Received: by 2002:ac0:a5b6:0:0:0:0:0 with SMTP id m51-v6csp1719706imm; Sat, 16 Jun 2018 01:28:21 -0700 (PDT) X-Google-Smtp-Source: ADUXVKLwUEfrMBV2hqxxyrvip27iwNxGz1uKDKtdtyqsUAZ//6V8I8TFbP4xFeK2VgHUEFKT0X8u X-Received: by 2002:a63:64c5:: with SMTP id y188-v6mr4620130pgb.37.1529137701726; Sat, 16 Jun 2018 01:28:21 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1529137701; cv=none; d=google.com; s=arc-20160816; b=qVguQQBWocYLS85T75t7+VtszSE3F0sy/V0fA6W0cKfNaL5gKCQrK+ur23ykAHgJts zJSuH2V8/Q+0FaPg0SGh0U3jm3RBe+d34HQ4ueN4qXT6WxMj+HbgW1Z9GZREA8p6Jqrj XpmS5hkvHp13giXrXw/Eakfrgo+HXyjvZMRw4Boj2YqAdKz0Dt2Ht/q0A2Gqhmb+6/39 jdxnIHCqHs5iB0aWXj4tyRf2EZ/m6lozlfvLQ4Jh2U/P81gZwzcELEXwIsPj8MLlc72C 1JC9NYwpblPoFB66sDgDvjuBPrKG1DZVEboxQtREMvWvdAEZQ5oWeEsdY7eCzJ2yXGX0 QJhQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:arc-authentication-results; bh=UQKoUMhwORs3fvv3XwExS9VwQWkUok2dTXyP9AyOSs0=; b=aVWRwztDkn/E8B+9x4chX6i7OJ0VXPYJAgOqRyF4OdlINMy2xjDQEtwhIsWo1QTmP2 BD5k22vHjxsjuvV0Nfgo2syLYwPhftBanfNocBUoED2G8OfZY1xV3upDyRqp8GygjEor EBZju4/FvKmTwr4NujrcCuElveBx7z87fB9DPNioOnZcu5QeL+6y1SpiAIjR3UEYES6O aKpbobjSgt6FaKU+FnZcuGCc5S270rtcHYKBRhAKTvpOdqs7zHKqzBamXQpbcg7lxr/h y25+1Qwyz/a1hcenAyBTXW//x+kcEOBzI+yow5hDkVWjgQbyelJopCA0ysUt7+WxfU3O Ytmg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id u11-v6si8049709pgc.97.2018.06.16.01.28.05; Sat, 16 Jun 2018 01:28:21 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932828AbeFPI13 (ORCPT + 99 others); Sat, 16 Jun 2018 04:27:29 -0400 Received: from mx3-rdu2.redhat.com ([66.187.233.73]:46386 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S932510AbeFPI1Y (ORCPT ); Sat, 16 Jun 2018 04:27:24 -0400 Received: from smtp.corp.redhat.com (int-mx04.intmail.prod.int.rdu2.redhat.com [10.11.54.4]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id D929E87A83; Sat, 16 Jun 2018 08:27:23 +0000 (UTC) Received: from 192.168.1.112 (ovpn-12-46.pek2.redhat.com [10.72.12.46]) by smtp.corp.redhat.com (Postfix) with ESMTP id 9F39020244E0; Sat, 16 Jun 2018 08:27:19 +0000 (UTC) From: Lianbo Jiang To: linux-kernel@vger.kernel.org Cc: iommu@lists.linux-foundation.org, kexec@lists.infradead.org, thomas.lendacky@amd.com, dyoung@redhat.com Subject: [PATCH 1/4 V3] Add a function(ioremap_encrypted) for kdump when AMD sme enabled Date: Sat, 16 Jun 2018 16:27:11 +0800 Message-Id: <20180616082714.32035-2-lijiang@redhat.com> In-Reply-To: <20180616082714.32035-1-lijiang@redhat.com> References: <20180616082714.32035-1-lijiang@redhat.com> X-Scanned-By: MIMEDefang 2.78 on 10.11.54.4 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.1]); Sat, 16 Jun 2018 08:27:23 +0000 (UTC) X-Greylist: inspected by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.1]); Sat, 16 Jun 2018 08:27:23 +0000 (UTC) for IP:'10.11.54.4' DOMAIN:'int-mx04.intmail.prod.int.rdu2.redhat.com' HELO:'smtp.corp.redhat.com' FROM:'lijiang@redhat.com' RCPT:'' Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org It is convenient to remap the old memory encrypted to the second kernel by calling ioremap_encrypted(). Signed-off-by: Lianbo Jiang --- Some changes: 1. remove the sme_active() check in __ioremap_caller(). 2. put some logic into the early_memremap_pgprot_adjust() for early memremap. arch/x86/include/asm/io.h | 3 +++ arch/x86/mm/ioremap.c | 28 ++++++++++++++++++++-------- 2 files changed, 23 insertions(+), 8 deletions(-) diff --git a/arch/x86/include/asm/io.h b/arch/x86/include/asm/io.h index f6e5b93..989d60b 100644 --- a/arch/x86/include/asm/io.h +++ b/arch/x86/include/asm/io.h @@ -192,6 +192,9 @@ extern void __iomem *ioremap_cache(resource_size_t offset, unsigned long size); #define ioremap_cache ioremap_cache extern void __iomem *ioremap_prot(resource_size_t offset, unsigned long size, unsigned long prot_val); #define ioremap_prot ioremap_prot +extern void __iomem *ioremap_encrypted(resource_size_t phys_addr, + unsigned long size); +#define ioremap_encrypted ioremap_encrypted /** * ioremap - map bus memory into CPU space diff --git a/arch/x86/mm/ioremap.c b/arch/x86/mm/ioremap.c index c63a545..e365fc4 100644 --- a/arch/x86/mm/ioremap.c +++ b/arch/x86/mm/ioremap.c @@ -24,6 +24,7 @@ #include #include #include +#include #include "physaddr.h" @@ -131,7 +132,8 @@ static void __ioremap_check_mem(resource_size_t addr, unsigned long size, * caller shouldn't need to know that small detail. */ static void __iomem *__ioremap_caller(resource_size_t phys_addr, - unsigned long size, enum page_cache_mode pcm, void *caller) + unsigned long size, enum page_cache_mode pcm, + void *caller, bool encrypted) { unsigned long offset, vaddr; resource_size_t last_addr; @@ -199,7 +201,7 @@ static void __iomem *__ioremap_caller(resource_size_t phys_addr, * resulting mapping. */ prot = PAGE_KERNEL_IO; - if (sev_active() && mem_flags.desc_other) + if ((sev_active() && mem_flags.desc_other) || encrypted) prot = pgprot_encrypted(prot); switch (pcm) { @@ -291,7 +293,7 @@ void __iomem *ioremap_nocache(resource_size_t phys_addr, unsigned long size) enum page_cache_mode pcm = _PAGE_CACHE_MODE_UC_MINUS; return __ioremap_caller(phys_addr, size, pcm, - __builtin_return_address(0)); + __builtin_return_address(0), false); } EXPORT_SYMBOL(ioremap_nocache); @@ -324,7 +326,7 @@ void __iomem *ioremap_uc(resource_size_t phys_addr, unsigned long size) enum page_cache_mode pcm = _PAGE_CACHE_MODE_UC; return __ioremap_caller(phys_addr, size, pcm, - __builtin_return_address(0)); + __builtin_return_address(0), false); } EXPORT_SYMBOL_GPL(ioremap_uc); @@ -341,7 +343,7 @@ EXPORT_SYMBOL_GPL(ioremap_uc); void __iomem *ioremap_wc(resource_size_t phys_addr, unsigned long size) { return __ioremap_caller(phys_addr, size, _PAGE_CACHE_MODE_WC, - __builtin_return_address(0)); + __builtin_return_address(0), false); } EXPORT_SYMBOL(ioremap_wc); @@ -358,14 +360,21 @@ EXPORT_SYMBOL(ioremap_wc); void __iomem *ioremap_wt(resource_size_t phys_addr, unsigned long size) { return __ioremap_caller(phys_addr, size, _PAGE_CACHE_MODE_WT, - __builtin_return_address(0)); + __builtin_return_address(0), false); } EXPORT_SYMBOL(ioremap_wt); +void __iomem *ioremap_encrypted(resource_size_t phys_addr, unsigned long size) +{ + return __ioremap_caller(phys_addr, size, _PAGE_CACHE_MODE_WB, + __builtin_return_address(0), true); +} +EXPORT_SYMBOL(ioremap_encrypted); + void __iomem *ioremap_cache(resource_size_t phys_addr, unsigned long size) { return __ioremap_caller(phys_addr, size, _PAGE_CACHE_MODE_WB, - __builtin_return_address(0)); + __builtin_return_address(0), false); } EXPORT_SYMBOL(ioremap_cache); @@ -374,7 +383,7 @@ void __iomem *ioremap_prot(resource_size_t phys_addr, unsigned long size, { return __ioremap_caller(phys_addr, size, pgprot2cachemode(__pgprot(prot_val)), - __builtin_return_address(0)); + __builtin_return_address(0), false); } EXPORT_SYMBOL(ioremap_prot); @@ -688,6 +697,9 @@ pgprot_t __init early_memremap_pgprot_adjust(resource_size_t phys_addr, if (encrypted_prot && memremap_should_map_decrypted(phys_addr, size)) encrypted_prot = false; + if (sme_active() && is_kdump_kernel()) + encrypted_prot = false; + return encrypted_prot ? pgprot_encrypted(prot) : pgprot_decrypted(prot); } -- 2.9.5