From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1756163AbdEDOOH (ORCPT ); Thu, 4 May 2017 10:14:07 -0400 Received: from mail-co1nam03on0060.outbound.protection.outlook.com ([104.47.40.60]:10912 "EHLO NAM03-CO1-obe.outbound.protection.outlook.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1754785AbdEDONo (ORCPT ); Thu, 4 May 2017 10:13:44 -0400 Authentication-Results: google.com; dkim=none (message not signed) header.d=none;google.com; dmarc=none action=none header.from=amd.com; Subject: Re: [PATCH v5 31/32] x86: Add sysfs support for Secure Memory Encryption To: Dave Young , Dave Hansen References: <20170418211612.10190.82788.stgit@tlendack-t1.amdoffice.net> <20170418212212.10190.73484.stgit@tlendack-t1.amdoffice.net> <1498ec98-b19d-c47d-902b-a68870a3f860@intel.com> <20170427072547.GB15297@dhcp-128-65.nay.redhat.com> CC: , , , , , , , , , , Thomas Gleixner , Rik van Riel , Brijesh Singh , Toshimitsu Kani , Arnd Bergmann , Jonathan Corbet , Matt Fleming , Joerg Roedel , =?UTF-8?B?UmFkaW0gS3LEjW3DocWZ?= , Konrad Rzeszutek Wilk , Andrey Ryabinin , Ingo Molnar , "Michael S. Tsirkin" , Andy Lutomirski , "H. Peter Anvin" , Borislav Petkov , Paolo Bonzini , Alexander Potapenko , Larry Woodman , Dmitry Vyukov From: Tom Lendacky Message-ID: <2abc7ad8-9d64-8617-44fe-1cb8af31e1f6@amd.com> Date: Thu, 4 May 2017 09:13:35 -0500 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:45.0) Gecko/20100101 Thunderbird/45.8.0 MIME-Version: 1.0 In-Reply-To: <20170427072547.GB15297@dhcp-128-65.nay.redhat.com> Content-Type: text/plain; charset="windows-1252"; format=flowed Content-Transfer-Encoding: 7bit X-Originating-IP: [165.204.78.1] X-ClientProxiedBy: BN6PR03CA0034.namprd03.prod.outlook.com (10.175.124.20) To DM5PR12MB1145.namprd12.prod.outlook.com (10.168.236.140) X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 83fd1a43-f49a-439f-5eb8-08d492f7c4af X-MS-Office365-Filtering-HT: Tenant X-Microsoft-Antispam: UriScan:;BCL:0;PCL:0;RULEID:(22001)(48565401081)(201703131423075)(201703031133081);SRVR:DM5PR12MB1145; X-Microsoft-Exchange-Diagnostics: 1;DM5PR12MB1145;3:y4ZrumQtH8TucFy64teVbVJ+h4ghyvQsWFtZtIpJy7RuSzXq0WIjBrWKgqjrC+KQZNz/Ne1rL8nkUdyxeIlW6slPhG7xrBSzZdEaKBWyC/CewBo4vFReeKhVEmub7ax8uyOzOxuK8A0IN5uxLaUbPSP/WEWMQ2dwCGCVshou+aUGjbiQHBe5IpwEfFJ7+TvDVkINKvBliuxMUCCYKfDteD0JxZ1QSih+W1Nz8B6smZ7iQdSyKeD/S0oZT1R7y0AcqQgxjSRsALh0wCvFeIUQALAzRoMVcnvpEXlDzhJgI2JrC5rMCt/n7696bkCz+j9m1SfEYMgcXv+kFsLhXGsNi3D3nLda/FEFAN9uLCkSbCM=;25:2uHT+JivxBPDIEWkarmvso0NfaUb+DZS8soZvkZgB9MzzkY90RyBiyhcWxEZEk2yGsGyUat6kMB4wQrWpO80Vq9W7qUJqeDJfx+krTZhWJmRkuzLxZEnw0qkNaotoqHRyd8GhnpKeFWDiQRNHPN+PI5YOgFLUAiFQfpJ+hdp77L6bPiZEv+ih+XRdWQ+za5oCMa04gLo9YCTyOFXq7O+fTX3n+Zjm+cWmsf7XVhMxeWi5Pw+gEdGlykjN+viQZW+QFbHClsqQacmov/ThMnXgSsg/qZwzSwSe6TayUxWUg0rYi+ZWCG56XYct2lV1J1eBQH8QASm0fJSrv6E8D2YA0KqeK/l876BgmVI0dpg7qe7wCy3BCiJk6ebIljy4sGhxSkLfW4I3OdV5jcgZgWYWBpGt16r7+rNGDt/REHHOBCHoTaLRUOMPX6SW/uFMAEg X-Microsoft-Exchange-Diagnostics: 1;DM5PR12MB1145;31:KUkJ8su47zgdpBCA/OGtPgc3OAyYWKqassqzQbdNpG/EoHQg54HzV7wwjGG4ZZyXobkUOM4mRSQ0teFsYhLJ5FHoZu9MI2p0UR6qzIlV2taobcTcbxcPVWx4n5aypKnLz7PcvfEt5Z0KUsiRVS2KM+mgjTCy4hBs10nOFk7W3Yussoy3CzSNJZPKtVa8ZvI2kdAQKBR7g+oCHvxWSAGdqWTgpbwdFAFgUXJNW9S7jzVQSpo+wpqiBIhAPPFE0Ptl;20:kc6Se9FS3wQvDMXINfcwA2e2j8y6gf+gl9I9q7Cz73CJDyOBq9RkJ2NxbcH7h/P6lfoFOZm9r/wgVmiAWiM+UEIKCBWqotAHf6N7ktKqde4oKKvwc4IXbZRAIjt0Joo2H/Ivu8GkR+pDLUson1SxcgiFgMfs5Mg1GoWmTB/pNrcKvSo8XdzA0NvnekHewHqg0dqAgTFWswGTm+Q7oBWPt6sv3dO3VmwuxrTKjGoBRGw/3IgrXEfWhGEMLh0/0QDClzhnl+m9AAvI7Xwve/xvO32/xlAwjRAkGphwJPVXiqhVcn6VT4hkdUWXWpL72TEQ8QroDSB5BAFLPhk6pap1w52rJHwcXxS6cZjQx8lK75kIFEw6sGjSzhdz7OyNBG9RdyqJ4h5Qc+H1fCMdev11Bmxx8qtq8MMqHk76umfxt6uJSziM0CVZIfj3xyQGgS2R2rlc4rUN+5HRf6BlIoVh7XscmI+1/a41RxS9ZenBQcI/Vs9pRUZur3TXuBElZRYI X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-Test: UriScan:; X-Exchange-Antispam-Report-CFA-Test: BCL:0;PCL:0;RULEID:(6040450)(601004)(2401047)(8121501046)(5005006)(3002001)(10201501046)(93006095)(93001095)(6055026)(6041248)(20161123555025)(20161123562025)(20161123564025)(20161123560025)(201703131423075)(201702281528075)(201703061421075)(201703061406153)(20161123558100)(6072148);SRVR:DM5PR12MB1145;BCL:0;PCL:0;RULEID:;SRVR:DM5PR12MB1145; X-Microsoft-Exchange-Diagnostics: 1;DM5PR12MB1145;4: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 X-Forefront-PRVS: 02973C87BC X-Forefront-Antispam-Report: SFV:NSPM;SFS:(10009020)(4630300001)(6049001)(6009001)(39410400002)(39860400002)(39850400002)(39400400002)(39840400002)(39450400003)(377454003)(24454002)(65826007)(229853002)(23746002)(36756003)(2950100002)(31696002)(86362001)(3260700006)(53546009)(4326008)(53936002)(5660300001)(4001350100001)(189998001)(81166006)(6486002)(230700001)(7416002)(25786009)(77096006)(3846002)(6116002)(8676002)(478600001)(66066001)(2906002)(6666003)(7736002)(305945005)(38730400002)(50986999)(54356999)(33646002)(47776003)(83506001)(50466002)(31686004)(42186005)(76176999)(64126003)(6246003)(93886004);DIR:OUT;SFP:1101;SCL:1;SRVR:DM5PR12MB1145;H:[10.236.64.250];FPR:;SPF:None;MLV:sfv;LANG:en; X-Microsoft-Exchange-Diagnostics: =?Windows-1252?Q?1;DM5PR12MB1145;23:coRlTf8G56mqlrcELlJIRyctzUA5QOvrHg4Sb?= =?Windows-1252?Q?NOKZN9ns53e0ln1CvYp41q04Jh9J0rCo98ydaMt8yKZkkz8iSx1uB68Z?= =?Windows-1252?Q?/GmgGH8Uia7LJsujPJHXEoC7bCIHOcJKHCKSLsugwU9orhHIRWJTkbBj?= =?Windows-1252?Q?EHZO3YYTO5JXLYIXRHFdB654zlnU8KO0knP9QadoK9X6IjNs2Mpb7v86?= =?Windows-1252?Q?Feyzf7sFZ1b7Yldg+V78TceCr5oXXDCapsrxDYpTjCevEz0rmdL6VpiL?= =?Windows-1252?Q?/aAc6tUJ980RE/PDnEPDH3ZLDFnYUDWZGiavJdHo6Ev99C2dG1kJw/1j?= =?Windows-1252?Q?gtIXjLvz4mlcGln2JxfCPQXzOVGkcdMo9eW0ZjuRheOtDwOTUwSuvozL?= =?Windows-1252?Q?Shl9RrR00TUR8i4i68dvkVTVrRdpVh1SR+ZvG0JTCfUulzWVa0pYN/KX?= =?Windows-1252?Q?g6FssBmEd+mueuXGM5VUZjQayN8c2hXzQELh7QOli2aAE2mvnBVdrpEk?= =?Windows-1252?Q?ZIJnAccYAX4v5yBmvRiXP8CMI4ahSt2cipVK9U7S182Cuf6oGp9J6pfM?= =?Windows-1252?Q?F4TzAJ+WV0z7ZTyUxUyplIfdLGIDvYcF0WWDTDNdB95KVWNfzHLeOfzC?= =?Windows-1252?Q?LFLMYc5phlrOrvcAy3vhBcKtVQxWxt9jYBSTtMGHs7+VenQkeyQXBHH6?= =?Windows-1252?Q?+3Vq+3/uQNTYlQVDjXJHV6FuhpatH54A3uG41yiloo1q3fRLDq4hHZUt?= =?Windows-1252?Q?2nz7HYhyZAaOjEzcihM7MSWsr9SuynvJ+bpCT0clhp4nzgXPzvQqVReh?= =?Windows-1252?Q?Noyh2DBmOlV+LPaq2SB8mTssnunxwix5Xgur9yFxvV7Exaomy6tyxBzG?= =?Windows-1252?Q?xaQo8sJEd5bu4p+TM6wW9x3VlYUo6EDWBLi09mHhoR9NRbE7ox9KGGP0?= =?Windows-1252?Q?4zbn4WoYoW8Sp0Fhk0FrqrivsHouqgWUJEXvOg5iMZeDrgiSeEJOq4Ae?= =?Windows-1252?Q?SkEphCCJx7HieSqADhOcC8yEd1hdNfgR86dWSVffqe0FvZDF0kGIOQNp?= =?Windows-1252?Q?Amu4C63mu4k7JBugrebWyYf0/O1ocI7KqDinmHrMuTkqcqb4tw59824J?= =?Windows-1252?Q?GXxKVmUiBBLAV8kh04JzJhzRVCenfhzv7KWqpSGRDi4Xc7Z38+CAKxLh?= =?Windows-1252?Q?U98Ce3n2gxNnrGAbI9ikWRq5Ch775Npz/bibfzSkTVoPZDh79ZQYRo1X?= =?Windows-1252?Q?kVrbGkEGw3bW+O21Dbcwll3B+cHWCS9DlgGJTMT/C4c7kpmcQHpMw8M/?= =?Windows-1252?Q?7jGXVTpcs7XK/ktNk3hbLmgHHTH8DKJavVKlAiw/uMCVjurinjWNmpWs?= =?Windows-1252?Q?MOKZNDRPxFpZZf3QKMEEiasedxJhJXq44r5faEEVVBZj8YxNfoq3ro?= =?Windows-1252?Q?=3D?= X-Microsoft-Exchange-Diagnostics: 1;DM5PR12MB1145;6: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;5:3xLzOcZr5dCnQmLoyKU6pwMdefR9SzA+ElKPSbDU/eZ7TnydENE/CFZQzK4VHS9ss2BhZp3KiVsyOAqJ5R3dLkqtFGOEXTCbc1pRlr+V9Xs4eR/8i3hmmfAcQLv1+Aq0P1ciinl6n1pgVlB6sZ2YYA==;24:roBHECrX0eIdX37J3jckZ0TBlB4mnPwQUEpxcX30aQE2v60dTbQNqtQPdxLEHUMJUwzKB7meXaQykY885jK5XXxWMtyou8Dkn2C3H+J2fYI= SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-Microsoft-Exchange-Diagnostics: 1;DM5PR12MB1145;7:LgV8q8x0N4FYI87B0gv0VV+CCOq1DYu7Hmz2/PoE+nihm8QWrpaDXPHpWzzNDj9enAHcx+t43E4BRNC3Sl7XpKkqicBLnaLZpXlAgHCWOKWEXKehn9ZezQ+pGfIGmfRlXxE5Tll9abZ2IEEfg6I5FGzyYh3LjvYHsat0RlIqBvmjQeHTlGURGO/PQx6EOAPcsPR+7gedf5Yr5fVPVP0gcTC5XOfqZZD8nJAQOQMwOc7bWL/onQa7AmWcqaNBXjbUbaF7I6vseimG4CC55wKh82+I/S8BF69Y3lRRQPhFcnS6lm2TZgYhP9xanzFx9lkMD4yIAb1xNCva8F1KD6Mw2Q==;20:ijFfPwmaxNRv88YYZLwbJA+FGiQZ0gAZxrRrrkSBDP3HifQUY/0DeW3UZ/sXMnjcjbeQj5B6MZ7+dLCqWPMsOl75S01nInGgnrXfZzRYnObfIFhXtPtuOb4gk8a8oHJXn2UfDAJmbGNjCJ+ny+fcSjSZlzbfvUZadcPQPiy0oIaGSNf/gmGW721uROHKTXwSaY/1rTtIhl7fUvKScd/BpcZQzMXnyPgEMY/7XKYNw/juO6hLustpMxwAczr6mb82 X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 04 May 2017 14:13:39.3134 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM5PR12MB1145 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 4/27/2017 2:25 AM, Dave Young wrote: > On 04/21/17 at 02:55pm, Dave Hansen wrote: >> On 04/18/2017 02:22 PM, Tom Lendacky wrote: >>> Add sysfs support for SME so that user-space utilities (kdump, etc.) can >>> determine if SME is active. >>> >>> A new directory will be created: >>> /sys/kernel/mm/sme/ >>> >>> And two entries within the new directory: >>> /sys/kernel/mm/sme/active >>> /sys/kernel/mm/sme/encryption_mask >> >> Why do they care, and what will they be doing with this information? > > Since kdump will copy old memory but need this to know if the old memory > was encrypted or not. With this sysfs file we can know the previous SME > status and pass to kdump kernel as like a kernel param. > > Tom, have you got chance to try if it works or not? Sorry, I haven't had a chance to test this yet. Thanks, Tom > > Thanks > Dave > From mboxrd@z Thu Jan 1 00:00:00 1970 From: Tom Lendacky Subject: Re: [PATCH v5 31/32] x86: Add sysfs support for Secure Memory Encryption Date: Thu, 4 May 2017 09:13:35 -0500 Message-ID: <2abc7ad8-9d64-8617-44fe-1cb8af31e1f6@amd.com> References: <20170418211612.10190.82788.stgit@tlendack-t1.amdoffice.net> <20170418212212.10190.73484.stgit@tlendack-t1.amdoffice.net> <1498ec98-b19d-c47d-902b-a68870a3f860@intel.com> <20170427072547.GB15297@dhcp-128-65.nay.redhat.com> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii"; Format="flowed" Content-Transfer-Encoding: 7bit Return-path: In-Reply-To: <20170427072547.GB15297-0VdLhd/A9Pl+NNSt+8eSiB/sF2h8X+2i0E9HWUfgJXw@public.gmane.org> List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: iommu-bounces-cunTk1MwBs9QetFLy7KEm3xJsTq8ys+cHZ5vskTnxNA@public.gmane.org Errors-To: iommu-bounces-cunTk1MwBs9QetFLy7KEm3xJsTq8ys+cHZ5vskTnxNA@public.gmane.org To: Dave Young , Dave Hansen Cc: linux-efi-u79uwXL29TY76Z2rM5mHXA@public.gmane.org, Brijesh Singh , Toshimitsu Kani , linux-doc-u79uwXL29TY76Z2rM5mHXA@public.gmane.org, Matt Fleming , linux-mm-Bw31MaZKKs3YtjvyW6yDsg@public.gmane.org, =?UTF-8?B?UmFkaW0gS3LEjW3DocWZ?= , Alexander Potapenko , "H. Peter Anvin" , Larry Woodman , linux-arch-u79uwXL29TY76Z2rM5mHXA@public.gmane.org, kvm-u79uwXL29TY76Z2rM5mHXA@public.gmane.org, Jonathan Corbet , x86-DgEjT+Ai2ygdnm+yROfE0A@public.gmane.org, kasan-dev-/JYPxA39Uh5TLH3MbocFFw@public.gmane.org, Ingo Molnar , Andrey Ryabinin , Rik van Riel , Arnd Bergmann , Borislav Petkov , Andy Lutomirski , Thomas Gleixner , Dmitry Vyukov , kexec-IAPFreCvJWM7uuMidbF8XUB+6BGkLq7r@public.gmane.org, linux-kernel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org, iommu-cunTk1MwBs9QetFLy7KEm3xJsTq8ys+cHZ5vskTnxNA@public.gmane.org, "Michael S. Tsirkin" List-Id: linux-efi@vger.kernel.org On 4/27/2017 2:25 AM, Dave Young wrote: > On 04/21/17 at 02:55pm, Dave Hansen wrote: >> On 04/18/2017 02:22 PM, Tom Lendacky wrote: >>> Add sysfs support for SME so that user-space utilities (kdump, etc.) can >>> determine if SME is active. >>> >>> A new directory will be created: >>> /sys/kernel/mm/sme/ >>> >>> And two entries within the new directory: >>> /sys/kernel/mm/sme/active >>> /sys/kernel/mm/sme/encryption_mask >> >> Why do they care, and what will they be doing with this information? > > Since kdump will copy old memory but need this to know if the old memory > was encrypted or not. With this sysfs file we can know the previous SME > status and pass to kdump kernel as like a kernel param. > > Tom, have you got chance to try if it works or not? Sorry, I haven't had a chance to test this yet. Thanks, Tom > > Thanks > Dave > From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail-io0-f198.google.com (mail-io0-f198.google.com [209.85.223.198]) by kanga.kvack.org (Postfix) with ESMTP id 69B696B0038 for ; Thu, 4 May 2017 10:13:44 -0400 (EDT) Received: by mail-io0-f198.google.com with SMTP id f102so16899393ioi.7 for ; Thu, 04 May 2017 07:13:44 -0700 (PDT) Received: from NAM03-DM3-obe.outbound.protection.outlook.com (mail-dm3nam03on0053.outbound.protection.outlook.com. [104.47.41.53]) by mx.google.com with ESMTPS id n6si324184otn.130.2017.05.04.07.13.43 for (version=TLS1_2 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Thu, 04 May 2017 07:13:43 -0700 (PDT) Subject: Re: [PATCH v5 31/32] x86: Add sysfs support for Secure Memory Encryption References: <20170418211612.10190.82788.stgit@tlendack-t1.amdoffice.net> <20170418212212.10190.73484.stgit@tlendack-t1.amdoffice.net> <1498ec98-b19d-c47d-902b-a68870a3f860@intel.com> <20170427072547.GB15297@dhcp-128-65.nay.redhat.com> From: Tom Lendacky Message-ID: <2abc7ad8-9d64-8617-44fe-1cb8af31e1f6@amd.com> Date: Thu, 4 May 2017 09:13:35 -0500 MIME-Version: 1.0 In-Reply-To: <20170427072547.GB15297@dhcp-128-65.nay.redhat.com> Content-Type: text/plain; charset="windows-1252"; format=flowed Content-Transfer-Encoding: 7bit Sender: owner-linux-mm@kvack.org List-ID: To: Dave Young , Dave Hansen Cc: linux-arch@vger.kernel.org, linux-efi@vger.kernel.org, kvm@vger.kernel.org, linux-doc@vger.kernel.org, x86@kernel.org, kexec@lists.infradead.org, linux-kernel@vger.kernel.org, kasan-dev@googlegroups.com, linux-mm@kvack.org, iommu@lists.linux-foundation.org, Thomas Gleixner , Rik van Riel , Brijesh Singh , Toshimitsu Kani , Arnd Bergmann , Jonathan Corbet , Matt Fleming , Joerg Roedel , =?UTF-8?B?UmFkaW0gS3LEjW3DocWZ?= , Konrad Rzeszutek Wilk , Andrey Ryabinin , Ingo Molnar , "Michael S. Tsirkin" , Andy Lutomirski , "H. Peter Anvin" , Borislav Petkov , Paolo Bonzini , Alexander Potapenko , Larry Woodman , Dmitry Vyukov On 4/27/2017 2:25 AM, Dave Young wrote: > On 04/21/17 at 02:55pm, Dave Hansen wrote: >> On 04/18/2017 02:22 PM, Tom Lendacky wrote: >>> Add sysfs support for SME so that user-space utilities (kdump, etc.) can >>> determine if SME is active. >>> >>> A new directory will be created: >>> /sys/kernel/mm/sme/ >>> >>> And two entries within the new directory: >>> /sys/kernel/mm/sme/active >>> /sys/kernel/mm/sme/encryption_mask >> >> Why do they care, and what will they be doing with this information? > > Since kdump will copy old memory but need this to know if the old memory > was encrypted or not. With this sysfs file we can know the previous SME > status and pass to kdump kernel as like a kernel param. > > Tom, have you got chance to try if it works or not? Sorry, I haven't had a chance to test this yet. Thanks, Tom > > Thanks > Dave > -- To unsubscribe, send a message with 'unsubscribe linux-mm' in the body to majordomo@kvack.org. For more info on Linux MM, see: http://www.linux-mm.org/ . Don't email: email@kvack.org From mboxrd@z Thu Jan 1 00:00:00 1970 Return-path: Received: from mail-dm3nam03on0058.outbound.protection.outlook.com ([104.47.41.58] helo=NAM03-DM3-obe.outbound.protection.outlook.com) by bombadil.infradead.org with esmtps (Exim 4.87 #1 (Red Hat Linux)) id 1d6HW8-0003Nc-KQ for kexec@lists.infradead.org; Thu, 04 May 2017 14:14:06 +0000 Subject: Re: [PATCH v5 31/32] x86: Add sysfs support for Secure Memory Encryption References: <20170418211612.10190.82788.stgit@tlendack-t1.amdoffice.net> <20170418212212.10190.73484.stgit@tlendack-t1.amdoffice.net> <1498ec98-b19d-c47d-902b-a68870a3f860@intel.com> <20170427072547.GB15297@dhcp-128-65.nay.redhat.com> From: Tom Lendacky Message-ID: <2abc7ad8-9d64-8617-44fe-1cb8af31e1f6@amd.com> Date: Thu, 4 May 2017 09:13:35 -0500 MIME-Version: 1.0 In-Reply-To: <20170427072547.GB15297@dhcp-128-65.nay.redhat.com> List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Content-Transfer-Encoding: 7bit Content-Type: text/plain; charset="us-ascii"; Format="flowed" Sender: "kexec" Errors-To: kexec-bounces+dwmw2=infradead.org@lists.infradead.org To: Dave Young , Dave Hansen Cc: linux-efi@vger.kernel.org, Brijesh Singh , Toshimitsu Kani , linux-doc@vger.kernel.org, Matt Fleming , linux-mm@kvack.org, =?UTF-8?B?UmFkaW0gS3LEjW3DocWZ?= , Alexander Potapenko , "H. Peter Anvin" , Larry Woodman , linux-arch@vger.kernel.org, kvm@vger.kernel.org, Jonathan Corbet , Joerg Roedel , x86@kernel.org, kasan-dev@googlegroups.com, Ingo Molnar , Andrey Ryabinin , Rik van Riel , Arnd Bergmann , Konrad Rzeszutek Wilk , Borislav Petkov , Andy Lutomirski , Thomas Gleixner , Dmitry Vyukov , kexec@lists.infradead.org, linux-kernel@vger.kernel.org, iommu@lists.linux-foundation.org, "Michael S. Tsirkin" , Paolo Bonzini On 4/27/2017 2:25 AM, Dave Young wrote: > On 04/21/17 at 02:55pm, Dave Hansen wrote: >> On 04/18/2017 02:22 PM, Tom Lendacky wrote: >>> Add sysfs support for SME so that user-space utilities (kdump, etc.) can >>> determine if SME is active. >>> >>> A new directory will be created: >>> /sys/kernel/mm/sme/ >>> >>> And two entries within the new directory: >>> /sys/kernel/mm/sme/active >>> /sys/kernel/mm/sme/encryption_mask >> >> Why do they care, and what will they be doing with this information? > > Since kdump will copy old memory but need this to know if the old memory > was encrypted or not. With this sysfs file we can know the previous SME > status and pass to kdump kernel as like a kernel param. > > Tom, have you got chance to try if it works or not? Sorry, I haven't had a chance to test this yet. Thanks, Tom > > Thanks > Dave > _______________________________________________ kexec mailing list kexec@lists.infradead.org http://lists.infradead.org/mailman/listinfo/kexec