Received: by 2002:ac0:98c7:0:0:0:0:0 with SMTP id g7-v6csp1122991imd; Sat, 27 Oct 2018 02:40:43 -0700 (PDT) X-Google-Smtp-Source: AJdET5fMkrXm/CQnjsjA9x7zXMaKX+5YvBxdI/3bLBqpVtofspIuIHfMn+eXDuCz2Yvl0JGjsNba X-Received: by 2002:a17:902:6b82:: with SMTP id p2-v6mr6826304plk.50.1540633243032; Sat, 27 Oct 2018 02:40:43 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1540633242; cv=none; d=google.com; s=arc-20160816; b=H9PbFEeo/YjA6n3XWaESDjbUUpd1+c2qLcO5ye18kORJFOCkPNlNCo3XDjIfx/d9Rp czBa7NBvkPTCblIKTy8lLXo5O6ZD2IOTINZsvIy9pqSzF0Gg1vbd+Dmfu9WR//69BtNk pwzDhadVhbk69xuVAw5ENTaUBhHjubEr2bpPnFFl1OTpv9qV/ReHWDEeHysOQ43f6Fhd wslh78PA/AV0V+rnU78bY7C+MGSYT7cl68AhfLwtRIJuxJrWQwVRpr88XknLO8ykStH7 2ECmI6Xt0JqOV22sbSdRnkOBwidjRdv3xVTxTqC+93ft3nGAHmT/xKzrw0eTq86705z8 y3Uw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=VmyOTVxDcyRZYPnzupzyLLEwbTgoZmioLByJUppsCys=; b=rnMzo+mpteXvwulRKU9qv9LslV5BQhyAL8tImgwA6NMU2/xRc+uM2xBigYedDUmo/+ CBG3lBiV5Qa8G5DzDkB/1zcQcywfelPQEkMla/qL/HuQ2P8hcrz9W0ig8mVEkFwV02N/ 8POjxbgrIBNj9n4ZOMHhWdIUI+A5kojFpLb3cVIRZbX3gzIw8QcXZ66XUKpQWkTw4crA 3cxJLams6faS5cV4lSYw+uVxqc800grHxXGEftpvLBQICi5zWZVBK5kk0uO+q1e/CXMF aIMSl9J7UncFe+r2YRJiY70+tE11W/FcUGFSRbiKBkNojMwLVc8uvczIOMPDZ9B+M0Sw bCPw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id x10-v6si13084605pfm.136.2018.10.27.02.40.10; Sat, 27 Oct 2018 02:40:42 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728361AbeJ0STp (ORCPT + 99 others); Sat, 27 Oct 2018 14:19:45 -0400 Received: from mx1.redhat.com ([209.132.183.28]:58474 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726610AbeJ0STp (ORCPT ); Sat, 27 Oct 2018 14:19:45 -0400 Received: from smtp.corp.redhat.com (int-mx07.intmail.prod.int.phx2.redhat.com [10.5.11.22]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id C15B53082AF3; Sat, 27 Oct 2018 09:39:24 +0000 (UTC) Received: from localhost (ovpn-8-21.pek2.redhat.com [10.72.8.21]) by smtp.corp.redhat.com (Postfix) with ESMTPS id E98291001944; Sat, 27 Oct 2018 09:39:21 +0000 (UTC) Date: Sat, 27 Oct 2018 17:39:17 +0800 From: Baoquan He To: Borislav Petkov Cc: Petr Tesarik , lijiang , linux-kernel@vger.kernel.org, x86@kernel.org, kexec@lists.infradead.org, mingo@redhat.com, tglx@linutronix.de, dyoung@redhat.com Subject: Re: [PATCH] kdump, vmcoreinfo: Export sme_me_mask value to vmcoreinfo Message-ID: <20181027093917.GA14493@MiWiFi-R3L-srv> References: <20181026093630.8520-1-lijiang@redhat.com> <053CC83A-9A95-4C12-9627-AABD1427DA9C@alien8.de> <1263471c-a27d-a698-15f0-b5947f13ea93@redhat.com> <20181026182440.20a4b107@ezekiel.suse.cz> <20181026222517.GB26927@nazgul.tnic> <20181027081343.GA1884@MiWiFi-R3L-srv> <20181027091007.GB1046@nazgul.tnic> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20181027091007.GB1046@nazgul.tnic> User-Agent: Mutt/1.9.1 (2017-09-22) X-Scanned-By: MIMEDefang 2.84 on 10.5.11.22 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.45]); Sat, 27 Oct 2018 09:39:24 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 10/27/18 at 11:10am, Borislav Petkov wrote: > On Sat, Oct 27, 2018 at 04:13:43PM +0800, Baoquan He wrote: > > Yes, agree. So sme_me_mask itself or the encryption bit number, both is > > fine. > > You need the encryption bit position and it better be properly formatted > and extracted into a vmcoreinfo-specific variable because we don't > expose arch-specific details like sme_me_mask to the outside. Not very sure about this, we have arch_crash_save_vmcoreinfo() in arch/x86/kernel/machine_kexec_64.c to export arch-specific stuffs outside. Is there any special reason about a mask in one architecture when expose it out? In fact it's only that bit position set mask, no other information. Surely it's also fine if we export encryption bit position, then convert it to mask in makedumpfile. > > > we may use cp to copy /proc/vmcore to a file directly, then analyze > > it in another compupter. This often happen when there's something > > wrong with makedumpfile, we need debug makedumpfile with the complete > > copied file. > > So for the analyze-on-another-computer scenario you absolutely must copy > anything from the first kernel decrypted because you can't decrypt it on > the other machine. > > Which means, in a sensitive environment, you probably should copy and > *encrypt* the dump again with gpg or so. Hmm, no matter it's makedumpfile or cp directly, when we read /proc/vmcore in kdump kernel, it will call __read_vmcore() or related functions in fs/proc/vmcore.c. With regarding to SME memory reading, Lianbo should have handle it in previous SME support in kdump patches. Just those page tables in crashed kernel are also memory content, they are decrypted and copied out, while with SME bit position enabled to indicate encryption, that bit position is added by kernel, now the 1st kernel is dead, we need wipe it out in makedumpfile when parsing. So this 'cp', it's still need be done in kdump kernel by 'cp' /proc/vmcore. Thanks Baoquan