From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 8A00DCCA479 for ; Wed, 29 Jun 2022 00:12:07 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id F03CF8E0001; Tue, 28 Jun 2022 20:12:06 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id E8D266B0072; Tue, 28 Jun 2022 20:12:06 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id D54228E0001; Tue, 28 Jun 2022 20:12:06 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0014.hostedemail.com [216.40.44.14]) by kanga.kvack.org (Postfix) with ESMTP id C27896B0071 for ; Tue, 28 Jun 2022 20:12:06 -0400 (EDT) Received: from smtpin18.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay02.hostedemail.com (Postfix) with ESMTP id 98F0B34325 for ; Wed, 29 Jun 2022 00:12:06 +0000 (UTC) X-FDA: 79629345852.18.F74BA9C Received: from mga01.intel.com (mga01.intel.com [192.55.52.88]) by imf17.hostedemail.com (Postfix) with ESMTP id F27A740031 for ; Wed, 29 Jun 2022 00:12:05 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1656461526; x=1687997526; h=message-id:date:mime-version:subject:to:cc:references: from:in-reply-to:content-transfer-encoding; bh=1rJZNOGjRv+TC9F6qD+OHSFaxGFTvIixlfRghRPUsaE=; b=gWe93vyUUZIBMFl+Nq8sKBQWh5spX2YA2emOuuG8TfTqk+AbbIirXZ0C vX19zbJX+DuvbeggiFCY1tPYmzrG1nqFHcIb8jgYIpZs74IvNOf0ILCUW ziA0aa9sAFJ/yCd8O4ZY6T5bCVnXtrlikZb+xLAQStfzC7+qozzCtHVCo HO3H70L9heXQTCfzm5Pbc4Tq6+O08v79bYENwWbkmKlHxs+oBfRKdd01v fnjc4fC7nn6DJE+ydbJFoUCShHD+QJz1XMjcqd2Fe6WjtTZNn9993M3EK 1+nQrAkT2oWzvzE9ZEnwB04dw/dHMAVnbYIAjg1ssNG5L1c3wJ9GlpP+b g==; X-IronPort-AV: E=McAfee;i="6400,9594,10392"; a="307367856" X-IronPort-AV: E=Sophos;i="5.92,230,1650956400"; d="scan'208";a="307367856" Received: from orsmga008.jf.intel.com ([10.7.209.65]) by fmsmga101.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 28 Jun 2022 17:12:04 -0700 X-IronPort-AV: E=Sophos;i="5.92,230,1650956400"; d="scan'208";a="617369374" Received: from staibmic-mobl1.amr.corp.intel.com (HELO [10.209.67.166]) ([10.209.67.166]) by orsmga008-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 28 Jun 2022 17:12:03 -0700 Message-ID: <88fe385c-fe40-d659-5081-7f3cdd9493e4@intel.com> Date: Tue, 28 Jun 2022 17:10:56 -0700 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Thunderbird/91.9.1 Subject: Re: [PATCHv7 11/14] x86: Disable kexec if system has unaccepted memory Content-Language: en-US To: "Kirill A. Shutemov" , "Eric W. Biederman" Cc: Borislav Petkov , Andy Lutomirski , Sean Christopherson , Andrew Morton , Joerg Roedel , Ard Biesheuvel , Andi Kleen , Kuppuswamy Sathyanarayanan , David Rientjes , Vlastimil Babka , Tom Lendacky , Thomas Gleixner , Peter Zijlstra , Paolo Bonzini , Ingo Molnar , Varad Gautam , Dario Faggioli , Mike Rapoport , David Hildenbrand , marcelo.cerri@canonical.com, tim.gardner@canonical.com, khalid.elmously@canonical.com, philip.cox@canonical.com, x86@kernel.org, linux-mm@kvack.org, linux-coco@lists.linux.dev, linux-efi@vger.kernel.org, linux-kernel@vger.kernel.org, kexec@lists.infradead.org References: <20220614120231.48165-1-kirill.shutemov@linux.intel.com> <20220614120231.48165-12-kirill.shutemov@linux.intel.com> <6be29d38-5c93-7cc9-0de7-235d3f83773c@intel.com> <87a6a3aw50.fsf@email.froward.int.ebiederm.org> <20220624020005.txpxlsbjbebf6oq4@black.fi.intel.com> <20220628235105.z6ytdzxofrdkjti4@black.fi.intel.com> From: Dave Hansen In-Reply-To: <20220628235105.z6ytdzxofrdkjti4@black.fi.intel.com> Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit ARC-Authentication-Results: i=1; imf17.hostedemail.com; dkim=pass header.d=intel.com header.s=Intel header.b=gWe93vyU; dmarc=pass (policy=none) header.from=intel.com; spf=none (imf17.hostedemail.com: domain of dave.hansen@intel.com has no SPF policy when checking 192.55.52.88) smtp.mailfrom=dave.hansen@intel.com ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1656461526; a=rsa-sha256; cv=none; b=X7jhO9DTHA3KVN209n3ovk+9ugwFH0ykT8y1Zhy6VPB55nbLPTjFcSWjsiMrQyQbTRmziy lUA0u/WLLQGlYG9cv/e8hFHAXGXcVTmrOhZowJC4KqFzQXrrdoKqQSA0Otepx9EiBKMUIw u39yQmRAW8HdMj8wZ0m9IjmNjsXyu9k= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1656461526; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=bTgd8NuG1XT3MB7WUGlO4bSPmFZ2nG5JuYFug062l3o=; b=N91IVhCLK3KI/hbWNERDxFs5wdz0UVIZJpvgLfL0ilSlJIpE1qlkiO9DPvnX1OXXIXiIJ1 ykk72IOb8kxFGiL0sDc6EeucGzP5h/ECu8XYEx78Uoe1Pj/vtKiHAjZ9GHJ0+uKdUNsVQr 3axGdeXBDwpFKJKbWM/VjK232wTsWtg= X-Stat-Signature: gck7ht7514xwjarj8yyubjoh8fztquhh X-Rspamd-Server: rspam08 X-Rspam-User: X-Rspamd-Queue-Id: F27A740031 Authentication-Results: imf17.hostedemail.com; dkim=pass header.d=intel.com header.s=Intel header.b=gWe93vyU; dmarc=pass (policy=none) header.from=intel.com; spf=none (imf17.hostedemail.com: domain of dave.hansen@intel.com has no SPF policy when checking 192.55.52.88) smtp.mailfrom=dave.hansen@intel.com X-HE-Tag: 1656461525-745947 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: On 6/28/22 16:51, Kirill A. Shutemov wrote: > On Fri, Jun 24, 2022 at 05:00:05AM +0300, Kirill A. Shutemov wrote: >>> If there is some deep and fundamental why this can not be supported >>> then it probably makes sense to put some code in the arch_kexec_load >>> hook that verifies that deep and fundamental reason is present. ... > + /* > + * TODO: Information on memory acceptance status has to be communicated > + * between kernel. > + */ So, the deep and fundamental reason is... drum roll... you haven't gotten around to implementing bitmap passing yet?!?!? I have the feeling that wasn't what Eric was looking for.