Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp404758yba; Wed, 24 Apr 2019 03:23:28 -0700 (PDT) X-Google-Smtp-Source: APXvYqw1JltG52z/O+1A5nQ19eWhMXMslADOl0h3tNoPyHKxT3XSbkNPo/NPJKP8jKgQV3Z3k6B1 X-Received: by 2002:aa7:91d6:: with SMTP id z22mr23041627pfa.242.1556101408870; Wed, 24 Apr 2019 03:23:28 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1556101408; cv=none; d=google.com; s=arc-20160816; b=OOL45tnCn+rbTuXih2pfJ8wFleFnzyAN9sT8a11+UTB87h2aGRzSvsvQc2DWDEStez oK8tPRkdzwbYQq+ub1WFTbnXsZxePQ52NgRkKm462Xt2lqeL+aXRp4bprakXWgxNkRFP TMSu0aK04+L5hpzE3OlfhmvABsZAdJo8ePtIOxaOxlR97+srmfLBc1+CHqs1Dx2B+6Oj rsspE2KRG68l93KwEs4KFH0THtYO0GgvfLLmn5TO632qRRK9kzRjX938sx8gtjcaoNXZ /N9+mZNbnAluOLxdJdRYivO3H434D0nCEg8aeZjciBFqv7dvT7IYgZxpYx6U62Z26SwL l2Rw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from; bh=o/0B5Zs3ukzK82FaxWDR62vyZRrdcXd/ykl0Dq6loAE=; b=Q7dvm9Ddsvi2n4JwLAoHWgvr69sbFwXu9LB/vS9uRt8YPD93Ly6yX8UBYc1/ZA3HBl xwIIo5Gt38trMxgwwUjxU2dU42qM4U3EwHaRS4EFRu/lc9kgH1iCrFmhvs736xDretWG PAucjYerUji27sshGnAkaDynWu5gMO/hxb2n+QaHpl+cbeu9d1g5m4InCHdObAJOOqVW hYhB6wYXNCNuWZ+/ZKZgz9CFgILbJGwtUn3QuVvDhMMKhCUzvVA/arIpYmMrKuXC9WJ3 b16NVUdfqoqyWDENJuJX8CL+kxXfV6otN2q+YWXmcmhN3z5Gi85R3jk8OBEW/oe4wHeN ZKWg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 97si4807456plb.271.2019.04.24.03.23.13; Wed, 24 Apr 2019 03:23:28 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728658AbfDXJaD (ORCPT + 99 others); Wed, 24 Apr 2019 05:30:03 -0400 Received: from mx1.redhat.com ([209.132.183.28]:55836 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727435AbfDXJaC (ORCPT ); Wed, 24 Apr 2019 05:30:02 -0400 Received: from smtp.corp.redhat.com (int-mx02.intmail.prod.int.phx2.redhat.com [10.5.11.12]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 2426031688E3; Wed, 24 Apr 2019 09:30:02 +0000 (UTC) Received: from MiWiFi-R3L-srv.redhat.com (ovpn-12-131.pek2.redhat.com [10.72.12.131]) by smtp.corp.redhat.com (Postfix) with ESMTP id AC22E60C78; Wed, 24 Apr 2019 09:29:58 +0000 (UTC) From: Baoquan He To: bp@alien8.de, j-nomura@ce.jp.nec.com, kasong@redhat.com, dyoung@redhat.com Cc: linux-kernel@vger.kernel.org, tglx@linutronix.de, fanc.fnst@cn.fujitsu.com, x86@kernel.org, kexec@lists.infradead.org, hpa@zytor.com Subject: [PATCH v5 1/2] x86/kexec: Build identity mapping for EFI systab and ACPI tables Date: Wed, 24 Apr 2019 17:29:43 +0800 Message-Id: <20190424092944.30481-2-bhe@redhat.com> In-Reply-To: <20190424092944.30481-1-bhe@redhat.com> References: <20190424092944.30481-1-bhe@redhat.com> X-Scanned-By: MIMEDefang 2.79 on 10.5.11.12 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.41]); Wed, 24 Apr 2019 09:30:02 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Kairui Song The current code only builds identity mapping for physical memory during kexec-type loading. The regions reserved by firmware are not covered. In the next patch, the boot decompressing code of kexec-ed kernel tries to access EFI systab and ACPI tables, lacking identity mapping for them will cause error and reset system to firmware. This error doesn't happen on all systems. Because kexec enables gbpages to build identity mapping, the EFI systab and ACPI tables could have been covered if they share the same 1 GB area with physical memory. To make sure, we should map them always. So here add mapping for them. Signed-off-by: Kairui Song --- arch/x86/kernel/machine_kexec_64.c | 86 ++++++++++++++++++++++++++++++ 1 file changed, 86 insertions(+) diff --git a/arch/x86/kernel/machine_kexec_64.c b/arch/x86/kernel/machine_kexec_64.c index ceba408ea982..77b40c3e28d7 100644 --- a/arch/x86/kernel/machine_kexec_64.c +++ b/arch/x86/kernel/machine_kexec_64.c @@ -18,6 +18,7 @@ #include #include #include +#include #include #include @@ -29,6 +30,48 @@ #include #include +#ifdef CONFIG_ACPI +/** + * Used while adding mapping for ACPI tables. + * Can be reused when other iomem regions need be mapped + */ +struct init_pgtable_data { + struct x86_mapping_info *info; + pgd_t *level4p; +}; + +static int mem_region_callback(struct resource *res, void *arg) +{ + struct init_pgtable_data *data = arg; + unsigned long mstart, mend; + + mstart = res->start; + mend = mstart + resource_size(res) - 1; + + return kernel_ident_mapping_init(data->info, + data->level4p, mstart, mend); +} + +static int init_acpi_pgtable(struct x86_mapping_info *info, + pgd_t *level4p) +{ + unsigned long flags = IORESOURCE_MEM | IORESOURCE_BUSY; + struct init_pgtable_data data; + + data.info = info; + data.level4p = level4p; + flags = IORESOURCE_MEM | IORESOURCE_BUSY; + return walk_iomem_res_desc(IORES_DESC_ACPI_TABLES, flags, 0, -1, + &data, mem_region_callback); +} +#else +static int init_acpi_pgtable(struct x86_mapping_info *info, + pgd_t *level4p) +{ + return 0; +} +#endif + #ifdef CONFIG_KEXEC_FILE const struct kexec_file_ops * const kexec_file_loaders[] = { &kexec_bzImage64_ops, @@ -36,6 +79,37 @@ const struct kexec_file_ops * const kexec_file_loaders[] = { }; #endif +#ifdef CONFIG_EFI +static int init_efi_systab_pgtable(struct x86_mapping_info *info, + pgd_t *level4p) +{ + unsigned long mstart, mend; + + if (!efi_enabled(EFI_BOOT)) + return 0; + + mstart = (boot_params.efi_info.efi_systab | + ((u64)boot_params.efi_info.efi_systab_hi<<32)); + + if (efi_enabled(EFI_64BIT)) + mend = mstart + sizeof(efi_system_table_64_t); + else + mend = mstart + sizeof(efi_system_table_32_t); + + if (mstart) + return kernel_ident_mapping_init(info, + level4p, mstart, mend); + + return 0; +} +#else +static inline int init_efi_systab_pgtable(struct x86_mapping_info *info, + pgd_t *level4p) +{ + return 0; +} +#endif + static void free_transition_pgtable(struct kimage *image) { free_page((unsigned long)image->arch.p4d); @@ -159,6 +233,18 @@ static int init_pgtable(struct kimage *image, unsigned long start_pgtable) return result; } + /** + * Prepare EFI systab and ACPI table mapping for kexec kernel, + * since they are not covered by pfn_mapped. + */ + result = init_efi_systab_pgtable(&info, level4p); + if (result) + return result; + + result = init_acpi_pgtable(&info, level4p); + if (result) + return result; + return init_transition_pgtable(image, level4p); } -- 2.17.2