Received: by 2002:ac0:a5a6:0:0:0:0:0 with SMTP id m35-v6csp361523imm; Tue, 25 Sep 2018 23:26:22 -0700 (PDT) X-Google-Smtp-Source: ACcGV62Wm0EFBcvRYFRdV39Pc5E1d2ldgWjuGR9pEJLOqCXL7+avSFyQH/ul8WLWxjgrKG6UXdD5 X-Received: by 2002:a17:902:6b83:: with SMTP id p3-v6mr4493096plk.133.1537943182568; Tue, 25 Sep 2018 23:26:22 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1537943182; cv=none; d=google.com; s=arc-20160816; b=KiigPdx/DC3V29rnOhH9QeHNqg9h+lCa+m8fSotlHddMgdT9BtxFLqEmVwPIeRNflo WgnirWic/N3fyLUKsp9Ox1PVFXSatBOrg6w8TqgGIYgRkhGTi5jRtWgabCjTqJ0+3Bn3 aWBVJnpBrYWo8ajq/bex9yPVcOHNJJlvpJNK9KPwOCPbIU5Ol21ZVilic2knFh1ncs2V ugOuuzlQBF3YE3/rSHYrLYkLBdLnnhRc8naRFAPtC1fTTXE+gnXUhbl9fABKy2n64+wn gjevtMd+1d7PwRb6ZosWeLb95XlyGkG1Iawb6hb4kG8/ENvCiPx+Iy6BUGGw3v9sIYhj 2RPQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:cc:references:to:from:subject; bh=k9XRX9tbF71LJiEyPyAHP9Frwp9LOM9SBqgaJDbunAY=; b=QHL2x1AVhOFUyKy+JiOoZdsZOWXHsRb4c6KVuBBFZT5OUPfQl2N2mlhmedCmbUHpnq mXy+1zBZAgTMnSoFwu6iQ9n/4TQAya0bFxy+n70RZ3456gdDtSRM/lKmX1+tB6SzgIAx eyaYo2gfW9obk95amY7BS93pJt7Rs/ps5urrrVPmPuXIjYu4dxJxL64wCTu1vDLXCFYc lF52h23M/+lhJik1FU3E+6IGVUW8e84ziWsbEAC1X+1D9s+QzCtlxmV/hlhf0El11YmM LDe70ZsueLQR6UTSyO+NjqGxpYNUkQJZW5YWGwo0I7NoE7Aszn4fMli+e96v0hUAKLkD B6MA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id c24-v6si4472850pls.211.2018.09.25.23.26.07; Tue, 25 Sep 2018 23:26:22 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726976AbeIZMhE (ORCPT + 99 others); Wed, 26 Sep 2018 08:37:04 -0400 Received: from mx1.redhat.com ([209.132.183.28]:59578 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726370AbeIZMhE (ORCPT ); Wed, 26 Sep 2018 08:37:04 -0400 Received: from smtp.corp.redhat.com (int-mx01.intmail.prod.int.phx2.redhat.com [10.5.11.11]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id E4655308A94D; Wed, 26 Sep 2018 06:25:44 +0000 (UTC) Received: from localhost.localdomain (ovpn-12-101.pek2.redhat.com [10.72.12.101]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 51638600C3; Wed, 26 Sep 2018 06:25:31 +0000 (UTC) Subject: Re: [PATCH 1/4 v7] x86/ioremap: add a function ioremap_encrypted() to remap kdump old memory From: lijiang To: Baoquan He References: <20180907081805.368-1-lijiang@redhat.com> <20180907081805.368-2-lijiang@redhat.com> <20180926022123.GA2555@MiWiFi-R3L-srv> Cc: linux-kernel@vger.kernel.org, joro@8bytes.org, mingo@redhat.com, ebiederm@xmission.com, hpa@zytor.com, tglx@linutronix.de, Dave Young , "Lendacky, Thomas" Message-ID: Date: Wed, 26 Sep 2018 14:25:28 +0800 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.9.1 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 8bit X-Scanned-By: MIMEDefang 2.79 on 10.5.11.11 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.41]); Wed, 26 Sep 2018 06:25:45 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Also cc maintainer and other reviewer. Thanks. 在 2018年09月26日 14:18, lijiang 写道: > 在 2018年09月26日 10:21, Baoquan He 写道: >> Hi Lianbo, >> >> On 09/07/18 at 04:18pm, Lianbo Jiang wrote: >>> When SME is enabled on AMD machine, the memory is encrypted in the first >>> kernel. In this case, SME also needs to be enabled in kdump kernel, and >>> we have to remap the old memory with the memory encryption mask. >> >> This patch series looks good to me. One thing is in your v5 post, Boris >> reviewed and complained about the git log, we worked together to make an >> document to explain, wondering why you don't rearrange it into log of >> this patch. Other than this, all looks fine. >> >> http://lkml.kernel.org/r/53536964-2b57-4630-de91-3d4da2b643a8@redhat.com >> > Thank you, Baoquan. > > Previously i had considered whether i should put these explaining into patch log, > because these contents are a little more, i might just put the description of > Solution A into this patch log and post this patch again. > > Lianbo >> >>> >>> Signed-off-by: Lianbo Jiang >>> --- >>> arch/x86/include/asm/io.h | 3 +++ >>> arch/x86/mm/ioremap.c | 25 +++++++++++++++++-------- >>> 2 files changed, 20 insertions(+), 8 deletions(-) >>> >>> diff --git a/arch/x86/include/asm/io.h b/arch/x86/include/asm/io.h >>> index 6de64840dd22..f8795f9581c7 100644 >>> --- a/arch/x86/include/asm/io.h >>> +++ b/arch/x86/include/asm/io.h >>> @@ -192,6 +192,9 @@ extern void __iomem *ioremap_cache(resource_size_t offset, unsigned long size); >>> #define ioremap_cache ioremap_cache >>> extern void __iomem *ioremap_prot(resource_size_t offset, unsigned long size, unsigned long prot_val); >>> #define ioremap_prot ioremap_prot >>> +extern void __iomem *ioremap_encrypted(resource_size_t phys_addr, >>> + unsigned long size); >>> +#define ioremap_encrypted ioremap_encrypted >>> >>> /** >>> * ioremap - map bus memory into CPU space >>> diff --git a/arch/x86/mm/ioremap.c b/arch/x86/mm/ioremap.c >>> index c63a545ec199..e01e6c695add 100644 >>> --- a/arch/x86/mm/ioremap.c >>> +++ b/arch/x86/mm/ioremap.c >>> @@ -24,6 +24,7 @@ >>> #include >>> #include >>> #include >>> +#include >>> >>> #include "physaddr.h" >>> >>> @@ -131,7 +132,8 @@ static void __ioremap_check_mem(resource_size_t addr, unsigned long size, >>> * caller shouldn't need to know that small detail. >>> */ >>> static void __iomem *__ioremap_caller(resource_size_t phys_addr, >>> - unsigned long size, enum page_cache_mode pcm, void *caller) >>> + unsigned long size, enum page_cache_mode pcm, >>> + void *caller, bool encrypted) >>> { >>> unsigned long offset, vaddr; >>> resource_size_t last_addr; >>> @@ -199,7 +201,7 @@ static void __iomem *__ioremap_caller(resource_size_t phys_addr, >>> * resulting mapping. >>> */ >>> prot = PAGE_KERNEL_IO; >>> - if (sev_active() && mem_flags.desc_other) >>> + if ((sev_active() && mem_flags.desc_other) || encrypted) >>> prot = pgprot_encrypted(prot); >>> >>> switch (pcm) { >>> @@ -291,7 +293,7 @@ void __iomem *ioremap_nocache(resource_size_t phys_addr, unsigned long size) >>> enum page_cache_mode pcm = _PAGE_CACHE_MODE_UC_MINUS; >>> >>> return __ioremap_caller(phys_addr, size, pcm, >>> - __builtin_return_address(0)); >>> + __builtin_return_address(0), false); >>> } >>> EXPORT_SYMBOL(ioremap_nocache); >>> >>> @@ -324,7 +326,7 @@ void __iomem *ioremap_uc(resource_size_t phys_addr, unsigned long size) >>> enum page_cache_mode pcm = _PAGE_CACHE_MODE_UC; >>> >>> return __ioremap_caller(phys_addr, size, pcm, >>> - __builtin_return_address(0)); >>> + __builtin_return_address(0), false); >>> } >>> EXPORT_SYMBOL_GPL(ioremap_uc); >>> >>> @@ -341,7 +343,7 @@ EXPORT_SYMBOL_GPL(ioremap_uc); >>> void __iomem *ioremap_wc(resource_size_t phys_addr, unsigned long size) >>> { >>> return __ioremap_caller(phys_addr, size, _PAGE_CACHE_MODE_WC, >>> - __builtin_return_address(0)); >>> + __builtin_return_address(0), false); >>> } >>> EXPORT_SYMBOL(ioremap_wc); >>> >>> @@ -358,14 +360,21 @@ EXPORT_SYMBOL(ioremap_wc); >>> void __iomem *ioremap_wt(resource_size_t phys_addr, unsigned long size) >>> { >>> return __ioremap_caller(phys_addr, size, _PAGE_CACHE_MODE_WT, >>> - __builtin_return_address(0)); >>> + __builtin_return_address(0), false); >>> } >>> EXPORT_SYMBOL(ioremap_wt); >>> >>> +void __iomem *ioremap_encrypted(resource_size_t phys_addr, unsigned long size) >>> +{ >>> + return __ioremap_caller(phys_addr, size, _PAGE_CACHE_MODE_WB, >>> + __builtin_return_address(0), true); >>> +} >>> +EXPORT_SYMBOL(ioremap_encrypted); >>> + >>> void __iomem *ioremap_cache(resource_size_t phys_addr, unsigned long size) >>> { >>> return __ioremap_caller(phys_addr, size, _PAGE_CACHE_MODE_WB, >>> - __builtin_return_address(0)); >>> + __builtin_return_address(0), false); >>> } >>> EXPORT_SYMBOL(ioremap_cache); >>> >>> @@ -374,7 +383,7 @@ void __iomem *ioremap_prot(resource_size_t phys_addr, unsigned long size, >>> { >>> return __ioremap_caller(phys_addr, size, >>> pgprot2cachemode(__pgprot(prot_val)), >>> - __builtin_return_address(0)); >>> + __builtin_return_address(0), false); >>> } >>> EXPORT_SYMBOL(ioremap_prot); >>> >>> -- >>> 2.17.1 >>> >> >> _______________________________________________ >> kexec mailing list >> kexec@lists.infradead.org >> http://lists.infradead.org/mailman/listinfo/kexec >> > > _______________________________________________ > kexec mailing list > kexec@lists.infradead.org > http://lists.infradead.org/mailman/listinfo/kexec >