Received: by 2002:a25:d7c1:0:0:0:0:0 with SMTP id o184csp3439533ybg; Fri, 25 Oct 2019 04:16:27 -0700 (PDT) X-Google-Smtp-Source: APXvYqxE/RlU0H07uaBhDQh+Ja9puAI8RD9QI0tm7EBe9aKXqdR5vB8Por4WwOJ4FFu4nQ5mo/+B X-Received: by 2002:a17:90a:db47:: with SMTP id u7mr3367722pjx.3.1572002187264; Fri, 25 Oct 2019 04:16:27 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1572002187; cv=none; d=google.com; s=arc-20160816; b=O4MGK8rlsXoxxRU57LXoWgp4l2pD0+UrGSFq6C9KUnDe4y59KqlU4QZeFsS3WZHQ50 0wOdM14+d7Ztafub5meEANoNgMrpZtFy0Qx1j36QSAeiZd6Dxw+TnUp6W2gcfLeWSry0 d534hmCZrAHEsp/c1Iz1wylyfBW2lQmuR7EOtp5272jB/hMzHjJGbToVM1n6J2NsH2rX d96MCkukegpbTS0Bc87gu2QuaWTBwV/KZH9lizDYwgmNIadkbpc0ejDzdAd7ye/Xfpao bOaURAjXeB2LCH2xxSHTTg3Y1IjpczEjonEnjeIQk4o3zh/semgAHg4trdsvX7aYVQgx qz/g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from :dkim-signature; bh=+83lcVguJyvnyafDeVP9ncl+WMvkJ+8ZOi3EzqtPjgg=; b=ZtioPfrjnHEj8fhPKu6ohAyD09Ow4HzZ16qbfzjiTj6HpqBR9xIswL6gDTDCUMr0dq sqlQ/jCE3Au8ujWSeJa3pc1nBQNHMoZV7jJmkcDQhj5p2iekvjqO7wwJXrIVHk5KBe2A T7D6fcpUKJ9u7xgYnvedmxsNmEoRQoZaM8nRr4bWs/Scuy2FtypuEdrrOesYxZxNlsfm Ps+wMlJMsK9N26SA5YDfx1uyUdvHkTH5dirPPwFro5M+FhC/ldcl0Niu3HC0ju6kVEf5 IHcKbdjbogC/O9z+R55ZITFO+eVUi6rWsUwqEVbjANEAJmfFviZ0H3ABSqpUkJbNo+dH U0zA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@oracle.com header.s=corp-2019-08-05 header.b=PpqDwkeJ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=oracle.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id b16si2050420pgw.540.2019.10.25.04.15.47; Fri, 25 Oct 2019 04:16:27 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@oracle.com header.s=corp-2019-08-05 header.b=PpqDwkeJ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=oracle.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2439336AbfJXLtd (ORCPT + 99 others); Thu, 24 Oct 2019 07:49:33 -0400 Received: from userp2120.oracle.com ([156.151.31.85]:46116 "EHLO userp2120.oracle.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726326AbfJXLtc (ORCPT ); Thu, 24 Oct 2019 07:49:32 -0400 Received: from pps.filterd (userp2120.oracle.com [127.0.0.1]) by userp2120.oracle.com (8.16.0.27/8.16.0.27) with SMTP id x9OBdBot022926; Thu, 24 Oct 2019 11:48:47 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=from : to : cc : subject : date : message-id; s=corp-2019-08-05; bh=+83lcVguJyvnyafDeVP9ncl+WMvkJ+8ZOi3EzqtPjgg=; b=PpqDwkeJLhJ7Ingfq7KJFOlkrifCd+/mA6l8d9UJ1OOM/xI0iraz0D8SdpNPN0VdCxTa xoUl6oQNnxJdYQ69+qro0MemPKSRZLJesx7Mq3CCloJRBn2sbnhIdzna6ddDNltl/eEd gIV2KA9OKZ2qd8GcfHEZlEjZSmR+gY1DGF8oh+0JyDSUFLo00OhWzNVR4zz9m71jpbrn gvuccVAW7JjSwBDWewa7pc8WRmYf6Mk8W4x4j2UOeuAmTmp35PqTXSOdLXVQdw7IYPZR PRQqjrPEGuMAZnr6hVloS9IaWycgWbMs+G9wF9wPmSlHlB65eAxQT4kJRhZqbb8/+Tig ZQ== Received: from userp3020.oracle.com (userp3020.oracle.com [156.151.31.79]) by userp2120.oracle.com with ESMTP id 2vqu4r2vjg-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Thu, 24 Oct 2019 11:48:46 +0000 Received: from pps.filterd (userp3020.oracle.com [127.0.0.1]) by userp3020.oracle.com (8.16.0.27/8.16.0.27) with SMTP id x9OBeE34147828; Thu, 24 Oct 2019 11:48:46 GMT Received: from userv0121.oracle.com (userv0121.oracle.com [156.151.31.72]) by userp3020.oracle.com with ESMTP id 2vtsk4kdhe-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Thu, 24 Oct 2019 11:48:46 +0000 Received: from abhmp0008.oracle.com (abhmp0008.oracle.com [141.146.116.14]) by userv0121.oracle.com (8.14.4/8.13.8) with ESMTP id x9OBmc76019554; Thu, 24 Oct 2019 11:48:38 GMT Received: from tomti.i.net-space.pl (/10.175.165.209) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Thu, 24 Oct 2019 04:48:37 -0700 From: Daniel Kiper To: linux-efi@vger.kernel.org, linux-kernel@vger.kernel.org, x86@kernel.org, xen-devel@lists.xenproject.org Cc: ard.biesheuvel@linaro.org, boris.ostrovsky@oracle.com, bp@alien8.de, corbet@lwn.net, dave.hansen@linux.intel.com, luto@kernel.org, peterz@infradead.org, eric.snowberg@oracle.com, hpa@zytor.com, jgross@suse.com, kanth.ghatraju@oracle.com, konrad.wilk@oracle.com, mingo@redhat.com, rdunlap@infradead.org, ross.philipson@oracle.com, tglx@linutronix.de Subject: [PATCH v4 0/3] x86/boot: Introduce the kernel_info et consortes Date: Thu, 24 Oct 2019 13:48:11 +0200 Message-Id: <20191024114814.6488-1-daniel.kiper@oracle.com> X-Mailer: git-send-email 2.11.0 X-Proofpoint-Virus-Version: vendor=nai engine=6000 definitions=9419 signatures=668684 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 suspectscore=0 malwarescore=0 phishscore=0 bulkscore=0 spamscore=0 mlxscore=0 mlxlogscore=663 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1908290000 definitions=main-1910240116 X-Proofpoint-Virus-Version: vendor=nai engine=6000 definitions=9419 signatures=668684 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1015 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=742 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1908290000 definitions=main-1910240116 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi, Due to very limited space in the setup_header this patch series introduces new kernel_info struct which will be used to convey information from the kernel to the bootloader. This way the boot protocol can be extended regardless of the setup_header limitations. Additionally, the patch series introduces some convenience features like the setup_indirect struct and the kernel_info.setup_type_max field. Daniel Documentation/x86/boot.rst | 174 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ arch/x86/boot/Makefile | 2 +- arch/x86/boot/compressed/Makefile | 4 +- arch/x86/boot/compressed/kaslr.c | 12 ++++++ arch/x86/boot/compressed/kernel_info.S | 22 ++++++++++ arch/x86/boot/header.S | 3 +- arch/x86/boot/tools/build.c | 5 +++ arch/x86/include/uapi/asm/bootparam.h | 16 +++++++- arch/x86/kernel/e820.c | 11 +++++ arch/x86/kernel/kdebugfs.c | 20 +++++++-- arch/x86/kernel/ksysfs.c | 30 ++++++++++---- arch/x86/kernel/setup.c | 4 ++ arch/x86/mm/ioremap.c | 11 +++++ 13 files changed, 298 insertions(+), 16 deletions(-) Daniel Kiper (3): x86/boot: Introduce the kernel_info x86/boot: Introduce the kernel_info.setup_type_max x86/boot: Introduce the setup_indirect