Received: by 10.223.185.116 with SMTP id b49csp361870wrg; Tue, 13 Feb 2018 23:37:18 -0800 (PST) X-Google-Smtp-Source: AH8x225YHtyT8TxnzuWgWhiACNFejyI6YpEEHP2G+PKnmey0gs5C4+wmlIB9N4tBhkxHnzmsv8Xl X-Received: by 10.101.66.129 with SMTP id j1mr3106452pgp.56.1518593838693; Tue, 13 Feb 2018 23:37:18 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1518593838; cv=none; d=google.com; s=arc-20160816; b=NRMm9bDZR3ql4AzMY1DYJZAYsBNHu7aHWh94VShW7i3wC1kyFfeJ1z7SVWuP6OgxSV OS/cr9CNVU/M6HAZrjxfVBGoaLzTFp03jywI7bvY7Ymnu9O7Zo/Mfdeuzs1bdIEpVr2i H5UY8Z0j5ezeRBwGvPIN4l9+gMWLOyOH6Lms5iQH+kURanYmxEcWPDKvGt1G9dJN7g3h PlwgqeyD7qJAFULyIMMJgiB5bAAOPVoTyAQx+PIPltm+fEv7ofXoxw2emlBsT8w8aGS6 wRCEXBwk5gx/RJMOaUpGmLVynsy8lVrwqXONcSNfdceG5qqJunVzB7tfwaedUTD/qfus uBvQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:arc-authentication-results; bh=0p3TVI1LU0cNy3rNGu4PJSFOicXb0QbrgS8v9FcK7Mw=; b=z6z9tQKQCpKrsBQeLVwHfc4U//Wc93kgma2rwYBeXV+yGqUto2Tjgx9ylpmLfV61bg +PtNDU/yL6IqhPCBRIt6Bbd2OlIqxmcIOhmAC/tLMPCVwVJck+I4QVolWyCQ0U+MUhZI Ap9UrdpwvrFYSC5zsi6VTi/m5F2IZPB/BRgqUba9Fv3nxkGW3O1bIJpiesTPNrcFtBbZ SBH7r5BU/aFu7HF6GBvcFOrdnqU4up1tneXBmgwFATNc3krBFvbWx8epHGwHkGgap3GO PuPPEvr9hRb9R0ZMlOhMpMD68fwNc88Msn1df3xU7sAPpJW7I7CXfN2vv3G/AK9X2Ke8 Tf2w== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id m9si2476782pgs.269.2018.02.13.23.37.03; Tue, 13 Feb 2018 23:37:18 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754557AbeBNHf4 (ORCPT + 99 others); Wed, 14 Feb 2018 02:35:56 -0500 Received: from mx3-rdu2.redhat.com ([66.187.233.73]:52000 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1754469AbeBNHfz (ORCPT ); Wed, 14 Feb 2018 02:35:55 -0500 Received: from smtp.corp.redhat.com (int-mx03.intmail.prod.int.rdu2.redhat.com [10.11.54.3]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id DEAAE40FB656; Wed, 14 Feb 2018 07:35:54 +0000 (UTC) Received: from dhcp-128-65.nay.redhat.com (ovpn-12-47.pek2.redhat.com [10.72.12.47]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 77C421006ECC; Wed, 14 Feb 2018 07:35:47 +0000 (UTC) Date: Wed, 14 Feb 2018 15:35:43 +0800 From: Dave Young To: Philipp Rudo Cc: kexec@lists.infradead.org, linux-s390@vger.kernel.org, Michael Ellerman , x86@kernel.org, Heiko Carstens , linux-kernel@vger.kernel.org, Martin Schwidefsky , Eric Biederman , Thiago Jung Bauermann , Andrew Morton , Vivek Goyal , AKASHI Takahiro Subject: Re: [PATCH 00/17] Add kexec_file_load support to s390 Message-ID: <20180214073543.GA12328@dhcp-128-65.nay.redhat.com> References: <20180212100754.55121-1-prudo@linux.vnet.ibm.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20180212100754.55121-1-prudo@linux.vnet.ibm.com> User-Agent: Mutt/1.9.1 (2017-09-22) X-Scanned-By: MIMEDefang 2.78 on 10.11.54.3 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.7]); Wed, 14 Feb 2018 07:35:55 +0000 (UTC) X-Greylist: inspected by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.7]); Wed, 14 Feb 2018 07:35:55 +0000 (UTC) for IP:'10.11.54.3' DOMAIN:'int-mx03.intmail.prod.int.rdu2.redhat.com' HELO:'smtp.corp.redhat.com' FROM:'dyoung@redhat.com' RCPT:'' Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Philipp, I added AKASHI in cc, he posted arm64 kexec_file series previously. I would like to read both series especially the general part, but maybe at the end of this month because of a holiday.. From the patch log the cleanup looks nice, but still need read the details. On 02/12/18 at 11:07am, Philipp Rudo wrote: > Hi everybody > > resending the series as there was no reaction, yet. Furthermore i was told > that Andrew and the x86 list should also be CCed, so welcome. > > No changes made to the patches since first time i sent them. The patches > apply to the current master (v4.16-rc1). > > Thanks > Philipp > > --- > > this series adds the kexec_file_load system call to s390. Before the system > call is added there are some preparations/clean ups to common > kexec_file_load. In detail this series contains: > > Patch #1&2: Minor cleanups/fixes. > > Patch #3-9: Clean up the purgatory load/relocation code. Especially remove > the mis-use of the purgatory_info->sechdrs->sh_offset field, currently > holding a pointer into either kexec_purgatory (ro) or purgatory_buf (rw) > depending on the section. With these patches the section address will be > calculated verbosely and sh_offset will contain the offset of the section > in the stripped purgatory binary (purgatory_buf). > > Patch #10: Allows architectures to set the purgaory load address. This > patch is important for s390 as the kernel and purgatory have to be loaded > to fixed addresses. In current code this is impossible as the purgatory > load is opaque to the architecture. > > Patch #11: Moves x86 purgatories sha implementation to common lib/ > directory. > > Patches #12-17 finally adds the kexec_file_load system call to s390. > > Please note that I had to touch arch code for x86 and power a little. In > theory this should not change the behavior but I don't have a way to test > it. Cross-compiling with defconfig(*) works fine for both. > > Thanks > Philipp > > (*) On x86 with the orc unwinder turned off. objtool SEGFAULTs on s390... > > Philipp Rudo (17): > kexec_file: Silence compile warnings > kexec_file: Remove checks in kexec_purgatory_load > kexec_file: Make purgatory_info->ehdr const > kexec_file: Search symbols in read-only kexec_purgatory > kexec_file: Use read-only sections in arch_kexec_apply_relocations* > kexec_file: Split up __kexec_load_puragory > kexec_file: Simplify kexec_purgatory_setup_sechdrs 1 > kexec_file: Simplify kexec_purgatory_setup_sechdrs 2 > kexec_file: Remove mis-use of sh_offset field > kexec_file: Allow archs to set purgatory load address > kexec_file: Move purgatories sha256 to common code > s390/kexec_file: Prepare setup.h for kexec_file_load > s390/kexec_file: Add purgatory > s390/kexec_file: Add kexec_file_load system call > s390/kexec_file: Add image loader > s390/kexec_file: Add crash support to image loader > s390/kexec_file: Add ELF loader > > arch/powerpc/kernel/kexec_elf_64.c | 9 +- > arch/s390/Kbuild | 1 + > arch/s390/Kconfig | 4 + > arch/s390/include/asm/kexec.h | 23 ++ > arch/s390/include/asm/purgatory.h | 17 ++ > arch/s390/include/asm/setup.h | 40 ++- > arch/s390/kernel/Makefile | 1 + > arch/s390/kernel/asm-offsets.c | 5 + > arch/s390/kernel/compat_wrapper.c | 1 + > arch/s390/kernel/kexec_elf.c | 149 ++++++++++ > arch/s390/kernel/kexec_image.c | 78 +++++ > arch/s390/kernel/machine_kexec_file.c | 291 +++++++++++++++++++ > arch/s390/kernel/syscalls/syscall.tbl | 1 + > arch/s390/purgatory/Makefile | 37 +++ > arch/s390/purgatory/head.S | 279 ++++++++++++++++++ > arch/s390/purgatory/purgatory.c | 42 +++ > arch/x86/kernel/kexec-bzimage64.c | 8 +- > arch/x86/kernel/machine_kexec_64.c | 66 ++--- > arch/x86/purgatory/Makefile | 3 + > arch/x86/purgatory/purgatory.c | 2 +- > include/linux/kexec.h | 38 +-- > {arch/x86/purgatory => include/linux}/sha256.h | 10 +- > kernel/kexec_file.c | 375 ++++++++++++------------- > {arch/x86/purgatory => lib}/sha256.c | 4 +- > 24 files changed, 1200 insertions(+), 284 deletions(-) > create mode 100644 arch/s390/include/asm/purgatory.h > create mode 100644 arch/s390/kernel/kexec_elf.c > create mode 100644 arch/s390/kernel/kexec_image.c > create mode 100644 arch/s390/kernel/machine_kexec_file.c > create mode 100644 arch/s390/purgatory/Makefile > create mode 100644 arch/s390/purgatory/head.S > create mode 100644 arch/s390/purgatory/purgatory.c > rename {arch/x86/purgatory => include/linux}/sha256.h (63%) > rename {arch/x86/purgatory => lib}/sha256.c (99%) > > -- > 2.13.5 > > > _______________________________________________ > kexec mailing list > kexec@lists.infradead.org > http://lists.infradead.org/mailman/listinfo/kexec Thanks Dave