On Mon, Jan 6, 2020 at 8:04 PM Dave Young <dyoung@xxxxxxxxxx> wrote: > > On 01/06/20 at 04:40pm, Dan Williams wrote: > > Dave noticed that when specifying multiple efi_fake_mem= entries only > > the last entry was successfully being reflected in the efi memory map. > > This is due to the fact that the efi_memmap_insert() is being called > > multiple times, but on successive invocations the insertion should be > > applied to the last new memmap rather than the original map at > > efi_fake_memmap() entry. > > > > Rework efi_fake_memmap() to install the new memory map after each > > efi_fake_mem= entry is parsed. > > > > This also fixes an issue in efi_fake_memmap() that caused it to litter > > emtpy entries into the end of the efi memory map. An empty entry causes > > efi_memmap_insert() to attempt more memmap splits / copies than > > efi_memmap_split_count() accounted for when sizing the new map. When > > that happens efi_memmap_insert() may overrun its allocation, and if you > > are lucky will spill over to an unmapped page leading to crash > > signature like the following rather than silent corruption: > > > > BUG: unable to handle page fault for address: ffffffffff281000 > > [..] > > RIP: 0010:efi_memmap_insert+0x11d/0x191 > > [..] > > Call Trace: > > ? bgrt_init+0xbe/0xbe > > ? efi_arch_mem_reserve+0x1cb/0x228 > > ? acpi_parse_bgrt+0xa/0xd > > ? acpi_table_parse+0x86/0xb8 > > ? acpi_boot_init+0x494/0x4e3 > > ? acpi_parse_x2apic+0x87/0x87 > > ? setup_acpi_sci+0xa2/0xa2 > > ? setup_arch+0x8db/0x9e1 > > ? start_kernel+0x6a/0x547 > > ? secondary_startup_64+0xb6/0xc0 > > > > Commit af1648984828 "x86/efi: Update e820 with reserved EFI boot > > services data to fix kexec breakage" is listed in Fixes: since it > > introduces more occurrences where efi_memmap_insert() is invoked after > > an efi_fake_mem= configuration has been parsed. Previously the side > > effects of vestigial empty entries were benign, but with commit > > af1648984828 that follow-on efi_memmap_insert() invocation triggers > > efi_memmap_insert() overruns. > > > > Fixes: 0f96a99dab36 ("efi: Add 'efi_fake_mem' boot option") > > Fixes: af1648984828 ("x86/efi: Update e820 with reserved EFI boot services...") > > A nitpick for the Fixes flags, as I replied in the thread below: > https://lore.kernel.org/linux-efi/CAPcyv4jLxqPaB22Ao9oV31Gm=b0+Phty+Uz33Snex4QchOUb0Q@xxxxxxxxxxxxxx/T/#m2bb2dd00f7715c9c19ccc48efef0fcd5fdb626e7 > > I reproduced two other panics without the patches applied, so this issue > is not caused by either of the commits, maybe just drop the Fixes. Just the "Fixes: af1648984828", right? No objection from me. I'll let Ingo say if he needs a resend for that. The "Fixes: 0f96a99dab36" is valid because the original implementation failed to handle the multiple argument case from the beginning. > > > Link: https://lore.kernel.org/r/20191231014630.GA24942@xxxxxxxxxxxxxxxxxxxxxxxxxx > > Reported-by: Dave Young <dyoung@xxxxxxxxxx> > > Cc: Taku Izumi <izumi.taku@xxxxxxxxxxxxxx> > > Cc: Michael Weiser <michael@xxxxxxxxxxxxxxxxxxx> > > Cc: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx> > > Cc: Thomas Gleixner <tglx@xxxxxxxxxxxxx> > > Cc: Ingo Molnar <mingo@xxxxxxxxxx> > > Signed-off-by: Dan Williams <dan.j.williams@xxxxxxxxx> > > --- > > drivers/firmware/efi/fake_mem.c | 31 ++++++++++++++++--------------- > > drivers/firmware/efi/memmap.c | 2 +- > > include/linux/efi.h | 2 ++ > > 3 files changed, 19 insertions(+), 16 deletions(-) > > > > diff --git a/drivers/firmware/efi/fake_mem.c b/drivers/firmware/efi/fake_mem.c > > index a8d20568d532..6e0f34a38171 100644 > > --- a/drivers/firmware/efi/fake_mem.c > > +++ b/drivers/firmware/efi/fake_mem.c > > @@ -34,25 +34,16 @@ static int __init cmp_fake_mem(const void *x1, const void *x2) > > return 0; > > } > > > > -void __init efi_fake_memmap(void) > > +static void __init efi_fake_range(struct efi_mem_range *efi_range) > > { > > struct efi_memory_map_data data = { 0 }; > > int new_nr_map = efi.memmap.nr_map; > > efi_memory_desc_t *md; > > void *new_memmap; > > - int i; > > - > > - if (!efi_enabled(EFI_MEMMAP) || !nr_fake_mem) > > - return; > > > > /* count up the number of EFI memory descriptor */ > > - for (i = 0; i < nr_fake_mem; i++) { > > - for_each_efi_memory_desc(md) { > > - struct range *r = &efi_fake_mems[i].range; > > - > > - new_nr_map += efi_memmap_split_count(md, r); > > - } > > - } > > + for_each_efi_memory_desc(md) > > + new_nr_map += efi_memmap_split_count(md, &efi_range->range); > > For this part, although I still have some concerns, but since I'm not > 100% clear about it, maybe just leave it as you do, and see if it is > good to Ard. Absent a specific failure case I didn't see anything to change here. _______________________________________________ kexec mailing list kexec@xxxxxxxxxxxxxxxxxxx http://lists.infradead.org/mailman/listinfo/kexec