Received: by 2002:a5b:505:0:0:0:0:0 with SMTP id o5csp2121001ybp; Sat, 12 Oct 2019 04:34:58 -0700 (PDT) X-Google-Smtp-Source: APXvYqwfq1BHPSHhgjg0NWgdflIYZHa50nVXVerbSqIevFVkAXzMCNftB48cRum8j151oOkNQnfR X-Received: by 2002:a17:906:4d50:: with SMTP id b16mr18577187ejv.245.1570880098459; Sat, 12 Oct 2019 04:34:58 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1570880098; cv=none; d=google.com; s=arc-20160816; b=XktfWCDZgKzwOITkcGWk+3ikhulvBKnVFOKs/sbhndV9HYcQrdoRryJTo1eO64n8VS FzwD5CUvGOd8SfoeBOdy5FtOeX838QsJ489/awTM/E3SFa5ie/FcoYOFyqQFO//Xs8cb UGuSBCaxMdp0ar49RTGBB7b0aDjcKIKcknXnQ9N9JsBbBUF7we+u3yvtDTWmk5gShpiG okIUbRqpIIB2gCFxtgFZjR8EKA3j7P5JZ+6umRTpEwXIwVKiDvn4S96E1Oe+C2oZ2CiN 2Qnwp9pd0Ru0zN8LDy3x95ObBfvjZC9Jkxf6ZJ9mtkNxqYhhoLYOzrCREFWDWSq6iRpj O1qg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:subject:mime-version:user-agent :message-id:in-reply-to:date:references:cc:to:from; bh=aXmNVr01pz9b5Zsh2NVKEQmN3jU5L1uTs2Brw4Yu5IU=; b=cbDpQA7Yf7NZLaRN6CEHffFYJ98JZz6NDmDO3h+FH5uCbB1rcACCrC4jtBOrP46AQ0 jXQbIJWsWnv921Y/XCC0NJp3ijZouXCQ9YKfbLj6OjBCPlKJO1ZPnmxTLaPU4E4Rzgri s8x7eTMNu6gwfudHLSe4mbRkOBex39hm7zqbakoFh6fbXxRtYsAG4bIuA5TOzeD9BXkp nz4m1gwdUiMvN5uAmCsXXh6LfF1XPcTAm5YmZykI0+I0C5sJYcjNUI2zv3Rir4PMbpte zZWU/Ca4wmhEgJijHqm3DmCJYsIs3ndV/16k/giaobFFQttCCaTwnYjxU7K5tQPtwMoK EaDA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=xmission.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id g90si8596277edd.329.2019.10.12.04.34.35; Sat, 12 Oct 2019 04:34:58 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=xmission.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729158AbfJLL1q (ORCPT + 99 others); Sat, 12 Oct 2019 07:27:46 -0400 Received: from out01.mta.xmission.com ([166.70.13.231]:56811 "EHLO out01.mta.xmission.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727068AbfJLL1q (ORCPT ); Sat, 12 Oct 2019 07:27:46 -0400 Received: from in01.mta.xmission.com ([166.70.13.51]) by out01.mta.xmission.com with esmtps (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.87) (envelope-from ) id 1iJFYb-0004nF-7B; Sat, 12 Oct 2019 05:27:33 -0600 Received: from ip68-227-160-95.om.om.cox.net ([68.227.160.95] helo=x220.xmission.com) by in01.mta.xmission.com with esmtpsa (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.87) (envelope-from ) id 1iJFYa-0002YW-Fa; Sat, 12 Oct 2019 05:27:33 -0600 From: ebiederm@xmission.com (Eric W. Biederman) To: Lianbo Jiang Cc: linux-kernel@vger.kernel.org, tglx@linutronix.de, mingo@redhat.com, bp@alien8.de, hpa@zytor.com, x86@kernel.org, bhe@redhat.com, dyoung@redhat.com, jgross@suse.com, dhowells@redhat.com, Thomas.Lendacky@amd.com, vgoyal@redhat.com, kexec@lists.infradead.org References: <20191012022140.19003-1-lijiang@redhat.com> <20191012022140.19003-4-lijiang@redhat.com> Date: Sat, 12 Oct 2019 06:26:42 -0500 In-Reply-To: <20191012022140.19003-4-lijiang@redhat.com> (Lianbo Jiang's message of "Sat, 12 Oct 2019 10:21:40 +0800") Message-ID: <87d0f22oi5.fsf@x220.int.ebiederm.org> User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/26.1 (gnu/linux) MIME-Version: 1.0 Content-Type: text/plain X-XM-SPF: eid=1iJFYa-0002YW-Fa;;;mid=<87d0f22oi5.fsf@x220.int.ebiederm.org>;;;hst=in01.mta.xmission.com;;;ip=68.227.160.95;;;frm=ebiederm@xmission.com;;;spf=neutral X-XM-AID: U2FsdGVkX1+uhegb7qW+kWraLRHYBavwA95Me10UhX4= X-SA-Exim-Connect-IP: 68.227.160.95 X-SA-Exim-Mail-From: ebiederm@xmission.com X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on sa01.xmission.com X-Spam-Level: ** X-Spam-Status: No, score=2.0 required=8.0 tests=ALL_TRUSTED,BAYES_50, DCC_CHECK_NEGATIVE,T_TM2_M_HEADER_IN_MSG,XMNoVowels,XMSubLong autolearn=disabled version=3.4.2 X-Spam-Report: * -1.0 ALL_TRUSTED Passed through trusted hosts only via SMTP * 0.8 BAYES_50 BODY: Bayes spam probability is 40 to 60% * [score: 0.5000] * 0.7 XMSubLong Long Subject * 1.5 XMNoVowels Alpha-numberic number with no vowels * 0.0 T_TM2_M_HEADER_IN_MSG BODY: No description available. * -0.0 DCC_CHECK_NEGATIVE Not listed in DCC * [sa01 1397; Body=1 Fuz1=1 Fuz2=1] X-Spam-DCC: XMission; sa01 1397; Body=1 Fuz1=1 Fuz2=1 X-Spam-Combo: **;Lianbo Jiang X-Spam-Relay-Country: X-Spam-Timing: total 327 ms - load_scoreonly_sql: 0.03 (0.0%), signal_user_changed: 2.6 (0.8%), b_tie_ro: 1.88 (0.6%), parse: 1.00 (0.3%), extract_message_metadata: 4.4 (1.3%), get_uri_detail_list: 2.2 (0.7%), tests_pri_-1000: 3.2 (1.0%), tests_pri_-950: 1.20 (0.4%), tests_pri_-900: 0.95 (0.3%), tests_pri_-90: 26 (7.8%), check_bayes: 24 (7.4%), b_tokenize: 6 (1.9%), b_tok_get_all: 8 (2.3%), b_comp_prob: 1.86 (0.6%), b_tok_touch_all: 4.1 (1.3%), b_finish: 0.63 (0.2%), tests_pri_0: 274 (83.9%), check_dkim_signature: 0.38 (0.1%), check_dkim_adsp: 2.5 (0.8%), poll_dns_idle: 1.11 (0.3%), tests_pri_10: 1.90 (0.6%), tests_pri_500: 5 (1.6%), rewrite_mail: 0.00 (0.0%) Subject: Re: [PATCH 3/3 v3] x86/kdump: clean up all the code related to the backup region X-Spam-Flag: No X-SA-Exim-Version: 4.2.1 (built Thu, 05 May 2016 13:38:54 -0600) X-SA-Exim-Scanned: Yes (on in01.mta.xmission.com) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Lianbo Jiang writes: > When the crashkernel kernel command line option is specified, the > low 1MiB memory will always be reserved, which makes that the memory > allocated later won't fall into the low 1MiB area, thereby, it's not > necessary to create a backup region and also no need to copy the first > 640k content to a backup region. > > Currently, the code related to the backup region can be safely removed, > so lets clean up. > > Signed-off-by: Lianbo Jiang > --- > diff --git a/arch/x86/kernel/crash.c b/arch/x86/kernel/crash.c > index eb651fbde92a..cc5774fc84c0 100644 > --- a/arch/x86/kernel/crash.c > +++ b/arch/x86/kernel/crash.c > @@ -173,8 +173,6 @@ void native_machine_crash_shutdown(struct pt_regs *regs) > > #ifdef CONFIG_KEXEC_FILE > > -static unsigned long crash_zero_bytes; > - > static int get_nr_ram_ranges_callback(struct resource *res, void *arg) > { > unsigned int *nr_ranges = arg; > @@ -234,9 +232,15 @@ static int prepare_elf64_ram_headers_callback(struct resource *res, void *arg) > { > struct crash_mem *cmem = arg; > > - cmem->ranges[cmem->nr_ranges].start = res->start; > - cmem->ranges[cmem->nr_ranges].end = res->end; > - cmem->nr_ranges++; > + if (res->start >= SZ_1M) { > + cmem->ranges[cmem->nr_ranges].start = res->start; > + cmem->ranges[cmem->nr_ranges].end = res->end; > + cmem->nr_ranges++; > + } else if (res->end > SZ_1M) { > + cmem->ranges[cmem->nr_ranges].start = SZ_1M; > + cmem->ranges[cmem->nr_ranges].end = res->end; > + cmem->nr_ranges++; > + } What is going on with this chunk? I can guess but this needs a clear comment. > > return 0; > } > @@ -356,9 +337,12 @@ int crash_setup_memmap_entries(struct kimage *image, struct boot_params *params) > memset(&cmd, 0, sizeof(struct crash_memmap_data)); > cmd.params = params; > > - /* Add first 640K segment */ > - ei.addr = image->arch.backup_src_start; > - ei.size = image->arch.backup_src_sz; > + /* > + * Add the low memory range[0x1000, SZ_1M], skip > + * the first zero page. > + */ > + ei.addr = PAGE_SIZE; > + ei.size = SZ_1M - PAGE_SIZE; > ei.type = E820_TYPE_RAM; > add_e820_entry(params, &ei); Likewise here. Why do we need a special case? Why the magic with PAGE_SIZE? Is this needed because of your other special case above? When SME is active and the crashkernel command line is enabled do we just want to leave the low 1MB unencrypted? So we don't need any special cases? Eric