* [PATCH] x86/mm: Guard adding .bbs..decrypted section with CONFIG_AMD_MEM_ENCRYPT
@ 2023-11-06 22:05 Lepton Wu
2023-11-06 22:16 ` [PATCH v2] " Lepton Wu
0 siblings, 1 reply; 2+ messages in thread
From: Lepton Wu @ 2023-11-06 22:05 UTC (permalink / raw)
To: brijesh.singh; +Cc: tglx, kvm, Lepton Wu
commit b3f0907c71e0 ("x86/mm: Add .bss..decrypted section to hold shared variables")
usage on some kernels without CONFIG_AMD_MEM_ENCRYPT. Fix it by guarding it
with CONFIG_AMD_MEM_ENCRYP.
Signed-off-by: Lepton Wu <ytht.net@gmail.com>
---
arch/x86/kernel/vmlinux.lds.S | 8 ++++++++
1 file changed, 8 insertions(+)
diff --git a/arch/x86/kernel/vmlinux.lds.S b/arch/x86/kernel/vmlinux.lds.S
index 54a5596adaa6..d39798a23f86 100644
--- a/arch/x86/kernel/vmlinux.lds.S
+++ b/arch/x86/kernel/vmlinux.lds.S
@@ -69,6 +69,8 @@ jiffies = jiffies_64;
#define ALIGN_ENTRY_TEXT_BEGIN . = ALIGN(PMD_SIZE);
#define ALIGN_ENTRY_TEXT_END . = ALIGN(PMD_SIZE);
+#ifdef CONFIG_AMD_MEM_ENCRYPT
+
/*
* This section contains data which will be mapped as decrypted. Memory
* encryption operates on a page basis. Make this section PMD-aligned
@@ -88,6 +90,12 @@ jiffies = jiffies_64;
#else
+#define BSS_DECRYPTED
+
+#endif
+
+#else
+
#define X86_ALIGN_RODATA_BEGIN
#define X86_ALIGN_RODATA_END \
. = ALIGN(PAGE_SIZE); \
--
2.42.0.869.gea05f2083d-goog
^ permalink raw reply related [flat|nested] 2+ messages in thread
* [PATCH v2] x86/mm: Guard adding .bbs..decrypted section with CONFIG_AMD_MEM_ENCRYPT
2023-11-06 22:05 [PATCH] x86/mm: Guard adding .bbs..decrypted section with CONFIG_AMD_MEM_ENCRYPT Lepton Wu
@ 2023-11-06 22:16 ` Lepton Wu
0 siblings, 0 replies; 2+ messages in thread
From: Lepton Wu @ 2023-11-06 22:16 UTC (permalink / raw)
To: brijesh.singh; +Cc: tglx, kvm, Lepton Wu
commit b3f0907c71e0 ("x86/mm: Add .bss..decrypted section to hold shared variables")
adds almost 2M memory usage on some kernels without CONFIG_AMD_MEM_ENCRYPT.
Fix it by guarding it with CONFIG_AMD_MEM_ENCRYPT.
Signed-off-by: Lepton Wu <ytht.net@gmail.com>
---
arch/x86/kernel/vmlinux.lds.S | 8 ++++++++
1 file changed, 8 insertions(+)
diff --git a/arch/x86/kernel/vmlinux.lds.S b/arch/x86/kernel/vmlinux.lds.S
index 54a5596adaa6..d39798a23f86 100644
--- a/arch/x86/kernel/vmlinux.lds.S
+++ b/arch/x86/kernel/vmlinux.lds.S
@@ -69,6 +69,8 @@ jiffies = jiffies_64;
#define ALIGN_ENTRY_TEXT_BEGIN . = ALIGN(PMD_SIZE);
#define ALIGN_ENTRY_TEXT_END . = ALIGN(PMD_SIZE);
+#ifdef CONFIG_AMD_MEM_ENCRYPT
+
/*
* This section contains data which will be mapped as decrypted. Memory
* encryption operates on a page basis. Make this section PMD-aligned
@@ -88,6 +90,12 @@ jiffies = jiffies_64;
#else
+#define BSS_DECRYPTED
+
+#endif
+
+#else
+
#define X86_ALIGN_RODATA_BEGIN
#define X86_ALIGN_RODATA_END \
. = ALIGN(PAGE_SIZE); \
--
2.42.0.869.gea05f2083d-goog
^ permalink raw reply related [flat|nested] 2+ messages in thread
end of thread, other threads:[~2023-11-06 22:19 UTC | newest]
Thread overview: 2+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2023-11-06 22:05 [PATCH] x86/mm: Guard adding .bbs..decrypted section with CONFIG_AMD_MEM_ENCRYPT Lepton Wu
2023-11-06 22:16 ` [PATCH v2] " Lepton Wu
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox