Patch Detail
get:
Show a patch.
patch:
Update a patch.
put:
Update a patch.
GET /api/patches/2195909/?format=api
{ "id": 2195909, "url": "http://patchwork.ozlabs.org/api/patches/2195909/?format=api", "web_url": "http://patchwork.ozlabs.org/project/linuxppc-dev/patch/20260212101001.343158-5-ruanjinjie@huawei.com/", "project": { "id": 2, "url": "http://patchwork.ozlabs.org/api/projects/2/?format=api", "name": "Linux PPC development", "link_name": "linuxppc-dev", "list_id": "linuxppc-dev.lists.ozlabs.org", "list_email": "linuxppc-dev@lists.ozlabs.org", "web_url": "https://github.com/linuxppc/wiki/wiki", "scm_url": "https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git", "webscm_url": "https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git/", "list_archive_url": "https://lore.kernel.org/linuxppc-dev/", "list_archive_url_format": "https://lore.kernel.org/linuxppc-dev/{}/", "commit_url_format": "https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git/commit/?id={}" }, "msgid": "<20260212101001.343158-5-ruanjinjie@huawei.com>", "list_archive_url": "https://lore.kernel.org/linuxppc-dev/20260212101001.343158-5-ruanjinjie@huawei.com/", "date": "2026-02-12T10:10:01", "name": "[v5,4/4] riscv: kexec: Add support for crashkernel CMA reservation", "commit_ref": null, "pull_url": null, "state": "new", "archived": false, "hash": "1fb8aa28e9c4c9d876bf45074217b4ab7c254f0c", "submitter": { "id": 84791, "url": "http://patchwork.ozlabs.org/api/people/84791/?format=api", "name": "Jinjie Ruan", "email": "ruanjinjie@huawei.com" }, "delegate": null, "mbox": "http://patchwork.ozlabs.org/project/linuxppc-dev/patch/20260212101001.343158-5-ruanjinjie@huawei.com/mbox/", "series": [ { "id": 491953, "url": "http://patchwork.ozlabs.org/api/series/491953/?format=api", "web_url": "http://patchwork.ozlabs.org/project/linuxppc-dev/list/?series=491953", "date": "2026-02-12T10:09:57", "name": "arm64/riscv: Add support for crashkernel CMA reservation", "version": 5, "mbox": "http://patchwork.ozlabs.org/series/491953/mbox/" } ], "comments": "http://patchwork.ozlabs.org/api/patches/2195909/comments/", "check": "success", "checks": "http://patchwork.ozlabs.org/api/patches/2195909/checks/", "tags": {}, "related": [], "headers": { "Return-Path": "\n <linuxppc-dev+bounces-16840-incoming=patchwork.ozlabs.org@lists.ozlabs.org>", "X-Original-To": [ "incoming@patchwork.ozlabs.org", "linuxppc-dev@lists.ozlabs.org" ], "Delivered-To": "patchwork-incoming@legolas.ozlabs.org", "Authentication-Results": [ "legolas.ozlabs.org;\n\tdkim=pass (1024-bit key;\n unprotected) header.d=huawei.com header.i=@huawei.com header.a=rsa-sha256\n header.s=dkim header.b=LRBlxtXx;\n\tdkim-atps=neutral", "legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=lists.ozlabs.org\n (client-ip=2404:9400:21b9:f100::1; helo=lists.ozlabs.org;\n envelope-from=linuxppc-dev+bounces-16840-incoming=patchwork.ozlabs.org@lists.ozlabs.org;\n receiver=patchwork.ozlabs.org)", "lists.ozlabs.org;\n arc=none smtp.remote-ip=113.46.200.223", "lists.ozlabs.org;\n dmarc=pass (p=quarantine dis=none) header.from=huawei.com", "lists.ozlabs.org;\n\tdkim=pass (1024-bit key;\n unprotected) header.d=huawei.com header.i=@huawei.com header.a=rsa-sha256\n header.s=dkim header.b=LRBlxtXx;\n\tdkim-atps=neutral", "lists.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=huawei.com\n (client-ip=113.46.200.223; helo=canpmsgout08.his.huawei.com;\n envelope-from=ruanjinjie@huawei.com; receiver=lists.ozlabs.org)" ], "Received": [ "from lists.ozlabs.org (lists.ozlabs.org\n [IPv6:2404:9400:21b9:f100::1])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fBWHw2L9bz1xpY\n\tfor <incoming@patchwork.ozlabs.org>; Thu, 12 Feb 2026 21:09:48 +1100 (AEDT)", "from boromir.ozlabs.org (localhost [127.0.0.1])\n\tby lists.ozlabs.org (Postfix) with ESMTP id 4fBWHR2snFz3br5;\n\tThu, 12 Feb 2026 21:09:23 +1100 (AEDT)", "from canpmsgout08.his.huawei.com (canpmsgout08.his.huawei.com\n [113.46.200.223])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature RSA-PSS (2048 bits) server-digest\n SHA256)\n\t(No client certificate requested)\n\tby lists.ozlabs.org (Postfix) with ESMTPS id 4fBWHQ1q9dz3bq4\n\tfor <linuxppc-dev@lists.ozlabs.org>; Thu, 12 Feb 2026 21:09:21 +1100 (AEDT)", "from mail.maildlp.com (unknown [172.19.163.15])\n\tby canpmsgout08.his.huawei.com (SkyGuard) with ESMTPS id 4fBW9x4BbyzmVCn;\n\tThu, 12 Feb 2026 18:04:37 +0800 (CST)", "from dggpemf500011.china.huawei.com (unknown [7.185.36.131])\n\tby mail.maildlp.com (Postfix) with ESMTPS id 7224F4056D;\n\tThu, 12 Feb 2026 18:09:17 +0800 (CST)", "from huawei.com (10.90.53.73) by dggpemf500011.china.huawei.com\n (7.185.36.131) with Microsoft SMTP Server (version=TLS1_2,\n cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1544.11; Thu, 12 Feb\n 2026 18:09:15 +0800" ], "ARC-Seal": "i=1; a=rsa-sha256; d=lists.ozlabs.org; s=201707; t=1770890963;\n\tcv=none;\n b=Urv/ygDH/jv3h5vDae0LNMuymMJ4U9VvvQ1feVO4iUmoqvwhBiV4Nu0y+NIEOAapR8dYCptL3D/0fUA9e9ik0nlj8zqkDk4m8T5W3B5LqeEBh5d+a0J7G/td05Pm3MN4g5XoXa5RTEqEeYSrSfOXKCwivS4iQfsmRvSZWcmFLRBvWGzId0URjUBoY362wvSgqtKqpXsqyIhhXt0tVqCW/b0t6x+vwhi0SH7XNXkfkhW2uSbO9b3EpXrWSeKs1GiwYhprzgAdtVkURABuoRoUmtgxa7tASqTxCLJ6c1PQwsLmOJwzWECMEjB2MMQhJ0fzrSceAeJNP2ARLrkLTC5RhQ==", "ARC-Message-Signature": "i=1; a=rsa-sha256; d=lists.ozlabs.org; s=201707;\n\tt=1770890963; c=relaxed/relaxed;\n\tbh=VtIO3omn8+PnTjjnD8spJPG7DsNFFnKCkMyH1MFJ9iU=;\n\th=From:To:Subject:Date:Message-ID:In-Reply-To:References:\n\t MIME-Version:Content-Type;\n b=MTpNpkDTha26ErWWGh5PU4zG2JC1MuKM29GvexcMHKd4GMQDiR2umH1A23yt6ia96wsHzSmX6Ze+pSQqlwcP10SRsi1IGsLj3obbSKNRgk++WhQGx9kMDizht4EZlSa/gTCkwKDxOXkVB6ZESDziGUzUqTEjzqCLnGSb23AfPRW144gRTDR6P/aAsSrwAqhbMcIejUCAwgu5kP/C2N29Zwmau/k6g11MFMigc2kPRdr1mtzAuPzvx+M/5FPC2OFUTgMZU+dh1GQ1AYhjt8PzJj41Tw5ujiV0LEcnWJAqpdTLWNAe20MWS0w6ae0lAkP/UVM6lysbXglyKNdexvm9eQ==", "ARC-Authentication-Results": "i=1; lists.ozlabs.org;\n dmarc=pass (p=quarantine dis=none) header.from=huawei.com;\n dkim=pass (1024-bit key;\n unprotected) header.d=huawei.com header.i=@huawei.com header.a=rsa-sha256\n header.s=dkim header.b=LRBlxtXx; dkim-atps=neutral;\n spf=pass (client-ip=113.46.200.223; helo=canpmsgout08.his.huawei.com;\n envelope-from=ruanjinjie@huawei.com;\n receiver=lists.ozlabs.org) smtp.mailfrom=huawei.com", "dkim-signature": "v=1; a=rsa-sha256; d=huawei.com; s=dkim;\n\tc=relaxed/relaxed; q=dns/txt;\n\th=From;\n\tbh=VtIO3omn8+PnTjjnD8spJPG7DsNFFnKCkMyH1MFJ9iU=;\n\tb=LRBlxtXxNIhJUpIXnCI0UUrNFItuoyFQorrQRUdZrd/efDRrIa9FBhjtnlJESaBSGzxQs1CSM\n\t/z1ydjV90abpxBtjreG9cwQ44wc0KiK+S/l1VZoX45KemCZ+AW3x7pCvV1Hsto62RViiW314c2E\n\t4q3ASiodvKeF5Ix7Ei7gpeU=", "From": "Jinjie Ruan <ruanjinjie@huawei.com>", "To": "<corbet@lwn.net>, <skhan@linuxfoundation.org>, <catalin.marinas@arm.com>,\n\t<will@kernel.org>, <chenhuacai@kernel.org>, <kernel@xen0n.name>,\n\t<maddy@linux.ibm.com>, <mpe@ellerman.id.au>, <npiggin@gmail.com>,\n\t<chleroy@kernel.org>, <pjw@kernel.org>, <palmer@dabbelt.com>,\n\t<aou@eecs.berkeley.edu>, <alex@ghiti.fr>, <tglx@kernel.org>,\n\t<mingo@redhat.com>, <bp@alien8.de>, <dave.hansen@linux.intel.com>,\n\t<hpa@zytor.com>, <akpm@linux-foundation.org>, <bhe@redhat.com>,\n\t<vgoyal@redhat.com>, <dyoung@redhat.com>, <rdunlap@infradead.org>,\n\t<kees@kernel.org>, <elver@google.com>, <paulmck@kernel.org>, <arnd@arndb.de>,\n\t<ruanjinjie@huawei.com>, <fvdl@google.com>, <thuth@redhat.com>,\n\t<ardb@kernel.org>, <leitao@debian.org>, <rppt@kernel.org>, <osandov@fb.com>,\n\t<cfsworks@gmail.com>, <sourabhjain@linux.ibm.com>, <ryan.roberts@arm.com>,\n\t<tangyouling@kylinos.cn>, <eajames@linux.ibm.com>, <hbathini@linux.ibm.com>,\n\t<ritesh.list@gmail.com>, <songshuaishuai@tinylab.org>, <bjorn@rivosinc.com>,\n\t<samuel.holland@sifive.com>, <kevin.brodsky@arm.com>,\n\t<junhui.liu@pigmoral.tech>, <vishal.moola@gmail.com>, <dwmw@amazon.co.uk>,\n\t<pbonzini@redhat.com>, <kai.huang@intel.com>, <ubizjak@gmail.com>,\n\t<coxu@redhat.com>, <fuqiang.wang@easystack.cn>, <liaoyuanhong@vivo.com>,\n\t<brgerst@gmail.com>, <jbohac@suse.cz>, <x86@kernel.org>,\n\t<linux-doc@vger.kernel.org>, <linux-kernel@vger.kernel.org>,\n\t<linux-arm-kernel@lists.infradead.org>, <loongarch@lists.linux.dev>,\n\t<linuxppc-dev@lists.ozlabs.org>, <linux-riscv@lists.infradead.org>,\n\t<kexec@lists.infradead.org>", "Subject": "[PATCH v5 4/4] riscv: kexec: Add support for crashkernel CMA\n reservation", "Date": "Thu, 12 Feb 2026 18:10:01 +0800", "Message-ID": "<20260212101001.343158-5-ruanjinjie@huawei.com>", "X-Mailer": "git-send-email 2.34.1", "In-Reply-To": "<20260212101001.343158-1-ruanjinjie@huawei.com>", "References": "<20260212101001.343158-1-ruanjinjie@huawei.com>", "X-Mailing-List": "linuxppc-dev@lists.ozlabs.org", "List-Id": "<linuxppc-dev.lists.ozlabs.org>", "List-Help": "<mailto:linuxppc-dev+help@lists.ozlabs.org>", "List-Owner": "<mailto:linuxppc-dev+owner@lists.ozlabs.org>", "List-Post": "<mailto:linuxppc-dev@lists.ozlabs.org>", "List-Archive": "<https://lore.kernel.org/linuxppc-dev/>,\n <https://lists.ozlabs.org/pipermail/linuxppc-dev/>", "List-Subscribe": "<mailto:linuxppc-dev+subscribe@lists.ozlabs.org>,\n <mailto:linuxppc-dev+subscribe-digest@lists.ozlabs.org>,\n <mailto:linuxppc-dev+subscribe-nomail@lists.ozlabs.org>", "List-Unsubscribe": "<mailto:linuxppc-dev+unsubscribe@lists.ozlabs.org>", "Precedence": "list", "MIME-Version": "1.0", "Content-Transfer-Encoding": "8bit", "Content-Type": "text/plain", "X-Originating-IP": "[10.90.53.73]", "X-ClientProxiedBy": "kwepems200002.china.huawei.com (7.221.188.68) To\n dggpemf500011.china.huawei.com (7.185.36.131)", "X-Spam-Status": "No, score=-0.2 required=3.0 tests=DKIM_SIGNED,DKIM_VALID,\n\tDKIM_VALID_AU,DKIM_VALID_EF,SPF_HELO_NONE,SPF_PASS autolearn=disabled\n\tversion=4.0.1 OzLabs 8", "X-Spam-Checker-Version": "SpamAssassin 4.0.1 (2024-03-25) on lists.ozlabs.org" }, "content": "Commit 35c18f2933c5 (\"Add a new optional \",cma\" suffix to the\ncrashkernel= command line option\") and commit ab475510e042 (\"kdump:\nimplement reserve_crashkernel_cma\") added CMA support for kdump\ncrashkernel reservation. This allows the kernel to dynamically allocate\ncontiguous memory for crash dumping when needed, rather than permanently\nreserving a fixed region at boot time.\n\nSo extend crashkernel CMA reservation support to riscv. The following\nchanges are made to enable CMA reservation:\n\n- Parse and obtain the CMA reservation size along with other crashkernel\n parameters.\n- Call reserve_crashkernel_cma() to allocate the CMA region for kdump.\n- Include the CMA-reserved ranges for kdump kernel to use.\n- Exclude the CMA-reserved ranges from the crash kernel memory to\n prevent them from being exported through /proc/vmcore, which is already\n done in the crash core.\n\nUpdate kernel-parameters.txt to document CMA support for crashkernel on\nriscv architecture.\n\nSigned-off-by: Jinjie Ruan <ruanjinjie@huawei.com>\n---\n Documentation/admin-guide/kernel-parameters.txt | 16 ++++++++--------\n arch/riscv/kernel/machine_kexec_file.c | 14 +++++++++++++-\n arch/riscv/mm/init.c | 5 +++--\n 3 files changed, 24 insertions(+), 11 deletions(-)", "diff": "diff --git a/Documentation/admin-guide/kernel-parameters.txt b/Documentation/admin-guide/kernel-parameters.txt\nindex a2c7c22c60e4..037002b5b867 100644\n--- a/Documentation/admin-guide/kernel-parameters.txt\n+++ b/Documentation/admin-guide/kernel-parameters.txt\n@@ -1121,14 +1121,14 @@ Kernel parameters\n \t\t\tIt will be ignored when crashkernel=X,high is not used\n \t\t\tor memory reserved is below 4G.\n \tcrashkernel=size[KMG],cma\n-\t\t\t[KNL, X86, ARM64, ppc] Reserve additional crash kernel memory from\n-\t\t\tCMA. This reservation is usable by the first system's\n-\t\t\tuserspace memory and kernel movable allocations (memory\n-\t\t\tballoon, zswap). Pages allocated from this memory range\n-\t\t\twill not be included in the vmcore so this should not\n-\t\t\tbe used if dumping of userspace memory is intended and\n-\t\t\tit has to be expected that some movable kernel pages\n-\t\t\tmay be missing from the dump.\n+\t\t\t[KNL, X86, ARM64, RISCV, ppc] Reserve additional crash\n+\t\t\tkernel memory from CMA. This reservation is usable by\n+\t\t\tthe first system's userspace memory and kernel movable\n+\t\t\tallocations (memory balloon, zswap). Pages allocated\n+\t\t\tfrom this memory range will not be included in the vmcore\n+\t\t\tso this should not be used if dumping of userspace memory\n+\t\t\tis intended and it has to be expected that some movable\n+\t\t\tkernel pages may be missing from the dump.\n \n \t\t\tA standard crashkernel reservation, as described above,\n \t\t\tis still needed to hold the crash kernel and initrd.\ndiff --git a/arch/riscv/kernel/machine_kexec_file.c b/arch/riscv/kernel/machine_kexec_file.c\nindex 2f0e7bbeb2f0..bc10ff157cf0 100644\n--- a/arch/riscv/kernel/machine_kexec_file.c\n+++ b/arch/riscv/kernel/machine_kexec_file.c\n@@ -64,8 +64,20 @@ static int prepare_elf64_ram_headers_callback(struct resource *res, void *arg)\n \n int arch_prepare_elf64_ram_headers(struct crash_mem *cmem)\n {\n+\tint ret, i;\n+\n \tcmem->nr_ranges = 0;\n-\treturn walk_system_ram_res(0, -1, cmem, prepare_elf64_ram_headers_callback);\n+\tret = walk_system_ram_res(0, -1, cmem, prepare_elf64_ram_headers_callback);\n+\tif (ret)\n+\t\treturn ret;\n+\n+\tfor (i = 0; i < crashk_cma_cnt; i++) {\n+\t\tcmem->ranges[cmem->nr_ranges].start = crashk_cma_ranges[i].start;\n+\t\tcmem->ranges[cmem->nr_ranges].end = crashk_cma_ranges[i].end;\n+\t\tcmem->nr_ranges++;\n+\t}\n+\n+\treturn 0;\n }\n \n static char *setup_kdump_cmdline(struct kimage *image, char *cmdline,\ndiff --git a/arch/riscv/mm/init.c b/arch/riscv/mm/init.c\nindex addb8a9305be..074d2d5f79ee 100644\n--- a/arch/riscv/mm/init.c\n+++ b/arch/riscv/mm/init.c\n@@ -1404,7 +1404,7 @@ static inline void setup_vm_final(void)\n */\n static void __init arch_reserve_crashkernel(void)\n {\n-\tunsigned long long low_size = 0;\n+\tunsigned long long low_size = 0, cma_size = 0;\n \tunsigned long long crash_base, crash_size;\n \tbool high = false;\n \tint ret;\n@@ -1414,11 +1414,12 @@ static void __init arch_reserve_crashkernel(void)\n \n \tret = parse_crashkernel(boot_command_line, memblock_phys_mem_size(),\n \t\t\t\t&crash_size, &crash_base,\n-\t\t\t\t&low_size, NULL, &high);\n+\t\t\t\t&low_size, &cma_size, &high);\n \tif (ret)\n \t\treturn;\n \n \treserve_crashkernel_generic(crash_size, crash_base, low_size, high);\n+\treserve_crashkernel_cma(cma_size);\n }\n \n void __init paging_init(void)\n", "prefixes": [ "v5", "4/4" ] }