Received: by 2002:a05:6358:11c7:b0:104:8066:f915 with SMTP id i7csp809469rwl; Fri, 7 Apr 2023 06:00:35 -0700 (PDT) X-Google-Smtp-Source: AKy350Ybp9nqv9GytFKfH7C6htsxm8sjmTNk8hI5Q3ztAyZnBkpHZADlSDT/XD21ahv50yF/UszW X-Received: by 2002:a17:906:faca:b0:930:18f5:d016 with SMTP id lu10-20020a170906faca00b0093018f5d016mr3147265ejb.15.1680872435405; Fri, 07 Apr 2023 06:00:35 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1680872435; cv=none; d=google.com; s=arc-20160816; b=k+LcT2mQq+KHxv1Yo9zL5dxu0hd7e8dXyDLb7bLKfKEf+WjXIKf9At0w9uZaH4OZVl lpzgrMwpYBNOmaNsS2pPEQwsapRqbBIT4bGit1MSwhU8xCaI7Bp0Z5OBn79YejQpMJvf WvHd44eLtCJhpWaXmzG/Jew8rXbjYfEFH/24O2Y4xZ+fE1ph3jXO0ImV5q4wl/6bErPV hChGNT0k4qEvC8GEndhVX8KsA8w7WQ3IpuCQl2iBQkng3Tq+frsNfG6IHkhi+OZ0wG2O /e9QkhkeOBaN/Sahed6aUso/l5D5NI8a9ZSd35WQNwbebSmQ5IkTMDV4eXBE62t2o6pR J7Uw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject; bh=EGGvHhB5JG6rLzTXnuIaFddCcslSB823jjqbmvh1TRA=; b=gjG4EtY3JGYnmJKp1eXJE0cN3qjMNAYhq8rWJFodtm7R+LJmk+XqnL3KIbIGJxq00a CcmkIpzuVsAJSkHKuuUDnvCetyF45asTMra/C945/Kq1UIwmq2XZ0lhjJKr+9DrCnutC XOptqeSfhEWE3dgHF4xlCvV/En6VVGMc0/KfQBzhqxvkhJN6qZtfV/sJ1PwDTwkYfeMz f9V25lRXUPjDDobfV9TxucFKBeMmtobL/cfmbh6SHTG+9jrOHyWsB0YkqL1GDJ5GLk4U q6WsL+InnZGC9WIB/YjyfGaKSOTiDDyi8wSKVfKbWtCz2IfrMSefwX8kESlPXgmHY3cG 6vrQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id c20-20020a170906171400b0093295ea18c2si2910736eje.392.2023.04.07.06.00.06; Fri, 07 Apr 2023 06:00:35 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232147AbjDGM7C (ORCPT + 99 others); Fri, 7 Apr 2023 08:59:02 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:37164 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231247AbjDGM7B (ORCPT ); Fri, 7 Apr 2023 08:59:01 -0400 Received: from szxga02-in.huawei.com (szxga02-in.huawei.com [45.249.212.188]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 795B476BB; Fri, 7 Apr 2023 05:58:58 -0700 (PDT) Received: from dggpemm500006.china.huawei.com (unknown [172.30.72.56]) by szxga02-in.huawei.com (SkyGuard) with ESMTP id 4PtJHY3gVrzSmPS; Fri, 7 Apr 2023 20:55:05 +0800 (CST) Received: from [10.174.178.55] (10.174.178.55) by dggpemm500006.china.huawei.com (7.185.36.236) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.23; Fri, 7 Apr 2023 20:58:54 +0800 Subject: Re: [PATCH -next v3 1/2] riscv: kdump: Implement crashkernel=X,[high,low] To: Simon Horman , Chen Jiahao CC: , , , , , , , , , , , , , References: <20230406220206.3067006-1-chenjiahao16@huawei.com> <20230406220206.3067006-2-chenjiahao16@huawei.com> From: "Leizhen (ThunderTown)" Message-ID: Date: Fri, 7 Apr 2023 20:58:53 +0800 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:60.0) Gecko/20100101 Thunderbird/60.7.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset="utf-8" Content-Language: en-US Content-Transfer-Encoding: 7bit X-Originating-IP: [10.174.178.55] X-ClientProxiedBy: dggems703-chm.china.huawei.com (10.3.19.180) To dggpemm500006.china.huawei.com (7.185.36.236) X-CFilter-Loop: Reflected X-Spam-Status: No, score=-4.3 required=5.0 tests=NICE_REPLY_A, RCVD_IN_DNSWL_MED,SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2023/4/7 20:03, Simon Horman wrote: > On Fri, Apr 07, 2023 at 06:02:05AM +0800, Chen Jiahao wrote: >> On riscv, the current crash kernel allocation logic is trying to >> allocate within 32bit addressible memory region by default, if >> failed, try to allocate without 4G restriction. >> >> In need of saving DMA zone memory while allocating a relatively large >> crash kernel region, allocating the reserved memory top down in >> high memory, without overlapping the DMA zone, is a mature solution. >> Here introduce the parameter option crashkernel=X,[high,low]. >> >> One can reserve the crash kernel from high memory above DMA zone range >> by explicitly passing "crashkernel=X,high"; or reserve a memory range >> below 4G with "crashkernel=X,low". >> >> Signed-off-by: Chen Jiahao > > ... > >> @@ -1180,14 +1206,37 @@ static void __init reserve_crashkernel(void) >> return; >> } >> >> - ret = parse_crashkernel(boot_command_line, memblock_phys_mem_size(), >> + ret = parse_crashkernel(cmdline, memblock_phys_mem_size(), >> &crash_size, &crash_base); >> - if (ret || !crash_size) >> + if (ret == -ENOENT) { >> + /* >> + * crashkernel=X,[high,low] can be specified or not, but >> + * invalid value is not allowed. > > nit: Perhaps something like this would be easier to correlate with the > code that follows: > > /* Fallback to crashkernel=X,[high,low] */ The description "crashkernel=X,[high,low] can be specified or not" is not correct, because crashkernel=X,high must be specified when walking into this branch. So use Simon's comments or copy arm64's comments(it's written for parse_crashkernel_low()). > > >> + */ >> + ret = parse_crashkernel_high(cmdline, 0, &crash_size, &crash_base); >> + if (ret || !crash_size) >> + return; >> + >> + /* >> + * crashkernel=Y,low is valid only when crashkernel=X,high >> + * is passed and high memory is reserved successful. > > nit: s/successful/successfully/ Seems like the whole "and high memory is reserved successful" needs to be deleted. Only the dependency between the two boot options should be described here, regardless of whether their memory is successfully allocated. > >> + */ >> + ret = parse_crashkernel_low(cmdline, 0, &crash_low_size, &crash_base); >> + if (ret == -ENOENT) >> + crash_low_size = DEFAULT_CRASH_KERNEL_LOW_SIZE; >> + else if (ret) >> + return; >> + >> + search_start = search_low_max; >> + } else if (ret || !crash_size) { >> + /* Invalid argument value specified */ >> return; >> + } > > ... > . > -- Regards, Zhen Lei