Received: by 2002:a05:7412:8d10:b0:f3:1519:9f41 with SMTP id bj16csp1514853rdb; Thu, 7 Dec 2023 00:55:29 -0800 (PST) X-Google-Smtp-Source: AGHT+IFaHy303txvC5UEP0mzLWezmZsjO9S5lZSbnvn432ctQ+HMZ4pM5q1b5CdeMF4xycEFuish X-Received: by 2002:a9d:6943:0:b0:6d9:dd93:eb2a with SMTP id p3-20020a9d6943000000b006d9dd93eb2amr221656oto.65.1701939329206; Thu, 07 Dec 2023 00:55:29 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1701939329; cv=none; d=google.com; s=arc-20160816; b=BUHfqcH3B7Zj9YmI8tGwh/RUdwA/AOkJCTxGi4Hec9qh+U9RrY2c0lWqaiwtHWatJ/ OBb2MxhpGpQ9wMHSIgzV4N3EGkeIQ0PBZylolHVhyQ4LqCNwL3oAtW3jEek6nw/SLKtU 0wQiAY+poPXOWOViaQA7jdF8i9QHhqi6CDKSv/6PmPDOK/GqyVBh+qvbZbfvFm6Yo7HG ICS+6YdQIsJuGgrroHHeHfcRKGu6xPcF4W19oKEW8KprcGdRKGI2sh50GUsaTZrdW9jQ Dt0SeG+hvQqccJZhyGzjYNPnoJp6X3abAv1GMiwxJxhUQfJ3CWHHo5VQukA8lR3ihNfX ew9w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date; bh=f8b65Lx2C05H9FjfOLHOl5u9qWg7vO/h3XIuRv/A1Sw=; fh=5IuTr0oXIem5+4QXbtXBtlCWumGjwfiAQvtAsFea4KE=; b=I2Q/cbCTaYSVgZfozYL3BJJdpi+N3Wt3VrFUNzytuk2IMY9J3LtbGnoz13OyYEO6I9 zRzF2dqyl2Jq/kF893MW+LcdAlnGIm16rGDuf1u0aVKLeeKNYUa44489cVGgQAKVEdjv CdGvKWqANy9VwKUh9m+AUpgIXSebI898MqV5rzyphXQPcbstDOtSqcCUoiPoBQzdPoUi etJqeZUSB9o2cNx9LwE7eo69iZK8q+H6y/PCdY3Jhz2uC1x3SzHr17Yl4AjJM1ntkoza 2VuE1fYOwC47HsE27eYQF7Ef0pKIw027dWygSUNa9qgBlXoX+eLW9fC9aXopY2gBFTYO w/ug== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.37 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=suse.com Return-Path: Received: from snail.vger.email (snail.vger.email. [23.128.96.37]) by mx.google.com with ESMTPS id j8-20020a63ec08000000b005c603f06562si852784pgh.333.2023.12.07.00.55.28 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 07 Dec 2023 00:55:29 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.37 as permitted sender) client-ip=23.128.96.37; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.37 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=suse.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by snail.vger.email (Postfix) with ESMTP id EE66E806138E; Thu, 7 Dec 2023 00:55:27 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at snail.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230218AbjLGIzS (ORCPT + 99 others); Thu, 7 Dec 2023 03:55:18 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:47946 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229583AbjLGIzQ (ORCPT ); Thu, 7 Dec 2023 03:55:16 -0500 Received: from smtp-out2.suse.de (smtp-out2.suse.de [IPv6:2a07:de40:b251:101:10:150:64:2]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 37BB610B for ; Thu, 7 Dec 2023 00:55:22 -0800 (PST) Received: from imap1.dmz-prg2.suse.org (imap1.dmz-prg2.suse.org [IPv6:2a07:de40:b281:104:10:150:64:97]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by smtp-out2.suse.de (Postfix) with ESMTPS id 85A4C1F86C; Thu, 7 Dec 2023 08:55:21 +0000 (UTC) Received: from imap1.dmz-prg2.suse.org (localhost [127.0.0.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by imap1.dmz-prg2.suse.org (Postfix) with ESMTPS id 65FC813976; Thu, 7 Dec 2023 08:55:21 +0000 (UTC) Received: from dovecot-director2.suse.de ([2a07:de40:b281:106:10:150:64:167]) by imap1.dmz-prg2.suse.org with ESMTPSA id t4UOF3mIcWVLPAAAD6G6ig (envelope-from ); Thu, 07 Dec 2023 08:55:21 +0000 Date: Thu, 7 Dec 2023 09:55:20 +0100 From: Michal Hocko To: Baoquan He Cc: Philipp Rudo , Donald Dutile , Jiri Bohac , Pingfan Liu , Tao Liu , Vivek Goyal , Dave Young , kexec@lists.infradead.org, linux-kernel@vger.kernel.org, David Hildenbrand Subject: Re: [PATCH 0/4] kdump: crashkernel reservation from CMA Message-ID: References: <20231201123353.2b3db7fa@rotkaeppchen> <20231201165113.43211a48@rotkaeppchen> <20231206120805.4fdcb8ab@rotkaeppchen> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: X-Rspamd-Queue-Id: 85A4C1F86C X-Spam-Score: 15.00 X-Spamd-Result: default: False [15.00 / 50.00]; RCVD_VIA_SMTP_AUTH(0.00)[]; R_SPF_FAIL(1.00)[-all]; ARC_NA(0.00)[]; FROM_HAS_DN(0.00)[]; TO_DN_SOME(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; MIME_GOOD(-0.10)[text/plain]; MID_RHS_NOT_FQDN(0.50)[]; DMARC_POLICY_QUARANTINE(1.50)[suse.com : No valid SPF, No valid DKIM,quarantine]; RCVD_COUNT_THREE(0.00)[3]; MX_GOOD(-0.01)[]; RCPT_COUNT_SEVEN(0.00)[11]; FUZZY_BLOCKED(0.00)[rspamd.com]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+]; RCVD_IN_DNSWL_HI(-0.50)[2a07:de40:b281:104:10:150:64:97:from]; RCVD_TLS_ALL(0.00)[]; BAYES_HAM(-0.00)[32.61%] X-Spamd-Bar: +++++++++++++++ Authentication-Results: smtp-out2.suse.de; dkim=none; dmarc=fail reason="No valid SPF, No valid DKIM" header.from=suse.com (policy=quarantine); spf=fail (smtp-out2.suse.de: domain of mhocko@suse.com does not designate 2a07:de40:b281:104:10:150:64:97 as permitted sender) smtp.mailfrom=mhocko@suse.com X-Rspamd-Server: rspamd1 X-Spam: Yes X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00, RCVD_IN_DNSWL_BLOCKED,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (snail.vger.email [0.0.0.0]); Thu, 07 Dec 2023 00:55:28 -0800 (PST) On Thu 07-12-23 12:23:13, Baoquan He wrote: [...] > We can't guarantee how swift the DMA transfer could be in the cma, case, > it will be a venture. We can't guarantee this of course but AFAIK the DMA shouldn't take minutes, right? While not perfect, waiting for some time before jumping into the crash kernel should be acceptable from user POV and it should work around most of those potential lingering programmed DMA transfers. So I guess what we would like to hear from you as kdump maintainers is this. Is it absolutely imperative that these issue must be proven impossible or is a best effort approach something worth investing time into? Because if the requirement is an absolute guarantee then I simply do not see any feasible way to achieve the goal of reusable memory. Let me reiterate that the existing reservation mechanism is showing its limits for production systems and I strongly believe this is something that needs addressing because crash dumps are very often the only tool to investigate complex issues. -- Michal Hocko SUSE Labs