Received: by 2002:ac0:a581:0:0:0:0:0 with SMTP id m1-v6csp1021936imm; Tue, 3 Jul 2018 04:16:41 -0700 (PDT) X-Google-Smtp-Source: ADUXVKLGJ1OguARO664+1u40aKPtAYLyTgNBPSeFMQX6BV3s6ApL3mbT+pRaY7nBKRKCKtMAv92J X-Received: by 2002:a63:4106:: with SMTP id o6-v6mr25645384pga.453.1530616601724; Tue, 03 Jul 2018 04:16:41 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1530616601; cv=none; d=google.com; s=arc-20160816; b=GEJk85aixrnl3FYDoEMe8/yD7jfDnAOuOERnLOEOMrpGz4Sl7QnxeaXK7whZ5u1ovf +2rr5t9dWDc0QjvIZ70Y8vDuIbkVxMyP+ZocRxp4iLRO/8eeJzk0ypuksaeidEMVXzwe Jp1OJ+JE9GRntoDsEzszJTzW37FTKvuMUBDbg4xk+0jdfcqzY+WFnJPMTxFxz0GDFHCQ 7S2tHu0oimKdDNt1jPXwDxT2L6s6/wyxWufY3Q+5D1xT7k1q6RwHxsYbfP6ev+ZcvjOJ z5YN19tsQKFvH7reRYdtUaMXcALInxg4zzp29JpDH1SFA49QI4BU9QAg3SA6seF/mM73 Dh+A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:arc-authentication-results; bh=86lgCUW7gCLZithjcFZeLbfo4SVTq84hkfaUJLLN7Qw=; b=Wkc0+7HGjOpa7bonKozVW4mXmWwvQKkKgr1gc9/u6dZP7atfAg6M7ms4L0RvApto4A zX4EuDg+RUPd0QUfmh4lVeBlVyb1cwa3s1H2q+/g1Ttxz9y6gP00f7E7h0L9Sb3l04oo 1UTC5Fx8/WTiacpjWaU8METZwu2jcon9V6aqG5qz4NfE5+OcJKT6ErB6ZdRGV617NYDu fmtw49KcQGLm+4fYhqyzOO8ZW/RucMyEGkFmDftbXBu8Z7SQ8kBd6vmG2yTnEFS0SrfZ P7tQwwqXB3IHvN188VQ6F+t27Rq+DyyIWP5qJxFG9D4zVZJ0fqCDllPMxI0J0Twq9UpI 4fjw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id n6-v6si875131pgt.268.2018.07.03.04.16.27; Tue, 03 Jul 2018 04:16:41 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753106AbeGCLOh (ORCPT + 99 others); Tue, 3 Jul 2018 07:14:37 -0400 Received: from mail.skyhub.de ([5.9.137.197]:42286 "EHLO mail.skyhub.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753048AbeGCLOg (ORCPT ); Tue, 3 Jul 2018 07:14:36 -0400 X-Virus-Scanned: Nedap ESD1 at mail.skyhub.de Received: from mail.skyhub.de ([127.0.0.1]) by localhost (blast.alien8.de [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id iYgjWA9L0CLD; Tue, 3 Jul 2018 13:14:34 +0200 (CEST) Received: from zn.tnic (p200300EC2BCC6E00329C23FFFEA6A903.dip0.t-ipconnect.de [IPv6:2003:ec:2bcc:6e00:329c:23ff:fea6:a903]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.skyhub.de (SuperMail on ZX Spectrum 128k) with ESMTPSA id B1FA51EC00EA; Tue, 3 Jul 2018 13:14:34 +0200 (CEST) Date: Tue, 3 Jul 2018 13:14:28 +0200 From: Borislav Petkov To: lijiang Cc: linux-kernel@vger.kernel.org, mingo@redhat.com, tglx@linutronix.de, hpa@zytor.com, ebiederm@xmission.com, joro@8bytes.org, thomas.lendacky@amd.com, dyoung@redhat.com, kexec@lists.infradead.org, iommu@lists.linux-foundation.org, bhe@redhat.com Subject: Re: [PATCH 1/5 V5] Add a function(ioremap_encrypted) for kdump when AMD sme enabled Message-ID: <20180703111428.GB5748@zn.tnic> References: <20180702072639.10110-1-lijiang@redhat.com> <20180702072639.10110-2-lijiang@redhat.com> <20180702101451.GB28730@zn.tnic> <4ae1cfb5-0a4b-2aac-2575-024e2c74826f@redhat.com> <895db996-febd-d50c-91af-4f1ef3d27bd8@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: <895db996-febd-d50c-91af-4f1ef3d27bd8@redhat.com> User-Agent: Mutt/1.9.5 (2018-04-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Jul 03, 2018 at 06:58:14PM +0800, lijiang wrote: > For kdump, the elf header finally use the crash kernel reserved memory, it is not an old memory. Lamme repeat my suggestion: So beef up the logic in __ioremap_caller() to figure out based on the address whether to access the memory encrypted or not. In general, you can deduce, based on the region you're mapping, whether you need to map in encrypted or decrypted. For example: addr = elfcorehdr_addr; /* Read Elf header */ rc = elfcorehdr_read((char *)&ehdr, sizeof(Elf64_Ehdr), &addr); if (rc < 0) return rc; elfcorehdr_addr has that elfcorehdr address. So you can check which address you're mapping and do: __ioremap_caller: ... prot = __ioremap_compute_prot(...); and that __ioremap_compute_prot() function which you will add will have all that logic to determine encrypted or not by comparing addresses etc. Does that make more sense? -- Regards/Gruss, Boris. Good mailing practices for 400: avoid top-posting and trim the reply.