Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754127AbcKJAg6 (ORCPT ); Wed, 9 Nov 2016 19:36:58 -0500 Received: from mail-bl2nam02on0071.outbound.protection.outlook.com ([104.47.38.71]:36544 "EHLO NAM02-BL2-obe.outbound.protection.outlook.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1753966AbcKJAgw (ORCPT ); Wed, 9 Nov 2016 19:36:52 -0500 Authentication-Results: spf=none (sender IP is ) smtp.mailfrom=Thomas.Lendacky@amd.com; From: Tom Lendacky Subject: [RFC PATCH v3 10/20] Add support to access boot related data in the clear To: , , , , , , , , CC: Rik van Riel , Radim =?utf-8?b?S3LEjW3DocWZ?= , Arnd Bergmann , Jonathan Corbet , Matt Fleming , Joerg Roedel , Konrad Rzeszutek Wilk , "Paolo Bonzini" , Larry Woodman , "Ingo Molnar" , Borislav Petkov , Andy Lutomirski , "H. Peter Anvin" , Andrey Ryabinin , Alexander Potapenko , "Thomas Gleixner" , Dmitry Vyukov Date: Wed, 9 Nov 2016 18:36:31 -0600 Message-ID: <20161110003631.3280.73292.stgit@tlendack-t1.amdoffice.net> In-Reply-To: <20161110003426.3280.2999.stgit@tlendack-t1.amdoffice.net> References: <20161110003426.3280.2999.stgit@tlendack-t1.amdoffice.net> User-Agent: StGit/0.17.1-dirty MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit X-Originating-IP: [165.204.77.1] X-ClientProxiedBy: BN6PR17CA0026.namprd17.prod.outlook.com (10.175.189.12) To MWHPR12MB1151.namprd12.prod.outlook.com (10.169.204.15) X-MS-Office365-Filtering-Correlation-Id: 061f766e-ec26-4dec-f120-08d40901a7c1 X-Microsoft-Exchange-Diagnostics: 1;MWHPR12MB1151;2:TofonxVVuinfUMjLN37ylSKYZQnlugIbLAJnDruU/qPIhWhkxgv670zX9BCXcnq57dgiNuk8RhoXxdVfn3/PO9L2KdDljYhIbPVjRCT1QyvsbOmPpjgrgtxJpw/R/II6FmdsH5O0JhO+Ta6cqEG6Tje6ZcYiexIBwlSjmLe0KxePAH5qhVASVPbBhBRlIZaj9xscQ5DTBQ3PwinPQYjppg==;3:0OjNt9/n355t9iDsYmS28i1AHATpNfbKkpL79j8Zy7fbhoLByLENjhp6WIv0U09lFdPIL+3uswmueEwfxLUyGguSWVYAU4BTrtXlorqL2bx5GU9vdPDI+Nc/bYmWmYTpv2CxsbxHcz4UR2K2qG/Z+A== X-Microsoft-Antispam: UriScan:;BCL:0;PCL:0;RULEID:;SRVR:MWHPR12MB1151; X-Microsoft-Exchange-Diagnostics: 1;MWHPR12MB1151;25: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 X-Microsoft-Exchange-Diagnostics: 1;MWHPR12MB1151;31:uzg4b27KCl5frpRRZ2giKNy7R32AtVNpjf7N3evt3TIUjnozxOf4HEjna+nSi3YLtq8QcAEib3jQHN2nzVFHNS4Qb1Szx9HnqsISdz2rSTL09Vvaq2U3LHocHjNheKpIyrPlDOZC8tL+JuXKvVLVbH7xaGcJbDLmtnIaxP8fnG4tae7fqSfTkXk5eK6mRsNnsNl1t9PBXyABnc3dHYTd2re4C9k6wrc6/KKATnIBSulMXAmkzPSIpdT2+pvx2XW9fQldhKrdzL6y7Kf9VafPMQ==;20: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 X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-Test: UriScan:(767451399110); X-Exchange-Antispam-Report-CFA-Test: BCL:0;PCL:0;RULEID:(6040176)(601004)(2401047)(8121501046)(5005006)(10201501046)(3002001)(6055026);SRVR:MWHPR12MB1151;BCL:0;PCL:0;RULEID:;SRVR:MWHPR12MB1151; X-Microsoft-Exchange-Diagnostics: 1;MWHPR12MB1151;4:lKyomOXTSc1h4l/dZ24T5ligWepmjSvPw6nheCx+dyAXDBeljB5RkXAQelXLlTrAq37nuaBthafWId+RU618YuGQEJ02YWkEZ+2Hl0uP1Dibf2BAz69BqJKliUFXVHjWi7Bb9sNExDyT1V4a2upiY1+M9nzgjokCjH9twmHYO/uTbnpEgfGoqWYdHhiUrWliy76hAgwrws3CsfBAPGZnpJarKY3jm9YT5Cl2OoCkl3sBvCp2P3/2r2tmsDCppMDPE0cDDcuNGtIpdIzUe/PK2Ra/NR+laKkDyiwKFN2wtSiK+GIo9OAI0rCclCpLFMfcnH6tsu5OrKz4HLrHTWH5BMl6qU9LOap82UFxEe6tnD2RhdxDSDMhLHK+II/FsY+UTyMaxs/IFIcoWJMEHbWmkKZOFz9QxYx4bscd5MNTAae5a+wdSjh/Qx+hEvssUGbvvvpMhYyUW8/hifcCCjKR4w== X-Forefront-PRVS: 01221E3973 X-Forefront-Antispam-Report: SFV:NSPM;SFS:(10009020)(4630300001)(979002)(6009001)(7916002)(189002)(199003)(105586002)(47776003)(4326007)(7846002)(3846002)(7416002)(7736002)(83506001)(54356999)(68736007)(50466002)(50986999)(76176999)(106356001)(189998001)(66066001)(6116002)(33646002)(97736004)(1076002)(53416004)(101416001)(86362001)(575784001)(2906002)(5001770100001)(42186005)(97746001)(23676002)(4001350100001)(586003)(2950100002)(6666003)(69596002)(5660300001)(9686002)(103116003)(77096005)(305945005)(8676002)(230700001)(2201001)(92566002)(81156014)(81166006)(71626007)(217873001)(969003)(989001)(999001)(1009001)(1019001);DIR:OUT;SFP:1101;SCL:1;SRVR:MWHPR12MB1151;H:tlendack-t1.amdoffice.net;FPR:;SPF:None;PTR:InfoNoRecords;MX:1;A:1;LANG:en; X-Microsoft-Exchange-Diagnostics: =?utf-8?B?MTtNV0hQUjEyTUIxMTUxOzIzOmN6TmNWMU1BQjd2M0xjVUhKbTFXOHlKbUVq?= =?utf-8?B?UURGM2V3SzlTWVFCcE5KcVNaeTdRemJzcytFTUFvRXgrVTk2SitCZHBkOUpt?= =?utf-8?B?aVdaWmZKd1h2ZVB6UmlaR2x6K3R3N3cvZUNCcVk0Z0JWNk1xbllSVUpwSFQz?= =?utf-8?B?bTNGQ2ZBNEZ3dmh5VVpLVkZ2cTJsNnA4NHUyZHNScWlmWnNjYlVrMUtJaUNB?= =?utf-8?B?bkxUTlpCT3dobyt3UHYrMU81MVNDYVBaZWIrUFYrQlBnTHYzT3FmTU0yZXg5?= =?utf-8?B?VHgyZkQ5RTdJV20xQUMwWUI2ZWpDeExZVGJadFhnVU9VSzVhVjJLbzRBRDB4?= =?utf-8?B?TzhzK0FKMlZFdEVTdmJHa3dFS280S2gva0FtKzgwZXMrd2JkY3FJUVdLemgy?= =?utf-8?B?MGF3S3lHaHE1NGpZN3BJRFB3VTZ6STVTNXFmZVZhTHhSVmg3cEJESTFvcE12?= =?utf-8?B?TlpzUUFNRFJIb0NuOXZseDRWWWJiN2ora1hyZ1Z4c2wrdExCTk5XZUNpMWsz?= =?utf-8?B?RWlyYno1aXJhS21BMGl5YlBkcTFCUmxUQWt2VXRnak9ScEszRjB3MG5KQ2Zn?= =?utf-8?B?TWhIZVdyZVNxbEhjeWErWmIrd0ZOOENqMjFuZTRWQ1dkSWxoamRwdUdZYjJU?= =?utf-8?B?MjU3M1ZUWlFvRUc3eDVHc3YvWnEvVU1jRDdXOFRTbTMrTGdBTS9hS1FvZWlm?= =?utf-8?B?anNIZ1gvaUpGbnQraHF1Nzk2QW5Zc3NnUUgxUnNJZFZxbHBaaEdCOUpMRVNw?= =?utf-8?B?SUdxa25JMzhOTFBwN2lBa2d3Z0RORUVZMjgzRnJNeGo1SUEvaXVJclBwVTdC?= =?utf-8?B?cDVaWWpkb1NSS092MHdYTitNanRYRmF1T3BlWGRiUy9wbmVLbVdoSmJUazR0?= =?utf-8?B?TE9wWTdTZCttMFR0eDVXbFB0SDJMWTNYdzZTS2ppYmtQYmd0R3RZZkpJdElU?= =?utf-8?B?d1EwZVZoVWFHdnlxdlZYTUV0bEgzQTU0YkhLNjJlY2JzN3hkUVFxVkhaQWtY?= =?utf-8?B?VEhuYndRTjl1MWtMa1FrdGd0dTd2V0QzWXVLZG56NmtTK05KV3d2SHRKc2pK?= =?utf-8?B?aWhYenRNMUF0R2hybDY0cjFIOU1lUmtyUkNJNXdmbHFMRUlsaFY4TXFRSFNy?= =?utf-8?B?bzIzZEpmeStKVVFBdGx5ZTN5emY1T2s1cUtaN3Vva09vb0FTQ3N4YndjeHRT?= =?utf-8?B?dDdaam5GMm42cE51UE5vRktUUmR2bnNsYXYrOEgrZGtKU1hRTzRBb1V0RUM1?= =?utf-8?B?ZXhMSE1IdGlQRVpWZmdXS29HQWpVQVMwV1krbW1vbFlHT0pVbXRPaXhvZEVV?= =?utf-8?B?MW1XU296eGh1SW5OMzYya1hBd1JkVG9lMmF6VHFmdzFyMy9rZHVpSzc0K0Jo?= =?utf-8?B?dGxSR2ZsbE9FYWpUOUtnN2t2ZTNLMFprQ0lieER0Y3JNSklsNWdjWHMxRVEv?= =?utf-8?B?VnNBc3Q3WUNmT29FU0pHZWRTa0JxajNnT3NwV2V5WVZaWkxnemEzOVZuN09u?= =?utf-8?B?ZXBMVGVsYjNyMlBOY1lFSlQ1d0JkUzFJdjNSeWxKY3FiTFc5Y2IwUHpXcGJH?= =?utf-8?B?bG1EODBYb1ZHQVZZN0JPUnJGVEdjQWtSM0UrSGlMY0RWVEl6bzMyM0RJR3dl?= =?utf-8?B?cjdzdTg3ZmNDVnNxNEtnNFQ1bmVWd0lIUjFWb3RNZzFQK0w0UzlSVXoxS2RJ?= =?utf-8?B?YjZab3BqRG9FM1h2QVRZbmVEUFVLZjNkWmxrUHowLzRHaTFpbGNPYmNzQnhR?= =?utf-8?B?bU5tMEdpQmx5QTRMWEdaVlFLZHI2U2k3aHdSUDZwNDJ1RFR4eDU0SVF6TUE1?= =?utf-8?B?UFQrbHlIdGVWQXpxU2hoZy9iN3hvTi9Ja0t0YVZFYkQ3dk1yT0RiUVNVRmJG?= =?utf-8?Q?WvOvbaAU/ps=3D?= X-Microsoft-Exchange-Diagnostics: 1;MWHPR12MB1151;6:qazTlX4r2Uxwkq0sIebhy2yoDDGg+I39c55fnsZcQ1EGAlz31HW43AXXU0U++PkT06OPSERS/G+9rN5NMSkVVClByQPsmtppLBsWwNc1EUYsrzXqv5ZEFLn3Eswcme2XHUXJMNa66majp0aZgdjEOU+VwmiPdfZW4UClqA7npP7N3mOAY3aplMqvgn+gDl6eVdml8A6mFA+VjUjccpE14RvmCLCUZlpRuKoa5OFLxzraKAy2joeWcnpjIM0KTX9DfiXH6HDSQh7wB+4XlP6AH0Ss+vOZ8rFcxzWrSg0Ol2aAmbxbzLkQ74XUrhre0UoL9T2GSpRH2zOrf1m+0t/PQx+aJGzsaUcHtOGSONJYMl8=;5:6Qs5wp/MCTTJ7C2BB5B3g/qLVcLkxGqF+iEG8kpotKfBESXQXY5+3bWb36GHfy/DO4QyiGDJlcVNXM3SMSr3OYCL3a1cfmhGbTonaOT8vPAA48YpXwtZ72tBXPK618pDULW9gSUAL639Mwk7MxZrkg==;24:NSHJcpNahgNQ/bwOZNQsyLouJY7N9cl2yTELf+YWmdVcxmDaHkblU1+gbiWpX9X7km406wGzMK9P8qfJuT8QE8t4zwJyIDVwLJ+39r2T8bI= SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-Microsoft-Exchange-Diagnostics: 1;MWHPR12MB1151;7:R5fGMeH1YPXk9ywr0sWpFlIyp05tL1zK8P7by5iamx3NzVd+cj5BeSdJm+EcjJXsNIfSgpCeylkEfA5JT5w+lcUGNBoo4L6s6Jrm/CB+95uCgkMJoMqFgp+bQAWhwD24gQxcLWt5ua1aWPiyIW6ZBsUxFZwckMStzeD/k1OafDtJaHUMsNpUTMdOGLfKtbBNlJ+jClF3NcIwHHTjaTTdvBfhYS/ExCMCGCQ28BjlxKqhpopvCWfR+lprTnGPaQrGWITzJKWKV0+MTr+j2opTpSo1AIcJgJFAvbzzdwO5LXDJ3LRN2OOdjDDltPoZAI5mub8jsSmDE/C64vLAJrwCn9hqXoKXIKpNam/K+LgEQ5g=;20:CaESZXvYrl6lg6LCuhhtlzyUy2ZW1ifPYzKa2oFgTvcgUwkM3K1IEVRbiiLw8o5uLmdL6bOLo6MvYILNuF5fgQqEWvKU8dxiljaE79pCmd6gKDiNbvlUWyl3czkpoKTtbp121xNv3DvqBVurBod0DeQel8uWC1UHFXWUK2jMj1eal/CFFKyD19pKMcLPOPrRZdITmaO47Lt3OnEwBrCrAoi2dLIX9BhPw+FYUCUibm48BLyE+B8JDK9a5FW539YT X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 10 Nov 2016 00:36:44.6066 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-Transport-CrossTenantHeadersStamped: MWHPR12MB1151 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 9345 Lines: 327 Boot data (such as EFI related data) is not encrypted when the system is booted and needs to be accessed unencrypted. Add support to apply the proper attributes to the EFI page tables and to the early_memremap and memremap APIs to identify the type of data being accessed so that the proper encryption attribute can be applied. Signed-off-by: Tom Lendacky --- arch/x86/include/asm/e820.h | 1 arch/x86/kernel/e820.c | 16 +++++++ arch/x86/mm/ioremap.c | 89 ++++++++++++++++++++++++++++++++++++++++ arch/x86/platform/efi/efi_64.c | 12 ++++- drivers/firmware/efi/efi.c | 33 +++++++++++++++ include/linux/efi.h | 2 + kernel/memremap.c | 8 +++- mm/early_ioremap.c | 18 +++++++- 8 files changed, 172 insertions(+), 7 deletions(-) diff --git a/arch/x86/include/asm/e820.h b/arch/x86/include/asm/e820.h index 476b574..186f1d04 100644 --- a/arch/x86/include/asm/e820.h +++ b/arch/x86/include/asm/e820.h @@ -16,6 +16,7 @@ extern struct e820map *e820_saved; extern unsigned long pci_mem_start; extern int e820_any_mapped(u64 start, u64 end, unsigned type); extern int e820_all_mapped(u64 start, u64 end, unsigned type); +extern unsigned int e820_get_entry_type(u64 start, u64 end); extern void e820_add_region(u64 start, u64 size, int type); extern void e820_print_map(char *who); extern int diff --git a/arch/x86/kernel/e820.c b/arch/x86/kernel/e820.c index b85fe5f..92fce4e 100644 --- a/arch/x86/kernel/e820.c +++ b/arch/x86/kernel/e820.c @@ -107,6 +107,22 @@ int __init e820_all_mapped(u64 start, u64 end, unsigned type) return 0; } +unsigned int e820_get_entry_type(u64 start, u64 end) +{ + int i; + + for (i = 0; i < e820->nr_map; i++) { + struct e820entry *ei = &e820->map[i]; + + if (ei->addr >= end || ei->addr + ei->size <= start) + continue; + + return ei->type; + } + + return 0; +} + /* * Add a memory region to the kernel e820 map. */ diff --git a/arch/x86/mm/ioremap.c b/arch/x86/mm/ioremap.c index ff542cd..ee347c2 100644 --- a/arch/x86/mm/ioremap.c +++ b/arch/x86/mm/ioremap.c @@ -20,6 +20,9 @@ #include #include #include +#include +#include +#include #include "physaddr.h" @@ -418,6 +421,92 @@ void unxlate_dev_mem_ptr(phys_addr_t phys, void *addr) iounmap((void __iomem *)((unsigned long)addr & PAGE_MASK)); } +static bool memremap_setup_data(resource_size_t phys_addr, + unsigned long size) +{ + u64 paddr; + + if (phys_addr == boot_params.hdr.setup_data) + return true; + + paddr = boot_params.efi_info.efi_memmap_hi; + paddr <<= 32; + paddr |= boot_params.efi_info.efi_memmap; + if (phys_addr == paddr) + return true; + + paddr = boot_params.efi_info.efi_systab_hi; + paddr <<= 32; + paddr |= boot_params.efi_info.efi_systab; + if (phys_addr == paddr) + return true; + + if (efi_table_address_match(phys_addr)) + return true; + + return false; +} + +static bool memremap_apply_encryption(resource_size_t phys_addr, + unsigned long size) +{ + /* SME is not active, just return true */ + if (!sme_me_mask) + return true; + + /* Check if the address is part of the setup data */ + if (memremap_setup_data(phys_addr, size)) + return false; + + /* Check if the address is part of EFI boot/runtime data */ + switch (efi_mem_type(phys_addr)) { + case EFI_BOOT_SERVICES_DATA: + case EFI_RUNTIME_SERVICES_DATA: + return false; + } + + /* Check if the address is outside kernel usable area */ + switch (e820_get_entry_type(phys_addr, phys_addr + size - 1)) { + case E820_RESERVED: + case E820_ACPI: + case E820_NVS: + case E820_UNUSABLE: + return false; + } + + return true; +} + +/* + * Architecure override of __weak function to prevent ram remap and use the + * architectural remap function. + */ +bool memremap_do_ram_remap(resource_size_t phys_addr, unsigned long size) +{ + if (!memremap_apply_encryption(phys_addr, size)) + return false; + + return true; +} + +/* + * Architecure override of __weak function to adjust the protection attributes + * used when remapping memory. + */ +pgprot_t __init early_memremap_pgprot_adjust(resource_size_t phys_addr, + unsigned long size, + pgprot_t prot) +{ + unsigned long prot_val = pgprot_val(prot); + + if (memremap_apply_encryption(phys_addr, size)) + prot_val |= _PAGE_ENC; + else + prot_val &= ~_PAGE_ENC; + + return __pgprot(prot_val); +} + /* Remap memory with encryption */ void __init *early_memremap_enc(resource_size_t phys_addr, unsigned long size) diff --git a/arch/x86/platform/efi/efi_64.c b/arch/x86/platform/efi/efi_64.c index 58b0f80..3f89179 100644 --- a/arch/x86/platform/efi/efi_64.c +++ b/arch/x86/platform/efi/efi_64.c @@ -221,7 +221,13 @@ int __init efi_setup_page_tables(unsigned long pa_memmap, unsigned num_pages) if (efi_enabled(EFI_OLD_MEMMAP)) return 0; - efi_scratch.efi_pgt = (pgd_t *)__pa(efi_pgd); + /* + * Since the PGD is encrypted, set the encryption mask so that when + * this value is loaded into cr3 the PGD will be decrypted during + * the pagetable walk. + */ + efi_scratch.efi_pgt = (pgd_t *)__sme_pa(efi_pgd); + pgd = efi_pgd; /* @@ -231,7 +237,7 @@ int __init efi_setup_page_tables(unsigned long pa_memmap, unsigned num_pages) * phys_efi_set_virtual_address_map(). */ pfn = pa_memmap >> PAGE_SHIFT; - if (kernel_map_pages_in_pgd(pgd, pfn, pa_memmap, num_pages, _PAGE_NX | _PAGE_RW)) { + if (kernel_map_pages_in_pgd(pgd, pfn, pa_memmap, num_pages, _PAGE_NX | _PAGE_RW | _PAGE_ENC)) { pr_err("Error ident-mapping new memmap (0x%lx)!\n", pa_memmap); return 1; } @@ -258,7 +264,7 @@ int __init efi_setup_page_tables(unsigned long pa_memmap, unsigned num_pages) text = __pa(_text); pfn = text >> PAGE_SHIFT; - if (kernel_map_pages_in_pgd(pgd, pfn, text, npages, _PAGE_RW)) { + if (kernel_map_pages_in_pgd(pgd, pfn, text, npages, _PAGE_RW | _PAGE_ENC)) { pr_err("Failed to map kernel text 1:1\n"); return 1; } diff --git a/drivers/firmware/efi/efi.c b/drivers/firmware/efi/efi.c index 1ac199c..91c06ec 100644 --- a/drivers/firmware/efi/efi.c +++ b/drivers/firmware/efi/efi.c @@ -51,6 +51,25 @@ struct efi __read_mostly efi = { }; EXPORT_SYMBOL(efi); +static unsigned long *efi_tables[] = { + &efi.mps, + &efi.acpi, + &efi.acpi20, + &efi.smbios, + &efi.smbios3, + &efi.sal_systab, + &efi.boot_info, + &efi.hcdp, + &efi.uga, + &efi.uv_systab, + &efi.fw_vendor, + &efi.runtime, + &efi.config_table, + &efi.esrt, + &efi.properties_table, + &efi.mem_attr_table, +}; + static bool disable_runtime; static int __init setup_noefi(char *arg) { @@ -822,3 +841,17 @@ int efi_status_to_err(efi_status_t status) return err; } + +bool efi_table_address_match(unsigned long phys_addr) +{ + int i; + + if (phys_addr == EFI_INVALID_TABLE_ADDR) + return false; + + for (i = 0; i < ARRAY_SIZE(efi_tables); i++) + if (*(efi_tables[i]) == phys_addr) + return true; + + return false; +} diff --git a/include/linux/efi.h b/include/linux/efi.h index 2d08948..72d89bf 100644 --- a/include/linux/efi.h +++ b/include/linux/efi.h @@ -1070,6 +1070,8 @@ efi_capsule_pending(int *reset_type) extern int efi_status_to_err(efi_status_t status); +extern bool efi_table_address_match(unsigned long phys_addr); + /* * Variable Attributes */ diff --git a/kernel/memremap.c b/kernel/memremap.c index b501e39..ac1437e 100644 --- a/kernel/memremap.c +++ b/kernel/memremap.c @@ -34,12 +34,18 @@ static void *arch_memremap_wb(resource_size_t offset, unsigned long size) } #endif +bool __weak memremap_do_ram_remap(resource_size_t offset, size_t size) +{ + return true; +} + static void *try_ram_remap(resource_size_t offset, size_t size) { unsigned long pfn = PHYS_PFN(offset); /* In the simple case just return the existing linear address */ - if (pfn_valid(pfn) && !PageHighMem(pfn_to_page(pfn))) + if (pfn_valid(pfn) && !PageHighMem(pfn_to_page(pfn)) && + memremap_do_ram_remap(offset, size)) return __va(offset); return NULL; /* fallback to arch_memremap_wb */ } diff --git a/mm/early_ioremap.c b/mm/early_ioremap.c index d71b98b..34af5b6 100644 --- a/mm/early_ioremap.c +++ b/mm/early_ioremap.c @@ -30,6 +30,13 @@ early_param("early_ioremap_debug", early_ioremap_debug_setup); static int after_paging_init __initdata; +pgprot_t __init __weak early_memremap_pgprot_adjust(resource_size_t phys_addr, + unsigned long size, + pgprot_t prot) +{ + return prot; +} + void __init __weak early_ioremap_shutdown(void) { } @@ -215,14 +222,19 @@ early_ioremap(resource_size_t phys_addr, unsigned long size) void __init * early_memremap(resource_size_t phys_addr, unsigned long size) { - return (__force void *)__early_ioremap(phys_addr, size, - FIXMAP_PAGE_NORMAL); + pgprot_t prot = early_memremap_pgprot_adjust(phys_addr, size, + FIXMAP_PAGE_NORMAL); + + return (__force void *)__early_ioremap(phys_addr, size, prot); } #ifdef FIXMAP_PAGE_RO void __init * early_memremap_ro(resource_size_t phys_addr, unsigned long size) { - return (__force void *)__early_ioremap(phys_addr, size, FIXMAP_PAGE_RO); + pgprot_t prot = early_memremap_pgprot_adjust(phys_addr, size, + FIXMAP_PAGE_RO); + + return (__force void *)__early_ioremap(phys_addr, size, prot); } #endif