Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp3546592imu; Mon, 17 Dec 2018 23:36:11 -0800 (PST) X-Google-Smtp-Source: AFSGD/XfpfL4Yzn+6UXd7aHLS/u+7XycFbrDBc6YxONv84N6kiSFZM7dIqSgs1WcwRq6tJFWn91c X-Received: by 2002:a62:9f01:: with SMTP id g1mr15589404pfe.223.1545118571100; Mon, 17 Dec 2018 23:36:11 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1545118571; cv=none; d=google.com; s=arc-20160816; b=xnj30RKYEBUXzaAmzgOaMU8T8hNzgR51T4Gs/9L21HzaXrPs1C3xHJCg4JuTn546oH tyY75mF3e3l0feT/lk8tK28MT3LborfF/C8emZZxznO2i98OrQOsVMblLV+XQK7WM2AG RDHc6JNgXCaUoXxoFlC6DL84zjv0K2z6lvmig5dk9CsF2a+w7a5pHoIUr9ssgE0sZdj6 l7lfbiYnyY1tdTEGaJdL1DTTg3W29Lom9N9TriJETLdDs+RRcFN1PDdCxDPOc1+vx4E2 67qtvqFQsT3y0ln7/QeDJLfWDoKLaNZnjdrLBYt+q0rvFHZVjIsmbBXSOGZwvzlO+0v8 Z6Bw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject; bh=+pOt6fhWhwHCg3O5qgBU11SlGVJ2UF6LsDEIcXdmsKo=; b=Lc3rAV5gcPpd8qu3W7DhwWAbmvOYsculUpCfX8r130EmjM+0JEuDQwFlqOIMaQFNXv 7NzYDLeaDUDbl/J67+9pqMHsoFIOTQ+gu88NTwWc3e2A0A4pTcQfwgP2QsTF819Uic4D evudMn5zc0SlEG4iHrQp38wS9ofaV8kRnZqXHQthLpSnC88tgWgTyl0uq88RzRog5s+H HMkYh+T667/RmqDCcGJJSNFQpc3P875KOVXEOEu6r9S4/pj3vOY6qUjqcX6EgLXqVHx5 fPis0ZpQkG+wurqFdmef+HDw9tK2jKB/vMDsIV5rI7CjCX+mZBiwqtI/T9sQvNZBLkwS O3PA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id h3si12871847pgl.468.2018.12.17.23.35.56; Mon, 17 Dec 2018 23:36:11 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726492AbeLRHez (ORCPT + 99 others); Tue, 18 Dec 2018 02:34:55 -0500 Received: from mx1.redhat.com ([209.132.183.28]:47778 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726316AbeLRHey (ORCPT ); Tue, 18 Dec 2018 02:34:54 -0500 Received: from smtp.corp.redhat.com (int-mx07.intmail.prod.int.phx2.redhat.com [10.5.11.22]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 666C5C02E632; Tue, 18 Dec 2018 07:34:54 +0000 (UTC) Received: from localhost.localdomain (ovpn-12-60.pek2.redhat.com [10.72.12.60]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 7D3D7100190E; Tue, 18 Dec 2018 07:34:47 +0000 (UTC) Subject: Re: [PATCH 2/2 v3] kdump,vmcoreinfo: Export the value of sme mask to vmcoreinfo To: Borislav Petkov Cc: linux-kernel@vger.kernel.org, kexec@lists.infradead.org, tglx@linutronix.de, mingo@redhat.com, x86@kernel.org, akpm@linux-foundation.org, bhe@redhat.com, dyoung@redhat.com, linux-doc@vger.kernel.org References: <20181216131617.2612-1-lijiang@redhat.com> <20181216131617.2612-3-lijiang@redhat.com> <20181217130129.GE12165@zn.tnic> From: lijiang Message-ID: Date: Tue, 18 Dec 2018 15:34:43 +0800 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.9.1 MIME-Version: 1.0 In-Reply-To: <20181217130129.GE12165@zn.tnic> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 8bit X-Scanned-By: MIMEDefang 2.84 on 10.5.11.22 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.32]); Tue, 18 Dec 2018 07:34:54 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 在 2018年12月17日 21:01, Borislav Petkov 写道: > On Sun, Dec 16, 2018 at 09:16:17PM +0800, Lianbo Jiang wrote: >> For AMD machine with SME feature, makedumpfile tools need to know >> whether the crash kernel was encrypted or not. If SME is enabled >> in the first kernel, the crash kernel's page table(pgd/pud/pmd/pte) >> contains the memory encryption mask, so need to remove the sme mask >> to obtain the true physical address. >> >> Signed-off-by: Lianbo Jiang >> --- >> arch/x86/kernel/machine_kexec_64.c | 14 ++++++++++++++ >> 1 file changed, 14 insertions(+) >> >> diff --git a/arch/x86/kernel/machine_kexec_64.c b/arch/x86/kernel/machine_kexec_64.c >> index 4c8acdfdc5a7..1860fe24117d 100644 >> --- a/arch/x86/kernel/machine_kexec_64.c >> +++ b/arch/x86/kernel/machine_kexec_64.c >> @@ -352,10 +352,24 @@ void machine_kexec(struct kimage *image) >> >> void arch_crash_save_vmcoreinfo(void) >> { >> + u64 sme_mask = sme_me_mask; >> + >> VMCOREINFO_NUMBER(phys_base); >> VMCOREINFO_SYMBOL(init_top_pgt); >> vmcoreinfo_append_str("NUMBER(pgtable_l5_enabled)=%d\n", >> pgtable_l5_enabled()); >> + /* >> + * Currently, the local variable 'sme_mask' stores the value of >> + * sme_me_mask(bit 47), and also write the value of sme_mask to >> + * the vmcoreinfo. >> + * If need, the bit(sme_mask) might be redefined in the future, >> + * but the 'bit63' will be reserved. >> + * For example: >> + * [ misc ][ enc bit ][ other misc SME info ] >> + * 0000_0000_0000_0000_1000_0000_0000_0000_0000_0000_..._0000 >> + * 63 59 55 51 47 43 39 35 31 27 ... 3 >> + */ > > This text belongs into the document. > Ok, i will move it into VMCOREINFO document. Thanks.