Received: by 2002:ab2:6309:0:b0:1fb:d597:ff75 with SMTP id s9csp446228lqt; Thu, 6 Jun 2024 08:10:04 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCXD8wJC5lHgk5EMB2K2MAaKqQG88csHPB+tVDjKxT3bMlpkDee+M6/Yw4dQnrMr2DWOw9SLw4ruSLdB96rgDKpzHSynrgkrFzHU/dTmaA== X-Google-Smtp-Source: AGHT+IERuuVHfA3+L3sVNZvLg11FmUCeBjmwLNX7611TUDYOZX3rQmM29H6lH6KK4VBBa1d/7MKA X-Received: by 2002:a17:906:fc01:b0:a59:9dbf:677b with SMTP id a640c23a62f3a-a69a0022d72mr422249566b.48.1717686603757; Thu, 06 Jun 2024 08:10:03 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1717686603; cv=pass; d=google.com; s=arc-20160816; b=ZOcdimVScVMVfCcaev1TWXR7o+W9zrm8+wXnQEINQ/1nMZx8zNgkfa5Mv2TmaV2zO/ CA9tuWW9FZ3A/KZZTM1sxAxzDIq5Ztf4xOBD9S9r12JzERQoiHbg67F39jx/l1PQQIWQ l+ECR9ble10aw7Tqppbxgpx/bYROXwI8wJ8WXT37Au3Axj1CYKTjBkDXEd1VnQ+adScA W3wQ5HLYBZbG5U2zvcZqjq+wUv9teauTWn8teSGbRkMqf7d/euiSio6flIWaG4boQjHo 3GmXqd4Cj9BtdgPj5wvwY1iSYgrFSn7TVqIP+qL0QZKjXiGHbEyDuJNXdK4ugoE7K7kV jULQ== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:in-reply-to:message-id :subject:cc:to:from:date; bh=2LFd3jR6qDR3QS+EWz1+ZCxOS3hIWTjnrGXktTWYyHY=; fh=LThuG9aufL7MLa1GdqNt7v68YQmAUhcnXtPvcp56Jqg=; b=V39Ge8+V8LYMY9XXOd4dM+3ErZ66rEQEozBgXpju4e19RfAuozdmom3vzi7IMFeV2D 8MjuOvbgJ8AhGCoDCUQInMSuqS5Kvu0QNydjw61LGM2Q4XomoWsdT/7MQT9l8D247Adu 30QXUVgiDwwIy9rjJWgSzQun/vz4dSlGTdiRzClNkXdf1bopLhVghc31EASo4r7j5715 x1ZWEFXG9w0X7PKcuEdfbuUkq6jpnbpzsoTUGAtnZodIjy3o7phFMM4aDdZjyzsIJ+Er 0TxbB3+B6nCeCFmFLyNfgvJJIFv3lFkZb3YtPeAcCJdT/8mkD2Jdms78i3cBobpwUH76 Orfw==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; arc=pass (i=1); spf=pass (google.com: domain of linux-kernel+bounces-204518-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) smtp.mailfrom="linux-kernel+bounces-204518-linux.lists.archive=gmail.com@vger.kernel.org" Return-Path: Received: from am.mirrors.kernel.org (am.mirrors.kernel.org. [147.75.80.249]) by mx.google.com with ESMTPS id a640c23a62f3a-a6c8074a681si73598666b.966.2024.06.06.08.10.03 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 06 Jun 2024 08:10:03 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-204518-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) client-ip=147.75.80.249; Authentication-Results: mx.google.com; arc=pass (i=1); spf=pass (google.com: domain of linux-kernel+bounces-204518-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.80.249 as permitted sender) smtp.mailfrom="linux-kernel+bounces-204518-linux.lists.archive=gmail.com@vger.kernel.org" Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by am.mirrors.kernel.org (Postfix) with ESMTPS id 74D0C1F2432D for ; Thu, 6 Jun 2024 15:10:03 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 99768199251; Thu, 6 Jun 2024 14:50:07 +0000 (UTC) Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 16955197A6A; Thu, 6 Jun 2024 14:50:06 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1717685407; cv=none; b=OGM0cjaJ/Ztm3qegf2HlQIf9C4KTZZXF87RqsGX+pbOgZi4ezI5m1/IhdeJNnTUFu7Le1Opv/btB/UkF1kCqCQG9LpSly2qfJZv5UV+2B1jk9mPHHd5XHbDg5YGC5l0jX9WrwXMENBzZkYRpBBbu3wJcGLWTlU2CQNziftoW+ZI= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1717685407; c=relaxed/simple; bh=jmrvv5mciAYj7KHnk+dVNZFlkNGJV5J8UVdaURNL02I=; h=Date:From:To:Cc:Subject:Message-ID:In-Reply-To:References: MIME-Version:Content-Type; b=SKCB8Qzc2qgkakC4Me+8TNyV02LKVsBz+0b1S56yxlJc1SkfpOKqnwGPt5hT9b5hM9t0TQ6WfCt/j3nB0PLGlKC4l4vv0BjkZD71X+BpKrOyF0oXzXD8vN8hWAXUE8GNdg7V1gWiSCm4m35OiPzDNd3UYJJUbpX2hbYyO+A9gJ0= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 Received: by smtp.kernel.org (Postfix) with ESMTPSA id 4942DC2BD10; Thu, 6 Jun 2024 14:50:02 +0000 (UTC) Date: Thu, 6 Jun 2024 10:50:13 -0400 From: Steven Rostedt To: "Luck, Tony" Cc: Ard Biesheuvel , "linux-kernel@vger.kernel.org" , "linux-trace-kernel@vger.kernel.org" , Masami Hiramatsu , Mark Rutland , Mathieu Desnoyers , Andrew Morton , "Liam R. Howlett" , Vlastimil Babka , Lorenzo Stoakes , "linux-mm@kvack.org" , Thomas Gleixner , Ingo Molnar , Borislav Petkov , Dave Hansen , "x86@kernel.org" , "H. Peter Anvin" , Peter Zijlstra , Kees Cook , "Guilherme G. Piccoli" , "linux-hardening@vger.kernel.org" , Guenter Roeck , "Ross Zwisler" , "wklin@google.com" , "Vineeth Remanan Pillai" , Joel Fernandes , Suleiman Souhlal , "Linus Torvalds" , Catalin Marinas , Will Deacon , Mike Rapoport Subject: Re: [PATCH 1/2] mm/memblock: Add "reserve_mem" to reserved named memory at boot up Message-ID: <20240606105013.6435d553@rorschach.local.home> In-Reply-To: References: <20240603233330.801075898@goodmis.org> <20240603233631.452433539@goodmis.org> <20240604070826.030c5202@gandalf.local.home> X-Mailer: Claws Mail 3.17.8 (GTK+ 2.24.33; x86_64-pc-linux-gnu) Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit On Tue, 4 Jun 2024 16:05:04 +0000 "Luck, Tony" wrote: > > I have been using this on two different test machines, as well as a > > chromebook, and it appears to work on all ofthem. As well as for VMs. I > > plan on adding this to my workstation and server too (they use EFI). > > I think that BIOS on Intel servers with ECC memory will stomp on all > memory (to ensure that ECC bits are all set to good values). There > might be a "fast boot" BIOS option to skip this (but using it leaves you > vulnerable after a crash due to ECC fail to hit the same error again). > Talking with some people that are interested in this, they told me that those servers (the ones that take several minutes to boot up) usually use kexec to reboot. Even after a crash (with or without kdump). In those cases, they said this would likely work for them. Again, this isn't fool proof nor guaranteed. It's a best effort approach that, at least for my use case, works most of the time. -- Steve