Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp3060681imu; Sun, 6 Jan 2019 17:50:41 -0800 (PST) X-Google-Smtp-Source: AFSGD/Uo9DCF3WcxwgWfIcTdpcyh0d+iJXdEKE5gu1M+zjCytnadmF4yh6A1vCmJnLNCKv09OVdX X-Received: by 2002:a62:184e:: with SMTP id 75mr60110961pfy.28.1546825841467; Sun, 06 Jan 2019 17:50:41 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1546825841; cv=none; d=google.com; s=arc-20160816; b=UX/6qLNxZF7V5Wh7Iq5h68MHJj73cGHLCtFhVwPdPLJGeTHPS4vkl1uOOGZNNgx43w UQIRUqsM2+ac/fKLWaJ0b96haV8pfqaVF5fOdKBNwoi1XYQilASnTsBbuOpd+OZN8X49 R+W7wWHewKVfONSzE1Eyxt2wMtvneTMNpFJrwd2203zhETMbPSvqNWUvvTzWQo4YcVbc fKGmwH5lVmEHuPOXX5ldeLSex1RBDf72MEz2VMnR1HW0G5Z5mqLQ2oNoQOAMu9QlY+xV LPKwV/xFf56EtAfK7Z6BlhWuI6dJJdzt25r0ZPrwfjmcOZhVHIxGIiqFQw91Iz29nXwy NEUA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from; bh=esdtdIRBzRn6wCL0VVm0kbM/DLIAXRm9f417RznUbqk=; b=UVpR2RRjxPlwWkSk6y5vwAX5mHzAdPCr6pBfvdNUj7N+GNZ2KJUUOVZ4HdoWL5Bl+o WTVuarXR+6yiXkrOsEWhm+2ejtEPJ/hSGsU84jFtb6WtY0hebzeW6xLWO3lCqwUYCeue mjYWQ6IP8wZ3bIr9Wf2mKKi/2iFNx/VDTY1lvMEcAVHcAcgefnjgBeQ+B/OSRziFdvEE cxp0x7PuktNCcsHWKp8lhcyNKHPpbOLObrGNfunVh0Y+9LWKOD7FbOqiJvpfDaJxz4sV 3DYjDnDV++TW52Lpo+rT51Z7y+KzNPWHwt/spG1o9sMh/SvFZkv8dD7t4qaZO74IexGK 8vmA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d9si16973658plr.127.2019.01.06.17.50.26; Sun, 06 Jan 2019 17:50:41 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726374AbfAGBsG (ORCPT + 99 others); Sun, 6 Jan 2019 20:48:06 -0500 Received: from mx1.redhat.com ([209.132.183.28]:50666 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726160AbfAGBsG (ORCPT ); Sun, 6 Jan 2019 20:48:06 -0500 Received: from smtp.corp.redhat.com (int-mx08.intmail.prod.int.phx2.redhat.com [10.5.11.23]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id C96FFC04958E; Mon, 7 Jan 2019 01:48:05 +0000 (UTC) Received: from localhost.localdomain.com (ovpn-12-80.pek2.redhat.com [10.72.12.80]) by smtp.corp.redhat.com (Postfix) with ESMTP id C5FF419741; Mon, 7 Jan 2019 01:47:59 +0000 (UTC) From: Lianbo Jiang To: linux-kernel@vger.kernel.org Cc: kexec@lists.infradead.org, tglx@linutronix.de, mingo@redhat.com, bp@alien8.de, x86@kernel.org, akpm@linux-foundation.org, bhe@redhat.com, dyoung@redhat.com, linux-doc@vger.kernel.org, k-hagio@ab.jp.nec.com, anderson@redhat.com Subject: [PATCH 2/2 v5] kdump,vmcoreinfo: Export the value of sme mask to vmcoreinfo Date: Mon, 7 Jan 2019 09:47:34 +0800 Message-Id: <20190107014734.9730-3-lijiang@redhat.com> In-Reply-To: <20190107014734.9730-1-lijiang@redhat.com> References: <20190107014734.9730-1-lijiang@redhat.com> X-Scanned-By: MIMEDefang 2.84 on 10.5.11.23 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.31]); Mon, 07 Jan 2019 01:48:06 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org For AMD machine with SME feature, makedumpfile tools need to know whether the crash kernel was encrypted or not. If SME is enabled in the first kernel, the crash kernel's page table(pgd/pud/pmd/pte) contains the memory encryption mask, so need to remove the sme mask to obtain the true physical address. Signed-off-by: Lianbo Jiang --- arch/x86/kernel/machine_kexec_64.c | 3 +++ 1 file changed, 3 insertions(+) diff --git a/arch/x86/kernel/machine_kexec_64.c b/arch/x86/kernel/machine_kexec_64.c index 4c8acdfdc5a7..bc4108096b18 100644 --- a/arch/x86/kernel/machine_kexec_64.c +++ b/arch/x86/kernel/machine_kexec_64.c @@ -352,10 +352,13 @@ void machine_kexec(struct kimage *image) void arch_crash_save_vmcoreinfo(void) { + u64 sme_mask = sme_me_mask; + VMCOREINFO_NUMBER(phys_base); VMCOREINFO_SYMBOL(init_top_pgt); vmcoreinfo_append_str("NUMBER(pgtable_l5_enabled)=%d\n", pgtable_l5_enabled()); + VMCOREINFO_NUMBER(sme_mask); #ifdef CONFIG_NUMA VMCOREINFO_SYMBOL(node_data); -- 2.17.1