Received: by 2002:a05:7412:d8a:b0:e2:908c:2ebd with SMTP id b10csp604349rdg; Tue, 10 Oct 2023 23:05:57 -0700 (PDT) X-Google-Smtp-Source: AGHT+IEK28yB404VAF8RN6uOIF7pB0hYtFKfYYa7wohXgg+ZpOxdDrfYMjHZw6G8T51dRoJD5G57 X-Received: by 2002:a05:6a00:2d1e:b0:68f:bb16:d16a with SMTP id fa30-20020a056a002d1e00b0068fbb16d16amr29489425pfb.5.1697004356729; Tue, 10 Oct 2023 23:05:56 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1697004356; cv=none; d=google.com; s=arc-20160816; b=xMJ374H6MLvSO2tylTrsEgb66ie3MoGOwXZspDuP3ikQb9WoRJ6n5MlF5PEwx5lOC7 xgtEmhbrZSa/ryJC+81/TSjsDFFfcd/0xq/aRzR1T3GXpIdRHFjBe4rsYl2WNgocofQn iQVd4VJwhDdqFSVPYa2J6cbrudDekn5M8WML4KXYdczE0KoHkUhdEIEtpjZ2Up9qb4Z+ 0teysh0ykIFhrUl8/NRT0X9YGV5hKvAt04fYAaK6dGP+gkcB2fkoEVMVF2iQnlqI8PVa c4iRgRUDybuwDtHrmASwb6fkzw/i7hytMEZ17i4GR/oaYgU0P9aKrc5+NLRXY3wuhyBY 83tw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:feedback-id:content-transfer-encoding :in-reply-to:from:references:cc:to:subject:user-agent:mime-version :date:message-id; bh=Un73IDZSwUpyGip0bgOaajD1kjDzkSGE6cqdmEIzXF0=; fh=p6stRLWCjtlAyHKMrweBt5O54lBrCQ9KcbWENXtUsjU=; b=eh6BSzwGr0fy6BiZRTkyy/doZIrYttLtxzvbH6IMYI2zjesVJiIlJ/CVKETddLLCtU 5jCXS6bl3bxNUfWYsG9cyTGUa7+UMAYDEptXOsGsVIiVot+YBnN9BofyfqDPDDPwfCII An3aoN4s/hDrC7PZjbgZemGWqmK9aDUVyB18sYpLiSxReqtE0kPGUYwzcX5Ehb1vgmdT icSurMaS/mgw3AypO4zHPvDv3nucbZGhgwusRCcoexOXPW0tEzC0H91ZfTBhvXJi8Vfw y2s7ljVmfUujqjIBOsNX+dzQbDkrF6lJdP963vqRE9DhhfHt3yiRjo127blponZbnVtq Pzfg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:5 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from groat.vger.email (groat.vger.email. [2620:137:e000::3:5]) by mx.google.com with ESMTPS id h12-20020a056a00170c00b0069341622984si11852393pfc.147.2023.10.10.23.05.56 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 10 Oct 2023 23:05:56 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:5 as permitted sender) client-ip=2620:137:e000::3:5; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:5 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by groat.vger.email (Postfix) with ESMTP id CC59B8080D4B; Tue, 10 Oct 2023 23:05:21 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at groat.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1344090AbjJKGFJ (ORCPT + 99 others); Wed, 11 Oct 2023 02:05:09 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:45056 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1343606AbjJKGFH (ORCPT ); Wed, 11 Oct 2023 02:05:07 -0400 Received: from bg4.exmail.qq.com (bg4.exmail.qq.com [43.154.54.12]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 84EC798 for ; Tue, 10 Oct 2023 23:05:02 -0700 (PDT) X-QQ-mid: bizesmtp77t1697004242t663iany Received: from [10.4.6.71] ( [58.240.82.166]) by bizesmtp.qq.com (ESMTP) with id ; Wed, 11 Oct 2023 14:03:59 +0800 (CST) X-QQ-SSF: 00200000000000B0B000000A0000000 X-QQ-FEAT: B8vEhG33zUS8CZi4+yfGHudp18It4vkViVUG73gJwa2ggDYO8PSAgFTFwoLPr 7xUvP23JdvjOuoEuNxs/WBhhr2yuWb7Z+DVRPbdL48FI3phuSY/GIkS0KEZ7dHYY0YA11W8 Apx0WEzjB8/CgM0GZ6aBmBbHEneTCFjw24YLwB0yhCFiA+x/joE05EDLvEmMlpJ0+Z8IU0f GJFEnP7Ba2JiDbh2UcZxj2g/+fXK5kkuG88T7A3QIMp2ZYF7s4qpuADOi+cFL8h7GTB4dLZ 7sy4NtjWDdBJfFp4G+/6b/CMkrjYAp2S5N+DPRP//XDpI9OQnnWtLMXPBnWqabmdc0KdDQz CrIKP7eE4t7ySZNTm5D6q2p1jndR5g/wa7AOus6MkLQEdukTFMxIzuYHE6fgQ== X-QQ-GoodBg: 0 X-BIZMAIL-ID: 13477319505604453870 Message-ID: <22EFF2C197DC5C5A+f82966f5-90cf-09a5-214e-4b0e87bc6064@tinylab.org> Date: Wed, 11 Oct 2023 14:03:59 +0800 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Thunderbird/91.13.0 Subject: Re: [PATCH 2/2] riscv: kexec_file: Support loading Image binary file To: Emil Renner Berthing , paul.walmsley@sifive.com, palmer@dabbelt.com, aou@eecs.berkeley.edu, lihuafei1@huawei.com, conor.dooley@microchip.com, liaochang1@huawei.com, ajones@ventanamicro.com, alexghiti@rivosinc.com, evan@rivosinc.com, sunilvl@ventanamicro.com, xianting.tian@linux.alibaba.com, samitolvanen@google.com, masahiroy@kernel.org, apatel@ventanamicro.com, jszhang@kernel.org, duwe@suse.de, eric.devolder@oracle.com Cc: linux-riscv@lists.infradead.org, linux-kernel@vger.kernel.org References: <20230914020044.1397356-1-songshuaishuai@tinylab.org> <20230914020044.1397356-3-songshuaishuai@tinylab.org> From: Song Shuai In-Reply-To: Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit X-QQ-SENDSIZE: 520 Feedback-ID: bizesmtp:tinylab.org:qybglogicsvrsz:qybglogicsvrsz4a-0 X-Spam-Status: No, score=1.1 required=5.0 tests=FORGED_MUA_MOZILLA, HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,NICE_REPLY_A, RCVD_IN_SBL_CSS,SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on groat.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (groat.vger.email [0.0.0.0]); Tue, 10 Oct 2023 23:05:22 -0700 (PDT) X-Spam-Level: * 在 2023/9/14 16:37, Emil Renner Berthing 写道: > Song Shuai wrote: >> This patch creates image_kexec_ops to load Image binary file >> for kexec_file_load() syscall. >> >> Signed-off-by: Song Shuai >> --- >> arch/riscv/include/asm/image.h | 2 + >> arch/riscv/include/asm/kexec.h | 1 + >> arch/riscv/kernel/Makefile | 2 +- >> arch/riscv/kernel/kexec_image.c | 97 ++++++++++++++++++++++++++ >> arch/riscv/kernel/machine_kexec_file.c | 1 + >> 5 files changed, 102 insertions(+), 1 deletion(-) >> create mode 100644 arch/riscv/kernel/kexec_image.c >> >> diff --git a/arch/riscv/include/asm/image.h b/arch/riscv/include/asm/image.h >> index e0b319af3681..8927a6ea1127 100644 >> --- a/arch/riscv/include/asm/image.h >> +++ b/arch/riscv/include/asm/image.h >> @@ -30,6 +30,8 @@ >> RISCV_HEADER_VERSION_MINOR) >> >> #ifndef __ASSEMBLY__ >> +#define riscv_image_flag_field(flags, field)\ >> + (((flags) >> field##_SHIFT) & field##_MASK) > > Hi Song, > > This macro is almost FIELD_GET from linux/bitfield.h .. > >> /** >> * struct riscv_image_header - riscv kernel image header >> * @code0: Executable code >> diff --git a/arch/riscv/include/asm/kexec.h b/arch/riscv/include/asm/kexec.h >> index 518825fe4160..b9ee8346cc8c 100644 >> --- a/arch/riscv/include/asm/kexec.h >> +++ b/arch/riscv/include/asm/kexec.h >> @@ -56,6 +56,7 @@ extern riscv_kexec_method riscv_kexec_norelocate; >> >> #ifdef CONFIG_KEXEC_FILE >> extern const struct kexec_file_ops elf_kexec_ops; >> +extern const struct kexec_file_ops image_kexec_ops; >> >> struct purgatory_info; >> int arch_kexec_apply_relocations_add(struct purgatory_info *pi, >> diff --git a/arch/riscv/kernel/Makefile b/arch/riscv/kernel/Makefile >> index 1c62c639e875..9ecba3231a36 100644 >> --- a/arch/riscv/kernel/Makefile >> +++ b/arch/riscv/kernel/Makefile >> @@ -86,7 +86,7 @@ endif >> obj-$(CONFIG_HOTPLUG_CPU) += cpu-hotplug.o >> obj-$(CONFIG_KGDB) += kgdb.o >> obj-$(CONFIG_KEXEC_CORE) += kexec_relocate.o crash_save_regs.o machine_kexec.o >> -obj-$(CONFIG_KEXEC_FILE) += kexec_elf.o machine_kexec_file.o >> +obj-$(CONFIG_KEXEC_FILE) += kexec_elf.o kexec_image.o machine_kexec_file.o >> obj-$(CONFIG_CRASH_DUMP) += crash_dump.o >> obj-$(CONFIG_CRASH_CORE) += crash_core.o >> >> diff --git a/arch/riscv/kernel/kexec_image.c b/arch/riscv/kernel/kexec_image.c >> new file mode 100644 >> index 000000000000..b6aa7f59bd53 >> --- /dev/null >> +++ b/arch/riscv/kernel/kexec_image.c >> @@ -0,0 +1,97 @@ >> +// SPDX-License-Identifier: GPL-2.0 >> +/* >> + * RISC-V Kexec image loader >> + * >> + */ >> + >> +#define pr_fmt(fmt) "kexec_file(Image): " fmt >> + >> +#include >> +#include >> +#include >> +#include >> +#include >> +#include >> +#include >> +#include >> + >> +static int image_probe(const char *kernel_buf, unsigned long kernel_len) >> +{ >> + const struct riscv_image_header *h = >> + (const struct riscv_image_header *)(kernel_buf); >> + >> + if (!h || (kernel_len < sizeof(*h))) >> + return -EINVAL; >> + >> + /* According to Documentation/riscv/boot-image-header.rst, >> + * use "magic2" field to check when version >= 0.2. >> + */ >> + >> + if (h->version >= RISCV_HEADER_VERSION && >> + memcmp(&h->magic2, RISCV_IMAGE_MAGIC2, sizeof(h->magic2))) >> + return -EINVAL; >> + >> + return 0; >> +} >> + >> +static void *image_load(struct kimage *image, >> + char *kernel, unsigned long kernel_len, >> + char *initrd, unsigned long initrd_len, >> + char *cmdline, unsigned long cmdline_len) >> +{ >> + struct riscv_image_header *h; >> + u64 flags; >> + bool be_image, be_kernel; >> + struct kexec_buf kbuf; >> + int ret; >> + >> + /* Check Image header */ >> + h = (struct riscv_image_header *)kernel; >> + if (!h->image_size) { >> + ret = -EINVAL; >> + goto out; >> + } >> + >> + /* Check endianness */ >> + flags = le64_to_cpu(h->flags); >> + be_image = riscv_image_flag_field(flags, RISCV_IMAGE_FLAG_BE); > > ..but here you're just testing a single bit, so since be_image is a bool it > could just be > be_image = flags & RISCV_IMAGE_FLAG_BE_MASK; > > /Emil Hi Emil, Sorry for the delayed response, The `flags` field currently only has bit-0 to indicate the kenrel endianness, your comment looks good in this case. While considering the future extension of the `flags` feild, the riscv_image_flag_field() is neccessiry to make callers to require the bits they want. So I prefer to keep this snippet. > >> + be_kernel = IS_ENABLED(CONFIG_CPU_BIG_ENDIAN); >> + if (be_image != be_kernel) { >> + ret = -EINVAL; >> + goto out; >> + } >> + >> + /* Load the kernel image */ >> + kbuf.image = image; >> + kbuf.buf_min = 0; >> + kbuf.buf_max = ULONG_MAX; >> + kbuf.top_down = false; >> + >> + kbuf.buffer = kernel; >> + kbuf.bufsz = kernel_len; >> + kbuf.mem = KEXEC_BUF_MEM_UNKNOWN; >> + kbuf.memsz = le64_to_cpu(h->image_size); >> + kbuf.buf_align = le64_to_cpu(h->text_offset); >> + >> + ret = kexec_add_buffer(&kbuf); >> + if (ret) { >> + pr_err("Error add kernel image ret=%d\n", ret); >> + goto out; >> + } >> + >> + image->start = kbuf.mem; >> + >> + pr_info("Loaded kernel at 0x%lx bufsz=0x%lx memsz=0x%lx\n", >> + kbuf.mem, kbuf.bufsz, kbuf.memsz); >> + >> + ret = load_extra_segments(image, kbuf.mem, kbuf.memsz, >> + initrd, initrd_len, cmdline, cmdline_len); >> + >> +out: >> + return ret ? ERR_PTR(ret) : NULL; >> +} >> + >> +const struct kexec_file_ops image_kexec_ops = { >> + .probe = image_probe, >> + .load = image_load, >> +}; >> diff --git a/arch/riscv/kernel/machine_kexec_file.c b/arch/riscv/kernel/machine_kexec_file.c >> index aedb8c16a283..5dc700834f1e 100644 >> --- a/arch/riscv/kernel/machine_kexec_file.c >> +++ b/arch/riscv/kernel/machine_kexec_file.c >> @@ -17,6 +17,7 @@ >> >> const struct kexec_file_ops * const kexec_file_loaders[] = { >> &elf_kexec_ops, >> + &image_kexec_ops, >> NULL >> }; >> >> -- >> 2.20.1 >> >> >> _______________________________________________ >> linux-riscv mailing list >> linux-riscv@lists.infradead.org >> http://lists.infradead.org/mailman/listinfo/linux-riscv > -- Thanks Song Shuai