linux-doc.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
From: "Jarkko Sakkinen" <jarkko@kernel.org>
To: "Ross Philipson" <ross.philipson@oracle.com>,
	<linux-kernel@vger.kernel.org>, <x86@kernel.org>,
	<linux-integrity@vger.kernel.org>, <linux-doc@vger.kernel.org>,
	<linux-crypto@vger.kernel.org>, <kexec@lists.infradead.org>,
	<linux-efi@vger.kernel.org>, <iommu@lists.linux-foundation.org>
Cc: <dpsmith@apertussolutions.com>, <tglx@linutronix.de>,
	<mingo@redhat.com>, <bp@alien8.de>, <hpa@zytor.com>,
	<dave.hansen@linux.intel.com>, <ardb@kernel.org>,
	<mjg59@srcf.ucam.org>, <James.Bottomley@hansenpartnership.com>,
	<peterhuewe@gmx.de>, <jgg@ziepe.ca>, <luto@amacapital.net>,
	<nivedita@alum.mit.edu>, <herbert@gondor.apana.org.au>,
	<davem@davemloft.net>, <corbet@lwn.net>, <ebiederm@xmission.com>,
	<dwmw2@infradead.org>, <baolu.lu@linux.intel.com>,
	<kanth.ghatraju@oracle.com>, <andrew.cooper3@citrix.com>,
	<trenchboot-devel@googlegroups.com>
Subject: Re: [PATCH v9 01/19] x86/boot: Place kernel_info at a fixed offset
Date: Tue, 04 Jun 2024 21:18:44 +0300	[thread overview]
Message-ID: <D1RFUDSAJJKJ.2MF9OSQAJGBRW@kernel.org> (raw)
In-Reply-To: <20240531010331.134441-2-ross.philipson@oracle.com>

On Fri May 31, 2024 at 4:03 AM EEST, Ross Philipson wrote:
> From: Arvind Sankar <nivedita@alum.mit.edu>
>
> There are use cases for storing the offset of a symbol in kernel_info.
> For example, the trenchboot series [0] needs to store the offset of the
> Measured Launch Environment header in kernel_info.

So either there are other use cases that you should enumerate, or just
be straight and state that this is done for Trenchboot.

I believe latter is the case, and there is no reason to project further.
If it does not interfere kernel otherwise, it should be fine just by
that.

Also I believe that it is written as Trenchboot, without "series" ;-)
Think when writing commit message that it will some day be part of the
commit log, not a series flying in the air.

Sorry for the nitpicks but better to be punctual and that way also
transparent as possible, right?

>
> Since commit (note: commit ID from tip/master)
>
> commit 527afc212231 ("x86/boot: Check that there are no run-time relocations")
>
> run-time relocations are not allowed in the compressed kernel, so simply
> using the symbol in kernel_info, as
>
> 	.long	symbol
>
> will cause a linker error because this is not position-independent.
>
> With kernel_info being a separate object file and in a different section
> from startup_32, there is no way to calculate the offset of a symbol
> from the start of the image in a position-independent way.
>
> To enable such use cases, put kernel_info into its own section which is

"To allow Trenchboot to access the fields of kernel_info..."

Much more understandable.

> placed at a predetermined offset (KERNEL_INFO_OFFSET) via the linker
> script. This will allow calculating the symbol offset in a
> position-independent way, by adding the offset from the start of
> kernel_info to KERNEL_INFO_OFFSET.
>
> Ensure that kernel_info is aligned, and use the SYM_DATA.* macros
> instead of bare labels. This stores the size of the kernel_info
> structure in the ELF symbol table.

Aligned to which boundary and short explanation why to that boundary,
i.e. state the obvious if you bring it up anyway here.

Just seems to be progressing pretty well so taking my eye glass and
looking into nitty gritty details...

BR, Jarkko

  reply	other threads:[~2024-06-04 18:18 UTC|newest]

Thread overview: 113+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2024-05-31  1:03 [PATCH v9 00/19] x86: Trenchboot secure dynamic launch Linux kernel support Ross Philipson
2024-05-31  1:03 ` [PATCH v9 01/19] x86/boot: Place kernel_info at a fixed offset Ross Philipson
2024-06-04 18:18   ` Jarkko Sakkinen [this message]
2024-06-04 20:28     ` ross.philipson
2024-05-31  1:03 ` [PATCH v9 02/19] Documentation/x86: Secure Launch kernel documentation Ross Philipson
2024-05-31  1:03 ` [PATCH v9 03/19] x86: Secure Launch Kconfig Ross Philipson
2024-05-31  1:03 ` [PATCH v9 04/19] x86: Secure Launch Resource Table header file Ross Philipson
2024-06-04 18:21   ` Jarkko Sakkinen
2024-06-04 20:31     ` ross.philipson
2024-06-04 22:36       ` Jarkko Sakkinen
2024-06-04 23:00         ` ross.philipson
2024-06-05  0:22           ` Jarkko Sakkinen
2024-06-05  0:27             ` Jarkko Sakkinen
2024-06-05  2:33             ` ross.philipson
2024-06-05  4:04               ` Jarkko Sakkinen
2024-06-05 19:03                 ` ross.philipson
2024-06-06  6:02                   ` Jarkko Sakkinen
2024-06-06 16:49                     ` ross.philipson
2024-06-20  0:18                       ` Jarkko Sakkinen
2024-06-20 16:55                         ` ross.philipson
2024-05-31  1:03 ` [PATCH v9 05/19] x86: Secure Launch main " Ross Philipson
2024-06-04 18:24   ` Jarkko Sakkinen
2024-06-04 20:52     ` ross.philipson
2024-05-31  1:03 ` [PATCH v9 06/19] x86: Add early SHA-1 support for Secure Launch early measurements Ross Philipson
2024-05-31  2:16   ` Eric Biggers
2024-05-31 13:54     ` Eric W. Biederman
2024-08-15 17:38       ` Daniel P. Smith
2024-08-15 19:10         ` Thomas Gleixner
2024-08-16 10:42           ` Jarkko Sakkinen
2024-08-16 11:01           ` Andrew Cooper
2024-08-16 11:22             ` Jarkko Sakkinen
2024-08-16 18:41               ` Matthew Garrett
2024-08-19 18:05                 ` Jarkko Sakkinen
2024-08-19 18:24                   ` Matthew Garrett
2024-08-20 15:26                     ` Jarkko Sakkinen
2024-08-22 18:29           ` Daniel P. Smith
2024-08-29  3:17           ` Andy Lutomirski
2024-08-29  3:25             ` Matthew Garrett
2024-08-29 17:26               ` Andy Lutomirski
2024-09-05  1:01             ` Daniel P. Smith
2024-09-13  0:34               ` Daniel P. Smith
2024-09-14  3:57                 ` Andy Lutomirski
2024-09-21 18:36                   ` Daniel P. Smith
2024-09-21 22:40                     ` Andy Lutomirski
2024-11-02 14:53                       ` Daniel P. Smith
2024-11-02 16:04                         ` James Bottomley
2024-11-15  1:17                           ` Daniel P. Smith
2024-11-18 18:43                             ` Andy Lutomirski
2024-11-18 18:50                               ` Andy Lutomirski
2024-11-18 19:12                               ` James Bottomley
2024-11-18 20:02                                 ` Andy Lutomirski
2024-11-21 20:11                                   ` ross.philipson
2024-11-21 20:54                                     ` Andy Lutomirski
2024-11-21 22:42                                       ` Andy Lutomirski
2024-11-22 23:37                                         ` ross.philipson
2024-12-12 19:56                                   ` Daniel P. Smith
2024-12-12 22:30                                     ` Andy Lutomirski
2024-12-14  2:56                                       ` Daniel P. Smith
2024-05-31 16:18     ` ross.philipson
2024-08-27 18:14     ` Eric Biggers
2024-08-28 20:14       ` ross.philipson
2024-08-28 23:13         ` Eric Biggers
2024-06-04 18:52   ` Jarkko Sakkinen
2024-06-04 21:02     ` ross.philipson
2024-06-04 22:40       ` Jarkko Sakkinen
2024-05-31  1:03 ` [PATCH v9 07/19] x86: Add early SHA-256 " Ross Philipson
2024-05-31  1:03 ` [PATCH v9 08/19] x86: Secure Launch kernel early boot stub Ross Philipson
2024-05-31 11:00   ` Ard Biesheuvel
2024-05-31 13:33     ` Ard Biesheuvel
2024-05-31 14:04       ` Ard Biesheuvel
2024-05-31 16:13         ` Ard Biesheuvel
2024-06-04 17:31         ` ross.philipson
2024-06-04 17:24       ` ross.philipson
2024-06-04 17:27         ` Ard Biesheuvel
2024-06-04 17:33           ` ross.philipson
2024-06-04 20:54             ` Ard Biesheuvel
2024-06-04 21:12               ` ross.philipson
2024-06-04 17:14     ` ross.philipson
2024-06-04 19:56   ` Jarkko Sakkinen
2024-06-04 21:09     ` ross.philipson
2024-06-04 22:43       ` Jarkko Sakkinen
2024-05-31  1:03 ` [PATCH v9 09/19] x86: Secure Launch kernel late " Ross Philipson
2024-06-04 19:58   ` Jarkko Sakkinen
2024-06-04 21:16     ` ross.philipson
2024-06-04 22:45       ` Jarkko Sakkinen
2024-06-04 19:59   ` Jarkko Sakkinen
2024-06-04 21:17     ` ross.philipson
2024-08-12 19:02     ` ross.philipson
2024-08-15 18:35       ` Jarkko Sakkinen
2024-05-31  1:03 ` [PATCH v9 10/19] x86: Secure Launch SMP bringup support Ross Philipson
2024-06-04 20:05   ` Jarkko Sakkinen
2024-06-04 21:47     ` ross.philipson
2024-06-04 22:46       ` Jarkko Sakkinen
2024-05-31  1:03 ` [PATCH v9 11/19] kexec: Secure Launch kexec SEXIT support Ross Philipson
2024-05-31  1:03 ` [PATCH v9 12/19] reboot: Secure Launch SEXIT support on reboot paths Ross Philipson
2024-05-31  1:03 ` [PATCH v9 13/19] tpm: Protect against locality counter underflow Ross Philipson
2024-06-04 20:12   ` Jarkko Sakkinen
2024-08-15 18:52     ` Daniel P. Smith
2024-05-31  1:03 ` [PATCH v9 14/19] tpm: Ensure tpm is in known state at startup Ross Philipson
2024-06-04 20:14   ` Jarkko Sakkinen
2024-08-15 19:24     ` Daniel P. Smith
2024-05-31  1:03 ` [PATCH v9 15/19] tpm: Make locality requests return consistent values Ross Philipson
2024-05-31  1:03 ` [PATCH v9 16/19] tpm: Add ability to set the preferred locality the TPM chip uses Ross Philipson
2024-06-04 20:27   ` Jarkko Sakkinen
2024-06-04 22:14     ` ross.philipson
2024-06-04 22:50       ` Jarkko Sakkinen
2024-06-04 23:04         ` ross.philipson
2024-05-31  1:03 ` [PATCH v9 17/19] tpm: Add sysfs interface to allow setting and querying the preferred locality Ross Philipson
2024-06-04 20:27   ` Jarkko Sakkinen
2024-05-31  1:03 ` [PATCH v9 18/19] x86: Secure Launch late initcall platform module Ross Philipson
2024-05-31  1:03 ` [PATCH v9 19/19] x86: EFI stub DRTM launch support for Secure Launch Ross Philipson
2024-05-31 11:09   ` Ard Biesheuvel
2024-06-04 17:22     ` ross.philipson

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=D1RFUDSAJJKJ.2MF9OSQAJGBRW@kernel.org \
    --to=jarkko@kernel.org \
    --cc=James.Bottomley@hansenpartnership.com \
    --cc=andrew.cooper3@citrix.com \
    --cc=ardb@kernel.org \
    --cc=baolu.lu@linux.intel.com \
    --cc=bp@alien8.de \
    --cc=corbet@lwn.net \
    --cc=dave.hansen@linux.intel.com \
    --cc=davem@davemloft.net \
    --cc=dpsmith@apertussolutions.com \
    --cc=dwmw2@infradead.org \
    --cc=ebiederm@xmission.com \
    --cc=herbert@gondor.apana.org.au \
    --cc=hpa@zytor.com \
    --cc=iommu@lists.linux-foundation.org \
    --cc=jgg@ziepe.ca \
    --cc=kanth.ghatraju@oracle.com \
    --cc=kexec@lists.infradead.org \
    --cc=linux-crypto@vger.kernel.org \
    --cc=linux-doc@vger.kernel.org \
    --cc=linux-efi@vger.kernel.org \
    --cc=linux-integrity@vger.kernel.org \
    --cc=linux-kernel@vger.kernel.org \
    --cc=luto@amacapital.net \
    --cc=mingo@redhat.com \
    --cc=mjg59@srcf.ucam.org \
    --cc=nivedita@alum.mit.edu \
    --cc=peterhuewe@gmx.de \
    --cc=ross.philipson@oracle.com \
    --cc=tglx@linutronix.de \
    --cc=trenchboot-devel@googlegroups.com \
    --cc=x86@kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).