Received: by 2002:ac0:aa62:0:0:0:0:0 with SMTP id w31-v6csp1930801ima; Mon, 22 Oct 2018 00:48:31 -0700 (PDT) X-Google-Smtp-Source: ACcGV62xxm5wLRGPS2r3ymS37j68fCRaRxjWOB4Agdp6zrcM3drbtgUShuEzMR2yJswJeFRzpjRn X-Received: by 2002:a62:2f44:: with SMTP id v65-v6mr35627169pfv.235.1540194511468; Mon, 22 Oct 2018 00:48:31 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1540194511; cv=none; d=google.com; s=arc-20160816; b=ChT68H5/92hnXJulzJS6a4oglqBX+scHSwcCDPYj3mHsB0gIHPhiZDMjXsq60ZIa9H JAhugW6fcGJ8MRaCjdIsHAfSXXXb7d9EgHnwZE3cUK8W1C5kq2r4bWYNJNMmgai+EVC4 9pe4bqT44ine16JK+OvVBUT0fFBbwLQUwQXz6E0fv8JLtAq0bB+3FtWMV3G1zTIY5MWn KZs+joIWe/xeRbiqzXEI0iYf5dYLCN6SvVJj970NI1wuLW6F4vxwWkot0bKoaMGbLRge YFtxCZfVvikK84mwtIpL58UcvCD06+rvzQUf5LJI+YmYuvIVBWskbUXVxJP25ayK8Wm7 4MgA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from; bh=Dnle5pQWs94HFIpF2VW4TwKA/wAWi5g+6so9ofa06T8=; b=HZLjsmXzJFnKTTsojH9ZRvyRoP5rnOCdZf4I07GKe0psBHkDa/2Y8MdA2eAcLtLQ0y m7qJYok7Pw5RrGLIbdzuYLm5wX6ixW9OIDbGnSt02kug4ojqvW8FJ+Sl8xDvLM/aeka3 YC0M/h8vEf7Emb87qbz9FUEJ66pdUOPre5HLh8yTF+9/0l0pkznzXHQhEm6fPv4iAtV3 AywtyHr3d0rF/x9d1c/N6DZVpVHQPjm1kvKBaHSUwWTrv1+ktjtUSp4zfrLZNpc4uI4A mKpHMtsis73snKeMFdmTXhW5xFK2IndXMfXz04dd1oFMN9XzqY8RLNWXU5fbQ8onnEID gHzg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id p9-v6si5350390pgn.522.2018.10.22.00.48.16; Mon, 22 Oct 2018 00:48:31 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727742AbeJVQFE (ORCPT + 99 others); Mon, 22 Oct 2018 12:05:04 -0400 Received: from mx1.redhat.com ([209.132.183.28]:41942 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727135AbeJVQFE (ORCPT ); Mon, 22 Oct 2018 12:05:04 -0400 Received: from smtp.corp.redhat.com (int-mx02.intmail.prod.int.phx2.redhat.com [10.5.11.12]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 947AA81DF1; Mon, 22 Oct 2018 07:47:41 +0000 (UTC) Received: from localhost.localdomain.com (ovpn-12-68.pek2.redhat.com [10.72.12.68]) by smtp.corp.redhat.com (Postfix) with ESMTP id 077B96EE20; Mon, 22 Oct 2018 07:47:31 +0000 (UTC) From: Lianbo Jiang To: linux-kernel@vger.kernel.org Cc: kexec@lists.infradead.org, x86@kernel.org, tglx@linutronix.de, mingo@redhat.com, bp@alien8.de, thomas.lendacky@amd.com, dyoung@redhat.com, bhe@redhat.com Subject: [PATCH 2/2 v4] x86/kexec_file: add reserved e820 ranges to kdump kernel e820 table Date: Mon, 22 Oct 2018 15:47:07 +0800 Message-Id: <20181022074707.13901-3-lijiang@redhat.com> In-Reply-To: <20181022074707.13901-1-lijiang@redhat.com> References: <20181022074707.13901-1-lijiang@redhat.com> X-Scanned-By: MIMEDefang 2.79 on 10.5.11.12 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.25]); Mon, 22 Oct 2018 07:47:41 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org E820 reserved ranges is useful in kdump kernel, it has been added in kexec-tools code. One reason is PCI mmconf (extended mode) requires reserved region otherwise it falls back to legacy mode. When AMD SME kdump support, it needs to map dmi table area as decrypted. For normal boot, these ranges sit in e820 reserved ranges, thus the early ioremap code naturally map them as decrypted. If it also has same e820 reserve setup in kdump kernel then it will just work like normal kernel. Suggested-by: Dave Young Signed-off-by: Lianbo Jiang --- arch/x86/kernel/crash.c | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/arch/x86/kernel/crash.c b/arch/x86/kernel/crash.c index ae724a6e0a5f..d3167125800e 100644 --- a/arch/x86/kernel/crash.c +++ b/arch/x86/kernel/crash.c @@ -384,6 +384,10 @@ int crash_setup_memmap_entries(struct kimage *image, struct boot_params *params) walk_iomem_res_desc(IORES_DESC_ACPI_NV_STORAGE, flags, 0, -1, &cmd, memmap_entry_callback); + cmd.type = E820_TYPE_RESERVED; + walk_iomem_res_desc(IORES_DESC_NONE, 0, 0, -1, &cmd, + memmap_entry_callback); + /* Add crashk_low_res region */ if (crashk_low_res.end) { ei.addr = crashk_low_res.start; -- 2.17.1