Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp2347909pxj; Sun, 30 May 2021 23:10:07 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxgCXN+kTaYrl88MHNNsW0OuVJ43uuc+P/xgEIC3z8xe78OySijtcnn/1VUB1A1F928Argb X-Received: by 2002:a05:6602:72f:: with SMTP id g15mr15819199iox.5.1622441407258; Sun, 30 May 2021 23:10:07 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1622441407; cv=none; d=google.com; s=arc-20160816; b=LoTQXFIOgXLwRtVp7Ue4BOJlV6Pb/Ckcr8O5I9cqQAnXSd6GIdRd+Z/8688Upju3Ad lW7pAzmmA8Il1rDUD0gXjKjbw+lvVv3oQEUJpOD7XOnLLO79a9OPaeY/N3Q/x7GrfmPr Pt+R6rR5OjdBpHbyPRbMJPPkzdNdB6Vmf/HQJa9uU/rnvOwYcm/irnuFvUcTHt8GlKax 38eNIXmJoqFmYXGp7tnEyPSAQLdYF1Hs0ws2wWH6M/hghTMA1/YPex7t6diam4HEM8lO NajbeEC2ibaBHBtjaAAeV0RzDVGl769mgmQkdUv9zHEWMLBLSCx1YzdHDUoIwqiZNRBc 9xtg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=+5ov8UUntqW9gCmRshS2gEuALsinTqlQoIyDSLkMHLE=; b=fOuuoD98xP0GonDUMxGmgVxfp+NnHe8HLcjWUf1YuERgbSRxv5WywhUoCbG3OhbhGU qylFAmuF60eugz7UFzb0FFj34k7y1/Ug24uPxIUwhGYMaizXdulX95xTn2XXtUAaHxal UnfsK9KUHYiqF34Zx5pDSNo7PETYbbPuo1lIHC/bxetKTFyIGNAHYX6oBQPSQyApxCtO himJSD8FoCIUqRGHxha39g5huSHvJ8YCpNvpiW0N4X7mCnY6J6Mu+NQgmWx5z5Q5NSiZ gaG52C2PabuzNws64TbkY98LK57dI9hE3Bw3miFQkzW2dDmtgqxhXuAsM3/dk+khe0Fb BPtQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=dkMt42Zs; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id w14si12990178ilv.110.2021.05.30.23.09.27; Sun, 30 May 2021 23:10:07 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=dkMt42Zs; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230091AbhEaGEZ (ORCPT + 99 others); Mon, 31 May 2021 02:04:25 -0400 Received: from mail.kernel.org ([198.145.29.99]:50590 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229752AbhEaGET (ORCPT ); Mon, 31 May 2021 02:04:19 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 015B86023E for ; Mon, 31 May 2021 06:02:39 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1622440960; bh=+5ov8UUntqW9gCmRshS2gEuALsinTqlQoIyDSLkMHLE=; h=References:In-Reply-To:From:Date:Subject:To:Cc:From; b=dkMt42Zsli2RFAB7P//uWpCuOMQQldTvXWBSnI7bd1WVfDurwkE6X0xLXPcfSNT9D zCSsCCMmptmKglgXIcXDMp0lrs4jZF5YQPIE7klxws4s7lJOBlwpHHoWhnNyHrykEc w6Bs8g6sWeWSVCfQNBkZ6Z944AHuE8PxmTI3zSYuIsMsnur/nV0ifYNiihWaYbdVpy Jb69l7kfAvSqgbISrgUBOBLCM/nCTLetDWn8NdDsTEahPAY+1NxsLztU2QFc+RlQvY DUfdG4mBh7JizraGFIXf47OQnAyfjNnrA0b10dihug/NQhj2NgYhwfj7dOVXW+vmFK kIvaOoNxkfTBA== Received: by mail-oi1-f178.google.com with SMTP id u11so11303194oiv.1 for ; Sun, 30 May 2021 23:02:39 -0700 (PDT) X-Gm-Message-State: AOAM530Xf7jHZTzUr6Ff+Gx0zTzaTRi510B+3H0IG4Vt1eQVc1OnPt5F 7FVdugcGDWeco/qzS6Gl3s1m2lUaZN+G7A962Uk= X-Received: by 2002:aca:4343:: with SMTP id q64mr13196858oia.33.1622440959409; Sun, 30 May 2021 23:02:39 -0700 (PDT) MIME-Version: 1.0 References: <20210526190531.62751-1-maz@kernel.org> <20210527173915.GH8661@arm.com> In-Reply-To: <20210527173915.GH8661@arm.com> From: Ard Biesheuvel Date: Mon, 31 May 2021 08:02:28 +0200 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: [PATCH 0/4] arm64: Make kexec_file_load honor iomem reservations To: Catalin Marinas Cc: Marc Zyngier , kexec@lists.infradead.org, Linux ARM , Linux Kernel Mailing List , Will Deacon , Mark Rutland , James Morse , Lorenzo Pieralisi , Hanjun Guo , Sudeep Holla , Eric Biederman , Bhupesh SHARMA , AKASHI Takahiro , Dave Young , Moritz Fischer , Android Kernel Team Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, 27 May 2021 at 19:39, Catalin Marinas wrote: > > On Wed, May 26, 2021 at 08:05:27PM +0100, Marc Zyngier wrote: > > This series is a complete departure from the approach I initially sent > > almost a month ago[1]. Instead of trying to teach EFI, ACPI and other > > subsystem to use memblock, I've decided to stick with the iomem > > resource tree and use that exclusively for arm64. > > > > This means that my current approach is (despite what I initially > > replied to both Dave and Catalin) to provide an arm64-specific > > implementation of arch_kexec_locate_mem_hole() which walks the > > resource tree and excludes ranges of RAM that have been registered for > > any odd purpose. This is exactly what the userspace implementation > > does, and I don't really see a good reason to diverge from it. > > > > Again, this allows my Synquacer board to reliably use kexec_file_load > > with as little as 256M, something that would always fail before as it > > would overwrite most of the reserved tables. > > > > Obviously, this is now at least 5.14 material. Given how broken > > kexec_file_load is for non-crash kernels on arm64 at the moment, > > should we at least disable it in 5.13 and all previous stable kernels? > > I think it makes sense to disable it in the current and earlier kernels. > Ack to that > For this series: > > Acked-by: Catalin Marinas and likewise for the series Reviewed-by: Ard Biesheuvel