Received: by 2002:ac0:98c7:0:0:0:0:0 with SMTP id g7-v6csp1068168imd; Sat, 27 Oct 2018 01:16:01 -0700 (PDT) X-Google-Smtp-Source: AJdET5fDk2Rg+43QMJIRXOlh9gw/yLMXlu+WjlBizt9/Ov8s2LUrHTu0VMEz59OsH3bu7umE6IOG X-Received: by 2002:aa7:8001:: with SMTP id j1-v6mr6819045pfi.73.1540628161640; Sat, 27 Oct 2018 01:16:01 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1540628161; cv=none; d=google.com; s=arc-20160816; b=eKG4VoFTLV5AWzc0yh3W/Bfts2Jx/Jt5MbcVR0V+fdN8LQzVLVVZ2/UAhc0NBM5j95 CLaFQxCV0FPhC9oIAXhqbOz3FkBw+TOXVHu2jQLw2t2MFGq+ee4lwiXl94/d7+84vCfa kwXkNyV1wNFAUQ5cv11Dc8cVi3IFAipHQUE4uULMzGzSJWOb2slPciHze9/zL9hGeQoa 6Na6jTHXRuHFJwGIq0SAlwMZASybo6NLocTEV1jbHOvF9J6dNzxPC9sQxvxc0OR35Vkm qe7zwtvvJwMqXiOXJNIiGCaCgA+JjG4ejuSAyN2jaAot8b6xtnj3hYjVLmiCRqttv7hr gmkA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=jAniU2wqpOFOMTQeDYp751PCDEDDYPzYN4iFjeKNlrI=; b=tH1BpydA0OtQvEBRjjQGvws06HhEqWjDIWnaXK+Kyh+sIGoVK/lc8y2BiYNVEIUPVJ zSkMpdC3fdPg1IYI/MKCDz6Xl6DFG8x6/b+TrqWPpthHwQ5R2NIb03dozdbb17Woqroh dyn7e16FcYWzFjZdLI+G3DIRf2zRjaATrX7ia1zrviw+QLonLIfcoWGaW2o2otjYmfp0 8mWEAD3sDTLf7aH2PLB6+ewmoCuUxB/ZgFb/Ds7tiHxXaUensUJSuXfotMY//XJ+84M/ RBFSHYZv8DXoxDwXJXf2M2cd0mV0vzFvPCsB4t+sGtfeJch6T6Cj5jVfkpp8do5xwMgR 1VAg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w22-v6si12993660plp.110.2018.10.27.01.15.45; Sat, 27 Oct 2018 01:16:01 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728339AbeJ0Qx6 (ORCPT + 99 others); Sat, 27 Oct 2018 12:53:58 -0400 Received: from mx1.redhat.com ([209.132.183.28]:58628 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728020AbeJ0Qx5 (ORCPT ); Sat, 27 Oct 2018 12:53:57 -0400 Received: from smtp.corp.redhat.com (int-mx02.intmail.prod.int.phx2.redhat.com [10.5.11.12]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 6804D753E8; Sat, 27 Oct 2018 08:13:49 +0000 (UTC) Received: from localhost (ovpn-8-21.pek2.redhat.com [10.72.8.21]) by smtp.corp.redhat.com (Postfix) with ESMTPS id BD35166D46; Sat, 27 Oct 2018 08:13:45 +0000 (UTC) Date: Sat, 27 Oct 2018 16:13:43 +0800 From: Baoquan He To: Borislav Petkov Cc: Petr Tesarik , lijiang , linux-kernel@vger.kernel.org, x86@kernel.org, kexec@lists.infradead.org, mingo@redhat.com, tglx@linutronix.de, dyoung@redhat.com Subject: Re: [PATCH] kdump, vmcoreinfo: Export sme_me_mask value to vmcoreinfo Message-ID: <20181027081343.GA1884@MiWiFi-R3L-srv> References: <20181026093630.8520-1-lijiang@redhat.com> <053CC83A-9A95-4C12-9627-AABD1427DA9C@alien8.de> <1263471c-a27d-a698-15f0-b5947f13ea93@redhat.com> <20181026182440.20a4b107@ezekiel.suse.cz> <20181026222517.GB26927@nazgul.tnic> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20181026222517.GB26927@nazgul.tnic> User-Agent: Mutt/1.9.1 (2017-09-22) X-Scanned-By: MIMEDefang 2.79 on 10.5.11.12 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.39]); Sat, 27 Oct 2018 08:13:49 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 10/27/18 at 12:25am, Borislav Petkov wrote: > On Fri, Oct 26, 2018 at 06:24:40PM +0200, Petr Tesarik wrote: > > But we need the MSR value from the panic kernel environment, not while > > the production kernel is still running, right? > > Actually, we need only the encryption bit number (and it should be 0 > otherwise to denote SME wasn't enabled). > > I guess something like > > VMCOREINFO_NUMBER(sme_mask); Yes, agree. So sme_me_mask itself or the encryption bit number, both is fine. We need read and parse the memory content of crashed kernel which is mapped to /prov/vmcore by user space makedumpfile. Not only is it because user space makedumpfile can't access and get if it's sme enabled from system, we may use cp to copy /proc/vmcore to a file directly, then analyze it in another compupter. This often happen when there's something wrong with makedumpfile, we need debug makedumpfile with the complete copied file. And only telling whether sme is enabled might be not enough. Since AMD CPU might extend to support 5-level, then the current fixed bit positon 47 would need be changed. Thanks Baoquan