2019-05-29 14:18:00 +00:00
|
|
|
// SPDX-License-Identifier: GPL-2.0-only
|
2017-07-11 01:00:26 +00:00
|
|
|
/*
|
|
|
|
* Copyright (C) 2012 Regents of the University of California
|
2019-06-28 20:36:21 +00:00
|
|
|
* Copyright (C) 2019 Western Digital Corporation or its affiliates.
|
2021-04-19 00:55:38 +00:00
|
|
|
* Copyright (C) 2020 FORTH-ICS/CARV
|
|
|
|
* Nick Kossifidis <mick@ics.forth.gr>
|
2017-07-11 01:00:26 +00:00
|
|
|
*/
|
|
|
|
|
|
|
|
#include <linux/init.h>
|
|
|
|
#include <linux/mm.h>
|
|
|
|
#include <linux/memblock.h>
|
2018-10-30 22:09:49 +00:00
|
|
|
#include <linux/initrd.h>
|
2017-07-11 01:00:26 +00:00
|
|
|
#include <linux/swap.h>
|
2018-01-16 08:37:50 +00:00
|
|
|
#include <linux/sizes.h>
|
2019-02-21 05:55:49 +00:00
|
|
|
#include <linux/of_fdt.h>
|
2021-04-19 00:55:39 +00:00
|
|
|
#include <linux/of_reserved_mem.h>
|
riscv: Fix memblock reservation for device tree blob
This fixes an error with how the FDT blob is reserved in memblock.
An incorrect physical address calculation exposed the FDT header to
unintended corruption, which typically manifested with of_fdt_raw_init()
faulting during late boot after fdt_totalsize() returned a wrong value.
Systems with smaller physical memory sizes more frequently trigger this
issue, as the kernel is more likely to allocate from the DMA32 zone
where bbl places the DTB after the kernel image.
Commit 671f9a3e2e24 ("RISC-V: Setup initial page tables in two stages")
changed the mapping of the DTB to reside in the fixmap area.
Consequently, early_init_fdt_reserve_self() cannot be used anymore in
setup_bootmem() since it relies on __pa() to derive a physical address,
which does not work with dtb_early_va that is no longer a valid kernel
logical address.
The reserved[0x1] region shows the effect of the pointer underflow
resulting from the __pa(initial_boot_params) offset subtraction:
[ 0.000000] MEMBLOCK configuration:
[ 0.000000] memory size = 0x000000001fe00000 reserved size = 0x0000000000a2e514
[ 0.000000] memory.cnt = 0x1
[ 0.000000] memory[0x0] [0x0000000080200000-0x000000009fffffff], 0x000000001fe00000 bytes flags: 0x0
[ 0.000000] reserved.cnt = 0x2
[ 0.000000] reserved[0x0] [0x0000000080200000-0x0000000080c2dfeb], 0x0000000000a2dfec bytes flags: 0x0
[ 0.000000] reserved[0x1] [0xfffffff080100000-0xfffffff080100527], 0x0000000000000528 bytes flags: 0x0
With the fix applied:
[ 0.000000] MEMBLOCK configuration:
[ 0.000000] memory size = 0x000000001fe00000 reserved size = 0x0000000000a2e514
[ 0.000000] memory.cnt = 0x1
[ 0.000000] memory[0x0] [0x0000000080200000-0x000000009fffffff], 0x000000001fe00000 bytes flags: 0x0
[ 0.000000] reserved.cnt = 0x2
[ 0.000000] reserved[0x0] [0x0000000080200000-0x0000000080c2dfeb], 0x0000000000a2dfec bytes flags: 0x0
[ 0.000000] reserved[0x1] [0x0000000080e00000-0x0000000080e00527], 0x0000000000000528 bytes flags: 0x0
Fixes: 671f9a3e2e24 ("RISC-V: Setup initial page tables in two stages")
Signed-off-by: Albert Ou <aou@eecs.berkeley.edu>
Tested-by: Bin Meng <bmeng.cn@gmail.com>
Reviewed-by: Anup Patel <anup@brainfault.org>
Signed-off-by: Paul Walmsley <paul.walmsley@sifive.com>
2019-09-27 23:14:18 +00:00
|
|
|
#include <linux/libfdt.h>
|
2020-03-09 16:55:41 +00:00
|
|
|
#include <linux/set_memory.h>
|
2020-10-31 06:01:12 +00:00
|
|
|
#include <linux/dma-map-ops.h>
|
2021-04-19 00:55:38 +00:00
|
|
|
#include <linux/crash_dump.h>
|
2017-07-11 01:00:26 +00:00
|
|
|
|
2019-01-07 15:27:01 +00:00
|
|
|
#include <asm/fixmap.h>
|
2017-07-11 01:00:26 +00:00
|
|
|
#include <asm/tlbflush.h>
|
|
|
|
#include <asm/sections.h>
|
2020-04-14 04:43:24 +00:00
|
|
|
#include <asm/soc.h>
|
2017-07-11 01:00:26 +00:00
|
|
|
#include <asm/io.h>
|
2020-06-03 23:03:55 +00:00
|
|
|
#include <asm/ptdump.h>
|
2020-11-19 00:38:29 +00:00
|
|
|
#include <asm/numa.h>
|
2017-07-11 01:00:26 +00:00
|
|
|
|
2019-10-17 22:00:17 +00:00
|
|
|
#include "../kernel/head.h"
|
|
|
|
|
2021-04-11 16:41:44 +00:00
|
|
|
unsigned long kernel_virt_addr = KERNEL_LINK_ADDR;
|
|
|
|
EXPORT_SYMBOL(kernel_virt_addr);
|
|
|
|
|
2019-03-26 08:03:47 +00:00
|
|
|
unsigned long empty_zero_page[PAGE_SIZE / sizeof(unsigned long)]
|
|
|
|
__page_aligned_bss;
|
|
|
|
EXPORT_SYMBOL(empty_zero_page);
|
|
|
|
|
2019-06-07 06:01:29 +00:00
|
|
|
extern char _start[];
|
2020-09-17 22:37:10 +00:00
|
|
|
#define DTB_EARLY_BASE_VA PGDIR_SIZE
|
|
|
|
void *dtb_early_va __initdata;
|
|
|
|
uintptr_t dtb_early_pa __initdata;
|
2019-06-07 06:01:29 +00:00
|
|
|
|
2020-09-17 22:37:12 +00:00
|
|
|
struct pt_alloc_ops {
|
|
|
|
pte_t *(*get_pte_virt)(phys_addr_t pa);
|
|
|
|
phys_addr_t (*alloc_pte)(uintptr_t va);
|
|
|
|
#ifndef __PAGETABLE_PMD_FOLDED
|
|
|
|
pmd_t *(*get_pmd_virt)(phys_addr_t pa);
|
|
|
|
phys_addr_t (*alloc_pmd)(uintptr_t va);
|
|
|
|
#endif
|
|
|
|
};
|
2019-06-07 06:01:29 +00:00
|
|
|
|
2020-10-31 06:01:12 +00:00
|
|
|
static phys_addr_t dma32_phys_limit __ro_after_init;
|
|
|
|
|
2017-07-11 01:00:26 +00:00
|
|
|
static void __init zone_sizes_init(void)
|
|
|
|
{
|
2018-01-16 08:37:50 +00:00
|
|
|
unsigned long max_zone_pfns[MAX_NR_ZONES] = { 0, };
|
2017-07-11 01:00:26 +00:00
|
|
|
|
2018-06-25 08:49:37 +00:00
|
|
|
#ifdef CONFIG_ZONE_DMA32
|
2020-10-31 06:01:12 +00:00
|
|
|
max_zone_pfns[ZONE_DMA32] = PFN_DOWN(dma32_phys_limit);
|
2018-06-25 08:49:37 +00:00
|
|
|
#endif
|
2018-01-16 08:37:50 +00:00
|
|
|
max_zone_pfns[ZONE_NORMAL] = max_low_pfn;
|
|
|
|
|
2020-06-03 22:57:10 +00:00
|
|
|
free_area_init(max_zone_pfns);
|
2017-07-11 01:00:26 +00:00
|
|
|
}
|
|
|
|
|
2021-03-29 18:22:21 +00:00
|
|
|
static void __init setup_zero_page(void)
|
2017-07-11 01:00:26 +00:00
|
|
|
{
|
|
|
|
memset((void *)empty_zero_page, 0, PAGE_SIZE);
|
|
|
|
}
|
|
|
|
|
2020-05-14 11:53:35 +00:00
|
|
|
#if defined(CONFIG_MMU) && defined(CONFIG_DEBUG_VM)
|
2019-11-18 05:58:34 +00:00
|
|
|
static inline void print_mlk(char *name, unsigned long b, unsigned long t)
|
|
|
|
{
|
|
|
|
pr_notice("%12s : 0x%08lx - 0x%08lx (%4ld kB)\n", name, b, t,
|
|
|
|
(((t) - (b)) >> 10));
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void print_mlm(char *name, unsigned long b, unsigned long t)
|
|
|
|
{
|
|
|
|
pr_notice("%12s : 0x%08lx - 0x%08lx (%4ld MB)\n", name, b, t,
|
|
|
|
(((t) - (b)) >> 20));
|
|
|
|
}
|
|
|
|
|
2021-03-29 18:22:21 +00:00
|
|
|
static void __init print_vm_layout(void)
|
2019-11-18 05:58:34 +00:00
|
|
|
{
|
|
|
|
pr_notice("Virtual kernel memory layout:\n");
|
|
|
|
print_mlk("fixmap", (unsigned long)FIXADDR_START,
|
|
|
|
(unsigned long)FIXADDR_TOP);
|
|
|
|
print_mlm("pci io", (unsigned long)PCI_IO_START,
|
|
|
|
(unsigned long)PCI_IO_END);
|
|
|
|
print_mlm("vmemmap", (unsigned long)VMEMMAP_START,
|
|
|
|
(unsigned long)VMEMMAP_END);
|
|
|
|
print_mlm("vmalloc", (unsigned long)VMALLOC_START,
|
|
|
|
(unsigned long)VMALLOC_END);
|
|
|
|
print_mlm("lowmem", (unsigned long)PAGE_OFFSET,
|
|
|
|
(unsigned long)high_memory);
|
2021-04-11 16:41:44 +00:00
|
|
|
#ifdef CONFIG_64BIT
|
|
|
|
print_mlm("kernel", (unsigned long)KERNEL_LINK_ADDR,
|
|
|
|
(unsigned long)ADDRESS_SPACE_END);
|
|
|
|
#endif
|
2019-11-18 05:58:34 +00:00
|
|
|
}
|
|
|
|
#else
|
|
|
|
static void print_vm_layout(void) { }
|
|
|
|
#endif /* CONFIG_DEBUG_VM */
|
|
|
|
|
2017-07-11 01:00:26 +00:00
|
|
|
void __init mem_init(void)
|
|
|
|
{
|
|
|
|
#ifdef CONFIG_FLATMEM
|
|
|
|
BUG_ON(!mem_map);
|
|
|
|
#endif /* CONFIG_FLATMEM */
|
|
|
|
|
|
|
|
high_memory = (void *)(__va(PFN_PHYS(max_low_pfn)));
|
2018-10-30 22:09:30 +00:00
|
|
|
memblock_free_all();
|
2017-07-11 01:00:26 +00:00
|
|
|
|
|
|
|
mem_init_print_info(NULL);
|
2019-11-18 05:58:34 +00:00
|
|
|
print_vm_layout();
|
2017-07-11 01:00:26 +00:00
|
|
|
}
|
|
|
|
|
2019-02-21 05:55:49 +00:00
|
|
|
void __init setup_bootmem(void)
|
|
|
|
{
|
2020-01-02 03:12:40 +00:00
|
|
|
phys_addr_t vmlinux_end = __pa_symbol(&_end);
|
|
|
|
phys_addr_t vmlinux_start = __pa_symbol(&_start);
|
2021-02-09 01:01:51 +00:00
|
|
|
phys_addr_t dram_end = memblock_end_of_DRAM();
|
2021-01-11 23:45:02 +00:00
|
|
|
phys_addr_t max_mapped_addr = __pa(~(ulong)0);
|
2019-02-21 05:55:49 +00:00
|
|
|
|
2021-02-09 01:01:51 +00:00
|
|
|
/* The maximal physical memory size is -PAGE_OFFSET. */
|
2020-12-19 00:13:56 +00:00
|
|
|
memblock_enforce_memory_limit(-PAGE_OFFSET);
|
2019-02-21 05:55:49 +00:00
|
|
|
|
2021-04-11 16:41:44 +00:00
|
|
|
/*
|
|
|
|
* Reserve from the start of the kernel to the end of the kernel
|
|
|
|
* and make sure we align the reservation on PMD_SIZE since we will
|
|
|
|
* map the kernel in the linear mapping as read-only: we do not want
|
|
|
|
* any allocation to happen between _end and the next pmd aligned page.
|
|
|
|
*/
|
|
|
|
memblock_reserve(vmlinux_start, (vmlinux_end - vmlinux_start + PMD_SIZE - 1) & PMD_MASK);
|
2019-06-07 06:01:29 +00:00
|
|
|
|
2021-01-11 23:45:02 +00:00
|
|
|
/*
|
|
|
|
* memblock allocator is not aware of the fact that last 4K bytes of
|
|
|
|
* the addressable memory can not be mapped because of IS_ERR_VALUE
|
|
|
|
* macro. Make sure that last 4k bytes are not usable by memblock
|
|
|
|
* if end of dram is equal to maximum addressable memory.
|
|
|
|
*/
|
|
|
|
if (max_mapped_addr == (dram_end - 1))
|
|
|
|
memblock_set_current_limit(max_mapped_addr - 4096);
|
|
|
|
|
2021-02-25 06:54:17 +00:00
|
|
|
min_low_pfn = PFN_UP(memblock_start_of_DRAM());
|
|
|
|
max_low_pfn = max_pfn = PFN_DOWN(dram_end);
|
|
|
|
|
2020-10-31 06:01:12 +00:00
|
|
|
dma32_phys_limit = min(4UL * SZ_1G, (unsigned long)PFN_PHYS(max_low_pfn));
|
2021-01-21 06:31:17 +00:00
|
|
|
set_max_mapnr(max_low_pfn - ARCH_PFN_OFFSET);
|
2019-02-21 05:55:49 +00:00
|
|
|
|
2021-01-15 05:46:06 +00:00
|
|
|
reserve_initrd_mem();
|
riscv: Fix memblock reservation for device tree blob
This fixes an error with how the FDT blob is reserved in memblock.
An incorrect physical address calculation exposed the FDT header to
unintended corruption, which typically manifested with of_fdt_raw_init()
faulting during late boot after fdt_totalsize() returned a wrong value.
Systems with smaller physical memory sizes more frequently trigger this
issue, as the kernel is more likely to allocate from the DMA32 zone
where bbl places the DTB after the kernel image.
Commit 671f9a3e2e24 ("RISC-V: Setup initial page tables in two stages")
changed the mapping of the DTB to reside in the fixmap area.
Consequently, early_init_fdt_reserve_self() cannot be used anymore in
setup_bootmem() since it relies on __pa() to derive a physical address,
which does not work with dtb_early_va that is no longer a valid kernel
logical address.
The reserved[0x1] region shows the effect of the pointer underflow
resulting from the __pa(initial_boot_params) offset subtraction:
[ 0.000000] MEMBLOCK configuration:
[ 0.000000] memory size = 0x000000001fe00000 reserved size = 0x0000000000a2e514
[ 0.000000] memory.cnt = 0x1
[ 0.000000] memory[0x0] [0x0000000080200000-0x000000009fffffff], 0x000000001fe00000 bytes flags: 0x0
[ 0.000000] reserved.cnt = 0x2
[ 0.000000] reserved[0x0] [0x0000000080200000-0x0000000080c2dfeb], 0x0000000000a2dfec bytes flags: 0x0
[ 0.000000] reserved[0x1] [0xfffffff080100000-0xfffffff080100527], 0x0000000000000528 bytes flags: 0x0
With the fix applied:
[ 0.000000] MEMBLOCK configuration:
[ 0.000000] memory size = 0x000000001fe00000 reserved size = 0x0000000000a2e514
[ 0.000000] memory.cnt = 0x1
[ 0.000000] memory[0x0] [0x0000000080200000-0x000000009fffffff], 0x000000001fe00000 bytes flags: 0x0
[ 0.000000] reserved.cnt = 0x2
[ 0.000000] reserved[0x0] [0x0000000080200000-0x0000000080c2dfeb], 0x0000000000a2dfec bytes flags: 0x0
[ 0.000000] reserved[0x1] [0x0000000080e00000-0x0000000080e00527], 0x0000000000000528 bytes flags: 0x0
Fixes: 671f9a3e2e24 ("RISC-V: Setup initial page tables in two stages")
Signed-off-by: Albert Ou <aou@eecs.berkeley.edu>
Tested-by: Bin Meng <bmeng.cn@gmail.com>
Reviewed-by: Anup Patel <anup@brainfault.org>
Signed-off-by: Paul Walmsley <paul.walmsley@sifive.com>
2019-09-27 23:14:18 +00:00
|
|
|
/*
|
2021-01-15 23:49:48 +00:00
|
|
|
* If DTB is built in, no need to reserve its memblock.
|
|
|
|
* Otherwise, do reserve it but avoid using
|
|
|
|
* early_init_fdt_reserve_self() since __pa() does
|
riscv: Fix memblock reservation for device tree blob
This fixes an error with how the FDT blob is reserved in memblock.
An incorrect physical address calculation exposed the FDT header to
unintended corruption, which typically manifested with of_fdt_raw_init()
faulting during late boot after fdt_totalsize() returned a wrong value.
Systems with smaller physical memory sizes more frequently trigger this
issue, as the kernel is more likely to allocate from the DMA32 zone
where bbl places the DTB after the kernel image.
Commit 671f9a3e2e24 ("RISC-V: Setup initial page tables in two stages")
changed the mapping of the DTB to reside in the fixmap area.
Consequently, early_init_fdt_reserve_self() cannot be used anymore in
setup_bootmem() since it relies on __pa() to derive a physical address,
which does not work with dtb_early_va that is no longer a valid kernel
logical address.
The reserved[0x1] region shows the effect of the pointer underflow
resulting from the __pa(initial_boot_params) offset subtraction:
[ 0.000000] MEMBLOCK configuration:
[ 0.000000] memory size = 0x000000001fe00000 reserved size = 0x0000000000a2e514
[ 0.000000] memory.cnt = 0x1
[ 0.000000] memory[0x0] [0x0000000080200000-0x000000009fffffff], 0x000000001fe00000 bytes flags: 0x0
[ 0.000000] reserved.cnt = 0x2
[ 0.000000] reserved[0x0] [0x0000000080200000-0x0000000080c2dfeb], 0x0000000000a2dfec bytes flags: 0x0
[ 0.000000] reserved[0x1] [0xfffffff080100000-0xfffffff080100527], 0x0000000000000528 bytes flags: 0x0
With the fix applied:
[ 0.000000] MEMBLOCK configuration:
[ 0.000000] memory size = 0x000000001fe00000 reserved size = 0x0000000000a2e514
[ 0.000000] memory.cnt = 0x1
[ 0.000000] memory[0x0] [0x0000000080200000-0x000000009fffffff], 0x000000001fe00000 bytes flags: 0x0
[ 0.000000] reserved.cnt = 0x2
[ 0.000000] reserved[0x0] [0x0000000080200000-0x0000000080c2dfeb], 0x0000000000a2dfec bytes flags: 0x0
[ 0.000000] reserved[0x1] [0x0000000080e00000-0x0000000080e00527], 0x0000000000000528 bytes flags: 0x0
Fixes: 671f9a3e2e24 ("RISC-V: Setup initial page tables in two stages")
Signed-off-by: Albert Ou <aou@eecs.berkeley.edu>
Tested-by: Bin Meng <bmeng.cn@gmail.com>
Reviewed-by: Anup Patel <anup@brainfault.org>
Signed-off-by: Paul Walmsley <paul.walmsley@sifive.com>
2019-09-27 23:14:18 +00:00
|
|
|
* not work for DTB pointers that are fixmap addresses
|
|
|
|
*/
|
2021-01-15 23:49:48 +00:00
|
|
|
if (!IS_ENABLED(CONFIG_BUILTIN_DTB))
|
|
|
|
memblock_reserve(dtb_early_pa, fdt_totalsize(dtb_early_va));
|
riscv: Fix memblock reservation for device tree blob
This fixes an error with how the FDT blob is reserved in memblock.
An incorrect physical address calculation exposed the FDT header to
unintended corruption, which typically manifested with of_fdt_raw_init()
faulting during late boot after fdt_totalsize() returned a wrong value.
Systems with smaller physical memory sizes more frequently trigger this
issue, as the kernel is more likely to allocate from the DMA32 zone
where bbl places the DTB after the kernel image.
Commit 671f9a3e2e24 ("RISC-V: Setup initial page tables in two stages")
changed the mapping of the DTB to reside in the fixmap area.
Consequently, early_init_fdt_reserve_self() cannot be used anymore in
setup_bootmem() since it relies on __pa() to derive a physical address,
which does not work with dtb_early_va that is no longer a valid kernel
logical address.
The reserved[0x1] region shows the effect of the pointer underflow
resulting from the __pa(initial_boot_params) offset subtraction:
[ 0.000000] MEMBLOCK configuration:
[ 0.000000] memory size = 0x000000001fe00000 reserved size = 0x0000000000a2e514
[ 0.000000] memory.cnt = 0x1
[ 0.000000] memory[0x0] [0x0000000080200000-0x000000009fffffff], 0x000000001fe00000 bytes flags: 0x0
[ 0.000000] reserved.cnt = 0x2
[ 0.000000] reserved[0x0] [0x0000000080200000-0x0000000080c2dfeb], 0x0000000000a2dfec bytes flags: 0x0
[ 0.000000] reserved[0x1] [0xfffffff080100000-0xfffffff080100527], 0x0000000000000528 bytes flags: 0x0
With the fix applied:
[ 0.000000] MEMBLOCK configuration:
[ 0.000000] memory size = 0x000000001fe00000 reserved size = 0x0000000000a2e514
[ 0.000000] memory.cnt = 0x1
[ 0.000000] memory[0x0] [0x0000000080200000-0x000000009fffffff], 0x000000001fe00000 bytes flags: 0x0
[ 0.000000] reserved.cnt = 0x2
[ 0.000000] reserved[0x0] [0x0000000080200000-0x0000000080c2dfeb], 0x0000000000a2dfec bytes flags: 0x0
[ 0.000000] reserved[0x1] [0x0000000080e00000-0x0000000080e00527], 0x0000000000000528 bytes flags: 0x0
Fixes: 671f9a3e2e24 ("RISC-V: Setup initial page tables in two stages")
Signed-off-by: Albert Ou <aou@eecs.berkeley.edu>
Tested-by: Bin Meng <bmeng.cn@gmail.com>
Reviewed-by: Anup Patel <anup@brainfault.org>
Signed-off-by: Paul Walmsley <paul.walmsley@sifive.com>
2019-09-27 23:14:18 +00:00
|
|
|
|
2019-02-21 05:55:49 +00:00
|
|
|
early_init_fdt_scan_reserved_mem();
|
2020-10-31 06:01:12 +00:00
|
|
|
dma_contiguous_reserve(dma32_phys_limit);
|
2019-02-21 05:55:49 +00:00
|
|
|
memblock_allow_resize();
|
|
|
|
}
|
2019-02-13 11:08:36 +00:00
|
|
|
|
2019-10-28 12:10:41 +00:00
|
|
|
#ifdef CONFIG_MMU
|
2021-03-29 18:22:51 +00:00
|
|
|
static struct pt_alloc_ops pt_ops __ro_after_init;
|
2020-09-17 22:37:12 +00:00
|
|
|
|
2021-04-11 16:41:44 +00:00
|
|
|
/* Offset between linear mapping virtual address and kernel load address */
|
2021-03-29 18:22:51 +00:00
|
|
|
unsigned long va_pa_offset __ro_after_init;
|
2019-03-26 08:03:47 +00:00
|
|
|
EXPORT_SYMBOL(va_pa_offset);
|
2021-04-11 16:41:44 +00:00
|
|
|
#ifdef CONFIG_64BIT
|
|
|
|
/* Offset between kernel mapping virtual address and kernel load address */
|
|
|
|
unsigned long va_kernel_pa_offset;
|
|
|
|
EXPORT_SYMBOL(va_kernel_pa_offset);
|
|
|
|
#endif
|
2021-03-29 18:22:51 +00:00
|
|
|
unsigned long pfn_base __ro_after_init;
|
2019-03-26 08:03:47 +00:00
|
|
|
EXPORT_SYMBOL(pfn_base);
|
|
|
|
|
2019-02-13 11:08:36 +00:00
|
|
|
pgd_t swapper_pg_dir[PTRS_PER_PGD] __page_aligned_bss;
|
2019-06-28 20:36:21 +00:00
|
|
|
pgd_t trampoline_pg_dir[PTRS_PER_PGD] __page_aligned_bss;
|
|
|
|
pte_t fixmap_pte[PTRS_PER_PTE] __page_aligned_bss;
|
2019-02-13 11:08:36 +00:00
|
|
|
|
2019-06-28 20:36:21 +00:00
|
|
|
pgd_t early_pg_dir[PTRS_PER_PGD] __initdata __aligned(PAGE_SIZE);
|
2019-01-07 15:27:01 +00:00
|
|
|
|
|
|
|
void __set_fixmap(enum fixed_addresses idx, phys_addr_t phys, pgprot_t prot)
|
|
|
|
{
|
|
|
|
unsigned long addr = __fix_to_virt(idx);
|
|
|
|
pte_t *ptep;
|
|
|
|
|
|
|
|
BUG_ON(idx <= FIX_HOLE || idx >= __end_of_fixed_addresses);
|
|
|
|
|
|
|
|
ptep = &fixmap_pte[pte_index(addr)];
|
|
|
|
|
2020-08-04 03:02:05 +00:00
|
|
|
if (pgprot_val(prot))
|
2019-01-07 15:27:01 +00:00
|
|
|
set_pte(ptep, pfn_pte(phys >> PAGE_SHIFT, prot));
|
2020-08-04 03:02:05 +00:00
|
|
|
else
|
2019-01-07 15:27:01 +00:00
|
|
|
pte_clear(&init_mm, addr, ptep);
|
2020-08-04 03:02:05 +00:00
|
|
|
local_flush_tlb_page(addr);
|
2019-01-07 15:27:01 +00:00
|
|
|
}
|
|
|
|
|
2020-09-17 22:37:12 +00:00
|
|
|
static inline pte_t *__init get_pte_virt_early(phys_addr_t pa)
|
2019-06-28 20:36:21 +00:00
|
|
|
{
|
2020-09-17 22:37:12 +00:00
|
|
|
return (pte_t *)((uintptr_t)pa);
|
2019-06-28 20:36:21 +00:00
|
|
|
}
|
|
|
|
|
2020-09-17 22:37:12 +00:00
|
|
|
static inline pte_t *__init get_pte_virt_fixmap(phys_addr_t pa)
|
|
|
|
{
|
|
|
|
clear_fixmap(FIX_PTE);
|
|
|
|
return (pte_t *)set_fixmap_offset(FIX_PTE, pa);
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline pte_t *get_pte_virt_late(phys_addr_t pa)
|
|
|
|
{
|
|
|
|
return (pte_t *) __va(pa);
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline phys_addr_t __init alloc_pte_early(uintptr_t va)
|
2019-06-28 20:36:21 +00:00
|
|
|
{
|
|
|
|
/*
|
|
|
|
* We only create PMD or PGD early mappings so we
|
|
|
|
* should never reach here with MMU disabled.
|
|
|
|
*/
|
2020-09-17 22:37:12 +00:00
|
|
|
BUG();
|
|
|
|
}
|
2019-06-28 20:36:21 +00:00
|
|
|
|
2020-09-17 22:37:12 +00:00
|
|
|
static inline phys_addr_t __init alloc_pte_fixmap(uintptr_t va)
|
|
|
|
{
|
2019-06-28 20:36:21 +00:00
|
|
|
return memblock_phys_alloc(PAGE_SIZE, PAGE_SIZE);
|
|
|
|
}
|
|
|
|
|
2020-09-17 22:37:12 +00:00
|
|
|
static phys_addr_t alloc_pte_late(uintptr_t va)
|
|
|
|
{
|
|
|
|
unsigned long vaddr;
|
|
|
|
|
|
|
|
vaddr = __get_free_page(GFP_KERNEL);
|
2021-03-30 13:56:26 +00:00
|
|
|
BUG_ON(!vaddr || !pgtable_pte_page_ctor(virt_to_page(vaddr)));
|
|
|
|
|
2020-09-17 22:37:12 +00:00
|
|
|
return __pa(vaddr);
|
|
|
|
}
|
|
|
|
|
2019-06-28 20:36:21 +00:00
|
|
|
static void __init create_pte_mapping(pte_t *ptep,
|
|
|
|
uintptr_t va, phys_addr_t pa,
|
|
|
|
phys_addr_t sz, pgprot_t prot)
|
|
|
|
{
|
2020-06-09 04:33:10 +00:00
|
|
|
uintptr_t pte_idx = pte_index(va);
|
2019-06-28 20:36:21 +00:00
|
|
|
|
|
|
|
BUG_ON(sz != PAGE_SIZE);
|
|
|
|
|
2020-06-09 04:33:10 +00:00
|
|
|
if (pte_none(ptep[pte_idx]))
|
|
|
|
ptep[pte_idx] = pfn_pte(PFN_DOWN(pa), prot);
|
2019-06-28 20:36:21 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
#ifndef __PAGETABLE_PMD_FOLDED
|
|
|
|
|
|
|
|
pmd_t trampoline_pmd[PTRS_PER_PMD] __page_aligned_bss;
|
|
|
|
pmd_t fixmap_pmd[PTRS_PER_PMD] __page_aligned_bss;
|
2021-02-21 14:22:33 +00:00
|
|
|
pmd_t early_pmd[PTRS_PER_PMD] __initdata __aligned(PAGE_SIZE);
|
2020-11-04 06:37:13 +00:00
|
|
|
pmd_t early_dtb_pmd[PTRS_PER_PMD] __initdata __aligned(PAGE_SIZE);
|
2019-06-28 20:36:21 +00:00
|
|
|
|
2020-09-17 22:37:12 +00:00
|
|
|
static pmd_t *__init get_pmd_virt_early(phys_addr_t pa)
|
2019-06-28 20:36:21 +00:00
|
|
|
{
|
2020-09-17 22:37:12 +00:00
|
|
|
/* Before MMU is enabled */
|
|
|
|
return (pmd_t *)((uintptr_t)pa);
|
2019-06-28 20:36:21 +00:00
|
|
|
}
|
|
|
|
|
2020-09-17 22:37:12 +00:00
|
|
|
static pmd_t *__init get_pmd_virt_fixmap(phys_addr_t pa)
|
2019-06-28 20:36:21 +00:00
|
|
|
{
|
2020-09-17 22:37:12 +00:00
|
|
|
clear_fixmap(FIX_PMD);
|
|
|
|
return (pmd_t *)set_fixmap_offset(FIX_PMD, pa);
|
|
|
|
}
|
2019-06-28 20:36:21 +00:00
|
|
|
|
2020-09-17 22:37:12 +00:00
|
|
|
static pmd_t *get_pmd_virt_late(phys_addr_t pa)
|
|
|
|
{
|
|
|
|
return (pmd_t *) __va(pa);
|
|
|
|
}
|
2019-06-28 20:36:21 +00:00
|
|
|
|
2020-09-17 22:37:12 +00:00
|
|
|
static phys_addr_t __init alloc_pmd_early(uintptr_t va)
|
|
|
|
{
|
2021-04-11 16:41:44 +00:00
|
|
|
BUG_ON((va - kernel_virt_addr) >> PGDIR_SHIFT);
|
2019-06-28 20:36:21 +00:00
|
|
|
|
2021-02-21 14:22:33 +00:00
|
|
|
return (uintptr_t)early_pmd;
|
2019-06-28 20:36:21 +00:00
|
|
|
}
|
|
|
|
|
2020-09-17 22:37:12 +00:00
|
|
|
static phys_addr_t __init alloc_pmd_fixmap(uintptr_t va)
|
|
|
|
{
|
|
|
|
return memblock_phys_alloc(PAGE_SIZE, PAGE_SIZE);
|
|
|
|
}
|
|
|
|
|
|
|
|
static phys_addr_t alloc_pmd_late(uintptr_t va)
|
|
|
|
{
|
|
|
|
unsigned long vaddr;
|
|
|
|
|
|
|
|
vaddr = __get_free_page(GFP_KERNEL);
|
|
|
|
BUG_ON(!vaddr);
|
|
|
|
return __pa(vaddr);
|
|
|
|
}
|
|
|
|
|
2019-06-28 20:36:21 +00:00
|
|
|
static void __init create_pmd_mapping(pmd_t *pmdp,
|
|
|
|
uintptr_t va, phys_addr_t pa,
|
|
|
|
phys_addr_t sz, pgprot_t prot)
|
|
|
|
{
|
|
|
|
pte_t *ptep;
|
|
|
|
phys_addr_t pte_phys;
|
2020-06-09 04:33:10 +00:00
|
|
|
uintptr_t pmd_idx = pmd_index(va);
|
2019-06-28 20:36:21 +00:00
|
|
|
|
|
|
|
if (sz == PMD_SIZE) {
|
2020-06-09 04:33:10 +00:00
|
|
|
if (pmd_none(pmdp[pmd_idx]))
|
|
|
|
pmdp[pmd_idx] = pfn_pmd(PFN_DOWN(pa), prot);
|
2019-06-28 20:36:21 +00:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2020-06-09 04:33:10 +00:00
|
|
|
if (pmd_none(pmdp[pmd_idx])) {
|
2020-09-17 22:37:12 +00:00
|
|
|
pte_phys = pt_ops.alloc_pte(va);
|
2020-06-09 04:33:10 +00:00
|
|
|
pmdp[pmd_idx] = pfn_pmd(PFN_DOWN(pte_phys), PAGE_TABLE);
|
2020-09-17 22:37:12 +00:00
|
|
|
ptep = pt_ops.get_pte_virt(pte_phys);
|
2019-06-28 20:36:21 +00:00
|
|
|
memset(ptep, 0, PAGE_SIZE);
|
|
|
|
} else {
|
2020-06-09 04:33:10 +00:00
|
|
|
pte_phys = PFN_PHYS(_pmd_pfn(pmdp[pmd_idx]));
|
2020-09-17 22:37:12 +00:00
|
|
|
ptep = pt_ops.get_pte_virt(pte_phys);
|
2019-06-28 20:36:21 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
create_pte_mapping(ptep, va, pa, sz, prot);
|
|
|
|
}
|
|
|
|
|
|
|
|
#define pgd_next_t pmd_t
|
2020-09-17 22:37:12 +00:00
|
|
|
#define alloc_pgd_next(__va) pt_ops.alloc_pmd(__va)
|
|
|
|
#define get_pgd_next_virt(__pa) pt_ops.get_pmd_virt(__pa)
|
2019-06-28 20:36:21 +00:00
|
|
|
#define create_pgd_next_mapping(__nextp, __va, __pa, __sz, __prot) \
|
|
|
|
create_pmd_mapping(__nextp, __va, __pa, __sz, __prot)
|
|
|
|
#define fixmap_pgd_next fixmap_pmd
|
|
|
|
#else
|
|
|
|
#define pgd_next_t pte_t
|
2020-09-17 22:37:12 +00:00
|
|
|
#define alloc_pgd_next(__va) pt_ops.alloc_pte(__va)
|
|
|
|
#define get_pgd_next_virt(__pa) pt_ops.get_pte_virt(__pa)
|
2019-06-28 20:36:21 +00:00
|
|
|
#define create_pgd_next_mapping(__nextp, __va, __pa, __sz, __prot) \
|
|
|
|
create_pte_mapping(__nextp, __va, __pa, __sz, __prot)
|
|
|
|
#define fixmap_pgd_next fixmap_pte
|
|
|
|
#endif
|
|
|
|
|
2020-09-17 22:37:15 +00:00
|
|
|
void __init create_pgd_mapping(pgd_t *pgdp,
|
2019-06-28 20:36:21 +00:00
|
|
|
uintptr_t va, phys_addr_t pa,
|
|
|
|
phys_addr_t sz, pgprot_t prot)
|
|
|
|
{
|
|
|
|
pgd_next_t *nextp;
|
|
|
|
phys_addr_t next_phys;
|
2020-06-09 04:33:10 +00:00
|
|
|
uintptr_t pgd_idx = pgd_index(va);
|
2019-06-28 20:36:21 +00:00
|
|
|
|
|
|
|
if (sz == PGDIR_SIZE) {
|
2020-06-09 04:33:10 +00:00
|
|
|
if (pgd_val(pgdp[pgd_idx]) == 0)
|
|
|
|
pgdp[pgd_idx] = pfn_pgd(PFN_DOWN(pa), prot);
|
2019-06-28 20:36:21 +00:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2020-06-09 04:33:10 +00:00
|
|
|
if (pgd_val(pgdp[pgd_idx]) == 0) {
|
2019-06-28 20:36:21 +00:00
|
|
|
next_phys = alloc_pgd_next(va);
|
2020-06-09 04:33:10 +00:00
|
|
|
pgdp[pgd_idx] = pfn_pgd(PFN_DOWN(next_phys), PAGE_TABLE);
|
2019-06-28 20:36:21 +00:00
|
|
|
nextp = get_pgd_next_virt(next_phys);
|
|
|
|
memset(nextp, 0, PAGE_SIZE);
|
|
|
|
} else {
|
2020-06-09 04:33:10 +00:00
|
|
|
next_phys = PFN_PHYS(_pgd_pfn(pgdp[pgd_idx]));
|
2019-06-28 20:36:21 +00:00
|
|
|
nextp = get_pgd_next_virt(next_phys);
|
|
|
|
}
|
|
|
|
|
|
|
|
create_pgd_next_mapping(nextp, va, pa, sz, prot);
|
|
|
|
}
|
|
|
|
|
|
|
|
static uintptr_t __init best_map_size(phys_addr_t base, phys_addr_t size)
|
|
|
|
{
|
2019-11-08 09:00:40 +00:00
|
|
|
/* Upgrade to PMD_SIZE mappings whenever possible */
|
|
|
|
if ((base & (PMD_SIZE - 1)) || (size & (PMD_SIZE - 1)))
|
|
|
|
return PAGE_SIZE;
|
2019-06-28 20:36:21 +00:00
|
|
|
|
2019-11-08 09:00:40 +00:00
|
|
|
return PMD_SIZE;
|
2019-06-28 20:36:21 +00:00
|
|
|
}
|
|
|
|
|
2019-03-26 08:03:47 +00:00
|
|
|
/*
|
|
|
|
* setup_vm() is called from head.S with MMU-off.
|
|
|
|
*
|
|
|
|
* Following requirements should be honoured for setup_vm() to work
|
|
|
|
* correctly:
|
|
|
|
* 1) It should use PC-relative addressing for accessing kernel symbols.
|
|
|
|
* To achieve this we always use GCC cmodel=medany.
|
|
|
|
* 2) The compiler instrumentation for FTRACE will not work for setup_vm()
|
|
|
|
* so disable compiler instrumentation when FTRACE is enabled.
|
|
|
|
*
|
|
|
|
* Currently, the above requirements are honoured by using custom CFLAGS
|
|
|
|
* for init.o in mm/Makefile.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#ifndef __riscv_cmodel_medany
|
2019-10-17 21:45:58 +00:00
|
|
|
#error "setup_vm() is called from head.S before relocate so it should not use absolute addressing."
|
2019-03-26 08:03:47 +00:00
|
|
|
#endif
|
|
|
|
|
2021-04-11 16:41:44 +00:00
|
|
|
uintptr_t load_pa, load_sz;
|
|
|
|
|
|
|
|
static void __init create_kernel_page_table(pgd_t *pgdir, uintptr_t map_size)
|
|
|
|
{
|
|
|
|
uintptr_t va, end_va;
|
|
|
|
|
|
|
|
end_va = kernel_virt_addr + load_sz;
|
|
|
|
for (va = kernel_virt_addr; va < end_va; va += map_size)
|
|
|
|
create_pgd_mapping(pgdir, va,
|
|
|
|
load_pa + (va - kernel_virt_addr),
|
|
|
|
map_size, PAGE_KERNEL_EXEC);
|
|
|
|
}
|
|
|
|
|
2019-06-28 20:36:21 +00:00
|
|
|
asmlinkage void __init setup_vm(uintptr_t dtb_pa)
|
2019-02-13 11:08:36 +00:00
|
|
|
{
|
2021-04-11 16:41:44 +00:00
|
|
|
uintptr_t pa;
|
2021-02-21 14:22:33 +00:00
|
|
|
uintptr_t map_size;
|
2020-09-17 22:37:11 +00:00
|
|
|
#ifndef __PAGETABLE_PMD_FOLDED
|
|
|
|
pmd_t fix_bmap_spmd, fix_bmap_epmd;
|
|
|
|
#endif
|
2021-04-11 16:41:44 +00:00
|
|
|
load_pa = (uintptr_t)(&_start);
|
|
|
|
load_sz = (uintptr_t)(&_end) - load_pa;
|
2019-06-28 20:36:21 +00:00
|
|
|
|
|
|
|
va_pa_offset = PAGE_OFFSET - load_pa;
|
2021-04-11 16:41:44 +00:00
|
|
|
#ifdef CONFIG_64BIT
|
|
|
|
va_kernel_pa_offset = kernel_virt_addr - load_pa;
|
|
|
|
#endif
|
|
|
|
|
2019-06-28 20:36:21 +00:00
|
|
|
pfn_base = PFN_DOWN(load_pa);
|
2019-02-13 11:08:36 +00:00
|
|
|
|
2019-06-28 20:36:21 +00:00
|
|
|
/*
|
|
|
|
* Enforce boot alignment requirements of RV32 and
|
|
|
|
* RV64 by only allowing PMD or PGD mappings.
|
|
|
|
*/
|
2021-02-21 14:22:33 +00:00
|
|
|
map_size = PMD_SIZE;
|
2019-02-13 11:08:36 +00:00
|
|
|
|
|
|
|
/* Sanity check alignment and size */
|
|
|
|
BUG_ON((PAGE_OFFSET % PGDIR_SIZE) != 0);
|
2019-06-28 20:36:21 +00:00
|
|
|
BUG_ON((load_pa % map_size) != 0);
|
|
|
|
|
2020-09-17 22:37:12 +00:00
|
|
|
pt_ops.alloc_pte = alloc_pte_early;
|
|
|
|
pt_ops.get_pte_virt = get_pte_virt_early;
|
|
|
|
#ifndef __PAGETABLE_PMD_FOLDED
|
|
|
|
pt_ops.alloc_pmd = alloc_pmd_early;
|
|
|
|
pt_ops.get_pmd_virt = get_pmd_virt_early;
|
|
|
|
#endif
|
2019-06-28 20:36:21 +00:00
|
|
|
/* Setup early PGD for fixmap */
|
|
|
|
create_pgd_mapping(early_pg_dir, FIXADDR_START,
|
|
|
|
(uintptr_t)fixmap_pgd_next, PGDIR_SIZE, PAGE_TABLE);
|
2019-02-13 11:08:36 +00:00
|
|
|
|
|
|
|
#ifndef __PAGETABLE_PMD_FOLDED
|
2019-06-28 20:36:21 +00:00
|
|
|
/* Setup fixmap PMD */
|
|
|
|
create_pmd_mapping(fixmap_pmd, FIXADDR_START,
|
|
|
|
(uintptr_t)fixmap_pte, PMD_SIZE, PAGE_TABLE);
|
|
|
|
/* Setup trampoline PGD and PMD */
|
2021-04-11 16:41:44 +00:00
|
|
|
create_pgd_mapping(trampoline_pg_dir, kernel_virt_addr,
|
2019-06-28 20:36:21 +00:00
|
|
|
(uintptr_t)trampoline_pmd, PGDIR_SIZE, PAGE_TABLE);
|
2021-04-11 16:41:44 +00:00
|
|
|
create_pmd_mapping(trampoline_pmd, kernel_virt_addr,
|
2019-06-28 20:36:21 +00:00
|
|
|
load_pa, PMD_SIZE, PAGE_KERNEL_EXEC);
|
|
|
|
#else
|
|
|
|
/* Setup trampoline PGD */
|
2021-04-11 16:41:44 +00:00
|
|
|
create_pgd_mapping(trampoline_pg_dir, kernel_virt_addr,
|
2019-06-28 20:36:21 +00:00
|
|
|
load_pa, PGDIR_SIZE, PAGE_KERNEL_EXEC);
|
|
|
|
#endif
|
2019-02-13 11:08:36 +00:00
|
|
|
|
2019-06-28 20:36:21 +00:00
|
|
|
/*
|
2021-04-11 16:41:44 +00:00
|
|
|
* Setup early PGD covering entire kernel which will allow
|
2019-06-28 20:36:21 +00:00
|
|
|
* us to reach paging_init(). We map all memory banks later
|
|
|
|
* in setup_vm_final() below.
|
|
|
|
*/
|
2021-04-11 16:41:44 +00:00
|
|
|
create_kernel_page_table(early_pg_dir, map_size);
|
2019-06-28 20:36:21 +00:00
|
|
|
|
2020-11-04 06:37:13 +00:00
|
|
|
#ifndef __PAGETABLE_PMD_FOLDED
|
|
|
|
/* Setup early PMD for DTB */
|
|
|
|
create_pgd_mapping(early_pg_dir, DTB_EARLY_BASE_VA,
|
|
|
|
(uintptr_t)early_dtb_pmd, PGDIR_SIZE, PAGE_TABLE);
|
2021-01-15 23:49:48 +00:00
|
|
|
#ifndef CONFIG_BUILTIN_DTB
|
2020-11-04 06:37:13 +00:00
|
|
|
/* Create two consecutive PMD mappings for FDT early scan */
|
|
|
|
pa = dtb_pa & ~(PMD_SIZE - 1);
|
|
|
|
create_pmd_mapping(early_dtb_pmd, DTB_EARLY_BASE_VA,
|
|
|
|
pa, PMD_SIZE, PAGE_KERNEL);
|
|
|
|
create_pmd_mapping(early_dtb_pmd, DTB_EARLY_BASE_VA + PMD_SIZE,
|
|
|
|
pa + PMD_SIZE, PMD_SIZE, PAGE_KERNEL);
|
|
|
|
dtb_early_va = (void *)DTB_EARLY_BASE_VA + (dtb_pa & (PMD_SIZE - 1));
|
2021-01-15 23:49:48 +00:00
|
|
|
#else /* CONFIG_BUILTIN_DTB */
|
2021-04-11 16:41:44 +00:00
|
|
|
#ifdef CONFIG_64BIT
|
|
|
|
/*
|
|
|
|
* __va can't be used since it would return a linear mapping address
|
|
|
|
* whereas dtb_early_va will be used before setup_vm_final installs
|
|
|
|
* the linear mapping.
|
|
|
|
*/
|
|
|
|
dtb_early_va = kernel_mapping_pa_to_va(dtb_pa);
|
|
|
|
#else
|
2021-01-15 23:49:48 +00:00
|
|
|
dtb_early_va = __va(dtb_pa);
|
2021-04-11 16:41:44 +00:00
|
|
|
#endif /* CONFIG_64BIT */
|
2021-01-15 23:49:48 +00:00
|
|
|
#endif /* CONFIG_BUILTIN_DTB */
|
2020-11-04 06:37:13 +00:00
|
|
|
#else
|
2021-01-15 23:49:48 +00:00
|
|
|
#ifndef CONFIG_BUILTIN_DTB
|
2020-09-17 22:37:10 +00:00
|
|
|
/* Create two consecutive PGD mappings for FDT early scan */
|
|
|
|
pa = dtb_pa & ~(PGDIR_SIZE - 1);
|
|
|
|
create_pgd_mapping(early_pg_dir, DTB_EARLY_BASE_VA,
|
|
|
|
pa, PGDIR_SIZE, PAGE_KERNEL);
|
|
|
|
create_pgd_mapping(early_pg_dir, DTB_EARLY_BASE_VA + PGDIR_SIZE,
|
|
|
|
pa + PGDIR_SIZE, PGDIR_SIZE, PAGE_KERNEL);
|
|
|
|
dtb_early_va = (void *)DTB_EARLY_BASE_VA + (dtb_pa & (PGDIR_SIZE - 1));
|
2021-01-15 23:49:48 +00:00
|
|
|
#else /* CONFIG_BUILTIN_DTB */
|
2021-04-11 16:41:44 +00:00
|
|
|
#ifdef CONFIG_64BIT
|
|
|
|
dtb_early_va = kernel_mapping_pa_to_va(dtb_pa);
|
|
|
|
#else
|
2021-01-15 23:49:48 +00:00
|
|
|
dtb_early_va = __va(dtb_pa);
|
2021-04-11 16:41:44 +00:00
|
|
|
#endif /* CONFIG_64BIT */
|
2021-01-15 23:49:48 +00:00
|
|
|
#endif /* CONFIG_BUILTIN_DTB */
|
2020-11-04 06:37:13 +00:00
|
|
|
#endif
|
riscv: Fix memblock reservation for device tree blob
This fixes an error with how the FDT blob is reserved in memblock.
An incorrect physical address calculation exposed the FDT header to
unintended corruption, which typically manifested with of_fdt_raw_init()
faulting during late boot after fdt_totalsize() returned a wrong value.
Systems with smaller physical memory sizes more frequently trigger this
issue, as the kernel is more likely to allocate from the DMA32 zone
where bbl places the DTB after the kernel image.
Commit 671f9a3e2e24 ("RISC-V: Setup initial page tables in two stages")
changed the mapping of the DTB to reside in the fixmap area.
Consequently, early_init_fdt_reserve_self() cannot be used anymore in
setup_bootmem() since it relies on __pa() to derive a physical address,
which does not work with dtb_early_va that is no longer a valid kernel
logical address.
The reserved[0x1] region shows the effect of the pointer underflow
resulting from the __pa(initial_boot_params) offset subtraction:
[ 0.000000] MEMBLOCK configuration:
[ 0.000000] memory size = 0x000000001fe00000 reserved size = 0x0000000000a2e514
[ 0.000000] memory.cnt = 0x1
[ 0.000000] memory[0x0] [0x0000000080200000-0x000000009fffffff], 0x000000001fe00000 bytes flags: 0x0
[ 0.000000] reserved.cnt = 0x2
[ 0.000000] reserved[0x0] [0x0000000080200000-0x0000000080c2dfeb], 0x0000000000a2dfec bytes flags: 0x0
[ 0.000000] reserved[0x1] [0xfffffff080100000-0xfffffff080100527], 0x0000000000000528 bytes flags: 0x0
With the fix applied:
[ 0.000000] MEMBLOCK configuration:
[ 0.000000] memory size = 0x000000001fe00000 reserved size = 0x0000000000a2e514
[ 0.000000] memory.cnt = 0x1
[ 0.000000] memory[0x0] [0x0000000080200000-0x000000009fffffff], 0x000000001fe00000 bytes flags: 0x0
[ 0.000000] reserved.cnt = 0x2
[ 0.000000] reserved[0x0] [0x0000000080200000-0x0000000080c2dfeb], 0x0000000000a2dfec bytes flags: 0x0
[ 0.000000] reserved[0x1] [0x0000000080e00000-0x0000000080e00527], 0x0000000000000528 bytes flags: 0x0
Fixes: 671f9a3e2e24 ("RISC-V: Setup initial page tables in two stages")
Signed-off-by: Albert Ou <aou@eecs.berkeley.edu>
Tested-by: Bin Meng <bmeng.cn@gmail.com>
Reviewed-by: Anup Patel <anup@brainfault.org>
Signed-off-by: Paul Walmsley <paul.walmsley@sifive.com>
2019-09-27 23:14:18 +00:00
|
|
|
dtb_early_pa = dtb_pa;
|
2020-09-17 22:37:11 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Bootime fixmap only can handle PMD_SIZE mapping. Thus, boot-ioremap
|
|
|
|
* range can not span multiple pmds.
|
|
|
|
*/
|
|
|
|
BUILD_BUG_ON((__fix_to_virt(FIX_BTMAP_BEGIN) >> PMD_SHIFT)
|
|
|
|
!= (__fix_to_virt(FIX_BTMAP_END) >> PMD_SHIFT));
|
|
|
|
|
|
|
|
#ifndef __PAGETABLE_PMD_FOLDED
|
|
|
|
/*
|
|
|
|
* Early ioremap fixmap is already created as it lies within first 2MB
|
|
|
|
* of fixmap region. We always map PMD_SIZE. Thus, both FIX_BTMAP_END
|
|
|
|
* FIX_BTMAP_BEGIN should lie in the same pmd. Verify that and warn
|
|
|
|
* the user if not.
|
|
|
|
*/
|
|
|
|
fix_bmap_spmd = fixmap_pmd[pmd_index(__fix_to_virt(FIX_BTMAP_BEGIN))];
|
|
|
|
fix_bmap_epmd = fixmap_pmd[pmd_index(__fix_to_virt(FIX_BTMAP_END))];
|
|
|
|
if (pmd_val(fix_bmap_spmd) != pmd_val(fix_bmap_epmd)) {
|
|
|
|
WARN_ON(1);
|
|
|
|
pr_warn("fixmap btmap start [%08lx] != end [%08lx]\n",
|
|
|
|
pmd_val(fix_bmap_spmd), pmd_val(fix_bmap_epmd));
|
|
|
|
pr_warn("fix_to_virt(FIX_BTMAP_BEGIN): %08lx\n",
|
|
|
|
fix_to_virt(FIX_BTMAP_BEGIN));
|
|
|
|
pr_warn("fix_to_virt(FIX_BTMAP_END): %08lx\n",
|
|
|
|
fix_to_virt(FIX_BTMAP_END));
|
|
|
|
|
|
|
|
pr_warn("FIX_BTMAP_END: %d\n", FIX_BTMAP_END);
|
|
|
|
pr_warn("FIX_BTMAP_BEGIN: %d\n", FIX_BTMAP_BEGIN);
|
|
|
|
}
|
|
|
|
#endif
|
2019-06-28 20:36:21 +00:00
|
|
|
}
|
2019-01-07 15:27:01 +00:00
|
|
|
|
2021-04-11 16:41:44 +00:00
|
|
|
#ifdef CONFIG_64BIT
|
|
|
|
void protect_kernel_linear_mapping_text_rodata(void)
|
|
|
|
{
|
|
|
|
unsigned long text_start = (unsigned long)lm_alias(_start);
|
|
|
|
unsigned long init_text_start = (unsigned long)lm_alias(__init_text_begin);
|
|
|
|
unsigned long rodata_start = (unsigned long)lm_alias(__start_rodata);
|
|
|
|
unsigned long data_start = (unsigned long)lm_alias(_data);
|
|
|
|
|
|
|
|
set_memory_ro(text_start, (init_text_start - text_start) >> PAGE_SHIFT);
|
|
|
|
set_memory_nx(text_start, (init_text_start - text_start) >> PAGE_SHIFT);
|
|
|
|
|
|
|
|
set_memory_ro(rodata_start, (data_start - rodata_start) >> PAGE_SHIFT);
|
|
|
|
set_memory_nx(rodata_start, (data_start - rodata_start) >> PAGE_SHIFT);
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2019-06-28 20:36:21 +00:00
|
|
|
static void __init setup_vm_final(void)
|
|
|
|
{
|
|
|
|
uintptr_t va, map_size;
|
|
|
|
phys_addr_t pa, start, end;
|
2020-10-13 23:58:08 +00:00
|
|
|
u64 i;
|
2019-06-28 20:36:21 +00:00
|
|
|
|
2020-09-17 22:37:12 +00:00
|
|
|
/**
|
|
|
|
* MMU is enabled at this point. But page table setup is not complete yet.
|
|
|
|
* fixmap page table alloc functions should be used at this point
|
|
|
|
*/
|
|
|
|
pt_ops.alloc_pte = alloc_pte_fixmap;
|
|
|
|
pt_ops.get_pte_virt = get_pte_virt_fixmap;
|
|
|
|
#ifndef __PAGETABLE_PMD_FOLDED
|
|
|
|
pt_ops.alloc_pmd = alloc_pmd_fixmap;
|
|
|
|
pt_ops.get_pmd_virt = get_pmd_virt_fixmap;
|
|
|
|
#endif
|
2019-06-28 20:36:21 +00:00
|
|
|
/* Setup swapper PGD for fixmap */
|
|
|
|
create_pgd_mapping(swapper_pg_dir, FIXADDR_START,
|
2020-01-02 03:12:40 +00:00
|
|
|
__pa_symbol(fixmap_pgd_next),
|
2019-06-28 20:36:21 +00:00
|
|
|
PGDIR_SIZE, PAGE_TABLE);
|
2019-01-07 15:27:01 +00:00
|
|
|
|
2021-04-11 16:41:44 +00:00
|
|
|
/* Map all memory banks in the linear mapping */
|
2020-10-13 23:58:08 +00:00
|
|
|
for_each_mem_range(i, &start, &end) {
|
2019-06-28 20:36:21 +00:00
|
|
|
if (start >= end)
|
|
|
|
break;
|
|
|
|
if (start <= __pa(PAGE_OFFSET) &&
|
|
|
|
__pa(PAGE_OFFSET) < end)
|
|
|
|
start = __pa(PAGE_OFFSET);
|
|
|
|
|
|
|
|
map_size = best_map_size(start, end - start);
|
|
|
|
for (pa = start; pa < end; pa += map_size) {
|
|
|
|
va = (uintptr_t)__va(pa);
|
|
|
|
create_pgd_mapping(swapper_pg_dir, va, pa,
|
2021-04-11 16:41:44 +00:00
|
|
|
map_size,
|
|
|
|
#ifdef CONFIG_64BIT
|
|
|
|
PAGE_KERNEL
|
|
|
|
#else
|
|
|
|
PAGE_KERNEL_EXEC
|
|
|
|
#endif
|
|
|
|
);
|
|
|
|
|
2019-06-28 20:36:21 +00:00
|
|
|
}
|
2019-02-13 11:08:36 +00:00
|
|
|
}
|
2019-01-07 15:27:01 +00:00
|
|
|
|
2021-04-11 16:41:44 +00:00
|
|
|
#ifdef CONFIG_64BIT
|
|
|
|
/* Map the kernel */
|
|
|
|
create_kernel_page_table(swapper_pg_dir, PMD_SIZE);
|
|
|
|
#endif
|
|
|
|
|
2019-06-28 20:36:21 +00:00
|
|
|
/* Clear fixmap PTE and PMD mappings */
|
|
|
|
clear_fixmap(FIX_PTE);
|
|
|
|
clear_fixmap(FIX_PMD);
|
|
|
|
|
|
|
|
/* Move to swapper page table */
|
2020-01-02 03:12:40 +00:00
|
|
|
csr_write(CSR_SATP, PFN_DOWN(__pa_symbol(swapper_pg_dir)) | SATP_MODE);
|
2019-06-28 20:36:21 +00:00
|
|
|
local_flush_tlb_all();
|
2020-09-17 22:37:12 +00:00
|
|
|
|
|
|
|
/* generic page allocation functions must be used to setup page table */
|
|
|
|
pt_ops.alloc_pte = alloc_pte_late;
|
|
|
|
pt_ops.get_pte_virt = get_pte_virt_late;
|
|
|
|
#ifndef __PAGETABLE_PMD_FOLDED
|
|
|
|
pt_ops.alloc_pmd = alloc_pmd_late;
|
|
|
|
pt_ops.get_pmd_virt = get_pmd_virt_late;
|
|
|
|
#endif
|
2019-06-28 20:36:21 +00:00
|
|
|
}
|
2019-10-28 12:10:41 +00:00
|
|
|
#else
|
|
|
|
asmlinkage void __init setup_vm(uintptr_t dtb_pa)
|
|
|
|
{
|
|
|
|
dtb_early_va = (void *)dtb_pa;
|
2020-10-01 19:04:56 +00:00
|
|
|
dtb_early_pa = dtb_pa;
|
2019-10-28 12:10:41 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
static inline void setup_vm_final(void)
|
|
|
|
{
|
|
|
|
}
|
|
|
|
#endif /* CONFIG_MMU */
|
2019-06-28 20:36:21 +00:00
|
|
|
|
2020-03-09 16:55:41 +00:00
|
|
|
#ifdef CONFIG_STRICT_KERNEL_RWX
|
2021-03-29 18:22:21 +00:00
|
|
|
void __init protect_kernel_text_data(void)
|
2020-03-09 16:55:41 +00:00
|
|
|
{
|
2020-11-05 00:04:38 +00:00
|
|
|
unsigned long text_start = (unsigned long)_start;
|
|
|
|
unsigned long init_text_start = (unsigned long)__init_text_begin;
|
|
|
|
unsigned long init_data_start = (unsigned long)__init_data_begin;
|
2020-03-09 16:55:41 +00:00
|
|
|
unsigned long rodata_start = (unsigned long)__start_rodata;
|
|
|
|
unsigned long data_start = (unsigned long)_data;
|
|
|
|
unsigned long max_low = (unsigned long)(__va(PFN_PHYS(max_low_pfn)));
|
|
|
|
|
2020-11-05 00:04:38 +00:00
|
|
|
set_memory_ro(text_start, (init_text_start - text_start) >> PAGE_SHIFT);
|
|
|
|
set_memory_ro(init_text_start, (init_data_start - init_text_start) >> PAGE_SHIFT);
|
|
|
|
set_memory_nx(init_data_start, (rodata_start - init_data_start) >> PAGE_SHIFT);
|
|
|
|
/* rodata section is marked readonly in mark_rodata_ro */
|
2020-03-09 16:55:41 +00:00
|
|
|
set_memory_nx(rodata_start, (data_start - rodata_start) >> PAGE_SHIFT);
|
|
|
|
set_memory_nx(data_start, (max_low - data_start) >> PAGE_SHIFT);
|
|
|
|
}
|
|
|
|
|
2020-11-05 00:04:38 +00:00
|
|
|
void mark_rodata_ro(void)
|
2020-06-16 07:45:46 +00:00
|
|
|
{
|
2020-11-05 00:04:38 +00:00
|
|
|
unsigned long rodata_start = (unsigned long)__start_rodata;
|
|
|
|
unsigned long data_start = (unsigned long)_data;
|
2020-06-16 07:45:46 +00:00
|
|
|
|
2020-11-05 00:04:38 +00:00
|
|
|
set_memory_ro(rodata_start, (data_start - rodata_start) >> PAGE_SHIFT);
|
2020-06-16 07:45:46 +00:00
|
|
|
|
2020-06-03 23:03:55 +00:00
|
|
|
debug_checkwx();
|
2020-06-16 07:45:46 +00:00
|
|
|
}
|
2020-03-09 16:55:41 +00:00
|
|
|
#endif
|
2020-06-16 07:45:46 +00:00
|
|
|
|
2021-04-19 00:55:38 +00:00
|
|
|
#ifdef CONFIG_KEXEC_CORE
|
|
|
|
/*
|
|
|
|
* reserve_crashkernel() - reserves memory for crash kernel
|
|
|
|
*
|
|
|
|
* This function reserves memory area given in "crashkernel=" kernel command
|
|
|
|
* line parameter. The memory reserved is used by dump capture kernel when
|
|
|
|
* primary kernel is crashing.
|
|
|
|
*/
|
|
|
|
static void __init reserve_crashkernel(void)
|
|
|
|
{
|
|
|
|
unsigned long long crash_base = 0;
|
|
|
|
unsigned long long crash_size = 0;
|
|
|
|
unsigned long search_start = memblock_start_of_DRAM();
|
|
|
|
unsigned long search_end = memblock_end_of_DRAM();
|
|
|
|
|
|
|
|
int ret = 0;
|
|
|
|
|
2021-04-19 00:55:39 +00:00
|
|
|
/*
|
|
|
|
* Don't reserve a region for a crash kernel on a crash kernel
|
|
|
|
* since it doesn't make much sense and we have limited memory
|
|
|
|
* resources.
|
|
|
|
*/
|
|
|
|
#ifdef CONFIG_CRASH_DUMP
|
|
|
|
if (is_kdump_kernel()) {
|
|
|
|
pr_info("crashkernel: ignoring reservation request\n");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2021-04-19 00:55:38 +00:00
|
|
|
ret = parse_crashkernel(boot_command_line, memblock_phys_mem_size(),
|
|
|
|
&crash_size, &crash_base);
|
|
|
|
if (ret || !crash_size)
|
|
|
|
return;
|
|
|
|
|
|
|
|
crash_size = PAGE_ALIGN(crash_size);
|
|
|
|
|
|
|
|
if (crash_base == 0) {
|
|
|
|
/*
|
|
|
|
* Current riscv boot protocol requires 2MB alignment for
|
|
|
|
* RV64 and 4MB alignment for RV32 (hugepage size)
|
|
|
|
*/
|
|
|
|
crash_base = memblock_find_in_range(search_start, search_end,
|
|
|
|
crash_size, PMD_SIZE);
|
|
|
|
|
|
|
|
if (crash_base == 0) {
|
|
|
|
pr_warn("crashkernel: couldn't allocate %lldKB\n",
|
|
|
|
crash_size >> 10);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
/* User specifies base address explicitly. */
|
|
|
|
if (!memblock_is_region_memory(crash_base, crash_size)) {
|
|
|
|
pr_warn("crashkernel: requested region is not memory\n");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (memblock_is_region_reserved(crash_base, crash_size)) {
|
|
|
|
pr_warn("crashkernel: requested region is reserved\n");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
if (!IS_ALIGNED(crash_base, PMD_SIZE)) {
|
|
|
|
pr_warn("crashkernel: requested region is misaligned\n");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
memblock_reserve(crash_base, crash_size);
|
|
|
|
|
|
|
|
pr_info("crashkernel: reserved 0x%016llx - 0x%016llx (%lld MB)\n",
|
|
|
|
crash_base, crash_base + crash_size, crash_size >> 20);
|
|
|
|
|
|
|
|
crashk_res.start = crash_base;
|
|
|
|
crashk_res.end = crash_base + crash_size - 1;
|
|
|
|
}
|
|
|
|
#endif /* CONFIG_KEXEC_CORE */
|
|
|
|
|
2021-04-19 00:55:39 +00:00
|
|
|
#ifdef CONFIG_CRASH_DUMP
|
|
|
|
/*
|
|
|
|
* We keep track of the ELF core header of the crashed
|
|
|
|
* kernel with a reserved-memory region with compatible
|
|
|
|
* string "linux,elfcorehdr". Here we register a callback
|
|
|
|
* to populate elfcorehdr_addr/size when this region is
|
|
|
|
* present. Note that this region will be marked as
|
|
|
|
* reserved once we call early_init_fdt_scan_reserved_mem()
|
|
|
|
* later on.
|
|
|
|
*/
|
|
|
|
static int elfcore_hdr_setup(struct reserved_mem *rmem)
|
|
|
|
{
|
|
|
|
elfcorehdr_addr = rmem->base;
|
|
|
|
elfcorehdr_size = rmem->size;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
RESERVEDMEM_OF_DECLARE(elfcorehdr, "linux,elfcorehdr", elfcore_hdr_setup);
|
|
|
|
#endif
|
|
|
|
|
2019-06-28 20:36:21 +00:00
|
|
|
void __init paging_init(void)
|
|
|
|
{
|
|
|
|
setup_vm_final();
|
|
|
|
setup_zero_page();
|
2020-11-19 00:38:27 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
void __init misc_mem_init(void)
|
|
|
|
{
|
2021-02-25 06:54:17 +00:00
|
|
|
early_memtest(min_low_pfn << PAGE_SHIFT, max_low_pfn << PAGE_SHIFT);
|
2020-11-19 00:38:29 +00:00
|
|
|
arch_numa_init();
|
2020-11-19 00:38:27 +00:00
|
|
|
sparse_init();
|
2019-06-28 20:36:21 +00:00
|
|
|
zone_sizes_init();
|
2021-04-19 00:55:38 +00:00
|
|
|
#ifdef CONFIG_KEXEC_CORE
|
|
|
|
reserve_crashkernel();
|
|
|
|
#endif
|
2020-11-19 00:38:29 +00:00
|
|
|
memblock_dump_all();
|
2019-02-13 11:08:36 +00:00
|
|
|
}
|
2019-08-28 21:40:54 +00:00
|
|
|
|
2019-10-23 03:23:02 +00:00
|
|
|
#ifdef CONFIG_SPARSEMEM_VMEMMAP
|
2019-08-28 21:40:54 +00:00
|
|
|
int __meminit vmemmap_populate(unsigned long start, unsigned long end, int node,
|
|
|
|
struct vmem_altmap *altmap)
|
|
|
|
{
|
2020-08-07 06:23:19 +00:00
|
|
|
return vmemmap_populate_basepages(start, end, node, NULL);
|
2019-08-28 21:40:54 +00:00
|
|
|
}
|
|
|
|
#endif
|