Received: by 2002:a05:7412:b10a:b0:f3:1519:9f41 with SMTP id az10csp251621rdb; Thu, 30 Nov 2023 04:06:03 -0800 (PST) X-Google-Smtp-Source: AGHT+IHhRKLmftv1C29379aIDuYyjrppZE5zP2zSgLQ0vrwCA3tlvN8UwmLtC7lv46nvLKpX3giS X-Received: by 2002:a05:6a21:3989:b0:186:ae16:103 with SMTP id ad9-20020a056a21398900b00186ae160103mr21937713pzc.30.1701345963131; Thu, 30 Nov 2023 04:06:03 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1701345963; cv=none; d=google.com; s=arc-20160816; b=S6Iu/a1elWNSRaB4HywmQ3yTKV2EO/Kh5gV3hcnJdLFzhlR7eijgTjFcdNxexxDAlr OS0XCA98i6DqLGQQfqFEPd1ageGB3kNDXC/8w4wXEa+qBb+JICmUq6FVwdmeYTUNVlVQ vDliwLDYl0rrF/nPEooHlzNG8ZBu1Mf6j/eIhOOmYghRE4cTpx4/9m3LQe8UiJi7V6wM Y5ajOz/80n1JE/2XxCfn7kEcfSbAWlRVF7Y8GgDKSXwwTibcTOPNq+4EurWbtFd/MsQU BYh0hApf5TOFx8VSMKrRKvxxldCAYSeZuGYW7+2ejCrpyMQeAVlnXoKSKYKu+uLykPMi 3fjg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=B80Gpj6tociNz1RbRJ/cNcWm35Kf/1SWUfnQzVTmpWk=; fh=YixqC/HmY5RaZe3BRPyMsz0B/0nyqp8sxqLrXkMVNCU=; b=W3Ix6eHrwBlCqrfunG4WodpAGUCb1rtYj4LOSvKk511jW0F9TWsfY+xUwIdpCJBNRE 8Fn4qVUfqmUIQDvFxCGCKVitQ4lKSJ7GlI8TT1Xumuueo4ZpuMy5MGkB6tzMT6nHVo7b M3lxVrACdoWZUI0UVJ2H9N6pR0wBH1Yd5DcVNYqxClcaHnfkQBiTwnsGXyblEZxxvABr 8tfhyOibJDj7XWpWoaaPPjzt8DfeMWerCRnL+bydslesWYneOOFuW2raxkleX0BBaECE 3vFMFM3CN9JiYURaEUVOJUvSctUQVHCGeTh4LdHNVbsUQ8cwSndAr5vmTWqzdo9lqHG8 zn/Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=D4wDA5xc; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:8 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from fry.vger.email (fry.vger.email. [2620:137:e000::3:8]) by mx.google.com with ESMTPS id e4-20020a656884000000b005bdbdc71c90si1114944pgt.282.2023.11.30.04.06.02 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 30 Nov 2023 04:06:03 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:8 as permitted sender) client-ip=2620:137:e000::3:8; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=D4wDA5xc; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:8 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by fry.vger.email (Postfix) with ESMTP id 6C1E98053CDF; Thu, 30 Nov 2023 04:05:29 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at fry.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1345246AbjK3MFE (ORCPT + 99 others); Thu, 30 Nov 2023 07:05:04 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:49158 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1345221AbjK3MFD (ORCPT ); Thu, 30 Nov 2023 07:05:03 -0500 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.129.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id A4B85D40 for ; Thu, 30 Nov 2023 04:05:09 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1701345909; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=B80Gpj6tociNz1RbRJ/cNcWm35Kf/1SWUfnQzVTmpWk=; b=D4wDA5xconauaWIsEXHp/sTdQHtUW3SRxnE9RINeJFaiV4VzkeJOpVzSzLWEQo+cm3psTf 51TO/vsGa4B1X5UMvZP+liasBuKRR3c805hofisMoSGovAHxzfshVCx2aCPYCh7uTlWFdD lNPpxw+snib/VIfkQqADfQNc/xhsW6Y= Received: from mimecast-mx02.redhat.com (mimecast-mx02.redhat.com [66.187.233.88]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-103-BqfA4TXcMKOdz47HbkXqIQ-1; Thu, 30 Nov 2023 07:05:03 -0500 X-MC-Unique: BqfA4TXcMKOdz47HbkXqIQ-1 Received: from smtp.corp.redhat.com (int-mx04.intmail.prod.int.rdu2.redhat.com [10.11.54.4]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by mimecast-mx02.redhat.com (Postfix) with ESMTPS id 48461811E86; Thu, 30 Nov 2023 12:05:03 +0000 (UTC) Received: from localhost (unknown [10.72.113.121]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 8D1A42026D68; Thu, 30 Nov 2023 12:05:02 +0000 (UTC) Date: Thu, 30 Nov 2023 20:04:59 +0800 From: Baoquan He To: Michal Hocko Cc: Donald Dutile , Jiri Bohac , Pingfan Liu , Tao Liu , Vivek Goyal , Dave Young , kexec@lists.infradead.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH 0/4] kdump: crashkernel reservation from CMA Message-ID: References: <91a31ce5-63d1-7470-18f7-92b039fda8e6@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: X-Scanned-By: MIMEDefang 3.4.1 on 10.11.54.4 X-Spam-Status: No, score=-0.9 required=5.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on fry.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (fry.vger.email [0.0.0.0]); Thu, 30 Nov 2023 04:05:29 -0800 (PST) On 11/30/23 at 11:16am, Michal Hocko wrote: > On Thu 30-11-23 11:00:48, Baoquan He wrote: > [...] > > Now, we are worried if there's risk if the CMA area is retaken into kdump > > kernel as system RAM. E.g is it possible that 1st kernel's ongoing RDMA > > or DMA will interfere with kdump kernel's normal memory accessing? > > Because kdump kernel usually only reset and initialize the needed > > device, e.g dump target. Those unneeded devices will be unshutdown and > > let go. > > I do not really want to discount your concerns but I am bit confused why > this matters so much. First of all, if there is a buggy RDMA driver > which doesn't use the proper pinning API (which would migrate away from > the CMA) then what is the worst case? We will get crash kernel corrupted > potentially and fail to take a proper kernel crash, right? Is this > worrisome? Yes. Is it a real roadblock? I do not think so. The problem > seems theoretical to me and it is not CMA usage at fault here IMHO. It > is the said theoretical driver that needs fixing anyway. > > Now, it is really fair to mention that CMA backed crash kernel memory > has some limitations > - CMA reservation can only be used by the userspace in the > primary kernel. If the size is overshot this might have > negative impact on kernel allocations > - userspace memory dumping in the crash kernel is fundamentally > incomplete. I am not sure if we are talking about the same thing. My concern is: ==================================================================== 1) system corrutption happened, crash dumping is prepared, cpu and interrupt controllers are shutdown; 2) all pci devices are kept alive; 3) kdump kernel boot up, initialization is only done on those devices which drivers are added into kdump kernel's initrd; 4) those on-flight DMA engine could be still working if their kernel module is not loaded; In this case, if the DMA's destination is located in crashkernel=,cma region, the DMA writting could continue even when kdump kernel has put important kernel data into the area. Is this possible or absolutely not possible with DMA, RDMA, or any other stuff which could keep accessing that area? The existing crashkernel= syntax can gurantee the reserved crashkernel area for kdump kernel is safe. ======================================================================= The 1st kernel's data in the ,cma area is ignored once crashkernel=,cma is taken.