From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-6.0 required=3.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI, SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED,USER_AGENT_SANE_1 autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 9465AC41604 for ; Wed, 7 Oct 2020 16:35:11 +0000 (UTC) Received: from merlin.infradead.org (merlin.infradead.org [205.233.59.134]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id 460252064E for ; Wed, 7 Oct 2020 16:35:11 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (2048-bit key) header.d=lists.infradead.org header.i=@lists.infradead.org header.b="dg9NEleR" DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 460252064E Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=arm.com Authentication-Results: mail.kernel.org; spf=none smtp.mailfrom=linux-arm-kernel-bounces+linux-arm-kernel=archiver.kernel.org@lists.infradead.org DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=merlin.20170209; h=Sender:Content-Transfer-Encoding: Content-Type:Cc:List-Subscribe:List-Help:List-Post:List-Archive: List-Unsubscribe:List-Id:In-Reply-To:MIME-Version:References:Message-ID: Subject:To:From:Date:Reply-To:Content-ID:Content-Description:Resent-Date: Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Owner; bh=g49l21nhlMINprmflsIdIfl8bSAG12BsriHJfVVjIKM=; b=dg9NEleRWGIwDcnWP2wAJUAHy OwjBjsn7Zeecjg7meblJuLv7FTZEOXnP3X6pu2TYwwy8Nd/VlLqxqkar59pKIVYafJQtvVqSRYXlU h784DziCL+PkgIDLpjY3JDFsDxVZeOcp6l34VwpDiEyTTRsZE3GeiaXpE37hGQyGrt4Nh87Ii1x0M 1Bd7bvyc0M8op39aKipv5J7mZo9jHFkQI6D3J3wuHtsQ+6iSuMcTGXlrqXQ6TnmNXIDGIbN5iJmFW griBFQBT2/w4mz4lZHljJI87f0nmHrh7hMgpSUJZFt5IqXFVC2QPjBYAbmkpsc4vAyaIcQLP3yZkf gdYv9BiEA==; Received: from localhost ([::1] helo=merlin.infradead.org) by merlin.infradead.org with esmtp (Exim 4.92.3 #3 (Red Hat Linux)) id 1kQCNd-0007lQ-Uv; Wed, 07 Oct 2020 16:33:30 +0000 Received: from mail.kernel.org ([198.145.29.99]) by merlin.infradead.org with esmtps (Exim 4.92.3 #3 (Red Hat Linux)) id 1kQCNb-0007kY-0Y; Wed, 07 Oct 2020 16:33:27 +0000 Received: from gaia (unknown [95.149.105.49]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 092952064E; Wed, 7 Oct 2020 16:33:21 +0000 (UTC) Date: Wed, 7 Oct 2020 17:33:19 +0100 From: Catalin Marinas To: Bhupesh Sharma Subject: Re: [PATCH v12 0/9] support reserving crashkernel above 4G on arm64 kdump Message-ID: <20201007163319.GS3462@gaia> References: <20200907134745.25732-1-chenzhou10@huawei.com> <20201005170937.GA14576@gaia> <20201006180012.GB31946@C02TF0J2HF1T.local> MIME-Version: 1.0 Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.10.1 (2018-07-13) X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20201007_123327_195142_82D38EBD X-CRM114-Status: GOOD ( 32.39 ) X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: wangkefeng.wang@huawei.com, Linux Doc Mailing List , Chen Zhou , huawei.libin@huawei.com, guohanjun@huawei.com, Will Deacon , Baoquan He , Jonathan Corbet , Ingo Molnar , RuiRui Yang , John Donnelly , Arnd Bergmann , xiexiuqi@huawei.com, Simon Horman , Thomas Gleixner , linux-arm-kernel , kexec mailing list , Linux Kernel Mailing List , Rob Herring , James Morse , Prabhakar Kushwaha , nsaenzjulienne@suse.de Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+linux-arm-kernel=archiver.kernel.org@lists.infradead.org On Wed, Oct 07, 2020 at 12:37:49PM +0530, Bhupesh Sharma wrote: > On Tue, Oct 6, 2020 at 11:30 PM Catalin Marinas wrote: > > On Mon, Oct 05, 2020 at 11:12:10PM +0530, Bhupesh Sharma wrote: > > > I think my earlier email with the test results on this series bounced > > > off the mailing list server (for some weird reason), but I still see > > > several issues with this patchset. I will add specific issues in the > > > review comments for each patch again, but overall, with a crashkernel > > > size of say 786M, I see the following issue: > > > > > > # cat /proc/cmdline > > > BOOT_IMAGE=(hd7,gpt2)/vmlinuz-5.9.0-rc7+ root=<..snip..> rd.lvm.lv=<..snip..> crashkernel=786M > > > > > > I see two regions of size 786M and 256M reserved in low and high > > > regions respectively, So we reserve a total of 1042M of memory, which > > > is an incorrect behaviour: > > > > > > # dmesg | grep -i crash > > > [ 0.000000] Reserving 256MB of low memory at 2816MB for crashkernel (System low RAM: 768MB) > > > [ 0.000000] Reserving 786MB of memory at 654158MB for crashkernel (System RAM: 130816MB) > > > [ 0.000000] Kernel command line: BOOT_IMAGE=(hd2,gpt2)/vmlinuz-5.9.0-rc7+ root=/dev/mapper/rhel_ampere--hr330a--03-root ro rd.lvm.lv=rhel_ampere-hr330a-03/root rd.lvm.lv=rhel_ampere-hr330a-03/swap crashkernel=786M cma=1024M > > > > > > # cat /proc/iomem | grep -i crash > > > b0000000-bfffffff : Crash kernel (low) > > > bfcbe00000-bffcffffff : Crash kernel > > > > As Chen said, that's the intended behaviour and how x86 works. The > > requested 768M goes in the high range if there's not enough low memory > > and an additional buffer for swiotlb is allocated, hence the low 256M. > > I understand, but why 256M (as low) for arm64? x86_64 setups usually > have more system memory available as compared to several commercially > available arm64 setups. So is the intent, just to keep the behavior > similar between arm64 and x86_64? Similar in the sense of the fallback to high memory and some low memory allocation but the amounts can vary per architecture. > Should we have a CONFIG option / bootarg to help one select the max > 'low_size'? Currently the ' low_size' value is calculated as: > > /* > * two parts from kernel/dma/swiotlb.c: > * -swiotlb size: user-specified with swiotlb= or default. > * > * -swiotlb overflow buffer: now hardcoded to 32k. We round it > * to 8M for other buffers that may need to stay low too. Also > * make sure we allocate enough extra low memory so that we > * don't run out of DMA buffers for 32-bit devices. > */ > low_size = max(swiotlb_size_or_default() + (8UL << 20), 256UL << 20); > > Since many arm64 boards ship with swiotlb=0 (turned off) via kernel > bootargs, the low_size, still ends up being 256M in such cases, > whereas this 256M can be used for some other purposes - so should we > be limiting this to 64M and failing the crash kernel allocation > request (gracefully) otherwise? I think it makes sense to set a low_size = 0 if swiotlb_size_or_default() is 0. The assumption would be that if the main kernel doesn't need an swiotlb, the crashdump one wouldn't need it either. But this probably needs the ZONE_DMA for non-RPi4 platforms addressed as well (expanded to the whole ZONE_DMA32). -- Catalin _______________________________________________ linux-arm-kernel mailing list linux-arm-kernel@lists.infradead.org http://lists.infradead.org/mailman/listinfo/linux-arm-kernel