kaslr is on, and all other cases go into alignment > > > check code which always need to check (and enforce) MIN_KIMG_ALIGN > > > > > > Signed-off-by: Benjamin Herrenschmidt <benh@xxxxxxxxxxxxxxxxxxx> > > > Fixes: 7c116db24d94 (efi/libstub/arm64: Retain 2MB kernel Image alignment if !KASLR) > > > --- > > > drivers/firmware/efi/libstub/arm64-stub.c | 27 ++++++++++------------- > > > 1 file changed, 12 insertions(+), 15 deletions(-) > > > > > > diff --git a/drivers/firmware/efi/libstub/arm64-stub.c b/drivers/firmware/efi/libstub/arm64-stub.c > > > index 7bf0a7acae5e..e264ff90ba03 100644 > > > --- a/drivers/firmware/efi/libstub/arm64-stub.c > > > +++ b/drivers/firmware/efi/libstub/arm64-stub.c > > > @@ -34,18 +34,6 @@ efi_status_t check_platform_features(void) > > > return EFI_SUCCESS; > > > } > > > > > > -/* > > > - * Although relocatable kernels can fix up the misalignment with respect to > > > - * MIN_KIMG_ALIGN, the resulting virtual text addresses are subtly out of > > > - * sync with those recorded in the vmlinux when kaslr is disabled but the > > > - * image required relocation anyway. Therefore retain 2M alignment unless > > > - * KASLR is in use. > > > - */ > > > -static u64 min_kimg_align(void) > > > -{ > > > - return efi_nokaslr ? MIN_KIMG_ALIGN : EFI_KIMG_ALIGN; > > > -} > > > - > > > efi_status_t handle_kernel_image(unsigned long *image_addr, > > > unsigned long *image_size, > > > unsigned long *reserve_addr, > > > @@ -84,15 +72,24 @@ efi_status_t handle_kernel_image(unsigned long *image_addr, > > > /* > > > * If KASLR is enabled, and we have some randomness available, > > > * locate the kernel at a randomized offset in physical memory. > > > + * > > > + * In that case, we don't need to preserve the 2M alignment > > > */ > > > - status = efi_random_alloc(*reserve_size, min_kimg_align(), > > > + status = efi_random_alloc(*reserve_size, EFI_KIMG_ALIGN, > > > reserve_addr, phys_seed); > > > } else { > > > status = EFI_OUT_OF_RESOURCES; > > > } > > > > > > if (status != EFI_SUCCESS) { > > > - if (IS_ALIGNED((u64)_text, min_kimg_align())) { > > > + /* > > > + * Although relocatable kernels can fix up the misalignment with respect to > > > + * MIN_KIMG_ALIGN, the resulting virtual text addresses are subtly out of > > > + * sync with those recorded in the vmlinux when kaslr is disabled but the > > > + * image required relocation anyway. Therefore retain 2M alignment unless > > > + * KASLR is in use. > > > + */ > > > + if (IS_ALIGNED((u64)_text, MIN_KIMG_ALIGN)) { > > > /* > > > * Just execute from wherever we were loaded by the > > > * UEFI PE/COFF loader if the alignment is suitable. > > > @@ -103,7 +100,7 @@ efi_status_t handle_kernel_image(unsigned long *image_addr, > > > } > > > > > > status = efi_allocate_pages_aligned(*reserve_size, reserve_addr, > > > - ULONG_MAX, min_kimg_align()); > > > + ULONG_MAX, MIN_KIMG_ALIGN); > > > > > > if (status != EFI_SUCCESS) { > > > efi_err("Failed to relocate kernel\n"); > > > > > > > > > > > > > _______________________________________________ > > linux-arm-kernel mailing list > > linux-arm-kernel@xxxxxxxxxxxxxxxxxxx > > http://lists.infradead.org/mailman/listinfo/linux-arm-kernel >