[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH] xen/arm: acpi: Support memory reserve configuration table



On Thu, 18 Aug 2022 10:15:30 +0100,
Leo Yan <leo.yan@xxxxxxxxxx> wrote:
> 
> Hi Ard,
> 
> On Wed, Aug 17, 2022 at 03:49:32PM +0200, Ard Biesheuvel wrote:
> 
> [...]
> 
> > > This header holds ACPI spec defined data structures. This one looks
> > > to be a Linux one, and hence shouldn't be defined here. You use it
> > > in a single CU only, so I see no reason to define it there.
> > >
> > > Furthermore - what if Linux decided to change their structure? Or
> > > is there a guarantee that they won't?
> > 
> > No, there is not. The memreserve table is an internal interface
> > between the EFI stub loader and the Linux kernel proper.
> > 
> > As I have argued many times before, booting the arm64 kernel in
> > EFI/ACPI mode without going through the EFI stub violates the ACPI
> > spec, and relies on interfaces that were not intended for public
> > consumption.
> 
> Let me ask a question but sorry it might be off topic.
> 
> In the Linux kernel function:
> 
>   static int gic_reserve_range(phys_addr_t addr, unsigned long size)
>   {
>           if (efi_enabled(EFI_CONFIG_TABLES))
>                   return efi_mem_reserve_persistent(addr, size);
>   
>           return 0;
>   }
> 
> We can see it will reserve persistent memory region for GIC pending
> pages, so my question is if a platform is booting with DT binding
> rather than ACPI table, how the primary kernel can reserve the pages
> and pass the info to the secondary kernel?

This is a false dichotomy. DT and UEFI are not exclusive, far from
it. That's actually how most non-ACPI systems boot these days, and
they are able to use kexec out of the box, using the EFI MEMRESERVE
internal API.

The real difference is between UEFI and non-UEFI. If you're allergic
to it, you have two options:

- you delegate the redistributor configuration to your bootloader,
  mark the corresponding memory as reserved in the DT from the
  bootloader, and you're done. A bunch of embedded systems do that,
  and are able to kexec.

- you keep configuring the RDs from Linux, but you must then mark the
  regions as reserved in the DT that is passed to the secondary
  kernel. It requires some cooperation from the kexec userspace to
  parse /proc/iomem and insert the correct annotations in that DT.

> Seems it's broken for kdump/kexec if kernel boots with using DT?

You equate kexec to kdump, which is wrong. kdump does *not* reuse the
memory from the previous kernel, and thus is immune to the RD table
reallocation problem. You don't need anything for kdump, as you will
use the RD tables as configured by the initial kernel.

        M.

-- 
Without deviation from the norm, progress is not possible.



 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.