Received: by 2002:a05:6a10:22f:0:0:0:0 with SMTP id 15csp3468356pxk; Mon, 5 Oct 2020 10:23:01 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyX+Qf814PTnFL4CqqmApPPv6Jv48gVAFTVEwaeYanAwVajERGER9U7MKiVnNZgTAQTdsLT X-Received: by 2002:aa7:c2d9:: with SMTP id m25mr761416edp.226.1601918581051; Mon, 05 Oct 2020 10:23:01 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1601918581; cv=none; d=google.com; s=arc-20160816; b=l2rvS3rsJPqc1btYmOBFSvl+yrzK4rpogP5jekAgkqouJuE2SCX9A2vXusVz+VIT96 Pjia2Tj897iO3Z+30QdU2gegf0lg4ftbKQMRs1EYjaeMdkfHzld59FumDOTqDr7i6lRu vW98uUGvHDDvyAV6HeMYKG378DAvswaKUcAUxkHB/kfnbhrHWEO1UeZbLYKhqYXlqfZb xQsDE0pVWK89sic+3LTwV30AQI9O3GQx+7/lWDMJpLbrDO0EAKjLznhMziPI2Hb0cQVw Auuj9vV4oUpA9LUjJXCs45gz8BMcCcrpYtanV8J8ssb4y+VfkN88ZwiEQk3k+kFhdVHH D/3w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:user-agent:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date; bh=yBh68InKa8UNXK/FA+On4Q6/CIGo5c4JB3FyMU3EcCk=; b=wVz+vI9qC/c2RZTAdxiB01/pWCSCiypXpGkEGDYy+sG9RDhxrm0GM8m7nZ/qRndA52 auk5hrjUNUWlHSAwgTT5dMNCSmSv1yQptZK14jamS04MIbroqob7HbuuwPYw95n5NDpW jyds95Yzd9eHUwSWgcdPfqAEIAM6hiwskzLQfqlZo5w50g/dXfgW6MEUw2r4ILS7Xwsx FyP5zd0r9HJOKYkG5VTNOV1TAFtrvy1VSYO/Xx5+1pxgTjxaCDJNVffe5bevDaEwAMqi f24vv0mUGNqxnnCmuWNTIYww+7oNm8Wu8LZ+s6RUspcWOd7h0xx58liXbKJoh0cI5gEK stqg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id bu21si435121edb.86.2020.10.05.10.22.32; Mon, 05 Oct 2020 10:23:01 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727571AbgJERVF (ORCPT + 99 others); Mon, 5 Oct 2020 13:21:05 -0400 Received: from mail.kernel.org ([198.145.29.99]:47482 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725973AbgJERVF (ORCPT ); Mon, 5 Oct 2020 13:21:05 -0400 Received: from gaia (unknown [95.149.105.49]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id A5ADD2078E; Mon, 5 Oct 2020 17:21:00 +0000 (UTC) Date: Mon, 5 Oct 2020 18:20:58 +0100 From: Catalin Marinas To: chenzhou Cc: Baoquan He , will@kernel.org, james.morse@arm.com, tglx@linutronix.de, mingo@redhat.com, dyoung@redhat.com, corbet@lwn.net, John.P.donnelly@oracle.com, prabhakar.pkin@gmail.com, bhsharma@redhat.com, horms@verge.net.au, robh+dt@kernel.org, arnd@arndb.de, nsaenzjulienne@suse.de, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, kexec@lists.infradead.org, linux-doc@vger.kernel.org, guohanjun@huawei.com, xiexiuqi@huawei.com, huawei.libin@huawei.com, wangkefeng.wang@huawei.com, rppt@linux.ibm.com Subject: Re: [PATCH v12 3/9] x86: kdump: use macro CRASH_ADDR_LOW_MAX in functions reserve_crashkernel[_low]() Message-ID: <20201005172057.GE14576@gaia> References: <20200907134745.25732-1-chenzhou10@huawei.com> <20200907134745.25732-4-chenzhou10@huawei.com> <20200918072526.GD25604@MiWiFi-R3L-srv> <14e22d92-1601-fc1c-a1c8-e3936d63db42@huawei.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <14e22d92-1601-fc1c-a1c8-e3936d63db42@huawei.com> User-Agent: Mutt/1.10.1 (2018-07-13) Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Sep 18, 2020 at 05:06:37PM +0800, chenzhou wrote: > On 2020/9/18 16:59, chenzhou wrote: > > On 2020/9/18 15:25, Baoquan He wrote: > >> On 09/07/20 at 09:47pm, Chen Zhou wrote: > >>> To make the functions reserve_crashkernel[_low]() as generic, > >>> replace some hard-coded numbers with macro CRASH_ADDR_LOW_MAX. > >>> > >>> Signed-off-by: Chen Zhou > >>> --- > >>> arch/x86/kernel/setup.c | 11 ++++++----- > >>> 1 file changed, 6 insertions(+), 5 deletions(-) > >>> > >>> diff --git a/arch/x86/kernel/setup.c b/arch/x86/kernel/setup.c > >>> index d7fd90c52dae..71a6a6e7ca5b 100644 > >>> --- a/arch/x86/kernel/setup.c > >>> +++ b/arch/x86/kernel/setup.c > >>> @@ -430,7 +430,7 @@ static int __init reserve_crashkernel_low(void) > >>> unsigned long total_low_mem; > >>> int ret; > >>> > >>> - total_low_mem = memblock_mem_size(1UL << (32 - PAGE_SHIFT)); > >>> + total_low_mem = memblock_mem_size(CRASH_ADDR_LOW_MAX >> PAGE_SHIFT); > >> Just note that the replacement has been done in another patch from Mike > >> Rapoport, partially. He seems to have done reserve_crashkernel_low() > >> part, there's one left in reserve_crashkernel(), you might want to check > >> that. > >> > >> Mike's patch which is from a patchset has been merged into Andrew's next > >> tree. > >> > >> commit 6e50f7672ffa362e9bd4bc0c0d2524ed872828c5 > >> Author: Mike Rapoport > >> Date: Wed Aug 26 15:22:32 2020 +1000 > >> > >> x86/setup: simplify reserve_crashkernel() > As Baoquan said, some functions have been changed in the next tree, > if i need to rebase on top of the next tree. Please rebase at 5.10-rc1 when the x86 change will probably be in and aim to queue this series for 5.11. Thanks. -- Catalin