Received: by 2002:ac0:a5a7:0:0:0:0:0 with SMTP id m36-v6csp2018286imm; Tue, 10 Jul 2018 11:41:32 -0700 (PDT) X-Google-Smtp-Source: AAOMgpciRgJoJ+YvV15C+8hBp6eLpxafXW7ukLltGY1ZzZ/ATIuh8aby+UhetWxab9Aks5EF5yf0 X-Received: by 2002:a63:383:: with SMTP id 125-v6mr18090992pgd.421.1531248092685; Tue, 10 Jul 2018 11:41:32 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1531248092; cv=none; d=google.com; s=arc-20160816; b=p+Lh3dLTA34JL2zGM7lNCK6WV5UbVoUcFey3CmubXz0Bj80a3amfpM90Xf64EY1gxu ZrfLL0Bl0ZDF2TJDGJM+/byi+nOiAmaPlEUZQWeR/hxdKXbuDESpyiIrWoRsuDHB19Ws /Thr9Rqau52IjJYxLXDXhzAhFxR3nZUDQhgw3ZczN2Oiqve/ybDdHAPm6667LDZXW7ia jDEbFqgrXkveQwV30Q/yTraoqAhIO0HExlP6piC5DIh3BA1h2Rd+R00O/jMvMxY/UtRg zANsP7Za9rUotY3hanbuNX9VepNGHGveSOe6dhR89GRNmJBuJh85Etc2kppMLhzbuY0t ksRQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :references:in-reply-to:mime-version:dkim-signature :arc-authentication-results; bh=b/qh4MmnxtcchGDhc6TQCa9qodaj+wt1P6Lw841CQsE=; b=wLK9GM2wFnduWVuK4ARzzEgUsUbvmzFiPzNGlnQdYlaHBxHwkC7OQjea2c50FwPBA0 mzSATdjoi+csFSsq0p0DJuXFiR98nYwZRhCLSbEaOssU/RQGa1ZBQJiGrgNodjq2rDS7 8phxCJ/u6o/+AxvwZKh+87XGFucGtOC2JAvqL7T9lYq7A2aRaxvlQpIioN0W/ha/P6RP K/Nzyrn1mTyuBBRPDUew8NmfSrtgSAPRxG9w1/wJZWRPyPXzz7OO6gqPcb4k+UjDQV2p 0wbFqZR/5dsfevmuN0acL4DhPvbrHJIAFe/AyJHqPo0tUAzMO+1zF5NfGEpvanxYsKrW 3wFA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=VbEO0wA4; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id x1-v6si651850pge.521.2018.07.10.11.41.17; Tue, 10 Jul 2018 11:41:32 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=VbEO0wA4; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732847AbeGJSjd (ORCPT + 99 others); Tue, 10 Jul 2018 14:39:33 -0400 Received: from mail-it0-f65.google.com ([209.85.214.65]:36715 "EHLO mail-it0-f65.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1732557AbeGJSjc (ORCPT ); Tue, 10 Jul 2018 14:39:32 -0400 Received: by mail-it0-f65.google.com with SMTP id j185-v6so81222ite.1 for ; Tue, 10 Jul 2018 11:39:17 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=b/qh4MmnxtcchGDhc6TQCa9qodaj+wt1P6Lw841CQsE=; b=VbEO0wA4MRaXUdYoFuQOdzSE6m4MyPMKxKp7oOLgz3MFnAatXJA+Zu0C3q7q0Z/6NI juw6JriPwlFo8DwKJSzTD9ZWe4lvJT9LkB5d9SwrdB39G9GV8gN+BlJYdFKb3Af0sS8Q +wK3rbTZu7XOVMcktCc1MCU7G4SEmFFr2tVdY= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=b/qh4MmnxtcchGDhc6TQCa9qodaj+wt1P6Lw841CQsE=; b=PPEApLLmz20ynJ3Pqj/bqixvg9ClzFpUXqPdRE1wZ+FqDch/KMnCGWb6aq8qHRFyxh 6x5aavmWLpZv5B+Gyvjxk34ToPfAKpHQ6q8VaMgxKwQ3PO4cz8W/82XxbeS16MoGthdN dzL648btTuZWlrHs1epPzrT9Htxou7leNwqBv2/ff6BFKVJtxMGRF7RNl2IjCFGGDWG6 v1uf0ITQ8hMKdsms0BH3GVQXOgy1I0gVfOAfB7nHwAkOXRB2mLXyM+bFd6Lu/btx64lD vuVRO9zGqV3l95dVXG7ngyc/RU6hD/ap+VfdZv5cnEHASqu5Sjapx8NpOG565zaUMSt4 1imQ== X-Gm-Message-State: APt69E22Jb5HJ7T/eOKsXQGabT07aSHE9yOyRoPMatrRAa2CMBmMNL0n fFAFrSMPSNQ72W9FEqcnwE9h8dxwNfH4kkYmliwGPA== X-Received: by 2002:a24:64d6:: with SMTP id t205-v6mr20544353itc.138.1531247957366; Tue, 10 Jul 2018 11:39:17 -0700 (PDT) MIME-Version: 1.0 Received: by 2002:a6b:bbc7:0:0:0:0:0 with HTTP; Tue, 10 Jul 2018 11:39:16 -0700 (PDT) In-Reply-To: <93c42065-bece-a4c7-ed99-5e98f91315a6@arm.com> References: <20180709234229.20181-1-takahiro.akashi@linaro.org> <20180709234229.20181-3-takahiro.akashi@linaro.org> <93c42065-bece-a4c7-ed99-5e98f91315a6@arm.com> From: Ard Biesheuvel Date: Tue, 10 Jul 2018 20:39:16 +0200 Message-ID: Subject: Re: [PATCH v3.1 2/4] efi/arm: preserve early mapping of UEFI memory map longer for BGRT To: James Morse Cc: AKASHI Takahiro , Catalin Marinas , Will Deacon , "Baicar, Tyler" , Bhupesh Sharma , Dave Young , Mark Rutland , Al Stone , Graeme Gregory , Hanjun Guo , Lorenzo Pieralisi , Sudeep Holla , linux-arm-kernel , Linux Kernel Mailing List , Kexec Mailing List Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 10 July 2018 at 19:57, James Morse wrote: > Hi Ard, > > On 10/07/18 00:42, AKASHI Takahiro wrote: >> From: Ard Biesheuvel >> >> The BGRT code validates the contents of the table against the UEFI >> memory map, and so it expects it to be mapped when the code runs. >> >> On ARM, this is currently not the case, since we tear down the early >> mapping after efi_init() completes, and only create the permanent >> mapping in arm_enable_runtime_services(), which executes as an early >> initcall, but still leaves a window where the UEFI memory map is not >> mapped. >> >> So move the call to efi_memmap_unmap() from efi_init() to >> arm_enable_runtime_services(). > > I don't have a machine that generates a BGRT, but I can see that efi_mem_type() > call in efi_bgrt_init() would cause the same problems we have with kexec and acpi. > I'm not sure I follow. The BGRT table only contains natively aligned fields, so the alignment faults should not occur when accessing this table after kexec. The issue addressed by this patch is that efi_mem_type() bails when called while EFI_MEMMAP is cleared. > >> diff --git a/drivers/firmware/efi/arm-init.c b/drivers/firmware/efi/arm-init.c >> index b5214c143fee..388a929baf95 100644 >> --- a/drivers/firmware/efi/arm-init.c >> +++ b/drivers/firmware/efi/arm-init.c >> @@ -259,7 +259,6 @@ void __init efi_init(void) >> >> reserve_regions(); >> efi_esrt_init(); >> - efi_memmap_unmap(); >> >> memblock_reserve(params.mmap & PAGE_MASK, >> PAGE_ALIGN(params.mmap_size + >> diff --git a/drivers/firmware/efi/arm-runtime.c b/drivers/firmware/efi/arm-runtime.c >> index 5889cbea60b8..59a8c0ec94d5 100644 >> --- a/drivers/firmware/efi/arm-runtime.c >> +++ b/drivers/firmware/efi/arm-runtime.c >> @@ -115,6 +115,8 @@ static int __init arm_enable_runtime_services(void) >> return 0; >> } >> >> + efi_memmap_unmap(); > > This can get called twice if uefi_init() fails after setting the EFI_BOOT flag, > but this can only happen if the system table signature is wrong, (or we're out > of memory really early). > I guess we should check the EFI_MEMMAP attribute here as well then. > I think this is harmless as we end up passing NULL to early_memunmap() which > WARN()s and returns as its outside the fixmap range. Its just more noise on > systems with a corrupt efi system table. > > Acked-by: James Morse > Thanks James