2019-05-29 22:18:00 +08:00
|
|
|
// SPDX-License-Identifier: GPL-2.0-only
|
2017-07-11 09:00:26 +08:00
|
|
|
/*
|
|
|
|
* Copyright (C) 2012 Regents of the University of California
|
2019-06-29 04:36:21 +08:00
|
|
|
* Copyright (C) 2019 Western Digital Corporation or its affiliates.
|
2017-07-11 09:00:26 +08:00
|
|
|
*/
|
|
|
|
|
|
|
|
#include <linux/init.h>
|
|
|
|
#include <linux/mm.h>
|
|
|
|
#include <linux/memblock.h>
|
2018-10-31 06:09:49 +08:00
|
|
|
#include <linux/initrd.h>
|
2017-07-11 09:00:26 +08:00
|
|
|
#include <linux/swap.h>
|
2018-01-16 16:37:50 +08:00
|
|
|
#include <linux/sizes.h>
|
2019-02-21 13:55:49 +08:00
|
|
|
#include <linux/of_fdt.h>
|
riscv: Fix memblock reservation for device tree blob
This fixes an error with how the FDT blob is reserved in memblock.
An incorrect physical address calculation exposed the FDT header to
unintended corruption, which typically manifested with of_fdt_raw_init()
faulting during late boot after fdt_totalsize() returned a wrong value.
Systems with smaller physical memory sizes more frequently trigger this
issue, as the kernel is more likely to allocate from the DMA32 zone
where bbl places the DTB after the kernel image.
Commit 671f9a3e2e24 ("RISC-V: Setup initial page tables in two stages")
changed the mapping of the DTB to reside in the fixmap area.
Consequently, early_init_fdt_reserve_self() cannot be used anymore in
setup_bootmem() since it relies on __pa() to derive a physical address,
which does not work with dtb_early_va that is no longer a valid kernel
logical address.
The reserved[0x1] region shows the effect of the pointer underflow
resulting from the __pa(initial_boot_params) offset subtraction:
[ 0.000000] MEMBLOCK configuration:
[ 0.000000] memory size = 0x000000001fe00000 reserved size = 0x0000000000a2e514
[ 0.000000] memory.cnt = 0x1
[ 0.000000] memory[0x0] [0x0000000080200000-0x000000009fffffff], 0x000000001fe00000 bytes flags: 0x0
[ 0.000000] reserved.cnt = 0x2
[ 0.000000] reserved[0x0] [0x0000000080200000-0x0000000080c2dfeb], 0x0000000000a2dfec bytes flags: 0x0
[ 0.000000] reserved[0x1] [0xfffffff080100000-0xfffffff080100527], 0x0000000000000528 bytes flags: 0x0
With the fix applied:
[ 0.000000] MEMBLOCK configuration:
[ 0.000000] memory size = 0x000000001fe00000 reserved size = 0x0000000000a2e514
[ 0.000000] memory.cnt = 0x1
[ 0.000000] memory[0x0] [0x0000000080200000-0x000000009fffffff], 0x000000001fe00000 bytes flags: 0x0
[ 0.000000] reserved.cnt = 0x2
[ 0.000000] reserved[0x0] [0x0000000080200000-0x0000000080c2dfeb], 0x0000000000a2dfec bytes flags: 0x0
[ 0.000000] reserved[0x1] [0x0000000080e00000-0x0000000080e00527], 0x0000000000000528 bytes flags: 0x0
Fixes: 671f9a3e2e24 ("RISC-V: Setup initial page tables in two stages")
Signed-off-by: Albert Ou <aou@eecs.berkeley.edu>
Tested-by: Bin Meng <bmeng.cn@gmail.com>
Reviewed-by: Anup Patel <anup@brainfault.org>
Signed-off-by: Paul Walmsley <paul.walmsley@sifive.com>
2019-09-28 07:14:18 +08:00
|
|
|
#include <linux/libfdt.h>
|
2020-03-10 00:55:41 +08:00
|
|
|
#include <linux/set_memory.h>
|
2017-07-11 09:00:26 +08:00
|
|
|
|
2019-01-07 23:27:01 +08:00
|
|
|
#include <asm/fixmap.h>
|
2017-07-11 09:00:26 +08:00
|
|
|
#include <asm/tlbflush.h>
|
|
|
|
#include <asm/sections.h>
|
2020-04-14 12:43:24 +08:00
|
|
|
#include <asm/soc.h>
|
2017-07-11 09:00:26 +08:00
|
|
|
#include <asm/io.h>
|
2020-06-04 07:03:55 +08:00
|
|
|
#include <asm/ptdump.h>
|
2017-07-11 09:00:26 +08:00
|
|
|
|
2019-10-18 06:00:17 +08:00
|
|
|
#include "../kernel/head.h"
|
|
|
|
|
2019-03-26 16:03:47 +08:00
|
|
|
unsigned long empty_zero_page[PAGE_SIZE / sizeof(unsigned long)]
|
|
|
|
__page_aligned_bss;
|
|
|
|
EXPORT_SYMBOL(empty_zero_page);
|
|
|
|
|
2019-06-07 14:01:29 +08:00
|
|
|
extern char _start[];
|
2019-10-28 20:10:41 +08:00
|
|
|
void *dtb_early_va;
|
2019-06-07 14:01:29 +08:00
|
|
|
|
2017-07-11 09:00:26 +08:00
|
|
|
static void __init zone_sizes_init(void)
|
|
|
|
{
|
2018-01-16 16:37:50 +08:00
|
|
|
unsigned long max_zone_pfns[MAX_NR_ZONES] = { 0, };
|
2017-07-11 09:00:26 +08:00
|
|
|
|
2018-06-25 16:49:37 +08:00
|
|
|
#ifdef CONFIG_ZONE_DMA32
|
2019-01-12 16:16:27 +08:00
|
|
|
max_zone_pfns[ZONE_DMA32] = PFN_DOWN(min(4UL * SZ_1G,
|
|
|
|
(unsigned long) PFN_PHYS(max_low_pfn)));
|
2018-06-25 16:49:37 +08:00
|
|
|
#endif
|
2018-01-16 16:37:50 +08:00
|
|
|
max_zone_pfns[ZONE_NORMAL] = max_low_pfn;
|
|
|
|
|
2020-06-04 06:57:10 +08:00
|
|
|
free_area_init(max_zone_pfns);
|
2017-07-11 09:00:26 +08:00
|
|
|
}
|
|
|
|
|
2019-10-28 20:10:41 +08:00
|
|
|
static void setup_zero_page(void)
|
2017-07-11 09:00:26 +08:00
|
|
|
{
|
|
|
|
memset((void *)empty_zero_page, 0, PAGE_SIZE);
|
|
|
|
}
|
|
|
|
|
2020-05-14 19:53:35 +08:00
|
|
|
#if defined(CONFIG_MMU) && defined(CONFIG_DEBUG_VM)
|
2019-11-18 13:58:34 +08:00
|
|
|
static inline void print_mlk(char *name, unsigned long b, unsigned long t)
|
|
|
|
{
|
|
|
|
pr_notice("%12s : 0x%08lx - 0x%08lx (%4ld kB)\n", name, b, t,
|
|
|
|
(((t) - (b)) >> 10));
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void print_mlm(char *name, unsigned long b, unsigned long t)
|
|
|
|
{
|
|
|
|
pr_notice("%12s : 0x%08lx - 0x%08lx (%4ld MB)\n", name, b, t,
|
|
|
|
(((t) - (b)) >> 20));
|
|
|
|
}
|
|
|
|
|
|
|
|
static void print_vm_layout(void)
|
|
|
|
{
|
|
|
|
pr_notice("Virtual kernel memory layout:\n");
|
|
|
|
print_mlk("fixmap", (unsigned long)FIXADDR_START,
|
|
|
|
(unsigned long)FIXADDR_TOP);
|
|
|
|
print_mlm("pci io", (unsigned long)PCI_IO_START,
|
|
|
|
(unsigned long)PCI_IO_END);
|
|
|
|
print_mlm("vmemmap", (unsigned long)VMEMMAP_START,
|
|
|
|
(unsigned long)VMEMMAP_END);
|
|
|
|
print_mlm("vmalloc", (unsigned long)VMALLOC_START,
|
|
|
|
(unsigned long)VMALLOC_END);
|
|
|
|
print_mlm("lowmem", (unsigned long)PAGE_OFFSET,
|
|
|
|
(unsigned long)high_memory);
|
|
|
|
}
|
|
|
|
#else
|
|
|
|
static void print_vm_layout(void) { }
|
|
|
|
#endif /* CONFIG_DEBUG_VM */
|
|
|
|
|
2017-07-11 09:00:26 +08:00
|
|
|
void __init mem_init(void)
|
|
|
|
{
|
|
|
|
#ifdef CONFIG_FLATMEM
|
|
|
|
BUG_ON(!mem_map);
|
|
|
|
#endif /* CONFIG_FLATMEM */
|
|
|
|
|
|
|
|
high_memory = (void *)(__va(PFN_PHYS(max_low_pfn)));
|
2018-10-31 06:09:30 +08:00
|
|
|
memblock_free_all();
|
2017-07-11 09:00:26 +08:00
|
|
|
|
|
|
|
mem_init_print_info(NULL);
|
2019-11-18 13:58:34 +08:00
|
|
|
print_vm_layout();
|
2017-07-11 09:00:26 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
#ifdef CONFIG_BLK_DEV_INITRD
|
2019-02-21 13:55:49 +08:00
|
|
|
static void __init setup_initrd(void)
|
|
|
|
{
|
2020-07-16 07:30:08 +08:00
|
|
|
phys_addr_t start;
|
2019-02-21 13:55:49 +08:00
|
|
|
unsigned long size;
|
|
|
|
|
2020-07-16 07:30:08 +08:00
|
|
|
/* Ignore the virtul address computed during device tree parsing */
|
|
|
|
initrd_start = initrd_end = 0;
|
|
|
|
|
|
|
|
if (!phys_initrd_size)
|
|
|
|
return;
|
|
|
|
/*
|
|
|
|
* Round the memory region to page boundaries as per free_initrd_mem()
|
|
|
|
* This allows us to detect whether the pages overlapping the initrd
|
|
|
|
* are in use, but more importantly, reserves the entire set of pages
|
|
|
|
* as we don't want these pages allocated for other purposes.
|
|
|
|
*/
|
|
|
|
start = round_down(phys_initrd_start, PAGE_SIZE);
|
|
|
|
size = phys_initrd_size + (phys_initrd_start - start);
|
|
|
|
size = round_up(size, PAGE_SIZE);
|
|
|
|
|
|
|
|
if (!memblock_is_region_memory(start, size)) {
|
|
|
|
pr_err("INITRD: 0x%08llx+0x%08lx is not a memory region",
|
|
|
|
(u64)start, size);
|
2019-02-21 13:55:49 +08:00
|
|
|
goto disable;
|
|
|
|
}
|
2020-07-16 07:30:08 +08:00
|
|
|
|
|
|
|
if (memblock_is_region_reserved(start, size)) {
|
|
|
|
pr_err("INITRD: 0x%08llx+0x%08lx overlaps in-use memory region\n",
|
|
|
|
(u64)start, size);
|
2019-02-21 13:55:49 +08:00
|
|
|
goto disable;
|
|
|
|
}
|
|
|
|
|
2020-07-16 07:30:08 +08:00
|
|
|
memblock_reserve(start, size);
|
|
|
|
/* Now convert initrd to virtual addresses */
|
|
|
|
initrd_start = (unsigned long)__va(phys_initrd_start);
|
|
|
|
initrd_end = initrd_start + phys_initrd_size;
|
2019-02-21 13:55:49 +08:00
|
|
|
initrd_below_start_ok = 1;
|
|
|
|
|
|
|
|
pr_info("Initial ramdisk at: 0x%p (%lu bytes)\n",
|
|
|
|
(void *)(initrd_start), size);
|
|
|
|
return;
|
|
|
|
disable:
|
|
|
|
pr_cont(" - disabling initrd\n");
|
|
|
|
initrd_start = 0;
|
|
|
|
initrd_end = 0;
|
|
|
|
}
|
2017-07-11 09:00:26 +08:00
|
|
|
#endif /* CONFIG_BLK_DEV_INITRD */
|
2019-02-21 13:55:49 +08:00
|
|
|
|
riscv: Fix memblock reservation for device tree blob
This fixes an error with how the FDT blob is reserved in memblock.
An incorrect physical address calculation exposed the FDT header to
unintended corruption, which typically manifested with of_fdt_raw_init()
faulting during late boot after fdt_totalsize() returned a wrong value.
Systems with smaller physical memory sizes more frequently trigger this
issue, as the kernel is more likely to allocate from the DMA32 zone
where bbl places the DTB after the kernel image.
Commit 671f9a3e2e24 ("RISC-V: Setup initial page tables in two stages")
changed the mapping of the DTB to reside in the fixmap area.
Consequently, early_init_fdt_reserve_self() cannot be used anymore in
setup_bootmem() since it relies on __pa() to derive a physical address,
which does not work with dtb_early_va that is no longer a valid kernel
logical address.
The reserved[0x1] region shows the effect of the pointer underflow
resulting from the __pa(initial_boot_params) offset subtraction:
[ 0.000000] MEMBLOCK configuration:
[ 0.000000] memory size = 0x000000001fe00000 reserved size = 0x0000000000a2e514
[ 0.000000] memory.cnt = 0x1
[ 0.000000] memory[0x0] [0x0000000080200000-0x000000009fffffff], 0x000000001fe00000 bytes flags: 0x0
[ 0.000000] reserved.cnt = 0x2
[ 0.000000] reserved[0x0] [0x0000000080200000-0x0000000080c2dfeb], 0x0000000000a2dfec bytes flags: 0x0
[ 0.000000] reserved[0x1] [0xfffffff080100000-0xfffffff080100527], 0x0000000000000528 bytes flags: 0x0
With the fix applied:
[ 0.000000] MEMBLOCK configuration:
[ 0.000000] memory size = 0x000000001fe00000 reserved size = 0x0000000000a2e514
[ 0.000000] memory.cnt = 0x1
[ 0.000000] memory[0x0] [0x0000000080200000-0x000000009fffffff], 0x000000001fe00000 bytes flags: 0x0
[ 0.000000] reserved.cnt = 0x2
[ 0.000000] reserved[0x0] [0x0000000080200000-0x0000000080c2dfeb], 0x0000000000a2dfec bytes flags: 0x0
[ 0.000000] reserved[0x1] [0x0000000080e00000-0x0000000080e00527], 0x0000000000000528 bytes flags: 0x0
Fixes: 671f9a3e2e24 ("RISC-V: Setup initial page tables in two stages")
Signed-off-by: Albert Ou <aou@eecs.berkeley.edu>
Tested-by: Bin Meng <bmeng.cn@gmail.com>
Reviewed-by: Anup Patel <anup@brainfault.org>
Signed-off-by: Paul Walmsley <paul.walmsley@sifive.com>
2019-09-28 07:14:18 +08:00
|
|
|
static phys_addr_t dtb_early_pa __initdata;
|
|
|
|
|
2019-02-21 13:55:49 +08:00
|
|
|
void __init setup_bootmem(void)
|
|
|
|
{
|
|
|
|
struct memblock_region *reg;
|
|
|
|
phys_addr_t mem_size = 0;
|
2020-07-16 07:30:09 +08:00
|
|
|
phys_addr_t total_mem = 0;
|
|
|
|
phys_addr_t mem_start, end = 0;
|
2020-01-02 11:12:40 +08:00
|
|
|
phys_addr_t vmlinux_end = __pa_symbol(&_end);
|
|
|
|
phys_addr_t vmlinux_start = __pa_symbol(&_start);
|
2019-02-21 13:55:49 +08:00
|
|
|
|
|
|
|
/* Find the memory region containing the kernel */
|
|
|
|
for_each_memblock(memory, reg) {
|
2020-07-16 07:30:09 +08:00
|
|
|
end = reg->base + reg->size;
|
|
|
|
if (!total_mem)
|
|
|
|
mem_start = reg->base;
|
|
|
|
if (reg->base <= vmlinux_start && vmlinux_end <= end)
|
|
|
|
BUG_ON(reg->size == 0);
|
|
|
|
total_mem = total_mem + reg->size;
|
2019-02-21 13:55:49 +08:00
|
|
|
}
|
2020-07-16 07:30:09 +08:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Remove memblock from the end of usable area to the
|
|
|
|
* end of region
|
|
|
|
*/
|
|
|
|
mem_size = min(total_mem, (phys_addr_t)-PAGE_OFFSET);
|
|
|
|
if (mem_start + mem_size < end)
|
|
|
|
memblock_remove(mem_start + mem_size,
|
|
|
|
end - mem_start - mem_size);
|
2019-02-21 13:55:49 +08:00
|
|
|
|
2019-06-07 14:01:29 +08:00
|
|
|
/* Reserve from the start of the kernel to the end of the kernel */
|
|
|
|
memblock_reserve(vmlinux_start, vmlinux_end - vmlinux_start);
|
|
|
|
|
2020-04-27 14:59:24 +08:00
|
|
|
max_pfn = PFN_DOWN(memblock_end_of_DRAM());
|
|
|
|
max_low_pfn = max_pfn;
|
2020-07-16 07:30:07 +08:00
|
|
|
set_max_mapnr(max_low_pfn);
|
2019-02-21 13:55:49 +08:00
|
|
|
|
|
|
|
#ifdef CONFIG_BLK_DEV_INITRD
|
|
|
|
setup_initrd();
|
|
|
|
#endif /* CONFIG_BLK_DEV_INITRD */
|
|
|
|
|
riscv: Fix memblock reservation for device tree blob
This fixes an error with how the FDT blob is reserved in memblock.
An incorrect physical address calculation exposed the FDT header to
unintended corruption, which typically manifested with of_fdt_raw_init()
faulting during late boot after fdt_totalsize() returned a wrong value.
Systems with smaller physical memory sizes more frequently trigger this
issue, as the kernel is more likely to allocate from the DMA32 zone
where bbl places the DTB after the kernel image.
Commit 671f9a3e2e24 ("RISC-V: Setup initial page tables in two stages")
changed the mapping of the DTB to reside in the fixmap area.
Consequently, early_init_fdt_reserve_self() cannot be used anymore in
setup_bootmem() since it relies on __pa() to derive a physical address,
which does not work with dtb_early_va that is no longer a valid kernel
logical address.
The reserved[0x1] region shows the effect of the pointer underflow
resulting from the __pa(initial_boot_params) offset subtraction:
[ 0.000000] MEMBLOCK configuration:
[ 0.000000] memory size = 0x000000001fe00000 reserved size = 0x0000000000a2e514
[ 0.000000] memory.cnt = 0x1
[ 0.000000] memory[0x0] [0x0000000080200000-0x000000009fffffff], 0x000000001fe00000 bytes flags: 0x0
[ 0.000000] reserved.cnt = 0x2
[ 0.000000] reserved[0x0] [0x0000000080200000-0x0000000080c2dfeb], 0x0000000000a2dfec bytes flags: 0x0
[ 0.000000] reserved[0x1] [0xfffffff080100000-0xfffffff080100527], 0x0000000000000528 bytes flags: 0x0
With the fix applied:
[ 0.000000] MEMBLOCK configuration:
[ 0.000000] memory size = 0x000000001fe00000 reserved size = 0x0000000000a2e514
[ 0.000000] memory.cnt = 0x1
[ 0.000000] memory[0x0] [0x0000000080200000-0x000000009fffffff], 0x000000001fe00000 bytes flags: 0x0
[ 0.000000] reserved.cnt = 0x2
[ 0.000000] reserved[0x0] [0x0000000080200000-0x0000000080c2dfeb], 0x0000000000a2dfec bytes flags: 0x0
[ 0.000000] reserved[0x1] [0x0000000080e00000-0x0000000080e00527], 0x0000000000000528 bytes flags: 0x0
Fixes: 671f9a3e2e24 ("RISC-V: Setup initial page tables in two stages")
Signed-off-by: Albert Ou <aou@eecs.berkeley.edu>
Tested-by: Bin Meng <bmeng.cn@gmail.com>
Reviewed-by: Anup Patel <anup@brainfault.org>
Signed-off-by: Paul Walmsley <paul.walmsley@sifive.com>
2019-09-28 07:14:18 +08:00
|
|
|
/*
|
|
|
|
* Avoid using early_init_fdt_reserve_self() since __pa() does
|
|
|
|
* not work for DTB pointers that are fixmap addresses
|
|
|
|
*/
|
|
|
|
memblock_reserve(dtb_early_pa, fdt_totalsize(dtb_early_va));
|
|
|
|
|
2019-02-21 13:55:49 +08:00
|
|
|
early_init_fdt_scan_reserved_mem();
|
|
|
|
memblock_allow_resize();
|
|
|
|
memblock_dump_all();
|
|
|
|
}
|
2019-02-13 19:08:36 +08:00
|
|
|
|
2019-10-28 20:10:41 +08:00
|
|
|
#ifdef CONFIG_MMU
|
2019-03-26 16:03:47 +08:00
|
|
|
unsigned long va_pa_offset;
|
|
|
|
EXPORT_SYMBOL(va_pa_offset);
|
|
|
|
unsigned long pfn_base;
|
|
|
|
EXPORT_SYMBOL(pfn_base);
|
|
|
|
|
2019-02-13 19:08:36 +08:00
|
|
|
pgd_t swapper_pg_dir[PTRS_PER_PGD] __page_aligned_bss;
|
2019-06-29 04:36:21 +08:00
|
|
|
pgd_t trampoline_pg_dir[PTRS_PER_PGD] __page_aligned_bss;
|
|
|
|
pte_t fixmap_pte[PTRS_PER_PTE] __page_aligned_bss;
|
|
|
|
static bool mmu_enabled;
|
2019-02-13 19:08:36 +08:00
|
|
|
|
2019-06-29 04:36:21 +08:00
|
|
|
#define MAX_EARLY_MAPPING_SIZE SZ_128M
|
2019-02-13 19:08:36 +08:00
|
|
|
|
2019-06-29 04:36:21 +08:00
|
|
|
pgd_t early_pg_dir[PTRS_PER_PGD] __initdata __aligned(PAGE_SIZE);
|
2019-01-07 23:27:01 +08:00
|
|
|
|
|
|
|
void __set_fixmap(enum fixed_addresses idx, phys_addr_t phys, pgprot_t prot)
|
|
|
|
{
|
|
|
|
unsigned long addr = __fix_to_virt(idx);
|
|
|
|
pte_t *ptep;
|
|
|
|
|
|
|
|
BUG_ON(idx <= FIX_HOLE || idx >= __end_of_fixed_addresses);
|
|
|
|
|
|
|
|
ptep = &fixmap_pte[pte_index(addr)];
|
|
|
|
|
2020-08-04 11:02:05 +08:00
|
|
|
if (pgprot_val(prot))
|
2019-01-07 23:27:01 +08:00
|
|
|
set_pte(ptep, pfn_pte(phys >> PAGE_SHIFT, prot));
|
2020-08-04 11:02:05 +08:00
|
|
|
else
|
2019-01-07 23:27:01 +08:00
|
|
|
pte_clear(&init_mm, addr, ptep);
|
2020-08-04 11:02:05 +08:00
|
|
|
local_flush_tlb_page(addr);
|
2019-01-07 23:27:01 +08:00
|
|
|
}
|
|
|
|
|
2019-06-29 04:36:21 +08:00
|
|
|
static pte_t *__init get_pte_virt(phys_addr_t pa)
|
|
|
|
{
|
|
|
|
if (mmu_enabled) {
|
|
|
|
clear_fixmap(FIX_PTE);
|
|
|
|
return (pte_t *)set_fixmap_offset(FIX_PTE, pa);
|
|
|
|
} else {
|
|
|
|
return (pte_t *)((uintptr_t)pa);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static phys_addr_t __init alloc_pte(uintptr_t va)
|
|
|
|
{
|
|
|
|
/*
|
|
|
|
* We only create PMD or PGD early mappings so we
|
|
|
|
* should never reach here with MMU disabled.
|
|
|
|
*/
|
|
|
|
BUG_ON(!mmu_enabled);
|
|
|
|
|
|
|
|
return memblock_phys_alloc(PAGE_SIZE, PAGE_SIZE);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void __init create_pte_mapping(pte_t *ptep,
|
|
|
|
uintptr_t va, phys_addr_t pa,
|
|
|
|
phys_addr_t sz, pgprot_t prot)
|
|
|
|
{
|
2020-06-09 12:33:10 +08:00
|
|
|
uintptr_t pte_idx = pte_index(va);
|
2019-06-29 04:36:21 +08:00
|
|
|
|
|
|
|
BUG_ON(sz != PAGE_SIZE);
|
|
|
|
|
2020-06-09 12:33:10 +08:00
|
|
|
if (pte_none(ptep[pte_idx]))
|
|
|
|
ptep[pte_idx] = pfn_pte(PFN_DOWN(pa), prot);
|
2019-06-29 04:36:21 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
#ifndef __PAGETABLE_PMD_FOLDED
|
|
|
|
|
|
|
|
pmd_t trampoline_pmd[PTRS_PER_PMD] __page_aligned_bss;
|
|
|
|
pmd_t fixmap_pmd[PTRS_PER_PMD] __page_aligned_bss;
|
|
|
|
|
|
|
|
#if MAX_EARLY_MAPPING_SIZE < PGDIR_SIZE
|
|
|
|
#define NUM_EARLY_PMDS 1UL
|
|
|
|
#else
|
|
|
|
#define NUM_EARLY_PMDS (1UL + MAX_EARLY_MAPPING_SIZE / PGDIR_SIZE)
|
|
|
|
#endif
|
|
|
|
pmd_t early_pmd[PTRS_PER_PMD * NUM_EARLY_PMDS] __initdata __aligned(PAGE_SIZE);
|
|
|
|
|
|
|
|
static pmd_t *__init get_pmd_virt(phys_addr_t pa)
|
|
|
|
{
|
|
|
|
if (mmu_enabled) {
|
|
|
|
clear_fixmap(FIX_PMD);
|
|
|
|
return (pmd_t *)set_fixmap_offset(FIX_PMD, pa);
|
|
|
|
} else {
|
|
|
|
return (pmd_t *)((uintptr_t)pa);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static phys_addr_t __init alloc_pmd(uintptr_t va)
|
|
|
|
{
|
|
|
|
uintptr_t pmd_num;
|
|
|
|
|
|
|
|
if (mmu_enabled)
|
|
|
|
return memblock_phys_alloc(PAGE_SIZE, PAGE_SIZE);
|
|
|
|
|
|
|
|
pmd_num = (va - PAGE_OFFSET) >> PGDIR_SHIFT;
|
|
|
|
BUG_ON(pmd_num >= NUM_EARLY_PMDS);
|
|
|
|
return (uintptr_t)&early_pmd[pmd_num * PTRS_PER_PMD];
|
|
|
|
}
|
|
|
|
|
|
|
|
static void __init create_pmd_mapping(pmd_t *pmdp,
|
|
|
|
uintptr_t va, phys_addr_t pa,
|
|
|
|
phys_addr_t sz, pgprot_t prot)
|
|
|
|
{
|
|
|
|
pte_t *ptep;
|
|
|
|
phys_addr_t pte_phys;
|
2020-06-09 12:33:10 +08:00
|
|
|
uintptr_t pmd_idx = pmd_index(va);
|
2019-06-29 04:36:21 +08:00
|
|
|
|
|
|
|
if (sz == PMD_SIZE) {
|
2020-06-09 12:33:10 +08:00
|
|
|
if (pmd_none(pmdp[pmd_idx]))
|
|
|
|
pmdp[pmd_idx] = pfn_pmd(PFN_DOWN(pa), prot);
|
2019-06-29 04:36:21 +08:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2020-06-09 12:33:10 +08:00
|
|
|
if (pmd_none(pmdp[pmd_idx])) {
|
2019-06-29 04:36:21 +08:00
|
|
|
pte_phys = alloc_pte(va);
|
2020-06-09 12:33:10 +08:00
|
|
|
pmdp[pmd_idx] = pfn_pmd(PFN_DOWN(pte_phys), PAGE_TABLE);
|
2019-06-29 04:36:21 +08:00
|
|
|
ptep = get_pte_virt(pte_phys);
|
|
|
|
memset(ptep, 0, PAGE_SIZE);
|
|
|
|
} else {
|
2020-06-09 12:33:10 +08:00
|
|
|
pte_phys = PFN_PHYS(_pmd_pfn(pmdp[pmd_idx]));
|
2019-06-29 04:36:21 +08:00
|
|
|
ptep = get_pte_virt(pte_phys);
|
|
|
|
}
|
|
|
|
|
|
|
|
create_pte_mapping(ptep, va, pa, sz, prot);
|
|
|
|
}
|
|
|
|
|
|
|
|
#define pgd_next_t pmd_t
|
|
|
|
#define alloc_pgd_next(__va) alloc_pmd(__va)
|
|
|
|
#define get_pgd_next_virt(__pa) get_pmd_virt(__pa)
|
|
|
|
#define create_pgd_next_mapping(__nextp, __va, __pa, __sz, __prot) \
|
|
|
|
create_pmd_mapping(__nextp, __va, __pa, __sz, __prot)
|
|
|
|
#define fixmap_pgd_next fixmap_pmd
|
|
|
|
#else
|
|
|
|
#define pgd_next_t pte_t
|
|
|
|
#define alloc_pgd_next(__va) alloc_pte(__va)
|
|
|
|
#define get_pgd_next_virt(__pa) get_pte_virt(__pa)
|
|
|
|
#define create_pgd_next_mapping(__nextp, __va, __pa, __sz, __prot) \
|
|
|
|
create_pte_mapping(__nextp, __va, __pa, __sz, __prot)
|
|
|
|
#define fixmap_pgd_next fixmap_pte
|
|
|
|
#endif
|
|
|
|
|
|
|
|
static void __init create_pgd_mapping(pgd_t *pgdp,
|
|
|
|
uintptr_t va, phys_addr_t pa,
|
|
|
|
phys_addr_t sz, pgprot_t prot)
|
|
|
|
{
|
|
|
|
pgd_next_t *nextp;
|
|
|
|
phys_addr_t next_phys;
|
2020-06-09 12:33:10 +08:00
|
|
|
uintptr_t pgd_idx = pgd_index(va);
|
2019-06-29 04:36:21 +08:00
|
|
|
|
|
|
|
if (sz == PGDIR_SIZE) {
|
2020-06-09 12:33:10 +08:00
|
|
|
if (pgd_val(pgdp[pgd_idx]) == 0)
|
|
|
|
pgdp[pgd_idx] = pfn_pgd(PFN_DOWN(pa), prot);
|
2019-06-29 04:36:21 +08:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2020-06-09 12:33:10 +08:00
|
|
|
if (pgd_val(pgdp[pgd_idx]) == 0) {
|
2019-06-29 04:36:21 +08:00
|
|
|
next_phys = alloc_pgd_next(va);
|
2020-06-09 12:33:10 +08:00
|
|
|
pgdp[pgd_idx] = pfn_pgd(PFN_DOWN(next_phys), PAGE_TABLE);
|
2019-06-29 04:36:21 +08:00
|
|
|
nextp = get_pgd_next_virt(next_phys);
|
|
|
|
memset(nextp, 0, PAGE_SIZE);
|
|
|
|
} else {
|
2020-06-09 12:33:10 +08:00
|
|
|
next_phys = PFN_PHYS(_pgd_pfn(pgdp[pgd_idx]));
|
2019-06-29 04:36:21 +08:00
|
|
|
nextp = get_pgd_next_virt(next_phys);
|
|
|
|
}
|
|
|
|
|
|
|
|
create_pgd_next_mapping(nextp, va, pa, sz, prot);
|
|
|
|
}
|
|
|
|
|
|
|
|
static uintptr_t __init best_map_size(phys_addr_t base, phys_addr_t size)
|
|
|
|
{
|
2019-11-08 17:00:40 +08:00
|
|
|
/* Upgrade to PMD_SIZE mappings whenever possible */
|
|
|
|
if ((base & (PMD_SIZE - 1)) || (size & (PMD_SIZE - 1)))
|
|
|
|
return PAGE_SIZE;
|
2019-06-29 04:36:21 +08:00
|
|
|
|
2019-11-08 17:00:40 +08:00
|
|
|
return PMD_SIZE;
|
2019-06-29 04:36:21 +08:00
|
|
|
}
|
|
|
|
|
2019-03-26 16:03:47 +08:00
|
|
|
/*
|
|
|
|
* setup_vm() is called from head.S with MMU-off.
|
|
|
|
*
|
|
|
|
* Following requirements should be honoured for setup_vm() to work
|
|
|
|
* correctly:
|
|
|
|
* 1) It should use PC-relative addressing for accessing kernel symbols.
|
|
|
|
* To achieve this we always use GCC cmodel=medany.
|
|
|
|
* 2) The compiler instrumentation for FTRACE will not work for setup_vm()
|
|
|
|
* so disable compiler instrumentation when FTRACE is enabled.
|
|
|
|
*
|
|
|
|
* Currently, the above requirements are honoured by using custom CFLAGS
|
|
|
|
* for init.o in mm/Makefile.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#ifndef __riscv_cmodel_medany
|
2019-10-18 05:45:58 +08:00
|
|
|
#error "setup_vm() is called from head.S before relocate so it should not use absolute addressing."
|
2019-03-26 16:03:47 +08:00
|
|
|
#endif
|
|
|
|
|
2019-06-29 04:36:21 +08:00
|
|
|
asmlinkage void __init setup_vm(uintptr_t dtb_pa)
|
2019-02-13 19:08:36 +08:00
|
|
|
{
|
2019-06-29 04:36:21 +08:00
|
|
|
uintptr_t va, end_va;
|
|
|
|
uintptr_t load_pa = (uintptr_t)(&_start);
|
|
|
|
uintptr_t load_sz = (uintptr_t)(&_end) - load_pa;
|
|
|
|
uintptr_t map_size = best_map_size(load_pa, MAX_EARLY_MAPPING_SIZE);
|
|
|
|
|
|
|
|
va_pa_offset = PAGE_OFFSET - load_pa;
|
|
|
|
pfn_base = PFN_DOWN(load_pa);
|
2019-02-13 19:08:36 +08:00
|
|
|
|
2019-06-29 04:36:21 +08:00
|
|
|
/*
|
|
|
|
* Enforce boot alignment requirements of RV32 and
|
|
|
|
* RV64 by only allowing PMD or PGD mappings.
|
|
|
|
*/
|
|
|
|
BUG_ON(map_size == PAGE_SIZE);
|
2019-02-13 19:08:36 +08:00
|
|
|
|
|
|
|
/* Sanity check alignment and size */
|
|
|
|
BUG_ON((PAGE_OFFSET % PGDIR_SIZE) != 0);
|
2019-06-29 04:36:21 +08:00
|
|
|
BUG_ON((load_pa % map_size) != 0);
|
|
|
|
BUG_ON(load_sz > MAX_EARLY_MAPPING_SIZE);
|
|
|
|
|
|
|
|
/* Setup early PGD for fixmap */
|
|
|
|
create_pgd_mapping(early_pg_dir, FIXADDR_START,
|
|
|
|
(uintptr_t)fixmap_pgd_next, PGDIR_SIZE, PAGE_TABLE);
|
2019-02-13 19:08:36 +08:00
|
|
|
|
|
|
|
#ifndef __PAGETABLE_PMD_FOLDED
|
2019-06-29 04:36:21 +08:00
|
|
|
/* Setup fixmap PMD */
|
|
|
|
create_pmd_mapping(fixmap_pmd, FIXADDR_START,
|
|
|
|
(uintptr_t)fixmap_pte, PMD_SIZE, PAGE_TABLE);
|
|
|
|
/* Setup trampoline PGD and PMD */
|
|
|
|
create_pgd_mapping(trampoline_pg_dir, PAGE_OFFSET,
|
|
|
|
(uintptr_t)trampoline_pmd, PGDIR_SIZE, PAGE_TABLE);
|
|
|
|
create_pmd_mapping(trampoline_pmd, PAGE_OFFSET,
|
|
|
|
load_pa, PMD_SIZE, PAGE_KERNEL_EXEC);
|
|
|
|
#else
|
|
|
|
/* Setup trampoline PGD */
|
|
|
|
create_pgd_mapping(trampoline_pg_dir, PAGE_OFFSET,
|
|
|
|
load_pa, PGDIR_SIZE, PAGE_KERNEL_EXEC);
|
|
|
|
#endif
|
2019-02-13 19:08:36 +08:00
|
|
|
|
2019-06-29 04:36:21 +08:00
|
|
|
/*
|
|
|
|
* Setup early PGD covering entire kernel which will allows
|
|
|
|
* us to reach paging_init(). We map all memory banks later
|
|
|
|
* in setup_vm_final() below.
|
|
|
|
*/
|
|
|
|
end_va = PAGE_OFFSET + load_sz;
|
|
|
|
for (va = PAGE_OFFSET; va < end_va; va += map_size)
|
|
|
|
create_pgd_mapping(early_pg_dir, va,
|
|
|
|
load_pa + (va - PAGE_OFFSET),
|
|
|
|
map_size, PAGE_KERNEL_EXEC);
|
|
|
|
|
|
|
|
/* Create fixed mapping for early FDT parsing */
|
|
|
|
end_va = __fix_to_virt(FIX_FDT) + FIX_FDT_SIZE;
|
|
|
|
for (va = __fix_to_virt(FIX_FDT); va < end_va; va += PAGE_SIZE)
|
|
|
|
create_pte_mapping(fixmap_pte, va,
|
|
|
|
dtb_pa + (va - __fix_to_virt(FIX_FDT)),
|
|
|
|
PAGE_SIZE, PAGE_KERNEL);
|
|
|
|
|
|
|
|
/* Save pointer to DTB for early FDT parsing */
|
|
|
|
dtb_early_va = (void *)fix_to_virt(FIX_FDT) + (dtb_pa & ~PAGE_MASK);
|
riscv: Fix memblock reservation for device tree blob
This fixes an error with how the FDT blob is reserved in memblock.
An incorrect physical address calculation exposed the FDT header to
unintended corruption, which typically manifested with of_fdt_raw_init()
faulting during late boot after fdt_totalsize() returned a wrong value.
Systems with smaller physical memory sizes more frequently trigger this
issue, as the kernel is more likely to allocate from the DMA32 zone
where bbl places the DTB after the kernel image.
Commit 671f9a3e2e24 ("RISC-V: Setup initial page tables in two stages")
changed the mapping of the DTB to reside in the fixmap area.
Consequently, early_init_fdt_reserve_self() cannot be used anymore in
setup_bootmem() since it relies on __pa() to derive a physical address,
which does not work with dtb_early_va that is no longer a valid kernel
logical address.
The reserved[0x1] region shows the effect of the pointer underflow
resulting from the __pa(initial_boot_params) offset subtraction:
[ 0.000000] MEMBLOCK configuration:
[ 0.000000] memory size = 0x000000001fe00000 reserved size = 0x0000000000a2e514
[ 0.000000] memory.cnt = 0x1
[ 0.000000] memory[0x0] [0x0000000080200000-0x000000009fffffff], 0x000000001fe00000 bytes flags: 0x0
[ 0.000000] reserved.cnt = 0x2
[ 0.000000] reserved[0x0] [0x0000000080200000-0x0000000080c2dfeb], 0x0000000000a2dfec bytes flags: 0x0
[ 0.000000] reserved[0x1] [0xfffffff080100000-0xfffffff080100527], 0x0000000000000528 bytes flags: 0x0
With the fix applied:
[ 0.000000] MEMBLOCK configuration:
[ 0.000000] memory size = 0x000000001fe00000 reserved size = 0x0000000000a2e514
[ 0.000000] memory.cnt = 0x1
[ 0.000000] memory[0x0] [0x0000000080200000-0x000000009fffffff], 0x000000001fe00000 bytes flags: 0x0
[ 0.000000] reserved.cnt = 0x2
[ 0.000000] reserved[0x0] [0x0000000080200000-0x0000000080c2dfeb], 0x0000000000a2dfec bytes flags: 0x0
[ 0.000000] reserved[0x1] [0x0000000080e00000-0x0000000080e00527], 0x0000000000000528 bytes flags: 0x0
Fixes: 671f9a3e2e24 ("RISC-V: Setup initial page tables in two stages")
Signed-off-by: Albert Ou <aou@eecs.berkeley.edu>
Tested-by: Bin Meng <bmeng.cn@gmail.com>
Reviewed-by: Anup Patel <anup@brainfault.org>
Signed-off-by: Paul Walmsley <paul.walmsley@sifive.com>
2019-09-28 07:14:18 +08:00
|
|
|
/* Save physical address for memblock reservation */
|
|
|
|
dtb_early_pa = dtb_pa;
|
2019-06-29 04:36:21 +08:00
|
|
|
}
|
2019-01-07 23:27:01 +08:00
|
|
|
|
2019-06-29 04:36:21 +08:00
|
|
|
static void __init setup_vm_final(void)
|
|
|
|
{
|
|
|
|
uintptr_t va, map_size;
|
|
|
|
phys_addr_t pa, start, end;
|
|
|
|
struct memblock_region *reg;
|
|
|
|
|
|
|
|
/* Set mmu_enabled flag */
|
|
|
|
mmu_enabled = true;
|
2019-02-13 19:08:36 +08:00
|
|
|
|
2019-06-29 04:36:21 +08:00
|
|
|
/* Setup swapper PGD for fixmap */
|
|
|
|
create_pgd_mapping(swapper_pg_dir, FIXADDR_START,
|
2020-01-02 11:12:40 +08:00
|
|
|
__pa_symbol(fixmap_pgd_next),
|
2019-06-29 04:36:21 +08:00
|
|
|
PGDIR_SIZE, PAGE_TABLE);
|
2019-01-07 23:27:01 +08:00
|
|
|
|
2019-06-29 04:36:21 +08:00
|
|
|
/* Map all memory banks */
|
|
|
|
for_each_memblock(memory, reg) {
|
|
|
|
start = reg->base;
|
|
|
|
end = start + reg->size;
|
|
|
|
|
|
|
|
if (start >= end)
|
|
|
|
break;
|
|
|
|
if (memblock_is_nomap(reg))
|
|
|
|
continue;
|
|
|
|
if (start <= __pa(PAGE_OFFSET) &&
|
|
|
|
__pa(PAGE_OFFSET) < end)
|
|
|
|
start = __pa(PAGE_OFFSET);
|
|
|
|
|
|
|
|
map_size = best_map_size(start, end - start);
|
|
|
|
for (pa = start; pa < end; pa += map_size) {
|
|
|
|
va = (uintptr_t)__va(pa);
|
|
|
|
create_pgd_mapping(swapper_pg_dir, va, pa,
|
|
|
|
map_size, PAGE_KERNEL_EXEC);
|
|
|
|
}
|
2019-02-13 19:08:36 +08:00
|
|
|
}
|
2019-01-07 23:27:01 +08:00
|
|
|
|
2019-06-29 04:36:21 +08:00
|
|
|
/* Clear fixmap PTE and PMD mappings */
|
|
|
|
clear_fixmap(FIX_PTE);
|
|
|
|
clear_fixmap(FIX_PMD);
|
|
|
|
|
|
|
|
/* Move to swapper page table */
|
2020-01-02 11:12:40 +08:00
|
|
|
csr_write(CSR_SATP, PFN_DOWN(__pa_symbol(swapper_pg_dir)) | SATP_MODE);
|
2019-06-29 04:36:21 +08:00
|
|
|
local_flush_tlb_all();
|
|
|
|
}
|
2019-10-28 20:10:41 +08:00
|
|
|
#else
|
|
|
|
asmlinkage void __init setup_vm(uintptr_t dtb_pa)
|
|
|
|
{
|
2020-04-14 12:43:24 +08:00
|
|
|
#ifdef CONFIG_BUILTIN_DTB
|
|
|
|
dtb_early_va = soc_lookup_builtin_dtb();
|
|
|
|
if (!dtb_early_va) {
|
|
|
|
/* Fallback to first available DTS */
|
|
|
|
dtb_early_va = (void *) __dtb_start;
|
|
|
|
}
|
|
|
|
#else
|
2019-10-28 20:10:41 +08:00
|
|
|
dtb_early_va = (void *)dtb_pa;
|
2020-04-14 12:43:24 +08:00
|
|
|
#endif
|
2020-10-02 03:04:56 +08:00
|
|
|
dtb_early_pa = dtb_pa;
|
2019-10-28 20:10:41 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static inline void setup_vm_final(void)
|
|
|
|
{
|
|
|
|
}
|
|
|
|
#endif /* CONFIG_MMU */
|
2019-06-29 04:36:21 +08:00
|
|
|
|
2020-03-10 00:55:41 +08:00
|
|
|
#ifdef CONFIG_STRICT_KERNEL_RWX
|
|
|
|
void mark_rodata_ro(void)
|
|
|
|
{
|
|
|
|
unsigned long text_start = (unsigned long)_text;
|
|
|
|
unsigned long text_end = (unsigned long)_etext;
|
|
|
|
unsigned long rodata_start = (unsigned long)__start_rodata;
|
|
|
|
unsigned long data_start = (unsigned long)_data;
|
|
|
|
unsigned long max_low = (unsigned long)(__va(PFN_PHYS(max_low_pfn)));
|
|
|
|
|
|
|
|
set_memory_ro(text_start, (text_end - text_start) >> PAGE_SHIFT);
|
|
|
|
set_memory_ro(rodata_start, (data_start - rodata_start) >> PAGE_SHIFT);
|
|
|
|
set_memory_nx(rodata_start, (data_start - rodata_start) >> PAGE_SHIFT);
|
|
|
|
set_memory_nx(data_start, (max_low - data_start) >> PAGE_SHIFT);
|
2020-06-04 07:03:55 +08:00
|
|
|
|
|
|
|
debug_checkwx();
|
2020-03-10 00:55:41 +08:00
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2020-07-16 14:15:26 +08:00
|
|
|
static void __init resource_init(void)
|
2020-06-16 15:45:46 +08:00
|
|
|
{
|
|
|
|
struct memblock_region *region;
|
|
|
|
|
|
|
|
for_each_memblock(memory, region) {
|
|
|
|
struct resource *res;
|
|
|
|
|
|
|
|
res = memblock_alloc(sizeof(struct resource), SMP_CACHE_BYTES);
|
|
|
|
if (!res)
|
|
|
|
panic("%s: Failed to allocate %zu bytes\n", __func__,
|
|
|
|
sizeof(struct resource));
|
|
|
|
|
|
|
|
if (memblock_is_nomap(region)) {
|
|
|
|
res->name = "reserved";
|
|
|
|
res->flags = IORESOURCE_MEM;
|
|
|
|
} else {
|
|
|
|
res->name = "System RAM";
|
|
|
|
res->flags = IORESOURCE_SYSTEM_RAM | IORESOURCE_BUSY;
|
|
|
|
}
|
|
|
|
res->start = __pfn_to_phys(memblock_region_memory_base_pfn(region));
|
|
|
|
res->end = __pfn_to_phys(memblock_region_memory_end_pfn(region)) - 1;
|
|
|
|
|
|
|
|
request_resource(&iomem_resource, res);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-06-29 04:36:21 +08:00
|
|
|
void __init paging_init(void)
|
|
|
|
{
|
|
|
|
setup_vm_final();
|
2019-08-29 05:40:54 +08:00
|
|
|
sparse_init();
|
2019-06-29 04:36:21 +08:00
|
|
|
setup_zero_page();
|
|
|
|
zone_sizes_init();
|
2020-06-16 15:45:46 +08:00
|
|
|
resource_init();
|
2019-02-13 19:08:36 +08:00
|
|
|
}
|
2019-08-29 05:40:54 +08:00
|
|
|
|
2019-10-23 11:23:02 +08:00
|
|
|
#ifdef CONFIG_SPARSEMEM_VMEMMAP
|
2019-08-29 05:40:54 +08:00
|
|
|
int __meminit vmemmap_populate(unsigned long start, unsigned long end, int node,
|
|
|
|
struct vmem_altmap *altmap)
|
|
|
|
{
|
2020-08-07 14:23:19 +08:00
|
|
|
return vmemmap_populate_basepages(start, end, node, NULL);
|
2019-08-29 05:40:54 +08:00
|
|
|
}
|
|
|
|
#endif
|