diff options
| -rw-r--r-- | arch/x86/boot/compressed/aslr.c | 34 | ||||
| -rw-r--r-- | arch/x86/boot/compressed/misc.c | 3 | ||||
| -rw-r--r-- | arch/x86/boot/compressed/misc.h | 6 | ||||
| -rw-r--r-- | arch/x86/include/asm/page_types.h | 3 | ||||
| -rw-r--r-- | arch/x86/include/uapi/asm/bootparam.h | 1 | ||||
| -rw-r--r-- | arch/x86/kernel/module.c | 11 | ||||
| -rw-r--r-- | arch/x86/kernel/setup.c | 22 | ||||
| -rw-r--r-- | arch/x86/mm/mmap.c | 6 | ||||
| -rw-r--r-- | fs/binfmt_elf.c | 5 |
9 files changed, 69 insertions, 22 deletions
diff --git a/arch/x86/boot/compressed/aslr.c b/arch/x86/boot/compressed/aslr.c index bb1376381985..7083c16cccba 100644 --- a/arch/x86/boot/compressed/aslr.c +++ b/arch/x86/boot/compressed/aslr.c | |||
| @@ -14,6 +14,13 @@ | |||
| 14 | static const char build_str[] = UTS_RELEASE " (" LINUX_COMPILE_BY "@" | 14 | static const char build_str[] = UTS_RELEASE " (" LINUX_COMPILE_BY "@" |
| 15 | LINUX_COMPILE_HOST ") (" LINUX_COMPILER ") " UTS_VERSION; | 15 | LINUX_COMPILE_HOST ") (" LINUX_COMPILER ") " UTS_VERSION; |
| 16 | 16 | ||
| 17 | struct kaslr_setup_data { | ||
| 18 | __u64 next; | ||
| 19 | __u32 type; | ||
| 20 | __u32 len; | ||
| 21 | __u8 data[1]; | ||
| 22 | } kaslr_setup_data; | ||
| 23 | |||
| 17 | #define I8254_PORT_CONTROL 0x43 | 24 | #define I8254_PORT_CONTROL 0x43 |
| 18 | #define I8254_PORT_COUNTER0 0x40 | 25 | #define I8254_PORT_COUNTER0 0x40 |
| 19 | #define I8254_CMD_READBACK 0xC0 | 26 | #define I8254_CMD_READBACK 0xC0 |
| @@ -295,7 +302,29 @@ static unsigned long find_random_addr(unsigned long minimum, | |||
| 295 | return slots_fetch_random(); | 302 | return slots_fetch_random(); |
| 296 | } | 303 | } |
| 297 | 304 | ||
| 298 | unsigned char *choose_kernel_location(unsigned char *input, | 305 | static void add_kaslr_setup_data(struct boot_params *params, __u8 enabled) |
| 306 | { | ||
| 307 | struct setup_data *data; | ||
| 308 | |||
| 309 | kaslr_setup_data.type = SETUP_KASLR; | ||
| 310 | kaslr_setup_data.len = 1; | ||
| 311 | kaslr_setup_data.next = 0; | ||
| 312 | kaslr_setup_data.data[0] = enabled; | ||
| 313 | |||
| 314 | data = (struct setup_data *)(unsigned long)params->hdr.setup_data; | ||
| 315 | |||
| 316 | while (data && data->next) | ||
| 317 | data = (struct setup_data *)(unsigned long)data->next; | ||
| 318 | |||
| 319 | if (data) | ||
| 320 | data->next = (unsigned long)&kaslr_setup_data; | ||
| 321 | else | ||
| 322 | params->hdr.setup_data = (unsigned long)&kaslr_setup_data; | ||
| 323 | |||
| 324 | } | ||
| 325 | |||
| 326 | unsigned char *choose_kernel_location(struct boot_params *params, | ||
| 327 | unsigned char *input, | ||
| 299 | unsigned long input_size, | 328 | unsigned long input_size, |
| 300 | unsigned char *output, | 329 | unsigned char *output, |
| 301 | unsigned long output_size) | 330 | unsigned long output_size) |
| @@ -306,14 +335,17 @@ unsigned char *choose_kernel_location(unsigned char *input, | |||
| 306 | #ifdef CONFIG_HIBERNATION | 335 | #ifdef CONFIG_HIBERNATION |
| 307 | if (!cmdline_find_option_bool("kaslr")) { | 336 | if (!cmdline_find_option_bool("kaslr")) { |
| 308 | debug_putstr("KASLR disabled by default...\n"); | 337 | debug_putstr("KASLR disabled by default...\n"); |
| 338 | add_kaslr_setup_data(params, 0); | ||
| 309 | goto out; | 339 | goto out; |
| 310 | } | 340 | } |
| 311 | #else | 341 | #else |
| 312 | if (cmdline_find_option_bool("nokaslr")) { | 342 | if (cmdline_find_option_bool("nokaslr")) { |
| 313 | debug_putstr("KASLR disabled by cmdline...\n"); | 343 | debug_putstr("KASLR disabled by cmdline...\n"); |
| 344 | add_kaslr_setup_data(params, 0); | ||
| 314 | goto out; | 345 | goto out; |
| 315 | } | 346 | } |
| 316 | #endif | 347 | #endif |
| 348 | add_kaslr_setup_data(params, 1); | ||
| 317 | 349 | ||
| 318 | /* Record the various known unsafe memory ranges. */ | 350 | /* Record the various known unsafe memory ranges. */ |
| 319 | mem_avoid_init((unsigned long)input, input_size, | 351 | mem_avoid_init((unsigned long)input, input_size, |
diff --git a/arch/x86/boot/compressed/misc.c b/arch/x86/boot/compressed/misc.c index a950864a64da..5903089c818f 100644 --- a/arch/x86/boot/compressed/misc.c +++ b/arch/x86/boot/compressed/misc.c | |||
| @@ -401,7 +401,8 @@ asmlinkage __visible void *decompress_kernel(void *rmode, memptr heap, | |||
| 401 | * the entire decompressed kernel plus relocation table, or the | 401 | * the entire decompressed kernel plus relocation table, or the |
| 402 | * entire decompressed kernel plus .bss and .brk sections. | 402 | * entire decompressed kernel plus .bss and .brk sections. |
| 403 | */ | 403 | */ |
| 404 | output = choose_kernel_location(input_data, input_len, output, | 404 | output = choose_kernel_location(real_mode, input_data, input_len, |
| 405 | output, | ||
| 405 | output_len > run_size ? output_len | 406 | output_len > run_size ? output_len |
| 406 | : run_size); | 407 | : run_size); |
| 407 | 408 | ||
diff --git a/arch/x86/boot/compressed/misc.h b/arch/x86/boot/compressed/misc.h index 24e3e569a13c..6d6730743024 100644 --- a/arch/x86/boot/compressed/misc.h +++ b/arch/x86/boot/compressed/misc.h | |||
| @@ -56,7 +56,8 @@ int cmdline_find_option_bool(const char *option); | |||
| 56 | 56 | ||
| 57 | #if CONFIG_RANDOMIZE_BASE | 57 | #if CONFIG_RANDOMIZE_BASE |
| 58 | /* aslr.c */ | 58 | /* aslr.c */ |
| 59 | unsigned char *choose_kernel_location(unsigned char *input, | 59 | unsigned char *choose_kernel_location(struct boot_params *params, |
| 60 | unsigned char *input, | ||
| 60 | unsigned long input_size, | 61 | unsigned long input_size, |
| 61 | unsigned char *output, | 62 | unsigned char *output, |
| 62 | unsigned long output_size); | 63 | unsigned long output_size); |
| @@ -64,7 +65,8 @@ unsigned char *choose_kernel_location(unsigned char *input, | |||
| 64 | bool has_cpuflag(int flag); | 65 | bool has_cpuflag(int flag); |
| 65 | #else | 66 | #else |
| 66 | static inline | 67 | static inline |
| 67 | unsigned char *choose_kernel_location(unsigned char *input, | 68 | unsigned char *choose_kernel_location(struct boot_params *params, |
| 69 | unsigned char *input, | ||
| 68 | unsigned long input_size, | 70 | unsigned long input_size, |
| 69 | unsigned char *output, | 71 | unsigned char *output, |
| 70 | unsigned long output_size) | 72 | unsigned long output_size) |
diff --git a/arch/x86/include/asm/page_types.h b/arch/x86/include/asm/page_types.h index f97fbe3abb67..3d43ce36eaba 100644 --- a/arch/x86/include/asm/page_types.h +++ b/arch/x86/include/asm/page_types.h | |||
| @@ -3,6 +3,7 @@ | |||
| 3 | 3 | ||
| 4 | #include <linux/const.h> | 4 | #include <linux/const.h> |
| 5 | #include <linux/types.h> | 5 | #include <linux/types.h> |
| 6 | #include <asm/bootparam.h> | ||
| 6 | 7 | ||
| 7 | /* PAGE_SHIFT determines the page size */ | 8 | /* PAGE_SHIFT determines the page size */ |
| 8 | #define PAGE_SHIFT 12 | 9 | #define PAGE_SHIFT 12 |
| @@ -51,6 +52,8 @@ extern int devmem_is_allowed(unsigned long pagenr); | |||
| 51 | extern unsigned long max_low_pfn_mapped; | 52 | extern unsigned long max_low_pfn_mapped; |
| 52 | extern unsigned long max_pfn_mapped; | 53 | extern unsigned long max_pfn_mapped; |
| 53 | 54 | ||
| 55 | extern bool kaslr_enabled; | ||
| 56 | |||
| 54 | static inline phys_addr_t get_max_mapped(void) | 57 | static inline phys_addr_t get_max_mapped(void) |
| 55 | { | 58 | { |
| 56 | return (phys_addr_t)max_pfn_mapped << PAGE_SHIFT; | 59 | return (phys_addr_t)max_pfn_mapped << PAGE_SHIFT; |
diff --git a/arch/x86/include/uapi/asm/bootparam.h b/arch/x86/include/uapi/asm/bootparam.h index 225b0988043a..44e6dd7e36a2 100644 --- a/arch/x86/include/uapi/asm/bootparam.h +++ b/arch/x86/include/uapi/asm/bootparam.h | |||
| @@ -7,6 +7,7 @@ | |||
| 7 | #define SETUP_DTB 2 | 7 | #define SETUP_DTB 2 |
| 8 | #define SETUP_PCI 3 | 8 | #define SETUP_PCI 3 |
| 9 | #define SETUP_EFI 4 | 9 | #define SETUP_EFI 4 |
| 10 | #define SETUP_KASLR 5 | ||
| 10 | 11 | ||
| 11 | /* ram_size flags */ | 12 | /* ram_size flags */ |
| 12 | #define RAMDISK_IMAGE_START_MASK 0x07FF | 13 | #define RAMDISK_IMAGE_START_MASK 0x07FF |
diff --git a/arch/x86/kernel/module.c b/arch/x86/kernel/module.c index e69f9882bf95..c3c59a3a14ad 100644 --- a/arch/x86/kernel/module.c +++ b/arch/x86/kernel/module.c | |||
| @@ -32,6 +32,7 @@ | |||
| 32 | 32 | ||
| 33 | #include <asm/page.h> | 33 | #include <asm/page.h> |
| 34 | #include <asm/pgtable.h> | 34 | #include <asm/pgtable.h> |
| 35 | #include <asm/page_types.h> | ||
| 35 | 36 | ||
| 36 | #if 0 | 37 | #if 0 |
| 37 | #define DEBUGP(fmt, ...) \ | 38 | #define DEBUGP(fmt, ...) \ |
| @@ -46,21 +47,13 @@ do { \ | |||
| 46 | 47 | ||
| 47 | #ifdef CONFIG_RANDOMIZE_BASE | 48 | #ifdef CONFIG_RANDOMIZE_BASE |
| 48 | static unsigned long module_load_offset; | 49 | static unsigned long module_load_offset; |
| 49 | static int randomize_modules = 1; | ||
| 50 | 50 | ||
| 51 | /* Mutex protects the module_load_offset. */ | 51 | /* Mutex protects the module_load_offset. */ |
| 52 | static DEFINE_MUTEX(module_kaslr_mutex); | 52 | static DEFINE_MUTEX(module_kaslr_mutex); |
| 53 | 53 | ||
| 54 | static int __init parse_nokaslr(char *p) | ||
| 55 | { | ||
| 56 | randomize_modules = 0; | ||
| 57 | return 0; | ||
| 58 | } | ||
| 59 | early_param("nokaslr", parse_nokaslr); | ||
| 60 | |||
| 61 | static unsigned long int get_module_load_offset(void) | 54 | static unsigned long int get_module_load_offset(void) |
| 62 | { | 55 | { |
| 63 | if (randomize_modules) { | 56 | if (kaslr_enabled) { |
| 64 | mutex_lock(&module_kaslr_mutex); | 57 | mutex_lock(&module_kaslr_mutex); |
| 65 | /* | 58 | /* |
| 66 | * Calculate the module_load_offset the first time this | 59 | * Calculate the module_load_offset the first time this |
diff --git a/arch/x86/kernel/setup.c b/arch/x86/kernel/setup.c index c4648adadd7d..0d8071d7addb 100644 --- a/arch/x86/kernel/setup.c +++ b/arch/x86/kernel/setup.c | |||
| @@ -121,6 +121,8 @@ | |||
| 121 | unsigned long max_low_pfn_mapped; | 121 | unsigned long max_low_pfn_mapped; |
| 122 | unsigned long max_pfn_mapped; | 122 | unsigned long max_pfn_mapped; |
| 123 | 123 | ||
| 124 | bool __read_mostly kaslr_enabled = false; | ||
| 125 | |||
| 124 | #ifdef CONFIG_DMI | 126 | #ifdef CONFIG_DMI |
| 125 | RESERVE_BRK(dmi_alloc, 65536); | 127 | RESERVE_BRK(dmi_alloc, 65536); |
| 126 | #endif | 128 | #endif |
| @@ -424,6 +426,11 @@ static void __init reserve_initrd(void) | |||
| 424 | } | 426 | } |
| 425 | #endif /* CONFIG_BLK_DEV_INITRD */ | 427 | #endif /* CONFIG_BLK_DEV_INITRD */ |
| 426 | 428 | ||
| 429 | static void __init parse_kaslr_setup(u64 pa_data, u32 data_len) | ||
| 430 | { | ||
| 431 | kaslr_enabled = (bool)(pa_data + sizeof(struct setup_data)); | ||
| 432 | } | ||
| 433 | |||
| 427 | static void __init parse_setup_data(void) | 434 | static void __init parse_setup_data(void) |
| 428 | { | 435 | { |
| 429 | struct setup_data *data; | 436 | struct setup_data *data; |
| @@ -449,6 +456,9 @@ static void __init parse_setup_data(void) | |||
| 449 | case SETUP_EFI: | 456 | case SETUP_EFI: |
| 450 | parse_efi_setup(pa_data, data_len); | 457 | parse_efi_setup(pa_data, data_len); |
| 451 | break; | 458 | break; |
| 459 | case SETUP_KASLR: | ||
| 460 | parse_kaslr_setup(pa_data, data_len); | ||
| 461 | break; | ||
| 452 | default: | 462 | default: |
| 453 | break; | 463 | break; |
| 454 | } | 464 | } |
| @@ -831,10 +841,14 @@ static void __init trim_low_memory_range(void) | |||
| 831 | static int | 841 | static int |
| 832 | dump_kernel_offset(struct notifier_block *self, unsigned long v, void *p) | 842 | dump_kernel_offset(struct notifier_block *self, unsigned long v, void *p) |
| 833 | { | 843 | { |
| 834 | pr_emerg("Kernel Offset: 0x%lx from 0x%lx " | 844 | if (kaslr_enabled) |
| 835 | "(relocation range: 0x%lx-0x%lx)\n", | 845 | pr_emerg("Kernel Offset: 0x%lx from 0x%lx (relocation range: 0x%lx-0x%lx)\n", |
| 836 | (unsigned long)&_text - __START_KERNEL, __START_KERNEL, | 846 | (unsigned long)&_text - __START_KERNEL, |
| 837 | __START_KERNEL_map, MODULES_VADDR-1); | 847 | __START_KERNEL, |
| 848 | __START_KERNEL_map, | ||
| 849 | MODULES_VADDR-1); | ||
| 850 | else | ||
| 851 | pr_emerg("Kernel Offset: disabled\n"); | ||
| 838 | 852 | ||
| 839 | return 0; | 853 | return 0; |
| 840 | } | 854 | } |
diff --git a/arch/x86/mm/mmap.c b/arch/x86/mm/mmap.c index 919b91205cd4..df4552bd239e 100644 --- a/arch/x86/mm/mmap.c +++ b/arch/x86/mm/mmap.c | |||
| @@ -35,12 +35,12 @@ struct va_alignment __read_mostly va_align = { | |||
| 35 | .flags = -1, | 35 | .flags = -1, |
| 36 | }; | 36 | }; |
| 37 | 37 | ||
| 38 | static unsigned int stack_maxrandom_size(void) | 38 | static unsigned long stack_maxrandom_size(void) |
| 39 | { | 39 | { |
| 40 | unsigned int max = 0; | 40 | unsigned long max = 0; |
| 41 | if ((current->flags & PF_RANDOMIZE) && | 41 | if ((current->flags & PF_RANDOMIZE) && |
| 42 | !(current->personality & ADDR_NO_RANDOMIZE)) { | 42 | !(current->personality & ADDR_NO_RANDOMIZE)) { |
| 43 | max = ((-1U) & STACK_RND_MASK) << PAGE_SHIFT; | 43 | max = ((-1UL) & STACK_RND_MASK) << PAGE_SHIFT; |
| 44 | } | 44 | } |
| 45 | 45 | ||
| 46 | return max; | 46 | return max; |
diff --git a/fs/binfmt_elf.c b/fs/binfmt_elf.c index 02b16910f4c9..995986b8e36b 100644 --- a/fs/binfmt_elf.c +++ b/fs/binfmt_elf.c | |||
| @@ -645,11 +645,12 @@ out: | |||
| 645 | 645 | ||
| 646 | static unsigned long randomize_stack_top(unsigned long stack_top) | 646 | static unsigned long randomize_stack_top(unsigned long stack_top) |
| 647 | { | 647 | { |
| 648 | unsigned int random_variable = 0; | 648 | unsigned long random_variable = 0; |
| 649 | 649 | ||
| 650 | if ((current->flags & PF_RANDOMIZE) && | 650 | if ((current->flags & PF_RANDOMIZE) && |
| 651 | !(current->personality & ADDR_NO_RANDOMIZE)) { | 651 | !(current->personality & ADDR_NO_RANDOMIZE)) { |
| 652 | random_variable = get_random_int() & STACK_RND_MASK; | 652 | random_variable = (unsigned long) get_random_int(); |
| 653 | random_variable &= STACK_RND_MASK; | ||
| 653 | random_variable <<= PAGE_SHIFT; | 654 | random_variable <<= PAGE_SHIFT; |
| 654 | } | 655 | } |
| 655 | #ifdef CONFIG_STACK_GROWSUP | 656 | #ifdef CONFIG_STACK_GROWSUP |
