Received: by 2002:a05:6358:bb9e:b0:b9:5105:a5b4 with SMTP id df30csp2765012rwb; Mon, 5 Sep 2022 00:41:09 -0700 (PDT) X-Google-Smtp-Source: AA6agR4DtklV5VyqbuAyTMecbXocVczGqhRd0YXhlyuUnWrWP8mkYu3Y+S0FmtAiAaGR3Ue8QRd1 X-Received: by 2002:a17:906:478d:b0:751:1f0f:76a2 with SMTP id cw13-20020a170906478d00b007511f0f76a2mr9460178ejc.607.1662363669523; Mon, 05 Sep 2022 00:41:09 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1662363669; cv=none; d=google.com; s=arc-20160816; b=f5kCnDCTCQ5Pn0CKgncPAfLJj7NxyIc2wx4Aai1TTR0l/joem2PIJdUs7bDMlFhJJm oOJqQC49TEFtDD/3nm3wr00hmFMKBdEj0qPTvbDMCCZZvojo/9J+Rmpe/yYwG7E9EUX2 A8bWn2nu5P6CcTzsYZjASZuvNlDdem0Ye0XF4VeD+1JenPOI0n87B1APaKznm/AJ5XZJ zI6LqFpOavtvpxu7hrhJVKDLEpQOrPLpvPKnZfQ5Q91UQHrtMp6xCmkv0hvy7XHLi2LF 3C/CATuWA2thFbcwbxqLF13uh+93uoTI5BG+JYng1QX0J8Vw8eBS25P3n+jOjoKs/Nt1 q3KQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=X9Wb0ShOdRm6AcKk5ekw3n64zTs+jpavoyKo/qUt5gI=; b=M8wScc5OBeqYrsm9hyoAEmapS85aYsIkxygwSkJjhEL2wGi1KgsqAvD3v8L/IHI6uq 9OXU7OrTyxlip9MkMY300vAwZJUFrVDWlWzjLEYl0cI8GHeg6WC1gQM41vq7ZIW6gmq2 RMCWIx5hNl4dXZap2b2UWM9zozG1sNnTmZs/OKy6fnrDvu4U+N3+GWGb9O/c8gAItccH nWiZ34x7hM4PjVlHNWH2iidOLS0vXL3nkg5hmlDpp5dlXoZCAaEEXWaG7euxkG/6mjxS lf8Xb84yjHEDpbIdi9iFcFnwW032yADu2ZRMzbez5ZczKjnBgWkkehcfzJ1fLSq8OCyO SUKQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=JGKMySdk; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id sb25-20020a1709076d9900b00741ad7e8c35si5558326ejc.624.2022.09.05.00.40.44; Mon, 05 Sep 2022 00:41:09 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=JGKMySdk; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236333AbiIEH3s (ORCPT + 99 others); Mon, 5 Sep 2022 03:29:48 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:37814 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S237834AbiIEH3P (ORCPT ); Mon, 5 Sep 2022 03:29:15 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 5202CBF46; Mon, 5 Sep 2022 00:29:01 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id D26A26114F; Mon, 5 Sep 2022 07:29:00 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 3D1D2C43470; Mon, 5 Sep 2022 07:29:00 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1662362940; bh=CFgCwLxabnSTm5t38K9gf4jhOrGuDxAkYE++1G/WjGM=; h=References:In-Reply-To:From:Date:Subject:To:Cc:From; b=JGKMySdkVYNsEEISdJeEgof2s7zUPB7MxIoc8NF0Ov0yUylKuxX9Zs89Zsc5jk9WM 5Q0Zo9qbNMH/4XRuWkVDa5GwP4Kcs/27OAT75QcgR11aIDsje7boiDSQHZuVVpyuNF i3wokmslWR1HLMcQFXaxFD4lNFXzpxBnvGVSKftMFYpK4dPjIRkL5ptVURSnifMfTz 28/wIZO/Dc6MKonqAUymwd2Z9f+Y9+pnagL5DVK2k5GXMDlpUdCguDFPmb45Cjic3S pkJLSsSq/LWishNQ3IOdosgRX33l70t4caPZXrt0S038a1MnVyQXgXECEFQtRGB50P 2vi92rF1uBY3Q== Received: by mail-lj1-f178.google.com with SMTP id b19so8302571ljf.8; Mon, 05 Sep 2022 00:29:00 -0700 (PDT) X-Gm-Message-State: ACgBeo0Py262bS4TJ7XU935PgRJ66a1GC2DORjO62e2zMyjc0QLqt586 DQ1mBandv7NqhT85CMwxEgBnznqQKb2+ixjHH7w= X-Received: by 2002:a05:651c:11c6:b0:265:d1cb:b7b4 with SMTP id z6-20020a05651c11c600b00265d1cbb7b4mr8755894ljo.69.1662362938224; Mon, 05 Sep 2022 00:28:58 -0700 (PDT) MIME-Version: 1.0 References: <20220819102037.2697798-1-chenhuacai@loongson.cn> <9b6f0aeaebbd36882b5b40d655f9ccd20c7be496.camel@xry111.site> In-Reply-To: From: Ard Biesheuvel Date: Mon, 5 Sep 2022 09:28:46 +0200 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: [PATCH V3] LoongArch: Add efistub booting support To: Huacai Chen Cc: Xi Ruoyao , Huacai Chen , Arnd Bergmann , loongarch@lists.linux.dev, linux-arch , Xuefeng Li , Guo Ren , Xuerui Wang , Jiaxun Yang , linux-efi , LKML Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-7.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, 5 Sept 2022 at 09:25, Huacai Chen wrote: > > Hi, Ard and Youling, > > On Mon, Sep 5, 2022 at 3:02 PM Ard Biesheuvel wrote: > > > > On Mon, 5 Sept 2022 at 05:51, Huacai Chen wrote: > > > > > > Hi, Ard, > > > > > > On Mon, Sep 5, 2022 at 5:59 AM Ard Biesheuvel wrote: > > > > > > > > On Sun, 4 Sept 2022 at 15:24, Huacai Chen wrote: > > > > > > > > > > Hi, Ard, > > > > > > > > > > On Thu, Sep 1, 2022 at 6:40 PM Huacai Chen wrote: > > > > > > > > > > > > Hi, Ard, > > > > > > > > > > > > On Sat, Aug 27, 2022 at 3:14 PM Ard Biesheuvel wrote: > > > > > > > > > > > > > > On Sat, 27 Aug 2022 at 06:41, Xi Ruoyao wrote: > > > > > > > > > > > > > > > > Tested V3 with the magic number check manually removed in my GRUB build. > > > > > > > > The system boots successfully. I've not tested Arnd's zBoot patch yet. > > > > > > > > > > > > > > I am Ard not Arnd :-) > > > > > > > > > > > > > > Please use this branch when testing the EFI decompressor: > > > > > > > https://git.kernel.org/pub/scm/linux/kernel/git/ardb/linux.git/log/?h=efi-decompressor-v4 > > > > > > The root cause of LoongArch zboot boot failure has been found, it is a > > > > > > binutils bug, latest toolchain with the below patch can solve the > > > > > > problem. > > > > > > > > > > > > diff --git a/bfd/elfnn-loongarch.c b/bfd/elfnn-loongarch.c > > > > > > index 5b44901b9e0..fafdc7c7458 100644 > > > > > > --- a/bfd/elfnn-loongarch.c > > > > > > +++ b/bfd/elfnn-loongarch.c > > > > > > @@ -2341,9 +2341,10 @@ loongarch_elf_relocate_section (bfd > > > > > > *output_bfd, struct bfd_link_info *info, > > > > > > case R_LARCH_SOP_PUSH_PLT_PCREL: > > > > > > unresolved_reloc = false; > > > > > > > > > > > > - if (resolved_to_const) > > > > > > + if (!is_undefweak && resolved_to_const) > > > > > > { > > > > > > relocation += rel->r_addend; > > > > > > + relocation -= pc; > > > > > > break; > > > > > > } > > > > > > else if (is_undefweak) > > > > > > > > > > > > > > > > > > Huacai > > > > > Now the patch is submitted here: > > > > > https://sourceware.org/pipermail/binutils/2022-September/122713.html > > > > > > > > > > > > > Great. Given the severity of this bug, I imagine that building the > > > > LoongArch kernel will require a version of binutils that carries this > > > > fix. > > > > > > > > Therefore, i will revert back to the original approach for accessing > > > > uncompressed_size, using an extern declaration with an __aligned(1) > > > > attribute. > > > > > > > > > And I have some other questions about kexec: kexec should jump to the > > > > > elf entry or the pe entry? I think is the elf entry, because if we > > > > > jump to the pe entry, then SVAM will be executed twice (but it should > > > > > be executed only once). However, how can we jump to the elf entry if > > > > > we use zboot? Maybe it is kexec-tool's responsibility to decompress > > > > > the zboot kernel image? > > > > > > > > > > > > > Yes, very good point. Kexec kernels cannot boot via the EFI entry > > > > point, as the boot services will already be shutdown. So the kexec > > > > kernel needs to boot via the same entrypoint in the core kernel that > > > > the EFI stub calls when it hands over. > > > > > > > > For the EFI zboot image in particular, we will need to teach kexec how > > > > to decompress them. The zboot image has a header that > > > > a) describes it as a EFI linux zimg > > > > b) describes the start and end offset of the compressed payload > > > > c) describes which compression algorithm was used. > > > > > > > > This means that any non-EFI loader (including kexec) should be able to > > > > extract the inner PE/COFF image and decompress it. For arm64 and > > > > RISC-V, this is sufficient as the EFI and raw images are the same. For > > > > LoongArch, I suppose it means we need a way to enter the core kernel > > > > directly via the entrypoint that the EFI stub uses when handing over > > > > (and pass the original DT argument so the kexec kernel has access to > > > > the EFI and ACPI firmware tables) > > > OK, then is this implementation [1] acceptable? I remember that you > > > said the MS-DOS header shouldn't contain other information, so I guess > > > this is unacceptable? > > > > > > > No, this looks reasonable to me. I objected to using magic numbers in > > the 'pure PE' view of the image, as it does not make sense for a pure > > PE loader such as GRUB to rely on such metadata. > > > > In this case (like on arm64), we are dealing with something else: we > > need to identify the image to the kernel itself, and here, using the > > unused space in the MS-DOS header is fine. > > > > > [1] https://lore.kernel.org/loongarch/c4dbb14a-5580-1e47-3d15-5d2079e88404@loongson.cn/T/#mb8c1dc44f7fa2d3ef638877f0cd3f958f0be96ad > OK, then there is no big problem here. And I found that arm64/riscv > don't need the kernel entry point in the header. I don't know why, but > I think it implies that a unified layout across architectures is > unnecessary, and I prefer to put the kernel entry point before > effective kernel size. :) > It is fine to put the entry point offset in the header. arm64 and RISC-V don't need this because the first instructions are a pseudo-NOP (an instruction that does nothing but its binary encoding looks like 'MZ..') and a jump to the actual entry point.