提交 1a537fe8 编写于 作者: A Ard Biesheuvel 提交者: Zheng Zengkai

arm64: mm: account for hotplug memory when randomizing the linear region

mainline inclusion
from mainline-v5.11-rc1
commit 97d6786e
category: bugfix
bugzilla: 175103 https://gitee.com/openeuler/kernel/issues/I4DDEL

Reference: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=97d6786e0669daa5c2f2d07a057f574e849dfd3e

-----------------------------------------------

As a hardening measure, we currently randomize the placement of
physical memory inside the linear region when KASLR is in effect.
Since the random offset at which to place the available physical
memory inside the linear region is chosen early at boot, it is
based on the memblock description of memory, which does not cover
hotplug memory. The consequence of this is that the randomization
offset may be chosen such that any hotplugged memory located above
memblock_end_of_DRAM() that appears later is pushed off the end of
the linear region, where it cannot be accessed.

So let's limit this randomization of the linear region to ensure
that this can no longer happen, by using the CPU's addressable PA
range instead. As it is guaranteed that no hotpluggable memory will
appear that falls outside of that range, we can safely put this PA
range sized window anywhere in the linear region.
Signed-off-by: NArd Biesheuvel <ardb@kernel.org>
Cc: Anshuman Khandual <anshuman.khandual@arm.com>
Cc: Will Deacon <will@kernel.org>
Cc: Steven Price <steven.price@arm.com>
Cc: Robin Murphy <robin.murphy@arm.com>
Link: https://lore.kernel.org/r/20201014081857.3288-1-ardb@kernel.orgSigned-off-by: NCatalin Marinas <catalin.marinas@arm.com>
Signed-off-by: NPeng Liu <liupeng256@huawei.com>
Reviewed-by: NChen Wandun <chenwandun@huawei.com>
Signed-off-by: NChen Jun <chenjun102@huawei.com>
Signed-off-by: NZheng Zengkai <zhengzengkai@huawei.com>
上级 a990edfa
...@@ -575,15 +575,18 @@ void __init arm64_memblock_init(void) ...@@ -575,15 +575,18 @@ void __init arm64_memblock_init(void)
if (IS_ENABLED(CONFIG_RANDOMIZE_BASE)) { if (IS_ENABLED(CONFIG_RANDOMIZE_BASE)) {
extern u16 memstart_offset_seed; extern u16 memstart_offset_seed;
u64 range = linear_region_size - u64 mmfr0 = read_cpuid(ID_AA64MMFR0_EL1);
(memblock_end_of_DRAM() - memblock_start_of_DRAM()); int parange = cpuid_feature_extract_unsigned_field(
mmfr0, ID_AA64MMFR0_PARANGE_SHIFT);
s64 range = linear_region_size -
BIT(id_aa64mmfr0_parange_to_phys_shift(parange));
/* /*
* If the size of the linear region exceeds, by a sufficient * If the size of the linear region exceeds, by a sufficient
* margin, the size of the region that the available physical * margin, the size of the region that the physical memory can
* memory spans, randomize the linear region as well. * span, randomize the linear region as well.
*/ */
if (memstart_offset_seed > 0 && range >= ARM64_MEMSTART_ALIGN) { if (memstart_offset_seed > 0 && range >= (s64)ARM64_MEMSTART_ALIGN) {
range /= ARM64_MEMSTART_ALIGN; range /= ARM64_MEMSTART_ALIGN;
memstart_addr -= ARM64_MEMSTART_ALIGN * memstart_addr -= ARM64_MEMSTART_ALIGN *
((range * memstart_offset_seed) >> 16); ((range * memstart_offset_seed) >> 16);
......
Markdown is supported
0% .
You are about to add 0 people to the discussion. Proceed with caution.
先完成此消息的编辑!
想要评论请 注册
新手
引导
客服 返回
顶部