.. | .. |
---|
| 1 | +// SPDX-License-Identifier: GPL-2.0-only |
---|
1 | 2 | /* |
---|
2 | 3 | * Copyright (C) 2016 Linaro Ltd <ard.biesheuvel@linaro.org> |
---|
3 | | - * |
---|
4 | | - * This program is free software; you can redistribute it and/or modify |
---|
5 | | - * it under the terms of the GNU General Public License version 2 as |
---|
6 | | - * published by the Free Software Foundation. |
---|
7 | 4 | */ |
---|
8 | 5 | |
---|
9 | 6 | #include <linux/cache.h> |
---|
.. | .. |
---|
13 | 10 | #include <linux/mm_types.h> |
---|
14 | 11 | #include <linux/sched.h> |
---|
15 | 12 | #include <linux/types.h> |
---|
| 13 | +#include <linux/pgtable.h> |
---|
| 14 | +#include <linux/random.h> |
---|
16 | 15 | |
---|
17 | 16 | #include <asm/cacheflush.h> |
---|
18 | 17 | #include <asm/fixmap.h> |
---|
19 | 18 | #include <asm/kernel-pgtable.h> |
---|
20 | 19 | #include <asm/memory.h> |
---|
21 | 20 | #include <asm/mmu.h> |
---|
22 | | -#include <asm/pgtable.h> |
---|
23 | 21 | #include <asm/sections.h> |
---|
| 22 | +#include <asm/setup.h> |
---|
24 | 23 | |
---|
| 24 | +enum kaslr_status { |
---|
| 25 | + KASLR_ENABLED, |
---|
| 26 | + KASLR_DISABLED_CMDLINE, |
---|
| 27 | + KASLR_DISABLED_NO_SEED, |
---|
| 28 | + KASLR_DISABLED_FDT_REMAP, |
---|
| 29 | +}; |
---|
| 30 | + |
---|
| 31 | +static enum kaslr_status __initdata kaslr_status; |
---|
25 | 32 | u64 __ro_after_init module_alloc_base; |
---|
26 | 33 | u16 __initdata memstart_offset_seed; |
---|
27 | 34 | |
---|
.. | .. |
---|
44 | 51 | return ret; |
---|
45 | 52 | } |
---|
46 | 53 | |
---|
47 | | -static __init const u8 *kaslr_get_cmdline(void *fdt) |
---|
48 | | -{ |
---|
49 | | - static __initconst const u8 default_cmdline[] = CONFIG_CMDLINE; |
---|
50 | | - |
---|
51 | | - if (!IS_ENABLED(CONFIG_CMDLINE_FORCE)) { |
---|
52 | | - int node; |
---|
53 | | - const u8 *prop; |
---|
54 | | - |
---|
55 | | - node = fdt_path_offset(fdt, "/chosen"); |
---|
56 | | - if (node < 0) |
---|
57 | | - goto out; |
---|
58 | | - |
---|
59 | | - prop = fdt_getprop(fdt, node, "bootargs", NULL); |
---|
60 | | - if (!prop) |
---|
61 | | - goto out; |
---|
62 | | - return prop; |
---|
63 | | - } |
---|
64 | | -out: |
---|
65 | | - return default_cmdline; |
---|
66 | | -} |
---|
| 54 | +struct arm64_ftr_override kaslr_feature_override __initdata; |
---|
67 | 55 | |
---|
68 | 56 | /* |
---|
69 | 57 | * This routine will be executed with the kernel mapped at its default virtual |
---|
.. | .. |
---|
73 | 61 | * containing function pointers) to be reinitialized, and zero-initialized |
---|
74 | 62 | * .bss variables will be reset to 0. |
---|
75 | 63 | */ |
---|
76 | | -u64 __init kaslr_early_init(u64 dt_phys) |
---|
| 64 | +u64 __init kaslr_early_init(void) |
---|
77 | 65 | { |
---|
78 | 66 | void *fdt; |
---|
79 | 67 | u64 seed, offset, mask, module_range; |
---|
80 | | - const u8 *cmdline, *str; |
---|
81 | | - int size; |
---|
| 68 | + unsigned long raw; |
---|
82 | 69 | |
---|
83 | 70 | /* |
---|
84 | 71 | * Set a reasonable default for module_alloc_base in case |
---|
.. | .. |
---|
92 | 79 | * and proceed with KASLR disabled. We will make another |
---|
93 | 80 | * attempt at mapping the FDT in setup_machine() |
---|
94 | 81 | */ |
---|
95 | | - early_fixmap_init(); |
---|
96 | | - fdt = fixmap_remap_fdt(dt_phys, &size, PAGE_KERNEL); |
---|
97 | | - if (!fdt) |
---|
| 82 | + fdt = get_early_fdt_ptr(); |
---|
| 83 | + if (!fdt) { |
---|
| 84 | + kaslr_status = KASLR_DISABLED_FDT_REMAP; |
---|
98 | 85 | return 0; |
---|
| 86 | + } |
---|
99 | 87 | |
---|
100 | 88 | /* |
---|
101 | 89 | * Retrieve (and wipe) the seed from the FDT |
---|
102 | 90 | */ |
---|
103 | 91 | seed = get_kaslr_seed(fdt); |
---|
104 | | - if (!seed) |
---|
105 | | - return 0; |
---|
106 | 92 | |
---|
107 | 93 | /* |
---|
108 | 94 | * Check if 'nokaslr' appears on the command line, and |
---|
109 | 95 | * return 0 if that is the case. |
---|
110 | 96 | */ |
---|
111 | | - cmdline = kaslr_get_cmdline(fdt); |
---|
112 | | - str = strstr(cmdline, "nokaslr"); |
---|
113 | | - if (str == cmdline || (str > cmdline && *(str - 1) == ' ')) |
---|
| 97 | + if (kaslr_feature_override.val & kaslr_feature_override.mask & 0xf) { |
---|
| 98 | + kaslr_status = KASLR_DISABLED_CMDLINE; |
---|
114 | 99 | return 0; |
---|
| 100 | + } |
---|
| 101 | + |
---|
| 102 | + /* |
---|
| 103 | + * Mix in any entropy obtainable architecturally if enabled |
---|
| 104 | + * and supported. |
---|
| 105 | + */ |
---|
| 106 | + |
---|
| 107 | + if (arch_get_random_seed_long_early(&raw)) |
---|
| 108 | + seed ^= raw; |
---|
| 109 | + |
---|
| 110 | + if (!seed) { |
---|
| 111 | + kaslr_status = KASLR_DISABLED_NO_SEED; |
---|
| 112 | + return 0; |
---|
| 113 | + } |
---|
115 | 114 | |
---|
116 | 115 | /* |
---|
117 | 116 | * OK, so we are proceeding with KASLR enabled. Calculate a suitable |
---|
118 | 117 | * kernel image offset from the seed. Let's place the kernel in the |
---|
119 | | - * middle half of the VMALLOC area (VA_BITS - 2), and stay clear of |
---|
| 118 | + * middle half of the VMALLOC area (VA_BITS_MIN - 2), and stay clear of |
---|
120 | 119 | * the lower and upper quarters to avoid colliding with other |
---|
121 | 120 | * allocations. |
---|
122 | 121 | * Even if we could randomize at page granularity for 16k and 64k pages, |
---|
123 | 122 | * let's always round to 2 MB so we don't interfere with the ability to |
---|
124 | 123 | * map using contiguous PTEs |
---|
125 | 124 | */ |
---|
126 | | - mask = ((1UL << (VA_BITS - 2)) - 1) & ~(SZ_2M - 1); |
---|
127 | | - offset = BIT(VA_BITS - 3) + (seed & mask); |
---|
| 125 | + mask = ((1UL << (VA_BITS_MIN - 2)) - 1) & ~(SZ_2M - 1); |
---|
| 126 | + offset = BIT(VA_BITS_MIN - 3) + (seed & mask); |
---|
128 | 127 | |
---|
129 | 128 | /* use the top 16 bits to randomize the linear region */ |
---|
130 | 129 | memstart_offset_seed = seed >> 48; |
---|
131 | 130 | |
---|
132 | | - if (IS_ENABLED(CONFIG_KASAN)) |
---|
| 131 | + if (!IS_ENABLED(CONFIG_KASAN_VMALLOC) && |
---|
| 132 | + (IS_ENABLED(CONFIG_KASAN_GENERIC) || |
---|
| 133 | + IS_ENABLED(CONFIG_KASAN_SW_TAGS))) |
---|
133 | 134 | /* |
---|
134 | | - * KASAN does not expect the module region to intersect the |
---|
135 | | - * vmalloc region, since shadow memory is allocated for each |
---|
136 | | - * module at load time, whereas the vmalloc region is shadowed |
---|
137 | | - * by KASAN zero pages. So keep modules out of the vmalloc |
---|
138 | | - * region if KASAN is enabled, and put the kernel well within |
---|
139 | | - * 4 GB of the module region. |
---|
| 135 | + * KASAN without KASAN_VMALLOC does not expect the module region |
---|
| 136 | + * to intersect the vmalloc region, since shadow memory is |
---|
| 137 | + * allocated for each module at load time, whereas the vmalloc |
---|
| 138 | + * region is shadowed by KASAN zero pages. So keep modules |
---|
| 139 | + * out of the vmalloc region if KASAN is enabled without |
---|
| 140 | + * KASAN_VMALLOC, and put the kernel well within 4 GB of the |
---|
| 141 | + * module region. |
---|
140 | 142 | */ |
---|
141 | 143 | return offset % SZ_2G; |
---|
142 | 144 | |
---|
.. | .. |
---|
173 | 175 | |
---|
174 | 176 | return offset; |
---|
175 | 177 | } |
---|
| 178 | + |
---|
| 179 | +static int __init kaslr_init(void) |
---|
| 180 | +{ |
---|
| 181 | + switch (kaslr_status) { |
---|
| 182 | + case KASLR_ENABLED: |
---|
| 183 | + pr_info("KASLR enabled\n"); |
---|
| 184 | + break; |
---|
| 185 | + case KASLR_DISABLED_CMDLINE: |
---|
| 186 | + pr_info("KASLR disabled on command line\n"); |
---|
| 187 | + break; |
---|
| 188 | + case KASLR_DISABLED_NO_SEED: |
---|
| 189 | + pr_warn("KASLR disabled due to lack of seed\n"); |
---|
| 190 | + break; |
---|
| 191 | + case KASLR_DISABLED_FDT_REMAP: |
---|
| 192 | + pr_warn("KASLR disabled due to FDT remapping failure\n"); |
---|
| 193 | + break; |
---|
| 194 | + } |
---|
| 195 | + |
---|
| 196 | + return 0; |
---|
| 197 | +} |
---|
| 198 | +core_initcall(kaslr_init) |
---|