lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <48608A11.8070605@zytor.com>
Date:	Mon, 23 Jun 2008 22:45:53 -0700
From:	"H. Peter Anvin" <hpa@...or.com>
To:	"Huang, Ying" <ying.huang@...el.com>
CC:	Paul Jackson <pj@....com>, mingo@...e.hu, andi@...stfloor.org,
	mingo@...hat.com, tglx@...utronix.de, linux-kernel@...r.kernel.org,
	yhlu.kernel@...il.com
Subject: Re: [PATCH] x86 boot: Pass E820 memory map entries more than 128
 via linked list of setup data

Huang, Ying wrote:
> On Mon, 2008-06-23 at 04:48 -0500, Paul Jackson wrote:
>> Huang wrote:
>>> 4. Current EFI memmap based code does not work properly in all
>>> situation, for example it can not works with kernel parameter:
>>> "memmap=exactmap, memmap=<xxx>, ...", "mem=<xxx>" or "noefi".
>> With "noefi" parameter, my EFI memmap based code is not supposed
>> to do anything.  The "noefi" parameter asks the kernel to ignore
>> any EFI support in the firmware it is booting from.
> 
> "noefi" is used to specify that the EFI runtime services should be
> disabled in kernel. But the memmap should be complete.
> 
>> Could you tell me more what you mean by "does not work properly?"
> 
> OK. It is OK for your code with "noefi". The remaining issues:
> 
> If "memmap=exactmap memmap=<xxx>" is specified in kernel command line.
> The user defined memmap should override that from firmware. But your
> code is executed after the user defined memmap is parsed, so the memmap
> from firmware will override that from user. This does not conform the
> semantics of "memmap=exactmap ...". Same issue for "mem=<xxx>".
> 
> Another issue is that the size of E820 memmap required on EFI system
> must be two times bigger than that really needed. Because at first the
> E820 memmap is filled with the entries from E820 and E820_EXT, then that
> from EFI memmap is appended.
> 

Hello,

I discussed this with Ingo earlier today, and we came to the following 
conclusion:

1. The EFI memmap code as a backup to the bootloader is fine.
2. Ying's memmap= objection needs to be addressed.  Violating user 
overrides is not appropriate.
3. It is important that we don't override the bootloader when the 
bootloader really does know best.  For example, kexec may want to 
control exactly what memory the target kernel uses.  As a result, we 
need a flag somewhere to disable *any* attempts at obtaining memory 
information from the environment, be it EFI, OpenFirmware or what have 
you.  The easiest way to do this is probably via a command-line flag, 
e.g. "noauxmem".

What do you guys think?

	-hpa
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ