From mboxrd@z Thu Jan 1 00:00:00 1970 Return-path: Date: Thu, 27 May 2021 18:39:15 +0100 From: Catalin Marinas Subject: Re: [PATCH 0/4] arm64: Make kexec_file_load honor iomem reservations Message-ID: <20210527173915.GH8661@arm.com> References: <20210526190531.62751-1-maz@kernel.org> MIME-Version: 1.0 Content-Disposition: inline In-Reply-To: <20210526190531.62751-1-maz@kernel.org> List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Sender: "kexec" Errors-To: kexec-bounces+dwmw2=infradead.org@lists.infradead.org To: Marc Zyngier Cc: kexec@lists.infradead.org, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, Will Deacon , Ard Biesheuvel , Mark Rutland , James Morse , Lorenzo Pieralisi , Hanjun Guo , Sudeep Holla , Eric Biederman , Bhupesh SHARMA , AKASHI Takahiro , Dave Young , Moritz Fischer , kernel-team@android.com On Wed, May 26, 2021 at 08:05:27PM +0100, Marc Zyngier wrote: > This series is a complete departure from the approach I initially sent > almost a month ago[1]. Instead of trying to teach EFI, ACPI and other > subsystem to use memblock, I've decided to stick with the iomem > resource tree and use that exclusively for arm64. > > This means that my current approach is (despite what I initially > replied to both Dave and Catalin) to provide an arm64-specific > implementation of arch_kexec_locate_mem_hole() which walks the > resource tree and excludes ranges of RAM that have been registered for > any odd purpose. This is exactly what the userspace implementation > does, and I don't really see a good reason to diverge from it. > > Again, this allows my Synquacer board to reliably use kexec_file_load > with as little as 256M, something that would always fail before as it > would overwrite most of the reserved tables. > > Obviously, this is now at least 5.14 material. Given how broken > kexec_file_load is for non-crash kernels on arm64 at the moment, > should we at least disable it in 5.13 and all previous stable kernels? I think it makes sense to disable it in the current and earlier kernels. For this series: Acked-by: Catalin Marinas _______________________________________________ kexec mailing list kexec@lists.infradead.org http://lists.infradead.org/mailman/listinfo/kexec