2019-05-29 22:18:00 +08:00
|
|
|
// SPDX-License-Identifier: GPL-2.0-only
|
2017-07-11 09:00:26 +08:00
|
|
|
/*
|
|
|
|
* Copyright (C) 2012 Regents of the University of California
|
2019-06-29 04:36:21 +08:00
|
|
|
* Copyright (C) 2019 Western Digital Corporation or its affiliates.
|
2021-04-19 08:55:38 +08:00
|
|
|
* Copyright (C) 2020 FORTH-ICS/CARV
|
|
|
|
* Nick Kossifidis <mick@ics.forth.gr>
|
2017-07-11 09:00:26 +08:00
|
|
|
*/
|
|
|
|
|
|
|
|
#include <linux/init.h>
|
|
|
|
#include <linux/mm.h>
|
|
|
|
#include <linux/memblock.h>
|
2018-10-31 06:09:49 +08:00
|
|
|
#include <linux/initrd.h>
|
2017-07-11 09:00:26 +08:00
|
|
|
#include <linux/swap.h>
|
2021-06-02 16:55:16 +08:00
|
|
|
#include <linux/swiotlb.h>
|
2018-01-16 16:37:50 +08:00
|
|
|
#include <linux/sizes.h>
|
2019-02-21 13:55:49 +08:00
|
|
|
#include <linux/of_fdt.h>
|
2021-04-19 08:55:39 +08:00
|
|
|
#include <linux/of_reserved_mem.h>
|
riscv: Fix memblock reservation for device tree blob
This fixes an error with how the FDT blob is reserved in memblock.
An incorrect physical address calculation exposed the FDT header to
unintended corruption, which typically manifested with of_fdt_raw_init()
faulting during late boot after fdt_totalsize() returned a wrong value.
Systems with smaller physical memory sizes more frequently trigger this
issue, as the kernel is more likely to allocate from the DMA32 zone
where bbl places the DTB after the kernel image.
Commit 671f9a3e2e24 ("RISC-V: Setup initial page tables in two stages")
changed the mapping of the DTB to reside in the fixmap area.
Consequently, early_init_fdt_reserve_self() cannot be used anymore in
setup_bootmem() since it relies on __pa() to derive a physical address,
which does not work with dtb_early_va that is no longer a valid kernel
logical address.
The reserved[0x1] region shows the effect of the pointer underflow
resulting from the __pa(initial_boot_params) offset subtraction:
[ 0.000000] MEMBLOCK configuration:
[ 0.000000] memory size = 0x000000001fe00000 reserved size = 0x0000000000a2e514
[ 0.000000] memory.cnt = 0x1
[ 0.000000] memory[0x0] [0x0000000080200000-0x000000009fffffff], 0x000000001fe00000 bytes flags: 0x0
[ 0.000000] reserved.cnt = 0x2
[ 0.000000] reserved[0x0] [0x0000000080200000-0x0000000080c2dfeb], 0x0000000000a2dfec bytes flags: 0x0
[ 0.000000] reserved[0x1] [0xfffffff080100000-0xfffffff080100527], 0x0000000000000528 bytes flags: 0x0
With the fix applied:
[ 0.000000] MEMBLOCK configuration:
[ 0.000000] memory size = 0x000000001fe00000 reserved size = 0x0000000000a2e514
[ 0.000000] memory.cnt = 0x1
[ 0.000000] memory[0x0] [0x0000000080200000-0x000000009fffffff], 0x000000001fe00000 bytes flags: 0x0
[ 0.000000] reserved.cnt = 0x2
[ 0.000000] reserved[0x0] [0x0000000080200000-0x0000000080c2dfeb], 0x0000000000a2dfec bytes flags: 0x0
[ 0.000000] reserved[0x1] [0x0000000080e00000-0x0000000080e00527], 0x0000000000000528 bytes flags: 0x0
Fixes: 671f9a3e2e24 ("RISC-V: Setup initial page tables in two stages")
Signed-off-by: Albert Ou <aou@eecs.berkeley.edu>
Tested-by: Bin Meng <bmeng.cn@gmail.com>
Reviewed-by: Anup Patel <anup@brainfault.org>
Signed-off-by: Paul Walmsley <paul.walmsley@sifive.com>
2019-09-28 07:14:18 +08:00
|
|
|
#include <linux/libfdt.h>
|
2020-03-10 00:55:41 +08:00
|
|
|
#include <linux/set_memory.h>
|
2020-10-31 14:01:12 +08:00
|
|
|
#include <linux/dma-map-ops.h>
|
2021-04-19 08:55:38 +08:00
|
|
|
#include <linux/crash_dump.h>
|
2017-07-11 09:00:26 +08:00
|
|
|
|
2019-01-07 23:27:01 +08:00
|
|
|
#include <asm/fixmap.h>
|
2017-07-11 09:00:26 +08:00
|
|
|
#include <asm/tlbflush.h>
|
|
|
|
#include <asm/sections.h>
|
2020-04-14 12:43:24 +08:00
|
|
|
#include <asm/soc.h>
|
2017-07-11 09:00:26 +08:00
|
|
|
#include <asm/io.h>
|
2020-06-04 07:03:55 +08:00
|
|
|
#include <asm/ptdump.h>
|
2020-11-19 08:38:29 +08:00
|
|
|
#include <asm/numa.h>
|
2017-07-11 09:00:26 +08:00
|
|
|
|
2019-10-18 06:00:17 +08:00
|
|
|
#include "../kernel/head.h"
|
|
|
|
|
2021-06-17 21:53:07 +08:00
|
|
|
struct kernel_mapping kernel_map __ro_after_init;
|
|
|
|
EXPORT_SYMBOL(kernel_map);
|
|
|
|
#ifdef CONFIG_XIP_KERNEL
|
|
|
|
#define kernel_map (*(struct kernel_mapping *)XIP_FIXUP(&kernel_map))
|
|
|
|
#endif
|
|
|
|
|
2021-04-13 14:35:14 +08:00
|
|
|
#ifdef CONFIG_XIP_KERNEL
|
2021-05-14 17:49:08 +08:00
|
|
|
extern char _xiprom[], _exiprom[];
|
2021-04-13 14:35:14 +08:00
|
|
|
#endif
|
2021-04-12 00:41:44 +08:00
|
|
|
|
2019-03-26 16:03:47 +08:00
|
|
|
unsigned long empty_zero_page[PAGE_SIZE / sizeof(unsigned long)]
|
|
|
|
__page_aligned_bss;
|
|
|
|
EXPORT_SYMBOL(empty_zero_page);
|
|
|
|
|
2019-06-07 14:01:29 +08:00
|
|
|
extern char _start[];
|
2020-09-18 06:37:10 +08:00
|
|
|
#define DTB_EARLY_BASE_VA PGDIR_SIZE
|
2021-04-13 14:35:14 +08:00
|
|
|
void *_dtb_early_va __initdata;
|
|
|
|
uintptr_t _dtb_early_pa __initdata;
|
2019-06-07 14:01:29 +08:00
|
|
|
|
2020-09-18 06:37:12 +08:00
|
|
|
struct pt_alloc_ops {
|
|
|
|
pte_t *(*get_pte_virt)(phys_addr_t pa);
|
|
|
|
phys_addr_t (*alloc_pte)(uintptr_t va);
|
|
|
|
#ifndef __PAGETABLE_PMD_FOLDED
|
|
|
|
pmd_t *(*get_pmd_virt)(phys_addr_t pa);
|
|
|
|
phys_addr_t (*alloc_pmd)(uintptr_t va);
|
|
|
|
#endif
|
|
|
|
};
|
2019-06-07 14:01:29 +08:00
|
|
|
|
2021-05-16 21:15:56 +08:00
|
|
|
static phys_addr_t dma32_phys_limit __initdata;
|
2020-10-31 14:01:12 +08:00
|
|
|
|
2017-07-11 09:00:26 +08:00
|
|
|
static void __init zone_sizes_init(void)
|
|
|
|
{
|
2018-01-16 16:37:50 +08:00
|
|
|
unsigned long max_zone_pfns[MAX_NR_ZONES] = { 0, };
|
2017-07-11 09:00:26 +08:00
|
|
|
|
2018-06-25 16:49:37 +08:00
|
|
|
#ifdef CONFIG_ZONE_DMA32
|
2020-10-31 14:01:12 +08:00
|
|
|
max_zone_pfns[ZONE_DMA32] = PFN_DOWN(dma32_phys_limit);
|
2018-06-25 16:49:37 +08:00
|
|
|
#endif
|
2018-01-16 16:37:50 +08:00
|
|
|
max_zone_pfns[ZONE_NORMAL] = max_low_pfn;
|
|
|
|
|
2020-06-04 06:57:10 +08:00
|
|
|
free_area_init(max_zone_pfns);
|
2017-07-11 09:00:26 +08:00
|
|
|
}
|
|
|
|
|
2020-05-14 19:53:35 +08:00
|
|
|
#if defined(CONFIG_MMU) && defined(CONFIG_DEBUG_VM)
|
2019-11-18 13:58:34 +08:00
|
|
|
static inline void print_mlk(char *name, unsigned long b, unsigned long t)
|
|
|
|
{
|
|
|
|
pr_notice("%12s : 0x%08lx - 0x%08lx (%4ld kB)\n", name, b, t,
|
|
|
|
(((t) - (b)) >> 10));
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void print_mlm(char *name, unsigned long b, unsigned long t)
|
|
|
|
{
|
|
|
|
pr_notice("%12s : 0x%08lx - 0x%08lx (%4ld MB)\n", name, b, t,
|
|
|
|
(((t) - (b)) >> 20));
|
|
|
|
}
|
|
|
|
|
2021-03-30 02:22:21 +08:00
|
|
|
static void __init print_vm_layout(void)
|
2019-11-18 13:58:34 +08:00
|
|
|
{
|
|
|
|
pr_notice("Virtual kernel memory layout:\n");
|
|
|
|
print_mlk("fixmap", (unsigned long)FIXADDR_START,
|
|
|
|
(unsigned long)FIXADDR_TOP);
|
|
|
|
print_mlm("pci io", (unsigned long)PCI_IO_START,
|
|
|
|
(unsigned long)PCI_IO_END);
|
|
|
|
print_mlm("vmemmap", (unsigned long)VMEMMAP_START,
|
|
|
|
(unsigned long)VMEMMAP_END);
|
|
|
|
print_mlm("vmalloc", (unsigned long)VMALLOC_START,
|
|
|
|
(unsigned long)VMALLOC_END);
|
|
|
|
print_mlm("lowmem", (unsigned long)PAGE_OFFSET,
|
|
|
|
(unsigned long)high_memory);
|
2021-04-12 00:41:44 +08:00
|
|
|
#ifdef CONFIG_64BIT
|
|
|
|
print_mlm("kernel", (unsigned long)KERNEL_LINK_ADDR,
|
|
|
|
(unsigned long)ADDRESS_SPACE_END);
|
|
|
|
#endif
|
2019-11-18 13:58:34 +08:00
|
|
|
}
|
|
|
|
#else
|
|
|
|
static void print_vm_layout(void) { }
|
|
|
|
#endif /* CONFIG_DEBUG_VM */
|
|
|
|
|
2017-07-11 09:00:26 +08:00
|
|
|
void __init mem_init(void)
|
|
|
|
{
|
|
|
|
#ifdef CONFIG_FLATMEM
|
|
|
|
BUG_ON(!mem_map);
|
|
|
|
#endif /* CONFIG_FLATMEM */
|
|
|
|
|
2021-06-02 16:55:16 +08:00
|
|
|
#ifdef CONFIG_SWIOTLB
|
|
|
|
if (swiotlb_force == SWIOTLB_FORCE ||
|
|
|
|
max_pfn > PFN_DOWN(dma32_phys_limit))
|
|
|
|
swiotlb_init(1);
|
|
|
|
else
|
|
|
|
swiotlb_force = SWIOTLB_NO_FORCE;
|
|
|
|
#endif
|
2017-07-11 09:00:26 +08:00
|
|
|
high_memory = (void *)(__va(PFN_PHYS(max_low_pfn)));
|
2018-10-31 06:09:30 +08:00
|
|
|
memblock_free_all();
|
2017-07-11 09:00:26 +08:00
|
|
|
|
2019-11-18 13:58:34 +08:00
|
|
|
print_vm_layout();
|
2017-07-11 09:00:26 +08:00
|
|
|
}
|
|
|
|
|
2021-06-02 16:55:17 +08:00
|
|
|
/*
|
2021-06-29 17:13:46 +08:00
|
|
|
* The default maximal physical memory size is -PAGE_OFFSET for 32-bit kernel,
|
|
|
|
* whereas for 64-bit kernel, the end of the virtual address space is occupied
|
|
|
|
* by the modules/BPF/kernel mappings which reduces the available size of the
|
|
|
|
* linear mapping.
|
|
|
|
* Limit the memory size via mem.
|
2021-06-02 16:55:17 +08:00
|
|
|
*/
|
2021-06-29 17:13:46 +08:00
|
|
|
#ifdef CONFIG_64BIT
|
|
|
|
static phys_addr_t memory_limit = -PAGE_OFFSET - SZ_4G;
|
|
|
|
#else
|
2021-06-02 16:55:17 +08:00
|
|
|
static phys_addr_t memory_limit = -PAGE_OFFSET;
|
2021-06-29 17:13:46 +08:00
|
|
|
#endif
|
2021-06-02 16:55:17 +08:00
|
|
|
|
|
|
|
static int __init early_mem(char *p)
|
|
|
|
{
|
|
|
|
u64 size;
|
|
|
|
|
|
|
|
if (!p)
|
|
|
|
return 1;
|
|
|
|
|
|
|
|
size = memparse(p, &p) & PAGE_MASK;
|
|
|
|
memory_limit = min_t(u64, size, memory_limit);
|
|
|
|
|
|
|
|
pr_notice("Memory limited to %lldMB\n", (u64)memory_limit >> 20);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
early_param("mem", early_mem);
|
|
|
|
|
2021-05-10 19:42:22 +08:00
|
|
|
static void __init setup_bootmem(void)
|
2019-02-21 13:55:49 +08:00
|
|
|
{
|
2020-01-02 11:12:40 +08:00
|
|
|
phys_addr_t vmlinux_end = __pa_symbol(&_end);
|
|
|
|
phys_addr_t vmlinux_start = __pa_symbol(&_start);
|
2021-06-29 17:13:48 +08:00
|
|
|
phys_addr_t __maybe_unused max_mapped_addr;
|
2021-06-02 16:55:17 +08:00
|
|
|
phys_addr_t dram_end;
|
2019-02-21 13:55:49 +08:00
|
|
|
|
2021-04-13 14:35:14 +08:00
|
|
|
#ifdef CONFIG_XIP_KERNEL
|
|
|
|
vmlinux_start = __pa_symbol(&_sdata);
|
|
|
|
#endif
|
|
|
|
|
2021-06-02 16:55:17 +08:00
|
|
|
memblock_enforce_memory_limit(memory_limit);
|
2019-02-21 13:55:49 +08:00
|
|
|
|
2021-04-12 00:41:44 +08:00
|
|
|
/*
|
|
|
|
* Reserve from the start of the kernel to the end of the kernel
|
2021-04-29 23:05:00 +08:00
|
|
|
*/
|
|
|
|
#if defined(CONFIG_64BIT) && defined(CONFIG_STRICT_KERNEL_RWX)
|
|
|
|
/*
|
|
|
|
* Make sure we align the reservation on PMD_SIZE since we will
|
2021-04-12 00:41:44 +08:00
|
|
|
* map the kernel in the linear mapping as read-only: we do not want
|
|
|
|
* any allocation to happen between _end and the next pmd aligned page.
|
|
|
|
*/
|
2021-04-29 23:05:00 +08:00
|
|
|
vmlinux_end = (vmlinux_end + PMD_SIZE - 1) & PMD_MASK;
|
|
|
|
#endif
|
|
|
|
memblock_reserve(vmlinux_start, vmlinux_end - vmlinux_start);
|
2019-06-07 14:01:29 +08:00
|
|
|
|
2021-06-02 16:55:17 +08:00
|
|
|
dram_end = memblock_end_of_DRAM();
|
2021-06-27 21:51:17 +08:00
|
|
|
|
2021-06-29 17:13:48 +08:00
|
|
|
#ifndef CONFIG_64BIT
|
2021-01-12 07:45:02 +08:00
|
|
|
/*
|
|
|
|
* memblock allocator is not aware of the fact that last 4K bytes of
|
|
|
|
* the addressable memory can not be mapped because of IS_ERR_VALUE
|
|
|
|
* macro. Make sure that last 4k bytes are not usable by memblock
|
2021-06-29 17:13:48 +08:00
|
|
|
* if end of dram is equal to maximum addressable memory. For 64-bit
|
|
|
|
* kernel, this problem can't happen here as the end of the virtual
|
|
|
|
* address space is occupied by the kernel mapping then this check must
|
|
|
|
* be done in create_kernel_page_table.
|
2021-01-12 07:45:02 +08:00
|
|
|
*/
|
2021-06-29 17:13:48 +08:00
|
|
|
max_mapped_addr = __pa(~(ulong)0);
|
2021-01-12 07:45:02 +08:00
|
|
|
if (max_mapped_addr == (dram_end - 1))
|
|
|
|
memblock_set_current_limit(max_mapped_addr - 4096);
|
2021-06-29 17:13:48 +08:00
|
|
|
#endif
|
2021-01-12 07:45:02 +08:00
|
|
|
|
2021-02-25 14:54:17 +08:00
|
|
|
min_low_pfn = PFN_UP(memblock_start_of_DRAM());
|
|
|
|
max_low_pfn = max_pfn = PFN_DOWN(dram_end);
|
|
|
|
|
2020-10-31 14:01:12 +08:00
|
|
|
dma32_phys_limit = min(4UL * SZ_1G, (unsigned long)PFN_PHYS(max_low_pfn));
|
2021-01-21 14:31:17 +08:00
|
|
|
set_max_mapnr(max_low_pfn - ARCH_PFN_OFFSET);
|
2019-02-21 13:55:49 +08:00
|
|
|
|
2021-01-15 13:46:06 +08:00
|
|
|
reserve_initrd_mem();
|
riscv: Fix memblock reservation for device tree blob
This fixes an error with how the FDT blob is reserved in memblock.
An incorrect physical address calculation exposed the FDT header to
unintended corruption, which typically manifested with of_fdt_raw_init()
faulting during late boot after fdt_totalsize() returned a wrong value.
Systems with smaller physical memory sizes more frequently trigger this
issue, as the kernel is more likely to allocate from the DMA32 zone
where bbl places the DTB after the kernel image.
Commit 671f9a3e2e24 ("RISC-V: Setup initial page tables in two stages")
changed the mapping of the DTB to reside in the fixmap area.
Consequently, early_init_fdt_reserve_self() cannot be used anymore in
setup_bootmem() since it relies on __pa() to derive a physical address,
which does not work with dtb_early_va that is no longer a valid kernel
logical address.
The reserved[0x1] region shows the effect of the pointer underflow
resulting from the __pa(initial_boot_params) offset subtraction:
[ 0.000000] MEMBLOCK configuration:
[ 0.000000] memory size = 0x000000001fe00000 reserved size = 0x0000000000a2e514
[ 0.000000] memory.cnt = 0x1
[ 0.000000] memory[0x0] [0x0000000080200000-0x000000009fffffff], 0x000000001fe00000 bytes flags: 0x0
[ 0.000000] reserved.cnt = 0x2
[ 0.000000] reserved[0x0] [0x0000000080200000-0x0000000080c2dfeb], 0x0000000000a2dfec bytes flags: 0x0
[ 0.000000] reserved[0x1] [0xfffffff080100000-0xfffffff080100527], 0x0000000000000528 bytes flags: 0x0
With the fix applied:
[ 0.000000] MEMBLOCK configuration:
[ 0.000000] memory size = 0x000000001fe00000 reserved size = 0x0000000000a2e514
[ 0.000000] memory.cnt = 0x1
[ 0.000000] memory[0x0] [0x0000000080200000-0x000000009fffffff], 0x000000001fe00000 bytes flags: 0x0
[ 0.000000] reserved.cnt = 0x2
[ 0.000000] reserved[0x0] [0x0000000080200000-0x0000000080c2dfeb], 0x0000000000a2dfec bytes flags: 0x0
[ 0.000000] reserved[0x1] [0x0000000080e00000-0x0000000080e00527], 0x0000000000000528 bytes flags: 0x0
Fixes: 671f9a3e2e24 ("RISC-V: Setup initial page tables in two stages")
Signed-off-by: Albert Ou <aou@eecs.berkeley.edu>
Tested-by: Bin Meng <bmeng.cn@gmail.com>
Reviewed-by: Anup Patel <anup@brainfault.org>
Signed-off-by: Paul Walmsley <paul.walmsley@sifive.com>
2019-09-28 07:14:18 +08:00
|
|
|
/*
|
2021-01-16 07:49:48 +08:00
|
|
|
* If DTB is built in, no need to reserve its memblock.
|
|
|
|
* Otherwise, do reserve it but avoid using
|
|
|
|
* early_init_fdt_reserve_self() since __pa() does
|
riscv: Fix memblock reservation for device tree blob
This fixes an error with how the FDT blob is reserved in memblock.
An incorrect physical address calculation exposed the FDT header to
unintended corruption, which typically manifested with of_fdt_raw_init()
faulting during late boot after fdt_totalsize() returned a wrong value.
Systems with smaller physical memory sizes more frequently trigger this
issue, as the kernel is more likely to allocate from the DMA32 zone
where bbl places the DTB after the kernel image.
Commit 671f9a3e2e24 ("RISC-V: Setup initial page tables in two stages")
changed the mapping of the DTB to reside in the fixmap area.
Consequently, early_init_fdt_reserve_self() cannot be used anymore in
setup_bootmem() since it relies on __pa() to derive a physical address,
which does not work with dtb_early_va that is no longer a valid kernel
logical address.
The reserved[0x1] region shows the effect of the pointer underflow
resulting from the __pa(initial_boot_params) offset subtraction:
[ 0.000000] MEMBLOCK configuration:
[ 0.000000] memory size = 0x000000001fe00000 reserved size = 0x0000000000a2e514
[ 0.000000] memory.cnt = 0x1
[ 0.000000] memory[0x0] [0x0000000080200000-0x000000009fffffff], 0x000000001fe00000 bytes flags: 0x0
[ 0.000000] reserved.cnt = 0x2
[ 0.000000] reserved[0x0] [0x0000000080200000-0x0000000080c2dfeb], 0x0000000000a2dfec bytes flags: 0x0
[ 0.000000] reserved[0x1] [0xfffffff080100000-0xfffffff080100527], 0x0000000000000528 bytes flags: 0x0
With the fix applied:
[ 0.000000] MEMBLOCK configuration:
[ 0.000000] memory size = 0x000000001fe00000 reserved size = 0x0000000000a2e514
[ 0.000000] memory.cnt = 0x1
[ 0.000000] memory[0x0] [0x0000000080200000-0x000000009fffffff], 0x000000001fe00000 bytes flags: 0x0
[ 0.000000] reserved.cnt = 0x2
[ 0.000000] reserved[0x0] [0x0000000080200000-0x0000000080c2dfeb], 0x0000000000a2dfec bytes flags: 0x0
[ 0.000000] reserved[0x1] [0x0000000080e00000-0x0000000080e00527], 0x0000000000000528 bytes flags: 0x0
Fixes: 671f9a3e2e24 ("RISC-V: Setup initial page tables in two stages")
Signed-off-by: Albert Ou <aou@eecs.berkeley.edu>
Tested-by: Bin Meng <bmeng.cn@gmail.com>
Reviewed-by: Anup Patel <anup@brainfault.org>
Signed-off-by: Paul Walmsley <paul.walmsley@sifive.com>
2019-09-28 07:14:18 +08:00
|
|
|
* not work for DTB pointers that are fixmap addresses
|
|
|
|
*/
|
2021-01-16 07:49:48 +08:00
|
|
|
if (!IS_ENABLED(CONFIG_BUILTIN_DTB))
|
|
|
|
memblock_reserve(dtb_early_pa, fdt_totalsize(dtb_early_va));
|
riscv: Fix memblock reservation for device tree blob
This fixes an error with how the FDT blob is reserved in memblock.
An incorrect physical address calculation exposed the FDT header to
unintended corruption, which typically manifested with of_fdt_raw_init()
faulting during late boot after fdt_totalsize() returned a wrong value.
Systems with smaller physical memory sizes more frequently trigger this
issue, as the kernel is more likely to allocate from the DMA32 zone
where bbl places the DTB after the kernel image.
Commit 671f9a3e2e24 ("RISC-V: Setup initial page tables in two stages")
changed the mapping of the DTB to reside in the fixmap area.
Consequently, early_init_fdt_reserve_self() cannot be used anymore in
setup_bootmem() since it relies on __pa() to derive a physical address,
which does not work with dtb_early_va that is no longer a valid kernel
logical address.
The reserved[0x1] region shows the effect of the pointer underflow
resulting from the __pa(initial_boot_params) offset subtraction:
[ 0.000000] MEMBLOCK configuration:
[ 0.000000] memory size = 0x000000001fe00000 reserved size = 0x0000000000a2e514
[ 0.000000] memory.cnt = 0x1
[ 0.000000] memory[0x0] [0x0000000080200000-0x000000009fffffff], 0x000000001fe00000 bytes flags: 0x0
[ 0.000000] reserved.cnt = 0x2
[ 0.000000] reserved[0x0] [0x0000000080200000-0x0000000080c2dfeb], 0x0000000000a2dfec bytes flags: 0x0
[ 0.000000] reserved[0x1] [0xfffffff080100000-0xfffffff080100527], 0x0000000000000528 bytes flags: 0x0
With the fix applied:
[ 0.000000] MEMBLOCK configuration:
[ 0.000000] memory size = 0x000000001fe00000 reserved size = 0x0000000000a2e514
[ 0.000000] memory.cnt = 0x1
[ 0.000000] memory[0x0] [0x0000000080200000-0x000000009fffffff], 0x000000001fe00000 bytes flags: 0x0
[ 0.000000] reserved.cnt = 0x2
[ 0.000000] reserved[0x0] [0x0000000080200000-0x0000000080c2dfeb], 0x0000000000a2dfec bytes flags: 0x0
[ 0.000000] reserved[0x1] [0x0000000080e00000-0x0000000080e00527], 0x0000000000000528 bytes flags: 0x0
Fixes: 671f9a3e2e24 ("RISC-V: Setup initial page tables in two stages")
Signed-off-by: Albert Ou <aou@eecs.berkeley.edu>
Tested-by: Bin Meng <bmeng.cn@gmail.com>
Reviewed-by: Anup Patel <anup@brainfault.org>
Signed-off-by: Paul Walmsley <paul.walmsley@sifive.com>
2019-09-28 07:14:18 +08:00
|
|
|
|
2019-02-21 13:55:49 +08:00
|
|
|
early_init_fdt_scan_reserved_mem();
|
2020-10-31 14:01:12 +08:00
|
|
|
dma_contiguous_reserve(dma32_phys_limit);
|
2019-02-21 13:55:49 +08:00
|
|
|
memblock_allow_resize();
|
|
|
|
}
|
2019-02-13 19:08:36 +08:00
|
|
|
|
2019-10-28 20:10:41 +08:00
|
|
|
#ifdef CONFIG_MMU
|
2021-05-16 21:15:56 +08:00
|
|
|
static struct pt_alloc_ops _pt_ops __initdata;
|
2021-04-13 14:35:14 +08:00
|
|
|
|
|
|
|
#ifdef CONFIG_XIP_KERNEL
|
|
|
|
#define pt_ops (*(struct pt_alloc_ops *)XIP_FIXUP(&_pt_ops))
|
|
|
|
#else
|
|
|
|
#define pt_ops _pt_ops
|
|
|
|
#endif
|
2020-09-18 06:37:12 +08:00
|
|
|
|
2021-03-30 02:22:51 +08:00
|
|
|
unsigned long pfn_base __ro_after_init;
|
2019-03-26 16:03:47 +08:00
|
|
|
EXPORT_SYMBOL(pfn_base);
|
|
|
|
|
2019-02-13 19:08:36 +08:00
|
|
|
pgd_t swapper_pg_dir[PTRS_PER_PGD] __page_aligned_bss;
|
2019-06-29 04:36:21 +08:00
|
|
|
pgd_t trampoline_pg_dir[PTRS_PER_PGD] __page_aligned_bss;
|
2021-05-16 21:15:56 +08:00
|
|
|
static pte_t fixmap_pte[PTRS_PER_PTE] __page_aligned_bss;
|
2019-02-13 19:08:36 +08:00
|
|
|
|
2019-06-29 04:36:21 +08:00
|
|
|
pgd_t early_pg_dir[PTRS_PER_PGD] __initdata __aligned(PAGE_SIZE);
|
2019-01-07 23:27:01 +08:00
|
|
|
|
2021-04-13 14:35:14 +08:00
|
|
|
#ifdef CONFIG_XIP_KERNEL
|
|
|
|
#define trampoline_pg_dir ((pgd_t *)XIP_FIXUP(trampoline_pg_dir))
|
|
|
|
#define fixmap_pte ((pte_t *)XIP_FIXUP(fixmap_pte))
|
|
|
|
#define early_pg_dir ((pgd_t *)XIP_FIXUP(early_pg_dir))
|
|
|
|
#endif /* CONFIG_XIP_KERNEL */
|
|
|
|
|
2019-01-07 23:27:01 +08:00
|
|
|
void __set_fixmap(enum fixed_addresses idx, phys_addr_t phys, pgprot_t prot)
|
|
|
|
{
|
|
|
|
unsigned long addr = __fix_to_virt(idx);
|
|
|
|
pte_t *ptep;
|
|
|
|
|
|
|
|
BUG_ON(idx <= FIX_HOLE || idx >= __end_of_fixed_addresses);
|
|
|
|
|
|
|
|
ptep = &fixmap_pte[pte_index(addr)];
|
|
|
|
|
2020-08-04 11:02:05 +08:00
|
|
|
if (pgprot_val(prot))
|
2019-01-07 23:27:01 +08:00
|
|
|
set_pte(ptep, pfn_pte(phys >> PAGE_SHIFT, prot));
|
2020-08-04 11:02:05 +08:00
|
|
|
else
|
2019-01-07 23:27:01 +08:00
|
|
|
pte_clear(&init_mm, addr, ptep);
|
2020-08-04 11:02:05 +08:00
|
|
|
local_flush_tlb_page(addr);
|
2019-01-07 23:27:01 +08:00
|
|
|
}
|
|
|
|
|
2020-09-18 06:37:12 +08:00
|
|
|
static inline pte_t *__init get_pte_virt_early(phys_addr_t pa)
|
2019-06-29 04:36:21 +08:00
|
|
|
{
|
2020-09-18 06:37:12 +08:00
|
|
|
return (pte_t *)((uintptr_t)pa);
|
2019-06-29 04:36:21 +08:00
|
|
|
}
|
|
|
|
|
2020-09-18 06:37:12 +08:00
|
|
|
static inline pte_t *__init get_pte_virt_fixmap(phys_addr_t pa)
|
|
|
|
{
|
|
|
|
clear_fixmap(FIX_PTE);
|
|
|
|
return (pte_t *)set_fixmap_offset(FIX_PTE, pa);
|
|
|
|
}
|
|
|
|
|
2021-05-16 21:15:56 +08:00
|
|
|
static inline pte_t *__init get_pte_virt_late(phys_addr_t pa)
|
2020-09-18 06:37:12 +08:00
|
|
|
{
|
|
|
|
return (pte_t *) __va(pa);
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline phys_addr_t __init alloc_pte_early(uintptr_t va)
|
2019-06-29 04:36:21 +08:00
|
|
|
{
|
|
|
|
/*
|
|
|
|
* We only create PMD or PGD early mappings so we
|
|
|
|
* should never reach here with MMU disabled.
|
|
|
|
*/
|
2020-09-18 06:37:12 +08:00
|
|
|
BUG();
|
|
|
|
}
|
2019-06-29 04:36:21 +08:00
|
|
|
|
2020-09-18 06:37:12 +08:00
|
|
|
static inline phys_addr_t __init alloc_pte_fixmap(uintptr_t va)
|
|
|
|
{
|
2019-06-29 04:36:21 +08:00
|
|
|
return memblock_phys_alloc(PAGE_SIZE, PAGE_SIZE);
|
|
|
|
}
|
|
|
|
|
2021-05-16 21:15:56 +08:00
|
|
|
static phys_addr_t __init alloc_pte_late(uintptr_t va)
|
2020-09-18 06:37:12 +08:00
|
|
|
{
|
|
|
|
unsigned long vaddr;
|
|
|
|
|
|
|
|
vaddr = __get_free_page(GFP_KERNEL);
|
2021-03-30 21:56:26 +08:00
|
|
|
BUG_ON(!vaddr || !pgtable_pte_page_ctor(virt_to_page(vaddr)));
|
|
|
|
|
2020-09-18 06:37:12 +08:00
|
|
|
return __pa(vaddr);
|
|
|
|
}
|
|
|
|
|
2019-06-29 04:36:21 +08:00
|
|
|
static void __init create_pte_mapping(pte_t *ptep,
|
|
|
|
uintptr_t va, phys_addr_t pa,
|
|
|
|
phys_addr_t sz, pgprot_t prot)
|
|
|
|
{
|
2020-06-09 12:33:10 +08:00
|
|
|
uintptr_t pte_idx = pte_index(va);
|
2019-06-29 04:36:21 +08:00
|
|
|
|
|
|
|
BUG_ON(sz != PAGE_SIZE);
|
|
|
|
|
2020-06-09 12:33:10 +08:00
|
|
|
if (pte_none(ptep[pte_idx]))
|
|
|
|
ptep[pte_idx] = pfn_pte(PFN_DOWN(pa), prot);
|
2019-06-29 04:36:21 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
#ifndef __PAGETABLE_PMD_FOLDED
|
|
|
|
|
2021-05-16 21:15:56 +08:00
|
|
|
static pmd_t trampoline_pmd[PTRS_PER_PMD] __page_aligned_bss;
|
|
|
|
static pmd_t fixmap_pmd[PTRS_PER_PMD] __page_aligned_bss;
|
|
|
|
static pmd_t early_pmd[PTRS_PER_PMD] __initdata __aligned(PAGE_SIZE);
|
|
|
|
static pmd_t early_dtb_pmd[PTRS_PER_PMD] __initdata __aligned(PAGE_SIZE);
|
2019-06-29 04:36:21 +08:00
|
|
|
|
2021-04-13 14:35:14 +08:00
|
|
|
#ifdef CONFIG_XIP_KERNEL
|
|
|
|
#define trampoline_pmd ((pmd_t *)XIP_FIXUP(trampoline_pmd))
|
|
|
|
#define fixmap_pmd ((pmd_t *)XIP_FIXUP(fixmap_pmd))
|
|
|
|
#define early_pmd ((pmd_t *)XIP_FIXUP(early_pmd))
|
|
|
|
#endif /* CONFIG_XIP_KERNEL */
|
|
|
|
|
2020-09-18 06:37:12 +08:00
|
|
|
static pmd_t *__init get_pmd_virt_early(phys_addr_t pa)
|
2019-06-29 04:36:21 +08:00
|
|
|
{
|
2020-09-18 06:37:12 +08:00
|
|
|
/* Before MMU is enabled */
|
|
|
|
return (pmd_t *)((uintptr_t)pa);
|
2019-06-29 04:36:21 +08:00
|
|
|
}
|
|
|
|
|
2020-09-18 06:37:12 +08:00
|
|
|
static pmd_t *__init get_pmd_virt_fixmap(phys_addr_t pa)
|
2019-06-29 04:36:21 +08:00
|
|
|
{
|
2020-09-18 06:37:12 +08:00
|
|
|
clear_fixmap(FIX_PMD);
|
|
|
|
return (pmd_t *)set_fixmap_offset(FIX_PMD, pa);
|
|
|
|
}
|
2019-06-29 04:36:21 +08:00
|
|
|
|
2021-05-16 21:15:56 +08:00
|
|
|
static pmd_t *__init get_pmd_virt_late(phys_addr_t pa)
|
2020-09-18 06:37:12 +08:00
|
|
|
{
|
|
|
|
return (pmd_t *) __va(pa);
|
|
|
|
}
|
2019-06-29 04:36:21 +08:00
|
|
|
|
2020-09-18 06:37:12 +08:00
|
|
|
static phys_addr_t __init alloc_pmd_early(uintptr_t va)
|
|
|
|
{
|
2021-06-17 21:53:07 +08:00
|
|
|
BUG_ON((va - kernel_map.virt_addr) >> PGDIR_SHIFT);
|
2019-06-29 04:36:21 +08:00
|
|
|
|
2021-02-21 22:22:33 +08:00
|
|
|
return (uintptr_t)early_pmd;
|
2019-06-29 04:36:21 +08:00
|
|
|
}
|
|
|
|
|
2020-09-18 06:37:12 +08:00
|
|
|
static phys_addr_t __init alloc_pmd_fixmap(uintptr_t va)
|
|
|
|
{
|
|
|
|
return memblock_phys_alloc(PAGE_SIZE, PAGE_SIZE);
|
|
|
|
}
|
|
|
|
|
2021-05-16 21:15:56 +08:00
|
|
|
static phys_addr_t __init alloc_pmd_late(uintptr_t va)
|
2020-09-18 06:37:12 +08:00
|
|
|
{
|
|
|
|
unsigned long vaddr;
|
|
|
|
|
|
|
|
vaddr = __get_free_page(GFP_KERNEL);
|
|
|
|
BUG_ON(!vaddr);
|
|
|
|
return __pa(vaddr);
|
|
|
|
}
|
|
|
|
|
2019-06-29 04:36:21 +08:00
|
|
|
static void __init create_pmd_mapping(pmd_t *pmdp,
|
|
|
|
uintptr_t va, phys_addr_t pa,
|
|
|
|
phys_addr_t sz, pgprot_t prot)
|
|
|
|
{
|
|
|
|
pte_t *ptep;
|
|
|
|
phys_addr_t pte_phys;
|
2020-06-09 12:33:10 +08:00
|
|
|
uintptr_t pmd_idx = pmd_index(va);
|
2019-06-29 04:36:21 +08:00
|
|
|
|
|
|
|
if (sz == PMD_SIZE) {
|
2020-06-09 12:33:10 +08:00
|
|
|
if (pmd_none(pmdp[pmd_idx]))
|
|
|
|
pmdp[pmd_idx] = pfn_pmd(PFN_DOWN(pa), prot);
|
2019-06-29 04:36:21 +08:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2020-06-09 12:33:10 +08:00
|
|
|
if (pmd_none(pmdp[pmd_idx])) {
|
2020-09-18 06:37:12 +08:00
|
|
|
pte_phys = pt_ops.alloc_pte(va);
|
2020-06-09 12:33:10 +08:00
|
|
|
pmdp[pmd_idx] = pfn_pmd(PFN_DOWN(pte_phys), PAGE_TABLE);
|
2020-09-18 06:37:12 +08:00
|
|
|
ptep = pt_ops.get_pte_virt(pte_phys);
|
2019-06-29 04:36:21 +08:00
|
|
|
memset(ptep, 0, PAGE_SIZE);
|
|
|
|
} else {
|
2020-06-09 12:33:10 +08:00
|
|
|
pte_phys = PFN_PHYS(_pmd_pfn(pmdp[pmd_idx]));
|
2020-09-18 06:37:12 +08:00
|
|
|
ptep = pt_ops.get_pte_virt(pte_phys);
|
2019-06-29 04:36:21 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
create_pte_mapping(ptep, va, pa, sz, prot);
|
|
|
|
}
|
|
|
|
|
|
|
|
#define pgd_next_t pmd_t
|
2020-09-18 06:37:12 +08:00
|
|
|
#define alloc_pgd_next(__va) pt_ops.alloc_pmd(__va)
|
|
|
|
#define get_pgd_next_virt(__pa) pt_ops.get_pmd_virt(__pa)
|
2019-06-29 04:36:21 +08:00
|
|
|
#define create_pgd_next_mapping(__nextp, __va, __pa, __sz, __prot) \
|
|
|
|
create_pmd_mapping(__nextp, __va, __pa, __sz, __prot)
|
|
|
|
#define fixmap_pgd_next fixmap_pmd
|
|
|
|
#else
|
|
|
|
#define pgd_next_t pte_t
|
2020-09-18 06:37:12 +08:00
|
|
|
#define alloc_pgd_next(__va) pt_ops.alloc_pte(__va)
|
|
|
|
#define get_pgd_next_virt(__pa) pt_ops.get_pte_virt(__pa)
|
2019-06-29 04:36:21 +08:00
|
|
|
#define create_pgd_next_mapping(__nextp, __va, __pa, __sz, __prot) \
|
|
|
|
create_pte_mapping(__nextp, __va, __pa, __sz, __prot)
|
|
|
|
#define fixmap_pgd_next fixmap_pte
|
|
|
|
#endif
|
|
|
|
|
2020-09-18 06:37:15 +08:00
|
|
|
void __init create_pgd_mapping(pgd_t *pgdp,
|
2019-06-29 04:36:21 +08:00
|
|
|
uintptr_t va, phys_addr_t pa,
|
|
|
|
phys_addr_t sz, pgprot_t prot)
|
|
|
|
{
|
|
|
|
pgd_next_t *nextp;
|
|
|
|
phys_addr_t next_phys;
|
2020-06-09 12:33:10 +08:00
|
|
|
uintptr_t pgd_idx = pgd_index(va);
|
2019-06-29 04:36:21 +08:00
|
|
|
|
|
|
|
if (sz == PGDIR_SIZE) {
|
2020-06-09 12:33:10 +08:00
|
|
|
if (pgd_val(pgdp[pgd_idx]) == 0)
|
|
|
|
pgdp[pgd_idx] = pfn_pgd(PFN_DOWN(pa), prot);
|
2019-06-29 04:36:21 +08:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2020-06-09 12:33:10 +08:00
|
|
|
if (pgd_val(pgdp[pgd_idx]) == 0) {
|
2019-06-29 04:36:21 +08:00
|
|
|
next_phys = alloc_pgd_next(va);
|
2020-06-09 12:33:10 +08:00
|
|
|
pgdp[pgd_idx] = pfn_pgd(PFN_DOWN(next_phys), PAGE_TABLE);
|
2019-06-29 04:36:21 +08:00
|
|
|
nextp = get_pgd_next_virt(next_phys);
|
|
|
|
memset(nextp, 0, PAGE_SIZE);
|
|
|
|
} else {
|
2020-06-09 12:33:10 +08:00
|
|
|
next_phys = PFN_PHYS(_pgd_pfn(pgdp[pgd_idx]));
|
2019-06-29 04:36:21 +08:00
|
|
|
nextp = get_pgd_next_virt(next_phys);
|
|
|
|
}
|
|
|
|
|
|
|
|
create_pgd_next_mapping(nextp, va, pa, sz, prot);
|
|
|
|
}
|
|
|
|
|
|
|
|
static uintptr_t __init best_map_size(phys_addr_t base, phys_addr_t size)
|
|
|
|
{
|
2019-11-08 17:00:40 +08:00
|
|
|
/* Upgrade to PMD_SIZE mappings whenever possible */
|
|
|
|
if ((base & (PMD_SIZE - 1)) || (size & (PMD_SIZE - 1)))
|
|
|
|
return PAGE_SIZE;
|
2019-06-29 04:36:21 +08:00
|
|
|
|
2019-11-08 17:00:40 +08:00
|
|
|
return PMD_SIZE;
|
2019-06-29 04:36:21 +08:00
|
|
|
}
|
|
|
|
|
2021-04-13 14:35:14 +08:00
|
|
|
#ifdef CONFIG_XIP_KERNEL
|
|
|
|
/* called from head.S with MMU off */
|
|
|
|
asmlinkage void __init __copy_data(void)
|
|
|
|
{
|
|
|
|
void *from = (void *)(&_sdata);
|
|
|
|
void *end = (void *)(&_end);
|
|
|
|
void *to = (void *)CONFIG_PHYS_RAM_BASE;
|
|
|
|
size_t sz = (size_t)(end - from + 1);
|
|
|
|
|
|
|
|
memcpy(to, from, sz);
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2021-06-24 20:00:41 +08:00
|
|
|
#ifdef CONFIG_STRICT_KERNEL_RWX
|
|
|
|
static __init pgprot_t pgprot_from_va(uintptr_t va)
|
|
|
|
{
|
|
|
|
if (is_va_kernel_text(va))
|
|
|
|
return PAGE_KERNEL_READ_EXEC;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* In 64-bit kernel, the kernel mapping is outside the linear mapping so
|
|
|
|
* we must protect its linear mapping alias from being executed and
|
|
|
|
* written.
|
|
|
|
* And rodata section is marked readonly in mark_rodata_ro.
|
|
|
|
*/
|
|
|
|
if (IS_ENABLED(CONFIG_64BIT) && is_va_kernel_lm_alias_text(va))
|
|
|
|
return PAGE_KERNEL_READ;
|
|
|
|
|
|
|
|
return PAGE_KERNEL;
|
|
|
|
}
|
|
|
|
|
|
|
|
void mark_rodata_ro(void)
|
|
|
|
{
|
|
|
|
set_kernel_memory(__start_rodata, _data, set_memory_ro);
|
|
|
|
if (IS_ENABLED(CONFIG_64BIT))
|
|
|
|
set_kernel_memory(lm_alias(__start_rodata), lm_alias(_data),
|
|
|
|
set_memory_ro);
|
|
|
|
|
|
|
|
debug_checkwx();
|
|
|
|
}
|
|
|
|
#else
|
|
|
|
static __init pgprot_t pgprot_from_va(uintptr_t va)
|
|
|
|
{
|
|
|
|
if (IS_ENABLED(CONFIG_64BIT) && !is_kernel_mapping(va))
|
|
|
|
return PAGE_KERNEL;
|
|
|
|
|
|
|
|
return PAGE_KERNEL_EXEC;
|
|
|
|
}
|
|
|
|
#endif /* CONFIG_STRICT_KERNEL_RWX */
|
|
|
|
|
2019-03-26 16:03:47 +08:00
|
|
|
/*
|
|
|
|
* setup_vm() is called from head.S with MMU-off.
|
|
|
|
*
|
|
|
|
* Following requirements should be honoured for setup_vm() to work
|
|
|
|
* correctly:
|
|
|
|
* 1) It should use PC-relative addressing for accessing kernel symbols.
|
|
|
|
* To achieve this we always use GCC cmodel=medany.
|
|
|
|
* 2) The compiler instrumentation for FTRACE will not work for setup_vm()
|
|
|
|
* so disable compiler instrumentation when FTRACE is enabled.
|
|
|
|
*
|
|
|
|
* Currently, the above requirements are honoured by using custom CFLAGS
|
|
|
|
* for init.o in mm/Makefile.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#ifndef __riscv_cmodel_medany
|
2019-10-18 05:45:58 +08:00
|
|
|
#error "setup_vm() is called from head.S before relocate so it should not use absolute addressing."
|
2019-03-26 16:03:47 +08:00
|
|
|
#endif
|
|
|
|
|
2021-04-13 14:35:14 +08:00
|
|
|
#ifdef CONFIG_XIP_KERNEL
|
2021-06-24 20:00:41 +08:00
|
|
|
static void __init create_kernel_page_table(pgd_t *pgdir, uintptr_t map_size,
|
|
|
|
__always_unused bool early)
|
2021-04-13 14:35:14 +08:00
|
|
|
{
|
|
|
|
uintptr_t va, end_va;
|
|
|
|
|
|
|
|
/* Map the flash resident part */
|
2021-06-17 21:53:07 +08:00
|
|
|
end_va = kernel_map.virt_addr + kernel_map.xiprom_sz;
|
|
|
|
for (va = kernel_map.virt_addr; va < end_va; va += map_size)
|
2021-04-13 14:35:14 +08:00
|
|
|
create_pgd_mapping(pgdir, va,
|
2021-06-17 21:53:07 +08:00
|
|
|
kernel_map.xiprom + (va - kernel_map.virt_addr),
|
2021-04-13 14:35:14 +08:00
|
|
|
map_size, PAGE_KERNEL_EXEC);
|
|
|
|
|
|
|
|
/* Map the data in RAM */
|
2021-06-17 21:53:07 +08:00
|
|
|
end_va = kernel_map.virt_addr + XIP_OFFSET + kernel_map.size;
|
|
|
|
for (va = kernel_map.virt_addr + XIP_OFFSET; va < end_va; va += map_size)
|
2021-04-13 14:35:14 +08:00
|
|
|
create_pgd_mapping(pgdir, va,
|
2021-06-17 21:53:07 +08:00
|
|
|
kernel_map.phys_addr + (va - (kernel_map.virt_addr + XIP_OFFSET)),
|
2021-04-13 14:35:14 +08:00
|
|
|
map_size, PAGE_KERNEL);
|
|
|
|
}
|
|
|
|
#else
|
2021-06-24 20:00:41 +08:00
|
|
|
static void __init create_kernel_page_table(pgd_t *pgdir, uintptr_t map_size,
|
|
|
|
bool early)
|
2021-04-12 00:41:44 +08:00
|
|
|
{
|
|
|
|
uintptr_t va, end_va;
|
|
|
|
|
2021-06-17 21:53:07 +08:00
|
|
|
end_va = kernel_map.virt_addr + kernel_map.size;
|
|
|
|
for (va = kernel_map.virt_addr; va < end_va; va += map_size)
|
2021-04-12 00:41:44 +08:00
|
|
|
create_pgd_mapping(pgdir, va,
|
2021-06-17 21:53:07 +08:00
|
|
|
kernel_map.phys_addr + (va - kernel_map.virt_addr),
|
2021-06-24 20:00:41 +08:00
|
|
|
map_size,
|
|
|
|
early ?
|
|
|
|
PAGE_KERNEL_EXEC : pgprot_from_va(va));
|
2021-04-12 00:41:44 +08:00
|
|
|
}
|
2021-04-13 14:35:14 +08:00
|
|
|
#endif
|
2021-04-12 00:41:44 +08:00
|
|
|
|
2019-06-29 04:36:21 +08:00
|
|
|
asmlinkage void __init setup_vm(uintptr_t dtb_pa)
|
2019-02-13 19:08:36 +08:00
|
|
|
{
|
2021-04-13 14:35:14 +08:00
|
|
|
uintptr_t __maybe_unused pa;
|
2021-02-21 22:22:33 +08:00
|
|
|
uintptr_t map_size;
|
2020-09-18 06:37:11 +08:00
|
|
|
#ifndef __PAGETABLE_PMD_FOLDED
|
|
|
|
pmd_t fix_bmap_spmd, fix_bmap_epmd;
|
|
|
|
#endif
|
2019-06-29 04:36:21 +08:00
|
|
|
|
2021-06-17 21:53:07 +08:00
|
|
|
kernel_map.virt_addr = KERNEL_LINK_ADDR;
|
|
|
|
|
2021-04-13 14:35:14 +08:00
|
|
|
#ifdef CONFIG_XIP_KERNEL
|
2021-06-17 21:53:07 +08:00
|
|
|
kernel_map.xiprom = (uintptr_t)CONFIG_XIP_PHYS_ADDR;
|
|
|
|
kernel_map.xiprom_sz = (uintptr_t)(&_exiprom) - (uintptr_t)(&_xiprom);
|
2021-04-13 14:35:14 +08:00
|
|
|
|
2021-06-17 21:53:07 +08:00
|
|
|
kernel_map.phys_addr = (uintptr_t)CONFIG_PHYS_RAM_BASE;
|
|
|
|
kernel_map.size = (uintptr_t)(&_end) - (uintptr_t)(&_sdata);
|
2021-04-13 14:35:14 +08:00
|
|
|
|
2021-06-17 21:53:07 +08:00
|
|
|
kernel_map.va_kernel_xip_pa_offset = kernel_map.virt_addr - kernel_map.xiprom;
|
2021-04-13 14:35:14 +08:00
|
|
|
#else
|
2021-06-17 21:53:07 +08:00
|
|
|
kernel_map.phys_addr = (uintptr_t)(&_start);
|
|
|
|
kernel_map.size = (uintptr_t)(&_end) - kernel_map.phys_addr;
|
2021-04-13 14:35:14 +08:00
|
|
|
#endif
|
2019-06-29 04:36:21 +08:00
|
|
|
|
2021-06-17 21:53:07 +08:00
|
|
|
kernel_map.va_pa_offset = PAGE_OFFSET - kernel_map.phys_addr;
|
2021-04-12 00:41:44 +08:00
|
|
|
#ifdef CONFIG_64BIT
|
2021-06-17 21:53:07 +08:00
|
|
|
kernel_map.va_kernel_pa_offset = kernel_map.virt_addr - kernel_map.phys_addr;
|
2021-04-12 00:41:44 +08:00
|
|
|
#endif
|
|
|
|
|
2021-06-17 21:53:07 +08:00
|
|
|
pfn_base = PFN_DOWN(kernel_map.phys_addr);
|
2019-02-13 19:08:36 +08:00
|
|
|
|
2019-06-29 04:36:21 +08:00
|
|
|
/*
|
|
|
|
* Enforce boot alignment requirements of RV32 and
|
|
|
|
* RV64 by only allowing PMD or PGD mappings.
|
|
|
|
*/
|
2021-02-21 22:22:33 +08:00
|
|
|
map_size = PMD_SIZE;
|
2019-02-13 19:08:36 +08:00
|
|
|
|
|
|
|
/* Sanity check alignment and size */
|
|
|
|
BUG_ON((PAGE_OFFSET % PGDIR_SIZE) != 0);
|
2021-06-17 21:53:07 +08:00
|
|
|
BUG_ON((kernel_map.phys_addr % map_size) != 0);
|
2019-06-29 04:36:21 +08:00
|
|
|
|
2021-06-29 17:13:48 +08:00
|
|
|
#ifdef CONFIG_64BIT
|
|
|
|
/*
|
|
|
|
* The last 4K bytes of the addressable memory can not be mapped because
|
|
|
|
* of IS_ERR_VALUE macro.
|
|
|
|
*/
|
|
|
|
BUG_ON((kernel_map.virt_addr + kernel_map.size) > ADDRESS_SPACE_END - SZ_4K);
|
|
|
|
#endif
|
|
|
|
|
2020-09-18 06:37:12 +08:00
|
|
|
pt_ops.alloc_pte = alloc_pte_early;
|
|
|
|
pt_ops.get_pte_virt = get_pte_virt_early;
|
|
|
|
#ifndef __PAGETABLE_PMD_FOLDED
|
|
|
|
pt_ops.alloc_pmd = alloc_pmd_early;
|
|
|
|
pt_ops.get_pmd_virt = get_pmd_virt_early;
|
|
|
|
#endif
|
2019-06-29 04:36:21 +08:00
|
|
|
/* Setup early PGD for fixmap */
|
|
|
|
create_pgd_mapping(early_pg_dir, FIXADDR_START,
|
|
|
|
(uintptr_t)fixmap_pgd_next, PGDIR_SIZE, PAGE_TABLE);
|
2019-02-13 19:08:36 +08:00
|
|
|
|
|
|
|
#ifndef __PAGETABLE_PMD_FOLDED
|
2019-06-29 04:36:21 +08:00
|
|
|
/* Setup fixmap PMD */
|
|
|
|
create_pmd_mapping(fixmap_pmd, FIXADDR_START,
|
|
|
|
(uintptr_t)fixmap_pte, PMD_SIZE, PAGE_TABLE);
|
|
|
|
/* Setup trampoline PGD and PMD */
|
2021-06-17 21:53:07 +08:00
|
|
|
create_pgd_mapping(trampoline_pg_dir, kernel_map.virt_addr,
|
2019-06-29 04:36:21 +08:00
|
|
|
(uintptr_t)trampoline_pmd, PGDIR_SIZE, PAGE_TABLE);
|
2021-04-13 14:35:14 +08:00
|
|
|
#ifdef CONFIG_XIP_KERNEL
|
2021-06-17 21:53:07 +08:00
|
|
|
create_pmd_mapping(trampoline_pmd, kernel_map.virt_addr,
|
|
|
|
kernel_map.xiprom, PMD_SIZE, PAGE_KERNEL_EXEC);
|
2021-04-13 14:35:14 +08:00
|
|
|
#else
|
2021-06-17 21:53:07 +08:00
|
|
|
create_pmd_mapping(trampoline_pmd, kernel_map.virt_addr,
|
|
|
|
kernel_map.phys_addr, PMD_SIZE, PAGE_KERNEL_EXEC);
|
2021-04-13 14:35:14 +08:00
|
|
|
#endif
|
2019-06-29 04:36:21 +08:00
|
|
|
#else
|
|
|
|
/* Setup trampoline PGD */
|
2021-06-17 21:53:07 +08:00
|
|
|
create_pgd_mapping(trampoline_pg_dir, kernel_map.virt_addr,
|
|
|
|
kernel_map.phys_addr, PGDIR_SIZE, PAGE_KERNEL_EXEC);
|
2019-06-29 04:36:21 +08:00
|
|
|
#endif
|
2019-02-13 19:08:36 +08:00
|
|
|
|
2019-06-29 04:36:21 +08:00
|
|
|
/*
|
2021-04-12 00:41:44 +08:00
|
|
|
* Setup early PGD covering entire kernel which will allow
|
2019-06-29 04:36:21 +08:00
|
|
|
* us to reach paging_init(). We map all memory banks later
|
|
|
|
* in setup_vm_final() below.
|
|
|
|
*/
|
2021-06-24 20:00:41 +08:00
|
|
|
create_kernel_page_table(early_pg_dir, map_size, true);
|
2019-06-29 04:36:21 +08:00
|
|
|
|
2020-11-04 14:37:13 +08:00
|
|
|
#ifndef __PAGETABLE_PMD_FOLDED
|
|
|
|
/* Setup early PMD for DTB */
|
|
|
|
create_pgd_mapping(early_pg_dir, DTB_EARLY_BASE_VA,
|
|
|
|
(uintptr_t)early_dtb_pmd, PGDIR_SIZE, PAGE_TABLE);
|
2021-01-16 07:49:48 +08:00
|
|
|
#ifndef CONFIG_BUILTIN_DTB
|
2020-11-04 14:37:13 +08:00
|
|
|
/* Create two consecutive PMD mappings for FDT early scan */
|
|
|
|
pa = dtb_pa & ~(PMD_SIZE - 1);
|
|
|
|
create_pmd_mapping(early_dtb_pmd, DTB_EARLY_BASE_VA,
|
|
|
|
pa, PMD_SIZE, PAGE_KERNEL);
|
|
|
|
create_pmd_mapping(early_dtb_pmd, DTB_EARLY_BASE_VA + PMD_SIZE,
|
|
|
|
pa + PMD_SIZE, PMD_SIZE, PAGE_KERNEL);
|
|
|
|
dtb_early_va = (void *)DTB_EARLY_BASE_VA + (dtb_pa & (PMD_SIZE - 1));
|
2021-01-16 07:49:48 +08:00
|
|
|
#else /* CONFIG_BUILTIN_DTB */
|
2021-04-12 00:41:44 +08:00
|
|
|
#ifdef CONFIG_64BIT
|
|
|
|
/*
|
|
|
|
* __va can't be used since it would return a linear mapping address
|
|
|
|
* whereas dtb_early_va will be used before setup_vm_final installs
|
|
|
|
* the linear mapping.
|
|
|
|
*/
|
2021-04-13 14:35:14 +08:00
|
|
|
dtb_early_va = kernel_mapping_pa_to_va(XIP_FIXUP(dtb_pa));
|
2021-04-12 00:41:44 +08:00
|
|
|
#else
|
2021-01-16 07:49:48 +08:00
|
|
|
dtb_early_va = __va(dtb_pa);
|
2021-04-12 00:41:44 +08:00
|
|
|
#endif /* CONFIG_64BIT */
|
2021-01-16 07:49:48 +08:00
|
|
|
#endif /* CONFIG_BUILTIN_DTB */
|
2020-11-04 14:37:13 +08:00
|
|
|
#else
|
2021-01-16 07:49:48 +08:00
|
|
|
#ifndef CONFIG_BUILTIN_DTB
|
2020-09-18 06:37:10 +08:00
|
|
|
/* Create two consecutive PGD mappings for FDT early scan */
|
|
|
|
pa = dtb_pa & ~(PGDIR_SIZE - 1);
|
|
|
|
create_pgd_mapping(early_pg_dir, DTB_EARLY_BASE_VA,
|
|
|
|
pa, PGDIR_SIZE, PAGE_KERNEL);
|
|
|
|
create_pgd_mapping(early_pg_dir, DTB_EARLY_BASE_VA + PGDIR_SIZE,
|
|
|
|
pa + PGDIR_SIZE, PGDIR_SIZE, PAGE_KERNEL);
|
|
|
|
dtb_early_va = (void *)DTB_EARLY_BASE_VA + (dtb_pa & (PGDIR_SIZE - 1));
|
2021-01-16 07:49:48 +08:00
|
|
|
#else /* CONFIG_BUILTIN_DTB */
|
2021-04-12 00:41:44 +08:00
|
|
|
#ifdef CONFIG_64BIT
|
2021-04-13 14:35:14 +08:00
|
|
|
dtb_early_va = kernel_mapping_pa_to_va(XIP_FIXUP(dtb_pa));
|
2021-04-12 00:41:44 +08:00
|
|
|
#else
|
2021-01-16 07:49:48 +08:00
|
|
|
dtb_early_va = __va(dtb_pa);
|
2021-04-12 00:41:44 +08:00
|
|
|
#endif /* CONFIG_64BIT */
|
2021-01-16 07:49:48 +08:00
|
|
|
#endif /* CONFIG_BUILTIN_DTB */
|
2020-11-04 14:37:13 +08:00
|
|
|
#endif
|
riscv: Fix memblock reservation for device tree blob
This fixes an error with how the FDT blob is reserved in memblock.
An incorrect physical address calculation exposed the FDT header to
unintended corruption, which typically manifested with of_fdt_raw_init()
faulting during late boot after fdt_totalsize() returned a wrong value.
Systems with smaller physical memory sizes more frequently trigger this
issue, as the kernel is more likely to allocate from the DMA32 zone
where bbl places the DTB after the kernel image.
Commit 671f9a3e2e24 ("RISC-V: Setup initial page tables in two stages")
changed the mapping of the DTB to reside in the fixmap area.
Consequently, early_init_fdt_reserve_self() cannot be used anymore in
setup_bootmem() since it relies on __pa() to derive a physical address,
which does not work with dtb_early_va that is no longer a valid kernel
logical address.
The reserved[0x1] region shows the effect of the pointer underflow
resulting from the __pa(initial_boot_params) offset subtraction:
[ 0.000000] MEMBLOCK configuration:
[ 0.000000] memory size = 0x000000001fe00000 reserved size = 0x0000000000a2e514
[ 0.000000] memory.cnt = 0x1
[ 0.000000] memory[0x0] [0x0000000080200000-0x000000009fffffff], 0x000000001fe00000 bytes flags: 0x0
[ 0.000000] reserved.cnt = 0x2
[ 0.000000] reserved[0x0] [0x0000000080200000-0x0000000080c2dfeb], 0x0000000000a2dfec bytes flags: 0x0
[ 0.000000] reserved[0x1] [0xfffffff080100000-0xfffffff080100527], 0x0000000000000528 bytes flags: 0x0
With the fix applied:
[ 0.000000] MEMBLOCK configuration:
[ 0.000000] memory size = 0x000000001fe00000 reserved size = 0x0000000000a2e514
[ 0.000000] memory.cnt = 0x1
[ 0.000000] memory[0x0] [0x0000000080200000-0x000000009fffffff], 0x000000001fe00000 bytes flags: 0x0
[ 0.000000] reserved.cnt = 0x2
[ 0.000000] reserved[0x0] [0x0000000080200000-0x0000000080c2dfeb], 0x0000000000a2dfec bytes flags: 0x0
[ 0.000000] reserved[0x1] [0x0000000080e00000-0x0000000080e00527], 0x0000000000000528 bytes flags: 0x0
Fixes: 671f9a3e2e24 ("RISC-V: Setup initial page tables in two stages")
Signed-off-by: Albert Ou <aou@eecs.berkeley.edu>
Tested-by: Bin Meng <bmeng.cn@gmail.com>
Reviewed-by: Anup Patel <anup@brainfault.org>
Signed-off-by: Paul Walmsley <paul.walmsley@sifive.com>
2019-09-28 07:14:18 +08:00
|
|
|
dtb_early_pa = dtb_pa;
|
2020-09-18 06:37:11 +08:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Bootime fixmap only can handle PMD_SIZE mapping. Thus, boot-ioremap
|
|
|
|
* range can not span multiple pmds.
|
|
|
|
*/
|
|
|
|
BUILD_BUG_ON((__fix_to_virt(FIX_BTMAP_BEGIN) >> PMD_SHIFT)
|
|
|
|
!= (__fix_to_virt(FIX_BTMAP_END) >> PMD_SHIFT));
|
|
|
|
|
|
|
|
#ifndef __PAGETABLE_PMD_FOLDED
|
|
|
|
/*
|
|
|
|
* Early ioremap fixmap is already created as it lies within first 2MB
|
|
|
|
* of fixmap region. We always map PMD_SIZE. Thus, both FIX_BTMAP_END
|
|
|
|
* FIX_BTMAP_BEGIN should lie in the same pmd. Verify that and warn
|
|
|
|
* the user if not.
|
|
|
|
*/
|
|
|
|
fix_bmap_spmd = fixmap_pmd[pmd_index(__fix_to_virt(FIX_BTMAP_BEGIN))];
|
|
|
|
fix_bmap_epmd = fixmap_pmd[pmd_index(__fix_to_virt(FIX_BTMAP_END))];
|
|
|
|
if (pmd_val(fix_bmap_spmd) != pmd_val(fix_bmap_epmd)) {
|
|
|
|
WARN_ON(1);
|
|
|
|
pr_warn("fixmap btmap start [%08lx] != end [%08lx]\n",
|
|
|
|
pmd_val(fix_bmap_spmd), pmd_val(fix_bmap_epmd));
|
|
|
|
pr_warn("fix_to_virt(FIX_BTMAP_BEGIN): %08lx\n",
|
|
|
|
fix_to_virt(FIX_BTMAP_BEGIN));
|
|
|
|
pr_warn("fix_to_virt(FIX_BTMAP_END): %08lx\n",
|
|
|
|
fix_to_virt(FIX_BTMAP_END));
|
|
|
|
|
|
|
|
pr_warn("FIX_BTMAP_END: %d\n", FIX_BTMAP_END);
|
|
|
|
pr_warn("FIX_BTMAP_BEGIN: %d\n", FIX_BTMAP_BEGIN);
|
|
|
|
}
|
|
|
|
#endif
|
2019-06-29 04:36:21 +08:00
|
|
|
}
|
2019-01-07 23:27:01 +08:00
|
|
|
|
2019-06-29 04:36:21 +08:00
|
|
|
static void __init setup_vm_final(void)
|
|
|
|
{
|
|
|
|
uintptr_t va, map_size;
|
|
|
|
phys_addr_t pa, start, end;
|
2020-10-14 07:58:08 +08:00
|
|
|
u64 i;
|
2019-06-29 04:36:21 +08:00
|
|
|
|
2020-09-18 06:37:12 +08:00
|
|
|
/**
|
|
|
|
* MMU is enabled at this point. But page table setup is not complete yet.
|
|
|
|
* fixmap page table alloc functions should be used at this point
|
|
|
|
*/
|
|
|
|
pt_ops.alloc_pte = alloc_pte_fixmap;
|
|
|
|
pt_ops.get_pte_virt = get_pte_virt_fixmap;
|
|
|
|
#ifndef __PAGETABLE_PMD_FOLDED
|
|
|
|
pt_ops.alloc_pmd = alloc_pmd_fixmap;
|
|
|
|
pt_ops.get_pmd_virt = get_pmd_virt_fixmap;
|
|
|
|
#endif
|
2019-06-29 04:36:21 +08:00
|
|
|
/* Setup swapper PGD for fixmap */
|
|
|
|
create_pgd_mapping(swapper_pg_dir, FIXADDR_START,
|
2020-01-02 11:12:40 +08:00
|
|
|
__pa_symbol(fixmap_pgd_next),
|
2019-06-29 04:36:21 +08:00
|
|
|
PGDIR_SIZE, PAGE_TABLE);
|
2019-01-07 23:27:01 +08:00
|
|
|
|
2021-04-12 00:41:44 +08:00
|
|
|
/* Map all memory banks in the linear mapping */
|
2020-10-14 07:58:08 +08:00
|
|
|
for_each_mem_range(i, &start, &end) {
|
2019-06-29 04:36:21 +08:00
|
|
|
if (start >= end)
|
|
|
|
break;
|
|
|
|
if (start <= __pa(PAGE_OFFSET) &&
|
|
|
|
__pa(PAGE_OFFSET) < end)
|
|
|
|
start = __pa(PAGE_OFFSET);
|
2021-06-29 17:13:47 +08:00
|
|
|
if (end >= __pa(PAGE_OFFSET) + memory_limit)
|
|
|
|
end = __pa(PAGE_OFFSET) + memory_limit;
|
2019-06-29 04:36:21 +08:00
|
|
|
|
|
|
|
map_size = best_map_size(start, end - start);
|
|
|
|
for (pa = start; pa < end; pa += map_size) {
|
|
|
|
va = (uintptr_t)__va(pa);
|
2021-04-12 00:41:44 +08:00
|
|
|
|
2021-06-24 20:00:41 +08:00
|
|
|
create_pgd_mapping(swapper_pg_dir, va, pa, map_size,
|
|
|
|
pgprot_from_va(va));
|
2019-06-29 04:36:21 +08:00
|
|
|
}
|
2019-02-13 19:08:36 +08:00
|
|
|
}
|
2019-01-07 23:27:01 +08:00
|
|
|
|
2021-04-12 00:41:44 +08:00
|
|
|
#ifdef CONFIG_64BIT
|
|
|
|
/* Map the kernel */
|
2021-06-24 20:00:41 +08:00
|
|
|
create_kernel_page_table(swapper_pg_dir, PMD_SIZE, false);
|
2021-04-12 00:41:44 +08:00
|
|
|
#endif
|
|
|
|
|
2019-06-29 04:36:21 +08:00
|
|
|
/* Clear fixmap PTE and PMD mappings */
|
|
|
|
clear_fixmap(FIX_PTE);
|
|
|
|
clear_fixmap(FIX_PMD);
|
|
|
|
|
|
|
|
/* Move to swapper page table */
|
2020-01-02 11:12:40 +08:00
|
|
|
csr_write(CSR_SATP, PFN_DOWN(__pa_symbol(swapper_pg_dir)) | SATP_MODE);
|
2019-06-29 04:36:21 +08:00
|
|
|
local_flush_tlb_all();
|
2020-09-18 06:37:12 +08:00
|
|
|
|
|
|
|
/* generic page allocation functions must be used to setup page table */
|
|
|
|
pt_ops.alloc_pte = alloc_pte_late;
|
|
|
|
pt_ops.get_pte_virt = get_pte_virt_late;
|
|
|
|
#ifndef __PAGETABLE_PMD_FOLDED
|
|
|
|
pt_ops.alloc_pmd = alloc_pmd_late;
|
|
|
|
pt_ops.get_pmd_virt = get_pmd_virt_late;
|
|
|
|
#endif
|
2019-06-29 04:36:21 +08:00
|
|
|
}
|
2019-10-28 20:10:41 +08:00
|
|
|
#else
|
|
|
|
asmlinkage void __init setup_vm(uintptr_t dtb_pa)
|
|
|
|
{
|
|
|
|
dtb_early_va = (void *)dtb_pa;
|
2020-10-02 03:04:56 +08:00
|
|
|
dtb_early_pa = dtb_pa;
|
2019-10-28 20:10:41 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static inline void setup_vm_final(void)
|
|
|
|
{
|
|
|
|
}
|
|
|
|
#endif /* CONFIG_MMU */
|
2019-06-29 04:36:21 +08:00
|
|
|
|
2021-04-19 08:55:38 +08:00
|
|
|
#ifdef CONFIG_KEXEC_CORE
|
|
|
|
/*
|
|
|
|
* reserve_crashkernel() - reserves memory for crash kernel
|
|
|
|
*
|
|
|
|
* This function reserves memory area given in "crashkernel=" kernel command
|
|
|
|
* line parameter. The memory reserved is used by dump capture kernel when
|
|
|
|
* primary kernel is crashing.
|
|
|
|
*/
|
|
|
|
static void __init reserve_crashkernel(void)
|
|
|
|
{
|
|
|
|
unsigned long long crash_base = 0;
|
|
|
|
unsigned long long crash_size = 0;
|
|
|
|
unsigned long search_start = memblock_start_of_DRAM();
|
|
|
|
unsigned long search_end = memblock_end_of_DRAM();
|
|
|
|
|
|
|
|
int ret = 0;
|
|
|
|
|
2021-04-19 08:55:39 +08:00
|
|
|
/*
|
|
|
|
* Don't reserve a region for a crash kernel on a crash kernel
|
|
|
|
* since it doesn't make much sense and we have limited memory
|
|
|
|
* resources.
|
|
|
|
*/
|
|
|
|
#ifdef CONFIG_CRASH_DUMP
|
|
|
|
if (is_kdump_kernel()) {
|
|
|
|
pr_info("crashkernel: ignoring reservation request\n");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2021-04-19 08:55:38 +08:00
|
|
|
ret = parse_crashkernel(boot_command_line, memblock_phys_mem_size(),
|
|
|
|
&crash_size, &crash_base);
|
|
|
|
if (ret || !crash_size)
|
|
|
|
return;
|
|
|
|
|
|
|
|
crash_size = PAGE_ALIGN(crash_size);
|
|
|
|
|
|
|
|
if (crash_base == 0) {
|
|
|
|
/*
|
|
|
|
* Current riscv boot protocol requires 2MB alignment for
|
|
|
|
* RV64 and 4MB alignment for RV32 (hugepage size)
|
|
|
|
*/
|
|
|
|
crash_base = memblock_find_in_range(search_start, search_end,
|
|
|
|
crash_size, PMD_SIZE);
|
|
|
|
|
|
|
|
if (crash_base == 0) {
|
|
|
|
pr_warn("crashkernel: couldn't allocate %lldKB\n",
|
|
|
|
crash_size >> 10);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
/* User specifies base address explicitly. */
|
|
|
|
if (!memblock_is_region_memory(crash_base, crash_size)) {
|
|
|
|
pr_warn("crashkernel: requested region is not memory\n");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (memblock_is_region_reserved(crash_base, crash_size)) {
|
|
|
|
pr_warn("crashkernel: requested region is reserved\n");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
if (!IS_ALIGNED(crash_base, PMD_SIZE)) {
|
|
|
|
pr_warn("crashkernel: requested region is misaligned\n");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
memblock_reserve(crash_base, crash_size);
|
|
|
|
|
|
|
|
pr_info("crashkernel: reserved 0x%016llx - 0x%016llx (%lld MB)\n",
|
|
|
|
crash_base, crash_base + crash_size, crash_size >> 20);
|
|
|
|
|
|
|
|
crashk_res.start = crash_base;
|
|
|
|
crashk_res.end = crash_base + crash_size - 1;
|
|
|
|
}
|
|
|
|
#endif /* CONFIG_KEXEC_CORE */
|
|
|
|
|
2021-04-19 08:55:39 +08:00
|
|
|
#ifdef CONFIG_CRASH_DUMP
|
|
|
|
/*
|
|
|
|
* We keep track of the ELF core header of the crashed
|
|
|
|
* kernel with a reserved-memory region with compatible
|
|
|
|
* string "linux,elfcorehdr". Here we register a callback
|
|
|
|
* to populate elfcorehdr_addr/size when this region is
|
|
|
|
* present. Note that this region will be marked as
|
|
|
|
* reserved once we call early_init_fdt_scan_reserved_mem()
|
|
|
|
* later on.
|
|
|
|
*/
|
2021-05-16 21:15:56 +08:00
|
|
|
static int __init elfcore_hdr_setup(struct reserved_mem *rmem)
|
2021-04-19 08:55:39 +08:00
|
|
|
{
|
|
|
|
elfcorehdr_addr = rmem->base;
|
|
|
|
elfcorehdr_size = rmem->size;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
RESERVEDMEM_OF_DECLARE(elfcorehdr, "linux,elfcorehdr", elfcore_hdr_setup);
|
|
|
|
#endif
|
|
|
|
|
2019-06-29 04:36:21 +08:00
|
|
|
void __init paging_init(void)
|
|
|
|
{
|
2021-05-10 19:42:22 +08:00
|
|
|
setup_bootmem();
|
2019-06-29 04:36:21 +08:00
|
|
|
setup_vm_final();
|
2020-11-19 08:38:27 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
void __init misc_mem_init(void)
|
|
|
|
{
|
2021-02-25 14:54:17 +08:00
|
|
|
early_memtest(min_low_pfn << PAGE_SHIFT, max_low_pfn << PAGE_SHIFT);
|
2020-11-19 08:38:29 +08:00
|
|
|
arch_numa_init();
|
2020-11-19 08:38:27 +08:00
|
|
|
sparse_init();
|
2019-06-29 04:36:21 +08:00
|
|
|
zone_sizes_init();
|
2021-04-19 08:55:38 +08:00
|
|
|
#ifdef CONFIG_KEXEC_CORE
|
|
|
|
reserve_crashkernel();
|
|
|
|
#endif
|
2020-11-19 08:38:29 +08:00
|
|
|
memblock_dump_all();
|
2019-02-13 19:08:36 +08:00
|
|
|
}
|
2019-08-29 05:40:54 +08:00
|
|
|
|
2019-10-23 11:23:02 +08:00
|
|
|
#ifdef CONFIG_SPARSEMEM_VMEMMAP
|
2019-08-29 05:40:54 +08:00
|
|
|
int __meminit vmemmap_populate(unsigned long start, unsigned long end, int node,
|
|
|
|
struct vmem_altmap *altmap)
|
|
|
|
{
|
2020-08-07 14:23:19 +08:00
|
|
|
return vmemmap_populate_basepages(start, end, node, NULL);
|
2019-08-29 05:40:54 +08:00
|
|
|
}
|
|
|
|
#endif
|