From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-4.1 required=3.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id EC585C433E2 for ; Fri, 4 Sep 2020 03:10:43 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id BB018206D4 for ; Fri, 4 Sep 2020 03:10:43 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (1024-bit key) header.d=redhat.com header.i=@redhat.com header.b="HjMnxldb" Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729623AbgIDDKh (ORCPT ); Thu, 3 Sep 2020 23:10:37 -0400 Received: from us-smtp-1.mimecast.com ([207.211.31.81]:50371 "EHLO us-smtp-delivery-1.mimecast.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1729538AbgIDDKg (ORCPT ); Thu, 3 Sep 2020 23:10:36 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1599189032; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=Dj5jkKXXucQZ7MjZMbSlTYrYOVJlx81k0wbbZcQzylA=; b=HjMnxldbzAaL88YQgmBo26PZD0qCON8a4+fjmv7dZs9gYGrO7FvnreC63Hl+jtUXf5Kj97 Lr0d0/2nH+Y74HFFAbubmhZk2cNUtvcxCuMxUU4jUZHBAnr39K9kmnDxll8xwJa0ertZUk 4FhwrmlDukX0EjGK9ac+ihZwyHmeMEk= Received: from mimecast-mx01.redhat.com (mimecast-mx01.redhat.com [209.132.183.4]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-397-bhhFaFSUMYSTd4ngGp7dig-1; Thu, 03 Sep 2020 23:10:28 -0400 X-MC-Unique: bhhFaFSUMYSTd4ngGp7dig-1 Received: from smtp.corp.redhat.com (int-mx01.intmail.prod.int.phx2.redhat.com [10.5.11.11]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx01.redhat.com (Postfix) with ESMTPS id D674D1084C80; Fri, 4 Sep 2020 03:10:25 +0000 (UTC) Received: from dhcp-128-65.nay.redhat.com (ovpn-13-47.pek2.redhat.com [10.72.13.47]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 083E418B59; Fri, 4 Sep 2020 03:10:17 +0000 (UTC) Date: Fri, 4 Sep 2020 11:10:14 +0800 From: Dave Young To: chenzhou Cc: Catalin Marinas , will@kernel.org, james.morse@arm.com, tglx@linutronix.de, mingo@redhat.com, bhe@redhat.com, corbet@lwn.net, John.P.donnelly@oracle.com, prabhakar.pkin@gmail.com, bhsharma@redhat.com, horms@verge.net.au, robh+dt@kernel.org, arnd@arndb.de, nsaenzjulienne@suse.de, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, kexec@lists.infradead.org, linux-doc@vger.kernel.org, guohanjun@huawei.com, xiexiuqi@huawei.com, huawei.libin@huawei.com, wangkefeng.wang@huawei.com Subject: Re: [PATCH v11 3/5] arm64: kdump: reimplement crashkernel=X Message-ID: <20200904031014.GA11869@dhcp-128-65.nay.redhat.com> References: <20200801130856.86625-1-chenzhou10@huawei.com> <20200801130856.86625-4-chenzhou10@huawei.com> <20200902170910.GB16673@gaia> <20200904030424.GA11384@dhcp-128-65.nay.redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20200904030424.GA11384@dhcp-128-65.nay.redhat.com> X-Scanned-By: MIMEDefang 2.79 on 10.5.11.11 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 09/04/20 at 11:04am, Dave Young wrote: > On 09/03/20 at 07:26pm, chenzhou wrote: > > Hi Catalin, > > > > > > On 2020/9/3 1:09, Catalin Marinas wrote: > > > On Sat, Aug 01, 2020 at 09:08:54PM +0800, Chen Zhou wrote: > > >> There are following issues in arm64 kdump: > > >> 1. We use crashkernel=X to reserve crashkernel below 4G, which > > >> will fail when there is no enough low memory. > > >> 2. If reserving crashkernel above 4G, in this case, crash dump > > >> kernel will boot failure because there is no low memory available > > >> for allocation. > > >> 3. Since commit 1a8e1cef7603 ("arm64: use both ZONE_DMA and ZONE_DMA32"), > > >> if the memory reserved for crash dump kernel falled in ZONE_DMA32, > > >> the devices in crash dump kernel need to use ZONE_DMA will alloc > > >> fail. > > >> > > >> To solve these issues, change the behavior of crashkernel=X. > > >> crashkernel=X tries low allocation in ZONE_DMA, and fall back to > > >> high allocation if it fails. > > >> > > >> If requized size X is too large and leads to very little free memory > > >> in ZONE_DMA after low allocation, the system may not work normally. > > >> So add a threshold and go for high allocation directly if the required > > >> size is too large. The value of threshold is set as the half of > > >> the low memory. > > >> > > >> If crash_base is outside ZONE_DMA, try to allocate at least 256M in > > >> ZONE_DMA automatically. "crashkernel=Y,low" can be used to allocate > > >> specified size low memory. > > > Except for the threshold to keep zone ZONE_DMA memory, > > > reserve_crashkernel() looks very close to the x86 version. Shall we try > > > to make this generic as well? In the first instance, you could avoid the > > > threshold check if it takes an explicit ",high" option. > > Ok, i will try to do this. > > > > I look into the function reserve_crashkernel() of x86 and found the start address is > > CRASH_ALIGN in function memblock_find_in_range(), which is different with arm64. > > > > I don't figure out why is CRASH_ALIGN in x86, is there any specific reason? > > Hmm, took another look at the option CONFIG_PHYSICAL_ALIGN > config PHYSICAL_ALIGN > hex "Alignment value to which kernel should be aligned" > default "0x200000" > range 0x2000 0x1000000 if X86_32 > range 0x200000 0x1000000 if X86_64 > > According to above, I think the 16M should come from the largest value > But the default value is 2M, with smaller value reservation can have > more chance to succeed. > > It seems we still need arch specific CRASH_ALIGN, but the initial > version you added the #ifdef for different arches, can you move the > macro to arch specific headers? And just keep the x86 align value as is, I can try to change the x86 value later to CONFIG_PHYSICAL_ALIGN, in this way this series can be cleaner. > > Thanks > Dave