Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp3105773yba; Sun, 28 Apr 2019 17:24:30 -0700 (PDT) X-Google-Smtp-Source: APXvYqwVpZv83vf/bNOr0qsbwgt7EZiWw4QnPyV+Ft4fky0Po/VcYMz9dPrNdXop5SLVmQzcD7vb X-Received: by 2002:a63:5166:: with SMTP id r38mr16319906pgl.429.1556497470222; Sun, 28 Apr 2019 17:24:30 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1556497470; cv=none; d=google.com; s=arc-20160816; b=cJwUhAR7Za5I/wQxT2LljHOepsCYOwMNY9lUikuWpub9q7S8JRLor6mU5NWUHQSUOs FvI0P3krIKw+OF+yYAmy+2VhcUVhcmAw0CPieowqy90Flqs6bNmLMnFL7LWPxRYYxKC6 ceP/60B2jED3B8tOPWCmgwwEYienSnmztFhtymQwFjiDx3K+GhdMp8gBzA/fnh2mQcMU Gw1yOeC02IpXGYW2pnuiYvHXVtrrXo3mRe9qXrXuig/4mWcu5tGgu5/U/jSMeSCwp4GT LmTveZtPD8VzGiLDDn1ZCRdawbK/3x+Mvil1mUf8zpPL8PzkaLSIPK12YL3qGAAP5Az0 p+jg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=b3owYEEjqIgQOLxt4bKNy2cNN4ur8UQPXUmXp9LRjAg=; b=Aw+dmiupSzEemznaF2/0VOFBawEWERaDW/nBqx+PsfxB5cF3yFOmBc0u5/meRFe215 hpIXLOOmchm+tiSjt96GitXX7W+grEujwuvp7QtmRxuMjF0SId1fzp9HBPyOkn5lrf8n GbKBYBZ2DLcW7xcGmNZYkZshJ2TucY9NGz1wdxm8NiHcmWZFAlc+Z4om7sC44XxHTD2Y vTkzNS4kRvGde3afZclx1cM3t4PYdidc8Fi+bh8G+Fbt4YCPtve+Es9P1RNc8Tp2LMer wd9lS184pZM2h6ZR0jmJMwGE2lxrPcvl9+RDXMCEK+inbDWy7uJ18lLcC6hci53DzBZM oZsQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id p16si17515953plq.315.2019.04.28.17.24.14; Sun, 28 Apr 2019 17:24:30 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726871AbfD2AXY (ORCPT + 99 others); Sun, 28 Apr 2019 20:23:24 -0400 Received: from mx1.redhat.com ([209.132.183.28]:51180 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726223AbfD2AXX (ORCPT ); Sun, 28 Apr 2019 20:23:23 -0400 Received: from smtp.corp.redhat.com (int-mx04.intmail.prod.int.phx2.redhat.com [10.5.11.14]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 912CC3098544; Mon, 29 Apr 2019 00:23:23 +0000 (UTC) Received: from localhost (ovpn-12-38.pek2.redhat.com [10.72.12.38]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 9EC6917D08; Mon, 29 Apr 2019 00:23:20 +0000 (UTC) Date: Mon, 29 Apr 2019 08:23:18 +0800 From: Baoquan He To: bp@alien8.de, j-nomura@ce.jp.nec.com, kasong@redhat.com, dyoung@redhat.com Cc: fanc.fnst@cn.fujitsu.com, x86@kernel.org, kexec@lists.infradead.org, linux-kernel@vger.kernel.org, hpa@zytor.com, tglx@linutronix.de Subject: [PATCH v6 1/2] x86/kexec: Build identity mapping for EFI systab and ACPI tables Message-ID: <20190429002318.GA25400@MiWiFi-R3L-srv> References: <20190424092944.30481-1-bhe@redhat.com> <20190424092944.30481-2-bhe@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190424092944.30481-2-bhe@redhat.com> User-Agent: Mutt/1.10.1 (2018-07-13) X-Scanned-By: MIMEDefang 2.79 on 10.5.11.14 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.49]); Mon, 29 Apr 2019 00:23:23 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Kairui Song The current code only builds identity mapping for physical memory during kexec-type loading. The regions reserved by firmware are not covered. In the later patch, the boot decompressing code of kexec-ed kernel tries to access EFI systab and ACPI tables, lacking identity mapping for them will cause error and reset system to firmware. This error doesn't happen on all systems. Because kexec enables gbpages to build identity mapping, the EFI systab and ACPI tables could have been covered if they share the same 1 GB area with physical memory. To make sure, we should map them always. So here add mapping for them. Signed-off-by: Kairui Song Signed-off-by: Baoquan He --- Changelog: v5->v6: Tune code, comments and patch log Per Boris's comments. v5: This patch was newly added into v5. arch/x86/kernel/machine_kexec_64.c | 79 ++++++++++++++++++++++++++++++ 1 file changed, 79 insertions(+) diff --git a/arch/x86/kernel/machine_kexec_64.c b/arch/x86/kernel/machine_kexec_64.c index ceba408ea982..0af01490ee2d 100644 --- a/arch/x86/kernel/machine_kexec_64.c +++ b/arch/x86/kernel/machine_kexec_64.c @@ -18,6 +18,7 @@ #include #include #include +#include #include #include @@ -29,6 +30,47 @@ #include #include +#ifdef CONFIG_ACPI +/* + * Used while adding mapping for ACPI tables. + * Can be reused when other iomem regions need be mapped + */ +struct init_pgtable_data { + struct x86_mapping_info *info; + pgd_t *level4p; +}; + +static int mem_region_callback(struct resource *res, void *arg) +{ + struct init_pgtable_data *data = arg; + unsigned long mstart, mend; + + mstart = res->start; + mend = mstart + resource_size(res) - 1; + + return kernel_ident_mapping_init(data->info, data->level4p, mstart, mend); +} + +static int +map_acpi_tables(struct x86_mapping_info *info, pgd_t *level4p) +{ + unsigned long flags = IORESOURCE_MEM | IORESOURCE_BUSY; + struct init_pgtable_data data; + + data.info = info; + data.level4p = level4p; + flags = IORESOURCE_MEM | IORESOURCE_BUSY; + return walk_iomem_res_desc(IORES_DESC_ACPI_TABLES, flags, 0, -1, + &data, mem_region_callback); +} +#else +static int init_acpi_pgtable(struct x86_mapping_info *info, + pgd_t *level4p) +{ + return 0; +} +#endif + #ifdef CONFIG_KEXEC_FILE const struct kexec_file_ops * const kexec_file_loaders[] = { &kexec_bzImage64_ops, @@ -36,6 +78,31 @@ const struct kexec_file_ops * const kexec_file_loaders[] = { }; #endif +static int +map_efi_systab(struct x86_mapping_info *info, pgd_t *level4p) +{ +#ifdef CONFIG_EFI + unsigned long mstart, mend; + + if (!efi_enabled(EFI_BOOT)) + return 0; + + mstart = (boot_params.efi_info.efi_systab | + ((u64)boot_params.efi_info.efi_systab_hi<<32)); + + if (efi_enabled(EFI_64BIT)) + mend = mstart + sizeof(efi_system_table_64_t); + else + mend = mstart + sizeof(efi_system_table_32_t); + + if (!mstart) + return 0; + + return kernel_ident_mapping_init(info, level4p, mstart, mend); +#endif + return 0; +} + static void free_transition_pgtable(struct kimage *image) { free_page((unsigned long)image->arch.p4d); @@ -159,6 +226,18 @@ static int init_pgtable(struct kimage *image, unsigned long start_pgtable) return result; } + /* + * Prepare EFI systab and ACPI table mapping for kexec kernel, + * since they are not covered by pfn_mapped. + */ + result = map_efi_systab(&info, level4p); + if (result) + return result; + + result = map_acpi_tables(&info, level4p); + if (result) + return result; + return init_transition_pgtable(image, level4p); } -- 2.17.2