From: Pratyush Yadav <pratyush@kernel.org>
To: Evangelos Petrongonas <epetron@amazon.de>
Cc: Ard Biesheuvel <ardb@kernel.org>,
Mike Rapoport <rppt@kernel.org>,
Alexander Graf <graf@amazon.com>,
Changyuan Lyu <changyuanl@google.com>,
Andrew Morton <akpm@linux-foundation.org>,
Baoquan He <bhe@redhat.com>, <kexec@lists.infradead.org>,
<linux-mm@kvack.org>, <linux-efi@vger.kernel.org>,
<linux-kernel@vger.kernel.org>, <nh-open-source@amazon.com>
Subject: Re: [PATCH v3 2/2] efi: Support booting with kexec handover (KHO)
Date: Tue, 09 Sep 2025 14:17:35 +0200 [thread overview]
Message-ID: <mafs0segvlt0g.fsf@kernel.org> (raw)
In-Reply-To: <b34da9fd50c89644cd4204136cfa6f5533445c56.1755721529.git.epetron@amazon.de>
On Thu, Aug 21 2025, Evangelos Petrongonas wrote:
> When KHO (Kexec HandOver) is enabled, it sets up scratch memory regions
> early during device tree scanning. After kexec, the new kernel
> exclusively uses this region for memory allocations during boot up to
> the initialization of the page allocator
>
> However, when booting with EFI, EFI's reserve_regions() uses
> memblock_remove(0, PHYS_ADDR_MAX) to clear all memory regions before
> rebuilding them from EFI data. This destroys KHO scratch regions and
> their flags, thus causing a kernel panic, as there are no scratch
> memory regions.
>
> Instead of wholesale removal, iterate through memory regions and only
> remove non-KHO ones. This preserves KHO scratch regions, which are
> good known memory, while still allowing EFI to rebuild its memory map.
>
> Acked-by: Mike Rapoport (Microsoft) <rppt@kernel.org>
> Signed-off-by: Evangelos Petrongonas <epetron@amazon.de>
> ---
> Changes in v3:
> - Improve the code comments, by stating that the scratch regions are
> good known memory
>
> Changes in v2:
> - Replace the for loop with for_each_mem_region
> - Fix comment indentation
> - Amend commit message to specify that scratch regions
> are known good regions
>
> drivers/firmware/efi/efi-init.c | 29 +++++++++++++++++++++++++----
> 1 file changed, 25 insertions(+), 4 deletions(-)
>
> diff --git a/drivers/firmware/efi/efi-init.c b/drivers/firmware/efi/efi-init.c
> index a00e07b853f2..a65c2d5b9e7b 100644
> --- a/drivers/firmware/efi/efi-init.c
> +++ b/drivers/firmware/efi/efi-init.c
> @@ -12,6 +12,7 @@
> #include <linux/efi.h>
> #include <linux/fwnode.h>
> #include <linux/init.h>
> +#include <linux/kexec_handover.h>
> #include <linux/memblock.h>
> #include <linux/mm_types.h>
> #include <linux/of.h>
> @@ -164,12 +165,32 @@ static __init void reserve_regions(void)
> pr_info("Processing EFI memory map:\n");
>
> /*
> - * Discard memblocks discovered so far: if there are any at this
> - * point, they originate from memory nodes in the DT, and UEFI
> - * uses its own memory map instead.
> + * Discard memblocks discovered so far except for KHO scratch
> + * regions. Most memblocks at this point originate from memory nodes
> + * in the DT and UEFI uses its own memory map instead. However, if
> + * KHO is enabled, scratch regions, which are good known memory
> + * must be preserved.
> */
> memblock_dump_all();
> - memblock_remove(0, PHYS_ADDR_MAX);
> +
> + if (is_kho_boot()) {
> + struct memblock_region *r;
> +
> + /* Remove all non-KHO regions */
> + for_each_mem_region(r) {
> + if (!memblock_is_kho_scratch(r)) {
> + memblock_remove(r->base, r->size);
> + r--;
Hmm, this caught me off-guard. I had to do a double take to realize that
memblock_remove() would decrease memblock.memory.cnt and move the whole
regions array back. A comment would have been nice here.
But then, I wouldn't want you to do a full resend of the series for this
minor nitpick. So perhaps whoever is taking this patch can add one when
applying? Either way is fine though...
Acked-by: Pratyush Yadav <pratyush@kernel.org>
> + }
> + }
> + } else {
> + /*
> + * KHO is disabled. Discard memblocks discovered so far:
> + * if there are any at this point, they originate from memory
> + * nodes in the DT, and UEFI uses its own memory map instead.
> + */
> + memblock_remove(0, PHYS_ADDR_MAX);
> + }
>
> for_each_efi_memory_desc(md) {
> paddr = md->phys_addr;
--
Regards,
Pratyush Yadav
next prev parent reply other threads:[~2025-09-09 12:17 UTC|newest]
Thread overview: 12+ messages / expand[flat|nested] mbox.gz Atom feed top
2025-08-21 17:58 [PATCH v3 0/2] efi: Fix EFI boot with kexec handover (KHO) Evangelos Petrongonas
2025-08-21 17:58 ` [PATCH v3 1/2] kexec: introduce is_kho_boot() Evangelos Petrongonas
2025-09-09 12:13 ` Pratyush Yadav
2025-08-21 17:59 ` [PATCH v3 2/2] efi: Support booting with kexec handover (KHO) Evangelos Petrongonas
2025-08-23 21:47 ` Ard Biesheuvel
2025-09-04 7:19 ` Ard Biesheuvel
2025-09-04 9:34 ` Evangelos Petrongonas
2025-09-04 9:39 ` Ard Biesheuvel
2025-09-04 12:57 ` Evangelos Petrongonas
2025-09-08 5:50 ` Ard Biesheuvel
2025-09-09 12:17 ` Pratyush Yadav [this message]
2025-08-21 20:58 ` [PATCH v3 0/2] efi: Fix EFI boot " Andrew Morton
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=mafs0segvlt0g.fsf@kernel.org \
--to=pratyush@kernel.org \
--cc=akpm@linux-foundation.org \
--cc=ardb@kernel.org \
--cc=bhe@redhat.com \
--cc=changyuanl@google.com \
--cc=epetron@amazon.de \
--cc=graf@amazon.com \
--cc=kexec@lists.infradead.org \
--cc=linux-efi@vger.kernel.org \
--cc=linux-kernel@vger.kernel.org \
--cc=linux-mm@kvack.org \
--cc=nh-open-source@amazon.com \
--cc=rppt@kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).