Message ID | 20250320015551.2157511-12-changyuanl@google.com (mailing list archive) |
---|---|
State | New |
Headers | show |
Series | kexec: introduce Kexec HandOver (KHO) | expand |
On 20/03/2025 02:55, Changyuan Lyu wrote: > From: Alexander Graf <graf@amazon.com> > > We have all generic code in place now to support Kexec with KHO. This > patch adds a config option that depends on architecture support to > enable KHO support. > > Signed-off-by: Alexander Graf <graf@amazon.com> > Co-developed-by: Mike Rapoport (Microsoft) <rppt@kernel.org> > Signed-off-by: Mike Rapoport (Microsoft) <rppt@kernel.org> > Co-developed-by: Changyuan Lyu <changyuanl@google.com> > Signed-off-by: Changyuan Lyu <changyuanl@google.com> What did you exactly co-develop here? Few changes does not mean you are a co-developer. Best regards, Krzysztof
Hi Krzysztof, On Thu, Mar 20, 2025 at 08:10:37 +0100, Krzysztof Kozlowski <krzk@kernel.org> wrote: > On 20/03/2025 02:55, Changyuan Lyu wrote: > > From: Alexander Graf <graf@amazon.com> > > > > We have all generic code in place now to support Kexec with KHO. This > > patch adds a config option that depends on architecture support to > > enable KHO support. > > > > Signed-off-by: Alexander Graf <graf@amazon.com> > > Co-developed-by: Mike Rapoport (Microsoft) <rppt@kernel.org> > > Signed-off-by: Mike Rapoport (Microsoft) <rppt@kernel.org> > > Co-developed-by: Changyuan Lyu <changyuanl@google.com> > > Signed-off-by: Changyuan Lyu <changyuanl@google.com> > What did you exactly co-develop here? Few changes does not mean you are > a co-developer. I proposed and implemented the hashtable-based state tree API in the previous patch "kexec: add Kexec HandOver (KHO) generation helpers" [1] and then added `select XXHASH` here. If one line of change is not qualified for "Co-developed-by", I will remove it from the commit message in the next version. [1] https://lore.kernel.org/all/20250320015551.2157511-8-changyuanl@google.com/ Best, Changyuan
On Thu, 20 Mar 2025 at 23:05, Changyuan Lyu <changyuanl@google.com> wrote: > > From: Alexander Graf <graf@amazon.com> > > We have all generic code in place now to support Kexec with KHO. This > patch adds a config option that depends on architecture support to > enable KHO support. > > Signed-off-by: Alexander Graf <graf@amazon.com> > Co-developed-by: Mike Rapoport (Microsoft) <rppt@kernel.org> > Signed-off-by: Mike Rapoport (Microsoft) <rppt@kernel.org> > Co-developed-by: Changyuan Lyu <changyuanl@google.com> > Signed-off-by: Changyuan Lyu <changyuanl@google.com> > --- > kernel/Kconfig.kexec | 15 +++++++++++++++ > 1 file changed, 15 insertions(+) > > diff --git a/kernel/Kconfig.kexec b/kernel/Kconfig.kexec > index 4d111f871951..57db99e758a8 100644 > --- a/kernel/Kconfig.kexec > +++ b/kernel/Kconfig.kexec > @@ -95,6 +95,21 @@ config KEXEC_JUMP > Jump between original kernel and kexeced kernel and invoke > code in physical address mode via KEXEC > > +config KEXEC_HANDOVER > + bool "kexec handover" > + depends on ARCH_SUPPORTS_KEXEC_HANDOVER && ARCH_SUPPORTS_KEXEC_FILE > + select MEMBLOCK_KHO_SCRATCH > + select KEXEC_FILE > + select DEBUG_FS > + select LIBFDT > + select CMA > + select XXHASH > + help > + Allow kexec to hand over state across kernels by generating and > + passing additional metadata to the target kernel. This is useful > + to keep data or state alive across the kexec. For this to work, > + both source and target kernels need to have this option enabled. > + Have you tested kdump? In my mind there are two issues, one is with CMA enabled, it could cause kdump crashkernel memory reservation failures more often due to the fragmented low memory. Secondly, in kdump kernel dump the crazy scratch memory in vmcore is not very meaningful. Otherwise I suspect this is not tested under kdump. If so please disable this option for kdump. > config CRASH_DUMP > bool "kernel crash dumps" > default ARCH_DEFAULT_CRASH_DUMP > -- > 2.48.1.711.g2feabab25a-goog > >
On Mon, Mar 24, 2025 at 12:18 AM Dave Young <dyoung@redhat.com> wrote: > > On Thu, 20 Mar 2025 at 23:05, Changyuan Lyu <changyuanl@google.com> wrote: > > > > From: Alexander Graf <graf@amazon.com> > > > > We have all generic code in place now to support Kexec with KHO. This > > patch adds a config option that depends on architecture support to > > enable KHO support. > > > > Signed-off-by: Alexander Graf <graf@amazon.com> > > Co-developed-by: Mike Rapoport (Microsoft) <rppt@kernel.org> > > Signed-off-by: Mike Rapoport (Microsoft) <rppt@kernel.org> > > Co-developed-by: Changyuan Lyu <changyuanl@google.com> > > Signed-off-by: Changyuan Lyu <changyuanl@google.com> > > --- > > kernel/Kconfig.kexec | 15 +++++++++++++++ > > 1 file changed, 15 insertions(+) > > > > diff --git a/kernel/Kconfig.kexec b/kernel/Kconfig.kexec > > index 4d111f871951..57db99e758a8 100644 > > --- a/kernel/Kconfig.kexec > > +++ b/kernel/Kconfig.kexec > > @@ -95,6 +95,21 @@ config KEXEC_JUMP > > Jump between original kernel and kexeced kernel and invoke > > code in physical address mode via KEXEC > > > > +config KEXEC_HANDOVER > > + bool "kexec handover" > > + depends on ARCH_SUPPORTS_KEXEC_HANDOVER && ARCH_SUPPORTS_KEXEC_FILE > > + select MEMBLOCK_KHO_SCRATCH > > + select KEXEC_FILE > > + select DEBUG_FS > > + select LIBFDT > > + select CMA > > + select XXHASH > > + help > > + Allow kexec to hand over state across kernels by generating and > > + passing additional metadata to the target kernel. This is useful > > + to keep data or state alive across the kexec. For this to work, > > + both source and target kernels need to have this option enabled. > > + > > Have you tested kdump? In my mind there are two issues, one is with > CMA enabled, it could cause kdump crashkernel memory reservation > failures more often due to the fragmented low memory. Secondly, in As I understand cma low memory scratch reservation is needed only to support some legacy pci devices that cannot use the full 64-bit space. If so, I am not sure if KHO needs to be supported on machines with such devices. However, even if we keep it, it should really be small, so I would not expect that to be a problem for crash kernel memory reservation. > kdump kernel dump the crazy scratch memory in vmcore is not very > meaningful. Otherwise I suspect this is not tested under kdump. If > so please disable this option for kdump. The scratch memory will appear as regular CMA in the vmcore. The crash kernel can be kexec loaded only from userland, long after the scratch memory is converted to CMA. Pasha
On Tue, 25 Mar 2025 at 03:27, Pasha Tatashin <pasha.tatashin@soleen.com> wrote: > > On Mon, Mar 24, 2025 at 12:18 AM Dave Young <dyoung@redhat.com> wrote: > > > > On Thu, 20 Mar 2025 at 23:05, Changyuan Lyu <changyuanl@google.com> wrote: > > > > > > From: Alexander Graf <graf@amazon.com> > > > > > > We have all generic code in place now to support Kexec with KHO. This > > > patch adds a config option that depends on architecture support to > > > enable KHO support. > > > > > > Signed-off-by: Alexander Graf <graf@amazon.com> > > > Co-developed-by: Mike Rapoport (Microsoft) <rppt@kernel.org> > > > Signed-off-by: Mike Rapoport (Microsoft) <rppt@kernel.org> > > > Co-developed-by: Changyuan Lyu <changyuanl@google.com> > > > Signed-off-by: Changyuan Lyu <changyuanl@google.com> > > > --- > > > kernel/Kconfig.kexec | 15 +++++++++++++++ > > > 1 file changed, 15 insertions(+) > > > > > > diff --git a/kernel/Kconfig.kexec b/kernel/Kconfig.kexec > > > index 4d111f871951..57db99e758a8 100644 > > > --- a/kernel/Kconfig.kexec > > > +++ b/kernel/Kconfig.kexec > > > @@ -95,6 +95,21 @@ config KEXEC_JUMP > > > Jump between original kernel and kexeced kernel and invoke > > > code in physical address mode via KEXEC > > > > > > +config KEXEC_HANDOVER > > > + bool "kexec handover" > > > + depends on ARCH_SUPPORTS_KEXEC_HANDOVER && ARCH_SUPPORTS_KEXEC_FILE > > > + select MEMBLOCK_KHO_SCRATCH > > > + select KEXEC_FILE > > > + select DEBUG_FS > > > + select LIBFDT > > > + select CMA > > > + select XXHASH > > > + help > > > + Allow kexec to hand over state across kernels by generating and > > > + passing additional metadata to the target kernel. This is useful > > > + to keep data or state alive across the kexec. For this to work, > > > + both source and target kernels need to have this option enabled. > > > + > > > > Have you tested kdump? In my mind there are two issues, one is with > > CMA enabled, it could cause kdump crashkernel memory reservation > > failures more often due to the fragmented low memory. Secondly, in > > As I understand cma low memory scratch reservation is needed only to > support some legacy pci devices that cannot use the full 64-bit space. > If so, I am not sure if KHO needs to be supported on machines with > such devices. However, even if we keep it, it should really be small, > so I would not expect that to be a problem for crash kernel memory > reservation. It is not easy to estimate how much of the KHO reserved memory is needed. I assume this as a mechanism for all different users, it is not predictable. Also it is not only about the size, but also it makes the memory fragmented. > > > kdump kernel dump the crazy scratch memory in vmcore is not very > > meaningful. Otherwise I suspect this is not tested under kdump. If > > so please disable this option for kdump. > > The scratch memory will appear as regular CMA in the vmcore. The crash > kernel can be kexec loaded only from userland, long after the scratch > memory is converted to CMA. Depending on the reserved size, if big enough it should be excluded in vmcore dumping. Otherwise if it is a kdump kernel it should skip the handling of the KHO passed previous old states. > > Pasha >
On Tue, 25 Mar 2025 at 09:24, Dave Young <dyoung@redhat.com> wrote: > > On Tue, 25 Mar 2025 at 03:27, Pasha Tatashin <pasha.tatashin@soleen.com> wrote: > > > > On Mon, Mar 24, 2025 at 12:18 AM Dave Young <dyoung@redhat.com> wrote: > > > > > > On Thu, 20 Mar 2025 at 23:05, Changyuan Lyu <changyuanl@google.com> wrote: > > > > > > > > From: Alexander Graf <graf@amazon.com> > > > > > > > > We have all generic code in place now to support Kexec with KHO. This > > > > patch adds a config option that depends on architecture support to > > > > enable KHO support. > > > > > > > > Signed-off-by: Alexander Graf <graf@amazon.com> > > > > Co-developed-by: Mike Rapoport (Microsoft) <rppt@kernel.org> > > > > Signed-off-by: Mike Rapoport (Microsoft) <rppt@kernel.org> > > > > Co-developed-by: Changyuan Lyu <changyuanl@google.com> > > > > Signed-off-by: Changyuan Lyu <changyuanl@google.com> > > > > --- > > > > kernel/Kconfig.kexec | 15 +++++++++++++++ > > > > 1 file changed, 15 insertions(+) > > > > > > > > diff --git a/kernel/Kconfig.kexec b/kernel/Kconfig.kexec > > > > index 4d111f871951..57db99e758a8 100644 > > > > --- a/kernel/Kconfig.kexec > > > > +++ b/kernel/Kconfig.kexec > > > > @@ -95,6 +95,21 @@ config KEXEC_JUMP > > > > Jump between original kernel and kexeced kernel and invoke > > > > code in physical address mode via KEXEC > > > > > > > > +config KEXEC_HANDOVER > > > > + bool "kexec handover" > > > > + depends on ARCH_SUPPORTS_KEXEC_HANDOVER && ARCH_SUPPORTS_KEXEC_FILE > > > > + select MEMBLOCK_KHO_SCRATCH > > > > + select KEXEC_FILE > > > > + select DEBUG_FS > > > > + select LIBFDT > > > > + select CMA > > > > + select XXHASH > > > > + help > > > > + Allow kexec to hand over state across kernels by generating and > > > > + passing additional metadata to the target kernel. This is useful > > > > + to keep data or state alive across the kexec. For this to work, > > > > + both source and target kernels need to have this option enabled. > > > > + > > > > > > Have you tested kdump? In my mind there are two issues, one is with > > > CMA enabled, it could cause kdump crashkernel memory reservation > > > failures more often due to the fragmented low memory. Secondly, in > > > > As I understand cma low memory scratch reservation is needed only to > > support some legacy pci devices that cannot use the full 64-bit space. > > If so, I am not sure if KHO needs to be supported on machines with > > such devices. However, even if we keep it, it should really be small, > > so I would not expect that to be a problem for crash kernel memory > > reservation. > > It is not easy to estimate how much of the KHO reserved memory is > needed. I assume this as a mechanism for all different users, it is > not predictable. Also it is not only about the size, but also it > makes the memory fragmented. > > > > > > kdump kernel dump the crazy scratch memory in vmcore is not very > > > meaningful. Otherwise I suspect this is not tested under kdump. If > > > so please disable this option for kdump. > > > > The scratch memory will appear as regular CMA in the vmcore. The crash > > kernel can be kexec loaded only from userland, long after the scratch > > memory is converted to CMA. > > Depending on the reserved size, if big enough it should be excluded in > vmcore dumping. > Otherwise if it is a kdump kernel it should skip the handling of the > KHO passed previous old states. If you do not want to make the KHO conflicts with kdump, then the above should be handled and well tested. And then leave to end user and distribution to determine if they want the both enabled considering the risk of crashkernel reservation failure. > > > > > Pasha > >
On 03/24/25 at 12:18pm, Dave Young wrote: > On Thu, 20 Mar 2025 at 23:05, Changyuan Lyu <changyuanl@google.com> wrote: > > > > From: Alexander Graf <graf@amazon.com> > > > > We have all generic code in place now to support Kexec with KHO. This > > patch adds a config option that depends on architecture support to > > enable KHO support. > > > > Signed-off-by: Alexander Graf <graf@amazon.com> > > Co-developed-by: Mike Rapoport (Microsoft) <rppt@kernel.org> > > Signed-off-by: Mike Rapoport (Microsoft) <rppt@kernel.org> > > Co-developed-by: Changyuan Lyu <changyuanl@google.com> > > Signed-off-by: Changyuan Lyu <changyuanl@google.com> > > --- > > kernel/Kconfig.kexec | 15 +++++++++++++++ > > 1 file changed, 15 insertions(+) > > > > diff --git a/kernel/Kconfig.kexec b/kernel/Kconfig.kexec > > index 4d111f871951..57db99e758a8 100644 > > --- a/kernel/Kconfig.kexec > > +++ b/kernel/Kconfig.kexec > > @@ -95,6 +95,21 @@ config KEXEC_JUMP > > Jump between original kernel and kexeced kernel and invoke > > code in physical address mode via KEXEC > > > > +config KEXEC_HANDOVER > > + bool "kexec handover" > > + depends on ARCH_SUPPORTS_KEXEC_HANDOVER && ARCH_SUPPORTS_KEXEC_FILE > > + select MEMBLOCK_KHO_SCRATCH > > + select KEXEC_FILE > > + select DEBUG_FS > > + select LIBFDT > > + select CMA > > + select XXHASH > > + help > > + Allow kexec to hand over state across kernels by generating and > > + passing additional metadata to the target kernel. This is useful > > + to keep data or state alive across the kexec. For this to work, > > + both source and target kernels need to have this option enabled. > > + > > Have you tested kdump? In my mind there are two issues, one is with > CMA enabled, it could cause kdump crashkernel memory reservation > failures more often due to the fragmented low memory. Secondly, in kho scracth memorys are reserved much later than crashkernel, we may not need to worry about it. ==================== start_kernel() ...... -->setup_arch(&command_line); -->arch_reserve_crashkernel(); ...... -->mm_core_init(); -->kho_memory_init(); > kdump kernel dump the crazy scratch memory in vmcore is not very > meaningful. Otherwise I suspect this is not tested under kdump. If > so please disable this option for kdump. Yeah, it's not meaningful to dump out scratch memorys into vmcore. We may need to dig them out from eflcorehdr. While it's an optimization, kho scratch is not big relative to the entire system memory. It can be done in later stage. My personal opinion.
> > > > Have you tested kdump? In my mind there are two issues, one is with > > CMA enabled, it could cause kdump crashkernel memory reservation > > failures more often due to the fragmented low memory. Secondly, in > > kho scracth memorys are reserved much later than crashkernel, we may not > need to worry about it. > ==================== > start_kernel() > ...... > -->setup_arch(&command_line); > -->arch_reserve_crashkernel(); > ...... > -->mm_core_init(); > -->kho_memory_init(); > > > kdump kernel dump the crazy scratch memory in vmcore is not very > > meaningful. Otherwise I suspect this is not tested under kdump. If > > so please disable this option for kdump. Ok, it is fine if this is the case, thanks Baoquan for clearing this worry. But the other concerns are still need to address, eg. KHO use cases are not good for kdump. There could be more to think about. eg. the issues talked in thread: https://lore.kernel.org/lkml/Z7dc9Cd8KX3b_brB@dwarf.suse.cz/T/
On Tue, Mar 25, 2025 at 2:58 AM Baoquan He <bhe@redhat.com> wrote: > > On 03/24/25 at 12:18pm, Dave Young wrote: > > On Thu, 20 Mar 2025 at 23:05, Changyuan Lyu <changyuanl@google.com> wrote: > > > > > > From: Alexander Graf <graf@amazon.com> > > > > > > We have all generic code in place now to support Kexec with KHO. This > > > patch adds a config option that depends on architecture support to > > > enable KHO support. > > > > > > Signed-off-by: Alexander Graf <graf@amazon.com> > > > Co-developed-by: Mike Rapoport (Microsoft) <rppt@kernel.org> > > > Signed-off-by: Mike Rapoport (Microsoft) <rppt@kernel.org> > > > Co-developed-by: Changyuan Lyu <changyuanl@google.com> > > > Signed-off-by: Changyuan Lyu <changyuanl@google.com> > > > --- > > > kernel/Kconfig.kexec | 15 +++++++++++++++ > > > 1 file changed, 15 insertions(+) > > > > > > diff --git a/kernel/Kconfig.kexec b/kernel/Kconfig.kexec > > > index 4d111f871951..57db99e758a8 100644 > > > --- a/kernel/Kconfig.kexec > > > +++ b/kernel/Kconfig.kexec > > > @@ -95,6 +95,21 @@ config KEXEC_JUMP > > > Jump between original kernel and kexeced kernel and invoke > > > code in physical address mode via KEXEC > > > > > > +config KEXEC_HANDOVER > > > + bool "kexec handover" > > > + depends on ARCH_SUPPORTS_KEXEC_HANDOVER && ARCH_SUPPORTS_KEXEC_FILE > > > + select MEMBLOCK_KHO_SCRATCH > > > + select KEXEC_FILE > > > + select DEBUG_FS > > > + select LIBFDT > > > + select CMA > > > + select XXHASH > > > + help > > > + Allow kexec to hand over state across kernels by generating and > > > + passing additional metadata to the target kernel. This is useful > > > + to keep data or state alive across the kexec. For this to work, > > > + both source and target kernels need to have this option enabled. > > > + > > > > Have you tested kdump? In my mind there are two issues, one is with > > CMA enabled, it could cause kdump crashkernel memory reservation > > failures more often due to the fragmented low memory. Secondly, in > > kho scracth memorys are reserved much later than crashkernel, we may not > need to worry about it. > ==================== > start_kernel() > ...... > -->setup_arch(&command_line); > -->arch_reserve_crashkernel(); > ...... > -->mm_core_init(); > -->kho_memory_init(); > > > kdump kernel dump the crazy scratch memory in vmcore is not very > > meaningful. Otherwise I suspect this is not tested under kdump. If > > so please disable this option for kdump. > > Yeah, it's not meaningful to dump out scratch memorys into vmcore. We > may need to dig them out from eflcorehdr. While it's an optimization, > kho scratch is not big relative to the entire system memory. It can be > done in later stage. My personal opinion. But, we don't; we only dump out the regular CMA memory that absolutely should be part of vmcore. When scratch is used during boot, it is used for regular early boot kernel allocations, such as to allocate memmap, which is an essential part of the crash dump. Pasha
On Tue, 25 Mar 2025 at 16:36, Dave Young <dyoung@redhat.com> wrote: > > > > > > > Have you tested kdump? In my mind there are two issues, one is with > > > CMA enabled, it could cause kdump crashkernel memory reservation > > > failures more often due to the fragmented low memory. Secondly, in > > > > kho scracth memorys are reserved much later than crashkernel, we may not > > need to worry about it. > > ==================== > > start_kernel() > > ...... > > -->setup_arch(&command_line); > > -->arch_reserve_crashkernel(); > > ...... > > -->mm_core_init(); > > -->kho_memory_init(); > > > > > kdump kernel dump the crazy scratch memory in vmcore is not very > > > meaningful. Otherwise I suspect this is not tested under kdump. If > > > so please disable this option for kdump. > > Ok, it is fine if this is the case, thanks Baoquan for clearing this worry. > > But the other concerns are still need to address, eg. KHO use cases > are not good for kdump. > There could be more to think about. > eg. the issues talked in thread: > https://lore.kernel.org/lkml/Z7dc9Cd8KX3b_brB@dwarf.suse.cz/T/ Rethink about this, other than previous concerns. Transferring the old kernel state to kdump kernel makes no sense since the old state is not stable as the kernel has crashed.
Hi Dave, On Wed, Mar 26, 2025 at 05:17:16PM +0800, Dave Young wrote: > On Tue, 25 Mar 2025 at 16:36, Dave Young <dyoung@redhat.com> wrote: > > > > > > > > > > Have you tested kdump? In my mind there are two issues, one is with > > > > CMA enabled, it could cause kdump crashkernel memory reservation > > > > failures more often due to the fragmented low memory. Secondly, in > > > > > > kho scracth memorys are reserved much later than crashkernel, we may not > > > need to worry about it. > > > ==================== > > > start_kernel() > > > ...... > > > -->setup_arch(&command_line); > > > -->arch_reserve_crashkernel(); > > > ...... > > > -->mm_core_init(); > > > -->kho_memory_init(); > > > > > > > kdump kernel dump the crazy scratch memory in vmcore is not very > > > > meaningful. Otherwise I suspect this is not tested under kdump. If > > > > so please disable this option for kdump. > > > > Ok, it is fine if this is the case, thanks Baoquan for clearing this worry. > > > > But the other concerns are still need to address, eg. KHO use cases > > are not good for kdump. > > There could be more to think about. > > eg. the issues talked in thread: > > https://lore.kernel.org/lkml/Z7dc9Cd8KX3b_brB@dwarf.suse.cz/T/ > > Rethink about this, other than previous concerns. Transferring the > old kernel state to kdump kernel makes no sense since the old state is > not stable as the kernel has crashed. KHO won't be active for kdump case. The KHO segments are only added to kexec_image and never to kexec_crash_image.
On Wed, 26 Mar 2025 at 19:34, Mike Rapoport <rppt@kernel.org> wrote: > > Hi Dave, > > On Wed, Mar 26, 2025 at 05:17:16PM +0800, Dave Young wrote: > > On Tue, 25 Mar 2025 at 16:36, Dave Young <dyoung@redhat.com> wrote: > > > > > > > > > > > > > Have you tested kdump? In my mind there are two issues, one is with > > > > > CMA enabled, it could cause kdump crashkernel memory reservation > > > > > failures more often due to the fragmented low memory. Secondly, in > > > > > > > > kho scracth memorys are reserved much later than crashkernel, we may not > > > > need to worry about it. > > > > ==================== > > > > start_kernel() > > > > ...... > > > > -->setup_arch(&command_line); > > > > -->arch_reserve_crashkernel(); > > > > ...... > > > > -->mm_core_init(); > > > > -->kho_memory_init(); > > > > > > > > > kdump kernel dump the crazy scratch memory in vmcore is not very > > > > > meaningful. Otherwise I suspect this is not tested under kdump. If > > > > > so please disable this option for kdump. > > > > > > Ok, it is fine if this is the case, thanks Baoquan for clearing this worry. > > > > > > But the other concerns are still need to address, eg. KHO use cases > > > are not good for kdump. > > > There could be more to think about. > > > eg. the issues talked in thread: > > > https://lore.kernel.org/lkml/Z7dc9Cd8KX3b_brB@dwarf.suse.cz/T/ > > > > Rethink about this, other than previous concerns. Transferring the > > old kernel state to kdump kernel makes no sense since the old state is > > not stable as the kernel has crashed. > > KHO won't be active for kdump case. The KHO segments are only added to > kexec_image and never to kexec_crash_image. Good to know, thanks! > > -- > Sincerely yours, > Mike. >
diff --git a/kernel/Kconfig.kexec b/kernel/Kconfig.kexec index 4d111f871951..57db99e758a8 100644 --- a/kernel/Kconfig.kexec +++ b/kernel/Kconfig.kexec @@ -95,6 +95,21 @@ config KEXEC_JUMP Jump between original kernel and kexeced kernel and invoke code in physical address mode via KEXEC +config KEXEC_HANDOVER + bool "kexec handover" + depends on ARCH_SUPPORTS_KEXEC_HANDOVER && ARCH_SUPPORTS_KEXEC_FILE + select MEMBLOCK_KHO_SCRATCH + select KEXEC_FILE + select DEBUG_FS + select LIBFDT + select CMA + select XXHASH + help + Allow kexec to hand over state across kernels by generating and + passing additional metadata to the target kernel. This is useful + to keep data or state alive across the kexec. For this to work, + both source and target kernels need to have this option enabled. + config CRASH_DUMP bool "kernel crash dumps" default ARCH_DEFAULT_CRASH_DUMP