Received: by 2002:a25:6193:0:0:0:0:0 with SMTP id v141csp1721231ybb; Thu, 9 Apr 2020 07:50:16 -0700 (PDT) X-Google-Smtp-Source: APiQypIKd3n30syvwlT3JdaN1yYBt8GjuJJEwHOQINoAeHP4szc4x3GPaK1M4sidVI0kf64A8y4G X-Received: by 2002:a05:6214:7e6:: with SMTP id bp6mr385248qvb.47.1586443816826; Thu, 09 Apr 2020 07:50:16 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1586443816; cv=none; d=google.com; s=arc-20160816; b=rS0awGB6D0AjbFBbQW2ebcLK4TTylL+/Gnu+3mBZp2tC3vHB72hJMXJdO9CbjiLk2X fTgA8iz9BZYT26PZTPNvAyYn+LUnYXbvYTyfxdb37eTuKAggdpi58ax6kGxPPxPsYwu4 ss4/mVPG38OM6N6dsmnF/xb0Hl5E0vt3jsMV8YNV0RwpxYZH2Tu/iPV01fVFEsUNJf3x tOZDdLm5n9jR3G0x0GEEfQe8ezAy0udbGqz1460tkwu7emKe02wB4n8Ww+4gnvXXCeNK sWPk9wfdFh4nslStP88PFNnMCAWTEprCFl0y2e0jW1LRf4B3rpc8T8ovIMoeNZBkggfR CmqA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=/Jcrc9fIbFigNoda8oYtI+MZeukOR+l3eC0Ipcg29AM=; b=yWHUAAmVPYuaSeNHEGP7bCHNK/uDc6UEG3L45GpRZXKId6lpi6YmKbcQacZYSbLnyw CSo7EpukF+bPGEEjR3rzZEy3vOEPVB2ellquC8kTZk6yIEiYiShg/VtRSl5HyqgFJayd aa9O5qEt3yuH9PzOgSkyQ98uwnO38nYIDqXb9IpawPwaMNKaFpw1rzzBtXLZC1i26G0P qAm6Mz9wZiO6XjXLQS/mhLD638E4f7/HGCuVCYWuSX+C3+OO5BqU2dhf0cUQ61eFn53n 1ZqcmP01UjkL7kVDDPaKrNWgVPs/n7qxML9v6QNSkM5+kNI5SHobGMpFZVm0k4ydfRGV 5AeQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="ce/KN0Hi"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id g12si1597392qtu.154.2020.04.09.07.50.01; Thu, 09 Apr 2020 07:50:16 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="ce/KN0Hi"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727876AbgDIOsI (ORCPT + 99 others); Thu, 9 Apr 2020 10:48:08 -0400 Received: from mail.kernel.org ([198.145.29.99]:49886 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726977AbgDIOsI (ORCPT ); Thu, 9 Apr 2020 10:48:08 -0400 Received: from mail-il1-f177.google.com (mail-il1-f177.google.com [209.85.166.177]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id C2555218AC; Thu, 9 Apr 2020 14:48:07 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1586443687; bh=onD7nON+N0SmQP21hJf/yfWHMLhZn2udjCwtUSwBH4w=; h=References:In-Reply-To:From:Date:Subject:To:Cc:From; b=ce/KN0HiLFNEkDTXUXzwRMh3n3jinfdt7219BETuD5hR1yaVTWAvQ6qquA1uNEJJr M6kC4osT1xMNVUkKRT0OCUZyMB9IxKLS42j4FzIKilCOOlljn+/FHNr2Z7BLrK5N5I Teck01ooZ1zjKGtMkDhzXSMEBOgb9sGkzhm4OsPI= Received: by mail-il1-f177.google.com with SMTP id z12so2368296ilb.10; Thu, 09 Apr 2020 07:48:07 -0700 (PDT) X-Gm-Message-State: AGi0Puah2HqoA+yVgcTkEx2zqia6etXdoGyMNGztscQgHOJR7y8/x0Bi 0lvYlTa2JyBSRRc62Zt2M/y4xVwBlnoGLAI4B7s= X-Received: by 2002:a05:6e02:4c:: with SMTP id i12mr6094ilr.211.1586443687085; Thu, 09 Apr 2020 07:48:07 -0700 (PDT) MIME-Version: 1.0 References: <20200406180614.429454-1-nivedita@alum.mit.edu> <20200408074334.GA21886@dhcp-128-65.nay.redhat.com> <20200409143910.GA727557@rani.riverdale.lan> In-Reply-To: <20200409143910.GA727557@rani.riverdale.lan> From: Ard Biesheuvel Date: Thu, 9 Apr 2020 16:47:55 +0200 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: [PATCH 1/2] efi/x86: Move efi stub globals from .bss to .data To: Arvind Sankar Cc: Dave Young , pjones@redhat.com, daniel.kiper@oracle.com, Leif Lindholm , Borislav Petkov , Sergey Shatunov , hpa@zytor.com, Linux Kernel Mailing List , mingo@redhat.com, Thomas Gleixner , X86 ML , linux-efi , initramfs@vger.kernel.org, Donovan Tremura , Harald Hoyer Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, 9 Apr 2020 at 16:39, Arvind Sankar wrote: > > On Wed, Apr 08, 2020 at 09:49:15AM +0200, Ard Biesheuvel wrote: > > (add Peter, Leif and Daniel) > > > > On Wed, 8 Apr 2020 at 09:43, Dave Young wrote: > > > > > > On 04/06/20 at 02:06pm, Arvind Sankar wrote: > > > > Commit > > > > > > > > 3ee372ccce4d ("x86/boot/compressed/64: Remove .bss/.pgtable from > > > > bzImage") > > > > > > > > removed the .bss section from the bzImage. > > > > > > > > However, while a PE loader is required to zero-initialize the .bss > > > > section before calling the PE entry point, the EFI handover protocol > > > > does not currently document any requirement that .bss be initialized by > > > > the bootloader prior to calling the handover entry. > > > > > > > > When systemd-boot is used to boot a unified kernel image [1], the image > > > > is constructed by embedding the bzImage as a .linux section in a PE > > > > executable that contains a small stub loader from systemd together with > > > > additional sections and potentially an initrd. As the .bss section > > > > within the bzImage is no longer explicitly present as part of the file, > > > > it is not initialized before calling the EFI handover entry. > > > > Furthermore, as the size of the embedded .linux section is only the size > > > > of the bzImage file itself, the .bss section's memory may not even have > > > > been allocated. > > > > > > I did not follow up the old report, maybe I missed something. But not > > > sure why only systemd-boot is mentioned here. I also have similar issue > > > with early efi failure. With these two patches applied, it works well > > > then. > > > > > > BTW, I use Fedora 31 + Grub2 > > > > > > > OK, so I take it this means that GRUB's PE/COFF loader does not > > zero-initialize BSS either? Does it honor the image size in memory if > > it exceeds the file size? > > Dave, that comment was because the previous report was for systemd-boot > stub. > > Ard, should I revise the commit message to make it clear it's not > restricted to systemd-boot but anything using handover entry may be > affected? Maybe just a "for example, when systemd-boot..." and then a > line to say grub2 with the EFI stub patches is also impacted? > Well, the fact the /some/ piece of software is used in production that relies on the ill-defined EFI handover protocol is sufficient justification, so I don't think it is hugely important to update it. > https://src.fedoraproject.org/rpms/grub2/blob/f31/f/0001-Add-support-for-Linux-EFI-stub-loading.patch#_743 > > + kernel_mem = grub_efi_allocate_pages_max(lh.pref_address, > + BYTES_TO_PAGES(lh.init_size)); > > Looking at this, grub does allocate init_size for the image, but it > doesn't zero it out. > > This call also looks wrong to me though. It allocates at max address of > pref_address, which, if it succeeds, will guarantee that the kernel gets > loaded entirely below pref_address == LOAD_PHYSICAL_ADDR. In native > mode, if it weren't for the EFI stub copying the kernel again, this > would cause the startup code to relocate the kernel into unallocated > memory. On a mixed-mode boot, this would cause the early page tables > setup prior to transitioning to 64-bit mode to be in unallocated memory > and potentially get clobbered by the EFI stub. > > The first try to allocate pref_address should be calling > grub_efi_allocate_fixed instead. Thanks Arvind. I'm sure the Fedora/RedHat folks on cc should be able to get these logged somewhere.