On 10/27/18 at 11:10am, Borislav Petkov wrote: > On Sat, Oct 27, 2018 at 04:13:43PM +0800, Baoquan He wrote: > > Yes, agree. So sme_me_mask itself or the encryption bit number, both is > > fine. > > You need the encryption bit position and it better be properly formatted > and extracted into a vmcoreinfo-specific variable because we don't > expose arch-specific details like sme_me_mask to the outside. Not very sure about this, we have arch_crash_save_vmcoreinfo() in arch/x86/kernel/machine_kexec_64.c to export arch-specific stuffs outside. Is there any special reason about a mask in one architecture when expose it out? In fact it's only that bit position set mask, no other information. Surely it's also fine if we export encryption bit position, then convert it to mask in makedumpfile. > > > we may use cp to copy /proc/vmcore to a file directly, then analyze > > it in another compupter. This often happen when there's something > > wrong with makedumpfile, we need debug makedumpfile with the complete > > copied file. > > So for the analyze-on-another-computer scenario you absolutely must copy > anything from the first kernel decrypted because you can't decrypt it on > the other machine. > > Which means, in a sensitive environment, you probably should copy and > *encrypt* the dump again with gpg or so. Hmm, no matter it's makedumpfile or cp directly, when we read /proc/vmcore in kdump kernel, it will call __read_vmcore() or related functions in fs/proc/vmcore.c. With regarding to SME memory reading, Lianbo should have handle it in previous SME support in kdump patches. Just those page tables in crashed kernel are also memory content, they are decrypted and copied out, while with SME bit position enabled to indicate encryption, that bit position is added by kernel, now the 1st kernel is dead, we need wipe it out in makedumpfile when parsing. So this 'cp', it's still need be done in kdump kernel by 'cp' /proc/vmcore. Thanks Baoquan _______________________________________________ kexec mailing list kexec@xxxxxxxxxxxxxxxxxxx http://lists.infradead.org/mailman/listinfo/kexec