Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp1626005imu; Sun, 16 Dec 2018 05:17:43 -0800 (PST) X-Google-Smtp-Source: AFSGD/VbXpy0eJ09v0mXjqo13XnR/PzG7BOLRETg5xkPFKAnJEPfznPVbzQSiVm+AMPJKAiQ0Uhp X-Received: by 2002:a17:902:8b88:: with SMTP id ay8mr9566541plb.55.1544966263298; Sun, 16 Dec 2018 05:17:43 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1544966263; cv=none; d=google.com; s=arc-20160816; b=OiYgkXoI8WyFscXqmZxP5NARBhYMmA9m3HJW1o0V8o9jey7heH0oJzMGOG5ukPmeJu wpHgO2wYr/6eCUOSCyaZjGAqVMzTsOW56U3LT9pDFYV6FxDcpbaqthiLbT/Fe7EpcNa/ jPZfj4JQW39xil3EselD/lqVLMdarONIB3szh1M9GFBi+FB2hJChj0JEHBMv4u3/gwAS /aqTXQ7ylfLeYXjis6RmQ/am2g16jrdfxs1uTPW0bNCU15uFhpxD9/q/P9zSmB36ld1c qja41NUZgt2ST84pTEfbGIJphNdcGBalBdilJ1laV5VT8wOKrPW7t6shvudxMzY3wYyZ g7CQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from; bh=uevM5UXEmDm8vbIixp91L1NvqFTlKbpNxPhlkxmzq/c=; b=IjpN5CJkmNi5v1+4uaBCArXACxiBq3uBeohNayCak9i4B4bVzK9g8gLF/bg5XQhiBh wXCfqqYcRuxr69fFsqpKW1UPv2Zy983tL468x8yZIcTdn2wTtrA89XXQsQjNfEh0EJZS CR/7sf9pTqWDQj4GruiAVoAFNyHlZepAu2hT7r0I/fU52cdnkkXUJpppuoNLJ6GVdnYx 1IFtlLUlNMFY9k0L2FKifkjqIcAnXDwu5NKRtxGh8TztI88Be2DcPaiK/3XwTpT+dT03 ggSgn5KPkOYUOkp6yy1jJM3hzWx3uh7eVITRleTpCXYWkjwIT8y3irVut+jwgTEOTMMR KFLw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id n32si8540237pgm.439.2018.12.16.05.17.28; Sun, 16 Dec 2018 05:17:43 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730586AbeLPNQ3 (ORCPT + 99 others); Sun, 16 Dec 2018 08:16:29 -0500 Received: from mx1.redhat.com ([209.132.183.28]:47270 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730382AbeLPNQ2 (ORCPT ); Sun, 16 Dec 2018 08:16:28 -0500 Received: from smtp.corp.redhat.com (int-mx03.intmail.prod.int.phx2.redhat.com [10.5.11.13]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id A27885D61D; Sun, 16 Dec 2018 13:16:28 +0000 (UTC) Received: from localhost.localdomain.com (ovpn-12-64.pek2.redhat.com [10.72.12.64]) by smtp.corp.redhat.com (Postfix) with ESMTP id 2326B608E6; Sun, 16 Dec 2018 13:16:20 +0000 (UTC) From: Lianbo Jiang To: linux-kernel@vger.kernel.org Cc: kexec@lists.infradead.org, tglx@linutronix.de, mingo@redhat.com, x86@kernel.org, akpm@linux-foundation.org, bhe@redhat.com, dyoung@redhat.com, linux-doc@vger.kernel.org Subject: [PATCH 0/2 v3] kdump,vmcoreinfo: Export the value of sme mask to vmcoreinfo Date: Sun, 16 Dec 2018 21:16:15 +0800 Message-Id: <20181216131617.2612-1-lijiang@redhat.com> X-Scanned-By: MIMEDefang 2.79 on 10.5.11.13 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.39]); Sun, 16 Dec 2018 13:16:28 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This patchset did two things: a. add a new document for vmcoreinfo This document lists some variables that export to vmcoreinfo, and briefly describles what these variables indicate. It should be instructive for many people who do not know the vmcoreinfo, and it would normalize the exported variable as a standard ABI between kernel and use-space. b. export the value of sme mask to vmcoreinfo For AMD machine with SME feature, makedumpfile tools need to know whether the crash kernel was encrypted or not. If SME is enabled in the first kernel, the crash kernel's page table(pgd/pud/pmd/pte) contains the memory encryption mask, so need to remove the sme mask to obtain the true physical address. Changes since v1: 1. No need to export a kernel-internal mask to userspace, so copy the value of sme_me_mask to a local variable 'sme_mask' and write the value of sme_mask to vmcoreinfo. 2. Add comment for the code. 3. Improve the patch log. 4. Add the vmcoreinfo documentation. Changes since v2: 1. Improve the vmcoreinfo document, add more descripts for these variables exported. 2. Fix spelling errors in the document. Lianbo Jiang (2): kdump: add the vmcoreinfo documentation kdump,vmcoreinfo: Export the value of sme mask to vmcoreinfo Documentation/kdump/vmcoreinfo.txt | 456 +++++++++++++++++++++++++++++ arch/x86/kernel/machine_kexec_64.c | 14 + 2 files changed, 470 insertions(+) create mode 100644 Documentation/kdump/vmcoreinfo.txt -- 2.17.1