From nobody Wed Oct 8 18:23:26 2025 Received: from mail-yb1-f182.google.com (mail-yb1-f182.google.com [209.85.219.182]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id C541E2F49E6 for ; Wed, 25 Jun 2025 23:18:47 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.219.182 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1750893530; cv=none; b=NAgFM8N1Q4Uh+OcNcQlMvO7w3iq/OZLIQnpYtbbf94S/Ta6yGcCi1nYjYk+eJgiF8yEaIf/mnnN202QjuurZFboUFe2Zj5YkEKWVjuDUq4a3GspRm2A0AZFDkMk8ZBNLoTJ/MoEXdm+ub8yn7kX2yMhQgEH/k3/vgK4QmX6EBig= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1750893530; c=relaxed/simple; bh=PF4zPZ0Sp9cFfB82RPz+AlnuSwnkSMU7iIBj0zSOFYQ=; h=From:To:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=DpzuvrjylUO8/wmWBdiFdo3ZevgoWtkDk7KKNMPqUh58pU0Q+Yw6vketLWS8VE6xRVhN1ZraBpCFLHjj3sYjgqxjFdrB+7ueXI4eZgmjfJxPRPbBCOxQlUoFoO2KN2KTMSWsnBHatEI89eKxIR8Z/6GeMTMToJXJI7ApH5824+g= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=soleen.com; spf=pass smtp.mailfrom=soleen.com; dkim=pass (2048-bit key) header.d=soleen-com.20230601.gappssmtp.com header.i=@soleen-com.20230601.gappssmtp.com header.b=ViCB+3V5; arc=none smtp.client-ip=209.85.219.182 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=soleen.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=soleen.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=soleen-com.20230601.gappssmtp.com header.i=@soleen-com.20230601.gappssmtp.com header.b="ViCB+3V5" Received: by mail-yb1-f182.google.com with SMTP id 3f1490d57ef6-e733cd55f9eso318281276.1 for ; Wed, 25 Jun 2025 16:18:47 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=soleen-com.20230601.gappssmtp.com; s=20230601; t=1750893527; x=1751498327; darn=vger.kernel.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:from:to:cc:subject:date:message-id :reply-to; bh=Oli2O51+2uVx0lLUJdn7wg4sXYNT345uLjNKlql1qmI=; b=ViCB+3V5htYFrHZMRHANBUKMG+bkSjOMn8AQIhMlOn+nvaOrw4Pb6+esS6L6xFmYKu hs2+nIZrpnNdYCgi5qOyECPNN+f2DM7wwi4mFyHufgiotz4Kpj1jyCCgG8kKAV4R6MlB em/T7NC40JexR821d2Euyyu07JvKz1HymVxiJTBvj0+DvHwUNR0Qj8wwZNGftTUoj5ID x2I8fABa4RfLSpkjzIeb8rqOw9DUu869p2tau+5MSmpOJPCoTpGnvCLuQj/Loae59pAT e7X5Gnlihiq32KW7A50UaDXPqnbPnYiLw+66a1OhK7J2Bwbvj7j4F8G84y5iBbLJ39TJ yDuw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1750893527; x=1751498327; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=Oli2O51+2uVx0lLUJdn7wg4sXYNT345uLjNKlql1qmI=; b=oj3gSgTtH1fMCgL9JoBIj+fc0PvKThhZdKJvErJ4YmoaM/1zIt4BAAw2zhw2ugX5ov 00aAH7TLNVF5x/tKnpN5Oh7Zbk36PeEKiR3BAqg7pa9+PTmNI2Hm7mWSct7fOe1Bm0Ta 2Odo/7qIeAuiP66w85l0l50xOtlWaIakNT9eOSQGbqujMwB1EXIsiQSzXe7KKKg2n+dY 8k6jzWeCKqKP5UDFLTqyxHjImzXElMDFvcSg/oDZ0egGgrHyLbXd3ewcn6qiVCoWdJcP yCNuc/70nOeoVJ/Q22N+ZF9BhyiPfWKUHi0NKYgdRN5AQE/0F83qGwsz23AktU0CoBm7 QMKA== X-Forwarded-Encrypted: i=1; AJvYcCVmLsVoj0eRVGboWlipHuC5+q5CVzo514IJ1jNjt2SgU7RTCpYi6Qg+bySpvour/KQNXpYiBxpUcA6vYp0=@vger.kernel.org X-Gm-Message-State: AOJu0YwgdZ2ayNEBXeBqF0W6OckkVmtvAkQGsYXGcDxGNDGxHLUnPbNx gsMjYliNBKcBzhRwJ5xiPU2L+fNLyXZGHRRIb85qoEew9niWePRse1rX+NDX7SkE7Gs= X-Gm-Gg: ASbGncsS4OEoDwjC25+Nj7Gz/k0tfF7g7QA+C5BqvGxEJGMMgcom69R7DVPTfW/Tux3 wb0RZPv/YbodYLBIkoqAz0DpwHUUrpZZa9o9S8zrwKSxd/cMi3yivw+7x86JJEXPFVgzkPPyTTS HYQKEJcwabKQilRFhm9qiEe4NskNwSqIRiHAJRCf0DHwa4jSYksFw9pPIscgzgYoK9kP77YXGZ1 kWbM92deEe67XYL4jxmtzDGiWvMAHkKRdMbLhmT1LRQE93Bj8LBBHALXHRw18SehCQmQltJ5mdK KRP/zQLerxDbSQyAo3Q/Nj1xAQJjBr3+uk14T9JUoeE9HNPCsOKvrjQSH2OUgfncLorSqUbEwWK +JsTYVRkz9Ss05QlprRxxjUTGMRc6cwbAR8Sip8zktqpYchWqweDK X-Google-Smtp-Source: AGHT+IF1PnL73EgTJEwVzGrV6WgSUuuJlktSvOW7rB8u8kfkaYIkr57swyuuC7E1tjKCDwfV/0m2Xg== X-Received: by 2002:a05:6902:2305:b0:e84:2a48:993f with SMTP id 3f1490d57ef6-e879b8875e2mr2677057276.7.1750893526742; Wed, 25 Jun 2025 16:18:46 -0700 (PDT) Received: from soleen.c.googlers.com.com (64.167.245.35.bc.googleusercontent.com. [35.245.167.64]) by smtp.gmail.com with ESMTPSA id 3f1490d57ef6-e842ac5c538sm3942684276.33.2025.06.25.16.18.45 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 25 Jun 2025 16:18:46 -0700 (PDT) From: Pasha Tatashin To: pratyush@kernel.org, jasonmiu@google.com, graf@amazon.com, changyuanl@google.com, pasha.tatashin@soleen.com, rppt@kernel.org, dmatlack@google.com, rientjes@google.com, corbet@lwn.net, rdunlap@infradead.org, ilpo.jarvinen@linux.intel.com, kanie@linux.alibaba.com, ojeda@kernel.org, aliceryhl@google.com, masahiroy@kernel.org, akpm@linux-foundation.org, tj@kernel.org, yoann.congal@smile.fr, mmaurer@google.com, roman.gushchin@linux.dev, chenridong@huawei.com, axboe@kernel.dk, mark.rutland@arm.com, jannh@google.com, vincent.guittot@linaro.org, hannes@cmpxchg.org, dan.j.williams@intel.com, david@redhat.com, joel.granados@kernel.org, rostedt@goodmis.org, anna.schumaker@oracle.com, song@kernel.org, zhangguopeng@kylinos.cn, linux@weissschuh.net, linux-kernel@vger.kernel.org, linux-doc@vger.kernel.org, linux-mm@kvack.org, gregkh@linuxfoundation.org, tglx@linutronix.de, mingo@redhat.com, bp@alien8.de, dave.hansen@linux.intel.com, x86@kernel.org, hpa@zytor.com, rafael@kernel.org, dakr@kernel.org, bartosz.golaszewski@linaro.org, cw00.choi@samsung.com, myungjoo.ham@samsung.com, yesanishhere@gmail.com, Jonathan.Cameron@huawei.com, quic_zijuhu@quicinc.com, aleksander.lobakin@intel.com, ira.weiny@intel.com, andriy.shevchenko@linux.intel.com, leon@kernel.org, lukas@wunner.de, bhelgaas@google.com, wagi@kernel.org, djeffery@redhat.com, stuart.w.hayes@gmail.com, ptyadav@amazon.de, lennart@poettering.net, brauner@kernel.org, linux-api@vger.kernel.org, linux-fsdevel@vger.kernel.org Subject: [PATCH v1 02/32] kho: mm: Don't allow deferred struct page with KHO Date: Wed, 25 Jun 2025 23:17:49 +0000 Message-ID: <20250625231838.1897085-3-pasha.tatashin@soleen.com> X-Mailer: git-send-email 2.50.0.727.gbf7dc18ff4-goog In-Reply-To: <20250625231838.1897085-1-pasha.tatashin@soleen.com> References: <20250625231838.1897085-1-pasha.tatashin@soleen.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" KHO uses struct pages for the preserved memory early in boot, however, with deferred struct page initialization, only a small portion of memory has properly initialized struct pages. This problem was detected where vmemmap is poisoned, and illegal flag combinations are detected. Don't allow them to be enabled together, and later we will have to teach KHO to work properly with deferred struct page init kernel feature. Fixes: 990a950fe8fd ("kexec: add config option for KHO") Signed-off-by: Pasha Tatashin --- kernel/Kconfig.kexec | 1 + 1 file changed, 1 insertion(+) diff --git a/kernel/Kconfig.kexec b/kernel/Kconfig.kexec index e64ce21f9a80..ff8ab20f9228 100644 --- a/kernel/Kconfig.kexec +++ b/kernel/Kconfig.kexec @@ -97,6 +97,7 @@ config KEXEC_JUMP config KEXEC_HANDOVER bool "kexec handover" depends on ARCH_SUPPORTS_KEXEC_HANDOVER && ARCH_SUPPORTS_KEXEC_FILE + depends on !DEFERRED_STRUCT_PAGE_INIT select MEMBLOCK_KHO_SCRATCH select KEXEC_FILE select DEBUG_FS --=20 2.50.0.727.gbf7dc18ff4-goog