Received: by 2002:a05:7412:b10a:b0:f3:1519:9f41 with SMTP id az10csp1180949rdb; Fri, 1 Dec 2023 08:59:24 -0800 (PST) X-Google-Smtp-Source: AGHT+IEU4dI+bBiwdM+o3ox2lUqOGKn4iELToeve1u3emRGTru01/x0tkH1qVLcbDj8t/BhXFOj7 X-Received: by 2002:a17:90b:3e86:b0:285:93f0:b2a4 with SMTP id rj6-20020a17090b3e8600b0028593f0b2a4mr27384115pjb.7.1701449964024; Fri, 01 Dec 2023 08:59:24 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1701449964; cv=none; d=google.com; s=arc-20160816; b=yWBVszlAHu3OgoxnNrQNtkGBZ/Ulf2C6ueQ4JrjlcG+0Wc1yfq5xquaOj1muhwtHAW 3YHPyg3lKZoJSrg0xOfWyizFO9AdM6iYRh46ojv1cEqkS2h6RmsKkO/+eGjYIVJihSLl H9BkbPGaAmZVMgst3gHeARX7Vm7MndsyMr45N2p0D4uQDPxU1vHDLMjQ9z5p4LJW9RDI msgSdv8qyJoDsEHIeHBEaO6xEJ4AdCatsi02fsbSGvQ+GpBBTYhZlDT4fSF/SFHeawk8 MqqMpQse/gOu8XEfhuMZa88T+xma/nb4vK2YklElTNSlsRyyvOKvtlob5zF1ivMtxVQJ c96A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=8lC7vlGIZCDtxYgghp69uMiLgN5wT33v6vp9VGEip7M=; fh=1oPupFOWn/JErXHxVwzPdB7X2yUXM3nzRqgZI8CssG0=; b=anCktp5pyk1zQL7o38OzMEcAFUrKUrHXCl/clXFmN7xNAQbgdcR5aw2LiiFjuxmNRM tAxmAw3HuDnxDzT1QtQqVF/v0gZHGPoeqJzQTzpIOUxkL3Fl6i9FJ2o61A354+CAs5Nq piQAtuRuEOIvz7HnUk/Vsao0Mk8mNEX5m0wTySCDihcK6RPdVK3MkUOwI9S7KvO+Aqnv REUbsTXUUB/6JFm5BCWPJUMT7oFMOwNA5AzLQbbBUIMFD+hixE+hnNvNSj2NtctfrlQ2 xLGX/WhRlXxhb5wbrfsZuOzNI0JUPo28r1H0YO3cckgrCgY5nRFwv7nZ41UYJL/P0MHR /8gw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@suse.com header.s=susede1 header.b=iCLzZBGe; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:6 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=suse.com Return-Path: Received: from pete.vger.email (pete.vger.email. [2620:137:e000::3:6]) by mx.google.com with ESMTPS id ig11-20020a17090b154b00b00285d330b95bsi3705793pjb.165.2023.12.01.08.59.23 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 01 Dec 2023 08:59:24 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:6 as permitted sender) client-ip=2620:137:e000::3:6; Authentication-Results: mx.google.com; dkim=pass header.i=@suse.com header.s=susede1 header.b=iCLzZBGe; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:6 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=suse.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by pete.vger.email (Postfix) with ESMTP id B2469844AB87; Fri, 1 Dec 2023 08:59:20 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at pete.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1378583AbjLAQ7D (ORCPT + 99 others); Fri, 1 Dec 2023 11:59:03 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:35250 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229888AbjLAQ7B (ORCPT ); Fri, 1 Dec 2023 11:59:01 -0500 Received: from smtp-out2.suse.de (smtp-out2.suse.de [195.135.223.131]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id CE1829A for ; Fri, 1 Dec 2023 08:59:05 -0800 (PST) Received: from imap1.dmz-prg2.suse.org (imap1.dmz-prg2.suse.org [10.150.64.97]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by smtp-out2.suse.de (Postfix) with ESMTPS id CB7481FD7F; Fri, 1 Dec 2023 16:59:03 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1; t=1701449943; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=8lC7vlGIZCDtxYgghp69uMiLgN5wT33v6vp9VGEip7M=; b=iCLzZBGeHwTaopLyzeZXrnzlZRLhRgwoMlJ3TstRPb7jsrLGdVJjjx68Ls6C/+sF1usJbe qJTiD2w/AwtWxrIixZGsUj4HmgByLfRDPasE04Barcf4uZC17nqzLSk+it6ZebwH8hvwWH wU6jKOVF56YSfkqLowsXrT+Zn6APurw= Received: from imap1.dmz-prg2.suse.org (localhost [127.0.0.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by imap1.dmz-prg2.suse.org (Postfix) with ESMTPS id A7DDB1379A; Fri, 1 Dec 2023 16:59:03 +0000 (UTC) Received: from dovecot-director2.suse.de ([2a07:de40:b281:106:10:150:64:167]) by imap1.dmz-prg2.suse.org with ESMTPSA id /FoDJtcQamUlZAAAD6G6ig (envelope-from ); Fri, 01 Dec 2023 16:59:03 +0000 Date: Fri, 1 Dec 2023 17:59:02 +0100 From: Michal Hocko To: Philipp Rudo Cc: Baoquan He , Donald Dutile , Jiri Bohac , Pingfan Liu , Tao Liu , Vivek Goyal , Dave Young , kexec@lists.infradead.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH 0/4] kdump: crashkernel reservation from CMA Message-ID: References: <91a31ce5-63d1-7470-18f7-92b039fda8e6@redhat.com> <20231201123353.2b3db7fa@rotkaeppchen> <20231201165113.43211a48@rotkaeppchen> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20231201165113.43211a48@rotkaeppchen> Authentication-Results: smtp-out2.suse.de; none X-Spam-Level: X-Spamd-Result: default: False [-0.60 / 50.00]; ARC_NA(0.00)[]; RCVD_VIA_SMTP_AUTH(0.00)[]; FROM_HAS_DN(0.00)[]; TO_DN_SOME(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; NEURAL_SPAM_SHORT(3.00)[1.000]; MIME_GOOD(-0.10)[text/plain]; NEURAL_HAM_LONG(-1.00)[-0.996]; RCVD_COUNT_THREE(0.00)[3]; DKIM_SIGNED(0.00)[suse.com:s=susede1]; RCPT_COUNT_SEVEN(0.00)[10]; DBL_BLOCKED_OPENRESOLVER(0.00)[suse.com:email]; FUZZY_BLOCKED(0.00)[rspamd.com]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+]; MID_RHS_NOT_FQDN(0.50)[]; RCVD_TLS_ALL(0.00)[]; BAYES_HAM(-3.00)[100.00%] X-Spam-Score: -0.60 X-Spam-Status: No, score=-0.9 required=5.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on pete.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (pete.vger.email [0.0.0.0]); Fri, 01 Dec 2023 08:59:20 -0800 (PST) On Fri 01-12-23 16:51:13, Philipp Rudo wrote: > On Fri, 1 Dec 2023 12:55:52 +0100 > Michal Hocko wrote: > > > On Fri 01-12-23 12:33:53, Philipp Rudo wrote: > > [...] > > > And yes, those are all what-if concerns but unfortunately that is all > > > we have right now. > > > > Should theoretical concerns without an actual evidence (e.g. multiple > > drivers known to be broken) become a roadblock for this otherwise useful > > feature? > > Those concerns aren't just theoretical. They are experiences we have > from a related feature that suffers exactly the same problem regularly > which wouldn't exist if everybody would simply work "properly". What is the related feature? > And yes, even purely theoretical concerns can become a roadblock for a > feature when the cost of those theoretical concerns exceed the benefit > of the feature. The thing is that bugs will be reported against kexec. > So _we_ need to figure out which of the shitty drivers caused the > problem. That puts additional burden on _us_. What we are trying to > evaluate at the moment is if the benefit outweighs the extra burden > with the information we have at the moment. I do understand your concerns! But I am pretty sure you do realize that it is really hard to argue theoreticals. Let me restate what I consider facts. Hopefully we can agree on these points - the CMA region can be used by user space memory which is a great advantage because the memory is not wasted and our experience has shown that users do care about this a lot. We _know_ that pressure on making those reservations smaller results in a less reliable crashdump and more resources spent on tuning and testing (especially after major upgrades). A larger reservation which is not completely wasted for the normal runtime is addressing that concern. - There is no other known mechanism to achieve the reusability of the crash kernel memory to stop the wastage without much more intrusive code/api impact (e.g. a separate zone or dedicated interface to prevent any hazardous usage like RDMA). - implementation wise the patch has a very small footprint. It is using an existing infrastructure (CMA) and it adds a minimal hooking into crashkernel configuration. - The only identified risk so far is RDMA acting on this memory without using proper pinning interface. If it helps to have a statement from RDMA maintainers/developers then we can pull them in for a further discussion of course. - The feature requires an explicit opt-in so this doesn't bring any new risk to existing crash kernel users until they decide to use it. AFAIU there is no way to tell that the crash kernel memory used to be CMA based in the primary kernel. If you believe that having that information available for debugability would help then I believe this shouldn't be hard to add. I think it would even make sense to mark this feature experimental to make it clear to users that this needs some time before it can be marked production ready. I hope I haven't really missed anything important. The final cost/benefit judgment is up to you, maintainers, of course but I would like to remind that we are dealing with a _real_ problem that many production systems are struggling with and that we don't really have any other solution available. -- Michal Hocko SUSE Labs