diff options
author | Pankaj Gupta <pankaj.gupta@amd.com> | 2022-11-02 17:07:28 +0100 |
---|---|---|
committer | Andrew Morton <akpm@linux-foundation.org> | 2022-11-09 00:57:23 +0100 |
commit | 867400af90f1f953ff9e10b1b87ecaf9369a7eb8 (patch) | |
tree | 8bb709bc2ea65c6ece6ff66115b6736735c02fac /mm | |
parent | Partly revert "mm/thp: carry over dirty bit when thp splits on pmd" (diff) | |
download | linux-867400af90f1f953ff9e10b1b87ecaf9369a7eb8.tar.xz linux-867400af90f1f953ff9e10b1b87ecaf9369a7eb8.zip |
mm/memremap.c: map FS_DAX device memory as decrypted
virtio_pmem use devm_memremap_pages() to map the device memory. By
default this memory is mapped as encrypted with SEV. Guest reboot changes
the current encryption key and guest no longer properly decrypts the FSDAX
device meta data.
Mark the corresponding device memory region for FSDAX devices (mapped with
memremap_pages) as decrypted to retain the persistent memory property.
Link: https://lkml.kernel.org/r/20221102160728.3184016-1-pankaj.gupta@amd.com
Fixes: b7b3c01b19159 ("mm/memremap_pages: support multiple ranges per invocation")
Signed-off-by: Pankaj Gupta <pankaj.gupta@amd.com>
Cc: Dan Williams <dan.j.williams@intel.com>
Cc: Tom Lendacky <thomas.lendacky@amd.com>
Cc: <stable@vger.kernel.org>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Diffstat (limited to 'mm')
-rw-r--r-- | mm/memremap.c | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/mm/memremap.c b/mm/memremap.c index 421bec3a29ee..08cbf54fe037 100644 --- a/mm/memremap.c +++ b/mm/memremap.c @@ -335,6 +335,7 @@ void *memremap_pages(struct dev_pagemap *pgmap, int nid) WARN(1, "File system DAX not supported\n"); return ERR_PTR(-EINVAL); } + params.pgprot = pgprot_decrypted(params.pgprot); break; case MEMORY_DEVICE_GENERIC: break; |