lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAMj1kXE1Gg+jN0yGZCi86HQBPrtX=-EHjMW9Z9XxsobH=RS0LA@mail.gmail.com>
Date:   Thu, 2 Jun 2022 18:14:36 +0200
From:   Ard Biesheuvel <ardb@...nel.org>
To:     WANG Xuerui <kernel@...0n.name>
Cc:     Huacai Chen <chenhuacai@...ngson.cn>,
        linux-arch <linux-arch@...r.kernel.org>,
        Linux Doc Mailing List <linux-doc@...r.kernel.org>,
        Linux Kernel Mailing List <linux-kernel@...r.kernel.org>,
        Xuefeng Li <lixuefeng@...ngson.cn>,
        Yanteng Si <siyanteng@...ngson.cn>,
        Huacai Chen <chenhuacai@...il.com>,
        Guo Ren <guoren@...nel.org>,
        Jiaxun Yang <jiaxun.yang@...goat.com>,
        Stephen Rothwell <sfr@...b.auug.org.au>,
        linux-efi <linux-efi@...r.kernel.org>,
        WANG Xuerui <git@...0n.name>, Yun Liu <liuyun@...ngson.cn>,
        Jonathan Corbet <corbet@....net>,
        Arnd Bergmann <arnd@...db.de>,
        Andy Lutomirski <luto@...nel.org>,
        Thomas Gleixner <tglx@...utronix.de>,
        Peter Zijlstra <peterz@...radead.org>,
        Andrew Morton <akpm@...ux-foundation.org>,
        David Airlie <airlied@...ux.ie>,
        Linus Torvalds <torvalds@...ux-foundation.org>
Subject: Re: Steps forward for the LoongArch UEFI bringup patch? (was: Re:
 [PATCH V14 11/24] LoongArch: Add boot and setup routines)

On Thu, 2 Jun 2022 at 16:09, WANG Xuerui <kernel@...0n.name> wrote:
>
> Hi Ard,
>
> Sorry for sounding particularly rushed and I really don't like rushing
> things either, but as explained in the previous reply [1], what we want
> to do is mainly to get the arch/loongarch into mainline first,
> stabilizing an ABI surface already under heavy testing for many months;
> plus Huacai has removed the questioned kernel version string, and the
> Loongson-specific "boardinfo" sysfs file that doesn't really belong to
> /sys/firmware/efi.
>

OK, that is an improvement.

> So, would you please clarify and explain how Huacai and I could best
> proceed to hopefully get the *rest* of the port readied for a (late)
> merge window PR? Otherwise much of userspace development would have to
> shift target once more, and many Linux distros would have to carry and
> rebase this big patchset for another 2 months which is real churn.
>
> If some more background is necessary, let me explain a bit more about
> the LoongArch boot protocol peculiarities...
>
> For one thing, the standard EFI stub boot flow is a recent development,
> and has not shipped yet; all currently existing LoongArch systems
> actually implement the previous Loongson-specific boot protocol based on
> "struct bootparamsinterface", or BPI for short, that was carried over
> from the MIPS era. Systems with BPI firmware provide full EFI services
> too, but all pointers in BPI structs are virtual addresses, and the
> memory maps are not provided in the same way as their new firmware. In
> addition to that, all BPI systems launch Linux via a special GRUB2 that
> can only boot ELF files (so cannot chainload an EFI stub), and it's
> unclear whether directly booting an EFI stub would work, so the EFI stub
> logic is not invoked at all but SVAM still have to be executed somehow
> to ensure sanity. All of this means the SVAM oddity will eventually get
> in, regardless of whether we take it out now or not, if the BPI support
> is to be mainlined in the future.
>

This means the boot chain is still relying on the internal stub <->
kernel API, which is the reason I objected to previous revisions of
this series. You *cannot* call EFI services at boot or at runtime if
you don't boot via the EFI stub. You either implement EFI boot
correctly, or not at all.

Also, is calling SetVirtualAddressMap() actually needed? On other
architectures, we don't map EFI memory regions into the kernel address
space, but into a separate set of page tables that is only active on
the CPU that calls into the firmware, and only while the firmware call
is in progress. This address space can typically describe the 1:1
mapping that the firmware uses, making SVAM() entirely optional.

Another thing I don't understand is how LoongArch implements both ELF
and PE/COFF, as they cannot co-exist in the same executable. Will
there be a flag day when all bootloaders and kernels switch from one
mode to the other?

> For another thing, it seems Loongson really wanted to support the "PMON"
> use case that wouldn't provide full EFI services but sharing some logic
> with UEFI boot. PMON is one of the MIPS firmware varieties that Loongson
> has supported back in the days, and they seem to have ported it to
> LoongArch as well.
>

Having different boot methods and ABIs is fine. The thing I mainly
objected to is reusing the EFI code in Linux to implement a boot
method that is not EFI.

If PMON wants to boot the core kernel and provide another
memory/machine description than UEFI/ACPI, LoongArch is free to
implement that. But any dependencies in the LoongArch boot code on
implementation details in Linux's EFI layer that it re-exports via an
alternative boot ABI are a big problem, as it turns those
implementation details into external ABI for all architectures that
implement EFI.

> For this, I don't know if Huacai should really just leave those
> modification in the downstream fork to keep the upstream Linux clean of
> such hacks, because to some degree dealing with such notoriety is life,
> it seems to me. I think at this point Huacai would cooperate and tweak
> the patch to get rid of the SVAM and other nonstandard bits as much as
> possible, and I'll help him where necessary too.
>

I don't want to be the one standing in your way, and I understand the
desire to get this merged for the user space side of things. So
perhaps it is better to merge this without the EFI support, and take
another cycle to implement this properly across all the other
components as well.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ