From nobody Mon Feb 9 07:22:16 2026 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id C247D1EA7E7; Thu, 6 Feb 2025 13:29:24 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1738848564; cv=none; b=Q+hp9ZdjssNhscjtb5u9r4I6TFa4arCzNFYn3OMm/61Ng1Pt4GH/hBEEMKoo1t6HK1xS/l/7ei80k1KqQY937a7JR0p2QUNryPGdMemjSDLy8Co762mZSty1wHMHLyVYUlZsVg3klv5DdxakKJlDvOy6zQAVCXBs2NFZqRH+/zU= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1738848564; c=relaxed/simple; bh=X7mR6kiT/fP3C44/I2+NRTu7ef7doFLaO1U8zS8Qi9w=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=Wll2gYmeEsYRsMJFP78pvjAlnpGsBiZt/tafvnjh6n9vT+6fa1s7/VxE0g6NVBP23ui0O5hYI07bNnnvIH7uMf7x7IciHtk0WG3FvckCf2gObKNaMXESngNdrlLHuTj2ZI2BvMt5oa2f3MAaJLVzC3ME8LUWR/FVLwrdOrcMtls= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=Q3ZxlqkB; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="Q3ZxlqkB" Received: by smtp.kernel.org (Postfix) with ESMTPSA id BBE40C4CEDF; Thu, 6 Feb 2025 13:29:15 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1738848564; bh=X7mR6kiT/fP3C44/I2+NRTu7ef7doFLaO1U8zS8Qi9w=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=Q3ZxlqkBYYhEdIJRnvdvLTErR+PthzQXy3Zxyfp34sfONUHY6JyXio3UB3ihtRZFZ AChoLyh1lqS5kBY9KDoO6gA/r9YCgzeUntG4/FQPSXZ5REwjRRZBCqGjd2JQE6Dy8c 08oliT0qZRQXtfz2TC4v8BwURGflWE5xZiglbUtMfzUXLRpkJom5sZ3LGYNcST1YG0 z9vu406bHiv1idZHn4xmBg7I12AnuMDbziGboj7zAZ+95NCWR5WWrkQ7r/Kzose6yg JpGvRZheiC/kEfCgfagYXGWCHTR4v8zMhdTmJYQClKFYkCK5g3n4ZZLyDTx1Zngce9 Arf1qcyN4wlPw== From: Mike Rapoport To: linux-kernel@vger.kernel.org Cc: Alexander Graf , Andrew Morton , Andy Lutomirski , Anthony Yznaga , Arnd Bergmann , Ashish Kalra , Benjamin Herrenschmidt , Borislav Petkov , Catalin Marinas , Dave Hansen , David Woodhouse , Eric Biederman , Ingo Molnar , James Gowans , Jonathan Corbet , Krzysztof Kozlowski , Mark Rutland , Mike Rapoport , Paolo Bonzini , Pasha Tatashin , "H. Peter Anvin" , Peter Zijlstra , Pratyush Yadav , Rob Herring , Rob Herring , Saravana Kannan , Stanislav Kinsburskii , Steven Rostedt , Thomas Gleixner , Tom Lendacky , Usama Arif , Will Deacon , devicetree@vger.kernel.org, kexec@lists.infradead.org, linux-arm-kernel@lists.infradead.org, linux-doc@vger.kernel.org, linux-mm@kvack.org, x86@kernel.org Subject: [PATCH v4 08/14] kexec: Add config option for KHO Date: Thu, 6 Feb 2025 15:27:48 +0200 Message-ID: <20250206132754.2596694-9-rppt@kernel.org> X-Mailer: git-send-email 2.47.2 In-Reply-To: <20250206132754.2596694-1-rppt@kernel.org> References: <20250206132754.2596694-1-rppt@kernel.org> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" From: Alexander Graf We have all generic code in place now to support Kexec with KHO. This patch adds a config option that depends on architecture support to enable KHO support. Signed-off-by: Alexander Graf Co-developed-by: Mike Rapoport (Microsoft) Signed-off-by: Mike Rapoport (Microsoft) --- kernel/Kconfig.kexec | 13 +++++++++++++ 1 file changed, 13 insertions(+) diff --git a/kernel/Kconfig.kexec b/kernel/Kconfig.kexec index 4d111f871951..332824d8d6dc 100644 --- a/kernel/Kconfig.kexec +++ b/kernel/Kconfig.kexec @@ -95,6 +95,19 @@ config KEXEC_JUMP Jump between original kernel and kexeced kernel and invoke code in physical address mode via KEXEC =20 +config KEXEC_HANDOVER + bool "kexec handover" + depends on ARCH_SUPPORTS_KEXEC_HANDOVER && ARCH_SUPPORTS_KEXEC_FILE + select MEMBLOCK_KHO_SCRATCH + select KEXEC_FILE + select LIBFDT + select CMA + help + Allow kexec to hand over state across kernels by generating and + passing additional metadata to the target kernel. This is useful + to keep data or state alive across the kexec. For this to work, + both source and target kernels need to have this option enabled. + config CRASH_DUMP bool "kernel crash dumps" default ARCH_DEFAULT_CRASH_DUMP --=20 2.47.2