Merge branch 'x86-urgent-for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip
Pull x86 fixes from Thomas Gleixner: - a fix for the kexec/purgatory regression which was introduced in the merge window via an innocent sparse fix. We could have reverted that commit, but on deeper inspection it turned out that the whole machinery is neither documented nor robust. So a proper cleanup was done instead - the fix for the TLB flush issue which was discovered recently - a simple typo fix for a reboot quirk * 'x86-urgent-for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip: x86/tlb: Fix tlb flushing when lguest clears PGE kexec, x86/purgatory: Unbreak it and clean it up x86/reboot/quirks: Fix typo in ASUS EeeBook X205TA reboot quirk
This commit is contained in:
commit
5a45a5a881
12 changed files with 80 additions and 48 deletions
|
@ -116,13 +116,13 @@ dt_offset:
|
|||
|
||||
.data
|
||||
.balign 8
|
||||
.globl sha256_digest
|
||||
sha256_digest:
|
||||
.globl purgatory_sha256_digest
|
||||
purgatory_sha256_digest:
|
||||
.skip 32
|
||||
.size sha256_digest, . - sha256_digest
|
||||
.size purgatory_sha256_digest, . - purgatory_sha256_digest
|
||||
|
||||
.balign 8
|
||||
.globl sha_regions
|
||||
sha_regions:
|
||||
.globl purgatory_sha_regions
|
||||
purgatory_sha_regions:
|
||||
.skip 8 * 2 * 16
|
||||
.size sha_regions, . - sha_regions
|
||||
.size purgatory_sha_regions, . - purgatory_sha_regions
|
||||
|
|
20
arch/x86/include/asm/purgatory.h
Normal file
20
arch/x86/include/asm/purgatory.h
Normal file
|
@ -0,0 +1,20 @@
|
|||
#ifndef _ASM_X86_PURGATORY_H
|
||||
#define _ASM_X86_PURGATORY_H
|
||||
|
||||
#ifndef __ASSEMBLY__
|
||||
#include <linux/purgatory.h>
|
||||
|
||||
extern void purgatory(void);
|
||||
/*
|
||||
* These forward declarations serve two purposes:
|
||||
*
|
||||
* 1) Make sparse happy when checking arch/purgatory
|
||||
* 2) Document that these are required to be global so the symbol
|
||||
* lookup in kexec works
|
||||
*/
|
||||
extern unsigned long purgatory_backup_dest;
|
||||
extern unsigned long purgatory_backup_src;
|
||||
extern unsigned long purgatory_backup_sz;
|
||||
#endif /* __ASSEMBLY__ */
|
||||
|
||||
#endif /* _ASM_PURGATORY_H */
|
|
@ -188,7 +188,7 @@ static inline void __native_flush_tlb_single(unsigned long addr)
|
|||
|
||||
static inline void __flush_tlb_all(void)
|
||||
{
|
||||
if (static_cpu_has(X86_FEATURE_PGE))
|
||||
if (boot_cpu_has(X86_FEATURE_PGE))
|
||||
__flush_tlb_global();
|
||||
else
|
||||
__flush_tlb();
|
||||
|
|
|
@ -194,19 +194,22 @@ static int arch_update_purgatory(struct kimage *image)
|
|||
|
||||
/* Setup copying of backup region */
|
||||
if (image->type == KEXEC_TYPE_CRASH) {
|
||||
ret = kexec_purgatory_get_set_symbol(image, "backup_dest",
|
||||
ret = kexec_purgatory_get_set_symbol(image,
|
||||
"purgatory_backup_dest",
|
||||
&image->arch.backup_load_addr,
|
||||
sizeof(image->arch.backup_load_addr), 0);
|
||||
if (ret)
|
||||
return ret;
|
||||
|
||||
ret = kexec_purgatory_get_set_symbol(image, "backup_src",
|
||||
ret = kexec_purgatory_get_set_symbol(image,
|
||||
"purgatory_backup_src",
|
||||
&image->arch.backup_src_start,
|
||||
sizeof(image->arch.backup_src_start), 0);
|
||||
if (ret)
|
||||
return ret;
|
||||
|
||||
ret = kexec_purgatory_get_set_symbol(image, "backup_sz",
|
||||
ret = kexec_purgatory_get_set_symbol(image,
|
||||
"purgatory_backup_sz",
|
||||
&image->arch.backup_src_sz,
|
||||
sizeof(image->arch.backup_src_sz), 0);
|
||||
if (ret)
|
||||
|
|
|
@ -228,7 +228,7 @@ static struct dmi_system_id __initdata reboot_dmi_table[] = {
|
|||
.ident = "ASUS EeeBook X205TA",
|
||||
.matches = {
|
||||
DMI_MATCH(DMI_SYS_VENDOR, "ASUSTeK COMPUTER INC."),
|
||||
DMI_MATCH(DMI_PRODUCT_NAME, "X205TAW"),
|
||||
DMI_MATCH(DMI_PRODUCT_NAME, "X205TA"),
|
||||
},
|
||||
},
|
||||
{ /* Handle problems with rebooting on ASUS EeeBook X205TAW */
|
||||
|
|
|
@ -10,22 +10,19 @@
|
|||
* Version 2. See the file COPYING for more details.
|
||||
*/
|
||||
|
||||
#include <linux/bug.h>
|
||||
#include <asm/purgatory.h>
|
||||
|
||||
#include "sha256.h"
|
||||
#include "purgatory.h"
|
||||
#include "../boot/string.h"
|
||||
|
||||
struct sha_region {
|
||||
unsigned long start;
|
||||
unsigned long len;
|
||||
};
|
||||
unsigned long purgatory_backup_dest __section(.kexec-purgatory);
|
||||
unsigned long purgatory_backup_src __section(.kexec-purgatory);
|
||||
unsigned long purgatory_backup_sz __section(.kexec-purgatory);
|
||||
|
||||
static unsigned long backup_dest;
|
||||
static unsigned long backup_src;
|
||||
static unsigned long backup_sz;
|
||||
u8 purgatory_sha256_digest[SHA256_DIGEST_SIZE] __section(.kexec-purgatory);
|
||||
|
||||
static u8 sha256_digest[SHA256_DIGEST_SIZE] = { 0 };
|
||||
|
||||
struct sha_region sha_regions[16] = {};
|
||||
struct kexec_sha_region purgatory_sha_regions[KEXEC_SEGMENT_MAX] __section(.kexec-purgatory);
|
||||
|
||||
/*
|
||||
* On x86, second kernel requries first 640K of memory to boot. Copy
|
||||
|
@ -34,26 +31,28 @@ struct sha_region sha_regions[16] = {};
|
|||
*/
|
||||
static int copy_backup_region(void)
|
||||
{
|
||||
if (backup_dest)
|
||||
memcpy((void *)backup_dest, (void *)backup_src, backup_sz);
|
||||
|
||||
if (purgatory_backup_dest) {
|
||||
memcpy((void *)purgatory_backup_dest,
|
||||
(void *)purgatory_backup_src, purgatory_backup_sz);
|
||||
}
|
||||
return 0;
|
||||
}
|
||||
|
||||
static int verify_sha256_digest(void)
|
||||
{
|
||||
struct sha_region *ptr, *end;
|
||||
struct kexec_sha_region *ptr, *end;
|
||||
u8 digest[SHA256_DIGEST_SIZE];
|
||||
struct sha256_state sctx;
|
||||
|
||||
sha256_init(&sctx);
|
||||
end = &sha_regions[sizeof(sha_regions)/sizeof(sha_regions[0])];
|
||||
for (ptr = sha_regions; ptr < end; ptr++)
|
||||
end = purgatory_sha_regions + ARRAY_SIZE(purgatory_sha_regions);
|
||||
|
||||
for (ptr = purgatory_sha_regions; ptr < end; ptr++)
|
||||
sha256_update(&sctx, (uint8_t *)(ptr->start), ptr->len);
|
||||
|
||||
sha256_final(&sctx, digest);
|
||||
|
||||
if (memcmp(digest, sha256_digest, sizeof(digest)))
|
||||
if (memcmp(digest, purgatory_sha256_digest, sizeof(digest)))
|
||||
return 1;
|
||||
|
||||
return 0;
|
||||
|
|
|
@ -1,8 +0,0 @@
|
|||
#ifndef PURGATORY_H
|
||||
#define PURGATORY_H
|
||||
|
||||
#ifndef __ASSEMBLY__
|
||||
extern void purgatory(void);
|
||||
#endif /* __ASSEMBLY__ */
|
||||
|
||||
#endif /* PURGATORY_H */
|
|
@ -9,7 +9,7 @@
|
|||
* This source code is licensed under the GNU General Public License,
|
||||
* Version 2. See the file COPYING for more details.
|
||||
*/
|
||||
#include "purgatory.h"
|
||||
#include <asm/purgatory.h>
|
||||
|
||||
.text
|
||||
.globl purgatory_start
|
||||
|
|
|
@ -10,7 +10,6 @@
|
|||
#ifndef SHA256_H
|
||||
#define SHA256_H
|
||||
|
||||
|
||||
#include <linux/types.h>
|
||||
#include <crypto/sha.h>
|
||||
|
||||
|
|
23
include/linux/purgatory.h
Normal file
23
include/linux/purgatory.h
Normal file
|
@ -0,0 +1,23 @@
|
|||
#ifndef _LINUX_PURGATORY_H
|
||||
#define _LINUX_PURGATORY_H
|
||||
|
||||
#include <linux/types.h>
|
||||
#include <crypto/sha.h>
|
||||
#include <uapi/linux/kexec.h>
|
||||
|
||||
struct kexec_sha_region {
|
||||
unsigned long start;
|
||||
unsigned long len;
|
||||
};
|
||||
|
||||
/*
|
||||
* These forward declarations serve two purposes:
|
||||
*
|
||||
* 1) Make sparse happy when checking arch/purgatory
|
||||
* 2) Document that these are required to be global so the symbol
|
||||
* lookup in kexec works
|
||||
*/
|
||||
extern struct kexec_sha_region purgatory_sha_regions[KEXEC_SEGMENT_MAX];
|
||||
extern u8 purgatory_sha256_digest[SHA256_DIGEST_SIZE];
|
||||
|
||||
#endif
|
|
@ -614,13 +614,13 @@ static int kexec_calculate_store_digests(struct kimage *image)
|
|||
ret = crypto_shash_final(desc, digest);
|
||||
if (ret)
|
||||
goto out_free_digest;
|
||||
ret = kexec_purgatory_get_set_symbol(image, "sha_regions",
|
||||
sha_regions, sha_region_sz, 0);
|
||||
ret = kexec_purgatory_get_set_symbol(image, "purgatory_sha_regions",
|
||||
sha_regions, sha_region_sz, 0);
|
||||
if (ret)
|
||||
goto out_free_digest;
|
||||
|
||||
ret = kexec_purgatory_get_set_symbol(image, "sha256_digest",
|
||||
digest, SHA256_DIGEST_SIZE, 0);
|
||||
ret = kexec_purgatory_get_set_symbol(image, "purgatory_sha256_digest",
|
||||
digest, SHA256_DIGEST_SIZE, 0);
|
||||
if (ret)
|
||||
goto out_free_digest;
|
||||
}
|
||||
|
|
|
@ -15,11 +15,7 @@ int kimage_is_destination_range(struct kimage *image,
|
|||
extern struct mutex kexec_mutex;
|
||||
|
||||
#ifdef CONFIG_KEXEC_FILE
|
||||
struct kexec_sha_region {
|
||||
unsigned long start;
|
||||
unsigned long len;
|
||||
};
|
||||
|
||||
#include <linux/purgatory.h>
|
||||
void kimage_file_post_load_cleanup(struct kimage *image);
|
||||
#else /* CONFIG_KEXEC_FILE */
|
||||
static inline void kimage_file_post_load_cleanup(struct kimage *image) { }
|
||||
|
|
Loading…
Reference in a new issue