Re: [PATCH v2 04/15] x86, kaslr: get kaslr_enabled back correctly

2015-03-07 Thread Borislav Petkov
On Fri, Mar 06, 2015 at 11:50:54AM -0800, Yinghai Lu wrote: On Fri, Mar 6, 2015 at 5:33 AM, Borislav Petkov b...@suse.de wrote: However, the setup_data linked list and thus the element which contains kaslr_enabled is chained together using physical addresses. At the time when we access

Re: Re: [PATCH v2 3/3] efi: Capsule update with user helper interface

2015-03-06 Thread Borislav Petkov
On Fri, Mar 06, 2015 at 11:41:57AM +, Kweh, Hock Leong wrote: # cat /any/path/capsule.bin /sys/devices/platform/efi_capsule/capsule_load This is straight-forward and clean. or doing: # echo /any/path/capsule.bin /sys/devices/platform/efi_capsule/capsule_load This is strange and

Re: [PATCH v2 04/15] x86, kaslr: get kaslr_enabled back correctly

2015-03-06 Thread Borislav Petkov
: f47233c2d34f (x86/mm/ASLR: Propagate base load address calculation) Cc: Matt Fleming matt.flem...@intel.com Cc: Borislav Petkov b...@suse.de Cc: Kees Cook keesc...@chromium.org Cc: Jiri Kosina jkos...@suse.cz Acked-by: Jiri Kosina jkos...@suse.cz Signed-off-by: Yinghai Lu ying...@kernel.org

Re: [PATCH v2 01/15] x86, kaslr: Use init_size instead of run_size

2015-03-06 Thread Borislav Petkov
On Wed, Mar 04, 2015 at 12:00:34AM -0800, Yinghai Lu wrote: commit e6023367d779 (x86, kaslr: Prevent .bss from overlaping initrd) introduced one run_size for kaslr. We do not need to have home grown run_size. We should use real runtime size (include copy/decompress) aka init_size Why?

Re: [PATCH v2 02/15] x86, boot: move ZO to end of buffer

2015-03-06 Thread Borislav Petkov
On Wed, Mar 04, 2015 at 12:00:35AM -0800, Yinghai Lu wrote: bp found data from boot stage can not be used kernel stage. Actually those data area is overlapped with VO kernel bss stage, and clear_bss() VO kernel bss stage? I'm sure you can think of a better explanation. Right now I'm

Re: Re: [PATCH v2 3/3] efi: Capsule update with user helper interface

2015-03-06 Thread Borislav Petkov
On Thu, Mar 05, 2015 at 03:08:42PM -0800, Andy Lutomirski wrote: No. Only root should be able to load capsules, but even root may not be able to write to /lib. So basically what we want to do is: # cat /any/path/to/efi/capsule/accessible/to/root/efi_capsule.img /sys/firmware/efi/update Now

Re: [PATCH v2 04/15] x86, kaslr: get kaslr_enabled back correctly

2015-03-04 Thread Borislav Petkov
this code. Fixes: f47233c2d34f (x86/mm/ASLR: Propagate base load address calculation) Cc: Matt Fleming matt.flem...@intel.com Cc: Borislav Petkov b...@suse.de Cc: Kees Cook keesc...@chromium.org Cc: Jiri Kosina jkos...@suse.cz Acked-by: Jiri Kosina jkos...@suse.cz Signed-off-by: Yinghai Lu

Re: Re: [PATCH v2 3/3] efi: Capsule update with user helper interface

2015-03-03 Thread Borislav Petkov
On Tue, Mar 03, 2015 at 12:37:54PM -0800, Andy Lutomirski wrote: The user *should not* be required to have write access to anything in /lib to install a UEFI capsule that they download from their motherboard vendor's website. /lib belongs to the distro, and UEFI capsules do not belong to the

Re: [PATCH 1/8] x86, kaslr: get kaslr_enabled back correctly

2015-03-02 Thread Borislav Petkov
On Mon, Mar 02, 2015 at 10:58:23AM -0800, Yinghai Lu wrote: On Mon, Mar 2, 2015 at 6:53 AM, Borislav Petkov b...@suse.de wrote: Well, it seems to work here but it still doesn't look reliable enough to me. And this addon_zo thing of arbitrary 256K is strange. Thanks for check that out

Re: [PATCH 1/8] x86, kaslr: get kaslr_enabled back correctly

2015-03-02 Thread Borislav Petkov
On Mon, Mar 02, 2015 at 03:04:30AM -0800, Yinghai Lu wrote: We can not assume that range is safe to use. Please check attach one that should fix the problem really. Well, it seems to work here but it still doesn't look reliable enough to me. And this addon_zo thing of arbitrary 256K is

Re: [PATCH 1/8] x86, kaslr: get kaslr_enabled back correctly

2015-03-01 Thread Borislav Petkov
On Sat, Feb 28, 2015 at 06:40:39PM -0800, Yinghai Lu wrote: oh, no. the offending commit already got into linus tree. We're working on it, follow this thread: http://lkml.kernel.org/r/1424929021.10337.24.ca...@intel.com -- Regards/Gruss, Boris. ECO tip #101: Trim your mails when you

Re: [PATCH 1/8] x86, kaslr: get kaslr_enabled back correctly

2015-03-01 Thread Borislav Petkov
On Sun, Mar 01, 2015 at 04:23:51PM +0100, Ingo Molnar wrote: I think that's a different bug. parse_kaslr_setup() is simply bogus, it does: kaslr_enabled = (bool)(pa_data + sizeof(struct setup_data)); Well, we found that while debugging the other issue too:

Re: [PATCH 1/8] x86, kaslr: get kaslr_enabled back correctly

2015-03-01 Thread Borislav Petkov
On Sun, Mar 01, 2015 at 11:27:48AM -0800, Yinghai Lu wrote: other 7 should also address the problem in http://lkml.kernel.org/r/1424929021.10337.24.ca...@intel.com No, they don't: [0.00] parse_setup_data: data: 0x2206e50 (va: ff200e50) { next: 0x0, type: 0x0, len: 16,

Re: [PATCH 1/8] x86, kaslr: get kaslr_enabled back correctly

2015-03-01 Thread Borislav Petkov
On Sun, Mar 01, 2015 at 12:24:08PM -0800, Yinghai Lu wrote: static allocation in misc.c can not be used to kernel/head_64.S stage safely. Correct. One possibility that works is sticking it right below LOAD_PHYSICAL_ADDR: +static void add_kaslr_setup_data(struct boot_params *params, +

Re: Re: [PATCH v2 3/3] efi: Capsule update with user helper interface

2015-02-26 Thread Borislav Petkov
On Thu, Feb 26, 2015 at 07:30:54AM -0800, Andy Lutomirski wrote: How can the error code be propagated? Would that echo command fail in case of error? Yeah, either that or we can put the error code in the sysfs file which userspace can cat. -- Regards/Gruss, Boris. ECO tip #101: Trim

Re: Re: [PATCH v2 3/3] efi: Capsule update with user helper interface

2015-02-25 Thread Borislav Petkov
On Wed, Feb 25, 2015 at 12:38:20PM +, Kweh, Hock Leong wrote: The reason we use this interface for efi capsule is that efi capsule support multi binaries to be uploaded and each binary file name can be different. So you can write the file path to a second file and reload then, once per

Re: Re: [PATCH v2 3/3] efi: Capsule update with user helper interface

2015-02-25 Thread Borislav Petkov
On Tue, Feb 24, 2015 at 12:49:09PM +, Kweh, Hock Leong wrote: So the process steps basically look like this: 1.) cat capsule_ticket=== acquire a number and lock mutex then expose firmware_class user helper

Re: [PATCH v2] efi, x86: Add a debug option to the efi= cmdline

2015-02-06 Thread Borislav Petkov
On Fri, Feb 06, 2015 at 01:00:12AM -0500, Parmeshwr Prasad wrote: I am really sorry that I could not mentioned for what purpose this patch is . I wanted this patch to be included along with your patch. As your patch is To add “debug” cmdline in efi=”option”. There are some messages in

Re: [PATCH] efi, x86: Add a debug option to the efi= cmdline

2015-02-05 Thread Borislav Petkov
On Thu, Feb 05, 2015 at 11:18:46AM +0800, Dave Young wrote: diff --git a/include/linux/efi.h b/include/linux/efi.h index 0238d612750e..14cec75d7e74 100644 --- a/include/linux/efi.h +++ b/include/linux/efi.h @@ -940,6 +940,7 @@ extern int __init efi_setup_pcdp_console(char *); #define

Re: [PATCH v2] efi, x86: Add a debug option to the efi= cmdline

2015-02-05 Thread Borislav Petkov
On Thu, Feb 05, 2015 at 07:45:10AM -0500, Parmeshwr Prasad wrote: It is better if we add some printk from efifb messages. Please review the below patch. First of all, we saw you patch. Then, From 7fbac896ab87f1b37646ac2f49bb8216ec330642 Mon Sep 17 00:00:00 2001 From: Parmeshwr Prasad

Re: [PATCH] x86/efi: Avoid triple faults during EFI mixed mode calls

2015-02-03 Thread Borislav Petkov
and late environments more apparent. Reported-by: Andy Lutomirski l...@amacapital.net Cc: Borislav Petkov b...@alien8.de Signed-off-by: Matt Fleming matt.flem...@intel.com Boots fine on my Dell box. Tested-by: Borislav Petkov b...@suse.de -- Regards/Gruss, Boris. ECO tip #101: Trim your

[PATCH] efi, x86: Add a debug option to the efi= cmdline

2015-01-30 Thread Borislav Petkov
From: Borislav Petkov b...@suse.de Date: Mon, 26 Jan 2015 19:49:59 +0100 Subject: [PATCH] efi, x86: Add a debug option to the efi= cmdline ... and hide the memory regions dump behind it. Make it default-off. Signed-off-by: Borislav Petkov b...@suse.de Link: http://lkml.kernel.org/r

Re: [PATCH] efi, x86: Add a debug option to the efi= cmdline

2015-01-30 Thread Borislav Petkov
On Fri, Jan 30, 2015 at 10:06:13AM -0800, Randy Dunlap wrote: Please update Documentation/kernel-parameters.txt also. Good idea. Done. Thanks. :-) -- Regards/Gruss, Boris. ECO tip #101: Trim your mails when you reply. -- -- To unsubscribe from this list: send the line unsubscribe

Re: Shorten efi regions output

2015-01-21 Thread Borislav Petkov
On Wed, Jan 21, 2015 at 12:48:58AM -0500, Jon Masters wrote: We have on a number of occasions found just this output useful in debugging boot issues on ARM servers We can turn it on by default on ARM and off on x86... -- Regards/Gruss, Boris. ECO tip #101: Trim your mails when you reply.

Re: EFI mixed mode + perf = rampant triple faults

2015-01-14 Thread Borislav Petkov
On Wed, Jan 14, 2015 at 10:38:25AM -0800, Andy Lutomirski wrote: That's not a real MCE, though -- it happens synchronously instead of MCE can be synchronous in a sense too, as a result of executing an insn, for example, i.e., EIPV bit set. at MCE priority with all the associated messiness. Or

Re: EFI mixed mode + perf = rampant triple faults

2015-01-14 Thread Borislav Petkov
On Wed, Jan 14, 2015 at 10:27:47AM -0800, Andy Lutomirski wrote: How are you manually triggering an MCE? I've been playing with some MCE stuff recently, but the only reasonably reliable way I know of to trigger an MCE is using WHEA, and I don't have a box with WHEA, and I assume your ASUS

Re: [PATCH v4 3/8] efi: split off remapping code from efi_config_init()

2015-01-05 Thread Borislav Petkov
On Mon, Dec 22, 2014 at 10:58:59AM +, Ard Biesheuvel wrote: Split of the remapping code from efi_config_init() so that the caller can perform its own remapping. This is necessary to correctly handle virtually remapped UEFI memory regions under kexec, as efi.systab will have been updated to

Re: [PATCH v4 4/8] efi: efistub: allow allocation alignment larger than EFI_PAGE_SIZE

2014-12-29 Thread Borislav Petkov
On Mon, Dec 29, 2014 at 09:25:15AM +, Ard Biesheuvel wrote: Do you have any comments regarding patches #3 and #6 in this series? Sorry, have had no time so far to take a look. Holidays and all... You're on the TODO list though :-) -- Regards/Gruss, Boris. -- -- To unsubscribe from this

[PATCH] efi: mv efi_guid_unparse - efi_guid_to_str

2014-12-18 Thread Borislav Petkov
From: Borislav Petkov b...@suse.de Call it what it does - unparse is plain-misleading. Signed-off-by: Borislav Petkov b...@suse.de --- block/partitions/efi.c | 2 +- drivers/firmware/efi/efi.c | 4 ++-- drivers/firmware/efi/efivars.c | 6 +++--- fs/efivarfs/super.c| 2

Re: Shorten efi regions output

2014-12-09 Thread Borislav Petkov
On Tue, Dec 09, 2014 at 04:35:33PM +0100, Laszlo Ersek wrote: I disagree with the patch in general, and I strongly disagree with this specific change in particular. This part: - breaks the alignment for the right side of the table Well, we can start by removing the sizes - they're useless

Re: [RFC PATCH] Add esrt support.

2014-12-08 Thread Borislav Petkov
On Tue, Nov 25, 2014 at 02:28:04PM -0500, Peter Jones wrote: Add sysfs files for EFI System Resource Table under /sys/firmware/efi/esrt and for each EFI System Resource Entry under entries/ as a subdir. Ok, let me make sure I know what I'm looking at: This is a table which is supposed to

Re: Backup EFI maintainer for December

2014-11-28 Thread Borislav Petkov
On Fri, Nov 28, 2014 at 06:10:23PM +, Matt Fleming wrote: Folks, I'm taking annual leave for all of December, so I've asked Ricardo and Borislav (Cc'd) to pick up and review any patches that hit the mailing list and send pull requests to the tip tree. This is just a heads up so no one

Re: [PATCH v3 03/13] arm64: improve CONFIG_STRICT_DEVMEM handling

2014-11-25 Thread Borislav Petkov
On Tue, Nov 25, 2014 at 05:39:25PM +, Matt Fleming wrote: On Tue, 18 Nov, at 01:57:02PM, Ard Biesheuvel wrote: Improve the handling of /dev/mem mappings under CONFIG_STRICT_DEVMEM by: - allowing read-only access to parts of System RAM that are not considered memory by the kernel, this

Re: [PATCH] rtc: Disable EFI rtc for x86

2014-11-11 Thread Borislav Petkov
On Tue, Nov 11, 2014 at 11:38:31AM +, One Thousand Gnomes wrote: I don't believe there is anything which prevents the CSM from faking a CMOS clock using SMM from whatever is actually in the hardware. HPET in SMM? Oh, sure, definitely. -- Regards/Gruss, Boris. Sent from a fat crate

Re: [PATCH] rtc: Disable EFI rtc for x86

2014-11-09 Thread Borislav Petkov
On Sun, Nov 09, 2014 at 06:37:46PM +0100, Pali Rohár wrote: this patch totally disabled efi rfc driver on x86 machines at compile time. But on some x86 machines it working without crash and reading from file /sys/class/rtc/rtc*/since_epoch returns correct information. So why to disable

Re: [PATCH 2/2] efi: Capsule update support

2014-10-10 Thread Borislav Petkov
On Tue, Oct 07, 2014 at 03:42:31PM +0100, Matt Fleming wrote: From: Matt Fleming matt.flem...@intel.com The EFI capsule mechanism allows data blobs to be passed to the EFI firmware. This patch just introduces the main infrastruture for interacting with the firmware. Once a capsule has

Re: [PATCH 6/6] x86/efi: introduce EFI_BOOT_SERVICES_WARN

2014-09-13 Thread Borislav Petkov
On Sat, Sep 13, 2014 at 11:36:16AM -0700, Ricardo Neri wrote: Being more verbose about this kind of illegal access from the firmware increases the likelihood of this kind firmware bugs to be fixed. I sincerely hope you're right and, more importantly, how do we make sure those warnings get seen

Re: [PATCH] x86, efi: print debug values in Kib not MB

2014-07-29 Thread Borislav Petkov
On Tue, Jul 29, 2014 at 01:09:21PM -0400, Prarit Bhargava wrote: The current debug print in EFI does [0.00] efi: mem84: type=3, attr=0xf, range=[0x645b5000-0x645fb000) (0MB) and rounds off the size to 0MB and isn't very useful. We should print this in Kib. After

Re: [PATCH] x86, efi: print debug values in Kib not MB

2014-07-29 Thread Borislav Petkov
On Tue, Jul 29, 2014 at 03:42:55PM -0700, David Rientjes wrote: If Prarit is going to implement this suggested reverse memparse() ... The only meaningful argument about the formatting here IMO is what people staring at this output are going to understand from it. And since those people most

Re: [PATCH 13/13] kexec: Support kexec/kdump on EFI systems

2014-06-18 Thread Borislav Petkov
Addomg linux-efi to CC for the efi bits. Please CC it on your next submission. Thanks. On Tue, Jun 03, 2014 at 09:07:02AM -0400, Vivek Goyal wrote: This patch does two thigns. It passes EFI run time mappings to second kernel in bootparams efi_info. Second kernel parse this info and create new

efi_call on SGI

2014-06-10 Thread Borislav Petkov
Btw, while we're at it, I see uv_bios_call is sometimes done with preemption disabled around it and sometimes it is not (at least I don't see it)... In any case, if SGI uses the EFI pagetable now too, you probably would want to do the efi calls like the rest of x86 does them - see the 64-bit

Re: [PATCH] export efi.flags to sysfs

2014-05-30 Thread Borislav Petkov
On Fri, May 30, 2014 at 10:24:38AM +0800, Dave Young wrote: How does /sys/firmware/efi/runtime-map/* look like with old mapping? Can't we look at it and figure out if it is 1:1 or not. There's phys_addr and virt_addr, (virt_addr - phys_addr) will always be -64G for 1:1 map,

Re: [PATCH]x86 efi: do not export efi runtime map in case old map

2014-05-30 Thread Borislav Petkov
boot failure. To address this issue do not export runtime maps in case efi old_map so userspace can use no efi boot instead. Signed-off-by: Dave Young dyo...@redhat.com Acked-by: Borislav Petkov b...@suse.de -- Regards/Gruss, Boris. Sent from a fat crate under my desk. Formatting

Re: [PATCH] export efi.flags to sysfs

2014-05-29 Thread Borislav Petkov
On Thu, May 29, 2014 at 08:45:20AM -0400, Vivek Goyal wrote: I am curious that what's the meaning of 1:1 mapping here? So far I thought that means virt and physical addresses are same but that does not seem to be the case. So what does it mean? 1:1 mapping in the EFI's case (and maybe in any

Re: [GIT PULL] EFI changes for v3.16

2014-05-19 Thread Borislav Petkov
On Mon, May 19, 2014 at 03:47:31PM -0700, H. Peter Anvin wrote: efi_call can happen in an irq context (pstore) and there we really need to make sure we're not scribbling over FPU state while we've interrupted a thread or kernel mode with a live FPU state. Therefore, use the

Re: kernel 3.14.2 oops: seems related to EFI

2014-05-18 Thread Borislav Petkov
On Sat, May 17, 2014 at 05:25:47PM +0200, Francis Moreau wrote: [ +0.018677] general protection fault: [#1] PREEMPT SMP [ +0.68] Modules linked in: usb_storage tun raid1 md_mod loop fuse joydev coretemp hwmon arc4 intel_rapl x86_pkg_temp_thermal intel_powerclamp kvm_intel

Re: [RFC][PATCH 04/11] x86/efi: Delete dead code when checking for non-native

2014-02-07 Thread Borislav Petkov
. where a 64-bit kernel is booted with 32-bit EFI firmware. Delete the dead code. Signed-off-by: Matt Fleming matt.flem...@intel.com Acked-by: Borislav Petkov b...@suse.de -- Regards/Gruss, Boris. Sent from a fat crate under my desk. Formatting is fine. -- -- To unsubscribe from

Re: [BUG] Linux 3.14 fails to boot with new EFI changes

2014-02-05 Thread Borislav Petkov
On Wed, Feb 05, 2014 at 03:45:36PM -0600, Alex Thorlton wrote: While working on an answer to this question, I ran across another issue on some newer hardware, that looks like it's definitely related to this problem, and might be the root cause. When booting on a UV2 we die in

Re: [BUG] Linux 3.14 fails to boot with new EFI changes

2014-01-31 Thread Borislav Petkov
On Fri, Jan 31, 2014 at 08:02:21AM -0600, Russ Anderson wrote: I'm not sure what you are asking for. We had a reliable way to boot before the recent patch broke it. (commit d2f7cbe7b26a74dbbbf8f325b2a6fd01bc34032c) So we should stop any further development just because your machines did boot

Re: [BUG] Linux 3.14 fails to boot with new EFI changes

2014-01-31 Thread Borislav Petkov
On Fri, Jan 31, 2014 at 03:23:18PM +0100, Borislav Petkov wrote: So we should stop any further development just because your machines did boot nicely before that. What about the other machines and kexec we're fixing with the work above? Jeez... Alternatively, we can force the old memmap method

Re: [RFC][PATCH 01/11] x86/boot: Cleanup header.S by removing some #ifdefs

2014-01-30 Thread Borislav Petkov
On Wed, Jan 29, 2014 at 04:23:47PM +, Matt Fleming wrote: From: Matt Fleming matt.flem...@intel.com handover_offset is now filled out by build.c. Don't set a default value as it will be overwritten anyway. Signed-off-by: Matt Fleming matt.flem...@intel.com Acked-by: Borislav Petkov b

Re: [PATCH 2/5] efi: Dump the EFI page table

2014-01-20 Thread Borislav Petkov
On Mon, Jan 20, 2014 at 01:38:02PM +, Matt Fleming wrote: +config EFI_PGT_DUMP + bool Dump the EFI pagetable + depends on EFI X86_PTDUMP + ---help--- + Enable this if you want to dump the EFI page table before + enabling virtual mode. This can be used to debug

[PATCH 2/5] efi: Dump the EFI page table

2014-01-18 Thread Borislav Petkov
From: Borislav Petkov b...@suse.de This is very useful for debugging issues with the recently added pagetable switching code for EFI virtual mode. Signed-off-by: Borislav Petkov b...@suse.de Tested-by: Toshi Kani toshi.k...@hp.com --- arch/x86/Kconfig | 9 + arch/x86

[PATCH 4/5] efi: Make efi virtual runtime map passing more robust

2014-01-18 Thread Borislav Petkov
From: Borislav Petkov b...@suse.de Currently, running SetVirtualAddressMap() and passing the physical address of the virtual map array was working only by a lucky coincidence because the memory was present in the EFI page table too. Until Toshi went and booted this on a big HP box - the krealloc

Re: [PATCH 1/4] x86, ptdump: Add the functionality to dump an arbitrary pagetable

2014-01-13 Thread Borislav Petkov
On Mon, Jan 13, 2014 at 01:32:40PM +0800, Dave Young wrote: pr_info? This is for debug purpose, maybe pr_debug is better? I hate pr_debug as it depends on other defines I have to have defined properly in order just so I get output. How about do not limit to only if (pgd) case, instead do

Re: [PATCH 4/4] efi: Make efi virtual runtime map passing more robust

2014-01-13 Thread Borislav Petkov
On Mon, Jan 13, 2014 at 01:40:39PM +0800, Dave Young wrote: Adding a safeguard check for desc_size is better though currently it's impossible for the desc_size PAGE_SIZE? Huh, what? sizeof(efi_memory_desc_t) is only 40 bytes AFAICT. -- Regards/Gruss, Boris. Sent from a fat crate under

Re: [PATCH 1/4] x86, ptdump: Add the functionality to dump an arbitrary pagetable

2014-01-13 Thread Borislav Petkov
On Mon, Jan 13, 2014 at 06:48:10AM -0800, Arjan van de Ven wrote: MODULE_LICENSE(GPL); MODULE_AUTHOR(Arjan van de Ven ar...@linux.intel.com); MODULE_DESCRIPTION(Kernel debugging helper that dumps pagetables); personally I consider it good form to always have this kind of information in .c

Re: [RFT][PATCH] ACPI / init: Run acpi_early_init() before efi_enter_virtual_mode() (was: Re: [RFC PATCH 00/14] Support timezone of ACPI TAD and EFI TIME)

2014-01-12 Thread Borislav Petkov
@@ asmlinkage void __init start_kernel(void check_bugs(); - acpi_early_init(); /* before LAPIC and SMP init */ sfi_init_late(); if (efi_enabled(EFI_RUNTIME_SERVICES)) { Looks good both on kvm+OVMF and on my Dell EFI box. Tested-by: Borislav Petkov b...@suse.de Toshi has

[PATCH 0/4] EFI memmap fix v2

2014-01-11 Thread Borislav Petkov
From: Borislav Petkov b...@suse.de Ok, here's v2 rebased and rediffed against tip (which has the relevant efi branches). Toshi, I'm pushing it to: git://git.kernel.org/pub/scm/linux/kernel/git/bp/bp.git#efi-fixes so that you can give it another run and so that the build robot can poke

[PATCH 4/4] efi: Make efi virtual runtime map passing more robust

2014-01-11 Thread Borislav Petkov
From: Borislav Petkov b...@suse.de Currently, running SetVirtualAddressMap() and passing the physical address of the virtual map array was working only by a lucky coincidence because the memory was present in the EFI page table too. Until Toshi went and booted this on a big HP box - the krealloc

[PATCH 1/4] x86, ptdump: Add the functionality to dump an arbitrary pagetable

2014-01-11 Thread Borislav Petkov
From: Borislav Petkov b...@suse.de With reusing the -trampoline_pgd page table for mapping EFI regions in order to use them after having switched to EFI virtual mode, it is very useful to be able to dump aforementioned page table in dmesg. This adds that functionality through the walk_pgd_level

[PATCH 2/4] efi: Dump the EFI page table

2014-01-11 Thread Borislav Petkov
From: Borislav Petkov b...@suse.de This is very useful for debugging issues with the recently added pagetable switching code for EFI virtual mode. Signed-off-by: Borislav Petkov b...@suse.de --- arch/x86/platform/efi/efi.c | 11 +++ 1 file changed, 11 insertions(+) diff --git a/arch

Re: [RFC PATCH 06/14] rtc-efi: register rtc-efi device when EFI enabled

2013-12-20 Thread Borislav Petkov
On Thu, Dec 19, 2013 at 08:30:48PM -0800, H. Peter Anvin wrote: On 12/19/2013 08:24 PM, joeyli wrote: I agreed, but userspace application should not be too often to access RTC. Maybe only when system boot and set timezone. This is, quite frankly, an idiotic argument. TBH, I've been

Re: [PATCH 3/3] efi: Make efi virtual runtime map passing more robust

2013-12-18 Thread Borislav Petkov
On Wed, Dec 18, 2013 at 05:07:57PM +0800, Dave Young wrote: How about firstly count the md numbers in the 1st loop, then get/roundup the total size, alloc the pages, map the mds one by one in another loop. No need as most systems would never need to reallocate. Even on Toshi's big system, the

Re: [PATCH 3/3] efi: Make efi virtual runtime map passing more robust

2013-12-17 Thread Borislav Petkov
On Tue, Dec 17, 2013 at 12:10:24PM +, Matt Fleming wrote: You sunk my i386 battleship, /home/build/git/efi/arch/x86/platform/efi/efi.c:824:24: error: ‘struct real_mode_header’ has no member named ‘trampoline_pgd’ make[4]: *** [arch/x86/platform/efi/efi.o] Error 1 make[3]: ***

Re: [PATCH v5 10/14] efi: only print saved efi runtime maps instead of all memmap ranges for kexec

2013-12-17 Thread Borislav Petkov
On Tue, Dec 17, 2013 at 02:34:36PM +0800, Dave Young wrote: They are moved to efi.c efi_setup_init(), I'm not sure if I expained clear enough, in current code parse_efi_setup only accept one argument phys_addr so I will mapping it with sizeof(struct setup_data) to get the payload size then get

Re: [PATCH v5 10/14] efi: only print saved efi runtime maps instead of all memmap ranges for kexec

2013-12-16 Thread Borislav Petkov
On Mon, Dec 16, 2013 at 10:00:10AM +0800, Dave Young wrote: - print_efi_memmap(); + if (efi_setup) { + int s; + struct efi_setup_data *data; + + s = sizeof(*data) + nr_efi_runtime_map * sizeof(data-map[0]); + data = early_memremap(efi_setup, s);

[PATCH 0/3] EFI memmap fix

2013-12-16 Thread Borislav Petkov
From: Borislav Petkov b...@suse.de Hi guys, this is the result of Toshi and me debugging a #GP on one of his big HP boxes sporting UEFI. Each commit message should be self-explanatory so please look there. This has more or less an RFC nature thus I'm sending it now to collect feedback

[PATCH 2/3] efi: Dump the EFI page table

2013-12-16 Thread Borislav Petkov
From: Borislav Petkov b...@suse.de This is very useful for debugging issues with the recently added pagetable switching code for EFI virtual mode. Signed-off-by: Borislav Petkov b...@suse.de --- arch/x86/platform/efi/efi.c | 11 +++ 1 file changed, 11 insertions(+) diff --git a/arch

[PATCH 3/3] efi: Make efi virtual runtime map passing more robust

2013-12-16 Thread Borislav Petkov
From: Borislav Petkov b...@suse.de Currently, running SetVirtualAddressMap() and passing the physical address of the virtual map array was working only by a lucky coincidence because the memory was present in the EFI page table too. Until Toshi went and booted this on a big HP box - the krealloc

[PATCH 1/3] x86, ptdump: Add the functionality to dump an arbitrary pagetable

2013-12-16 Thread Borislav Petkov
From: Borislav Petkov b...@suse.de With reusing the -trampoline_pgd page table for mapping EFI regions in order to use them after having switched to EFI virtual mode, it is very useful to be able to dump aforementioned page table in dmesg. This adds that functionality through the walk_pgd_level

Re: [PATCH v5 10/14] efi: only print saved efi runtime maps instead of all memmap ranges for kexec

2013-12-13 Thread Borislav Petkov
On Mon, Dec 09, 2013 at 05:42:23PM +0800, Dave Young wrote: For kexec/kdump kernel efi runtime mappings are saved, printing original whole memmap ranges does not make sense anymore. So introduce a new function to only print runtime maps in case kexec/kdump kernel is used. changelog: Matt:

Re: [PATCH v5 12/14] x86: export x86 boot_params to sysfs

2013-12-13 Thread Borislav Petkov
/* boot protocal version (in hex, 0x prefixed)*/ Changelog: Greg: use __ATTR_RO() and group attr. Matt and Boris: Documentation improvement, code indentation. Signed-off-by: Dave Young dyo...@redhat.com Acked-by: Borislav Petkov b...@suse.de -- Regards/Gruss, Boris. Sent from

Re: [PATCH v5 13/14] x86: reserve setup_data ranges late after parsing memmap cmdline

2013-12-13 Thread Borislav Petkov
as reserved ranges and later ioremap will be fine with it. changes: Boris: improve patch description Signed-off-by: Dave Young dyo...@redhat.com Acked-by: Borislav Petkov b...@suse.de -- Regards/Gruss, Boris. Sent from a fat crate under my desk. Formatting is fine. -- -- To unsubscribe

Re: [PATCH v5 08/14] efi: export efi runtime memory mapping to sysfs

2013-12-12 Thread Borislav Petkov
On Thu, Dec 12, 2013 at 03:13:37PM +0800, Dave Young wrote: BTW, I will restructure the whole code when I move them to efi_kexec.c, so no worry about it? If you have strong opinion I can move them though. Well, if it were me, I'd do it now so that it'll see more testing. Later, it will be only

Re: [PATCH v5 08/14] efi: export efi runtime memory mapping to sysfs

2013-12-12 Thread Borislav Petkov
On Thu, Dec 12, 2013 at 10:36:17AM +0800, Dave Young wrote: Sorry that I forgot to explain this in changelog, should ask you before. I did try moving it to efisubsys_init but it need add extern declaration So what? Add it. for efi_runtime_map_init. Since link order will ensure it being

Re: [PATCH v5 09/14] efi: passing kexec necessary efi data via setup_data

2013-12-12 Thread Borislav Petkov
On Thu, Dec 12, 2013 at 03:17:43PM +0800, Dave Young wrote: Rethink about this issue, moving them to efi_$(BITS).c I need move the efi_setup from a static variable to an extern, It looks not worth. Dave, would you please do what is suggested to you? A big part of the efi code is split into

Re: [PATCH v5 00/14] kexec kernel efi runtime support

2013-12-10 Thread Borislav Petkov
On Tue, Dec 10, 2013 at 03:25:49PM -0800, Andrew Morton wrote: On Mon, 9 Dec 2013 17:42:13 +0800 Dave Young dyo...@redhat.com wrote: Here is the V5 patchset for supporting kexec kernel efi runtime. It's unclear (to me) who's supposed to merge this lot. It's a kexec patch which actually

Re: [PATCH v5 01/14] x86/mm: sparse warning fix for early_memremap

2013-12-09 Thread Borislav Petkov
On Mon, Dec 09, 2013 at 05:42:14PM +0800, Dave Young wrote: There's a lot of sparse warnings for code like below: void *a = early_memremap(phys_addr, size); early_memremap intend to map kernel memory with ioremap facility, the return pointer should be a kernel ram pointer instead of iomem

Re: [PATCH v4 07/12] efi: passing kexec necessary efi data via setup_data

2013-12-05 Thread Borislav Petkov
On Thu, Dec 05, 2013 at 08:56:02AM -0700, Toshi Kani wrote: The smbios in efi_setup_data is necessary for kexec to pass the physical address of the SMBIOS table from the 1st kernel to the 2nd kernel. The kernel boot sequence proceeds in the following order. Step 2 requires efi.smbios to be

Re: [PATCH v4 06/12] efi: export efi runtime memory mapping to sysfs

2013-12-02 Thread Borislav Petkov
On Mon, Dec 02, 2013 at 10:59:42AM +0800, Dave Young wrote: They are only called if there's setup_data SETUP_EFI passed in. Yes, I think only kexec need that part of code. But I hesitated to mess the code with a lot of #if. Will think about it. Well, the accepted strategy with the efi code is

Re: [PATCH v4 06/12] efi: export efi runtime memory mapping to sysfs

2013-11-29 Thread Borislav Petkov
On Fri, Nov 29, 2013 at 05:40:35PM +0800, Dave Young wrote: Matt are suggesting to below one, is it ok to you? I'm fine with both. The efi runtime services can only be switched to virtual mode once without rebooting. The kexec kernel must maintain the same physical to virtual address mappings

Re: [PATCH v4 07/12] efi: passing kexec necessary efi data via setup_data

2013-11-29 Thread Borislav Petkov
On Fri, Nov 29, 2013 at 05:14:16PM +0800, Dave Young wrote: That's reserved for future extension use, who knows if we will need to pass other fields in the future. Hrrmmm, 8*64 = 64 Bytes?? And you can't change it later because of the situation where machines might be using older kexec-tools?

Re: [PATCH v4 08/12] efi: only print saved efi runtime maps instead of all memmap ranges for kexec

2013-11-29 Thread Borislav Petkov
On Fri, Nov 29, 2013 at 04:50:50PM +0800, Dave Young wrote: It's for debugging purpose, I think it's helpful. Why? The first kernel did dump it already. -- Regards/Gruss, Boris. Sent from a fat crate under my desk. Formatting is fine. -- -- To unsubscribe from this list: send the line

Re: [PATCH v4 06/12] efi: export efi runtime memory mapping to sysfs

2013-11-27 Thread Borislav Petkov
On Tue, Nov 26, 2013 at 01:57:51PM +0800, Dave Young wrote: kexec kernel will need exactly same mapping for efi runtime memory ranges. Thus here export the runtime ranges mapping to sysfs, kexec-tools will assemble them and pass to 2nd kernel via setup_data. Introducing a new directly

Re: [patch 0/4 v3] kexec-tools: efi runtime support

2013-11-27 Thread Borislav Petkov
On Wed, Nov 27, 2013 at 05:29:46PM +0800, Dave Young wrote: I would like to send a new version which addressing several issues for code structure improvement and changelog etc. If there's no further comments I will send them tommorrow. As a rule of thumb you should wait ~week and give chance

Re: [PATCH v4 09/12] x86: add xloadflags bit for efi runtime support on kexec

2013-11-27 Thread Borislav Petkov
the flag and switch to old logic. changelog: Matt: + defined(CONFIG_KEXEC) HPA: document the flag. Signed-off-by: Dave Young dyo...@redhat.com Other than that: Acked-by: Borislav Petkov b...@suse.de -- Regards/Gruss, Boris. Sent from a fat crate under my desk. Formatting is fine

Re: [PATCH v4 10/12] x86: export x86 boot_params to sysfs

2013-11-27 Thread Borislav Petkov
On Tue, Nov 26, 2013 at 01:57:55PM +0800, Dave Young wrote: kexec-tools use boot_params for getting the 1st kernel hardware_subarch, the kexec kernel efi runtime support also need read the old efi_info from boot_params. Currently it exists in debugfs which is not a good place for such

Re: [PATCH v4 05/12] efi: export more efi table variable to sysfs

2013-11-26 Thread Borislav Petkov
On Tue, Nov 26, 2013 at 01:57:50PM +0800, Dave Young wrote: diff --git a/drivers/firmware/efi/efi.c b/drivers/firmware/efi/efi.c index 2e2fbde..5d85956 100644 --- a/drivers/firmware/efi/efi.c +++ b/drivers/firmware/efi/efi.c @@ -32,6 +32,9 @@ struct efi __read_mostly efi = { .hcdp

Re: [patch 01/12 v4] efi: remove unused variables in __map_region

2013-11-25 Thread Borislav Petkov
On Mon, Nov 25, 2013 at 05:19:57PM +0800, Dave Young wrote: Sigh, looks like I should move to git-send-email for less error prone. You won't regret it :-) -- Regards/Gruss, Boris. Sent from a fat crate under my desk. Formatting is fine. -- -- To unsubscribe from this list: send the line

Re: [patch 5/9 v3] efi: export more efi table variable to sysfs

2013-11-23 Thread Borislav Petkov
On Fri, Nov 22, 2013 at 10:48:50AM +0800, Dave Young wrote: efi.config_table = (unsigned long)efi.systab-tables; efi.fw_vendor= (unsigned long)efi.systab-fw_vendor; efi.runtime = (unsigned long)efi.systab-runtime; Hmm, UEFI spec mentions the them like below so I use

Re: [patch 5/9 v3] efi: export more efi table variable to sysfs

2013-11-21 Thread Borislav Petkov
On Thu, Nov 21, 2013 at 02:17:09PM +0800, dyo...@redhat.com wrote: --- efi.orig/arch/x86/platform/efi/efi.c +++ efi/arch/x86/platform/efi/efi.c @@ -653,6 +653,10 @@ void __init efi_init(void) set_bit(EFI_SYSTEM_TABLES, x86_efi_facility); + efi.fw_vendor = (unsigned

Re: [RFC v2 2/2] x86, efi: Early use of boot service memory

2013-11-21 Thread Borislav Petkov
On Thu, Nov 21, 2013 at 02:01:26PM -0700, Jerry Hoemann wrote: Some platform have firmware that violate the UEFI spec and access boot service code or data segments after the system has called ExitBootServices(). The call to efi_reserve_boot_services is a workaround to avoid using boot service

Re: [patch 1/9 v3] efi: remove unused variables in __map_region

2013-11-21 Thread Borislav Petkov
On Thu, Nov 21, 2013 at 02:17:05PM +0800, dyo...@redhat.com wrote: variables size and end is useless in this function, thus remove them. Reported-by: Toshi Kani toshi.k...@hp.com Signed-off-by: Dave Young dyo...@redhat.com Good catch. Acked-by: Borislav Petkov b...@suse.de -- Regards

Re: [patch 4/9 v3] efi: cleanup efi_enter_virtual_mode function

2013-11-21 Thread Borislav Petkov
Matt: check return value of krealloc. Signed-off-by: Dave Young dyo...@redhat.com Same short comment nitpick as earlier :) Otherwise: Acked-by: Borislav Petkov b...@suse.de --- arch/x86/platform/efi/efi.c | 109 ++-- 1 file changed, 66 insertions

Re: [patch 2/9 v3] efi: add a wrapper function efi_map_region_fixed

2013-11-21 Thread Borislav Petkov
: coding style reuse __map_region Signed-off-by: Dave Young dyo...@redhat.com Except minor nitpick below: Acked-by: Borislav Petkov b...@suse.de --- arch/x86/include/asm/efi.h |1 + arch/x86/platform/efi/efi_32.c |2 ++ arch/x86/platform/efi/efi_64.c | 10 ++ 3

Re: [patch 0/7 v2] kexec kernel efi runtime support

2013-11-05 Thread Borislav Petkov
On Tue, Nov 05, 2013 at 04:20:07PM +0800, dyo...@redhat.com wrote: Please help to review the patches. Sure, but will have to wait 'til next week when I get back. Thanks. -- Regards/Gruss, Boris. -- To unsubscribe from this list: send the line unsubscribe linux-efi in the body of a message to

Re: [patch 3/6] Cleanup efi_enter_virtual_mode function

2013-11-01 Thread Borislav Petkov
On Fri, Nov 01, 2013 at 09:18:25AM +0800, Dave Young wrote: Great, thank you. BTW, I have managed to test original patch set on a Macboot Air of my friend with usb boot, it works ok. Ok, that's actually a very good news - the apples tend to be special wrt uefi implementation. --

[PATCH 03/11] x86, pageattr: Add a PGD pagetable populating function

2013-10-31 Thread Borislav Petkov
From: Borislav Petkov b...@suse.de This allocates, if necessary, and populates the corresponding PGD entry with a PUD page. The next population level is a dummy macro which will be removed by the next patch and it is added here to keep the patch small and easily reviewable but not break bisection

[PATCH 05/11] x86, pageattr: Add a PMD pagetable populating function

2013-10-31 Thread Borislav Petkov
From: Borislav Petkov b...@suse.de Handle PMD-level mappings the same as PUD ones. Signed-off-by: Borislav Petkov b...@suse.de --- arch/x86/mm/pageattr.c | 82 +- 1 file changed, 81 insertions(+), 1 deletion(-) diff --git a/arch/x86/mm/pageattr.c

<    1   2   3   4   5   >