Received: by 2002:ac0:a594:0:0:0:0:0 with SMTP id m20-v6csp3948813imm; Thu, 17 May 2018 18:38:06 -0700 (PDT) X-Google-Smtp-Source: AB8JxZp/p52DVVw/1ZEiq90zUaHX0x8vZVRg3jtz4FkMGtfWU8VTQwvlucU6m07aPsGKr5RKlSeD X-Received: by 2002:a17:902:6b45:: with SMTP id g5-v6mr7535217plt.67.1526607486095; Thu, 17 May 2018 18:38:06 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1526607486; cv=none; d=google.com; s=arc-20160816; b=jXBcZMKJG67+ywmD3QIgbRk6p63wxuBUtMHUSNkgw7Bas9DYMkADvIkZeVl4OkR+0m KFs2lIwKw9ULWw3HIUZA973rqlnlwIYpDmD4sqcwNLcjvg7eOcW/V355AkaKbwJMtDuW 5tGdUyYllrK341YZmn+w5UA1koBLXhF1PskwS7PBBfIBfiFhbsXmV3tnf7r79heIZLEN zZ61rwjlw794us5N/3wjNgaznfi+naW736YjeZubHX9WxlzZRsNs+IZMgW75TWFwi3pZ pDnY2LOzPXkIBq/R9038+clq9buXaBje93PzktySw8H2tdZGEKx25K1HHiCHKJ+MRLuQ 7gbg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:arc-authentication-results; bh=GJcpvRHoFA9Z5DZm/qJjhhaj9tVz/tD8/K6KEexlg6Y=; b=rARLdpeB+dRv9t4c79F9wSR0/9d82Huv+lobFD+SFJjG0RcMZH8Pz2T9U8cyhrkF5T MmL2Dj3kDVt2AJdWdJNe3kXHLLKL40gHhatLoB2quh6tEi1OQtP5wbQWZ6Ki/eT8Gfn7 3vvENPLP/hHfVA/gxh17OVczV8MLjI7LfBBkiIwCQMjNcgGlv9BrkYAA3e6lMtLA7gg4 wImDwwAoZGSVgkkefIVRCuD3iXisJ3HTA3rXErCeQvNwueW/EPu670AU9cQBSyPoLA2I accSk7l6EBx7ZqyF19iOj4CMf0opMqLFIi57aJJ7niR2fK7YEgYni3yxW7tg2vHctkvQ rhOg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id i62-v6si6578058pfg.218.2018.05.17.18.37.49; Thu, 17 May 2018 18:38:06 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751984AbeERBhk (ORCPT + 99 others); Thu, 17 May 2018 21:37:40 -0400 Received: from mx3-rdu2.redhat.com ([66.187.233.73]:38538 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1751844AbeERBhj (ORCPT ); Thu, 17 May 2018 21:37:39 -0400 Received: from smtp.corp.redhat.com (int-mx04.intmail.prod.int.rdu2.redhat.com [10.11.54.4]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id CDE0BC12A5; Fri, 18 May 2018 01:37:38 +0000 (UTC) Received: from localhost (ovpn-8-19.pek2.redhat.com [10.72.8.19]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 0528F2024CBC; Fri, 18 May 2018 01:37:37 +0000 (UTC) Date: Fri, 18 May 2018 09:37:35 +0800 From: Baoquan He To: James Morse Cc: AKASHI Takahiro , catalin.marinas@arm.com, will.deacon@arm.com, dhowells@redhat.com, vgoyal@redhat.com, herbert@gondor.apana.org.au, davem@davemloft.net, dyoung@redhat.com, arnd@arndb.de, ard.biesheuvel@linaro.org, bhsharma@redhat.com, kexec@lists.infradead.org, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH v9 04/11] arm64: kexec_file: allocate memory walking through memblock list Message-ID: <20180518013735.GP24627@MiWiFi-R3L-srv> References: <20180425062629.29404-1-takahiro.akashi@linaro.org> <20180425062629.29404-5-takahiro.akashi@linaro.org> <648656ef-1f1e-b0ac-581c-aba1e62f4eee@arm.com> <20180507055906.GE11326@linaro.org> <20180517021024.GI24627@MiWiFi-R3L-srv> <20180517021547.GJ24627@MiWiFi-R3L-srv> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.9.1 (2017-09-22) X-Scanned-By: MIMEDefang 2.78 on 10.11.54.4 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.1]); Fri, 18 May 2018 01:37:38 +0000 (UTC) X-Greylist: inspected by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.1]); Fri, 18 May 2018 01:37:38 +0000 (UTC) for IP:'10.11.54.4' DOMAIN:'int-mx04.intmail.prod.int.rdu2.redhat.com' HELO:'smtp.corp.redhat.com' FROM:'bhe@redhat.com' RCPT:'' Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 05/17/18 at 07:04pm, James Morse wrote: > Hi Baoquan, > > On 17/05/18 03:15, Baoquan He wrote: > > On 05/17/18 at 10:10am, Baoquan He wrote: > >> On 05/07/18 at 02:59pm, AKASHI Takahiro wrote: > >>> On Tue, May 01, 2018 at 06:46:09PM +0100, James Morse wrote: > >>>> On 25/04/18 07:26, AKASHI Takahiro wrote: > >>>>> We need to prevent firmware-reserved memory regions, particularly EFI > >>>>> memory map as well as ACPI tables, from being corrupted by loading > >>>>> kernel/initrd (or other kexec buffers). We also want to support memory > >>>>> allocation in top-down manner in addition to default bottom-up. > >>>>> So let's have arm64 specific arch_kexec_walk_mem() which will search > >>>>> for available memory ranges in usable memblock list, > >>>>> i.e. !NOMAP & !reserved, > >>>> > >>>>> instead of system resource tree. > >>>> > >>>> Didn't we try to fix the system-resource-tree in order to fix regular-kexec to > >>>> be safe in the EFI-memory-map/ACPI-tables case? > >>>> > >>>> It would be good to avoid having two ways of doing this, and I would like to > >>>> avoid having extra arch code... > >>> > >>> I know what you mean. > >>> /proc/iomem or system resource is, in my opinion, not the best place to > >>> describe memory usage of kernel but rather to describe *physical* hardware > >>> layout. As we are still discussing about "reserved" memory, I don't want > >>> to depend on it. > >>> Along with memblock list, we will have more accurate control over memory > >>> usage. > >> > >> In kexec-tools, we see any usable memory as candidate which can be used > > > > Here I said 'any', it's not accurate. Those memory which need be passed > > to 2nd kernel for use need be excluded, just as we have done in > > kexec-tools. > > > >> to load kexec kernel image/initrd etc. However kexec loading is a > >> preparation work, it just books those position for later kexec kernel > >> jumping after "kexec -e", that is why we need kexec_buf to remember > >> them and do the real content copy of kernel/initrd. > > The problem we have on arm64 is /proc/iomem is being used for two things. > 1) Kexec's this is memory I can book for the new kernel. > 2) Kdump's this is memory I must describe for vmcore. > > We get the memory map from UEFI via the EFI stub, and leave it in > memblock_reserved() memory. A new kexec kernel needs this to boot: it mustn't > overwrite it. The same goes for the ACPI tables, they could be reclaimed and > used as memory, but the new kexec kernel needs them to boot, they are > memblock_reserved() too. Thanks for these details. Seems arm64 is different. In x86 64 memblock is used as bootmem allocator and will be released when buddy takes over. Mainly, using memblock may bring concern that kexec kernel will jump to a unfixed position. This creates an unexpected effect as KASLR is doing, namely kernel could be put at a random position. As we know, kexec was invented for fast kernel dev testing by bypassing firmware reset, and has been taken to reboot those huge server with thousands of devices and large memory for business currently. This extra unpected KASLR effect may cause annoyance even though people have disabled KASLR explicitly for a specific testing purpose. Besides, discarding the /proc/iomem scanning but taking memblock instead in kernel space works for kexec loading for the time being, the flaw of /proc/iomem still exists and cause problem for user space kexec-tools, as pointed out. Do we have a plan for that? > > If we knock all memblock_reserved() regions out of /proc/iomem then kdump > doesn't work, because /proc/iomem is only generated once. Its a snapshot. The > initcode/data is an example of memory we release from memblock_reserve() after > this, then gets used for data we need in the vmcore. Hmm, I'm a little confused here. We have defined different iores type for different memory region. If acpi need be reused by kdump/kexec, we can change to not reclaim it, and add them into /proc/iomem in order to notify components which rely on them to process. enum { IORES_DESC_NONE = 0, IORES_DESC_CRASH_KERNEL = 1, IORES_DESC_ACPI_TABLES = 2, IORES_DESC_ACPI_NV_STORAGE = 3, IORES_DESC_PERSISTENT_MEMORY = 4, IORES_DESC_PERSISTENT_MEMORY_LEGACY = 5, IORES_DESC_DEVICE_PRIVATE_MEMORY = 6, IORES_DESC_DEVICE_PUBLIC_MEMORY = 7, }; Just walk around and talk about it, limited by poor arm64 knowledge, I may not have a complete view. If it's not like what I think about, I will stop, and can come back when I get more background knowledge. Thanks Baoquan > > Ideally we would describe all this in /proc/iomem with: > | 8001e80000-83ff186fff : System RAM > | 8002080000-8002feffff : [Data you really need to boot] > > kexec-tools should not overwrite 'data you really need to boot' unless it knows > what it is, and that the system will never need it again. (examples: overwrite > the ACPI tables when booting a non-acpi kernel, overwrite the UEFI memory map if > the DT has been regenerated for a non-uefi kernel) > > But, kexec-tools doesn't parse those second level entries properly. We have a > bug in user-space, and a bug in the kernel. > > Because /proc/iomem is being used for two things, and kexec-tools only parses > one level, I don't think we can fix this in the kernel without breaking one of > the use-cases. I think Akashi's fix user-space too approach is the most > pragmatic approach. > > > >> Here you use > >> memblock to search available memory, isn't it deviating too far away > >> from the original design in kexec-tools. Assume kexec loading and > >> kexec_file loading should be consistent on loading even though they are > >> done in different space, kernel space and user space. > > Its much easier for us to parse memblock in the kernel as the helpers step over > the regions we know we don't want. For the resource list we would need to > strcmp(), and a bunch of handling for the second level entries. > > > Thanks, > > James