Received: by 2002:a5b:505:0:0:0:0:0 with SMTP id o5csp5429509ybp; Mon, 14 Oct 2019 22:35:20 -0700 (PDT) X-Google-Smtp-Source: APXvYqxSBiAgz65NbtlmcHTApqjNVkyRr0RGCBpUn2cRXlAwcEKBlVRPXnpLDW6AiJ6zMA7EYo93 X-Received: by 2002:a17:906:e113:: with SMTP id gj19mr32716918ejb.203.1571117720811; Mon, 14 Oct 2019 22:35:20 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1571117720; cv=none; d=google.com; s=arc-20160816; b=yYhlnTZ8PdFPvZ5wDIiIF7uJjf+es8f7mHhxeFKQBSLM9YAm+oj5v2kxPgYShbGnlf MTGRtQj2ew5DgqAltNG7i52Us6xvEKBmxbYKZf6/wi62S3/yDHgUNOR/1KuCrBmn5Pp0 rWNxlwhtLUWBagR0GggTh8CuT4OTQrcQjV3cWIC73OeAUeDhIexgRVBchmmKV9HlYRB0 Jbf1P1QEKhM9YnQmxfF39DNgxlZB3KL00dcsVwCoamSn/TU6DhOUDFwbWy6d1eHYvMRb hHeuR81I7ocPm6e7Wq4b4LW5kHdhklPEY2ZzXORHcZreA9XCudZGlqV9Qju1Nv+0N1+H XQvA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=m3nv1+38AcFZuXmbVD4d8rDs0/s6OUVU6hyC2GtWWYw=; b=egL15+DmNry2rrZWgPmmre0arqvq/c8hrfQK78pq5xp1LPNRVSv5ZCuoaeOOU19Ijl FJPnHIShTgGwtj0tMp7twk97WX007aO/sawHFQ+sVXABJokK7DPqrUjay8g/KfRwqVjL FfaaxbAueBaYLRdsh35oO0Do+V94zIyKNWpxjt82ZdkTi6fi4l3oAQg1FufPtGZdWchN aS7Fp784Qe7ntlkTNNL22WYUX1nC/xVqaYIeiz15LQhs48bQ249ErinF8i8XBzJQlpAQ wi+NT6rR2+XlmHt5NGj0CEhqxrcP9DOWJohBItwBreQNuaRrCn++hf7zhJ5C+HwnPQll Heeg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z35si14273174edd.340.2019.10.14.22.34.57; Mon, 14 Oct 2019 22:35:20 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726950AbfJOCS6 (ORCPT + 99 others); Mon, 14 Oct 2019 22:18:58 -0400 Received: from mx1.redhat.com ([209.132.183.28]:55268 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726766AbfJOCS6 (ORCPT ); Mon, 14 Oct 2019 22:18:58 -0400 Received: from smtp.corp.redhat.com (int-mx02.intmail.prod.int.phx2.redhat.com [10.5.11.12]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 70D17859FC; Tue, 15 Oct 2019 02:18:57 +0000 (UTC) Received: from dhcp-128-65.nay.redhat.com (ovpn-12-17.pek2.redhat.com [10.72.12.17]) by smtp.corp.redhat.com (Postfix) with ESMTPS id ED97E60BE2; Tue, 15 Oct 2019 02:18:51 +0000 (UTC) Date: Tue, 15 Oct 2019 10:18:48 +0800 From: Dave Young To: Kairui Song Cc: Linux Kernel Mailing List , Ingo Molnar , Thomas Gleixner , Ingo Molnar , Borislav Petkov , Thomas Lendacky , Baoquan He , Lianbo Jiang , the arch/x86 maintainers , "kexec@lists.infradead.org" Subject: Re: [PATCH v3 2/2] x86/kdump: Reserve extra memory when SME or SEV is active Message-ID: <20191015021848.GA18043@dhcp-128-65.nay.redhat.com> References: <20190910151341.14986-1-kasong@redhat.com> <20190910151341.14986-3-kasong@redhat.com> <20190911055618.GA104115@gmail.com> <20190927054208.GA13426@dhcp-128-65.nay.redhat.com> <3e1f65de-4539-736e-a7b4-3c726a001f4b@redhat.com> <20191014110504.GA16271@dhcp-128-65.nay.redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20191014110504.GA16271@dhcp-128-65.nay.redhat.com> User-Agent: Mutt/1.12.1 (2019-06-15) X-Scanned-By: MIMEDefang 2.79 on 10.5.11.12 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.26]); Tue, 15 Oct 2019 02:18:57 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 10/14/19 at 07:05pm, Dave Young wrote: > On 10/12/19 at 05:24pm, Kairui Song wrote: > > On 9/27/19 1:42 PM, Dave Young wrote: > > > On 09/25/19 at 06:36pm, Kairui Song wrote: > > > > On Wed, Sep 11, 2019 at 1:56 PM Ingo Molnar wrote: > > > > > * Kairui Song wrote: > > > > > > > > > > > Since commit c7753208a94c ("x86, swiotlb: Add memory encryption support"), > > > > > > SWIOTLB will be enabled even if there is less than 4G of memory when SME > > > > > > is active, to support DMA of devices that not support address with the > > > > > > encrypt bit. > > > > > > > > > > > > And commit aba2d9a6385a ("iommu/amd: Do not disable SWIOTLB if SME is > > > > > > active") make the kernel keep SWIOTLB enabled even if there is an IOMMU. > > > > > > > > > > > > Then commit d7b417fa08d1 ("x86/mm: Add DMA support for SEV memory > > > > > > encryption") will always force SWIOTLB to be enabled when SEV is active > > > > > > in all cases. > > > > > > > > > > > > Now, when either SME or SEV is active, SWIOTLB will be force enabled, > > > > > > and this is also true for kdump kernel. As a result kdump kernel will > > > > > > run out of already scarce pre-reserved memory easily. > > > > > > > > > > > > So when SME/SEV is active, reserve extra memory for SWIOTLB to ensure > > > > > > kdump kernel have enough memory, except when "crashkernel=size[KMG],high" > > > > > > is specified or any offset is used. As for the high reservation case, an > > > > > > extra low memory region will always be reserved and that is enough for > > > > > > SWIOTLB. Else if the offset format is used, user should be fully aware > > > > > > of any possible kdump kernel memory requirement and have to organize the > > > > > > memory usage carefully. > > > > > > > > > > > > Signed-off-by: Kairui Song > > > > > > --- > > > > > > arch/x86/kernel/setup.c | 20 +++++++++++++++++--- > > > > > > 1 file changed, 17 insertions(+), 3 deletions(-) > > > > > > > > > > > > diff --git a/arch/x86/kernel/setup.c b/arch/x86/kernel/setup.c > > > > > > index 71f20bb18cb0..ee6a2f1e2226 100644 > > > > > > --- a/arch/x86/kernel/setup.c > > > > > > +++ b/arch/x86/kernel/setup.c > > > > > > @@ -530,7 +530,7 @@ static int __init crashkernel_find_region(unsigned long long *crash_base, > > > > > > unsigned long long *crash_size, > > > > > > bool high) > > > > > > { > > > > > > - unsigned long long base, size; > > > > > > + unsigned long long base, size, mem_enc_req = 0; > > > > > > > > > > > > base = *crash_base; > > > > > > size = *crash_size; > > > > > > @@ -561,11 +561,25 @@ static int __init crashkernel_find_region(unsigned long long *crash_base, > > > > > > if (high) > > > > > > goto high_reserve; > > > > > > > > > > > > + /* > > > > > > + * When SME/SEV is active and not using high reserve, > > > > > > + * it will always required an extra SWIOTLB region. > > > > > > + */ > > > > > > + if (mem_encrypt_active()) > > > > > > + mem_enc_req = ALIGN(swiotlb_size_or_default(), SZ_1M); > > > > > > + > > > > > > base = memblock_find_in_range(CRASH_ALIGN, > > > > > > - CRASH_ADDR_LOW_MAX, size, > > > > > > + CRASH_ADDR_LOW_MAX, > > > > > > + size + mem_enc_req, > > > > > > CRASH_ALIGN); > > > > > > > > > > > > > Hi Ingo, > > > > > > > > I re-read my previous reply, it's long and tedious, let me try to make > > > > a more effective reply: > > > > > > > > > What sizes are we talking about here? > > > > > > > > The size here is how much memory will be reserved for kdump kernel, to > > > > ensure kdump kernel and userspace can run without OOM. > > > > > > > > > > > > > > - What is the possible size range of swiotlb_size_or_default() > > > > > > > > swiotlb_size_or_default() returns the swiotlb size, it's specified by > > > > user using swiotlb=, or default size (64MB) > > > > > > > > > > > > > > - What is the size of CRASH_ADDR_LOW_MAX (the old limit)? > > > > > > > > It's 4G. > > > > > > > > > > > > > > - Why do we replace one fixed limit with another fixed limit instead of > > > > > accurately sizing the area, with each required feature adding its own > > > > > requirement to the reservation size? > > > > > > > > It's quite hard to "accurately sizing the area". > > > > > > > > No way to tell the exact amount of memory kdump needs, we can only estimate. > > > > Kdump kernel use different cmdline, drivers and components will have > > > > special handling for kdump, and userspace is totally different. > > > > > > Agreed about your above, but specific this the problem in this patch > > > There should be other ways. > > > > > > First thought about doing generic handling in swiotlb part, and do > > > something like kdump_memory_reserve(size) Ingo suggested, but according > > > to you swiotlb init is late, so it can not increase the size, OTOH if > > > reserve another region for kdump in swiotlb will cause other issues. > > > > > > So let's think about other improvement, for example to see if you can > > > call kdump_memory_reserve(size) in AMD SME init path, for example in > > > mem_encrypt_init(), is it before crashkernel reservation? > > > > > > If doable it will be at least cleaner than the code in this patch. > > > > > > Thanks > > > Dave > > > > > > > How about something simple as following code? The logic and new function is as simple as > > possible, just always reserve extra low memory when SME/SEV is active, ignore the high/low > > reservation case. It will waste some memory with SME and high reservation though. > > > > Was hesitating a lot about this series, one thing I'm thinking is that what is the point > > of "crashkernel=" argument, if the crashkernel value could be adjusted according, the value > > specified will seems more meanless or confusing... > > > > And currently there isn't anything like crashkernel=auto or anything similiar to let kernel > > calculate the value automatically, maybe the admin should be aware of the value or be informed > > about the suitable crashkernel value after all? > > Hmm, it is reasonable that a user defined value should be just as is > without any change by kernel. So it is a good reason to introduce > a crashkernel=auto so that kernel can tune the crashkernel size > accordingly on top of some base value which can be configurable by > kernel configs (arch dependent). > And for the time being, can just print a warning when crashkernel= param is used, in mem_encrypt_init() code. alert people to increase the memory size swiotlb_size_or_default(). In the future, if the crashkernel=auto is doable then kernel can adapt to that in code. Even if it is reasonable to let admin to provide a exact value but sometimes it is hard to know these kernel requirement details.. Thanks Dave