Received: by 2002:ac0:a5b6:0:0:0:0:0 with SMTP id m51-v6csp2308026imm; Mon, 28 May 2018 05:49:16 -0700 (PDT) X-Google-Smtp-Source: AB8JxZpMXISUkOVfSxGLqqpikimGKZJzr2anG8AtAeqQIyGLYDnpq2mP7+nx3JursclmoBFDnG74 X-Received: by 2002:a65:484c:: with SMTP id i12-v6mr10557815pgs.162.1527511756059; Mon, 28 May 2018 05:49:16 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1527511756; cv=none; d=google.com; s=arc-20160816; b=DPFBcuGjtcyeJh8ETcVsyuOoP7V3UlesT6yK0XQ9Qrwj3jebTaOJAyy04azNkFn6UP SCZ28ZTLXwdIcW4O3m7iwGcFTWOuD5KGG3A2Ew88Oyv66kDgkONhEOgmQgjsUp8UuHNV 9lwve0KgBlJvIA5QoqpqN1gjtA83zgAH7AH+K/bTHbaByi4pq2Fsw3yiEKl6L0oO61Av m/cJtiVk2dYZYVZQ43uyXoYzMbPLS65ruAfuVr2ekC394nBliMrob5lb2ETbN/yudEOC X+0OpvAavZQlD0rjUnnBNw9N7Rs4O7z6iqxcZMBI3ruyUQaEkvLWaPsxzUlts8vgwgm/ SiZQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :organization:references:in-reply-to:message-id:subject:cc:to:from :date:arc-authentication-results; bh=08E9gEMjnXew2ilNmk9mNlLuycz6+2DqBBnNnBo8Tak=; b=NzlzwjhwY1bjjZNAQd6ratHC48X5MDrF0kgrzi+4bI09n9iK/oWymmu8B1xPnCrfpi 3p15UjIq3SY5L+2EE8vppsVsZvPEQfe+LbGeBJoolxx8cnIrg9v7Bse+Ts9wOBMaz/tT gKiZ1xPcJ5c79G+6d+WJyQkAyTY9rJRjNDHLBXaaAXUKBachseR3fxl/coHecLUEWIg4 +Tc2opWVvQWhYminpFsU4qlrOB8P3WycuPO+XH63eTqS7ftcV9Ag2EjQ3uXFSE5kDxi0 ccW/B+/qwKzttl1LijtC6lPUnuooRfSYvqRq8UqBQSdi176spK0w9kivCJFkC4xryuAz R56g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e125-v6si30334075pfg.112.2018.05.28.05.49.01; Mon, 28 May 2018 05:49:16 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S938986AbeE1MsJ (ORCPT + 99 others); Mon, 28 May 2018 08:48:09 -0400 Received: from mx2.suse.de ([195.135.220.15]:52212 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S937615AbeE1MsF (ORCPT ); Mon, 28 May 2018 08:48:05 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay1.suse.de (charybdis-ext-too.suse.de [195.135.220.254]) by mx2.suse.de (Postfix) with ESMTP id 54388AB35; Mon, 28 May 2018 12:39:00 +0000 (UTC) Date: Mon, 28 May 2018 14:34:00 +0200 From: Petr Tesarik To: ebiederm@xmission.com (Eric W. Biederman) Cc: dzickus@redhat.com, Neil Horman , Tony Luck , bhe@redhat.com, Michael Ellerman , kexec@lists.infradead.org, linux-kernel@vger.kernel.org, Hari Bathini , Benjamin Herrenschmidt , Martin Schwidefsky , Cong Wang , Andrew Morton , Dave Young , Ingo Molnar , Vivek Goyal Subject: Re: [PATCH] kdump: add default crashkernel reserve kernel config options Message-ID: <20180528143400.4fc68de4@ezekiel.suse.cz> In-Reply-To: <87d0xjwlo2.fsf@xmission.com> References: <20180521025337.GA4627@dhcp-128-65.nay.redhat.com> <20180521120215.117d963a7619eb0d1f54bced@linux-foundation.org> <20180523070641.GA1689@dhcp-128-65.nay.redhat.com> <877enucqr0.fsf@xmission.com> <20180523222236.5a96732e@ezekiel.suse.cz> <20180524014905.GB2031@dhcp-128-65.nay.redhat.com> <20180524085708.31aa311d@ezekiel.suse.cz> <87k1rt3tdu.fsf@xmission.com> <20180525065943.03bcb911@ezekiel.suse.cz> <87d0xjwlo2.fsf@xmission.com> Organization: SUSE Linux, s.r.o. X-Mailer: Claws Mail 3.13.2 (GTK+ 2.24.31; x86_64-suse-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, 25 May 2018 15:00:13 -0500 ebiederm@xmission.com (Eric W. Biederman) wrote: >[...] > The ultimate point is that the absolute best we can do is to run a > kernel in memory that we never use for anything else and then we have a > fighting chance of getting the system working and getting a report of > the failure out to somewhere. > > > Anyway, of course we would still have to keep the current method, > > because user pages are not always filtered. For example, a major SUSE > > account runs a database in user space and also inspects its data > > structures in case of a system crash. > > And I understand the memory pressures that will encourage people to use > user pages for extra memory to run the dump capture kernel in. Short of > the presence of an IOMMU that all DMA transfers must go through I don't > see how those user pages could reliably be used. Absolutely. I fully understand that a system which reuses first kernel's memory in some way must be less reliable than the current state. However, some people are willing to trade less reliability for reduced resource consumption. Note that we're not talking about reserving a few gigs on a single machine with some terabytes of memory (i.e. less than 1% of total RAM), rather a few hundred megs of each 4-gig VM on an s390x machine (i.e. about 10% of total RAM). Petr T