Received: by 2002:a05:7412:b10a:b0:f3:1519:9f41 with SMTP id az10csp198126rdb; Thu, 30 Nov 2023 02:16:47 -0800 (PST) X-Google-Smtp-Source: AGHT+IGiZsnckexQUxYaQ1cAQWyNhPlxrprwNQkB2kYxAts4Yukymxb/KkBig3u2ArvISRii4nSf X-Received: by 2002:a05:6a00:23cc:b0:6cd:8a19:c324 with SMTP id g12-20020a056a0023cc00b006cd8a19c324mr16892746pfc.3.1701339407408; Thu, 30 Nov 2023 02:16:47 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1701339407; cv=none; d=google.com; s=arc-20160816; b=CRevAzjCZ9hvq4gInRZh5fdEeRT9mTbzU8LMg+xuq88H6s07pargMJKNi2jThuFi5V UBkVSX6UNUHL21juz2oYsQdspITKtT4vTsOstzrwrI8CvMouRRix9LeOfMHe2Gb9CMd/ UUdNyioCf9lXyVJepsYLM5YzxEkBwynulinArgQPNTMRK9w8B2ZEyiCy74Jkv89qdIpq AxtkGkeqb70ADf5SaRLfdX626pPJv2t53E7yihlvrfo9rp8xwVBCF2kdkwZRtMOROmdQ GlSsHKpBFTtmKc32x9n3jIv/4oSOdXBHAM7lf5EFUgiBA3wHU4JsdMv7/iRCwS93ak1h 5cZA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date; bh=L+3gNf0Km7KF1CmAwf+Tk11Q1PbXjPKP1ll6cDNWocs=; fh=S7hkGnZhYlctT9a7ctMy5uePF3DPUQdV32eZY95u7mw=; b=ka5thvYZIyNB4XgXQIUvaU4pcgUYyTQ3bZXHx1b2ZENWe+t4drBAXlgfHck41QpxCH bVIJSodJkXtG7fSzDwMLCCoEM3tCgcU2woDBEpXVuZ0G/HJxOdH56IRPTMTME1rM+VRL L2nZVAw6mUkLiDqWvKpGySYiceDM1fqwvZB0F54NQXIpdWdXzdIlFb1Qfz0Ub5bUpaSL aklImVfjv1dTG2fvAJROq/LfPenP7n8Vbxtrt9m2mGUzzHr4IqjBX46NjnXIfuMCpiBT sXgL8/LReH+kdPT53zKW0tkTOGdY9ZbNf4bl4vY8C/NpfGYsqXWBAZrT1K8jR9Iqv8ES iq6Q== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:1 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=suse.com Return-Path: Received: from morse.vger.email (morse.vger.email. [2620:137:e000::3:1]) by mx.google.com with ESMTPS id bw18-20020a056a00409200b006cbe638cd99si941505pfb.368.2023.11.30.02.16.44 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 30 Nov 2023 02:16:47 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:1 as permitted sender) client-ip=2620:137:e000::3:1; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:1 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=suse.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by morse.vger.email (Postfix) with ESMTP id 619AB826E8F6; Thu, 30 Nov 2023 02:16:42 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at morse.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231784AbjK3KQ0 (ORCPT + 99 others); Thu, 30 Nov 2023 05:16:26 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:48486 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229462AbjK3KQZ (ORCPT ); Thu, 30 Nov 2023 05:16:25 -0500 Received: from smtp-out2.suse.de (smtp-out2.suse.de [IPv6:2a07:de40:b251:101:10:150:64:2]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 0615910D0 for ; Thu, 30 Nov 2023 02:16:32 -0800 (PST) Received: from imap1.dmz-prg2.suse.org (imap1.dmz-prg2.suse.org [IPv6:2a07:de40:b281:104:10:150:64:97]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by smtp-out2.suse.de (Postfix) with ESMTPS id 5771F1FCEA; Thu, 30 Nov 2023 10:16:30 +0000 (UTC) Received: from imap1.dmz-prg2.suse.org (localhost [127.0.0.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by imap1.dmz-prg2.suse.org (Postfix) with ESMTPS id 2A81913AB1; Thu, 30 Nov 2023 10:16:30 +0000 (UTC) Received: from dovecot-director2.suse.de ([2a07:de40:b281:106:10:150:64:167]) by imap1.dmz-prg2.suse.org with ESMTPSA id InggBv5gaGXEDAAAD6G6ig (envelope-from ); Thu, 30 Nov 2023 10:16:30 +0000 Date: Thu, 30 Nov 2023 11:16:29 +0100 From: Michal Hocko To: Baoquan He Cc: Donald Dutile , Jiri Bohac , Pingfan Liu , Tao Liu , Vivek Goyal , Dave Young , kexec@lists.infradead.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH 0/4] kdump: crashkernel reservation from CMA Message-ID: References: <91a31ce5-63d1-7470-18f7-92b039fda8e6@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: X-Spamd-Bar: +++++++++++++++ Authentication-Results: smtp-out2.suse.de; dkim=none; dmarc=fail reason="No valid SPF, No valid DKIM" header.from=suse.com (policy=quarantine); spf=fail (smtp-out2.suse.de: domain of mhocko@suse.com does not designate 2a07:de40:b281:104:10:150:64:97 as permitted sender) smtp.mailfrom=mhocko@suse.com X-Rspamd-Server: rspamd2 X-Spamd-Result: default: False [15.00 / 50.00]; RCVD_VIA_SMTP_AUTH(0.00)[]; R_SPF_FAIL(1.00)[-all]; ARC_NA(0.00)[]; FROM_HAS_DN(0.00)[]; TO_DN_SOME(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000]; MIME_GOOD(-0.10)[text/plain]; MID_RHS_NOT_FQDN(0.50)[]; DMARC_POLICY_QUARANTINE(1.50)[suse.com : No valid SPF, No valid DKIM,quarantine]; SPAMHAUS_XBL(0.00)[2a07:de40:b281:104:10:150:64:97:from]; RCVD_COUNT_THREE(0.00)[3]; MX_GOOD(-0.01)[]; RCPT_COUNT_SEVEN(0.00)[9]; FUZZY_BLOCKED(0.00)[rspamd.com]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(2.20)[]; MIME_TRACE(0.00)[0:+]; RCVD_TLS_ALL(0.00)[]; BAYES_HAM(-0.00)[12.74%] X-Spam-Score: 15.00 X-Rspamd-Queue-Id: 5771F1FCEA X-Spam: Yes X-Spam-Status: No, score=-0.8 required=5.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on morse.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (morse.vger.email [0.0.0.0]); Thu, 30 Nov 2023 02:16:42 -0800 (PST) On Thu 30-11-23 11:00:48, Baoquan He wrote: [...] > Now, we are worried if there's risk if the CMA area is retaken into kdump > kernel as system RAM. E.g is it possible that 1st kernel's ongoing RDMA > or DMA will interfere with kdump kernel's normal memory accessing? > Because kdump kernel usually only reset and initialize the needed > device, e.g dump target. Those unneeded devices will be unshutdown and > let go. I do not really want to discount your concerns but I am bit confused why this matters so much. First of all, if there is a buggy RDMA driver which doesn't use the proper pinning API (which would migrate away from the CMA) then what is the worst case? We will get crash kernel corrupted potentially and fail to take a proper kernel crash, right? Is this worrisome? Yes. Is it a real roadblock? I do not think so. The problem seems theoretical to me and it is not CMA usage at fault here IMHO. It is the said theoretical driver that needs fixing anyway. Now, it is really fair to mention that CMA backed crash kernel memory has some limitations - CMA reservation can only be used by the userspace in the primary kernel. If the size is overshot this might have negative impact on kernel allocations - userspace memory dumping in the crash kernel is fundamentally incomplete. Just my 2c -- Michal Hocko SUSE Labs