Received: by 2002:ac0:a5a6:0:0:0:0:0 with SMTP id m35-v6csp4689386imm; Mon, 17 Sep 2018 19:50:59 -0700 (PDT) X-Google-Smtp-Source: ANB0VdY4zLbNO+WR+i+iuydOVHq9eBHg9GW0f1C/snSghoCVwiTG5h/WuXn/ZERbNJpqO+SjKSJl X-Received: by 2002:a17:902:3fa5:: with SMTP id a34-v6mr27430862pld.244.1537239059049; Mon, 17 Sep 2018 19:50:59 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1537239059; cv=none; d=google.com; s=arc-20160816; b=a8BQWSOm7rMw8dL8iu86el6dDgVMKXDj4cu3Za4piYUPDKvbVFBTced0kqMkQX8SPG hWmVY6+8XCejm4PtDq+xhfnRrcg1Lqj/i2Mqjpb5+Gomwuq10A22OZ1KWwd0jZXUiF5z 860/sE/xH4IdMriM9st4Em4w2OfJa5/ahYeiSHETspn+9pOJHY2MsWtLwsncwoWGoHv/ pio03AtEBP7wI6L8x8tYqYaemmnGgfjec2u5ME10NaF3uC1V8VWE7UTMVQ50J06+Opt5 lcvP23VE7cq0bzZFfnTusjpNeDgEZKraYHsHhzicHlt6UzslvdayY+ctZ6d8XiiXVf+i 3wfg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from; bh=aO9GUK9MXOeQGfIt697NASHLwHVKKjJ9XLPqTilV/fM=; b=D0YQikJISCPjE+9yrGT+6+kgo+JSJ7EZS+cyl7yhfnnO61mFsPNMp6e0K4Uw0cIU45 PknTPkJKQG+2SNz87GlsuAwwGCe2puxdN4m82ff1MXowYG3QmipVr8Z0Uf1rolp1heAG DT9RAhZGSa0wucPhRLpMQDq6pNkaxK1e7fqNAos64kpqeTidqDQicEWPn1Yn6b7TYfyZ U4KlXFYiWHTy92a8rSXJFOZUDxOm+DKhOITtW+nB8UERMd7j+xyLgX2iE+OuwAG2hWUi H4VqGUOOXpap4fEjjxKoiFjnpXroqXJOFY3kG2XFqU0aI28jtJsJgFW5SPr0+BRT/PPg r1TQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id x22-v6si16637678pfh.84.2018.09.17.19.50.43; Mon, 17 Sep 2018 19:50:59 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728986AbeIRITb (ORCPT + 99 others); Tue, 18 Sep 2018 04:19:31 -0400 Received: from mx1.redhat.com ([209.132.183.28]:34332 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726501AbeIRITb (ORCPT ); Tue, 18 Sep 2018 04:19:31 -0400 Received: from smtp.corp.redhat.com (int-mx11.intmail.prod.int.phx2.redhat.com [10.5.11.26]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 131523082123; Tue, 18 Sep 2018 02:49:09 +0000 (UTC) Received: from localhost.localdomain.com (ovpn-12-52.pek2.redhat.com [10.72.12.52]) by smtp.corp.redhat.com (Postfix) with ESMTP id B4A4030912F4; Tue, 18 Sep 2018 02:49:00 +0000 (UTC) From: Lianbo Jiang To: linux-kernel@vger.kernel.org Cc: tglx@linutronix.de, mingo@redhat.com, hpa@zytor.com, x86@kernel.org, akpm@linux-foundation.org, dyoung@redhat.com Subject: [PATCH 2/2] x86/kexec_file: add reserved e820 ranges to 2nd kernel e820 table Date: Tue, 18 Sep 2018 10:48:37 +0800 Message-Id: <20180918024837.17710-3-lijiang@redhat.com> In-Reply-To: <20180918024837.17710-1-lijiang@redhat.com> References: <20180918024837.17710-1-lijiang@redhat.com> X-Scanned-By: MIMEDefang 2.84 on 10.5.11.26 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.42]); Tue, 18 Sep 2018 02:49:09 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org e820 reserved ranges is useful in kdump kernel, we have added this in kexec-tools code. One reason is PCI mmconf (extended mode) requires reserved region otherwise it falls back to legacy mode. When AMD SME kdump support, it needs to map dmi table area as unencrypted. For normal boot these ranges sit in e820 reserved ranges thus the early ioremap code naturally map them as unencrypted. So if we have same e820 reserve setup in kdump kernel then it will just work like normal kernel. Signed-off-by: Dave Young Signed-off-by: Lianbo Jiang --- arch/x86/kernel/crash.c | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/arch/x86/kernel/crash.c b/arch/x86/kernel/crash.c index 3c113e6545a3..db453e9c117b 100644 --- a/arch/x86/kernel/crash.c +++ b/arch/x86/kernel/crash.c @@ -384,6 +384,12 @@ int crash_setup_memmap_entries(struct kimage *image, struct boot_params *params) walk_iomem_res_desc(IORES_DESC_ACPI_NV_STORAGE, flags, 0, -1, &cmd, memmap_entry_callback); + /* Add all reserved ranges */ + cmd.type = E820_TYPE_RESERVED; + flags = IORESOURCE_MEM; + walk_iomem_res_desc(IORES_DESC_NONE, flags, 0, -1, &cmd, + memmap_entry_callback); + /* Add crashk_low_res region */ if (crashk_low_res.end) { ei.addr = crashk_low_res.start; -- 2.17.1