kaslr.c 14.3 KB
Newer Older
1 2 3 4 5 6 7 8 9 10 11
/*
 * kaslr.c
 *
 * This contains the routines needed to generate a reasonable level of
 * entropy to choose a randomized kernel base address offset in support
 * of Kernel Address Space Layout Randomization (KASLR). Additionally
 * handles walking the physical memory maps (and tracking memory regions
 * to avoid) in order to select a physical memory location that can
 * contain the entire properly aligned running kernel image.
 *
 */
12
#include "misc.h"
13
#include "error.h"
14

15 16 17 18 19 20 21
#include <generated/compile.h>
#include <linux/module.h>
#include <linux/uts.h>
#include <linux/utsname.h>
#include <generated/utsrelease.h>

/* Simplified build-specific string for starting entropy. */
22
static const char build_str[] = UTS_RELEASE " (" LINUX_COMPILE_BY "@"
23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40
		LINUX_COMPILE_HOST ") (" LINUX_COMPILER ") " UTS_VERSION;

static unsigned long rotate_xor(unsigned long hash, const void *area,
				size_t size)
{
	size_t i;
	unsigned long *ptr = (unsigned long *)area;

	for (i = 0; i < size / sizeof(hash); i++) {
		/* Rotate by odd number of bits and XOR. */
		hash = (hash << ((sizeof(hash) * 8) - 7)) | (hash >> 7);
		hash ^= ptr[i];
	}

	return hash;
}

/* Attempt to create a simple but unpredictable starting entropy. */
41
static unsigned long get_boot_seed(void)
42 43 44 45
{
	unsigned long hash = 0;

	hash = rotate_xor(hash, build_str, sizeof(build_str));
46
	hash = rotate_xor(hash, boot_params, sizeof(*boot_params));
47 48 49 50

	return hash;
}

51 52
#define KASLR_COMPRESSED_BOOT
#include "../../lib/kaslr.c"
53

54 55 56 57 58
struct mem_vector {
	unsigned long start;
	unsigned long size;
};

59 60 61 62 63 64 65 66
enum mem_avoid_index {
	MEM_AVOID_ZO_RANGE = 0,
	MEM_AVOID_INITRD,
	MEM_AVOID_CMDLINE,
	MEM_AVOID_BOOTPARAMS,
	MEM_AVOID_MAX,
};

67
static struct mem_vector mem_avoid[MEM_AVOID_MAX];
68 69 70 71 72 73 74 75 76 77 78 79

static bool mem_overlaps(struct mem_vector *one, struct mem_vector *two)
{
	/* Item one is entirely before item two. */
	if (one->start + one->size <= two->start)
		return false;
	/* Item one is entirely after item two. */
	if (one->start >= two->start + two->size)
		return false;
	return true;
}

80
/*
81 82 83
 * In theory, KASLR can put the kernel anywhere in the range of [16M, 64T).
 * The mem_avoid array is used to store the ranges that need to be avoided
 * when KASLR searches for an appropriate random address. We must avoid any
84
 * regions that are unsafe to overlap with during decompression, and other
85 86 87 88 89
 * things like the initrd, cmdline and boot_params. This comment seeks to
 * explain mem_avoid as clearly as possible since incorrect mem_avoid
 * memory ranges lead to really hard to debug boot failures.
 *
 * The initrd, cmdline, and boot_params are trivial to identify for
90
 * avoiding. They are MEM_AVOID_INITRD, MEM_AVOID_CMDLINE, and
91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110
 * MEM_AVOID_BOOTPARAMS respectively below.
 *
 * What is not obvious how to avoid is the range of memory that is used
 * during decompression (MEM_AVOID_ZO_RANGE below). This range must cover
 * the compressed kernel (ZO) and its run space, which is used to extract
 * the uncompressed kernel (VO) and relocs.
 *
 * ZO's full run size sits against the end of the decompression buffer, so
 * we can calculate where text, data, bss, etc of ZO are positioned more
 * easily.
 *
 * For additional background, the decompression calculations can be found
 * in header.S, and the memory diagram is based on the one found in misc.c.
 *
 * The following conditions are already enforced by the image layouts and
 * associated code:
 *  - input + input_size >= output + output_size
 *  - kernel_total_size <= init_size
 *  - kernel_total_size <= output_size (see Note below)
 *  - output + init_size >= output + output_size
111
 *
112 113 114 115 116
 * (Note that kernel_total_size and output_size have no fundamental
 * relationship, but output_size is passed to choose_random_location
 * as a maximum of the two. The diagram is showing a case where
 * kernel_total_size is larger than output_size, but this case is
 * handled by bumping output_size.)
117
 *
118
 * The above conditions can be illustrated by a diagram:
119
 *
120 121 122 123 124 125 126
 * 0   output            input            input+input_size    output+init_size
 * |     |                 |                             |             |
 * |     |                 |                             |             |
 * |-----|--------|--------|--------------|-----------|--|-------------|
 *                |                       |           |
 *                |                       |           |
 * output+init_size-ZO_INIT_SIZE  output+output_size  output+kernel_total_size
127
 *
128 129
 * [output, output+init_size) is the entire memory range used for
 * extracting the compressed image.
130
 *
131 132
 * [output, output+kernel_total_size) is the range needed for the
 * uncompressed kernel (VO) and its run size (bss, brk, etc).
133
 *
134 135 136
 * [output, output+output_size) is VO plus relocs (i.e. the entire
 * uncompressed payload contained by ZO). This is the area of the buffer
 * written to during decompression.
137
 *
138 139 140
 * [output+init_size-ZO_INIT_SIZE, output+init_size) is the worst-case
 * range of the copied ZO and decompression code. (i.e. the range
 * covered backwards of size ZO_INIT_SIZE, starting from output+init_size.)
141
 *
142 143 144
 * [input, input+input_size) is the original copied compressed image (ZO)
 * (i.e. it does not include its run size). This range must be avoided
 * because it contains the data used for decompression.
145
 *
146 147 148
 * [input+input_size, output+init_size) is [_text, _end) for ZO. This
 * range includes ZO's heap and stack, and must be avoided since it
 * performs the decompression.
149
 *
150 151 152
 * Since the above two ranges need to be avoided and they are adjacent,
 * they can be merged, resulting in: [input, output+init_size) which
 * becomes the MEM_AVOID_ZO_RANGE below.
153
 */
154
static void mem_avoid_init(unsigned long input, unsigned long input_size,
155
			   unsigned long output)
156
{
157
	unsigned long init_size = boot_params->hdr.init_size;
158 159 160 161 162 163
	u64 initrd_start, initrd_size;
	u64 cmd_line, cmd_line_size;
	char *ptr;

	/*
	 * Avoid the region that is unsafe to overlap during
164
	 * decompression.
165
	 */
166 167
	mem_avoid[MEM_AVOID_ZO_RANGE].start = input;
	mem_avoid[MEM_AVOID_ZO_RANGE].size = (output + init_size) - input;
168 169
	add_identity_map(mem_avoid[MEM_AVOID_ZO_RANGE].start,
			 mem_avoid[MEM_AVOID_ZO_RANGE].size);
170 171

	/* Avoid initrd. */
172 173 174 175
	initrd_start  = (u64)boot_params->ext_ramdisk_image << 32;
	initrd_start |= boot_params->hdr.ramdisk_image;
	initrd_size  = (u64)boot_params->ext_ramdisk_size << 32;
	initrd_size |= boot_params->hdr.ramdisk_size;
176 177
	mem_avoid[MEM_AVOID_INITRD].start = initrd_start;
	mem_avoid[MEM_AVOID_INITRD].size = initrd_size;
178
	/* No need to set mapping for initrd, it will be handled in VO. */
179 180

	/* Avoid kernel command line. */
181 182
	cmd_line  = (u64)boot_params->ext_cmd_line_ptr << 32;
	cmd_line |= boot_params->hdr.cmd_line_ptr;
183 184 185 186
	/* Calculate size of cmd_line. */
	ptr = (char *)(unsigned long)cmd_line;
	for (cmd_line_size = 0; ptr[cmd_line_size++]; )
		;
187 188
	mem_avoid[MEM_AVOID_CMDLINE].start = cmd_line;
	mem_avoid[MEM_AVOID_CMDLINE].size = cmd_line_size;
189 190
	add_identity_map(mem_avoid[MEM_AVOID_CMDLINE].start,
			 mem_avoid[MEM_AVOID_CMDLINE].size);
191

192 193 194
	/* Avoid boot parameters. */
	mem_avoid[MEM_AVOID_BOOTPARAMS].start = (unsigned long)boot_params;
	mem_avoid[MEM_AVOID_BOOTPARAMS].size = sizeof(*boot_params);
195 196 197 198 199 200 201 202 203
	add_identity_map(mem_avoid[MEM_AVOID_BOOTPARAMS].start,
			 mem_avoid[MEM_AVOID_BOOTPARAMS].size);

	/* We don't need to set a mapping for setup_data. */

#ifdef CONFIG_X86_VERBOSE_BOOTUP
	/* Make sure video RAM can be used. */
	add_identity_map(0, PMD_SIZE);
#endif
204 205
}

206 207 208 209 210 211
/*
 * Does this memory vector overlap a known avoided area? If so, record the
 * overlap region with the lowest address.
 */
static bool mem_avoid_overlap(struct mem_vector *img,
			      struct mem_vector *overlap)
212 213
{
	int i;
214
	struct setup_data *ptr;
215 216
	unsigned long earliest = img->start + img->size;
	bool is_overlapping = false;
217 218

	for (i = 0; i < MEM_AVOID_MAX; i++) {
219 220 221
		if (mem_overlaps(img, &mem_avoid[i]) &&
		    mem_avoid[i].start < earliest) {
			*overlap = mem_avoid[i];
222
			earliest = overlap->start;
223 224
			is_overlapping = true;
		}
225 226
	}

227
	/* Avoid all entries in the setup_data linked list. */
228
	ptr = (struct setup_data *)(unsigned long)boot_params->hdr.setup_data;
229 230 231
	while (ptr) {
		struct mem_vector avoid;

232
		avoid.start = (unsigned long)ptr;
233 234
		avoid.size = sizeof(*ptr) + ptr->len;

235 236
		if (mem_overlaps(img, &avoid) && (avoid.start < earliest)) {
			*overlap = avoid;
237
			earliest = overlap->start;
238 239
			is_overlapping = true;
		}
240 241 242 243

		ptr = (struct setup_data *)(unsigned long)ptr->next;
	}

244
	return is_overlapping;
245 246
}

247 248 249 250 251 252 253 254 255
struct slot_area {
	unsigned long addr;
	int num;
};

#define MAX_SLOT_AREA 100

static struct slot_area slot_areas[MAX_SLOT_AREA];

256
static unsigned long slot_max;
257

258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276
static unsigned long slot_area_index;

static void store_slot_info(struct mem_vector *region, unsigned long image_size)
{
	struct slot_area slot_area;

	if (slot_area_index == MAX_SLOT_AREA)
		return;

	slot_area.addr = region->start;
	slot_area.num = (region->size - image_size) /
			CONFIG_PHYSICAL_ALIGN + 1;

	if (slot_area.num > 0) {
		slot_areas[slot_area_index++] = slot_area;
		slot_max += slot_area.num;
	}
}

277 278
static unsigned long slots_fetch_random(void)
{
279 280 281
	unsigned long slot;
	int i;

282 283 284 285
	/* Handle case of no slots stored. */
	if (slot_max == 0)
		return 0;

286
	slot = kaslr_get_random_long("Physical") % slot_max;
287 288 289 290 291 292 293 294 295 296 297 298

	for (i = 0; i < slot_area_index; i++) {
		if (slot >= slot_areas[i].num) {
			slot -= slot_areas[i].num;
			continue;
		}
		return slot_areas[i].addr + slot * CONFIG_PHYSICAL_ALIGN;
	}

	if (i == slot_area_index)
		debug_putstr("slots_fetch_random() failed!?\n");
	return 0;
299 300 301 302 303 304
}

static void process_e820_entry(struct e820entry *entry,
			       unsigned long minimum,
			       unsigned long image_size)
{
305 306 307
	struct mem_vector region, overlap;
	struct slot_area slot_area;
	unsigned long start_orig;
308 309 310 311 312

	/* Skip non-RAM entries. */
	if (entry->type != E820_RAM)
		return;

313 314
	/* On 32-bit, ignore entries entirely above our maximum. */
	if (IS_ENABLED(CONFIG_X86_32) && entry->addr >= KERNEL_IMAGE_SIZE)
315 316 317 318 319 320 321 322 323
		return;

	/* Ignore entries entirely below our minimum. */
	if (entry->addr + entry->size < minimum)
		return;

	region.start = entry->addr;
	region.size = entry->size;

324 325 326
	/* Give up if slot area array is full. */
	while (slot_area_index < MAX_SLOT_AREA) {
		start_orig = region.start;
327

328 329 330
		/* Potentially raise address to minimum location. */
		if (region.start < minimum)
			region.start = minimum;
331

332 333
		/* Potentially raise address to meet alignment needs. */
		region.start = ALIGN(region.start, CONFIG_PHYSICAL_ALIGN);
334

335 336 337
		/* Did we raise the address above this e820 region? */
		if (region.start > entry->addr + entry->size)
			return;
338

339 340
		/* Reduce size by any delta from the original address. */
		region.size -= region.start - start_orig;
341

342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372
		/* On 32-bit, reduce region size to fit within max size. */
		if (IS_ENABLED(CONFIG_X86_32) &&
		    region.start + region.size > KERNEL_IMAGE_SIZE)
			region.size = KERNEL_IMAGE_SIZE - region.start;

		/* Return if region can't contain decompressed kernel */
		if (region.size < image_size)
			return;

		/* If nothing overlaps, store the region and return. */
		if (!mem_avoid_overlap(&region, &overlap)) {
			store_slot_info(&region, image_size);
			return;
		}

		/* Store beginning of region if holds at least image_size. */
		if (overlap.start > region.start + image_size) {
			struct mem_vector beginning;

			beginning.start = region.start;
			beginning.size = overlap.start - region.start;
			store_slot_info(&beginning, image_size);
		}

		/* Return if overlap extends to or past end of region. */
		if (overlap.start + overlap.size >= region.start + region.size)
			return;

		/* Clip off the overlapping region and start over. */
		region.size -= overlap.start - region.start + overlap.size;
		region.start = overlap.start + overlap.size;
373 374 375
	}
}

376 377
static unsigned long find_random_phys_addr(unsigned long minimum,
					   unsigned long image_size)
378 379 380 381 382 383 384 385
{
	int i;
	unsigned long addr;

	/* Make sure minimum is aligned. */
	minimum = ALIGN(minimum, CONFIG_PHYSICAL_ALIGN);

	/* Verify potential e820 positions, appending to slots list. */
386
	for (i = 0; i < boot_params->e820_entries; i++) {
387 388
		process_e820_entry(&boot_params->e820_map[i], minimum,
				   image_size);
389 390 391 392
		if (slot_area_index == MAX_SLOT_AREA) {
			debug_putstr("Aborted e820 scan (slot_areas full)!\n");
			break;
		}
393 394 395 396 397
	}

	return slots_fetch_random();
}

398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415
static unsigned long find_random_virt_addr(unsigned long minimum,
					   unsigned long image_size)
{
	unsigned long slots, random_addr;

	/* Make sure minimum is aligned. */
	minimum = ALIGN(minimum, CONFIG_PHYSICAL_ALIGN);
	/* Align image_size for easy slot calculations. */
	image_size = ALIGN(image_size, CONFIG_PHYSICAL_ALIGN);

	/*
	 * There are how many CONFIG_PHYSICAL_ALIGN-sized slots
	 * that can hold image_size within the range of minimum to
	 * KERNEL_IMAGE_SIZE?
	 */
	slots = (KERNEL_IMAGE_SIZE - minimum - image_size) /
		 CONFIG_PHYSICAL_ALIGN + 1;

416
	random_addr = kaslr_get_random_long("Virtual") % slots;
417 418 419 420

	return random_addr * CONFIG_PHYSICAL_ALIGN + minimum;
}

421 422 423 424
/*
 * Since this function examines addresses much more numerically,
 * it takes the input and output pointers as 'unsigned long'.
 */
425 426 427 428 429
void choose_random_location(unsigned long input,
			    unsigned long input_size,
			    unsigned long *output,
			    unsigned long output_size,
			    unsigned long *virt_addr)
430
{
431
	unsigned long random_addr, min_addr;
432

433 434 435
	/* By default, keep output position unchanged. */
	*virt_addr = *output;

436
	if (cmdline_find_option_bool("nokaslr")) {
437
		warn("KASLR disabled: 'nokaslr' on cmdline.");
438
		return;
439 440
	}

441
	boot_params->hdr.loadflags |= KASLR_FLAG;
442

443 444 445
	/* Prepare to add new identity pagetables on demand. */
	initialize_identity_maps();

446
	/* Record the various known unsafe memory ranges. */
447
	mem_avoid_init(input, input_size, *output);
448

449 450 451 452 453 454 455
	/*
	 * Low end of the randomization range should be the
	 * smaller of 512M or the initial kernel image
	 * location:
	 */
	min_addr = min(*output, 512UL << 20);

456
	/* Walk e820 and find a random address. */
457
	random_addr = find_random_phys_addr(min_addr, output_size);
458
	if (!random_addr) {
459
		warn("KASLR disabled: could not find suitable E820 region!");
460 461 462 463 464 465
	} else {
		/* Update the new physical address location. */
		if (*output != random_addr) {
			add_identity_map(random_addr, output_size);
			*output = random_addr;
		}
466 467
	}

468
	/* This actually loads the identity pagetable on x86_64. */
469
	finalize_identity_maps();
470 471 472 473 474

	/* Pick random virtual address starting from LOAD_PHYSICAL_ADDR. */
	if (IS_ENABLED(CONFIG_X86_64))
		random_addr = find_random_virt_addr(LOAD_PHYSICAL_ADDR, output_size);
	*virt_addr = random_addr;
475
}