Re: [PATCH v9 06/11] arm64: kexec_file: allow for loading Image-format kernel

2018-05-14 Thread AKASHI Takahiro
James, On Fri, May 11, 2018 at 06:07:06PM +0100, James Morse wrote: > Hi Akashi, > > On 07/05/18 08:21, AKASHI Takahiro wrote: > > On Tue, May 01, 2018 at 06:46:11PM +0100, James Morse wrote: > >> On 25/04/18 07:26, AKASHI Takahiro wrote: > >>> This patch provides kexec_file_ops for

Re: [PATCH v9 03/11] arm64: kexec_file: invoke the kernel without purgatory

2018-05-14 Thread AKASHI Takahiro
James, On Fri, May 11, 2018 at 06:03:49PM +0100, James Morse wrote: > Hi Akashi, > > On 07/05/18 06:22, AKASHI Takahiro wrote: > > On Tue, May 01, 2018 at 06:46:06PM +0100, James Morse wrote: > >> On 25/04/18 07:26, AKASHI Takahiro wrote: > >>> diff --git a/arch/arm64/kernel/machine_kexec.c >

Re: [PATCH v9 04/11] arm64: kexec_file: allocate memory walking through memblock list

2018-05-14 Thread AKASHI Takahiro
James, On Mon, May 07, 2018 at 02:59:07PM +0900, AKASHI Takahiro wrote: > James, > > On Tue, May 01, 2018 at 06:46:09PM +0100, James Morse wrote: > > Hi Akashi, > > > > On 25/04/18 07:26, AKASHI Takahiro wrote: > > > We need to prevent firmware-reserved memory regions, particularly EFI > > >

[PATCH 2/2] support kdump when AMD secure memory encryption is active

2018-05-14 Thread Lianbo Jiang
When sme enabled on AMD server, we also need to support kdump. Because the memory is encrypted in the first kernel, we will remap the old memory encrypted to the second kernel(crash kernel), and sme is also enabled in the second kernel, otherwise the old memory encrypted can not be decrypted.

[PATCH 0/2] support kdump for AMD secure memory encryption(sme)

2018-05-14 Thread Lianbo Jiang
It is convenient to remap the old memory encrypted to the second kernel by calling ioremap_encrypted(). When sme enabled on AMD server, we also need to support kdump. Because the memory is encrypted in the first kernel, we will remap the old memory encrypted to the second kernel(crash kernel),

[PATCH 1/2] add a function(ioremap_encrypted) for kdump when AMD sme enabled.

2018-05-14 Thread Lianbo Jiang
It is convenient to remap the old memory encrypted to the second kernel by calling ioremap_encrypted(). Signed-off-by: Lianbo Jiang --- arch/x86/include/asm/io.h | 2 ++ arch/x86/mm/ioremap.c | 25 + 2 files changed, 19 insertions(+), 8

Re: [PATCH net-next v8 0/3] kernel: add support to collect hardware logs in crash recovery kernel

2018-05-14 Thread Eric W. Biederman
David Miller writes: > I'm deferring this patch series. > > If we can't get a reasonable review from an interested party in 10+ > days, that is not reasonable. > > Resubmit this once someone reviews it properly. David I am out on vacation this week and last (the reason for

Re: [PATCH makedumpfile] handle mem_section as either a pointer or an array

2018-05-14 Thread Thadeu Lima de Souza Cascardo
On Mon, May 14, 2018 at 07:40:21AM +, Masaki Tachibana wrote: > Hi Thadeu, > > So sorry for the late reply. > I will merge the patch into V1.6.4 with the following modifying > because I have already accepted "Always use bigger SECTION_MAP_MASK" patch. > > 63,68c63,64 > < if

RE: [PATCH makedumpfile] handle mem_section as either a pointer or an array

2018-05-14 Thread Masaki Tachibana
Hi Thadeu, So sorry for the late reply. I will merge the patch into V1.6.4 with the following modifying because I have already accepted "Always use bigger SECTION_MAP_MASK" patch. 63,68c63,64 < if (info->kernel_version < KERNEL_VERSION(4, 13, 0)) < - map &=