Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp1357209rwb; Mon, 7 Nov 2022 00:15:18 -0800 (PST) X-Google-Smtp-Source: AMsMyM4IjoDbHAPUMu5pBknCOjpiHjKQIBGPmVu80AmZLFs/khiBuLCe3/OAQuld2tbbqSy5qC94 X-Received: by 2002:a17:902:9a8b:b0:17a:455:d967 with SMTP id w11-20020a1709029a8b00b0017a0455d967mr48413497plp.52.1667808918119; Mon, 07 Nov 2022 00:15:18 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1667808918; cv=none; d=google.com; s=arc-20160816; b=bcQVVgFIsas6x/mb8r0WtElnUP+QhBS1UCEeTjCISFTd7tiHAlfV6abXQ7dOnhd/dY bGBCoHWW3+3JwpPMJfcYCc8HUEF8Lxqk0E/yPdwPAZF+zpHSJUz37GHMTZ+Opa2Ea3R8 pL8UB3ZmG5jUNskbNTdmkcbQ/pOGAvynQwR7AABD9oVKGl/ZtXbLC2bXdQJPKlWQCctl uajt/l14Bwmdt+tbDVNForSs8esJMx56Wr4RrpJ1Ic7S7MXdRuBwxvry0W5B4PiKQjSf eDXOj/g44F3zkJ/8Aph+zK1NShmUSKFyp36aR1FJDKVUU61THs1ZCULdS43LjvfJc6A7 3r8A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=xkjAKYc9FXb8vAKFUk+ZLuky94BRi1m+VajvOgs9/zk=; b=x55YLdoNDmZU3407/SaTu534vi9Rq2zgWrHDAXGHC/mQIaduxSF2vwPCtE0vyUFX7r 4RTSKedgVunDuWhRxeSInR7p4AJdxU15AR0fjRJr6wVKoQQMTwQUPon/bZGBmxh3PFeW /eZUYq4qkgeT0W4k5nIWiRzxMNjd4BcllivHJ5z9bBTsBOipgiy/t6cRP8hXLHIhJKMR Jldra5bkajchcVAqNpSx6RUTYSchWxBm+dbvuKXOnQ+gNyLg3ACrClUQo9RJu8cIVtXI YF/9wD1e6DoKMaTJV6v3H+8acdTGzR4HLg4DQQrm/MgvTRHoNBz2iX3JMTjgztY+0Y7+ IDIw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=HIcK9a54; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id o8-20020a170902d4c800b0017841de491fsi11440701plg.361.2022.11.07.00.15.06; Mon, 07 Nov 2022 00:15:18 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=HIcK9a54; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231481AbiKGIKR (ORCPT + 95 others); Mon, 7 Nov 2022 03:10:17 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:58414 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230239AbiKGIKP (ORCPT ); Mon, 7 Nov 2022 03:10:15 -0500 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 4531413F5E for ; Mon, 7 Nov 2022 00:09:16 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1667808555; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=xkjAKYc9FXb8vAKFUk+ZLuky94BRi1m+VajvOgs9/zk=; b=HIcK9a54NA6bNl3RA7+RX3YCVc8uHk3or8HFSx54TApcz36iAH5SjPQP7X11YnVGKDuGt/ SdRYktHI/oIpFqa+iQo0Vy8Je66pO9IGYiIW4O+S6ZrWz5kPc+mvbyrJOnYjnh7LiefZfh pjpIcnJk74p/xSMxAmOhiS/XqhDZeAs= Received: from mail-ed1-f71.google.com (mail-ed1-f71.google.com [209.85.208.71]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_128_GCM_SHA256) id us-mta-658-TXqeKo-zP_aioF-1Mk1VyA-1; Mon, 07 Nov 2022 03:09:14 -0500 X-MC-Unique: TXqeKo-zP_aioF-1Mk1VyA-1 Received: by mail-ed1-f71.google.com with SMTP id h9-20020a05640250c900b00461d8ee12e2so7832073edb.23 for ; Mon, 07 Nov 2022 00:09:13 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=xkjAKYc9FXb8vAKFUk+ZLuky94BRi1m+VajvOgs9/zk=; b=eLr7X04AoN5z1bsfHgO7fhTXFcl20Oz9R5k9j1rhwhi1fBsiBRW9oUQXaqVo+6jmp9 n2G9pJL4L7CEMPTJPa/vl+PAceVFbCVkzAGOBc99l+7U5jfZyucE6bit0JEk+Xn3+GlV dRaoOnkRYBZa2LfFeZScrW3Y8LcShkwR3G+EEw8Y7YCDK6FqU6/D/1EnTzVEtBoq+Z7m TkYEwAV1+omwwz+oqAFx/tEubMqocbpWV/0Qvrsprbq4c+R0G46B/HbkKunJpKmdMXGj RHmubkOM5DhN3DjRDjxy2LTrylaHuQ+9eE2DFuWW21n4FWayMgUaQxcCMJQZHMKlKkOH l6CQ== X-Gm-Message-State: ANoB5pk9qCPT7YDO/OL5zFgvp13ce3HRmNBaGV+BJ3PdpUFCJk0QooYU iPl7EaEp1NvRHOpCGU49AkdmQDSiqHj1Ps6DCsrqZNctLBqSzfCncLGojubsdo4sedcocj6RaZz jM2PR2YIFvKVlqu901TuWZwIZrsRbuTUFilvpc6/G X-Received: by 2002:a17:906:3ada:b0:7ae:566e:3a1c with SMTP id z26-20020a1709063ada00b007ae566e3a1cmr8476266ejd.223.1667808552869; Mon, 07 Nov 2022 00:09:12 -0800 (PST) X-Received: by 2002:a17:906:3ada:b0:7ae:566e:3a1c with SMTP id z26-20020a1709063ada00b007ae566e3a1cmr8476241ejd.223.1667808552587; Mon, 07 Nov 2022 00:09:12 -0800 (PST) MIME-Version: 1.0 References: <3acf1cc7a974cb4fb9b77b39311c6714@tfwno.gf> <2f43e1e583a92e1592c48a15a763e1f7@tfwno.gf> In-Reply-To: From: Dave Young Date: Mon, 7 Nov 2022 16:08:34 +0800 Message-ID: Subject: Re: Bug: kexec on Lenovo ThinkPad T480 disables EFI mode To: Ard Biesheuvel Cc: ns@tfwno.gf, Baoquan He , Eric Biederman , kexec@lists.infradead.org, linux-kernel@vger.kernel.org, linux-efi@vger.kernel.org Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, RCVD_IN_MSPIKE_H2,SPF_HELO_NONE,SPF_NONE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, 7 Nov 2022 at 15:55, Ard Biesheuvel wrote: > > On Mon, 7 Nov 2022 at 08:40, Dave Young wrote: > > > > On Mon, 7 Nov 2022 at 15:36, Dave Young wrote: > > > > > > Hi Ard, > > > > > > On Mon, 7 Nov 2022 at 15:30, Ard Biesheuvel wrote: > > > > > > > > On Mon, 7 Nov 2022 at 07:55, Dave Young wrote: > > > > > > > > > > Hi, > > > > > > > > > > On Sat, 5 Nov 2022 at 22:16, wrote: > > > > > > > > > > > > On 2022-11-05 05:49, Dave Young wrote: > > > > > > > Baoquan, thanks for cc me. > > > > > > > > > > > > > > On Sat, 5 Nov 2022 at 11:10, Baoquan He wrote: > > > > > > >> > > > > > > >> Add Dave to CC > > > > > > >> > > > > > > >> On 10/28/22 at 01:02pm, ns@tfwno.gf wrote: > > > > > > >> > Greetings, > > > > > > >> > > > > > > > >> > I've been hitting a bug on my Lenovo ThinkPad T480 where kexecing will > > > > > > >> > cause EFI mode (if that's the right term for it) to be unconditionally > > > > > > >> > disabled, even when not using the --noefi option to kexec. > > > > > > >> > > > > > > > >> > What I mean by "EFI mode" being disabled, more than just EFI runtime > > > > > > >> > services, is that basically nothing about the system's EFI is visible > > > > > > >> > post-kexec. Normally you have a message like this in dmesg when the > > > > > > >> > system is booted in EFI mode: > > > > > > >> > > > > > > > >> > [ 0.000000] efi: EFI v2.70 by EDK II > > > > > > >> > [ 0.000000] efi: SMBIOS=0x7f98a000 ACPI=0x7fb7e000 ACPI 2.0=0x7fb7e014 > > > > > > >> > MEMATTR=0x7ec63018 > > > > > > >> > (obviously not the real firmware of the machine I'm talking about, but I > > > > > > >> > can also send that if it would be of any help) > > > > > > >> > > > > > > > >> > No such message pops up in my dmesg as a result of this bug, & this > > > > > > >> > causes some fallout like being unable to find the system's DMI > > > > > > >> > information: > > > > > > >> > > > > > > > >> > <6>[ 0.000000] DMI not present or invalid. > > > > > > >> > > > > > > > >> > The efivarfs module also fails to load with -ENODEV. > > > > > > >> > > > > > > > >> > I've tried also booting with efi=runtime explicitly but it doesn't > > > > > > >> > change anything. The kernel still does not print the name of the EFI > > > > > > >> > firmware, DMI is still missing, & efivarfs still fails to load. > > > > > > >> > > > > > > > >> > I've been using the kexec_load syscall for all these tests, if it's > > > > > > >> > important. > > > > > > >> > > > > > > > >> > Also, to make it very clear, all this only ever happens post-kexec. When > > > > > > >> > booting straight from UEFI (with the EFI stub), all the aforementioned > > > > > > >> > stuff that fails works perfectly fine (i.e. name of firmware is printed, > > > > > > >> > DMI is properly found, & efivarfs loads & mounts just fine). > > > > > > >> > > > > > > > >> > This is reproducible with a vanilla 6.1-rc2 kernel. I've been trying to > > > > > > >> > bisect it, but it seems like it goes pretty far back. I've got vanilla > > > > > > >> > mainline kernel builds dating back to 5.17 that have the exact same > > > > > > >> > issue. It might be worth noting that during this testing, I made sure > > > > > > >> > the version of the kernel being kexeced & the kernel kexecing were the > > > > > > >> > same version. It may not have been a problem in older kernels, but that > > > > > > >> > would be difficult to test for me (a pretty important driver for this > > > > > > >> > machine was only merged during v5.17-rc4). So it may not have been a > > > > > > >> > regression & just a hidden problem since time immemorial. > > > > > > >> > > > > > > > >> > I am willing to test any patches I may get to further debug or fix > > > > > > >> > this issue, preferably based on the current state of torvalds/linux.git. > > > > > > >> > I can build & test kernels quite a few times per day. > > > > > > >> > > > > > > > >> > I can also send any important materials (kernel config, dmesg, firmware > > > > > > >> > information, so on & so forth) on request. I'll also just mention I'm > > > > > > >> > using kexec-tools 2.0.24 upfront, if it matters. > > > > > > > > > > > > > > Can you check the efi runtime in sysfs: > > > > > > > ls /sys/firmware/efi/runtime-map/ > > > > > > > > > > > > > > If nothing then maybe you did not enable CONFIG_EFI_RUNTIME_MAP=y, it > > > > > > > is needed for kexec UEFI boot on x86_64. > > > > > > > > > > > > Oh my, it really is that simple. > > > > > > > > > > > > Indeed, enabling this in the pre-kexec kernel fixes it all up. I had > > > > > > blindly disabled it in my quest to downsize the pre-kexec kernel to > > > > > > reduce boot time (it only runs a bootloader). In hindsight, the firmware > > > > > > drivers section is not really a good section to tweak on a whim. > > > > > > > > > > > > I'm terribly sorry to have taken your time to "fix" this "bug". But I > > > > > > must ask, is there any reason why this is a visible config option, or at > > > > > > least not gated behind CONFIG_EXPERT? drivers/firmware/efi/runtime-map.c > > > > > > is pretty tiny, & considering it depends on CONFIG_KEXEC_CORE, one > > > > > > probably wants to have kexec work properly if they can even enable it. > > > > > > > > > > Glad to know it works with the .config tweaking. I can not recall any > > > > > reason for that though. > > > > > > > > > > Since it sits in the efi code path, let's see how Ard thinks about > > > > > your proposal. > > > > > > > > > > > > > I don't understand why EFI_RUNTIME_MAP should depend on KEXEC_CORE at > > > > all: it is documented as a feature that can be enabled for debugging > > > > as well, and kexec does not work as expected without it. > > > > > > Probably debugging only mentioned in text, but not been considered in > > > the kconfig logic :( > > > > > > > > > > > Should we just change it like this perhaps? > > > > > > > > --- a/drivers/firmware/efi/Kconfig > > > > +++ b/drivers/firmware/efi/Kconfig > > > > @@ -28,8 +28,8 @@ config EFI_VARS_PSTORE_DEFAULT_DISABLE > > > > > > > > config EFI_RUNTIME_MAP > > > > bool "Export efi runtime maps to sysfs" > > > > - depends on X86 && EFI && KEXEC_CORE > > > > - default y > > > > + depends on X86 && EFI > > > > + default KEXEC_CORE > > > > help > > > > > > > > and maybe add an 'if EXPERT' so that the option is only visible to > > > > modify when CONFIG_EXPERT=y ? > > > > > > Above changes look good to me. > > > > > > > > > > > In any case, I intend to move this code into arch/x86 as well, so I'll > > > > have a couple of patches out shortly. > > > > > > That would be better since it is X86 only. Thanks, Ard. > > > > Hmm, before doing that, do you think it is useful for debugging > > purposes? That could be a reason to sit in efi code instead of x86 .. > > > > This code was only ever enabled on x86, and on ARM/arm64, we can > capture the memory map via efi=debug on any kernel build, and capture > the virtual mappings using PTDUMP (which also gives us the exact > attributes for each mapped region) > > So I don't think it has that much value on non-x86 tbh. Ok, fair enough. Thanks Dave