Received: by 2002:ac0:a5a6:0:0:0:0:0 with SMTP id m35-v6csp2193645imm; Mon, 3 Sep 2018 22:51:28 -0700 (PDT) X-Google-Smtp-Source: ANB0VdZmwM1F5TkmbPYq1vtGFBk0jzcJHc1P/C6eyOm+GOSMUSgKk+C+4ilNVzqb1FW4IRgrZy9Q X-Received: by 2002:a65:48c6:: with SMTP id o6-v6mr28793039pgs.99.1536040288779; Mon, 03 Sep 2018 22:51:28 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1536040288; cv=none; d=google.com; s=arc-20160816; b=GzrBW9BKE+KgkKC0a4xkGuAdqDLiBbd9kWEcQlMDsF63/ThjaJu5zkCmsuHNDOuiWY bc/pCSFbCnzibWAXlc1hqYJhJPnvmnWn5yWkmsnvMCAb/4wMFxSd9RVPgROEO2CAn1Mm RWU5H689331C44LkW5QAh8aZvqx56/m0BU3iiS+Lvalm/upOyV3CgiAkXwXZzX3AVJBV e5dRf+JV008++xgM/Pq926ESfi4259RaMQY69X9d+Y5jxhU/RupZPjuRUrSRFqaUfmG0 IIML6Ys8kcChpoT0yuyIFcQfe9Dyma8OijBOJdbpJjCtbUhcfzCwUQPEUEqCa2VpugRG Zj4g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:arc-authentication-results; bh=FEcUYWE/RBwkSLUcX7dXtQXgNDQQ3UJo/gOiYicX0Gg=; b=M9PlXp8wB9j7Bb9zdx1jbxei0OJLm6MSpTEeJjUpfUuAkNkwJ/4XWHwgn/1o+LnF3Z z3gb2THe9rTIJCfZ3MptkmbhgJmqPdBmaasUBjZvQwrACC0S+4+ZrbKSLpW2pdHs0DHc l9pR2L2BvdGFd1z2FaHpD53Zwe/tRaK9kBBt63dzc84/ImwjZNNnGRTF/JyNbU7LJQ8S vxlsWPwwsHqZorNyZV345rMfkD28D8TI0A9ukffOQfuh4q/5DikgpCNawR5q8JV/rJ7j 7tFTLSVl8auWORheJny9AUQNyY0be+otpQdDVJAA47gBGLpW7mYyeCNv8HkRpUUTZCV4 u+3w== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id l63-v6si18022085pgd.598.2018.09.03.22.50.59; Mon, 03 Sep 2018 22:51:28 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727389AbeIDKMk (ORCPT + 99 others); Tue, 4 Sep 2018 06:12:40 -0400 Received: from terminus.zytor.com ([198.137.202.136]:38319 "EHLO mail.zytor.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727169AbeIDKMj (ORCPT ); Tue, 4 Sep 2018 06:12:39 -0400 Received: from carbon-x1.hos.anvin.org (c-24-5-245-234.hsd1.ca.comcast.net [24.5.245.234] (may be forged)) (authenticated bits=0) by mail.zytor.com (8.15.2/8.15.2) with ESMTPSA id w845kdJp3575320 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=NO); Mon, 3 Sep 2018 22:46:39 -0700 Subject: Re: [PATCH 1/3] x86/boot: Add bit fields into xloadflags for 5-level kernel checking To: Baoquan He Cc: x86@kernel.org, kexec@lists.infradead.org, linux-kernel@vger.kernel.org, tglx@linutronix.de, mingo@kernel.org, kirill.shutemov@linux.intel.com References: <20180829141624.13985-1-bhe@redhat.com> <20180829141624.13985-2-bhe@redhat.com> <6ea94875-ae07-6220-eb3e-d3f830cdac03@zytor.com> <20180904034414.GI1740@192.168.1.3> <4546fc39-4982-4c91-c812-0df1e9bc9e20@zytor.com> <20180904052036.GJ1740@192.168.1.3> From: "H. Peter Anvin" Message-ID: Date: Mon, 3 Sep 2018 22:46:33 -0700 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.9.1 MIME-Version: 1.0 In-Reply-To: <20180904052036.GJ1740@192.168.1.3> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 09/03/18 22:20, Baoquan He wrote: > On 09/03/18 at 09:13pm, H. Peter Anvin wrote: >> On 09/03/18 20:44, Baoquan He wrote: >>> >>> 1) in arch/x86/kernel/relocate_kernel_64.S, we set X86_CR4_LA57 into cr4 >>> if the 1st kernel is in 5-level mode. Then in >>> arch/x86/boot/compressed/head_64.S, paging_prepare() is called to decide >>> if 5-level mode will be enabled, and prepare the trampoline. If >>> kexec/kdump kernel is expected to be in 4-level, e.g with 'nolv5' >>> specified, it still can handle well. But for the old kernel w/o these >>> 5-level codes, it will ignore the fact that X86_CR4_LA57 has been set >>> in CR4 and proceed anyway, then #GP is triggered. That's why XLF_5LEVEL >>> is used to mark. >>> >> >> That's what I'm saying, don't do that. Always jump into the second kernel in >> 4-level mode, i.e. X86_CR4_LA57 unset. That's the only sane thing. > > Well, this might not be suggested. Kexec has been a formal feature in > our distro, our customers usually use it to reboot high end servers > because those machines may take one hour to boot up from firmware. And > 5-level may be also supported very soon, if people want to do a fast > reboot from the current kernel in 5-level, and expect to see it's in > 5-level too in the 2nd kernel, this always kexec jumping to the 2nd > kernel in 4-level mode might be unaccepted. > That makes no sense. I'm talking about *entering* the kernel; the second kernel should switch to 5-level mode as necessary. -hpa