* [PATCH] x86/boot: Fix kexec booting failure after SEV early boot support
@ 2018-09-25 11:10 ` Kairui Song
0 siblings, 0 replies; 22+ messages in thread
From: Kairui Song @ 2018-09-25 11:10 UTC (permalink / raw)
To: linux-kernel
Cc: tglx, mingo, hpa, x86, thomas.lendacky, brijesh.singh, bp,
kasong, kexec, dyoung
Commit 1958b5fc4010 ("x86/boot: Add early boot support when running
with SEV active") is causing kexec becomes sometimes unstable, kexec
reboot won't start a second kernel bypassing BIOS boot process, instead,
the system got reset.
That's because, in get_sev_encryption_bit function, we are using
32-bit RIP-relative addressing to read the value of enc_bit, but
kexec may alloc the early boot up code to a higher location, which
is beyond 32-bit addressing limit. Some garbage will be read and
get_sev_encryption_bit will return the wrong value, which lead to
wrong memory page flag.
This patch adds a get_sev_encryption_bit_64 function to avoid this
problem. 64-bit early boot code will use this function instead, it
uses native RIP addressing to read the enc_bit which have no problem
with any location.
Fixes: 1958b5fc4010 ("x86/boot: Add early boot support when running with SEV active")
Signed-off-by: Kairui Song <kasong@redhat.com>
---
arch/x86/boot/compressed/mem_encrypt.S | 64 ++++++++++++++++++--------
1 file changed, 45 insertions(+), 19 deletions(-)
diff --git a/arch/x86/boot/compressed/mem_encrypt.S b/arch/x86/boot/compressed/mem_encrypt.S
index eaa843a52907..41933550449a 100644
--- a/arch/x86/boot/compressed/mem_encrypt.S
+++ b/arch/x86/boot/compressed/mem_encrypt.S
@@ -18,27 +18,13 @@
.text
.code32
-ENTRY(get_sev_encryption_bit)
+do_get_sev_encryption_bit:
xor %eax, %eax
#ifdef CONFIG_AMD_MEM_ENCRYPT
push %ebx
push %ecx
push %edx
- push %edi
-
- /*
- * RIP-relative addressing is needed to access the encryption bit
- * variable. Since we are running in 32-bit mode we need this call/pop
- * sequence to get the proper relative addressing.
- */
- call 1f
-1: popl %edi
- subl $1b, %edi
-
- movl enc_bit(%edi), %eax
- cmpl $0, %eax
- jge .Lsev_exit
/* Check if running under a hypervisor */
movl $1, %eax
@@ -69,25 +55,65 @@ ENTRY(get_sev_encryption_bit)
movl %ebx, %eax
andl $0x3f, %eax /* Return the encryption bit location */
- movl %eax, enc_bit(%edi)
jmp .Lsev_exit
.Lno_sev:
xor %eax, %eax
- movl %eax, enc_bit(%edi)
.Lsev_exit:
- pop %edi
pop %edx
pop %ecx
pop %ebx
+#endif /* CONFIG_AMD_MEM_ENCRYPT */
+
+ ret
+
+ENTRY(get_sev_encryption_bit)
+ xor %eax, %eax
+
+#ifdef CONFIG_AMD_MEM_ENCRYPT
+ push %edi
+
+ /*
+ * RIP-relative addressing is needed to access the encryption bit
+ * variable. Since we are running in 32-bit mode we need this call/pop
+ * sequence to get the proper relative addressing.
+ */
+ call 1f
+1: popl %edi
+ subl $1b, %edi
+
+ movl enc_bit(%edi), %eax
+ cmpl $0, %eax
+ jge 2f
+
+ call do_get_sev_encryption_bit
+ movl %eax, enc_bit(%edi)
+2:
+ pop %edi
#endif /* CONFIG_AMD_MEM_ENCRYPT */
ret
ENDPROC(get_sev_encryption_bit)
.code64
+ENTRY(get_sev_encryption_bit_64)
+ xor %rax, %rax
+
+#ifdef CONFIG_AMD_MEM_ENCRYPT
+ movl enc_bit(%rip), %eax
+ cmpl $0, %eax
+ jge 1f
+
+ call do_get_sev_encryption_bit
+ movl %eax, enc_bit(%rip)
+1:
+#endif /* CONFIG_AMD_MEM_ENCRYPT */
+
+ ret
+ENDPROC(get_sev_encryption_bit_64)
+
ENTRY(set_sev_encryption_mask)
#ifdef CONFIG_AMD_MEM_ENCRYPT
push %rbp
@@ -95,7 +121,7 @@ ENTRY(set_sev_encryption_mask)
movq %rsp, %rbp /* Save current stack pointer */
- call get_sev_encryption_bit /* Get the encryption bit position */
+ call get_sev_encryption_bit_64 /* Get the encryption bit position */
testl %eax, %eax
jz .Lno_sev_mask
--
2.17.1
^ permalink raw reply related [flat|nested] 22+ messages in thread
* [PATCH] x86/boot: Fix kexec booting failure after SEV early boot support
@ 2018-09-25 11:10 ` Kairui Song
0 siblings, 0 replies; 22+ messages in thread
From: Kairui Song @ 2018-09-25 11:10 UTC (permalink / raw)
To: linux-kernel
Cc: thomas.lendacky, brijesh.singh, kasong, x86, kexec, mingo, hpa,
tglx, bp, dyoung
Commit 1958b5fc4010 ("x86/boot: Add early boot support when running
with SEV active") is causing kexec becomes sometimes unstable, kexec
reboot won't start a second kernel bypassing BIOS boot process, instead,
the system got reset.
That's because, in get_sev_encryption_bit function, we are using
32-bit RIP-relative addressing to read the value of enc_bit, but
kexec may alloc the early boot up code to a higher location, which
is beyond 32-bit addressing limit. Some garbage will be read and
get_sev_encryption_bit will return the wrong value, which lead to
wrong memory page flag.
This patch adds a get_sev_encryption_bit_64 function to avoid this
problem. 64-bit early boot code will use this function instead, it
uses native RIP addressing to read the enc_bit which have no problem
with any location.
Fixes: 1958b5fc4010 ("x86/boot: Add early boot support when running with SEV active")
Signed-off-by: Kairui Song <kasong@redhat.com>
---
arch/x86/boot/compressed/mem_encrypt.S | 64 ++++++++++++++++++--------
1 file changed, 45 insertions(+), 19 deletions(-)
diff --git a/arch/x86/boot/compressed/mem_encrypt.S b/arch/x86/boot/compressed/mem_encrypt.S
index eaa843a52907..41933550449a 100644
--- a/arch/x86/boot/compressed/mem_encrypt.S
+++ b/arch/x86/boot/compressed/mem_encrypt.S
@@ -18,27 +18,13 @@
.text
.code32
-ENTRY(get_sev_encryption_bit)
+do_get_sev_encryption_bit:
xor %eax, %eax
#ifdef CONFIG_AMD_MEM_ENCRYPT
push %ebx
push %ecx
push %edx
- push %edi
-
- /*
- * RIP-relative addressing is needed to access the encryption bit
- * variable. Since we are running in 32-bit mode we need this call/pop
- * sequence to get the proper relative addressing.
- */
- call 1f
-1: popl %edi
- subl $1b, %edi
-
- movl enc_bit(%edi), %eax
- cmpl $0, %eax
- jge .Lsev_exit
/* Check if running under a hypervisor */
movl $1, %eax
@@ -69,25 +55,65 @@ ENTRY(get_sev_encryption_bit)
movl %ebx, %eax
andl $0x3f, %eax /* Return the encryption bit location */
- movl %eax, enc_bit(%edi)
jmp .Lsev_exit
.Lno_sev:
xor %eax, %eax
- movl %eax, enc_bit(%edi)
.Lsev_exit:
- pop %edi
pop %edx
pop %ecx
pop %ebx
+#endif /* CONFIG_AMD_MEM_ENCRYPT */
+
+ ret
+
+ENTRY(get_sev_encryption_bit)
+ xor %eax, %eax
+
+#ifdef CONFIG_AMD_MEM_ENCRYPT
+ push %edi
+
+ /*
+ * RIP-relative addressing is needed to access the encryption bit
+ * variable. Since we are running in 32-bit mode we need this call/pop
+ * sequence to get the proper relative addressing.
+ */
+ call 1f
+1: popl %edi
+ subl $1b, %edi
+
+ movl enc_bit(%edi), %eax
+ cmpl $0, %eax
+ jge 2f
+
+ call do_get_sev_encryption_bit
+ movl %eax, enc_bit(%edi)
+2:
+ pop %edi
#endif /* CONFIG_AMD_MEM_ENCRYPT */
ret
ENDPROC(get_sev_encryption_bit)
.code64
+ENTRY(get_sev_encryption_bit_64)
+ xor %rax, %rax
+
+#ifdef CONFIG_AMD_MEM_ENCRYPT
+ movl enc_bit(%rip), %eax
+ cmpl $0, %eax
+ jge 1f
+
+ call do_get_sev_encryption_bit
+ movl %eax, enc_bit(%rip)
+1:
+#endif /* CONFIG_AMD_MEM_ENCRYPT */
+
+ ret
+ENDPROC(get_sev_encryption_bit_64)
+
ENTRY(set_sev_encryption_mask)
#ifdef CONFIG_AMD_MEM_ENCRYPT
push %rbp
@@ -95,7 +121,7 @@ ENTRY(set_sev_encryption_mask)
movq %rsp, %rbp /* Save current stack pointer */
- call get_sev_encryption_bit /* Get the encryption bit position */
+ call get_sev_encryption_bit_64 /* Get the encryption bit position */
testl %eax, %eax
jz .Lno_sev_mask
--
2.17.1
_______________________________________________
kexec mailing list
kexec@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/kexec
^ permalink raw reply related [flat|nested] 22+ messages in thread
* Re: [PATCH] x86/boot: Fix kexec booting failure after SEV early boot support
2018-09-25 11:10 ` Kairui Song
@ 2018-09-25 14:33 ` Lendacky, Thomas
-1 siblings, 0 replies; 22+ messages in thread
From: Lendacky, Thomas @ 2018-09-25 14:33 UTC (permalink / raw)
To: Kairui Song, linux-kernel
Cc: tglx, mingo, hpa, x86, Singh, Brijesh, bp, kexec, dyoung,
Borislav Petkov
On 09/25/2018 06:10 AM, Kairui Song wrote:
> Commit 1958b5fc4010 ("x86/boot: Add early boot support when running
> with SEV active") is causing kexec becomes sometimes unstable, kexec
> reboot won't start a second kernel bypassing BIOS boot process, instead,
> the system got reset.
>
> That's because, in get_sev_encryption_bit function, we are using
> 32-bit RIP-relative addressing to read the value of enc_bit, but
> kexec may alloc the early boot up code to a higher location, which
> is beyond 32-bit addressing limit. Some garbage will be read and
> get_sev_encryption_bit will return the wrong value, which lead to
> wrong memory page flag.
>
> This patch adds a get_sev_encryption_bit_64 function to avoid this
> problem. 64-bit early boot code will use this function instead, it
> uses native RIP addressing to read the enc_bit which have no problem
> with any location.
>
> Fixes: 1958b5fc4010 ("x86/boot: Add early boot support when running with SEV active")
> Signed-off-by: Kairui Song <kasong@redhat.com>
Reviewed-by: Tom Lendacky <thomas.lendacky@amd.com>
> ---
> arch/x86/boot/compressed/mem_encrypt.S | 64 ++++++++++++++++++--------
> 1 file changed, 45 insertions(+), 19 deletions(-)
>
> diff --git a/arch/x86/boot/compressed/mem_encrypt.S b/arch/x86/boot/compressed/mem_encrypt.S
> index eaa843a52907..41933550449a 100644
> --- a/arch/x86/boot/compressed/mem_encrypt.S
> +++ b/arch/x86/boot/compressed/mem_encrypt.S
> @@ -18,27 +18,13 @@
>
> .text
> .code32
> -ENTRY(get_sev_encryption_bit)
> +do_get_sev_encryption_bit:
> xor %eax, %eax
>
> #ifdef CONFIG_AMD_MEM_ENCRYPT
> push %ebx
> push %ecx
> push %edx
> - push %edi
> -
> - /*
> - * RIP-relative addressing is needed to access the encryption bit
> - * variable. Since we are running in 32-bit mode we need this call/pop
> - * sequence to get the proper relative addressing.
> - */
> - call 1f
> -1: popl %edi
> - subl $1b, %edi
> -
> - movl enc_bit(%edi), %eax
> - cmpl $0, %eax
> - jge .Lsev_exit
>
> /* Check if running under a hypervisor */
> movl $1, %eax
> @@ -69,25 +55,65 @@ ENTRY(get_sev_encryption_bit)
>
> movl %ebx, %eax
> andl $0x3f, %eax /* Return the encryption bit location */
> - movl %eax, enc_bit(%edi)
> jmp .Lsev_exit
>
> .Lno_sev:
> xor %eax, %eax
> - movl %eax, enc_bit(%edi)
>
> .Lsev_exit:
> - pop %edi
> pop %edx
> pop %ecx
> pop %ebx
>
> +#endif /* CONFIG_AMD_MEM_ENCRYPT */
> +
> + ret
> +
> +ENTRY(get_sev_encryption_bit)
> + xor %eax, %eax
> +
> +#ifdef CONFIG_AMD_MEM_ENCRYPT
> + push %edi
> +
> + /*
> + * RIP-relative addressing is needed to access the encryption bit
> + * variable. Since we are running in 32-bit mode we need this call/pop
> + * sequence to get the proper relative addressing.
> + */
> + call 1f
> +1: popl %edi
> + subl $1b, %edi
> +
> + movl enc_bit(%edi), %eax
> + cmpl $0, %eax
> + jge 2f
> +
> + call do_get_sev_encryption_bit
> + movl %eax, enc_bit(%edi)
> +2:
> + pop %edi
> #endif /* CONFIG_AMD_MEM_ENCRYPT */
>
> ret
> ENDPROC(get_sev_encryption_bit)
>
> .code64
> +ENTRY(get_sev_encryption_bit_64)
> + xor %rax, %rax
> +
> +#ifdef CONFIG_AMD_MEM_ENCRYPT
> + movl enc_bit(%rip), %eax
> + cmpl $0, %eax
> + jge 1f
> +
> + call do_get_sev_encryption_bit
> + movl %eax, enc_bit(%rip)
> +1:
> +#endif /* CONFIG_AMD_MEM_ENCRYPT */
> +
> + ret
> +ENDPROC(get_sev_encryption_bit_64)
> +
> ENTRY(set_sev_encryption_mask)
> #ifdef CONFIG_AMD_MEM_ENCRYPT
> push %rbp
> @@ -95,7 +121,7 @@ ENTRY(set_sev_encryption_mask)
>
> movq %rsp, %rbp /* Save current stack pointer */
>
> - call get_sev_encryption_bit /* Get the encryption bit position */
> + call get_sev_encryption_bit_64 /* Get the encryption bit position */
> testl %eax, %eax
> jz .Lno_sev_mask
>
>
^ permalink raw reply [flat|nested] 22+ messages in thread
* Re: [PATCH] x86/boot: Fix kexec booting failure after SEV early boot support
@ 2018-09-25 14:33 ` Lendacky, Thomas
0 siblings, 0 replies; 22+ messages in thread
From: Lendacky, Thomas @ 2018-09-25 14:33 UTC (permalink / raw)
To: Kairui Song, linux-kernel
Cc: Singh, Brijesh, x86, kexec, mingo, hpa, tglx, Borislav Petkov, dyoung
On 09/25/2018 06:10 AM, Kairui Song wrote:
> Commit 1958b5fc4010 ("x86/boot: Add early boot support when running
> with SEV active") is causing kexec becomes sometimes unstable, kexec
> reboot won't start a second kernel bypassing BIOS boot process, instead,
> the system got reset.
>
> That's because, in get_sev_encryption_bit function, we are using
> 32-bit RIP-relative addressing to read the value of enc_bit, but
> kexec may alloc the early boot up code to a higher location, which
> is beyond 32-bit addressing limit. Some garbage will be read and
> get_sev_encryption_bit will return the wrong value, which lead to
> wrong memory page flag.
>
> This patch adds a get_sev_encryption_bit_64 function to avoid this
> problem. 64-bit early boot code will use this function instead, it
> uses native RIP addressing to read the enc_bit which have no problem
> with any location.
>
> Fixes: 1958b5fc4010 ("x86/boot: Add early boot support when running with SEV active")
> Signed-off-by: Kairui Song <kasong@redhat.com>
Reviewed-by: Tom Lendacky <thomas.lendacky@amd.com>
> ---
> arch/x86/boot/compressed/mem_encrypt.S | 64 ++++++++++++++++++--------
> 1 file changed, 45 insertions(+), 19 deletions(-)
>
> diff --git a/arch/x86/boot/compressed/mem_encrypt.S b/arch/x86/boot/compressed/mem_encrypt.S
> index eaa843a52907..41933550449a 100644
> --- a/arch/x86/boot/compressed/mem_encrypt.S
> +++ b/arch/x86/boot/compressed/mem_encrypt.S
> @@ -18,27 +18,13 @@
>
> .text
> .code32
> -ENTRY(get_sev_encryption_bit)
> +do_get_sev_encryption_bit:
> xor %eax, %eax
>
> #ifdef CONFIG_AMD_MEM_ENCRYPT
> push %ebx
> push %ecx
> push %edx
> - push %edi
> -
> - /*
> - * RIP-relative addressing is needed to access the encryption bit
> - * variable. Since we are running in 32-bit mode we need this call/pop
> - * sequence to get the proper relative addressing.
> - */
> - call 1f
> -1: popl %edi
> - subl $1b, %edi
> -
> - movl enc_bit(%edi), %eax
> - cmpl $0, %eax
> - jge .Lsev_exit
>
> /* Check if running under a hypervisor */
> movl $1, %eax
> @@ -69,25 +55,65 @@ ENTRY(get_sev_encryption_bit)
>
> movl %ebx, %eax
> andl $0x3f, %eax /* Return the encryption bit location */
> - movl %eax, enc_bit(%edi)
> jmp .Lsev_exit
>
> .Lno_sev:
> xor %eax, %eax
> - movl %eax, enc_bit(%edi)
>
> .Lsev_exit:
> - pop %edi
> pop %edx
> pop %ecx
> pop %ebx
>
> +#endif /* CONFIG_AMD_MEM_ENCRYPT */
> +
> + ret
> +
> +ENTRY(get_sev_encryption_bit)
> + xor %eax, %eax
> +
> +#ifdef CONFIG_AMD_MEM_ENCRYPT
> + push %edi
> +
> + /*
> + * RIP-relative addressing is needed to access the encryption bit
> + * variable. Since we are running in 32-bit mode we need this call/pop
> + * sequence to get the proper relative addressing.
> + */
> + call 1f
> +1: popl %edi
> + subl $1b, %edi
> +
> + movl enc_bit(%edi), %eax
> + cmpl $0, %eax
> + jge 2f
> +
> + call do_get_sev_encryption_bit
> + movl %eax, enc_bit(%edi)
> +2:
> + pop %edi
> #endif /* CONFIG_AMD_MEM_ENCRYPT */
>
> ret
> ENDPROC(get_sev_encryption_bit)
>
> .code64
> +ENTRY(get_sev_encryption_bit_64)
> + xor %rax, %rax
> +
> +#ifdef CONFIG_AMD_MEM_ENCRYPT
> + movl enc_bit(%rip), %eax
> + cmpl $0, %eax
> + jge 1f
> +
> + call do_get_sev_encryption_bit
> + movl %eax, enc_bit(%rip)
> +1:
> +#endif /* CONFIG_AMD_MEM_ENCRYPT */
> +
> + ret
> +ENDPROC(get_sev_encryption_bit_64)
> +
> ENTRY(set_sev_encryption_mask)
> #ifdef CONFIG_AMD_MEM_ENCRYPT
> push %rbp
> @@ -95,7 +121,7 @@ ENTRY(set_sev_encryption_mask)
>
> movq %rsp, %rbp /* Save current stack pointer */
>
> - call get_sev_encryption_bit /* Get the encryption bit position */
> + call get_sev_encryption_bit_64 /* Get the encryption bit position */
> testl %eax, %eax
> jz .Lno_sev_mask
>
>
_______________________________________________
kexec mailing list
kexec@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/kexec
^ permalink raw reply [flat|nested] 22+ messages in thread
* Re: [PATCH] x86/boot: Fix kexec booting failure after SEV early boot support
2018-09-25 14:33 ` Lendacky, Thomas
@ 2018-09-25 17:26 ` Borislav Petkov
-1 siblings, 0 replies; 22+ messages in thread
From: Borislav Petkov @ 2018-09-25 17:26 UTC (permalink / raw)
To: Lendacky, Thomas, Kairui Song
Cc: linux-kernel, tglx, mingo, hpa, x86, Singh, Brijesh, kexec, dyoung
On Tue, Sep 25, 2018 at 02:33:48PM +0000, Lendacky, Thomas wrote:
> On 09/25/2018 06:10 AM, Kairui Song wrote:
> > Commit 1958b5fc4010 ("x86/boot: Add early boot support when running
> > with SEV active") is causing kexec becomes sometimes unstable, kexec
> > reboot won't start a second kernel bypassing BIOS boot process, instead,
> > the system got reset.
> >
> > That's because, in get_sev_encryption_bit function, we are using
> > 32-bit RIP-relative addressing to read the value of enc_bit, but
> > kexec may alloc the early boot up code to a higher location, which
> > is beyond 32-bit addressing limit. Some garbage will be read and
> > get_sev_encryption_bit will return the wrong value, which lead to
> > wrong memory page flag.
> >
> > This patch adds a get_sev_encryption_bit_64 function to avoid this
> > problem. 64-bit early boot code will use this function instead, it
> > uses native RIP addressing to read the enc_bit which have no problem
> > with any location.
> >
> > Fixes: 1958b5fc4010 ("x86/boot: Add early boot support when running with SEV active")
> > Signed-off-by: Kairui Song <kasong@redhat.com>
>
> Reviewed-by: Tom Lendacky <thomas.lendacky@amd.com>
>
> > ---
> > arch/x86/boot/compressed/mem_encrypt.S | 64 ++++++++++++++++++--------
> > 1 file changed, 45 insertions(+), 19 deletions(-)
> >
> > diff --git a/arch/x86/boot/compressed/mem_encrypt.S b/arch/x86/boot/compressed/mem_encrypt.S
> > index eaa843a52907..41933550449a 100644
> > --- a/arch/x86/boot/compressed/mem_encrypt.S
> > +++ b/arch/x86/boot/compressed/mem_encrypt.S
> > @@ -18,27 +18,13 @@
> >
> > .text
> > .code32
> > -ENTRY(get_sev_encryption_bit)
> > +do_get_sev_encryption_bit:
> > xor %eax, %eax
> >
> > #ifdef CONFIG_AMD_MEM_ENCRYPT
> > push %ebx
> > push %ecx
> > push %edx
> > - push %edi
> > -
> > - /*
> > - * RIP-relative addressing is needed to access the encryption bit
> > - * variable. Since we are running in 32-bit mode we need this call/pop
> > - * sequence to get the proper relative addressing.
> > - */
> > - call 1f
> > -1: popl %edi
> > - subl $1b, %edi
> > -
> > - movl enc_bit(%edi), %eax
> > - cmpl $0, %eax
> > - jge .Lsev_exit
> >
> > /* Check if running under a hypervisor */
> > movl $1, %eax
> > @@ -69,25 +55,65 @@ ENTRY(get_sev_encryption_bit)
> >
> > movl %ebx, %eax
> > andl $0x3f, %eax /* Return the encryption bit location */
> > - movl %eax, enc_bit(%edi)
IINM, the problem can be addressed in a simpler way by getting rid of
enc_bit and thus getting rid of the need to do relative addressing of
anything and simply doing the whole dance of figuring out the C-bit each
time. It probably wouldn't be even measurable...
--
Regards/Gruss,
Boris.
SUSE Linux GmbH, GF: Felix Imendörffer, Jane Smithard, Graham Norton, HRB 21284 (AG Nürnberg)
--
^ permalink raw reply [flat|nested] 22+ messages in thread
* Re: [PATCH] x86/boot: Fix kexec booting failure after SEV early boot support
@ 2018-09-25 17:26 ` Borislav Petkov
0 siblings, 0 replies; 22+ messages in thread
From: Borislav Petkov @ 2018-09-25 17:26 UTC (permalink / raw)
To: Lendacky, Thomas, Kairui Song
Cc: Singh, Brijesh, x86, kexec, linux-kernel, mingo, hpa, tglx, dyoung
On Tue, Sep 25, 2018 at 02:33:48PM +0000, Lendacky, Thomas wrote:
> On 09/25/2018 06:10 AM, Kairui Song wrote:
> > Commit 1958b5fc4010 ("x86/boot: Add early boot support when running
> > with SEV active") is causing kexec becomes sometimes unstable, kexec
> > reboot won't start a second kernel bypassing BIOS boot process, instead,
> > the system got reset.
> >
> > That's because, in get_sev_encryption_bit function, we are using
> > 32-bit RIP-relative addressing to read the value of enc_bit, but
> > kexec may alloc the early boot up code to a higher location, which
> > is beyond 32-bit addressing limit. Some garbage will be read and
> > get_sev_encryption_bit will return the wrong value, which lead to
> > wrong memory page flag.
> >
> > This patch adds a get_sev_encryption_bit_64 function to avoid this
> > problem. 64-bit early boot code will use this function instead, it
> > uses native RIP addressing to read the enc_bit which have no problem
> > with any location.
> >
> > Fixes: 1958b5fc4010 ("x86/boot: Add early boot support when running with SEV active")
> > Signed-off-by: Kairui Song <kasong@redhat.com>
>
> Reviewed-by: Tom Lendacky <thomas.lendacky@amd.com>
>
> > ---
> > arch/x86/boot/compressed/mem_encrypt.S | 64 ++++++++++++++++++--------
> > 1 file changed, 45 insertions(+), 19 deletions(-)
> >
> > diff --git a/arch/x86/boot/compressed/mem_encrypt.S b/arch/x86/boot/compressed/mem_encrypt.S
> > index eaa843a52907..41933550449a 100644
> > --- a/arch/x86/boot/compressed/mem_encrypt.S
> > +++ b/arch/x86/boot/compressed/mem_encrypt.S
> > @@ -18,27 +18,13 @@
> >
> > .text
> > .code32
> > -ENTRY(get_sev_encryption_bit)
> > +do_get_sev_encryption_bit:
> > xor %eax, %eax
> >
> > #ifdef CONFIG_AMD_MEM_ENCRYPT
> > push %ebx
> > push %ecx
> > push %edx
> > - push %edi
> > -
> > - /*
> > - * RIP-relative addressing is needed to access the encryption bit
> > - * variable. Since we are running in 32-bit mode we need this call/pop
> > - * sequence to get the proper relative addressing.
> > - */
> > - call 1f
> > -1: popl %edi
> > - subl $1b, %edi
> > -
> > - movl enc_bit(%edi), %eax
> > - cmpl $0, %eax
> > - jge .Lsev_exit
> >
> > /* Check if running under a hypervisor */
> > movl $1, %eax
> > @@ -69,25 +55,65 @@ ENTRY(get_sev_encryption_bit)
> >
> > movl %ebx, %eax
> > andl $0x3f, %eax /* Return the encryption bit location */
> > - movl %eax, enc_bit(%edi)
IINM, the problem can be addressed in a simpler way by getting rid of
enc_bit and thus getting rid of the need to do relative addressing of
anything and simply doing the whole dance of figuring out the C-bit each
time. It probably wouldn't be even measurable...
--
Regards/Gruss,
Boris.
SUSE Linux GmbH, GF: Felix Imendörffer, Jane Smithard, Graham Norton, HRB 21284 (AG Nürnberg)
--
_______________________________________________
kexec mailing list
kexec@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/kexec
^ permalink raw reply [flat|nested] 22+ messages in thread
* Re: [PATCH] x86/boot: Fix kexec booting failure after SEV early boot support
2018-09-25 17:26 ` Borislav Petkov
@ 2018-09-26 7:32 ` Baoquan He
-1 siblings, 0 replies; 22+ messages in thread
From: Baoquan He @ 2018-09-26 7:32 UTC (permalink / raw)
To: Borislav Petkov
Cc: Lendacky, Thomas, Kairui Song, Singh, Brijesh, x86, kexec,
linux-kernel, mingo, hpa, tglx, dyoung
On 09/25/18 at 07:26pm, Borislav Petkov wrote:
> IINM, the problem can be addressed in a simpler way by getting rid of
> enc_bit and thus getting rid of the need to do relative addressing of
> anything and simply doing the whole dance of figuring out the C-bit each
> time. It probably wouldn't be even measurable...
Couldn't agree more.
Obviously enc_bit is redundent here. We only check eax each time,
removing it can fix the RIP-relative addressing issue in kexec.
diff --git a/arch/x86/boot/compressed/mem_encrypt.S b/arch/x86/boot/compressed/mem_encrypt.S
index eaa843a52907..0b60eb867d25 100644
--- a/arch/x86/boot/compressed/mem_encrypt.S
+++ b/arch/x86/boot/compressed/mem_encrypt.S
@@ -27,19 +27,6 @@ ENTRY(get_sev_encryption_bit)
push %edx
push %edi
- /*
- * RIP-relative addressing is needed to access the encryption bit
- * variable. Since we are running in 32-bit mode we need this call/pop
- * sequence to get the proper relative addressing.
- */
- call 1f
-1: popl %edi
- subl $1b, %edi
-
- movl enc_bit(%edi), %eax
- cmpl $0, %eax
- jge .Lsev_exit
-
/* Check if running under a hypervisor */
movl $1, %eax
cpuid
@@ -69,12 +56,10 @@ ENTRY(get_sev_encryption_bit)
movl %ebx, %eax
andl $0x3f, %eax /* Return the encryption bit location */
- movl %eax, enc_bit(%edi)
jmp .Lsev_exit
.Lno_sev:
xor %eax, %eax
- movl %eax, enc_bit(%edi)
.Lsev_exit:
pop %edi
@@ -113,9 +98,6 @@ ENTRY(set_sev_encryption_mask)
ENDPROC(set_sev_encryption_mask)
.data
-enc_bit:
- .int 0xffffffff
-
#ifdef CONFIG_AMD_MEM_ENCRYPT
.balign 8
GLOBAL(sme_me_mask)
^ permalink raw reply related [flat|nested] 22+ messages in thread
* Re: [PATCH] x86/boot: Fix kexec booting failure after SEV early boot support
@ 2018-09-26 7:32 ` Baoquan He
0 siblings, 0 replies; 22+ messages in thread
From: Baoquan He @ 2018-09-26 7:32 UTC (permalink / raw)
To: Borislav Petkov
Cc: Lendacky, Thomas, Singh, Brijesh, Kairui Song, x86, kexec,
linux-kernel, mingo, hpa, tglx, dyoung
On 09/25/18 at 07:26pm, Borislav Petkov wrote:
> IINM, the problem can be addressed in a simpler way by getting rid of
> enc_bit and thus getting rid of the need to do relative addressing of
> anything and simply doing the whole dance of figuring out the C-bit each
> time. It probably wouldn't be even measurable...
Couldn't agree more.
Obviously enc_bit is redundent here. We only check eax each time,
removing it can fix the RIP-relative addressing issue in kexec.
diff --git a/arch/x86/boot/compressed/mem_encrypt.S b/arch/x86/boot/compressed/mem_encrypt.S
index eaa843a52907..0b60eb867d25 100644
--- a/arch/x86/boot/compressed/mem_encrypt.S
+++ b/arch/x86/boot/compressed/mem_encrypt.S
@@ -27,19 +27,6 @@ ENTRY(get_sev_encryption_bit)
push %edx
push %edi
- /*
- * RIP-relative addressing is needed to access the encryption bit
- * variable. Since we are running in 32-bit mode we need this call/pop
- * sequence to get the proper relative addressing.
- */
- call 1f
-1: popl %edi
- subl $1b, %edi
-
- movl enc_bit(%edi), %eax
- cmpl $0, %eax
- jge .Lsev_exit
-
/* Check if running under a hypervisor */
movl $1, %eax
cpuid
@@ -69,12 +56,10 @@ ENTRY(get_sev_encryption_bit)
movl %ebx, %eax
andl $0x3f, %eax /* Return the encryption bit location */
- movl %eax, enc_bit(%edi)
jmp .Lsev_exit
.Lno_sev:
xor %eax, %eax
- movl %eax, enc_bit(%edi)
.Lsev_exit:
pop %edi
@@ -113,9 +98,6 @@ ENTRY(set_sev_encryption_mask)
ENDPROC(set_sev_encryption_mask)
.data
-enc_bit:
- .int 0xffffffff
-
#ifdef CONFIG_AMD_MEM_ENCRYPT
.balign 8
GLOBAL(sme_me_mask)
_______________________________________________
kexec mailing list
kexec@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/kexec
^ permalink raw reply related [flat|nested] 22+ messages in thread
* Re: [PATCH] x86/boot: Fix kexec booting failure after SEV early boot support
2018-09-26 7:32 ` Baoquan He
@ 2018-09-26 10:52 ` Kairui Song
-1 siblings, 0 replies; 22+ messages in thread
From: Kairui Song @ 2018-09-26 10:52 UTC (permalink / raw)
To: Thomas.Lendacky
Cc: Baoquan He, bp, brijesh.singh, x86, kexec, linux-kernel, mingo,
hpa, tglx, Dave Young
On Wed, Sep 26, 2018 at 3:33 PM Baoquan He <bhe@redhat.com> wrote:
>
> On 09/25/18 at 07:26pm, Borislav Petkov wrote:
> > IINM, the problem can be addressed in a simpler way by getting rid of
> > enc_bit and thus getting rid of the need to do relative addressing of
> > anything and simply doing the whole dance of figuring out the C-bit each
> > time. It probably wouldn't be even measurable...
>
> Couldn't agree more.
>
> Obviously enc_bit is redundent here. We only check eax each time,
> removing it can fix the RIP-relative addressing issue in kexec.
>
> diff --git a/arch/x86/boot/compressed/mem_encrypt.S b/arch/x86/boot/compressed/mem_encrypt.S
> index eaa843a52907..0b60eb867d25 100644
> --- a/arch/x86/boot/compressed/mem_encrypt.S
> +++ b/arch/x86/boot/compressed/mem_encrypt.S
> @@ -27,19 +27,6 @@ ENTRY(get_sev_encryption_bit)
> push %edx
> push %edi
>
> - /*
> - * RIP-relative addressing is needed to access the encryption bit
> - * variable. Since we are running in 32-bit mode we need this call/pop
> - * sequence to get the proper relative addressing.
> - */
> - call 1f
> -1: popl %edi
> - subl $1b, %edi
> -
> - movl enc_bit(%edi), %eax
> - cmpl $0, %eax
> - jge .Lsev_exit
> -
> /* Check if running under a hypervisor */
> movl $1, %eax
> cpuid
> @@ -69,12 +56,10 @@ ENTRY(get_sev_encryption_bit)
>
> movl %ebx, %eax
> andl $0x3f, %eax /* Return the encryption bit location */
> - movl %eax, enc_bit(%edi)
> jmp .Lsev_exit
>
> .Lno_sev:
> xor %eax, %eax
> - movl %eax, enc_bit(%edi)
>
> .Lsev_exit:
> pop %edi
> @@ -113,9 +98,6 @@ ENTRY(set_sev_encryption_mask)
> ENDPROC(set_sev_encryption_mask)
>
> .data
> -enc_bit:
> - .int 0xffffffff
> -
> #ifdef CONFIG_AMD_MEM_ENCRYPT
> .balign 8
> GLOBAL(sme_me_mask)
That is much cleaner indeed, I'm not sure if enc_bit have any other
usage, if not we can just drop it for sure.
Hi Thomas, can you help confirm if enc_bit is only a cache to avoid
doing the cpuid stuff?
--
Best Regards,
Kairui Song
^ permalink raw reply [flat|nested] 22+ messages in thread
* Re: [PATCH] x86/boot: Fix kexec booting failure after SEV early boot support
@ 2018-09-26 10:52 ` Kairui Song
0 siblings, 0 replies; 22+ messages in thread
From: Kairui Song @ 2018-09-26 10:52 UTC (permalink / raw)
To: Thomas.Lendacky
Cc: brijesh.singh, Baoquan He, x86, kexec, linux-kernel, mingo, hpa,
tglx, bp, Dave Young
On Wed, Sep 26, 2018 at 3:33 PM Baoquan He <bhe@redhat.com> wrote:
>
> On 09/25/18 at 07:26pm, Borislav Petkov wrote:
> > IINM, the problem can be addressed in a simpler way by getting rid of
> > enc_bit and thus getting rid of the need to do relative addressing of
> > anything and simply doing the whole dance of figuring out the C-bit each
> > time. It probably wouldn't be even measurable...
>
> Couldn't agree more.
>
> Obviously enc_bit is redundent here. We only check eax each time,
> removing it can fix the RIP-relative addressing issue in kexec.
>
> diff --git a/arch/x86/boot/compressed/mem_encrypt.S b/arch/x86/boot/compressed/mem_encrypt.S
> index eaa843a52907..0b60eb867d25 100644
> --- a/arch/x86/boot/compressed/mem_encrypt.S
> +++ b/arch/x86/boot/compressed/mem_encrypt.S
> @@ -27,19 +27,6 @@ ENTRY(get_sev_encryption_bit)
> push %edx
> push %edi
>
> - /*
> - * RIP-relative addressing is needed to access the encryption bit
> - * variable. Since we are running in 32-bit mode we need this call/pop
> - * sequence to get the proper relative addressing.
> - */
> - call 1f
> -1: popl %edi
> - subl $1b, %edi
> -
> - movl enc_bit(%edi), %eax
> - cmpl $0, %eax
> - jge .Lsev_exit
> -
> /* Check if running under a hypervisor */
> movl $1, %eax
> cpuid
> @@ -69,12 +56,10 @@ ENTRY(get_sev_encryption_bit)
>
> movl %ebx, %eax
> andl $0x3f, %eax /* Return the encryption bit location */
> - movl %eax, enc_bit(%edi)
> jmp .Lsev_exit
>
> .Lno_sev:
> xor %eax, %eax
> - movl %eax, enc_bit(%edi)
>
> .Lsev_exit:
> pop %edi
> @@ -113,9 +98,6 @@ ENTRY(set_sev_encryption_mask)
> ENDPROC(set_sev_encryption_mask)
>
> .data
> -enc_bit:
> - .int 0xffffffff
> -
> #ifdef CONFIG_AMD_MEM_ENCRYPT
> .balign 8
> GLOBAL(sme_me_mask)
That is much cleaner indeed, I'm not sure if enc_bit have any other
usage, if not we can just drop it for sure.
Hi Thomas, can you help confirm if enc_bit is only a cache to avoid
doing the cpuid stuff?
--
Best Regards,
Kairui Song
_______________________________________________
kexec mailing list
kexec@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/kexec
^ permalink raw reply [flat|nested] 22+ messages in thread
* Re: [PATCH] x86/boot: Fix kexec booting failure after SEV early boot support
2018-09-26 7:32 ` Baoquan He
@ 2018-09-26 11:22 ` Baoquan He
-1 siblings, 0 replies; 22+ messages in thread
From: Baoquan He @ 2018-09-26 11:22 UTC (permalink / raw)
To: Borislav Petkov, Lendacky, Thomas
Cc: Kairui Song, Singh, Brijesh, x86, kexec, linux-kernel, mingo,
hpa, tglx, dyoung
On 09/26/18 at 03:32pm, Baoquan He wrote:
> On 09/25/18 at 07:26pm, Borislav Petkov wrote:
> > IINM, the problem can be addressed in a simpler way by getting rid of
> > enc_bit and thus getting rid of the need to do relative addressing of
> > anything and simply doing the whole dance of figuring out the C-bit each
> > time. It probably wouldn't be even measurable...
>
> Couldn't agree more.
>
> Obviously enc_bit is redundent here. We only check eax each time,
> removing it can fix the RIP-relative addressing issue in kexec.
OK, in distros CONFIG_AMD_MEM_ENCRYPT=y is set by default usually.
enc_bit can save once in normal boot, then fetch and skip the cpuid
detection in initialize_identity_maps(). However this only speeds up in
amd system with SME, on intel cpu and amd cpu w/o sme, it still needs to
do cpuid twice. Removing it should be not measurable as Boris said.
Not sure if Tom has other concern.
Thanks
Baoquan
>
> diff --git a/arch/x86/boot/compressed/mem_encrypt.S b/arch/x86/boot/compressed/mem_encrypt.S
> index eaa843a52907..0b60eb867d25 100644
> --- a/arch/x86/boot/compressed/mem_encrypt.S
> +++ b/arch/x86/boot/compressed/mem_encrypt.S
> @@ -27,19 +27,6 @@ ENTRY(get_sev_encryption_bit)
> push %edx
> push %edi
>
> - /*
> - * RIP-relative addressing is needed to access the encryption bit
> - * variable. Since we are running in 32-bit mode we need this call/pop
> - * sequence to get the proper relative addressing.
> - */
> - call 1f
> -1: popl %edi
> - subl $1b, %edi
> -
> - movl enc_bit(%edi), %eax
> - cmpl $0, %eax
> - jge .Lsev_exit
> -
> /* Check if running under a hypervisor */
> movl $1, %eax
> cpuid
> @@ -69,12 +56,10 @@ ENTRY(get_sev_encryption_bit)
>
> movl %ebx, %eax
> andl $0x3f, %eax /* Return the encryption bit location */
> - movl %eax, enc_bit(%edi)
> jmp .Lsev_exit
>
> .Lno_sev:
> xor %eax, %eax
> - movl %eax, enc_bit(%edi)
>
> .Lsev_exit:
> pop %edi
> @@ -113,9 +98,6 @@ ENTRY(set_sev_encryption_mask)
> ENDPROC(set_sev_encryption_mask)
>
> .data
> -enc_bit:
> - .int 0xffffffff
> -
> #ifdef CONFIG_AMD_MEM_ENCRYPT
> .balign 8
> GLOBAL(sme_me_mask)
^ permalink raw reply [flat|nested] 22+ messages in thread
* Re: [PATCH] x86/boot: Fix kexec booting failure after SEV early boot support
@ 2018-09-26 11:22 ` Baoquan He
0 siblings, 0 replies; 22+ messages in thread
From: Baoquan He @ 2018-09-26 11:22 UTC (permalink / raw)
To: Borislav Petkov, Lendacky, Thomas
Cc: Singh, Brijesh, Kairui Song, x86, kexec, linux-kernel, mingo,
hpa, tglx, dyoung
On 09/26/18 at 03:32pm, Baoquan He wrote:
> On 09/25/18 at 07:26pm, Borislav Petkov wrote:
> > IINM, the problem can be addressed in a simpler way by getting rid of
> > enc_bit and thus getting rid of the need to do relative addressing of
> > anything and simply doing the whole dance of figuring out the C-bit each
> > time. It probably wouldn't be even measurable...
>
> Couldn't agree more.
>
> Obviously enc_bit is redundent here. We only check eax each time,
> removing it can fix the RIP-relative addressing issue in kexec.
OK, in distros CONFIG_AMD_MEM_ENCRYPT=y is set by default usually.
enc_bit can save once in normal boot, then fetch and skip the cpuid
detection in initialize_identity_maps(). However this only speeds up in
amd system with SME, on intel cpu and amd cpu w/o sme, it still needs to
do cpuid twice. Removing it should be not measurable as Boris said.
Not sure if Tom has other concern.
Thanks
Baoquan
>
> diff --git a/arch/x86/boot/compressed/mem_encrypt.S b/arch/x86/boot/compressed/mem_encrypt.S
> index eaa843a52907..0b60eb867d25 100644
> --- a/arch/x86/boot/compressed/mem_encrypt.S
> +++ b/arch/x86/boot/compressed/mem_encrypt.S
> @@ -27,19 +27,6 @@ ENTRY(get_sev_encryption_bit)
> push %edx
> push %edi
>
> - /*
> - * RIP-relative addressing is needed to access the encryption bit
> - * variable. Since we are running in 32-bit mode we need this call/pop
> - * sequence to get the proper relative addressing.
> - */
> - call 1f
> -1: popl %edi
> - subl $1b, %edi
> -
> - movl enc_bit(%edi), %eax
> - cmpl $0, %eax
> - jge .Lsev_exit
> -
> /* Check if running under a hypervisor */
> movl $1, %eax
> cpuid
> @@ -69,12 +56,10 @@ ENTRY(get_sev_encryption_bit)
>
> movl %ebx, %eax
> andl $0x3f, %eax /* Return the encryption bit location */
> - movl %eax, enc_bit(%edi)
> jmp .Lsev_exit
>
> .Lno_sev:
> xor %eax, %eax
> - movl %eax, enc_bit(%edi)
>
> .Lsev_exit:
> pop %edi
> @@ -113,9 +98,6 @@ ENTRY(set_sev_encryption_mask)
> ENDPROC(set_sev_encryption_mask)
>
> .data
> -enc_bit:
> - .int 0xffffffff
> -
> #ifdef CONFIG_AMD_MEM_ENCRYPT
> .balign 8
> GLOBAL(sme_me_mask)
_______________________________________________
kexec mailing list
kexec@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/kexec
^ permalink raw reply [flat|nested] 22+ messages in thread
* Re: [PATCH] x86/boot: Fix kexec booting failure after SEV early boot support
2018-09-26 11:22 ` Baoquan He
@ 2018-09-26 13:01 ` Lendacky, Thomas
-1 siblings, 0 replies; 22+ messages in thread
From: Lendacky, Thomas @ 2018-09-26 13:01 UTC (permalink / raw)
To: Baoquan He, Borislav Petkov
Cc: Kairui Song, Singh, Brijesh, x86, kexec, linux-kernel, mingo,
hpa, tglx, dyoung
On 09/26/2018 06:22 AM, Baoquan He wrote:
> On 09/26/18 at 03:32pm, Baoquan He wrote:
>> On 09/25/18 at 07:26pm, Borislav Petkov wrote:
>>> IINM, the problem can be addressed in a simpler way by getting rid of
>>> enc_bit and thus getting rid of the need to do relative addressing of
>>> anything and simply doing the whole dance of figuring out the C-bit each
>>> time. It probably wouldn't be even measurable...
>>
>> Couldn't agree more.
>>
>> Obviously enc_bit is redundent here. We only check eax each time,
>> removing it can fix the RIP-relative addressing issue in kexec.
>
> OK, in distros CONFIG_AMD_MEM_ENCRYPT=y is set by default usually.
> enc_bit can save once in normal boot, then fetch and skip the cpuid
> detection in initialize_identity_maps(). However this only speeds up in
> amd system with SME, on intel cpu and amd cpu w/o sme, it still needs to
> do cpuid twice. Removing it should be not measurable as Boris said.
> Not sure if Tom has other concern.
No concern from me. The original version of the patch did not cache the
value, that was added based on the patch series feedback. So, if there
is no concern about executing some extra CPUID/RDMSR instructions, then
it would certainly simplify the code quite a bit.
Thanks,
Tom
>
> Thanks
> Baoquan
>
>>
>> diff --git a/arch/x86/boot/compressed/mem_encrypt.S b/arch/x86/boot/compressed/mem_encrypt.S
>> index eaa843a52907..0b60eb867d25 100644
>> --- a/arch/x86/boot/compressed/mem_encrypt.S
>> +++ b/arch/x86/boot/compressed/mem_encrypt.S
>> @@ -27,19 +27,6 @@ ENTRY(get_sev_encryption_bit)
>> push %edx
>> push %edi
>>
>> - /*
>> - * RIP-relative addressing is needed to access the encryption bit
>> - * variable. Since we are running in 32-bit mode we need this call/pop
>> - * sequence to get the proper relative addressing.
>> - */
>> - call 1f
>> -1: popl %edi
>> - subl $1b, %edi
>> -
>> - movl enc_bit(%edi), %eax
>> - cmpl $0, %eax
>> - jge .Lsev_exit
>> -
>> /* Check if running under a hypervisor */
>> movl $1, %eax
>> cpuid
>> @@ -69,12 +56,10 @@ ENTRY(get_sev_encryption_bit)
>>
>> movl %ebx, %eax
>> andl $0x3f, %eax /* Return the encryption bit location */
>> - movl %eax, enc_bit(%edi)
>> jmp .Lsev_exit
>>
>> .Lno_sev:
>> xor %eax, %eax
>> - movl %eax, enc_bit(%edi)
>>
>> .Lsev_exit:
>> pop %edi
>> @@ -113,9 +98,6 @@ ENTRY(set_sev_encryption_mask)
>> ENDPROC(set_sev_encryption_mask)
>>
>> .data
>> -enc_bit:
>> - .int 0xffffffff
>> -
>> #ifdef CONFIG_AMD_MEM_ENCRYPT
>> .balign 8
>> GLOBAL(sme_me_mask)
^ permalink raw reply [flat|nested] 22+ messages in thread
* Re: [PATCH] x86/boot: Fix kexec booting failure after SEV early boot support
@ 2018-09-26 13:01 ` Lendacky, Thomas
0 siblings, 0 replies; 22+ messages in thread
From: Lendacky, Thomas @ 2018-09-26 13:01 UTC (permalink / raw)
To: Baoquan He, Borislav Petkov
Cc: Singh, Brijesh, Kairui Song, x86, kexec, linux-kernel, mingo,
hpa, tglx, dyoung
On 09/26/2018 06:22 AM, Baoquan He wrote:
> On 09/26/18 at 03:32pm, Baoquan He wrote:
>> On 09/25/18 at 07:26pm, Borislav Petkov wrote:
>>> IINM, the problem can be addressed in a simpler way by getting rid of
>>> enc_bit and thus getting rid of the need to do relative addressing of
>>> anything and simply doing the whole dance of figuring out the C-bit each
>>> time. It probably wouldn't be even measurable...
>>
>> Couldn't agree more.
>>
>> Obviously enc_bit is redundent here. We only check eax each time,
>> removing it can fix the RIP-relative addressing issue in kexec.
>
> OK, in distros CONFIG_AMD_MEM_ENCRYPT=y is set by default usually.
> enc_bit can save once in normal boot, then fetch and skip the cpuid
> detection in initialize_identity_maps(). However this only speeds up in
> amd system with SME, on intel cpu and amd cpu w/o sme, it still needs to
> do cpuid twice. Removing it should be not measurable as Boris said.
> Not sure if Tom has other concern.
No concern from me. The original version of the patch did not cache the
value, that was added based on the patch series feedback. So, if there
is no concern about executing some extra CPUID/RDMSR instructions, then
it would certainly simplify the code quite a bit.
Thanks,
Tom
>
> Thanks
> Baoquan
>
>>
>> diff --git a/arch/x86/boot/compressed/mem_encrypt.S b/arch/x86/boot/compressed/mem_encrypt.S
>> index eaa843a52907..0b60eb867d25 100644
>> --- a/arch/x86/boot/compressed/mem_encrypt.S
>> +++ b/arch/x86/boot/compressed/mem_encrypt.S
>> @@ -27,19 +27,6 @@ ENTRY(get_sev_encryption_bit)
>> push %edx
>> push %edi
>>
>> - /*
>> - * RIP-relative addressing is needed to access the encryption bit
>> - * variable. Since we are running in 32-bit mode we need this call/pop
>> - * sequence to get the proper relative addressing.
>> - */
>> - call 1f
>> -1: popl %edi
>> - subl $1b, %edi
>> -
>> - movl enc_bit(%edi), %eax
>> - cmpl $0, %eax
>> - jge .Lsev_exit
>> -
>> /* Check if running under a hypervisor */
>> movl $1, %eax
>> cpuid
>> @@ -69,12 +56,10 @@ ENTRY(get_sev_encryption_bit)
>>
>> movl %ebx, %eax
>> andl $0x3f, %eax /* Return the encryption bit location */
>> - movl %eax, enc_bit(%edi)
>> jmp .Lsev_exit
>>
>> .Lno_sev:
>> xor %eax, %eax
>> - movl %eax, enc_bit(%edi)
>>
>> .Lsev_exit:
>> pop %edi
>> @@ -113,9 +98,6 @@ ENTRY(set_sev_encryption_mask)
>> ENDPROC(set_sev_encryption_mask)
>>
>> .data
>> -enc_bit:
>> - .int 0xffffffff
>> -
>> #ifdef CONFIG_AMD_MEM_ENCRYPT
>> .balign 8
>> GLOBAL(sme_me_mask)
_______________________________________________
kexec mailing list
kexec@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/kexec
^ permalink raw reply [flat|nested] 22+ messages in thread
* Re: [PATCH] x86/boot: Fix kexec booting failure after SEV early boot support
2018-09-26 13:01 ` Lendacky, Thomas
@ 2018-09-26 13:18 ` Borislav Petkov
-1 siblings, 0 replies; 22+ messages in thread
From: Borislav Petkov @ 2018-09-26 13:18 UTC (permalink / raw)
To: Lendacky, Thomas
Cc: Baoquan He, Kairui Song, Singh, Brijesh, x86, kexec,
linux-kernel, mingo, hpa, tglx, dyoung
On Wed, Sep 26, 2018 at 01:01:00PM +0000, Lendacky, Thomas wrote:
> No concern from me. The original version of the patch did not cache the
> value, that was added based on the patch series feedback. So, if there
> is no concern about executing some extra CPUID/RDMSR instructions, then
> it would certainly simplify the code quite a bit.
Yeah, I think it was me who suggested to cache it but having simpler
code greatly outweighs the minute caching win.
--
Regards/Gruss,
Boris.
SUSE Linux GmbH, GF: Felix Imendörffer, Jane Smithard, Graham Norton, HRB 21284 (AG Nürnberg)
^ permalink raw reply [flat|nested] 22+ messages in thread
* Re: [PATCH] x86/boot: Fix kexec booting failure after SEV early boot support
@ 2018-09-26 13:18 ` Borislav Petkov
0 siblings, 0 replies; 22+ messages in thread
From: Borislav Petkov @ 2018-09-26 13:18 UTC (permalink / raw)
To: Lendacky, Thomas
Cc: Singh, Brijesh, Kairui Song, Baoquan He, x86, kexec,
linux-kernel, mingo, hpa, tglx, dyoung
On Wed, Sep 26, 2018 at 01:01:00PM +0000, Lendacky, Thomas wrote:
> No concern from me. The original version of the patch did not cache the
> value, that was added based on the patch series feedback. So, if there
> is no concern about executing some extra CPUID/RDMSR instructions, then
> it would certainly simplify the code quite a bit.
Yeah, I think it was me who suggested to cache it but having simpler
code greatly outweighs the minute caching win.
--
Regards/Gruss,
Boris.
SUSE Linux GmbH, GF: Felix Imendörffer, Jane Smithard, Graham Norton, HRB 21284 (AG Nürnberg)
_______________________________________________
kexec mailing list
kexec@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/kexec
^ permalink raw reply [flat|nested] 22+ messages in thread
* Re: [PATCH] x86/boot: Fix kexec booting failure after SEV early boot support
2018-09-26 13:01 ` Lendacky, Thomas
@ 2018-09-26 13:21 ` Baoquan He
-1 siblings, 0 replies; 22+ messages in thread
From: Baoquan He @ 2018-09-26 13:21 UTC (permalink / raw)
To: Lendacky, Thomas, Kairui Song
Cc: Borislav Petkov, Singh, Brijesh, x86, kexec, linux-kernel, mingo,
hpa, tglx, dyoung
On 09/26/18 at 01:01pm, Lendacky, Thomas wrote:
> On 09/26/2018 06:22 AM, Baoquan He wrote:
> > On 09/26/18 at 03:32pm, Baoquan He wrote:
> >> On 09/25/18 at 07:26pm, Borislav Petkov wrote:
> >>> IINM, the problem can be addressed in a simpler way by getting rid of
> >>> enc_bit and thus getting rid of the need to do relative addressing of
> >>> anything and simply doing the whole dance of figuring out the C-bit each
> >>> time. It probably wouldn't be even measurable...
> >>
> >> Couldn't agree more.
> >>
> >> Obviously enc_bit is redundent here. We only check eax each time,
> >> removing it can fix the RIP-relative addressing issue in kexec.
> >
> > OK, in distros CONFIG_AMD_MEM_ENCRYPT=y is set by default usually.
> > enc_bit can save once in normal boot, then fetch and skip the cpuid
> > detection in initialize_identity_maps(). However this only speeds up in
> > amd system with SME, on intel cpu and amd cpu w/o sme, it still needs to
> > do cpuid twice. Removing it should be not measurable as Boris said.
> > Not sure if Tom has other concern.
>
> No concern from me. The original version of the patch did not cache the
> value, that was added based on the patch series feedback. So, if there
> is no concern about executing some extra CPUID/RDMSR instructions, then
> it would certainly simplify the code quite a bit.
OK, thanks for confirming this, Tom.
Then, maybe Kairui can repost below code with formal patch log after
testing. I have tested on a intel machine with 48G memory, and
CONFIG_AMD_MEM_ENCRYPT=y, it works well. Maybe add Boris's Suggested-By,
and CC me.
Thanks
Baoquan
> >>
> >> diff --git a/arch/x86/boot/compressed/mem_encrypt.S b/arch/x86/boot/compressed/mem_encrypt.S
> >> index eaa843a52907..0b60eb867d25 100644
> >> --- a/arch/x86/boot/compressed/mem_encrypt.S
> >> +++ b/arch/x86/boot/compressed/mem_encrypt.S
> >> @@ -27,19 +27,6 @@ ENTRY(get_sev_encryption_bit)
> >> push %edx
> >> push %edi
> >>
> >> - /*
> >> - * RIP-relative addressing is needed to access the encryption bit
> >> - * variable. Since we are running in 32-bit mode we need this call/pop
> >> - * sequence to get the proper relative addressing.
> >> - */
> >> - call 1f
> >> -1: popl %edi
> >> - subl $1b, %edi
> >> -
> >> - movl enc_bit(%edi), %eax
> >> - cmpl $0, %eax
> >> - jge .Lsev_exit
> >> -
> >> /* Check if running under a hypervisor */
> >> movl $1, %eax
> >> cpuid
> >> @@ -69,12 +56,10 @@ ENTRY(get_sev_encryption_bit)
> >>
> >> movl %ebx, %eax
> >> andl $0x3f, %eax /* Return the encryption bit location */
> >> - movl %eax, enc_bit(%edi)
> >> jmp .Lsev_exit
> >>
> >> .Lno_sev:
> >> xor %eax, %eax
> >> - movl %eax, enc_bit(%edi)
> >>
> >> .Lsev_exit:
> >> pop %edi
> >> @@ -113,9 +98,6 @@ ENTRY(set_sev_encryption_mask)
> >> ENDPROC(set_sev_encryption_mask)
> >>
> >> .data
> >> -enc_bit:
> >> - .int 0xffffffff
> >> -
> >> #ifdef CONFIG_AMD_MEM_ENCRYPT
> >> .balign 8
> >> GLOBAL(sme_me_mask)
^ permalink raw reply [flat|nested] 22+ messages in thread
* Re: [PATCH] x86/boot: Fix kexec booting failure after SEV early boot support
@ 2018-09-26 13:21 ` Baoquan He
0 siblings, 0 replies; 22+ messages in thread
From: Baoquan He @ 2018-09-26 13:21 UTC (permalink / raw)
To: Lendacky, Thomas, Kairui Song
Cc: Singh, Brijesh, x86, kexec, linux-kernel, mingo, hpa, tglx,
Borislav Petkov, dyoung
On 09/26/18 at 01:01pm, Lendacky, Thomas wrote:
> On 09/26/2018 06:22 AM, Baoquan He wrote:
> > On 09/26/18 at 03:32pm, Baoquan He wrote:
> >> On 09/25/18 at 07:26pm, Borislav Petkov wrote:
> >>> IINM, the problem can be addressed in a simpler way by getting rid of
> >>> enc_bit and thus getting rid of the need to do relative addressing of
> >>> anything and simply doing the whole dance of figuring out the C-bit each
> >>> time. It probably wouldn't be even measurable...
> >>
> >> Couldn't agree more.
> >>
> >> Obviously enc_bit is redundent here. We only check eax each time,
> >> removing it can fix the RIP-relative addressing issue in kexec.
> >
> > OK, in distros CONFIG_AMD_MEM_ENCRYPT=y is set by default usually.
> > enc_bit can save once in normal boot, then fetch and skip the cpuid
> > detection in initialize_identity_maps(). However this only speeds up in
> > amd system with SME, on intel cpu and amd cpu w/o sme, it still needs to
> > do cpuid twice. Removing it should be not measurable as Boris said.
> > Not sure if Tom has other concern.
>
> No concern from me. The original version of the patch did not cache the
> value, that was added based on the patch series feedback. So, if there
> is no concern about executing some extra CPUID/RDMSR instructions, then
> it would certainly simplify the code quite a bit.
OK, thanks for confirming this, Tom.
Then, maybe Kairui can repost below code with formal patch log after
testing. I have tested on a intel machine with 48G memory, and
CONFIG_AMD_MEM_ENCRYPT=y, it works well. Maybe add Boris's Suggested-By,
and CC me.
Thanks
Baoquan
> >>
> >> diff --git a/arch/x86/boot/compressed/mem_encrypt.S b/arch/x86/boot/compressed/mem_encrypt.S
> >> index eaa843a52907..0b60eb867d25 100644
> >> --- a/arch/x86/boot/compressed/mem_encrypt.S
> >> +++ b/arch/x86/boot/compressed/mem_encrypt.S
> >> @@ -27,19 +27,6 @@ ENTRY(get_sev_encryption_bit)
> >> push %edx
> >> push %edi
> >>
> >> - /*
> >> - * RIP-relative addressing is needed to access the encryption bit
> >> - * variable. Since we are running in 32-bit mode we need this call/pop
> >> - * sequence to get the proper relative addressing.
> >> - */
> >> - call 1f
> >> -1: popl %edi
> >> - subl $1b, %edi
> >> -
> >> - movl enc_bit(%edi), %eax
> >> - cmpl $0, %eax
> >> - jge .Lsev_exit
> >> -
> >> /* Check if running under a hypervisor */
> >> movl $1, %eax
> >> cpuid
> >> @@ -69,12 +56,10 @@ ENTRY(get_sev_encryption_bit)
> >>
> >> movl %ebx, %eax
> >> andl $0x3f, %eax /* Return the encryption bit location */
> >> - movl %eax, enc_bit(%edi)
> >> jmp .Lsev_exit
> >>
> >> .Lno_sev:
> >> xor %eax, %eax
> >> - movl %eax, enc_bit(%edi)
> >>
> >> .Lsev_exit:
> >> pop %edi
> >> @@ -113,9 +98,6 @@ ENTRY(set_sev_encryption_mask)
> >> ENDPROC(set_sev_encryption_mask)
> >>
> >> .data
> >> -enc_bit:
> >> - .int 0xffffffff
> >> -
> >> #ifdef CONFIG_AMD_MEM_ENCRYPT
> >> .balign 8
> >> GLOBAL(sme_me_mask)
_______________________________________________
kexec mailing list
kexec@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/kexec
^ permalink raw reply [flat|nested] 22+ messages in thread
* Re: [PATCH] x86/boot: Fix kexec booting failure after SEV early boot support
2018-09-27 12:38 ` Kairui Song
@ 2018-09-27 13:16 ` Lendacky, Thomas
-1 siblings, 0 replies; 22+ messages in thread
From: Lendacky, Thomas @ 2018-09-27 13:16 UTC (permalink / raw)
To: Kairui Song, linux-kernel
Cc: tglx, mingo, hpa, x86, Singh, Brijesh, bp, kexec, dyoung, bhe, ghook
On 09/27/2018 07:38 AM, Kairui Song wrote:
> Commit 1958b5fc4010 ("x86/boot: Add early boot support when running
> with SEV active") is causing kexec becomes sometimes unstable even if
> SEV is not active. kexec reboot won't start a second kernel bypassing
> BIOS boot process, instead, the system got reset.
>
> That's because, in get_sev_encryption_bit function, we are using
> 32-bit RIP-relative addressing to read the value of enc_bit, but
> kexec may alloc the early boot up code to a higher location, which
> is beyond 32-bit addressing limit. Some garbage will be read and
> get_sev_encryption_bit will return the wrong value, which leads to
> wrong memory page flag.
>
> This patch removes the use of enc_bit, as currently, enc_bit's only
> purpose is to avoid duplicated encryption bit reading, but the overhead
> of reading encryption bit is so tiny, so no need to cache that.
>
> Fixes: 1958b5fc4010 ("x86/boot: Add early boot support when running with SEV active")
> Suggested-by: Borislav Petkov <bp@suse.de>
> Signed-off-by: Kairui Song <kasong@redhat.com>
Reviewed-by: Tom Lendacky <thomas.lendacky@amd.com>
> ---
> arch/x86/boot/compressed/mem_encrypt.S | 19 -------------------
> 1 file changed, 19 deletions(-)
>
> diff --git a/arch/x86/boot/compressed/mem_encrypt.S b/arch/x86/boot/compressed/mem_encrypt.S
> index eaa843a52907..a480356e0ed8 100644
> --- a/arch/x86/boot/compressed/mem_encrypt.S
> +++ b/arch/x86/boot/compressed/mem_encrypt.S
> @@ -25,20 +25,6 @@ ENTRY(get_sev_encryption_bit)
> push %ebx
> push %ecx
> push %edx
> - push %edi
> -
> - /*
> - * RIP-relative addressing is needed to access the encryption bit
> - * variable. Since we are running in 32-bit mode we need this call/pop
> - * sequence to get the proper relative addressing.
> - */
> - call 1f
> -1: popl %edi
> - subl $1b, %edi
> -
> - movl enc_bit(%edi), %eax
> - cmpl $0, %eax
> - jge .Lsev_exit
>
> /* Check if running under a hypervisor */
> movl $1, %eax
> @@ -69,15 +55,12 @@ ENTRY(get_sev_encryption_bit)
>
> movl %ebx, %eax
> andl $0x3f, %eax /* Return the encryption bit location */
> - movl %eax, enc_bit(%edi)
> jmp .Lsev_exit
>
> .Lno_sev:
> xor %eax, %eax
> - movl %eax, enc_bit(%edi)
>
> .Lsev_exit:
> - pop %edi
> pop %edx
> pop %ecx
> pop %ebx
> @@ -113,8 +96,6 @@ ENTRY(set_sev_encryption_mask)
> ENDPROC(set_sev_encryption_mask)
>
> .data
> -enc_bit:
> - .int 0xffffffff
>
> #ifdef CONFIG_AMD_MEM_ENCRYPT
> .balign 8
>
^ permalink raw reply [flat|nested] 22+ messages in thread
* Re: [PATCH] x86/boot: Fix kexec booting failure after SEV early boot support
@ 2018-09-27 13:16 ` Lendacky, Thomas
0 siblings, 0 replies; 22+ messages in thread
From: Lendacky, Thomas @ 2018-09-27 13:16 UTC (permalink / raw)
To: Kairui Song, linux-kernel
Cc: ghook, Singh, Brijesh, bhe, x86, kexec, mingo, hpa, tglx, bp, dyoung
On 09/27/2018 07:38 AM, Kairui Song wrote:
> Commit 1958b5fc4010 ("x86/boot: Add early boot support when running
> with SEV active") is causing kexec becomes sometimes unstable even if
> SEV is not active. kexec reboot won't start a second kernel bypassing
> BIOS boot process, instead, the system got reset.
>
> That's because, in get_sev_encryption_bit function, we are using
> 32-bit RIP-relative addressing to read the value of enc_bit, but
> kexec may alloc the early boot up code to a higher location, which
> is beyond 32-bit addressing limit. Some garbage will be read and
> get_sev_encryption_bit will return the wrong value, which leads to
> wrong memory page flag.
>
> This patch removes the use of enc_bit, as currently, enc_bit's only
> purpose is to avoid duplicated encryption bit reading, but the overhead
> of reading encryption bit is so tiny, so no need to cache that.
>
> Fixes: 1958b5fc4010 ("x86/boot: Add early boot support when running with SEV active")
> Suggested-by: Borislav Petkov <bp@suse.de>
> Signed-off-by: Kairui Song <kasong@redhat.com>
Reviewed-by: Tom Lendacky <thomas.lendacky@amd.com>
> ---
> arch/x86/boot/compressed/mem_encrypt.S | 19 -------------------
> 1 file changed, 19 deletions(-)
>
> diff --git a/arch/x86/boot/compressed/mem_encrypt.S b/arch/x86/boot/compressed/mem_encrypt.S
> index eaa843a52907..a480356e0ed8 100644
> --- a/arch/x86/boot/compressed/mem_encrypt.S
> +++ b/arch/x86/boot/compressed/mem_encrypt.S
> @@ -25,20 +25,6 @@ ENTRY(get_sev_encryption_bit)
> push %ebx
> push %ecx
> push %edx
> - push %edi
> -
> - /*
> - * RIP-relative addressing is needed to access the encryption bit
> - * variable. Since we are running in 32-bit mode we need this call/pop
> - * sequence to get the proper relative addressing.
> - */
> - call 1f
> -1: popl %edi
> - subl $1b, %edi
> -
> - movl enc_bit(%edi), %eax
> - cmpl $0, %eax
> - jge .Lsev_exit
>
> /* Check if running under a hypervisor */
> movl $1, %eax
> @@ -69,15 +55,12 @@ ENTRY(get_sev_encryption_bit)
>
> movl %ebx, %eax
> andl $0x3f, %eax /* Return the encryption bit location */
> - movl %eax, enc_bit(%edi)
> jmp .Lsev_exit
>
> .Lno_sev:
> xor %eax, %eax
> - movl %eax, enc_bit(%edi)
>
> .Lsev_exit:
> - pop %edi
> pop %edx
> pop %ecx
> pop %ebx
> @@ -113,8 +96,6 @@ ENTRY(set_sev_encryption_mask)
> ENDPROC(set_sev_encryption_mask)
>
> .data
> -enc_bit:
> - .int 0xffffffff
>
> #ifdef CONFIG_AMD_MEM_ENCRYPT
> .balign 8
>
_______________________________________________
kexec mailing list
kexec@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/kexec
^ permalink raw reply [flat|nested] 22+ messages in thread
* [PATCH] x86/boot: Fix kexec booting failure after SEV early boot support
@ 2018-09-27 12:38 ` Kairui Song
0 siblings, 0 replies; 22+ messages in thread
From: Kairui Song @ 2018-09-27 12:38 UTC (permalink / raw)
To: linux-kernel
Cc: tglx, mingo, hpa, x86, thomas.lendacky, brijesh.singh, bp,
kasong, kexec, dyoung, bhe, ghook
Commit 1958b5fc4010 ("x86/boot: Add early boot support when running
with SEV active") is causing kexec becomes sometimes unstable even if
SEV is not active. kexec reboot won't start a second kernel bypassing
BIOS boot process, instead, the system got reset.
That's because, in get_sev_encryption_bit function, we are using
32-bit RIP-relative addressing to read the value of enc_bit, but
kexec may alloc the early boot up code to a higher location, which
is beyond 32-bit addressing limit. Some garbage will be read and
get_sev_encryption_bit will return the wrong value, which leads to
wrong memory page flag.
This patch removes the use of enc_bit, as currently, enc_bit's only
purpose is to avoid duplicated encryption bit reading, but the overhead
of reading encryption bit is so tiny, so no need to cache that.
Fixes: 1958b5fc4010 ("x86/boot: Add early boot support when running with SEV active")
Suggested-by: Borislav Petkov <bp@suse.de>
Signed-off-by: Kairui Song <kasong@redhat.com>
---
arch/x86/boot/compressed/mem_encrypt.S | 19 -------------------
1 file changed, 19 deletions(-)
diff --git a/arch/x86/boot/compressed/mem_encrypt.S b/arch/x86/boot/compressed/mem_encrypt.S
index eaa843a52907..a480356e0ed8 100644
--- a/arch/x86/boot/compressed/mem_encrypt.S
+++ b/arch/x86/boot/compressed/mem_encrypt.S
@@ -25,20 +25,6 @@ ENTRY(get_sev_encryption_bit)
push %ebx
push %ecx
push %edx
- push %edi
-
- /*
- * RIP-relative addressing is needed to access the encryption bit
- * variable. Since we are running in 32-bit mode we need this call/pop
- * sequence to get the proper relative addressing.
- */
- call 1f
-1: popl %edi
- subl $1b, %edi
-
- movl enc_bit(%edi), %eax
- cmpl $0, %eax
- jge .Lsev_exit
/* Check if running under a hypervisor */
movl $1, %eax
@@ -69,15 +55,12 @@ ENTRY(get_sev_encryption_bit)
movl %ebx, %eax
andl $0x3f, %eax /* Return the encryption bit location */
- movl %eax, enc_bit(%edi)
jmp .Lsev_exit
.Lno_sev:
xor %eax, %eax
- movl %eax, enc_bit(%edi)
.Lsev_exit:
- pop %edi
pop %edx
pop %ecx
pop %ebx
@@ -113,8 +96,6 @@ ENTRY(set_sev_encryption_mask)
ENDPROC(set_sev_encryption_mask)
.data
-enc_bit:
- .int 0xffffffff
#ifdef CONFIG_AMD_MEM_ENCRYPT
.balign 8
--
2.17.1
^ permalink raw reply related [flat|nested] 22+ messages in thread
* [PATCH] x86/boot: Fix kexec booting failure after SEV early boot support
@ 2018-09-27 12:38 ` Kairui Song
0 siblings, 0 replies; 22+ messages in thread
From: Kairui Song @ 2018-09-27 12:38 UTC (permalink / raw)
To: linux-kernel
Cc: thomas.lendacky, ghook, brijesh.singh, kasong, bhe, x86, kexec,
mingo, hpa, tglx, bp, dyoung
Commit 1958b5fc4010 ("x86/boot: Add early boot support when running
with SEV active") is causing kexec becomes sometimes unstable even if
SEV is not active. kexec reboot won't start a second kernel bypassing
BIOS boot process, instead, the system got reset.
That's because, in get_sev_encryption_bit function, we are using
32-bit RIP-relative addressing to read the value of enc_bit, but
kexec may alloc the early boot up code to a higher location, which
is beyond 32-bit addressing limit. Some garbage will be read and
get_sev_encryption_bit will return the wrong value, which leads to
wrong memory page flag.
This patch removes the use of enc_bit, as currently, enc_bit's only
purpose is to avoid duplicated encryption bit reading, but the overhead
of reading encryption bit is so tiny, so no need to cache that.
Fixes: 1958b5fc4010 ("x86/boot: Add early boot support when running with SEV active")
Suggested-by: Borislav Petkov <bp@suse.de>
Signed-off-by: Kairui Song <kasong@redhat.com>
---
arch/x86/boot/compressed/mem_encrypt.S | 19 -------------------
1 file changed, 19 deletions(-)
diff --git a/arch/x86/boot/compressed/mem_encrypt.S b/arch/x86/boot/compressed/mem_encrypt.S
index eaa843a52907..a480356e0ed8 100644
--- a/arch/x86/boot/compressed/mem_encrypt.S
+++ b/arch/x86/boot/compressed/mem_encrypt.S
@@ -25,20 +25,6 @@ ENTRY(get_sev_encryption_bit)
push %ebx
push %ecx
push %edx
- push %edi
-
- /*
- * RIP-relative addressing is needed to access the encryption bit
- * variable. Since we are running in 32-bit mode we need this call/pop
- * sequence to get the proper relative addressing.
- */
- call 1f
-1: popl %edi
- subl $1b, %edi
-
- movl enc_bit(%edi), %eax
- cmpl $0, %eax
- jge .Lsev_exit
/* Check if running under a hypervisor */
movl $1, %eax
@@ -69,15 +55,12 @@ ENTRY(get_sev_encryption_bit)
movl %ebx, %eax
andl $0x3f, %eax /* Return the encryption bit location */
- movl %eax, enc_bit(%edi)
jmp .Lsev_exit
.Lno_sev:
xor %eax, %eax
- movl %eax, enc_bit(%edi)
.Lsev_exit:
- pop %edi
pop %edx
pop %ecx
pop %ebx
@@ -113,8 +96,6 @@ ENTRY(set_sev_encryption_mask)
ENDPROC(set_sev_encryption_mask)
.data
-enc_bit:
- .int 0xffffffff
#ifdef CONFIG_AMD_MEM_ENCRYPT
.balign 8
--
2.17.1
_______________________________________________
kexec mailing list
kexec@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/kexec
^ permalink raw reply related [flat|nested] 22+ messages in thread
end of thread, other threads:[~2018-09-27 13:17 UTC | newest]
Thread overview: 22+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2018-09-25 11:10 [PATCH] x86/boot: Fix kexec booting failure after SEV early boot support Kairui Song
2018-09-25 11:10 ` Kairui Song
2018-09-25 14:33 ` Lendacky, Thomas
2018-09-25 14:33 ` Lendacky, Thomas
2018-09-25 17:26 ` Borislav Petkov
2018-09-25 17:26 ` Borislav Petkov
2018-09-26 7:32 ` Baoquan He
2018-09-26 7:32 ` Baoquan He
2018-09-26 10:52 ` Kairui Song
2018-09-26 10:52 ` Kairui Song
2018-09-26 11:22 ` Baoquan He
2018-09-26 11:22 ` Baoquan He
2018-09-26 13:01 ` Lendacky, Thomas
2018-09-26 13:01 ` Lendacky, Thomas
2018-09-26 13:18 ` Borislav Petkov
2018-09-26 13:18 ` Borislav Petkov
2018-09-26 13:21 ` Baoquan He
2018-09-26 13:21 ` Baoquan He
2018-09-27 12:38 Kairui Song
2018-09-27 12:38 ` Kairui Song
2018-09-27 13:16 ` Lendacky, Thomas
2018-09-27 13:16 ` Lendacky, Thomas
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.