Received: by 2002:a25:31c3:0:0:0:0:0 with SMTP id x186csp4066622ybx; Mon, 4 Nov 2019 07:19:57 -0800 (PST) X-Google-Smtp-Source: APXvYqxXtBk9KIFbilSVBptb2Rwa9nIbLPv2ej56RkKFMjYmOfTnnL2rZdLPc6p0xXH1D3B1OMW7 X-Received: by 2002:a17:906:5919:: with SMTP id h25mr23974187ejq.222.1572880797285; Mon, 04 Nov 2019 07:19:57 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1572880797; cv=none; d=google.com; s=arc-20160816; b=vREX70JWnuvQ+qZtLLW9GiipW3xXO9/8TUH7qL3jCQch9VO3gz4oKef+B9WRYPmhHh Gex65O8kmhqzC3CMznzwTPK8RrgFzqsCgHja7sOa7vxtF26G3Zg0Ni8R5pXq1oLepwhw o+0AoGEcXNcyUe6ZdPnznccxvkGHqg4pjmbkCeiD8Pf6EPdvCz6TL4SNcPJNmT4XGzYR drYiIn+g36BzJkSUIliTTUvGA8DErKsGJuy7MPKp1UIRIf3YQq5/l6YzHyH7zAPOanBv e/GTp4bwnGzLmPtzAMdq+FeyIElkk8hCabIA5c6LTOptwtpKGAQbwemC6zKvGwlfM0lV TXFQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from :dkim-signature; bh=+83lcVguJyvnyafDeVP9ncl+WMvkJ+8ZOi3EzqtPjgg=; b=CGVwqaydEiDmxBm/pHeJDzkguId40UsLLvTkPQnW2fOHAes5h7KAcJfRO4s93j4XuU CoAL3kcQA0HEJ4clILKEfO86y6EbnZGGzQUXoMyaFbQUEEFue31Wb5asVP94or7Degpm u6SaIIVKzNajksGHMnMrGbzORboIHibdCD7+/usyr9kYb8D/t1pztMusszL8YaDUmmgk jEyFrKLV9d31LYPeTqF5lq5a92UZtV+6lKnAiOwCuaZsV+lVFlgzarwOsSCenMQynY5n 8jv6oBG2jU5XVu6V5ZqWFy0SdHmOENpFBrtJD8PgA8pxt3Lm1m8cmbsviYBGPeuRKVVG oWuA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@oracle.com header.s=corp-2019-08-05 header.b=ILq4JoZ9; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=oracle.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id s13si4287019eju.83.2019.11.04.07.19.33; Mon, 04 Nov 2019 07:19:57 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@oracle.com header.s=corp-2019-08-05 header.b=ILq4JoZ9; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=oracle.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729318AbfKDPRG (ORCPT + 99 others); Mon, 4 Nov 2019 10:17:06 -0500 Received: from aserp2120.oracle.com ([141.146.126.78]:55964 "EHLO aserp2120.oracle.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727796AbfKDPRG (ORCPT ); Mon, 4 Nov 2019 10:17:06 -0500 Received: from pps.filterd (aserp2120.oracle.com [127.0.0.1]) by aserp2120.oracle.com (8.16.0.27/8.16.0.27) with SMTP id xA4FCH2q032157; Mon, 4 Nov 2019 15:14:31 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=from : to : cc : subject : date : message-id; s=corp-2019-08-05; bh=+83lcVguJyvnyafDeVP9ncl+WMvkJ+8ZOi3EzqtPjgg=; b=ILq4JoZ91xi0X3BXYbFx3Jh8Aov5v6iXEjEc8SDZw/oOBGdKSX//iFs7g5bXLcofHE+j 0vEJXr3MXBR+RsxU1IHBhSehGzuhhZhGkQ05jap4OVRaCocR7O96nIop/p4fI11n0+Nb QKysaIwRZnn58e6Fh/GR4foux9BMiMMqHGZTXLiNqmAI4SgNZUxyWNkgxahaHDs+1x21 iJjsxkaWE7GsYTMp7/OStbWM8FMZCyBk68WXMEZxPH173hsbVjnuRG2fyEXlseydpbu6 Tos8URXi3eSie9mw/WGIlY7CEWPRyqcwu3/3OMb1ngMxtu52S/NbipUYBE4zleispc7n LQ== Received: from userp3030.oracle.com (userp3030.oracle.com [156.151.31.80]) by aserp2120.oracle.com with ESMTP id 2w11rpr139-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Mon, 04 Nov 2019 15:14:31 +0000 Received: from pps.filterd (userp3030.oracle.com [127.0.0.1]) by userp3030.oracle.com (8.16.0.27/8.16.0.27) with SMTP id xA4FB2JA136281; Mon, 4 Nov 2019 15:14:30 GMT Received: from aserv0121.oracle.com (aserv0121.oracle.com [141.146.126.235]) by userp3030.oracle.com with ESMTP id 2w1k8uxutt-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Mon, 04 Nov 2019 15:14:30 +0000 Received: from abhmp0015.oracle.com (abhmp0015.oracle.com [141.146.116.21]) by aserv0121.oracle.com (8.14.4/8.13.8) with ESMTP id xA4FEKf4002177; Mon, 4 Nov 2019 15:14:25 GMT Received: from tomti.i.net-space.pl (/10.175.168.29) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Mon, 04 Nov 2019 07:14:16 -0800 From: Daniel Kiper To: linux-efi@vger.kernel.org, linux-kernel@vger.kernel.org, x86@kernel.org, xen-devel@lists.xenproject.org Cc: ard.biesheuvel@linaro.org, boris.ostrovsky@oracle.com, bp@alien8.de, corbet@lwn.net, dave.hansen@linux.intel.com, luto@kernel.org, peterz@infradead.org, eric.snowberg@oracle.com, hpa@zytor.com, jgross@suse.com, kanth.ghatraju@oracle.com, konrad.wilk@oracle.com, mingo@redhat.com, rdunlap@infradead.org, ross.philipson@oracle.com, tglx@linutronix.de Subject: [PATCH v5 0/3] x86/boot: Introduce the kernel_info et consortes Date: Mon, 4 Nov 2019 16:13:51 +0100 Message-Id: <20191104151354.28145-1-daniel.kiper@oracle.com> X-Mailer: git-send-email 2.11.0 X-Proofpoint-Virus-Version: vendor=nai engine=6000 definitions=9431 signatures=668685 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 suspectscore=0 malwarescore=0 phishscore=0 bulkscore=0 spamscore=0 mlxscore=0 mlxlogscore=663 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1908290000 definitions=main-1911040151 X-Proofpoint-Virus-Version: vendor=nai engine=6000 definitions=9431 signatures=668685 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1015 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=742 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1908290000 definitions=main-1911040151 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi, Due to very limited space in the setup_header this patch series introduces new kernel_info struct which will be used to convey information from the kernel to the bootloader. This way the boot protocol can be extended regardless of the setup_header limitations. Additionally, the patch series introduces some convenience features like the setup_indirect struct and the kernel_info.setup_type_max field. Daniel Documentation/x86/boot.rst | 174 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ arch/x86/boot/Makefile | 2 +- arch/x86/boot/compressed/Makefile | 4 +- arch/x86/boot/compressed/kaslr.c | 12 ++++++ arch/x86/boot/compressed/kernel_info.S | 22 ++++++++++ arch/x86/boot/header.S | 3 +- arch/x86/boot/tools/build.c | 5 +++ arch/x86/include/uapi/asm/bootparam.h | 16 +++++++- arch/x86/kernel/e820.c | 11 +++++ arch/x86/kernel/kdebugfs.c | 20 +++++++-- arch/x86/kernel/ksysfs.c | 30 ++++++++++---- arch/x86/kernel/setup.c | 4 ++ arch/x86/mm/ioremap.c | 11 +++++ 13 files changed, 298 insertions(+), 16 deletions(-) Daniel Kiper (3): x86/boot: Introduce the kernel_info x86/boot: Introduce the kernel_info.setup_type_max x86/boot: Introduce the setup_indirect