From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932553Ab2KVUvg (ORCPT ); Thu, 22 Nov 2012 15:51:36 -0500 Received: from terminus.zytor.com ([198.137.202.10]:47238 "EHLO mail.zytor.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1755431Ab2KVUvf (ORCPT ); Thu, 22 Nov 2012 15:51:35 -0500 Message-ID: <50AE902D.5090705@zytor.com> Date: Thu, 22 Nov 2012 12:50:53 -0800 From: "H. Peter Anvin" User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:16.0) Gecko/20121029 Thunderbird/16.0.2 MIME-Version: 1.0 To: Yinghai Lu CC: Thomas Gleixner , Ingo Molnar , "Eric W. Biederman" , linux-kernel@vger.kernel.org, Rob Landley , Matt Fleming Subject: Re: [PATCH v3 11/12] x86, boot: add fields to support load bzImage and ramdisk high References: <1353482170-10160-1-git-send-email-yinghai@kernel.org> <1353482170-10160-12-git-send-email-yinghai@kernel.org> <50AD0CA1.8000904@zytor.com> <50AD291A.10600@zytor.com> <50AE70E7.6060204@zytor.com> <50AE7429.6030308@zytor.com> In-Reply-To: Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 11/22/2012 12:18 PM, Yinghai Lu wrote: >> >> If we can get the sentinel hack to work that would probably be useful, but >> we need to understand the exact pathology. > > for kexec bzImage --real-mode-entry, code after setup_header will be executed. > > so we could clear value before setup_header after copy 16bit section > from bzImage... > > Index: kexec-tools/kexec/arch/i386/kexec-bzImage.c > =================================================================== > --- kexec-tools.orig/kexec/arch/i386/kexec-bzImage.c > +++ kexec-tools/kexec/arch/i386/kexec-bzImage.c > @@ -212,6 +212,16 @@ int do_bzImage_load(struct kexec_info *i > setup_size = kern16_size + command_line_len + PURGATORY_CMDLINE_SIZE; > real_mode = xmalloc(setup_size); > memcpy(real_mode, kernel, kern16_size); > + /* > + * clear value before header > + * not not clear value after header, --real-mode-entry > + * need code after header. > + */ > + memset(real_mode, 0, 0x1f1); > + if (!real_mode_entry) { > + /* clear value after setup_header */ > + memset((unsigned char *)real_mode + 0x290, 0, kern16_size - 0x290); > + } > You really should move the memset() into the if() clause as well... doesn't matter at the moment, but that is the protocol. The limit is 0x280, not 0x290, or -- better -- you can use the byte at 0x201 to get the size. -hpa -- H. Peter Anvin, Intel Open Source Technology Center I work for Intel. I don't speak on their behalf.