kdump, proc/vmcore: Enable kdumping encrypted memory with SME enabled
authorLianbo Jiang <lijiang@redhat.com>
Sun, 30 Sep 2018 08:37:41 +0000 (16:37 +0800)
committerBorislav Petkov <bp@suse.de>
Sat, 6 Oct 2018 10:09:26 +0000 (12:09 +0200)
commitdbf01d88c5b7300b04d4b9e5d9d82319bf85e27b
tree2c06ce22ae25ee51011631c7570cc67c7f76be1b
parentb92ba64a88f896a2a92f26760e9ff6eed2dd212b
kdump, proc/vmcore: Enable kdumping encrypted memory with SME enabled

In the kdump kernel, the memory of the first kernel needs to be dumped
into the vmcore file.

If SME is enabled in the first kernel, the old memory has to be remapped
with the memory encryption mask in order to access it properly.

Split copy_oldmem_page() functionality to handle encrypted memory
properly.

 [ bp: Heavily massage everything. ]

Signed-off-by: Lianbo Jiang <lijiang@redhat.com>
Signed-off-by: Borislav Petkov <bp@suse.de>
Cc: kexec@lists.infradead.org
Cc: tglx@linutronix.de
Cc: mingo@redhat.com
Cc: hpa@zytor.com
Cc: akpm@linux-foundation.org
Cc: dan.j.williams@intel.com
Cc: bhelgaas@google.com
Cc: baiyaowei@cmss.chinamobile.com
Cc: tiwai@suse.de
Cc: brijesh.singh@amd.com
Cc: dyoung@redhat.com
Cc: bhe@redhat.com
Cc: jroedel@suse.de
Link: https://lkml.kernel.org/r/be7b47f9-6be6-e0d1-2c2a-9125bc74b818@redhat.com
arch/x86/kernel/crash_dump_64.c
fs/proc/vmcore.c
include/linux/crash_dump.h