diff mbox series

[v2] arm64: warn on incorrect placement of the kernel by the bootloader

Message ID 20200611124330.252163-1-ardb@kernel.org (mailing list archive)
State Mainlined
Commit dd4bc60765873445893037ae73a5f75398a8cd19
Headers show
Series [v2] arm64: warn on incorrect placement of the kernel by the bootloader | expand

Commit Message

Ard Biesheuvel June 11, 2020, 12:43 p.m. UTC
Commit cfa7ede20f133c ("arm64: set TEXT_OFFSET to 0x0 in preparation for
removing it entirely") results in boot failures when booting kernels that
are built without KASLR support on broken bootloaders that ignore the
TEXT_OFFSET value passed via the header, and use the default of 0x80000
instead.

To work around this, turn CONFIG_RELOCATABLE on by default, even if KASLR
itself (CONFIG_RANDOMIZE_BASE) is turned off, and require CONFIG_EXPERT
to be enabled to deviate from this. Then, emit a warning into the kernel
log if we are not booting via the EFI stub (which is permitted to deviate
from the placement restrictions) and the kernel base address is not placed
according to the rules as laid out in Documentation/arm64/booting.rst.

Signed-off-by: Ard Biesheuvel <ardb@kernel.org>
---
v2: use pr_warn() instead of WARN()

 arch/arm64/Kconfig        | 3 ++-
 arch/arm64/kernel/setup.c | 4 ++++
 2 files changed, 6 insertions(+), 1 deletion(-)

Comments

Will Deacon June 11, 2020, 1:23 p.m. UTC | #1
On Thu, 11 Jun 2020 14:43:30 +0200, Ard Biesheuvel wrote:
> Commit cfa7ede20f133c ("arm64: set TEXT_OFFSET to 0x0 in preparation for
> removing it entirely") results in boot failures when booting kernels that
> are built without KASLR support on broken bootloaders that ignore the
> TEXT_OFFSET value passed via the header, and use the default of 0x80000
> instead.
> 
> To work around this, turn CONFIG_RELOCATABLE on by default, even if KASLR
> itself (CONFIG_RANDOMIZE_BASE) is turned off, and require CONFIG_EXPERT
> to be enabled to deviate from this. Then, emit a warning into the kernel
> log if we are not booting via the EFI stub (which is permitted to deviate
> from the placement restrictions) and the kernel base address is not placed
> according to the rules as laid out in Documentation/arm64/booting.rst.

Applied to arm64 (for-next/core), thanks!

[1/1] arm64: warn on incorrect placement of the kernel by the bootloader
      https://git.kernel.org/arm64/c/dd4bc6076587

Cheers,
Ard Biesheuvel June 13, 2020, 8:45 a.m. UTC | #2
On Thu, 11 Jun 2020 at 15:23, Will Deacon <will@kernel.org> wrote:
>
> On Thu, 11 Jun 2020 14:43:30 +0200, Ard Biesheuvel wrote:
> > Commit cfa7ede20f133c ("arm64: set TEXT_OFFSET to 0x0 in preparation for
> > removing it entirely") results in boot failures when booting kernels that
> > are built without KASLR support on broken bootloaders that ignore the
> > TEXT_OFFSET value passed via the header, and use the default of 0x80000
> > instead.
> >
> > To work around this, turn CONFIG_RELOCATABLE on by default, even if KASLR
> > itself (CONFIG_RANDOMIZE_BASE) is turned off, and require CONFIG_EXPERT
> > to be enabled to deviate from this. Then, emit a warning into the kernel
> > log if we are not booting via the EFI stub (which is permitted to deviate
> > from the placement restrictions) and the kernel base address is not placed
> > according to the rules as laid out in Documentation/arm64/booting.rst.
>
> Applied to arm64 (for-next/core), thanks!
>
> [1/1] arm64: warn on incorrect placement of the kernel by the bootloader
>       https://git.kernel.org/arm64/c/dd4bc6076587
>

This test

((u64)_text % MIN_KIMG_ALIGN) != 0

should have been written as

((u64)_text % MIN_KIMG_ALIGN) != TEXT_OFFSET

because now, we are throwing the warning when
CONFIG_ARM64_RANDOMIZE_TEXT_OFFSET is enabled :-(

I was reluctant to add another Makefile rule to add a
-DTEXT_OFFSET=... GCC option when compiling this source file, but it
appears we need it after all.
Will Deacon June 15, 2020, 9:51 a.m. UTC | #3
On Sat, Jun 13, 2020 at 10:45:10AM +0200, Ard Biesheuvel wrote:
> On Thu, 11 Jun 2020 at 15:23, Will Deacon <will@kernel.org> wrote:
> >
> > On Thu, 11 Jun 2020 14:43:30 +0200, Ard Biesheuvel wrote:
> > > Commit cfa7ede20f133c ("arm64: set TEXT_OFFSET to 0x0 in preparation for
> > > removing it entirely") results in boot failures when booting kernels that
> > > are built without KASLR support on broken bootloaders that ignore the
> > > TEXT_OFFSET value passed via the header, and use the default of 0x80000
> > > instead.
> > >
> > > To work around this, turn CONFIG_RELOCATABLE on by default, even if KASLR
> > > itself (CONFIG_RANDOMIZE_BASE) is turned off, and require CONFIG_EXPERT
> > > to be enabled to deviate from this. Then, emit a warning into the kernel
> > > log if we are not booting via the EFI stub (which is permitted to deviate
> > > from the placement restrictions) and the kernel base address is not placed
> > > according to the rules as laid out in Documentation/arm64/booting.rst.
> >
> > Applied to arm64 (for-next/core), thanks!
> >
> > [1/1] arm64: warn on incorrect placement of the kernel by the bootloader
> >       https://git.kernel.org/arm64/c/dd4bc6076587
> >
> 
> This test
> 
> ((u64)_text % MIN_KIMG_ALIGN) != 0
> 
> should have been written as
> 
> ((u64)_text % MIN_KIMG_ALIGN) != TEXT_OFFSET
> 
> because now, we are throwing the warning when
> CONFIG_ARM64_RANDOMIZE_TEXT_OFFSET is enabled :-(
> 
> I was reluctant to add another Makefile rule to add a
> -DTEXT_OFFSET=... GCC option when compiling this source file, but it
> appears we need it after all.

FWIW, I'd be in favour of removing CONFIG_ARM64_RANDOMIZE_TEXT_OFFSET at
this stage as I don't really see the point in it, especially now that
TEXT_OFFSET is on the way out and we've practically forced the use of a
relocatable image.

What do you think?

Will
Ard Biesheuvel June 15, 2020, 9:53 a.m. UTC | #4
On Mon, 15 Jun 2020 at 11:51, Will Deacon <will@kernel.org> wrote:
>
> On Sat, Jun 13, 2020 at 10:45:10AM +0200, Ard Biesheuvel wrote:
> > On Thu, 11 Jun 2020 at 15:23, Will Deacon <will@kernel.org> wrote:
> > >
> > > On Thu, 11 Jun 2020 14:43:30 +0200, Ard Biesheuvel wrote:
> > > > Commit cfa7ede20f133c ("arm64: set TEXT_OFFSET to 0x0 in preparation for
> > > > removing it entirely") results in boot failures when booting kernels that
> > > > are built without KASLR support on broken bootloaders that ignore the
> > > > TEXT_OFFSET value passed via the header, and use the default of 0x80000
> > > > instead.
> > > >
> > > > To work around this, turn CONFIG_RELOCATABLE on by default, even if KASLR
> > > > itself (CONFIG_RANDOMIZE_BASE) is turned off, and require CONFIG_EXPERT
> > > > to be enabled to deviate from this. Then, emit a warning into the kernel
> > > > log if we are not booting via the EFI stub (which is permitted to deviate
> > > > from the placement restrictions) and the kernel base address is not placed
> > > > according to the rules as laid out in Documentation/arm64/booting.rst.
> > >
> > > Applied to arm64 (for-next/core), thanks!
> > >
> > > [1/1] arm64: warn on incorrect placement of the kernel by the bootloader
> > >       https://git.kernel.org/arm64/c/dd4bc6076587
> > >
> >
> > This test
> >
> > ((u64)_text % MIN_KIMG_ALIGN) != 0
> >
> > should have been written as
> >
> > ((u64)_text % MIN_KIMG_ALIGN) != TEXT_OFFSET
> >
> > because now, we are throwing the warning when
> > CONFIG_ARM64_RANDOMIZE_TEXT_OFFSET is enabled :-(
> >
> > I was reluctant to add another Makefile rule to add a
> > -DTEXT_OFFSET=... GCC option when compiling this source file, but it
> > appears we need it after all.
>
> FWIW, I'd be in favour of removing CONFIG_ARM64_RANDOMIZE_TEXT_OFFSET at
> this stage as I don't really see the point in it, especially now that
> TEXT_OFFSET is on the way out and we've practically forced the use of a
> relocatable image.
>
> What do you think?
>

I agree. TEXT_OFFSET now always deviates from the default value of
0x80000, and we are only now catching issues that
CONFIG_ARM64_RANDOMIZE_TEXT_OFFSET was intended to catch.

I'll prepare a patch.
diff mbox series

Patch

diff --git a/arch/arm64/Kconfig b/arch/arm64/Kconfig
index 7f9d38444d6d..16c3f158c80e 100644
--- a/arch/arm64/Kconfig
+++ b/arch/arm64/Kconfig
@@ -1740,8 +1740,9 @@  config ARM64_DEBUG_PRIORITY_MASKING
 endif
 
 config RELOCATABLE
-	bool
+	bool "Build a relocatable kernel image" if EXPERT
 	select ARCH_HAS_RELR
+	default y
 	help
 	  This builds the kernel as a Position Independent Executable (PIE),
 	  which retains all relocation metadata required to relocate the
diff --git a/arch/arm64/kernel/setup.c b/arch/arm64/kernel/setup.c
index 3fd2c11c09fc..5d7d6ac034fd 100644
--- a/arch/arm64/kernel/setup.c
+++ b/arch/arm64/kernel/setup.c
@@ -319,6 +319,10 @@  void __init setup_arch(char **cmdline_p)
 
 	xen_early_init();
 	efi_init();
+
+	if (!efi_enabled(EFI_BOOT) && ((u64)_text % MIN_KIMG_ALIGN) != 0)
+	     pr_warn(FW_BUG "Kernel image misaligned at boot, please fix your bootloader!");
+
 	arm64_memblock_init();
 
 	paging_init();