Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp1860109ybi; Sat, 8 Jun 2019 21:07:06 -0700 (PDT) X-Google-Smtp-Source: APXvYqwqd6+UdNv61TxEQ70XTTId+KXTaRjXPm7S5CSdiFueALWCxD3voa7GZ2C6E2TrxSAgHvKm X-Received: by 2002:a63:6445:: with SMTP id y66mr10184431pgb.23.1560053226063; Sat, 08 Jun 2019 21:07:06 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1560053226; cv=none; d=google.com; s=arc-20160816; b=gXevvhIHKkLdJJOU3mxom4FCnZbm4YE1bJiRHc3G5++EhK5ZcbHjarSlMlINnCVEUJ eEbPQhsKXKPHlni++nz2lqGoFUkfD00qkjPvq3knm8FV+Cv6Bnl3/VavMi/4JCiSZJ1a d5MO5GIHslis1JrKqq+GPin66t0HKEMuWLoQJZxPz2V0uJuvu5rf4s+9KzF+qzRrEi5i CNLFBE+fC1GBAgwedf08zj6nUUVTRSBbI+udXvFVpO5wWgXLUBdF0SC7c+fwFhk/IfSx OpeT5kG99TEwREfzU2YSj5/ewAWwT3wKcORj6nAcOS9+9oX5qQVqhVt3lvgK/5UrH77i 5mDw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject; bh=68B0fgLexHl+8Xk/K2uiDjySDegqYAG1uwB6KmumFzo=; b=WRHroeNsVu2mDF6RCugFMasE+it+ohO6otalY7cPkhq9vgutkX5Fst2FUweeGSTsL6 FAVI22R2VZZwnQ40vmN/DVuwTYvDxdscZkHSeVzNalojDrsUS9PGG+FhNnT/CqWKGOUb j7zw6dhLwyQEht5SEFOgQ1KTNejGQo3OTytEYxEBrCd9ckCiN7JHB0bJCYCw5sGtTijr W3LjQKUwjcEsdNQX+6FxwMXmkH1K2tZZSjGqseiMFuS4THndYRiYzNY6GRAhD9e0gvSE 8OujfXySMYZ+kFg1orcpRxkBep4LQyywB7P4eCUuBTV+XrcSIyVlJMiTxPZGb8s7JFyk CB5Q== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id p11si6089964plk.67.2019.06.08.21.06.36; Sat, 08 Jun 2019 21:07:06 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1725819AbfFIEDG (ORCPT + 99 others); Sun, 9 Jun 2019 00:03:06 -0400 Received: from mx1.redhat.com ([209.132.183.28]:54128 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725385AbfFIEDG (ORCPT ); Sun, 9 Jun 2019 00:03:06 -0400 Received: from smtp.corp.redhat.com (int-mx01.intmail.prod.int.phx2.redhat.com [10.5.11.11]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id D82317FDEE; Sun, 9 Jun 2019 04:03:05 +0000 (UTC) Received: from localhost.localdomain (ovpn-12-49.pek2.redhat.com [10.72.12.49]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 1507F601A6; Sun, 9 Jun 2019 04:02:52 +0000 (UTC) Subject: Re: [PATCH 0/3 v11] add reserved e820 ranges to the kdump kernel e820 table To: Borislav Petkov Cc: linux-kernel@vger.kernel.org, kexec@lists.infradead.org, tglx@linutronix.de, mingo@redhat.com, akpm@linux-foundation.org, dave.hansen@linux.intel.com, luto@kernel.org, peterz@infradead.org, x86@kernel.org, hpa@zytor.com, dyoung@redhat.com, bhe@redhat.com, Thomas.Lendacky@amd.com References: <20190423013007.17838-1-lijiang@redhat.com> <12847a03-3226-0b29-97b5-04d404410147@redhat.com> <20190607174211.GN20269@zn.tnic> From: lijiang Message-ID: <843cf2d9-8b52-75de-0e76-7ae216bc8e64@redhat.com> Date: Sun, 9 Jun 2019 12:02:49 +0800 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.9.1 MIME-Version: 1.0 In-Reply-To: <20190607174211.GN20269@zn.tnic> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 8bit X-Scanned-By: MIMEDefang 2.79 on 10.5.11.11 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.27]); Sun, 09 Jun 2019 04:03:06 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 在 2019年06月08日 01:42, Borislav Petkov 写道: > On Tue, May 28, 2019 at 03:30:21PM +0800, lijiang wrote: >> Hi, Boris and Thomas >> >> Could you give me any suggestions about this patch series? Other reviewers? > > So I'm testing this on a box with SME enabled but after loading the > crash kernel, it freezes instead of rebooting. My cmdline is: > > kexec -s -p /boot/vmlinuz-5.2.0-rc3+ --initrd=/boot/initrd.img-5.2.0-rc3+ --command-line="maxcpus=1 root=/dev/sda5 ro debug ignore_loglevel log_buf_len=16M no_console_suspend net.ifnames=0 systemd.log_target=null mem_encrypt=on kvm_amd.sev=1 nr_cpus=1 irqpoll reset_devices vga=normal LANG=en_US.UTF-8 earlyprintk=serial cgroup_disable=memory mce=off numa=off udev.children-max=2 panic=10 rootflags=nofail acpi_no_memhotplug transparent_hugepage=never disable_cpu_apicid=0" > > and the reserved range is: > > [ 0.000000] Reserving 256MB of memory at 3392MB for crashkernel (System RAM: 16271MB) > > I'm wondering if it is related to > > https://lkml.kernel.org/r/20190604134952.GC26891@MiWiFi-R3L-srv > Yes. It should be a SME issue. Thanks. Lianbo > Thx. >