From mboxrd@z Thu Jan 1 00:00:00 1970 From: panand@redhat.com (Pratyush Anand) Date: Wed, 9 Dec 2015 14:58:39 +0530 Subject: [PATCH] kexec: Add --lite option In-Reply-To: <5666FE91.5010302@arm.com> References: <1445469125.30908.105.camel@infradead.org> <20151022031718.GB11227@dhcp-129-115.nay.redhat.com> <20151022125012.GB20847@redhat.com> <1445540891.30908.144.camel@infradead.org> <1446703011.12676.83.camel@freescale.com> <20151207114547.GE16406@dhcppc13.redhat.com> <20151207114839.GF16406@dhcppc13.redhat.com> <56658696.6070103@arm.com> <20151207140755.GG16406@dhcppc13.redhat.com> <5666FE91.5010302@arm.com> Message-ID: <20151209092839.GN16406@dhcppc13.redhat.com> To: linux-arm-kernel@lists.infradead.org List-Id: linux-arm-kernel.lists.infradead.org Hi James, On 08/12/2015:04:00:17 PM, James Morse wrote: > Hi Pratyush, > > On 07/12/15 14:07, Pratyush Anand wrote: > > On 07/12/2015:01:16:06 PM, James Morse wrote: > >> I haven't benchmarked this, but: > >> > >> util_lib/sha256.c contains calls out to memcpy(). > >> In your case 1, this will use the glibc version. In case 2, it will use > >> the version implemented in purgatory/string.c, which is a byte-by-byte copy. > >> > > > > Yes, I agree that byte copy is too slow. But, memcpy() in sha256_update() will > > copy only few bytes (I think max 126 bytes). Most of the data will be processed > > using loop while( length >= 64 ){}, where we do not have any memcpy.So, I do not > > think that this would be causing such a difference. > > You're right, I benchmarked the two sha256.o files checksumming a 10MB > buffer - one takes 0.6s, the other 1.7s, we can probably expect a couple > of seconds to do this. > > Is the sha256 really useful? Purgatory can't print out an error message, > if it fails... kdump needs the sha256 integrity checks. Please see previous reply from Dave, Vivek and Eric in this thread. Purgatory prints error message, in case sha256 fails. It prints expected and calculated sha256 values. You must pass --port with proper value to see print messages. Geoff has been able to see purgatory debug messages on foundation model only with --port, however I need below patch and pass --port-lsr as well in order to print all the characters properly. https://github.com/pratyushanand/kexec-tools/commit/ab30f4015189b177dd2e78980f5b7e47c2d22fe4 So, on a system having pl011 base address 0xe1010000, I pass --port=0xe1010000 --port-lsr=0xe1010018,0x80 to the kexec command. > > > > Could it be the case that I am not using perfect memory attributes while setting > > up identity mapping and enabling D-cache. My implementation is here: > > https://github.com/pratyushanand/kexec-tools/commit/8efdbc56b52f99a8a074edd0ddc519d7b68be82f > First of all, thanks a lot for taking out your time to review it :-) > I'm no expert, but that looks like you're setting it up as 'normal' Me too not an expert. Shouldn't it be normal type memory? I think, I will need to define only UART area as device type (currently it is not defined, and so I am not able to use print message while mmu is enabled). > memory. You're missing some isb-s and tlbi-s: depending on how long the > changes to system state take, you may be using old memory-attributes or > page-tables. If you depend on a change to system state, (like turning > the mmu on), you need explicit synchronisation, see section 12.3.2 of > the 'Architecture Programmers Guide' (arm den0024a), and D7.1.2 of the > ARM ARM. I will go through these docs and kernel arch/arm64/kernel/head.S and will rewrite the cache implementation. > > I haven't managed to get your kexec-tools branch to work with v10 of May be you can try master branch. It is almost same as that of Geoff's. Additionally, it has support to "wait for transmit completion before next character transmission". > Geoff's series. It looks like you save registers to the stack, which > give stale values once you turn the mmu off. You also do the opposite, > saving registers with the mmu off, then cleaning cache lines over the > top, corrupting the saved registers. > > The page size of 64K is hard coded. Kexec-ing from a 4K kernel, to a 4K > kernel will work, but only if the hardware also supports 64K, this will > be surprising to debug. OK, I will take care in the re-implementation. Thanks ~Pratyush From mboxrd@z Thu Jan 1 00:00:00 1970 Return-path: Date: Wed, 9 Dec 2015 14:58:39 +0530 From: Pratyush Anand Subject: Re: [PATCH] kexec: Add --lite option Message-ID: <20151209092839.GN16406@dhcppc13.redhat.com> References: <1445469125.30908.105.camel@infradead.org> <20151022031718.GB11227@dhcp-129-115.nay.redhat.com> <20151022125012.GB20847@redhat.com> <1445540891.30908.144.camel@infradead.org> <1446703011.12676.83.camel@freescale.com> <20151207114547.GE16406@dhcppc13.redhat.com> <20151207114839.GF16406@dhcppc13.redhat.com> <56658696.6070103@arm.com> <20151207140755.GG16406@dhcppc13.redhat.com> <5666FE91.5010302@arm.com> MIME-Version: 1.0 Content-Disposition: inline In-Reply-To: <5666FE91.5010302@arm.com> List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Sender: "kexec" Errors-To: kexec-bounces+dwmw2=infradead.org@lists.infradead.org To: James Morse Cc: Geoff Levand , kexec@lists.infradead.org, Simon Horman , Vivek Goyal , Petitboot@lists.ozlabs.org, Scott Wood , Dave Young , linux-arm-kernel@lists.infradead.org Hi James, On 08/12/2015:04:00:17 PM, James Morse wrote: > Hi Pratyush, > > On 07/12/15 14:07, Pratyush Anand wrote: > > On 07/12/2015:01:16:06 PM, James Morse wrote: > >> I haven't benchmarked this, but: > >> > >> util_lib/sha256.c contains calls out to memcpy(). > >> In your case 1, this will use the glibc version. In case 2, it will use > >> the version implemented in purgatory/string.c, which is a byte-by-byte copy. > >> > > > > Yes, I agree that byte copy is too slow. But, memcpy() in sha256_update() will > > copy only few bytes (I think max 126 bytes). Most of the data will be processed > > using loop while( length >= 64 ){}, where we do not have any memcpy.So, I do not > > think that this would be causing such a difference. > > You're right, I benchmarked the two sha256.o files checksumming a 10MB > buffer - one takes 0.6s, the other 1.7s, we can probably expect a couple > of seconds to do this. > > Is the sha256 really useful? Purgatory can't print out an error message, > if it fails... kdump needs the sha256 integrity checks. Please see previous reply from Dave, Vivek and Eric in this thread. Purgatory prints error message, in case sha256 fails. It prints expected and calculated sha256 values. You must pass --port with proper value to see print messages. Geoff has been able to see purgatory debug messages on foundation model only with --port, however I need below patch and pass --port-lsr as well in order to print all the characters properly. https://github.com/pratyushanand/kexec-tools/commit/ab30f4015189b177dd2e78980f5b7e47c2d22fe4 So, on a system having pl011 base address 0xe1010000, I pass --port=0xe1010000 --port-lsr=0xe1010018,0x80 to the kexec command. > > > > Could it be the case that I am not using perfect memory attributes while setting > > up identity mapping and enabling D-cache. My implementation is here: > > https://github.com/pratyushanand/kexec-tools/commit/8efdbc56b52f99a8a074edd0ddc519d7b68be82f > First of all, thanks a lot for taking out your time to review it :-) > I'm no expert, but that looks like you're setting it up as 'normal' Me too not an expert. Shouldn't it be normal type memory? I think, I will need to define only UART area as device type (currently it is not defined, and so I am not able to use print message while mmu is enabled). > memory. You're missing some isb-s and tlbi-s: depending on how long the > changes to system state take, you may be using old memory-attributes or > page-tables. If you depend on a change to system state, (like turning > the mmu on), you need explicit synchronisation, see section 12.3.2 of > the 'Architecture Programmers Guide' (arm den0024a), and D7.1.2 of the > ARM ARM. I will go through these docs and kernel arch/arm64/kernel/head.S and will rewrite the cache implementation. > > I haven't managed to get your kexec-tools branch to work with v10 of May be you can try master branch. It is almost same as that of Geoff's. Additionally, it has support to "wait for transmit completion before next character transmission". > Geoff's series. It looks like you save registers to the stack, which > give stale values once you turn the mmu off. You also do the opposite, > saving registers with the mmu off, then cleaning cache lines over the > top, corrupting the saved registers. > > The page size of 64K is hard coded. Kexec-ing from a 4K kernel, to a 4K > kernel will work, but only if the hardware also supports 64K, this will > be surprising to debug. OK, I will take care in the re-implementation. Thanks ~Pratyush _______________________________________________ kexec mailing list kexec@lists.infradead.org http://lists.infradead.org/mailman/listinfo/kexec