From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752600AbcF3RaO (ORCPT ); Thu, 30 Jun 2016 13:30:14 -0400 Received: from mx0b-001b2d01.pphosted.com ([148.163.158.5]:54639 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1751547AbcF3R3I (ORCPT ); Thu, 30 Jun 2016 13:29:08 -0400 X-IBM-Helo: d24dlp02.br.ibm.com X-IBM-MailFrom: bauerman@linux.vnet.ibm.com X-IBM-RcptTo: linux-kernel@vger.kernel.org From: Thiago Jung Bauermann To: Dave Young Cc: linuxppc-dev@lists.ozlabs.org, kexec@lists.infradead.org, linux-kernel@vger.kernel.org, vgoyal@redhat.com, Eric Biederman Subject: Re: [PATCH v3 3/9] kexec_file: Factor out kexec_locate_mem_hole from kexec_add_buffer. Date: Thu, 30 Jun 2016 13:08:16 -0300 User-Agent: KMail/4.14.3 (Linux/3.13.0-88-generic; KDE/4.14.13; x86_64; ; ) In-Reply-To: <20160630154119.GB3058@dhcp-128-65.nay.redhat.com> References: <1466538521-31216-1-git-send-email-bauerman@linux.vnet.ibm.com> <1736656.LVyt5NrzWE@hactar> <20160630154119.GB3058@dhcp-128-65.nay.redhat.com> MIME-Version: 1.0 Content-Transfer-Encoding: 7Bit Content-Type: text/plain; charset="us-ascii" X-TM-AS-MML: disable X-Content-Scanned: Fidelis XPS MAILER x-cbid: 16063016-0028-0000-0000-0000011E0B99 X-IBM-AV-DETECTION: SAVI=unused REMOTE=unused XFE=unused x-cbparentid: 16063016-0029-0000-0000-000013C33261 Message-Id: <1786832.5GOvNa6ecY@hactar> X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10432:,, definitions=2016-06-30_07:,, signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 spamscore=0 suspectscore=2 malwarescore=0 phishscore=0 adultscore=0 bulkscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1604210000 definitions=main-1606300153 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Am Donnerstag, 30 Juni 2016, 11:41:19 schrieb Dave Young: > On 06/29/16 at 06:09pm, Thiago Jung Bauermann wrote: > > Am Mittwoch, 29 Juni 2016, 15:45:18 schrieb Dave Young: > > > On 06/28/16 at 07:18pm, Thiago Jung Bauermann wrote: > > > > Am Dienstag, 28 Juni 2016, 15:20:55 schrieb Dave Young: > > > > > On 06/27/16 at 04:21pm, Dave Young wrote: > > > It looks good except one nitpick inline.. > > > > > > > +/** > > > > + * kexec_locate_mem_hole - find free memory to load segment or use > > > > in > > > > purgatory > > > > > > It is not necessary to use only for purgatory load.. > > > > Ok, what about this? > > > > /** > > > > * kexec_locate_mem_hole - find free memory in a given kimage. > > Hmm, a given kimage sounds not correct, I can not get a better way to > describe it. How about below with a little change to your previous one: > > kexec_locate_mem_hole - find a free chunk of memory to load kexec segment. > In powerpc the memory chunk can also be used for the purgatory stack. That describes what the memory currently is used for. If powerpc or any other architecture starts to use the memory for something else, this comment would need to be updated. :-) What the function really does is find free memory in the physical address space after the currently running kernel hands over control to whatever runs next. What that memory is used for is decided by the caller of the function. Since (at least for now), the only things that run next are the purgatory and the next kernel, what about this? kexec_locate_mem_hole - find free memory for the purgatory or the next kernel []'s Thiago Jung Bauermann IBM Linux Technology Center