lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Thu, 21 Nov 2013 14:17:04 +0800 From: dyoung@...hat.com To: linux-kernel@...r.kernel.org Cc: linux-efi@...r.kernel.org, x86@...nel.org, mjg59@...f.ucam.org, hpa@...or.com, James.Bottomley@...senPartnership.com, vgoyal@...hat.com, ebiederm@...ssion.com, horms@...ge.net.au, kexec@...ts.infradead.org, bp@...en8.de, greg@...ah.com, matt@...sole-pimps.org, toshi.kani@...com Subject: [patch 0/9 v3] kexec kernel efi runtime support Hi, Here is the V3 for supporting kexec kernel efi runtime. Per pervious discussion I pass the 1st kernel efi runtime mapping via setup_data to 2nd kernel. Besides of the runtime mapping info I also pass the fw_vendor, runtime, config table, smbios physical address in setup_data. EFI spec mentioned fw_vendor, runtime, config table addresses will be converted to virt address after entering virtual mode, but we will use it as physical address in efi_init. For smbios EFI spec did not mention about the address updating, but during my test on a HP workstation, the bios will convert it to Virt addr, thus pass it in setup_data as well. For fw_vendor, runtime, config table, I export them in /sys/firmware/ efi/, smbios is already in /sys/firmware/efi/systab. For efi runtime mapping I add a new directory /sys/firmware/efi/ runtime-map/ like below [dave@...kstar ~]$ tree /sys/firmware/efi/runtime-map/ /sys/firmware/efi/runtime-map/ ├── 0 │ ├── attribute │ ├── num_pages │ ├── phys_addr │ ├── type │ └── virt_addr ├── 1 │ ├── attribute │ ├── num_pages │ ├── phys_addr │ ├── type │ └── virt_addr [snip] kexec-tools will assemble them as setup_data and pass to 2nd kernel. I will send userspace patches as well. Limitation is I only write support for x86_64, test on below machines: Lenovo thinkpad t420 Dell inspiron 14 - 3421 HP Z420 workstation Qemu + OVMF Please help to review the patches. The patches are based on matt's efi master tree Changes from v1: add one flag in xloadflags, so kexec-tools can safely load old kernel without efi support. coding style fixes function name for map phys_addr to fixed virt_addr Add ABI documentation for sysfs files Changes from v2: 01/09: a new patch to remove unused variables in __map_region function catched by Toshi Kani 09/09: a new patch to export x86 boot_params to sysfs instead of use debugfs files Matt: reuse __map_region instead do same thing in another function. add a wrapper function efi_map_region_fixed [02/09] check return value of krealloc sysfs dir name s/efi-runtime-map/runtime-map [06/09] use desc_size in efi_runtime_map for the xloadflags defination: +&& defined(CONFIG_KEXEC) Greg: sysfs : one file one value for fw_vendor, runtime, tables. [05/09] Document them in ABI testing HPA: Document the new xloadflag Also there's other function cleanup and improvement for error handling. -- Thanks Dave -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists