Received: by 2002:ab2:6d45:0:b0:1fb:d597:ff75 with SMTP id d5csp20875lqr; Tue, 4 Jun 2024 19:10:17 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCXncBB/FeZIwhvklwLfQiXLdFkhWID/7/oboKvgpWPRCdOuF8dyyDn+0ow+2bs2NTMWy125wjnQCkTjwRbm39apX1+QRYlI4MNQ20wt4g== X-Google-Smtp-Source: AGHT+IGs+hBW2nqbIE9MGhvgkNQoeaRhBWMlUWWj1wmzT4VNbBeVPJQyQRe0CR7TJqy5QSgoHbJj X-Received: by 2002:a05:6870:164a:b0:250:7dba:9507 with SMTP id 586e51a60fabf-251228e55ccmr1449046fac.36.1717553417124; Tue, 04 Jun 2024 19:10:17 -0700 (PDT) Return-Path: Received: from sy.mirrors.kernel.org (sy.mirrors.kernel.org. [147.75.48.161]) by mx.google.com with ESMTPS id d2e1a72fcca58-70242e6746esi8898848b3a.404.2024.06.04.19.10.16 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 04 Jun 2024 19:10:17 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-201667-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.48.161 as permitted sender) client-ip=147.75.48.161; Authentication-Results: mx.google.com; dkim=pass header.i=@amd.com header.s=selector1 header.b=wpUDorH1; arc=fail (signature failed); spf=pass (google.com: domain of linux-kernel+bounces-201667-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.48.161 as permitted sender) smtp.mailfrom="linux-kernel+bounces-201667-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=amd.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sy.mirrors.kernel.org (Postfix) with ESMTPS id CA1C8B260BD for ; Wed, 5 Jun 2024 02:09:12 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 20C245FDA5; Wed, 5 Jun 2024 02:09:07 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=amd.com header.i=@amd.com header.b="wpUDorH1" Received: from NAM10-BN7-obe.outbound.protection.outlook.com (mail-bn7nam10on2083.outbound.protection.outlook.com [40.107.92.83]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 56F572E62C for ; Wed, 5 Jun 2024 02:09:04 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=fail smtp.client-ip=40.107.92.83 ARC-Seal:i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1717553345; cv=fail; b=fpXWx/HlXopi51Dk6SXP/NOwn2RhTST9eUHHEcUCyJ5nQTXmTltIrVNxVuH467fpU0RGWFPijy2DDi1hYKqatd9LGDbe5JdiOdO0u+WKIiUrrWdQ71SsFmT8sOm0LU5LTvdtuefyw8992MdaVWBpWR4+bETjqu3r+KAM8Cz7KNY= ARC-Message-Signature:i=2; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1717553345; c=relaxed/simple; bh=L4BpQRpk5J4UX+ROCdzyvX2UsLxweofD+JJ7h1bICts=; h=Message-ID:Date:Subject:To:Cc:References:From:In-Reply-To: Content-Type:MIME-Version; b=XS1XBLxMPpQNjZOP1n2wq/VIQjnIidbrXgL4DGTayTj6jXZIxIBuliqFhknwg1KUGRtP9vIweYckP00TzOT4iyFljIcHc1E66mdzqo4NhQW0uGtVqDffIe55lSRiuw008HuOLtC48lXSY4YBKrc3hHKcMeMIFIEQgAdrhP73qVY= ARC-Authentication-Results:i=2; smtp.subspace.kernel.org; dmarc=pass (p=quarantine dis=none) header.from=amd.com; spf=fail smtp.mailfrom=amd.com; dkim=pass (1024-bit key) header.d=amd.com header.i=@amd.com header.b=wpUDorH1; arc=fail smtp.client-ip=40.107.92.83 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=quarantine dis=none) header.from=amd.com Authentication-Results: smtp.subspace.kernel.org; spf=fail smtp.mailfrom=amd.com ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=ZZv/vMkN51k4/Pi7fe/HRK8cH6Mvtfz7igaUYx4HluKKjjSwRAgIFaVxsOBBgGAyzSVZZKZxiyljC4vAjVWDM4U0NvHZSeUZ3ObrJvlAOUCTI1fNpLgi/bdl76IuNdNn9Hv1KFrZV1E+gVjrbkC9ZXimOmeDe9EEdv8dZiw69qDprGU+22WVfVl1cd6sV0BoA03THkgwk8kA0NHn+Z+D430yYOk+flNnUfZWtayR6LV7BPHEu5tnVWWe9zL9DtoWbFOL8rZasVHzX5fQxFumCCoGqTcKl7UJEgoDo6Hrz/IHc/zvWSFgOz6DIHN2B3cCF3vg7pE+kcadMg+gpVGlDQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=ob9gAOuutnCeYllyKUeCK/29WaTblNIF41MU75wv5fQ=; b=a+tXMnahhFaOslSzBmW9SStdRJl1WG32VWpJBXai1IS59YhNf6c5OX4R33eNVR+A+0YVD0aruL4SMPDglk5XkL6bPSGQAW/coueWqYjfqAilVubQ7treAHctJjCoVp/kcD2d/qKrHPTihI65sbWylAmM+4sYaZAvAvADqvhowc9xHIfWkJDRUbDRlqnb2FDk5MZWhz3OMewC3GjtL7apmevw6ZXTsiHeaspIsbVm/VTywaijbHmw2Q8D+uZRy1wgse/Ucz6pqutie2CSLDUhwczZy1ZoQuihoCm9dqoUOGpYI+RGT4qu24btRzoR4CxAX0hcAusnryS0oo5G91Sk7w== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=amd.com; dmarc=pass action=none header.from=amd.com; dkim=pass header.d=amd.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amd.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=ob9gAOuutnCeYllyKUeCK/29WaTblNIF41MU75wv5fQ=; b=wpUDorH1g1Z0rnKgCx1tRrr+KExxyJ2P8A757BVOMVBlbhYldya/4mgU5pOKq945ct1n9IooR3rcsxb1dwvvtTYnkN+M3ifzAn9BYgkPl/S8hupCLeOzZ66krFGadbcXlLmJVj/GRgS5ZjtnnU4KW/C3i+Z02ypuSNTdyXmjCcc= Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=amd.com; Received: from SN6PR12MB2767.namprd12.prod.outlook.com (2603:10b6:805:75::23) by DS7PR12MB6094.namprd12.prod.outlook.com (2603:10b6:8:9d::14) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7633.27; Wed, 5 Jun 2024 02:09:00 +0000 Received: from SN6PR12MB2767.namprd12.prod.outlook.com ([fe80::e441:89a7:4dd:dce7]) by SN6PR12MB2767.namprd12.prod.outlook.com ([fe80::e441:89a7:4dd:dce7%5]) with mapi id 15.20.7633.021; Wed, 5 Jun 2024 02:08:59 +0000 Message-ID: <41e085b8-2b45-40ab-9a6f-f4ad975a0b06@amd.com> Date: Tue, 4 Jun 2024 21:08:55 -0500 User-Agent: Mozilla Thunderbird Subject: Re: [PATCH v7 1/3] efi/x86: Fix EFI memory map corruption with kexec Content-Language: en-US To: Dave Young Cc: Borislav Petkov , Mike Rapoport , tglx@linutronix.de, mingo@redhat.com, dave.hansen@linux.intel.com, x86@kernel.org, rafael@kernel.org, hpa@zytor.com, peterz@infradead.org, adrian.hunter@intel.com, sathyanarayanan.kuppuswamy@linux.intel.com, jun.nakajima@intel.com, rick.p.edgecombe@intel.com, thomas.lendacky@amd.com, michael.roth@amd.com, seanjc@google.com, kai.huang@intel.com, bhe@redhat.com, kirill.shutemov@linux.intel.com, bdas@redhat.com, vkuznets@redhat.com, dionnaglaze@google.com, anisinha@redhat.com, jroedel@suse.de, ardb@kernel.org, kexec@lists.infradead.org, linux-coco@lists.linux.dev, linux-kernel@vger.kernel.org, dan.j.williams@intel.com References: <20240603085654.GBZl2FVjPd-gagt-UA@fat_crate.local> <8e3dfc15-f609-4839-85c7-1cc8cefd7acc@amd.com> <1ef36309-8d7f-447b-a54a-3cdafeccca64@amd.com> <20240603144639.GCZl3XTwmFHwi-KUZW@fat_crate.local> <7eb4ca99-679c-4f23-9562-a39b966c28a0@amd.com> <20240603165747.GGZl32C9yrmXJ4nhPT@fat_crate.local> <2343889c-887a-49ce-86df-343737d70d37@amd.com> <20240603171231.GJZl35f-BHvU2Pk3lb@fat_crate.local> From: "Kalra, Ashish" In-Reply-To: Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit X-ClientProxiedBy: DM6PR06CA0038.namprd06.prod.outlook.com (2603:10b6:5:54::15) To SN6PR12MB2767.namprd12.prod.outlook.com (2603:10b6:805:75::23) Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: SN6PR12MB2767:EE_|DS7PR12MB6094:EE_ X-MS-Office365-Filtering-Correlation-Id: f0e04e19-f1ea-411b-9f72-08dc850476ae X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230031|366007|1800799015|376005|7416005; X-Microsoft-Antispam-Message-Info: =?utf-8?B?ZHRiU0hhZnpSblBLU3ZtQTdIaXV2UWNQckxIR0NGc3pEQ1VyVkVpamw2NEdJ?= =?utf-8?B?UDRxbXZlM1p1cSswdm5HcjJqOU5ZeG9ZWXhYYXRaNG5DVFJmN2M4VEcwaWFG?= =?utf-8?B?b28zUFp2OXhHQ3ZiS2N1SGVDcHBsZFZPMno2ZGRyc1lKVDR5VnZBaXJKZDV6?= =?utf-8?B?VHArYmVCNWFVbnhDbUU5Z1phcEpRYnROazRGYm5jRlN0OUJMOC9uMXZ6ak5P?= =?utf-8?B?NWdNVVd6a1NGU1JLMmIzTjBEQjlBNWZHWENrazFTWXVnblhObU5LWGpLb2sw?= =?utf-8?B?VXB4Z0RGNXZtMVlhY1JXOEd1ODNxak9Xc1JETEFGQUJkUUUyQUhzN3ROYkhI?= =?utf-8?B?dHNkSytkUEVkMXkxNGE3YjZmVmM2OFc5K2FtQTNBbWRjWW1rR2RHMWdldUsy?= =?utf-8?B?VWJRTUdPa0VBcmd0VXc0TFpOd1V5K2FmMGNpSHBMZWZPd3Jya1l1YUpxeHlZ?= =?utf-8?B?VW5OQjZobXo1MW96WS80Vis5clVaTDVQbWlVbHJCY09PcXBNbG90NTk1aGFi?= =?utf-8?B?VEpjdDhkOFNCUlRoSjJWQ1dYUDdHdjkwdFNING9ma2pLcDdlR254andkMzMw?= =?utf-8?B?STZiM0RwMHRZSEM5VzdGUGJqYzJadkJUWmtmN1ZnUUZCRldDbWQvV0VVR3NZ?= =?utf-8?B?Szd0eUtiRVl1Tk9La3RvY3pIQ1NQU1lwQks3cEdHdG9iUkFXN3lIU3VFS3lW?= =?utf-8?B?djlHWVpRYWEyZytoNmN0YjVmY2JBRE1NbXlSeDgwZjBWYjVMY3VFeE1ITS93?= =?utf-8?B?djR6OXo0ZUZXTWNVaitWK3ZRNXdsdGNvZnJMYUJVUXVYQ3NxblF6R2JVSmNZ?= =?utf-8?B?OUpiemxXUE42cmFPczA4djhUU2xmZGpNQStITHNLSjdUUjlLTzkxbXd6ZlF5?= =?utf-8?B?K0s3ZlJWY3hBcUdFZFFLUTBoYUFFdkpHekh4YWRseWlWd3pxalRaVXpGNmtO?= =?utf-8?B?dG0xbk80ODNWTGVjSk5wd3JucFN6dlI0R1lUVUFUZXV1U0M3U1hyUXRjKytn?= =?utf-8?B?OE01bEExUFpqc1piUGFRalljdGN4M2xZOVlMczJQVURYKzBXdnlSaEVReVhp?= =?utf-8?B?a2ZZZkRDTTNkSGRvcEY5UVJuMFdOQnVTNmV3RG0xQUUwMHdKd01JSVJ6TnVt?= =?utf-8?B?aTJ1MkxVejFINkRWdm45aXhob1crNWgzbzVaMWFJS2ZXSHBuTnZuMmxHL0xz?= =?utf-8?B?WkhwOU9FQTV4UGFHeElEczFzZWFER3I4QnBQdnQzOGVNNk9zY3ZrdzliaWU4?= =?utf-8?B?TUVNejdqSXdvUm5ORjAzOEZyMkN2aVdOUnZ0UmdTTm82NzNSWE9CeGdFcmVm?= =?utf-8?B?YlA4VWVCZ3hNSkZQOHdOK1E5T2Z3V2xHVjRmWHJ4OWo0TkgxbFpSNTdycTk2?= =?utf-8?B?YnpFVnBsdDFiVGRzaVMrcXRYaDBzSXlhYitqc0srOTVvOFJZWnU3dEpzK3Rm?= =?utf-8?B?Z1hLMlVCTzNLZ1RqR2xydmdyK2VyNG1Xb2p2MFZJODFtYVIvZHo0ZWFTTlFy?= =?utf-8?B?TGFING9SK0xQRmZDMnpaWnNoVGJ0dTh5b053NUZIWk1qYWVMVWdBUGZGTzlt?= =?utf-8?B?Q1QrWnpIc0VENDZocUNiVEZhWkhhZTVkY0hDV25nalJiSUF6Q3pFd3had1NF?= =?utf-8?B?Y0lXaE16TUljeXZsWTN0RFJPYmZ1b1dIcWtDRTE4cXg5MS9kaCtRcTA2bWVo?= =?utf-8?B?US9QeGw0MmdocmVRdmZDUkhvUHRwK0tHTG0yZkw2Q2ZET2lRS0FUNU1RPT0=?= X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:SN6PR12MB2767.namprd12.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230031)(366007)(1800799015)(376005)(7416005);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?dE8zUS9VZlVkL0V6ZGdOd3RPcGVOZUFaK2x6a3F5Zkk4V3NqT2pXV1NxeEJi?= =?utf-8?B?akwyaTU3N0ZwbUNxQzY4eWdSb0MxRlhUcklINUxEYXovelBzZGpkaXVFaFMv?= =?utf-8?B?amlJM1pPMXFXT2hzaXdJK1pNZ3o0akhvc0dFZU9ub3FDTmlacGdHWFBGWnV2?= =?utf-8?B?ejhCZ1FDZXo2aytSb3ZJOVB2cGdpc0RwaVp1ejlwVjQwakRmYXEyOFp3WUNP?= =?utf-8?B?elRPd0RLb2lOamNtNjdoLzQrOGlBR2ZNTFZEWE9DRGczbXRGaUVIUU5HQ1ZP?= =?utf-8?B?b3ZHQjEybFlqcXlIYndsV2JUWGJyVDN1UE04K296TFFLMVUvbmFQbzN4Y1Ez?= =?utf-8?B?Zk1uMkIycTM3WkxQQmJOdlQyR1g4Uk5rKyt0bC9oLzZsT2VrQ1B2MmpvVUhT?= =?utf-8?B?dHoxb0J2WUovV0hZelpScHM5Uzk0WVVDWEJ2ZWg1RExvR2daOGhjQ3F6MFhK?= =?utf-8?B?V0Y1VjN2VFFMOVcreFovYm9qRVVYRlRzMVdEOHh1NlVkK1BOYVhiZEp5azNL?= =?utf-8?B?NVAxMXZrZG9vTXBLeWtaNmpXRFlVZzdhWHhlWXZObUdZcnpvYkREWFZmZnRv?= =?utf-8?B?c0xadVAwVTFzMy9veGFUZkk2ZEZ3WUFKdXJuWVN1UU9wbW9aNE0xOTJmajBz?= =?utf-8?B?TnlwcVppMTNwdlllOU4rS3FDa3ZOOHc0QlBMOUIwUnoyVnFHNlV3Q3JZYWcy?= =?utf-8?B?ZkF2aSsrcU4rc0lrVHV0UGtnV3Q3eDBFUGZvQ2VLZVBObDViRjE0a2tlWnJS?= =?utf-8?B?KythTkRVejh5bzcxSmxRUEhaa0R3WWo3UE9URWNIVFRYYjUxTmFIcExicTAz?= =?utf-8?B?RVZIRjlFempxeXU2M2IwTGVtS0tPeDhhcnNRblFpdDNDelRjR3RPd3ExeUFX?= =?utf-8?B?MzRCV01QMkhrWkNhWndlMDZ4S1NPRU5HVXZhN0ZkaktLcGVOZ0Z0MWdaakh6?= =?utf-8?B?UElxUG9iT1BaTUhJMWE3R3dhbzcyMHNBckNnZGFHTjByOHhMM1dIODUzSVZC?= =?utf-8?B?YzQzYXRIcXFoWGdVMHRPTzRtekh6SGxzck1YV3IxNWFtWStsVFJUL3ppdGZD?= =?utf-8?B?RnRsalBWd05uM3MyUHpuVkNyTWVFcFYrZ0pqSkFha1diVFMxRklISFNkUUJl?= =?utf-8?B?UEt0dkNBZlR3K3hQTlByZWNFQllXOGxZMnE3NjdxUmQwNkF2QjNxQTU2R1Q1?= =?utf-8?B?L2RNazlFWVp2SERJNk5NcnZNQTczRzFYMFRGV2g2a3lhdGxZaHhSOXRmT2la?= =?utf-8?B?Mm5kWmNjQ0dYZEE4ait2QUZFWWZrTlJqc3VzbnhxRHh1RmVSbU9YalNrSG5K?= =?utf-8?B?QnViUEUzdWk2TUM0ajluZUgybTZkdlkwRGlGSmRjZmM3eFFtSFd6SU45VHBO?= =?utf-8?B?R1NNVmRYZzZZd0VLUE9wdElXV2NNREpCRERkMVF5YW16YmthbmEzTFdKVmE5?= =?utf-8?B?NE90ZitLK1cvMUJLeGpudU9nd2hxa3pBeUoyNGVVNlFZYytZbS9RdkJoVkFv?= =?utf-8?B?aVhDcDdjVGMxanF1blVUR0laZnM0V05tM0FzeFRzSTJ5SWlhUXhRL3hENmZZ?= =?utf-8?B?WjRRSTRtKzNmOE5sM3RUMTZ4SmhtRXE1UW5kdG1lSlZCUlVRQ3JDMkpPWUo4?= =?utf-8?B?NjlCRDFyYllJaVRVSkhNUEhMci9tYUpOaXg2ZEdkay9yd0UxazNKTWJMKzdv?= =?utf-8?B?NUdGb21ieEhrM0F4bE04VDNpTDZOdzgwR1hLbmkrSVdVSGEvQjhKZ3IwZlll?= =?utf-8?B?elFlc3F3b3diSUU5SS9sL0IvYi9NVjN6akFWZWVXelpaVEhVcEdPa0psdk1m?= =?utf-8?B?REFta2YrS25GNDFwUjJtMW5vb3gvTE5NWitnSFFmOXh1bFdIV0lxQi8yc2kz?= =?utf-8?B?VzlXYjlsWWVZcVZhRTZpVWF5L2NDNnROa2FNbG1iaWM1eDdCQmlaZiszVEdX?= =?utf-8?B?N0hndW9rVFpxQ05Fd3FoODhkK2dEa1g5ZmNhUnVRdnlRZWpDc2QrNTZjWVUx?= =?utf-8?B?THRicnBJZ0IrNkNGQ2RDMGVEV3RCQVM4REswMmJCSVpiWWI5NUtTbnh2eHJU?= =?utf-8?B?RGJJckR4WUV2dmVOQ0VLZ0ZERytxdEIyTlFFQld1dE55emZDVWVpdjB5S0Rx?= =?utf-8?Q?TWlr8ZqMxhjnoP6oL5QMxau7Z?= X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-Network-Message-Id: f0e04e19-f1ea-411b-9f72-08dc850476ae X-MS-Exchange-CrossTenant-AuthSource: SN6PR12MB2767.namprd12.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 05 Jun 2024 02:08:59.8498 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: 5/eTeHp7VKLINsGHDqA86D/ukOnRE6Hn0fUtRRsjUyaGM7z6RJzOJTeB7i52Lzc0n8Tv1vEScnzpVz+Ay2UDtw== X-MS-Exchange-Transport-CrossTenantHeadersStamped: DS7PR12MB6094 Hello Dave, On 6/4/2024 8:58 PM, Dave Young wrote: > On Wed, 5 Jun 2024 at 09:52, Dave Young wrote: >>>> ... >>>> if (efi.memmap.flags & (EFI_MEMMAP_MEMBLOCK | EFI_MEMMAP_SLAB)) { >>>> __efi_memmap_free(efi.memmap.phys_map, >>>> efi.memmap.desc_size * efi.memmap.nr_map, efi.memmap.flags); >>>> } >>> From your debugging the memmap should not be freed. This piece of >>> code was added in below commit, added Dan Williams in cc list: >>> commit f0ef6523475f18ccd213e22ee593dfd131a2c5ea >>> Author: Dan Williams >>> Date: Mon Jan 13 18:22:44 2020 +0100 >>> >>> efi: Fix efi_memmap_alloc() leaks >>> >>> With efi_fake_memmap() and efi_arch_mem_reserve() the efi table may be >>> updated and replaced multiple times. When that happens a previous >>> dynamically allocated efi memory map can be garbage collected. Use the >>> new EFI_MEMMAP_{SLAB,MEMBLOCK} flags to detect when a dynamically >>> allocated memory map is being replaced. >>> >> Dan, probably those regions should be freed only for "fake" memmap? > Ashish, can you comment out the __efi_memmap_free see if it works for > you just confirm about the behavior. Yes, i have already tried and tested that, if i avoid __efi_memmap_free(), then i don't see this memory map corruption. Thanks, Ashish