Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp1865113imu; Thu, 10 Jan 2019 04:27:26 -0800 (PST) X-Google-Smtp-Source: ALg8bN7oktBpUjsC1zDzW7tpoAptPcSBHh3c1+ubl2p/Uizim92yYEE4A5cNEUsf80IfSB9qUruy X-Received: by 2002:a17:902:848d:: with SMTP id c13mr10218145plo.257.1547123245958; Thu, 10 Jan 2019 04:27:25 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1547123245; cv=none; d=google.com; s=arc-20160816; b=nMA+RyMW9MmVDLoWr29Up51TI4hEId7e1IewPIfdiaaza7Bd2Y1MXxAX/KDr7wAS6f kJgIQzCNeB5r3F8ZhE+1GvtE/a+vzcps7EUtP9TuxyZ2VuAsDX3EofGfzQebqNG/iFTg CIoJJgohsC8pHTSqZqkFwP6e4aW0GT9rM5JJa+t3B85C4E2sQhKERNtjszdm0iJ3zIXt H0LyjpsqpmmHpf69IfdhA0AVVGECQ5AXcQafc6R8rDzCmJIsnERW3JNx8GykF34NR9Xv +/Fv72UAkU99N2w5D2zIWM1ouQunmRBHRNwOt5WysZy7UMOgR47hNA3TjiOAd6boWkHi r5mw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from; bh=SARHYkJK2iDbwkAaWhq56OX/ArpdUwriYhqp02XTZ74=; b=jXhWDijOQRzNQ6vyVW1M+fseXm9R//QiptqCTs4CGrfoAgl3bOOeMYC0OpTCVKpvRK ocCkFrtttKLrBeF4xCYwek4T35YP9ZqSPP2PZaOubbpuY83hjS46QH5Iya1dgKHvkpCf +fzwypduJ4pR9mA2fRQi9DSkpOeshUwyTjH6nS6W5gg0Flk+CK7nu0gL7njJjUUdOSd5 yzp33YiDfXJg5jxA/F1S+qmzauDzG1l8WnI7fTG3krk7Sz2gjMX9NV331Q1hU/R7rfYw XrCyQONsjrYr1rwuGqnwPcBHPgPLmmpi5s6xGkfFw1apu1Fijda7t7OEnC6YcgcpaYQX FL3g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id l6si68798925pgg.592.2019.01.10.04.27.10; Thu, 10 Jan 2019 04:27:25 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728124AbfAJMT4 (ORCPT + 99 others); Thu, 10 Jan 2019 07:19:56 -0500 Received: from mx1.redhat.com ([209.132.183.28]:48069 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727214AbfAJMT4 (ORCPT ); Thu, 10 Jan 2019 07:19:56 -0500 Received: from smtp.corp.redhat.com (int-mx06.intmail.prod.int.phx2.redhat.com [10.5.11.16]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id ABCEF804F7; Thu, 10 Jan 2019 12:19:55 +0000 (UTC) Received: from localhost.localdomain.com (ovpn-12-80.pek2.redhat.com [10.72.12.80]) by smtp.corp.redhat.com (Postfix) with ESMTP id 831155C72C; Thu, 10 Jan 2019 12:19:47 +0000 (UTC) From: Lianbo Jiang To: linux-kernel@vger.kernel.org Cc: kexec@lists.infradead.org, tglx@linutronix.de, mingo@redhat.com, bp@alien8.de, x86@kernel.org, akpm@linux-foundation.org, bhe@redhat.com, dyoung@redhat.com, k-hagio@ab.jp.nec.com, anderson@redhat.com, linux-doc@vger.kernel.org Subject: [PATCH 0/2 v6] kdump,vmcoreinfo: Export the value of sme mask to vmcoreinfo Date: Thu, 10 Jan 2019 20:19:42 +0800 Message-Id: <20190110121944.6050-1-lijiang@redhat.com> X-Scanned-By: MIMEDefang 2.79 on 10.5.11.16 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.27]); Thu, 10 Jan 2019 12:19:55 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This patchset did two things: a. add a new document for vmcoreinfo This document lists some variables that export to vmcoreinfo, and briefly describles what these variables indicate. It should be instructive for many people who do not know the vmcoreinfo. b. export the value of sme mask to vmcoreinfo For AMD machine with SME feature, makedumpfile tools need to know whether the crashed kernel was encrypted or not. If SME is enabled in the first kernel, the crashed kernel's page table(pgd/pud/pmd/pte) contains the memory encryption mask, so makedumpfile needs to remove the sme mask to obtain the true physical address. Changes since v1: 1. No need to export a kernel-internal mask to userspace, so copy the value of sme_me_mask to a local variable 'sme_mask' and write the value of sme_mask to vmcoreinfo. 2. Add comment for the code. 3. Improve the patch log. 4. Add the vmcoreinfo documentation. Changes since v2: 1. Improve the vmcoreinfo document, add more descripts for these variables exported. 2. Fix spelling errors in the document. Changes since v3: 1. Still improve the vmcoreinfo document, and make it become more clear and easy to read. 2. Move sme_mask comments in the code to the vmcoreinfo document. 3. Improve patch log. Changes since v4: 1. Remove a command that dumping the VMCOREINFO contents from this document. 2. Merge the 'PG_buddy' and 'PG_offline' into the PG_* flag in this document. 3. Correct some of the mistakes in this document. Changes since v5: 1. Improve patch log. Lianbo Jiang (2): kdump: add the vmcoreinfo documentation kdump,vmcoreinfo: Export the value of sme mask to vmcoreinfo Documentation/kdump/vmcoreinfo.txt | 500 +++++++++++++++++++++++++++++ arch/x86/kernel/machine_kexec_64.c | 3 + 2 files changed, 503 insertions(+) create mode 100644 Documentation/kdump/vmcoreinfo.txt -- 2.17.1