Received: by 2002:a25:31c3:0:0:0:0:0 with SMTP id x186csp2187648ybx; Fri, 8 Nov 2019 01:03:36 -0800 (PST) X-Google-Smtp-Source: APXvYqyOd1aIMuqzVr+PaczBr3Cz2+CcSfvtA0WUONdH2wT9dh5peyRyEjew3pqCs8MUm6JwImQ1 X-Received: by 2002:a05:6402:886:: with SMTP id e6mr8949658edy.46.1573203816284; Fri, 08 Nov 2019 01:03:36 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1573203816; cv=none; d=google.com; s=arc-20160816; b=NLNqv5+T8cenfJMNW31o0pEn3deK7qjVmzizzGlES9VFKSHAFwwcHD9s9EBuW0x7rg 99vgWaX7yaoZGfpWMwpPuwEgzm/3sCozFCRJfLYq3P8Zr7tQkaVwyp+0q/GtEmRjusTR BFrEDBL1ErN7moLdmSAczOb2xLT5EBuHR8mQ27n0DTTYMM2uL2F3qxCE5CuFeomasYhb 9T+tNSmrir5KA8H6yIU94tkArRLdbmYQS87b9JMsC6RqiUQ6hLQ9mraob99gk8JoisYT QwzIX310xMUrHd98AzDit3QvYebXr/OMxFoCTAMdZjq6tEGFuMYwbNYQV/Zvnbgat5tc MS4A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:references :in-reply-to:message-id:date:subject:cc:to:from:dkim-signature; bh=+jjghK9R0lMbuYITPwblyuIiknRGv+8dU2qzMWqZXIA=; b=sY9z5txhUe9ocHMtwKFH3k18GrnyRXqaSiDc79YF8X+Ve1jgum5M3p5KR/sBzUCkPs UBrIAG5tdLaYVkLjOji9CkkbZZgN3EGO6WhuDi9d8uPlznDVjuDq23VYBOcJPO5MrGpE qci0Q01bAi5NU7f6AWw4h3kEhfoL7VxJ7iKZksKNgNxSqtvCtlADGyQLpQm56srV6FzR FtNc+Irev75yjyaXKvwdve9ifK2cDZlCDqEF5I7zxRJ1RMho0q9VDf3j3teONR43vCFi wVHfPtriWeooDRBTs3hHrv2HNRFPBqVwxMXg58qrv3UWUe1TP1k6FKxLODLH8Ie3tYm6 mudQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=EDYC74GQ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id q17si3338163ejm.165.2019.11.08.01.03.11; Fri, 08 Nov 2019 01:03:36 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=EDYC74GQ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731319AbfKHJBF (ORCPT + 99 others); Fri, 8 Nov 2019 04:01:05 -0500 Received: from us-smtp-delivery-1.mimecast.com ([205.139.110.120]:57495 "EHLO us-smtp-1.mimecast.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1731264AbfKHJBE (ORCPT ); Fri, 8 Nov 2019 04:01:04 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1573203662; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=+jjghK9R0lMbuYITPwblyuIiknRGv+8dU2qzMWqZXIA=; b=EDYC74GQLk6mluayMmiSry78xUAddhnz/vo1JEErNUmaS5vVSK0hTy5WvKjd6aAJYLXA2X ZmoALedafuLiu/Uc0tH76NoItNIO66rUtbelCsy8kqd2uzLpKFGYV8afbzAjCyQeFkN4dn v1zuVGWJCViERJEhDV+kJU7J5WT22Jg= Received: from mimecast-mx01.redhat.com (mimecast-mx01.redhat.com [209.132.183.4]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-262-R29VTCIfN3O4-tbuBex1SA-1; Fri, 08 Nov 2019 04:00:59 -0500 Received: from smtp.corp.redhat.com (int-mx05.intmail.prod.int.phx2.redhat.com [10.5.11.15]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx01.redhat.com (Postfix) with ESMTPS id CE5E5180491C; Fri, 8 Nov 2019 09:00:57 +0000 (UTC) Received: from localhost.localdomain.com (ovpn-12-112.pek2.redhat.com [10.72.12.112]) by smtp.corp.redhat.com (Postfix) with ESMTP id 558C05D6A5; Fri, 8 Nov 2019 09:00:51 +0000 (UTC) From: Lianbo Jiang To: linux-kernel@vger.kernel.org Cc: tglx@linutronix.de, mingo@redhat.com, bp@alien8.de, hpa@zytor.com, x86@kernel.org, bhe@redhat.com, dyoung@redhat.com, jgross@suse.com, dhowells@redhat.com, Thomas.Lendacky@amd.com, ebiederm@xmission.com, vgoyal@redhat.com, d.hatayama@fujitsu.com, horms@verge.net.au, kexec@lists.infradead.org Subject: [PATCH 2/3 v9] x86/kdump: clean up all the code related to the backup region Date: Fri, 8 Nov 2019 17:00:26 +0800 Message-Id: <20191108090027.11082-3-lijiang@redhat.com> In-Reply-To: <20191108090027.11082-1-lijiang@redhat.com> References: <20191108090027.11082-1-lijiang@redhat.com> X-Scanned-By: MIMEDefang 2.79 on 10.5.11.15 X-MC-Unique: R29VTCIfN3O4-tbuBex1SA-1 X-Mimecast-Spam-Score: 0 Content-Type: text/plain; charset=WINDOWS-1252 Content-Transfer-Encoding: quoted-printable Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org When the crashkernel kernel command line option is specified, the low 1M memory will always be reserved, which makes that the memory allocated later won't fall into the low 1M area, thereby, it's not necessary to create a backup region and also no need to copy the first 640k content to a backup region. Currently, the code related to the backup region can be safely removed, so lets clean up. Signed-off-by: Lianbo Jiang --- arch/x86/include/asm/kexec.h | 10 ---- arch/x86/include/asm/purgatory.h | 10 ---- arch/x86/kernel/crash.c | 87 ++++-------------------------- arch/x86/kernel/machine_kexec_64.c | 47 ---------------- arch/x86/purgatory/purgatory.c | 19 ------- 5 files changed, 11 insertions(+), 162 deletions(-) diff --git a/arch/x86/include/asm/kexec.h b/arch/x86/include/asm/kexec.h index 5e7d6b46de97..6802c59e8252 100644 --- a/arch/x86/include/asm/kexec.h +++ b/arch/x86/include/asm/kexec.h @@ -66,10 +66,6 @@ struct kimage; # define KEXEC_ARCH KEXEC_ARCH_X86_64 #endif =20 -/* Memory to backup during crash kdump */ -#define KEXEC_BACKUP_SRC_START=09(0UL) -#define KEXEC_BACKUP_SRC_END=09(640 * 1024UL - 1)=09/* 640K */ - /* * This function is responsible for capturing register states if coming * via panic otherwise just fix up the ss and sp if coming via kernel @@ -154,12 +150,6 @@ struct kimage_arch { =09pud_t *pud; =09pmd_t *pmd; =09pte_t *pte; -=09/* Details of backup region */ -=09unsigned long backup_src_start; -=09unsigned long backup_src_sz; - -=09/* Physical address of backup segment */ -=09unsigned long backup_load_addr; =20 =09/* Core ELF header buffer */ =09void *elf_headers; diff --git a/arch/x86/include/asm/purgatory.h b/arch/x86/include/asm/purgat= ory.h index 92c34e517da1..5528e9325049 100644 --- a/arch/x86/include/asm/purgatory.h +++ b/arch/x86/include/asm/purgatory.h @@ -6,16 +6,6 @@ #include =20 extern void purgatory(void); -/* - * These forward declarations serve two purposes: - * - * 1) Make sparse happy when checking arch/purgatory - * 2) Document that these are required to be global so the symbol - * lookup in kexec works - */ -extern unsigned long purgatory_backup_dest; -extern unsigned long purgatory_backup_src; -extern unsigned long purgatory_backup_sz; #endif=09/* __ASSEMBLY__ */ =20 #endif /* _ASM_PURGATORY_H */ diff --git a/arch/x86/kernel/crash.c b/arch/x86/kernel/crash.c index db2301afade5..40b04b6eb675 100644 --- a/arch/x86/kernel/crash.c +++ b/arch/x86/kernel/crash.c @@ -188,8 +188,6 @@ void native_machine_crash_shutdown(struct pt_regs *regs= ) =20 #ifdef CONFIG_KEXEC_FILE =20 -static unsigned long crash_zero_bytes; - static int get_nr_ram_ranges_callback(struct resource *res, void *arg) { =09unsigned int *nr_ranges =3D arg; @@ -232,6 +230,11 @@ static int elf_header_exclude_ranges(struct crash_mem = *cmem) { =09int ret =3D 0; =20 +=09/* Exclude the low 1M because it is always reserved */ +=09ret =3D crash_exclude_mem_range(cmem, 0, 1<<20); +=09if (ret) +=09=09return ret; + =09/* Exclude crashkernel region */ =09ret =3D crash_exclude_mem_range(cmem, crashk_res.start, crashk_res.end)= ; =09if (ret) @@ -261,9 +264,7 @@ static int prepare_elf_headers(struct kimage *image, vo= id **addr, =09=09=09=09=09unsigned long *sz) { =09struct crash_mem *cmem; -=09Elf64_Ehdr *ehdr; -=09Elf64_Phdr *phdr; -=09int ret, i; +=09int ret; =20 =09cmem =3D fill_up_crash_elf_data(); =09if (!cmem) @@ -282,22 +283,7 @@ static int prepare_elf_headers(struct kimage *image, v= oid **addr, =09/* By default prepare 64bit headers */ =09ret =3D crash_prepare_elf64_headers(cmem, =09=09=09=09IS_ENABLED(CONFIG_X86_64), addr, sz); -=09if (ret) -=09=09goto out; =20 -=09/* -=09 * If a range matches backup region, adjust offset to backup -=09 * segment. -=09 */ -=09ehdr =3D (Elf64_Ehdr *)*addr; -=09phdr =3D (Elf64_Phdr *)(ehdr + 1); -=09for (i =3D 0; i < ehdr->e_phnum; phdr++, i++) -=09=09if (phdr->p_type =3D=3D PT_LOAD && -=09=09=09=09phdr->p_paddr =3D=3D image->arch.backup_src_start && -=09=09=09=09phdr->p_memsz =3D=3D image->arch.backup_src_sz) { -=09=09=09phdr->p_offset =3D image->arch.backup_load_addr; -=09=09=09break; -=09=09} out: =09vfree(cmem); =09return ret; @@ -336,19 +322,11 @@ static int memmap_exclude_ranges(struct kimage *image= , struct crash_mem *cmem, =09=09=09=09 unsigned long long mend) { =09unsigned long start, end; -=09int ret =3D 0; =20 =09cmem->ranges[0].start =3D mstart; =09cmem->ranges[0].end =3D mend; =09cmem->nr_ranges =3D 1; =20 -=09/* Exclude Backup region */ -=09start =3D image->arch.backup_load_addr; -=09end =3D start + image->arch.backup_src_sz - 1; -=09ret =3D crash_exclude_mem_range(cmem, start, end); -=09if (ret) -=09=09return ret; - =09/* Exclude elf header region */ =09start =3D image->arch.elf_load_addr; =09end =3D start + image->arch.elf_headers_sz - 1; @@ -371,11 +349,11 @@ int crash_setup_memmap_entries(struct kimage *image, = struct boot_params *params) =09memset(&cmd, 0, sizeof(struct crash_memmap_data)); =09cmd.params =3D params; =20 -=09/* Add first 640K segment */ -=09ei.addr =3D image->arch.backup_src_start; -=09ei.size =3D image->arch.backup_src_sz; -=09ei.type =3D E820_TYPE_RAM; -=09add_e820_entry(params, &ei); +=09/* Add the low 1M */ +=09cmd.type =3D E820_TYPE_RAM; +=09flags =3D IORESOURCE_SYSTEM_RAM | IORESOURCE_BUSY; +=09walk_iomem_res_desc(IORES_DESC_NONE, flags, 0, (1<<20)-1, &cmd, +=09=09=09memmap_entry_callback); =20 =09/* Add ACPI tables */ =09cmd.type =3D E820_TYPE_ACPI; @@ -424,55 +402,12 @@ int crash_setup_memmap_entries(struct kimage *image, = struct boot_params *params) =09return ret; } =20 -static int determine_backup_region(struct resource *res, void *arg) -{ -=09struct kimage *image =3D arg; - -=09image->arch.backup_src_start =3D res->start; -=09image->arch.backup_src_sz =3D resource_size(res); - -=09/* Expecting only one range for backup region */ -=09return 1; -} - int crash_load_segments(struct kimage *image) { =09int ret; =09struct kexec_buf kbuf =3D { .image =3D image, .buf_min =3D 0, =09=09=09=09 .buf_max =3D ULONG_MAX, .top_down =3D false }; =20 -=09/* -=09 * Determine and load a segment for backup area. First 640K RAM -=09 * region is backup source -=09 */ - -=09ret =3D walk_system_ram_res(KEXEC_BACKUP_SRC_START, KEXEC_BACKUP_SRC_EN= D, -=09=09=09=09image, determine_backup_region); - -=09/* Zero or postive return values are ok */ -=09if (ret < 0) -=09=09return ret; - -=09/* Add backup segment. */ -=09if (image->arch.backup_src_sz) { -=09=09kbuf.buffer =3D &crash_zero_bytes; -=09=09kbuf.bufsz =3D sizeof(crash_zero_bytes); -=09=09kbuf.memsz =3D image->arch.backup_src_sz; -=09=09kbuf.buf_align =3D PAGE_SIZE; -=09=09/* -=09=09 * Ideally there is no source for backup segment. This is -=09=09 * copied in purgatory after crash. Just add a zero filled -=09=09 * segment for now to make sure checksum logic works fine. -=09=09 */ -=09=09ret =3D kexec_add_buffer(&kbuf); -=09=09if (ret) -=09=09=09return ret; -=09=09image->arch.backup_load_addr =3D kbuf.mem; -=09=09pr_debug("Loaded backup region at 0x%lx backup_start=3D0x%lx memsz= =3D0x%lx\n", -=09=09=09 image->arch.backup_load_addr, -=09=09=09 image->arch.backup_src_start, kbuf.memsz); -=09} - =09/* Prepare elf headers and add a segment */ =09ret =3D prepare_elf_headers(image, &kbuf.buffer, &kbuf.bufsz); =09if (ret) diff --git a/arch/x86/kernel/machine_kexec_64.c b/arch/x86/kernel/machine_k= exec_64.c index 5dcd438ad8f2..16e125a50b33 100644 --- a/arch/x86/kernel/machine_kexec_64.c +++ b/arch/x86/kernel/machine_kexec_64.c @@ -298,48 +298,6 @@ static void load_segments(void) =09=09); } =20 -#ifdef CONFIG_KEXEC_FILE -/* Update purgatory as needed after various image segments have been prepa= red */ -static int arch_update_purgatory(struct kimage *image) -{ -=09int ret =3D 0; - -=09if (!image->file_mode) -=09=09return 0; - -=09/* Setup copying of backup region */ -=09if (image->type =3D=3D KEXEC_TYPE_CRASH) { -=09=09ret =3D kexec_purgatory_get_set_symbol(image, -=09=09=09=09"purgatory_backup_dest", -=09=09=09=09&image->arch.backup_load_addr, -=09=09=09=09sizeof(image->arch.backup_load_addr), 0); -=09=09if (ret) -=09=09=09return ret; - -=09=09ret =3D kexec_purgatory_get_set_symbol(image, -=09=09=09=09"purgatory_backup_src", -=09=09=09=09&image->arch.backup_src_start, -=09=09=09=09sizeof(image->arch.backup_src_start), 0); -=09=09if (ret) -=09=09=09return ret; - -=09=09ret =3D kexec_purgatory_get_set_symbol(image, -=09=09=09=09"purgatory_backup_sz", -=09=09=09=09&image->arch.backup_src_sz, -=09=09=09=09sizeof(image->arch.backup_src_sz), 0); -=09=09if (ret) -=09=09=09return ret; -=09} - -=09return ret; -} -#else /* !CONFIG_KEXEC_FILE */ -static inline int arch_update_purgatory(struct kimage *image) -{ -=09return 0; -} -#endif /* CONFIG_KEXEC_FILE */ - int machine_kexec_prepare(struct kimage *image) { =09unsigned long start_pgtable; @@ -353,11 +311,6 @@ int machine_kexec_prepare(struct kimage *image) =09if (result) =09=09return result; =20 -=09/* update purgatory as needed */ -=09result =3D arch_update_purgatory(image); -=09if (result) -=09=09return result; - =09return 0; } =20 diff --git a/arch/x86/purgatory/purgatory.c b/arch/x86/purgatory/purgatory.= c index 3b95410ff0f8..2961234d0795 100644 --- a/arch/x86/purgatory/purgatory.c +++ b/arch/x86/purgatory/purgatory.c @@ -14,28 +14,10 @@ =20 #include "../boot/string.h" =20 -unsigned long purgatory_backup_dest __section(.kexec-purgatory); -unsigned long purgatory_backup_src __section(.kexec-purgatory); -unsigned long purgatory_backup_sz __section(.kexec-purgatory); - u8 purgatory_sha256_digest[SHA256_DIGEST_SIZE] __section(.kexec-purgatory)= ; =20 struct kexec_sha_region purgatory_sha_regions[KEXEC_SEGMENT_MAX] __section= (.kexec-purgatory); =20 -/* - * On x86, second kernel requries first 640K of memory to boot. Copy - * first 640K to a backup region in reserved memory range so that second - * kernel can use first 640K. - */ -static int copy_backup_region(void) -{ -=09if (purgatory_backup_dest) { -=09=09memcpy((void *)purgatory_backup_dest, -=09=09 (void *)purgatory_backup_src, purgatory_backup_sz); -=09} -=09return 0; -} - static int verify_sha256_digest(void) { =09struct kexec_sha_region *ptr, *end; @@ -66,7 +48,6 @@ void purgatory(void) =09=09for (;;) =09=09=09; =09} -=09copy_backup_region(); } =20 /* --=20 2.17.1