Received: by 2002:a05:6a10:22f:0:0:0:0 with SMTP id 15csp3463996pxk; Mon, 5 Oct 2020 10:16:09 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxpJepmbCVveVZMpPhGkSnEt7sydKbukUgaYsIJlBDKPYzIn+7NmxuZ9vAYQAKFcL7iJ9Gx X-Received: by 2002:a05:6402:17b5:: with SMTP id j21mr682266edy.276.1601918168849; Mon, 05 Oct 2020 10:16:08 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1601918168; cv=none; d=google.com; s=arc-20160816; b=tdb63PKeGSGRmhUHt9kPNCVpsXGfhGRqb9kmlvEJpqM+8Zh8n6OlFJp5pR3Xecd6hN ucLhoW0LCgMLroST+YW8WXHQgVRl+V/T66y8IDEcW93edm/0KUJ3A++TsFyx5eus/TPR YBf7Fk3o2QG0GY6E4U4vbOCPI2xw3me6CLY6RGBVFl6ZLh4Ynwi3mDPxMlh3mUsDyLBP od+bAPUGv8tQCLvS6LqRYT0TP9/X9AnGr4xWzncm1zcNgD6UL2E+Tn3AyItjsIxXTYmx HSgEwbQjmPf1j6QZULG1FD02ip+aTiK11ezyRt7oWKT0xpc7Y0BKEFPzXsJiVdMc7Zig lYmQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:user-agent:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date; bh=NXktlgDHQgd0hdoEDnjZl5oCXlUf7Ogue/61fnRNcJM=; b=sUBPYMfa3HUQcv8wpUnSaRe0Qghr2piTWS2XTAlCprGQbJAFoyjHFdlNYggQCR2yzu 1MM0TtRwRbj6/0eqh1DatiGnBK3mewMNEMWPPe7fIvTi2PUOqcPdi+jiQtusTONUjKkF 3VV7+0LLlZzGybTal4Vgv03iCZo5bXeRJqQxGrfrlhBGM50TnHeoF0hkIio9BhaIKpk+ 0PB4PieAyRy9jjo219nla+WJyBZ+sSKxWgegceYmYS2dYTXHYN3Ubh6XayCV95Z9T9iX uX3K0WgRRmUvdY2pxCuMZatYD/JfBxKwbtJqBfG68rZcoIJZZIp3xMBGZf1F9anMP8Lf 3vcw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id l14si156848ejg.242.2020.10.05.10.15.46; Mon, 05 Oct 2020 10:16:08 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727908AbgJERJp (ORCPT + 99 others); Mon, 5 Oct 2020 13:09:45 -0400 Received: from mail.kernel.org ([198.145.29.99]:39844 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726615AbgJERJp (ORCPT ); Mon, 5 Oct 2020 13:09:45 -0400 Received: from gaia (unknown [95.149.105.49]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 3241E2078E; Mon, 5 Oct 2020 17:09:41 +0000 (UTC) Date: Mon, 5 Oct 2020 18:09:38 +0100 From: Catalin Marinas To: John Donnelly Cc: Chen Zhou , will@kernel.org, james.morse@arm.com, tglx@linutronix.de, mingo@redhat.com, dyoung@redhat.com, bhe@redhat.com, corbet@lwn.net, prabhakar.pkin@gmail.com, bhsharma@redhat.com, horms@verge.net.au, robh+dt@kernel.org, arnd@arndb.de, nsaenzjulienne@suse.de, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, kexec@lists.infradead.org, linux-doc@vger.kernel.org, guohanjun@huawei.com, xiexiuqi@huawei.com, huawei.libin@huawei.com, wangkefeng.wang@huawei.com Subject: Re: [PATCH v12 0/9] support reserving crashkernel above 4G on arm64 kdump Message-ID: <20201005170937.GA14576@gaia> References: <20200907134745.25732-1-chenzhou10@huawei.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.10.1 (2018-07-13) Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sat, Sep 12, 2020 at 06:44:29AM -0500, John Donnelly wrote: > On 9/7/20 8:47 AM, Chen Zhou wrote: > > Chen Zhou (9): > > x86: kdump: move CRASH_ALIGN to 2M > > x86: kdump: make the lower bound of crash kernel reservation > > consistent > > x86: kdump: use macro CRASH_ADDR_LOW_MAX in functions > > reserve_crashkernel[_low]() > > x86: kdump: move reserve_crashkernel[_low]() into crash_core.c > > arm64: kdump: introduce some macroes for crash kernel reservation > > arm64: kdump: reimplement crashkernel=X > > kdump: add threshold for the required memory > > arm64: kdump: add memory for devices by DT property > > linux,usable-memory-range > > kdump: update Documentation about crashkernel [...] > I did a brief unit-test on 5.9-rc4. > > Please add: > > Tested-by: John Donnelly Thanks for testing. > This activity is over a year old. It needs accepted. It's getting there, hopefully in 5.11. There are some minor tweaks to address. -- Catalin