Message ID | 20230406220206.3067006-1-chenjiahao16@huawei.com |
---|---|
Headers |
Return-Path: <linux-kernel-owner@vger.kernel.org> Delivered-To: ouuuleilei@gmail.com Received: by 2002:a59:b0ea:0:b0:3b6:4342:cba0 with SMTP id b10csp1057168vqo; Thu, 6 Apr 2023 07:11:42 -0700 (PDT) X-Google-Smtp-Source: AKy350acUyRgzoAs0h+z6KiHhg3JxVhO2HvOtlyqT19rsjF7VI/DTzL7IqJ8gKNVOuuTrQnbbSpQ X-Received: by 2002:a05:6402:1001:b0:502:4862:d453 with SMTP id c1-20020a056402100100b005024862d453mr4465499edu.3.1680790301751; Thu, 06 Apr 2023 07:11:41 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1680790301; cv=none; d=google.com; s=arc-20160816; b=YRArl4nTGK1yTw1n4n3mS4X7iz4SkeJoANxhYNUIhkRO/VexoQiYKTE3Lkzj8uP1+J ltxrGAFeeH/NHPCDgMY7R1M28COU9wMY7QE86EWkyaAmNHKG1wx+QcXpab+vhKh8JQ52 SdiHgrWS2kmik4A5cdpkKj1QGj6w9um4BecNxxb1Wot0t+i198/Y+ehHn5VqehR3FSoJ wZipQDeQtujkvRidZRKQY4YDVfjCsWw7eyAwlCAiPj2NsOIJitcuHjgSJDBKkaQ7Gkny wl8QrMfZv0zFNUIb8HNjjQwLeqpzT2X+K4xWaORZdRitUNkaU9Ub/pEdORYD+Jfyim62 hEZQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=d3OI1HhEWog0D5ip4IosttFSdQIKBAQri01lyOx+1AY=; b=zlJmBxo0VhRuE6PQaMBvNp9c5Z5bThG1TOm++BxuCex4mQTLwEMKQWkoE2ABYVjaga SaZa6Nu8082RfZJXWsrVW3qsAAOEQsqWEd3G6CEgOQmSxuvljWXql4Ha0eVbIERMhXjk GBlvWNg9eC4IZqs7Cv97mS+wbvWnuGqdMG9SNos/IohPGsr+w/4xvQFUmk3VyJ1zppS+ LEKyJl3LQ7Vp81yrj5Q9wcBKcPpiPsmAxv/cDy4TqnrVjgSidevMZOMU4bKMkVGL6ZxF +2JO29zIUlmGwcRhQRcPVYUp/rdI5SqUl4EV0wRqqtGACMHGXiPuzKMt+k9SECtoauY4 F1Mw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id h25-20020a50ed99000000b00501d50c1416si1073288edr.411.2023.04.06.07.11.17; Thu, 06 Apr 2023 07:11:41 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S239006AbjDFOG1 (ORCPT <rfc822;lkml4gm@gmail.com> + 99 others); Thu, 6 Apr 2023 10:06:27 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:48186 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S238972AbjDFOGW (ORCPT <rfc822;linux-kernel@vger.kernel.org>); Thu, 6 Apr 2023 10:06:22 -0400 Received: from szxga01-in.huawei.com (szxga01-in.huawei.com [45.249.212.187]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 590247ABA; Thu, 6 Apr 2023 07:05:55 -0700 (PDT) Received: from dggpemm500016.china.huawei.com (unknown [172.30.72.56]) by szxga01-in.huawei.com (SkyGuard) with ESMTP id 4Psjt61DPRzrXfC; Thu, 6 Apr 2023 22:04:30 +0800 (CST) Received: from huawei.com (10.67.174.205) by dggpemm500016.china.huawei.com (7.185.36.25) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.23; Thu, 6 Apr 2023 22:05:47 +0800 From: Chen Jiahao <chenjiahao16@huawei.com> To: <linux-kernel@vger.kernel.org>, <linux-riscv@lists.infradead.org>, <kexec@lists.infradead.org>, <linux-doc@vger.kernel.org> CC: <paul.walmsley@sifive.com>, <palmer@dabbelt.com>, <conor.dooley@microchip.com>, <guoren@kernel.org>, <heiko@sntech.de>, <bjorn@rivosinc.com>, <alex@ghiti.fr>, <akpm@linux-foundation.org>, <atishp@rivosinc.com>, <bhe@redhat.com>, <thunder.leizhen@huawei.com>, <horms@kernel.org> Subject: [PATCH -next v3 0/2] support allocating crashkernel above 4G explicitly on riscv Date: Fri, 7 Apr 2023 06:02:04 +0800 Message-ID: <20230406220206.3067006-1-chenjiahao16@huawei.com> X-Mailer: git-send-email 2.31.1 MIME-Version: 1.0 Content-Transfer-Encoding: 7BIT Content-Type: text/plain; charset=US-ASCII X-Originating-IP: [10.67.174.205] X-ClientProxiedBy: dggems706-chm.china.huawei.com (10.3.19.183) To dggpemm500016.china.huawei.com (7.185.36.25) X-CFilter-Loop: Reflected X-Spam-Status: No, score=-2.3 required=5.0 tests=DATE_IN_FUTURE_06_12, RCVD_IN_DNSWL_MED,SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: <linux-kernel.vger.kernel.org> X-Mailing-List: linux-kernel@vger.kernel.org X-getmail-retrieved-from-mailbox: =?utf-8?q?INBOX?= X-GMAIL-THRID: =?utf-8?q?1762436371411414282?= X-GMAIL-MSGID: =?utf-8?q?1762436371411414282?= |
Series |
support allocating crashkernel above 4G explicitly on riscv
|
|
Message
Chen Jiahao
April 6, 2023, 10:02 p.m. UTC
On riscv, the current crash kernel allocation logic is trying to allocate within 32bit addressible memory region by default, if failed, try to allocate without 4G restriction. In need of saving DMA zone memory while allocating a relatively large crash kernel region, allocating the reserved memory top down in high memory, without overlapping the DMA zone, is a mature solution. Hence this patchset introduces the parameter option crashkernel=X,[high,low]. One can reserve the crash kernel from high memory above DMA zone range by explicitly passing "crashkernel=X,high"; or reserve a memory range below 4G with "crashkernel=X,low". Besides, there are few rules need to take notice: 1. "crashkernel=X,[high,low]" will be ignored if "crashkernel=size" is specified. 2. "crashkernel=X,low" is valid only when "crashkernel=X,high" is passed and there is enough memory to be allocated under 4G. 3. When allocating crashkernel above 4G and no "crashkernel=X,low" is specified, a 128M low memory will be allocated automatically for swiotlb bounce buffer. See Documentation/admin-guide/kernel-parameters.txt for more information. To verify loading the crashkernel, adapted kexec-tools is attached below: https://github.com/chenjh005/kexec-tools/tree/build-test-riscv-v2 Following test cases have been performed as expected: 1) crashkernel=256M //low=256M 2) crashkernel=1G //low=1G 3) crashkernel=4G //high=4G, low=128M(default) 4) crashkernel=4G crashkernel=256M,high //high=4G, low=128M(default), high is ignored 5) crashkernel=4G crashkernel=256M,low //high=4G, low=128M(default), low is ignored 6) crashkernel=4G,high //high=4G, low=128M(default) 7) crashkernel=256M,low //low=0M, invalid 8) crashkernel=4G,high crashkernel=256M,low //high=4G, low=256M 9) crashkernel=4G,high crashkernel=4G,low //high=0M, low=0M, invalid 10) crashkernel=512M@0xd0000000 //low=512M 11) crashkernel=1G@0xe0000000 //high=0M, low=0M, no enough low memory, failed Changes since [v3]: 1. Update to print warning and return explicitly on failure when crashkernel=size@offset is specified. Not changing the result in this case but making the logic more straightforward. 2. Some minor cleanup. Changes since [v2]: 1. Update the allocation logic to ensure the high crashkernel region is reserved strictly above dma32_phys_limit. 2. Clean up some minor format problems. Chen Jiahao (2): riscv: kdump: Implement crashkernel=X,[high,low] docs: kdump: Update the crashkernel description for riscv .../admin-guide/kernel-parameters.txt | 15 ++-- arch/riscv/kernel/setup.c | 5 ++ arch/riscv/mm/init.c | 74 +++++++++++++++++-- 3 files changed, 82 insertions(+), 12 deletions(-)
Comments
On Fri, Apr 07, 2023 at 06:02:04AM +0800, Chen Jiahao wrote: > On riscv, the current crash kernel allocation logic is trying to > allocate within 32bit addressible memory region by default, if > failed, try to allocate without 4G restriction. > > In need of saving DMA zone memory while allocating a relatively large > crash kernel region, allocating the reserved memory top down in > high memory, without overlapping the DMA zone, is a mature solution. > Hence this patchset introduces the parameter option crashkernel=X,[high,low]. > > One can reserve the crash kernel from high memory above DMA zone range > by explicitly passing "crashkernel=X,high"; or reserve a memory range > below 4G with "crashkernel=X,low". Besides, there are few rules need > to take notice: > 1. "crashkernel=X,[high,low]" will be ignored if "crashkernel=size" > is specified. > 2. "crashkernel=X,low" is valid only when "crashkernel=X,high" is passed > and there is enough memory to be allocated under 4G. > 3. When allocating crashkernel above 4G and no "crashkernel=X,low" is > specified, a 128M low memory will be allocated automatically for > swiotlb bounce buffer. > See Documentation/admin-guide/kernel-parameters.txt for more information. > > To verify loading the crashkernel, adapted kexec-tools is attached below: > https://github.com/chenjh005/kexec-tools/tree/build-test-riscv-v2 Are you planning to submit the kexec-tools patches too?
On 2023/4/7 20:05, Simon Horman wrote: > On Fri, Apr 07, 2023 at 06:02:04AM +0800, Chen Jiahao wrote: >> On riscv, the current crash kernel allocation logic is trying to >> allocate within 32bit addressible memory region by default, if >> failed, try to allocate without 4G restriction. >> >> In need of saving DMA zone memory while allocating a relatively large >> crash kernel region, allocating the reserved memory top down in >> high memory, without overlapping the DMA zone, is a mature solution. >> Hence this patchset introduces the parameter option crashkernel=X,[high,low]. >> >> One can reserve the crash kernel from high memory above DMA zone range >> by explicitly passing "crashkernel=X,high"; or reserve a memory range >> below 4G with "crashkernel=X,low". Besides, there are few rules need >> to take notice: >> 1. "crashkernel=X,[high,low]" will be ignored if "crashkernel=size" >> is specified. >> 2. "crashkernel=X,low" is valid only when "crashkernel=X,high" is passed >> and there is enough memory to be allocated under 4G. >> 3. When allocating crashkernel above 4G and no "crashkernel=X,low" is >> specified, a 128M low memory will be allocated automatically for >> swiotlb bounce buffer. >> See Documentation/admin-guide/kernel-parameters.txt for more information. >> >> To verify loading the crashkernel, adapted kexec-tools is attached below: >> https://github.com/chenjh005/kexec-tools/tree/build-test-riscv-v2 > Are you planning to submit the kexec-tools patches too? Yes, but current adaptation is a little informal. I will submit them later after further tests. BR, Jiahao