)]}'
{
  "commit": "a87b4e50aa0b9d00a40aaebee51169bc76b100b7",
  "tree": "bbd6818de62da3566193557fbee7fab32598b88a",
  "parents": [
    "9cb024806610b9e57d97ace0709661f5e308d7f2"
  ],
  "author": {
    "name": "Dan Williams",
    "email": "dan.j.williams@intel.com",
    "time": "Sat Oct 18 21:53:12 2025 -0700"
  },
  "committer": {
    "name": "Dan Williams",
    "email": "dan.j.williams@intel.com",
    "time": "Fri Nov 14 15:08:15 2025 -0800"
  },
  "message": "x86/ioremap, resource: Introduce IORES_DESC_ENCRYPTED for encrypted PCI MMIO\n\nPCIe Trusted Execution Environment Device Interface Security Protocol\n(TDISP) arranges for a PCI device to support encrypted MMIO. In support of\nthat capability, ioremap() needs a mechanism to detect when a PCI device\nhas been dynamically transitioned into this secure state and enforce\nencrypted MMIO mappings.\n\nTeach ioremap() about a new IORES_DESC_ENCRYPTED type that supplements the\nexisting PCI Memory Space (MMIO) BAR resources. The proposal is that a\nresource, \"PCI MMIO Encrypted\", with this description type is injected by\nthe PCI/TSM core for each PCI device BAR that is to be protected.\n\nUnlike the existing encryption determination which is \"implied with a\nsilent fallback to an unencrypted mapping\", this indication is \"explicit\nwith an expectation that the request fails instead of fallback\".\nIORES_MUST_ENCRYPT is added to manage this expectation.\n\nGiven that \"PCI MMIO Encrypted\" is an additional resource in the tree, the\nIORESOURCE_BUSY flag will only be set on a descendant/child of that\nresource. That means it cannot share the same walk as the check for \"System\nRAM\". Add walk_iomem_res_desc() to check if any IORES_DESC_ENCRYPTED\nintersects the ioremap() range and set IORES_MUST_ENCRYPT accordingly.\n\nCc: Dave Hansen \u003cdave.hansen@linux.intel.com\u003e\nCc: Andy Lutomirski \u003cluto@kernel.org\u003e\nCc: Peter Zijlstra \u003cpeterz@infradead.org\u003e\nCc: Thomas Gleixner \u003ctglx@linutronix.de\u003e\nCc: Ingo Molnar \u003cmingo@redhat.com\u003e\nCc: Borislav Petkov \u003cbp@alien8.de\u003e\nCc: x86@kernel.org\nCc: \"H. Peter Anvin\" \u003chpa@zytor.com\u003e\nSigned-off-by: Dan Williams \u003cdan.j.williams@intel.com\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "12c8180ca1ba7473f42c5d4cef306657356dae40",
      "old_mode": 33188,
      "old_path": "arch/x86/mm/ioremap.c",
      "new_id": "ad9cf2c456a38f9a3b237f9d4e46f586ee0b7d49",
      "new_mode": 33188,
      "new_path": "arch/x86/mm/ioremap.c"
    },
    {
      "type": "modify",
      "old_id": "9afa30f9346fceca06a3e7f990df9d8c926bfc97",
      "old_mode": 33188,
      "old_path": "include/linux/ioport.h",
      "new_id": "3efd07443c472c46fe5aacec6bc8742aa9afd969",
      "new_mode": 33188,
      "new_path": "include/linux/ioport.h"
    }
  ]
}
