lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Sun, 20 Apr 2008 08:42:39 -1000
From:	Mitch Bradley <wmb@...mworks.com>
To:	Andres Salomon <dilinger@...ued.net>
CC:	"H. Peter Anvin" <hpa@...or.com>,
	Yinghai Lu <yhlu.kernel@...il.com>,
	"Eric W. Biederman" <ebiederm@...ssion.com>,
	Ingo Molnar <mingo@...e.hu>,
	Andrew Morton <akpm@...ux-foundation.org>,
	Joseph Fannin <jfannin@...il.com>,
	linux-kernel@...r.kernel.org, jordan.crouse@....com
Subject: Re: [PATCH 1/2] OLPC: Add support for calling into Open Firmware



Andres Salomon wrote:
> On Sun, 20 Apr 2008 08:07:55 -0400
> "H. Peter Anvin" <hpa@...or.com> wrote:
>
>   
>> Yinghai Lu wrote:
>>     
>>> On Sat, Apr 19, 2008 at 10:39 AM, Andres Salomon <dilinger@...ued.net> wrote:
>>>       
>>>>  This adds 32-bit support for calling into OFW from the kernel.  It's useful
>>>>  for querying the firmware for misc hardware information, fetching the device
>>>>  tree, etc.
>>>>
>>>>  There's potentially no reason why other platforms couldn't use this, but
>>>>  currently OLPC is the main user of it.
>>>>
>>>>  This work was originally done by Mitch Bradley.
>>>>
>>>>         
>> Hm.  This interface seems more than a bit ad hoc.  In particular, I 
>> *really* don't like the swapper_pg_dir hack.
>>
>> "There must be a better way."
>>
>> 	-hpa
>>     
>
> I'm certainly open to suggestions..  Otherwise, I'll poke around and
> see if I can come up w/ something.
>   

The x86 architecture doesn't make this problem easy.

The conventional solution is to have the BIOS operate in real mode.  
When the kernel calls into the BIOS, it has to do a grotesque dance that 
involves jumping through a chain of several segments of different 
flavors, thus gradually shutting down the multi-tiered address 
translation mechanism.  Then, if the BIOS is actually operating in 
protected mode (which is necessary if it is larger than 64K, as all 
modern BIOSes are), it has to perform the inverse process, do the 
requested work, then go back into real mode to return to the kernel.  
The net result is that a "call" into the BIOS involves:

a) Copying the arguments to a real-mode register shadow array
b) Saving all the registers - general ones and a few special ones too
c) Far call to a linear-mapped code segment with an execution address in 
the first 1M of memory
d) Switching to a different stack
e) Turning off page translation
f) Switching from protected mode to real mode (or in some cases, V86 
mode instead, which requires an additional Task State Segment dance to 
set the IO permission mask)
g) Switching to a real-mode interrupt descriptor table

h) Executing an INT instruction

I) Performing the inverse of a - g inside the BIOS

j) Doing the requested work

K) Performing a - g again to get back into real mode

l) Executing an "iret" instruction

M) Performing the inverse of a-g to return to normal operation

The machinery that you need to do all that is predictably complex - 
extra segment descriptors that are set up just-so, several little code 
fragments that must be at special addresses in the first meg, additional 
stacks, a real-mode interrupt table at a fixed address, and several data 
save arrays.  That machinery has to be in assembly language, spanning 
several different instruction set modes.

Compared to that, I think that sharing one or two page directory entries 
at the very top of the virtual address space is pretty clean and 
simple.  With that sharing, the BIOS call is just an ordinary subroutine 
call.  (The setup code copies the entire page directory, but only a 
couple of entries are actually needed.  The reason for copying the whole 
thing is because it is rather more work to determine the exact number of 
entries necessary, compared to copying everything and then letting Linux 
replace the ones it uses.)

Every other solution that I know of requires some sort of heroic dance, 
either from the OS or from the BIOS or (usually) both.

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ