Received: by 2002:a05:7412:b10a:b0:f3:1519:9f41 with SMTP id az10csp935470rdb; Fri, 1 Dec 2023 02:38:01 -0800 (PST) X-Google-Smtp-Source: AGHT+IHkQyIBfzb/h3hPXrxgBADCWWrJoBl1UVIxhuf+aZRn67lRLd4T6HwS3mSp19BUulBVCYaS X-Received: by 2002:a05:6358:6503:b0:16e:2fd6:9624 with SMTP id v3-20020a056358650300b0016e2fd69624mr18203892rwg.31.1701427080812; Fri, 01 Dec 2023 02:38:00 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1701427080; cv=none; d=google.com; s=arc-20160816; b=WkmIfq9BOl/MZ6zrPzLPvQh5e/rUTFybXlNHpvjz15eQZLuFS+vZdyzcaurU/0eroK OOi4Ra9yVEitdvTysTsDhKBQXr1UK+/nxBiLddxxGAJQ5iy/rKJ8Ru2gVAj41UT8KGpf wnY7s1EoGafkldfYohnBr31HfbVM8LNvIQAxalJb8wowpLbPn7aWaYFEWgLhOQZHdBMg jgOgvxhY8KnGzdZLGDhaGCdNauHnY1kC2le3HavNcWT07FT+fRaXsFiFzWXND0zi+CF4 2MbH0zmaaV41wdKBr0JNgpOJ/ByrIfLso+BMQGBvy1zMAP05s3tAwM+ltawOcpbFY0Fd /89g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=3AKHXuA9rkIsDSYU4VYYdpC7Z1E4D6XbgmPzoeVMV08=; fh=9KeZQjOGe0HdMiqFojivNiG2gMMhYrBYUOkSdcxx8SI=; b=mNedw+IdRCDmyr2Tv3oPLjqIZ0SegS4+UbHtDa9/Xpm5QDaeikKMFhtuOW76QD1kQX CuCjGBW0ZHZ4yztGimVMmZKZv8I7uL/12ROA9EnfSbQ1Aj1OZj37SNdQEFuvzOmdCbBj sCzE59f4REn5zPQBtqbfxkZRdqoLh6F2YZjtkL8To4AseSh5HNYP0mHqmd98gDl06EwF rZ77d+RaGcj27ig36+iwFgyNO/6Lf5PhWThP0yXTB3BCXnnYu1BnFaev4sQJ0N9SUR05 8MGR3xOGkXz/cIV8QYnZP75p8KiB1oCriRmBxTNlNviJN5LIcXwE5ny6toBIoSJbRNCU 79Qg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@suse.com header.s=susede1 header.b=CY5cWtFO; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:5 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=suse.com Return-Path: Received: from groat.vger.email (groat.vger.email. [2620:137:e000::3:5]) by mx.google.com with ESMTPS id r5-20020a632045000000b005bdbdd396eesi3160440pgm.633.2023.12.01.02.38.00 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 01 Dec 2023 02:38:00 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:5 as permitted sender) client-ip=2620:137:e000::3:5; Authentication-Results: mx.google.com; dkim=pass header.i=@suse.com header.s=susede1 header.b=CY5cWtFO; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:5 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=suse.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by groat.vger.email (Postfix) with ESMTP id 19A908260FB6; Fri, 1 Dec 2023 02:37:58 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at groat.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1378302AbjLAKhd (ORCPT + 99 others); Fri, 1 Dec 2023 05:37:33 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:55484 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1378266AbjLAKha (ORCPT ); Fri, 1 Dec 2023 05:37:30 -0500 Received: from smtp-out1.suse.de (smtp-out1.suse.de [195.135.223.130]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 3DA22F4 for ; Fri, 1 Dec 2023 02:37:36 -0800 (PST) Received: from imap1.dmz-prg2.suse.org (imap1.dmz-prg2.suse.org [10.150.64.97]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by smtp-out1.suse.de (Postfix) with ESMTPS id 5061221C55; Fri, 1 Dec 2023 10:37:34 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1; t=1701427054; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=3AKHXuA9rkIsDSYU4VYYdpC7Z1E4D6XbgmPzoeVMV08=; b=CY5cWtFOcN9jOy0PFWPsrJrLEpFGDaWd6f52ktF+iZ2lmZWLHChlb++7dLUkPDxpsYNoZw cVbos4WRyBhkKA8Ojovn8rsa3/Xmd6J20OADutV0XA77pLK1p9OIdUqTTHXWbt62jgMy89 E4D5c0wnfPIpqefwkppJvFnM515DRS8= Received: from imap1.dmz-prg2.suse.org (localhost [127.0.0.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by imap1.dmz-prg2.suse.org (Postfix) with ESMTPS id 2EDF81379A; Fri, 1 Dec 2023 10:37:34 +0000 (UTC) Received: from dovecot-director2.suse.de ([2a07:de40:b281:106:10:150:64:167]) by imap1.dmz-prg2.suse.org with ESMTPSA id D1qICG63aWXNZAAAD6G6ig (envelope-from ); Fri, 01 Dec 2023 10:37:34 +0000 Date: Fri, 1 Dec 2023 11:37:33 +0100 From: Michal Hocko To: Pingfan Liu Cc: Baoquan He , Donald Dutile , Jiri Bohac , Tao Liu , Vivek Goyal , Dave Young , kexec@lists.infradead.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH 0/4] kdump: crashkernel reservation from CMA Message-ID: References: <91a31ce5-63d1-7470-18f7-92b039fda8e6@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: Authentication-Results: smtp-out1.suse.de; none X-Spam-Level: X-Spam-Score: -1.19 X-Spamd-Result: default: False [-1.19 / 50.00]; ARC_NA(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; FROM_HAS_DN(0.00)[]; TO_DN_SOME(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; NEURAL_HAM_LONG(-1.00)[-1.000]; MIME_GOOD(-0.10)[text/plain]; RCVD_COUNT_THREE(0.00)[3]; DKIM_SIGNED(0.00)[suse.com:s=susede1]; RCPT_COUNT_SEVEN(0.00)[9]; FUZZY_BLOCKED(0.00)[rspamd.com]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+]; MID_RHS_NOT_FQDN(0.50)[]; RCVD_TLS_ALL(0.00)[]; BAYES_HAM(-0.59)[81.62%] X-Spam-Status: No, score=-0.9 required=5.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on groat.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (groat.vger.email [0.0.0.0]); Fri, 01 Dec 2023 02:37:58 -0800 (PST) On Fri 01-12-23 08:54:20, Pingfan Liu wrote: [...] > > I am not aware of any method to detect a driver is going to configure a > > RDMA. > > > > If there is a pattern, scripts/coccinelle may give some help. But I am > not sure about that. I am not aware of any pattern. > > > If this can be resolved, I think this method is promising. > > > > Are you indicating this is a mandatory prerequisite? > > IMHO, that should be mandatory. Otherwise for any unexpected kdump > kernel collapses, it can not shake off its suspicion. I appreciate your carefulness! But I do not really see how such a detection would work and be maintained over time. What exactly is the scope of such a tooling? Should it be limited to RDMA drivers? Should we protect from stray writes in general? Also to make it clear. Are you going to nak the proposed solution if there is no such tooling available? -- Michal Hocko SUSE Labs