Received: by 2002:a05:6358:9144:b0:117:f937:c515 with SMTP id r4csp6955615rwr; Tue, 25 Apr 2023 06:21:53 -0700 (PDT) X-Google-Smtp-Source: AKy350YwcEih38cnoekCvuxpNPt2iUw+rr4qjRaBUj8DhhArenKwEeXtkEwG1L0/WybI1MdMHgJF X-Received: by 2002:a05:6a20:8e24:b0:f3:3578:6699 with SMTP id y36-20020a056a208e2400b000f335786699mr13709248pzj.45.1682428912754; Tue, 25 Apr 2023 06:21:52 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1682428912; cv=none; d=google.com; s=arc-20160816; b=CE+gs8k7QMtQ1gAlcCaU45P8qzHFm8a+G0o5Ez3Nrz6VPvUZomQuFCo9kj7LvPQpCe 4geHop+XDQAgIa/BYUpHNu84CEcsu3dN1tIsFKQiKK89sGJdVzyyAGK6lSFlaoiEiXo2 jedHlqL82X0xivJR94XdKDQRwwjfC1rm1D5lRwZkLffXaeoc+qLvJ25WoKw+N/rzg910 Jf1B55hjYy7qK2tKWj+tCa6/xD2w+GUxVqwAywYPHaEtDHG75qAfgTQBFiQ7cPJN4DPb WlWXZKDVFyZhdavwulI1JSdyBMICxf9JNUxyA7SLaLGB2iTf5N518sGb7WouXcR8+TUC Awuw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:references :cc:to:from:content-language:subject:user-agent:mime-version:date :message-id; bh=eTvnW8/NtJOka/NvrdrEqQtZthUFeM7gGkgbRozUnAs=; b=XDRWFRFnVRdmYaDq+dQ8BhFgAFMg3w9i4txsdB14a3nqAiYIGKBO8URQtATzYO1ReX unF+4Q4CjAzsNRaZgSK9QzzYKCuhHvNFpbloXCu+zluzgRYbURlsBUzSgeoNeBsVtNLS HkT1u4na8Hg3eaxhi5we0COgOBfqxhLOtXccKZILz7jsKlJcR8VDCbHQXfGLcnHlY7kk hMkfllDvDUJ/gd2XNkJZoJuKUbNaDMQxxjtarPg2gRxsbSpMV2PLqu3J5KmnBsYew9qF ChzhrzveMuV8yel+pjKNmorkPoUWFUZN/mrTZa2SD5UkSwNLDzFjDauSn1tpUO9gxaKR GQ+g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id k29-20020a63ff1d000000b0051f04512a26si13660782pgi.393.2023.04.25.06.21.36; Tue, 25 Apr 2023 06:21:52 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233705AbjDYNVD (ORCPT + 99 others); Tue, 25 Apr 2023 09:21:03 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:49282 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234009AbjDYNVB (ORCPT ); Tue, 25 Apr 2023 09:21:01 -0400 Received: from szxga01-in.huawei.com (szxga01-in.huawei.com [45.249.212.187]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 261A32D52; Tue, 25 Apr 2023 06:20:56 -0700 (PDT) Received: from dggpemm500016.china.huawei.com (unknown [172.30.72.53]) by szxga01-in.huawei.com (SkyGuard) with ESMTP id 4Q5MwY6SF8zpT8Q; Tue, 25 Apr 2023 21:17:01 +0800 (CST) Received: from [10.67.108.26] (10.67.108.26) by dggpemm500016.china.huawei.com (7.185.36.25) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.23; Tue, 25 Apr 2023 21:20:53 +0800 Message-ID: Date: Tue, 25 Apr 2023 21:20:53 +0800 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:102.0) Gecko/20100101 Thunderbird/102.9.0 Subject: Re: [PATCH -next v4 0/2] support allocating crashkernel above 4G explicitly on riscv Content-Language: en-US From: "chenjiahao (C)" To: , , , CC: , , , , , , , , , , , References: <20230410130553.3226347-1-chenjiahao16@huawei.com> In-Reply-To: <20230410130553.3226347-1-chenjiahao16@huawei.com> Content-Type: text/plain; charset="UTF-8"; format=flowed Content-Transfer-Encoding: 7bit X-Originating-IP: [10.67.108.26] X-ClientProxiedBy: dggems703-chm.china.huawei.com (10.3.19.180) To dggpemm500016.china.huawei.com (7.185.36.25) X-CFilter-Loop: Reflected X-Spam-Status: No, score=-5.6 required=5.0 tests=BAYES_00,NICE_REPLY_A, RCVD_IN_DNSWL_MED,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2023/4/10 21:05, Chen Jiahao wrote: > On riscv, the current crash kernel allocation logic is trying to > allocate within 32bit addressible memory region by default, if > failed, try to allocate without 4G restriction. > > In need of saving DMA zone memory while allocating a relatively large > crash kernel region, allocating the reserved memory top down in > high memory, without overlapping the DMA zone, is a mature solution. > Hence this patchset introduces the parameter option crashkernel=X,[high,low]. > > One can reserve the crash kernel from high memory above DMA zone range > by explicitly passing "crashkernel=X,high"; or reserve a memory range > below 4G with "crashkernel=X,low". Besides, there are few rules need > to take notice: > 1. "crashkernel=X,[high,low]" will be ignored if "crashkernel=size" > is specified. > 2. "crashkernel=X,low" is valid only when "crashkernel=X,high" is passed > and there is enough memory to be allocated under 4G. > 3. When allocating crashkernel above 4G and no "crashkernel=X,low" is > specified, a 128M low memory will be allocated automatically for > swiotlb bounce buffer. > See Documentation/admin-guide/kernel-parameters.txt for more information. > > To verify loading the crashkernel, adapted kexec-tools is attached below: > https://github.com/chenjh005/kexec-tools/tree/build-test-riscv-v2 > > Following test cases have been performed as expected: > 1) crashkernel=256M //low=256M > 2) crashkernel=1G //low=1G > 3) crashkernel=4G //high=4G, low=128M(default) > 4) crashkernel=4G crashkernel=256M,high //high=4G, low=128M(default), high is ignored > 5) crashkernel=4G crashkernel=256M,low //high=4G, low=128M(default), low is ignored > 6) crashkernel=4G,high //high=4G, low=128M(default) > 7) crashkernel=256M,low //low=0M, invalid > 8) crashkernel=4G,high crashkernel=256M,low //high=4G, low=256M > 9) crashkernel=4G,high crashkernel=4G,low //high=0M, low=0M, invalid > 10) crashkernel=512M@0xd0000000 //low=512M > 11) crashkernel=1G@0xe0000000 //high=0M, low=0M, no enough low memory, failed > > Changes since [v4]: > 1. Update some imprecise code comments for cmdline parsing. > > Changes since [v3]: > 1. Update to print warning and return explicitly on failure when > crashkernel=size@offset is specified. Not changing the result > in this case but making the logic more straightforward. > 2. Some minor cleanup. > > Changes since [v2]: > 1. Update the allocation logic to ensure the high crashkernel > region is reserved strictly above dma32_phys_limit. > 2. Clean up some minor format problems. > > Chen Jiahao (2): > riscv: kdump: Implement crashkernel=X,[high,low] > docs: kdump: Update the crashkernel description for riscv > > .../admin-guide/kernel-parameters.txt | 15 ++-- > arch/riscv/kernel/setup.c | 5 ++ > arch/riscv/mm/init.c | 71 +++++++++++++++++-- > 3 files changed, 79 insertions(+), 12 deletions(-) Hi folks, The current version has fix all problems up-to-date, please let me know if there is any other bug, or somewhere not quiet correct. Thanks for looking into this. Best Regards, Jiahao