From: "Kirill A. Shutemov" <kirill.shutemov@linux.intel.com>
To: Borislav Petkov <bp@alien8.de>, Ard Biesheuvel <ardb@kernel.org>
Cc: Andy Lutomirski <luto@kernel.org>,
Dave Hansen <dave.hansen@intel.com>,
Sean Christopherson <seanjc@google.com>,
Andrew Morton <akpm@linux-foundation.org>,
Joerg Roedel <jroedel@suse.de>, Andi Kleen <ak@linux.intel.com>,
Kuppuswamy Sathyanarayanan
<sathyanarayanan.kuppuswamy@linux.intel.com>,
David Rientjes <rientjes@google.com>,
Vlastimil Babka <vbabka@suse.cz>,
Tom Lendacky <thomas.lendacky@amd.com>,
Thomas Gleixner <tglx@linutronix.de>,
Peter Zijlstra <peterz@infradead.org>,
Paolo Bonzini <pbonzini@redhat.com>,
Ingo Molnar <mingo@redhat.com>,
Dario Faggioli <dfaggioli@suse.com>,
Mike Rapoport <rppt@kernel.org>,
David Hildenbrand <david@redhat.com>,
Mel Gorman <mgorman@techsingularity.net>,
marcelo.cerri@canonical.com, tim.gardner@canonical.com,
khalid.elmously@canonical.com, philip.cox@canonical.com,
aarcange@redhat.com, peterx@redhat.com, x86@kernel.org,
linux-mm@kvack.org, linux-coco@lists.linux.dev,
linux-efi@vger.kernel.org, linux-kernel@vger.kernel.org,
Liam Merwick <liam.merwick@oracle.com>
Subject: Re: [PATCHv13 4/9] x86/boot/compressed: Handle unaccepted memory
Date: Fri, 2 Jun 2023 18:36:44 +0300 [thread overview]
Message-ID: <20230602153644.cbdicj2cc6p6goh3@box.shutemov.name> (raw)
In-Reply-To: <20230602140641.GKZHn3caQpYveKxFgU@fat_crate.local>
On Fri, Jun 02, 2023 at 04:06:41PM +0200, Borislav Petkov wrote:
> On Thu, Jun 01, 2023 at 09:25:38PM +0300, Kirill A. Shutemov wrote:
> > diff --git a/arch/x86/boot/compressed/kaslr.c b/arch/x86/boot/compressed/kaslr.c
> > index 454757fbdfe5..749f0fe7e446 100644
> > --- a/arch/x86/boot/compressed/kaslr.c
> > +++ b/arch/x86/boot/compressed/kaslr.c
> > @@ -672,6 +672,28 @@ static bool process_mem_region(struct mem_vector *region,
> > }
> >
> > #ifdef CONFIG_EFI
> > +
> > +/*
> > + * Only EFI_CONVENTIONAL_MEMORY and EFI_UNACCEPTED_MEMORY (if supported) are
> > + * guaranteed to be free.
> > + *
> > + * It is more conservative in picking free memory than the EFI spec allows:
>
> "Pick free memory more conservatively than the EFI spec allows:
> EFI_BOOT_SERVICES_ ..."
Okay.
> > + *
> > + * According to the spec, EFI_BOOT_SERVICES_{CODE|DATA} are also free memory
> > + * and thus available to place the kernel image into, but in practice there's
> > + * firmware where using that memory leads to crashes.
>
> ... because that firmware still scratches into that memory or why?
I moved the existing comment. I don't have have any context beyond that.
Relevant commit: 0982adc74673 ("x86/boot/KASLR: Work around firmware bugs
by excluding EFI_BOOT_SERVICES_* and EFI_LOADER_* from KASLR's choice")
Ard, do you have anything to add here?
> > + */
> > +static inline bool memory_type_is_free(efi_memory_desc_t *md)
> > +{
> > + if (md->type == EFI_CONVENTIONAL_MEMORY)
> > + return true;
> > +
> > + if (md->type == EFI_UNACCEPTED_MEMORY)
> > + return IS_ENABLED(CONFIG_UNACCEPTED_MEMORY);
>
> Make it plan and simple:
>
> if (IS_ENABLED(CONFIG_UNACCEPTED_MEMORY) &&
> md->type == EFI_UNACCEPTED_MEMORY)
> return true;
I don't see why it is simpler. It looks unnecessary noisy to me.
But okay.
> > +
> > + return false;
> > +}
> > +
> > /*
> > * Returns true if we processed the EFI memmap, which we prefer over the E820
> > * table if it is available.
> > @@ -716,18 +738,7 @@ process_efi_entries(unsigned long minimum, unsigned long image_size)
> > for (i = 0; i < nr_desc; i++) {
> > md = efi_early_memdesc_ptr(pmap, e->efi_memdesc_size, i);
> >
> > - /*
> > - * Here we are more conservative in picking free memory than
> > - * the EFI spec allows:
> > - *
> > - * According to the spec, EFI_BOOT_SERVICES_{CODE|DATA} are also
> > - * free memory and thus available to place the kernel image into,
> > - * but in practice there's firmware where using that memory leads
> > - * to crashes.
> > - *
> > - * Only EFI_CONVENTIONAL_MEMORY is guaranteed to be free.
> > - */
> > - if (md->type != EFI_CONVENTIONAL_MEMORY)
> > + if (!memory_type_is_free(md))
> > continue;
> >
> > if (efi_soft_reserve_enabled() &&
> > diff --git a/arch/x86/boot/compressed/mem.c b/arch/x86/boot/compressed/mem.c
> > index 67594fcb11d9..4ecf26576a77 100644
> > --- a/arch/x86/boot/compressed/mem.c
> > +++ b/arch/x86/boot/compressed/mem.c
> > @@ -1,9 +1,40 @@
> > // SPDX-License-Identifier: GPL-2.0-only
> >
> > #include "error.h"
> > +#include "misc.h"
> >
> > void arch_accept_memory(phys_addr_t start, phys_addr_t end)
> > {
> > /* Platform-specific memory-acceptance call goes here */
> > error("Cannot accept memory");
> > }
> > +
> > +void init_unaccepted_memory(void)
> > +{
> > + guid_t guid = LINUX_EFI_UNACCEPTED_MEM_TABLE_GUID;
>
> An additional space after the "=".
Okay.
> > + struct efi_unaccepted_memory *unaccepted_table;
> > + unsigned long cfg_table_pa;
> > + unsigned int cfg_table_len;
> > + enum efi_type et;
> > + int ret;
> > +
> > + et = efi_get_type(boot_params);
> > + if (et == EFI_TYPE_NONE)
> > + return;
> > +
> > + ret = efi_get_conf_table(boot_params, &cfg_table_pa, &cfg_table_len);
> > + if (ret)
> > + error("EFI config table not found.");
>
> What's the point in erroring out here?
Configuration table suppose to be present, even if unaccepted memory is
not supported. Something is very wrong if it is missing.
I will downgrade it warn().
> > + unaccepted_table = (void *)efi_find_vendor_table(boot_params,
> > + cfg_table_pa,
> > + cfg_table_len,
> > + guid);
> > + if (!unaccepted_table)
> > + return;
> > +
> > + if (unaccepted_table->version != 1)
> > + error("Unknown version of unaccepted memory table\n");
> > +
> > + set_unaccepted_table(unaccepted_table);
>
> Why is this a function at all and not a simple assignment?
I wanted to keep unaccepted_table private to the libstub/unaccepted_memory.c.
The setter provides a good spot for documentation to guide unaccepted
memory enablers for other archs.
Still want replace it with direct assignment?
>
> > diff --git a/arch/x86/boot/compressed/misc.c b/arch/x86/boot/compressed/misc.c
> > index 014ff222bf4b..36535a3753f5 100644
> > --- a/arch/x86/boot/compressed/misc.c
> > +++ b/arch/x86/boot/compressed/misc.c
> > @@ -455,6 +455,13 @@ asmlinkage __visible void *extract_kernel(void *rmode, memptr heap,
> > #endif
> >
> > debug_putstr("\nDecompressing Linux... ");
> > +
> > + if (IS_ENABLED(CONFIG_UNACCEPTED_MEMORY)) {
> > + debug_putstr("Accepting memory... ");
>
> This needs to happen...
>
> > + init_unaccepted_memory();
>
> ... after the init, after the init has parsed the config table and has
> found unaccepted memory.
>
> If not, you don't need to issue anything as that would be wrong.
Okay, I will make init_unaccepted_memory() return true if unaccepted
memory is present and hide defined it always-false for !UNACCEPTED_MEMORY.
So this hunk will look this way:
if (init_unaccepted_memory()) {
debug_putstr("Accepting memory... ");
accept_memory(__pa(output), __pa(output) + needed_size);
}
--
Kiryl Shutsemau / Kirill A. Shutemov
next prev parent reply other threads:[~2023-06-02 15:37 UTC|newest]
Thread overview: 31+ messages / expand[flat|nested] mbox.gz Atom feed top
2023-06-01 18:25 [PATCHv13 0/9] mm, x86/cc, efi: Implement support for unaccepted memory Kirill A. Shutemov
2023-06-01 18:25 ` [PATCHv13 1/9] mm: Add " Kirill A. Shutemov
2023-06-01 18:25 ` [PATCHv13 2/9] efi/x86: Get full memory map in allocate_e820() Kirill A. Shutemov
2023-06-01 18:25 ` [PATCHv13 3/9] efi/libstub: Implement support for unaccepted memory Kirill A. Shutemov
2023-06-02 12:10 ` Borislav Petkov
2023-06-02 12:20 ` Kirill A. Shutemov
2023-06-01 18:25 ` [PATCHv13 4/9] x86/boot/compressed: Handle " Kirill A. Shutemov
2023-06-02 14:06 ` Borislav Petkov
2023-06-02 15:36 ` Kirill A. Shutemov [this message]
2023-06-02 15:59 ` Ard Biesheuvel
2023-06-02 16:10 ` Borislav Petkov
2023-06-02 16:09 ` Borislav Petkov
2023-06-02 16:17 ` Ard Biesheuvel
2023-06-02 16:45 ` Borislav Petkov
2023-06-05 11:29 ` Kirill A. Shutemov
2023-06-01 18:25 ` [PATCHv13 5/9] efi: Add unaccepted memory support Kirill A. Shutemov
2023-06-05 15:43 ` Borislav Petkov
2023-06-05 17:33 ` Kirill A. Shutemov
2023-06-05 19:12 ` Borislav Petkov
2023-06-05 21:37 ` Kirill A. Shutemov
2023-06-06 12:19 ` Kirill A. Shutemov
2023-06-06 12:29 ` Borislav Petkov
2023-06-01 18:25 ` [PATCHv13 6/9] efi/unaccepted: Avoid load_unaligned_zeropad() stepping into unaccepted memory Kirill A. Shutemov
2023-06-01 18:25 ` [PATCHv13 7/9] x86/tdx: Make _tdx_hypercall() and __tdx_module_call() available in boot stub Kirill A. Shutemov
2023-06-01 18:25 ` [PATCHv13 8/9] x86/tdx: Refactor try_accept_one() Kirill A. Shutemov
2023-06-01 18:25 ` [PATCHv13 9/9] x86/tdx: Add unaccepted memory support Kirill A. Shutemov
2023-06-02 13:22 ` Tom Lendacky
2023-06-02 14:26 ` Tom Lendacky
2023-06-05 19:18 ` Dave Hansen
2023-06-05 21:39 ` Kirill A. Shutemov
2023-06-02 14:35 ` Kirill A. Shutemov
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20230602153644.cbdicj2cc6p6goh3@box.shutemov.name \
--to=kirill.shutemov@linux.intel.com \
--cc=aarcange@redhat.com \
--cc=ak@linux.intel.com \
--cc=akpm@linux-foundation.org \
--cc=ardb@kernel.org \
--cc=bp@alien8.de \
--cc=dave.hansen@intel.com \
--cc=david@redhat.com \
--cc=dfaggioli@suse.com \
--cc=jroedel@suse.de \
--cc=khalid.elmously@canonical.com \
--cc=liam.merwick@oracle.com \
--cc=linux-coco@lists.linux.dev \
--cc=linux-efi@vger.kernel.org \
--cc=linux-kernel@vger.kernel.org \
--cc=linux-mm@kvack.org \
--cc=luto@kernel.org \
--cc=marcelo.cerri@canonical.com \
--cc=mgorman@techsingularity.net \
--cc=mingo@redhat.com \
--cc=pbonzini@redhat.com \
--cc=peterx@redhat.com \
--cc=peterz@infradead.org \
--cc=philip.cox@canonical.com \
--cc=rientjes@google.com \
--cc=rppt@kernel.org \
--cc=sathyanarayanan.kuppuswamy@linux.intel.com \
--cc=seanjc@google.com \
--cc=tglx@linutronix.de \
--cc=thomas.lendacky@amd.com \
--cc=tim.gardner@canonical.com \
--cc=vbabka@suse.cz \
--cc=x86@kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).