Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754069AbdCFSUM (ORCPT ); Mon, 6 Mar 2017 13:20:12 -0500 Received: from mail-sn1nam02on0046.outbound.protection.outlook.com ([104.47.36.46]:51168 "EHLO NAM02-SN1-obe.outbound.protection.outlook.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1752947AbdCFST7 (ORCPT ); Mon, 6 Mar 2017 13:19:59 -0500 Authentication-Results: lists.infradead.org; dkim=none (message not signed) header.d=none;lists.infradead.org; dmarc=none action=none header.from=amd.com; Subject: Re: [RFC PATCH v4 26/28] x86: Allow kexec to be used with SME To: Dave Young References: <20170216154158.19244.66630.stgit@tlendack-t1.amdoffice.net> <20170216154755.19244.51276.stgit@tlendack-t1.amdoffice.net> <20170217155756.GJ30272@char.us.ORACLE.com> <20170301092536.GB8353@dhcp-128-65.nay.redhat.com> <998eb58b-eefd-3093-093f-9ae25ddda472@amd.com> CC: Konrad Rzeszutek Wilk , , , , , , , , , , Rik van Riel , =?UTF-8?B?UmFkaW0gS3LEjW3DocWZ?= , Toshimitsu Kani , Arnd Bergmann , Jonathan Corbet , Matt Fleming , "Michael S. Tsirkin" , Joerg Roedel , Paolo Bonzini , Brijesh Singh , Ingo Molnar , Alexander Potapenko , Andy Lutomirski , "H. Peter Anvin" , Borislav Petkov , Andrey Ryabinin , Thomas Gleixner , Larry Woodman , Dmitry Vyukov , From: Tom Lendacky Message-ID: <87ecaf44-b5a0-61c6-30b1-a798cc535983@amd.com> Date: Mon, 6 Mar 2017 12:04:28 -0600 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:45.0) Gecko/20100101 Thunderbird/45.7.1 MIME-Version: 1.0 In-Reply-To: <998eb58b-eefd-3093-093f-9ae25ddda472@amd.com> Content-Type: text/plain; charset="windows-1252"; format=flowed Content-Transfer-Encoding: 7bit X-Originating-IP: [165.204.77.1] X-ClientProxiedBy: BN6PR1001CA0005.namprd10.prod.outlook.com (10.174.84.18) To BN6PR12MB1137.namprd12.prod.outlook.com (10.168.226.139) X-MS-Office365-Filtering-Correlation-Id: 4a53051e-ab5c-4ef0-dba7-08d464bb3dd2 X-MS-Office365-Filtering-HT: Tenant X-Microsoft-Antispam: UriScan:;BCL:0;PCL:0;RULEID:(22001)(48565401081);SRVR:BN6PR12MB1137; X-Microsoft-Exchange-Diagnostics: 1;BN6PR12MB1137;3:HZzRXndJNPENNyj5JplayuwXbkfd0D2/KQMHxltyDOnz+83Rmr03VxZhegreiw6ZIKXmfSlKvLdrikteRSIYa43wO0ZuC/OBdUpRhNkAASsdddQETUPvuR3p9f6GkfaiCZnYThp4VSfXHvQ/HlnayFGgamKaCHZMrNA57xerc89yOR9Eq+M8C71rm9bu3n15m5VOc1xIS2i70KyI8HtEg5uLPAPH/VnFxwtPpO3KznkgQdKx/CiI3ubU1ElkfRa0tJ77X0dh9+g1Ys6qajVPuKXF3nN2k1vva7hlljW/Rbw=;25:PLBgk0y5A6gkYwamzOHg6D9t04D7ONNA5ukN98QSlMHMkf8bCFgpk+JMYSccpBb/nr+5kEvpsY2KuViAlh7cM4+a0/wMoemvsy59eRUd1/SYNpp4Bs26saaC5D95zY3xumOk+7fgiJnqndBoup5WdWduQyWDyMe76AtGanH88lTzznm5FrQ92tbhfuqtivuVv712CBEBGMCqWWsuZSPNQlIpZbLDirVSbO+Ctsupd0KNrbpypqgv+qaDi1D20yac2DJPZ81iNdVIorMC+FXZisKUW8b0MtiTnmHiKkuQPceuqZ4u0yvAHZLOo4KMGcwlJwWPX8h77LuZ0fT8rXJBSFKvE23qWEsM3lx/0LYKTG0nCFHMmEZ7rFxDbGmbPAt5bHeSxk1I1r0RdbN61FV8IjgemwocsgmxceASJN1hjlA3VcA+AxBjgAW97+5ll4M2voU8l46sThhJac3ubp/KXA== X-Microsoft-Exchange-Diagnostics: 1;BN6PR12MB1137;31:F2aH7RVaGNXEMHCmi1S4aCvb1AHqGJZ7paQ2RtyMorWQkks+toQ13UlybmnD9SYIdCTqPRp2hXk5oWt9muZaFfc6AXGHS1xB9f7/hGmFJsUBpnTom4lr6sgswuufpOwa7g/61TiSuwojNmrdT3pxafZVeOSjFu0IKPavfgEvyr1IMbuwEt5NVOLI3+jX8WuAsbnFoWZK7AgHL0QwaTWDHpW6Lwc/8m2okwKivplBj0A=;20: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 X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-Test: UriScan:; X-Exchange-Antispam-Report-CFA-Test: BCL:0;PCL:0;RULEID:(6040375)(601004)(2401047)(8121501046)(5005006)(10201501046)(3002001)(6055026)(6041248)(20161123560025)(20161123555025)(20161123564025)(20161123558025)(20161123562025)(6072148);SRVR:BN6PR12MB1137;BCL:0;PCL:0;RULEID:;SRVR:BN6PR12MB1137; X-Microsoft-Exchange-Diagnostics: 1;BN6PR12MB1137;4:081QI7xmqCpHUF64KlHLpgu5vxHPZvd1cJ2PiMPa5L5e/eeDDda4tdYdggNGFddmEIDgK8iVvvm0dWffNasV2KQ0OthsbbKwhmOVLBmUi9QM1aYtG29inOfRY6kEtcbh6+9UBBZIUlc3OqbHQN4qzUwclwrkumUqKfDJ5aefaodMdi5eKOBOflMNTRnprig4MjxHAAEtv+oBBCi9Gg+CAbaETosHFaNOeR0LtJRghbOFbMiKIK1G0ATA26glev0+hEMI1GNC3IxW+FMrGDt2WVvFo6TfLpJ4Jz413zoisgwlMivKvXXgdSPLwC341RB3/oQva9SZExoqHytnOJzP/gc4d7HYHEXgo8QPB2GG8LG5jh3hUs/IP0Vl+H+W6zJtJ7NS+oSqhTdFvWaJCmpK1xfnHsV9NcDGBIvDWvkmCB/6lrTh3/wE/z49uA7wF5873fujaA/laS5As0S1NK1u90fEYZm5sMViBWqEO7Qmh1guFVyewpEFGoNY/henR0/d6pTZgWLhTN+05fBgpqUP1LRHdN8Hryc4aT5O3jRL0CgdZmnImWGrO7c5TXR3nJTotRdJ2te0OA3cnKJ1a/iHGG4Azl4KEdOCCLfu2xc75N+RuSC0zBuZXg8p//Qy2hbH X-Forefront-PRVS: 0238AEEDB0 X-Forefront-Antispam-Report: SFV:NSPM;SFS:(10009020)(4630300001)(6009001)(6049001)(7916002)(39840400002)(39850400002)(39860400002)(39450400003)(39410400002)(377454003)(24454002)(93886004)(2950100002)(6246003)(66066001)(65806001)(38730400002)(110136004)(65956001)(65826007)(54356999)(5660300001)(50466002)(33646002)(86362001)(305945005)(2906002)(6916009)(23746002)(53546006)(31696002)(76176999)(7406005)(7736002)(4326008)(7416002)(50986999)(36756003)(83506001)(31686004)(42186005)(8676002)(81166006)(25786008)(54906002)(6486002)(77096006)(189998001)(92566002)(230700001)(53936002)(4001350100001)(47776003)(90366009)(64126003)(3846002)(6116002)(217873001);DIR:OUT;SFP:1101;SCL:1;SRVR:BN6PR12MB1137;H:[10.236.64.195];FPR:;SPF:None;MLV:sfv;LANG:en; X-Microsoft-Exchange-Diagnostics: =?Windows-1252?Q?1;BN6PR12MB1137;23:q+EexAFVZouewgWS5JpBPTioqOncQPytlpTdY?= =?Windows-1252?Q?3PIZdjH+dc9XPs71DSN9saLyK7iHC8b/MKYWSLg7jG8mpjvXWTziI7vr?= =?Windows-1252?Q?B1JlnXeLHCw2BniEO6EoyTLM480fkfocsXxsxoxnDUy9UZlkTh4R5Hyt?= =?Windows-1252?Q?L3/bV5aeqkGYnQoSrtjCc7a9heyksKQWysX6HwoaQ1PcjwCR6RRoCXfX?= =?Windows-1252?Q?A/gIaJubvoNKHC9qawldE4Yqb7mN/xhiNJpMPCi538CkMSqc1k3moF3h?= =?Windows-1252?Q?02cf66vqIQyrBqRgL3yY4wp4kaLpzcDvZ1GHS8nqsHGhFGNMaCxI0iIy?= =?Windows-1252?Q?vDK3H44KDbywsfLwassNtjFCJrRvJrOc0v0FOYCPRwGJfl1ahpJkK003?= =?Windows-1252?Q?2JWu4Km5JuaZqGhl1C9CCtKoCbI1dkHJQP2sAE6pms13A3+oeGEJUeu7?= =?Windows-1252?Q?t0BlFg4LxS+ndlj1I0Qh5NW6xE+9fT0nVjER70eZCmd9eZQSSRQD3KO0?= =?Windows-1252?Q?iRnHPxDEeYPR7Buw+6Yoz9kQxdADrqSUxmfvTQdcwseofyi1+0abb0Zg?= =?Windows-1252?Q?zLX0iAazj13mkDts8xCmRgiUz6kwq7fNPjSAPiHdcL0gp55quhwOueRh?= =?Windows-1252?Q?6vIwg7q+qELaIEap5j/V8zPNyuTc4bC86YQupkpEDSYpyinqHlauVeRP?= =?Windows-1252?Q?BFtCLA6zxY3dyxPpMXEglPmUXcFKP7cJQaP3eO4cKIqOVUWmfF+0xK0E?= =?Windows-1252?Q?wdBK3wbqfRi+q1lFfQiIAuyYjfa/qzzdjDzSjgnFi5vO0lfnyMzUqOlL?= =?Windows-1252?Q?4ah5SV+VTndbayL/iqnlA/go0TePSRz0F+HGQ/PZO2bWjkhUNEwGV6Yw?= =?Windows-1252?Q?11/HS9yhzHxIWwUVSrm7h+tHKV+ahxCuMg0zT13O3+JidVAz4kTW/QUh?= =?Windows-1252?Q?veWbgOt6DRko1FBKqLj7mME9qBS6lFkuoSyLnfAFdtL6Z5Sb7sftTF8X?= =?Windows-1252?Q?J/CvVkQ9S6R8Dpl0PqqV2GWrK1rr8qVi5VFhbr/KNiwefJYga5P+XJ/3?= =?Windows-1252?Q?w1E8tbU52EiPqI2+BlS8BU0ansY3/UuG7S/x5Sqdprec+tuPCdAsofO3?= =?Windows-1252?Q?woCFeEtSqXBD3WuaJ0knrvJhtEUKUcxC5O90+aRJnk4WknLu+jmifrH7?= =?Windows-1252?Q?Megdyc0Dj2ZunZZEbQznV+ZhJxCUmsg4Pds8t4cZT6Vs8dy0BYMYaw/L?= =?Windows-1252?Q?2Nkc1qIfhEJ6VozpmudKZ/UudH9s41DLDq6AQa5uNfz4pbYCf/P4m0Se?= =?Windows-1252?Q?FTabZRMelZYXgJqT0hYmAsw79WJXLNH7dDeUX+85tVWiC1zVrMLt7nCg?= =?Windows-1252?Q?GpiM+uGs6kulqkDgWWb/hZd5UdZ1u8dwYyfIgZb7ngY6vzL0VsALeayT?= =?Windows-1252?Q?7O884ogTofUoRN/pRyKLyIsp84aUnPJxSfBYmONI96tikz3FNDwHtCDA?= =?Windows-1252?Q?Csc5FgSDqeQ/aPnhZkDrJ6H2yUr?= X-Microsoft-Exchange-Diagnostics: 1;BN6PR12MB1137;6:zRV3sQdVtfu8QAWbonbKhK9N4fBnXV8o7ElkHViXBRpauP1BsQxPaXefU/aPcMljhDEgybb74X6y9F7+2RHeIWtxYp2SEKNu9kkYJTErVOp0ez4R9N7O4ewThWmIDal6G+RHT+e11MDNTINeyBBqtfu5M9TmTFYpRGlbe/RE8KH8G/hQA5auZEbud94jxZbKV3pFM1e22R0Gx/e+DE2LjcZgj3tt407GAXPQZxGepKMYGvG9uS1Y7lUFIrh/MjB3A9QZT+Xu7k083cSs9XhShvscI4CMOdrdutKC8IKsjSKR28XXCe4O0id7zkyMdsbHoRBfdNJYaO/kNM5OQtsWWfRnQYy7hAWhe8W1XHNRb7O/4car7q8HXWHzDkHEiTIdhE2UcnXyzJTRBnYUmq9i8TmLLLJdeihXb13g+qUbrnw=;5:GtheeArtZTMTltKNK0tNefSb8G0HzISJ+BPRLWEos/63h29JallicnQzLApz9e/0zEZwn7kKWvqS4wnatNvWq09ukZxb7Y57LpCG+tGa6qkPVr6WIinhgb8n3qo2eILSrUYPhLxSl1D3XQCrzsQEbMo0pmtd2lABlcQDj9l9JMY=;24:uLDhjh609xoZJZ+GO5xX11MRcmyE43gDd5TLw+1EF7UIHEaxnuRggGCe1kcVbRtL7dIz7wljAE9Hm/bjBAzj09+P0tbfLZbyx5yHmPTnbww= SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-Microsoft-Exchange-Diagnostics: 1;BN6PR12MB1137;7:x3DJaB3CYPX/1e1sq/udNWwGF+BoLBcvjnp5WUH0rE6ZSHNdVEmnx568eDNNKwrH0yLhsUJbB5/JgShg+81lPvAc0rA/YaaIoTARbgj+znEbbh7zy9CUoPS3BvSTJDQxOZrYg/pfIrc3YWTuK+FlFjrvDyoHMOYqVZx8r6ywmqs8nlzzAYcb4MWD4bUvHmqF0zdJN5Bz2Ikst2sLEFURiBWvdr9dUeZKGocPdGPQbdIduNEKN89627Em2Hdz0mEbe84sCqIIhanCVrsb7Kx+eczFHZ5FODhtEPSIhCNeizEn0T/EI1cwx8T13Au8gPPlbW1lVrBgj6vjO3tFPXpeIg==;20:4f0zMBCbwpKJbP0xvM4SSKS/9DRLPTHQ5iUtMnpm5uITVQreuIuYy+cUlIk3HMSp/SO8NVgalV9tBENCcrR1Swxckbet4soWBNNxjV0VSCa8Jok1rjHd7ObdEmKMHKDXtJvPVrvpF/vYKZ1V3aZCd+k4ZZat+zDS70hhrl1qsp8DtcjtMn/0uVdEuP/QwzohZ3sIYAP5HaN7sfFGK09N0+gOgUIh1Tl0Ys8VHbHnQEEsMjqtijS7JVPk6Eyb84c0 X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 06 Mar 2017 18:04:30.9035 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN6PR12MB1137 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 2233 Lines: 66 +kexec-list On 3/6/2017 11:58 AM, Tom Lendacky wrote: > On 3/1/2017 3:25 AM, Dave Young wrote: >> Hi Tom, > > Hi Dave, > >> >> On 02/17/17 at 10:43am, Tom Lendacky wrote: >>> On 2/17/2017 9:57 AM, Konrad Rzeszutek Wilk wrote: >>>> On Thu, Feb 16, 2017 at 09:47:55AM -0600, Tom Lendacky wrote: >>>>> Provide support so that kexec can be used to boot a kernel when SME is >>>>> enabled. >>>> >>>> Is the point of kexec and kdump to ehh, dump memory ? But if the >>>> rest of the memory is encrypted you won't get much, will you? >>> >>> Kexec can be used to reboot a system without going back through BIOS. >>> So you can use kexec without using kdump. >>> >>> For kdump, just taking a quick look, the option to enable memory >>> encryption can be provided on the crash kernel command line and then >> >> Is there a simple way to get the SME status? Probably add some sysfs >> file for this purpose. > > Currently there is not. I can look at adding something, maybe just the > sme_me_mask value, which if non-zero, would indicate SME is active. > >> >>> crash kernel can would be able to copy the memory decrypted if the >>> pagetable is set up properly. It looks like currently ioremap_cache() >>> is used to map the old memory page. That might be able to be changed >>> to a memremap() so that the encryption bit is set in the mapping. That >>> will mean that memory that is not marked encrypted (EFI tables, swiotlb >>> memory, etc) would not be read correctly. >> >> Manage to store info about those ranges which are not encrypted so that >> memremap can handle them? > > I can look into whether something can be done in this area. Any input > you can provide as to what would be the best way/place to store the > range info so kdump can make use of it, would be greatly appreciated. > >> >>> >>>> >>>> Would it make sense to include some printk to the user if they >>>> are setting up kdump that they won't get anything out of it? >>> >>> Probably a good idea to add something like that. >> >> It will break kdump functionality, it should be fixed instead of >> just adding printk to warn user.. > > I do want kdump to work. I'll investigate further what can be done in > this area. > > Thanks, > Tom > >> >> Thanks >> Dave >>