Received: by 2002:a05:6a10:6744:0:0:0:0 with SMTP id w4csp541844pxu; Wed, 7 Oct 2020 09:27:23 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxBRgayqvLp4MPdjX/L1fNRX1ZhquHFzvH/lgmpGPA0gd0vSG2tvRfHjjXXp0bdqmNgsNsw X-Received: by 2002:a50:ce06:: with SMTP id y6mr4498672edi.273.1602088043039; Wed, 07 Oct 2020 09:27:23 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1602088043; cv=none; d=google.com; s=arc-20160816; b=pwro6mevvBzIGRnvjFkWUPx7HFDwzePzjeDWv5cjTWeMQbI7+xcknQ74fQlWPHpXHv Br4xCI4a9q+0efcoYngzWnrazWQEMTqz/DQ1YDHeT8r5uWDf9EcrwleuMpYsBbRjn2dP Y2pULuItXWIlTbYeK/pOgnAPw3Zz+pHARvbhU8OSOpm4/+OhgdPnv6LPmu49T36jL2Z+ 2yk7SH7/QCyE/rer2Tn7hIFWYmcdEHaU2vGuEIwnbFpINDCjePvF3CO5g14OI94gKLQ5 MMt8s9wyD+zgSxAgUx2+sF2asBHZdWMDhBTtdDZAZ5LeINWELYOx/aLQ5u2NHPsiXCHG tvEA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:user-agent:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date; bh=RL+xI7b5/qNoulfbiyw1MQjFTuBePU2/jVqrfMXfMkg=; b=KjtBG4RFi0YEKE/Cmfgg8ftTaaDUWUlxKvRbnSO1nA1Ah3T8wvsQFkE/9wvirmRaPy hMZOtxLCKwRpddCnkmtom0vcCqjTHWRv7pdL+JIiOoC1yh5jxmNtuzbSIFe6ntWu2fk1 4lCUH3yYnNqd5hlMxydNkuW3mK/EpcPxN8ypqT5KAqk7E2OsxLZ0FPqvgCfva0qlGgMY PXVyFFms2IFZsccovDwcC70yMSWoELUcV5oDYK1d+q3tRStWXOXput831IoJccm6pndo De3F7eDCJ2Vmx8bh7J616eObwdvIIZt+r4Ol7Yo917cZqDcUmQz77w6A75kXJZrv5a2S vs3w== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id d17si1910115edv.383.2020.10.07.09.27.00; Wed, 07 Oct 2020 09:27:23 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728251AbgJGQZB (ORCPT + 99 others); Wed, 7 Oct 2020 12:25:01 -0400 Received: from mail.kernel.org ([198.145.29.99]:59260 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726504AbgJGQZB (ORCPT ); Wed, 7 Oct 2020 12:25:01 -0400 Received: from gaia (unknown [95.149.105.49]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 3B21E216C4; Wed, 7 Oct 2020 16:24:56 +0000 (UTC) Date: Wed, 7 Oct 2020 17:24:53 +0100 From: Catalin Marinas To: chenzhou Cc: will@kernel.org, james.morse@arm.com, tglx@linutronix.de, mingo@redhat.com, dyoung@redhat.com, bhe@redhat.com, corbet@lwn.net, John.P.donnelly@oracle.com, prabhakar.pkin@gmail.com, bhsharma@redhat.com, horms@verge.net.au, robh+dt@kernel.org, arnd@arndb.de, nsaenzjulienne@suse.de, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, kexec@lists.infradead.org, linux-doc@vger.kernel.org, guohanjun@huawei.com, xiexiuqi@huawei.com, huawei.libin@huawei.com, wangkefeng.wang@huawei.com Subject: Re: [PATCH v12 9/9] kdump: update Documentation about crashkernel Message-ID: <20201007162453.GR3462@gaia> References: <20200907134745.25732-1-chenzhou10@huawei.com> <20200907134745.25732-10-chenzhou10@huawei.com> <20201005171936.GD14576@gaia> <8644712d-1331-1efc-1cd2-6da8640145b7@huawei.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <8644712d-1331-1efc-1cd2-6da8640145b7@huawei.com> User-Agent: Mutt/1.10.1 (2018-07-13) Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Oct 06, 2020 at 10:10:54AM +0800, chenzhou wrote: > On 2020/10/6 1:19, Catalin Marinas wrote: > > On Mon, Sep 07, 2020 at 09:47:45PM +0800, Chen Zhou wrote: > >> diff --git a/Documentation/admin-guide/kdump/kdump.rst b/Documentation/admin-guide/kdump/kdump.rst > >> index 2da65fef2a1c..549611abc581 100644 > >> --- a/Documentation/admin-guide/kdump/kdump.rst > >> +++ b/Documentation/admin-guide/kdump/kdump.rst > > [...] > >> @@ -316,8 +325,18 @@ Boot into System Kernel > >> kernel will automatically locate the crash kernel image within the > >> first 512MB of RAM if X is not given. > >> > >> - On arm64, use "crashkernel=Y[@X]". Note that the start address of > >> - the kernel, X if explicitly specified, must be aligned to 2MiB (0x200000). > >> + On arm64, use "crashkernel=X" to try low allocation in DMA zone, and > >> + fall back to high allocation if it fails. And go for high allocation > >> + directly if the required size is too large. > >> + We can also use "crashkernel=X,high" to select a high region above > >> + DMA zone, which also tries to allocate at least 256M low memory in > >> + DMA zone automatically. > >> + "crashkernel=Y,low" can be used to allocate specified size low memory > >> + in DMA zone. > >> + For non-RPi4 platforms, change DMA zone memtioned above to DMA32 zone. > > I don't think we should mention non-RPi4 explicitly here. I don't even > > understand what the suggestion is since the only way is to disable > > ZONE_DMA in the kernel config. I'd just stick to ZONE_DMA description > > here. > How about like this: > If the kernel config ZONE_DMA is disabled, just try low allocation in DMA32 zone > and high allocation above DMA32 zone. Something like: "allocate 256M low memory in the DMA zone automatically (or the DMA32 zone if CONFIG_ZONE_DMA is disabled)". I'd keep it short. -- Catalin