Received: by 2002:a05:7412:d8a:b0:e2:908c:2ebd with SMTP id b10csp719721rdg; Wed, 11 Oct 2023 03:48:59 -0700 (PDT) X-Google-Smtp-Source: AGHT+IFyFqUNPw5gcZEiTzRoBuS7qX4YX0ZkNabcCkYpftH0hH5Nqxtab4QnInOlaOrWa0Vt/J2t X-Received: by 2002:a05:6a21:6da0:b0:14d:446f:7212 with SMTP id wl32-20020a056a216da000b0014d446f7212mr26550584pzb.46.1697021339160; Wed, 11 Oct 2023 03:48:59 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1697021339; cv=none; d=google.com; s=arc-20160816; b=SKJ21iNxH5g8g1dpYtO6uVPwnA+Jm8o3yrLNXDCjuNBzwKIB8eXk4exlYPZPhyrQT2 MnBxMJV7eA30KJS6R0q4uuFeCHf+94Ssx5/8Hi8x+ROiSxcehZesrJLrOTHakInfYt16 eC2dQlbEjhX4MyIzf6LQzBle9u4wEigzcU8s35OsLh0wogREE+UTvbLhXTlDGdlhEDJc egbbDMsgx/xpUMGGhHQ5CihAhqWFRLn+s/F24x1zrHN9bX6EYGtyfCW0fLCFk0WkozCL hFNc8zsOM/T7zgxHVlIVxsSgnZ2hFmdm+KTgx/+2RWQ1gsXwWTo0wRPMByJtTjnbKnAd gHyw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:cc:to:subject :message-id:date:mime-version:references:in-reply-to:from :dkim-signature; bh=cRzOcp0OjwkTIHvUDiChZJdp1mFmpW3qpQhjzVMaHqk=; fh=bZ9OvL3VuOXrVYEjkvLlMr+nhDn3oJYwQwcSxy3qPzA=; b=uKuiSeKYBZ+fadQM1fPjElm7kVof5z4N2CzVs8BC24qB0m/k/S24Rhr4yIM5yPNWeV Im0xH80vmLIh1GrjPVZ3MQ/wp9pGLPZDwL9hpuTCeAz4DptY1jJiaQbuonjD2m2x1Jcl 9NW2YGYEN/pb6yvMbvFqcAxPF/zGvEU11mI0Gu2zb/UdQ3bXaourB8oGgPe00Kvzp6cb Q6728nqiXoA5sA8SVPD+7htXA9wGKX9kadby1U+GuCdkhl+W2+YR0XZjMLtl3mHaG1lw tfFFWzYWTU3hBIJMvG3hNB96tQU16ru3/HPZk4tUZCe5HVVqoqEA2r9nRx8RRaI3JBVl djvg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@canonical.com header.s=20210705 header.b=S6xNv1tx; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.38 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=canonical.com Return-Path: Received: from fry.vger.email (fry.vger.email. [23.128.96.38]) by mx.google.com with ESMTPS id h21-20020a17090acf1500b0025960d035c6si718508pju.138.2023.10.11.03.48.58 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 11 Oct 2023 03:48:59 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.38 as permitted sender) client-ip=23.128.96.38; Authentication-Results: mx.google.com; dkim=pass header.i=@canonical.com header.s=20210705 header.b=S6xNv1tx; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.38 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=canonical.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by fry.vger.email (Postfix) with ESMTP id 3D55280A9DEE; Wed, 11 Oct 2023 03:48:56 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at fry.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1346014AbjJKKsp (ORCPT + 99 others); Wed, 11 Oct 2023 06:48:45 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:48498 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229750AbjJKKso (ORCPT ); Wed, 11 Oct 2023 06:48:44 -0400 Received: from smtp-relay-internal-0.canonical.com (smtp-relay-internal-0.canonical.com [185.125.188.122]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id C553F98 for ; Wed, 11 Oct 2023 03:48:41 -0700 (PDT) Received: from mail-qk1-f198.google.com (mail-qk1-f198.google.com [209.85.222.198]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by smtp-relay-internal-0.canonical.com (Postfix) with ESMTPS id 058593FA5C for ; Wed, 11 Oct 2023 10:48:37 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=canonical.com; s=20210705; t=1697021317; bh=cRzOcp0OjwkTIHvUDiChZJdp1mFmpW3qpQhjzVMaHqk=; h=From:In-Reply-To:References:Mime-Version:Date:Message-ID:Subject: To:Cc:Content-Type; b=S6xNv1tx6cw7y1PhTY4h8/x11NdtNu0+wYEgIbh4b8bzix1Cbq7wF7liTZD1l4GTC on0pROW7GmdDbSquSOdzEEMxhh5sS7YcUKfcfcPjqCGbc8rC1SNJC3Gp6eyV9qWMA6 n0C17VsjdzpPneMz1UHQvRx++xdbfFqqgvQMTU+eWQfJx+8gGjMTPzOVKSrRD91WUo ioz6TlK5q5cmR3Up2OgkcLUpG6OgVIKgmO3N5YELA7tsdZ8hPcNQiY4Y/rLC8w+eNs xeEKI6L1qoDCOnjxjoxGcUkGha5ZFCgqmHVQmmfPd0Lj3Mm3vs+eKQ9Q7D8fmlQKhm brKYCUya62+mQ== Received: by mail-qk1-f198.google.com with SMTP id af79cd13be357-77405179afdso761939485a.1 for ; Wed, 11 Oct 2023 03:48:36 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1697021316; x=1697626116; h=content-transfer-encoding:cc:to:subject:message-id:date :mime-version:references:in-reply-to:from:x-gm-message-state:from:to :cc:subject:date:message-id:reply-to; bh=cRzOcp0OjwkTIHvUDiChZJdp1mFmpW3qpQhjzVMaHqk=; b=mpPppZpM10Bzz5WsEkKNnk0PndDNxuUTFaeIRgrPf3Z5P0vU4TyNmkxEmnXjPxlE/b s6F2SN8XyGmgdo6eg5Lnsl5I04hcSqkLgEimwY//KehxgDFgUr37ZoazWC+vCk7ToVGT QIuxajebaJGtJ4dpNBZVE2NnQHXJIqWRKHrE+TTCWgB2uzFYbLq+aDqkchzhu5kGbv5V ZoCIciiv3cIo7c1DChY3LzHFny2d9gSEa+Su39LokyQVynEPTDKBsFir1yAx3ff9zcVC tULixwKvE2sZ/X9PJimPUpiJnpvGdcmpTdFfK2nbGuA31Rxn7LC36i3P7JzrUoN/kxGG UXXA== X-Gm-Message-State: AOJu0YxtjhQku0lSAcv/oEpCZynQvAVjfx3xc5SYpAvFfHjh2RONEuz6 DchamHJd5DT7RU3GhF+n5Pr61DZPrcpF/Ngj7/A4gIhLaXT4Dh3q8NBiqraKYyKxqyTHgZSa96/ DYSKvHk1z2cy6K7ADPGGLV2qzUZDqQd8PskvR47C0ICvZuIz/8u7kg6YCSw== X-Received: by 2002:a05:620a:2add:b0:775:c0e4:aea4 with SMTP id bn29-20020a05620a2add00b00775c0e4aea4mr21219749qkb.66.1697021315975; Wed, 11 Oct 2023 03:48:35 -0700 (PDT) X-Received: by 2002:a05:620a:2add:b0:775:c0e4:aea4 with SMTP id bn29-20020a05620a2add00b00775c0e4aea4mr21219732qkb.66.1697021315660; Wed, 11 Oct 2023 03:48:35 -0700 (PDT) Received: from 348282803490 named unknown by gmailapi.google.com with HTTPREST; Wed, 11 Oct 2023 03:48:35 -0700 From: Emil Renner Berthing In-Reply-To: <22EFF2C197DC5C5A+f82966f5-90cf-09a5-214e-4b0e87bc6064@tinylab.org> References: <20230914020044.1397356-1-songshuaishuai@tinylab.org> <20230914020044.1397356-3-songshuaishuai@tinylab.org> <22EFF2C197DC5C5A+f82966f5-90cf-09a5-214e-4b0e87bc6064@tinylab.org> Mime-Version: 1.0 Date: Wed, 11 Oct 2023 03:48:35 -0700 Message-ID: Subject: Re: [PATCH 2/2] riscv: kexec_file: Support loading Image binary file To: Song Shuai , Emil Renner Berthing , paul.walmsley@sifive.com, palmer@dabbelt.com, aou@eecs.berkeley.edu, lihuafei1@huawei.com, conor.dooley@microchip.com, liaochang1@huawei.com, ajones@ventanamicro.com, alexghiti@rivosinc.com, evan@rivosinc.com, sunilvl@ventanamicro.com, xianting.tian@linux.alibaba.com, samitolvanen@google.com, masahiroy@kernel.org, apatel@ventanamicro.com, jszhang@kernel.org, duwe@suse.de, eric.devolder@oracle.com Cc: linux-riscv@lists.infradead.org, linux-kernel@vger.kernel.org Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Spam-Status: No, score=2.7 required=5.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,RCVD_IN_SBL_CSS,SPF_HELO_NONE,SPF_PASS, URIBL_BLOCKED autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on fry.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (fry.vger.email [0.0.0.0]); Wed, 11 Oct 2023 03:48:56 -0700 (PDT) X-Spam-Level: ** Song Shuai wrote: > > > =E5=9C=A8 2023/9/14 16:37, Emil Renner Berthing =E5=86=99=E9=81=93: > > Song Shuai wrote: > >> This patch creates image_kexec_ops to load Image binary file > >> for kexec_file_load() syscall. > >> > >> Signed-off-by: Song Shuai > >> --- > >> arch/riscv/include/asm/image.h | 2 + > >> arch/riscv/include/asm/kexec.h | 1 + > >> arch/riscv/kernel/Makefile | 2 +- > >> arch/riscv/kernel/kexec_image.c | 97 ++++++++++++++++++++++++= ++ > >> arch/riscv/kernel/machine_kexec_file.c | 1 + > >> 5 files changed, 102 insertions(+), 1 deletion(-) > >> create mode 100644 arch/riscv/kernel/kexec_image.c > >> > >> diff --git a/arch/riscv/include/asm/image.h b/arch/riscv/include/asm/i= mage.h > >> index e0b319af3681..8927a6ea1127 100644 > >> --- a/arch/riscv/include/asm/image.h > >> +++ b/arch/riscv/include/asm/image.h > >> @@ -30,6 +30,8 @@ > >> RISCV_HEADER_VERSION_MINOR) > >> > >> #ifndef __ASSEMBLY__ > >> +#define riscv_image_flag_field(flags, field)\ > >> + (((flags) >> field##_SHIFT) & field##_MASK) > > > > Hi Song, > > > > This macro is almost FIELD_GET from linux/bitfield.h .. > > > >> /** > >> * struct riscv_image_header - riscv kernel image header > >> * @code0: Executable code > >> diff --git a/arch/riscv/include/asm/kexec.h b/arch/riscv/include/asm/k= exec.h > >> index 518825fe4160..b9ee8346cc8c 100644 > >> --- a/arch/riscv/include/asm/kexec.h > >> +++ b/arch/riscv/include/asm/kexec.h > >> @@ -56,6 +56,7 @@ extern riscv_kexec_method riscv_kexec_norelocate; > >> > >> #ifdef CONFIG_KEXEC_FILE > >> extern const struct kexec_file_ops elf_kexec_ops; > >> +extern const struct kexec_file_ops image_kexec_ops; > >> > >> struct purgatory_info; > >> int arch_kexec_apply_relocations_add(struct purgatory_info *pi, > >> diff --git a/arch/riscv/kernel/Makefile b/arch/riscv/kernel/Makefile > >> index 1c62c639e875..9ecba3231a36 100644 > >> --- a/arch/riscv/kernel/Makefile > >> +++ b/arch/riscv/kernel/Makefile > >> @@ -86,7 +86,7 @@ endif > >> obj-$(CONFIG_HOTPLUG_CPU) +=3D cpu-hotplug.o > >> obj-$(CONFIG_KGDB) +=3D kgdb.o > >> obj-$(CONFIG_KEXEC_CORE) +=3D kexec_relocate.o crash_save_regs.o mac= hine_kexec.o > >> -obj-$(CONFIG_KEXEC_FILE) +=3D kexec_elf.o machine_kexec_file.o > >> +obj-$(CONFIG_KEXEC_FILE) +=3D kexec_elf.o kexec_image.o machine_kexec= _file.o > >> obj-$(CONFIG_CRASH_DUMP) +=3D crash_dump.o > >> obj-$(CONFIG_CRASH_CORE) +=3D crash_core.o > >> > >> diff --git a/arch/riscv/kernel/kexec_image.c b/arch/riscv/kernel/kexec= _image.c > >> new file mode 100644 > >> index 000000000000..b6aa7f59bd53 > >> --- /dev/null > >> +++ b/arch/riscv/kernel/kexec_image.c > >> @@ -0,0 +1,97 @@ > >> +// SPDX-License-Identifier: GPL-2.0 > >> +/* > >> + * RISC-V Kexec image loader > >> + * > >> + */ > >> + > >> +#define pr_fmt(fmt) "kexec_file(Image): " fmt > >> + > >> +#include > >> +#include > >> +#include > >> +#include > >> +#include > >> +#include > >> +#include > >> +#include > >> + > >> +static int image_probe(const char *kernel_buf, unsigned long kernel_l= en) > >> +{ > >> + const struct riscv_image_header *h =3D > >> + (const struct riscv_image_header *)(kernel_buf); > >> + > >> + if (!h || (kernel_len < sizeof(*h))) > >> + return -EINVAL; > >> + > >> + /* According to Documentation/riscv/boot-image-header.rst, > >> + * use "magic2" field to check when version >=3D 0.2. > >> + */ > >> + > >> + if (h->version >=3D RISCV_HEADER_VERSION && > >> + memcmp(&h->magic2, RISCV_IMAGE_MAGIC2, sizeof(h->magic2))) > >> + return -EINVAL; > >> + > >> + return 0; > >> +} > >> + > >> +static void *image_load(struct kimage *image, > >> + char *kernel, unsigned long kernel_len, > >> + char *initrd, unsigned long initrd_len, > >> + char *cmdline, unsigned long cmdline_len) > >> +{ > >> + struct riscv_image_header *h; > >> + u64 flags; > >> + bool be_image, be_kernel; > >> + struct kexec_buf kbuf; > >> + int ret; > >> + > >> + /* Check Image header */ > >> + h =3D (struct riscv_image_header *)kernel; > >> + if (!h->image_size) { > >> + ret =3D -EINVAL; > >> + goto out; > >> + } > >> + > >> + /* Check endianness */ > >> + flags =3D le64_to_cpu(h->flags); > >> + be_image =3D riscv_image_flag_field(flags, RISCV_IMAGE_FLAG_BE); > > > > ..but here you're just testing a single bit, so since be_image is a boo= l it > > could just be > > be_image =3D flags & RISCV_IMAGE_FLAG_BE_MASK; > > > > /Emil > Hi Emil, > > Sorry for the delayed response, > > The `flags` field currently only has bit-0 to indicate the kenrel > endianness, your comment looks good in this case. > > While considering the future extension of the `flags` feild, the > riscv_image_flag_field() is neccessiry to make callers to require the > bits they want. Right, but please don't invent your own FIELD_GET then. > > So I prefer to keep this snippet. > > > >> + be_kernel =3D IS_ENABLED(CONFIG_CPU_BIG_ENDIAN); > >> + if (be_image !=3D be_kernel) { > >> + ret =3D -EINVAL; > >> + goto out; > >> + } > >> + > >> + /* Load the kernel image */ > >> + kbuf.image =3D image; > >> + kbuf.buf_min =3D 0; > >> + kbuf.buf_max =3D ULONG_MAX; > >> + kbuf.top_down =3D false; > >> + > >> + kbuf.buffer =3D kernel; > >> + kbuf.bufsz =3D kernel_len; > >> + kbuf.mem =3D KEXEC_BUF_MEM_UNKNOWN; > >> + kbuf.memsz =3D le64_to_cpu(h->image_size); > >> + kbuf.buf_align =3D le64_to_cpu(h->text_offset); > >> + > >> + ret =3D kexec_add_buffer(&kbuf); > >> + if (ret) { > >> + pr_err("Error add kernel image ret=3D%d\n", ret); > >> + goto out; > >> + } > >> + > >> + image->start =3D kbuf.mem; > >> + > >> + pr_info("Loaded kernel at 0x%lx bufsz=3D0x%lx memsz=3D0x%lx\n", > >> + kbuf.mem, kbuf.bufsz, kbuf.memsz); > >> + > >> + ret =3D load_extra_segments(image, kbuf.mem, kbuf.memsz, > >> + initrd, initrd_len, cmdline, cmdline_len); > >> + > >> +out: > >> + return ret ? ERR_PTR(ret) : NULL; > >> +} > >> + > >> +const struct kexec_file_ops image_kexec_ops =3D { > >> + .probe =3D image_probe, > >> + .load =3D image_load, > >> +}; > >> diff --git a/arch/riscv/kernel/machine_kexec_file.c b/arch/riscv/kerne= l/machine_kexec_file.c > >> index aedb8c16a283..5dc700834f1e 100644 > >> --- a/arch/riscv/kernel/machine_kexec_file.c > >> +++ b/arch/riscv/kernel/machine_kexec_file.c > >> @@ -17,6 +17,7 @@ > >> > >> const struct kexec_file_ops * const kexec_file_loaders[] =3D { > >> &elf_kexec_ops, > >> + &image_kexec_ops, > >> NULL > >> }; > >> > >> -- > >> 2.20.1 > >> > >> > >> _______________________________________________ > >> linux-riscv mailing list > >> linux-riscv@lists.infradead.org > >> http://lists.infradead.org/mailman/listinfo/linux-riscv > > > > -- > Thanks > Song Shuai > > > _______________________________________________ > linux-riscv mailing list > linux-riscv@lists.infradead.org > http://lists.infradead.org/mailman/listinfo/linux-riscv