[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20181202030839.29945-1-lijiang@redhat.com>
Date: Sun, 2 Dec 2018 11:08:37 +0800
From: Lianbo Jiang <lijiang@...hat.com>
To: linux-kernel@...r.kernel.org
Cc: kexec@...ts.infradead.org, tglx@...utronix.de, mingo@...hat.com,
bp@...en8.de, x86@...nel.org, akpm@...ux-foundation.org,
bhe@...hat.com, dyoung@...hat.com
Subject: [PATCH 0/2 v2] kdump,vmcoreinfo: Export the value of sme mask to vmcoreinfo
This patchset did two things:
a. add a new document for vmcoreinfo
This document lists some variables that export to vmcoreinfo, and briefly
describles what these variables indicate. It should be instructive for
many people who do not know the vmcoreinfo, and it also normalizes the
exported variable as a standard ABI between kernel and use-space.
b. export the value of sme mask to vmcoreinfo
For AMD machine with SME feature, makedumpfile tools need to know whether
the crash kernel was encrypted or not. If SME is enabled in the first
kernel, the crash kernel's page table(pgd/pud/pmd/pte) contains the
memory encryption mask, so need to remove the sme mask to obtain the true
physical address.
Changes since v1:
1. No need to export a kernel-internal mask to userspace, so copy the
value of sme_me_mask to a local variable 'sme_mask' and write the value
of sme_mask to vmcoreinfo.
2. Add comment for the code.
3. Improve the patch log.
4. Add the vmcoreinfo documentation.
Lianbo Jiang (2):
kdump: add the vmcoreinfo documentation
kdump,vmcoreinfo: Export the value of sme mask to vmcoreinfo
Documentation/kdump/vmcoreinfo.txt | 400 +++++++++++++++++++++++++++++
arch/x86/kernel/machine_kexec_64.c | 14 +
2 files changed, 414 insertions(+)
create mode 100644 Documentation/kdump/vmcoreinfo.txt
--
2.17.1
Powered by blists - more mailing lists