Received: by 2002:a05:7412:8d10:b0:f3:1519:9f41 with SMTP id bj16csp3773361rdb; Sun, 10 Dec 2023 21:56:20 -0800 (PST) X-Google-Smtp-Source: AGHT+IHa8IYmRfZy7GHFhIRMDB5n3vP8tJrUX+D6gwDNo3qTXKlR1ZkwXfKZGYlCOVLg10/dtRrV X-Received: by 2002:a05:6a00:1251:b0:6ce:63d8:3b61 with SMTP id u17-20020a056a00125100b006ce63d83b61mr4766940pfi.26.1702274179961; Sun, 10 Dec 2023 21:56:19 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1702274179; cv=none; d=google.com; s=arc-20160816; b=H/pY9n1dkvkMdiZGraKCtjKXyDC8QzmffDQzAYNjDJ6MMDJsLDrxIxZAWZLWyusaxO sNIZVkOdH2s+TMl7iFaogpoNTmhFiDjDybDgv2Xe26axFZNrUXW3g8ndA/bCLf2ieHLv n1Y+QX0qRcTXjWMvNyGTWHLzXufvjYY6fqkYYQCY0c19n4WJdhyOu/R8/TlRqChOrifV SlBxsGw3tLebfXBT/Mca8tqTPWRpufhjYm4SLf05268HOTYE7rCS73yzZSl4w0W3Mzz0 6oHJEHln5dzxIbUCfAFFOQIqLSahNtaUc2cZP7E3N7mMRc4dw3STirV57Y0GlUNNC9r0 NDpQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=hQMg/oQLQ+AfY0dgegoDtJ1iAm0snwYJkd6yvNpoSzg=; fh=sGX40rX4sNrXiaqk/R0nG5J2zEmJ5OUZp2lplPWJFU8=; b=O8WXuQ2t6p5FBGxg3vtxE7oQf0YXbkfd/WG6afo776Q7hkfrQb9jJTIkIWHRtBT/WO 4pUIiLFvU1XgzrLRBmMiurp2OegotCFW/CsM4sCA1zclnoCCU2LItzyf0TBOttHOQEcY oXJ4RnMz2dpZKhpsg5QXDaYzuR5entlokRssdKVDxQVjRmRXOVKCS5dlDCVdAp1ju6L+ VtD/KOo4MIafQxXrz5N8MapAgs1kQWWv0s+PhLKL8WcGJcbtEHrBG8ehc2neM36PPb3W KtuVR1pS+GvuzhyjnGvSFyOhpILP72LM27XYW1Fkr4J1r8W0ZW0CKi5TA9Ll2kw/0P7S CMqg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=VSbA+ysz; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:5 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from groat.vger.email (groat.vger.email. [2620:137:e000::3:5]) by mx.google.com with ESMTPS id d24-20020aa78e58000000b006cef630790esi565447pfr.90.2023.12.10.21.56.19 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sun, 10 Dec 2023 21:56:19 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:5 as permitted sender) client-ip=2620:137:e000::3:5; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=VSbA+ysz; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:5 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by groat.vger.email (Postfix) with ESMTP id D4DB9806993A; Sun, 10 Dec 2023 21:56:17 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at groat.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233203AbjLKF4E (ORCPT + 99 others); Mon, 11 Dec 2023 00:56:04 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:38126 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233104AbjLKF4E (ORCPT ); Mon, 11 Dec 2023 00:56:04 -0500 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.129.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 20E0EEB for ; Sun, 10 Dec 2023 21:56:10 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1702274168; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=hQMg/oQLQ+AfY0dgegoDtJ1iAm0snwYJkd6yvNpoSzg=; b=VSbA+yszQy7dpNWYN4YeY00czF7579j0XjPUAop3r2+nZF5jPGLF1FxJvRE2qaSjycqXan 7vUlry3xpW4yV4+MG44MqtlRppQF6hrMPC+dMqeZTur8DL2E+1fVEXHRVOprndaFhk+mJX /zEXwES4kNlGOYJRACTSkf/kgYPdtxQ= Received: from mimecast-mx02.redhat.com (mimecast-mx02.redhat.com [66.187.233.88]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-515-1DnNItMvMzGKeaaYkGtXLA-1; Mon, 11 Dec 2023 00:53:26 -0500 X-MC-Unique: 1DnNItMvMzGKeaaYkGtXLA-1 Received: from smtp.corp.redhat.com (int-mx01.intmail.prod.int.rdu2.redhat.com [10.11.54.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by mimecast-mx02.redhat.com (Postfix) with ESMTPS id 65501185A78B; Mon, 11 Dec 2023 05:53:16 +0000 (UTC) Received: from localhost (unknown [10.72.112.218]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 7AD063C27; Mon, 11 Dec 2023 05:53:15 +0000 (UTC) Date: Mon, 11 Dec 2023 13:53:12 +0800 From: Baoquan He To: Andrew Morton Cc: Yuntao Wang , linux-kernel@vger.kernel.org, kexec@lists.infradead.org, Vivek Goyal , Dave Young , Zhen Lei Subject: Re: [PATCH] crash_core: Fix the check for whether crashkernel is from high memory Message-ID: References: <20231209141438.77233-1-ytcoode@gmail.com> <20231209143418.92f02de6b6c6db2b7b3b1815@linux-foundation.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20231209143418.92f02de6b6c6db2b7b3b1815@linux-foundation.org> X-Scanned-By: MIMEDefang 3.4.1 on 10.11.54.1 X-Spam-Status: No, score=-0.9 required=5.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on groat.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (groat.vger.email [0.0.0.0]); Sun, 10 Dec 2023 21:56:18 -0800 (PST) On 12/09/23 at 02:34pm, Andrew Morton wrote: > On Sat, 9 Dec 2023 22:14:38 +0800 Yuntao Wang wrote: > > > If crash_base is equal to CRASH_ADDR_LOW_MAX, it also indicates that > > the crashkernel memory is allocated from high memory. However, the > > current check only considers the case where crash_base is greater than > > CRASH_ADDR_LOW_MAX. Fix it. > > > > This patch also includes some minor cleanups. > > Can we please include a description of the runtime effects of this > change? ie, what happens now and under what circumstances, and how > does the fix alter these things? This is a good catch. Guess it's observed from code exploring. The runtime effects is that crashkernel high memory is successfully reserved, whereas the crashkernel low memory is bypassed in this case, then kdump kernel bootup will fail because of no low memory under 4G.