Hi Jason, thanks for reviewing the patchset! On Fri, Mar 21, 2025 at 10:34:47 -0300, Jason Gunthorpe <jgg@xxxxxxxxxx> wrote: > On Wed, Mar 19, 2025 at 06:55:42PM -0700, Changyuan Lyu wrote: > > From: Alexander Graf <graf@xxxxxxxxxx> > > > > Add the core infrastructure to generate Kexec HandOver metadata. Kexec > > HandOver is a mechanism that allows Linux to preserve state - arbitrary > > properties as well as memory locations - across kexec. > > > > It does so using 2 concepts: > > > > 1) State Tree - Every KHO kexec carries a state tree that describes the > > state of the system. The state tree is represented as hash-tables. > > Device drivers can add/remove their data into/from the state tree at > > system runtime. On kexec, the tree is converted to FDT (flattened > > device tree). > > Why are we changing this? I much prefered the idea of having recursive > FDTs than this notion copying eveything into tables then out into FDT? > Now that we have the preserved pages mechanism there is a pretty > direct path to doing recursive FDT. We are not copying data into the hashtables, instead the hashtables only record the address and size of the data to be serialized into FDT. The idea is similar to recording preserved folios in xarray and then serialize it to linked pages. > I feel like this patch is premature, it should come later in the > project along with a stronger justification for this approach. > > IHMO keep things simple for this series, just the very basics. The main purpose of using hashtables is to enable KHO users to save data to KHO at any time, not just at the time of activate/finalize KHO through sysfs/debugfs. For example, FDBox can save the data into KHO tree once a new fd is saved to KHO. Also, using hashtables allows KHO users to add data to KHO concurrently, while with notifiers, KHO users' callbacks are executed serially. Regarding the suggestion of recursive FDT, I feel like it is already doable with this patchset, or even with Mike's V4 patch. A KHO user can just allocates a buffer, serialize all its states to the buffer using libfdt (or even using other binary formats), save the address of the buffer to KHO's tree, and finally register the buffer's underlying pages/folios with kho_preserve_folio(). > > +int register_kho_notifier(struct notifier_block *nb) > > +{ > > + return blocking_notifier_chain_register(&kho_out.chain_head, nb); > > +} > > +EXPORT_SYMBOL_GPL(register_kho_notifier); > > And another different set of notifiers? :( I changed the semantics of the notifiers. In Mike's V4, the KHO notifier is to pass the fdt pointer to KHO users to push data into the blob. In this patchset, it notifies KHO users about the last chance for saving data to KHO. It is not necessary for every KHO user to register a notifier, as they can use the helper functions to save data to KHO tree anytime (but before the KHO tree is converted and frozen). For example, FDBox would not need a notifier if it saves data to KHO tree immediately once an FD is registered to it. However, some KHO users may still want to add data just before kexec, so I kept the notifiers and allow KHO users to get notified when the state tree hashtables are about to be frozen and converted to FDT. > > +static int kho_finalize(void) > > +{ > > + int err = 0; > > + void *fdt; > > + > > + fdt = kvmalloc(kho_out.fdt_max, GFP_KERNEL); > > + if (!fdt) > > + return -ENOMEM; > > We go to all the trouble of keeping track of stuff in dynamic hashes > but still can't automatically size the fdt and keep the dumb uapi to > have the user say? :( :( The reason of keeping fdt_max in the this patchset is to simplify the support of kexec_file_load(). We want to be able to do kexec_file_load() first and then do KHO activation/finalization to move kexec_file_load() out of the blackout window. At the time of kexec_file_load(), we need to pass the KHO FDT address to the new kernel's setup data (x86) or devicetree (arm), but KHO FDT is not generated yet. The simple solution used in this patchset is to reserve a ksegment of size fdt_max and pass the address of that ksegment to the new kernel. The final FDT is copied to that ksegment in kernel_kexec(). The extra benefit of this solution is the reserved ksegment is physically contiguous. To completely remove fdt_max, I am considering the idea in [1]. At the time of kexec_file_load(), we pass the address of an anchor page to the new kernel, and the anchor page will later be fulfilled with the physical addresses of the pages containing the FDT blob. Multiple anchor pages can be linked together. The FDT blob pages can be physically noncontiguous. [1] https://lore.kernel.org/all/CA+CK2bBBX+HgD0HLj-AyTScM59F2wXq11BEPgejPMHoEwqj+_Q@xxxxxxxxxxxxxx/ Best, Changyuan