Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1755977AbcKVNoP (ORCPT ); Tue, 22 Nov 2016 08:44:15 -0500 Received: from mx0a-001b2d01.pphosted.com ([148.163.156.1]:37928 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754550AbcKVNoN (ORCPT ); Tue, 22 Nov 2016 08:44:13 -0500 From: Thiago Jung Bauermann To: Michael Ellerman Cc: Dave Young , kexec@lists.infradead.org, linuxppc-dev@lists.ozlabs.org, linux-kernel@vger.kernel.org, x86@kernel.org, Eric Biederman , Vivek Goyal , Baoquan He , Benjamin Herrenschmidt , Paul Mackerras , Stewart Smith , Mimi Zohar , Thomas Gleixner , Ingo Molnar , "H. Peter Anvin" , Andrew Morton , Stephen Rothwell Subject: Re: [PATCH v10 04/10] kexec_file: Add support for purgatory built as PIE. Date: Tue, 22 Nov 2016 11:44:03 -0200 User-Agent: KMail/5.1.3 (Linux/4.4.0-47-generic; KDE/5.23.0; x86_64; ; ) In-Reply-To: <87ziksuk7t.fsf@concordia.ellerman.id.au> References: <1478748449-3894-1-git-send-email-bauerman@linux.vnet.ibm.com> <5009580.5GxAkTrMYA@morokweng> <87ziksuk7t.fsf@concordia.ellerman.id.au> MIME-Version: 1.0 Content-Transfer-Encoding: 7Bit Content-Type: text/plain; charset="us-ascii" X-TM-AS-MML: disable X-Content-Scanned: Fidelis XPS MAILER x-cbid: 16112213-0028-0000-0000-0000016F2C0C X-IBM-AV-DETECTION: SAVI=unused REMOTE=unused XFE=unused x-cbparentid: 16112213-0029-0000-0000-0000146B2D3F Message-Id: <2486176.qfzlYnJWAn@morokweng> X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10432:,, definitions=2016-11-22_07:,, signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 spamscore=0 suspectscore=0 malwarescore=0 phishscore=0 adultscore=0 bulkscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1609300000 definitions=main-1611220246 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 4165 Lines: 100 Am Dienstag, 22. November 2016, 17:01:10 BRST schrieb Michael Ellerman: > Thiago Jung Bauermann writes: > > Am Sonntag, 20. November 2016, 10:45:46 BRST schrieb Dave Young: > >> On 11/10/16 at 01:27am, Thiago Jung Bauermann wrote: > >> > powerpc's purgatory.ro has 12 relocation types when built as > >> > a relocatable object. To implement support for them requires > >> > arch_kexec_apply_relocations_add to duplicate a lot of code with > >> > module_64.c:apply_relocate_add. > >> > > >> > When built as a Position Independent Executable there are only 4 > >> > relocation types in purgatory.ro, so it becomes practical for the > >> > powerpc > >> > implementation of kexec_file to have its own relocation implementation. > >> > > >> > Also, the purgatory is an executable and not an intermediary output > >> > from > >> > the compiler so it makes sense conceptually that it is easier to build > >> > it as a PIE than as a partially linked object. > >> > > >> > Apart from the greatly reduced number of relocations, there are two > >> > differences between a relocatable object and a PIE: > >> > > >> > 1. __kexec_load_purgatory needs to use the program headers rather than > >> > the > >> > > >> > section headers to figure out how to load the binary. > >> > > >> > 2. Symbol values are absolute addresses instead of relative to the > >> > > >> > start of the section. > >> > > >> > This patch adds the support needed in generic code for the differences > >> > above and allows powerpc to load and relocate a position independent > >> > purgatory. > >> > >> [snip] > >> > >> The kexec-tools machine_apply_elf_rel is pretty simple for ppc64, it is > >> not that complex. So could you look into simplify your kexec_file > >> implementation? > > > > I can try, but there is one fundamental issue here: powerpc > > position-dependent code relies more on relocations than x86 > > position-dependent code does, so there's a limit to how simple it can be > > made without switching to position- independent code. And it will always > > be more involved than it is on x86. > I think we need to go back to the drawing board on this one. > > My hope was that building purgatory as PIE would reduce the amount of > complexity, but instead it's just added more. Sorry for sending you in > that direction. It added complexity because in my series powerpc was using a PIE purgatory but x86 kept using a partially-linked object (because of the problem I mentioned I had when trying out a PIE x86 purgatory), so generic code needed two purgatory loaders. I'll see if I can make the PIE x86 purgatory to work so that generic code can have only one loader implementation. Then it will indeed be simpler. Am Dienstag, 22. November 2016, 14:16:22 BRST schrieb Dave Young: > Hi Michael > > On 11/22/16 at 05:01pm, Michael Ellerman wrote: > > In general I dislike the level of complexity of the kexec-tools > > purgatory, and in particular I'm not comfortable with things like: > > > > diff --git a/arch/powerpc/purgatory/sha256.c > > b/arch/powerpc/purgatory/sha256.c new file mode 100644 > > index 000000000000..6abee1877d56 > > --- /dev/null > > +++ b/arch/powerpc/purgatory/sha256.c > > @@ -0,0 +1,6 @@ > > +#include "../boot/string.h" > > + > > +/* Avoid including x86's boot/string.h in sha256.c. */ > > +#define BOOT_STRING_H > > + > > +#include "../../x86/purgatory/sha256.c" > > Agreed, include x86 code in powerpc looks bad > > > I think the best way to get this over the line would be to take the > > kexec-lite purgatory implementation and use that to begin with. I know > > it doesn't have all the features of the kexec-tools version, but it > > should work, and we can look at adding the extra features later. > > Instead of adding other implementation, moving the purgatory sha256 code > out of x86 sounds better so that we can reuse them cleanly.. Do you have a suggestion of where that code can live so that it can be shared between purgatories for different arches? Do we need a purgatory with generic and arch-specific code like in kexec- tools? -- Thiago Jung Bauermann IBM Linux Technology Center