Received: by 2002:ac0:a5a6:0:0:0:0:0 with SMTP id m35-v6csp327862imm; Fri, 21 Sep 2018 00:33:32 -0700 (PDT) X-Google-Smtp-Source: ANB0VdZKT0EgjC8u+wOfaM/qKeGWKiHutX38i6srDwry5i6xw/kE6f305xvvuqkKFeYtIyOwHORx X-Received: by 2002:a17:902:4381:: with SMTP id j1-v6mr41828576pld.227.1537515212042; Fri, 21 Sep 2018 00:33:32 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1537515212; cv=none; d=google.com; s=arc-20160816; b=rdfNGqjkExUaytj0RVw+DSDWgiKECmRqM9bHxx/6qlZQfI7LJ0ARCj2bAK2Lz22O1T 7KRAzWoqB8V82D8NLjeeLaNKh7Zh720/z/JuzUJBdfcRsd8nfs0iqCE0g4/I35O7zuMc WODBEDjkzEtpqteAh2okZ0gWiusKshCKr2Heew0ncvYXLEWdtHsnmi9J8pn03sFNuTxv Kr/tXxFicGVV5VcKOGg5oG6ghANqJNu+BypQuBh6dvcN7Uu9zZ5tuPTxXzv9Wj1ceGyc KI6eG8X4Se7hHvlOJ7ya9IY5u74uoC2a3KcbWvxbWtD79/vSV4vAEIQFCqFvDj3gvB0G xnLw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from; bh=AywBfnF62DK39Tqy4du09HLXQJTNG9k8R603Xm23dbs=; b=ptGyvlE4IYVk1uU9tFCU8rLVU7X/rhyLbttmNsNkorT4j+usKpeoDbvBxeeaNtaLrP BbzEuYWk0KPZg8hehqx+jy4q6ZaIv+MH98Ri2rBV75AXHKIlyGTfTrkYYhxXRQsIkY/i +4mYzj7ziGr2U6gj1sfL7r0qBweoakc7pu3KHHEF51yS0lzPrffWh0+RdupOH7QHqv60 qaEH2YYYTx4tnXnu+nRaJM170P1egq4Eq8de6Xs1cykTadsfKR2m866Rm/hX0RtnbX5Q nJXlgN+askMdGh/Jr917iuLxwr8tdT9EmkpSpqL2ke7fyAOmAE+rDrZDBcuwZz3rIDe9 3wbQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 90-v6si27022750pla.466.2018.09.21.00.33.15; Fri, 21 Sep 2018 00:33:32 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2389467AbeIUNUp (ORCPT + 99 others); Fri, 21 Sep 2018 09:20:45 -0400 Received: from mx1.redhat.com ([209.132.183.28]:57384 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2389398AbeIUNUo (ORCPT ); Fri, 21 Sep 2018 09:20:44 -0400 Received: from smtp.corp.redhat.com (int-mx12.intmail.prod.int.phx2.redhat.com [10.5.11.27]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id CAF9D62E83; Fri, 21 Sep 2018 07:33:08 +0000 (UTC) Received: from localhost.localdomain.com (ovpn-12-74.pek2.redhat.com [10.72.12.74]) by smtp.corp.redhat.com (Postfix) with ESMTP id AF8E289AF5; Fri, 21 Sep 2018 07:32:57 +0000 (UTC) From: Lianbo Jiang To: linux-kernel@vger.kernel.org Cc: kexec@lists.infradead.org, tglx@linutronix.de, mingo@redhat.com, hpa@zytor.com, x86@kernel.org, akpm@linux-foundation.org, dan.j.williams@intel.com, thomas.lendacky@amd.com, bhelgaas@google.com, baiyaowei@cmss.chinamobile.com, tiwai@suse.de, bp@suse.de, brijesh.singh@amd.com, dyoung@redhat.com, bhe@redhat.com Subject: [PATCH 3/3 v3] x86/kexec_file: add reserved e820 ranges to kdump kernel e820 table Date: Fri, 21 Sep 2018 15:32:11 +0800 Message-Id: <20180921073211.20097-4-lijiang@redhat.com> In-Reply-To: <20180921073211.20097-1-lijiang@redhat.com> References: <20180921073211.20097-1-lijiang@redhat.com> X-Scanned-By: MIMEDefang 2.84 on 10.5.11.27 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.39]); Fri, 21 Sep 2018 07:33:09 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org E820 reserved ranges is useful in kdump kernel, we have added this in kexec-tools code. One reason is PCI mmconf (extended mode) requires reserved region otherwise it falls back to legacy mode. When AMD SME kdump support, it needs to map dmi table area as unencrypted. For normal boot, these ranges sit in e820 reserved ranges, thus the early ioremap code naturally map them as unencrypted. If we also have same e820 reserve setup in kdump kernel then it will just work like normal kernel. Suggested-by: Dave Young Signed-off-by: Lianbo Jiang --- arch/x86/kernel/crash.c | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/arch/x86/kernel/crash.c b/arch/x86/kernel/crash.c index ae724a6e0a5f..3460be990e0c 100644 --- a/arch/x86/kernel/crash.c +++ b/arch/x86/kernel/crash.c @@ -384,6 +384,11 @@ int crash_setup_memmap_entries(struct kimage *image, struct boot_params *params) walk_iomem_res_desc(IORES_DESC_ACPI_NV_STORAGE, flags, 0, -1, &cmd, memmap_entry_callback); + /* Add all reserved ranges */ + cmd.type = E820_TYPE_RESERVED; + walk_iomem_res_desc(IORES_DESC_NONE, 0, 0, -1, &cmd, + memmap_entry_callback); + /* Add crashk_low_res region */ if (crashk_low_res.end) { ei.addr = crashk_low_res.start; -- 2.17.1