From patchwork Wed Dec 13 00:04:43 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Alexander Graf X-Patchwork-Id: 13490142 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 78A59C4332F for ; Wed, 13 Dec 2023 00:06:23 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 0D5136B03B4; Tue, 12 Dec 2023 19:06:23 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id 084406B03B5; Tue, 12 Dec 2023 19:06:22 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id E18066B03B7; Tue, 12 Dec 2023 19:06:22 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0012.hostedemail.com [216.40.44.12]) by kanga.kvack.org (Postfix) with ESMTP id D2CC56B03B4 for ; Tue, 12 Dec 2023 19:06:22 -0500 (EST) Received: from smtpin23.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay10.hostedemail.com (Postfix) with ESMTP id 930DDC0B1B for ; Wed, 13 Dec 2023 00:06:22 +0000 (UTC) X-FDA: 81559853004.23.4701BD5 Received: from smtp-fw-6002.amazon.com (smtp-fw-6002.amazon.com [52.95.49.90]) by imf01.hostedemail.com (Postfix) with ESMTP id 6C4D340006 for ; Wed, 13 Dec 2023 00:06:20 +0000 (UTC) Authentication-Results: imf01.hostedemail.com; dkim=pass header.d=amazon.com header.s=amazon201209 header.b=fUfjJqzt; dmarc=pass (policy=quarantine) header.from=amazon.com; spf=pass (imf01.hostedemail.com: domain of "prvs=704f7accf=graf@amazon.de" designates 52.95.49.90 as permitted sender) smtp.mailfrom="prvs=704f7accf=graf@amazon.de" ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1702425980; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=2/g7t8dqwJHCv4j3q+tOmI1oayO/LeEOR2vQQ38tfk8=; b=VPRY4xAw+asFQGIU879JGIBWfY4ZlUglu/X9eHPQLIthC7yjI1WQhPhZiYLf5bOsWmyK1N 7QRnRtRiKfwrqexW0VP9Zc/7GqYC0lwsMWm5wCXi43VHGkiztXKhajEMRmp+YJCY2IpO+d zvz/80dfEB0MuGfoVc5ldF/cBfh8xYI= ARC-Authentication-Results: i=1; imf01.hostedemail.com; dkim=pass header.d=amazon.com header.s=amazon201209 header.b=fUfjJqzt; dmarc=pass (policy=quarantine) header.from=amazon.com; spf=pass (imf01.hostedemail.com: domain of "prvs=704f7accf=graf@amazon.de" designates 52.95.49.90 as permitted sender) smtp.mailfrom="prvs=704f7accf=graf@amazon.de" ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1702425980; a=rsa-sha256; cv=none; b=cs5iZlq3k8GYumv3ua8ZojT8+FCliwOh7Z+JR4aX9P3DprXcS8wJp44Hvy4UXeY0HO+Pt8 G67ADlaxSWCEriI+ZfmnWIT/lI9IgUTdetFyeYe1JWaQsAKcJbj0G44NHoQGsRxyCrp8io gkNK5rS5Nm9wC7E1RiU7bIcFVK/5Jgg= DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amazon.com; i=@amazon.com; q=dns/txt; s=amazon201209; t=1702425981; x=1733961981; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=2/g7t8dqwJHCv4j3q+tOmI1oayO/LeEOR2vQQ38tfk8=; b=fUfjJqztd2F7rAGVT5H6Q5wEw4dYyHilqI5Lb1uAV/i0NT9o5dGex9WD JLBgefCoj7ZxgRx/wz+I4rfCDMssJfx6AKkfi53DRee9qo/CWcI+LsPZ3 VWhBIJiFBqyA5/wQguHcRgCo50GaafAytrsSUK/sfiyi4ZXlWbyHwQdz5 s=; X-IronPort-AV: E=Sophos;i="6.04,271,1695686400"; d="scan'208";a="373412697" Received: from iad12-co-svc-p1-lb1-vlan3.amazon.com (HELO email-inbound-relay-iad-1e-m6i4x-529f0975.us-east-1.amazon.com) ([10.43.8.6]) by smtp-border-fw-6002.iad6.amazon.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 13 Dec 2023 00:06:19 +0000 Received: from smtpout.prod.us-west-2.prod.farcaster.email.amazon.dev (iad7-ws-svc-p70-lb3-vlan3.iad.amazon.com [10.32.235.38]) by email-inbound-relay-iad-1e-m6i4x-529f0975.us-east-1.amazon.com (Postfix) with ESMTPS id CCC6E49815; Wed, 13 Dec 2023 00:06:05 +0000 (UTC) Received: from EX19MTAUWA001.ant.amazon.com [10.0.21.151:23290] by smtpin.naws.us-west-2.prod.farcaster.email.amazon.dev [10.0.43.236:2525] with esmtp (Farcaster) id 5b333ece-94a3-4a4f-9c0a-106bd493cbae; Wed, 13 Dec 2023 00:06:04 +0000 (UTC) X-Farcaster-Flow-ID: 5b333ece-94a3-4a4f-9c0a-106bd493cbae Received: from EX19D020UWC004.ant.amazon.com (10.13.138.149) by EX19MTAUWA001.ant.amazon.com (10.250.64.204) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1118.40; Wed, 13 Dec 2023 00:06:04 +0000 Received: from dev-dsk-graf-1a-5ce218e4.eu-west-1.amazon.com (10.253.83.51) by EX19D020UWC004.ant.amazon.com (10.13.138.149) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1118.40; Wed, 13 Dec 2023 00:06:00 +0000 From: Alexander Graf To: CC: , , , , , , , Eric Biederman , "H. Peter Anvin" , Andy Lutomirski , Peter Zijlstra , "Rob Herring" , Steven Rostedt , "Andrew Morton" , Mark Rutland , "Tom Lendacky" , Ashish Kalra , James Gowans , Stanislav Kinsburskii , , , , Anthony Yznaga , Usama Arif , David Woodhouse , Benjamin Herrenschmidt Subject: [PATCH 06/15] arm64: Add KHO support Date: Wed, 13 Dec 2023 00:04:43 +0000 Message-ID: <20231213000452.88295-7-graf@amazon.com> X-Mailer: git-send-email 2.40.1 In-Reply-To: <20231213000452.88295-1-graf@amazon.com> References: <20231213000452.88295-1-graf@amazon.com> MIME-Version: 1.0 X-Originating-IP: [10.253.83.51] X-ClientProxiedBy: EX19D042UWA003.ant.amazon.com (10.13.139.44) To EX19D020UWC004.ant.amazon.com (10.13.138.149) X-Rspam-User: X-Rspamd-Server: rspam12 X-Rspamd-Queue-Id: 6C4D340006 X-Stat-Signature: u1n3imyj4wttooafyokn9j18hiuzutqr X-HE-Tag: 1702425980-145515 X-HE-Meta: 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 TMAz/h9m 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 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: We now have all bits in place to support KHO kexecs. This patch adds awareness of KHO in the kexec file as well as boot path for arm64 and adds the respective kconfig option to the architecture so that it can use KHO successfully. Signed-off-by: Alexander Graf --- arch/arm64/Kconfig | 12 ++++++++++++ arch/arm64/kernel/setup.c | 2 ++ arch/arm64/mm/init.c | 8 ++++++++ drivers/of/fdt.c | 41 +++++++++++++++++++++++++++++++++++++++ drivers/of/kexec.c | 36 ++++++++++++++++++++++++++++++++++ 5 files changed, 99 insertions(+) diff --git a/arch/arm64/Kconfig b/arch/arm64/Kconfig index 7b071a00425d..1ba338ce7598 100644 --- a/arch/arm64/Kconfig +++ b/arch/arm64/Kconfig @@ -1501,6 +1501,18 @@ config ARCH_SUPPORTS_CRASH_DUMP config ARCH_HAS_GENERIC_CRASHKERNEL_RESERVATION def_bool CRASH_CORE +config KEXEC_KHO + bool "kexec handover" + depends on KEXEC + select MEMBLOCK_SCRATCH + select LIBFDT + select CMA + help + Allow kexec to hand over state across kernels by generating and + passing additional metadata to the target kernel. This is useful + to keep data or state alive across the kexec. For this to work, + both source and target kernels need to have this option enabled. + config TRANS_TABLE def_bool y depends on HIBERNATION || KEXEC_CORE diff --git a/arch/arm64/kernel/setup.c b/arch/arm64/kernel/setup.c index 417a8a86b2db..8035b673d96d 100644 --- a/arch/arm64/kernel/setup.c +++ b/arch/arm64/kernel/setup.c @@ -346,6 +346,8 @@ void __init __no_sanitize_address setup_arch(char **cmdline_p) paging_init(); + kho_reserve_mem(); + acpi_table_upgrade(); /* Parse the ACPI tables for possible boot-time configuration */ diff --git a/arch/arm64/mm/init.c b/arch/arm64/mm/init.c index 74c1db8ce271..254d82f3383a 100644 --- a/arch/arm64/mm/init.c +++ b/arch/arm64/mm/init.c @@ -358,6 +358,8 @@ void __init bootmem_init(void) */ arch_reserve_crashkernel(); + kho_reserve(); + memblock_dump_all(); } @@ -386,6 +388,12 @@ void __init mem_init(void) /* this will put all unused low memory onto the freelists */ memblock_free_all(); + /* + * Now that all KHO pages are marked as reserved, let's flip them back + * to normal pages with accurate refcount. + */ + kho_populate_refcount(); + /* * Check boundaries twice: Some fundamental inconsistencies can be * detected at build time already. diff --git a/drivers/of/fdt.c b/drivers/of/fdt.c index bf502ba8da95..af95139351ed 100644 --- a/drivers/of/fdt.c +++ b/drivers/of/fdt.c @@ -1006,6 +1006,44 @@ void __init early_init_dt_check_for_usable_mem_range(void) memblock_add(rgn[i].base, rgn[i].size); } +/** + * early_init_dt_check_kho - Decode info required for kexec handover from DT + */ +void __init early_init_dt_check_kho(void) +{ +#ifdef CONFIG_KEXEC_KHO + unsigned long node = chosen_node_offset; + u64 kho_start, scratch_start, scratch_size, mem_start, mem_size; + const __be32 *p; + int l; + + if ((long)node < 0) + return; + + p = of_get_flat_dt_prop(node, "linux,kho-dt", &l); + if (l != (dt_root_addr_cells + dt_root_size_cells) * sizeof(__be32)) + return; + + kho_start = dt_mem_next_cell(dt_root_addr_cells, &p); + + p = of_get_flat_dt_prop(node, "linux,kho-scratch", &l); + if (l != (dt_root_addr_cells + dt_root_size_cells) * sizeof(__be32)) + return; + + scratch_start = dt_mem_next_cell(dt_root_addr_cells, &p); + scratch_size = dt_mem_next_cell(dt_root_addr_cells, &p); + + p = of_get_flat_dt_prop(node, "linux,kho-mem", &l); + if (l != (dt_root_addr_cells + dt_root_size_cells) * sizeof(__be32)) + return; + + mem_start = dt_mem_next_cell(dt_root_addr_cells, &p); + mem_size = dt_mem_next_cell(dt_root_addr_cells, &p); + + kho_populate(kho_start, scratch_start, scratch_size, mem_start, mem_size); +#endif +} + #ifdef CONFIG_SERIAL_EARLYCON int __init early_init_dt_scan_chosen_stdout(void) @@ -1304,6 +1342,9 @@ void __init early_init_dt_scan_nodes(void) /* Handle linux,usable-memory-range property */ early_init_dt_check_for_usable_mem_range(); + + /* Handle kexec handover */ + early_init_dt_check_kho(); } bool __init early_init_dt_scan(void *params) diff --git a/drivers/of/kexec.c b/drivers/of/kexec.c index 68278340cecf..a612e6bb8c75 100644 --- a/drivers/of/kexec.c +++ b/drivers/of/kexec.c @@ -264,6 +264,37 @@ static inline int setup_ima_buffer(const struct kimage *image, void *fdt, } #endif /* CONFIG_IMA_KEXEC */ +static int kho_add_chosen(const struct kimage *image, void *fdt, int chosen_node) +{ + int ret = 0; + +#ifdef CONFIG_KEXEC_KHO + if (!image->kho.dt.buffer || !image->kho.mem_cache.buffer) + goto out; + + pr_debug("Adding kho metadata to DT"); + + ret = fdt_appendprop_addrrange(fdt, 0, chosen_node, "linux,kho-dt", + image->kho.dt.mem, image->kho.dt.memsz); + if (ret) + goto out; + + ret = fdt_appendprop_addrrange(fdt, 0, chosen_node, "linux,kho-scratch", + kho_scratch_phys, kho_scratch_len); + if (ret) + goto out; + + ret = fdt_appendprop_addrrange(fdt, 0, chosen_node, "linux,kho-mem", + image->kho.mem_cache.mem, + image->kho.mem_cache.bufsz); + if (ret) + goto out; + +out: +#endif + return ret; +} + /* * of_kexec_alloc_and_setup_fdt - Alloc and setup a new Flattened Device Tree * @@ -412,6 +443,11 @@ void *of_kexec_alloc_and_setup_fdt(const struct kimage *image, } } + /* Add kho metadata if this is a KHO image */ + ret = kho_add_chosen(image, fdt, chosen_node); + if (ret) + goto out; + /* add bootargs */ if (cmdline) { ret = fdt_setprop_string(fdt, chosen_node, "bootargs", cmdline);