Received: by 2002:ac8:156:0:b0:3e0:cd10:60c8 with SMTP id f22csp1685270qtg; Tue, 21 Mar 2023 20:57:59 -0700 (PDT) X-Google-Smtp-Source: AK7set95ioyOcJPdIT8TbImu1V9MHnbSD+d85puWXHYWDo8+Ee/ulOpu0knyE//TH4OLrQzdkctC X-Received: by 2002:a17:90a:1903:b0:23b:2f4f:1a9b with SMTP id 3-20020a17090a190300b0023b2f4f1a9bmr2120353pjg.37.1679457479113; Tue, 21 Mar 2023 20:57:59 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1679457479; cv=none; d=google.com; s=arc-20160816; b=TvPa0RpdoxNLX7ZDdwa0FvT7CDhRWfGra3greAgD+QO2u7Y6sbpnp3OoRJjuMJOwZq qv3tdEtKKwgM3PbrW+o8UQHQWd21KX0uKz5rj8+jqACy2fjwkuD2nw7XlrZezIVmlc58 q39fgrEXpD1cxeGd1vQiGm1LSJP19xSfl5cVVlRM5yh5rkD7pOApXm4NBZzfIyDik4r8 ANA+mec6TIiGzhtSZ/WGCYo+S5cqBKG2ACcaIYjJ5tf86HGUsKHmmVelUabcW0si84sE uvwoMwP7r0qAFgZoAiIfeeFCJvMi3Dld08WMVf/t1/Zqts1HbcvLFHgvGqaFLJAHFtr6 DH2A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=PSjcouOeVUsfHGMQpi8nK/Q3dghfFqw0jQAKm35Uovc=; b=hFtEy7W7/ezcjUf7QF6I+rKFBspVlr4LKKmJhAquJ4mUMN6w9muAj8FIkb5WNgjVBC 6tAkm2A88A/US/6A5sghdLk2UH+ZUwMHBm5R1q9BO5Kp6EYWVpH+DfEC2kUEWi7Va4u8 UBNvrHW1zuDXsHoHeR3gejLP29+2KCuzun/bcLOFEQuqPG17QiOUQZafT1E5k8meE5b/ 5XrnJTSXf5ZxQIDkoRYUujgRpwzGb2KbRkSp7Tj1Zy0iydp8vJrOt/XmIndBB2oWnjWj K5YLCv988n3JZF19e2Uzzwop7fyhzElyOyhinB42FeN21tcc0KG3uONzF/d9Kx8eN54o xpnw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=flGUPC4U; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id c13-20020a17090ad90d00b0023b30b28b89si14085759pjv.56.2023.03.21.20.57.47; Tue, 21 Mar 2023 20:57:59 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=flGUPC4U; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229927AbjCVDop (ORCPT + 99 others); Tue, 21 Mar 2023 23:44:45 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:59002 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229522AbjCVDoo (ORCPT ); Tue, 21 Mar 2023 23:44:44 -0400 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 3DBAE227A1 for ; Tue, 21 Mar 2023 20:43:57 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1679456636; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=PSjcouOeVUsfHGMQpi8nK/Q3dghfFqw0jQAKm35Uovc=; b=flGUPC4UZ3KYcrH8n6+p5NE4NZ05WjNRbcN5wW+jMOO9JMaOmPoM1zH0D7G87j94slahOY 69VyFVapeFvzxEScv7J1Z7JAzlPpe+TUM5AyKhCHedgMwNyLNRcRCYFTxdSVMU7kYJ7B5D mhOUJYUNE4shySPh3ilJ5/XU+ZOUmMA= Received: from mail-io1-f69.google.com (mail-io1-f69.google.com [209.85.166.69]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-504-K8Mmh6o9PWyXRDibgtLwVA-1; Tue, 21 Mar 2023 23:43:55 -0400 X-MC-Unique: K8Mmh6o9PWyXRDibgtLwVA-1 Received: by mail-io1-f69.google.com with SMTP id r25-20020a056602235900b0074d472df653so8740768iot.2 for ; Tue, 21 Mar 2023 20:43:55 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; t=1679456634; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=PSjcouOeVUsfHGMQpi8nK/Q3dghfFqw0jQAKm35Uovc=; b=XJhGrGHgSF0eweT4joDpQdt4Sm/eZlRYkwSXeG31/dDFpzqq2NFw9YFySEnToFgogh fNMULo3vYxa9Mmt+XEi23vpS2pl9kN/jAuBcf2I9S+Jn/25ZpgpJDuju/oJDT8U8xKHc IMyP6vGY6OgsjjGOrx6C+sSiJ2J/pZv4e2FHGuZ70iaUXQIEkdG0qzQesB1GpGwGuXmh KGegy4gy/LXtfnm9cXjULDr5ACizsMQopFwJfMYevDIT50nPD0UzjVcxdFurLO9Kgfl+ uFjKATxL/sX04jH7InvrDeihz1xtQBV0NuOf041Q0FPd0j63eMADf5AgjiPN75N0YXyc +whQ== X-Gm-Message-State: AO0yUKXrYxQCyy/XWpux8MDMG1dxMXlX5h6p6Gfhgy4W1wBqxzNr5zQn byLEi/DrbPaqLt4AIi2VCVpz+yBF+ximIHT2lmfdLuZh7+ZdiWwLfa5due4kuzcOtDl+A+KzqD0 +5zGCQQ3P0FAh/BxgrYox5iAyuSZbvuNgLc0T2lfa X-Received: by 2002:a92:ae04:0:b0:310:9afc:aa6 with SMTP id s4-20020a92ae04000000b003109afc0aa6mr2159326ilh.0.1679456634635; Tue, 21 Mar 2023 20:43:54 -0700 (PDT) X-Received: by 2002:a92:ae04:0:b0:310:9afc:aa6 with SMTP id s4-20020a92ae04000000b003109afc0aa6mr2159319ilh.0.1679456634386; Tue, 21 Mar 2023 20:43:54 -0700 (PDT) MIME-Version: 1.0 References: <20230306030305.15595-1-kernelfans@gmail.com> In-Reply-To: From: Dave Young Date: Wed, 22 Mar 2023 11:44:52 +0800 Message-ID: Subject: Re: [PATCH 0/6] arm64: make kexec_file able to load zboot image To: Pingfan Liu Cc: Ard Biesheuvel , linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, Catalin Marinas , Will Deacon , Andrew Morton , kexec@lists.infradead.org, Mark Rutland Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-0.2 required=5.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, RCVD_IN_MSPIKE_H2,SPF_HELO_NONE,SPF_NONE,URIBL_BLOCKED autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, 10 Mar 2023 at 12:18, Pingfan Liu wrote: > > On Tue, Mar 07, 2023 at 04:08:55PM +0800, Pingfan Liu wrote: > > Hi Ard, > > > > Thanks for sharing your idea. Please see the comment. > > > > On Mon, Mar 06, 2023 at 09:08:03AM +0100, Ard Biesheuvel wrote: > > > (cc Mark) > > > > > > Hello Pingfan, > > > > > > Thanks for working on this. > > > > > > On Mon, 6 Mar 2023 at 04:03, Pingfan Liu wrote: > > > > > > > > After introducing zboot image, kexec_file can not load and jump to the > > > > new style image. Hence it demands a method to load the new kernel. > > > > > > > > The crux of the problem lies in when and how to decompress the Image.gz. > > > > There are three possible courses to take: -1. in user space, but hard to > > > > achieve due to the signature verification inside the kernel. > > > > > > That depends. The EFI zboot image encapsulates another PE/COFF image, > > > which could be signed as well. > > > > > > So there are at least three other options here: > > > - sign the encapsulated image with the same key as the zboot image > > > - sign the encapsulated image with a key that is only valid for kexec boot > > > - sign the encapsulated image with an ephemeral key that is only valid > > > for a kexec'ing an image that was produced by the same kernel build > > > > > > > -2. at the > > > > boot time, let the efi_zboot_entry() handles it, which means a simulated > > > > EFI service should be provided to that entry, especially about how to be > > > > aware of the memory layout. > > > > > > This is actually an idea I intend to explore: with the EFI runtime > > > services regions mapped 1:1, it wouldn't be too hard to implement a > > > minimal environment that can run the zboot image under the previous > > > > The idea of the minimal environment lools amazing. After digging > > more deeply into it, I think it means to implement most of the function > > members in efi_boot_services, besides that, some UEFI protocols due to > > the reference of efi_call_proto(). So a clear boundary between zboot and > > its dependent EFI service is demanded before the work. > > > > Looking deeper into it. This approach may be splitted into the following > chunks: > -1. Estimation the memory demanded by the decompression of zboot, which > roughly includes the size of Image, the size of the emulated service and > the stack used by zboot. Finally we need a kexec_add_buffer() for this > range. > > -2. The emulated EFI services and some initial data such as the physical > address of dtb, the usable memory start address and size should be set > by kexec_purgatory_get_set_symbol() > > -3. Set up an identity mapping of the usable memory by zboot, prepare > stack and turn on MMU at the last point just before 'br efi_zboot_entry' > in relocate_kernel.S, which means relocate_kernel.S should support two > kinds of payload. > > -4. For efi_zboot_entry(), if jumping from kexec, limit its requirement > to only a few boot services: e.g. allocate_pages, allocate_pool. So the > emulated services can be deduced. Hi Pingfan, I'm not sure how hard it will be although Ard thinks it could be doable. If it is not easy I suspect it is not worth the effort. For your current series, my suggestion is you can try to move the major code in the generic code path in kernel/kexec_file.c and keep the arch code minimum so that in the future other arches can avoid redundant code. Otherwise a fallback solution could be using the same key to sign both the zboot image and the internal kernel image like below: 1. sign the kernel with the same key twice (kernel image and zboot image) in distro kernel 2. introduce a kconfig in mainline to sign the kernel image with an ephemeral key same to kernel modules. Distro can disable the config option. (in this way kexec can only load the same kernel, it is not useful if people want to load older/newer kernels) 3. patch kexec-tools to decompress the zboot image and load the kernel image > > > > kernel up to the point where it call ExitBootServices(), after which > > > kexec() would take over. > > > > > > > IIUC, after kexec switches to efi_zboot_entry(), it will not return, > > right? > > > > I have this assumption because letting the control path switch between > kernel and non-kernel code is not a good idea. > > > Thanks, > > Pingfan > > > > > -3. in kernel space, during the file load > > > > of the zboot image. At that point, the kernel masters the whole memory > > > > information, and easily allocates a suitable memory for the decompressed > > > > kernel image. (I think this is similar to what grub does today). > > > > > > > > > > GRUB just calls LoadImage(), and the decompression code runs in the EFI context. > > > > > > > Ah, thanks for the correcting. I had made an wrong assumption of grub > > based on [1], from which, I thought that grub is the case "For > > compatibility with non-EFI loaders, the payload can be decompressed and > > executed by the loader as well, provided that the loader implements the > > decompression algorithm and that non-EFI boot is supported by the > > encapsulated image" > > > > > > [1]: https://www.phoronix.com/news/Linux-6.1-Generic-EFI-Zboot > > > > > > Eager to find a solution to kexec a zboot image. Hope it will come soon. > > > > > > Thanks, > > > > Pingfan > > > > The core of this series is [5/6]. [3,6/6] handles the config option. > > > > The assumption of [3/6] is kexec_file_load is independent of zboot, > > > > especially it can load kernel images compressed with different > > > > compression method. [6/6] is if EFI_ZBOOT, the corresponding > > > > decompression method should be included. > > > > > > > > > > > > Cc: Catalin Marinas > > > > Cc: Will Deacon > > > > Cc: Andrew Morton > > > > Cc: Ard Biesheuvel > > > > Cc: kexec@lists.infradead.org > > > > To: linux-arm-kernel@lists.infradead.org > > > > To: linux-kernel@vger.kernel.org > > > > > > > > Pingfan Liu (6): > > > > arm64: kexec: Rename kexec_image.c to kexec_raw_image.c > > > > lib/decompress: Introduce decompress_method_by_name() > > > > arm64: Kconfig: Pick decompressing method for kexec file load > > > > lib/decompress: Keep decompress routines based on selection > > > > arm64: kexec: Introduce zboot image loader > > > > init/Kconfig: Select decompressing method if compressing kernel > > > > > > > > arch/arm64/Kconfig | 59 ++++++ > > > > arch/arm64/include/asm/kexec.h | 4 +- > > > > arch/arm64/kernel/Makefile | 2 +- > > > > .../{kexec_image.c => kexec_raw_image.c} | 2 +- > > > > arch/arm64/kernel/kexec_zboot_image.c | 186 ++++++++++++++++++ > > > > arch/arm64/kernel/machine_kexec.c | 1 + > > > > arch/arm64/kernel/machine_kexec_file.c | 3 +- > > > > include/linux/decompress/generic.h | 2 + > > > > include/linux/decompress/mm.h | 9 +- > > > > include/linux/zboot.h | 26 +++ > > > > init/Kconfig | 7 + > > > > lib/Kconfig | 3 + > > > > lib/decompress.c | 17 +- > > > > 13 files changed, 314 insertions(+), 7 deletions(-) > > > > rename arch/arm64/kernel/{kexec_image.c => kexec_raw_image.c} (98%) > > > > create mode 100644 arch/arm64/kernel/kexec_zboot_image.c > > > > create mode 100644 include/linux/zboot.h > > > > > > > > -- > > > > 2.31.1 > > > > > > _______________________________________________ > kexec mailing list > kexec@lists.infradead.org > http://lists.infradead.org/mailman/listinfo/kexec >