lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20180815035921.GA5865@dhcp-128-65.nay.redhat.com>
Date:   Wed, 15 Aug 2018 11:59:21 +0800
From:   Dave Young <dyoung@...hat.com>
To:     Mike Galbraith <efault@....de>
Cc:     Baoquan He <bhe@...hat.com>,
        Sebastian Andrzej Siewior <bigeasy@...utronix.de>,
        lkml <linux-kernel@...r.kernel.org>
Subject: Re: [PATCH] x86, kdump: Fix efi=noruntime NULL pointer dereference

Apologize for late reply, I'm occupied with something else.

On 08/10/18 at 07:39pm, Mike Galbraith wrote:
> On Fri, 2018-08-10 at 18:28 +0800, Dave Young wrote:
> > 
> > > @@ -250,8 +253,10 @@ setup_boot_parameters(struct kimage *image, struct boot_params *params,
> > >  
> > >  #ifdef CONFIG_EFI
> > >  	/* Setup EFI state */
> > > -	setup_efi_state(params, params_load_addr, efi_map_offset, efi_map_sz,
> > > +	ret = setup_efi_state(params, params_load_addr, efi_map_offset, efi_map_sz,
> > >  			efi_setup_data_offset);
> > > +	if (ret)
> > 
> > Here should check efi_enabled(EFI_BOOT) && ret
> 
> Patch with that works for me.
> 
> > In case efi boot we need the efi info set correctly,  or one need pass
> > acpi_rsdp= in kernel cmdline param.
> > 
> > Still not sure how to allow one to workaround it by using acpi_rsdp=
> > param with kexec_file_load..
> 
> Does this improve things, and plug the no boot hole?

Would you mind to tune my patch with some acpi_rsdp checking and add
some error message in case kexec load failure? Eg. suggest people to use
append acpi_rsdp for noefi booting etc.

I'm still not very satisfied with the code cleanup, ideally we should add a
separate kbuf for efi stuff, so that we can isolate the efi_map_sz
efi_setup_data_offset, and efi_map_offset initialization only when
necessary.  Anyway the cleanup can be a separate patch.

> 
> x86, kdump: cleanup efi setup data handling a bit
> 
> 1. Remove efi specific variables from bzImage64_load() other than the
> one it needs, efi_map_sz, passing it and params_cmdline_sz on to efi
> setup functions, giving them all they need without duplication.
> 
> 2. Only allocate space for efi setup data when a 1:1 mapping is available.
> Bail early with -ENODEV if not available, but is required to boot, and
> acpi_rsdp= was not passed on the command line. 
> 
> 3. Use the proper config dependency to isolate efi setup functions,
> adding a !EFI_RUNTIME_MAP stub for setup_efi_state().
> 
> 4. Change efi functions that cannot fail to void. 
> 
> Signed-off-by: Mike Galbraith <efault@....de>
> ---
>  arch/x86/kernel/kexec-bzimage64.c |   99 +++++++++++++++++---------------------
>  1 file changed, 45 insertions(+), 54 deletions(-)
> 
> --- a/arch/x86/kernel/kexec-bzimage64.c
> +++ b/arch/x86/kernel/kexec-bzimage64.c
> @@ -112,35 +112,32 @@ static int setup_e820_entries(struct boo
>  	return 0;
>  }
>  
> -#ifdef CONFIG_EFI
> -static int setup_efi_info_memmap(struct boot_params *params,
> +#ifdef CONFIG_EFI_RUNTIME_MAP
> +static void setup_efi_info_memmap(struct boot_params *params,
>  				  unsigned long params_load_addr,
> -				  unsigned int efi_map_offset,
> +				  unsigned int params_cmdline_sz,
>  				  unsigned int efi_map_sz)
>  {
> -	void *efi_map = (void *)params + efi_map_offset;
> -	unsigned long efi_map_phys_addr = params_load_addr + efi_map_offset;
> +	void *efi_map = (void *)params + params_cmdline_sz;
> +	unsigned long efi_map_phys_addr = params_load_addr + params_cmdline_sz;
>  	struct efi_info *ei = &params->efi_info;
>  
> -	if (!efi_map_sz)
> -		return -EINVAL;
> -
>  	efi_runtime_map_copy(efi_map, efi_map_sz);
>  
>  	ei->efi_memmap = efi_map_phys_addr & 0xffffffff;
>  	ei->efi_memmap_hi = efi_map_phys_addr >> 32;
>  	ei->efi_memmap_size = efi_map_sz;
> -
> -	return 0;
>  }
>  
> -static int
> +static void
>  prepare_add_efi_setup_data(struct boot_params *params,
> -		       unsigned long params_load_addr,
> -		       unsigned int efi_setup_data_offset)
> +			   unsigned long params_load_addr,
> +			   unsigned int params_cmdline_sz,
> +			   unsigned int efi_map_sz)
>  {
> +	unsigned int data_offset = params_cmdline_sz + ALIGN(efi_map_sz, 16);
>  	unsigned long setup_data_phys;
> -	struct setup_data *sd = (void *)params + efi_setup_data_offset;
> +	struct setup_data *sd = (void *)params + data_offset;
>  	struct efi_setup_data *esd = (void *)sd + sizeof(struct setup_data);
>  
>  	esd->fw_vendor = efi.fw_vendor;
> @@ -152,33 +149,20 @@ prepare_add_efi_setup_data(struct boot_p
>  	sd->len = sizeof(struct efi_setup_data);
>  
>  	/* Add setup data */
> -	setup_data_phys = params_load_addr + efi_setup_data_offset;
> +	setup_data_phys = params_load_addr + data_offset;
>  	sd->next = params->hdr.setup_data;
>  	params->hdr.setup_data = setup_data_phys;
> -
> -	return 0;
>  }
>  
>  static int
>  setup_efi_state(struct boot_params *params, unsigned long params_load_addr,
> -		unsigned int efi_map_offset, unsigned int efi_map_sz,
> -		unsigned int efi_setup_data_offset)
> +		unsigned int params_cmdline_sz, unsigned int efi_map_sz)
>  {
>  	struct efi_info *current_ei = &boot_params.efi_info;
>  	struct efi_info *ei = &params->efi_info;
> -	int ret;
> -
> -	if (!current_ei->efi_memmap_size)
> -		return -EINVAL;
>  
> -	/*
> -	 * If 1:1 mapping is not enabled, second kernel can not setup EFI
> -	 * and use EFI run time services. User space will have to pass
> -	 * acpi_rsdp=<addr> on kernel command line to make second kernel boot
> -	 * without efi.
> -	 */
> -	if (efi_enabled(EFI_OLD_MEMMAP) || !efi_enabled(EFI_RUNTIME_SERVICES))
> -		return -ENODEV;
> +	if (!efi_map_sz || !current_ei->efi_memmap_size)
> +		return efi_map_sz ? -EINVAL : 0;
>  
>  	ei->efi_loader_signature = current_ei->efi_loader_signature;
>  	ei->efi_systab = current_ei->efi_systab;
> @@ -187,21 +171,24 @@ setup_efi_state(struct boot_params *para
>  	ei->efi_memdesc_version = current_ei->efi_memdesc_version;
>  	ei->efi_memdesc_size = efi_get_runtime_map_desc_size();
>  
> -	ret = setup_efi_info_memmap(params, params_load_addr, efi_map_offset,
> +	setup_efi_info_memmap(params, params_load_addr, params_cmdline_sz,
>  			      efi_map_sz);
> -	if (ret)
> -		return ret;
> -	prepare_add_efi_setup_data(params, params_load_addr,
> -				   efi_setup_data_offset);
> +	prepare_add_efi_setup_data(params, params_load_addr, params_cmdline_sz,
> +				   efi_map_sz);
>  	return 0;
>  }
> -#endif /* CONFIG_EFI */
> +#else /* !CONFIG_EFI_RUNTIME_MAP */
> +static int
> +setup_efi_state(struct boot_params *params, unsigned long params_load_addr,
> +		unsigned int params_cmdline_sz, unsigned int efi_map_sz)
> +{ return 0; }
> +#endif /* CONFIG_EFI_RUNTIME_MAP */
>  
>  static int
>  setup_boot_parameters(struct kimage *image, struct boot_params *params,
>  		      unsigned long params_load_addr,
> -		      unsigned int efi_map_offset, unsigned int efi_map_sz,
> -		      unsigned int efi_setup_data_offset)
> +		      unsigned int params_cmdline_sz,
> +		      unsigned int efi_map_sz)
>  {
>  	unsigned int nr_e820_entries;
>  	unsigned long long mem_k, start, end;
> @@ -251,13 +238,9 @@ setup_boot_parameters(struct kimage *ima
>  		}
>  	}
>  
> -#ifdef CONFIG_EFI
> -	/* Setup EFI state */
> -	ret = setup_efi_state(params, params_load_addr, efi_map_offset, efi_map_sz,
> -			efi_setup_data_offset);
> -	if (efi_enabled(EFI_BOOT) && ret)
> +	ret = setup_efi_state(params, params_load_addr, params_cmdline_sz, efi_map_sz);
> +	if (ret)
>  		return ret;
> -#endif
>  
>  	/* Setup EDD info */
>  	memcpy(params->eddbuf, boot_params.eddbuf,
> @@ -343,7 +326,7 @@ static void *bzImage64_load(struct kimag
>  	struct kexec_entry64_regs regs64;
>  	void *stack;
>  	unsigned int setup_hdr_offset = offsetof(struct boot_params, hdr);
> -	unsigned int efi_map_offset, efi_map_sz, efi_setup_data_offset;
> +	unsigned int efi_map_sz = 0;
>  	struct kexec_buf kbuf = { .image = image, .buf_max = ULONG_MAX,
>  				  .top_down = true };
>  	struct kexec_buf pbuf = { .image = image, .buf_min = MIN_PURGATORY_ADDR,
> @@ -402,19 +385,28 @@ static void *bzImage64_load(struct kimag
>  	 * have to create separate segment for each. Keeps things
>  	 * little bit simple
>  	 */
> -	efi_map_sz = efi_get_runtime_map_size();
>  	params_cmdline_sz = sizeof(struct boot_params) + cmdline_len +
>  				MAX_ELFCOREHDR_STR_LEN;
>  	params_cmdline_sz = ALIGN(params_cmdline_sz, 16);
> -	kbuf.bufsz = params_cmdline_sz + ALIGN(efi_map_sz, 16) +
> -				sizeof(struct setup_data) +
> -				sizeof(struct efi_setup_data);
> +	kbuf.bufsz = params_cmdline_sz + sizeof(struct setup_data);
> +
> +	/*
> +	 * If a 1:1 mapping does not exist, the second kernel cannot setup
> +	 * and use EFI run time services, user space will have to pass
> +	 * acpi_rsdp=<addr> on the kernel command line to make the second
> +	 * kernel boot without efi.  Allocate space for efi setup data if
> +	 * this constraint is met, bail if not, but is required to boot,
> +	 * and acpi_rsdp=<addr> was not passed on the command line.
> +	 */
> +	if (efi_enabled(EFI_RUNTIME_SERVICES) && !efi_enabled(EFI_OLD_MEMMAP)) {
> +		efi_map_sz = efi_get_runtime_map_size();
> +		kbuf.bufsz += ALIGN(efi_map_sz, 16) + sizeof(struct efi_setup_data);
> +	} else if (efi_enabled(EFI_BOOT) && !strstr(cmdline, "acpi_rsdp="))
> +		return ERR_PTR(-ENODEV);
>  
>  	params = kzalloc(kbuf.bufsz, GFP_KERNEL);
>  	if (!params)
>  		return ERR_PTR(-ENOMEM);
> -	efi_map_offset = params_cmdline_sz;
> -	efi_setup_data_offset = efi_map_offset + ALIGN(efi_map_sz, 16);
>  
>  	/* Copy setup header onto bootparams. Documentation/x86/boot.txt */
>  	setup_header_size = 0x0202 + kernel[0x0201] - setup_hdr_offset;
> @@ -494,8 +486,7 @@ static void *bzImage64_load(struct kimag
>  		goto out_free_params;
>  
>  	ret = setup_boot_parameters(image, params, bootparam_load_addr,
> -				    efi_map_offset, efi_map_sz,
> -				    efi_setup_data_offset);
> +				    params_cmdline_sz, efi_map_sz);
>  	if (ret)
>  		goto out_free_params;
>  
> 

Thanks
Dave

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ