Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp585760rwb; Wed, 7 Dec 2022 02:25:58 -0800 (PST) X-Google-Smtp-Source: AA0mqf662MyPfXvi7S4Ks0zsHvwwYPC7F7v+X5HScHeMgbk2ZjG9e4sZnISO4Bkq7jm8sP8fcUt0 X-Received: by 2002:a17:90a:f48d:b0:212:c877:e948 with SMTP id bx13-20020a17090af48d00b00212c877e948mr106594548pjb.39.1670408758160; Wed, 07 Dec 2022 02:25:58 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1670408758; cv=none; d=google.com; s=arc-20160816; b=YuJxrINK7GiaqRIz2YLGvMaU0mCKtMsIjyQVbX7n6N9CV8kH5xY0nu+zQRzy7aX17s J7cRvVJUsen7LmnnOAq62ScK+FmsHCdF/X0I60AO0pljlWGt2U1upfEKSx53X21BhpbB av56L+BycWzCVPk4axEEISdZTK8qZYqySAICv1CEcumbZkqZ+3gY8WTbmEaZwUGaPmfu bdRxDjdeeim+ImFsfhc0Qqw/ovWZYBlqCDuMaupWDb/xk0Ztg/fKAQw2GBz5v9+5z7hm WaTMOI+h3xGh7bmnQS9OYeSHa0uUmHy7cIujv9DGUFl/lAO3VscSRBPQYxokBHqrfNA5 mbUA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=hDwchu5WKWCgmm4vmsqSytCqDgC46MDaYK7Byjk/kcs=; b=I1hOKBwQwm5QsHDWSaj3vz5FpnkKaJpJLQk9VNx0/8tnFtUsBhENJBeUaddEcRHkFU ydbNR+a9ithrobo56g253hdQLeu+Y3a2ajkx+5IkZ0wLofWR0/BYzKSm4PgFGd/Y4dlK e1+vGyahNCsHKzZauhmWsmH47tecwu3v3ybh9VxIVvPwI5s/MiI8JLcqPf4gVS8r/Zk2 XhazECEXmfabzr0GkW1pv3XlcDJQBB8Q58LzPZnfK2CNF1V5V0HtWiW3ebJrsLN6WifB bmH54dpS73lOp9aUGog7xRBqy1yii8RsPNWAcLTcbIE6vht2IwjIOXuqOh3G9x9CCgzc 2hdw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@alien8.de header.s=dkim header.b=UsWNFmf1; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=alien8.de Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id y15-20020a63ce0f000000b004706a2c7d48si19369065pgf.684.2022.12.07.02.25.48; Wed, 07 Dec 2022 02:25:58 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@alien8.de header.s=dkim header.b=UsWNFmf1; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=alien8.de Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230369AbiLGKUE (ORCPT + 76 others); Wed, 7 Dec 2022 05:20:04 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:48434 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230337AbiLGKUB (ORCPT ); Wed, 7 Dec 2022 05:20:01 -0500 Received: from mail.skyhub.de (mail.skyhub.de [5.9.137.197]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 57829CE10 for ; Wed, 7 Dec 2022 02:20:00 -0800 (PST) Received: from zn.tnic (p200300ea9733e711329c23fffea6a903.dip0.t-ipconnect.de [IPv6:2003:ea:9733:e711:329c:23ff:fea6:a903]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.skyhub.de (SuperMail on ZX Spectrum 128k) with ESMTPSA id CF9681EC01E0; Wed, 7 Dec 2022 11:19:58 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=alien8.de; s=dkim; t=1670408399; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:in-reply-to:in-reply-to: references:references; bh=hDwchu5WKWCgmm4vmsqSytCqDgC46MDaYK7Byjk/kcs=; b=UsWNFmf1WL++RlApKVLd3IgqwoP/G3Xb0EMWUlob3QYFwZuov/9f8jQ+NDtV263XJM9Zvk NT0RHmrdQTSz11yh4B2q+1+1EN3nBwZgIZ4iEVYVX6mppAp74PG43jC7zvIMCYLg7zx+Wn +kADImrNJjaljc5LaS50UDvd/3HsKp4= Date: Wed, 7 Dec 2022 11:19:58 +0100 From: Borislav Petkov To: Eric DeVolder Cc: linux-kernel@vger.kernel.org, x86@kernel.org, kexec@lists.infradead.org, ebiederm@xmission.com, dyoung@redhat.com, bhe@redhat.com, vgoyal@redhat.com, tglx@linutronix.de, mingo@redhat.com, dave.hansen@linux.intel.com, hpa@zytor.com, nramas@linux.microsoft.com, thomas.lendacky@amd.com, robh@kernel.org, efault@gmx.de, rppt@kernel.org, david@redhat.com, sourabhjain@linux.ibm.com, konrad.wilk@oracle.com, boris.ostrovsky@oracle.com Subject: Re: [PATCH v14 7/7] x86/crash: add x86 crash hotplug support Message-ID: References: <20221116214643.6384-1-eric.devolder@oracle.com> <20221116214643.6384-8-eric.devolder@oracle.com> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: <20221116214643.6384-8-eric.devolder@oracle.com> X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Nov 16, 2022 at 04:46:43PM -0500, Eric DeVolder wrote: > When CPU or memory is hot un/plugged, the crash elfcorehdr, which > describes the CPUs and memory in the system, must also be updated. > > A new elfcorehdr is generated from the available CPUs and memory > into a buffer, and then installed over the top of the existing > elfcorehdr. The segment containing the elfcorehdr is identified > at run time in crash_core:handle_hotplug_event(), which works for > both the kexec_load() and kexec_file_load() syscalls. > > In the patch 'kexec: exclude elfcorehdr from the segment digest' > the need to update purgatory due to the change in elfcorehdr was > eliminated. As a result, no changes to purgatory or boot_params > (as the elfcorehdr= kernel command line parameter pointer > remains unchanged and correct) are needed, just elfcorehdr. > > To accommodate a growing number of resources via hotplug, the > elfcorehdr segment must be sufficiently large enough to accommodate > changes, see the CRASH_MAX_MEMORY_RANGES description. > > Signed-off-by: Eric DeVolder > --- > arch/x86/Kconfig | 9 +++ > arch/x86/include/asm/kexec.h | 15 +++++ > arch/x86/kernel/crash.c | 106 ++++++++++++++++++++++++++++++++++- > 3 files changed, 127 insertions(+), 3 deletions(-) Some quick cleanups ontop, there's potential for more: --- diff --git a/arch/x86/Kconfig b/arch/x86/Kconfig index ffee99046942..486509030d3a 100644 --- a/arch/x86/Kconfig +++ b/arch/x86/Kconfig @@ -2091,13 +2091,16 @@ config CRASH_DUMP For more details see Documentation/admin-guide/kdump/kdump.rst config CRASH_HOTPLUG - bool "kernel updates of crash elfcorehdr" + bool "Update the crash elfcorehdr on system configuration changes" default n depends on CRASH_DUMP && (HOTPLUG_CPU || MEMORY_HOTPLUG) help - Enable the kernel to directly update the crash elfcorehdr (which - contains the list of CPUs and memory regions to be dumped upon - a crash) in response to hot plug/unplug of CPUs or memory. + Enable direct updates to the crash elfcorehdr (which contains + the list of CPUs and memory regions to be dumped upon a crash) + in response to hot plug/unplug of CPUs or memory. This is a much + more advanced approach than userspace attempting that. + + If unsure, say Y. config KEXEC_JUMP bool "kexec jump" diff --git a/arch/x86/kernel/crash.c b/arch/x86/kernel/crash.c index d2238bcf8106..d26f208e582e 100644 --- a/arch/x86/kernel/crash.c +++ b/arch/x86/kernel/crash.c @@ -413,25 +413,32 @@ int crash_load_segments(struct kimage *image) image->elf_headers_sz = kbuf.bufsz; kbuf.memsz = kbuf.bufsz; -#ifdef CONFIG_CRASH_HOTPLUG - /* Ensure elfcorehdr segment large enough for hotplug changes */ - unsigned long pnum = 2; /* VMCOREINFO and kernel_map */ - - if (IS_ENABLED(CONFIG_HOTPLUG_CPU)) - pnum += CONFIG_NR_CPUS_DEFAULT; - if (IS_ENABLED(CONFIG_MEMORY_HOTPLUG)) - pnum += CRASH_MAX_MEMORY_RANGES; - if (pnum < (unsigned long)PN_XNUM) { - kbuf.memsz = pnum * sizeof(Elf64_Phdr); - kbuf.memsz += sizeof(Elf64_Ehdr); - image->elfcorehdr_index = image->nr_segments; - image->elfcorehdr_index_valid = true; - /* Mark as usable to crash kernel, else crash kernel fails on boot */ - image->elf_headers_sz = kbuf.memsz; - } else { - pr_err("number of Phdrs %lu exceeds max\n", pnum); + if (IS_ENABLED(CONFIG_CRASH_HOTPLUG)) { + /* + * Ensure the elfcorehdr segment large enough for hotplug changes. + * Start with VMCOREINFO and kernel_map: + */ + unsigned long pnum = 2; + + if (IS_ENABLED(CONFIG_HOTPLUG_CPU)) + pnum += CONFIG_NR_CPUS_DEFAULT; + + if (IS_ENABLED(CONFIG_MEMORY_HOTPLUG)) + pnum += CRASH_MAX_MEMORY_RANGES; + + if (pnum < (unsigned long)PN_XNUM) { + kbuf.memsz = pnum * sizeof(Elf64_Phdr); + kbuf.memsz += sizeof(Elf64_Ehdr); + + image->elfcorehdr_index = image->nr_segments; + image->elfcorehdr_index_valid = true; + + /* Mark as usable to crash kernel, else crash kernel fails on boot */ + image->elf_headers_sz = kbuf.memsz; + } else { + pr_err("number of Phdrs %lu exceeds max\n", pnum); + } } -#endif kbuf.buf_align = ELF_CORE_HEADER_ALIGN; kbuf.mem = KEXEC_BUF_MEM_UNKNOWN; @@ -463,10 +470,9 @@ int crash_load_segments(struct kimage *image) */ void arch_crash_handle_hotplug_event(struct kimage *image) { + void *elfbuf, *old_elfcorehdr; unsigned long mem, memsz; - unsigned long elfsz = 0; - void *elfbuf = NULL; - void *ptr; + unsigned long elfsz; /* * Create the new elfcorehdr reflecting the changes to CPU and/or @@ -489,26 +495,24 @@ void arch_crash_handle_hotplug_event(struct kimage *image) goto out; } - /* - * Copy new elfcorehdr over the old elfcorehdr at destination. - */ - ptr = arch_map_crash_pages(mem, memsz); - if (ptr) { - /* - * Temporarily invalidate the crash image while the - * elfcorehdr is updated. - */ - xchg(&kexec_crash_image, NULL); - memcpy_flushcache(ptr, elfbuf, elfsz); - xchg(&kexec_crash_image, image); - arch_unmap_crash_pages(ptr); - pr_debug("updated elfcorehdr\n"); - } else { + /* Copy new elfcorehdr over the old elfcorehdr at destination. */ + old_elfcorehdr = arch_map_crash_pages(mem, memsz); + if (!old_elfcorehdr) { pr_err("updating elfcorehdr failed\n"); + goto out; } + /* + * Temporarily invalidate the crash image while the elfcorehdr + * is updated. + * */ + xchg(&kexec_crash_image, NULL); + memcpy_flushcache(old_elfcorehdr, elfbuf, elfsz); + xchg(&kexec_crash_image, image); + arch_unmap_crash_pages(old_elfcorehdr); + pr_debug("updated elfcorehdr\n"); + out: - if (elfbuf) - vfree(elfbuf); + vfree(elfbuf); } #endif -- Regards/Gruss, Boris. https://people.kernel.org/tglx/notes-about-netiquette