[PATCH] x86/kaslr: Revisit entropy when CONFIG_PCI_P2PDMA is enabled

From: Balbir Singh
Date: Wed Feb 05 2025 - 21:33:05 EST


When CONFIG_PCI_P2PDMA is enabled, it maps the PFN's via a
ZONE_DEVICE mapping using devm_memremap_pages(). The mapped
virtual address range corresponds to the pci_resource_start()
of the BAR address and size corresponding to the BAR length.

When KASLR is enabled, the direct map range of the kernel is
reduced to the size of physical memory plus additional padding.
If the BAR address is beyond this limit, PCI peer to peer DMA
mappings fail.

Fix this by not shrinking the size of direct map when CONFIG_PCI_P2PDMA
is enabled. This reduces the total available entropy, but it's
better than the current work around of having to disable KASLR
completely.

Cc: Dave Hansen <dave.hansen@xxxxxxxxxxxxxxx>
Cc: Andy Lutomirski <luto@xxxxxxxxxx>
Cc: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
Cc: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
Cc: Ingo Molnar <mingo@xxxxxxxxxx>
Cc: Borislav Petkov <bp@xxxxxxxxx>
Cc: "H. Peter Anvin" <hpa@xxxxxxxxx>
Link: https://lore.kernel.org/all/1462225276-106993-1-git-send-email-thgarnie@xxxxxxxxxx/


Signed-off-by: Balbir Singh <balbirs@xxxxxxxxxx>
---

Testing:

commit 0483e1fa6e09d ("x86/mm: Implement ASLR for kernel memory regions") mentions the
problems that the following problems need to be addressed.

1 The three target memory sections are never at the same place between
boots.
2 The physical memory mapping can use a virtual address not aligned on
the PGD page table.
3 Have good entropy early at boot before get_random_bytes is available.
4 Add optional padding for memory hotplug compatibility.

Ran an automated test to ensure that (1) holds true across several
iterations of automated reboot testing. 2, 3 and 4 are not impacted
by this patch.

Manual Testing on a system where the problem reproduces

1. With KASLR

Hotplug memory [0x240000000000-0x242000000000] exceeds maximum addressable range [0x0-0xaffffffffff]
------------[ cut here ]------------
2. With the fixes

added peer-to-peer DMA memory 0x240000000000-0x241fffffffff

KASLR is still enabled as seen by kaslr_offset() (difference
between __START_KERNEL and _stext)
3. Without the fixes and KASLR disabled

added peer-to-peer DMA memory 0x240000000000-0x241fffffffff

KASLR is disabled, kaslr_offset() is 0.

On my system with 46 bits physical address and 4 level page tables (no
LA57), the remaining entropy dropped from 49 TiB to 20 TiB

arch/x86/mm/kaslr.c | 10 ++++++++--
1 file changed, 8 insertions(+), 2 deletions(-)

diff --git a/arch/x86/mm/kaslr.c b/arch/x86/mm/kaslr.c
index 11a93542d198..3c306de52fd4 100644
--- a/arch/x86/mm/kaslr.c
+++ b/arch/x86/mm/kaslr.c
@@ -113,8 +113,14 @@ void __init kernel_randomize_memory(void)
memory_tb = DIV_ROUND_UP(max_pfn << PAGE_SHIFT, 1UL << TB_SHIFT) +
CONFIG_RANDOMIZE_MEMORY_PHYSICAL_PADDING;

- /* Adapt physical memory region size based on available memory */
- if (memory_tb < kaslr_regions[0].size_tb)
+ /*
+ * Adapt physical memory region size based on available memory,
+ * except when CONFIG_PCI_P2PDMA is enabled. P2PDMA exposes the
+ * device BAR space assuming the direct map space is large enough
+ * for creating a ZONE_DEVICE mapping in the direct map corresponding
+ * to the physical BAR address.
+ */
+ if (!IS_ENABLED(CONFIG_PCI_P2PDMA) && (memory_tb < kaslr_regions[0].size_tb))
kaslr_regions[0].size_tb = memory_tb;

/*
--
2.48.0