14b/0x23b
[8.815793] __memblock_free_late: [0x0001-0x00013fff]
efi_free_boot_services+0x14b/0x23b
To fix the above issues, let's hold the whole low-1M memory regions
unconditionally in the efi_free_boot_services().
Signed-off-by: Lianbo Jiang
---
Background(copy from bhe'
specified.
Signed-off-by: Lianbo Jiang
---
arch/x86/platform/efi/quirks.c | 14 ++
1 file changed, 14 insertions(+)
diff --git a/arch/x86/platform/efi/quirks.c b/arch/x86/platform/efi/quirks.c
index 67d93a243c35..637f932c4fd4 100644
--- a/arch/x86/platform/efi/quirks.c
+++ b/arch/x86/pla
Since crash utility has moved to github, the original URL is no longer
available. Let's update it accordingly.
Suggested-by: Dave Young
Signed-off-by: Lianbo Jiang
---
Documentation/admin-guide/kdump/kdump.rst | 7 +--
1 file changed, 5 insertions(+), 2 deletions(-)
diff --git
information.
Signed-off-by: Lianbo Jiang
---
kernel/kexec_file.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/kernel/kexec_file.c b/kernel/kexec_file.c
index 41616b6a80ad..e2c03b4ce31b 100644
--- a/kernel/kexec_file.c
+++ b/kernel/kexec_file.c
@@ -1323,10 +1323,10 @@ int
Let's carefully handle the boundary of the function parameter to make
sure that the arguments passed doesn't exceed the address range.
Signed-off-by: Lianbo Jiang
---
arch/x86/kernel/crash.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/arch/x86/kernel/crash.c b/arch/x86
extend the crash_exclude_mem_range()
to handle the overlapping ranges.
Signed-off-by: Lianbo Jiang
---
kernel/kexec_file.c | 31 +--
1 file changed, 21 insertions(+), 10 deletions(-)
diff --git a/kernel/kexec_file.c b/kernel/kexec_file.c
index 09cc78df53c6..41616b6a80ad 100644
--- a/
[3] [PATCH 3/3] kexec_file: correctly output debugging information for
the PT_LOAD elf header
Lianbo Jiang (3):
x86/crash: Correct the address boundary of function parameters
kexec: Improve the crash_exclude_mem_range() to handle the overlapping
ranges
kexec_file: correctly output
verification
is mandated. Otherwise, we lift the bar for any kernel image.
Signed-off-by: Lianbo Jiang
---
Changes since v1:
[1] Modify the log level(suggested by Jiri Bohac)
kernel/kexec_file.c | 34 ++
1 file changed, 6 insertions(+), 28 deletions(-)
diff --git
verification
is mandated. Otherwise, we lift the bar for any kernel image.
Signed-off-by: Lianbo Jiang
---
kernel/kexec_file.c | 37 ++---
1 file changed, 6 insertions(+), 31 deletions(-)
diff --git a/kernel/kexec_file.c b/kernel/kexec_file.c
index faa74d5f6941
ing the string.
So, let's fix this corner and make sure that the string "reserved" and
"Reserved" in the "/proc/iomem" are both parsed appropriately.
Signed-off-by: Lianbo Jiang
---
Note:
Please follow up this commit below about kdump fix.
1ac3e4a57000 ("kdump: fi
ing the string.
So, let's fix this corner and make sure that the string "reserved" and
"Reserved" in the "/proc/iomem" are both parsed appropriately.
Signed-off-by: Lianbo Jiang
---
Note:
Please follow up this commit below about kdump fix.
1ac3e4a57000 ("kdump: fix an
ystem call")
Reported-by: kbuild test robot
Signed-off-by: Lianbo Jiang
Link: https://lkml.kernel.org/r/201910310233.ejrttmwp%25...@intel.com
---
arch/x86/include/asm/crash.h | 2 ++
1 file changed, 2 insertions(+)
diff --git a/arch/x86/include/asm/crash.h b/arch/x86/include/asm/cra
region.
Currently, the code related to the backup region can be safely
removed, so lets clean up.
Signed-off-by: Lianbo Jiang
---
arch/x86/include/asm/kexec.h | 10
arch/x86/include/asm/purgatory.h | 10
arch/x86/kernel/crash.c| 87 --
arch
t need to be
included in crash dumps or used for anything except the processor
trampolines that must live in the low 1M.
Signed-off-by: Lianbo Jiang
---
arch/x86/include/asm/crash.h | 6 ++
arch/x86/kernel/crash.c | 15 +++
arch/x86/realmode/init.c | 2 ++
3 files chang
().
[2] Fix some warnings reported by kduild.
Changes since v8:
[1] Fix some build warnings reported by kbuild and make it as a separate
patch.
Lianbo Jiang (3):
x86/kdump: always reserve the low 1M when the crashkernel option is
specified
x86/kdump: clean up all the code related
region.
Currently, the code related to the backup region can be safely
removed, so lets clean up.
Signed-off-by: Lianbo Jiang
---
arch/x86/include/asm/kexec.h | 10
arch/x86/include/asm/purgatory.h | 10
arch/x86/kernel/crash.c| 87 --
arch
t need to be
included in crash dumps or used for anything except the processor
trampolines that must live in the low 1M.
Signed-off-by: Lianbo Jiang
Reported-by: kbuild test robot
---
arch/x86/include/asm/crash.h | 8
arch/x86/kernel/crash.c | 15 +++
arch/x86/realmode/
to arch/x86/include/asm/crash.h
(Suggested by Dave Young)
[2] Adjust the corresponding header files.
Changes since v7:
[1] Change the function name from kexec_reserve_low_1MiB() to
crash_reserve_low_1M().
[2] Fix some warnings reported by kduild.
Lianbo Jiang (2):
x86/kdump: always
region.
Currently, the code related to the backup region can be safely
removed, so lets clean up.
Signed-off-by: Lianbo Jiang
---
arch/x86/include/asm/kexec.h | 10
arch/x86/include/asm/purgatory.h | 10
arch/x86/kernel/crash.c| 87 --
arch
to arch/x86/include/asm/crash.h
(Suggested by Dave Young)
[2] Adjust the corresponding header files.
Changes since v7:
[1] Change the function name from kexec_reserve_low_1MiB() to
crash_reserve_low_1M().
Lianbo Jiang (2):
x86/kdump: always reserve the low 1M when the crashkernel option
t need to be
included in crash dumps or used for anything except the processor
trampolines that must live in the low 1M.
Signed-off-by: Lianbo Jiang
---
arch/x86/include/asm/crash.h | 6 ++
arch/x86/kernel/crash.c | 15 +++
arch/x86/realmode/init.c | 2 ++
3 files chang
to a backup region.
Currently, the code related to the backup region can be safely removed,
so lets clean up.
Signed-off-by: Lianbo Jiang
---
arch/x86/include/asm/kexec.h | 10
arch/x86/include/asm/purgatory.h | 10
arch/x86/kernel/crash.c| 87
t need to be
included in crash dumps or used for anything except the processor
trampolines that must live in the low 1MiB.
Signed-off-by: Lianbo Jiang
---
arch/x86/include/asm/crash.h | 6 ++
arch/x86/kernel/crash.c | 15 +++
arch/x86/realmode/init.c | 2 ++
3 files chang
declaration function to arch/x86/include/asm/crash.h
(Suggested by Dave Young)
[2] Adjust the corresponding header files.
Lianbo Jiang (2):
x86/kdump: always reserve the low 1MiB when the crashkernel option is
specified
x86/kdump: clean up all the code related to the backup region
arch/x86
the kexec_reserve_low_1MiB() in arch/x86/kernel/
machine_kexec_64.c so that it does not cause the compile error
on non-x86 kernel, and also ensures that it can work well on x86
kernel.
Lianbo Jiang (2):
x86/kdump: always reserve the low 1MiB when the crashkernel option is
specified
x86
t need to be
included in crash dumps or used for anything except the processor
trampolines that must live in the low 1MiB.
Signed-off-by: Lianbo Jiang
---
BTW:I also tried to fix the above problem in purgatory(), but there
are too many restricts in purgatory() context, for example: i can't
alloca
to a backup region.
Currently, the code related to the backup region can be safely removed,
so lets clean up.
Signed-off-by: Lianbo Jiang
---
arch/x86/include/asm/kexec.h | 10
arch/x86/include/asm/purgatory.h | 10
arch/x86/kernel/crash.c| 87
to a backup region.
Currently, the code related to the backup region can be safely removed,
so lets clean up.
Signed-off-by: Lianbo Jiang
---
arch/x86/include/asm/kexec.h | 10
arch/x86/include/asm/purgatory.h | 10
arch/x86/kernel/crash.c| 87
t need to be
included in crash dumps or used for anything except the processor
trampolines that must live in the low 1MiB.
Signed-off-by: Lianbo Jiang
---
BTW:I also tried to fix the above problem in purgatory(), but there
are too many restricts in purgatory() context, for example: i can't
alloca
and which is called by reserve_real_mode(). (Suggested by Boris)
Lianbo Jiang (2):
x86/kdump: always reserve the low 1MiB when the crashkernel option is
specified
x86/kdump: clean up all the code related to the backup region
arch/x86/include/asm/kexec.h | 10
arch/x86/include
egion in purgatory(). This indicates that
it does not need to be included in crash dumps or used for anything
execept the processor trampolines that must live in the low 1MiB.
In addition, also need to clean all the code related to the backup
region later.
Signed-off-by: Lianbo Jiang
---
arch/x86
to a backup region.
Currently, the code related to the backup region can be safely removed,
so lets clean up.
Signed-off-by: Lianbo Jiang
---
arch/x86/include/asm/kexec.h | 10
arch/x86/include/asm/purgatory.h | 10
arch/x86/kernel/crash.c| 87
Lianbo Jiang (3):
x86/kdump: always reserve the low 1MiB when the crashkernel option is
specified
x86/kdump: remove the unused crash_copy_backup_region()
x86/kdump: clean up all the code related to the backup region
arch/x86/include/asm/crash.h | 1 -
arch/x86/include/asm/kexec.h
The crash_copy_backup_region() has never been used, so clean
up the redundant code.
Signed-off-by: Lianbo Jiang
---
arch/x86/include/asm/crash.h | 1 -
1 file changed, 1 deletion(-)
diff --git a/arch/x86/include/asm/crash.h b/arch/x86/include/asm/crash.h
index 0acf5ee45a21..089b2850f9d1 100644
The crash_copy_backup_region() has never been used, so clean
up the redundant code.
Signed-off-by: Lianbo Jiang
---
arch/x86/include/asm/crash.h | 1 -
1 file changed, 1 deletion(-)
diff --git a/arch/x86/include/asm/crash.h b/arch/x86/include/asm/crash.h
index 0acf5ee45a21..089b2850f9d1 100644
to a backup region.
Currently, the code related to the backup region can be safely removed,
so lets clean up.
Signed-off-by: Lianbo Jiang
---
arch/x86/include/asm/kexec.h | 10
arch/x86/include/asm/purgatory.h | 10
arch/x86/kernel/crash.c| 91
)
[2] Remove the unused crash_copy_backup_region()
[3] Remove the backup region and clean up
[4] Split them into three patches
Lianbo Jiang (3):
x86/kdump: Fix 'kmem -s' reported an invalid freepointer when SME was
active
x86/kdump cleanup: remove the unused crash_copy_backup_region()
x86
purgatory().
In addition, also need to clean all the code related to the backup
region later.
Signed-off-by: Lianbo Jiang
---
arch/x86/realmode/init.c | 11 +++
1 file changed, 11 insertions(+)
diff --git a/arch/x86/realmode/init.c b/arch/x86/realmode/init.c
index 7dce39c8c034..bf4c8ff
e first 640k area to a backup region in the purgatory().
Signed-off-by: Lianbo Jiang
---
Changes since v1:
1. Improve patch log
2. Change the checking condition from sme_active() to sme_active()
&& strstr(boot_command_line, "crashkernel=")
arch/x86/kernel/setup.c | 3 +++
1 file
...
If vmcore-dmesg.txt occupies the whole disk, the vmcore can not be
saved, this is also a problem.
Lets limit the size of vmcore-dmesg.txt to avoid such problems.
Signed-off-by: Lianbo Jiang
---
vmcore-dmesg/vmcore-dmesg.c | 10 ++
1 file changed, 10 insertions(+)
diff --git a/vmcore
Here, no need to wrap the read_elf() again, lets invoke it directly.
So remove the read_elf_kcore() and clean up redundant code.
Signed-off-by: Lianbo Jiang
---
kexec/arch/arm64/kexec-arm64.c | 2 +-
util_lib/elf_info.c| 15 ++-
util_lib/include/elf_info.h| 2 +-
3
] split them([patch 1/4] and [patch 2/4]) into a separate patch.
[2] remove a typedef definition for handler.
[3] remove some changes of variable 'fname' and fix its error.
Lianbo Jiang (4):
Cleanup: remove the read_elf_kcore()
Fix an error definition about the variable 'fname'
Cleanup: move
Some code related to vmcore-dmesg.c is put into the util_lib, which
is not very reasonable, so lets move it back and tidy up those code.
In addition, that will also help to limit the size of vmcore-dmesg.txt
in vmcore-dmesg.c instead of elf_info.c.
Signed-off-by: Lianbo Jiang
---
util_lib
value will be always 'null' when printing an error information.
Signed-off-by: Lianbo Jiang
---
util_lib/elf_info.c | 2 +-
vmcore-dmesg/vmcore-dmesg.c | 2 +-
2 files changed, 2 insertions(+), 2 deletions(-)
diff --git a/util_lib/elf_info.c b/util_lib/elf_info.c
index d9397ecd8626
...
If vmcore-dmesg.txt occupies the whole disk, the vmcore can not be
saved, this is also a problem.
Lets limit the size of vmcore-dmesg.txt to avoid such problems.
Signed-off-by: Lianbo Jiang
---
vmcore-dmesg/vmcore-dmesg.c | 10 ++
1 file changed, 10 insertions(+)
diff --git a/vmcore
Some code related to vmcore-dmesg.c is put into the util_lib, which
is not very reasonable, so lets move it back and tidy up those code.
In addition, that will also help to limit the size of vmcore-dmesg.txt.
Signed-off-by: Lianbo Jiang
---
kexec/arch/arm64/kexec-arm64.c | 2 +-
util_lib
the size of vmcore-dmesg.txt to 2G
With some corrupted vmcore files, the vmcore-dmesg.txt file may
grow forever till the kdump disk becomes full. Lets limit the
size of vmcore-dmesg.txt to avoid such problems.
BTW: I tested this patch on x86 64 and arm64, it also worked well.
Lianbo Jiang (2):
cleanup
When SEV is active, the second kernel image is loaded into the
encrypted memory. Lets make sure that when kexec builds the
identity mapping page table it adds the memory encryption mask(C-bit).
Co-developed-by: Brijesh Singh
Signed-off-by: Brijesh Singh
Signed-off-by: Lianbo Jiang
---
arch
jesh Singh
Signed-off-by: Brijesh Singh
Signed-off-by: Lianbo Jiang
---
arch/x86/kernel/machine_kexec_64.c | 15 +++
1 file changed, 15 insertions(+)
diff --git a/arch/x86/kernel/machine_kexec_64.c
b/arch/x86/kernel/machine_kexec_64.c
index ceba408ea982..f60611531d17 100644
---
are loaded
to the encrypted memory when SEV is active, hence the kernel elf header
must be remapped as encrypted in order to access it properly.
Co-developed-by: Brijesh Singh
Signed-off-by: Brijesh Singh
Signed-off-by: Lianbo Jiang
---
fs/proc/vmcore.c | 6 +++---
1 file changed, 3 insert
nd of the function names.
3. Fix the multiple confusing checks.
4. Add comment in the arch_kexec_post_alloc_pages().
Changes since v2:
1. Add the explanation to the commit message[Boris' suggestion].
2. Improve the patch log.
Lianbo Jiang (3):
x86/kexec: Do not map the kexec area as decrypted when SEV is active
x86/kexe
ved ranges are
not present at all in kdump kernel e820 table, those reserved regions are
considered as encrypted, it goes wrong.
The e820 reserved range is useful in kdump kernel, so it is necessary to
pass the e820 reserved ranges to the kdump kernel.
Suggested-by: Dave Young
Signed-off-by: Lianbo Jiang
---
IORES_DESC_RESERVED has been created for
the reserved areas, similarly, the IORES_DESC_{NONE,RESERVED} should
not be mapped encrypted in SEV when using ioremap().
Therefore, need to modify the check condition in SEV and improve them.
Suggested-by: Borislav Petkov
Signed-off-by: Lianbo Jiang
---
arch/x86/mm
and redefine
it.
3. Change the name of the __ioremap_check_desc_other() to
__ioremap_check_desc().
4. Change the check condition in SEV and also improve them.
5. Modify the return value for some functions.
Lianbo Jiang (3):
x86/e820, resource: add a new I/O resource descriptor
'IORES_DESC_
the reserved resource ranges when walking through iomem resources.
Suggested-by: Borislav Petkov
Signed-off-by: Lianbo Jiang
---
arch/x86/kernel/e820.c | 2 +-
include/linux/ioport.h | 1 +
2 files changed, 2 insertions(+), 1 deletion(-)
diff --git a/arch/x86/kernel/e820.c b/arch/x86/kernel/e820.c
index
ved ranges are
not present at all in kdump kernel e820 table, those reserved regions are
considered as encrypted, it goes wrong.
The e820 reserved range is useful in kdump kernel, so it is necessary to
pass the e820 reserved ranges to the kdump kernel.
Suggested-by: Dave Young
Signed-off-by: Lianbo Jiang
---
modify the kernel/resource.c, so correct them.
3. Change the name of the __ioremap_check_desc_other() to
__ioremap_check_desc_none_and_reserved(), and modify the
check condition, add comment above it.
Lianbo Jiang (2):
x86/mm, resource: add a new I/O resource descriptor
'IORES_DESC
-by: Lianbo Jiang
---
arch/x86/kernel/e820.c | 2 +-
arch/x86/mm/ioremap.c | 16 ++--
include/linux/ioport.h | 1 +
3 files changed, 16 insertions(+), 3 deletions(-)
diff --git a/arch/x86/kernel/e820.c b/arch/x86/kernel/e820.c
index 2879e234e193..16fcde196243 100644
--- a/arch/x86/kernel
modify the kernel/resource.c, so correct them.
3. Change the name of the __ioremap_check_desc_other() to
__ioremap_check_desc_none_and_reserved(), and modify the
check condition, add comment above it.
Lianbo Jiang (2):
x86/mm, resource: add a new I/O resource descriptor
'IORES_DESC
ved ranges are
not present at all in kdump kernel e820 table, those reserved regions are
considered as encrypted, it goes wrong.
The e820 reserved range is useful in kdump kernel, so it is necessary to
pass the e820 reserved ranges to the kdump kernel.
Suggested-by: Dave Young
Signed-off-by: Lianbo Jiang
---
y
when SEV was enabled, hence the kernel elf header must be remapped as
encrypted in order to access it properly.
Co-developed-by: Brijesh Singh
Signed-off-by: Brijesh Singh
Signed-off-by: Lianbo Jiang
---
fs/proc/vmcore.c | 6 +++---
1 file changed, 3 insertions(+), 3 deletions(-)
diff --git
When SEV is active, the second kernel image is loaded into the
encrypted memory. Lets make sure that when kexec builds the
identity mapping page table it adds the memory encryption mask(C-bit).
Co-developed-by: Brijesh Singh
Signed-off-by: Brijesh Singh
Signed-off-by: Lianbo Jiang
---
arch
cho c > /proc/sysrq-trigger
[3] check and parse the vmcore
# crash vmlinux /var/crash/127.0.0.1-2019-03-15-05\:03\:42/vmcore
Changes since v1:
1. Modify the patch subject prefixes.
2. Improve patch log: add parentheses at the end of the function names.
3. Fix the multiple confusing checks.
4. Ad
Signed-off-by: Brijesh Singh
Signed-off-by: Lianbo Jiang
---
arch/x86/kernel/machine_kexec_64.c | 15 +++
1 file changed, 15 insertions(+)
diff --git a/arch/x86/kernel/machine_kexec_64.c
b/arch/x86/kernel/machine_kexec_64.c
index ceba408ea982..f60611531d17 100644
--- a/arch/x86/kernel
and also cause some
errors. Because the 'E820_TYPE_RESERVED' type is converted to the new
descriptor 'IORES_DESC_RESERVED' instead of 'IORES_DESC_NONE', it has been
changed.
Suggested-by: Borislav Petkov
Signed-off-by: Lianbo Jiang
---
arch/x86/kernel/e820.c | 2 +-
include/linux/ioport.h | 1
ot present at all in kdump kernel e820 table, those reserved regions are
considered as encrypted, it goes wrong.
The e820 reserved range is useful in kdump kernel, so it is necessary to
pass the e820 reserved ranges to kdump kernel.
Suggested-by: Dave Young
Signed-off-by: Lianbo Jiang
---
arch/
64.(Borislav's suggestion)
2. Change the examination condition to the 'IORES_DESC_ACPI_*'.
3. Modify the signature. This patch(add the new I/O resource
descriptor 'IORES_DESC_RESERVED') was suggested by Boris.
Lianbo Jiang (3):
x86/mm: Change the examination condition to avoid confusion
resource: a
Following the commit <0e4c12b45aa8> ("x86/mm, resource: Use
PAGE_KERNEL protection for ioremap of memory pages"), here
it is really checking for the 'IORES_DESC_ACPI_*' values.
Therefore, it is necessary to change the examination condition
to avoid confusion.
Signed-off-
disable_cpu_apicid=0"
[2] trigger panic
# echo 1 > /proc/sys/kernel/sysrq
# echo c > /proc/sysrq-trigger
[3] check and parse the vmcore
# crash vmlinux /var/crash/127.0.0.1-2019-03-15-05\:03\:42/vmcore
Lianbo Jiang (3):
kexec: Do not map the kexec area as decrypted when SEV is ac
y
when SEV was enabled, hence the kernel elf header must be remapped as
encrypted in order to access it properly.
Co-developed-by: Brijesh Singh
Signed-off-by: Brijesh Singh
Signed-off-by: Lianbo Jiang
---
fs/proc/vmcore.c | 6 +++---
1 file changed, 3 insertions(+), 3 deletions(-)
diff --git
When SEV is active, the second kernel image is loaded into the
encrypted memory. Lets make sure that when kexec builds the
identity mapping page table it adds the memory encryption mask(C-bit).
Co-developed-by: Brijesh Singh
Signed-off-by: Brijesh Singh
Signed-off-by: Lianbo Jiang
---
arch
-off-by: Brijesh Singh
Signed-off-by: Lianbo Jiang
---
arch/x86/kernel/machine_kexec_64.c | 8 ++--
1 file changed, 6 insertions(+), 2 deletions(-)
diff --git a/arch/x86/kernel/machine_kexec_64.c
b/arch/x86/kernel/machine_kexec_64.c
index ceba408ea982..bcebf4993da4 100644
--- a/arch/x86/kernel
acpi_rsdp command line if it sees the first kernel support efi
runtime. This is causing the second kernel boot failure.
The EFI runtime is not available so early in the boot process so
unconditionally pass the 'acpi_rsdp=xxx' to the second kernel.
Signed-off-by: Lianbo Jiang
Signed-off-by: Brijesh
For AMD machine with SME feature, if SME is enabled in the first
kernel, the crashed kernel's page table(pgd/pud/pmd/pte) contains
the memory encryption mask, so makedumpfile needs to remove the
memory encryption mask to obtain the true physical address.
Signed-off-by: Lianbo Jiang
---
Changes
For AMD machine with SME feature, if SME is enabled in the first
kernel, the crashed kernel's page table(pgd/pud/pmd/pte) contains
the memory encryption mask, so makedumpfile needs to remove the
memory encryption mask to obtain the true physical address.
Signed-off-by: Lianbo Jiang
---
Changes
For AMD machine with SME feature, if SME is enabled in the first
kernel, the crashed kernel's page table(pgd/pud/pmd/pte) contains
the memory encryption mask, so makedumpfile needs to remove the
memory encryption mask to obtain the true physical address.
Signed-off-by: Lianbo Jiang
---
arch
It will be used to store the sme mask for crashed kernel, the
sme_mask denotes whether the old memory is encrypted or not.
Signed-off-by: Lianbo Jiang
---
makedumpfile.c | 3 +++
makedumpfile.h | 1 +
2 files changed, 4 insertions(+)
diff --git a/makedumpfile.c b/makedumpfile.c
index 8923538
to vmcoreinfo
https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=65f750e5457aef9a8085a99d613fea0430303e93
https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=f263245a0ce2c4e23b89a58fa5f7dfc048e11929
Lianbo Jiang (2):
Makedumpfile: add a new variable 'sme_mask
This document lists some variables that export to vmcoreinfo, and briefly
describles what these variables indicate. It should be instructive for
many people who do not know the vmcoreinfo.
Suggested-by: Borislav Petkov
Signed-off-by: Lianbo Jiang
---
Documentation/kdump/vmcoreinfo.txt | 500
. Improve patch log.
Lianbo Jiang (2):
kdump: add the vmcoreinfo documentation
kdump,vmcoreinfo: Export the value of sme mask to vmcoreinfo
Documentation/kdump/vmcoreinfo.txt | 500 +
arch/x86/kernel/machine_kexec_64.c | 3 +
2 files changed, 503 insertions
the true physical address.
Signed-off-by: Lianbo Jiang
---
arch/x86/kernel/machine_kexec_64.c | 3 +++
1 file changed, 3 insertions(+)
diff --git a/arch/x86/kernel/machine_kexec_64.c
b/arch/x86/kernel/machine_kexec_64.c
index 4c8acdfdc5a7..bc4108096b18 100644
--- a/arch/x86/kernel/machine_kexec_64
address.
Signed-off-by: Lianbo Jiang
---
arch/x86/kernel/machine_kexec_64.c | 3 +++
1 file changed, 3 insertions(+)
diff --git a/arch/x86/kernel/machine_kexec_64.c
b/arch/x86/kernel/machine_kexec_64.c
index 4c8acdfdc5a7..bc4108096b18 100644
--- a/arch/x86/kernel/machine_kexec_64.c
+++ b/arch/x86
in this
document.
3. Correct some of the mistakes in this document.
*** BLURB HERE ***
Lianbo Jiang (2):
kdump: add the vmcoreinfo documentation
kdump,vmcoreinfo: Export the value of sme mask to vmcoreinfo
Documentation/kdump/vmcoreinfo.txt | 500 +
arch/x86/kernel
-by: Borislav Petkov
Signed-off-by: Lianbo Jiang
---
Documentation/kdump/vmcoreinfo.txt | 500 +
1 file changed, 500 insertions(+)
create mode 100644 Documentation/kdump/vmcoreinfo.txt
diff --git a/Documentation/kdump/vmcoreinfo.txt
b/Documentation/kdump/vmcoreinfo.txt
new
-by: Borislav Petkov
Signed-off-by: Lianbo Jiang
---
Documentation/kdump/vmcoreinfo.txt | 513 +
1 file changed, 513 insertions(+)
create mode 100644 Documentation/kdump/vmcoreinfo.txt
diff --git a/Documentation/kdump/vmcoreinfo.txt
b/Documentation/kdump/vmcoreinfo.txt
new
it become more
clear and easy to read.
2. Move sme_mask comments in the code to the vmcoreinfo document.
3. Improve patch log.
Lianbo Jiang (2):
kdump: add the vmcoreinfo documentation
kdump,vmcoreinfo: Export the value of sme mask to vmcoreinfo
Documentation/kdump/vmcoreinfo.txt | 513
address.
Signed-off-by: Lianbo Jiang
---
arch/x86/kernel/machine_kexec_64.c | 3 +++
1 file changed, 3 insertions(+)
diff --git a/arch/x86/kernel/machine_kexec_64.c
b/arch/x86/kernel/machine_kexec_64.c
index 4c8acdfdc5a7..bc4108096b18 100644
--- a/arch/x86/kernel/machine_kexec_64.c
+++ b/arch/x86
-by: Borislav Petkov
Signed-off-by: Lianbo Jiang
---
Documentation/kdump/vmcoreinfo.txt | 456 +
1 file changed, 456 insertions(+)
create mode 100644 Documentation/kdump/vmcoreinfo.txt
diff --git a/Documentation/kdump/vmcoreinfo.txt
b/Documentation/kdump/vmcoreinfo.txt
address.
Signed-off-by: Lianbo Jiang
---
arch/x86/kernel/machine_kexec_64.c | 14 ++
1 file changed, 14 insertions(+)
diff --git a/arch/x86/kernel/machine_kexec_64.c
b/arch/x86/kernel/machine_kexec_64.c
index 4c8acdfdc5a7..1860fe24117d 100644
--- a/arch/x86/kernel/machine_kexec_64.c
comment for the code.
3. Improve the patch log.
4. Add the vmcoreinfo documentation.
Changes since v2:
1. Improve the vmcoreinfo document, add more descripts for these
variables exported.
2. Fix spelling errors in the document.
Lianbo Jiang (2):
kdump: add the vmcoreinfo documentation
kdump
-by: Borislav Petkov
Signed-off-by: Lianbo Jiang
---
Documentation/kdump/vmcoreinfo.txt | 400 +
1 file changed, 400 insertions(+)
create mode 100644 Documentation/kdump/vmcoreinfo.txt
diff --git a/Documentation/kdump/vmcoreinfo.txt
b/Documentation/kdump/vmcoreinfo.txt
address.
Signed-off-by: Lianbo Jiang
---
arch/x86/kernel/machine_kexec_64.c | 14 ++
1 file changed, 14 insertions(+)
diff --git a/arch/x86/kernel/machine_kexec_64.c
b/arch/x86/kernel/machine_kexec_64.c
index 4c8acdfdc5a7..1860fe24117d 100644
--- a/arch/x86/kernel/machine_kexec_64.c
comment for the code.
3. Improve the patch log.
4. Add the vmcoreinfo documentation.
Lianbo Jiang (2):
kdump: add the vmcoreinfo documentation
kdump,vmcoreinfo: Export the value of sme mask to vmcoreinfo
Documentation/kdump/vmcoreinfo.txt | 400 +
arch/x86/kernel
ot present at all in kdump kernel e820 table, those reserved regions are
considered as encrypted, it goes wrong.
The e820 reserved range is useful in kdump kernel, so it is necessary to
pass the e820 reserved ranges to kdump kernel.
Suggested-by: Dave Young
Signed-off-by: Lianbo Jiang
---
arch/
and also cause some
errors. Because the 'E820_TYPE_RESERVED' type is converted to the new
descriptor 'IORES_DESC_RESERVED' instead of 'IORES_DESC_NONE', it has been
changed.
Suggested-by: Dave Young
Signed-off-by: Lianbo Jiang
---
arch/ia64/kernel/efi.c | 4
arch/x86/kernel/e820.c | 2
tor 'IORES_DESC_RESERVED'.
3. Update patch log.
Changes since v7:
1. Improve patch log.
2. Improve this function __ioremap_check_desc_other().
3. Modify code comment in the __ioremap_check_desc_other()
Lianbo Jiang (2):
resource: add the new I/O resource descriptor 'IORES_DESC_RESERVED'
x86/kexec_
and also updates these codes relates to 'IORES_DESC_NONE'.
2. Modify the [PATCH 2/2], and walk through io resource based on the
new descriptor 'IORES_DESC_RESERVED'.
3. Update patch log.
Lianbo Jiang (2):
resource: add the new I/O resource descriptor 'IORES_DESC_RESERVED'
x86/kexec_file: add reserved e8
to 'IORES_DESC_NONE' have
been updated.
Suggested-by: Dave Young
Signed-off-by: Lianbo Jiang
---
arch/ia64/kernel/efi.c | 4
arch/x86/kernel/e820.c | 2 +-
arch/x86/mm/ioremap.c | 9 -
include/linux/ioport.h | 1 +
kernel/resource.c | 6 +++---
5 files changed, 17 insertions(+), 5
ved ranges are
not present at all in kdump kernel e820 table, those reserved regions are
considered as encrypted, it goes wrong.
The e820 reserved range is useful in kdump kernel, so it is necessary to
pass the e820 reserved ranges to kdump kernel.
Suggested-by: Dave Young
Signed-off-by: Lianbo Jiang
---
resource descriptor 'IORES_DESC_RESERVED'
for the iomem resources search interfaces. It is helpful to exactly
match the reserved resource ranges when walking through iomem resources.
Suggested-by: Dave Young
Signed-off-by: Lianbo Jiang
---
Changes since v5:
1. Improve the patch log
Changes since v6
1 - 100 of 171 matches
Mail list logo