Received: by 2002:a25:d7c1:0:0:0:0:0 with SMTP id o184csp746166ybg; Wed, 23 Oct 2019 05:24:26 -0700 (PDT) X-Google-Smtp-Source: APXvYqy631M9EJWvTul7OZAgiabc1eHG2FyGl19WFpyidafHNao+H2oCb5x4EMyMNjr6rbSDofiy X-Received: by 2002:aa7:da4f:: with SMTP id w15mr36845284eds.26.1571833466741; Wed, 23 Oct 2019 05:24:26 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1571833466; cv=none; d=google.com; s=arc-20160816; b=QMPyn2/OFCUrVwbPpSjJMpmtvWu57Rlxlk3EHhM4jiYcRyEQubrtrNvA6TPNyCNn6+ 3n8/w0LPt+zaqQud+YQdNiz3y8k3tqaHZiN5w5WLDRWIsfhXBKu76cZH1wns5sVP8gVN stU+MRSd6p08jmsGmiigxuP0fBnb9gpU1lckkd5osDcVbZIWNKu0mevmMR6ugOralahA 9kv4/lp4CkaeuHSUta7Gz3PLZfFjsEj0ZMvs80KDiKM6g26tPy7ykRVW13OQL8hbJ496 UGjDwa2j2yfxYY9xrI2qeevTLB7MzDNbjOyHBippHlqvUNmy6z+4OLZt4Ifpgas/5J+I 1LXg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:dkim-signature; bh=PPe1IRBOsH2BR4FF+8mJN3mzcvJtrOdn5If1ErhhvOc=; b=U8T6yxkZ2+B9PprOtTTyj6CZffyn1+iCCItoV+b9D6cf6YG4uIE9o/svADG/8LNC0h S9dSepNntuMTCO9eLOLm0Jyoz2YLk3uRU2gRbNfqlpZWEhAQsWYW2lNtdhNMKwYHUPYP /j/j6c9pC1T47K13v+DgWcd2I8jG+2wKJcU17XTba3uUl9N53GN9sJsC0sO3ULi7t+sH DevaRGmx2BAN6YXIphr44qON38Lsw+wdmxvEOeN72O65mqw5p0PvwDSLy226IVtqwAvG a4QspFskubRDMZs13+FtLiqZ11S5rCGST9etRn+H8ZB9R0NCqcUSM1ZCBg4GAc7G9mRv U+8g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=R0dWjVDV; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id rk6si12646538ejb.129.2019.10.23.05.24.02; Wed, 23 Oct 2019 05:24:26 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=R0dWjVDV; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727154AbfJWFfg (ORCPT + 99 others); Wed, 23 Oct 2019 01:35:36 -0400 Received: from us-smtp-1.mimecast.com ([205.139.110.61]:24467 "EHLO us-smtp-delivery-1.mimecast.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1725775AbfJWFfg (ORCPT ); Wed, 23 Oct 2019 01:35:36 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1571808935; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=PPe1IRBOsH2BR4FF+8mJN3mzcvJtrOdn5If1ErhhvOc=; b=R0dWjVDVUL6B2/tV17ZeZ2VIaX/tolwRacf2D8PF2afyU1QUkpPPG3GWy5xtLjK2trjCsz aZrLHrVVxCkjcObyAx3UOj/BONI9MQKRKbNMEBtqaO9s08SERpisVnBZ6ByRWX3ldjeTKs oz8bopp85lLm9a57eA8kipwzrUAVR9A= Received: from mimecast-mx01.redhat.com (mimecast-mx01.redhat.com [209.132.183.4]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-354-LK_5z2xoMhi396xlherLOg-1; Wed, 23 Oct 2019 01:35:31 -0400 Received: from smtp.corp.redhat.com (int-mx07.intmail.prod.int.phx2.redhat.com [10.5.11.22]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx01.redhat.com (Postfix) with ESMTPS id 388B91005500; Wed, 23 Oct 2019 05:35:30 +0000 (UTC) Received: from localhost.localdomain (ovpn-12-33.pek2.redhat.com [10.72.12.33]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 47780100164D; Wed, 23 Oct 2019 05:35:14 +0000 (UTC) Subject: Re: [PATCH 1/3 v4] x86/kdump: always reserve the low 1MiB when the crashkernel option is specified To: Borislav Petkov Cc: linux-kernel@vger.kernel.org, tglx@linutronix.de, mingo@redhat.com, hpa@zytor.com, x86@kernel.org, bhe@redhat.com, dyoung@redhat.com, jgross@suse.com, dhowells@redhat.com, Thomas.Lendacky@amd.com, ebiederm@xmission.com, vgoyal@redhat.com, kexec@lists.infradead.org References: <20191017094347.20327-1-lijiang@redhat.com> <20191017094347.20327-2-lijiang@redhat.com> <20191022083015.GB31700@zn.tnic> From: lijiang Message-ID: <75648e8d-4ef7-0537-618e-e4a57f0d3b9b@redhat.com> Date: Wed, 23 Oct 2019 13:35:09 +0800 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.9.1 MIME-Version: 1.0 In-Reply-To: <20191022083015.GB31700@zn.tnic> Content-Language: en-US X-Scanned-By: MIMEDefang 2.84 on 10.5.11.22 X-MC-Unique: LK_5z2xoMhi396xlherLOg-1 X-Mimecast-Spam-Score: 0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org =E5=9C=A8 2019=E5=B9=B410=E6=9C=8822=E6=97=A5 16:30, Borislav Petkov =E5=86= =99=E9=81=93: > This ifdeffery needs to be a function in kernel/kexec_core.c which is > called by reserve_real_mode(), instead. Would you mind if i improve this patch as follow? Thanks. From 5804abec62279585f374d78ace1250505c44c6b7 Mon Sep 17 00:00:00 2001 From: Lianbo Jiang Date: Wed, 23 Oct 2019 11:27:04 +0800 Subject: [PATCH] x86/kdump: always reserve the low 1MiB when the crashkerne= l option is specified Kdump kernel will reuse the first 640k region because the real mode trampoline has to work in this area. When the vmcore is dumped, the old memory in this area may be accessed, therefore, kernel has to copy the contents of the first 640k area to a backup region so that kdump kernel can read the old memory from the backup area of the first 640k area, which is done in the purgatory(). But, the current handling of copying the first 640k area runs into problems when SME is enabled, kernel does not properly copy these old memory to the backup area in the purgatory(), thereby, kdump kernel reads out the encrypted contents, because the kdump kernel must access the first kernel's memory with the encryption bit set when SME is enabled in the first kernel. Please refer to this link: Bugzilla: https://bugzilla.kernel.org/show_bug.cgi?id=3D204793 Finally, it causes the following errors, and the crash tool gets invalid pointers when parsing the vmcore. crash> kmem -s|grep -i invalid kmem: dma-kmalloc-512: slab:ffffd77680001c00 invalid freepointer:a6086ac099= f0c5a4 kmem: dma-kmalloc-512: slab:ffffd77680001c00 invalid freepointer:a6086ac099= f0c5a4 crash> To avoid the above errors, when the crashkernel option is specified, lets reserve the remaining low 1MiB memory(after reserving real mode memory) so that the allocated memory does not fall into the low 1MiB area, which makes us not to copy the first 640k content to a backup region in purgatory(). This indicates that it does not need to be included in crash dumps or used for anything except the processor trampolines that must live in the low 1MiB. Signed-off-by: Lianbo Jiang --- BTW:I also tried to fix the above problem in purgatory(), but there are too many restricts in purgatory() context, for example: i can't allocate new memory to create the identity mapping page table for SME situation. Currently, there are two places where the first 640k area is needed, the first one is in the find_trampoline_placement(), another one is in the reserve_real_mode(), and their content doesn't matter. In addition, also need to clean all the code related to the backup region later. arch/x86/realmode/init.c | 2 ++ include/linux/kexec.h | 2 ++ kernel/kexec_core.c | 13 +++++++++++++ 3 files changed, 17 insertions(+) diff --git a/arch/x86/realmode/init.c b/arch/x86/realmode/init.c index 7dce39c8c034..064cc79a015d 100644 --- a/arch/x86/realmode/init.c +++ b/arch/x86/realmode/init.c @@ -3,6 +3,7 @@ #include #include #include +#include =20 #include #include @@ -34,6 +35,7 @@ void __init reserve_real_mode(void) =20 =09memblock_reserve(mem, size); =09set_real_mode_mem(mem); +=09kexec_reserve_low_1MiB(); } =20 static void __init setup_real_mode(void) diff --git a/include/linux/kexec.h b/include/linux/kexec.h index 1776eb2e43a4..30acf1d738bc 100644 --- a/include/linux/kexec.h +++ b/include/linux/kexec.h @@ -306,6 +306,7 @@ extern void __crash_kexec(struct pt_regs *); extern void crash_kexec(struct pt_regs *); int kexec_should_crash(struct task_struct *); int kexec_crash_loaded(void); +void kexec_reserve_low_1MiB(void); void crash_save_cpu(struct pt_regs *regs, int cpu); extern int kimage_crash_copy_vmcoreinfo(struct kimage *image); =20 @@ -397,6 +398,7 @@ static inline void __crash_kexec(struct pt_regs *regs) = { } static inline void crash_kexec(struct pt_regs *regs) { } static inline int kexec_should_crash(struct task_struct *p) { return 0; } static inline int kexec_crash_loaded(void) { return 0; } +static inline void kexec_reserve_low_1MiB(void) { } #define kexec_in_progress false #endif /* CONFIG_KEXEC_CORE */ =20 diff --git a/kernel/kexec_core.c b/kernel/kexec_core.c index 15d70a90b50d..5bd89f1fee42 100644 --- a/kernel/kexec_core.c +++ b/kernel/kexec_core.c @@ -37,6 +37,7 @@ #include #include #include +#include =20 #include #include @@ -70,6 +71,18 @@ struct resource crashk_low_res =3D { =09.desc =3D IORES_DESC_CRASH_KERNEL }; =20 +/* + * When the crashkernel option is specified, only use the low + * 1MiB for the real mode trampoline. + */ +void kexec_reserve_low_1MiB(void) +{ +=09if (strstr(boot_command_line, "crashkernel=3D")) { +=09=09memblock_reserve(0, 1<<20); +=09=09pr_info("Reserving the low 1MiB of memory for crashkernel\n"); +=09} +} + int kexec_should_crash(struct task_struct *p) { =09/* --=20 2.17.1