Received: by 2002:ac0:a581:0:0:0:0:0 with SMTP id m1-v6csp2046943imm; Thu, 21 Jun 2018 06:29:24 -0700 (PDT) X-Google-Smtp-Source: ADUXVKLO0qn7KexMSn7Kv1Bl2M0H/IKJqgvgcyBIl9R1UZ5owqAjGzmoe/YtYFVnFgIueGG2diOX X-Received: by 2002:a17:902:a989:: with SMTP id bh9-v6mr29152321plb.245.1529587764765; Thu, 21 Jun 2018 06:29:24 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1529587764; cv=none; d=google.com; s=arc-20160816; b=JrvxS4ZoHqBQkaHkrMRF2kajkD5KtTsvR+gdIQ/KnFjfc2BUxGcEUGn64LY4N1lkmO MGM3t4LMd3Etzm32oFPvXgc/54Q3r62CGouPwf4d/bOF+R8YYYpnuAXe30lM//XrOpIv nxlc8x5V8LAiNM4xyJFpCCRkRAr2rkEgXHsV2VMy7TtvKU4s3E+oGzkHFWYJeFw4gCe6 DOrfDcaPvPt74UGaxoG8w4H1LqyMLkwZZVk3ATsax87sdC7JmCCb2RGF4XXVtwpjV4DI b4SYF6h8PrE9SH5xdrXYulTmywGSFaGQELZjc42Hb4My6vPIu4rgtfrgbs+VZgKby5jw SBFQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:arc-authentication-results; bh=cWkWd1fhiiRQh/ofYsp29gbWVzIB9EbpuQUPs23yqyU=; b=mXq0VNPzzQKFEwU6f0FIX2JeJRdJVozU8qbeNVoifNzgV9ypmJe7O3QdmxZuQUyfQE u5raj9mSAG267sTrd+1FKcKwRWsXDj1U5KPF0RgP1Jr9xYlQBhZPrUAaFfhWPTdzcUUz /9cz/zMtkW8CazyBz/zi1OKRbc2qKz67R1DZDOVvnQTrrT8r+JCuqW6CEobIfarowMlK QA5BJlGQQR9ZAUEf4aYZjNcTWJuVB+Jci6Zp/ZjBm3XaggBpoyhxNM/RDjo6wuzU80oq M/Lcne0gDSAjdyGyZezEPqYB9IW5LLtCCVBnCbdzhP0bzgKOTbfNGPyn/xPvybT3HKdx yIlA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id x13-v6si4424784pfn.286.2018.06.21.06.29.09; Thu, 21 Jun 2018 06:29:24 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932902AbeFUN1f (ORCPT + 99 others); Thu, 21 Jun 2018 09:27:35 -0400 Received: from mx3-rdu2.redhat.com ([66.187.233.73]:34082 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S932677AbeFUN1e (ORCPT ); Thu, 21 Jun 2018 09:27:34 -0400 Received: from smtp.corp.redhat.com (int-mx06.intmail.prod.int.rdu2.redhat.com [10.11.54.6]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id F3FC44010227; Thu, 21 Jun 2018 13:27:33 +0000 (UTC) Received: from 192.168.1.107 (ovpn-12-52.pek2.redhat.com [10.72.12.52]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 8CCC12156880; Thu, 21 Jun 2018 13:27:28 +0000 (UTC) Subject: Re: [PATCH 2/4 V3] Allocate pages for kdump without encryption when SME is enabled To: Baoquan He Cc: linux-kernel@vger.kernel.org, thomas.lendacky@amd.com, iommu@lists.linux-foundation.org, dyoung@redhat.com, kexec@lists.infradead.org References: <20180616082714.32035-1-lijiang@redhat.com> <20180616082714.32035-3-lijiang@redhat.com> <20180621015306.GG29979@MiWiFi-R3L-srv> <20180621102321.GK29979@MiWiFi-R3L-srv> From: lijiang Message-ID: <49706f0e-03b6-8c43-c35f-c0b0338a17bd@redhat.com> Date: Thu, 21 Jun 2018 21:27:23 +0800 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.4.0 MIME-Version: 1.0 In-Reply-To: <20180621102321.GK29979@MiWiFi-R3L-srv> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 8bit X-Scanned-By: MIMEDefang 2.78 on 10.11.54.6 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.6]); Thu, 21 Jun 2018 13:27:34 +0000 (UTC) X-Greylist: inspected by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.6]); Thu, 21 Jun 2018 13:27:34 +0000 (UTC) for IP:'10.11.54.6' DOMAIN:'int-mx06.intmail.prod.int.rdu2.redhat.com' HELO:'smtp.corp.redhat.com' FROM:'lijiang@redhat.com' RCPT:'' Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 在 2018年06月21日 18:23, Baoquan He 写道: > On 06/21/18 at 01:06pm, lijiang wrote: >> 在 2018年06月21日 09:53, Baoquan He 写道: >>> On 06/16/18 at 04:27pm, Lianbo Jiang wrote: >>>> When SME is enabled in the first kernel, we will allocate pages >>>> for kdump without encryption in order to be able to boot the >>>> second kernel in the same manner as kexec, which helps to keep >>>> the same code style. >>>> >>>> Signed-off-by: Lianbo Jiang >>>> --- >>>> kernel/kexec_core.c | 12 ++++++++++++ >>>> 1 file changed, 12 insertions(+) >>>> >>>> diff --git a/kernel/kexec_core.c b/kernel/kexec_core.c >>>> index 20fef1a..3c22a9b 100644 >>>> --- a/kernel/kexec_core.c >>>> +++ b/kernel/kexec_core.c >>>> @@ -471,6 +471,16 @@ static struct page *kimage_alloc_crash_control_pages(struct kimage *image, >>>> } >>>> } >>>> >>>> + if (pages) { >>>> + unsigned int count, i; >>>> + >>>> + pages->mapping = NULL; >>>> + set_page_private(pages, order); >>>> + count = 1 << order; >>>> + for (i = 0; i < count; i++) >>>> + SetPageReserved(pages + i); >>> >>> I guess you might imitate the kexec case, however kexec get pages from >>> buddy. Crash pages are reserved in memblock, these codes might make no sense. >>> >> Thanks for your comments. >> We have changed the attribute of pages, so the original attribute of pages will be >> restored when they free. > > Hmm, you can check what kimage_free() is doing, and where > kimage->control_pages, dest_pages, unusable_pages is assigned. Do you > know where these original attribute of pages comes from and they are > used/needed in CRASH case, if you care about them? > Originally, we want to have an opportunity to restore the previous attribute of pages, that should be more better if the pages are remembered in 'image->control_pages'. If we remove these codes, it is also harmless for kdump, but it will become strange, maybe someone could ask where to restore the previous attribute of pages. Thanks. >> >>>> + arch_kexec_post_alloc_pages(page_address(pages), 1 << order, 0); >>>> + } >>>> return pages; >>>> } >>>> >>>> @@ -865,6 +875,7 @@ static int kimage_load_crash_segment(struct kimage *image, >>>> result = -ENOMEM; >>>> goto out; >>>> } >>>> + arch_kexec_post_alloc_pages(page_address(page), 1, 0); >>>> ptr = kmap(page); >>>> ptr += maddr & ~PAGE_MASK; >>>> mchunk = min_t(size_t, mbytes, >>>> @@ -882,6 +893,7 @@ static int kimage_load_crash_segment(struct kimage *image, >>>> result = copy_from_user(ptr, buf, uchunk); >>>> kexec_flush_icache_page(page); >>>> kunmap(page); >>>> + arch_kexec_pre_free_pages(page_address(page), 1); >>>> if (result) { >>>> result = -EFAULT; >>>> goto out; >>>> -- >>>> 2.9.5 >>>> >>>> >>>> _______________________________________________ >>>> kexec mailing list >>>> kexec@lists.infradead.org >>>> http://lists.infradead.org/mailman/listinfo/kexec