mirror of
https://mirrors.bfsu.edu.cn/git/linux.git
synced 2024-12-30 14:34:51 +08:00
aa5b537b0e
* Support for Sv57-based virtual memory. * Various improvements for the MicroChip PolarFire SOC and the associated Icicle dev board, which should allow upstream kernels to boot without any additional modifications. * An improved memmove() implementation. * Support for the new Ssconfpmf and SBI PMU extensions, which allows for a much more useful perf implementation on RISC-V systems. * Support for restartable sequences. -----BEGIN PGP SIGNATURE----- iQJHBAABCAAxFiEEKzw3R0RoQ7JKlDp6LhMZ81+7GIkFAmI96FcTHHBhbG1lckBk YWJiZWx0LmNvbQAKCRAuExnzX7sYiQBFD/425+6xmoOru6Wiki3Ja0fqQToNrQyW IbmE/8AxUP7UxMvJSNzvQm8deXgklzvmegXCtnjwZZins971vMzzDSI83k/zn8I7 m5thVC9z01BjodV+pvIp/44hS6FesolOLzkVHksX0Zh6h0iidrc34Qf5HrqvvNfN CZ/4K1+E9ig5r9qZp4WdvocCXj+FzwF/30GjKoW9vwA599CEG/dCo+TNN9GKD6XS k+xiUGwlIRA+kCLSPFCi7ev9XPr1tCmQB7uB8Igcvr7Y3mWl8HKfajQVXBnXNRC3 ifbDxpx1elJiLPyf7Rza8jIDwDhLQdxBiwPgDgP9h9R4x0uF4efq8PzLzFlFmaE+ 9Z9thfykBb5dXYDFDje9bAOXvKnGk7Iqxdsz0qWo/ChEQawX1+11bJb0TNN8QTT9 YvlQfUXgb1dmEcj5yG2uVE1Y8L7YNLRMsZU3W3FbmPJZoavSOuU4x0yCGeLyv597 76af3nuBJ5v80Db97gu6St+HIACeevKflsZUf/8GS/p7d1DlvmrWzQUMEycxPTG9 UZpZak58jh7AqQ9JbLnavhwmeacY50vpZOw6QHGAHSN+8daCPlOHDG7Ver7Z+kNj +srJ7iKMvLnnaEjGNgavfxdqTOme1gv4LWs/JdHYMkpphqVN92xBDJnhXTPRVZiQ 0x39vK86qtB46A== =Omc6 -----END PGP SIGNATURE----- Merge tag 'riscv-for-linus-5.18-mw0' of git://git.kernel.org/pub/scm/linux/kernel/git/riscv/linux Pull RISC-V updates from Palmer Dabbelt: - Support for Sv57-based virtual memory. - Various improvements for the MicroChip PolarFire SOC and the associated Icicle dev board, which should allow upstream kernels to boot without any additional modifications. - An improved memmove() implementation. - Support for the new Ssconfpmf and SBI PMU extensions, which allows for a much more useful perf implementation on RISC-V systems. - Support for restartable sequences. * tag 'riscv-for-linus-5.18-mw0' of git://git.kernel.org/pub/scm/linux/kernel/git/riscv/linux: (36 commits) rseq/selftests: Add support for RISC-V RISC-V: Add support for restartable sequence MAINTAINERS: Add entry for RISC-V PMU drivers Documentation: riscv: Remove the old documentation RISC-V: Add sscofpmf extension support RISC-V: Add perf platform driver based on SBI PMU extension RISC-V: Add RISC-V SBI PMU extension definitions RISC-V: Add a simple platform driver for RISC-V legacy perf RISC-V: Add a perf core library for pmu drivers RISC-V: Add CSR encodings for all HPMCOUNTERS RISC-V: Remove the current perf implementation RISC-V: Improve /proc/cpuinfo output for ISA extensions RISC-V: Do no continue isa string parsing without correct XLEN RISC-V: Implement multi-letter ISA extension probing framework RISC-V: Extract multi-letter extension names from "riscv, isa" RISC-V: Minimal parser for "riscv, isa" strings RISC-V: Correctly print supported extensions riscv: Fixed misaligned memory access. Fixed pointer comparison. MAINTAINERS: update riscv/microchip entry riscv: dts: microchip: add new peripherals to icicle kit device tree ...
470 lines
14 KiB
C
470 lines
14 KiB
C
// SPDX-License-Identifier: GPL-2.0
|
|
// Copyright (C) 2019 Andes Technology Corporation
|
|
|
|
#include <linux/pfn.h>
|
|
#include <linux/init_task.h>
|
|
#include <linux/kasan.h>
|
|
#include <linux/kernel.h>
|
|
#include <linux/memblock.h>
|
|
#include <linux/pgtable.h>
|
|
#include <asm/tlbflush.h>
|
|
#include <asm/fixmap.h>
|
|
#include <asm/pgalloc.h>
|
|
|
|
/*
|
|
* Kasan shadow region must lie at a fixed address across sv39, sv48 and sv57
|
|
* which is right before the kernel.
|
|
*
|
|
* For sv39, the region is aligned on PGDIR_SIZE so we only need to populate
|
|
* the page global directory with kasan_early_shadow_pmd.
|
|
*
|
|
* For sv48 and sv57, the region is not aligned on PGDIR_SIZE so the mapping
|
|
* must be divided as follows:
|
|
* - the first PGD entry, although incomplete, is populated with
|
|
* kasan_early_shadow_pud/p4d
|
|
* - the PGD entries in the middle are populated with kasan_early_shadow_pud/p4d
|
|
* - the last PGD entry is shared with the kernel mapping so populated at the
|
|
* lower levels pud/p4d
|
|
*
|
|
* In addition, when shallow populating a kasan region (for example vmalloc),
|
|
* this region may also not be aligned on PGDIR size, so we must go down to the
|
|
* pud level too.
|
|
*/
|
|
|
|
extern pgd_t early_pg_dir[PTRS_PER_PGD];
|
|
|
|
static void __init kasan_populate_pte(pmd_t *pmd, unsigned long vaddr, unsigned long end)
|
|
{
|
|
phys_addr_t phys_addr;
|
|
pte_t *ptep, *base_pte;
|
|
|
|
if (pmd_none(*pmd))
|
|
base_pte = memblock_alloc(PTRS_PER_PTE * sizeof(pte_t), PAGE_SIZE);
|
|
else
|
|
base_pte = (pte_t *)pmd_page_vaddr(*pmd);
|
|
|
|
ptep = base_pte + pte_index(vaddr);
|
|
|
|
do {
|
|
if (pte_none(*ptep)) {
|
|
phys_addr = memblock_phys_alloc(PAGE_SIZE, PAGE_SIZE);
|
|
set_pte(ptep, pfn_pte(PFN_DOWN(phys_addr), PAGE_KERNEL));
|
|
}
|
|
} while (ptep++, vaddr += PAGE_SIZE, vaddr != end);
|
|
|
|
set_pmd(pmd, pfn_pmd(PFN_DOWN(__pa(base_pte)), PAGE_TABLE));
|
|
}
|
|
|
|
static void __init kasan_populate_pmd(pud_t *pud, unsigned long vaddr, unsigned long end)
|
|
{
|
|
phys_addr_t phys_addr;
|
|
pmd_t *pmdp, *base_pmd;
|
|
unsigned long next;
|
|
|
|
if (pud_none(*pud)) {
|
|
base_pmd = memblock_alloc(PTRS_PER_PMD * sizeof(pmd_t), PAGE_SIZE);
|
|
} else {
|
|
base_pmd = (pmd_t *)pud_pgtable(*pud);
|
|
if (base_pmd == lm_alias(kasan_early_shadow_pmd))
|
|
base_pmd = memblock_alloc(PTRS_PER_PMD * sizeof(pmd_t), PAGE_SIZE);
|
|
}
|
|
|
|
pmdp = base_pmd + pmd_index(vaddr);
|
|
|
|
do {
|
|
next = pmd_addr_end(vaddr, end);
|
|
|
|
if (pmd_none(*pmdp) && IS_ALIGNED(vaddr, PMD_SIZE) && (next - vaddr) >= PMD_SIZE) {
|
|
phys_addr = memblock_phys_alloc(PMD_SIZE, PMD_SIZE);
|
|
if (phys_addr) {
|
|
set_pmd(pmdp, pfn_pmd(PFN_DOWN(phys_addr), PAGE_KERNEL));
|
|
continue;
|
|
}
|
|
}
|
|
|
|
kasan_populate_pte(pmdp, vaddr, next);
|
|
} while (pmdp++, vaddr = next, vaddr != end);
|
|
|
|
/*
|
|
* Wait for the whole PGD to be populated before setting the PGD in
|
|
* the page table, otherwise, if we did set the PGD before populating
|
|
* it entirely, memblock could allocate a page at a physical address
|
|
* where KASAN is not populated yet and then we'd get a page fault.
|
|
*/
|
|
set_pud(pud, pfn_pud(PFN_DOWN(__pa(base_pmd)), PAGE_TABLE));
|
|
}
|
|
|
|
static void __init kasan_populate_pud(pgd_t *pgd,
|
|
unsigned long vaddr, unsigned long end,
|
|
bool early)
|
|
{
|
|
phys_addr_t phys_addr;
|
|
pud_t *pudp, *base_pud;
|
|
unsigned long next;
|
|
|
|
if (early) {
|
|
/*
|
|
* We can't use pgd_page_vaddr here as it would return a linear
|
|
* mapping address but it is not mapped yet, but when populating
|
|
* early_pg_dir, we need the physical address and when populating
|
|
* swapper_pg_dir, we need the kernel virtual address so use
|
|
* pt_ops facility.
|
|
*/
|
|
base_pud = pt_ops.get_pud_virt(pfn_to_phys(_pgd_pfn(*pgd)));
|
|
} else if (pgd_none(*pgd)) {
|
|
base_pud = memblock_alloc(PTRS_PER_PUD * sizeof(pud_t), PAGE_SIZE);
|
|
} else {
|
|
base_pud = (pud_t *)pgd_page_vaddr(*pgd);
|
|
if (base_pud == lm_alias(kasan_early_shadow_pud)) {
|
|
base_pud = memblock_alloc(PTRS_PER_PUD * sizeof(pud_t), PAGE_SIZE);
|
|
memcpy(base_pud, (void *)kasan_early_shadow_pud,
|
|
sizeof(pud_t) * PTRS_PER_PUD);
|
|
}
|
|
}
|
|
|
|
pudp = base_pud + pud_index(vaddr);
|
|
|
|
do {
|
|
next = pud_addr_end(vaddr, end);
|
|
|
|
if (pud_none(*pudp) && IS_ALIGNED(vaddr, PUD_SIZE) && (next - vaddr) >= PUD_SIZE) {
|
|
if (early) {
|
|
phys_addr = __pa(((uintptr_t)kasan_early_shadow_pmd));
|
|
set_pud(pudp, pfn_pud(PFN_DOWN(phys_addr), PAGE_TABLE));
|
|
continue;
|
|
} else {
|
|
phys_addr = memblock_phys_alloc(PUD_SIZE, PUD_SIZE);
|
|
if (phys_addr) {
|
|
set_pud(pudp, pfn_pud(PFN_DOWN(phys_addr), PAGE_KERNEL));
|
|
continue;
|
|
}
|
|
}
|
|
}
|
|
|
|
kasan_populate_pmd(pudp, vaddr, next);
|
|
} while (pudp++, vaddr = next, vaddr != end);
|
|
|
|
/*
|
|
* Wait for the whole PGD to be populated before setting the PGD in
|
|
* the page table, otherwise, if we did set the PGD before populating
|
|
* it entirely, memblock could allocate a page at a physical address
|
|
* where KASAN is not populated yet and then we'd get a page fault.
|
|
*/
|
|
if (!early)
|
|
set_pgd(pgd, pfn_pgd(PFN_DOWN(__pa(base_pud)), PAGE_TABLE));
|
|
}
|
|
|
|
static void __init kasan_populate_p4d(pgd_t *pgd,
|
|
unsigned long vaddr, unsigned long end,
|
|
bool early)
|
|
{
|
|
phys_addr_t phys_addr;
|
|
p4d_t *p4dp, *base_p4d;
|
|
unsigned long next;
|
|
|
|
if (early) {
|
|
/*
|
|
* We can't use pgd_page_vaddr here as it would return a linear
|
|
* mapping address but it is not mapped yet, but when populating
|
|
* early_pg_dir, we need the physical address and when populating
|
|
* swapper_pg_dir, we need the kernel virtual address so use
|
|
* pt_ops facility.
|
|
*/
|
|
base_p4d = pt_ops.get_p4d_virt(pfn_to_phys(_pgd_pfn(*pgd)));
|
|
} else {
|
|
base_p4d = (p4d_t *)pgd_page_vaddr(*pgd);
|
|
if (base_p4d == lm_alias(kasan_early_shadow_p4d))
|
|
base_p4d = memblock_alloc(PTRS_PER_PUD * sizeof(p4d_t), PAGE_SIZE);
|
|
}
|
|
|
|
p4dp = base_p4d + p4d_index(vaddr);
|
|
|
|
do {
|
|
next = p4d_addr_end(vaddr, end);
|
|
|
|
if (p4d_none(*p4dp) && IS_ALIGNED(vaddr, P4D_SIZE) && (next - vaddr) >= P4D_SIZE) {
|
|
if (early) {
|
|
phys_addr = __pa(((uintptr_t)kasan_early_shadow_pud));
|
|
set_p4d(p4dp, pfn_p4d(PFN_DOWN(phys_addr), PAGE_TABLE));
|
|
continue;
|
|
} else {
|
|
phys_addr = memblock_phys_alloc(P4D_SIZE, P4D_SIZE);
|
|
if (phys_addr) {
|
|
set_p4d(p4dp, pfn_p4d(PFN_DOWN(phys_addr), PAGE_KERNEL));
|
|
continue;
|
|
}
|
|
}
|
|
}
|
|
|
|
kasan_populate_pud((pgd_t *)p4dp, vaddr, next, early);
|
|
} while (p4dp++, vaddr = next, vaddr != end);
|
|
|
|
/*
|
|
* Wait for the whole P4D to be populated before setting the P4D in
|
|
* the page table, otherwise, if we did set the P4D before populating
|
|
* it entirely, memblock could allocate a page at a physical address
|
|
* where KASAN is not populated yet and then we'd get a page fault.
|
|
*/
|
|
if (!early)
|
|
set_pgd(pgd, pfn_pgd(PFN_DOWN(__pa(base_p4d)), PAGE_TABLE));
|
|
}
|
|
|
|
#define kasan_early_shadow_pgd_next (pgtable_l5_enabled ? \
|
|
(uintptr_t)kasan_early_shadow_p4d : \
|
|
(pgtable_l4_enabled ? \
|
|
(uintptr_t)kasan_early_shadow_pud : \
|
|
(uintptr_t)kasan_early_shadow_pmd))
|
|
#define kasan_populate_pgd_next(pgdp, vaddr, next, early) \
|
|
(pgtable_l5_enabled ? \
|
|
kasan_populate_p4d(pgdp, vaddr, next, early) : \
|
|
(pgtable_l4_enabled ? \
|
|
kasan_populate_pud(pgdp, vaddr, next, early) : \
|
|
kasan_populate_pmd((pud_t *)pgdp, vaddr, next)))
|
|
|
|
static void __init kasan_populate_pgd(pgd_t *pgdp,
|
|
unsigned long vaddr, unsigned long end,
|
|
bool early)
|
|
{
|
|
phys_addr_t phys_addr;
|
|
unsigned long next;
|
|
|
|
do {
|
|
next = pgd_addr_end(vaddr, end);
|
|
|
|
if (IS_ALIGNED(vaddr, PGDIR_SIZE) && (next - vaddr) >= PGDIR_SIZE) {
|
|
if (early) {
|
|
phys_addr = __pa((uintptr_t)kasan_early_shadow_pgd_next);
|
|
set_pgd(pgdp, pfn_pgd(PFN_DOWN(phys_addr), PAGE_TABLE));
|
|
continue;
|
|
} else if (pgd_page_vaddr(*pgdp) ==
|
|
(unsigned long)lm_alias(kasan_early_shadow_pgd_next)) {
|
|
/*
|
|
* pgdp can't be none since kasan_early_init
|
|
* initialized all KASAN shadow region with
|
|
* kasan_early_shadow_pud: if this is still the
|
|
* case, that means we can try to allocate a
|
|
* hugepage as a replacement.
|
|
*/
|
|
phys_addr = memblock_phys_alloc(PGDIR_SIZE, PGDIR_SIZE);
|
|
if (phys_addr) {
|
|
set_pgd(pgdp, pfn_pgd(PFN_DOWN(phys_addr), PAGE_KERNEL));
|
|
continue;
|
|
}
|
|
}
|
|
}
|
|
|
|
kasan_populate_pgd_next(pgdp, vaddr, next, early);
|
|
} while (pgdp++, vaddr = next, vaddr != end);
|
|
}
|
|
|
|
asmlinkage void __init kasan_early_init(void)
|
|
{
|
|
uintptr_t i;
|
|
|
|
BUILD_BUG_ON(KASAN_SHADOW_OFFSET !=
|
|
KASAN_SHADOW_END - (1UL << (64 - KASAN_SHADOW_SCALE_SHIFT)));
|
|
|
|
for (i = 0; i < PTRS_PER_PTE; ++i)
|
|
set_pte(kasan_early_shadow_pte + i,
|
|
pfn_pte(virt_to_pfn(kasan_early_shadow_page), PAGE_KERNEL));
|
|
|
|
for (i = 0; i < PTRS_PER_PMD; ++i)
|
|
set_pmd(kasan_early_shadow_pmd + i,
|
|
pfn_pmd(PFN_DOWN
|
|
(__pa((uintptr_t)kasan_early_shadow_pte)),
|
|
PAGE_TABLE));
|
|
|
|
if (pgtable_l4_enabled) {
|
|
for (i = 0; i < PTRS_PER_PUD; ++i)
|
|
set_pud(kasan_early_shadow_pud + i,
|
|
pfn_pud(PFN_DOWN
|
|
(__pa(((uintptr_t)kasan_early_shadow_pmd))),
|
|
PAGE_TABLE));
|
|
}
|
|
|
|
if (pgtable_l5_enabled) {
|
|
for (i = 0; i < PTRS_PER_P4D; ++i)
|
|
set_p4d(kasan_early_shadow_p4d + i,
|
|
pfn_p4d(PFN_DOWN
|
|
(__pa(((uintptr_t)kasan_early_shadow_pud))),
|
|
PAGE_TABLE));
|
|
}
|
|
|
|
kasan_populate_pgd(early_pg_dir + pgd_index(KASAN_SHADOW_START),
|
|
KASAN_SHADOW_START, KASAN_SHADOW_END, true);
|
|
|
|
local_flush_tlb_all();
|
|
}
|
|
|
|
void __init kasan_swapper_init(void)
|
|
{
|
|
kasan_populate_pgd(pgd_offset_k(KASAN_SHADOW_START),
|
|
KASAN_SHADOW_START, KASAN_SHADOW_END, true);
|
|
|
|
local_flush_tlb_all();
|
|
}
|
|
|
|
static void __init kasan_populate(void *start, void *end)
|
|
{
|
|
unsigned long vaddr = (unsigned long)start & PAGE_MASK;
|
|
unsigned long vend = PAGE_ALIGN((unsigned long)end);
|
|
|
|
kasan_populate_pgd(pgd_offset_k(vaddr), vaddr, vend, false);
|
|
|
|
local_flush_tlb_all();
|
|
memset(start, KASAN_SHADOW_INIT, end - start);
|
|
}
|
|
|
|
static void __init kasan_shallow_populate_pmd(pgd_t *pgdp,
|
|
unsigned long vaddr, unsigned long end)
|
|
{
|
|
unsigned long next;
|
|
pmd_t *pmdp, *base_pmd;
|
|
bool is_kasan_pte;
|
|
|
|
base_pmd = (pmd_t *)pgd_page_vaddr(*pgdp);
|
|
pmdp = base_pmd + pmd_index(vaddr);
|
|
|
|
do {
|
|
next = pmd_addr_end(vaddr, end);
|
|
is_kasan_pte = (pmd_pgtable(*pmdp) == lm_alias(kasan_early_shadow_pte));
|
|
|
|
if (is_kasan_pte)
|
|
pmd_clear(pmdp);
|
|
} while (pmdp++, vaddr = next, vaddr != end);
|
|
}
|
|
|
|
static void __init kasan_shallow_populate_pud(pgd_t *pgdp,
|
|
unsigned long vaddr, unsigned long end)
|
|
{
|
|
unsigned long next;
|
|
pud_t *pudp, *base_pud;
|
|
pmd_t *base_pmd;
|
|
bool is_kasan_pmd;
|
|
|
|
base_pud = (pud_t *)pgd_page_vaddr(*pgdp);
|
|
pudp = base_pud + pud_index(vaddr);
|
|
|
|
do {
|
|
next = pud_addr_end(vaddr, end);
|
|
is_kasan_pmd = (pud_pgtable(*pudp) == lm_alias(kasan_early_shadow_pmd));
|
|
|
|
if (!is_kasan_pmd)
|
|
continue;
|
|
|
|
base_pmd = memblock_alloc(PAGE_SIZE, PAGE_SIZE);
|
|
set_pud(pudp, pfn_pud(PFN_DOWN(__pa(base_pmd)), PAGE_TABLE));
|
|
|
|
if (IS_ALIGNED(vaddr, PUD_SIZE) && (next - vaddr) >= PUD_SIZE)
|
|
continue;
|
|
|
|
memcpy(base_pmd, (void *)kasan_early_shadow_pmd, PAGE_SIZE);
|
|
kasan_shallow_populate_pmd((pgd_t *)pudp, vaddr, next);
|
|
} while (pudp++, vaddr = next, vaddr != end);
|
|
}
|
|
|
|
static void __init kasan_shallow_populate_p4d(pgd_t *pgdp,
|
|
unsigned long vaddr, unsigned long end)
|
|
{
|
|
unsigned long next;
|
|
p4d_t *p4dp, *base_p4d;
|
|
pud_t *base_pud;
|
|
bool is_kasan_pud;
|
|
|
|
base_p4d = (p4d_t *)pgd_page_vaddr(*pgdp);
|
|
p4dp = base_p4d + p4d_index(vaddr);
|
|
|
|
do {
|
|
next = p4d_addr_end(vaddr, end);
|
|
is_kasan_pud = (p4d_pgtable(*p4dp) == lm_alias(kasan_early_shadow_pud));
|
|
|
|
if (!is_kasan_pud)
|
|
continue;
|
|
|
|
base_pud = memblock_alloc(PAGE_SIZE, PAGE_SIZE);
|
|
set_p4d(p4dp, pfn_p4d(PFN_DOWN(__pa(base_pud)), PAGE_TABLE));
|
|
|
|
if (IS_ALIGNED(vaddr, P4D_SIZE) && (next - vaddr) >= P4D_SIZE)
|
|
continue;
|
|
|
|
memcpy(base_pud, (void *)kasan_early_shadow_pud, PAGE_SIZE);
|
|
kasan_shallow_populate_pud((pgd_t *)p4dp, vaddr, next);
|
|
} while (p4dp++, vaddr = next, vaddr != end);
|
|
}
|
|
|
|
#define kasan_shallow_populate_pgd_next(pgdp, vaddr, next) \
|
|
(pgtable_l5_enabled ? \
|
|
kasan_shallow_populate_p4d(pgdp, vaddr, next) : \
|
|
(pgtable_l4_enabled ? \
|
|
kasan_shallow_populate_pud(pgdp, vaddr, next) : \
|
|
kasan_shallow_populate_pmd(pgdp, vaddr, next)))
|
|
|
|
static void __init kasan_shallow_populate_pgd(unsigned long vaddr, unsigned long end)
|
|
{
|
|
unsigned long next;
|
|
void *p;
|
|
pgd_t *pgd_k = pgd_offset_k(vaddr);
|
|
bool is_kasan_pgd_next;
|
|
|
|
do {
|
|
next = pgd_addr_end(vaddr, end);
|
|
is_kasan_pgd_next = (pgd_page_vaddr(*pgd_k) ==
|
|
(unsigned long)lm_alias(kasan_early_shadow_pgd_next));
|
|
|
|
if (is_kasan_pgd_next) {
|
|
p = memblock_alloc(PAGE_SIZE, PAGE_SIZE);
|
|
set_pgd(pgd_k, pfn_pgd(PFN_DOWN(__pa(p)), PAGE_TABLE));
|
|
}
|
|
|
|
if (IS_ALIGNED(vaddr, PGDIR_SIZE) && (next - vaddr) >= PGDIR_SIZE)
|
|
continue;
|
|
|
|
memcpy(p, (void *)kasan_early_shadow_pgd_next, PAGE_SIZE);
|
|
kasan_shallow_populate_pgd_next(pgd_k, vaddr, next);
|
|
} while (pgd_k++, vaddr = next, vaddr != end);
|
|
}
|
|
|
|
static void __init kasan_shallow_populate(void *start, void *end)
|
|
{
|
|
unsigned long vaddr = (unsigned long)start & PAGE_MASK;
|
|
unsigned long vend = PAGE_ALIGN((unsigned long)end);
|
|
|
|
kasan_shallow_populate_pgd(vaddr, vend);
|
|
local_flush_tlb_all();
|
|
}
|
|
|
|
void __init kasan_init(void)
|
|
{
|
|
phys_addr_t p_start, p_end;
|
|
u64 i;
|
|
|
|
if (IS_ENABLED(CONFIG_KASAN_VMALLOC))
|
|
kasan_shallow_populate(
|
|
(void *)kasan_mem_to_shadow((void *)VMALLOC_START),
|
|
(void *)kasan_mem_to_shadow((void *)VMALLOC_END));
|
|
|
|
/* Populate the linear mapping */
|
|
for_each_mem_range(i, &p_start, &p_end) {
|
|
void *start = (void *)__va(p_start);
|
|
void *end = (void *)__va(p_end);
|
|
|
|
if (start >= end)
|
|
break;
|
|
|
|
kasan_populate(kasan_mem_to_shadow(start), kasan_mem_to_shadow(end));
|
|
}
|
|
|
|
/* Populate kernel, BPF, modules mapping */
|
|
kasan_populate(kasan_mem_to_shadow((const void *)MODULES_VADDR),
|
|
kasan_mem_to_shadow((const void *)MODULES_VADDR + SZ_2G));
|
|
|
|
for (i = 0; i < PTRS_PER_PTE; i++)
|
|
set_pte(&kasan_early_shadow_pte[i],
|
|
mk_pte(virt_to_page(kasan_early_shadow_page),
|
|
__pgprot(_PAGE_PRESENT | _PAGE_READ |
|
|
_PAGE_ACCESSED)));
|
|
|
|
memset(kasan_early_shadow_page, KASAN_SHADOW_INIT, PAGE_SIZE);
|
|
init_task.kasan_depth = 0;
|
|
}
|