Received: by 2002:a05:6358:11c7:b0:104:8066:f915 with SMTP id i7csp3911719rwl; Mon, 10 Apr 2023 03:11:58 -0700 (PDT) X-Google-Smtp-Source: AKy350Y13Vb5PXmfCVDrLdLvNDFAmN9NfG6NQCYzwkP8Dr/XA10CFLksFKukROzSU+NMz5ww7iWE X-Received: by 2002:a17:903:11c9:b0:1a1:a06c:4892 with SMTP id q9-20020a17090311c900b001a1a06c4892mr15418470plh.13.1681121518123; Mon, 10 Apr 2023 03:11:58 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1681121518; cv=none; d=google.com; s=arc-20160816; b=Vw4IKNdYcGL2WFXm73Moj8gLJQlaVSAABn0XOKE++tYugtsVearqv4OhKPE/0k0jF3 gIxulaRl1rHXY1nHA2UwZyO5u4UJYgFtO9zleBoVCN6He338ngMmhLKmYX0y5sIH2sza 5+ILlucoPlDezcA30nqJetN7zA7UX9aJNrbnmpPh/kor0qw87Zgwzqjk5IHCCDBl7Kgm h4jkYRNIz/Ld9xJQqmeQ8TbRcVzahNxk32z7Q/OwgvwPo5aweYoEhXhzQ4sX4so8QM9a dOJnQgF6hcNbMmitSWny52YUBQPsqVdEkTbEhOfmggkup4sGt3hGLpjBntOwNywk8Ssq +OOw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:user-agent:mime-version :date:message-id; bh=Wkvs/6+Y0wcy9fZ3QcyQRQNAIlHPSCbYDbE0xddT5X4=; b=HmMPGtG+dLoH/P+XWBIKshWEFoSqVVKfhxu1zQcplIM0CuLRWompU49QbdrFaWhMza Ao5r3+ps77gv03smzMxvTrWkApR3ZCeVnEqf1K513vec57O4WZPqFZMQ31Vq1+OGZoF6 GCQzTinR9LgriVCJY3eZWhFqS1ZjoF4RsEeT2r23CTNh2XLAPGT2Ex9Tb84Mhpz/S6W5 qQdz6ezeKL9B/97WfzKDCFKcwsrAqMBGu7tEJ9aUmS/OWNyTYAHLh8W8YsB9WY9kRfTw Krzz9UpTYs+05RPA15hvRKhwWwJxrrAMI08AOyxmUWkLOHZ590NeivlmRjNCJlOYvNbs BZvg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id q20-20020a170902b11400b001a520d3ecb1si6753011plr.515.2023.04.10.03.11.45; Mon, 10 Apr 2023 03:11:58 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229844AbjDJKE5 (ORCPT + 99 others); Mon, 10 Apr 2023 06:04:57 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:49988 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229612AbjDJKEt (ORCPT ); Mon, 10 Apr 2023 06:04:49 -0400 Received: from szxga08-in.huawei.com (szxga08-in.huawei.com [45.249.212.255]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 844A9212D; Mon, 10 Apr 2023 03:04:48 -0700 (PDT) Received: from dggpemm500016.china.huawei.com (unknown [172.30.72.54]) by szxga08-in.huawei.com (SkyGuard) with ESMTP id 4Pw4HZ1ymSz17Rtt; Mon, 10 Apr 2023 18:01:14 +0800 (CST) Received: from [10.67.108.26] (10.67.108.26) by dggpemm500016.china.huawei.com (7.185.36.25) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.23; Mon, 10 Apr 2023 17:52:37 +0800 Message-ID: <20dd1890-273b-3a5b-7a4e-6feaf722cf8a@huawei.com> Date: Mon, 10 Apr 2023 17:52:37 +0800 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:102.0) Gecko/20100101 Thunderbird/102.9.0 Subject: Re: [PATCH -next v3 1/2] riscv: kdump: Implement crashkernel=X,[high,low] Content-Language: en-US To: "Leizhen (ThunderTown)" , Simon Horman CC: , , , , , , , , , , , , , References: <20230406220206.3067006-1-chenjiahao16@huawei.com> <20230406220206.3067006-2-chenjiahao16@huawei.com> From: "chenjiahao (C)" In-Reply-To: Content-Type: text/plain; charset="UTF-8"; format=flowed Content-Transfer-Encoding: 7bit X-Originating-IP: [10.67.108.26] X-ClientProxiedBy: dggems705-chm.china.huawei.com (10.3.19.182) To dggpemm500016.china.huawei.com (7.185.36.25) X-CFilter-Loop: Reflected X-Spam-Status: No, score=-5.5 required=5.0 tests=NICE_REPLY_A, RCVD_IN_DNSWL_MED,RCVD_IN_MSPIKE_H2,SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2023/4/8 10:00, Leizhen (ThunderTown) wrote: > > On 2023/4/7 20:58, Leizhen (ThunderTown) wrote: >> >> On 2023/4/7 20:03, Simon Horman wrote: >>> On Fri, Apr 07, 2023 at 06:02:05AM +0800, Chen Jiahao wrote: >>>> On riscv, the current crash kernel allocation logic is trying to >>>> allocate within 32bit addressible memory region by default, if >>>> failed, try to allocate without 4G restriction. >>>> >>>> In need of saving DMA zone memory while allocating a relatively large >>>> crash kernel region, allocating the reserved memory top down in >>>> high memory, without overlapping the DMA zone, is a mature solution. >>>> Here introduce the parameter option crashkernel=X,[high,low]. >>>> >>>> One can reserve the crash kernel from high memory above DMA zone range >>>> by explicitly passing "crashkernel=X,high"; or reserve a memory range >>>> below 4G with "crashkernel=X,low". >>>> >>>> Signed-off-by: Chen Jiahao >>> ... >>> >>>> @@ -1180,14 +1206,37 @@ static void __init reserve_crashkernel(void) >>>> return; >>>> } >>>> >>>> - ret = parse_crashkernel(boot_command_line, memblock_phys_mem_size(), >>>> + ret = parse_crashkernel(cmdline, memblock_phys_mem_size(), >>>> &crash_size, &crash_base); >>>> - if (ret || !crash_size) >>>> + if (ret == -ENOENT) { >>>> + /* >>>> + * crashkernel=X,[high,low] can be specified or not, but >>>> + * invalid value is not allowed. >>> nit: Perhaps something like this would be easier to correlate with the >>> code that follows: >>> >>> /* Fallback to crashkernel=X,[high,low] */ >> The description "crashkernel=X,[high,low] can be specified or not" is not >> correct, because crashkernel=X,high must be specified when walking into this >> branch. So use Simon's comments or copy arm64's comments(it's written for >> parse_crashkernel_low()). > I rethink it a little bit, if it's relative to crashkernel=X[@offset], > that's also true. > > Reviewed-by: Zhen Lei Sure, The commit should not be ambiguous like this, Simon's comment above is a better option. >>> >>>> + */ >>>> + ret = parse_crashkernel_high(cmdline, 0, &crash_size, &crash_base); >>>> + if (ret || !crash_size) >>>> + return; >>>> + >>>> + /* >>>> + * crashkernel=Y,low is valid only when crashkernel=X,high >>>> + * is passed and high memory is reserved successful. >>> nit: s/successful/successfully/ >> Seems like the whole "and high memory is reserved successful" needs to be deleted. >> Only the dependency between the two boot options should be described here, >> regardless of whether their memory is successfully allocated. The comment here is imprecise, since there is absolutely no check whether the allocation is successful before "parse_crashkernel_low" >> >>>> + */ >>>> + ret = parse_crashkernel_low(cmdline, 0, &crash_low_size, &crash_base); >>>> + if (ret == -ENOENT) >>>> + crash_low_size = DEFAULT_CRASH_KERNEL_LOW_SIZE; >>>> + else if (ret) >>>> + return; >>>> + >>>> + search_start = search_low_max; >>>> + } else if (ret || !crash_size) { >>>> + /* Invalid argument value specified */ >>>> return; >>>> + } >>> ... >>> . >>> BR, Jiahao