Received: by 2002:a17:90a:1609:0:0:0:0 with SMTP id n9csp2059232pja; Thu, 9 Apr 2020 13:18:36 -0700 (PDT) X-Google-Smtp-Source: APiQypJ0QryGZLANmcuCRVsZJtxePcMZMtwB2kYAT1NtYVPjKBNCpFT1Y0SxvI8UhQbIBkFmzvvY X-Received: by 2002:a05:6214:6a6:: with SMTP id s6mr1847357qvz.247.1586463516328; Thu, 09 Apr 2020 13:18:36 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1586463516; cv=none; d=google.com; s=arc-20160816; b=Iiyc9QCFVvyLzuN/MGjpaRG0FWFAy4luhvMRTEnYHF9h4pqI/HxGgjzaXS+LzWGIeV oRFVVGChqla9EqobDeIQ0XU+jS5rikfwW3Wc1J8xpZL4kt3/bNeo5zEDWqdu1z/zG4Jn /Q+rKmVPq+vBqRTTtyjLrFKO1j+QDLaNUjpTFNFMxndaFx8uiSe8tRNFv6aYa8/i67GF 3c0hR4WYIlkE74ur1OJT/5vdZ8oprXMXxARpc1IP7jrPD6o0caWlIaZam/L+niFQmJsZ z5ehq1/E7Lpr//QUDTwRofnCeyUdXXdudKlynfyhpwtT1K2BQsBMWj8qeSD6JIC23cxW Vx1Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date; bh=uCpLYayg162OE9H8T9+hkeRGAXglK6vV/qYBKQMzE80=; b=jUwqboeiXyegzNThmZewNYA/qsm+d1We6JqLNqTs+5kOkJCD2HgUJmueiUZyA9BwIO zxY/ZWp1JtgjSyeF8J9XgbOc7DEIfuXLFDLl1q7A/6/GMd2bsK9jOX5NE/EAZZebQCb6 4sQCRqQYOt9rN6llTmvwRKa764gYcQExk/Iv0W9ZeI2o5ryXtY2q4NbciPBwC8Esqomw rHWXWGDiidYfRHzbg4Ib2GpapB5bOjOh4RBOFCCmEjn6Os+K+Qr5REUjudE0VoXzZnku NzqYR2iC1/wOuBgtQJbI6FMP5W8C42x5K/CeY44vplukQZ0GEyIrFu+ABawlYiXEQjgP BrOg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id o19si10151qkj.305.2020.04.09.13.18.19; Thu, 09 Apr 2020 13:18:36 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726945AbgDIUQ4 (ORCPT + 99 others); Thu, 9 Apr 2020 16:16:56 -0400 Received: from outgoing-auth-1.mit.edu ([18.9.28.11]:54613 "EHLO outgoing.mit.edu" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726796AbgDIUQ4 (ORCPT ); Thu, 9 Apr 2020 16:16:56 -0400 Received: from callcc.thunk.org (pool-72-93-95-157.bstnma.fios.verizon.net [72.93.95.157]) (authenticated bits=0) (User authenticated as tytso@ATHENA.MIT.EDU) by outgoing.mit.edu (8.14.7/8.12.4) with ESMTP id 039KGWaT016170 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Thu, 9 Apr 2020 16:16:33 -0400 Received: by callcc.thunk.org (Postfix, from userid 15806) id 9733A42013D; Thu, 9 Apr 2020 16:16:32 -0400 (EDT) Date: Thu, 9 Apr 2020 16:16:32 -0400 From: "Theodore Y. Ts'o" To: Ard Biesheuvel Cc: linux-efi , Ingo Molnar , Thomas Gleixner , Linux Kernel Mailing List , Arnd Bergmann , Arvind Sankar , Borislav Petkov , Colin Ian King , Gary Lin , Jiri Slaby , Sergey Shatunov , Takashi Iwai Subject: Re: [GIT PULL 0/9] EFI fixes for v5.7-rc Message-ID: <20200409201632.GC45598@mit.edu> References: <20200409130434.6736-1-ardb@kernel.org> <20200409190109.GB45598@mit.edu> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Apr 09, 2020 at 09:04:42PM +0200, Ard Biesheuvel wrote: > > > I'm currently building Linus's latest branch to see if it's been fixed > > since v5.6-11114-g9c94b39560c3 (which is where I first noticed it) and > > while I was waiting for v5.6-12349-g87ebc45d2d32 to finish building so > > I could test it, I noticed these patches, and so I figured I'd fire > > off this quick question. > > > > I think we might be able to downright revert that patch if the > underlying assumption on my part is inaccurate, which was that the > fact that the boot code no longer uses the runtime table address > implies that there is no longer a reason to pass it. Unfortunately, it doesn't cleanly revert, which is why I started checking to see if it might be fixed already before trying to figure out how to do a manual revert. I just tested and the tip of Linus's tree still has the failure. The short description of the failure: I'm using Debian Stable (Buster) with a 4.19 distro kernel and kexec-tools 2.0.18 to kexec into the kernel under test. I'm using a Google Compute Engine VM, and the actual kexec command is here: https://github.com/tytso/xfstests-bld/blob/master/kvm-xfstests/test-appliance/files/usr/local/lib/gce-kexec#L146 What happens is that the kexec'ed kernel immediately crashes, at which point we drop back into the BIOS, and then it boots the Debain 4.19.0 distro kernel instead of the kernel to be tested boot. Since we lose the boot command line that was used from the kexec, the gce-xfstests image retries the kexec, which fails, and the failing kexec repeats until I manually kill the VM. The bisect fingred v5.6-rc1-59-g0a67361dcdaa ("efi/x86: Remove runtime table address from kexec EFI setup data") as the first failing commit. Its immediate parent commit, v5.6-rc1-58-g06c0bd93434c works just fine. Is there any further debugging information that would be useful? Thanks, - Ted