blob: bb9179084217bf34ab75fb8cf22a8b20cdb39bf4 [file] [log] [blame]
Catalin Marinasc1cc1552012-03-05 11:49:27 +00001/*
2 * Based on arch/arm/mm/mmu.c
3 *
4 * Copyright (C) 1995-2005 Russell King
5 * Copyright (C) 2012 ARM Ltd.
6 *
7 * This program is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU General Public License version 2 as
9 * published by the Free Software Foundation.
10 *
11 * This program is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 * GNU General Public License for more details.
15 *
16 * You should have received a copy of the GNU General Public License
17 * along with this program. If not, see <http://www.gnu.org/licenses/>.
18 */
19
Jisheng Zhang5a9e3e12016-08-15 14:45:46 +080020#include <linux/cache.h>
Catalin Marinasc1cc1552012-03-05 11:49:27 +000021#include <linux/export.h>
22#include <linux/kernel.h>
23#include <linux/errno.h>
24#include <linux/init.h>
Ard Biesheuvel61bd93c2015-06-01 13:40:32 +020025#include <linux/libfdt.h>
Catalin Marinasc1cc1552012-03-05 11:49:27 +000026#include <linux/mman.h>
27#include <linux/nodemask.h>
28#include <linux/memblock.h>
29#include <linux/fs.h>
Catalin Marinas2475ff92012-10-23 14:55:08 +010030#include <linux/io.h>
Laura Abbott2077be62017-01-10 13:35:49 -080031#include <linux/mm.h>
Catalin Marinasc1cc1552012-03-05 11:49:27 +000032
Mark Rutland21ab99c2016-01-25 11:44:56 +000033#include <asm/barrier.h>
Catalin Marinasc1cc1552012-03-05 11:49:27 +000034#include <asm/cputype.h>
Laura Abbottaf86e592014-11-21 21:50:42 +000035#include <asm/fixmap.h>
Mark Rutland068a17a2016-01-25 11:45:12 +000036#include <asm/kasan.h>
Suzuki K. Pouloseb433dce2015-10-19 14:19:28 +010037#include <asm/kernel-pgtable.h>
Catalin Marinasc1cc1552012-03-05 11:49:27 +000038#include <asm/sections.h>
39#include <asm/setup.h>
40#include <asm/sizes.h>
41#include <asm/tlb.h>
Jungseok Leec79b9542014-05-12 18:40:51 +090042#include <asm/memblock.h>
Catalin Marinasc1cc1552012-03-05 11:49:27 +000043#include <asm/mmu_context.h>
Laura Abbott1404d6f2016-10-27 09:27:34 -070044#include <asm/ptdump.h>
Catalin Marinasc1cc1552012-03-05 11:49:27 +000045
Ard Biesheuveldd006da2015-03-19 16:42:27 +000046u64 idmap_t0sz = TCR_T0SZ(VA_BITS);
47
Jisheng Zhang5a9e3e12016-08-15 14:45:46 +080048u64 kimage_voffset __ro_after_init;
Ard Biesheuvela7f8de12016-02-16 13:52:42 +010049EXPORT_SYMBOL(kimage_voffset);
50
Catalin Marinasc1cc1552012-03-05 11:49:27 +000051/*
52 * Empty_zero_page is a special page that is used for zero-initialized data
53 * and COW.
54 */
Mark Rutland5227cfa2016-01-25 11:44:57 +000055unsigned long empty_zero_page[PAGE_SIZE / sizeof(unsigned long)] __page_aligned_bss;
Catalin Marinasc1cc1552012-03-05 11:49:27 +000056EXPORT_SYMBOL(empty_zero_page);
57
Ard Biesheuvelf9040772016-02-16 13:52:40 +010058static pte_t bm_pte[PTRS_PER_PTE] __page_aligned_bss;
59static pmd_t bm_pmd[PTRS_PER_PMD] __page_aligned_bss __maybe_unused;
60static pud_t bm_pud[PTRS_PER_PUD] __page_aligned_bss __maybe_unused;
61
Catalin Marinasc1cc1552012-03-05 11:49:27 +000062pgprot_t phys_mem_access_prot(struct file *file, unsigned long pfn,
63 unsigned long size, pgprot_t vma_prot)
64{
65 if (!pfn_valid(pfn))
66 return pgprot_noncached(vma_prot);
67 else if (file->f_flags & O_SYNC)
68 return pgprot_writecombine(vma_prot);
69 return vma_prot;
70}
71EXPORT_SYMBOL(phys_mem_access_prot);
72
Mark Rutlandf4710442016-01-25 11:45:08 +000073static phys_addr_t __init early_pgtable_alloc(void)
Catalin Marinasc1cc1552012-03-05 11:49:27 +000074{
Suzuki K. Poulose71423922015-11-20 17:45:40 +000075 phys_addr_t phys;
76 void *ptr;
77
Mark Rutland21ab99c2016-01-25 11:44:56 +000078 phys = memblock_alloc(PAGE_SIZE, PAGE_SIZE);
Mark Rutlandf4710442016-01-25 11:45:08 +000079
80 /*
81 * The FIX_{PGD,PUD,PMD} slots may be in active use, but the FIX_PTE
82 * slot will be free, so we can (ab)use the FIX_PTE slot to initialise
83 * any level of table.
84 */
85 ptr = pte_set_fixmap(phys);
86
Mark Rutland21ab99c2016-01-25 11:44:56 +000087 memset(ptr, 0, PAGE_SIZE);
88
Mark Rutlandf4710442016-01-25 11:45:08 +000089 /*
90 * Implicit barriers also ensure the zeroed page is visible to the page
91 * table walker
92 */
93 pte_clear_fixmap();
94
95 return phys;
Catalin Marinasc1cc1552012-03-05 11:49:27 +000096}
97
Ard Biesheuvele98216b2016-10-21 12:22:56 +010098static bool pgattr_change_is_safe(u64 old, u64 new)
99{
100 /*
101 * The following mapping attributes may be updated in live
102 * kernel mappings without the need for break-before-make.
103 */
104 static const pteval_t mask = PTE_PXN | PTE_RDONLY | PTE_WRITE;
105
106 return old == 0 || new == 0 || ((old ^ new) & ~mask) == 0;
107}
108
Laura Abbottda141702015-01-21 17:36:06 -0800109static void alloc_init_pte(pmd_t *pmd, unsigned long addr,
Ard Biesheuvele393cf42017-03-09 21:52:04 +0100110 unsigned long end, phys_addr_t phys,
Laura Abbottda141702015-01-21 17:36:06 -0800111 pgprot_t prot,
Mark Rutlandd81bbe62017-02-23 16:22:55 +0000112 phys_addr_t (*pgtable_alloc)(void))
Catalin Marinasc1cc1552012-03-05 11:49:27 +0000113{
114 pte_t *pte;
115
Catalin Marinas4133af62016-06-29 14:51:29 +0200116 BUG_ON(pmd_sect(*pmd));
117 if (pmd_none(*pmd)) {
Laura Abbott132233a2016-02-05 16:24:46 -0800118 phys_addr_t pte_phys;
119 BUG_ON(!pgtable_alloc);
120 pte_phys = pgtable_alloc();
Mark Rutlandf4710442016-01-25 11:45:08 +0000121 pte = pte_set_fixmap(pte_phys);
Mark Rutlandf4710442016-01-25 11:45:08 +0000122 __pmd_populate(pmd, pte_phys, PMD_TYPE_TABLE);
Mark Rutlandf4710442016-01-25 11:45:08 +0000123 pte_clear_fixmap();
Catalin Marinasc1cc1552012-03-05 11:49:27 +0000124 }
Mark Rutlanda1c76572015-01-27 16:36:30 +0000125 BUG_ON(pmd_bad(*pmd));
Catalin Marinasc1cc1552012-03-05 11:49:27 +0000126
Mark Rutlandf4710442016-01-25 11:45:08 +0000127 pte = pte_set_fixmap_offset(pmd, addr);
Catalin Marinasc1cc1552012-03-05 11:49:27 +0000128 do {
Ard Biesheuvele98216b2016-10-21 12:22:56 +0100129 pte_t old_pte = *pte;
130
Ard Biesheuvele393cf42017-03-09 21:52:04 +0100131 set_pte(pte, pfn_pte(__phys_to_pfn(phys), prot));
Ard Biesheuvele98216b2016-10-21 12:22:56 +0100132
133 /*
134 * After the PTE entry has been populated once, we
135 * only allow updates to the permission attributes.
136 */
137 BUG_ON(!pgattr_change_is_safe(pte_val(old_pte), pte_val(*pte)));
138
Ard Biesheuvele393cf42017-03-09 21:52:04 +0100139 phys += PAGE_SIZE;
Catalin Marinas667c2752015-11-26 15:42:41 +0000140 } while (pte++, addr += PAGE_SIZE, addr != end);
Mark Rutlandf4710442016-01-25 11:45:08 +0000141
142 pte_clear_fixmap();
Catalin Marinasc1cc1552012-03-05 11:49:27 +0000143}
144
Mark Rutland11509a32016-01-25 11:45:10 +0000145static void alloc_init_pmd(pud_t *pud, unsigned long addr, unsigned long end,
Laura Abbottda141702015-01-21 17:36:06 -0800146 phys_addr_t phys, pgprot_t prot,
Ard Biesheuvel53e1b322016-06-29 14:51:26 +0200147 phys_addr_t (*pgtable_alloc)(void),
Ard Biesheuvelf14c66c2016-10-21 12:22:57 +0100148 bool page_mappings_only)
Catalin Marinasc1cc1552012-03-05 11:49:27 +0000149{
150 pmd_t *pmd;
151 unsigned long next;
152
153 /*
154 * Check for initial section mappings in the pgd/pud and remove them.
155 */
Catalin Marinas4133af62016-06-29 14:51:29 +0200156 BUG_ON(pud_sect(*pud));
157 if (pud_none(*pud)) {
Laura Abbott132233a2016-02-05 16:24:46 -0800158 phys_addr_t pmd_phys;
159 BUG_ON(!pgtable_alloc);
160 pmd_phys = pgtable_alloc();
Mark Rutlandf4710442016-01-25 11:45:08 +0000161 pmd = pmd_set_fixmap(pmd_phys);
Mark Rutlandf4710442016-01-25 11:45:08 +0000162 __pud_populate(pud, pmd_phys, PUD_TYPE_TABLE);
Mark Rutlandf4710442016-01-25 11:45:08 +0000163 pmd_clear_fixmap();
Catalin Marinasc1cc1552012-03-05 11:49:27 +0000164 }
Mark Rutlanda1c76572015-01-27 16:36:30 +0000165 BUG_ON(pud_bad(*pud));
Catalin Marinasc1cc1552012-03-05 11:49:27 +0000166
Mark Rutlandf4710442016-01-25 11:45:08 +0000167 pmd = pmd_set_fixmap_offset(pud, addr);
Catalin Marinasc1cc1552012-03-05 11:49:27 +0000168 do {
Ard Biesheuvele98216b2016-10-21 12:22:56 +0100169 pmd_t old_pmd = *pmd;
170
Catalin Marinasc1cc1552012-03-05 11:49:27 +0000171 next = pmd_addr_end(addr, end);
Ard Biesheuvele98216b2016-10-21 12:22:56 +0100172
Catalin Marinasc1cc1552012-03-05 11:49:27 +0000173 /* try section mapping first */
Laura Abbott83863f22016-02-05 16:24:47 -0800174 if (((addr | next | phys) & ~SECTION_MASK) == 0 &&
Ard Biesheuvelf14c66c2016-10-21 12:22:57 +0100175 !page_mappings_only) {
Mark Rutlandd81bbe62017-02-23 16:22:55 +0000176 pmd_set_huge(pmd, phys, prot);
Ard Biesheuvele98216b2016-10-21 12:22:56 +0100177
Catalin Marinasa55f9922014-02-04 16:01:31 +0000178 /*
Ard Biesheuvele98216b2016-10-21 12:22:56 +0100179 * After the PMD entry has been populated once, we
180 * only allow updates to the permission attributes.
Catalin Marinasa55f9922014-02-04 16:01:31 +0000181 */
Ard Biesheuvele98216b2016-10-21 12:22:56 +0100182 BUG_ON(!pgattr_change_is_safe(pmd_val(old_pmd),
183 pmd_val(*pmd)));
Catalin Marinasa55f9922014-02-04 16:01:31 +0000184 } else {
Ard Biesheuvele393cf42017-03-09 21:52:04 +0100185 alloc_init_pte(pmd, addr, next, phys,
Mark Rutlandd81bbe62017-02-23 16:22:55 +0000186 prot, pgtable_alloc);
Ard Biesheuvele98216b2016-10-21 12:22:56 +0100187
188 BUG_ON(pmd_val(old_pmd) != 0 &&
189 pmd_val(old_pmd) != pmd_val(*pmd));
Catalin Marinasa55f9922014-02-04 16:01:31 +0000190 }
Catalin Marinasc1cc1552012-03-05 11:49:27 +0000191 phys += next - addr;
192 } while (pmd++, addr = next, addr != end);
Mark Rutlandf4710442016-01-25 11:45:08 +0000193
194 pmd_clear_fixmap();
Catalin Marinasc1cc1552012-03-05 11:49:27 +0000195}
196
Laura Abbottda141702015-01-21 17:36:06 -0800197static inline bool use_1G_block(unsigned long addr, unsigned long next,
198 unsigned long phys)
199{
200 if (PAGE_SHIFT != 12)
201 return false;
202
203 if (((addr | next | phys) & ~PUD_MASK) != 0)
204 return false;
205
206 return true;
207}
208
Mark Rutland11509a32016-01-25 11:45:10 +0000209static void alloc_init_pud(pgd_t *pgd, unsigned long addr, unsigned long end,
Laura Abbottda141702015-01-21 17:36:06 -0800210 phys_addr_t phys, pgprot_t prot,
Ard Biesheuvel53e1b322016-06-29 14:51:26 +0200211 phys_addr_t (*pgtable_alloc)(void),
Ard Biesheuvelf14c66c2016-10-21 12:22:57 +0100212 bool page_mappings_only)
Catalin Marinasc1cc1552012-03-05 11:49:27 +0000213{
Jungseok Leec79b9542014-05-12 18:40:51 +0900214 pud_t *pud;
Catalin Marinasc1cc1552012-03-05 11:49:27 +0000215 unsigned long next;
216
Jungseok Leec79b9542014-05-12 18:40:51 +0900217 if (pgd_none(*pgd)) {
Laura Abbott132233a2016-02-05 16:24:46 -0800218 phys_addr_t pud_phys;
219 BUG_ON(!pgtable_alloc);
220 pud_phys = pgtable_alloc();
Mark Rutlandf4710442016-01-25 11:45:08 +0000221 __pgd_populate(pgd, pud_phys, PUD_TYPE_TABLE);
Jungseok Leec79b9542014-05-12 18:40:51 +0900222 }
223 BUG_ON(pgd_bad(*pgd));
224
Mark Rutlandf4710442016-01-25 11:45:08 +0000225 pud = pud_set_fixmap_offset(pgd, addr);
Catalin Marinasc1cc1552012-03-05 11:49:27 +0000226 do {
Ard Biesheuvele98216b2016-10-21 12:22:56 +0100227 pud_t old_pud = *pud;
228
Catalin Marinasc1cc1552012-03-05 11:49:27 +0000229 next = pud_addr_end(addr, end);
Steve Capper206a2a72014-05-06 14:02:27 +0100230
231 /*
232 * For 4K granule only, attempt to put down a 1GB block
233 */
Ard Biesheuvelf14c66c2016-10-21 12:22:57 +0100234 if (use_1G_block(addr, next, phys) && !page_mappings_only) {
Mark Rutlandc661cb12016-03-22 10:11:45 +0000235 pud_set_huge(pud, phys, prot);
Steve Capper206a2a72014-05-06 14:02:27 +0100236
237 /*
Ard Biesheuvele98216b2016-10-21 12:22:56 +0100238 * After the PUD entry has been populated once, we
239 * only allow updates to the permission attributes.
Steve Capper206a2a72014-05-06 14:02:27 +0100240 */
Ard Biesheuvele98216b2016-10-21 12:22:56 +0100241 BUG_ON(!pgattr_change_is_safe(pud_val(old_pud),
242 pud_val(*pud)));
Steve Capper206a2a72014-05-06 14:02:27 +0100243 } else {
Mark Rutland11509a32016-01-25 11:45:10 +0000244 alloc_init_pmd(pud, addr, next, phys, prot,
Ard Biesheuvelf14c66c2016-10-21 12:22:57 +0100245 pgtable_alloc, page_mappings_only);
Ard Biesheuvele98216b2016-10-21 12:22:56 +0100246
247 BUG_ON(pud_val(old_pud) != 0 &&
248 pud_val(old_pud) != pud_val(*pud));
Steve Capper206a2a72014-05-06 14:02:27 +0100249 }
Catalin Marinasc1cc1552012-03-05 11:49:27 +0000250 phys += next - addr;
251 } while (pud++, addr = next, addr != end);
Mark Rutlandf4710442016-01-25 11:45:08 +0000252
253 pud_clear_fixmap();
Catalin Marinasc1cc1552012-03-05 11:49:27 +0000254}
255
Ard Biesheuvel40f87d32016-06-29 14:51:30 +0200256static void __create_pgd_mapping(pgd_t *pgdir, phys_addr_t phys,
257 unsigned long virt, phys_addr_t size,
258 pgprot_t prot,
259 phys_addr_t (*pgtable_alloc)(void),
Ard Biesheuvelf14c66c2016-10-21 12:22:57 +0100260 bool page_mappings_only)
Catalin Marinasc1cc1552012-03-05 11:49:27 +0000261{
262 unsigned long addr, length, end, next;
Ard Biesheuvel40f87d32016-06-29 14:51:30 +0200263 pgd_t *pgd = pgd_offset_raw(pgdir, virt);
Catalin Marinasc1cc1552012-03-05 11:49:27 +0000264
Mark Rutlandcc5d2b32015-11-23 13:26:19 +0000265 /*
266 * If the virtual and physical address don't have the same offset
267 * within a page, we cannot map the region as the caller expects.
268 */
269 if (WARN_ON((phys ^ virt) & ~PAGE_MASK))
270 return;
271
Mark Rutland9c4e08a2015-11-23 13:26:20 +0000272 phys &= PAGE_MASK;
Catalin Marinasc1cc1552012-03-05 11:49:27 +0000273 addr = virt & PAGE_MASK;
274 length = PAGE_ALIGN(size + (virt & ~PAGE_MASK));
275
Catalin Marinasc1cc1552012-03-05 11:49:27 +0000276 end = addr + length;
277 do {
278 next = pgd_addr_end(addr, end);
Ard Biesheuvel53e1b322016-06-29 14:51:26 +0200279 alloc_init_pud(pgd, addr, next, phys, prot, pgtable_alloc,
Ard Biesheuvelf14c66c2016-10-21 12:22:57 +0100280 page_mappings_only);
Catalin Marinasc1cc1552012-03-05 11:49:27 +0000281 phys += next - addr;
282 } while (pgd++, addr = next, addr != end);
283}
284
Ard Biesheuvel1378dc32016-07-22 19:32:25 +0200285static phys_addr_t pgd_pgtable_alloc(void)
Laura Abbottda141702015-01-21 17:36:06 -0800286{
Mark Rutland21ab99c2016-01-25 11:44:56 +0000287 void *ptr = (void *)__get_free_page(PGALLOC_GFP);
Ard Biesheuvel1378dc32016-07-22 19:32:25 +0200288 if (!ptr || !pgtable_page_ctor(virt_to_page(ptr)))
289 BUG();
Mark Rutland21ab99c2016-01-25 11:44:56 +0000290
291 /* Ensure the zeroed page is visible to the page table walker */
292 dsb(ishst);
Mark Rutlandf4710442016-01-25 11:45:08 +0000293 return __pa(ptr);
Laura Abbottda141702015-01-21 17:36:06 -0800294}
295
Laura Abbott132233a2016-02-05 16:24:46 -0800296/*
297 * This function can only be used to modify existing table entries,
298 * without allocating new levels of table. Note that this permits the
299 * creation of new section or page entries.
300 */
301static void __init create_mapping_noalloc(phys_addr_t phys, unsigned long virt,
Laura Abbottda141702015-01-21 17:36:06 -0800302 phys_addr_t size, pgprot_t prot)
Mark Salterd7ecbdd2014-03-12 12:28:06 -0400303{
304 if (virt < VMALLOC_START) {
305 pr_warn("BUG: not creating mapping for %pa at 0x%016lx - outside kernel range\n",
306 &phys, virt);
307 return;
308 }
Ard Biesheuvelf14c66c2016-10-21 12:22:57 +0100309 __create_pgd_mapping(init_mm.pgd, phys, virt, size, prot, NULL, false);
Mark Salterd7ecbdd2014-03-12 12:28:06 -0400310}
311
Ard Biesheuvel8ce837c2014-10-20 15:42:07 +0200312void __init create_pgd_mapping(struct mm_struct *mm, phys_addr_t phys,
313 unsigned long virt, phys_addr_t size,
Ard Biesheuvelf14c66c2016-10-21 12:22:57 +0100314 pgprot_t prot, bool page_mappings_only)
Ard Biesheuvel8ce837c2014-10-20 15:42:07 +0200315{
Ard Biesheuvel1378dc32016-07-22 19:32:25 +0200316 BUG_ON(mm == &init_mm);
317
Mark Rutland11509a32016-01-25 11:45:10 +0000318 __create_pgd_mapping(mm->pgd, phys, virt, size, prot,
Ard Biesheuvelf14c66c2016-10-21 12:22:57 +0100319 pgd_pgtable_alloc, page_mappings_only);
Mark Salterd7ecbdd2014-03-12 12:28:06 -0400320}
321
Ard Biesheuvelaa8c09b2017-03-09 21:52:00 +0100322static void update_mapping_prot(phys_addr_t phys, unsigned long virt,
323 phys_addr_t size, pgprot_t prot)
Laura Abbottda141702015-01-21 17:36:06 -0800324{
325 if (virt < VMALLOC_START) {
Ard Biesheuvelaa8c09b2017-03-09 21:52:00 +0100326 pr_warn("BUG: not updating mapping for %pa at 0x%016lx - outside kernel range\n",
Laura Abbottda141702015-01-21 17:36:06 -0800327 &phys, virt);
328 return;
329 }
330
Mark Rutland11509a32016-01-25 11:45:10 +0000331 __create_pgd_mapping(init_mm.pgd, phys, virt, size, prot,
Ard Biesheuvelf14c66c2016-10-21 12:22:57 +0100332 NULL, debug_pagealloc_enabled());
Ard Biesheuvelaa8c09b2017-03-09 21:52:00 +0100333
334 /* flush the TLBs after updating live kernel mappings */
335 flush_tlb_kernel_range(virt, virt + size);
Laura Abbottda141702015-01-21 17:36:06 -0800336}
337
Mark Rutland068a17a2016-01-25 11:45:12 +0000338static void __init __map_memblock(pgd_t *pgd, phys_addr_t start, phys_addr_t end)
Laura Abbottda141702015-01-21 17:36:06 -0800339{
Miles Cheneac80172017-01-13 13:59:35 +0800340 phys_addr_t kernel_start = __pa_symbol(_text);
341 phys_addr_t kernel_end = __pa_symbol(__init_begin);
Mark Rutland068a17a2016-01-25 11:45:12 +0000342
343 /*
Ard Biesheuvelf9040772016-02-16 13:52:40 +0100344 * Take care not to create a writable alias for the
345 * read-only text and rodata sections of the kernel image.
Mark Rutland068a17a2016-01-25 11:45:12 +0000346 */
347
Ard Biesheuvel9fdc14c52016-06-23 15:53:17 +0200348 /* No overlap with the kernel text/rodata */
Mark Rutland068a17a2016-01-25 11:45:12 +0000349 if (end < kernel_start || start >= kernel_end) {
350 __create_pgd_mapping(pgd, start, __phys_to_virt(start),
351 end - start, PAGE_KERNEL,
Ard Biesheuvel53e1b322016-06-29 14:51:26 +0200352 early_pgtable_alloc,
Ard Biesheuvelf14c66c2016-10-21 12:22:57 +0100353 debug_pagealloc_enabled());
Mark Rutland068a17a2016-01-25 11:45:12 +0000354 return;
Laura Abbottda141702015-01-21 17:36:06 -0800355 }
356
Mark Rutland068a17a2016-01-25 11:45:12 +0000357 /*
Ard Biesheuvel9fdc14c52016-06-23 15:53:17 +0200358 * This block overlaps the kernel text/rodata mappings.
Ard Biesheuvelf9040772016-02-16 13:52:40 +0100359 * Map the portion(s) which don't overlap.
Mark Rutland068a17a2016-01-25 11:45:12 +0000360 */
361 if (start < kernel_start)
362 __create_pgd_mapping(pgd, start,
363 __phys_to_virt(start),
364 kernel_start - start, PAGE_KERNEL,
Ard Biesheuvel53e1b322016-06-29 14:51:26 +0200365 early_pgtable_alloc,
Ard Biesheuvelf14c66c2016-10-21 12:22:57 +0100366 debug_pagealloc_enabled());
Mark Rutland068a17a2016-01-25 11:45:12 +0000367 if (kernel_end < end)
368 __create_pgd_mapping(pgd, kernel_end,
369 __phys_to_virt(kernel_end),
370 end - kernel_end, PAGE_KERNEL,
Ard Biesheuvel53e1b322016-06-29 14:51:26 +0200371 early_pgtable_alloc,
Ard Biesheuvelf14c66c2016-10-21 12:22:57 +0100372 debug_pagealloc_enabled());
Ard Biesheuvelf9040772016-02-16 13:52:40 +0100373
374 /*
Ard Biesheuvel5ea53062017-03-09 21:52:01 +0100375 * Map the linear alias of the [_text, __init_begin) interval
376 * as non-executable now, and remove the write permission in
377 * mark_linear_text_alias_ro() below (which will be called after
378 * alternative patching has completed). This makes the contents
379 * of the region accessible to subsystems such as hibernate,
380 * but protects it from inadvertent modification or execution.
Ard Biesheuvelf9040772016-02-16 13:52:40 +0100381 */
382 __create_pgd_mapping(pgd, kernel_start, __phys_to_virt(kernel_start),
Ard Biesheuvel5ea53062017-03-09 21:52:01 +0100383 kernel_end - kernel_start, PAGE_KERNEL,
Ard Biesheuvelf14c66c2016-10-21 12:22:57 +0100384 early_pgtable_alloc, debug_pagealloc_enabled());
Laura Abbottda141702015-01-21 17:36:06 -0800385}
Laura Abbottda141702015-01-21 17:36:06 -0800386
Ard Biesheuvel5ea53062017-03-09 21:52:01 +0100387void __init mark_linear_text_alias_ro(void)
388{
389 /*
390 * Remove the write permissions from the linear alias of .text/.rodata
391 */
392 update_mapping_prot(__pa_symbol(_text), (unsigned long)lm_alias(_text),
393 (unsigned long)__init_begin - (unsigned long)_text,
394 PAGE_KERNEL_RO);
395}
396
Mark Rutland068a17a2016-01-25 11:45:12 +0000397static void __init map_mem(pgd_t *pgd)
Catalin Marinasc1cc1552012-03-05 11:49:27 +0000398{
399 struct memblock_region *reg;
Steve Capperf6bc87c2013-04-30 11:00:33 +0100400
Catalin Marinasc1cc1552012-03-05 11:49:27 +0000401 /* map all the memory banks */
402 for_each_memblock(memory, reg) {
403 phys_addr_t start = reg->base;
404 phys_addr_t end = start + reg->size;
405
406 if (start >= end)
407 break;
Ard Biesheuvel68709f42015-11-30 13:28:16 +0100408 if (memblock_is_nomap(reg))
409 continue;
Catalin Marinasc1cc1552012-03-05 11:49:27 +0000410
Mark Rutland068a17a2016-01-25 11:45:12 +0000411 __map_memblock(pgd, start, end);
Catalin Marinasc1cc1552012-03-05 11:49:27 +0000412 }
413}
414
Laura Abbottda141702015-01-21 17:36:06 -0800415void mark_rodata_ro(void)
416{
Jeremy Linton2f39b5f2016-02-19 11:50:32 -0600417 unsigned long section_size;
Ard Biesheuvelf9040772016-02-16 13:52:40 +0100418
Jeremy Linton2f39b5f2016-02-19 11:50:32 -0600419 /*
Ard Biesheuvel9fdc14c52016-06-23 15:53:17 +0200420 * mark .rodata as read only. Use __init_begin rather than __end_rodata
421 * to cover NOTES and EXCEPTION_TABLE.
Jeremy Linton2f39b5f2016-02-19 11:50:32 -0600422 */
Ard Biesheuvel9fdc14c52016-06-23 15:53:17 +0200423 section_size = (unsigned long)__init_begin - (unsigned long)__start_rodata;
Ard Biesheuvelaa8c09b2017-03-09 21:52:00 +0100424 update_mapping_prot(__pa_symbol(__start_rodata), (unsigned long)__start_rodata,
Jeremy Linton2f39b5f2016-02-19 11:50:32 -0600425 section_size, PAGE_KERNEL_RO);
Ard Biesheuvele98216b2016-10-21 12:22:56 +0100426
Laura Abbott1404d6f2016-10-27 09:27:34 -0700427 debug_checkwx();
Laura Abbottda141702015-01-21 17:36:06 -0800428}
Laura Abbottda141702015-01-21 17:36:06 -0800429
Ard Biesheuvel2c09ec02016-03-30 17:43:06 +0200430static void __init map_kernel_segment(pgd_t *pgd, void *va_start, void *va_end,
431 pgprot_t prot, struct vm_struct *vma)
Mark Rutland068a17a2016-01-25 11:45:12 +0000432{
Laura Abbott2077be62017-01-10 13:35:49 -0800433 phys_addr_t pa_start = __pa_symbol(va_start);
Mark Rutland068a17a2016-01-25 11:45:12 +0000434 unsigned long size = va_end - va_start;
435
436 BUG_ON(!PAGE_ALIGNED(pa_start));
437 BUG_ON(!PAGE_ALIGNED(size));
438
439 __create_pgd_mapping(pgd, pa_start, (unsigned long)va_start, size, prot,
Ard Biesheuvelf14c66c2016-10-21 12:22:57 +0100440 early_pgtable_alloc, debug_pagealloc_enabled());
Ard Biesheuvelf9040772016-02-16 13:52:40 +0100441
442 vma->addr = va_start;
443 vma->phys_addr = pa_start;
444 vma->size = size;
445 vma->flags = VM_MAP;
446 vma->caller = __builtin_return_address(0);
447
448 vm_area_add_early(vma);
Mark Rutland068a17a2016-01-25 11:45:12 +0000449}
450
Ard Biesheuvel28b066d2017-03-09 21:52:02 +0100451static int __init parse_rodata(char *arg)
452{
453 return strtobool(arg, &rodata_enabled);
454}
455early_param("rodata", parse_rodata);
456
Mark Rutland068a17a2016-01-25 11:45:12 +0000457/*
458 * Create fine-grained mappings for the kernel.
459 */
460static void __init map_kernel(pgd_t *pgd)
461{
Ard Biesheuvel2ebe088b2017-03-09 21:52:03 +0100462 static struct vm_struct vmlinux_text, vmlinux_rodata, vmlinux_inittext,
463 vmlinux_initdata, vmlinux_data;
Mark Rutland068a17a2016-01-25 11:45:12 +0000464
Ard Biesheuvel28b066d2017-03-09 21:52:02 +0100465 /*
466 * External debuggers may need to write directly to the text
467 * mapping to install SW breakpoints. Allow this (only) when
468 * explicitly requested with rodata=off.
469 */
470 pgprot_t text_prot = rodata_enabled ? PAGE_KERNEL_ROX : PAGE_KERNEL_EXEC;
471
472 map_kernel_segment(pgd, _text, _etext, text_prot, &vmlinux_text);
Ard Biesheuvel2ebe088b2017-03-09 21:52:03 +0100473 map_kernel_segment(pgd, __start_rodata, __inittext_begin, PAGE_KERNEL,
474 &vmlinux_rodata);
475 map_kernel_segment(pgd, __inittext_begin, __inittext_end, text_prot,
476 &vmlinux_inittext);
477 map_kernel_segment(pgd, __initdata_begin, __initdata_end, PAGE_KERNEL,
478 &vmlinux_initdata);
Ard Biesheuvel2c09ec02016-03-30 17:43:06 +0200479 map_kernel_segment(pgd, _data, _end, PAGE_KERNEL, &vmlinux_data);
Mark Rutland068a17a2016-01-25 11:45:12 +0000480
Ard Biesheuvelf9040772016-02-16 13:52:40 +0100481 if (!pgd_val(*pgd_offset_raw(pgd, FIXADDR_START))) {
482 /*
483 * The fixmap falls in a separate pgd to the kernel, and doesn't
484 * live in the carveout for the swapper_pg_dir. We can simply
485 * re-use the existing dir for the fixmap.
486 */
487 set_pgd(pgd_offset_raw(pgd, FIXADDR_START),
488 *pgd_offset_k(FIXADDR_START));
489 } else if (CONFIG_PGTABLE_LEVELS > 3) {
490 /*
491 * The fixmap shares its top level pgd entry with the kernel
492 * mapping. This can really only occur when we are running
493 * with 16k/4 levels, so we can simply reuse the pud level
494 * entry instead.
495 */
496 BUG_ON(!IS_ENABLED(CONFIG_ARM64_16K_PAGES));
497 set_pud(pud_set_fixmap_offset(pgd, FIXADDR_START),
Laura Abbott2077be62017-01-10 13:35:49 -0800498 __pud(__pa_symbol(bm_pmd) | PUD_TYPE_TABLE));
Ard Biesheuvelf9040772016-02-16 13:52:40 +0100499 pud_clear_fixmap();
500 } else {
501 BUG();
502 }
Mark Rutland068a17a2016-01-25 11:45:12 +0000503
504 kasan_copy_shadow(pgd);
505}
506
Catalin Marinasc1cc1552012-03-05 11:49:27 +0000507/*
508 * paging_init() sets up the page tables, initialises the zone memory
509 * maps and sets up the zero page.
510 */
511void __init paging_init(void)
512{
Mark Rutland068a17a2016-01-25 11:45:12 +0000513 phys_addr_t pgd_phys = early_pgtable_alloc();
514 pgd_t *pgd = pgd_set_fixmap(pgd_phys);
515
516 map_kernel(pgd);
517 map_mem(pgd);
518
519 /*
520 * We want to reuse the original swapper_pg_dir so we don't have to
521 * communicate the new address to non-coherent secondaries in
522 * secondary_entry, and so cpu_switch_mm can generate the address with
523 * adrp+add rather than a load from some global variable.
524 *
525 * To do this we need to go via a temporary pgd.
526 */
527 cpu_replace_ttbr1(__va(pgd_phys));
Arnd Bergmann12f043f2017-02-14 22:27:01 +0100528 memcpy(swapper_pg_dir, pgd, PGD_SIZE);
Laura Abbott2077be62017-01-10 13:35:49 -0800529 cpu_replace_ttbr1(lm_alias(swapper_pg_dir));
Mark Rutland068a17a2016-01-25 11:45:12 +0000530
531 pgd_clear_fixmap();
532 memblock_free(pgd_phys, PAGE_SIZE);
533
534 /*
535 * We only reuse the PGD from the swapper_pg_dir, not the pud + pmd
536 * allocated with it.
537 */
Laura Abbott2077be62017-01-10 13:35:49 -0800538 memblock_free(__pa_symbol(swapper_pg_dir) + PAGE_SIZE,
Mark Rutland068a17a2016-01-25 11:45:12 +0000539 SWAPPER_DIR_SIZE - PAGE_SIZE);
Catalin Marinasc1cc1552012-03-05 11:49:27 +0000540}
541
542/*
Catalin Marinasc1cc1552012-03-05 11:49:27 +0000543 * Check whether a kernel address is valid (derived from arch/x86/).
544 */
545int kern_addr_valid(unsigned long addr)
546{
547 pgd_t *pgd;
548 pud_t *pud;
549 pmd_t *pmd;
550 pte_t *pte;
551
552 if ((((long)addr) >> VA_BITS) != -1UL)
553 return 0;
554
555 pgd = pgd_offset_k(addr);
556 if (pgd_none(*pgd))
557 return 0;
558
559 pud = pud_offset(pgd, addr);
560 if (pud_none(*pud))
561 return 0;
562
Steve Capper206a2a72014-05-06 14:02:27 +0100563 if (pud_sect(*pud))
564 return pfn_valid(pud_pfn(*pud));
565
Catalin Marinasc1cc1552012-03-05 11:49:27 +0000566 pmd = pmd_offset(pud, addr);
567 if (pmd_none(*pmd))
568 return 0;
569
Dave Andersonda6e4cb2014-04-15 18:53:24 +0100570 if (pmd_sect(*pmd))
571 return pfn_valid(pmd_pfn(*pmd));
572
Catalin Marinasc1cc1552012-03-05 11:49:27 +0000573 pte = pte_offset_kernel(pmd, addr);
574 if (pte_none(*pte))
575 return 0;
576
577 return pfn_valid(pte_pfn(*pte));
578}
579#ifdef CONFIG_SPARSEMEM_VMEMMAP
Suzuki K. Pouloseb433dce2015-10-19 14:19:28 +0100580#if !ARM64_SWAPPER_USES_SECTION_MAPS
Johannes Weiner0aad8182013-04-29 15:07:50 -0700581int __meminit vmemmap_populate(unsigned long start, unsigned long end, int node)
Catalin Marinasc1cc1552012-03-05 11:49:27 +0000582{
Johannes Weiner0aad8182013-04-29 15:07:50 -0700583 return vmemmap_populate_basepages(start, end, node);
Catalin Marinasc1cc1552012-03-05 11:49:27 +0000584}
Suzuki K. Pouloseb433dce2015-10-19 14:19:28 +0100585#else /* !ARM64_SWAPPER_USES_SECTION_MAPS */
Johannes Weiner0aad8182013-04-29 15:07:50 -0700586int __meminit vmemmap_populate(unsigned long start, unsigned long end, int node)
Catalin Marinasc1cc1552012-03-05 11:49:27 +0000587{
Johannes Weiner0aad8182013-04-29 15:07:50 -0700588 unsigned long addr = start;
Catalin Marinasc1cc1552012-03-05 11:49:27 +0000589 unsigned long next;
590 pgd_t *pgd;
591 pud_t *pud;
592 pmd_t *pmd;
593
594 do {
595 next = pmd_addr_end(addr, end);
596
597 pgd = vmemmap_pgd_populate(addr, node);
598 if (!pgd)
599 return -ENOMEM;
600
601 pud = vmemmap_pud_populate(pgd, addr, node);
602 if (!pud)
603 return -ENOMEM;
604
605 pmd = pmd_offset(pud, addr);
606 if (pmd_none(*pmd)) {
607 void *p = NULL;
608
609 p = vmemmap_alloc_block_buf(PMD_SIZE, node);
610 if (!p)
611 return -ENOMEM;
612
Catalin Marinasa501e322014-04-03 15:57:15 +0100613 set_pmd(pmd, __pmd(__pa(p) | PROT_SECT_NORMAL));
Catalin Marinasc1cc1552012-03-05 11:49:27 +0000614 } else
615 vmemmap_verify((pte_t *)pmd, node, addr, next);
616 } while (addr = next, addr != end);
617
618 return 0;
619}
620#endif /* CONFIG_ARM64_64K_PAGES */
Johannes Weiner0aad8182013-04-29 15:07:50 -0700621void vmemmap_free(unsigned long start, unsigned long end)
Tang Chen01975182013-02-22 16:33:08 -0800622{
623}
Catalin Marinasc1cc1552012-03-05 11:49:27 +0000624#endif /* CONFIG_SPARSEMEM_VMEMMAP */
Laura Abbottaf86e592014-11-21 21:50:42 +0000625
Laura Abbottaf86e592014-11-21 21:50:42 +0000626static inline pud_t * fixmap_pud(unsigned long addr)
627{
628 pgd_t *pgd = pgd_offset_k(addr);
629
630 BUG_ON(pgd_none(*pgd) || pgd_bad(*pgd));
631
Ard Biesheuvel157962f2016-02-16 13:52:38 +0100632 return pud_offset_kimg(pgd, addr);
Laura Abbottaf86e592014-11-21 21:50:42 +0000633}
634
635static inline pmd_t * fixmap_pmd(unsigned long addr)
636{
637 pud_t *pud = fixmap_pud(addr);
638
639 BUG_ON(pud_none(*pud) || pud_bad(*pud));
640
Ard Biesheuvel157962f2016-02-16 13:52:38 +0100641 return pmd_offset_kimg(pud, addr);
Laura Abbottaf86e592014-11-21 21:50:42 +0000642}
643
644static inline pte_t * fixmap_pte(unsigned long addr)
645{
Ard Biesheuvel157962f2016-02-16 13:52:38 +0100646 return &bm_pte[pte_index(addr)];
Laura Abbottaf86e592014-11-21 21:50:42 +0000647}
648
Laura Abbott2077be62017-01-10 13:35:49 -0800649/*
650 * The p*d_populate functions call virt_to_phys implicitly so they can't be used
651 * directly on kernel symbols (bm_p*d). This function is called too early to use
652 * lm_alias so __p*d_populate functions must be used to populate with the
653 * physical address from __pa_symbol.
654 */
Laura Abbottaf86e592014-11-21 21:50:42 +0000655void __init early_fixmap_init(void)
656{
657 pgd_t *pgd;
658 pud_t *pud;
659 pmd_t *pmd;
660 unsigned long addr = FIXADDR_START;
661
662 pgd = pgd_offset_k(addr);
Ard Biesheuvelf80fb3a2016-01-26 14:12:01 +0100663 if (CONFIG_PGTABLE_LEVELS > 3 &&
Laura Abbott2077be62017-01-10 13:35:49 -0800664 !(pgd_none(*pgd) || pgd_page_paddr(*pgd) == __pa_symbol(bm_pud))) {
Ard Biesheuvelf9040772016-02-16 13:52:40 +0100665 /*
666 * We only end up here if the kernel mapping and the fixmap
667 * share the top level pgd entry, which should only happen on
668 * 16k/4 levels configurations.
669 */
670 BUG_ON(!IS_ENABLED(CONFIG_ARM64_16K_PAGES));
671 pud = pud_offset_kimg(pgd, addr);
672 } else {
Laura Abbott2077be62017-01-10 13:35:49 -0800673 if (pgd_none(*pgd))
674 __pgd_populate(pgd, __pa_symbol(bm_pud), PUD_TYPE_TABLE);
Ard Biesheuvelf9040772016-02-16 13:52:40 +0100675 pud = fixmap_pud(addr);
676 }
Laura Abbott2077be62017-01-10 13:35:49 -0800677 if (pud_none(*pud))
678 __pud_populate(pud, __pa_symbol(bm_pmd), PMD_TYPE_TABLE);
Ard Biesheuvel157962f2016-02-16 13:52:38 +0100679 pmd = fixmap_pmd(addr);
Laura Abbott2077be62017-01-10 13:35:49 -0800680 __pmd_populate(pmd, __pa_symbol(bm_pte), PMD_TYPE_TABLE);
Laura Abbottaf86e592014-11-21 21:50:42 +0000681
682 /*
683 * The boot-ioremap range spans multiple pmds, for which
Ard Biesheuvel157962f2016-02-16 13:52:38 +0100684 * we are not prepared:
Laura Abbottaf86e592014-11-21 21:50:42 +0000685 */
686 BUILD_BUG_ON((__fix_to_virt(FIX_BTMAP_BEGIN) >> PMD_SHIFT)
687 != (__fix_to_virt(FIX_BTMAP_END) >> PMD_SHIFT));
688
689 if ((pmd != fixmap_pmd(fix_to_virt(FIX_BTMAP_BEGIN)))
690 || pmd != fixmap_pmd(fix_to_virt(FIX_BTMAP_END))) {
691 WARN_ON(1);
692 pr_warn("pmd %p != %p, %p\n",
693 pmd, fixmap_pmd(fix_to_virt(FIX_BTMAP_BEGIN)),
694 fixmap_pmd(fix_to_virt(FIX_BTMAP_END)));
695 pr_warn("fix_to_virt(FIX_BTMAP_BEGIN): %08lx\n",
696 fix_to_virt(FIX_BTMAP_BEGIN));
697 pr_warn("fix_to_virt(FIX_BTMAP_END): %08lx\n",
698 fix_to_virt(FIX_BTMAP_END));
699
700 pr_warn("FIX_BTMAP_END: %d\n", FIX_BTMAP_END);
701 pr_warn("FIX_BTMAP_BEGIN: %d\n", FIX_BTMAP_BEGIN);
702 }
703}
704
705void __set_fixmap(enum fixed_addresses idx,
706 phys_addr_t phys, pgprot_t flags)
707{
708 unsigned long addr = __fix_to_virt(idx);
709 pte_t *pte;
710
Mark Rutlandb63dbef2015-03-04 13:27:35 +0000711 BUG_ON(idx <= FIX_HOLE || idx >= __end_of_fixed_addresses);
Laura Abbottaf86e592014-11-21 21:50:42 +0000712
713 pte = fixmap_pte(addr);
714
715 if (pgprot_val(flags)) {
716 set_pte(pte, pfn_pte(phys >> PAGE_SHIFT, flags));
717 } else {
718 pte_clear(&init_mm, addr, pte);
719 flush_tlb_kernel_range(addr, addr+PAGE_SIZE);
720 }
721}
Ard Biesheuvel61bd93c2015-06-01 13:40:32 +0200722
Ard Biesheuvelf80fb3a2016-01-26 14:12:01 +0100723void *__init __fixmap_remap_fdt(phys_addr_t dt_phys, int *size, pgprot_t prot)
Ard Biesheuvel61bd93c2015-06-01 13:40:32 +0200724{
725 const u64 dt_virt_base = __fix_to_virt(FIX_FDT);
Ard Biesheuvelf80fb3a2016-01-26 14:12:01 +0100726 int offset;
Ard Biesheuvel61bd93c2015-06-01 13:40:32 +0200727 void *dt_virt;
728
729 /*
730 * Check whether the physical FDT address is set and meets the minimum
731 * alignment requirement. Since we are relying on MIN_FDT_ALIGN to be
Ard Biesheuvel04a84812016-08-01 13:29:31 +0200732 * at least 8 bytes so that we can always access the magic and size
733 * fields of the FDT header after mapping the first chunk, double check
734 * here if that is indeed the case.
Ard Biesheuvel61bd93c2015-06-01 13:40:32 +0200735 */
736 BUILD_BUG_ON(MIN_FDT_ALIGN < 8);
737 if (!dt_phys || dt_phys % MIN_FDT_ALIGN)
738 return NULL;
739
740 /*
741 * Make sure that the FDT region can be mapped without the need to
742 * allocate additional translation table pages, so that it is safe
Laura Abbott132233a2016-02-05 16:24:46 -0800743 * to call create_mapping_noalloc() this early.
Ard Biesheuvel61bd93c2015-06-01 13:40:32 +0200744 *
745 * On 64k pages, the FDT will be mapped using PTEs, so we need to
746 * be in the same PMD as the rest of the fixmap.
747 * On 4k pages, we'll use section mappings for the FDT so we only
748 * have to be in the same PUD.
749 */
750 BUILD_BUG_ON(dt_virt_base % SZ_2M);
751
Suzuki K. Pouloseb433dce2015-10-19 14:19:28 +0100752 BUILD_BUG_ON(__fix_to_virt(FIX_FDT_END) >> SWAPPER_TABLE_SHIFT !=
753 __fix_to_virt(FIX_BTMAP_BEGIN) >> SWAPPER_TABLE_SHIFT);
Ard Biesheuvel61bd93c2015-06-01 13:40:32 +0200754
Suzuki K. Pouloseb433dce2015-10-19 14:19:28 +0100755 offset = dt_phys % SWAPPER_BLOCK_SIZE;
Ard Biesheuvel61bd93c2015-06-01 13:40:32 +0200756 dt_virt = (void *)dt_virt_base + offset;
757
758 /* map the first chunk so we can read the size from the header */
Laura Abbott132233a2016-02-05 16:24:46 -0800759 create_mapping_noalloc(round_down(dt_phys, SWAPPER_BLOCK_SIZE),
760 dt_virt_base, SWAPPER_BLOCK_SIZE, prot);
Ard Biesheuvel61bd93c2015-06-01 13:40:32 +0200761
Ard Biesheuvel04a84812016-08-01 13:29:31 +0200762 if (fdt_magic(dt_virt) != FDT_MAGIC)
Ard Biesheuvel61bd93c2015-06-01 13:40:32 +0200763 return NULL;
764
Ard Biesheuvelf80fb3a2016-01-26 14:12:01 +0100765 *size = fdt_totalsize(dt_virt);
766 if (*size > MAX_FDT_SIZE)
Ard Biesheuvel61bd93c2015-06-01 13:40:32 +0200767 return NULL;
768
Ard Biesheuvelf80fb3a2016-01-26 14:12:01 +0100769 if (offset + *size > SWAPPER_BLOCK_SIZE)
Laura Abbott132233a2016-02-05 16:24:46 -0800770 create_mapping_noalloc(round_down(dt_phys, SWAPPER_BLOCK_SIZE), dt_virt_base,
Ard Biesheuvelf80fb3a2016-01-26 14:12:01 +0100771 round_up(offset + *size, SWAPPER_BLOCK_SIZE), prot);
772
773 return dt_virt;
774}
775
776void *__init fixmap_remap_fdt(phys_addr_t dt_phys)
777{
778 void *dt_virt;
779 int size;
780
781 dt_virt = __fixmap_remap_fdt(dt_phys, &size, PAGE_KERNEL_RO);
782 if (!dt_virt)
783 return NULL;
Ard Biesheuvel61bd93c2015-06-01 13:40:32 +0200784
785 memblock_reserve(dt_phys, size);
Ard Biesheuvel61bd93c2015-06-01 13:40:32 +0200786 return dt_virt;
787}
Ard Biesheuvel324420b2016-02-16 13:52:35 +0100788
789int __init arch_ioremap_pud_supported(void)
790{
791 /* only 4k granule supports level 1 block mappings */
792 return IS_ENABLED(CONFIG_ARM64_4K_PAGES);
793}
794
795int __init arch_ioremap_pmd_supported(void)
796{
797 return 1;
798}
799
800int pud_set_huge(pud_t *pud, phys_addr_t phys, pgprot_t prot)
801{
802 BUG_ON(phys & ~PUD_MASK);
803 set_pud(pud, __pud(phys | PUD_TYPE_SECT | pgprot_val(mk_sect_prot(prot))));
804 return 1;
805}
806
807int pmd_set_huge(pmd_t *pmd, phys_addr_t phys, pgprot_t prot)
808{
809 BUG_ON(phys & ~PMD_MASK);
810 set_pmd(pmd, __pmd(phys | PMD_TYPE_SECT | pgprot_val(mk_sect_prot(prot))));
811 return 1;
812}
813
814int pud_clear_huge(pud_t *pud)
815{
816 if (!pud_sect(*pud))
817 return 0;
818 pud_clear(pud);
819 return 1;
820}
821
822int pmd_clear_huge(pmd_t *pmd)
823{
824 if (!pmd_sect(*pmd))
825 return 0;
826 pmd_clear(pmd);
827 return 1;
828}