lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Mon, 15 Sep 2014 19:47:24 -0500 From: <suravee.suthikulpanit@....com> To: <catalin.marinas@....com>, <will.deacon@....com>, <linux-arm-kernel@...ts.infradead.org>, <linux-apci@...r.kernel.org> CC: <linux-kernel@...r.kernel.org>, <astone@...hat.com>, <hanjun.guo@...aro.org>, <rjw@...ysocki.net>, <marc.zyngier@....com>, <mark.rutland@....com>, <Sudeep.Holla@....com>, <olof@...om.net>, <grant.likely@...aro.org>, <graeme.gregory@...aro.org>, <arnd@...db.de>, <jason@...edaemon.net>, Ard Biesheuvel <ard.biesheuvel@...aro.org> Subject: [PATCH 2/4] arm64/efi: efistub: don't abort if base of DRAM is occupied From: Ard Biesheuvel <ard.biesheuvel@...aro.org> If we cannot relocate the kernel Image to its preferred offset of base of DRAM plus TEXT_OFFSET, instead relocate it to the lowest available 2 MB boundary plus TEXT_OFFSET. We may lose a bit of memory at the low end, but we can still proceed normally otherwise. Acked-by: Mark Salter <msalter@...hat.com> Acked-by: Mark Rutland <mark.rutland@....com> Acked-by: Leif Lindholm <leif.lindholm@...aro.org> Tested-by: Leif Lindholm <leif.lindholm@...aro.org> Signed-off-by: Ard Biesheuvel <ard.biesheuvel@...aro.org> Signed-off-by: Will Deacon <will.deacon@....com> --- arch/arm64/kernel/efi-stub.c | 16 ++++++---------- 1 file changed, 6 insertions(+), 10 deletions(-) diff --git a/arch/arm64/kernel/efi-stub.c b/arch/arm64/kernel/efi-stub.c index 1317fef..d27dd98 100644 --- a/arch/arm64/kernel/efi-stub.c +++ b/arch/arm64/kernel/efi-stub.c @@ -28,20 +28,16 @@ efi_status_t handle_kernel_image(efi_system_table_t *sys_table, kernel_size = _edata - _text; if (*image_addr != (dram_base + TEXT_OFFSET)) { kernel_memsize = kernel_size + (_end - _edata); - status = efi_relocate_kernel(sys_table, image_addr, - kernel_size, kernel_memsize, - dram_base + TEXT_OFFSET, - PAGE_SIZE); + status = efi_low_alloc(sys_table, kernel_memsize + TEXT_OFFSET, + SZ_2M, reserve_addr); if (status != EFI_SUCCESS) { pr_efi_err(sys_table, "Failed to relocate kernel\n"); return status; } - if (*image_addr != (dram_base + TEXT_OFFSET)) { - pr_efi_err(sys_table, "Failed to alloc kernel memory\n"); - efi_free(sys_table, kernel_memsize, *image_addr); - return EFI_LOAD_ERROR; - } - *image_size = kernel_memsize; + memcpy((void *)*reserve_addr + TEXT_OFFSET, (void *)*image_addr, + kernel_size); + *image_addr = *reserve_addr + TEXT_OFFSET; + *reserve_size = kernel_memsize + TEXT_OFFSET; } -- 1.9.3 -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists