Received: by 2002:a05:6a10:2726:0:0:0:0 with SMTP id ib38csp409081pxb; Tue, 29 Mar 2022 05:54:12 -0700 (PDT) X-Google-Smtp-Source: ABdhPJx/sgSkXNgM5T9NKgEv5cvnrwPgt1PdhIIaymqkpW3SGy5ys6m+/ZdDcrExHYiMCzKwxhX0 X-Received: by 2002:a17:906:1411:b0:6da:f354:fb83 with SMTP id p17-20020a170906141100b006daf354fb83mr34420078ejc.539.1648558452313; Tue, 29 Mar 2022 05:54:12 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1648558452; cv=none; d=google.com; s=arc-20160816; b=eq7lUAW97WdqbmYFntBzS2S/hDrRMUOQARH0xCjaq3rxQ5h4Dqg+OJQ4bUZv5ATMj6 8VEPKCxciZbHJC5CBOjCb9RxYDSfDkXVcCdAd0y3TpOLcqfelWKwN5zy7nQ2CyQsnXvV M4Rhc1tpkqFkRxaz0esG0yDbTCVgZKBIRc+H48wlWbAvhTLPXiOFmUbOpBJT1aNW95Y2 YyFjkR22czzaJYTOp/GlhbaY0lLqCdnpmfsDlSxEcQD2ADVxOupO4xp1pU0GFMb1Z8iU NFRkO88VzjX3bPFZT+JfZlmcgJUTOpUJTVNgf3zuwG06LbIE6BMnJ3ljikVZEf/PiOAt FF9A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=lC3vZ6FN9b3s6fWDhQ0MuF2PrMmG69pBA7aNKhTAz7k=; b=pr2TJWeJn0+x2VqOi6KKi9H4haAneXJInrLQEbg6RqSbqJgOrvI0aZfZNoITClcS1B R+SkNONSsrI4YSW3Aj2lem/lOF67qBd/IRRDPA/R/C+4JjmbdsyeQV5EpIokJtQRrmrk hb3vzK27v1Kvx4FzfpVI+BCKv0goo3KhpvutIQjdK6GSx7Bx1C7XaszV8BCGMBf4/sD6 Xe2xU7OpS4kG2jV2YKFOy9D20wa11VuIQLCFiPDDuFi2YNIBt+dc2HFRZQe4hB08NYsl kKOYK5SD7jgejcG5lrSiXTElsXWsr+WL7QffRAj89p3QlZcnQ3+RbMM14JVOMrPCtzwc ydkw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=BA18187w; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id d14-20020a17090648ce00b006e0d609036dsi11270817ejt.558.2022.03.29.05.53.45; Tue, 29 Mar 2022 05:54:12 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=BA18187w; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233882AbiC2I2A (ORCPT + 99 others); Tue, 29 Mar 2022 04:28:00 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:55780 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233550AbiC2I17 (ORCPT ); Tue, 29 Mar 2022 04:27:59 -0400 Received: from ams.source.kernel.org (ams.source.kernel.org [IPv6:2604:1380:4601:e00::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 13D841F687A; Tue, 29 Mar 2022 01:26:17 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id 7DF05B816AA; Tue, 29 Mar 2022 08:26:15 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 27658C34116; Tue, 29 Mar 2022 08:26:14 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1648542374; bh=P64VippWtoDYEoAYe0HzOfZq72o+3xuuZhXnLlrgXKQ=; h=References:In-Reply-To:From:Date:Subject:To:Cc:From; b=BA18187wrbX7cTMSQzq79snzwaUo5Js7LuiMhKNVQ6k43197XlTAEEmHP1wFoZDu0 xgSbtGHYkLlsElFzREuGpVV41MsRkf9UO4KnD4yb+mhi4s+pQKLm/tHkH5OX8J4Y3s LhE1zzA1StHqs048cRNqQFjWwotM0hWVtz203rEFeNO9TWIXPAy0ZGiD4sR6vW0fre zNpl9VyoeUnzVObjnEylmYCN+BxgoqSeT/G1B5WEc/KsVF/H2UWyPhxU8KHAehKmwR ZMWQEyxDpAuuLCvkI7OR/mBGLVSoU2YMSFzngEOd+nVjCpjS1gSBcOOL9u3//Rz5Se LbhXNPvCBRhQg== Received: by mail-oo1-f54.google.com with SMTP id s203-20020a4a3bd4000000b003191c2dcbe8so2973499oos.9; Tue, 29 Mar 2022 01:26:14 -0700 (PDT) X-Gm-Message-State: AOAM531ydOwT4aefQ27l7KByL9ay665zkG/wOvfAwhPvlaOJPpNy6aED NNz6Fzt9E0cQ61IyuF2+kQx0/KzMUdqBlpQGQUg= X-Received: by 2002:a4a:3391:0:b0:320:d78b:7957 with SMTP id q139-20020a4a3391000000b00320d78b7957mr561025ooq.60.1648542373173; Tue, 29 Mar 2022 01:26:13 -0700 (PDT) MIME-Version: 1.0 References: <20220326064632.131637-1-mawupeng1@huawei.com> In-Reply-To: <20220326064632.131637-1-mawupeng1@huawei.com> From: Ard Biesheuvel Date: Tue, 29 Mar 2022 10:26:02 +0200 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: [PATCH 0/9] introduce mirrored memory support for arm64 To: Wupeng Ma Cc: Andrew Morton , Catalin Marinas , Will Deacon , Jonathan Corbet , Thomas Gleixner , Ingo Molnar , Borislav Petkov , Dave Hansen , X86 ML , hpa@zyccr.com, Darren Hart , Andy Shevchenko , Mike Rapoport , "Paul E. McKenney" , Peter Zijlstra , Joerg Roedel , songmuchun@bytedance.com, macro@orcam.me.uk, Frederic Weisbecker , W_Armin@gmx.de, John Garry , Sean Christopherson , Thomas Bogendoerfer , Anshuman Khandual , chenhuacai@kernel.org, David Hildenbrand , gpiccoli@igalia.com, Mark Rutland , Kefeng Wang , Linux Doc Mailing List , Linux Kernel Mailing List , Linux ARM , linux-efi , linux-ia64@vger.kernel.org, platform-driver-x86@vger.kernel.org, Linux Memory Management List Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-7.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sat, 26 Mar 2022 at 07:27, Wupeng Ma wrote: > > From: Ma Wupeng > > Commit b05b9f5f9dcf ("x86, mirror: x86 enabling - find mirrored memory ranges") > introduced mirrored memory support for x86. This support rely on UEFI to > report mirrored memory address ranges. See UEFI 2.5 spec pages 157-158: > > http://www.uefi.org/sites/default/files/resources/UEFI%202_5.pdf > > Arm64 can support this too. So mirrored memory support is added to support > arm64. > What is the point of this if the kernel itself is not loaded in EFI_MORE_RELIABLE memory? On x86, this is handled by the decompressor, but that does not exist on arm64. The problem here is that UEFI defines this as a memory *attribute* rather than a memory *type*, which means you cannot allocate EFI_MORE_RELIABLE memory easily: you have to iterate over the memory map and look for regions with the desired attribute, and allocate those pages explicitly. I'd prefer to implement this in the bootloader, and only add minimal logic to the stub to respect the placement of the kernel by the loader if the loader signals it to do so (there are other reasons for this - I will cc you on a patch shortly that implements this) This also means that the fake_mem stuff is not going to work: the memory map observed by the stub comes straight from the firmware, and if the stub needs to be involved in placing (or respecting the placement by the loader of) the kernel image, it needs to observe those EFI_MORE_RELIABLE regions too. If you don't have access to a machine that actually exposes EFI_MORE_RELIABLE memory, I suggest you prototype it in QEMU/edk2 instead. In fact, we have been trying very hard not to touch the firmware provided memory map at all on ARM, rather than use it as a scratchpad for all kinds of annotations. This means, for instance, that kexec is idempotent - the next kernel should not be affected by modifications to the memory map applied by the previous kernel. In summary, implementing kernelcore=mirror for arm64 is fine with me, but there are some issues we need to address first. > Patch #1-#2 introduce efi_fake_mem support for arm64. > Patch #3-#4 introduce mirrored memory support form arm64. > Patch #5-#7 fix some bugs for arm64 if memory reliable is enabled. > Patch #8 disable mirror feature if kernelcore is not specified. > Patch #9 remove some redundant code in ia64 efi_init. > > Ma Wupeng (9): > efi: Make efi_print_memmap() public > arm64: efi: Add fake memory support > efi: Make efi_find_mirror() public > arm64/mirror: arm64 enabling - find mirrored memory ranges > mm: Ratelimited mirrored memory related warning messages > mm: Demote warning message in vmemmap_verify() to debug level > mm: Calc the right pfn if page size is not 4K > efi: Disable mirror feature if kernelcore is not specified > ia64/efi: Code simplification in efi_init > > .../admin-guide/kernel-parameters.txt | 4 +- > arch/arm64/kernel/setup.c | 3 ++ > arch/ia64/kernel/efi.c | 37 +----------------- > arch/x86/include/asm/efi.h | 5 --- > arch/x86/platform/efi/efi.c | 39 ------------------- > drivers/firmware/efi/Kconfig | 2 +- > drivers/firmware/efi/efi.c | 26 +++++++++++++ > drivers/firmware/efi/memmap.c | 16 ++++++++ > include/linux/efi.h | 4 ++ > include/linux/mm.h | 2 + > mm/memblock.c | 4 +- > mm/page_alloc.c | 4 +- > mm/sparse-vmemmap.c | 2 +- > 13 files changed, 60 insertions(+), 88 deletions(-) > > -- > 2.18.0.huawei.25 >