Received: by 2002:ab2:6857:0:b0:1ef:ffd0:ce49 with SMTP id l23csp779999lqp; Thu, 21 Mar 2024 15:48:29 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCVo/sW7uyzY2Jtt6BHsQ//0EOYgCieWxFHETvHAajqm/HtD2ZELnBuLp6KLCbPXPIFZyVoolX5HzX+9S6CJLymW8m1rkJRGRO+jRsPXIg== X-Google-Smtp-Source: AGHT+IE1G/HpvB2mlwp0tFvXuyIWNIfApCeHk3HuuLVSQA2ttLH0BVSvgUVtcZC/nl7rqVMdAO+X X-Received: by 2002:a05:6870:2251:b0:221:2e07:3d66 with SMTP id j17-20020a056870225100b002212e073d66mr626506oaf.10.1711061309556; Thu, 21 Mar 2024 15:48:29 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1711061309; cv=pass; d=google.com; s=arc-20160816; b=UshrjObdgzH3Db53yQFSgQDHyNuOIlr6VTZUpAO9uUW9rLRvWir8SjIgB+ZkYI6MDZ Xs6EW6pNJ4uw+7ibus67ObaJcnEdcbSvxq2y8pL1XKQXDZYvxmfWiK2NQ/SlV9V3ESiK vWgQ+NMxn4/eYig5jEw0VedQt2u2TVmQELqEZDtwbCCAK3GUZMQIqjT1kqzAMG7/phL+ SbiOBshXGTEVlMLamlNAkClhrAYAxSf2q9Ob40zy34YwE1KoojEvJ7+9+uAbbQvIqUsp RFMAaiFL+iatfB28nsN3IK+LO/rF5EvPDwBrJ7vdte/c0/KJVfaAltzTT1mvtsCB+4/Q DcwA== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:list-unsubscribe:list-subscribe:list-id:precedence :dkim-signature; bh=29a5EAjDdjroLYQOMy2DSYLa2sFp/kl0Nu6TAA1am6U=; fh=H8Is0cM1XbwOPjyBLw+hniLNsLE71CInF6rFf3oj47k=; b=QQpEQbst5Mh5pLddi8RCwR2Bp8cisiqgOw6Ds72p7soaZSErRueeRfqyv6CRQ8a0Iy JS1W7gVJlkSX0XoJG/AMXAtkLzsp2zE4dqqOxNsNREvaDc3e/6NF6nTKeIYPLum0mOez aAu3g3VXNb7nKNU0WUhPRUuiRG7pzztgl4pW1AUVQGH7iV3busOUS8BQQq/oiCEVX0RT g24ONZ8lRrB07q5aHOp/pQo2PI/OepXKNkEM0IEKF3D0Mrkt5q0rSXqliDYDTaWjQ+1Y 7kuBFO2rjAhw8R5CI00hX5TAS5vD3po9wxTo2ktNVNOJgxoKnStOGQ+6vo9u68Y3lq/X ERgg==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=V9kUQWHU; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-kernel+bounces-110772-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-110772-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from sv.mirrors.kernel.org (sv.mirrors.kernel.org. [2604:1380:45e3:2400::1]) by mx.google.com with ESMTPS id fb11-20020a056a002d8b00b006e6c71e1d33si626487pfb.165.2024.03.21.15.48.29 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 21 Mar 2024 15:48:29 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-110772-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) client-ip=2604:1380:45e3:2400::1; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=V9kUQWHU; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-kernel+bounces-110772-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-110772-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sv.mirrors.kernel.org (Postfix) with ESMTPS id 85B6C284270 for ; Thu, 21 Mar 2024 22:48:26 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 21E4579FE; Thu, 21 Mar 2024 22:48:23 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="V9kUQWHU" Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 449DC522F; Thu, 21 Mar 2024 22:48:22 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1711061302; cv=none; b=V4SJGonnk1AuXYDXOwm55eDRQ3H/44cpHfWjylweQFUASIrU/UoyDhlIRLZ4CGfBwoCNRD3e7FLW3w+SYuJslFfXtE77Wk2vsXg61rZG+8YlSZ0HNobcazJX1ZrEsP+rjlZncs/8bf5LihZn9jXpzzVt52Fv9PllGZfPRtfPNhg= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1711061302; c=relaxed/simple; bh=8kZQaLxa0VikRd55GghvL73ntNDipBA2PLPwjJcF8O0=; h=MIME-Version:References:In-Reply-To:From:Date:Message-ID:Subject: To:Cc:Content-Type; b=sNDcfr7KQXdLFi0eqcKIFcNN25YHaeNCE5+PePqHF6wF/XdscVl6wHl02gTzzX181M4senUVu6s22uI7+7lnflP5WByHniMDVk4m3Eb/EmjCf/2idMGo80FUF40SuLILM55CFIS/yGwTEnieswDUw4UaeSqa6Azt1gp+7wmRymk= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=V9kUQWHU; arc=none smtp.client-ip=10.30.226.201 Received: by smtp.kernel.org (Postfix) with ESMTPSA id F3562C433B2; Thu, 21 Mar 2024 22:48:21 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1711061302; bh=8kZQaLxa0VikRd55GghvL73ntNDipBA2PLPwjJcF8O0=; h=References:In-Reply-To:From:Date:Subject:To:Cc:From; b=V9kUQWHUKrAxIDxKddw6QS53ZHLQ6X5EYKqO5x7O1t7DEKuxHMXMh6JCkM2F4qCts YdIRzCqNRpMqefFTHj/9fTlxvASCuXh0Ayg0j5XHlF/OpKZUmsyPogMln+W0aLVa5d SQVQZg2SXI834AJTH97UhGNjxCCUx9vZa9PXldDWMhimfumYd4qqF4aofD0QocHC7P KlRHApAQFTB2VVaNbBTOfxM84xa8antNJDqyK9YAhr/bXAQis24xj0NpgKcI34Uma7 r6iOdFrjEY6GOaYXwt/31XSHvMMWOt5asDXifnesPwqoY4QLTjazUsnVlJEXaCzHo3 VgbaYExkvtApA== Received: by mail-lj1-f174.google.com with SMTP id 38308e7fff4ca-2d68cf90ec4so25318461fa.1; Thu, 21 Mar 2024 15:48:21 -0700 (PDT) X-Forwarded-Encrypted: i=1; AJvYcCX4HOHp7pO3kVcCSO3gu4BKNUSCqA5YTgb9cec7ejfyPRwsTQJngIMIZKcj+Mj9hSHKUKdxtWTXEId6P6w6RNCbdIqYVCUYXZhzCSHjC0jeokAOY94sClmSygUKYaqiUyUWwQfHgdSF X-Gm-Message-State: AOJu0YzSkW6RNCbv/u/OUD+CA2f3NotT3y8+iJgWc6AVtkdeUqo5g9pJ 6n7w4sNZcV9uSrg0wmMaeq9MA/BVmWSLk/+FUufVMLFRvvmqfbFDtLfU1nOFP16V8zAmfxWGurX 0KDPbS5UrfdvvioWZDMPNgtO+Ql0= X-Received: by 2002:a05:6512:34c4:b0:515:940f:b7af with SMTP id w4-20020a05651234c400b00515940fb7afmr391674lfr.52.1711061300349; Thu, 21 Mar 2024 15:48:20 -0700 (PDT) Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 References: <20240321150510.GI8211@craftyguy.net> In-Reply-To: <20240321150510.GI8211@craftyguy.net> From: Ard Biesheuvel Date: Thu, 21 Mar 2024 23:48:09 +0100 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: x86_64 32-bit EFI mixed mode boot broken To: Clayton Craft , Hans de Goede Cc: x86@kernel.org, linux-kernel@vger.kernel.org, linux-efi@vger.kernel.org, Thomas Gleixner , Ingo Molnar , Borislav Petkov , Dave Hansen , regressions@lists.linux.dev Content-Type: text/plain; charset="UTF-8" (cc Hans) On Thu, 21 Mar 2024 at 23:05, Clayton Craft wrote: > > I've been chasing a problem with 32-bit EFI mixed mode booting on two different > (x86_64) Intel Bay Trail platforms, where the system reboots or hangs seemingly > very early somewhere before or after loading the kernel. I've not been able to > get any output from the kernel or stub over efifb when the issue happens[0], and > do not have serial console access on these systems. > > v6.8 fails for me, and presumably so does everything back to v6.2. v6.1 is able > to boot OK on these platforms with mixed mode, and it looks like there are a lot > of changes from 6.1..6.2 for EFI/mixed mode booting. v6.1 just received some EFI related backports, so please check the latest v6.1.y as well. > I did managed to bisect the > issue to: > > commit e2ab9eab324cdf240de89741e4a1aa79919f0196 > Author: Ard Biesheuvel > Date: Tue Nov 22 17:10:02 2022 +0100 > > x86/boot/compressed: Move 32-bit entrypoint code into .text section > > However I'm not sure how to proceed from here, or if my bisect is all that > useful since the commit seems to be in the middle of a bunch of changes I do not > understand. I've been using systemd-boot to test this (both the full bootloader > and UKI w/ the sd-boot stub). Is 32-bit mixed mode on x86_64 working for others? > I usually test on 32-bit OVMF built with LOAD_X64_ON_IA32_ENABLE, which allows the use of the compat entry point. This is different from the EFI handover protocol, and I am not sure which one you are using. I have never had any reports, or noticed any issues myself. Last time I tried (some weeks ago) it was working for me. CC'ing Hans who may have more data points.