Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp2548843yba; Mon, 22 Apr 2019 08:44:42 -0700 (PDT) X-Google-Smtp-Source: APXvYqzPvAx8ZqJTCpt0btxly9n8JXSAAkPjTXIJiBg9oj3edzrhMH1i2mQvtm9AB2pkPaxOPSL4 X-Received: by 2002:a63:243:: with SMTP id 64mr19436866pgc.214.1555947882558; Mon, 22 Apr 2019 08:44:42 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1555947882; cv=none; d=google.com; s=arc-20160816; b=l30gu5DqHVo1VhQjsi2z9ZZmpixFcRI/Z/kDvOURMSc90OCYy1GWkc/90PWHjfjYAT OOfg7VjlkbxHte6Csby3tYEgJfhB1cGRIpu2N8im7SYv2lu149UFupTJxKyY3WIsQtCP a3zq/CxLlLoJWuQIu4nR1Ht48EE0cWqgcL5E+zp6Lkn7O9/WPahv3jB7aTsSq0PTLXtC XmcnYs/bZHFNmuqHwhNNhOfE8jNRsKnDQtWAX0Y1Cmp+nAiE0dUuuXgrqQybjrG/fTgF gqn9vy+WFMdFBvesnqEyHMAZgJbDhcK96s7PTmY8yu6FRsKt00N86rvRIdy606aZF0U+ gZjA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=JFpPLtfkepV9r9+lHEYcsdq9WsB7wkVB6MPpylxpGW8=; b=krShbAdPHJoW8fy4sJDCh7B1cBGh21rD3pJksD4ajFbqH9Il/tlcYynuws5OSlnMMM BRSShx9qLUBSF02xNVj0TdpRricoa+1gebIwbRe23AuukTILx9Z7yXZQsLLBUrTE1QpB c8isUne0FYAT26LhvY7XKBoOoZRZpZTzIBz3tE27EdLn0qyAJYY+C0AHLItKGZvSDEFs PbQXU+LWyr4Lpg64KSBGXjD+HMOWS3SW/suZfkHDz6ankuGhY9p9GkfIOqPLg35GcdY8 6tVNVVJOHorF9h8bV2WVnZPzE6vxs8iWbkMMl6MVQQNn7xNdgohMtXukiiRpSp7WfHMz TLPA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@alien8.de header.s=dkim header.b=FMHNpjnr; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=alien8.de Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id l37si13585149plb.173.2019.04.22.08.44.26; Mon, 22 Apr 2019 08:44:42 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@alien8.de header.s=dkim header.b=FMHNpjnr; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=alien8.de Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728091AbfDVPR1 (ORCPT + 99 others); Mon, 22 Apr 2019 11:17:27 -0400 Received: from mail.skyhub.de ([5.9.137.197]:57036 "EHLO mail.skyhub.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728077AbfDVPR1 (ORCPT ); Mon, 22 Apr 2019 11:17:27 -0400 Received: from zn.tnic (p200300EC2F07AE00B522724F4D48BE41.dip0.t-ipconnect.de [IPv6:2003:ec:2f07:ae00:b522:724f:4d48:be41]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.skyhub.de (SuperMail on ZX Spectrum 128k) with ESMTPSA id 77A091EC027B; Mon, 22 Apr 2019 17:17:25 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=alien8.de; s=dkim; t=1555946245; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:in-reply-to:in-reply-to: references:references; bh=JFpPLtfkepV9r9+lHEYcsdq9WsB7wkVB6MPpylxpGW8=; b=FMHNpjnrXbYmVyRsNnRzG136ACapGj3qe3EoZZCyU6ah8CwfJmNoLsf8xx+9Wx62M7AvWR WXRCQ1LwEsyIAx7IPhGgYEYYw1fR1XoSbGhSNPCAineeJYnAfRujXlRrwHGjlIZ04v7iQ6 HNFp7ZD/aGj6aZ85f6LoUlSaCQdNqeI= Date: Mon, 22 Apr 2019 17:17:23 +0200 From: Borislav Petkov To: Baoquan He , "H. Peter Anvin" Cc: Junichi Nomura , dyoung@redhat.com, Kairui Song , Thomas Gleixner , linux-kernel@vger.kernel.org, Chao Fan , "x86@kernel.org" , "kexec@lists.infradead.org" Subject: Re: [RFC PATCH] kexec, x86/boot: map systab region in identity mapping before accessing it Message-ID: <20190422151723.GD21457@zn.tnic> References: <20190419101733.GA10324@zn.tnic> <20190419105014.GE11060@MiWiFi-R3L-srv> <20190419112801.GB10324@zn.tnic> <20190419113621.GD10324@zn.tnic> <20190422143346.GD3584@localhost.localdomain> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: <20190422143346.GD3584@localhost.localdomain> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org + hpa On Mon, Apr 22, 2019 at 10:33:46PM +0800, Baoquan He wrote: > On 04/19/19 at 01:36pm, Borislav Petkov wrote: > > On Fri, Apr 19, 2019 at 01:28:01PM +0200, Borislav Petkov wrote: > > > Read again what I said: "should all be passed through boot_params". > > > Which means, boot_params should be extended with a field of a flag to > > > say: "this is a kexec'ed kernel". > > > > And by that I mean similar to the XLF_EFI_KEXEC mechanism. The first > > kernel or kexec(1) should prepare the info needed by the kexec'ed > > kernel. > > We have set the loader type to '0x0D << 4' for kexec specifically, in both > kexec_load and kexec_file_load. We can check this to identify if it's > kexec-ed kernel or not. > > Update patch with it? > > static void *bzImage64_load(struct kimage *image, char *kernel, > unsigned long kernel_len, char *initrd, > unsigned long initrd_len, char *cmdline, > unsigned long cmdline_len) > { > > ... > /* bootloader info. Do we need a separate ID for kexec kernel loader? */ > params->hdr.type_of_loader = 0x0D << 4; That's already documented in Documentation/x86/boot.txt Field name: type_of_loader Type: write (obligatory) Offset/size: 0x210/1 Protocol: 2.00+ ... D kexec-tools And yes, the question in the code is still valid: do we need a separate ID. I'd say no and we'll simply call 0xD all kernels loaded using a kexec-type syscall. IMO. -- Regards/Gruss, Boris. Good mailing practices for 400: avoid top-posting and trim the reply.