Received: by 2002:ac0:a581:0:0:0:0:0 with SMTP id m1-v6csp939280imm; Tue, 3 Jul 2018 02:41:44 -0700 (PDT) X-Google-Smtp-Source: ADUXVKJPeH7p4lkOe4LaDOdmj8FoQ5lg/fR6x4CXzHMvQdob7zMELoFDa+KCn2oub1pHihUOMk7W X-Received: by 2002:a17:902:aa87:: with SMTP id d7-v6mr29261572plr.215.1530610904604; Tue, 03 Jul 2018 02:41:44 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1530610904; cv=none; d=google.com; s=arc-20160816; b=Zw5f3N4Q8DHmc5ZE/IZF9QvrRAPSYw4HTuJ4qJvYt2m/YJrLuebIFKCn32znLAGpV5 xYOt3i2qgk5j1p3dMDnucqP7/Q6FsILEnPO53gNurydd8Zl9ESIqijI345HjPV5JEPm4 JRxD7AtihYDKanP+eB/h/rdq5AntrTwB/6ClpuIVBDPUJxzaok92y/wGDn74FaxfNfks arCQ0Jvmw+X8q9dW1og8wBxbpBuKUYiLq9F9HMuFgJiCYJ4MbuDGcp+AZ0L/JLQRwob/ vlshIZjtFtI9UMFYrM1oOWXOO1vgeGs+d6djt1v53PtjQ2/W52tNF/Q0zIq8NcIn9jWr 98WQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:arc-authentication-results; bh=pWqZm7eNBhjt9oigmcr+Vl2KSPZw3HLLPaaL9kpAy7s=; b=EUy2rWiQlrW+YawUlxHdFNQ7hveamfJJfroYf5FJvydmXpQ8h9LeP3VgMTVV/RjXZo SesQNEom12m0N6Uf3gFz+wSDs0QsPums72Rrs3x8tXixGr5lJ0l2d2uw2WfNNxAc1+5G 9btPOmAySVppU0XY5xXTnpG4jZHidv1MVC2QSN+FdN3UibiRGKNib4pXvuOY7H4cqyVO H+itovktiyT4V/D63fbZXYaSpsIx6ZohTLwLwBZb6qbddLz1E+HAemggShN1itKGYIeR WvdBQriIvBgs416cj6cDXPS17XRTHMdt69pYArQ2weAYRrnzegFH5pvAWq3Yk1WLQWlB JGbg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f26-v6si706890pgf.10.2018.07.03.02.41.30; Tue, 03 Jul 2018 02:41:44 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S933593AbeGCJjd (ORCPT + 99 others); Tue, 3 Jul 2018 05:39:33 -0400 Received: from mail.skyhub.de ([5.9.137.197]:38426 "EHLO mail.skyhub.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S933358AbeGCJjc (ORCPT ); Tue, 3 Jul 2018 05:39:32 -0400 X-Virus-Scanned: Nedap ESD1 at mail.skyhub.de Received: from mail.skyhub.de ([127.0.0.1]) by localhost (blast.alien8.de [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id cD2ic_AphpCw; Tue, 3 Jul 2018 11:39:31 +0200 (CEST) Received: from zn.tnic (p200300EC2BCC6E00329C23FFFEA6A903.dip0.t-ipconnect.de [IPv6:2003:ec:2bcc:6e00:329c:23ff:fea6:a903]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.skyhub.de (SuperMail on ZX Spectrum 128k) with ESMTPSA id CA8B81EC03AD; Tue, 3 Jul 2018 11:39:30 +0200 (CEST) Date: Tue, 3 Jul 2018 11:39:24 +0200 From: Borislav Petkov To: lijiang Cc: linux-kernel@vger.kernel.org, mingo@redhat.com, tglx@linutronix.de, hpa@zytor.com, ebiederm@xmission.com, joro@8bytes.org, thomas.lendacky@amd.com, dyoung@redhat.com, kexec@lists.infradead.org, iommu@lists.linux-foundation.org, bhe@redhat.com Subject: Re: [PATCH 1/5 V5] Add a function(ioremap_encrypted) for kdump when AMD sme enabled Message-ID: <20180703093924.GA5748@zn.tnic> References: <20180702072639.10110-1-lijiang@redhat.com> <20180702072639.10110-2-lijiang@redhat.com> <20180702101451.GB28730@zn.tnic> <4ae1cfb5-0a4b-2aac-2575-024e2c74826f@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: <4ae1cfb5-0a4b-2aac-2575-024e2c74826f@redhat.com> User-Agent: Mutt/1.9.5 (2018-04-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Jul 03, 2018 at 10:17:19AM +0800, lijiang wrote: > for example, the elfcorehdr. In fact, the elfcorehdr and notes You mean this? ssize_t __weak elfcorehdr_read_notes(char *buf, size_t count, u64 *ppos) { - return read_from_oldmem(buf, count, ppos, 0); + return read_from_oldmem(buf, count, ppos, 0, sme_active()); That looks encrypted to me. > call the same function(read_from_oldmem->ioremap_cache), in this case, > it is very difficult to properly remap the memory if the caller don't > care whether the memory is encrypted. So beef up the logic in __ioremap_caller() to figure out based on the address whether to access the memory encrypted or not. You can find out the elfcorehdr address in the capture kernel. -- Regards/Gruss, Boris. Good mailing practices for 400: avoid top-posting and trim the reply.