Received: by 2002:a05:6358:9144:b0:117:f937:c515 with SMTP id r4csp8489958rwr; Thu, 11 May 2023 01:52:23 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ6sv0ohjv5wBwXg8uFNrDeUq+2Ah8lXgPaPnuLrUxsB5PfCOtxbKp0ylphN55XphWSLiI7q X-Received: by 2002:a17:90b:3a8c:b0:247:40f1:79d7 with SMTP id om12-20020a17090b3a8c00b0024740f179d7mr20088220pjb.34.1683795143562; Thu, 11 May 2023 01:52:23 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1683795143; cv=none; d=google.com; s=arc-20160816; b=1I9Q7PZa3UcaNSikGmQqLTfIEHLnXNKP1ofwmSQPosLa9y9pDeui7d75KakOIymOWC jEhoaRraLlvPHj9/JGM62kFJB4AlH0Q1W/eKK3nq2z1Gh6JXsW/u2k2enNlEXIrDTnTk bn/yS2OUFCNqz6TNMfi+NIzwtvmk282pHOH+6FbdYYuhLYLc3h3RcBwNz+/MYg6yGdRQ kqwkT3JZvSbEYCUBDaTtoTlYNch3kItqtBDDQ6mQnZ14sxWFDiq69eneElRyPSEtfzq8 GBmEWp4H0OaAyLQ7bPMGdI/IsdlAlp8FbPcLVgLViXoMtYBh0K9iezpqrnDU1FcjUZQq ZqmQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=6Ksnhd9f6euk4UMwz4r0L3znJBmMFCS4LERmkABdjZk=; b=qkVQwBqMckXbExqZJ2z7a8LcB/s+NbyMlW4WGWmf/K64ryDZvkaG6suJq0E93mExN8 a/rTIH1naKnDmilBaxfMxTSTqxFC8zrCnL3Y1LtT0L3PN6neCk85H+5sF/laYdI8Yxlx s7REqup761D4QUtUFxKQbI5upB4zw4xslvkhk85T9Uh0CSKMqj1wii/ymqbmYRRJSUb3 bJOHlnia7cQGe7cMWJqJJnrzmUJFuaAP5nBoaErsKE2Tdiv6LHmtCirGjYn462Ry6UAW FWpcBSexTqCPYTBBruhH29unTTT3yJ3IFS/1GaGfWFz+c/SaPvITfqiFQuWtV1BII+YH YiPw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id 2-20020a17090a000200b0024f338cd9f6si17550240pja.130.2023.05.11.01.52.11; Thu, 11 May 2023 01:52:23 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233879AbjEKIvh (ORCPT + 99 others); Thu, 11 May 2023 04:51:37 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:52686 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229536AbjEKIvf (ORCPT ); Thu, 11 May 2023 04:51:35 -0400 Received: from szxga02-in.huawei.com (szxga02-in.huawei.com [45.249.212.188]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 69A6755A2; Thu, 11 May 2023 01:51:33 -0700 (PDT) Received: from dggpemm500016.china.huawei.com (unknown [172.30.72.57]) by szxga02-in.huawei.com (SkyGuard) with ESMTP id 4QH59S0MtbzTk81; Thu, 11 May 2023 16:46:52 +0800 (CST) Received: from huawei.com (10.67.174.205) by dggpemm500016.china.huawei.com (7.185.36.25) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.23; Thu, 11 May 2023 16:51:31 +0800 From: Chen Jiahao To: , , , CC: , , , , , , , , , , , Subject: [PATCH -next v5 0/2] support allocating crashkernel above 4G explicitly on riscv Date: Thu, 11 May 2023 16:51:37 +0800 Message-ID: <20230511085139.1039088-1-chenjiahao16@huawei.com> X-Mailer: git-send-email 2.31.1 MIME-Version: 1.0 Content-Transfer-Encoding: 7BIT Content-Type: text/plain; charset=US-ASCII X-Originating-IP: [10.67.174.205] X-ClientProxiedBy: dggems701-chm.china.huawei.com (10.3.19.178) To dggpemm500016.china.huawei.com (7.185.36.25) X-CFilter-Loop: Reflected X-Spam-Status: No, score=-4.2 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_MED, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On riscv, the current crash kernel allocation logic is trying to allocate within 32bit addressible memory region by default, if failed, try to allocate without 4G restriction. In need of saving DMA zone memory while allocating a relatively large crash kernel region, allocating the reserved memory top down in high memory, without overlapping the DMA zone, is a mature solution. Hence this patchset introduces the parameter option crashkernel=X,[high,low]. One can reserve the crash kernel from high memory above DMA zone range by explicitly passing "crashkernel=X,high"; or reserve a memory range below 4G with "crashkernel=X,low". Besides, there are few rules need to take notice: 1. "crashkernel=X,[high,low]" will be ignored if "crashkernel=size" is specified. 2. "crashkernel=X,low" is valid only when "crashkernel=X,high" is passed and there is enough memory to be allocated under 4G. 3. When allocating crashkernel above 4G and no "crashkernel=X,low" is specified, a 128M low memory will be allocated automatically for swiotlb bounce buffer. See Documentation/admin-guide/kernel-parameters.txt for more information. To verify loading the crashkernel, adapted kexec-tools is attached below: https://github.com/chenjh005/kexec-tools/tree/build-test-riscv-v2 Following test cases have been performed as expected: 1) crashkernel=256M //low=256M 2) crashkernel=1G //low=1G 3) crashkernel=4G //high=4G, low=128M(default) 4) crashkernel=4G crashkernel=256M,high //high=4G, low=128M(default), high is ignored 5) crashkernel=4G crashkernel=256M,low //high=4G, low=128M(default), low is ignored 6) crashkernel=4G,high //high=4G, low=128M(default) 7) crashkernel=256M,low //low=0M, invalid 8) crashkernel=4G,high crashkernel=256M,low //high=4G, low=256M 9) crashkernel=4G,high crashkernel=4G,low //high=0M, low=0M, invalid 10) crashkernel=512M@0xd0000000 //low=512M Changes since [v5]: 1. Update the crashkernel allocation logic when crashkernel=X,high is specified. In this case, region above 4G will directly get reserved as crashkernel, rather than trying lower 32bit allocation first. Changes since [v4]: 1. Update some imprecise code comments for cmdline parsing. Changes since [v3]: 1. Update to print warning and return explicitly on failure when crashkernel=size@offset is specified. Not changing the result in this case but making the logic more straightforward. 2. Some minor cleanup. Changes since [v2]: 1. Update the allocation logic to ensure the high crashkernel region is reserved strictly above dma32_phys_limit. 2. Clean up some minor format problems. Chen Jiahao (2): riscv: kdump: Implement crashkernel=X,[high,low] docs: kdump: Update the crashkernel description for riscv .../admin-guide/kernel-parameters.txt | 15 ++-- arch/riscv/kernel/setup.c | 5 ++ arch/riscv/mm/init.c | 73 +++++++++++++++++-- 3 files changed, 79 insertions(+), 14 deletions(-) -- 2.31.1