From: Jeffrey Hugo <jhugo-sgV2jX0FEOL9JmXXK+q4OQ@public.gmane.org>
To: Ard Biesheuvel <ard.biesheuvel-QSEj5FYQhm4dnm+yROfE0A@public.gmane.org>
Cc: Mark Rutland <mark.rutland-5wv7dgnIgG8@public.gmane.org>,
"linux-efi-u79uwXL29TY76Z2rM5mHXA@public.gmane.org"
<linux-efi-u79uwXL29TY76Z2rM5mHXA@public.gmane.org>,
Matt Fleming
<matt-mF/unelCI9GS6iBeEJttW/XRex20P6io@public.gmane.org>,
Catalin Marinas <catalin.marinas-5wv7dgnIgG8@public.gmane.org>,
Timur Tabi <timur-sgV2jX0FEOL9JmXXK+q4OQ@public.gmane.org>,
Leif Lindholm
<leif.lindholm-QSEj5FYQhm4dnm+yROfE0A@public.gmane.org>,
"linux-arm-kernel-IAPFreCvJWM7uuMidbF8XUB+6BGkLq7r@public.gmane.org"
<linux-arm-kernel-IAPFreCvJWM7uuMidbF8XUB+6BGkLq7r@public.gmane.org>
Subject: Re: [PATCH] efi: arm-stub: Correct FDT and initrd allocation rules for arm64
Date: Thu, 9 Feb 2017 10:41:49 -0700 [thread overview]
Message-ID: <5595ed30-3c97-8d7b-154a-9af474a4e22c@codeaurora.org> (raw)
In-Reply-To: <CAKv+Gu8Lr2KmEgJU4_GA8qm5_OZfYZECH0-=OBTDJ=1-5fAsnw-JsoAwUIsXosN+BqQ9rBEUg@public.gmane.org>
On 2/9/2017 10:16 AM, Ard Biesheuvel wrote:
> On 9 February 2017 at 17:06, Jeffrey Hugo <jhugo-sgV2jX0FEOL9JmXXK+q4OQ@public.gmane.org> wrote:
>> On 2/9/2017 3:16 AM, Ard Biesheuvel wrote:
>>>
>>> On arm64, we have made some changes over the past year to the way the
>>> kernel itself is allocated and to how it deals with the initrd and FDT.
>>> This patch brings the allocation logic in the EFI stub in line with that,
>>> which is necessary because the introduction of KASLR has created the
>>> possibility for the initrd to be allocated in a place where the kernel
>>> may not be able to map it. (This is currently a theoretical scenario,
>>> since it only affects systems where the size of RAM exceeds the size of
>>> the linear mapping.)
>>>
>>> So adhere to the arm64 boot protocol, and make sure that the initrd is
>>> fully inside a 1GB aligned 32 GB window that covers the kernel as well.
>>>
>>> The FDT may be anywhere in memory on arm64 now that we map it via the
>>> fixmap, so we can lift the address restriction there completely.
>>>
>>> Signed-off-by: Ard Biesheuvel <ard.biesheuvel-QSEj5FYQhm4dnm+yROfE0A@public.gmane.org>
>>> ---
>>
>>
>> I'll give this a test on our platform that was running into the current
>> limitation - probably this weekend.
>>
>> I reviewed the code and its ok, but I do have one question. Do we need to
>> handle the case where initrd ends up below the kernel?
>>
>> Lets assume KALSR puts the kernel somewhere up high in DDR, after the 32GB
>> mark in DDR. Now lets assume the unlikely scenario that the initrd won't
>> fit anywhere after 32GB, but will fit before 32GB. Per my understanding of
>> efi_high_alloc, it will put the initrd before the 32GB mark, which will be
>> outside of the window where the kernel is.
>>
>
> The 32 GB does not have to be 32 GB aligned, only 1 GB aligned. So as
> long as the follow expression holds, we should be fine
>
>
> align(max(kernel_end, initrd_end), 1g) - align_down (min
> (kernel_start, initrd_start), 1g) <= 32g
Yes, and I argue there is a possibility (we'll call it extremely remote)
where that may not hold. My question is, do we care about that
possibility, and if so, do we do anything about it?
>
>
>> Seems like there are 3 options -
>> 1. We consider the scenario unlikely to the point that we don't care, and
>> don't do anything
>> 2. We check to see if initrd is allocated to be within the window, and if
>> not print an error message
>> 3. Change efi_high_alloc to take a min addess as well as a max, so that it
>> will fail if the initrd can't fit in the window (which will result in an
>> error message printed)
>>
>> Thoughts?
>>
>>
>>> arch/arm/include/asm/efi.h | 14 +++++++++++++-
>>> arch/arm64/include/asm/efi.h | 19 ++++++++++++++++++-
>>> drivers/firmware/efi/libstub/arm-stub.c | 7 ++++---
>>> 3 files changed, 35 insertions(+), 5 deletions(-)
>>>
>>> diff --git a/arch/arm/include/asm/efi.h b/arch/arm/include/asm/efi.h
>>> index 0b06f5341b45..62620451f60b 100644
>>> --- a/arch/arm/include/asm/efi.h
>>> +++ b/arch/arm/include/asm/efi.h
>>> @@ -84,6 +84,18 @@ static inline void efifb_setup_from_dmi(struct
>>> screen_info *si, const char *opt)
>>> */
>>> #define ZIMAGE_OFFSET_LIMIT SZ_128M
>>> #define MIN_ZIMAGE_OFFSET MAX_UNCOMP_KERNEL_SIZE
>>> -#define MAX_FDT_OFFSET ZIMAGE_OFFSET_LIMIT
>>> +
>>> +/* on ARM, the FDT should be located in the first 128 MB of RAM */
>>> +static inline unsigned long efi_get_max_fdt_addr(unsigned long dram_base)
>>> +{
>>> + return dram_base + ZIMAGE_OFFSET_LIMIT;
>>> +}
>>> +
>>> +/* on ARM, the initrd should be loaded in a lowmem region */
>>> +static inline unsigned long efi_get_max_initrd_addr(unsigned long
>>> dram_base,
>>> + unsigned long
>>> image_addr)
>>> +{
>>> + return dram_base + SZ_512M;
>>> +}
>>>
>>> #endif /* _ASM_ARM_EFI_H */
>>> diff --git a/arch/arm64/include/asm/efi.h b/arch/arm64/include/asm/efi.h
>>> index 0b6b1633017f..6a6c8a0d1424 100644
>>> --- a/arch/arm64/include/asm/efi.h
>>> +++ b/arch/arm64/include/asm/efi.h
>>> @@ -46,7 +46,24 @@ int efi_set_mapping_permissions(struct mm_struct *mm,
>>> efi_memory_desc_t *md);
>>> * 2MiB so we know it won't cross a 2MiB boundary.
>>> */
>>> #define EFI_FDT_ALIGN SZ_2M /* used by
>>> allocate_new_fdt_and_exit_boot() */
>>> -#define MAX_FDT_OFFSET SZ_512M
>>> +
>>> +/* on arm64, the FDT may be located anywhere in system RAM */
>>> +static inline unsigned long efi_get_max_fdt_addr(unsigned long dram_base)
>>> +{
>>> + return ULONG_MAX;
>>> +}
>>> +
>>> +/*
>>> + * On arm64, the initrd must be completely inside a 1 GB aligned 32 GB
>>> window
>>> + * that covers Image as well. Since we allocate from the top down, set a
>>> max
>>> + * address that is virtually guaranteed to produce a suitable allocation
>>> even
>>> + * when the physical address of Image is randomized.
>>> + */
>>> +static inline unsigned long efi_get_max_initrd_addr(unsigned long
>>> dram_base,
>>> + unsigned long
>>> image_addr)
>>> +{
>>> + return ALIGN(image_addr, SZ_1G) + 31UL * SZ_1G;
>>> +}
>>>
>>> #define efi_call_early(f, ...)
>>> sys_table_arg->boottime->f(__VA_ARGS__)
>>> #define __efi_call_early(f, ...) f(__VA_ARGS__)
>>> diff --git a/drivers/firmware/efi/libstub/arm-stub.c
>>> b/drivers/firmware/efi/libstub/arm-stub.c
>>> index b4f7d78f9e8b..557281fe375f 100644
>>> --- a/drivers/firmware/efi/libstub/arm-stub.c
>>> +++ b/drivers/firmware/efi/libstub/arm-stub.c
>>> @@ -333,8 +333,9 @@ unsigned long efi_entry(void *handle,
>>> efi_system_table_t *sys_table,
>>> if (!fdt_addr)
>>> pr_efi(sys_table, "Generating empty DTB\n");
>>>
>>> - status = handle_cmdline_files(sys_table, image, cmdline_ptr,
>>> - "initrd=", dram_base + SZ_512M,
>>> + status = handle_cmdline_files(sys_table, image, cmdline_ptr,
>>> "initrd=",
>>> + efi_get_max_initrd_addr(dram_base,
>>> +
>>> *image_addr),
>>> (unsigned long *)&initrd_addr,
>>> (unsigned long *)&initrd_size);
>>> if (status != EFI_SUCCESS)
>>> @@ -344,7 +345,7 @@ unsigned long efi_entry(void *handle,
>>> efi_system_table_t *sys_table,
>>>
>>> new_fdt_addr = fdt_addr;
>>> status = allocate_new_fdt_and_exit_boot(sys_table, handle,
>>> - &new_fdt_addr, dram_base + MAX_FDT_OFFSET,
>>> + &new_fdt_addr,
>>> efi_get_max_fdt_addr(dram_base),
>>> initrd_addr, initrd_size, cmdline_ptr,
>>> fdt_addr, fdt_size);
>>>
>>>
>>
>>
>> --
>> Jeffrey Hugo
>> Qualcomm Datacenter Technologies as an affiliate of Qualcomm Technologies,
>> Inc.
>> Qualcomm Technologies, Inc. is a member of the
>> Code Aurora Forum, a Linux Foundation Collaborative Project.
>
> _______________________________________________
> linux-arm-kernel mailing list
> linux-arm-kernel-IAPFreCvJWM7uuMidbF8XUB+6BGkLq7r@public.gmane.org
> http://lists.infradead.org/mailman/listinfo/linux-arm-kernel
>
--
Jeffrey Hugo
Qualcomm Datacenter Technologies as an affiliate of Qualcomm
Technologies, Inc.
Qualcomm Technologies, Inc. is a member of the
Code Aurora Forum, a Linux Foundation Collaborative Project.
next prev parent reply other threads:[~2017-02-09 17:41 UTC|newest]
Thread overview: 12+ messages / expand[flat|nested] mbox.gz Atom feed top
2017-02-09 10:16 [PATCH] efi: arm-stub: Correct FDT and initrd allocation rules for arm64 Ard Biesheuvel
[not found] ` <1486635389-26974-1-git-send-email-ard.biesheuvel-QSEj5FYQhm4dnm+yROfE0A@public.gmane.org>
2017-02-09 10:20 ` Ard Biesheuvel
2017-02-09 17:06 ` Jeffrey Hugo
2017-02-09 17:16 ` Ard Biesheuvel
[not found] ` <CAKv+Gu8Lr2KmEgJU4_GA8qm5_OZfYZECH0-=OBTDJ=1-5fAsnw-JsoAwUIsXosN+BqQ9rBEUg@public.gmane.org>
2017-02-09 17:41 ` Jeffrey Hugo [this message]
2017-02-09 17:45 ` Ard Biesheuvel
[not found] ` <CAKv+Gu9fwzgbfGosVcGGqJHLhW=79LWhg4vS4MWEtTdBEHbNUw-JsoAwUIsXosN+BqQ9rBEUg@public.gmane.org>
2017-02-09 18:01 ` Jeffrey Hugo
[not found] ` <75121ecb-5ee6-202d-8cfa-a90d323d1bc5-sgV2jX0FEOL9JmXXK+q4OQ@public.gmane.org>
2017-02-09 18:18 ` Ard Biesheuvel
[not found] ` <CAKv+Gu8iA3eed6nHXvwez8=fjEvL1M+KzepUyM7cnNeqZSUBhw-JsoAwUIsXosN+BqQ9rBEUg@public.gmane.org>
2017-02-09 18:26 ` Ard Biesheuvel
[not found] ` <CAKv+Gu-EPdcLFBmHoVB4UROrUSkYorgn5a9SX1wpAD_30=1tGw-JsoAwUIsXosN+BqQ9rBEUg@public.gmane.org>
2017-02-09 19:04 ` Jeffrey Hugo
2017-02-09 19:33 ` Ard Biesheuvel
2017-02-10 0:28 ` Ruigrok, Richard
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=5595ed30-3c97-8d7b-154a-9af474a4e22c@codeaurora.org \
--to=jhugo-sgv2jx0feol9jmxxk+q4oq@public.gmane.org \
--cc=ard.biesheuvel-QSEj5FYQhm4dnm+yROfE0A@public.gmane.org \
--cc=catalin.marinas-5wv7dgnIgG8@public.gmane.org \
--cc=leif.lindholm-QSEj5FYQhm4dnm+yROfE0A@public.gmane.org \
--cc=linux-arm-kernel-IAPFreCvJWM7uuMidbF8XUB+6BGkLq7r@public.gmane.org \
--cc=linux-efi-u79uwXL29TY76Z2rM5mHXA@public.gmane.org \
--cc=mark.rutland-5wv7dgnIgG8@public.gmane.org \
--cc=matt-mF/unelCI9GS6iBeEJttW/XRex20P6io@public.gmane.org \
--cc=timur-sgV2jX0FEOL9JmXXK+q4OQ@public.gmane.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox