Received: by 2002:a25:2c96:0:0:0:0:0 with SMTP id s144csp1511470ybs; Mon, 25 May 2020 18:46:30 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyJkspDNWd694lBzII7TdOe5wIZHJMA6AJT9L28sMDhHpUKM8n2rLIJIjynIsqaKtwenHE9 X-Received: by 2002:a50:bb29:: with SMTP id y38mr1469490ede.358.1590457590298; Mon, 25 May 2020 18:46:30 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1590457590; cv=none; d=google.com; s=arc-20160816; b=xq8j+Fg95puW8xM00khidyJypW7JRBUo4VgvCn3qaiNsV6my2cDe/AxNIlraPTxahb vZaeVhW6q3m4b9RuJ3FCLs1CsOQJJYejfB4gJuxBac+APNYKZx0Krlm/xpV0XNBsZ7Tz 0RRnUbDKw+x3lNlh+jdSD+3Im8cdcGJWDm9Eokg+s9j2iuLT3TwyD4RNb1BmcXtGtYng 75IBjPkzhmknxVJNgTfmm1aKgVKavzM04iZi3c7lGO1jUdLkwUTGUqND4AaLwM67PWbN Xgn8xUl6vAqHcRdgwErwugrYQC2tAF5BMQDO8SwTXdODiImvwWRbos4RGePM06RTF/1G 5KNg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=90A2V+s9G7+5U5tOSG/V9yeg3CjImgO19y8K0xgH3vo=; b=sdDdRT53nWSDGhrHJnJy7TbZiy1AWBaVHyRWj9+jDQz5FsET9EQXkLeBzl+6xto6UR 09YuGF8XDQQ63/ooKmnyImPt9imEjwsKOwj5TUAn5Vj0ImrsLGRd9w8xRjlDVWXObPP4 cNlP4JYl/XEoib+NCnGHLtPrGrMBBXv0l9Rc2PD0pKvBhX1QEo2km1Bv89quABbq9Enb DMrPk4p1r66/501x6GnYteeFpcpJ5ooxPUzpshZXdZYa1f1ifbgwx0fyMFWfM6+i2piM A33THsEHOY2enZxzH/Qt6juYKfvtnxQcxW1eNOnM8Rr/ImzNWw6lVNC8EECBGZO67O5E /DMQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=ZBcUjXew; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id h3si10219472edn.52.2020.05.25.18.46.08; Mon, 25 May 2020 18:46:30 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=ZBcUjXew; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2388579AbgEZBnH (ORCPT + 99 others); Mon, 25 May 2020 21:43:07 -0400 Received: from us-smtp-2.mimecast.com ([205.139.110.61]:46185 "EHLO us-smtp-delivery-1.mimecast.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S2387794AbgEZBnG (ORCPT ); Mon, 25 May 2020 21:43:06 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1590457384; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=90A2V+s9G7+5U5tOSG/V9yeg3CjImgO19y8K0xgH3vo=; b=ZBcUjXewX8p6W31MrW+CRIKTiV9gJxESlCkPyI2yU5AZ+iGy5ZUdPeM2AbYhjZMphaWCXo 4R6KMHw8hhY9lvaHigTmzOFLYl4tg1f5JgXYdisQNkCgiwPVk1R3SgwPolpDnaSAN0S8wz SQxWwvpZNbE7S7i4o8H3eAeVVkxyqIA= Received: from mimecast-mx01.redhat.com (mimecast-mx01.redhat.com [209.132.183.4]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-272-UgCT4IApOH-CVovWkXx76g-1; Mon, 25 May 2020 21:42:50 -0400 X-MC-Unique: UgCT4IApOH-CVovWkXx76g-1 Received: from smtp.corp.redhat.com (int-mx01.intmail.prod.int.phx2.redhat.com [10.5.11.11]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx01.redhat.com (Postfix) with ESMTPS id 5C5E8107ACCD; Tue, 26 May 2020 01:42:48 +0000 (UTC) Received: from localhost (ovpn-12-31.pek2.redhat.com [10.72.12.31]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 0850879C3E; Tue, 26 May 2020 01:42:44 +0000 (UTC) Date: Tue, 26 May 2020 09:42:42 +0800 From: Baoquan He To: Chen Zhou Cc: tglx@linutronix.de, mingo@redhat.com, catalin.marinas@arm.com, will@kernel.org, dyoung@redhat.com, robh+dt@kernel.org, John.p.donnelly@oracle.com, arnd@arndb.de, devicetree@vger.kernel.org, linux-doc@vger.kernel.org, kexec@lists.infradead.org, linux-kernel@vger.kernel.org, horms@verge.net.au, guohanjun@huawei.com, pkushwaha@marvell.com, linux-arm-kernel@lists.infradead.org Subject: Re: [PATCH v8 0/5] support reserving crashkernel above 4G on arm64 kdump Message-ID: <20200526014242.GF20045@MiWiFi-R3L-srv> References: <20200521093805.64398-1-chenzhou10@huawei.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20200521093805.64398-1-chenzhou10@huawei.com> User-Agent: Mutt/1.10.1 (2018-07-13) X-Scanned-By: MIMEDefang 2.79 on 10.5.11.11 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 05/21/20 at 05:38pm, Chen Zhou wrote: > This patch series enable reserving crashkernel above 4G in arm64. > > There are following issues in arm64 kdump: > 1. We use crashkernel=X to reserve crashkernel below 4G, which will fail > when there is no enough low memory. > 2. Currently, crashkernel=Y@X can be used to reserve crashkernel above 4G, > in this case, if swiotlb or DMA buffers are required, crash dump kernel > will boot failure because there is no low memory available for allocation. > > To solve these issues, introduce crashkernel=X,low to reserve specified > size low memory. > Crashkernel=X tries to reserve memory for the crash dump kernel under > 4G. If crashkernel=Y,low is specified simultaneously, reserve spcified > size low memory for crash kdump kernel devices firstly and then reserve > memory above 4G. > > When crashkernel is reserved above 4G in memory, that is, crashkernel=X,low > is specified simultaneously, kernel should reserve specified size low memory > for crash dump kernel devices. So there may be two crash kernel regions, one > is below 4G, the other is above 4G. > In order to distinct from the high region and make no effect to the use of > kexec-tools, rename the low region as "Crash kernel (low)", and add DT property > "linux,low-memory-range" to crash dump kernel's dtb to pass the low region. > > Besides, we need to modify kexec-tools: > arm64: kdump: add another DT property to crash dump kernel's dtb(see [1]) > > The previous changes and discussions can be retrieved from: > > Changes since [v7] > - Move x86 CRASH_ALIGN to 2M > Suggested by Dave and do some test, move x86 CRASH_ALIGN to 2M. OK, moving x86 CRASH_ALIGN to 2M is suggested by Dave. Because CONFIG_PHYSICAL_ALIGN can be selected from 2M to 16M. So 2M seems good. But, anyway, we should tell the reason why it need be changed in commit log. arch/x86/Kconfig: config PHYSICAL_ALIGN hex "Alignment value to which kernel should be aligned" default "0x200000" range 0x2000 0x1000000 if X86_32 range 0x200000 0x1000000 if X86_64 > - Update Documentation/devicetree/bindings/chosen.txt > Add corresponding documentation to Documentation/devicetree/bindings/chosen.txt suggested by Arnd. > - Add Tested-by from Jhon and pk > > Changes since [v6] > - Fix build errors reported by kbuild test robot. > > Changes since [v5] > - Move reserve_crashkernel_low() into kernel/crash_core.c. > - Delete crashkernel=X,high. And the crashkernel=X,high being deleted need be told too. Otherwise people reading the commit have to check why themselves. I didn't follow the old version, can't see why ,high can't be specified explicitly. > - Modify crashkernel=X,low. > If crashkernel=X,low is specified simultaneously, reserve spcified size low > memory for crash kdump kernel devices firstly and then reserve memory above 4G. > In addition, rename crashk_low_res as "Crash kernel (low)" for arm64, and then > pass to crash dump kernel by DT property "linux,low-memory-range". > - Update Documentation/admin-guide/kdump/kdump.rst. > > Changes since [v4] > - Reimplement memblock_cap_memory_ranges for multiple ranges by Mike. > > Changes since [v3] > - Add memblock_cap_memory_ranges back for multiple ranges. > - Fix some compiling warnings. > > Changes since [v2] > - Split patch "arm64: kdump: support reserving crashkernel above 4G" as > two. Put "move reserve_crashkernel_low() into kexec_core.c" in a separate > patch. > > Changes since [v1]: > - Move common reserve_crashkernel_low() code into kernel/kexec_core.c. > - Remove memblock_cap_memory_ranges() i added in v1 and implement that > in fdt_enforce_memory_region(). > There are at most two crash kernel regions, for two crash kernel regions > case, we cap the memory range [min(regs[*].start), max(regs[*].end)] > and then remove the memory range in the middle. > > [1]: http://lists.infradead.org/pipermail/kexec/2020-May/025128.html > [v1]: https://lkml.org/lkml/2019/4/2/1174 > [v2]: https://lkml.org/lkml/2019/4/9/86 > [v3]: https://lkml.org/lkml/2019/4/9/306 > [v4]: https://lkml.org/lkml/2019/4/15/273 > [v5]: https://lkml.org/lkml/2019/5/6/1360 > [v6]: https://lkml.org/lkml/2019/8/30/142 > [v7]: https://lkml.org/lkml/2019/12/23/411 > > Chen Zhou (5): > x86: kdump: move reserve_crashkernel_low() into crash_core.c > arm64: kdump: reserve crashkenel above 4G for crash dump kernel > arm64: kdump: add memory for devices by DT property, low-memory-range > kdump: update Documentation about crashkernel on arm64 > dt-bindings: chosen: Document linux,low-memory-range for arm64 kdump > > Documentation/admin-guide/kdump/kdump.rst | 13 ++- > .../admin-guide/kernel-parameters.txt | 12 ++- > Documentation/devicetree/bindings/chosen.txt | 25 ++++++ > arch/arm64/kernel/setup.c | 8 +- > arch/arm64/mm/init.c | 61 ++++++++++++- > arch/x86/kernel/setup.c | 66 ++------------ > include/linux/crash_core.h | 3 + > include/linux/kexec.h | 2 - > kernel/crash_core.c | 85 +++++++++++++++++++ > kernel/kexec_core.c | 17 ---- > 10 files changed, 208 insertions(+), 84 deletions(-) > > -- > 2.20.1 > > > _______________________________________________ > kexec mailing list > kexec@lists.infradead.org > http://lists.infradead.org/mailman/listinfo/kexec >