Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp3059992imu; Sun, 6 Jan 2019 17:49:21 -0800 (PST) X-Google-Smtp-Source: ALg8bN77Q/ajse2JMSh0BfSgdF84WvB46C2LkhrN7Noy72+oz6ytjszOtqZRLjvAVPVJ8Esso87W X-Received: by 2002:a65:49cd:: with SMTP id t13mr9413753pgs.376.1546825761232; Sun, 06 Jan 2019 17:49:21 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1546825761; cv=none; d=google.com; s=arc-20160816; b=TQ0AkCoAJPj7Dp7SGIGnpTvpuyQJnJ94pbtDdDl6Ukh7JnjU9nxD8tROr55f7HRTpK 3yxM6BwNsLVP57BQ0XDRWdjh0kP8105+MipbeazdNqSvch8s+yUo4LRpgL6pME+VphKd BoLIItWvfgY4L3cHVJjYO5Iwl2M5FbmfmcKUllEm6iRzq2kS3wGJeLU/QYe6Z9TYn4AC UMR4bFGL9Z14hEYJ34qA1qiW+DETXsrNxL1T9VVUnz/ND+BSUS3MhA2w/UgZqIXaMvAN XLsjxCVSq5nbdExu78nyyR6DvKB/z5TVquLd/ntItllZb1EjTPJQf6VsWr3YEjLKdzIS CZ7A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from; bh=L7rp4xUfnYZajbGhr0ZKXLffLRJuvDOuJ2dSryIO+o4=; b=lhFDoyDA0YSMufC9S8hhdrZFOv0K56HskO26unTWjIB9A1QQ+x6S8ZKL8czwfl0pU4 xK4cXNZM241LjOBlWpwPjJtpRarq/f1KzQHk+nMD0cUKXHyfHBREGWrG1VWRRMSGx52B VvTgEOsDIxM4tSWBW5OU4Miwv56OlNFKo0+PFKPSHL6w5VDYd+LC7OX8+pxoCXxL88zY 8I0NHn16uTiviX2aDuOKbsht3KC8fW4EX+H2CEOrXFW+ltfkZDFyP6OxE8+b8mU/dR06 4Cr+fF+t0VkLZVH/FMG3n0NF8qL0MYW7Y3Noiq071JXwrW+xnIGj6DSAFLZsojkgoRR0 lZng== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 187si48038028pfv.238.2019.01.06.17.49.03; Sun, 06 Jan 2019 17:49:21 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726233AbfAGBrw (ORCPT + 99 others); Sun, 6 Jan 2019 20:47:52 -0500 Received: from mx1.redhat.com ([209.132.183.28]:40210 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726160AbfAGBrv (ORCPT ); Sun, 6 Jan 2019 20:47:51 -0500 Received: from smtp.corp.redhat.com (int-mx08.intmail.prod.int.phx2.redhat.com [10.5.11.23]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id A776588311; Mon, 7 Jan 2019 01:47:51 +0000 (UTC) Received: from localhost.localdomain.com (ovpn-12-80.pek2.redhat.com [10.72.12.80]) by smtp.corp.redhat.com (Postfix) with ESMTP id 81E6C19741; Mon, 7 Jan 2019 01:47:43 +0000 (UTC) From: Lianbo Jiang To: linux-kernel@vger.kernel.org Cc: kexec@lists.infradead.org, tglx@linutronix.de, mingo@redhat.com, bp@alien8.de, x86@kernel.org, akpm@linux-foundation.org, bhe@redhat.com, dyoung@redhat.com, linux-doc@vger.kernel.org, k-hagio@ab.jp.nec.com, anderson@redhat.com Subject: [PATCH 0/2 v5] kdump,vmcoreinfo: Export the value of sme mask to vmcoreinfo Date: Mon, 7 Jan 2019 09:47:32 +0800 Message-Id: <20190107014734.9730-1-lijiang@redhat.com> X-Scanned-By: MIMEDefang 2.84 on 10.5.11.23 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.28]); Mon, 07 Jan 2019 01:47:51 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This patchset did two things: a. add a new document for vmcoreinfo This document lists some variables that export to vmcoreinfo, and briefly describles what these variables indicate. It should be instructive for many people who do not know the vmcoreinfo, and it also normalizes the exported variable as a convention between kernel and use-space. b. export the value of sme mask to vmcoreinfo For AMD machine with SME feature, makedumpfile tools need to know whether the crash kernel was encrypted or not. If SME is enabled in the first kernel, the crash kernel's page table(pgd/pud/pmd/pte) contains the memory encryption mask, so need to remove the sme mask to obtain the true physical address. Changes since v1: 1. No need to export a kernel-internal mask to userspace, so copy the value of sme_me_mask to a local variable 'sme_mask' and write the value of sme_mask to vmcoreinfo. 2. Add comment for the code. 3. Improve the patch log. 4. Add the vmcoreinfo documentation. Changes since v2: 1. Improve the vmcoreinfo document, add more descripts for these variables exported. 2. Fix spelling errors in the document. Changes since v3: 1. Still improve the vmcoreinfo document, and make it become more clear and easy to read. 2. Move sme_mask comments in the code to the vmcoreinfo document. 3. Improve patch log. Changes since v4: 1. Remove a command that dumping the VMCOREINFO contents from this document. 2. Merge the 'PG_buddy' and 'PG_offline' into the PG_* flag in this document. 3. Correct some of the mistakes in this document. *** BLURB HERE *** Lianbo Jiang (2): kdump: add the vmcoreinfo documentation kdump,vmcoreinfo: Export the value of sme mask to vmcoreinfo Documentation/kdump/vmcoreinfo.txt | 500 +++++++++++++++++++++++++++++ arch/x86/kernel/machine_kexec_64.c | 3 + 2 files changed, 503 insertions(+) create mode 100644 Documentation/kdump/vmcoreinfo.txt -- 2.17.1