Show a cover letter.

GET /api/covers/814217/?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 814217,
    "url": "http://patchwork.ozlabs.org/api/covers/814217/?format=api",
    "web_url": "http://patchwork.ozlabs.org/project/linux-imx/cover/20170915105932.25338-1-takahiro.akashi@linaro.org/",
    "project": {
        "id": 19,
        "url": "http://patchwork.ozlabs.org/api/projects/19/?format=api",
        "name": "Linux IMX development",
        "link_name": "linux-imx",
        "list_id": "linux-imx-kernel.lists.patchwork.ozlabs.org",
        "list_email": "linux-imx-kernel@lists.patchwork.ozlabs.org",
        "web_url": null,
        "scm_url": null,
        "webscm_url": null,
        "list_archive_url": "",
        "list_archive_url_format": "",
        "commit_url_format": ""
    },
    "msgid": "<20170915105932.25338-1-takahiro.akashi@linaro.org>",
    "list_archive_url": null,
    "date": "2017-09-15T10:59:22",
    "name": "[v3,00/10] arm64: kexec: add kexec_file_load() support",
    "submitter": {
        "id": 61166,
        "url": "http://patchwork.ozlabs.org/api/people/61166/?format=api",
        "name": "AKASHI Takahiro",
        "email": "takahiro.akashi@linaro.org"
    },
    "mbox": "http://patchwork.ozlabs.org/project/linux-imx/cover/20170915105932.25338-1-takahiro.akashi@linaro.org/mbox/",
    "series": [
        {
            "id": 3281,
            "url": "http://patchwork.ozlabs.org/api/series/3281/?format=api",
            "web_url": "http://patchwork.ozlabs.org/project/linux-imx/list/?series=3281",
            "date": "2017-09-15T10:59:22",
            "name": "arm64: kexec: add kexec_file_load() support",
            "version": 3,
            "mbox": "http://patchwork.ozlabs.org/series/3281/mbox/"
        }
    ],
    "comments": "http://patchwork.ozlabs.org/api/covers/814217/comments/",
    "headers": {
        "Return-Path": "<linux-arm-kernel-bounces+incoming-imx=patchwork.ozlabs.org@lists.infradead.org>",
        "X-Original-To": "incoming-imx@patchwork.ozlabs.org",
        "Delivered-To": "patchwork-incoming-imx@bilbo.ozlabs.org",
        "Authentication-Results": [
            "ozlabs.org;\n\tspf=none (mailfrom) smtp.mailfrom=lists.infradead.org\n\t(client-ip=65.50.211.133; helo=bombadil.infradead.org;\n\tenvelope-from=linux-arm-kernel-bounces+incoming-imx=patchwork.ozlabs.org@lists.infradead.org;\n\treceiver=<UNKNOWN>)",
            "ozlabs.org; dkim=pass (2048-bit key;\n\tunprotected) header.d=lists.infradead.org\n\theader.i=@lists.infradead.org header.b=\"Q7AMWoS/\"; \n\tdkim=fail reason=\"signature verification failed\" (1024-bit key;\n\tunprotected) header.d=linaro.org header.i=@linaro.org\n\theader.b=\"hil0uE/o\"; dkim-atps=neutral"
        ],
        "Received": [
            "from bombadil.infradead.org (bombadil.infradead.org\n\t[65.50.211.133])\n\t(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256\n\tbits)) (No client certificate requested)\n\tby ozlabs.org (Postfix) with ESMTPS id 3xtsng1wndz9t2h\n\tfor <incoming-imx@patchwork.ozlabs.org>;\n\tFri, 15 Sep 2017 20:58:15 +1000 (AEST)",
            "from localhost ([127.0.0.1] helo=bombadil.infradead.org)\n\tby bombadil.infradead.org with esmtp (Exim 4.87 #1 (Red Hat Linux))\n\tid 1dsoK3-0000Dq-8V; Fri, 15 Sep 2017 10:58:11 +0000",
            "from mail-pg0-x22c.google.com ([2607:f8b0:400e:c05::22c])\n\tby bombadil.infradead.org with esmtps (Exim 4.87 #1 (Red Hat Linux))\n\tid 1dsoJy-00008x-55 for linux-arm-kernel@lists.infradead.org;\n\tFri, 15 Sep 2017 10:58:08 +0000",
            "by mail-pg0-x22c.google.com with SMTP id m30so1308162pgn.6\n\tfor <linux-arm-kernel@lists.infradead.org>;\n\tFri, 15 Sep 2017 03:57:44 -0700 (PDT)",
            "from linaro.org ([121.95.100.191])\n\tby smtp.googlemail.com with ESMTPSA id\n\tk82sm1796120pfj.66.2017.09.15.03.57.42\n\t(version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128);\n\tFri, 15 Sep 2017 03:57:43 -0700 (PDT)"
        ],
        "DKIM-Signature": [
            "v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;\n\td=lists.infradead.org; s=bombadil.20170209; h=Sender:\n\tContent-Transfer-Encoding:Content-Type:MIME-Version:Cc:List-Subscribe:\n\tList-Help:List-Post:List-Archive:List-Unsubscribe:List-Id:Message-Id:Date:\n\tSubject:To:From:Reply-To:Content-ID:Content-Description:Resent-Date:\n\tResent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To:\n\tReferences:List-Owner; bh=dCIRRCww00JIUinbTCX91KFI/NUoLHou0fDOosg0HTU=;\n\tb=Q7A\n\tMWoS/eeJOZ3dRvU2PnLTjVIbXUzIz6U7YabacuEGSHSmVc1eXW8Pb87w+lZ3H/s4iAmRz6KR4a8rR\n\tbiB3J8ucCAGwfTcSYijZx9ikMA/yDmjHv4imI1F57uCHgoDhvNagqfkK4gcZfnpuSdJF59fqDj6I2\n\tTxJzzgxhAko1CBwn1Zv/9RQP+G8UsFqfUG199xhmenr2vuKIIHSr6DfBGT2kl/5PU0BwJ8HHD0rus\n\tOg1xwVOCIeNLb3RiSznG3bm/TvX0Zpg/1OWwvEztYGztYvxDfgn4zZNANtbRMKz4ineJZuwCci+Bt\n\tO8XKtrKn+o4EdHMAGhfV9lwXTKNCnow==;",
            "v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google;\n\th=from:to:cc:subject:date:message-id;\n\tbh=G8IuSGIeoIG2NL5VJhAfjDVujUmkg9tHs8XQYoklK0k=;\n\tb=hil0uE/ooAOvElwCGpagIzt9G8AJ5ryZgh3dePrT06k7pvXUzma1ncP6zmQfZURZNe\n\tIetWltPzT1/DJ/k/OHsLx3AD/GwH0FSYFzuXxj4xnGXuumlCaTXgELLHmRcA4yIA5fNP\n\tbFXc8wrZu4p88TkNwLK0fAiwfVnfyByQZhhgI="
        ],
        "X-Google-DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed;\n\td=1e100.net; s=20161025;\n\th=x-gm-message-state:from:to:cc:subject:date:message-id;\n\tbh=G8IuSGIeoIG2NL5VJhAfjDVujUmkg9tHs8XQYoklK0k=;\n\tb=GyxjjahmsExNgZETdczWCh76M9c2z6f/+ErYHpCoPdKVr/U0mpoVloJlDVOwpA26g+\n\trSZOIM0TMcMM+Q1G7T67kZI6AOGh0JJn87+PG6BYWKlL/xXwFJFrsxHYBW7gijlDGbXT\n\tGk/hgzIbRWQIaxdt2oZ0BM52S50RGkC2g14zvjobO8/nVQxCqHa91DCZEdcBY9Ji5D+2\n\tQEdi8V4cmy1A9XRpHM2EOsfaPTZIpUcvbEXs26ZqKMBF976M8uwEXH2yNHGCzuc16J8G\n\t+hOUe+NQlqda3DCTf9y5mx+XOx6dcQGubQP0VZ7IQk6g48K7B1Pl6ilkayK8VKuli/LY\n\tgdCg==",
        "X-Gm-Message-State": "AHPjjUgEzU8HxhH3il0OgvKAVC815Qcllk/Ro/XkXL/wnXh5Dy7tuXky\n\tj+wKVHtRBAq3hV01",
        "X-Google-Smtp-Source": "ADKCNb76z8mkjUy0bSxf2hZ5fhuz+vo/loaM/wNpztiY746CBurRY70tLnl2NybGDv7M1vHNR9GtIA==",
        "X-Received": "by 10.98.138.17 with SMTP id y17mr17081365pfd.149.1505473064081; \n\tFri, 15 Sep 2017 03:57:44 -0700 (PDT)",
        "From": "AKASHI Takahiro <takahiro.akashi@linaro.org>",
        "To": "catalin.marinas@arm.com, will.deacon@arm.com, bauerman@linux.vnet.ibm.com,\n\tdhowells@redhat.com, vgoyal@redhat.com, herbert@gondor.apana.org.au, \n\tdavem@davemloft.net, akpm@linux-foundation.org, mpe@ellerman.id.au,\n\tdyoung@redhat.com, bhe@redhat.com, arnd@arndb.de,\n\tard.biesheuvel@linaro.org",
        "Subject": "[PATCH v3 00/10] arm64: kexec: add kexec_file_load() support",
        "Date": "Fri, 15 Sep 2017 19:59:22 +0900",
        "Message-Id": "<20170915105932.25338-1-takahiro.akashi@linaro.org>",
        "X-Mailer": "git-send-email 2.14.1",
        "X-CRM114-Version": "20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 ",
        "X-CRM114-CacheID": "sfid-20170915_035806_367428_FCDA4D79 ",
        "X-CRM114-Status": "GOOD (  16.26  )",
        "X-Spam-Score": "-2.0 (--)",
        "X-Spam-Report": "SpamAssassin version 3.4.1 on bombadil.infradead.org summary:\n\tContent analysis details:   (-2.0 points)\n\tpts rule name              description\n\t---- ----------------------\n\t--------------------------------------------------\n\t-0.0 RCVD_IN_DNSWL_NONE RBL: Sender listed at http://www.dnswl.org/,\n\tno\n\ttrust [2607:f8b0:400e:c05:0:0:0:22c listed in] [list.dnswl.org]\n\t-0.0 SPF_PASS               SPF: sender matches SPF record\n\t-1.9 BAYES_00               BODY: Bayes spam probability is 0 to 1%\n\t[score: 0.0000]\n\t-0.1 DKIM_VALID Message has at least one valid DKIM or DK signature\n\t0.1 DKIM_SIGNED            Message has a DKIM or DK signature,\n\tnot necessarily valid\n\t-0.1 DKIM_VALID_AU Message has a valid DKIM or DK signature from\n\tauthor's domain",
        "X-BeenThere": "linux-arm-kernel@lists.infradead.org",
        "X-Mailman-Version": "2.1.21",
        "Precedence": "list",
        "List-Unsubscribe": "<http://lists.infradead.org/mailman/options/linux-arm-kernel>,\n\t<mailto:linux-arm-kernel-request@lists.infradead.org?subject=unsubscribe>",
        "List-Archive": "<http://lists.infradead.org/pipermail/linux-arm-kernel/>",
        "List-Post": "<mailto:linux-arm-kernel@lists.infradead.org>",
        "List-Help": "<mailto:linux-arm-kernel-request@lists.infradead.org?subject=help>",
        "List-Subscribe": "<http://lists.infradead.org/mailman/listinfo/linux-arm-kernel>,\n\t<mailto:linux-arm-kernel-request@lists.infradead.org?subject=subscribe>",
        "Cc": "AKASHI Takahiro <takahiro.akashi@linaro.org>, kexec@lists.infradead.org, \n\tlinux-kernel@vger.kernel.org, linux-arm-kernel@lists.infradead.org",
        "MIME-Version": "1.0",
        "Content-Type": "text/plain; charset=\"us-ascii\"",
        "Content-Transfer-Encoding": "7bit",
        "Sender": "\"linux-arm-kernel\" <linux-arm-kernel-bounces@lists.infradead.org>",
        "Errors-To": "linux-arm-kernel-bounces+incoming-imx=patchwork.ozlabs.org@lists.infradead.org",
        "List-Id": "linux-imx-kernel.lists.patchwork.ozlabs.org"
    },
    "content": "This is the third round of implementing kexec_file_load() support\non arm64.[1]\nMost of the code is based on kexec-tools (along with some kernel code\nfrom x86, which also came from kexec-tools).\n\n\nThis patch series enables us to\n  * load the kernel, Image, with kexec_file_load system call, and\n  * optionally verify its signature at load time for trusted boot.\n\nTo load the kernel via kexec_file_load system call, a small change\nis also needed to kexec-tools. See [2]. This enables '-s' option.\n\nAs we discussed a long time ago, users may not be allowed to specify\ndevice-tree file of the 2nd kernel explicitly with kexec-tools, hence\nre-using the blob of the first kernel.\n\nRegarding a signing method, we conform with x86 (or rather Microsoft?)\nstyle of signing since the binary can also be seen as in PE format\n(assuming that CONFIG_EFI is enabled).\n\n    Powerpc is also going to support extended-file-attribute-based\n    verification[3] with vmlinux, but arm64 doesn't for now partly\n    because we don't have TPM-based IMA at this moment.\n\nAccordingly, we can use the existing command, sbsign, to sign the kernel.\n\n    $ sbsign --key ${KEY} --cert ${CERT} Image\n\nPlease note that it is totally up to the system what key/certificate is\nused for signing, but one of easy ways to *try* this feature is to turn on\nCONFIG_MODULE_SIG so that we can reuse certs/signing_key.pem as a signing\nkey, KEY and CERT above, for kernel.\n(This also enables CONFIG_CRYPTO_SHA1 by default.)\n\n\nSome concerns(or future works):\n* Even if the kernel is configured with CONFIG_RANDOMIZE_BASE, the 2nd\n  kernel won't be placed at a randomized address. We will have to\n  add some boot code similar to efi-stub to implement the feature.\n* While big-endian kernel can support kernel signing, I'm not sure that\n  Image can be recognized as in PE format because x86 standard only\n  defines little-endian-based format.\n* IMA(and extended file attribute)-based kexec\n* vmlinux support\n\n  [1] http://git.linaro.org/people/takahiro.akashi/linux-aarch64.git\n\tbranch:arm64/kexec_file\n  [2] http://git.linaro.org/people/takahiro.akashi/kexec-tools.git\n\tbranch:arm64/kexec_file\n  [3] http://lkml.iu.edu//hypermail/linux/kernel/1707.0/03669.html\n\n\nChanges in v3 (Sep 15, 2017)\n* fix kbuild test error\n* factor out arch_kexec_kernel_*() & arch_kimage_file_post_load_cleanup()\n* remove CONFIG_CRASH_CORE guard from kexec_file.c\n* add vmapped kernel region to vmcore for gdb backtracing\n  (see prepare_elf64_headers())\n* merge asm/kexec_file.h into asm/kexec.h\n* and some cleanups\n\nChanges in v2 (Sep 8, 2017)\n* move core-header-related functions from crash_core.c to kexec_file.c\n* drop hash-check code from purgatory\n* modify purgatory asm to remove arch_kexec_apply_relocations_add()\n* drop older kernel support\n* drop vmlinux support (at least, for this series)\n\nPatch #1 to #5 are all preparatory patches on generic side.\nPatch #6 is purgatory code.\nPatch #7 to #9 are common for enabling kexec_file_load.\nPatch #10 is for 'Image' support.\n\nAKASHI Takahiro (10):\n  include: pe.h: remove message[] from mz header definition\n  resource: add walk_system_ram_res_rev()\n  kexec_file: factor out arch_kexec_kernel_*() from x86, powerpc\n  kexec_file: factor out crashdump elf header function from x86\n  asm-generic: add kexec_file_load system call to unistd.h\n  arm64: kexec_file: create purgatory\n  arm64: kexec_file: load initrd, device-tree and purgatory segments\n  arm64: kexec_file: set up for crash dump adding elf core header\n  arm64: enable KEXEC_FILE config\n  arm64: kexec_file: add Image format support\n\n arch/arm64/Kconfig                          |  29 +++\n arch/arm64/Makefile                         |   1 +\n arch/arm64/include/asm/kexec.h              |  93 +++++++\n arch/arm64/kernel/Makefile                  |   4 +-\n arch/arm64/kernel/kexec_image.c             | 105 ++++++++\n arch/arm64/kernel/machine_kexec_file.c      | 365 ++++++++++++++++++++++++++++\n arch/arm64/purgatory/Makefile               |  24 ++\n arch/arm64/purgatory/entry.S                |  55 +++++\n arch/powerpc/include/asm/kexec.h            |   4 +\n arch/powerpc/kernel/machine_kexec_file_64.c |  36 +--\n arch/x86/kernel/crash.c                     | 324 ------------------------\n arch/x86/kernel/machine_kexec_64.c          |  59 +----\n include/linux/ioport.h                      |   3 +\n include/linux/kexec.h                       |  43 +++-\n include/linux/pe.h                          |   2 +-\n include/uapi/asm-generic/unistd.h           |   4 +-\n kernel/kexec_file.c                         | 360 ++++++++++++++++++++++++++-\n kernel/kexec_internal.h                     |  20 ++\n kernel/resource.c                           |  59 +++++\n 19 files changed, 1156 insertions(+), 434 deletions(-)\n create mode 100644 arch/arm64/kernel/kexec_image.c\n create mode 100644 arch/arm64/kernel/machine_kexec_file.c\n create mode 100644 arch/arm64/purgatory/Makefile\n create mode 100644 arch/arm64/purgatory/entry.S"
}