From patchwork Mon Jun 13 14:45:24 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Ard Biesheuvel X-Patchwork-Id: 12879619 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from bombadil.infradead.org (bombadil.infradead.org [198.137.202.133]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id D9C55C433EF for ; Mon, 13 Jun 2022 14:47:28 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=bombadil.20210309; h=Sender: Content-Transfer-Encoding:Content-Type:List-Subscribe:List-Help:List-Post: List-Archive:List-Unsubscribe:List-Id:MIME-Version:Message-Id:Date:Subject:Cc :To:From:Reply-To:Content-ID:Content-Description:Resent-Date:Resent-From: Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To:References: List-Owner; bh=mwj65PRxPwEvkzunD4RYZ3dMlAA66bS4cR24alBP+tI=; b=U2QTz/vNQvuvA2 QSkBLqJVcIMaAqpXyYb0Viw2jjrJQf5aWvd0btlZwgR4dqtMuFg3Gf4IQf4b+DsYe7gNhq2YyLMqf 7M+q6qGReOa77UmIAIX1V+HiMNeRsNcz3OKUv6VQG4f1Bvyj5OIUAmEG+0WpDo8re1+g6q6na1Eqs o2w/OmgSUoT9+qdLF9TCKLgAoQLZvzkM3iTm1eMGLpze+E52LXxDSReZMtixrtLCH15nnBrhRitCG FuxOlCMbmuZgs4fe/cme6kCYZfAyh15ysAnkhbs/EnHVdZaTzdxhQ0b7JaDzzL3r/sTHURWtvtkcx 6Y8TyU3sBMaewfWrQcGQ==; Received: from localhost ([::1] helo=bombadil.infradead.org) by bombadil.infradead.org with esmtp (Exim 4.94.2 #2 (Red Hat Linux)) id 1o0lKa-004GNm-Sc; Mon, 13 Jun 2022 14:46:17 +0000 Received: from dfw.source.kernel.org ([2604:1380:4641:c500::1]) by bombadil.infradead.org with esmtps (Exim 4.94.2 #2 (Red Hat Linux)) id 1o0lKO-004GIS-Hz for linux-arm-kernel@lists.infradead.org; Mon, 13 Jun 2022 14:46:06 +0000 Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 0F0116142A; Mon, 13 Jun 2022 14:46:04 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id C7C93C34114; Mon, 13 Jun 2022 14:46:01 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1655131563; bh=z184xQ+j4dfqKxhZCsP+g0tmE7BGnxlgI1xOjLLX6eY=; h=From:To:Cc:Subject:Date:From; b=o0wX9DRG5sTa3TDDQAYEOrtZZKx53BiDKeIS+lD3DmSkbT8JkvIw8jWoo/BI0XQ9s lb29nd01HstRubGxmEy72BN1/NKtmFxVum6eAZrCMsHYxzeaEuCgOr1lJtIyhRh8RI DAgfrs0MbTJMIC7ApcSB2+jh8pdlB12D0OWm7ZxlLO2cs5w6xCeaMnrUNwBNjmkfGc YcTbkU841p7mSXWB//ZINfoKZLp/CbCMf/rsuKkwEtvmi40M52C1GGzBcF82OXb8N6 3WI7qvP90RZEvOlbBZftZj2WT3xou2U6CNBkRI3XySYb8wPrX7WEJCXumfPZtFAZH5 ogiB5ExIJxBHw== From: Ard Biesheuvel To: linux-arm-kernel@lists.infradead.org Cc: linux-hardening@vger.kernel.org, Ard Biesheuvel , Marc Zyngier , Will Deacon , Mark Rutland , Kees Cook , Catalin Marinas , Mark Brown , Anshuman Khandual Subject: [PATCH v4 00/26] arm64: refactor boot flow and add support for WXN Date: Mon, 13 Jun 2022 16:45:24 +0200 Message-Id: <20220613144550.3760857-1-ardb@kernel.org> X-Mailer: git-send-email 2.30.2 MIME-Version: 1.0 X-Developer-Signature: v=1; a=openpgp-sha256; l=7202; h=from:subject; bh=z184xQ+j4dfqKxhZCsP+g0tmE7BGnxlgI1xOjLLX6eY=; b=owEB7QES/pANAwAKAcNPIjmS2Y8kAcsmYgBip01rJL6Q0QfCZL+jx8h0qCyV0oEgnf/4lolSimFh bAse12SJAbMEAAEKAB0WIQT72WJ8QGnJQhU3VynDTyI5ktmPJAUCYqdNawAKCRDDTyI5ktmPJNeHDA C47+lDCDEtZT04qm1uCrv+I6sqg3r6SOPYcGc7hVglcJmd3vkbYPGyqw5NajBk8YzsKf8Xf71Dbp8j xDTq/cWZKvpbyJXqo/eTmiTZdVw7UCtkUUvLUvAcRDyiz0BrrvlXNYg1HOwIsUhyWPIwtonFaYLXkw qfIRH2yd0EFqqmt5iAnwFboDfbEO82e0fa8ssTAmQKXdORF9n8Cn64m3cxCqI6I/K36CIni3buQqr5 m838wWFOhzRRxHSw8IWKJfZlarGWoeqLVV4c+jr+k1TI5CQWsfrnva+vW2joJSJPECjKZlH/Ic+jF3 hiaFUXm0o2zvKuQilGogJYsNtSfaPUiPq/MlH3BZWV/1kr7AzR9LVnyPSGMdACGveMR7wrIJv18qyJ aVyC38Fatl+NDMJ/XAqJQCLT+zoEYvgJskW33b1cy/1o8TzyDx5IvcvbfrH0hLB0sBvufvkYXgCGPN 3v6PmAWziDhWHSt4TXD0NnmMR+f6ce6GkLq6gVLA291+k= X-Developer-Key: i=ardb@kernel.org; a=openpgp; fpr=F43D03328115A198C90016883D200E9CA6329909 X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20220613_074604_718648_A0BB6CDE X-CRM114-Status: GOOD ( 32.49 ) X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+linux-arm-kernel=archiver.kernel.org@lists.infradead.org [ TL;DR this series does the following: - move variable definitions and assignments out of early asm code where possible, and get rid of explicit cache maintenance; - convert initial ID map so it covers the entire loaded image as well as the DT blob; - create the kernel mapping only once instead of twice (for KASLR), and do it with the MMU and caches on; - avoid mappings that are both writable and executable entirely; - avoid parsing the DT while the kernel text and rodata are still mapped writable; - allow WXN to be enabled (with an opt-out) so writable mappings are never executable. ] This is a followup to a previous series of mine [0][1], and it aims to streamline the boot flow with respect to cache maintenance and redundant copying of data in memory, as well as eliminate writable executable mappings at any time during the boot or after. Additionally, this series removes the little dance we do to create a kernel mapping, relocate the kernel, run the KASLR init code, tear down the old mapping and create a new one, relocate the kernel again, and finally enter the kernel proper. Instead, it invokes a minimal C function 'kaslr_early_init()' while running from the ID map which includes a temporary mapping of the FDT. This change represents a substantial chunk of the diffstat, as it requires some work to instantiate code that can run safely from an arbitrary load address. The WXN support was tested using a Debian bullseye mixed AArch64/armhf user space, running Gnome shell, Chromium, Firefox, LibreOffice, etc. Some minimal tweaks are needed to avoid entries appearing in the kernel log regarding attempts from user space to create PROT_EXEC+PROT_WRITE mappings, but in most cases (libffi, for instance), the library in question already carries a workaround, but didn't enable it by default because it did not detect selinux as being active (which it was not, in this case) Changes since v3: - drop changes for entering with the MMU enabled for now; - reject mmap() and mprotect() calls with PROT_WRITE and PROT_EXEC flags passed when WXN is in effect; this essentially matches the behavior of both selinux and PaX, and most distros (including Android) can already deal with this just fine; - defer KASLR initialization to an initcall() to the extent possible. Changes since v2: - create a separate, initial ID map that is discarded after boot, and create the permanent ID map from C code using the ordinary memory mapping code; - refactor the extended ID map handling, and along with it, simplify the early memory mapping macros, so that we can deal with an extended ID map that requires multiple table entries at intermediate levels; - eliminate all variable assignments with the MMU off from the happy flow; - replace temporary FDT mapping in TTBR1 with a FDT mapping in the initial ID map; - use read-only attributes for all code mappings, so we can boot with WXN enabled if we elect to do so. Changes since v1: - Remove the dodgy handling of the KASLR seed, which was necessary to avoid doing two iterations of the setup/teardown of the page tables. This is now dealt with by creating the TTBR1 page tables while executing from TTBR0, and so all memory manipulations are still done with the MMU and caches on. - Only boot from EFI with the MMU and caches on if the image was not moved around in memory. Otherwise, we cannot rely on the firmware's ID map to have created an executable mapping for the copied code. [0] https://lore.kernel.org/all/20220304175657.2744400-1-ardb@kernel.org/ [1] https://lore.kernel.org/all/20220330154205.2483167-1-ardb@kernel.org/ [2] https://lore.kernel.org/all/20220411094824.4176877-1-ardb@kernel.org/ Cc: Marc Zyngier Cc: Will Deacon Cc: Mark Rutland Cc: Kees Cook Cc: Catalin Marinas Cc: Mark Brown Cc: Anshuman Khandual Ard Biesheuvel (26): arm64: head: move kimage_vaddr variable into C file arm64: mm: make vabits_actual a build time constant if possible arm64: head: move assignment of idmap_t0sz to C code arm64: head: drop idmap_ptrs_per_pgd arm64: head: simplify page table mapping macros (slightly) arm64: head: switch to map_memory macro for the extended ID map arm64: head: split off idmap creation code arm64: kernel: drop unnecessary PoC cache clean+invalidate arm64: head: pass ID map root table address to __enable_mmu() arm64: mm: provide idmap pointer to cpu_replace_ttbr1() arm64: head: add helper function to remap regions in early page tables arm64: head: cover entire kernel image in initial ID map arm64: head: use relative references to the RELA and RELR tables arm64: head: create a temporary FDT mapping in the initial ID map arm64: idreg-override: use early FDT mapping in ID map arm64: head: factor out TTBR1 assignment into a macro arm64: head: populate kernel page tables with MMU and caches on arm64: head: record CPU boot mode after enabling the MMU arm64: kaslr: defer initialization to late initcall where permitted arm64: head: avoid relocating the kernel twice for KASLR arm64: setup: drop early FDT pointer helpers arm64: mm: move ro_after_init section into the data segment arm64: head: remap the kernel text/inittext region read-only mm: add arch hook to validate mmap() prot flags arm64: mm: add support for WXN memory translation attribute arm64: kernel: move ID map out of .text mapping arch/arm64/Kconfig | 11 + arch/arm64/include/asm/assembler.h | 37 +- arch/arm64/include/asm/cpufeature.h | 8 + arch/arm64/include/asm/kernel-pgtable.h | 18 +- arch/arm64/include/asm/memory.h | 4 + arch/arm64/include/asm/mman.h | 36 ++ arch/arm64/include/asm/mmu_context.h | 46 +- arch/arm64/include/asm/setup.h | 3 - arch/arm64/kernel/Makefile | 2 +- arch/arm64/kernel/cpufeature.c | 2 +- arch/arm64/kernel/head.S | 536 ++++++++++---------- arch/arm64/kernel/hyp-stub.S | 4 +- arch/arm64/kernel/idreg-override.c | 33 +- arch/arm64/kernel/image-vars.h | 4 + arch/arm64/kernel/kaslr.c | 149 +----- arch/arm64/kernel/pi/Makefile | 33 ++ arch/arm64/kernel/pi/kaslr_early.c | 112 ++++ arch/arm64/kernel/setup.c | 15 - arch/arm64/kernel/sleep.S | 1 + arch/arm64/kernel/suspend.c | 2 +- arch/arm64/kernel/vmlinux.lds.S | 63 ++- arch/arm64/mm/kasan_init.c | 4 +- arch/arm64/mm/mmu.c | 96 +++- arch/arm64/mm/proc.S | 29 +- include/linux/mman.h | 15 + mm/mmap.c | 3 + 26 files changed, 763 insertions(+), 503 deletions(-) create mode 100644 arch/arm64/kernel/pi/Makefile create mode 100644 arch/arm64/kernel/pi/kaslr_early.c