Received: by 2002:ac0:a5a6:0:0:0:0:0 with SMTP id m35-v6csp327284imm; Fri, 21 Sep 2018 00:32:50 -0700 (PDT) X-Google-Smtp-Source: ANB0VdbmL2zxLyyLxOd9IBgw5mikFghJUU6ICHinmMF57UQwYbg6VnWLBLIrU2mhZF3QG6MDs8P3 X-Received: by 2002:a17:902:7d83:: with SMTP id a3-v6mr43157661plm.0.1537515170703; Fri, 21 Sep 2018 00:32:50 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1537515170; cv=none; d=google.com; s=arc-20160816; b=amfjyRsqlsmR2wNeQFtbRYLCK+9h+L/S8vYi5cUtWTH7fV+FJPuxZr8sCyJ3gkun50 OixAmEfFHLJgC4tC1scIm9vaGGUyL0E9YIVI+8wD5ZiOszIuglZzWpkgMBD1IuXeiABh +uyfrQolJWCBPVEbhjsL/NI0+vdMpWYVCMuOsV+a5KzS+i0KfSdrNH/cN2+PEooMTajP GbHZrw36wsdQGTwBSEdkeMm3esruaTPyo5Vc1RhP1Bn6mE+nvFv1zf6wakpcblCHcdm/ K1BZS4rFKEk/uibU6e0CvngmJZ5fL1GYVUsqVEf0XcsacwGSnvFz8cy9rA5JOUPN0ehX SzVw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from; bh=v8pI67hBBKzEev2kW8KbnNbSJa6GS7WfqzWFFMY0mjo=; b=UoGUMlkx4aCzoWeFjc/npYs244BiL80OxVNN1f8624mRPo35CjIO9esq+4aaLS/Gsm 8ixTdqHFhblLz0OKWGPlou7jo3dKew2Hi1zx8WtHZEgZbRP3i6/0fQVvfjvK10OROIsc xFDjNT6liuPUnpi8ILgQPoUZ9j0nxwlpbCybmpHLB8zvSjciy9KKtN1GCQne0VniAPln 20cREt/y9Tcff45cGU5vIEaxKZGU0CiJ8DOG0mkWMla6pZ2YjtQIlntWmDy0iKFNhob0 hiBJTftN0W3SkEMxls3OikAhijUMQgeQMFHJkHKVHb/QNMRQdJMzvHQ1e+1CpwE9ak0P zw8g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id p7-v6si28467119pll.42.2018.09.21.00.32.35; Fri, 21 Sep 2018 00:32:50 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2389625AbeIUNUG (ORCPT + 99 others); Fri, 21 Sep 2018 09:20:06 -0400 Received: from mx1.redhat.com ([209.132.183.28]:40178 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2389398AbeIUNUG (ORCPT ); Fri, 21 Sep 2018 09:20:06 -0400 Received: from smtp.corp.redhat.com (int-mx12.intmail.prod.int.phx2.redhat.com [10.5.11.27]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 671773082135; Fri, 21 Sep 2018 07:32:30 +0000 (UTC) Received: from localhost.localdomain.com (ovpn-12-74.pek2.redhat.com [10.72.12.74]) by smtp.corp.redhat.com (Postfix) with ESMTP id 3E57189AF5; Fri, 21 Sep 2018 07:32:15 +0000 (UTC) From: Lianbo Jiang To: linux-kernel@vger.kernel.org Cc: kexec@lists.infradead.org, tglx@linutronix.de, mingo@redhat.com, hpa@zytor.com, x86@kernel.org, akpm@linux-foundation.org, dan.j.williams@intel.com, thomas.lendacky@amd.com, bhelgaas@google.com, baiyaowei@cmss.chinamobile.com, tiwai@suse.de, bp@suse.de, brijesh.singh@amd.com, dyoung@redhat.com, bhe@redhat.com Subject: [PATCH 0/3 v3] add reserved e820 ranges to the kdump kernel e820 table Date: Fri, 21 Sep 2018 15:32:08 +0800 Message-Id: <20180921073211.20097-1-lijiang@redhat.com> X-Scanned-By: MIMEDefang 2.84 on 10.5.11.27 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.42]); Fri, 21 Sep 2018 07:32:31 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org E820 reserved ranges is useful in kdump kernel, we have added this in kexec-tools code. One reason is PCI mmconf (extended mode) requires reserved region otherwise it falls back to legacy mode. Furthermore, when AMD SME kdump support, it needs to map dmi table area as unencrypted. For normal boot, these ranges sit in e820 reserved ranges, thus the early ioremap code naturally map them as unencrypted. If we also have same e820 reserve setup in kdump kernel then it will just work like normal kernel. Kdump uses walk_iomem_res_desc to iterate resources, then adds matched desc to e820 table for the kdump kernel. But IORES_DESC_NONE resource type includes several different e820 types, we need add exact e820 type to the kdump kernel e820 table, thus it also needs an extra checking in memmap_entry_callback() to match the e820 type and resource name. By the way, we also fix an error which walks through iomem resources, the values of the function parameter may be modified in the while loop of __walk_iomem_res_desc(), which will cause us to not get the desired result in some cases. Changes since v2: 1. Modified the value of flags to "0", when walking through the whole tree for e820 reserved ranges. 2. Modified the invalid SOB chain issue. Lianbo Jiang (3): resource: fix an error which walks through iomem resources x86/kexec_file: add e820 entry in case e820 type string matches to io resource name x86/kexec_file: add reserved e820 ranges to kdump kernel e820 table arch/x86/include/asm/e820/api.h | 2 ++ arch/x86/kernel/crash.c | 11 ++++++++++- arch/x86/kernel/e820.c | 2 +- kernel/resource.c | 3 +++ 4 files changed, 16 insertions(+), 2 deletions(-) -- 2.17.1