Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp923531yba; Sun, 31 Mar 2019 17:15:18 -0700 (PDT) X-Google-Smtp-Source: APXvYqw+3hGyzn5ces4knsG4+Y/Lou12Y4bVhc1Ks+2qKOhAl5kqUoPn1eH9KhiQRFrA1bf9L0LK X-Received: by 2002:a17:902:8a8a:: with SMTP id p10mr3583765plo.8.1554077718765; Sun, 31 Mar 2019 17:15:18 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1554077718; cv=none; d=google.com; s=arc-20160816; b=Pbusb3dqLj8M7f8G+/b29CZWCsYHaewnx9zLJDIv00gfcy2LLPEu6vaD36qjaSV+yP smidjHjtR5UIQFtOBNG/7Xdk6l5YNC8Hs04REC54GbmfqnrX5eMFrkZ/viL1y75hykuF xIiJcpUOrruYw8+gvX9MxSTze/PYCu+lplCLSW1aGjCqaZAv2U531Elubdx5miSpiHTb b6fAfk7vJj0dOiGo/yFo1HexKBe/SzqFEBc+/z31tOktz/GuXAOwfB0BjDIqK7UXy7VJ kQsuviosEeGQehFth+e0zqAO6DY/eO//TV5vCXlEPaI8kFPM11bqKe/V7dCMlGW2BY7l Rdtw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:content-transfer-encoding :content-id:content-language:accept-language:in-reply-to:references :message-id:date:thread-index:thread-topic:subject:cc:to:from; bh=URB8QKMGNCKRuTdHzrI/wZk1v550pUeXAS5S7Uk8lFI=; b=AptH9RqPfuVSyM7Y1leLS6U9vdCkPW68t/QtrVFCuIuCZ2r1F+ULtKY7lPKz+ACB+B o5VTNGMZWx2h9dJ/ndWI23bo/KhpInTXg1ogXHm3zkYm3Ky64UVsyX8KpUBCztX4TAUz +RFK+4/nSv+u8l3Pna+C9WvE/1kycoLJ61V3zK81nWQisFImo70gfjP2wV4+JAfPde/4 FqZx0YbLaxaXfVDLHiqzrR+WYi80Uc36OunFwgmoVEe2gQBfeF2OFv3H8EvIkQkpHUE8 LUq4FxxGTUrf+NRDgG+2d7jbJDT8Ehmg5yHitZq0CfSKc8TK+7Es3FXuj0IYv2Xc/+Pg I2rw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id x4si7334351pll.344.2019.03.31.17.15.03; Sun, 31 Mar 2019 17:15:18 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731556AbfDAAO2 convert rfc822-to-8bit (ORCPT + 99 others); Sun, 31 Mar 2019 20:14:28 -0400 Received: from tyo161.gate.nec.co.jp ([114.179.232.161]:35521 "EHLO tyo161.gate.nec.co.jp" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731335AbfDAAO2 (ORCPT ); Sun, 31 Mar 2019 20:14:28 -0400 Received: from mailgate01.nec.co.jp ([114.179.233.122]) by tyo161.gate.nec.co.jp (8.15.1/8.15.1) with ESMTPS id x310DwTj012939 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Mon, 1 Apr 2019 09:13:58 +0900 Received: from mailsv01.nec.co.jp (mailgate-v.nec.co.jp [10.204.236.94]) by mailgate01.nec.co.jp (8.15.1/8.15.1) with ESMTP id x310Dwle004054; Mon, 1 Apr 2019 09:13:58 +0900 Received: from mail01b.kamome.nec.co.jp (mail01b.kamome.nec.co.jp [10.25.43.2]) by mailsv01.nec.co.jp (8.15.1/8.15.1) with ESMTP id x310Cfd2015131; Mon, 1 Apr 2019 09:13:58 +0900 Received: from bpxc99gp.gisp.nec.co.jp ([10.38.151.137] [10.38.151.137]) by mail03.kamome.nec.co.jp with ESMTP id BT-MMP-3839479; Mon, 1 Apr 2019 09:08:40 +0900 Received: from BPXM12GP.gisp.nec.co.jp ([10.38.151.204]) by BPXC09GP.gisp.nec.co.jp ([10.38.151.137]) with mapi id 14.03.0319.002; Mon, 1 Apr 2019 09:08:39 +0900 From: Junichi Nomura To: Borislav Petkov , "bhe@redhat.com" , "Dave Young" , "fanc.fnst@cn.fujitsu.com" CC: "kasong@redhat.com" , "x86@kernel.org" , "kexec@lists.infradead.org" , "linux-kernel@vger.kernel.org" Subject: [PATCH v2] x86/boot: Use efi_setup_data for searching RSDP on kexec-ed kernel Thread-Topic: [PATCH v2] x86/boot: Use efi_setup_data for searching RSDP on kexec-ed kernel Thread-Index: AQHU6B8O/KQzLHnxN0GPgqBgBxCptQ== Date: Mon, 1 Apr 2019 00:08:39 +0000 Message-ID: <20190401000837.GA5170@jeru.linux.bs1.fc.nec.co.jp> References: <20190325120149.GI12016@zn.tnic> <20190325122302.GC13160@dhcp-128-65.nay.redhat.com> <20190325123229.GL12016@zn.tnic> <20190325231000.GA9184@jeru.linux.bs1.fc.nec.co.jp> <20190326135714.GG1867@zn.tnic> <20190327014852.GA3659@MiWiFi-R3L-srv> <73322ba9-e436-68db-7863-afd31607d969@ce.jp.nec.com> <20190328064343.GA1877@MiWiFi-R3L-srv> <20190328074337.GA9470@jeru.linux.bs1.fc.nec.co.jp> <20190328155256.GP22720@zn.tnic> In-Reply-To: <20190328155256.GP22720@zn.tnic> Accept-Language: en-US, ja-JP Content-Language: ja-JP X-MS-Has-Attach: X-MS-TNEF-Correlator: x-originating-ip: [10.34.125.85] Content-Type: text/plain; charset="iso-2022-jp" Content-ID: Content-Transfer-Encoding: 8BIT MIME-Version: 1.0 X-TM-AS-MML: disable Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Commit 3a63f70bf4c3a ("x86/boot: Early parse RSDP and save it in boot_params") broke kexec boot on EFI systems. efi_get_rsdp_addr() in the early parsing code tries to search RSDP from EFI table but that will crash because the table address is virtual when the kernel was booted by kexec. In the case of kexec, physical address of EFI tables is provided via efi_setup_data in boot_params, which is set up by kexec(1). Factor out the table parsing code and use different pointers depending on whether the kernel is booted by kexec or not. Fixes: 3a63f70bf4c3a ("x86/boot: Early parse RSDP and save it in boot_params") Signed-off-by: Jun'ichi Nomura Acked-by: Baoquan He Cc: Chao Fan Cc: Borislav Petkov Cc: Dave Young -- v2: Added comments above __efi_get_rsdp_addr() and kexec_get_rsdp_addr() diff --git a/arch/x86/boot/compressed/acpi.c b/arch/x86/boot/compressed/acpi.c --- a/arch/x86/boot/compressed/acpi.c +++ b/arch/x86/boot/compressed/acpi.c @@ -44,17 +44,112 @@ static acpi_physical_address get_acpi_rsdp(void) return addr; } -/* Search EFI system tables for RSDP. */ -static acpi_physical_address efi_get_rsdp_addr(void) +#ifdef CONFIG_EFI +static unsigned long efi_get_kexec_setup_data_addr(void) +{ + struct setup_data *data; + u64 pa_data; + + pa_data = boot_params->hdr.setup_data; + while (pa_data) { + data = (struct setup_data *) pa_data; + if (data->type == SETUP_EFI) + return pa_data + sizeof(struct setup_data); + pa_data = data->next; + } + return 0; +} + +/* + * Search EFI system tables for RSDP. If both ACPI_20_TABLE_GUID and + * ACPI_TABLE_GUID are found, take the former, which has more features. + */ +static acpi_physical_address +__efi_get_rsdp_addr(unsigned long config_tables, unsigned int nr_tables, + bool efi_64) { acpi_physical_address rsdp_addr = 0; + int i; + + /* Get EFI tables from systab. */ + for (i = 0; i < nr_tables; i++) { + acpi_physical_address table; + efi_guid_t guid; + + if (efi_64) { + efi_config_table_64_t *tbl = (efi_config_table_64_t *) config_tables + i; + + guid = tbl->guid; + table = tbl->table; + + if (!IS_ENABLED(CONFIG_X86_64) && table >> 32) { + debug_putstr("Error getting RSDP address: EFI config table located above 4GB.\n"); + return 0; + } + } else { + efi_config_table_32_t *tbl = (efi_config_table_32_t *) config_tables + i; + guid = tbl->guid; + table = tbl->table; + } + + if (!(efi_guidcmp(guid, ACPI_TABLE_GUID))) + rsdp_addr = table; + else if (!(efi_guidcmp(guid, ACPI_20_TABLE_GUID))) + return table; + } + + return rsdp_addr; +} +#endif + +/* + * EFI/kexec support is only added for 64bit. So we don't have to + * care 32bit case. + */ +static acpi_physical_address kexec_get_rsdp_addr(void) +{ #ifdef CONFIG_EFI - unsigned long systab, systab_tables, config_tables; + efi_system_table_64_t *systab; + struct efi_setup_data *esd; + struct efi_info *ei; + char *sig; + + esd = (struct efi_setup_data *) efi_get_kexec_setup_data_addr(); + if (!esd) + return 0; + + if (!esd->tables) { + debug_putstr("Wrong kexec SETUP_EFI data.\n"); + return 0; + } + + ei = &boot_params->efi_info; + sig = (char *)&ei->efi_loader_signature; + if (strncmp(sig, EFI64_LOADER_SIGNATURE, 4)) { + debug_putstr("Wrong kexec EFI loader signature.\n"); + return 0; + } + + /* Get systab from boot params. */ + systab = (efi_system_table_64_t *) (ei->efi_systab | ((__u64)ei->efi_systab_hi << 32)); + if (!systab) + error("EFI system table not found in kexec boot_params."); + + return __efi_get_rsdp_addr((unsigned long) esd->tables, + systab->nr_tables, true); +#else + return 0; +#endif +} + +static acpi_physical_address efi_get_rsdp_addr(void) +{ +#ifdef CONFIG_EFI + unsigned long systab, config_tables; unsigned int nr_tables; struct efi_info *ei; bool efi_64; - int size, i; char *sig; ei = &boot_params->efi_info; @@ -88,49 +183,20 @@ static acpi_physical_address efi_get_rsdp_addr(void) config_tables = stbl->tables; nr_tables = stbl->nr_tables; - size = sizeof(efi_config_table_64_t); } else { efi_system_table_32_t *stbl = (efi_system_table_32_t *)systab; config_tables = stbl->tables; nr_tables = stbl->nr_tables; - size = sizeof(efi_config_table_32_t); } if (!config_tables) error("EFI config tables not found."); - /* Get EFI tables from systab. */ - for (i = 0; i < nr_tables; i++) { - acpi_physical_address table; - efi_guid_t guid; - - config_tables += size; - - if (efi_64) { - efi_config_table_64_t *tbl = (efi_config_table_64_t *)config_tables; - - guid = tbl->guid; - table = tbl->table; - - if (!IS_ENABLED(CONFIG_X86_64) && table >> 32) { - debug_putstr("Error getting RSDP address: EFI config table located above 4GB.\n"); - return 0; - } - } else { - efi_config_table_32_t *tbl = (efi_config_table_32_t *)config_tables; - - guid = tbl->guid; - table = tbl->table; - } - - if (!(efi_guidcmp(guid, ACPI_TABLE_GUID))) - rsdp_addr = table; - else if (!(efi_guidcmp(guid, ACPI_20_TABLE_GUID))) - return table; - } + return __efi_get_rsdp_addr(config_tables, nr_tables, efi_64); +#else + return 0; #endif - return rsdp_addr; } static u8 compute_checksum(u8 *buffer, u32 length) @@ -221,6 +287,9 @@ acpi_physical_address get_rsdp_addr(void) pa = boot_params->acpi_rsdp_addr; if (!pa) + pa = kexec_get_rsdp_addr(); + + if (!pa) pa = efi_get_rsdp_addr(); if (!pa)