Is Secure Memory Encryption supported on my AMD platform?

AMD的SME(安全内存加密)特性自RHEL 7.5起启用,使用单一密钥加密系统内存。然而,在RHEL 7&8上运行时存在已知问题,如kdump实用工具的不兼容性和某些存储控制器导致的启动失败。Red Hat正在与合作伙伴解决这些问题。

https://access.redhat.com/articles/4255251

Updated 2019年七月20日04:25 - 

English 

AMD's SME (Secure Memory Encryption) feature was first enabled in Red Hat Enterprise Linux 7.5. This technology uses a single key to encrypt system memory which is generated by the AMD Secure Processor at boot.

SME requires enablement in either the system BIOS or operating system. When enabled in the BIOS, memory encryption is transparent and can be run with any operating system. However, this feature is turned off by default on all systems booting the Red Hat Enterprise Linux kernel and must be turned on with a kernel boot parameter.

At this time there are known issues when running SME on Red Hat Enterprise Linux 7 & 8. The kdump utility, RHEL’s kernel crash dumping mechanism, is currently incompatible with some systems running in SME enabled mode. It could be necessary to disable SME before attempting to capture a kdump for debugging purposes. Red Hat Quality Engineering has also seen issues with select storage controllers which can cause the system to encounter boot failures when SME is enabled. Due to the issues discovered on this technology, certification of systems with AMD Epyc processors was conducted with SME disabled. Once the AMD SME technology has stabilized, certification will be conducted with SME enabled.

Red Hat is committed to enabling the SME technology and is working with our partners AMD, Dell, and HPE to resolve these issues as quickly as possible. Until that time Red Hat recommends you do not enable SME on your production systems. If you experience SME related issues on your AMD Epyc systems you are encouraged to report them in the Red Hat Customer Portal so Red Hat Engineering and Quality Engineering Teams can work with our OEM partners to resolve them as quickly as possible.

To verify if SME is currently active on a system, use the following command:

Raw

# dmesg|grep -i sme

If SME is enabled and active, the following output should be seen:

Raw

[    0.000000] AMD Secure Memory Encryption (SME) active

To disable SME on affected systems, look for and remove the following kernel boot parameter:

Raw

mem_encrypt=on

Then reboot the system to disable Secure Memory Encryption. If SME is enabled in the system BIOS, contact your OEM provider for details on how to correctly disable the technology before attempting a kdump.

[*] Symmetric multi-processing support │ │ │ │ -*- Support x2apic │ │ │ │ [ ] Enable MSI and MSI-x delivery by posted interrupts (NEW) │ │ │ │ [*] Enable MPS table │ │ │ │ [ ] x86 CPU resource control support (NEW) │ │ │ │ [ ] Flexible Return and Event Delivery (NEW) │ │ │ │ [*] Support for extended (non-PC) x86 platforms │ │ │ │ [*] Numascale NumaChip │ │ │ │ [ ] ScaleMP vSMP │ │ │ │ [ ] SGI Ultraviolet │ │ │ │ [ ] Goldfish (Virtual Platform) │ │ │ │ [ ] Intel MID platform support │ │ │ │ [*] Intel Low Power Subsystem Support │ │ │ │ [*] AMD ACPI2Platform devices support │ │ │ │ -*- Intel SoC IOSF Sideband support for SoC platforms │ │ │ │ [*] Enable IOSF sideband access through debugfs │ │ │ │ [*] Single-depth WCHAN output │ │ │ │ [*] Linux guest support ---> │ │ │ │ Processor family (Intel Atom) ---> │ │ │ │ [*] Supported processor vendors ---> │ │ │ │ -*- Enable DMI scanning │ │ │ │ [*] Old AMD GART IOMMU support │ │ │ │ [*] Enable Maximum number of SMP Processors and NUMA Nodes [*] Cluster scheduler support (NEW) │ │ │ │ [*] Multi-core scheduler support │ │ │ │ [*] CPU core priorities scheduler support │ │ │ │ [*] Reroute for broken boot IRQs │ │ │ │ [*] Machine Check / overheating reporting │ │ │ │ [*] Support for deprecated /dev/mcelog character device │ │ │ │ [*] Intel MCE features │ │ │ │ [*] AMD MCE features │ │ │ │ <M> Machine check injector support │ │ │ │ Performance monitoring ---> │ │ │ │ [*] Enable support for 16-bit segments │ │ │ │ [*] Enable vsyscall emulation │ │ │ │ [*] IOPERM and IOPL Emulation (NEW) │ │ │ │ [ ] Late microcode loading (DANGEROUS) (NEW) │ │ │ │ <M> /dev/cpu/*/msr - Model-specific register support │ │ │ │ <M> /dev/cpu/*/cpuid - CPU information support │ │ │ │ [ ] Enable 5-level page tables support │ │ │ │ [ ] Enable statistic for Change Page Attribute (NEW) │ │ │ │ [*] AMD Secure Memory Encryption (SME) support │ │ │ │ [*] NUMA Memory Allocation and Scheduler Support │ │ │ │ [*] Old style AMD Opteron NUMA detection [*] ACPI NUMA detection │ │ │ │ [*] Enable sysfs memory/probe interface │ │ │ │ <*> Support non-standard NVDIMMs and ADR protected memory │ │ │ │ [*] Check for low memory corruption │ │ │ │ [*] Set the default setting of memory_corruption_check │ │ │ │ [*] MTRR (Memory Type Range Register) support │ │ │ │ [*] MTRR cleanup support │ │ │ │ (1) MTRR cleanup enable value (0-1) │ │ │ │ (1) MTRR cleanup spare reg num (0-7) │ │ │ │ [*] x86 PAT support │ │ │ │ [*] User Mode Instruction Prevention (NEW) │ │ │ │ [*] Memory Protection Keys │ │ │ │ TSX enable mode (off) ---> │ │ │ │ [ ] Software Guard eXtensions (SGX) (NEW) │ │ │ │ [*] EFI runtime service support [*] EFI handover protocol (DEPRECATED) (NEW) │ │ │ │ [*] EFI mixed-mode support │ │ │ │ -*- Export EFI runtime maps to sysfs │ │ │ │ Timer frequency (250 HZ) ---> │ │ │ │ (0x1000000) Physical address where the kernel is loaded │ │ │ │ -*- Build a relocatable kernel │ │ │ │ [*] Randomize the address of the kernel image (KASLR) │ │ │ │ (0x200000) Alignment value to which kernel should be aligned │ │ │ │ [*] Randomize the kernel memory sections │ │ │ │ (0xa) Physical memory mapping padding │ │ │ │ [ ] Disable the 32-bit vDSO (needed for glibc 2.3.3) │ │ │ │ vsyscall table for legacy applications (Emulate execution only) ---> │ │ │ │ [ ] Built-in kernel command line │ │ │ │ [*] Enable the LDT (local descriptor table) │ │ │ │ [ ] Enforce strict size checking for sigaltstack (NEW) │ │ │ │ [*] Kernel Live Patching │ │ │ └───────────────────────────────────────────────────────────────────这里面有没有我可以精简的
最新发布
08-08
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值