Received: by 10.192.165.148 with SMTP id m20csp2688912imm; Sun, 6 May 2018 22:23:34 -0700 (PDT) X-Google-Smtp-Source: AB8JxZoBg5aU/Fix5/fQFXqTAnXVOrLXrEcAKm1BJC1mxxmquG+P9XIeSTzNu0n0Vo5oIzDrMD9z X-Received: by 10.167.134.20 with SMTP id p20mr35526686pfn.159.1525670614504; Sun, 06 May 2018 22:23:34 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1525670614; cv=none; d=google.com; s=arc-20160816; b=TEbwzDv4fsMud3PxU+78JrqaJ1mYHhqnjLtqeCEKSgzNTs6t4nXU1zzIeztTlVczU6 yCsGXaiPiUYvPeNYe/iUCkr03bqh5qUCEXXC3tbaKkvPW7se3EqEkDta9Ywh3m0maQuy Sm5byu+vyXsjZcFHVClv/4/f1Pwhhrc3d50CV25/n+RW1cp/E+1YT1MFVCL9hrMH/vTA mZRqSy7mpK0+SVVOoMbkyjTQLyycC0Xsq2h1sKL0tuQpVVw1lA4B/qsWCWOSfLlNHDrO 7lz9TGf9qqGaqyAr7XshTRf+9YfAemSF8fgOyu3jxpcCLPfLLKHxlZ6oMr7xt8ewyyzI tiCA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:mail-followup-to :message-id:subject:cc:to:from:date:dkim-signature :arc-authentication-results; bh=mJQU5dEh+n9e5hi10uIdg+pJYObJ9Ifr6U65Xwo1T40=; b=Rxo833fW45yHVsFZvsMymrC7ZXbcSCI2kKXr2iJmHkU4SiSPfsMnUgrYXLLfG9zdhb Ybl1Xs80Omn52qjLpYwPRwotE9j5RtheqZdA6kesH7ZAAJ8UffA4yNGFwkn9dQwcU5tK 3B6SFbSlYRY6Ww49ih8B5ZIgPe6Vs2ZmFLaaAPWGiIs+huGCOK/7KYu3pdyDSDh9iF+N gRwrsX8bxGzcF36LwcF1uH+WJrFTbHGGu0w8ecl7mpgCpBoC38iFPrvTL/IQ/v0+suGC sAyhK6UvP3v13Hp4nRENdfns6hZTtri2bJADDHwjbHHhcvSM2u9h2hBtzuYB36MHmYk4 mQVg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=ajqe1RHv; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id g59-v6si22341577plb.381.2018.05.06.22.23.19; Sun, 06 May 2018 22:23:34 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=ajqe1RHv; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751449AbeEGFV0 (ORCPT + 99 others); Mon, 7 May 2018 01:21:26 -0400 Received: from mail-io0-f194.google.com ([209.85.223.194]:45733 "EHLO mail-io0-f194.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750811AbeEGFVX (ORCPT ); Mon, 7 May 2018 01:21:23 -0400 Received: by mail-io0-f194.google.com with SMTP id c9-v6so25842259iob.12 for ; Sun, 06 May 2018 22:21:23 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=date:from:to:cc:subject:message-id:mail-followup-to:references :mime-version:content-disposition:in-reply-to:user-agent; bh=mJQU5dEh+n9e5hi10uIdg+pJYObJ9Ifr6U65Xwo1T40=; b=ajqe1RHvQs0RK0HBS+2dmfgM/Xuv6YySGJnDe5hBxg5L2KiciN5lyQ1FANTLbDwdLP BEXMMmOQKDRphOJF59wALzZVfNcstSI68JYw+jmUYg8pfZhifZrGNZQj12crcvMIBAiT hBb0rcHNd4tboAsVjNPPLBpWiaFFjNdEEfSkQ= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id :mail-followup-to:references:mime-version:content-disposition :in-reply-to:user-agent; bh=mJQU5dEh+n9e5hi10uIdg+pJYObJ9Ifr6U65Xwo1T40=; b=r0AJKwGZ7lKWiseYt79LBo5jA0f6WoiXV/IKwbcBkc5dWi+ecgIAPDBH9cAq0bmlET lC22LJgQpI2q9VwynMMoifWyhc00QT1NibFEuKDmyPA+1ll2xey0ian6kwv7UrDhHQq1 rW/Fm26701WX0G7PQ3cilAK+uC9xa3/cAmmTw1O/RxwOR38aUUCiV1QKi9xL3UHuNrgl HvAVyuU7LHQtaAiTrbalSKcfg+PNTyNS4zq/WAiI6Nj0RMlCKSdCihVTXBReWeOzn6ML woTrw4LQjGoQGq/FSJKElNRwDybLEHKgO3j1wpYdMa5veKwXkZct3dy7ZepQ52znaHCV 8t8w== X-Gm-Message-State: ALQs6tCWXM6ISfkXRVIjLqJDAbkRaL0yr0WpeEjxa8uHPvaUkcdoVfHX pypCLHP9CCkA1dk+Ml2WlgbQY6UTD7M= X-Received: by 2002:a6b:11df:: with SMTP id 92-v6mr37877026ior.156.1525670482905; Sun, 06 May 2018 22:21:22 -0700 (PDT) Received: from linaro.org ([121.95.100.191]) by smtp.googlemail.com with ESMTPSA id n102-v6sm4614683ioe.65.2018.05.06.22.21.18 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Sun, 06 May 2018 22:21:22 -0700 (PDT) Date: Mon, 7 May 2018 14:22:09 +0900 From: AKASHI Takahiro To: James Morse Cc: catalin.marinas@arm.com, will.deacon@arm.com, dhowells@redhat.com, vgoyal@redhat.com, herbert@gondor.apana.org.au, davem@davemloft.net, dyoung@redhat.com, bhe@redhat.com, arnd@arndb.de, ard.biesheuvel@linaro.org, bhsharma@redhat.com, kexec@lists.infradead.org, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH v9 03/11] arm64: kexec_file: invoke the kernel without purgatory Message-ID: <20180507052208.GD11326@linaro.org> Mail-Followup-To: AKASHI Takahiro , James Morse , catalin.marinas@arm.com, will.deacon@arm.com, dhowells@redhat.com, vgoyal@redhat.com, herbert@gondor.apana.org.au, davem@davemloft.net, dyoung@redhat.com, bhe@redhat.com, arnd@arndb.de, ard.biesheuvel@linaro.org, bhsharma@redhat.com, kexec@lists.infradead.org, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org References: <20180425062629.29404-1-takahiro.akashi@linaro.org> <20180425062629.29404-4-takahiro.akashi@linaro.org> <9c830fe8-56d8-b43a-6265-43d31dffe61a@arm.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <9c830fe8-56d8-b43a-6265-43d31dffe61a@arm.com> User-Agent: Mutt/1.5.24 (2015-08-30) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, May 01, 2018 at 06:46:06PM +0100, James Morse wrote: > Hi Akashi, > > On 25/04/18 07:26, AKASHI Takahiro wrote: > > On arm64, purugatory would do almosty nothing. So just invoke secondary > > kernel directy by jumping into its entry code. > > (Nits: purgatory, almost, directly) Oops, I think I ran spell before ... > > > While, in this case, cpu_soft_restart() must be called with dtb address > > in the fifth argument, the behavior still stays compatible with kexec_load > > case as long as the argument is null. > > > > diff --git a/arch/arm64/kernel/cpu-reset.S b/arch/arm64/kernel/cpu-reset.S > > index 8021b46c9743..391df91328ac 100644 > > --- a/arch/arm64/kernel/cpu-reset.S > > +++ b/arch/arm64/kernel/cpu-reset.S > > @@ -24,9 +24,9 @@ > > * > > * @el2_switch: Flag to indicate a swich to EL2 is needed. > > (Nit: switch) ditto > > * @entry: Location to jump to for soft reset. > > - * arg0: First argument passed to @entry. > > - * arg1: Second argument passed to @entry. > > - * arg2: Third argument passed to @entry. > > + * arg0: First argument passed to @entry. (relocation list) > > + * arg1: Second argument passed to @entry.(physcal kernel entry) > > (Nit: physical) ditto > > > + * arg2: Third argument passed to @entry. (physical dtb address) > > * > > * Put the CPU into the same state as it would be if it had been reset, and > > * branch to what would be the reset vector. It must be executed with the > > diff --git a/arch/arm64/kernel/machine_kexec.c b/arch/arm64/kernel/machine_kexec.c > > index f76ea92dff91..f7dbba00be10 100644 > > --- a/arch/arm64/kernel/machine_kexec.c > > +++ b/arch/arm64/kernel/machine_kexec.c > > @@ -205,10 +205,17 @@ void machine_kexec(struct kimage *kimage) > > * uses physical addressing to relocate the new image to its final > > * position and transfers control to the image entry point when the > > * relocation is complete. > > + * In case of kexec_file_load syscall, we directly start the kernel, > > + * skipping purgatory. > > We're not really skipping purgatory, purgatory doesn't exist! For regular kexec > the image/payload we run is up to kexec-tools. For kexec_file_load its a > kernel-image. Purgatory is a kexec-tools-ism. You are right, but in general, purgatory is expected to exist by generic kexec code and does exist on all architectures, kexec_load() or kexec_file_load(), except arm64's kexec_file_load case. So it would be nice to have some explicit notes here. > > > cpu_soft_restart(kimage != kexec_crash_image, > > - reboot_code_buffer_phys, kimage->head, kimage->start, 0); > > + reboot_code_buffer_phys, kimage->head, kimage->start, > > +#ifdef CONFIG_KEXEC_FILE > > + kimage->purgatory_info.purgatory_buf ? > > + 0 : kimage->arch.dtb_mem); > > +#else > > + 0); > > +#endif > > Where does kimage->arch.dtb_mem come from? This patch won't build until patch 8 > adds the config option, which is going to make bisecting any kexec side-effects > tricky. CONFIG_KEXEC_FILE is also used in patch #4, #5 and #6. I don't know how we can fix this as the implementation is divided into several patches. (So bisecting doesn't work anyway.) > purgatory_buf seems to only be set in kexec_purgatory_setup_kbuf(), called from > kexec_load_purgatory(), which we don't use. How does this get a value? > > Would it be better to always use kimage->arch.dtb_mem, and ensure that is 0 for > regular kexec (as we can't know where the dtb is)? (image_arg may then be a > better name). The problem is arch.dtb_mem is currently defined only if CONFIG_KEXEC_FILE. So I would like to - merge this patch with patch#8 - change the condition #ifdef CONFIG_KEXEC_FILE kimage->file_mode ? kimage->arch.dtb_mem : 0); #else 0); #endif Thanks, -Takahiro AKASHI > > Thanks, > > James