From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from lists.ozlabs.org (lists.ozlabs.org [112.213.38.117]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id B3FEDCCD1BB for ; Wed, 22 Oct 2025 10:26:13 +0000 (UTC) Received: from boromir.ozlabs.org (localhost [127.0.0.1]) by lists.ozlabs.org (Postfix) with ESMTP id 4cs5100nS1z2yyd; Wed, 22 Oct 2025 21:26:12 +1100 (AEDT) Authentication-Results: lists.ozlabs.org; arc=none smtp.remote-ip=148.163.156.1 ARC-Seal: i=1; a=rsa-sha256; d=lists.ozlabs.org; s=201707; t=1761128772; cv=none; b=LRzcSoA6jr1pUjIIRiLJgE1SzMvF6N+r/sSeJp6kmacuWaaWBM3L51jKAZ3M3vB19VPE8c/pXATP+NkE7YGx/kS+yqxZ1xxt0AympfzB/HXMjicpV/klYRh//bQzNNkvVhW0RMwQV0aWOoD7x8StmsBOZIEX3wRNUy1R0nXgPmqeSHh+5W61WIXeedcre7PzD5BndzbTf76J6O9OaL4d0+cVCNqzPpkIiUuzKctG+WREFtFWtGaNkZdNutMCsBI6GVoCyo+NTmy1T6mGzBMIWn4+26CfZko7WjZii+YfH8K0hfwlW4DvIDKNChqEUuuDRmm3dbDX807y6dBIIDIdtQ== ARC-Message-Signature: i=1; a=rsa-sha256; d=lists.ozlabs.org; s=201707; t=1761128772; c=relaxed/relaxed; bh=L4WNrkKw0EoDvuIkWpJ3zdanNv54eTH1/JatKZIwH0s=; h=From:To:Cc:Subject:Date:Message-ID:MIME-Version; b=BVhf40DB0H3Swbv0ccd75aUgZDGiHFJsJy+W35L0Z4UvjJ3DiAyZ5azQoC1I8AYM5Qhv/5O6TyNJiqGJO+rNHaR7gCPZaEseOrog6argiZ1ChNQ5vg01T2mdSlWzantt15BlUGViU+vLyUTH6pqcKDaOfE08iAFUmgWV5kJfEz/DaaJU2ltPq0L4jAVdH5LE83L6a0jtdqcIQnCyMlFp0A6HYJVbQYJCSB1Ko+C7R2L6Zkcwan+pwGr/9IIyjE/iEiCPOo98z1Ri4CxP+aVETpapehN/b4bmSXzdXWwAORZ1wh0U7yj7tHmYk5Nt7yzQw6ugykSrWMzzDByoz2OESg== ARC-Authentication-Results: i=1; lists.ozlabs.org; dmarc=pass (p=none dis=none) header.from=linux.ibm.com; dkim=pass (2048-bit key; unprotected) header.d=ibm.com header.i=@ibm.com header.a=rsa-sha256 header.s=pp1 header.b=rbQd5tz/; dkim-atps=neutral; spf=pass (client-ip=148.163.156.1; helo=mx0a-001b2d01.pphosted.com; envelope-from=sourabhjain@linux.ibm.com; receiver=lists.ozlabs.org) smtp.mailfrom=linux.ibm.com Authentication-Results: lists.ozlabs.org; dmarc=pass (p=none dis=none) header.from=linux.ibm.com Authentication-Results: lists.ozlabs.org; dkim=pass (2048-bit key; unprotected) header.d=ibm.com header.i=@ibm.com header.a=rsa-sha256 header.s=pp1 header.b=rbQd5tz/; dkim-atps=neutral Authentication-Results: lists.ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=linux.ibm.com (client-ip=148.163.156.1; helo=mx0a-001b2d01.pphosted.com; envelope-from=sourabhjain@linux.ibm.com; receiver=lists.ozlabs.org) Received: from mx0a-001b2d01.pphosted.com (mx0a-001b2d01.pphosted.com [148.163.156.1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by lists.ozlabs.org (Postfix) with ESMTPS id 4cs50v27nTz2yjx for ; Wed, 22 Oct 2025 21:26:06 +1100 (AEDT) Received: from pps.filterd (m0356517.ppops.net [127.0.0.1]) by mx0a-001b2d01.pphosted.com (8.18.1.2/8.18.1.2) with ESMTP id 59M7RRpE017349; Wed, 22 Oct 2025 10:25:58 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ibm.com; h=cc :content-transfer-encoding:date:from:message-id:mime-version :subject:to; s=pp1; bh=L4WNrkKw0EoDvuIkWpJ3zdanNv54eTH1/JatKZIwH 0s=; b=rbQd5tz/T8wwhuE0RlkH0D3GVAECx4HRpTNFwNhWxaY4K5ma7M6CfIAFp veCn4A6Pt4Y8VEt2kyL3FnWNDmdrSNRKZ9GFlchgjA/Y2ZW8Xe+59mkJr0ISwdpl MiiObhNnI8chyVE06NxxjwOfoFJlZlzUe/OHDsX6TNaVJLg7lKDbtLDoSfJxrWIk +XQff9HAPPZn7OlSxBTLSTnRf+HK23O8RcLwfooqrMVSsSBqqyklMPhuT1cRQ+Wr vyGvbk4bj8Uq6K6Wxw8ksQeze3JdcPnzBVnJCg9bXQBaEqo8lTL7hOWZbkVU7pRH tq6cbc2cjxB1snKh6naLD45TtcR8w== Received: from pps.reinject (localhost [127.0.0.1]) by mx0a-001b2d01.pphosted.com (PPS) with ESMTPS id 49v31s44mn-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Wed, 22 Oct 2025 10:25:58 +0000 (GMT) Received: from m0356517.ppops.net (m0356517.ppops.net [127.0.0.1]) by pps.reinject (8.18.1.12/8.18.0.8) with ESMTP id 59MAHrtt004413; Wed, 22 Oct 2025 10:25:58 GMT Received: from ppma13.dal12v.mail.ibm.com (dd.9e.1632.ip4.static.sl-reverse.com [50.22.158.221]) by mx0a-001b2d01.pphosted.com (PPS) with ESMTPS id 49v31s44mh-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Wed, 22 Oct 2025 10:25:58 +0000 (GMT) Received: from pps.filterd (ppma13.dal12v.mail.ibm.com [127.0.0.1]) by ppma13.dal12v.mail.ibm.com (8.18.1.2/8.18.1.2) with ESMTP id 59M805f3002367; Wed, 22 Oct 2025 10:25:57 GMT Received: from smtprelay01.fra02v.mail.ibm.com ([9.218.2.227]) by ppma13.dal12v.mail.ibm.com (PPS) with ESMTPS id 49vqejfhu3-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Wed, 22 Oct 2025 10:25:57 +0000 Received: from smtpav07.fra02v.mail.ibm.com (smtpav07.fra02v.mail.ibm.com [10.20.54.106]) by smtprelay01.fra02v.mail.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id 59MAPriv62456302 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Wed, 22 Oct 2025 10:25:53 GMT Received: from smtpav07.fra02v.mail.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 4560A20043; Wed, 22 Oct 2025 10:25:53 +0000 (GMT) Received: from smtpav07.fra02v.mail.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 0A10120040; Wed, 22 Oct 2025 10:25:51 +0000 (GMT) Received: from li-4f5ba44c-27d4-11b2-a85c-a08f5b49eada.in.ibm.com (unknown [9.109.204.116]) by smtpav07.fra02v.mail.ibm.com (Postfix) with ESMTP; Wed, 22 Oct 2025 10:25:50 +0000 (GMT) From: Sourabh Jain To: linuxppc-dev@lists.ozlabs.org Cc: Sourabh Jain , Baoquan he , Jiri Bohac , Hari Bathini , Madhavan Srinivasan , Mahesh Salgaonkar , Michael Ellerman , "Ritesh Harjani (IBM)" , Shivang Upadhyay Subject: [PATCH] powerpc/kdump: Add support for crashkernel CMA reservation Date: Wed, 22 Oct 2025 15:55:31 +0530 Message-ID: <20251022102531.657147-1-sourabhjain@linux.ibm.com> X-Mailer: git-send-email 2.51.0 X-Mailing-List: linuxppc-dev@lists.ozlabs.org List-Id: List-Help: List-Owner: List-Post: List-Archive: , List-Subscribe: , , List-Unsubscribe: Precedence: list MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-TM-AS-GCONF: 00 X-Proofpoint-ORIG-GUID: WlsAFepaj27xWP9bSpdM4F1KvlPiDfLY X-Proofpoint-GUID: 6kA8EQxX0CPSoWQJVns_pr0uCVwF47mh X-Proofpoint-Spam-Details-Enc: AW1haW4tMjUxMDE4MDAyMiBTYWx0ZWRfX4JG2XaMdlcuP tp6xKB8tE/WlSSJJosQKssXTO7NQ1SmVMcj4TLLVDRrMnWo03mgxNoaggooqYVqEBcjrheM3m5e vAyWSDM48WnVCYd1gm94Ro4Nj4eOqg9Kp2/zPwGNGXTbciOaTxVRjr0eJRQw0TLBLKbqxp8in95 yFuv3qaz5ZDFhyMz9KZkzKySdgQ3ZcdxlgU4Lm30uAhpmhFVNH+g7RqRRV+1YloAJrqsqs78mEV kH3sojfm3x/MYFqgX2pPc0YNbxeMTvOZskuG1SVIaEch/vW4orpylMFd98En114ofBwaTAmLo/J mrJYSgnWPgTBB10ZE+NCCnYhM7+rGhjk3vvz5x+BqQqG/CDTxeAXx2U4nwHwg/xkmkblOZwzLE7 EOlLGhpaQxDrpcCW20+aA9i3RQ8tDw== X-Authority-Analysis: v=2.4 cv=IJYPywvG c=1 sm=1 tr=0 ts=68f8b136 cx=c_pps a=AfN7/Ok6k8XGzOShvHwTGQ==:117 a=AfN7/Ok6k8XGzOShvHwTGQ==:17 a=x6icFKpwvdMA:10 a=VkNPw1HP01LnGYTKEx00:22 a=20KFwNOVAAAA:8 a=VnNF1IyMAAAA:8 a=pGLkceISAAAA:8 a=-o-kazUmVXvP5PRTSMQA:9 X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.293,Aquarius:18.0.1121,Hydra:6.1.9,FMLib:17.12.80.40 definitions=2025-10-22_03,2025-10-13_01,2025-03-28_01 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 phishscore=0 lowpriorityscore=0 clxscore=1011 suspectscore=0 spamscore=0 bulkscore=0 adultscore=0 impostorscore=0 malwarescore=0 priorityscore=1501 classifier=typeunknown authscore=0 authtc= authcc= route=outbound adjust=0 reason=mlx scancount=1 engine=8.19.0-2510020000 definitions=main-2510180022 Commit 35c18f2933c5 ("Add a new optional ",cma" suffix to the crashkernel= command line option") and commit ab475510e042 ("kdump: implement reserve_crashkernel_cma") added CMA support for kdump crashkernel reservation. Extend crashkernel CMA reservation support to powerpc. The following changes are made to enable CMA reservation on powerpc: - Parse and obtain the CMA reservation size along with other crashkernel parameters - Call reserve_crashkernel_cma() to allocate the CMA region for kdump - Include the CMA-reserved ranges in the usable memory ranges for the kdump kernel to use. - Exclude the CMA-reserved ranges from the crash kernel memory to prevent them from being exported through /proc/vmcore To ensure proper CMA reservation, reserve_crashkernel_cma() is called after pageblock_order is initialized. Cc: Baoquan he Cc: Jiri Bohac Cc: Hari Bathini Cc: Madhavan Srinivasan Cc: Mahesh Salgaonkar Cc: Michael Ellerman Cc: Ritesh Harjani (IBM) Cc: Shivang Upadhyay Signed-off-by: Sourabh Jain --- arch/powerpc/include/asm/kexec.h | 7 +++++++ arch/powerpc/kernel/setup-common.c | 4 +++- arch/powerpc/kexec/core.c | 11 ++++++++++- arch/powerpc/kexec/ranges.c | 16 +++++++++++++++- 4 files changed, 35 insertions(+), 3 deletions(-) diff --git a/arch/powerpc/include/asm/kexec.h b/arch/powerpc/include/asm/kexec.h index 4bbf9f699aaa..c158ffbfeadb 100644 --- a/arch/powerpc/include/asm/kexec.h +++ b/arch/powerpc/include/asm/kexec.h @@ -51,9 +51,16 @@ #ifndef __ASSEMBLER__ #include +#include typedef void (*crash_shutdown_t)(void); +#ifdef CRASHKERNEL_CMA +void kdump_cma_reserve(void); +#else +static inline void kdump_cma_reserve(void) { } +#endif + #ifdef CONFIG_KEXEC_CORE struct kimage; struct pt_regs; diff --git a/arch/powerpc/kernel/setup-common.c b/arch/powerpc/kernel/setup-common.c index 68d47c53876c..1279e8777366 100644 --- a/arch/powerpc/kernel/setup-common.c +++ b/arch/powerpc/kernel/setup-common.c @@ -35,6 +35,7 @@ #include #include #include +#include #include #include #include @@ -995,11 +996,12 @@ void __init setup_arch(char **cmdline_p) initmem_init(); /* - * Reserve large chunks of memory for use by CMA for fadump, KVM and + * Reserve large chunks of memory for use by CMA for kdump, fadump, KVM and * hugetlb. These must be called after initmem_init(), so that * pageblock_order is initialised. */ fadump_cma_init(); + kdump_cma_reserve(); kvm_cma_reserve(); gigantic_hugetlb_cma_reserve(); diff --git a/arch/powerpc/kexec/core.c b/arch/powerpc/kexec/core.c index d1a2d755381c..3328b1acd875 100644 --- a/arch/powerpc/kexec/core.c +++ b/arch/powerpc/kexec/core.c @@ -33,6 +33,9 @@ void machine_kexec_cleanup(struct kimage *image) { } + +static unsigned long long cma_size; + /* * Do not allocate memory (or fail in any way) in machine_kexec(). * We are past the point of no return, committed to rebooting now. @@ -110,7 +113,7 @@ void __init arch_reserve_crashkernel(void) /* use common parsing */ ret = parse_crashkernel(boot_command_line, total_mem_sz, &crash_size, - &crash_base, NULL, NULL, NULL); + &crash_base, NULL, &cma_size, NULL); if (ret) return; @@ -130,6 +133,12 @@ void __init arch_reserve_crashkernel(void) reserve_crashkernel_generic(crash_size, crash_base, 0, false); } +void __init kdump_cma_reserve(void) +{ + if (cma_size) + reserve_crashkernel_cma(cma_size); +} + int __init overlaps_crashkernel(unsigned long start, unsigned long size) { return (start + size) > crashk_res.start && start <= crashk_res.end; diff --git a/arch/powerpc/kexec/ranges.c b/arch/powerpc/kexec/ranges.c index 3702b0bdab14..dad58fc38251 100644 --- a/arch/powerpc/kexec/ranges.c +++ b/arch/powerpc/kexec/ranges.c @@ -515,7 +515,7 @@ int get_exclude_memory_ranges(struct crash_mem **mem_ranges) */ int get_usable_memory_ranges(struct crash_mem **mem_ranges) { - int ret; + int ret, i; /* * Early boot failure observed on guests when low memory (first memory @@ -528,6 +528,13 @@ int get_usable_memory_ranges(struct crash_mem **mem_ranges) if (ret) goto out; + for (i = 0; i < crashk_cma_cnt; i++) { + ret = add_mem_range(mem_ranges, crashk_cma_ranges[i].start, + crashk_cma_ranges[i].end); + if (ret) + goto out; + } + ret = add_rtas_mem_range(mem_ranges); if (ret) goto out; @@ -595,6 +602,13 @@ int get_crash_memory_ranges(struct crash_mem **mem_ranges) if (ret) goto out; + for (i = 0; i < crashk_cma_cnt; ++i) { + ret = crash_exclude_mem_range(tmem, crashk_cma_ranges[i].start, + crashk_cma_ranges[i].end); + if (ret) + goto out; + } + /* * FIXME: For now, stay in parity with kexec-tools but if RTAS/OPAL * regions are exported to save their context at the time of -- 2.51.0