Received: by 2002:a25:824b:0:0:0:0:0 with SMTP id d11csp1342826ybn; Wed, 25 Sep 2019 16:44:46 -0700 (PDT) X-Google-Smtp-Source: APXvYqz/YVOWWjzrjRsKAIwiqw2sk35kFXlMUgURW6XBqtOTwA+tyBMGib/ZNnKnQ5j4CBm2Nozs X-Received: by 2002:a05:6402:13c2:: with SMTP id a2mr605994edx.21.1569455086481; Wed, 25 Sep 2019 16:44:46 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1569455086; cv=none; d=google.com; s=arc-20160816; b=yUG3Wl2umWK7CZVZUwtb4bCtclDnckL9+qSLt5TqPJRuQClL7gaQNAGDKKgIVKxmp3 mzkm4wt0aDimfW7081GLMD1zv0TK3NB6iA5lvu/BmQK9Wamf1KlSK5Rp1KMRiVTCzBlU 1yVSYQPHx6L4lS+jrSpRir9oCweyTK9yGo85DB2rAuBKDhC+jFFD+VfenByMdSlyQ6o1 n7QriAYHGroWPWjN+Q3tk27mlP9/ZFCqfxi0mdT5CWadjckw8A9ATpyTElajel4kN8aF lWA2xgzZljiEMSF7rrBJDCnpwVBf9n0PrjNwxx1TA5HucIOlYXpbQ9VoebGRSAtgObzq oCUA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:to:from:dkim-signature; bh=lqhPf0WylVWrQq3bujKuRCUKeKaYyeeOquS4YZjsMbs=; b=qB4+EzrsBNkJxaYWJa1r652AaB21qHyQIC6emmY/qo9P48UC45h6PIAiDWhCMYWQbu m7syNUNaGc+U2ayP71+0905IaTh7NPyyjjCpzg5LcX143CGgfVNJ1ftgB/GRmwKrlXkI eoZIJQxTfKYAe/K7c5VQ3lStQCHYloAA2YrJwEYp6kj6tpAAuo2xHGhC4Dv1FcXDtNgq k0Lb62ZVXu30KpUptol/BvWjK6KAgxUAp06ZSyXnuYLupGMdfWwEwYdwpJO3I3Eu01qm JTS8Rmrp3Q/lJI8QFGpDVuX1vwI2LbVJfmQDESXjM16nRRpAm/31w86g47VJqRNi6LHW Ngrw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@soleen.com header.s=google header.b=RZqJZ2jM; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d5si306783edq.60.2019.09.25.16.44.22; Wed, 25 Sep 2019 16:44:46 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@soleen.com header.s=google header.b=RZqJZ2jM; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2502651AbfIWUei (ORCPT + 99 others); Mon, 23 Sep 2019 16:34:38 -0400 Received: from mail-pg1-f195.google.com ([209.85.215.195]:34972 "EHLO mail-pg1-f195.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728647AbfIWUei (ORCPT ); Mon, 23 Sep 2019 16:34:38 -0400 Received: by mail-pg1-f195.google.com with SMTP id a24so8659718pgj.2 for ; Mon, 23 Sep 2019 13:34:37 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=soleen.com; s=google; h=from:to:subject:date:message-id:mime-version :content-transfer-encoding; bh=lqhPf0WylVWrQq3bujKuRCUKeKaYyeeOquS4YZjsMbs=; b=RZqJZ2jMiQ4jrVlplk0gInJ2H9AKuD/9MozDl+VOtFFs+4z68Obn9Bk09TPSSP0cT0 TgSq1ja39iNbYKpWpf2355Susly26z95NREFOtyfSXBVLGy0QcVGFyAqEJPlhtAXuf+5 ZhM4VuRkGoU1gCHP7HrwbPv/kneZVTtd8XT/Dr74pWEsIaeBKVMFUgWTxuDKidTRFGH4 DYIgov3lFIa6nyaSKl6SWF+sKjNRXovwtcRZOJuuefq27ulSTsDsjQqQJWu1yYIHq37p cEiLZJfEBTIsAv4SjPs9UQ7m7C7ejeKkUZb2vg2neglAqqwH1ckgtbxGzZCCp3MX1wht 1NFg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:subject:date:message-id:mime-version :content-transfer-encoding; bh=lqhPf0WylVWrQq3bujKuRCUKeKaYyeeOquS4YZjsMbs=; b=gECjluoK4tpPnd6pKxqmqZd4wibtscFmKt+35GBzikthC34/Urx/YlwUEk81pS6oHz /R/R5VNQcv6ektPkacAtNXOyhzYJbxuiQUwdfH3Ipmoq6pPJ6qdtZbIu80UIFZLfTWoa wXCyiYrAIy/I0jK72u3lHsxEGgfbcxy2x9/ZpDBlYhrQ+1zXGILDqkWNwKXLd43btn6l euYNI3quRQJsmgMrlaxhJ+p37yfOrzGliIxSLAGtQ3BWY1v2H8hPG/mSxkpQyMzofYTM ZJ5rejQmvC1XAs2mWRfkO0waA2A3sQzPgw6GCzlnbszCOP5F5vqbaf23VEoxgSwqOKJL fNzA== X-Gm-Message-State: APjAAAXA2RZwFqJrIoOIr6NcnlMnoljJAsTS6d7SPNyvwX0spm4Z7mK2 md9O4LGUj3fPzTONdQJSXlE3qg== X-Received: by 2002:a63:2943:: with SMTP id p64mr1669712pgp.98.1569270876837; Mon, 23 Sep 2019 13:34:36 -0700 (PDT) Received: from xakep.corp.microsoft.com (c-73-69-118-222.hsd1.nh.comcast.net. [73.69.118.222]) by smtp.gmail.com with ESMTPSA id n29sm12798676pgm.4.2019.09.23.13.34.34 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 23 Sep 2019 13:34:36 -0700 (PDT) From: Pavel Tatashin To: pasha.tatashin@soleen.com, jmorris@namei.org, sashal@kernel.org, ebiederm@xmission.com, kexec@lists.infradead.org, linux-kernel@vger.kernel.org, corbet@lwn.net, catalin.marinas@arm.com, will@kernel.org, linux-arm-kernel@lists.infradead.org, marc.zyngier@arm.com, james.morse@arm.com, vladimir.murzin@arm.com, matthias.bgg@gmail.com, bhsharma@redhat.com, linux-mm@kvack.org, mark.rutland@arm.com Subject: [PATCH v5 00/17] arm64: MMU enabled kexec relocation Date: Mon, 23 Sep 2019 16:34:10 -0400 Message-Id: <20190923203427.294286-1-pasha.tatashin@soleen.com> X-Mailer: git-send-email 2.23.0 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Changelog: v5: - Addressed comments from Matthias Brugger: added review-by's, improved comments, and made cleanups to swsusp_arch_resume() in addition to create_safe_exec_page(). - Synced with mainline tip. v4: - Addressed comments from James Morse. - Split "check pgd table allocation" into two patches, and moved to the beginning of series for simpler backport of the fixes. Added "Fixes:" tags to commit logs. - Changed "arm64, hibernate:" to "arm64: hibernate:" - Added Reviewed-by's - Moved "add PUD_SECT_RDONLY" earlier in series to be with other clean-ups - Added "Derived from:" to arch/arm64/mm/trans_pgd.c - Removed "flags" from trans_info - Changed .trans_alloc_page assumption to return zeroed page. - Simplify changes to trans_pgd_map_page(), by keeping the old code. - Simplify changes to trans_pgd_create_copy, by keeping the old code. - Removed: "add trans_pgd_create_empty" - replace init_mm with NULL, and keep using non "__" version of populate functions. v3: - Split changes to create_safe_exec_page() into several patches for easier review as request by Mark Rutland. This is why this series has 3 more patches. - Renamed trans_table to tans_pgd as agreed with Mark. The header comment in trans_pgd.c explains that trans stands for transitional page tables. Meaning they are used in transition between two kernels. v2: - Fixed hibernate bug reported by James Morse - Addressed comments from James Morse: * More incremental changes to trans_table * Removed TRANS_FORCEMAP * Added kexec reboot data for image with 380M in size. Enable MMU during kexec relocation in order to improve reboot performance. If kexec functionality is used for a fast system update, with a minimal downtime, the relocation of kernel + initramfs takes a significant portion of reboot. The reason for slow relocation is because it is done without MMU, and thus not benefiting from D-Cache. Performance data ---------------- For this experiment, the size of kernel plus initramfs is small, only 25M. If initramfs was larger, than the improvements would be greater, as time spent in relocation is proportional to the size of relocation. Previously: kernel shutdown 0.022131328s relocation 0.440510736s kernel startup 0.294706768s Relocation was taking: 58.2% of reboot time Now: kernel shutdown 0.032066576s relocation 0.022158152s kernel startup 0.296055880s Now: Relocation takes 6.3% of reboot time Total reboot is x2.16 times faster. With bigger userland (fitImage 380M), the reboot time is improved by 3.57s, and is reduced from 3.9s down to 0.33s Previous approaches and discussions ----------------------------------- https://lore.kernel.org/lkml/20190909181221.309510-1-pasha.tatashin@soleen.com version 4 of this series https://lore.kernel.org/lkml/20190821183204.23576-1-pasha.tatashin@soleen.com version 3 of this series https://lore.kernel.org/lkml/20190817024629.26611-1-pasha.tatashin@soleen.com version 2 of this series https://lore.kernel.org/lkml/20190801152439.11363-1-pasha.tatashin@soleen.com version 1 of this series https://lore.kernel.org/lkml/20190709182014.16052-1-pasha.tatashin@soleen.com reserve space for kexec to avoid relocation, involves changes to generic code to optimize a problem that exists on arm64 only: https://lore.kernel.org/lkml/20190716165641.6990-1-pasha.tatashin@soleen.com The first attempt to enable MMU, some bugs that prevented performance improvement. The page tables unnecessary configured idmap for the whole physical space. https://lore.kernel.org/lkml/20190731153857.4045-1-pasha.tatashin@soleen.com No linear copy, bug with EL2 reboots. Pavel Tatashin (17): kexec: quiet down kexec reboot arm64: hibernate: pass the allocated pgdp to ttbr0 arm64: hibernate: check pgd table allocation arm64: hibernate: use get_safe_page directly arm64: hibernate: remove gotos as they are not needed arm64: hibernate: rename dst to page in create_safe_exec_page arm64: hibernate: add PUD_SECT_RDONLY arm64: hibernate: add trans_pgd public functions arm64: hibernate: move page handling function to new trans_pgd.c arm64: trans_pgd: make trans_pgd_map_page generic arm64: trans_pgd: pass allocator trans_pgd_create_copy arm64: trans_pgd: pass NULL instead of init_mm to *_populate functions kexec: add machine_kexec_post_load() arm64: kexec: move relocation function setup and clean up arm64: kexec: add expandable argument to relocation function arm64: kexec: configure trans_pgd page table for kexec arm64: kexec: enable MMU during kexec relocation arch/arm64/Kconfig | 4 + arch/arm64/include/asm/kexec.h | 51 ++++- arch/arm64/include/asm/pgtable-hwdef.h | 1 + arch/arm64/include/asm/trans_pgd.h | 34 ++++ arch/arm64/kernel/asm-offsets.c | 14 ++ arch/arm64/kernel/cpu-reset.S | 4 +- arch/arm64/kernel/cpu-reset.h | 8 +- arch/arm64/kernel/hibernate.c | 245 +++++-------------------- arch/arm64/kernel/machine_kexec.c | 196 ++++++++++++++++---- arch/arm64/kernel/relocate_kernel.S | 196 ++++++++++---------- arch/arm64/mm/Makefile | 1 + arch/arm64/mm/trans_pgd.c | 244 ++++++++++++++++++++++++ kernel/kexec.c | 4 + kernel/kexec_core.c | 8 +- kernel/kexec_file.c | 4 + kernel/kexec_internal.h | 2 + 16 files changed, 674 insertions(+), 342 deletions(-) create mode 100644 arch/arm64/include/asm/trans_pgd.h create mode 100644 arch/arm64/mm/trans_pgd.c -- 2.23.0