lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Fri, 7 Aug 2015 11:16:03 -0700
From:	"Zhang, Jonathan Zhixiong" <zjzhang@...eaurora.org>
To:	Ard Biesheuvel <ard.biesheuvel@...aro.org>,
	Matt Fleming <matt@...eblueprint.co.uk>
Cc:	Catalin Marinas <catalin.marinas@....com>,
	Will Deacon <will.deacon@....com>, Fu Wei <fu.wei@...aro.org>,
	Al Stone <al.stone@...aro.org>, Borislav Petkov <bp@...en8.de>,
	Matt Fleming <matt.fleming@...el.com>,
	"Rafael J. Wysocki" <rjw@...ysocki.net>,
	Hanjun Guo <hanjun.guo@...aro.org>,
	Leif Lindholm <leif.lindholm@...aro.org>,
	"linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>,
	Linaro ACPI Mailman List <linaro-acpi@...ts.linaro.org>,
	Timur Tabi <timur@...eaurora.org>
Subject: Re: [PATCH V10 4/5] arm64: apei: implement
 arch_apei_get_mem_attributes()



On 8/7/2015 2:50 AM, Ard Biesheuvel wrote:
> On 7 August 2015 at 11:37, Matt Fleming <matt@...eblueprint.co.uk> wrote:
>> On Fri, 07 Aug, at 11:00:17AM, Ard Biesheuvel wrote:
>>>
>>> The EFI memory types are not exclusive, and so many regions will have
>>> all of the above set. The UEFI spec does not define how to interpret
>>> these superimposed attributes, it is up to the OS to decide on a
>>> consistent approach.
>>>
>>> For instance, this region (captured from a arm64 boot log with
>>> uefi_debug set on the command line)
>>>
>>> [Runtime Data       |RUN|  |  |  |   |WB|WT|WC|UC]
>>>
>>> would be mapped uncached when following the above logic, while it
>>> makes more sense to map using PAGE_KERNEL in this case.
>>
>> Urgh... good point Ard. Right now this is limited to the GHES driver, so
>> it's unclear whether this patch is buggy in practice or not.
>>
>> Does it *ever* make sense to map a region as cacheable (WB/WT/WC) on
>> arm64 for the APEI/GHES case? Does the firmware handle the necessary
>> cache flushing?
>>
>
> No it does not. Currently, we only consider EFI_MEMORY_WB when
> discovering system RAM from the UEFI memory map, so the direct linear
> mapping should have a hole where the APEI/GHES regions lives if it
> doesn't have the WB attribute set. This means we can map it WT/WC/UC
> without violating architectural rules regarding mismatches attributes,
> but it requires an explicit ioremap()
On some (future) arm64 platforms, APEI/GHES region may have full
coherent access by platform. In such case, the APEI/GHES region have
the same memory attributes as the rest of system RAM, such region
do not need to be advised by UEFI as separate entry, but as part of
system RAM memory region.
That being said, for arm64 platforms that do not have WB capability
for APEI/GHES region, such region should be mapped accordingly.
>
>>>  From the spec:
>>>
>>> """
>>> EFI_MEMORY_UC: The memory region supports being configured as not cacheable.
>>> EFI_MEMORY_WC: The memory region supports being configured as write combining.
>>> EFI_MEMORY_WT: The memory region supports being configured as
>>> cacheable with a “write through” policy. Writes that hit in the cache
>>> will also be written to main memory.
>>> EFI_MEMORY_WB: The memory region supports being configured as
>>> cacheable with a “write back” policy. Reads and writes that hit in the
>>> cache do not propagate to main memory. Dirty data is written back to
>>> main memory when a new cache line is allocated.
>>> """
>>
>> Jonathan, can you please provide the EFI memory map region attributes
>> for the GHES region that requires this series?
[Reserved           |   |  |  |  |   |  |  |  |UC]

>>
>> --
>> Matt Fleming, Intel Open Source Technology Center

-- 
Jonathan (Zhixiong) Zhang
The Qualcomm Innovation Center, Inc. is a member of the Code Aurora Forum,
a Linux Foundation Collaborative Project
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ