All of lore.kernel.org
 help / color / mirror / Atom feed
From: AKASHI Takahiro <takahiro.akashi@linaro.org>
To: James Morse <james.morse@arm.com>
Cc: catalin.marinas@arm.com, will.deacon@arm.com,
	dhowells@redhat.com, vgoyal@redhat.com,
	herbert@gondor.apana.org.au, davem@davemloft.net,
	dyoung@redhat.com, bhe@redhat.com, arnd@arndb.de,
	schwidefsky@de.ibm.com, heiko.carstens@de.ibm.com,
	ard.biesheuvel@linaro.org, bhsharma@redhat.com,
	kexec@lists.infradead.org, linux-arm-kernel@lists.infradead.org,
	linux-kernel@vger.kernel.org
Subject: Re: [PATCH v12 13/16] arm64: kexec_file: invoke the kernel without purgatory
Date: Fri, 27 Jul 2018 16:22:43 +0900	[thread overview]
Message-ID: <20180727072242.GH11258@linaro.org> (raw)
In-Reply-To: <b9257c90-a538-fb82-b9de-574d68d06fbd@arm.com>

On Thu, Jul 26, 2018 at 02:36:07PM +0100, James Morse wrote:
> Hi Akashi,
> 
> On 24/07/18 07:57, AKASHI Takahiro wrote:
> > On arm64, purgatory would do almost nothing. So just invoke secondary
> > kernel directly by jumping into its entry code.
> > 
> > While, in this case, cpu_soft_restart() must be called with dtb address
> > in the fifth argument, the behavior still stays compatible with kexec_load
> > case as long as the argument is null.
> 
> This patch conflicts with commit 76f4e2da45b4 ("arm64: kexec: always reset to
> EL2 if present") in the arm64 tree.

I haven't noticed Mark's patch.

I'm going to have to refresh my memory regarding why I introduced
el2_switch when I implemented kdump.
According to my current memory, however, I added
kvm_arch_hardware_enable/disable(), and associated functions, to gracefully
shutdown EL2 in case of kexec. Since we have no chance to call reset
function (via notifier) at kdump, I believed that el2_switch was necessary
for better chance of successful kdump.

Thanks,
-Takahiro AKASHI

> Thanks,
> 
> James
> 
> > diff --git a/arch/arm64/kernel/machine_kexec.c b/arch/arm64/kernel/machine_kexec.c
> > index f76ea92dff91..830a5063e09d 100644
> > --- a/arch/arm64/kernel/machine_kexec.c
> > +++ b/arch/arm64/kernel/machine_kexec.c
> > @@ -205,10 +205,18 @@ void machine_kexec(struct kimage *kimage)
> >  	 * uses physical addressing to relocate the new image to its final
> >  	 * position and transfers control to the image entry point when the
> >  	 * relocation is complete.
> > +	 * In kexec case, kimage->start points to purgatory assuming that
> > +	 * kernel entry and dtb address are embedded in purgatory by
> > +	 * userspace (kexec-tools).
> > +	 * In kexec_file case, the kernel starts directly without purgatory.
> >  	 */
> > -
> >  	cpu_soft_restart(kimage != kexec_crash_image,
> > -		reboot_code_buffer_phys, kimage->head, kimage->start, 0);
> > +		reboot_code_buffer_phys, kimage->head, kimage->start,
> > +#ifdef CONFIG_KEXEC_FILE
> > +						kimage->arch.dtb_mem);
> > +#else
> > +						0);
> > +#endif
> >  
> >  	BUG(); /* Should never get here. */
> >  }

WARNING: multiple messages have this Message-ID (diff)
From: takahiro.akashi@linaro.org (AKASHI Takahiro)
To: linux-arm-kernel@lists.infradead.org
Subject: [PATCH v12 13/16] arm64: kexec_file: invoke the kernel without purgatory
Date: Fri, 27 Jul 2018 16:22:43 +0900	[thread overview]
Message-ID: <20180727072242.GH11258@linaro.org> (raw)
In-Reply-To: <b9257c90-a538-fb82-b9de-574d68d06fbd@arm.com>

On Thu, Jul 26, 2018 at 02:36:07PM +0100, James Morse wrote:
> Hi Akashi,
> 
> On 24/07/18 07:57, AKASHI Takahiro wrote:
> > On arm64, purgatory would do almost nothing. So just invoke secondary
> > kernel directly by jumping into its entry code.
> > 
> > While, in this case, cpu_soft_restart() must be called with dtb address
> > in the fifth argument, the behavior still stays compatible with kexec_load
> > case as long as the argument is null.
> 
> This patch conflicts with commit 76f4e2da45b4 ("arm64: kexec: always reset to
> EL2 if present") in the arm64 tree.

I haven't noticed Mark's patch.

I'm going to have to refresh my memory regarding why I introduced
el2_switch when I implemented kdump.
According to my current memory, however, I added
kvm_arch_hardware_enable/disable(), and associated functions, to gracefully
shutdown EL2 in case of kexec. Since we have no chance to call reset
function (via notifier) at kdump, I believed that el2_switch was necessary
for better chance of successful kdump.

Thanks,
-Takahiro AKASHI

> Thanks,
> 
> James
> 
> > diff --git a/arch/arm64/kernel/machine_kexec.c b/arch/arm64/kernel/machine_kexec.c
> > index f76ea92dff91..830a5063e09d 100644
> > --- a/arch/arm64/kernel/machine_kexec.c
> > +++ b/arch/arm64/kernel/machine_kexec.c
> > @@ -205,10 +205,18 @@ void machine_kexec(struct kimage *kimage)
> >  	 * uses physical addressing to relocate the new image to its final
> >  	 * position and transfers control to the image entry point when the
> >  	 * relocation is complete.
> > +	 * In kexec case, kimage->start points to purgatory assuming that
> > +	 * kernel entry and dtb address are embedded in purgatory by
> > +	 * userspace (kexec-tools).
> > +	 * In kexec_file case, the kernel starts directly without purgatory.
> >  	 */
> > -
> >  	cpu_soft_restart(kimage != kexec_crash_image,
> > -		reboot_code_buffer_phys, kimage->head, kimage->start, 0);
> > +		reboot_code_buffer_phys, kimage->head, kimage->start,
> > +#ifdef CONFIG_KEXEC_FILE
> > +						kimage->arch.dtb_mem);
> > +#else
> > +						0);
> > +#endif
> >  
> >  	BUG(); /* Should never get here. */
> >  }

WARNING: multiple messages have this Message-ID (diff)
From: AKASHI Takahiro <takahiro.akashi@linaro.org>
To: James Morse <james.morse@arm.com>
Cc: herbert@gondor.apana.org.au, bhe@redhat.com,
	ard.biesheuvel@linaro.org, catalin.marinas@arm.com,
	bhsharma@redhat.com, will.deacon@arm.com,
	linux-kernel@vger.kernel.org, heiko.carstens@de.ibm.com,
	dhowells@redhat.com, arnd@arndb.de,
	linux-arm-kernel@lists.infradead.org, kexec@lists.infradead.org,
	schwidefsky@de.ibm.com, dyoung@redhat.com, davem@davemloft.net,
	vgoyal@redhat.com
Subject: Re: [PATCH v12 13/16] arm64: kexec_file: invoke the kernel without purgatory
Date: Fri, 27 Jul 2018 16:22:43 +0900	[thread overview]
Message-ID: <20180727072242.GH11258@linaro.org> (raw)
In-Reply-To: <b9257c90-a538-fb82-b9de-574d68d06fbd@arm.com>

On Thu, Jul 26, 2018 at 02:36:07PM +0100, James Morse wrote:
> Hi Akashi,
> 
> On 24/07/18 07:57, AKASHI Takahiro wrote:
> > On arm64, purgatory would do almost nothing. So just invoke secondary
> > kernel directly by jumping into its entry code.
> > 
> > While, in this case, cpu_soft_restart() must be called with dtb address
> > in the fifth argument, the behavior still stays compatible with kexec_load
> > case as long as the argument is null.
> 
> This patch conflicts with commit 76f4e2da45b4 ("arm64: kexec: always reset to
> EL2 if present") in the arm64 tree.

I haven't noticed Mark's patch.

I'm going to have to refresh my memory regarding why I introduced
el2_switch when I implemented kdump.
According to my current memory, however, I added
kvm_arch_hardware_enable/disable(), and associated functions, to gracefully
shutdown EL2 in case of kexec. Since we have no chance to call reset
function (via notifier) at kdump, I believed that el2_switch was necessary
for better chance of successful kdump.

Thanks,
-Takahiro AKASHI

> Thanks,
> 
> James
> 
> > diff --git a/arch/arm64/kernel/machine_kexec.c b/arch/arm64/kernel/machine_kexec.c
> > index f76ea92dff91..830a5063e09d 100644
> > --- a/arch/arm64/kernel/machine_kexec.c
> > +++ b/arch/arm64/kernel/machine_kexec.c
> > @@ -205,10 +205,18 @@ void machine_kexec(struct kimage *kimage)
> >  	 * uses physical addressing to relocate the new image to its final
> >  	 * position and transfers control to the image entry point when the
> >  	 * relocation is complete.
> > +	 * In kexec case, kimage->start points to purgatory assuming that
> > +	 * kernel entry and dtb address are embedded in purgatory by
> > +	 * userspace (kexec-tools).
> > +	 * In kexec_file case, the kernel starts directly without purgatory.
> >  	 */
> > -
> >  	cpu_soft_restart(kimage != kexec_crash_image,
> > -		reboot_code_buffer_phys, kimage->head, kimage->start, 0);
> > +		reboot_code_buffer_phys, kimage->head, kimage->start,
> > +#ifdef CONFIG_KEXEC_FILE
> > +						kimage->arch.dtb_mem);
> > +#else
> > +						0);
> > +#endif
> >  
> >  	BUG(); /* Should never get here. */
> >  }

_______________________________________________
kexec mailing list
kexec@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/kexec

  reply	other threads:[~2018-07-27  7:21 UTC|newest]

Thread overview: 99+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2018-07-24  6:57 [PATCH v12 00/16] arm64: kexec: add kexec_file_load() support AKASHI Takahiro
2018-07-24  6:57 ` AKASHI Takahiro
2018-07-24  6:57 ` AKASHI Takahiro
2018-07-24  6:57 ` [PATCH v12 01/16] asm-generic: add kexec_file_load system call to unistd.h AKASHI Takahiro
2018-07-24  6:57   ` AKASHI Takahiro
2018-07-24  6:57   ` AKASHI Takahiro
2018-07-26 13:35   ` James Morse
2018-07-26 13:35     ` James Morse
2018-07-26 13:35     ` James Morse
2018-07-27  5:22     ` AKASHI Takahiro
2018-07-27  5:22       ` AKASHI Takahiro
2018-07-27  5:22       ` AKASHI Takahiro
2018-07-24  6:57 ` [PATCH v12 02/16] kexec_file: make kexec_image_post_load_cleanup_default() global AKASHI Takahiro
2018-07-24  6:57   ` AKASHI Takahiro
2018-07-24  6:57   ` AKASHI Takahiro
2018-07-24  6:57 ` [PATCH v12 03/16] s390, kexec_file: drop arch_kexec_mem_walk() AKASHI Takahiro
2018-07-24  6:57   ` AKASHI Takahiro
2018-07-24  6:57   ` AKASHI Takahiro
2018-07-24  9:23   ` Philipp Rudo
2018-07-24  9:23     ` Philipp Rudo
2018-07-24  9:23     ` Philipp Rudo
2018-07-24  6:57 ` [PATCH v12 04/16] powerpc, kexec_file: factor out memblock-based arch_kexec_walk_mem() AKASHI Takahiro
2018-07-24  6:57   ` AKASHI Takahiro
2018-07-24  6:57   ` AKASHI Takahiro
2018-07-25 12:31   ` Dave Young
2018-07-25 12:31     ` Dave Young
2018-07-25 12:31     ` Dave Young
2018-07-27  5:25     ` AKASHI Takahiro
2018-07-27  5:25       ` AKASHI Takahiro
2018-07-27  5:25       ` AKASHI Takahiro
2018-07-24  6:57 ` [PATCH v12 05/16] kexec_file: kexec_walk_memblock() only walks a dedicated region at kdump AKASHI Takahiro
2018-07-24  6:57   ` AKASHI Takahiro
2018-07-24  6:57   ` AKASHI Takahiro
2018-07-24  6:57 ` [PATCH v12 06/16] of/fdt: add helper functions for handling properties AKASHI Takahiro
2018-07-24  6:57   ` AKASHI Takahiro
2018-07-24  6:57   ` AKASHI Takahiro
2018-07-24  6:57 ` [PATCH v12 07/16] arm64: add image head flag definitions AKASHI Takahiro
2018-07-24  6:57   ` AKASHI Takahiro
2018-07-24  6:57   ` AKASHI Takahiro
2018-07-24  6:57 ` [PATCH v12 08/16] arm64: cpufeature: add MMFR0 helper functions AKASHI Takahiro
2018-07-24  6:57   ` AKASHI Takahiro
2018-07-24  6:57   ` AKASHI Takahiro
2018-07-24  6:57 ` [PATCH v12 09/16] arm64: enable KEXEC_FILE config AKASHI Takahiro
2018-07-24  6:57   ` AKASHI Takahiro
2018-07-24  6:57   ` AKASHI Takahiro
2018-07-24  6:57 ` [PATCH v12 10/16] arm64: kexec_file: load initrd and device-tree AKASHI Takahiro
2018-07-24  6:57   ` AKASHI Takahiro
2018-07-24  6:57   ` AKASHI Takahiro
2018-07-26 13:34   ` James Morse
2018-07-26 13:34     ` James Morse
2018-07-26 13:34     ` James Morse
2018-07-27  5:37     ` AKASHI Takahiro
2018-07-27  5:37       ` AKASHI Takahiro
2018-07-27  5:37       ` AKASHI Takahiro
2018-07-24  6:57 ` [PATCH v12 11/16] arm64: kexec_file: allow for loading Image-format kernel AKASHI Takahiro
2018-07-24  6:57   ` AKASHI Takahiro
2018-07-24  6:57   ` AKASHI Takahiro
2018-07-24  6:57 ` [PATCH v12 12/16] arm64: kexec_file: add crash dump support AKASHI Takahiro
2018-07-24  6:57   ` AKASHI Takahiro
2018-07-24  6:57   ` AKASHI Takahiro
2018-07-26 13:36   ` James Morse
2018-07-26 13:36     ` James Morse
2018-07-26 13:36     ` James Morse
2018-07-27  7:00     ` AKASHI Takahiro
2018-07-27  7:00       ` AKASHI Takahiro
2018-07-27  7:00       ` AKASHI Takahiro
2018-07-24  6:57 ` [PATCH v12 13/16] arm64: kexec_file: invoke the kernel without purgatory AKASHI Takahiro
2018-07-24  6:57   ` AKASHI Takahiro
2018-07-24  6:57   ` AKASHI Takahiro
2018-07-26 13:36   ` James Morse
2018-07-26 13:36     ` James Morse
2018-07-26 13:36     ` James Morse
2018-07-27  7:22     ` AKASHI Takahiro [this message]
2018-07-27  7:22       ` AKASHI Takahiro
2018-07-27  7:22       ` AKASHI Takahiro
2018-07-24  6:57 ` [PATCH v12 14/16] include: pe.h: remove message[] from mz header definition AKASHI Takahiro
2018-07-24  6:57   ` AKASHI Takahiro
2018-07-24  6:57   ` AKASHI Takahiro
2018-07-24  6:57 ` [PATCH v12 15/16] arm64: kexec_file: add kernel signature verification support AKASHI Takahiro
2018-07-24  6:57   ` AKASHI Takahiro
2018-07-24  6:57   ` AKASHI Takahiro
2018-07-26 13:39   ` James Morse
2018-07-26 13:39     ` James Morse
2018-07-26 13:39     ` James Morse
2018-07-24  6:57 ` [PATCH v12 16/16] arm64: kexec_file: add kaslr support AKASHI Takahiro
2018-07-24  6:57   ` AKASHI Takahiro
2018-07-24  6:57   ` AKASHI Takahiro
2018-07-26 13:40   ` James Morse
2018-07-26 13:40     ` James Morse
2018-07-26 13:40     ` James Morse
2018-07-27  8:31     ` AKASHI Takahiro
2018-07-27  8:31       ` AKASHI Takahiro
2018-07-27  8:31       ` AKASHI Takahiro
     [not found]       ` <405b6708-4518-d81e-3938-39032c2b487e@arm.com>
2018-07-27  9:28         ` Ard Biesheuvel
2018-07-27  9:28           ` Ard Biesheuvel
2018-07-27  9:28           ` Ard Biesheuvel
2018-08-01  7:57         ` AKASHI Takahiro
2018-08-01  7:57           ` AKASHI Takahiro
2018-08-01  7:57           ` AKASHI Takahiro

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20180727072242.GH11258@linaro.org \
    --to=takahiro.akashi@linaro.org \
    --cc=ard.biesheuvel@linaro.org \
    --cc=arnd@arndb.de \
    --cc=bhe@redhat.com \
    --cc=bhsharma@redhat.com \
    --cc=catalin.marinas@arm.com \
    --cc=davem@davemloft.net \
    --cc=dhowells@redhat.com \
    --cc=dyoung@redhat.com \
    --cc=heiko.carstens@de.ibm.com \
    --cc=herbert@gondor.apana.org.au \
    --cc=james.morse@arm.com \
    --cc=kexec@lists.infradead.org \
    --cc=linux-arm-kernel@lists.infradead.org \
    --cc=linux-kernel@vger.kernel.org \
    --cc=schwidefsky@de.ibm.com \
    --cc=vgoyal@redhat.com \
    --cc=will.deacon@arm.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.