Received: by 2002:a25:6193:0:0:0:0:0 with SMTP id v141csp622723ybb; Fri, 10 Apr 2020 06:56:11 -0700 (PDT) X-Google-Smtp-Source: APiQypI0Ev1Y0Lmb4GHcbRtAF8/H+diKY00UrHUIB1K8iAN6u/N0RT8aJ36kwpo3pSFSxZ6blW6Q X-Received: by 2002:a05:620a:209c:: with SMTP id e28mr4212856qka.501.1586526971428; Fri, 10 Apr 2020 06:56:11 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1586526971; cv=none; d=google.com; s=arc-20160816; b=keNMP+L6WRFSRxKDUJgygv9GWvha0t7xuwgVxeepqJtsdLzmtPNi5ypdVHlqDqp80K s+VDitM3A24GO18ph4X+IwCwtJ1YXYr3b5njfO1UONkUW4ExGWgznRFB2EovB7RQom3B 756xDodXLYiPmSmbRU9ucoDZ5913xyN5u+qU7KfQExrlDlh/f8zm07hCWUPKdS/P5uGU CPeughoHPWyaTILRDYl63laABEvff2sBEZ9wlJgV68zSLZO/McTZF3hUD8tHf9azknWP PUCYRbqreCeur/2A326rq/Ofyff+cWGKwm5e2Yovpl4mZSws0Kfm0DGcFBhGxk55JwQi fKqw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date :dkim-signature; bh=iz174XEQjo4HdMwcToRtjnHITXXF+QDP8a5ZECFP3Pc=; b=CbsanZ1daiUlpLZCVzwnqoSrIxeHNJc29CbK+InpTrQZ+6AUYwYn4yXn/QAHyGOl4i rc7wGrbVju5/HyXm2guTxHkR4o+zRTvSiAxYhpCCOnnWFWZlqNCKTnREdykIB8xmm27Z O+BmyybDmgGY6Q0TwiJiYpKpWlk6MHq9tYbi6VLWCevUDtSb6we62cpxJJJrYnLuYGzt abEW2PPqPfkY4ZYyZRqcWPfs6ExabYrx8SOXUZKRO0zaaVFUyHnIp4VdKHWf87qoEn9z 1De6MOLQqQUH/u8Ij62OfvbR0tFrB2OlnBS6RGL1K2SsGxZ06/H+mLE/hyp6/19uNXWl a7sg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b="P/Id93cT"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id a12si1066278qvb.198.2020.04.10.06.55.54; Fri, 10 Apr 2020 06:56:11 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b="P/Id93cT"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726203AbgDJNzE (ORCPT + 99 others); Fri, 10 Apr 2020 09:55:04 -0400 Received: from us-smtp-1.mimecast.com ([207.211.31.81]:26294 "EHLO us-smtp-delivery-1.mimecast.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726049AbgDJNzE (ORCPT ); Fri, 10 Apr 2020 09:55:04 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1586526903; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=iz174XEQjo4HdMwcToRtjnHITXXF+QDP8a5ZECFP3Pc=; b=P/Id93cTrRAhZS01mimoNV08pgUuQQBhq+OskWK9iNVMg8bS/IQPrxqkpr1qdT2JXQ7W0J lkiLUJZMgbxSnbgTqinrqCmSL1zYC/h7lbqU6rycK4CXGoyf72wsbuKtEVYvDr48C91GV+ w9Bhjbd84Xw0WdHSjcJx90kv7eoYNVc= Received: from mimecast-mx01.redhat.com (mimecast-mx01.redhat.com [209.132.183.4]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-379-0sQfwSBnPamulE2kIkaCUA-1; Fri, 10 Apr 2020 09:54:59 -0400 X-MC-Unique: 0sQfwSBnPamulE2kIkaCUA-1 Received: from smtp.corp.redhat.com (int-mx02.intmail.prod.int.phx2.redhat.com [10.5.11.12]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx01.redhat.com (Postfix) with ESMTPS id 998DB107ACC7; Fri, 10 Apr 2020 13:54:55 +0000 (UTC) Received: from dhcp-128-65.nay.redhat.com (ovpn-12-106.pek2.redhat.com [10.72.12.106]) by smtp.corp.redhat.com (Postfix) with ESMTPS id A4ED260C05; Fri, 10 Apr 2020 13:54:47 +0000 (UTC) Date: Fri, 10 Apr 2020 21:54:42 +0800 From: Dave Young To: Ard Biesheuvel Cc: "Theodore Y. Ts'o" , linux-efi , Ingo Molnar , Thomas Gleixner , kexec@lists.infradead.org, Linux Kernel Mailing List , Arnd Bergmann , Arvind Sankar , Borislav Petkov , Colin Ian King , Gary Lin , Jiri Slaby , Sergey Shatunov , Takashi Iwai Subject: Re: [GIT PULL 0/9] EFI fixes for v5.7-rc Message-ID: <20200410135442.GA6772@dhcp-128-65.nay.redhat.com> References: <20200409130434.6736-1-ardb@kernel.org> <20200409190109.GB45598@mit.edu> <20200409201632.GC45598@mit.edu> <20200409235716.GF45598@mit.edu> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: X-Scanned-By: MIMEDefang 2.79 on 10.5.11.12 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Cc kexec list. On 04/10/20 at 09:08am, Ard Biesheuvel wrote: > On Fri, 10 Apr 2020 at 01:57, Theodore Y. Ts'o wrote: > > > > On Thu, Apr 09, 2020 at 11:29:06PM +0200, Ard Biesheuvel wrote: > > > > What happens is that the kexec'ed kernel immediately crashes, at which > > > > point we drop back into the BIOS, and then it boots the Debain 4.19.0 > > > > distro kernel instead of the kernel to be tested boot. Since we lose > > > > the boot command line that was used from the kexec, the gce-xfstests > > > > image retries the kexec, which fails, and the failing kexec repeats > > > > until I manually kill the VM. > > > > > > Does this help at all? > > > > > > diff --git a/arch/x86/include/asm/efi.h b/arch/x86/include/asm/efi.h > > > index 781170d36f50..52f8138243df 100644 > > > --- a/arch/x86/include/asm/efi.h > > > +++ b/arch/x86/include/asm/efi.h > > > @@ -180,6 +180,7 @@ extern void __init > > > efi_uv1_memmap_phys_epilog(pgd_t *save_pgd); > > > > > > struct efi_setup_data { > > > u64 fw_vendor; > > > + u64 __unused; > > > u64 tables; > > > u64 smbios; > > > u64 reserved[8]; > > > > > > Tested-by: Theodore Ts'o > > > > OK, I'll spin a proper patch > > > Yep, that fixed it. Thanks!! > > > > I wonder if this structure definition should be moved something like > > arch/x86/include/uapi/asm/efi.h so it's more obvious that the > > structure layout is used externally to the kernel? > > > > Well, 95% of the data structures used by EFI are based on the UEFI > spec, so the base assumption is really that we cannot make changes > like these to begin with. But I'll add a DON'T TOUCH comment here in > any case. > The runtime cleanup looks a very good one, but I also missed that, userspace kexec-tools will break with the efi setup_data changes. But kexec_file_load will just work with the cleanup applied. Ard, could you add kexec list in cc when you send the fix out? Thanks Dave