From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-0.6 required=3.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,FREEMAIL_FORGED_FROMDOMAIN,FREEMAIL_FROM, HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 475C1C2BA1A for ; Wed, 8 Apr 2020 15:24:18 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 1CECE206C0 for ; Wed, 8 Apr 2020 15:24:18 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="UE4+gfLl" Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728897AbgDHPYR (ORCPT ); Wed, 8 Apr 2020 11:24:17 -0400 Received: from mail-wr1-f66.google.com ([209.85.221.66]:38389 "EHLO mail-wr1-f66.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728745AbgDHPYQ (ORCPT ); Wed, 8 Apr 2020 11:24:16 -0400 Received: by mail-wr1-f66.google.com with SMTP id 31so8275400wre.5 for ; Wed, 08 Apr 2020 08:24:15 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to; bh=VS45I5JryTy6gPLmg//8OHhKmPoCHc7JEw279etnSwI=; b=UE4+gfLlBPdTZ88IssRzPc8/BBA0W1v6WoxqTugC89pv8n6/oaDEaiUjz+t5zwQnUn 1Ag1m4F50OUnw5qrYzDxxhRJK5Mvsm8eV02l/7BhdLZPRzSc6+Y1DGfRQTz4sn6A5YlV YbjZy1sN6R7hqYA/O9/kS8wlIlKa3gZYk3whVCExKS8o6myHK2RUY9hseGdKWk+G4msH PSZ46/gbjCz6EO/ZNSa2p+4CbmQRS3muvmYhDBXfwaJmejjX0/q+8honiNToFPZkRliA vJH1NbvU854AhwsH3ld1nPuGy39ljuCIYXFzF6un7n3fcOmjm47keP60O6Sqq2Ih0UQS kGuQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to; bh=VS45I5JryTy6gPLmg//8OHhKmPoCHc7JEw279etnSwI=; b=oYirao57J7eDTiQQaCw8kmuSS3JLM7pamz9IARgjn3BaxAgLeDQ3apu4eeKa1IWWmB JHUnsCj3RqxhwHRpEX0tZBTNPnyAgLVjChy0k2nYfywxw5wjW4wwl1Yr6XBKmRWz0u8O JnMsCaINZLQQqV9YRPGzVY3w03/9D60yFnN238mqNKSn1clcBqL0PaP2l6vcwSNZxKxv CnoCwh45+HmWmTHD4JqEGna8u0lcyCUWINO3EhmH2A7kweLQNJfkZbnKH0mirltSxr3M zYoR93Lbd03dlEYC6A+8d3vjNqplPX5qmcvp9ZmoEyXfzJYYJvA6OcWEiJlXxdWHY0+1 iGdw== X-Gm-Message-State: AGi0PubnXCpcEazKmvRIuYLhoz0aEyn5OKL7RrUIWK7Z75ligLR4qwAF Yg49U7U3/W5LfqtFam1chZw= X-Google-Smtp-Source: APiQypKYtSlEoaruFsAq0fVU+3+ulWKUMGKAHDwwzV7LgGzHarBw/AkttQfcsuTgGPzsZZ852cus+Q== X-Received: by 2002:a5d:6310:: with SMTP id i16mr8811623wru.244.1586359454449; Wed, 08 Apr 2020 08:24:14 -0700 (PDT) Received: from Red ([2a01:cb1d:3d5:a100:2e56:dcff:fed2:c6d6]) by smtp.googlemail.com with ESMTPSA id q19sm31925948wra.38.2020.04.08.08.24.13 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 08 Apr 2020 08:24:13 -0700 (PDT) Date: Wed, 8 Apr 2020 17:24:12 +0200 From: Corentin Labbe To: Russell King - ARM Linux admin Cc: kexec@lists.infradead.org, linux-kernel@vger.kernel.org, mripard@kernel.org, wens@csie.org, ebiederm@xmission.com, linux-arm-kernel@lists.infradead.org Subject: Re: Trying to kexec on Allwinner A80 Message-ID: <20200408152412.GA3621@Red> References: <20200407100203.GK25745@shell.armlinux.org.uk> <20200407101912.GL25745@shell.armlinux.org.uk> <20200407113454.GA457@Red> <20200407122243.GN25745@shell.armlinux.org.uk> <20200407130559.GB457@Red> <20200407132602.GO25745@shell.armlinux.org.uk> <20200407134849.GC457@Red> <20200407181740.GP25745@shell.armlinux.org.uk> <20200408084029.GA1859@Red> <20200408093320.GQ25745@shell.armlinux.org.uk> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20200408093320.GQ25745@shell.armlinux.org.uk> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Apr 08, 2020 at 10:33:20AM +0100, Russell King - ARM Linux admin wrote: > On Wed, Apr 08, 2020 at 10:40:29AM +0200, Corentin Labbe wrote: > > This is the last boot: > > ## Loading init Ramdisk from Legacy Image at 2a000000 ... > > Image Name: > > Image Type: ARM Linux RAMDisk Image (uncompressed) > > Data Size: 8031928 Bytes = 7.7 MiB > > Load Address: 00000000 > > Entry Point: 00000000 > > Verifying Checksum ... OK > > ## Flattened Device Tree blob at 23000000 > > Booting using the fdt blob at 0x23000000 > > Loading Ramdisk to 29857000, end 29fffeb8 ... OK > > Loading Device Tree to 2984e000, end 29856fd1 ... OK > > Starting kernel ... > > ID:0x00000000 DT:0x2984E000 > > Uncompressing Linux... done, booting the kernel. > > [...] > > fake uboot stuff > > [...] > > DEBUG: bootz: run kexec with --debug --kexec-syscall --force --initrd /tmp/ramdisk --dtb /tmp/dtb --command-line='console=ttyS0,115200n8 root=/dev/ram0 earlycon=uart,mmio32,0x7000000 earlyprintk ip=dhcp' > > Set DEBUG! > > main:1417 OPT_KEXEC_SYSCALL > > main:1422 OPT_KEXEC_SYSCALL_AUTO > > arch_process_options:119 > > main:1500 > > main:1517 res=0 do_load=1 > > main:1519 res=0 do_kexec_file_syscall=0 > > my_load:713 > > Try gzip decompression. > > kernel: 0xb6931008 kernel_size: 0x444fc8 > > get_memory_ranges:36 > > MEMORY RANGES > > 0000000020000000-000000009fffffff (0) > > zImage_arm_load:423 > > zImage header: 0x016f2818 0x00000000 0x00444fc8 > > zImage size 0x444fc8, file size 0x444fc8 > > zImage requires 0x00455fc8 bytes > > offset 0x00006738 tag 0x5a534c4b size 8 > > Decompressed kernel sizes: > > text+data 0x00b77958 bss 0x0003d428 total 0x00bb4d80 > > Resulting kernel space: 0x00fcd920 > > Kernel: address=0x20008000 size=0x00fcd920 > > Initrd: address=0x20fd6000 size=0x016a6b97 > > DT : address=0x2267d000 size=0x00006043 > > kexec_load: entry = 0x20008000 flags = 0x280000 > > nr_segments = 3 > > segment[0].buf = 0xb6931008 > > segment[0].bufsz = 0x444fcc > > segment[0].mem = 0x20008000 > > segment[0].memsz = 0x445000 > > segment[1].buf = 0xb528a008 > > segment[1].bufsz = 0x16a6b97 > > segment[1].mem = 0x20fd6000 > > segment[1].memsz = 0x16a7000 > > segment[2].buf = 0x4ef88 > > segment[2].bufsz = 0x6043 > > segment[2].mem = 0x2267d000 > > segment[2].memsz = 0x7000 > > main:1568 res=0[ 32.098439] sun7i-dwmac 830000.ethernet eth0: Link is Down > > main:1582 res=0 do_exec=1 > > [ 32.113191] kexec_core: Starting new kernel > > [ 32.460412] Bye! > > ID:0xFFFFFFFF DT:0x2267D000 > > C:0x200080C0-0x2044CFE0->0x20B80500-0x20FC5420 > > ID:0xFFFFFFFF DT:0x2267D000 > > Uncompressing Linux... done, booting the kernel. > > Okay, that looks fine: > - the DT is out of the way, so shouldn't be corrupted by the > decompression process. > - the decompressor writes the kernel image to 0x20008000 to 0x20b7f958 > which is clear of the decompressor itself (which relocated itself > to 0x20b80500). > - the ID doesn't matter for DT booting purposes. > > I see you've gone back to using your own dtb rather than one derived > from the booting kernel. I strongly recommend against giving your own > dtb to kexec as if the boot loader modifies the DTB when calling the > first kernel (such as adding memory region information, adding MAC > addresses, enabling or disabling various devices) those modifications > will be lost if you supply your own DTB to kexec. > > Please drop "--dtb /tmp/dtb". > Thanks it works now. With a working setup I diffed dtb and the one given by uboot and it seems the missing node for booting was /memory. So now I am able to boot the same kernel as the "fake uboot". For booting a different kernel, I fdtput the dtb (for memory and bootargs), and it works until it try to mount the roofs which it find corrupt. Since the rootfs I get by the fakeuboot is a "uboot legacy image" (rootfs.cpio.gz modified by mkimage), I drop the first 64bytes but it seems not sufficiant. (even if file say it is a good rootfs.cpio.gz) Or perhaps the kernel get an invalid initrd address. Anyway the main issue is fixed. Thanks for your help