Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp1634623yba; Sun, 21 Apr 2019 11:28:06 -0700 (PDT) X-Google-Smtp-Source: APXvYqzJSdPhfnDLRrnwHWU6145ZupIymy/5JxlJOibFJ1mIJf+2qOuv2GD9rjhebtyoszFoRrSg X-Received: by 2002:aa7:8552:: with SMTP id y18mr15837328pfn.176.1555871286687; Sun, 21 Apr 2019 11:28:06 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1555871286; cv=none; d=google.com; s=arc-20160816; b=qJq87yAJxzFyuBc5H/tF/1R6mP2RpewLWFRp7AuXQdEIuU5sAhkDA0Li/oKUgF2lc7 fz/2DRmtK7jHLE5juKgCX9Kx/rc87NT0/pTN5JuYZbJH/xXITOnp1wVi6C43HR/eZSeV ubn3xK/7nnP/vPd7XZT/qyyJC0g3sDLnT3fsOTRY8JFWStEibD5xY7uZW25+k5qxs5Wr 6oGITCp1oinnzPiRXyJwh1/VaSilh201AO+0iZ5kcEuGq9IM7e4Yh+bxDaMjfLXyGdMI P4+Ud2PyN4oI+weu39ncfshkV3rTx7FksCJR10vTRZYXKGZo7JqDWv72gQFTz1Jpvc6o bFNA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=rouN/2O/91Fj9bPoMMHAznPecSTB1pt/LF5uz7VIQfs=; b=V5Cp4AYxBtDowMgtdfQ0X2YzMmfqQ5a3vMKj3F1dOfeXl/SfcWSCNiUogLWmuOeVE8 7oZn27AEX2kb0KzeoFTCMMJevf1yg6W4cCfcDPqPXtf+Kbd3MX543oBjzirl8QKvATGq 0fOSvDsxjyAgHtFPnESfbqxwUI1/29V2X4dRQTHkDRGC/FZRrQoo/0MbaxpqX4YP4ZV6 ojH5N5aOpMKRP5ebzv+8plWwT05LPgRytroqd1n8E94a7lYnxxD/XttqflaULf2CSZrH F+ubUwcHJqjJDKDrisk5X1KRH5Yg7oRezAlD4TnZQkrsg62tSkJeKYowCN3OsIlz7loh Qg0g== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@gmail.com header.s=20161025 header.b=PnXtDMXh; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 1si11137088ply.311.2019.04.21.11.27.17; Sun, 21 Apr 2019 11:28:06 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=fail header.i=@gmail.com header.s=20161025 header.b=PnXtDMXh; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726402AbfDUSYm (ORCPT + 99 others); Sun, 21 Apr 2019 14:24:42 -0400 Received: from mail-wr1-f65.google.com ([209.85.221.65]:47093 "EHLO mail-wr1-f65.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726197AbfDUSYl (ORCPT ); Sun, 21 Apr 2019 14:24:41 -0400 Received: by mail-wr1-f65.google.com with SMTP id t17so13336408wrw.13 for ; Sun, 21 Apr 2019 11:24:40 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=sender:date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to:user-agent; bh=rouN/2O/91Fj9bPoMMHAznPecSTB1pt/LF5uz7VIQfs=; b=PnXtDMXhm2cRiXkuHhd0eE0LU1z3VEHm+cnh9U0nlB1zI1cLK1RVIswKNEZgxvc+ew ntbj3M7NkD6G3NQgT3MwvjZxf+kOXcVAEnxZY2di2MARCyd1QG/Myjh9inxSwJ4/jAWM zoVWNNIxGMZP3xXq77jpBr5dbojy1iRBcYGdCo8Mgjhs+fZG7KERwU84iT7B9t93DjWj MMxeLlgF91juOT5U9iv8AcgPbIQOmGb04mxeYT/DJlJnBCIU3Ls17oFfIuqEs1YDaY/P 9rqZsgqaeiALvQ2E/8VBOjnqlOM/aeuPlK52jnoxbUaHur3s7R0/8YsPxST6EgeSIsUg RQUg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:sender:date:from:to:cc:subject:message-id :references:mime-version:content-disposition:in-reply-to:user-agent; bh=rouN/2O/91Fj9bPoMMHAznPecSTB1pt/LF5uz7VIQfs=; b=TKoejd5LydlABd7E/K3+oqfrK8T9y3nuJUXSczfwkP3NmwtXLrvdIILNI7oJIY69CJ YT8Bz6gBVuz9xG34u4LxF+EkGagauMj7hVKiJmiPWcOLjTEm5p0796WXSrhepm3OxUZk iQfcxhY6BPQeR9fB93227wc/5xxwpiCO8pu4ktgMGnJJJOY7bUW+AnifEWfz6eNK3USO FIQlip0wrXjzlDQwPPUDeCMW+Cw8PnPlOfSdTtL/aqsTLYZZjEOqUjO4moXgJbiK3lrT 55UPRhEE9MRWgWAJVhFsrE6vEeTNIZ+txK9wqMH0uck3L4GhMUIBPT3Ryzf3Kuf5FKN3 t7+Q== X-Gm-Message-State: APjAAAVHTTs2MeHz6XpXavYyyyAawdHu88jzxAhlkoVKx1JJR2/HGDbC DsaxPGzy0Aj7o+ZDG5zOjnXeDiw6 X-Received: by 2002:a05:6000:1152:: with SMTP id d18mr10623382wrx.32.1555871079873; Sun, 21 Apr 2019 11:24:39 -0700 (PDT) Received: from gmail.com (2E8B0CD5.catv.pool.telekom.hu. [46.139.12.213]) by smtp.gmail.com with ESMTPSA id c11sm3484944wrs.86.2019.04.21.11.24.38 (version=TLS1_2 cipher=ECDHE-RSA-CHACHA20-POLY1305 bits=256/256); Sun, 21 Apr 2019 11:24:39 -0700 (PDT) Date: Sun, 21 Apr 2019 20:24:36 +0200 From: Ingo Molnar To: Dave Young Cc: Thomas Gleixner , Ingo Molnar , Borislav Petkov , "H. Peter Anvin" , x86@kernel.org, linux-kernel@vger.kernel.org, vgoyal@redhat.com, bhe@redhat.com, piliu@redhat.com, Yinghai Lu , Eric Biederman Subject: Re: [PATCH 1/2] X86/kdump: move crashkernel=X to reserve under 4G by default Message-ID: <20190421182436.GB35603@gmail.com> References: <20190421035058.943630505@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190421035058.943630505@redhat.com> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org * Dave Young wrote: > The kdump crashkernel low reservation is limited to under 896M even for > X86_64. This obscure and miserable limitation exists for old kexec-tools > compatibility, but the reason is not documented anywhere. > > Some more tests/investigations about the background: > a) Previously old kexec-tools can only load purgatory to memory under 2G, > Eric remove that limitation in 2012 in kexec-tools: > Commit b4f9f8599679 ("kexec x86_64: Make purgatory relocatable anywhere > in the 64bit address space.") > > b) back in 2013 Yinghai removed all the limitations in new kexec-tools, > bzImage64 can be loaded to anywhere. > Commit 82c3dd2280d2 ("kexec, x86_64: Load bzImage64 above 4G") > > c) test results with old kexec-tools with old and latest kernels. > 1. old kexec-tools can not build with modern toolchain anymore, > I built it in a RHEL6 vm > 2. 2.0.0 kexec-tools does not work with latest kernel even with > memory under 896M and give an error: > "ELF core (kcore) parse failed", it needs below kexec-tools fix > Commit ed15ba1b9977 ("build_mem_phdrs(): check if p_paddr is invalid") > 3. even with patched kexec-tools which fixes 2), it still needs some > other fixes to work correctly for kaslr enabled kernels. > > So the situation is: > * old kexec-tools is already broken with latest kernels > * we can not keep this limitations forever just for compatibility of very > old kexec-tools. > * If one must use old tools then he/she can choose crashkernel=X@Y > * people have reported bugs crashkernel=384M failed because kaslr makes > the 0-896M space sparse, > * crashkernel can reserve in low or high area, it is natural to understand > low as memory under 4G > > Hence drop the 896M limitation, and change crashkernel low reservation to > reserve under 4G by default. > > Signed-off-by: Dave Young > --- > arch/x86/kernel/setup.c | 10 +++++----- > 1 file changed, 5 insertions(+), 5 deletions(-) > > --- linux-x86.orig/arch/x86/kernel/setup.c > +++ linux-x86/arch/x86/kernel/setup.c > @@ -71,6 +71,7 @@ > #include > #include > #include > +#include > > #include > #include