162306a36Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0 262306a36Sopenharmony_ci/* 362306a36Sopenharmony_ci * Initialize MMU support. 462306a36Sopenharmony_ci * 562306a36Sopenharmony_ci * Copyright (C) 1998-2003 Hewlett-Packard Co 662306a36Sopenharmony_ci * David Mosberger-Tang <davidm@hpl.hp.com> 762306a36Sopenharmony_ci */ 862306a36Sopenharmony_ci#include <linux/kernel.h> 962306a36Sopenharmony_ci#include <linux/init.h> 1062306a36Sopenharmony_ci 1162306a36Sopenharmony_ci#include <linux/dma-map-ops.h> 1262306a36Sopenharmony_ci#include <linux/dmar.h> 1362306a36Sopenharmony_ci#include <linux/efi.h> 1462306a36Sopenharmony_ci#include <linux/elf.h> 1562306a36Sopenharmony_ci#include <linux/memblock.h> 1662306a36Sopenharmony_ci#include <linux/mm.h> 1762306a36Sopenharmony_ci#include <linux/sched/signal.h> 1862306a36Sopenharmony_ci#include <linux/mmzone.h> 1962306a36Sopenharmony_ci#include <linux/module.h> 2062306a36Sopenharmony_ci#include <linux/personality.h> 2162306a36Sopenharmony_ci#include <linux/reboot.h> 2262306a36Sopenharmony_ci#include <linux/slab.h> 2362306a36Sopenharmony_ci#include <linux/swap.h> 2462306a36Sopenharmony_ci#include <linux/proc_fs.h> 2562306a36Sopenharmony_ci#include <linux/bitops.h> 2662306a36Sopenharmony_ci#include <linux/kexec.h> 2762306a36Sopenharmony_ci#include <linux/swiotlb.h> 2862306a36Sopenharmony_ci 2962306a36Sopenharmony_ci#include <asm/dma.h> 3062306a36Sopenharmony_ci#include <asm/efi.h> 3162306a36Sopenharmony_ci#include <asm/io.h> 3262306a36Sopenharmony_ci#include <asm/numa.h> 3362306a36Sopenharmony_ci#include <asm/patch.h> 3462306a36Sopenharmony_ci#include <asm/pgalloc.h> 3562306a36Sopenharmony_ci#include <asm/sal.h> 3662306a36Sopenharmony_ci#include <asm/sections.h> 3762306a36Sopenharmony_ci#include <asm/tlb.h> 3862306a36Sopenharmony_ci#include <linux/uaccess.h> 3962306a36Sopenharmony_ci#include <asm/unistd.h> 4062306a36Sopenharmony_ci#include <asm/mca.h> 4162306a36Sopenharmony_ci 4262306a36Sopenharmony_ciextern void ia64_tlb_init (void); 4362306a36Sopenharmony_ci 4462306a36Sopenharmony_ciunsigned long MAX_DMA_ADDRESS = PAGE_OFFSET + 0x100000000UL; 4562306a36Sopenharmony_ci 4662306a36Sopenharmony_cistruct page *zero_page_memmap_ptr; /* map entry for zero page */ 4762306a36Sopenharmony_ciEXPORT_SYMBOL(zero_page_memmap_ptr); 4862306a36Sopenharmony_ci 4962306a36Sopenharmony_civoid 5062306a36Sopenharmony_ci__ia64_sync_icache_dcache (pte_t pte) 5162306a36Sopenharmony_ci{ 5262306a36Sopenharmony_ci unsigned long addr; 5362306a36Sopenharmony_ci struct folio *folio; 5462306a36Sopenharmony_ci 5562306a36Sopenharmony_ci folio = page_folio(pte_page(pte)); 5662306a36Sopenharmony_ci addr = (unsigned long)folio_address(folio); 5762306a36Sopenharmony_ci 5862306a36Sopenharmony_ci if (test_bit(PG_arch_1, &folio->flags)) 5962306a36Sopenharmony_ci return; /* i-cache is already coherent with d-cache */ 6062306a36Sopenharmony_ci 6162306a36Sopenharmony_ci flush_icache_range(addr, addr + folio_size(folio)); 6262306a36Sopenharmony_ci set_bit(PG_arch_1, &folio->flags); /* mark page as clean */ 6362306a36Sopenharmony_ci} 6462306a36Sopenharmony_ci 6562306a36Sopenharmony_ci/* 6662306a36Sopenharmony_ci * Since DMA is i-cache coherent, any (complete) folios that were written via 6762306a36Sopenharmony_ci * DMA can be marked as "clean" so that lazy_mmu_prot_update() doesn't have to 6862306a36Sopenharmony_ci * flush them when they get mapped into an executable vm-area. 6962306a36Sopenharmony_ci */ 7062306a36Sopenharmony_civoid arch_dma_mark_clean(phys_addr_t paddr, size_t size) 7162306a36Sopenharmony_ci{ 7262306a36Sopenharmony_ci unsigned long pfn = PHYS_PFN(paddr); 7362306a36Sopenharmony_ci struct folio *folio = page_folio(pfn_to_page(pfn)); 7462306a36Sopenharmony_ci ssize_t left = size; 7562306a36Sopenharmony_ci size_t offset = offset_in_folio(folio, paddr); 7662306a36Sopenharmony_ci 7762306a36Sopenharmony_ci if (offset) { 7862306a36Sopenharmony_ci left -= folio_size(folio) - offset; 7962306a36Sopenharmony_ci if (left <= 0) 8062306a36Sopenharmony_ci return; 8162306a36Sopenharmony_ci folio = folio_next(folio); 8262306a36Sopenharmony_ci } 8362306a36Sopenharmony_ci 8462306a36Sopenharmony_ci while (left >= (ssize_t)folio_size(folio)) { 8562306a36Sopenharmony_ci left -= folio_size(folio); 8662306a36Sopenharmony_ci set_bit(PG_arch_1, &pfn_to_page(pfn)->flags); 8762306a36Sopenharmony_ci if (!left) 8862306a36Sopenharmony_ci break; 8962306a36Sopenharmony_ci folio = folio_next(folio); 9062306a36Sopenharmony_ci } 9162306a36Sopenharmony_ci} 9262306a36Sopenharmony_ci 9362306a36Sopenharmony_ciinline void 9462306a36Sopenharmony_ciia64_set_rbs_bot (void) 9562306a36Sopenharmony_ci{ 9662306a36Sopenharmony_ci unsigned long stack_size = rlimit_max(RLIMIT_STACK) & -16; 9762306a36Sopenharmony_ci 9862306a36Sopenharmony_ci if (stack_size > MAX_USER_STACK_SIZE) 9962306a36Sopenharmony_ci stack_size = MAX_USER_STACK_SIZE; 10062306a36Sopenharmony_ci current->thread.rbs_bot = PAGE_ALIGN(current->mm->start_stack - stack_size); 10162306a36Sopenharmony_ci} 10262306a36Sopenharmony_ci 10362306a36Sopenharmony_ci/* 10462306a36Sopenharmony_ci * This performs some platform-dependent address space initialization. 10562306a36Sopenharmony_ci * On IA-64, we want to setup the VM area for the register backing 10662306a36Sopenharmony_ci * store (which grows upwards) and install the gateway page which is 10762306a36Sopenharmony_ci * used for signal trampolines, etc. 10862306a36Sopenharmony_ci */ 10962306a36Sopenharmony_civoid 11062306a36Sopenharmony_ciia64_init_addr_space (void) 11162306a36Sopenharmony_ci{ 11262306a36Sopenharmony_ci struct vm_area_struct *vma; 11362306a36Sopenharmony_ci 11462306a36Sopenharmony_ci ia64_set_rbs_bot(); 11562306a36Sopenharmony_ci 11662306a36Sopenharmony_ci /* 11762306a36Sopenharmony_ci * If we're out of memory and kmem_cache_alloc() returns NULL, we simply ignore 11862306a36Sopenharmony_ci * the problem. When the process attempts to write to the register backing store 11962306a36Sopenharmony_ci * for the first time, it will get a SEGFAULT in this case. 12062306a36Sopenharmony_ci */ 12162306a36Sopenharmony_ci vma = vm_area_alloc(current->mm); 12262306a36Sopenharmony_ci if (vma) { 12362306a36Sopenharmony_ci vma_set_anonymous(vma); 12462306a36Sopenharmony_ci vma->vm_start = current->thread.rbs_bot & PAGE_MASK; 12562306a36Sopenharmony_ci vma->vm_end = vma->vm_start + PAGE_SIZE; 12662306a36Sopenharmony_ci vm_flags_init(vma, VM_DATA_DEFAULT_FLAGS|VM_GROWSUP|VM_ACCOUNT); 12762306a36Sopenharmony_ci vma->vm_page_prot = vm_get_page_prot(vma->vm_flags); 12862306a36Sopenharmony_ci mmap_write_lock(current->mm); 12962306a36Sopenharmony_ci if (insert_vm_struct(current->mm, vma)) { 13062306a36Sopenharmony_ci mmap_write_unlock(current->mm); 13162306a36Sopenharmony_ci vm_area_free(vma); 13262306a36Sopenharmony_ci return; 13362306a36Sopenharmony_ci } 13462306a36Sopenharmony_ci mmap_write_unlock(current->mm); 13562306a36Sopenharmony_ci } 13662306a36Sopenharmony_ci 13762306a36Sopenharmony_ci /* map NaT-page at address zero to speed up speculative dereferencing of NULL: */ 13862306a36Sopenharmony_ci if (!(current->personality & MMAP_PAGE_ZERO)) { 13962306a36Sopenharmony_ci vma = vm_area_alloc(current->mm); 14062306a36Sopenharmony_ci if (vma) { 14162306a36Sopenharmony_ci vma_set_anonymous(vma); 14262306a36Sopenharmony_ci vma->vm_end = PAGE_SIZE; 14362306a36Sopenharmony_ci vma->vm_page_prot = __pgprot(pgprot_val(PAGE_READONLY) | _PAGE_MA_NAT); 14462306a36Sopenharmony_ci vm_flags_init(vma, VM_READ | VM_MAYREAD | VM_IO | 14562306a36Sopenharmony_ci VM_DONTEXPAND | VM_DONTDUMP); 14662306a36Sopenharmony_ci mmap_write_lock(current->mm); 14762306a36Sopenharmony_ci if (insert_vm_struct(current->mm, vma)) { 14862306a36Sopenharmony_ci mmap_write_unlock(current->mm); 14962306a36Sopenharmony_ci vm_area_free(vma); 15062306a36Sopenharmony_ci return; 15162306a36Sopenharmony_ci } 15262306a36Sopenharmony_ci mmap_write_unlock(current->mm); 15362306a36Sopenharmony_ci } 15462306a36Sopenharmony_ci } 15562306a36Sopenharmony_ci} 15662306a36Sopenharmony_ci 15762306a36Sopenharmony_civoid 15862306a36Sopenharmony_cifree_initmem (void) 15962306a36Sopenharmony_ci{ 16062306a36Sopenharmony_ci free_reserved_area(ia64_imva(__init_begin), ia64_imva(__init_end), 16162306a36Sopenharmony_ci -1, "unused kernel"); 16262306a36Sopenharmony_ci} 16362306a36Sopenharmony_ci 16462306a36Sopenharmony_civoid __init 16562306a36Sopenharmony_cifree_initrd_mem (unsigned long start, unsigned long end) 16662306a36Sopenharmony_ci{ 16762306a36Sopenharmony_ci /* 16862306a36Sopenharmony_ci * EFI uses 4KB pages while the kernel can use 4KB or bigger. 16962306a36Sopenharmony_ci * Thus EFI and the kernel may have different page sizes. It is 17062306a36Sopenharmony_ci * therefore possible to have the initrd share the same page as 17162306a36Sopenharmony_ci * the end of the kernel (given current setup). 17262306a36Sopenharmony_ci * 17362306a36Sopenharmony_ci * To avoid freeing/using the wrong page (kernel sized) we: 17462306a36Sopenharmony_ci * - align up the beginning of initrd 17562306a36Sopenharmony_ci * - align down the end of initrd 17662306a36Sopenharmony_ci * 17762306a36Sopenharmony_ci * | | 17862306a36Sopenharmony_ci * |=============| a000 17962306a36Sopenharmony_ci * | | 18062306a36Sopenharmony_ci * | | 18162306a36Sopenharmony_ci * | | 9000 18262306a36Sopenharmony_ci * |/////////////| 18362306a36Sopenharmony_ci * |/////////////| 18462306a36Sopenharmony_ci * |=============| 8000 18562306a36Sopenharmony_ci * |///INITRD////| 18662306a36Sopenharmony_ci * |/////////////| 18762306a36Sopenharmony_ci * |/////////////| 7000 18862306a36Sopenharmony_ci * | | 18962306a36Sopenharmony_ci * |KKKKKKKKKKKKK| 19062306a36Sopenharmony_ci * |=============| 6000 19162306a36Sopenharmony_ci * |KKKKKKKKKKKKK| 19262306a36Sopenharmony_ci * |KKKKKKKKKKKKK| 19362306a36Sopenharmony_ci * K=kernel using 8KB pages 19462306a36Sopenharmony_ci * 19562306a36Sopenharmony_ci * In this example, we must free page 8000 ONLY. So we must align up 19662306a36Sopenharmony_ci * initrd_start and keep initrd_end as is. 19762306a36Sopenharmony_ci */ 19862306a36Sopenharmony_ci start = PAGE_ALIGN(start); 19962306a36Sopenharmony_ci end = end & PAGE_MASK; 20062306a36Sopenharmony_ci 20162306a36Sopenharmony_ci if (start < end) 20262306a36Sopenharmony_ci printk(KERN_INFO "Freeing initrd memory: %ldkB freed\n", (end - start) >> 10); 20362306a36Sopenharmony_ci 20462306a36Sopenharmony_ci for (; start < end; start += PAGE_SIZE) { 20562306a36Sopenharmony_ci if (!virt_addr_valid(start)) 20662306a36Sopenharmony_ci continue; 20762306a36Sopenharmony_ci free_reserved_page(virt_to_page(start)); 20862306a36Sopenharmony_ci } 20962306a36Sopenharmony_ci} 21062306a36Sopenharmony_ci 21162306a36Sopenharmony_ci/* 21262306a36Sopenharmony_ci * This installs a clean page in the kernel's page table. 21362306a36Sopenharmony_ci */ 21462306a36Sopenharmony_cistatic struct page * __init 21562306a36Sopenharmony_ciput_kernel_page (struct page *page, unsigned long address, pgprot_t pgprot) 21662306a36Sopenharmony_ci{ 21762306a36Sopenharmony_ci pgd_t *pgd; 21862306a36Sopenharmony_ci p4d_t *p4d; 21962306a36Sopenharmony_ci pud_t *pud; 22062306a36Sopenharmony_ci pmd_t *pmd; 22162306a36Sopenharmony_ci pte_t *pte; 22262306a36Sopenharmony_ci 22362306a36Sopenharmony_ci pgd = pgd_offset_k(address); /* note: this is NOT pgd_offset()! */ 22462306a36Sopenharmony_ci 22562306a36Sopenharmony_ci { 22662306a36Sopenharmony_ci p4d = p4d_alloc(&init_mm, pgd, address); 22762306a36Sopenharmony_ci if (!p4d) 22862306a36Sopenharmony_ci goto out; 22962306a36Sopenharmony_ci pud = pud_alloc(&init_mm, p4d, address); 23062306a36Sopenharmony_ci if (!pud) 23162306a36Sopenharmony_ci goto out; 23262306a36Sopenharmony_ci pmd = pmd_alloc(&init_mm, pud, address); 23362306a36Sopenharmony_ci if (!pmd) 23462306a36Sopenharmony_ci goto out; 23562306a36Sopenharmony_ci pte = pte_alloc_kernel(pmd, address); 23662306a36Sopenharmony_ci if (!pte) 23762306a36Sopenharmony_ci goto out; 23862306a36Sopenharmony_ci if (!pte_none(*pte)) 23962306a36Sopenharmony_ci goto out; 24062306a36Sopenharmony_ci set_pte(pte, mk_pte(page, pgprot)); 24162306a36Sopenharmony_ci } 24262306a36Sopenharmony_ci out: 24362306a36Sopenharmony_ci /* no need for flush_tlb */ 24462306a36Sopenharmony_ci return page; 24562306a36Sopenharmony_ci} 24662306a36Sopenharmony_ci 24762306a36Sopenharmony_cistatic void __init 24862306a36Sopenharmony_cisetup_gate (void) 24962306a36Sopenharmony_ci{ 25062306a36Sopenharmony_ci struct page *page; 25162306a36Sopenharmony_ci 25262306a36Sopenharmony_ci /* 25362306a36Sopenharmony_ci * Map the gate page twice: once read-only to export the ELF 25462306a36Sopenharmony_ci * headers etc. and once execute-only page to enable 25562306a36Sopenharmony_ci * privilege-promotion via "epc": 25662306a36Sopenharmony_ci */ 25762306a36Sopenharmony_ci page = virt_to_page(ia64_imva(__start_gate_section)); 25862306a36Sopenharmony_ci put_kernel_page(page, GATE_ADDR, PAGE_READONLY); 25962306a36Sopenharmony_ci#ifdef HAVE_BUGGY_SEGREL 26062306a36Sopenharmony_ci page = virt_to_page(ia64_imva(__start_gate_section + PAGE_SIZE)); 26162306a36Sopenharmony_ci put_kernel_page(page, GATE_ADDR + PAGE_SIZE, PAGE_GATE); 26262306a36Sopenharmony_ci#else 26362306a36Sopenharmony_ci put_kernel_page(page, GATE_ADDR + PERCPU_PAGE_SIZE, PAGE_GATE); 26462306a36Sopenharmony_ci /* Fill in the holes (if any) with read-only zero pages: */ 26562306a36Sopenharmony_ci { 26662306a36Sopenharmony_ci unsigned long addr; 26762306a36Sopenharmony_ci 26862306a36Sopenharmony_ci for (addr = GATE_ADDR + PAGE_SIZE; 26962306a36Sopenharmony_ci addr < GATE_ADDR + PERCPU_PAGE_SIZE; 27062306a36Sopenharmony_ci addr += PAGE_SIZE) 27162306a36Sopenharmony_ci { 27262306a36Sopenharmony_ci put_kernel_page(ZERO_PAGE(0), addr, 27362306a36Sopenharmony_ci PAGE_READONLY); 27462306a36Sopenharmony_ci put_kernel_page(ZERO_PAGE(0), addr + PERCPU_PAGE_SIZE, 27562306a36Sopenharmony_ci PAGE_READONLY); 27662306a36Sopenharmony_ci } 27762306a36Sopenharmony_ci } 27862306a36Sopenharmony_ci#endif 27962306a36Sopenharmony_ci ia64_patch_gate(); 28062306a36Sopenharmony_ci} 28162306a36Sopenharmony_ci 28262306a36Sopenharmony_cistatic struct vm_area_struct gate_vma; 28362306a36Sopenharmony_ci 28462306a36Sopenharmony_cistatic int __init gate_vma_init(void) 28562306a36Sopenharmony_ci{ 28662306a36Sopenharmony_ci vma_init(&gate_vma, NULL); 28762306a36Sopenharmony_ci gate_vma.vm_start = FIXADDR_USER_START; 28862306a36Sopenharmony_ci gate_vma.vm_end = FIXADDR_USER_END; 28962306a36Sopenharmony_ci vm_flags_init(&gate_vma, VM_READ | VM_MAYREAD | VM_EXEC | VM_MAYEXEC); 29062306a36Sopenharmony_ci gate_vma.vm_page_prot = __pgprot(__ACCESS_BITS | _PAGE_PL_3 | _PAGE_AR_RX); 29162306a36Sopenharmony_ci 29262306a36Sopenharmony_ci return 0; 29362306a36Sopenharmony_ci} 29462306a36Sopenharmony_ci__initcall(gate_vma_init); 29562306a36Sopenharmony_ci 29662306a36Sopenharmony_cistruct vm_area_struct *get_gate_vma(struct mm_struct *mm) 29762306a36Sopenharmony_ci{ 29862306a36Sopenharmony_ci return &gate_vma; 29962306a36Sopenharmony_ci} 30062306a36Sopenharmony_ci 30162306a36Sopenharmony_ciint in_gate_area_no_mm(unsigned long addr) 30262306a36Sopenharmony_ci{ 30362306a36Sopenharmony_ci if ((addr >= FIXADDR_USER_START) && (addr < FIXADDR_USER_END)) 30462306a36Sopenharmony_ci return 1; 30562306a36Sopenharmony_ci return 0; 30662306a36Sopenharmony_ci} 30762306a36Sopenharmony_ci 30862306a36Sopenharmony_ciint in_gate_area(struct mm_struct *mm, unsigned long addr) 30962306a36Sopenharmony_ci{ 31062306a36Sopenharmony_ci return in_gate_area_no_mm(addr); 31162306a36Sopenharmony_ci} 31262306a36Sopenharmony_ci 31362306a36Sopenharmony_civoid ia64_mmu_init(void *my_cpu_data) 31462306a36Sopenharmony_ci{ 31562306a36Sopenharmony_ci unsigned long pta, impl_va_bits; 31662306a36Sopenharmony_ci extern void tlb_init(void); 31762306a36Sopenharmony_ci 31862306a36Sopenharmony_ci#ifdef CONFIG_DISABLE_VHPT 31962306a36Sopenharmony_ci# define VHPT_ENABLE_BIT 0 32062306a36Sopenharmony_ci#else 32162306a36Sopenharmony_ci# define VHPT_ENABLE_BIT 1 32262306a36Sopenharmony_ci#endif 32362306a36Sopenharmony_ci 32462306a36Sopenharmony_ci /* 32562306a36Sopenharmony_ci * Check if the virtually mapped linear page table (VMLPT) overlaps with a mapped 32662306a36Sopenharmony_ci * address space. The IA-64 architecture guarantees that at least 50 bits of 32762306a36Sopenharmony_ci * virtual address space are implemented but if we pick a large enough page size 32862306a36Sopenharmony_ci * (e.g., 64KB), the mapped address space is big enough that it will overlap with 32962306a36Sopenharmony_ci * VMLPT. I assume that once we run on machines big enough to warrant 64KB pages, 33062306a36Sopenharmony_ci * IMPL_VA_MSB will be significantly bigger, so this is unlikely to become a 33162306a36Sopenharmony_ci * problem in practice. Alternatively, we could truncate the top of the mapped 33262306a36Sopenharmony_ci * address space to not permit mappings that would overlap with the VMLPT. 33362306a36Sopenharmony_ci * --davidm 00/12/06 33462306a36Sopenharmony_ci */ 33562306a36Sopenharmony_ci# define pte_bits 3 33662306a36Sopenharmony_ci# define mapped_space_bits (3*(PAGE_SHIFT - pte_bits) + PAGE_SHIFT) 33762306a36Sopenharmony_ci /* 33862306a36Sopenharmony_ci * The virtual page table has to cover the entire implemented address space within 33962306a36Sopenharmony_ci * a region even though not all of this space may be mappable. The reason for 34062306a36Sopenharmony_ci * this is that the Access bit and Dirty bit fault handlers perform 34162306a36Sopenharmony_ci * non-speculative accesses to the virtual page table, so the address range of the 34262306a36Sopenharmony_ci * virtual page table itself needs to be covered by virtual page table. 34362306a36Sopenharmony_ci */ 34462306a36Sopenharmony_ci# define vmlpt_bits (impl_va_bits - PAGE_SHIFT + pte_bits) 34562306a36Sopenharmony_ci# define POW2(n) (1ULL << (n)) 34662306a36Sopenharmony_ci 34762306a36Sopenharmony_ci impl_va_bits = ffz(~(local_cpu_data->unimpl_va_mask | (7UL << 61))); 34862306a36Sopenharmony_ci 34962306a36Sopenharmony_ci if (impl_va_bits < 51 || impl_va_bits > 61) 35062306a36Sopenharmony_ci panic("CPU has bogus IMPL_VA_MSB value of %lu!\n", impl_va_bits - 1); 35162306a36Sopenharmony_ci /* 35262306a36Sopenharmony_ci * mapped_space_bits - PAGE_SHIFT is the total number of ptes we need, 35362306a36Sopenharmony_ci * which must fit into "vmlpt_bits - pte_bits" slots. Second half of 35462306a36Sopenharmony_ci * the test makes sure that our mapped space doesn't overlap the 35562306a36Sopenharmony_ci * unimplemented hole in the middle of the region. 35662306a36Sopenharmony_ci */ 35762306a36Sopenharmony_ci if ((mapped_space_bits - PAGE_SHIFT > vmlpt_bits - pte_bits) || 35862306a36Sopenharmony_ci (mapped_space_bits > impl_va_bits - 1)) 35962306a36Sopenharmony_ci panic("Cannot build a big enough virtual-linear page table" 36062306a36Sopenharmony_ci " to cover mapped address space.\n" 36162306a36Sopenharmony_ci " Try using a smaller page size.\n"); 36262306a36Sopenharmony_ci 36362306a36Sopenharmony_ci 36462306a36Sopenharmony_ci /* place the VMLPT at the end of each page-table mapped region: */ 36562306a36Sopenharmony_ci pta = POW2(61) - POW2(vmlpt_bits); 36662306a36Sopenharmony_ci 36762306a36Sopenharmony_ci /* 36862306a36Sopenharmony_ci * Set the (virtually mapped linear) page table address. Bit 36962306a36Sopenharmony_ci * 8 selects between the short and long format, bits 2-7 the 37062306a36Sopenharmony_ci * size of the table, and bit 0 whether the VHPT walker is 37162306a36Sopenharmony_ci * enabled. 37262306a36Sopenharmony_ci */ 37362306a36Sopenharmony_ci ia64_set_pta(pta | (0 << 8) | (vmlpt_bits << 2) | VHPT_ENABLE_BIT); 37462306a36Sopenharmony_ci 37562306a36Sopenharmony_ci ia64_tlb_init(); 37662306a36Sopenharmony_ci 37762306a36Sopenharmony_ci#ifdef CONFIG_HUGETLB_PAGE 37862306a36Sopenharmony_ci ia64_set_rr(HPAGE_REGION_BASE, HPAGE_SHIFT << 2); 37962306a36Sopenharmony_ci ia64_srlz_d(); 38062306a36Sopenharmony_ci#endif 38162306a36Sopenharmony_ci} 38262306a36Sopenharmony_ci 38362306a36Sopenharmony_ciint __init register_active_ranges(u64 start, u64 len, int nid) 38462306a36Sopenharmony_ci{ 38562306a36Sopenharmony_ci u64 end = start + len; 38662306a36Sopenharmony_ci 38762306a36Sopenharmony_ci#ifdef CONFIG_KEXEC 38862306a36Sopenharmony_ci if (start > crashk_res.start && start < crashk_res.end) 38962306a36Sopenharmony_ci start = crashk_res.end; 39062306a36Sopenharmony_ci if (end > crashk_res.start && end < crashk_res.end) 39162306a36Sopenharmony_ci end = crashk_res.start; 39262306a36Sopenharmony_ci#endif 39362306a36Sopenharmony_ci 39462306a36Sopenharmony_ci if (start < end) 39562306a36Sopenharmony_ci memblock_add_node(__pa(start), end - start, nid, MEMBLOCK_NONE); 39662306a36Sopenharmony_ci return 0; 39762306a36Sopenharmony_ci} 39862306a36Sopenharmony_ci 39962306a36Sopenharmony_ciint 40062306a36Sopenharmony_cifind_max_min_low_pfn (u64 start, u64 end, void *arg) 40162306a36Sopenharmony_ci{ 40262306a36Sopenharmony_ci unsigned long pfn_start, pfn_end; 40362306a36Sopenharmony_ci#ifdef CONFIG_FLATMEM 40462306a36Sopenharmony_ci pfn_start = (PAGE_ALIGN(__pa(start))) >> PAGE_SHIFT; 40562306a36Sopenharmony_ci pfn_end = (PAGE_ALIGN(__pa(end - 1))) >> PAGE_SHIFT; 40662306a36Sopenharmony_ci#else 40762306a36Sopenharmony_ci pfn_start = GRANULEROUNDDOWN(__pa(start)) >> PAGE_SHIFT; 40862306a36Sopenharmony_ci pfn_end = GRANULEROUNDUP(__pa(end - 1)) >> PAGE_SHIFT; 40962306a36Sopenharmony_ci#endif 41062306a36Sopenharmony_ci min_low_pfn = min(min_low_pfn, pfn_start); 41162306a36Sopenharmony_ci max_low_pfn = max(max_low_pfn, pfn_end); 41262306a36Sopenharmony_ci return 0; 41362306a36Sopenharmony_ci} 41462306a36Sopenharmony_ci 41562306a36Sopenharmony_ci/* 41662306a36Sopenharmony_ci * Boot command-line option "nolwsys" can be used to disable the use of any light-weight 41762306a36Sopenharmony_ci * system call handler. When this option is in effect, all fsyscalls will end up bubbling 41862306a36Sopenharmony_ci * down into the kernel and calling the normal (heavy-weight) syscall handler. This is 41962306a36Sopenharmony_ci * useful for performance testing, but conceivably could also come in handy for debugging 42062306a36Sopenharmony_ci * purposes. 42162306a36Sopenharmony_ci */ 42262306a36Sopenharmony_ci 42362306a36Sopenharmony_cistatic int nolwsys __initdata; 42462306a36Sopenharmony_ci 42562306a36Sopenharmony_cistatic int __init 42662306a36Sopenharmony_cinolwsys_setup (char *s) 42762306a36Sopenharmony_ci{ 42862306a36Sopenharmony_ci nolwsys = 1; 42962306a36Sopenharmony_ci return 1; 43062306a36Sopenharmony_ci} 43162306a36Sopenharmony_ci 43262306a36Sopenharmony_ci__setup("nolwsys", nolwsys_setup); 43362306a36Sopenharmony_ci 43462306a36Sopenharmony_civoid __init 43562306a36Sopenharmony_cimem_init (void) 43662306a36Sopenharmony_ci{ 43762306a36Sopenharmony_ci int i; 43862306a36Sopenharmony_ci 43962306a36Sopenharmony_ci BUG_ON(PTRS_PER_PGD * sizeof(pgd_t) != PAGE_SIZE); 44062306a36Sopenharmony_ci BUG_ON(PTRS_PER_PMD * sizeof(pmd_t) != PAGE_SIZE); 44162306a36Sopenharmony_ci BUG_ON(PTRS_PER_PTE * sizeof(pte_t) != PAGE_SIZE); 44262306a36Sopenharmony_ci 44362306a36Sopenharmony_ci /* 44462306a36Sopenharmony_ci * This needs to be called _after_ the command line has been parsed but 44562306a36Sopenharmony_ci * _before_ any drivers that may need the PCI DMA interface are 44662306a36Sopenharmony_ci * initialized or bootmem has been freed. 44762306a36Sopenharmony_ci */ 44862306a36Sopenharmony_ci do { 44962306a36Sopenharmony_ci#ifdef CONFIG_INTEL_IOMMU 45062306a36Sopenharmony_ci detect_intel_iommu(); 45162306a36Sopenharmony_ci if (iommu_detected) 45262306a36Sopenharmony_ci break; 45362306a36Sopenharmony_ci#endif 45462306a36Sopenharmony_ci swiotlb_init(true, SWIOTLB_VERBOSE); 45562306a36Sopenharmony_ci } while (0); 45662306a36Sopenharmony_ci 45762306a36Sopenharmony_ci#ifdef CONFIG_FLATMEM 45862306a36Sopenharmony_ci BUG_ON(!mem_map); 45962306a36Sopenharmony_ci#endif 46062306a36Sopenharmony_ci 46162306a36Sopenharmony_ci set_max_mapnr(max_low_pfn); 46262306a36Sopenharmony_ci high_memory = __va(max_low_pfn * PAGE_SIZE); 46362306a36Sopenharmony_ci memblock_free_all(); 46462306a36Sopenharmony_ci 46562306a36Sopenharmony_ci /* 46662306a36Sopenharmony_ci * For fsyscall entrypoints with no light-weight handler, use the ordinary 46762306a36Sopenharmony_ci * (heavy-weight) handler, but mark it by setting bit 0, so the fsyscall entry 46862306a36Sopenharmony_ci * code can tell them apart. 46962306a36Sopenharmony_ci */ 47062306a36Sopenharmony_ci for (i = 0; i < NR_syscalls; ++i) { 47162306a36Sopenharmony_ci extern unsigned long fsyscall_table[NR_syscalls]; 47262306a36Sopenharmony_ci extern unsigned long sys_call_table[NR_syscalls]; 47362306a36Sopenharmony_ci 47462306a36Sopenharmony_ci if (!fsyscall_table[i] || nolwsys) 47562306a36Sopenharmony_ci fsyscall_table[i] = sys_call_table[i] | 1; 47662306a36Sopenharmony_ci } 47762306a36Sopenharmony_ci setup_gate(); 47862306a36Sopenharmony_ci} 47962306a36Sopenharmony_ci 48062306a36Sopenharmony_ci#ifdef CONFIG_MEMORY_HOTPLUG 48162306a36Sopenharmony_ciint arch_add_memory(int nid, u64 start, u64 size, 48262306a36Sopenharmony_ci struct mhp_params *params) 48362306a36Sopenharmony_ci{ 48462306a36Sopenharmony_ci unsigned long start_pfn = start >> PAGE_SHIFT; 48562306a36Sopenharmony_ci unsigned long nr_pages = size >> PAGE_SHIFT; 48662306a36Sopenharmony_ci int ret; 48762306a36Sopenharmony_ci 48862306a36Sopenharmony_ci if (WARN_ON_ONCE(params->pgprot.pgprot != PAGE_KERNEL.pgprot)) 48962306a36Sopenharmony_ci return -EINVAL; 49062306a36Sopenharmony_ci 49162306a36Sopenharmony_ci ret = __add_pages(nid, start_pfn, nr_pages, params); 49262306a36Sopenharmony_ci if (ret) 49362306a36Sopenharmony_ci printk("%s: Problem encountered in __add_pages() as ret=%d\n", 49462306a36Sopenharmony_ci __func__, ret); 49562306a36Sopenharmony_ci 49662306a36Sopenharmony_ci return ret; 49762306a36Sopenharmony_ci} 49862306a36Sopenharmony_ci 49962306a36Sopenharmony_civoid arch_remove_memory(u64 start, u64 size, struct vmem_altmap *altmap) 50062306a36Sopenharmony_ci{ 50162306a36Sopenharmony_ci unsigned long start_pfn = start >> PAGE_SHIFT; 50262306a36Sopenharmony_ci unsigned long nr_pages = size >> PAGE_SHIFT; 50362306a36Sopenharmony_ci 50462306a36Sopenharmony_ci __remove_pages(start_pfn, nr_pages, altmap); 50562306a36Sopenharmony_ci} 50662306a36Sopenharmony_ci#endif 50762306a36Sopenharmony_ci 50862306a36Sopenharmony_cistatic const pgprot_t protection_map[16] = { 50962306a36Sopenharmony_ci [VM_NONE] = PAGE_NONE, 51062306a36Sopenharmony_ci [VM_READ] = PAGE_READONLY, 51162306a36Sopenharmony_ci [VM_WRITE] = PAGE_READONLY, 51262306a36Sopenharmony_ci [VM_WRITE | VM_READ] = PAGE_READONLY, 51362306a36Sopenharmony_ci [VM_EXEC] = __pgprot(__ACCESS_BITS | _PAGE_PL_3 | 51462306a36Sopenharmony_ci _PAGE_AR_X_RX), 51562306a36Sopenharmony_ci [VM_EXEC | VM_READ] = __pgprot(__ACCESS_BITS | _PAGE_PL_3 | 51662306a36Sopenharmony_ci _PAGE_AR_RX), 51762306a36Sopenharmony_ci [VM_EXEC | VM_WRITE] = PAGE_COPY_EXEC, 51862306a36Sopenharmony_ci [VM_EXEC | VM_WRITE | VM_READ] = PAGE_COPY_EXEC, 51962306a36Sopenharmony_ci [VM_SHARED] = PAGE_NONE, 52062306a36Sopenharmony_ci [VM_SHARED | VM_READ] = PAGE_READONLY, 52162306a36Sopenharmony_ci [VM_SHARED | VM_WRITE] = PAGE_SHARED, 52262306a36Sopenharmony_ci [VM_SHARED | VM_WRITE | VM_READ] = PAGE_SHARED, 52362306a36Sopenharmony_ci [VM_SHARED | VM_EXEC] = __pgprot(__ACCESS_BITS | _PAGE_PL_3 | 52462306a36Sopenharmony_ci _PAGE_AR_X_RX), 52562306a36Sopenharmony_ci [VM_SHARED | VM_EXEC | VM_READ] = __pgprot(__ACCESS_BITS | _PAGE_PL_3 | 52662306a36Sopenharmony_ci _PAGE_AR_RX), 52762306a36Sopenharmony_ci [VM_SHARED | VM_EXEC | VM_WRITE] = __pgprot(__ACCESS_BITS | _PAGE_PL_3 | 52862306a36Sopenharmony_ci _PAGE_AR_RWX), 52962306a36Sopenharmony_ci [VM_SHARED | VM_EXEC | VM_WRITE | VM_READ] = __pgprot(__ACCESS_BITS | _PAGE_PL_3 | 53062306a36Sopenharmony_ci _PAGE_AR_RWX) 53162306a36Sopenharmony_ci}; 53262306a36Sopenharmony_ciDECLARE_VM_GET_PAGE_PROT 533