2009-02-16 08:48:59 +08:00
|
|
|
/*
|
|
|
|
* fixmap.h: compile-time virtual memory allocation
|
|
|
|
*
|
|
|
|
* This file is subject to the terms and conditions of the GNU General Public
|
|
|
|
* License. See the file "COPYING" in the main directory of this archive
|
|
|
|
* for more details.
|
|
|
|
*
|
|
|
|
* Copyright (C) 1998 Ingo Molnar
|
|
|
|
*
|
|
|
|
* Support of BIGMEM added by Gerhard Wichert, Siemens AG, July 1999
|
|
|
|
* x86_32 and x86_64 integration by Gustavo F. Padovan, February 2009
|
|
|
|
*/
|
|
|
|
|
2008-10-23 13:26:29 +08:00
|
|
|
#ifndef _ASM_X86_FIXMAP_H
|
|
|
|
#define _ASM_X86_FIXMAP_H
|
2008-04-26 00:25:25 +08:00
|
|
|
|
2018-09-20 10:58:28 +08:00
|
|
|
/*
|
|
|
|
* Exposed to assembly code for setting up initial page tables. Cannot be
|
|
|
|
* calculated in assembly code (fixmap entries are an enum), but is sanity
|
|
|
|
* checked in the actual fixmap C code to make sure that the fixmap is
|
|
|
|
* covered fully.
|
|
|
|
*/
|
|
|
|
#define FIXMAP_PMD_NUM 2
|
|
|
|
/* fixmap starts downwards from the 507th entry in level2_fixmap_pgt */
|
|
|
|
#define FIXMAP_PMD_TOP 507
|
|
|
|
|
2009-02-16 08:48:59 +08:00
|
|
|
#ifndef __ASSEMBLY__
|
|
|
|
#include <linux/kernel.h>
|
|
|
|
#include <asm/acpi.h>
|
|
|
|
#include <asm/apicdef.h>
|
|
|
|
#include <asm/page.h>
|
|
|
|
#ifdef CONFIG_X86_32
|
|
|
|
#include <linux/threads.h>
|
|
|
|
#include <asm/kmap_types.h>
|
|
|
|
#else
|
2014-05-06 03:19:36 +08:00
|
|
|
#include <uapi/asm/vsyscall.h>
|
2009-02-16 08:48:59 +08:00
|
|
|
#endif
|
|
|
|
|
|
|
|
/*
|
|
|
|
* We can't declare FIXADDR_TOP as variable for x86_64 because vsyscall
|
|
|
|
* uses fixmaps that relies on FIXADDR_TOP for proper address calculation.
|
|
|
|
* Because of this, FIXADDR_TOP x86 integration was left as later work.
|
|
|
|
*/
|
|
|
|
#ifdef CONFIG_X86_32
|
2019-08-09 19:46:12 +08:00
|
|
|
/*
|
2009-02-16 08:48:59 +08:00
|
|
|
* Leave one empty page between vmalloc'ed areas and
|
|
|
|
* the start of the fixmap.
|
|
|
|
*/
|
|
|
|
extern unsigned long __FIXADDR_TOP;
|
|
|
|
#define FIXADDR_TOP ((unsigned long)__FIXADDR_TOP)
|
|
|
|
#else
|
2014-05-06 03:19:36 +08:00
|
|
|
#define FIXADDR_TOP (round_up(VSYSCALL_ADDR + PAGE_SIZE, 1<<PMD_SHIFT) - \
|
|
|
|
PAGE_SIZE)
|
2009-02-16 08:48:59 +08:00
|
|
|
#endif
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Here we define all the compile-time 'special' virtual
|
|
|
|
* addresses. The point is to have a constant address at
|
|
|
|
* compile time, but to set the physical address only
|
|
|
|
* in the boot process.
|
|
|
|
* for x86_32: We allocate these special addresses
|
|
|
|
* from the end of virtual memory (0xfffff000) backwards.
|
|
|
|
* Also this lets us do fail-safe vmalloc(), we
|
|
|
|
* can guarantee that these special addresses and
|
|
|
|
* vmalloc()-ed addresses never overlap.
|
|
|
|
*
|
|
|
|
* These 'compile-time allocated' memory buffers are
|
|
|
|
* fixed-size 4k pages (or larger if used with an increment
|
|
|
|
* higher than 1). Use set_fixmap(idx,phys) to associate
|
|
|
|
* physical memory with fixmap indices.
|
|
|
|
*
|
|
|
|
* TLB entries of such buffers will not be flushed across
|
|
|
|
* task switches.
|
|
|
|
*/
|
|
|
|
enum fixed_addresses {
|
2007-10-11 17:20:03 +08:00
|
|
|
#ifdef CONFIG_X86_32
|
2009-02-16 08:48:59 +08:00
|
|
|
FIX_HOLE,
|
2007-10-11 17:20:03 +08:00
|
|
|
#else
|
2014-10-30 05:33:47 +08:00
|
|
|
#ifdef CONFIG_X86_VSYSCALL_EMULATION
|
2014-05-06 03:19:36 +08:00
|
|
|
VSYSCALL_PAGE = (FIXADDR_TOP - VSYSCALL_ADDR) >> PAGE_SHIFT,
|
2014-10-30 05:33:47 +08:00
|
|
|
#endif
|
2007-10-11 17:20:03 +08:00
|
|
|
#endif
|
2009-02-16 08:48:59 +08:00
|
|
|
FIX_DBGP_BASE,
|
|
|
|
FIX_EARLYCON_MEM_BASE,
|
2010-03-15 18:11:15 +08:00
|
|
|
#ifdef CONFIG_PROVIDE_OHCI1394_DMA_INIT
|
|
|
|
FIX_OHCI1394_BASE,
|
|
|
|
#endif
|
2009-02-16 08:48:59 +08:00
|
|
|
#ifdef CONFIG_X86_LOCAL_APIC
|
|
|
|
FIX_APIC_BASE, /* local (CPU) APIC) -- required for SMP or not */
|
|
|
|
#endif
|
|
|
|
#ifdef CONFIG_X86_IO_APIC
|
|
|
|
FIX_IO_APIC_BASE_0,
|
|
|
|
FIX_IO_APIC_BASE_END = FIX_IO_APIC_BASE_0 + MAX_IO_APICS - 1,
|
|
|
|
#endif
|
|
|
|
#ifdef CONFIG_X86_32
|
|
|
|
FIX_KMAP_BEGIN, /* reserved pte's for temporary kernel mappings */
|
|
|
|
FIX_KMAP_END = FIX_KMAP_BEGIN+(KM_TYPE_NR*NR_CPUS)-1,
|
|
|
|
#ifdef CONFIG_PCI_MMCONFIG
|
|
|
|
FIX_PCIE_MCFG,
|
|
|
|
#endif
|
|
|
|
#endif
|
|
|
|
#ifdef CONFIG_PARAVIRT
|
|
|
|
FIX_PARAVIRT_BOOTMAP,
|
|
|
|
#endif
|
2011-12-18 01:43:40 +08:00
|
|
|
#ifdef CONFIG_X86_INTEL_MID
|
2010-11-11 01:29:00 +08:00
|
|
|
FIX_LNW_VRTC,
|
|
|
|
#endif
|
2017-03-15 01:05:07 +08:00
|
|
|
|
2017-11-07 02:44:24 +08:00
|
|
|
#ifdef CONFIG_ACPI_APEI_GHES
|
|
|
|
/* Used for GHES mapping from assorted contexts */
|
|
|
|
FIX_APEI_GHES_IRQ,
|
|
|
|
FIX_APEI_GHES_NMI,
|
|
|
|
#endif
|
|
|
|
|
2011-01-11 18:55:56 +08:00
|
|
|
__end_of_permanent_fixed_addresses,
|
|
|
|
|
2009-02-16 08:48:59 +08:00
|
|
|
/*
|
x86 early_ioremap: Increase FIX_BTMAPS_SLOTS to 8
3.16 kernel boot fail with earlyprintk=efi, it keeps scrolling at the
bottom line of screen.
Bisected, the first bad commit is below:
commit 86dfc6f339886559d80ee0d4bd20fe5ee90450f0
Author: Lv Zheng <lv.zheng@intel.com>
Date: Fri Apr 4 12:38:57 2014 +0800
ACPICA: Tables: Fix table checksums verification before installation.
I did some debugging by enabling both serial and efi earlyprintk, below is
some debug dmesg, seems early_ioremap fails in scroll up function due to
no free slot, see below dmesg output:
WARNING: CPU: 0 PID: 0 at mm/early_ioremap.c:116 __early_ioremap+0x90/0x1c4()
__early_ioremap(ed00c800, 00000c80) not found slot
Modules linked in:
CPU: 0 PID: 0 Comm: swapper Not tainted 3.17.0-rc1+ #204
Hardware name: Hewlett-Packard HP Z420 Workstation/1589, BIOS J61 v03.15 05/09/2013
Call Trace:
dump_stack+0x4e/0x7a
warn_slowpath_common+0x75/0x8e
? __early_ioremap+0x90/0x1c4
warn_slowpath_fmt+0x47/0x49
__early_ioremap+0x90/0x1c4
? sprintf+0x46/0x48
early_ioremap+0x13/0x15
early_efi_map+0x24/0x26
early_efi_scroll_up+0x6d/0xc0
early_efi_write+0x1b0/0x214
call_console_drivers.constprop.21+0x73/0x7e
console_unlock+0x151/0x3b2
? vprintk_emit+0x49f/0x532
vprintk_emit+0x521/0x532
? console_unlock+0x383/0x3b2
printk+0x4f/0x51
acpi_os_vprintf+0x2b/0x2d
acpi_os_printf+0x43/0x45
acpi_info+0x5c/0x63
? __acpi_map_table+0x13/0x18
? acpi_os_map_iomem+0x21/0x147
acpi_tb_print_table_header+0x177/0x186
acpi_tb_install_table_with_override+0x4b/0x62
acpi_tb_install_standard_table+0xd9/0x215
? early_ioremap+0x13/0x15
? __acpi_map_table+0x13/0x18
acpi_tb_parse_root_table+0x16e/0x1b4
acpi_initialize_tables+0x57/0x59
acpi_table_init+0x50/0xce
acpi_boot_table_init+0x1e/0x85
setup_arch+0x9b7/0xcc4
start_kernel+0x94/0x42d
? early_idt_handlers+0x120/0x120
x86_64_start_reservations+0x2a/0x2c
x86_64_start_kernel+0xf3/0x100
Quote reply from Lv.zheng about the early ioremap slot usage in this case:
"""
In early_efi_scroll_up(), 2 mapping entries will be used for the src/dst screen buffer.
In drivers/acpi/acpica/tbutils.c, we've improved the early table loading code in acpi_tb_parse_root_table().
We now need 2 mapping entries:
1. One mapping entry is used for RSDT table mapping. Each RSDT entry contains an address for another ACPI table.
2. For each entry in RSDP, we need another mapping entry to map the table to perform necessary check/override before installing it.
When acpi_tb_parse_root_table() prints something through EFI earlyprintk console, we'll have 4 mapping entries used.
The current 4 slots setting of early_ioremap() seems to be too small for such a use case.
"""
Thus increase the slot to 8 in this patch to fix this issue.
boot-time mappings become 512 page with this patch.
Signed-off-by: Dave Young <dyoung@redhat.com>
Cc: <stable@vger.kernel.org> # v3.16
Signed-off-by: Matt Fleming <matt.fleming@intel.com>
2014-08-26 17:06:41 +08:00
|
|
|
* 512 temporary boot-time mappings, used by early_ioremap(),
|
2009-02-16 08:48:59 +08:00
|
|
|
* before ioremap() is functional.
|
|
|
|
*
|
x86 early_ioremap: Increase FIX_BTMAPS_SLOTS to 8
3.16 kernel boot fail with earlyprintk=efi, it keeps scrolling at the
bottom line of screen.
Bisected, the first bad commit is below:
commit 86dfc6f339886559d80ee0d4bd20fe5ee90450f0
Author: Lv Zheng <lv.zheng@intel.com>
Date: Fri Apr 4 12:38:57 2014 +0800
ACPICA: Tables: Fix table checksums verification before installation.
I did some debugging by enabling both serial and efi earlyprintk, below is
some debug dmesg, seems early_ioremap fails in scroll up function due to
no free slot, see below dmesg output:
WARNING: CPU: 0 PID: 0 at mm/early_ioremap.c:116 __early_ioremap+0x90/0x1c4()
__early_ioremap(ed00c800, 00000c80) not found slot
Modules linked in:
CPU: 0 PID: 0 Comm: swapper Not tainted 3.17.0-rc1+ #204
Hardware name: Hewlett-Packard HP Z420 Workstation/1589, BIOS J61 v03.15 05/09/2013
Call Trace:
dump_stack+0x4e/0x7a
warn_slowpath_common+0x75/0x8e
? __early_ioremap+0x90/0x1c4
warn_slowpath_fmt+0x47/0x49
__early_ioremap+0x90/0x1c4
? sprintf+0x46/0x48
early_ioremap+0x13/0x15
early_efi_map+0x24/0x26
early_efi_scroll_up+0x6d/0xc0
early_efi_write+0x1b0/0x214
call_console_drivers.constprop.21+0x73/0x7e
console_unlock+0x151/0x3b2
? vprintk_emit+0x49f/0x532
vprintk_emit+0x521/0x532
? console_unlock+0x383/0x3b2
printk+0x4f/0x51
acpi_os_vprintf+0x2b/0x2d
acpi_os_printf+0x43/0x45
acpi_info+0x5c/0x63
? __acpi_map_table+0x13/0x18
? acpi_os_map_iomem+0x21/0x147
acpi_tb_print_table_header+0x177/0x186
acpi_tb_install_table_with_override+0x4b/0x62
acpi_tb_install_standard_table+0xd9/0x215
? early_ioremap+0x13/0x15
? __acpi_map_table+0x13/0x18
acpi_tb_parse_root_table+0x16e/0x1b4
acpi_initialize_tables+0x57/0x59
acpi_table_init+0x50/0xce
acpi_boot_table_init+0x1e/0x85
setup_arch+0x9b7/0xcc4
start_kernel+0x94/0x42d
? early_idt_handlers+0x120/0x120
x86_64_start_reservations+0x2a/0x2c
x86_64_start_kernel+0xf3/0x100
Quote reply from Lv.zheng about the early ioremap slot usage in this case:
"""
In early_efi_scroll_up(), 2 mapping entries will be used for the src/dst screen buffer.
In drivers/acpi/acpica/tbutils.c, we've improved the early table loading code in acpi_tb_parse_root_table().
We now need 2 mapping entries:
1. One mapping entry is used for RSDT table mapping. Each RSDT entry contains an address for another ACPI table.
2. For each entry in RSDP, we need another mapping entry to map the table to perform necessary check/override before installing it.
When acpi_tb_parse_root_table() prints something through EFI earlyprintk console, we'll have 4 mapping entries used.
The current 4 slots setting of early_ioremap() seems to be too small for such a use case.
"""
Thus increase the slot to 8 in this patch to fix this issue.
boot-time mappings become 512 page with this patch.
Signed-off-by: Dave Young <dyoung@redhat.com>
Cc: <stable@vger.kernel.org> # v3.16
Signed-off-by: Matt Fleming <matt.fleming@intel.com>
2014-08-26 17:06:41 +08:00
|
|
|
* If necessary we round it up to the next 512 pages boundary so
|
2019-08-09 19:46:12 +08:00
|
|
|
* that we can have a single pmd entry and a single pte table:
|
2009-02-16 08:48:59 +08:00
|
|
|
*/
|
|
|
|
#define NR_FIX_BTMAPS 64
|
x86 early_ioremap: Increase FIX_BTMAPS_SLOTS to 8
3.16 kernel boot fail with earlyprintk=efi, it keeps scrolling at the
bottom line of screen.
Bisected, the first bad commit is below:
commit 86dfc6f339886559d80ee0d4bd20fe5ee90450f0
Author: Lv Zheng <lv.zheng@intel.com>
Date: Fri Apr 4 12:38:57 2014 +0800
ACPICA: Tables: Fix table checksums verification before installation.
I did some debugging by enabling both serial and efi earlyprintk, below is
some debug dmesg, seems early_ioremap fails in scroll up function due to
no free slot, see below dmesg output:
WARNING: CPU: 0 PID: 0 at mm/early_ioremap.c:116 __early_ioremap+0x90/0x1c4()
__early_ioremap(ed00c800, 00000c80) not found slot
Modules linked in:
CPU: 0 PID: 0 Comm: swapper Not tainted 3.17.0-rc1+ #204
Hardware name: Hewlett-Packard HP Z420 Workstation/1589, BIOS J61 v03.15 05/09/2013
Call Trace:
dump_stack+0x4e/0x7a
warn_slowpath_common+0x75/0x8e
? __early_ioremap+0x90/0x1c4
warn_slowpath_fmt+0x47/0x49
__early_ioremap+0x90/0x1c4
? sprintf+0x46/0x48
early_ioremap+0x13/0x15
early_efi_map+0x24/0x26
early_efi_scroll_up+0x6d/0xc0
early_efi_write+0x1b0/0x214
call_console_drivers.constprop.21+0x73/0x7e
console_unlock+0x151/0x3b2
? vprintk_emit+0x49f/0x532
vprintk_emit+0x521/0x532
? console_unlock+0x383/0x3b2
printk+0x4f/0x51
acpi_os_vprintf+0x2b/0x2d
acpi_os_printf+0x43/0x45
acpi_info+0x5c/0x63
? __acpi_map_table+0x13/0x18
? acpi_os_map_iomem+0x21/0x147
acpi_tb_print_table_header+0x177/0x186
acpi_tb_install_table_with_override+0x4b/0x62
acpi_tb_install_standard_table+0xd9/0x215
? early_ioremap+0x13/0x15
? __acpi_map_table+0x13/0x18
acpi_tb_parse_root_table+0x16e/0x1b4
acpi_initialize_tables+0x57/0x59
acpi_table_init+0x50/0xce
acpi_boot_table_init+0x1e/0x85
setup_arch+0x9b7/0xcc4
start_kernel+0x94/0x42d
? early_idt_handlers+0x120/0x120
x86_64_start_reservations+0x2a/0x2c
x86_64_start_kernel+0xf3/0x100
Quote reply from Lv.zheng about the early ioremap slot usage in this case:
"""
In early_efi_scroll_up(), 2 mapping entries will be used for the src/dst screen buffer.
In drivers/acpi/acpica/tbutils.c, we've improved the early table loading code in acpi_tb_parse_root_table().
We now need 2 mapping entries:
1. One mapping entry is used for RSDT table mapping. Each RSDT entry contains an address for another ACPI table.
2. For each entry in RSDP, we need another mapping entry to map the table to perform necessary check/override before installing it.
When acpi_tb_parse_root_table() prints something through EFI earlyprintk console, we'll have 4 mapping entries used.
The current 4 slots setting of early_ioremap() seems to be too small for such a use case.
"""
Thus increase the slot to 8 in this patch to fix this issue.
boot-time mappings become 512 page with this patch.
Signed-off-by: Dave Young <dyoung@redhat.com>
Cc: <stable@vger.kernel.org> # v3.16
Signed-off-by: Matt Fleming <matt.fleming@intel.com>
2014-08-26 17:06:41 +08:00
|
|
|
#define FIX_BTMAPS_SLOTS 8
|
2009-12-19 00:05:51 +08:00
|
|
|
#define TOTAL_FIX_BTMAPS (NR_FIX_BTMAPS * FIX_BTMAPS_SLOTS)
|
|
|
|
FIX_BTMAP_END =
|
|
|
|
(__end_of_permanent_fixed_addresses ^
|
|
|
|
(__end_of_permanent_fixed_addresses + TOTAL_FIX_BTMAPS - 1)) &
|
|
|
|
-PTRS_PER_PTE
|
|
|
|
? __end_of_permanent_fixed_addresses + TOTAL_FIX_BTMAPS -
|
|
|
|
(__end_of_permanent_fixed_addresses & (TOTAL_FIX_BTMAPS - 1))
|
|
|
|
: __end_of_permanent_fixed_addresses,
|
|
|
|
FIX_BTMAP_BEGIN = FIX_BTMAP_END + TOTAL_FIX_BTMAPS - 1,
|
2009-02-16 08:48:59 +08:00
|
|
|
#ifdef CONFIG_X86_32
|
|
|
|
FIX_WP_TEST,
|
x86, intel_txt: Intel TXT boot support
This patch adds kernel configuration and boot support for Intel Trusted
Execution Technology (Intel TXT).
Intel's technology for safer computing, Intel Trusted Execution
Technology (Intel TXT), defines platform-level enhancements that
provide the building blocks for creating trusted platforms.
Intel TXT was formerly known by the code name LaGrande Technology (LT).
Intel TXT in Brief:
o Provides dynamic root of trust for measurement (DRTM)
o Data protection in case of improper shutdown
o Measurement and verification of launched environment
Intel TXT is part of the vPro(TM) brand and is also available some
non-vPro systems. It is currently available on desktop systems based on
the Q35, X38, Q45, and Q43 Express chipsets (e.g. Dell Optiplex 755, HP
dc7800, etc.) and mobile systems based on the GM45, PM45, and GS45
Express chipsets.
For more information, see http://www.intel.com/technology/security/.
This site also has a link to the Intel TXT MLE Developers Manual, which
has been updated for the new released platforms.
A much more complete description of how these patches support TXT, how to
configure a system for it, etc. is in the Documentation/intel_txt.txt file
in this patch.
This patch provides the TXT support routines for complete functionality,
documentation for TXT support and for the changes to the boot_params structure,
and boot detection of a TXT launch. Attempts to shutdown (reboot, Sx) the system
will result in platform resets; subsequent patches will support these shutdown modes
properly.
Documentation/intel_txt.txt | 210 +++++++++++++++++++++
Documentation/x86/zero-page.txt | 1
arch/x86/include/asm/bootparam.h | 3
arch/x86/include/asm/fixmap.h | 3
arch/x86/include/asm/tboot.h | 197 ++++++++++++++++++++
arch/x86/kernel/Makefile | 1
arch/x86/kernel/setup.c | 4
arch/x86/kernel/tboot.c | 379 +++++++++++++++++++++++++++++++++++++++
security/Kconfig | 30 +++
9 files changed, 827 insertions(+), 1 deletion(-)
Signed-off-by: Joseph Cihula <joseph.cihula@intel.com>
Signed-off-by: Shane Wang <shane.wang@intel.com>
Signed-off-by: Gang Wei <gang.wei@intel.com>
Signed-off-by: H. Peter Anvin <hpa@zytor.com>
2009-07-01 10:30:59 +08:00
|
|
|
#endif
|
|
|
|
#ifdef CONFIG_INTEL_TXT
|
|
|
|
FIX_TBOOT_BASE,
|
2009-02-16 08:48:59 +08:00
|
|
|
#endif
|
|
|
|
__end_of_fixed_addresses
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
extern void reserve_top_address(unsigned long reserve);
|
|
|
|
|
2018-01-30 19:22:55 +08:00
|
|
|
#define FIXADDR_SIZE (__end_of_permanent_fixed_addresses << PAGE_SHIFT)
|
|
|
|
#define FIXADDR_START (FIXADDR_TOP - FIXADDR_SIZE)
|
|
|
|
#define FIXADDR_TOT_SIZE (__end_of_fixed_addresses << PAGE_SHIFT)
|
|
|
|
#define FIXADDR_TOT_START (FIXADDR_TOP - FIXADDR_TOT_SIZE)
|
2008-04-26 00:25:25 +08:00
|
|
|
|
2008-06-18 02:41:54 +08:00
|
|
|
extern int fixmaps_set;
|
|
|
|
|
2008-10-31 10:37:09 +08:00
|
|
|
extern pte_t *kmap_pte;
|
2016-01-20 05:38:59 +08:00
|
|
|
#define kmap_prot PAGE_KERNEL
|
2008-10-31 10:37:09 +08:00
|
|
|
extern pte_t *pkmap_page_table;
|
|
|
|
|
2008-06-18 02:42:01 +08:00
|
|
|
void __native_set_fixmap(enum fixed_addresses idx, pte_t pte);
|
|
|
|
void native_set_fixmap(enum fixed_addresses idx,
|
2009-04-10 01:55:33 +08:00
|
|
|
phys_addr_t phys, pgprot_t flags);
|
2008-06-18 02:42:01 +08:00
|
|
|
|
2018-08-28 15:40:25 +08:00
|
|
|
#ifndef CONFIG_PARAVIRT_XXL
|
2008-06-18 02:42:01 +08:00
|
|
|
static inline void __set_fixmap(enum fixed_addresses idx,
|
2009-04-10 01:55:33 +08:00
|
|
|
phys_addr_t phys, pgprot_t flags)
|
2008-06-18 02:42:01 +08:00
|
|
|
{
|
|
|
|
native_set_fixmap(idx, phys, flags);
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2017-07-18 05:10:07 +08:00
|
|
|
/*
|
|
|
|
* FIXMAP_PAGE_NOCACHE is used for MMIO. Memory encryption is not
|
|
|
|
* supported for MMIO addresses, so make sure that the memory encryption
|
|
|
|
* mask is not part of the page attributes.
|
|
|
|
*/
|
|
|
|
#define FIXMAP_PAGE_NOCACHE PAGE_KERNEL_IO_NOCACHE
|
|
|
|
|
2017-07-18 05:10:09 +08:00
|
|
|
/*
|
|
|
|
* Early memremap routines used for in-place encryption. The mappings created
|
|
|
|
* by these routines are intended to be used as temporary mappings.
|
|
|
|
*/
|
|
|
|
void __init *early_memremap_encrypted(resource_size_t phys_addr,
|
|
|
|
unsigned long size);
|
|
|
|
void __init *early_memremap_encrypted_wp(resource_size_t phys_addr,
|
|
|
|
unsigned long size);
|
|
|
|
void __init *early_memremap_decrypted(resource_size_t phys_addr,
|
|
|
|
unsigned long size);
|
|
|
|
void __init *early_memremap_decrypted_wp(resource_size_t phys_addr,
|
|
|
|
unsigned long size);
|
|
|
|
|
2014-01-24 07:53:50 +08:00
|
|
|
#include <asm-generic/fixmap.h>
|
2010-09-13 15:08:54 +08:00
|
|
|
|
2014-04-08 06:39:49 +08:00
|
|
|
#define __late_set_fixmap(idx, phys, flags) __set_fixmap(idx, phys, flags)
|
|
|
|
#define __late_clear_fixmap(idx) __set_fixmap(idx, 0, __pgprot(0))
|
|
|
|
|
|
|
|
void __early_set_fixmap(enum fixed_addresses idx,
|
|
|
|
phys_addr_t phys, pgprot_t flags);
|
|
|
|
|
2009-02-16 08:48:59 +08:00
|
|
|
#endif /* !__ASSEMBLY__ */
|
2008-10-23 13:26:29 +08:00
|
|
|
#endif /* _ASM_X86_FIXMAP_H */
|