Received: by 2002:ac0:bc90:0:0:0:0:0 with SMTP id a16csp2998364img; Mon, 25 Mar 2019 01:23:36 -0700 (PDT) X-Google-Smtp-Source: APXvYqwGuJzyee54GdnpTmWc+2Am3QzSO5TsHpnLMzCbPRf5PxfOc2JiF2z/dWeVjxU7dFleYKlT X-Received: by 2002:a17:902:5a2:: with SMTP id f31mr23814697plf.119.1553502215911; Mon, 25 Mar 2019 01:23:35 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1553502215; cv=none; d=google.com; s=arc-20160816; b=JGV1jZ7IegRAmkPF7Fqh6xwPKHNNBOmSvZhj+vaP8zIceBggRcYAj0jLFHC8BnGEvT kx+KtpD4zMLBAIuPONqCdqhOpQ9k0WV8kgTPtXlsVkqfh6usijgsJYXWYR+Cfzxkb5be NddLYbKVx+fCLB3+clyE96fXtV3kyNQYc8uB3uhzTmGicW8AEp7vGS25iUym+/kvxhgs ylb5BR6DHolOt9mEZxVf64f53HkDPtVKLfR31OzvGzqxwNk2NQiuhCZl5w+fQ1zATk0P Xzs35MUaFrpbOD1eSYWwJ+YvPSd8hWxhq2M0E1xwaB9PxwqmGMBUcs8VOjBBSoQmAX/h oL2w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=77f4Ya5aYXHpRaGXHF7c7bKvW3Ax1Wwzk3kCLPzqNsk=; b=hYnJW2q1e+17+JFoW2HZXGtOfZ34nch5RrgnxtNPXCEsoNlHtswbxCkTRcL0MomHXT Kr6NWOU11k0popO84UX64xIwfoguipsjRf/pgqXXKs4KMdqhYmSKnmrVcLgLFzZj45LG n6ioZk/+f+JOITldRv6UEAi3cE7qgTfO48XMkJZ8WqFRvJzh+CJi3Y8a8Q6rlkKza4rn LNCcJUAk4r5vWJSDPm8qGVe6Q4cu1l7dL1jq9nv60GF+Fk58eCxRjuw+eHGdAEX1VeLr 8ohNQtF8Cbb5FKG63XhlapXPsD3mFjjthwTyuPIFoh5QCpa9d1p23GG8fr6zLREKvjDB 2ptg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id j5si13021180pfi.227.2019.03.25.01.23.20; Mon, 25 Mar 2019 01:23:35 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729985AbfCYIV2 (ORCPT + 99 others); Mon, 25 Mar 2019 04:21:28 -0400 Received: from mx1.redhat.com ([209.132.183.28]:34226 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729914AbfCYIV1 (ORCPT ); Mon, 25 Mar 2019 04:21:27 -0400 Received: from smtp.corp.redhat.com (int-mx04.intmail.prod.int.phx2.redhat.com [10.5.11.14]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id A6A0981F1B; Mon, 25 Mar 2019 08:21:27 +0000 (UTC) Received: from localhost (ovpn-12-56.pek2.redhat.com [10.72.12.56]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 122835DA27; Mon, 25 Mar 2019 08:21:26 +0000 (UTC) Date: Mon, 25 Mar 2019 16:21:24 +0800 From: Baoquan He To: Borislav Petkov Cc: Junichi Nomura , "fanc.fnst@cn.fujitsu.com" , "linux-kernel@vger.kernel.org" , "x86@kernel.org" Subject: Re: [PATCH] x86/boot: Use EFI setup data if provided Message-ID: <20190325082124.GD3659@MiWiFi-R3L-srv> References: <20190322110342.GA16202@jeru.linux.bs1.fc.nec.co.jp> <20190322152328.GD12472@zn.tnic> <20190325072710.GA31828@MiWiFi-R3L-srv> <20190325075342.GE12016@zn.tnic> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190325075342.GE12016@zn.tnic> User-Agent: Mutt/1.10.1 (2018-07-13) X-Scanned-By: MIMEDefang 2.79 on 10.5.11.14 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.27]); Mon, 25 Mar 2019 08:21:27 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 03/25/19 at 08:53am, Borislav Petkov wrote: > On Mon, Mar 25, 2019 at 03:27:10PM +0800, Baoquan He wrote: > > Kexec kernel also need to get rsdp to get SRAT tables so that KASLR can > > avoid those hotpluggable regions in boot compression stage. > > > > The kexec_file_load has filled in acpi_rsdp_addr of kexec kernel in > > below code. It will return direclty in get_rsdp_addr() since > > acpi_rsdp_addr is got from boot_params->acpi_rsdp_addr. > > > > arch/x86/kernel/kexec-bzimage64.c <> > > params->acpi_rsdp_addr = boot_params.acpi_rsdp_addr; > > > > The other interface, kexec_load, its boot_params filling is done in user > > space kexec_tools. And we haven't made the acpi_rsdp_addr filling yet. > > And the old kexec_tools utility can also cause the new kexec kernel to > > search efi rspd pointer even thought it's fixed. > > Yes, kexec is a pile of ugly and fragile hackery. Well, yes, we have to admit that, since kexec is based on hacking. It never miss chance to give us bumps all over the head. If it hasn't been changed to cater the kernel iamge verification, the kexec_load is enough to serve, and maintaining most of codes in user space won't impact other component. Thanks Baoquan