On Thu, Mar 02, 2017 at 10:13:53AM -0500, Brijesh Singh wrote: > From: Tom Lendacky <thomas.lendacky@xxxxxxx> > > In order to map BOOT data with the proper encryption bit, the Btw, what does that all-caps spelling "BOOT" denote? Something I'm missing? > early_ioremap() function calls are changed to early_memremap() calls. > This allows the proper access for both SME and SEV. > > Signed-off-by: Tom Lendacky <thomas.lendacky@xxxxxxx> > --- > arch/x86/kernel/acpi/boot.c | 4 ++-- > arch/x86/kernel/mpparse.c | 10 +++++----- > drivers/sfi/sfi_core.c | 6 +++--- > 3 files changed, 10 insertions(+), 10 deletions(-) > > diff --git a/arch/x86/kernel/acpi/boot.c b/arch/x86/kernel/acpi/boot.c > index 35174c6..468c25a 100644 > --- a/arch/x86/kernel/acpi/boot.c > +++ b/arch/x86/kernel/acpi/boot.c > @@ -124,7 +124,7 @@ char *__init __acpi_map_table(unsigned long phys, unsigned long size) > if (!phys || !size) > return NULL; > > - return early_ioremap(phys, size); > + return early_memremap(phys, size); Right, the question will keep popping up why we can simply replace memremap with ioremap and the general difference wrt to SME/SEV. So it would be a good idea to have a comment in, say, arch/x86/mm/ioremap.c, explaining the general situation. Thanks. -- Regards/Gruss, Boris. SUSE Linux GmbH, GF: Felix Imendörffer, Jane Smithard, Graham Norton, HRB 21284 (AG Nürnberg) --