Received: by 2002:a25:8b12:0:0:0:0:0 with SMTP id i18csp1996039ybl; Thu, 15 Aug 2019 04:54:40 -0700 (PDT) X-Google-Smtp-Source: APXvYqyiYioSAcvUP5CwAD2pCvsDwlNC83XWXFecNWM5OrY5CCATcoQsBQNdijD0anpXPldhK7v2 X-Received: by 2002:a62:2603:: with SMTP id m3mr5173892pfm.163.1565870080857; Thu, 15 Aug 2019 04:54:40 -0700 (PDT) Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id n23si1828690plp.273.2019.08.15.04.54.24; Thu, 15 Aug 2019 04:54:40 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; arc=fail (body hash mismatch); spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730805AbfHOLxX convert rfc822-to-8bit (ORCPT + 99 others); Thu, 15 Aug 2019 07:53:23 -0400 Received: from m9a0003g.houston.softwaregrp.com ([15.124.64.68]:56692 "EHLO m9a0003g.houston.softwaregrp.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729986AbfHOLxW (ORCPT ); Thu, 15 Aug 2019 07:53:22 -0400 X-Greylist: delayed 1521 seconds by postgrey-1.27 at vger.kernel.org; Thu, 15 Aug 2019 07:53:21 EDT Received: FROM m9a0003g.houston.softwaregrp.com (15.121.0.190) BY m9a0003g.houston.softwaregrp.com WITH ESMTP; Thu, 15 Aug 2019 11:52:48 +0000 Received: from M4W0334.microfocus.com (2002:f78:1192::f78:1192) by M9W0067.microfocus.com (2002:f79:be::f79:be) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1591.10; Thu, 15 Aug 2019 11:16:13 +0000 Received: from NAM05-DM3-obe.outbound.protection.outlook.com (15.124.8.14) by M4W0334.microfocus.com (15.120.17.146) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1591.10 via Frontend Transport; Thu, 15 Aug 2019 11:16:13 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=USABAu6ReCCpFXMK0fSbKQwrkgoaAqBlI/1N6qsDwIsPxhwWX8jLG4ROnqBzEhT4eyxbAnvyBblsaJI9+bu4K2qBitXHFE57Rc6v4J5SzaNLqaxnShSVBeQP+DP2kZlv7zycRfWjvnOEtTafddBLiNRZ71+tIjXkK+cwFfVsB1qGGrgSWGlBIG9cLSnb022kCcwjmBCMnEbG+i8Z08ELSYRwvaUMg0EWGAlpPswSHFnNbERlLL25USYVSuyLmcWOydICStz/2KIIkUouDrbSKAo9Dif8/J+KEcNz4dB8qqVCkvoLfu6E12nQEjSuaPkv4m6Ls+4rcrvtV/nNKVirmw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=XE5gjmJaG89rGFN2Wivn9jOi53U3V58G2S7W7jgVEtM=; b=JLAxBHVOnUtoxtRm4s9hbg+a84GDX3K5UJfc6bvBV7U1Besh++Z2dtx/o+46mRdvhtPi3hVZccDHJPDGBe98qL+BAP6dRJTAggv7rk6923kzBtZfkOcSuNIoZP+aD/Vlp5Z+rHNqVLUkAXhMGQcqSTkayr8jv3UcUPJMDGCLO/q2ZiinAPvuNxUgJ8A8pPIWKtJ/2eD/lgVqRqjWSGuLjWFE0bqCQuO+JTijlVmZfT5IBojMj03rnk/ToVj2daDAM2fMTfP+hGVtHLYVuJhXkQiXT3jBhE6I4oh6A9olfOgXINSDeCbnPJKfGPnZLAaWu4mQ593k/wctgOPy8t962Q== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com; dkim=pass header.d=suse.com; arc=none Received: from BY5PR18MB3283.namprd18.prod.outlook.com (10.255.139.203) by BY5PR18MB3156.namprd18.prod.outlook.com (10.255.138.204) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2178.16; Thu, 15 Aug 2019 11:16:12 +0000 Received: from BY5PR18MB3283.namprd18.prod.outlook.com ([fe80::847e:511a:8cc2:8fca]) by BY5PR18MB3283.namprd18.prod.outlook.com ([fe80::847e:511a:8cc2:8fca%6]) with mapi id 15.20.2157.022; Thu, 15 Aug 2019 11:16:12 +0000 From: Chester Lin To: Ard Biesheuvel CC: "linux@armlinux.org.uk" , Chester Lin , "guillaume.gardet@arm.com" , "ren_guo@c-sky.com" , "mingo@kernel.org" , "akpm@linux-foundation.org" , "geert@linux-m68k.org" , "rppt@linux.ibm.com" , "linux-arm-kernel@lists.infradead.org" , Gary Lin , "Juergen Gross" , Joey Lee , "linux-efi@vger.kernel.org" , "linux-kernel@vger.kernel.org" Subject: Re: [PATCH] efi/arm: fix allocation failure when reserving the kernel base Thread-Topic: [PATCH] efi/arm: fix allocation failure when reserving the kernel base Thread-Index: AQHVSPSS9nx4lee000qskpi0lgLxmKbqoqP1gBFKchaAADaQgA== Date: Thu, 15 Aug 2019 11:16:11 +0000 Message-ID: <20190815111543.GA4728@linux-8mug> References: <20190802053744.5519-1-clin@suse.com> In-Reply-To: Accept-Language: zh-TW, en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-clientproxiedby: DB6PR04CA0032.eurprd04.prod.outlook.com (2603:10a6:6::45) To BY5PR18MB3283.namprd18.prod.outlook.com (2603:10b6:a03:196::11) authentication-results: spf=none (sender IP is ) smtp.mailfrom=clin@suse.com; x-ms-exchange-messagesentrepresentingtype: 1 x-originating-ip: [202.47.205.198] x-ms-publictraffictype: Email x-ms-office365-filtering-correlation-id: 393e15ac-a8b3-43e8-c764-08d72171fa53 x-microsoft-antispam: BCL:0;PCL:0;RULEID:(2390118)(7020095)(4652040)(8989299)(5600148)(711020)(4605104)(1401327)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(2017052603328)(7193020);SRVR:BY5PR18MB3156; x-ms-traffictypediagnostic: BY5PR18MB3156: x-ms-exchange-transport-forked: True x-microsoft-antispam-prvs: x-ms-oob-tlc-oobclassifiers: OLM:8882; x-forefront-prvs: 01304918F3 x-forefront-antispam-report: SFV:NSPM;SFS:(10019020)(7916004)(4636009)(39860400002)(376002)(396003)(366004)(346002)(136003)(189003)(53434003)(199004)(476003)(71200400001)(6116002)(3846002)(71190400001)(256004)(316002)(6512007)(9686003)(6436002)(33716001)(66066001)(54906003)(25786009)(8936002)(7736002)(66946007)(305945005)(66446008)(66556008)(66476007)(64756008)(11346002)(53936002)(14444005)(486006)(446003)(7416002)(2906002)(1076003)(229853002)(26005)(86362001)(14454004)(386003)(81166006)(30864003)(102836004)(186003)(6506007)(81156014)(5660300002)(6246003)(478600001)(8676002)(53946003)(6486002)(33656002)(99286004)(52116002)(4326008)(6916009)(76176011);DIR:OUT;SFP:1102;SCL:1;SRVR:BY5PR18MB3156;H:BY5PR18MB3283.namprd18.prod.outlook.com;FPR:;SPF:None;LANG:en;PTR:InfoNoRecords;MX:1;A:1; received-spf: None (protection.outlook.com: suse.com does not designate permitted sender hosts) x-ms-exchange-senderadcheck: 1 x-microsoft-antispam-message-info: 1uPXBHWzlAb1VpHQ78IuMZT2wCmXMFfJyraYwBZnFAvfcmds9ynY/irOGLIBRBG1izdYZnLY4qqvT38TycxdTBRAhAywG0mwC39HuUGCQC238+MmiEuX1jA9Xm+C09CMPl2wckoaqR8CkLaN87K/XX/f9Ljw26ocKUhdVc53LFSuIPjXq8DCCdOQDMw/hnpO6/LCjgy2N5CDFKoYnahkfXoc3C+ggHGT1FyF4bgKdlJNFdCZ/ZQDNCPJSNDr5iSardGIzmYEd9GDTgfPNGaizo9DsakWpVaI7KPuV1clMBuAeWQ2hAJ79izAbvVsDh4s+eFbqcZrTuDQWH3gcxre6/Aj8IDs22mfC64Mu2NYZJQpAqtfrDrECCDvrQqQbEaiRgb8QWmekiXjBj0jBftUo11xW/q8N5a3Aeeulyqk5xU= Content-Type: text/plain; charset="us-ascii" Content-ID: <17223CB882A0764185864C6E9EE256E0@namprd18.prod.outlook.com> Content-Transfer-Encoding: 8BIT MIME-Version: 1.0 X-MS-Exchange-CrossTenant-Network-Message-Id: 393e15ac-a8b3-43e8-c764-08d72171fa53 X-MS-Exchange-CrossTenant-originalarrivaltime: 15 Aug 2019 11:16:11.6606 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 856b813c-16e5-49a5-85ec-6f081e13b527 X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: oXmlQmdB7lvTNqA8wQHo/5QtwH2IEEg0rfW+qR5AuPOfCbiwOhCJ5FU9NZOdR85b X-MS-Exchange-Transport-CrossTenantHeadersStamped: BY5PR18MB3156 X-OriginatorOrg: suse.com Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Ard, On Thu, Aug 15, 2019 at 10:59:43AM +0300, Ard Biesheuvel wrote: > On Sun, 4 Aug 2019 at 10:57, Ard Biesheuvel wrote: > > > > Hello Chester, > > > > On Fri, 2 Aug 2019 at 08:40, Chester Lin wrote: > > > > > > In some cases the arm32 efistub could fail to allocate memory for > > > uncompressed kernel. For example, we got the following error message when > > > verifying EFI stub on Raspberry Pi-2 [kernel-5.2.1 + grub-2.04] : > > > > > > EFI stub: Booting Linux Kernel... > > > EFI stub: ERROR: Unable to allocate memory for uncompressed kernel. > > > EFI stub: ERROR: Failed to relocate kernel > > > > > > After checking the EFI memory map we found that the first page [0 - 0xfff] > > > had been reserved by Raspberry Pi-2's firmware, and the efistub tried to > > > set the dram base at 0, which was actually in a reserved region. > > > > > > > This by itself is a violation of the Linux boot protocol for 32-bit > > ARM when using the decompressor. The decompressor rounds down its own > > base address to a multiple of 128 MB, and assumes the whole area is > > available for the decompressed kernel and related data structures. > > (The first TEXT_OFFSET bytes are no longer used in practice, which is > > why putting a reserved region of 4 KB bytes works at the moment, but > > this is fragile). Note that the decompressor does not look at any DT > > or EFI provided memory maps *at all*. > > > > So unfortunately, this is not something we can fix in the kernel, but > > we should fix it in the bootloader or in GRUB, so it does not put any > > reserved regions in the first 128 MB of memory, > > > > OK, perhaps we can fix this by taking TEXT_OFFSET into account. The > ARM boot protocol docs are unclear about whether this memory should be > used or not, but it is no longer used for its original purpose (page > tables), and the RPi loader already keeps data there. > > Can you check whether the following patch works for you? > > diff --git a/drivers/firmware/efi/libstub/Makefile > b/drivers/firmware/efi/libstub/Makefile > index 0460c7581220..ee0661ddb25b 100644 > --- a/drivers/firmware/efi/libstub/Makefile > +++ b/drivers/firmware/efi/libstub/Makefile > @@ -52,6 +52,7 @@ lib-$(CONFIG_EFI_ARMSTUB) += arm-stub.o fdt.o > string.o random.o \ > > lib-$(CONFIG_ARM) += arm32-stub.o > lib-$(CONFIG_ARM64) += arm64-stub.o > +CFLAGS_arm32-stub.o := -DTEXT_OFFSET=$(TEXT_OFFSET) > CFLAGS_arm64-stub.o := -DTEXT_OFFSET=$(TEXT_OFFSET) > > # > diff --git a/drivers/firmware/efi/libstub/arm32-stub.c > b/drivers/firmware/efi/libstub/arm32-stub.c > index e8f7aefb6813..66ff0c8ec269 100644 > --- a/drivers/firmware/efi/libstub/arm32-stub.c > +++ b/drivers/firmware/efi/libstub/arm32-stub.c > @@ -204,7 +204,7 @@ efi_status_t > handle_kernel_image(efi_system_table_t *sys_table, > * loaded. These assumptions are made by the decompressor, > * before any memory map is available. > */ > - dram_base = round_up(dram_base, SZ_128M); > + dram_base = round_up(dram_base, SZ_128M) + TEXT_OFFSET; > > status = reserve_kernel_base(sys_table, dram_base, reserve_addr, > reserve_size); > I tried your patch on rpi2 and got the following panic. Just a reminder that I have replaced some log messages with "......" since it might be too long to post all. In this case the kernel failed to reserve cma, which should hit the issue of memblock_limit=0x1000 as I had mentioned in my patch description. The first block [0-0xfff] was scanned in adjust_lowmem_bounds(), but it did not align with PMD_SIZE so the cma reservation failed because the memblock.current_limit was extremely low. That's why I expand the first reservation from 1 PAGESIZE to 1 PMD_SIZE in my patch in order to avoid this issue. Please kindly let me know if any suggestion, thank you. boot-log: -------- Loading Linux test ... EFI stub: Booting Linux Kernel... EFI stub: Using DTB from configuration table EFI stub: Exiting boot services and installing virtual address map... Uncompressing Linux... done, booting the kernel. [ 0.000000] Booting Linux on physical CPU 0xf00 [ 0.000000] Linux version 5.2.1-lpae (chester@linux-8mug) (......) [ 0.000000] CPU: ARMv7 Processor [410fc075] revision 5 (ARMv7), cr=30c5387d [ 0.000000] CPU: div instructions available: patching division code [ 0.000000] CPU: PIPT / VIPT nonaliasing data cache, VIPT aliasing instruction cache [ 0.000000] OF: fdt: Machine model: Raspberry Pi 2 Model B Rev 1.1 [ 0.000000] printk: bootconsole [earlycon0] enabled [ 0.000000] Memory policy: Data cache writealloc [ 0.000000] efi: Getting EFI parameters from FDT: [ 0.000000] efi: System Table: 0x000000003df757c0 [ 0.000000] efi: MemMap Address: 0x000000002c1c5040 [ 0.000000] efi: MemMap Size: 0x000003c0 [ 0.000000] efi: MemMap Desc. Size: 0x00000028 [ 0.000000] efi: MemMap Desc. Version: 0x00000001 [ 0.000000] efi: EFI v2.70 by Das U-Boot [ 0.000000] efi: SMBIOS=0x3cb62000 MEMRESERVE=0x3cb3d040 [ 0.000000] memblock_reserve: [0x000000003cb3d040-0x000000003cb3d04f] efi_config_parse_tables+0x25c/0x2d8 [ 0.000000] efi: Processing EFI memory map: [ 0.000000] MEMBLOCK configuration: [ 0.000000] memory size = 0x000000003e000000 reserved size = 0x0000000000000010 [ 0.000000] memory.cnt = 0x1 [ 0.000000] memory[0x0] [0x0000000000000000-0x000000003dffffff], 0x000000003e000000 bytes flags: 0x0 [ 0.000000] reserved.cnt = 0x1 [ 0.000000] reserved[0x0] [0x000000003cb3d040-0x000000003cb3d04f], 0x0000000000000010 bytes flags: 0x0 [ 0.000000] memblock_remove: [0x0000000000000000-0xfffffffffffffffe] reserve_regions+0x68/0x23c [ 0.000000] efi: 0x000000000000-0x000000000fff [Reserved | | | | | | | | |WB| | | ] [ 0.000000] memblock_add: [0x0000000000000000-0x0000000000000fff] early_init_dt_add_memory_arch+0x164/0x178 [ 0.000000] efi: 0x000000001000-0x000000307fff [Conventional Memory| | | | | | | | |WB| | | ] [ 0.000000] memblock_add: [0x0000000000001000-0x0000000000307fff] early_init_dt_add_memory_arch+0x164/0x178 [ 0.000000] efi: 0x000000308000-0x000002307fff [Boot Data | | | | | | | | |WB| | | ] [ 0.000000] memblock_add: [0x0000000000308000-0x0000000002307fff] early_init_dt_add_memory_arch+0x164/0x178 [ 0.000000] efi: 0x000002308000-0x000002a93fff [Loader Data | | | | | | | | |WB| | | ] [ 0.000000] memblock_add: [0x0000000002308000-0x0000000002a93fff] early_init_dt_add_memory_arch+0x164/0x178 [ 0.000000] efi: 0x000002a94000-0x000007cf5fff [Conventional Memory| | | | | | | | |WB| | | ] [ 0.000000] memblock_add: [0x0000000002a94000-0x0000000007cf5fff] early_init_dt_add_memory_arch+0x164/0x178 ...... ...... [ 0.000000] memblock_add: [0x000000003df76000-0x000000003dffffff] early_init_dt_add_memory_arch+0x164/0x178 [ 0.000000] efi: 0x00003f100000-0x00003f100fff [Memory Mapped I/O |RUN| | | | | | | | | | | ] [ 0.000000] memblock_reserve: [0x000000002c1c5000-0x000000002c1c5fff] efi_init+0xd8/0x1c8 [ 0.000000] memblock_reserve: [0x0000000000400000-0x0000000001df2cef] arm_memblock_init+0x44/0x19c [ 0.000000] memblock_reserve: [0x0000000000303000-0x0000000000307fff] arm_mm_memblock_reserve+0x30/0x38 [ 0.000000] memblock_reserve: [0x0000000007cf6000-0x0000000007cfc5c4] early_init_dt_reserve_memory_arch+0x2c/0x30 [ 0.000000] cma: Failed to reserve 64 MiB [ 0.000000] MEMBLOCK configuration: [ 0.000000] memory size = 0x000000003e000000 reserved size = 0x00000000019ff2c5 [ 0.000000] memory.cnt = 0xa [ 0.000000] memory[0x0] [0x0000000000000000-0x0000000000000fff], 0x0000000000001000 bytes flags: 0x4 [ 0.000000] memory[0x1] [0x0000000000001000-0x0000000007ef5fff], 0x0000000007ef5000 bytes flags: 0x0 [ 0.000000] memory[0x2] [0x0000000007ef6000-0x0000000007f09fff], 0x0000000000014000 bytes flags: 0x4 [ 0.000000] memory[0x3] [0x0000000007f0a000-0x000000003cb3efff], 0x0000000034c35000 bytes flags: 0x0 [ 0.000000] memory[0x4] [0x000000003cb3f000-0x000000003cb3ffff], 0x0000000000001000 bytes flags: 0x4 [ 0.000000] memory[0x5] [0x000000003cb40000-0x000000003cb5ffff], 0x0000000000020000 bytes flags: 0x0 [ 0.000000] memory[0x6] [0x000000003cb60000-0x000000003cb68fff], 0x0000000000009000 bytes flags: 0x4 [ 0.000000] memory[0x7] [0x000000003cb69000-0x000000003df74fff], 0x000000000140c000 bytes flags: 0x0 [ 0.000000] memory[0x8] [0x000000003df75000-0x000000003df75fff], 0x0000000000001000 bytes flags: 0x4 [ 0.000000] memory[0x9] [0x000000003df76000-0x000000003dffffff], 0x000000000008a000 bytes flags: 0x0 [ 0.000000] reserved.cnt = 0x5 [ 0.000000] reserved[0x0] [0x0000000000303000-0x0000000000307fff], 0x0000000000005000 bytes flags: 0x0 [ 0.000000] reserved[0x1] [0x0000000000400000-0x0000000001df2cef], 0x00000000019f2cf0 bytes flags: 0x0 [ 0.000000] reserved[0x2] [0x0000000007cf6000-0x0000000007cfc5c4], 0x00000000000065c5 bytes flags: 0x0 [ 0.000000] reserved[0x3] [0x000000002c1c5000-0x000000002c1c5fff], 0x0000000000001000 bytes flags: 0x0 [ 0.000000] reserved[0x4] [0x000000003cb3d040-0x000000003cb3d04f], 0x0000000000000010 bytes flags: 0x0 [ 0.000000] memblock_alloc_try_nid: 4096 bytes align=0x1000 nid=-1 from=0x0000000000000000 max_addr=0x0000000000000000 early_alloc+0x44/0x70 [ 0.000000] Kernel panic - not syncing: early_alloc: Failed to allocate 4096 bytes align=0x1000 [ 0.000000] CPU: 0 PID: 0 Comm: swapper Not tainted 5.2.1-lpae #1 openSUSE Tumbleweed (unreleased) [ 0.000000] Hardware name: BCM2835 [ 0.000000] Backtrace: [ 0.000000] [] (dump_backtrace) from [] (show_stack+0x20/0x24) [ 0.000000] r7:c1800000 r6:00000000 r5:600001d3 r4:c1901ba0 [ 0.000000] [] (show_stack) from [] (dump_stack+0xd0/0x104) [ 0.000000] [] (dump_stack) from [] (panic+0xf8/0x32c) [ 0.000000] r10:c0307000 r9:c0001000 r8:00000003 r7:00000000 r6:00000000 r5:c181df04 [ 0.000000] r4:c192b8d8 r3:00000001 [ 0.000000] [] (panic) from [] (early_alloc+0x60/0x70) [ 0.000000] r3:00001000 r2:00001000 r1:c10037e8 r0:c12fe64c [ 0.000000] r7:00000000 [ 0.000000] [] (early_alloc) from [] (arm_pte_alloc+0x34/0x94) [ 0.000000] r7:00000000 r6:00000000 r4:c0307000 [ 0.000000] [] (arm_pte_alloc) from [] (__create_mapping+0x210/0x2c0) [ 0.000000] r9:c0001000 r8:c0001000 r7:00000001 r6:c13f22e0 r5:c0200000 r4:c0400000 [ 0.000000] [] (__create_mapping) from [] (create_mapping+0xe8/0x108) [ 0.000000] r10:c0400000 r9:c16a2110 r8:c19c7a80 r7:00000000 r6:00400000 r5:c13f2000 [ 0.000000] r4:c1801ef0 [ 0.000000] [] (create_mapping) from [] (paging_init+0x350/0x75c) [ 0.000000] r4:c1842d40 > > > > > grub> lsefimmap > > > Type Physical start - end #Pages Size Attributes > > > reserved 0000000000000000-0000000000000fff 00000001 4KiB WB > > > conv-mem 0000000000001000-0000000007ef5fff 00007ef5 130004KiB WB > > > RT-data 0000000007ef6000-0000000007f09fff 00000014 80KiB RT WB > > > conv-mem 0000000007f0a000-000000002d871fff 00025968 615840KiB WB > > > ..... > > > > > > To avoid a reserved address, we have to ignore the memory regions which are > > > marked as EFI_RESERVED_TYPE, and only conventional memory regions can be > > > chosen. If the region before the kernel base is unaligned, it will be > > > marked as EFI_RESERVED_TYPE and let kernel ignore it so that memblock_limit > > > will not be sticked with a very low address such as 0x1000. > > > > > This is a separate issue, so it should be handled in a separate patch. > > > > Signed-off-by: Chester Lin > > > --- > > > arch/arm/mm/mmu.c | 3 ++ > > > drivers/firmware/efi/libstub/arm32-stub.c | 43 ++++++++++++++++++----- > > > 2 files changed, 37 insertions(+), 9 deletions(-) > > > > > > diff --git a/arch/arm/mm/mmu.c b/arch/arm/mm/mmu.c > > > index f3ce34113f89..909b11ba48d8 100644 > > > --- a/arch/arm/mm/mmu.c > > > +++ b/arch/arm/mm/mmu.c > > > @@ -1184,6 +1184,9 @@ void __init adjust_lowmem_bounds(void) > > > phys_addr_t block_start = reg->base; > > > phys_addr_t block_end = reg->base + reg->size; > > > > > > + if (memblock_is_nomap(reg)) > > > + continue; > > > + > > > if (reg->base < vmalloc_limit) { > > > if (block_end > lowmem_limit) > > > /* > > > diff --git a/drivers/firmware/efi/libstub/arm32-stub.c b/drivers/firmware/efi/libstub/arm32-stub.c > > > index e8f7aefb6813..10d33d36df00 100644 > > > --- a/drivers/firmware/efi/libstub/arm32-stub.c > > > +++ b/drivers/firmware/efi/libstub/arm32-stub.c > > > @@ -128,7 +128,7 @@ static efi_status_t reserve_kernel_base(efi_system_table_t *sys_table_arg, > > > > > > for (l = 0; l < map_size; l += desc_size) { > > > efi_memory_desc_t *desc; > > > - u64 start, end; > > > + u64 start, end, spare, kernel_base; > > > > > > desc = (void *)memory_map + l; > > > start = desc->phys_addr; > > > @@ -144,27 +144,52 @@ static efi_status_t reserve_kernel_base(efi_system_table_t *sys_table_arg, > > > case EFI_BOOT_SERVICES_DATA: > > > /* Ignore types that are released to the OS anyway */ > > > continue; > > > - > > > + case EFI_RESERVED_TYPE: > > > + /* Ignore reserved regions */ > > > + continue; > > > case EFI_CONVENTIONAL_MEMORY: > > > /* > > > * Reserve the intersection between this entry and the > > > * region. > > > */ > > > start = max(start, (u64)dram_base); > > > - end = min(end, (u64)dram_base + MAX_UNCOMP_KERNEL_SIZE); > > > + kernel_base = round_up(start, PMD_SIZE); > > > + spare = kernel_base - start; > > > + end = min(end, kernel_base + MAX_UNCOMP_KERNEL_SIZE); > > > + > > > + status = efi_call_early(allocate_pages, > > > + EFI_ALLOCATE_ADDRESS, > > > + EFI_LOADER_DATA, > > > + MAX_UNCOMP_KERNEL_SIZE / EFI_PAGE_SIZE, > > > + &kernel_base); > > > + if (status != EFI_SUCCESS) { > > > + pr_efi_err(sys_table_arg, > > > + "reserve_kernel_base: alloc failed.\n"); > > > + goto out; > > > + } > > > + *reserve_addr = kernel_base; > > > > > > + if (!spare) > > > + break; > > > + /* > > > + * If there's a gap between start and kernel_base, > > > + * it needs be reserved so that the memblock_limit > > > + * will not fall on a very low address when running > > > + * adjust_lowmem_bounds(), wchich could eventually > > > + * cause CMA reservation issue. > > > + */ > > > status = efi_call_early(allocate_pages, > > > EFI_ALLOCATE_ADDRESS, > > > - EFI_LOADER_DATA, > > > - (end - start) / EFI_PAGE_SIZE, > > > + EFI_RESERVED_TYPE, > > > + spare / EFI_PAGE_SIZE, > > > &start); > > > if (status != EFI_SUCCESS) { > > > pr_efi_err(sys_table_arg, > > > - "reserve_kernel_base(): alloc failed.\n"); > > > + "reserve spare-region failed\n"); > > > goto out; > > > } > > > - break; > > > > > > + break; > > > case EFI_LOADER_CODE: > > > case EFI_LOADER_DATA: > > > /* > > > @@ -220,7 +245,7 @@ efi_status_t handle_kernel_image(efi_system_table_t *sys_table, > > > *image_size = image->image_size; > > > status = efi_relocate_kernel(sys_table, image_addr, *image_size, > > > *image_size, > > > - dram_base + MAX_UNCOMP_KERNEL_SIZE, 0); > > > + *reserve_addr + MAX_UNCOMP_KERNEL_SIZE, 0); > > > if (status != EFI_SUCCESS) { > > > pr_efi_err(sys_table, "Failed to relocate kernel.\n"); > > > efi_free(sys_table, *reserve_size, *reserve_addr); > > > @@ -233,7 +258,7 @@ efi_status_t handle_kernel_image(efi_system_table_t *sys_table, > > > * in memory. The kernel determines the base of DRAM from the > > > * address at which the zImage is loaded. > > > */ > > > - if (*image_addr + *image_size > dram_base + ZIMAGE_OFFSET_LIMIT) { > > > + if (*image_addr + *image_size > *reserve_addr + ZIMAGE_OFFSET_LIMIT) { > > > pr_efi_err(sys_table, "Failed to relocate kernel, no low memory available.\n"); > > > efi_free(sys_table, *reserve_size, *reserve_addr); > > > *reserve_size = 0; > > > -- > > > 2.22.0 > > > >