lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Wed, 01 Aug 2007 15:56:18 +0800
From:	"Huang, Ying" <ying.huang@...el.com>
To:	Pavel Machek <pavel@....cz>
Cc:	"Eric W. Biederman" <ebiederm@...ssion.com>,
	nigel@...el.suspend2.net, "Rafael J. Wysocki" <rjw@...k.pl>,
	Jeremy Maitin-Shepard <jbms@....edu>,
	Alan Stern <stern@...land.harvard.edu>,
	Andrew Morton <akpm@...ux-foundation.org>, david@...g.hm,
	linux-kernel@...r.kernel.org, linux-pm@...ts.linux-foundation.org,
	Kexec Mailing List <kexec@...ts.infradead.org>
Subject: Re: [PATH 1/1] Kexec jump - v2 - kexec jump

On Tue, 2007-07-31 at 11:51 +0200, Pavel Machek wrote:
> Hi!
> 
> > This patch implement the functionality of jumping from kexeced kernel
> > to original kernel.
> > 
> > A new reboot command named LINUX_REBOOT_CMD_KJUMP is defined to
> > trigger the jumping to (executing) the new kernel or jumping back to
> > the original kernel.
> 
> Could we get two reboot commands? Exec loaded kernel seems to be quite
> different operation than "jump back".

Exec loaded kernel for jumping back is also different from exec loaded
kernel normally.

Maybe the two reboot operations in kexec jump can be seen as "jump to"
and "jump back"?

> How do I test these patches? kexec -p <bzImage>, then kexec -j?

Yes.

> > +static unsigned long kexec_backup_addr = ~0UL;
> > +
> > +/* kexec_backup= specifies the location of backuped 0~640k memory of
> > + * crashed kernel.
> > + */
> > +static int __init parse_kexec_backup(char *arg)
> > +{
> > +	if (!arg)
> > +		return -EINVAL;
> > +
> > +	kexec_backup_addr = memparse(arg, &arg);
> > +	return 0;
> > +}
> > +early_param("kexec_backup", parse_kexec_backup);
> 
> New kernel parameters should be documented. (Plus I do not know how to
> use this one, please help :-).

This kernel parameter will be added to kernel command line by
kexec-tools automatically.

I will add corresponding document in next version.

> 
> > +int kexec_flags;
> > +
> > +static unsigned long kexec_jump_buf_pfn;
> > +
> > +static int __init parse_kexec_jump_buf_pfn(char *arg)
> > +{
> > +	if (!arg)
> > +		return -EINVAL;
> > +
> > +	kexec_jump_buf_pfn = memparse(arg, &arg);
> > +	kexec_flags |= KEXEC_FLAGS_IS_KEXECED_KERNEL;
> > +	return 0;
> > +}
> > +early_param("kexec_jump_buf_pfn", parse_kexec_jump_buf_pfn);
> 
> This one should be documented, too, I'd guess. (Is that internal,
> kernel-to-kernel communication?)

Document will be added in next version too.

This parameter is used for kernel-to-kernel communication. But now, it
must be setup by user, as in usage guide.

Best Regards,
Huang Ying
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ