From: Alex Ghiti <alex@ghiti.fr> To: David Hildenbrand <david@redhat.com>, Paul Walmsley <paul.walmsley@sifive.com>, Palmer Dabbelt <palmer@dabbelt.com>, Albert Ou <aou@eecs.berkeley.edu>, linux-riscv@lists.infradead.org, linux-kernel@vger.kernel.org, linux-arch@vger.kernel.org, linux-mm@kvack.org Cc: Vitaly Wool <vitaly.wool@konsulko.com>, Mike Rapoport <rppt@linux.ibm.com> Subject: Re: [PATCH v7] RISC-V: enable XIP Date: Fri, 9 Apr 2021 08:57:51 -0400 [thread overview] Message-ID: <e06f5c63-c897-51a8-8398-ff844a27ff48@ghiti.fr> (raw) In-Reply-To: <d4d771a8-c731-acaf-b42d-44800c61f2e6@redhat.com> Le 4/9/21 à 8:07 AM, David Hildenbrand a écrit : > On 09.04.21 13:39, Alex Ghiti wrote: >> Hi David, >> >> Le 4/9/21 à 4:23 AM, David Hildenbrand a écrit : >>> On 09.04.21 09:14, Alex Ghiti wrote: >>>> Le 4/9/21 à 2:51 AM, Alexandre Ghiti a écrit : >>>>> From: Vitaly Wool <vitaly.wool@konsulko.com> >>>>> >>>>> Introduce XIP (eXecute In Place) support for RISC-V platforms. >>>>> It allows code to be executed directly from non-volatile storage >>>>> directly addressable by the CPU, such as QSPI NOR flash which can >>>>> be found on many RISC-V platforms. This makes way for significant >>>>> optimization of RAM footprint. The XIP kernel is not compressed >>>>> since it has to run directly from flash, so it will occupy more >>>>> space on the non-volatile storage. The physical flash address used >>>>> to link the kernel object files and for storing it has to be known >>>>> at compile time and is represented by a Kconfig option. >>>>> >>>>> XIP on RISC-V will for the time being only work on MMU-enabled >>>>> kernels. >>>>> >>>> I added linux-mm and linux-arch to get feedbacks because I noticed that >>>> DEBUG_VM_PGTABLE fails for SPARSEMEM (it works for FLATMEM but I think >>>> it does not do what is expected): the fact that we don't have any >>>> struct >>>> page to back the text and rodata in flash is the problem but to which >>>> extent ? >>> >>> Just wondering, why can't we create a memmap for that memory -- or is it >>> even desireable to not do that explicity? There might be some nasty side >>> effects when not having a memmap for text and rodata. >> >> >> Do you have examples of such effects ? Any feature that will not work >> without that ? >> > > At least if it's not part of /proc/iomem in any way (maybe "System RAM" > is not what we want without a memmap, TBD), kexec-tools won't be able to > handle it properly e.g., for kdump. But not sure if that is really > relevant in your setup. > > Regarding other features, anything that does a pfn_valid(), > pfn_to_page() or pfn_to_online_page() would behave differently now -- > assuming the kernel doesn't fall into a section with other System RAM > (whereby we would still allocate the memmap for the whole section). > > I guess you might stumble over some surprises in some code paths, but > nothing really comes to mind. Not sure if your zeropage is part of the > kernel image on RISC-V (I remember that we sometimes need a memmap > there, but I might be wrong)? It is in the kernel image and is located in bss which will be in RAM and then be backed by a memmap. > > I assume you still somehow create the direct mapping for the kernel, > right? So it's really some memory region with a direct mapping but > without a memmap (and right now, without a resource), correct? > No I don't create any direct mapping for the text and the rodata. > [...] > >>> >>> Also, will that memory properly be exposed in the resource tree as >>> System RAM (e.g., /proc/iomem) ? Otherwise some things (/proc/kcore) >>> won't work as expected - the kernel won't be included in a dump. >> >> >> I have just checked and it does not appear in /proc/iomem. >> >> Ok your conclusion would be to have struct page, I'm going to implement >> this version then using memblock as you described. > > Let's first evaluate what the harm could be. You could (and should?) > create the kernel resource manually - IIRC, that's independent of the > memmap/memblock thing. > > @Mike, what's your take on not having a memmap for kernel text and ro data? >
WARNING: multiple messages have this Message-ID (diff)
From: Alex Ghiti <alex@ghiti.fr> To: David Hildenbrand <david@redhat.com>, Paul Walmsley <paul.walmsley@sifive.com>, Palmer Dabbelt <palmer@dabbelt.com>, Albert Ou <aou@eecs.berkeley.edu>, linux-riscv@lists.infradead.org, linux-kernel@vger.kernel.org, linux-arch@vger.kernel.org, linux-mm@kvack.org Cc: Vitaly Wool <vitaly.wool@konsulko.com>, Mike Rapoport <rppt@linux.ibm.com> Subject: Re: [PATCH v7] RISC-V: enable XIP Date: Fri, 9 Apr 2021 08:57:51 -0400 [thread overview] Message-ID: <e06f5c63-c897-51a8-8398-ff844a27ff48@ghiti.fr> (raw) In-Reply-To: <d4d771a8-c731-acaf-b42d-44800c61f2e6@redhat.com> Le 4/9/21 à 8:07 AM, David Hildenbrand a écrit : > On 09.04.21 13:39, Alex Ghiti wrote: >> Hi David, >> >> Le 4/9/21 à 4:23 AM, David Hildenbrand a écrit : >>> On 09.04.21 09:14, Alex Ghiti wrote: >>>> Le 4/9/21 à 2:51 AM, Alexandre Ghiti a écrit : >>>>> From: Vitaly Wool <vitaly.wool@konsulko.com> >>>>> >>>>> Introduce XIP (eXecute In Place) support for RISC-V platforms. >>>>> It allows code to be executed directly from non-volatile storage >>>>> directly addressable by the CPU, such as QSPI NOR flash which can >>>>> be found on many RISC-V platforms. This makes way for significant >>>>> optimization of RAM footprint. The XIP kernel is not compressed >>>>> since it has to run directly from flash, so it will occupy more >>>>> space on the non-volatile storage. The physical flash address used >>>>> to link the kernel object files and for storing it has to be known >>>>> at compile time and is represented by a Kconfig option. >>>>> >>>>> XIP on RISC-V will for the time being only work on MMU-enabled >>>>> kernels. >>>>> >>>> I added linux-mm and linux-arch to get feedbacks because I noticed that >>>> DEBUG_VM_PGTABLE fails for SPARSEMEM (it works for FLATMEM but I think >>>> it does not do what is expected): the fact that we don't have any >>>> struct >>>> page to back the text and rodata in flash is the problem but to which >>>> extent ? >>> >>> Just wondering, why can't we create a memmap for that memory -- or is it >>> even desireable to not do that explicity? There might be some nasty side >>> effects when not having a memmap for text and rodata. >> >> >> Do you have examples of such effects ? Any feature that will not work >> without that ? >> > > At least if it's not part of /proc/iomem in any way (maybe "System RAM" > is not what we want without a memmap, TBD), kexec-tools won't be able to > handle it properly e.g., for kdump. But not sure if that is really > relevant in your setup. > > Regarding other features, anything that does a pfn_valid(), > pfn_to_page() or pfn_to_online_page() would behave differently now -- > assuming the kernel doesn't fall into a section with other System RAM > (whereby we would still allocate the memmap for the whole section). > > I guess you might stumble over some surprises in some code paths, but > nothing really comes to mind. Not sure if your zeropage is part of the > kernel image on RISC-V (I remember that we sometimes need a memmap > there, but I might be wrong)? It is in the kernel image and is located in bss which will be in RAM and then be backed by a memmap. > > I assume you still somehow create the direct mapping for the kernel, > right? So it's really some memory region with a direct mapping but > without a memmap (and right now, without a resource), correct? > No I don't create any direct mapping for the text and the rodata. > [...] > >>> >>> Also, will that memory properly be exposed in the resource tree as >>> System RAM (e.g., /proc/iomem) ? Otherwise some things (/proc/kcore) >>> won't work as expected - the kernel won't be included in a dump. >> >> >> I have just checked and it does not appear in /proc/iomem. >> >> Ok your conclusion would be to have struct page, I'm going to implement >> this version then using memblock as you described. > > Let's first evaluate what the harm could be. You could (and should?) > create the kernel resource manually - IIRC, that's independent of the > memmap/memblock thing. > > @Mike, what's your take on not having a memmap for kernel text and ro data? > _______________________________________________ linux-riscv mailing list linux-riscv@lists.infradead.org http://lists.infradead.org/mailman/listinfo/linux-riscv
next prev parent reply other threads:[~2021-04-09 12:58 UTC|newest] Thread overview: 32+ messages / expand[flat|nested] mbox.gz Atom feed top 2021-04-09 6:51 [PATCH v7] RISC-V: enable XIP Alexandre Ghiti 2021-04-09 6:51 ` Alexandre Ghiti 2021-04-09 7:14 ` Alex Ghiti 2021-04-09 7:14 ` Alex Ghiti 2021-04-09 8:23 ` David Hildenbrand 2021-04-09 8:23 ` David Hildenbrand 2021-04-09 11:39 ` Alex Ghiti 2021-04-09 11:39 ` Alex Ghiti 2021-04-09 12:07 ` David Hildenbrand 2021-04-09 12:07 ` David Hildenbrand 2021-04-09 12:57 ` Alex Ghiti [this message] 2021-04-09 12:57 ` Alex Ghiti 2021-04-09 14:10 ` Mike Rapoport 2021-04-09 14:10 ` Mike Rapoport 2021-04-09 14:16 ` David Hildenbrand 2021-04-09 14:16 ` David Hildenbrand 2021-04-09 12:12 ` Mike Rapoport 2021-04-09 12:12 ` Mike Rapoport 2021-04-09 12:46 ` David Hildenbrand 2021-04-09 12:46 ` David Hildenbrand 2021-04-09 13:59 ` Mike Rapoport 2021-04-09 13:59 ` Mike Rapoport 2021-04-09 14:10 ` David Hildenbrand 2021-04-09 14:10 ` David Hildenbrand 2021-04-09 14:42 ` Vitaly Wool 2021-04-09 14:42 ` Vitaly Wool 2021-04-09 14:42 ` Vitaly Wool 2021-04-12 5:12 ` Alex Ghiti 2021-04-12 5:12 ` Alex Ghiti 2021-04-12 7:49 ` Vitaly Wool 2021-04-12 7:49 ` Vitaly Wool 2021-04-12 7:49 ` Vitaly Wool
Reply instructions: You may reply publicly to this message via plain-text email using any one of the following methods: * Save the following mbox file, import it into your mail client, and reply-to-all from there: mbox Avoid top-posting and favor interleaved quoting: https://en.wikipedia.org/wiki/Posting_style#Interleaved_style * Reply using the --to, --cc, and --in-reply-to switches of git-send-email(1): git send-email \ --in-reply-to=e06f5c63-c897-51a8-8398-ff844a27ff48@ghiti.fr \ --to=alex@ghiti.fr \ --cc=aou@eecs.berkeley.edu \ --cc=david@redhat.com \ --cc=linux-arch@vger.kernel.org \ --cc=linux-kernel@vger.kernel.org \ --cc=linux-mm@kvack.org \ --cc=linux-riscv@lists.infradead.org \ --cc=palmer@dabbelt.com \ --cc=paul.walmsley@sifive.com \ --cc=rppt@linux.ibm.com \ --cc=vitaly.wool@konsulko.com \ /path/to/YOUR_REPLY https://kernel.org/pub/software/scm/git/docs/git-send-email.html * If your mail client supports setting the In-Reply-To header via mailto: links, try the mailto: linkBe sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes, see mirroring instructions on how to clone and mirror all data and code used by this external index.