Received: by 2002:ac0:a5b6:0:0:0:0:0 with SMTP id m51-v6csp1673158imm; Thu, 14 Jun 2018 01:48:52 -0700 (PDT) X-Google-Smtp-Source: ADUXVKLaDSgfK9ZDY5bYb2FUpWlQ/YCOJ/DRWwArtfW45xTuH6QjMsnK5puZg2jr3eO7X7/o4uEl X-Received: by 2002:a17:902:42c3:: with SMTP id h61-v6mr1999635pld.319.1528966132491; Thu, 14 Jun 2018 01:48:52 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1528966132; cv=none; d=google.com; s=arc-20160816; b=xBHatm7NowT4aKcaLVsEkDxmuObukKvFLMVDzNheAFLnJp2zGWPXuVkAVOPO+xslJO lnvvGfe+34VnZ8TL3cGmzSrKsiP19pHrJ/69zIDgF+UH+bV66cFR76GqSvnwBcbQH1Ob tBSAgmGVSOnXonUqkZ0TjLHmwOBpZjuktS9Q0GOFzolMDMXI7vK4abAm0I8nqp+EsH57 5lXo1sI4z5OMfdGFvwdZpXuQXM79smexabLgtHiSb97bZeXA8MBQR10U6AMVAOItOsFx 8BxP2H/VY5fcUgb+weMLqhsOJVpF5budMzaYFwdKPx0Qt5Wz9xuGDqCKm0lLlwDaLvEt gGkg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:arc-authentication-results; bh=I0qyMlbJfXFWkaqOPHt0ZTzpvBNQCg6ahQ+bWR/m0pU=; b=QTT98jwiQ5ENtdhd45Rs8AgAecHJN1Pa7fePUZFkbzpWQw32SgDh/CtLjIjVPnhEGP 6lzFcnbTq5EHi7Tf8KnQQq7Gm/9xeY9TxRfhPy+ZphnA6EugShyLDBmgRljOQa6rZMBZ XJhxW4MIa87BsRCE0LpkrBbUZ+V/6AJgoqZH97CzyrLq205vI6wjWy1frmUGqnXfgOTM dT/vsgI+Ky1dFSfdKwGIU1u0vbHO2Cvme2cj/yi3h65dx/BiXXUS9tQ73l2fgyz7fPCe He3sT1zyOQiQWATgHTy5AK9M9OxzoD5MthXTSxx30kZDwzCMBI8nAR9ezqBq4TtFyrUa wz+A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e88-v6si5026165pfk.198.2018.06.14.01.48.38; Thu, 14 Jun 2018 01:48:52 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754846AbeFNIsJ (ORCPT + 99 others); Thu, 14 Jun 2018 04:48:09 -0400 Received: from mx3-rdu2.redhat.com ([66.187.233.73]:42892 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1754602AbeFNIsA (ORCPT ); Thu, 14 Jun 2018 04:48:00 -0400 Received: from smtp.corp.redhat.com (int-mx05.intmail.prod.int.rdu2.redhat.com [10.11.54.5]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 9C8FC8011059; Thu, 14 Jun 2018 08:47:59 +0000 (UTC) Received: from localhost.localdomain.com (ovpn-12-137.pek2.redhat.com [10.72.12.137]) by smtp.corp.redhat.com (Postfix) with ESMTP id 67B631C667; Thu, 14 Jun 2018 08:47:57 +0000 (UTC) From: Lianbo Jiang To: linux-kernel@vger.kernel.org Cc: kexec@lists.infradead.org, thomas.lendacky@amd.com, dyoung@redhat.com Subject: [PATCH 1/2 V2] Add a function(ioremap_encrypted) for kdump when AMD sme enabled. Date: Thu, 14 Jun 2018 16:47:47 +0800 Message-Id: <20180614084748.9617-2-lijiang@redhat.com> In-Reply-To: <20180614084748.9617-1-lijiang@redhat.com> References: <20180614084748.9617-1-lijiang@redhat.com> X-Scanned-By: MIMEDefang 2.79 on 10.11.54.5 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.8]); Thu, 14 Jun 2018 08:47:59 +0000 (UTC) X-Greylist: inspected by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.8]); Thu, 14 Jun 2018 08:47:59 +0000 (UTC) for IP:'10.11.54.5' DOMAIN:'int-mx05.intmail.prod.int.rdu2.redhat.com' HELO:'smtp.corp.redhat.com' FROM:'lijiang@redhat.com' RCPT:'' Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org It is convenient to remap the old memory encrypted to the second kernel by calling ioremap_encrypted(). Signed-off-by: Lianbo Jiang --- Some changes based on V1: 1. remove the sme_active() check in __ioremap_caller(). arch/x86/include/asm/io.h | 3 +++ arch/x86/mm/ioremap.c | 24 ++++++++++++++++-------- 2 files changed, 19 insertions(+), 8 deletions(-) diff --git a/arch/x86/include/asm/io.h b/arch/x86/include/asm/io.h index f6e5b93..989d60b 100644 --- a/arch/x86/include/asm/io.h +++ b/arch/x86/include/asm/io.h @@ -192,6 +192,9 @@ extern void __iomem *ioremap_cache(resource_size_t offset, unsigned long size); #define ioremap_cache ioremap_cache extern void __iomem *ioremap_prot(resource_size_t offset, unsigned long size, unsigned long prot_val); #define ioremap_prot ioremap_prot +extern void __iomem *ioremap_encrypted(resource_size_t phys_addr, + unsigned long size); +#define ioremap_encrypted ioremap_encrypted /** * ioremap - map bus memory into CPU space diff --git a/arch/x86/mm/ioremap.c b/arch/x86/mm/ioremap.c index c63a545..24e0920 100644 --- a/arch/x86/mm/ioremap.c +++ b/arch/x86/mm/ioremap.c @@ -131,7 +131,8 @@ static void __ioremap_check_mem(resource_size_t addr, unsigned long size, * caller shouldn't need to know that small detail. */ static void __iomem *__ioremap_caller(resource_size_t phys_addr, - unsigned long size, enum page_cache_mode pcm, void *caller) + unsigned long size, enum page_cache_mode pcm, + void *caller, bool encrypted) { unsigned long offset, vaddr; resource_size_t last_addr; @@ -199,7 +200,7 @@ static void __iomem *__ioremap_caller(resource_size_t phys_addr, * resulting mapping. */ prot = PAGE_KERNEL_IO; - if (sev_active() && mem_flags.desc_other) + if ((sev_active() && mem_flags.desc_other) || encrypted) prot = pgprot_encrypted(prot); switch (pcm) { @@ -291,7 +292,7 @@ void __iomem *ioremap_nocache(resource_size_t phys_addr, unsigned long size) enum page_cache_mode pcm = _PAGE_CACHE_MODE_UC_MINUS; return __ioremap_caller(phys_addr, size, pcm, - __builtin_return_address(0)); + __builtin_return_address(0), false); } EXPORT_SYMBOL(ioremap_nocache); @@ -324,7 +325,7 @@ void __iomem *ioremap_uc(resource_size_t phys_addr, unsigned long size) enum page_cache_mode pcm = _PAGE_CACHE_MODE_UC; return __ioremap_caller(phys_addr, size, pcm, - __builtin_return_address(0)); + __builtin_return_address(0), false); } EXPORT_SYMBOL_GPL(ioremap_uc); @@ -341,7 +342,7 @@ EXPORT_SYMBOL_GPL(ioremap_uc); void __iomem *ioremap_wc(resource_size_t phys_addr, unsigned long size) { return __ioremap_caller(phys_addr, size, _PAGE_CACHE_MODE_WC, - __builtin_return_address(0)); + __builtin_return_address(0), false); } EXPORT_SYMBOL(ioremap_wc); @@ -358,14 +359,21 @@ EXPORT_SYMBOL(ioremap_wc); void __iomem *ioremap_wt(resource_size_t phys_addr, unsigned long size) { return __ioremap_caller(phys_addr, size, _PAGE_CACHE_MODE_WT, - __builtin_return_address(0)); + __builtin_return_address(0), false); } EXPORT_SYMBOL(ioremap_wt); +void __iomem *ioremap_encrypted(resource_size_t phys_addr, unsigned long size) +{ + return __ioremap_caller(phys_addr, size, _PAGE_CACHE_MODE_WB, + __builtin_return_address(0), true); +} +EXPORT_SYMBOL(ioremap_encrypted); + void __iomem *ioremap_cache(resource_size_t phys_addr, unsigned long size) { return __ioremap_caller(phys_addr, size, _PAGE_CACHE_MODE_WB, - __builtin_return_address(0)); + __builtin_return_address(0), false); } EXPORT_SYMBOL(ioremap_cache); @@ -374,7 +382,7 @@ void __iomem *ioremap_prot(resource_size_t phys_addr, unsigned long size, { return __ioremap_caller(phys_addr, size, pgprot2cachemode(__pgprot(prot_val)), - __builtin_return_address(0)); + __builtin_return_address(0), false); } EXPORT_SYMBOL(ioremap_prot); -- 2.9.5