Received: by 2002:ac0:bc90:0:0:0:0:0 with SMTP id a16csp3010994img; Mon, 25 Mar 2019 01:44:18 -0700 (PDT) X-Google-Smtp-Source: APXvYqzStVojMGpsTROEx7sRU1NuX6yA4GG7xBmKAE9EOL1YB1PHwDS1mdQ1/Ic2jXfSYldeWENB X-Received: by 2002:a63:68ca:: with SMTP id d193mr21909881pgc.53.1553503458085; Mon, 25 Mar 2019 01:44:18 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1553503458; cv=none; d=google.com; s=arc-20160816; b=jXr7sCP0UDMeNsJ9AI3p6JWh7QICuKTQmMCoeQSKz4Oi9CIGF2+q7/9KMNdHIM2Pm2 cP6KCwc0hLTGM1390miMImir9WMFRDgJnr/57KPDZ1uyOwGOm9xfIDRU/XRhSCKSfO6q 5NqP3rIlsLL4OB4vT/FsTK+J2x2I/Oe8ZaV8ElYmugpenh+bBv9veZVHs6w89BTgafRs cJ4OpNANSsJdE66yuT79YZBukf6sjVHA0x2RAwUcrFktfvWfaCDWZlrThgoHu15PFsHg QUMfVqE6XqYLuApdZU8qepii4lBDOnxkWoij84MOT7OSTtqy8SJSuTaJDa/i9l7yT3GA p3gA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :message-id:in-reply-to:subject:cc:to:from:date; bh=RXbQGvS+nvAZSvf9AZ3Aa6mv2xQs0tfk1BmbFJKlo4I=; b=rmf2Fcba2gPD89s7FJjLhWHTaOOWs0s3M+C4FCKIZ+eTcnqKAmInZj0+TAdHdLLegR rRyabNe9zXcQRymMm3erav45ewhnVM7x0mEPVMNIi32qvsikROabHpRHjMXmvqZX+H5T rO9ZLEN3ydn4+h2Qd3vqAeUwDsSMxR5MpjeAuJZ1DZAdJ++/hbOh7TvGPnvGozUNlJWP 62HeyO9Je1eqUYjDvzerglTiDu9y0nr03eTOChldQFK5w6FNzcAb4k8w1CzwHTC/JD64 5opqYFmeNwPSbE/g3nuxzDD6MZhT50u/oWo42a9sfdSxZ49SLuR1B1GHzrW28nrzLzk9 ag/g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id h21si13613678plr.229.2019.03.25.01.44.02; Mon, 25 Mar 2019 01:44:18 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730019AbfCYInL (ORCPT + 99 others); Mon, 25 Mar 2019 04:43:11 -0400 Received: from Galois.linutronix.de ([146.0.238.70]:45000 "EHLO Galois.linutronix.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729526AbfCYInL (ORCPT ); Mon, 25 Mar 2019 04:43:11 -0400 Received: from p5492e2fc.dip0.t-ipconnect.de ([84.146.226.252] helo=nanos) by Galois.linutronix.de with esmtpsa (TLS1.2:DHE_RSA_AES_256_CBC_SHA256:256) (Exim 4.80) (envelope-from ) id 1h8LCA-0005Qk-PT; Mon, 25 Mar 2019 09:43:03 +0100 Date: Mon, 25 Mar 2019 09:43:02 +0100 (CET) From: Thomas Gleixner To: Baoquan He cc: Borislav Petkov , Junichi Nomura , "fanc.fnst@cn.fujitsu.com" , "linux-kernel@vger.kernel.org" , "x86@kernel.org" Subject: Re: [PATCH] x86/boot: Use EFI setup data if provided In-Reply-To: <20190325082124.GD3659@MiWiFi-R3L-srv> Message-ID: References: <20190322110342.GA16202@jeru.linux.bs1.fc.nec.co.jp> <20190322152328.GD12472@zn.tnic> <20190325072710.GA31828@MiWiFi-R3L-srv> <20190325075342.GE12016@zn.tnic> <20190325082124.GD3659@MiWiFi-R3L-srv> User-Agent: Alpine 2.21 (DEB 202 2017-01-01) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII X-Linutronix-Spam-Score: -1.0 X-Linutronix-Spam-Level: - X-Linutronix-Spam-Status: No , -1.0 points, 5.0 required, ALL_TRUSTED=-1,SHORTCIRCUIT=-0.0001 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, 25 Mar 2019, Baoquan He wrote: > On 03/25/19 at 08:53am, Borislav Petkov wrote: > > On Mon, Mar 25, 2019 at 03:27:10PM +0800, Baoquan He wrote: > > > Kexec kernel also need to get rsdp to get SRAT tables so that KASLR can > > > avoid those hotpluggable regions in boot compression stage. > > > > > > The kexec_file_load has filled in acpi_rsdp_addr of kexec kernel in > > > below code. It will return direclty in get_rsdp_addr() since > > > acpi_rsdp_addr is got from boot_params->acpi_rsdp_addr. > > > > > > arch/x86/kernel/kexec-bzimage64.c <> > > > params->acpi_rsdp_addr = boot_params.acpi_rsdp_addr; > > > > > > The other interface, kexec_load, its boot_params filling is done in user > > > space kexec_tools. And we haven't made the acpi_rsdp_addr filling yet. > > > And the old kexec_tools utility can also cause the new kexec kernel to > > > search efi rspd pointer even thought it's fixed. > > > > Yes, kexec is a pile of ugly and fragile hackery. > > Well, yes, we have to admit that, since kexec is based on hacking. Well, then the right thing to do is to think about it proper and replace the hackery by something well thought out instead of adding duct tape to it every other day. Thanks, tglx