diff mbox series

[RFC] arm64: efi: fix chicken-and-egg problem in memreserve code

Message ID 20190118174324.24715-1-ard.biesheuvel@linaro.org
State New
Headers show
Series [RFC] arm64: efi: fix chicken-and-egg problem in memreserve code | expand

Commit Message

Ard Biesheuvel Jan. 18, 2019, 5:43 p.m. UTC
Unfortunately, it appears that the recently introduced and repaired
EFI memreserve code is still broken.

Originally, we applied all memory reservation passed via the EFI table
before doing any memblock allocations. However, this turned out to be
problematic, given that the number of reservations is unbounded, and
a GICv3 system will reserve a block of memory for each CPU, resulting
in hundreds of reservations.

We 'fixed' this by deferring the reservations in the memblock table
until after we enabled memblock resizing. However, to reach this
point, we must have mapped DRAM and the kernel, which itself relies
on some memblock allocations for page tables. Also, memblock resizing
itself relies on the ability to invoke memblock_alloc() to reallocate
those tables themselves.

So this is a nice chicken-and-egg problem which is rather difficult
to fix cleanly. So instead of a clean solution, I came up with the
patch below.

The idea is to set a memblock allocation limit below the lowest
reservation entry that occurs in the memreserve table. This way,
we can map DRAM and the kernel and enable memblock resizing without
running the risk of clobbering those reserved regions. After applying
all the reservations, the memblock limit restriction is lifted again,
allowing the boot to proceed normally.

Signed-off-by: Ard Biesheuvel <ard.biesheuvel@linaro.org>

---

The problem with this approach is that it is not guaranteed that the
temporary limit will leave enough memory to allocate the page tables
and resize the memblock reserved array. Since this is only 10s of KBs,
it is unlikely to break in practice, but some pathological behavior
may still occur, which is rather nasty :-(

 arch/arm64/include/asm/memblock.h |  1 +
 arch/arm64/kernel/setup.c         |  2 +-
 arch/arm64/mm/init.c              | 19 ++++++++++
 drivers/firmware/efi/efi.c        | 39 +++++++++++++++++++-
 include/linux/efi.h               |  7 ++++
 5 files changed, 66 insertions(+), 2 deletions(-)

-- 
2.20.1

Comments

James Morse Jan. 22, 2019, 11:32 a.m. UTC | #1
Hi Ard,

On 18/01/2019 17:43, Ard Biesheuvel wrote:
> Unfortunately, it appears that the recently introduced and repaired

> EFI memreserve code is still broken.

> 

> Originally, we applied all memory reservation passed via the EFI table

> before doing any memblock allocations. However, this turned out to be

> problematic, given that the number of reservations is unbounded, and

> a GICv3 system will reserve a block of memory for each CPU, resulting

> in hundreds of reservations.

> 

> We 'fixed' this by deferring the reservations in the memblock table

> until after we enabled memblock resizing. However, to reach this

> point, we must have mapped DRAM and the kernel, which itself relies

> on some memblock allocations for page tables. Also, memblock resizing

> itself relies on the ability to invoke memblock_alloc() to reallocate

> those tables themselves.

> 

> So this is a nice chicken-and-egg problem which is rather difficult

> to fix cleanly. So instead of a clean solution, I came up with the

> patch below.

> 

> The idea is to set a memblock allocation limit below the lowest

> reservation entry that occurs in the memreserve table. This way,

> we can map DRAM and the kernel and enable memblock resizing without

> running the risk of clobbering those reserved regions. After applying

> all the reservations, the memblock limit restriction is lifted again,

> allowing the boot to proceed normally.


.... how does this interact with kdump? Is it possible the crash-kernel region
is above the lowest reservation entry, meaning there is no usable memory?


> The problem with this approach is that it is not guaranteed that the

> temporary limit will leave enough memory to allocate the page tables

> and resize the memblock reserved array. Since this is only 10s of KBs,

> it is unlikely to break in practice, but some pathological behavior

> may still occur, which is rather nasty :-(


As I understand it, the in-kernel-image memblock_reserved_init_regions is used
early on, because we don't know where the reserved regions of memory are, but
INIT_MEMBLOCK_REGIONS should be big enough to describe them. We trip up when it
isn't big enough, and we can't resize it yet.

... thinking out loud ...

Does reserve_regions() know how big that array needs to be?
(it can count the nomap and persistent reservations, as well as the gaps between
memory banks).

Could we 'allocate' that array to be big enough for everything learnt via EFI in
reserve_regions()? It memblock_remove()s all existing memory, so we know at this
point there aren't existing reservations/allocations.


Thanks,

James
Ard Biesheuvel Jan. 22, 2019, 12:10 p.m. UTC | #2
On Tue, 22 Jan 2019 at 12:32, James Morse <james.morse@arm.com> wrote:
>

> Hi Ard,

>

> On 18/01/2019 17:43, Ard Biesheuvel wrote:

> > Unfortunately, it appears that the recently introduced and repaired

> > EFI memreserve code is still broken.

> >

> > Originally, we applied all memory reservation passed via the EFI table

> > before doing any memblock allocations. However, this turned out to be

> > problematic, given that the number of reservations is unbounded, and

> > a GICv3 system will reserve a block of memory for each CPU, resulting

> > in hundreds of reservations.

> >

> > We 'fixed' this by deferring the reservations in the memblock table

> > until after we enabled memblock resizing. However, to reach this

> > point, we must have mapped DRAM and the kernel, which itself relies

> > on some memblock allocations for page tables. Also, memblock resizing

> > itself relies on the ability to invoke memblock_alloc() to reallocate

> > those tables themselves.

> >

> > So this is a nice chicken-and-egg problem which is rather difficult

> > to fix cleanly. So instead of a clean solution, I came up with the

> > patch below.

> >

> > The idea is to set a memblock allocation limit below the lowest

> > reservation entry that occurs in the memreserve table. This way,

> > we can map DRAM and the kernel and enable memblock resizing without

> > running the risk of clobbering those reserved regions. After applying

> > all the reservations, the memblock limit restriction is lifted again,

> > allowing the boot to proceed normally.

>

> .... how does this interact with kdump? Is it possible the crash-kernel region

> is above the lowest reservation entry, meaning there is no usable memory?

>


I suppose that is possible, yes ...

>

> > The problem with this approach is that it is not guaranteed that the

> > temporary limit will leave enough memory to allocate the page tables

> > and resize the memblock reserved array. Since this is only 10s of KBs,

> > it is unlikely to break in practice, but some pathological behavior

> > may still occur, which is rather nasty :-(

>

> As I understand it, the in-kernel-image memblock_reserved_init_regions is used

> early on, because we don't know where the reserved regions of memory are, but

> INIT_MEMBLOCK_REGIONS should be big enough to describe them. We trip up when it

> isn't big enough, and we can't resize it yet.

>


Indeed. If we could establish a reasonable upper bound for the
statically allocated size, the issue would not exist.

> ... thinking out loud ...

>

> Does reserve_regions() know how big that array needs to be?

> (it can count the nomap and persistent reservations, as well as the gaps between

> memory banks).

>

> Could we 'allocate' that array to be big enough for everything learnt via EFI in

> reserve_regions()? It memblock_remove()s all existing memory, so we know at this

> point there aren't existing reservations/allocations.

>


I am not sure I follow. Re-allocating the memblock array involves
allocating some memory and moving the array into it. The complicating
factor is that that memory has to be mapped at that point, which is
not the case when reserve_regions() executes.
diff mbox series

Patch

diff --git a/arch/arm64/include/asm/memblock.h b/arch/arm64/include/asm/memblock.h
index 6afeed2467f1..461d093e67cf 100644
--- a/arch/arm64/include/asm/memblock.h
+++ b/arch/arm64/include/asm/memblock.h
@@ -17,5 +17,6 @@ 
 #define __ASM_MEMBLOCK_H
 
 extern void arm64_memblock_init(void);
+extern void arm64_memblock_post_paging_init(void);
 
 #endif
diff --git a/arch/arm64/kernel/setup.c b/arch/arm64/kernel/setup.c
index 4b0e1231625c..a76b165e3f16 100644
--- a/arch/arm64/kernel/setup.c
+++ b/arch/arm64/kernel/setup.c
@@ -313,7 +313,7 @@  void __init setup_arch(char **cmdline_p)
 	arm64_memblock_init();
 
 	paging_init();
-	efi_apply_persistent_mem_reservations();
+	arm64_memblock_post_paging_init();
 
 	acpi_table_upgrade();
 
diff --git a/arch/arm64/mm/init.c b/arch/arm64/mm/init.c
index 7205a9085b4d..6e95b52b5d07 100644
--- a/arch/arm64/mm/init.c
+++ b/arch/arm64/mm/init.c
@@ -355,6 +355,7 @@  static void __init fdt_enforce_memory_region(void)
 void __init arm64_memblock_init(void)
 {
 	const s64 linear_region_size = -(s64)PAGE_OFFSET;
+	u64 memblock_limit;
 
 	/* Handle linux,usable-memory-range property */
 	fdt_enforce_memory_region();
@@ -399,6 +400,18 @@  void __init arm64_memblock_init(void)
 		memblock_add(__pa_symbol(_text), (u64)(_end - _text));
 	}
 
+	/*
+	 * Set a temporary memblock allocation limit so that we don't clobber
+	 * regions that we will want to reserve later. However, since the
+	 * number of reserved regions that can be described this way is
+	 * basically unbounded, we have to defer applying the actual
+	 * reservations until after we have mapped enough memory to allow
+	 * the memblock resize routines to run.
+	 */
+	efi_prepare_persistent_mem_reservations(&memblock_limit);
+	if (memblock_limit < memory_limit)
+		memblock_set_current_limit(memblock_limit);
+
 	if (IS_ENABLED(CONFIG_BLK_DEV_INITRD) && phys_initrd_size) {
 		/*
 		 * Add back the memory we just removed if it results in the
@@ -666,3 +679,9 @@  static int __init register_mem_limit_dumper(void)
 	return 0;
 }
 __initcall(register_mem_limit_dumper);
+
+void __init arm64_memblock_post_paging_init(void)
+{
+	memblock_set_current_limit(memory_limit);
+	efi_apply_persistent_mem_reservations();
+}
diff --git a/drivers/firmware/efi/efi.c b/drivers/firmware/efi/efi.c
index 4c46ff6f2242..643e38f5e200 100644
--- a/drivers/firmware/efi/efi.c
+++ b/drivers/firmware/efi/efi.c
@@ -595,11 +595,13 @@  int __init efi_config_parse_tables(void *config_tables, int count, int sz,
 	return 0;
 }
 
-int __init efi_apply_persistent_mem_reservations(void)
+int __init efi_prepare_persistent_mem_reservations(u64 *lowest)
 {
 	if (efi.mem_reserve != EFI_INVALID_TABLE_ADDR) {
 		unsigned long prsv = efi.mem_reserve;
 
+		*lowest = U64_MAX;
+
 		while (prsv) {
 			struct linux_efi_memreserve *rsv;
 			u8 *p;
@@ -622,6 +624,41 @@  int __init efi_apply_persistent_mem_reservations(void)
 			/* reserve the entry itself */
 			memblock_reserve(prsv, EFI_MEMRESERVE_SIZE(rsv->size));
 
+			for (i = 0; i < atomic_read(&rsv->count); i++)
+				*lowest = min(*lowest, rsv->entry[i].base);
+
+			prsv = rsv->next;
+			early_memunmap(p, PAGE_SIZE);
+		}
+	}
+
+	return 0;
+}
+
+int __init efi_apply_persistent_mem_reservations(void)
+{
+	if (efi.mem_reserve != EFI_INVALID_TABLE_ADDR) {
+		unsigned long prsv = efi.mem_reserve;
+
+		while (prsv) {
+			struct linux_efi_memreserve *rsv;
+			u8 *p;
+			int i;
+
+			/*
+			 * Just map a full page: that is what we will get
+			 * anyway, and it permits us to map the entire entry
+			 * before knowing its size.
+			 */
+			p = early_memremap(ALIGN_DOWN(prsv, PAGE_SIZE),
+					   PAGE_SIZE);
+			if (p == NULL) {
+				pr_err("Could not map UEFI memreserve entry!\n");
+				return -ENOMEM;
+			}
+
+			rsv = (void *)(p + prsv % PAGE_SIZE);
+
 			for (i = 0; i < atomic_read(&rsv->count); i++) {
 				memblock_reserve(rsv->entry[i].base,
 						 rsv->entry[i].size);
diff --git a/include/linux/efi.h b/include/linux/efi.h
index be08518c2553..2ec2153fc12e 100644
--- a/include/linux/efi.h
+++ b/include/linux/efi.h
@@ -1212,6 +1212,7 @@  extern void efi_reboot(enum reboot_mode reboot_mode, const char *__unused);
 
 extern bool efi_is_table_address(unsigned long phys_addr);
 
+extern int efi_prepare_persistent_mem_reservations(u64 *lowest);
 extern int efi_apply_persistent_mem_reservations(void);
 #else
 static inline bool efi_enabled(int feature)
@@ -1232,6 +1233,12 @@  static inline bool efi_is_table_address(unsigned long phys_addr)
 	return false;
 }
 
+static inline int efi_prepare_persistent_mem_reservations(u64 *lowest)
+{
+	*lowest = U64_MAX;
+	return 0;
+}
+
 static inline int efi_apply_persistent_mem_reservations(void)
 {
 	return 0;