blob: bc9d5eb7bfa2b32bfe5ec58c6754f31d224f6122 [file] [log] [blame]
Catalin Marinasc1cc1552012-03-05 11:49:27 +00001/*
2 * Based on arch/arm/mm/mmu.c
3 *
4 * Copyright (C) 1995-2005 Russell King
5 * Copyright (C) 2012 ARM Ltd.
6 *
7 * This program is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU General Public License version 2 as
9 * published by the Free Software Foundation.
10 *
11 * This program is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 * GNU General Public License for more details.
15 *
16 * You should have received a copy of the GNU General Public License
17 * along with this program. If not, see <http://www.gnu.org/licenses/>.
18 */
19
Jisheng Zhang5a9e3e12016-08-15 14:45:46 +080020#include <linux/cache.h>
Catalin Marinasc1cc1552012-03-05 11:49:27 +000021#include <linux/export.h>
22#include <linux/kernel.h>
23#include <linux/errno.h>
24#include <linux/init.h>
Ard Biesheuvel61bd93c2015-06-01 13:40:32 +020025#include <linux/libfdt.h>
Catalin Marinasc1cc1552012-03-05 11:49:27 +000026#include <linux/mman.h>
27#include <linux/nodemask.h>
28#include <linux/memblock.h>
29#include <linux/fs.h>
Catalin Marinas2475ff92012-10-23 14:55:08 +010030#include <linux/io.h>
Laura Abbott2077be62017-01-10 13:35:49 -080031#include <linux/mm.h>
Catalin Marinasc1cc1552012-03-05 11:49:27 +000032
Mark Rutland21ab99c2016-01-25 11:44:56 +000033#include <asm/barrier.h>
Catalin Marinasc1cc1552012-03-05 11:49:27 +000034#include <asm/cputype.h>
Laura Abbottaf86e592014-11-21 21:50:42 +000035#include <asm/fixmap.h>
Mark Rutland068a17a2016-01-25 11:45:12 +000036#include <asm/kasan.h>
Suzuki K. Pouloseb433dce2015-10-19 14:19:28 +010037#include <asm/kernel-pgtable.h>
Catalin Marinasc1cc1552012-03-05 11:49:27 +000038#include <asm/sections.h>
39#include <asm/setup.h>
40#include <asm/sizes.h>
41#include <asm/tlb.h>
Jungseok Leec79b954b2014-05-12 18:40:51 +090042#include <asm/memblock.h>
Catalin Marinasc1cc1552012-03-05 11:49:27 +000043#include <asm/mmu_context.h>
Laura Abbott1404d6f2016-10-27 09:27:34 -070044#include <asm/ptdump.h>
Catalin Marinasc1cc1552012-03-05 11:49:27 +000045
Ard Biesheuvelc0951362017-03-09 21:52:07 +010046#define NO_BLOCK_MAPPINGS BIT(0)
47
Ard Biesheuveldd006da2015-03-19 16:42:27 +000048u64 idmap_t0sz = TCR_T0SZ(VA_BITS);
49
Jisheng Zhang5a9e3e12016-08-15 14:45:46 +080050u64 kimage_voffset __ro_after_init;
Ard Biesheuvela7f8de12016-02-16 13:52:42 +010051EXPORT_SYMBOL(kimage_voffset);
52
Catalin Marinasc1cc1552012-03-05 11:49:27 +000053/*
54 * Empty_zero_page is a special page that is used for zero-initialized data
55 * and COW.
56 */
Mark Rutland5227cfa2016-01-25 11:44:57 +000057unsigned long empty_zero_page[PAGE_SIZE / sizeof(unsigned long)] __page_aligned_bss;
Catalin Marinasc1cc1552012-03-05 11:49:27 +000058EXPORT_SYMBOL(empty_zero_page);
59
Ard Biesheuvelf9040772016-02-16 13:52:40 +010060static pte_t bm_pte[PTRS_PER_PTE] __page_aligned_bss;
61static pmd_t bm_pmd[PTRS_PER_PMD] __page_aligned_bss __maybe_unused;
62static pud_t bm_pud[PTRS_PER_PUD] __page_aligned_bss __maybe_unused;
63
Catalin Marinasc1cc1552012-03-05 11:49:27 +000064pgprot_t phys_mem_access_prot(struct file *file, unsigned long pfn,
65 unsigned long size, pgprot_t vma_prot)
66{
67 if (!pfn_valid(pfn))
68 return pgprot_noncached(vma_prot);
69 else if (file->f_flags & O_SYNC)
70 return pgprot_writecombine(vma_prot);
71 return vma_prot;
72}
73EXPORT_SYMBOL(phys_mem_access_prot);
74
Mark Rutlandf4710442016-01-25 11:45:08 +000075static phys_addr_t __init early_pgtable_alloc(void)
Catalin Marinasc1cc1552012-03-05 11:49:27 +000076{
Suzuki K. Poulose71423922015-11-20 17:45:40 +000077 phys_addr_t phys;
78 void *ptr;
79
Mark Rutland21ab99c2016-01-25 11:44:56 +000080 phys = memblock_alloc(PAGE_SIZE, PAGE_SIZE);
Mark Rutlandf4710442016-01-25 11:45:08 +000081
82 /*
83 * The FIX_{PGD,PUD,PMD} slots may be in active use, but the FIX_PTE
84 * slot will be free, so we can (ab)use the FIX_PTE slot to initialise
85 * any level of table.
86 */
87 ptr = pte_set_fixmap(phys);
88
Mark Rutland21ab99c2016-01-25 11:44:56 +000089 memset(ptr, 0, PAGE_SIZE);
90
Mark Rutlandf4710442016-01-25 11:45:08 +000091 /*
92 * Implicit barriers also ensure the zeroed page is visible to the page
93 * table walker
94 */
95 pte_clear_fixmap();
96
97 return phys;
Catalin Marinasc1cc1552012-03-05 11:49:27 +000098}
99
Ard Biesheuvele98216b2016-10-21 12:22:56 +0100100static bool pgattr_change_is_safe(u64 old, u64 new)
101{
102 /*
103 * The following mapping attributes may be updated in live
104 * kernel mappings without the need for break-before-make.
105 */
106 static const pteval_t mask = PTE_PXN | PTE_RDONLY | PTE_WRITE;
107
Ard Biesheuvel141d1492017-03-09 21:52:06 +0100108 /* creating or taking down mappings is always safe */
109 if (old == 0 || new == 0)
110 return true;
111
112 /* live contiguous mappings may not be manipulated at all */
113 if ((old | new) & PTE_CONT)
114 return false;
115
116 return ((old ^ new) & ~mask) == 0;
Ard Biesheuvele98216b2016-10-21 12:22:56 +0100117}
118
Laura Abbottda141702015-01-21 17:36:06 -0800119static void alloc_init_pte(pmd_t *pmd, unsigned long addr,
Ard Biesheuvele393cf42017-03-09 21:52:04 +0100120 unsigned long end, phys_addr_t phys,
Laura Abbottda141702015-01-21 17:36:06 -0800121 pgprot_t prot,
Mark Rutlandd81bbe62017-02-23 16:22:55 +0000122 phys_addr_t (*pgtable_alloc)(void))
Catalin Marinasc1cc1552012-03-05 11:49:27 +0000123{
124 pte_t *pte;
125
Catalin Marinas4133af62016-06-29 14:51:29 +0200126 BUG_ON(pmd_sect(*pmd));
127 if (pmd_none(*pmd)) {
Laura Abbott132233a2016-02-05 16:24:46 -0800128 phys_addr_t pte_phys;
129 BUG_ON(!pgtable_alloc);
130 pte_phys = pgtable_alloc();
Mark Rutlandf4710442016-01-25 11:45:08 +0000131 pte = pte_set_fixmap(pte_phys);
Mark Rutlandf4710442016-01-25 11:45:08 +0000132 __pmd_populate(pmd, pte_phys, PMD_TYPE_TABLE);
Mark Rutlandf4710442016-01-25 11:45:08 +0000133 pte_clear_fixmap();
Catalin Marinasc1cc1552012-03-05 11:49:27 +0000134 }
Mark Rutlanda1c76572015-01-27 16:36:30 +0000135 BUG_ON(pmd_bad(*pmd));
Catalin Marinasc1cc1552012-03-05 11:49:27 +0000136
Mark Rutlandf4710442016-01-25 11:45:08 +0000137 pte = pte_set_fixmap_offset(pmd, addr);
Catalin Marinasc1cc1552012-03-05 11:49:27 +0000138 do {
Ard Biesheuvele98216b2016-10-21 12:22:56 +0100139 pte_t old_pte = *pte;
140
Ard Biesheuvele393cf42017-03-09 21:52:04 +0100141 set_pte(pte, pfn_pte(__phys_to_pfn(phys), prot));
Ard Biesheuvele98216b2016-10-21 12:22:56 +0100142
143 /*
144 * After the PTE entry has been populated once, we
145 * only allow updates to the permission attributes.
146 */
147 BUG_ON(!pgattr_change_is_safe(pte_val(old_pte), pte_val(*pte)));
148
Ard Biesheuvele393cf42017-03-09 21:52:04 +0100149 phys += PAGE_SIZE;
Catalin Marinas667c2752015-11-26 15:42:41 +0000150 } while (pte++, addr += PAGE_SIZE, addr != end);
Mark Rutlandf4710442016-01-25 11:45:08 +0000151
152 pte_clear_fixmap();
Catalin Marinasc1cc1552012-03-05 11:49:27 +0000153}
154
Mark Rutland11509a32016-01-25 11:45:10 +0000155static void alloc_init_pmd(pud_t *pud, unsigned long addr, unsigned long end,
Laura Abbottda141702015-01-21 17:36:06 -0800156 phys_addr_t phys, pgprot_t prot,
Ard Biesheuvel53e1b322016-06-29 14:51:26 +0200157 phys_addr_t (*pgtable_alloc)(void),
Ard Biesheuvelc0951362017-03-09 21:52:07 +0100158 int flags)
Catalin Marinasc1cc1552012-03-05 11:49:27 +0000159{
160 pmd_t *pmd;
161 unsigned long next;
162
163 /*
164 * Check for initial section mappings in the pgd/pud and remove them.
165 */
Catalin Marinas4133af62016-06-29 14:51:29 +0200166 BUG_ON(pud_sect(*pud));
167 if (pud_none(*pud)) {
Laura Abbott132233a2016-02-05 16:24:46 -0800168 phys_addr_t pmd_phys;
169 BUG_ON(!pgtable_alloc);
170 pmd_phys = pgtable_alloc();
Mark Rutlandf4710442016-01-25 11:45:08 +0000171 pmd = pmd_set_fixmap(pmd_phys);
Mark Rutlandf4710442016-01-25 11:45:08 +0000172 __pud_populate(pud, pmd_phys, PUD_TYPE_TABLE);
Mark Rutlandf4710442016-01-25 11:45:08 +0000173 pmd_clear_fixmap();
Catalin Marinasc1cc1552012-03-05 11:49:27 +0000174 }
Mark Rutlanda1c76572015-01-27 16:36:30 +0000175 BUG_ON(pud_bad(*pud));
Catalin Marinasc1cc1552012-03-05 11:49:27 +0000176
Mark Rutlandf4710442016-01-25 11:45:08 +0000177 pmd = pmd_set_fixmap_offset(pud, addr);
Catalin Marinasc1cc1552012-03-05 11:49:27 +0000178 do {
Ard Biesheuvele98216b2016-10-21 12:22:56 +0100179 pmd_t old_pmd = *pmd;
180
Catalin Marinasc1cc1552012-03-05 11:49:27 +0000181 next = pmd_addr_end(addr, end);
Ard Biesheuvele98216b2016-10-21 12:22:56 +0100182
Catalin Marinasc1cc1552012-03-05 11:49:27 +0000183 /* try section mapping first */
Laura Abbott83863f22016-02-05 16:24:47 -0800184 if (((addr | next | phys) & ~SECTION_MASK) == 0 &&
Ard Biesheuvelc0951362017-03-09 21:52:07 +0100185 (flags & NO_BLOCK_MAPPINGS) == 0) {
Mark Rutlandd81bbe62017-02-23 16:22:55 +0000186 pmd_set_huge(pmd, phys, prot);
Ard Biesheuvele98216b2016-10-21 12:22:56 +0100187
Catalin Marinasa55f9922014-02-04 16:01:31 +0000188 /*
Ard Biesheuvele98216b2016-10-21 12:22:56 +0100189 * After the PMD entry has been populated once, we
190 * only allow updates to the permission attributes.
Catalin Marinasa55f9922014-02-04 16:01:31 +0000191 */
Ard Biesheuvele98216b2016-10-21 12:22:56 +0100192 BUG_ON(!pgattr_change_is_safe(pmd_val(old_pmd),
193 pmd_val(*pmd)));
Catalin Marinasa55f9922014-02-04 16:01:31 +0000194 } else {
Ard Biesheuvele393cf42017-03-09 21:52:04 +0100195 alloc_init_pte(pmd, addr, next, phys,
Mark Rutlandd81bbe62017-02-23 16:22:55 +0000196 prot, pgtable_alloc);
Ard Biesheuvele98216b2016-10-21 12:22:56 +0100197
198 BUG_ON(pmd_val(old_pmd) != 0 &&
199 pmd_val(old_pmd) != pmd_val(*pmd));
Catalin Marinasa55f9922014-02-04 16:01:31 +0000200 }
Catalin Marinasc1cc1552012-03-05 11:49:27 +0000201 phys += next - addr;
202 } while (pmd++, addr = next, addr != end);
Mark Rutlandf4710442016-01-25 11:45:08 +0000203
204 pmd_clear_fixmap();
Catalin Marinasc1cc1552012-03-05 11:49:27 +0000205}
206
Laura Abbottda141702015-01-21 17:36:06 -0800207static inline bool use_1G_block(unsigned long addr, unsigned long next,
208 unsigned long phys)
209{
210 if (PAGE_SHIFT != 12)
211 return false;
212
213 if (((addr | next | phys) & ~PUD_MASK) != 0)
214 return false;
215
216 return true;
217}
218
Mark Rutland11509a32016-01-25 11:45:10 +0000219static void alloc_init_pud(pgd_t *pgd, unsigned long addr, unsigned long end,
Laura Abbottda141702015-01-21 17:36:06 -0800220 phys_addr_t phys, pgprot_t prot,
Ard Biesheuvel53e1b322016-06-29 14:51:26 +0200221 phys_addr_t (*pgtable_alloc)(void),
Ard Biesheuvelc0951362017-03-09 21:52:07 +0100222 int flags)
Catalin Marinasc1cc1552012-03-05 11:49:27 +0000223{
Jungseok Leec79b954b2014-05-12 18:40:51 +0900224 pud_t *pud;
Catalin Marinasc1cc1552012-03-05 11:49:27 +0000225 unsigned long next;
226
Jungseok Leec79b954b2014-05-12 18:40:51 +0900227 if (pgd_none(*pgd)) {
Laura Abbott132233a2016-02-05 16:24:46 -0800228 phys_addr_t pud_phys;
229 BUG_ON(!pgtable_alloc);
230 pud_phys = pgtable_alloc();
Mark Rutlandf4710442016-01-25 11:45:08 +0000231 __pgd_populate(pgd, pud_phys, PUD_TYPE_TABLE);
Jungseok Leec79b954b2014-05-12 18:40:51 +0900232 }
233 BUG_ON(pgd_bad(*pgd));
234
Mark Rutlandf4710442016-01-25 11:45:08 +0000235 pud = pud_set_fixmap_offset(pgd, addr);
Catalin Marinasc1cc1552012-03-05 11:49:27 +0000236 do {
Ard Biesheuvele98216b2016-10-21 12:22:56 +0100237 pud_t old_pud = *pud;
238
Catalin Marinasc1cc1552012-03-05 11:49:27 +0000239 next = pud_addr_end(addr, end);
Steve Capper206a2a72014-05-06 14:02:27 +0100240
241 /*
242 * For 4K granule only, attempt to put down a 1GB block
243 */
Ard Biesheuvelc0951362017-03-09 21:52:07 +0100244 if (use_1G_block(addr, next, phys) &&
245 (flags & NO_BLOCK_MAPPINGS) == 0) {
Mark Rutlandc661cb12016-03-22 10:11:45 +0000246 pud_set_huge(pud, phys, prot);
Steve Capper206a2a72014-05-06 14:02:27 +0100247
248 /*
Ard Biesheuvele98216b2016-10-21 12:22:56 +0100249 * After the PUD entry has been populated once, we
250 * only allow updates to the permission attributes.
Steve Capper206a2a72014-05-06 14:02:27 +0100251 */
Ard Biesheuvele98216b2016-10-21 12:22:56 +0100252 BUG_ON(!pgattr_change_is_safe(pud_val(old_pud),
253 pud_val(*pud)));
Steve Capper206a2a72014-05-06 14:02:27 +0100254 } else {
Mark Rutland11509a32016-01-25 11:45:10 +0000255 alloc_init_pmd(pud, addr, next, phys, prot,
Ard Biesheuvelc0951362017-03-09 21:52:07 +0100256 pgtable_alloc, flags);
Ard Biesheuvele98216b2016-10-21 12:22:56 +0100257
258 BUG_ON(pud_val(old_pud) != 0 &&
259 pud_val(old_pud) != pud_val(*pud));
Steve Capper206a2a72014-05-06 14:02:27 +0100260 }
Catalin Marinasc1cc1552012-03-05 11:49:27 +0000261 phys += next - addr;
262 } while (pud++, addr = next, addr != end);
Mark Rutlandf4710442016-01-25 11:45:08 +0000263
264 pud_clear_fixmap();
Catalin Marinasc1cc1552012-03-05 11:49:27 +0000265}
266
Ard Biesheuvel40f87d32016-06-29 14:51:30 +0200267static void __create_pgd_mapping(pgd_t *pgdir, phys_addr_t phys,
268 unsigned long virt, phys_addr_t size,
269 pgprot_t prot,
270 phys_addr_t (*pgtable_alloc)(void),
Ard Biesheuvelc0951362017-03-09 21:52:07 +0100271 int flags)
Catalin Marinasc1cc1552012-03-05 11:49:27 +0000272{
273 unsigned long addr, length, end, next;
Ard Biesheuvel40f87d32016-06-29 14:51:30 +0200274 pgd_t *pgd = pgd_offset_raw(pgdir, virt);
Catalin Marinasc1cc1552012-03-05 11:49:27 +0000275
Mark Rutlandcc5d2b32015-11-23 13:26:19 +0000276 /*
277 * If the virtual and physical address don't have the same offset
278 * within a page, we cannot map the region as the caller expects.
279 */
280 if (WARN_ON((phys ^ virt) & ~PAGE_MASK))
281 return;
282
Mark Rutland9c4e08a2015-11-23 13:26:20 +0000283 phys &= PAGE_MASK;
Catalin Marinasc1cc1552012-03-05 11:49:27 +0000284 addr = virt & PAGE_MASK;
285 length = PAGE_ALIGN(size + (virt & ~PAGE_MASK));
286
Catalin Marinasc1cc1552012-03-05 11:49:27 +0000287 end = addr + length;
288 do {
289 next = pgd_addr_end(addr, end);
Ard Biesheuvel53e1b322016-06-29 14:51:26 +0200290 alloc_init_pud(pgd, addr, next, phys, prot, pgtable_alloc,
Ard Biesheuvelc0951362017-03-09 21:52:07 +0100291 flags);
Catalin Marinasc1cc1552012-03-05 11:49:27 +0000292 phys += next - addr;
293 } while (pgd++, addr = next, addr != end);
294}
295
Ard Biesheuvel1378dc32016-07-22 19:32:25 +0200296static phys_addr_t pgd_pgtable_alloc(void)
Laura Abbottda141702015-01-21 17:36:06 -0800297{
Mark Rutland21ab99c2016-01-25 11:44:56 +0000298 void *ptr = (void *)__get_free_page(PGALLOC_GFP);
Ard Biesheuvel1378dc32016-07-22 19:32:25 +0200299 if (!ptr || !pgtable_page_ctor(virt_to_page(ptr)))
300 BUG();
Mark Rutland21ab99c2016-01-25 11:44:56 +0000301
302 /* Ensure the zeroed page is visible to the page table walker */
303 dsb(ishst);
Mark Rutlandf4710442016-01-25 11:45:08 +0000304 return __pa(ptr);
Laura Abbottda141702015-01-21 17:36:06 -0800305}
306
Laura Abbott132233a2016-02-05 16:24:46 -0800307/*
308 * This function can only be used to modify existing table entries,
309 * without allocating new levels of table. Note that this permits the
310 * creation of new section or page entries.
311 */
312static void __init create_mapping_noalloc(phys_addr_t phys, unsigned long virt,
Laura Abbottda141702015-01-21 17:36:06 -0800313 phys_addr_t size, pgprot_t prot)
Mark Salterd7ecbdd2014-03-12 12:28:06 -0400314{
315 if (virt < VMALLOC_START) {
316 pr_warn("BUG: not creating mapping for %pa at 0x%016lx - outside kernel range\n",
317 &phys, virt);
318 return;
319 }
Ard Biesheuvelc0951362017-03-09 21:52:07 +0100320 __create_pgd_mapping(init_mm.pgd, phys, virt, size, prot, NULL, 0);
Mark Salterd7ecbdd2014-03-12 12:28:06 -0400321}
322
Ard Biesheuvel8ce837c2014-10-20 15:42:07 +0200323void __init create_pgd_mapping(struct mm_struct *mm, phys_addr_t phys,
324 unsigned long virt, phys_addr_t size,
Ard Biesheuvelf14c66c2016-10-21 12:22:57 +0100325 pgprot_t prot, bool page_mappings_only)
Ard Biesheuvel8ce837c2014-10-20 15:42:07 +0200326{
Ard Biesheuvelc0951362017-03-09 21:52:07 +0100327 int flags = 0;
328
Ard Biesheuvel1378dc32016-07-22 19:32:25 +0200329 BUG_ON(mm == &init_mm);
330
Ard Biesheuvelc0951362017-03-09 21:52:07 +0100331 if (page_mappings_only)
332 flags = NO_BLOCK_MAPPINGS;
333
Mark Rutland11509a32016-01-25 11:45:10 +0000334 __create_pgd_mapping(mm->pgd, phys, virt, size, prot,
Ard Biesheuvelc0951362017-03-09 21:52:07 +0100335 pgd_pgtable_alloc, flags);
Mark Salterd7ecbdd2014-03-12 12:28:06 -0400336}
337
Ard Biesheuvelaa8c09b2017-03-09 21:52:00 +0100338static void update_mapping_prot(phys_addr_t phys, unsigned long virt,
339 phys_addr_t size, pgprot_t prot)
Laura Abbottda141702015-01-21 17:36:06 -0800340{
341 if (virt < VMALLOC_START) {
Ard Biesheuvelaa8c09b2017-03-09 21:52:00 +0100342 pr_warn("BUG: not updating mapping for %pa at 0x%016lx - outside kernel range\n",
Laura Abbottda141702015-01-21 17:36:06 -0800343 &phys, virt);
344 return;
345 }
346
Ard Biesheuvelc0951362017-03-09 21:52:07 +0100347 __create_pgd_mapping(init_mm.pgd, phys, virt, size, prot, NULL, 0);
Ard Biesheuvelaa8c09b2017-03-09 21:52:00 +0100348
349 /* flush the TLBs after updating live kernel mappings */
350 flush_tlb_kernel_range(virt, virt + size);
Laura Abbottda141702015-01-21 17:36:06 -0800351}
352
Mark Rutland068a17a2016-01-25 11:45:12 +0000353static void __init __map_memblock(pgd_t *pgd, phys_addr_t start, phys_addr_t end)
Laura Abbottda141702015-01-21 17:36:06 -0800354{
Miles Cheneac80172017-01-13 13:59:35 +0800355 phys_addr_t kernel_start = __pa_symbol(_text);
356 phys_addr_t kernel_end = __pa_symbol(__init_begin);
Ard Biesheuvelc0951362017-03-09 21:52:07 +0100357 int flags = 0;
358
359 if (debug_pagealloc_enabled())
360 flags = NO_BLOCK_MAPPINGS;
Mark Rutland068a17a2016-01-25 11:45:12 +0000361
362 /*
Ard Biesheuvelf9040772016-02-16 13:52:40 +0100363 * Take care not to create a writable alias for the
364 * read-only text and rodata sections of the kernel image.
Mark Rutland068a17a2016-01-25 11:45:12 +0000365 */
366
Ard Biesheuvel9fdc14c52016-06-23 15:53:17 +0200367 /* No overlap with the kernel text/rodata */
Mark Rutland068a17a2016-01-25 11:45:12 +0000368 if (end < kernel_start || start >= kernel_end) {
369 __create_pgd_mapping(pgd, start, __phys_to_virt(start),
370 end - start, PAGE_KERNEL,
Ard Biesheuvelc0951362017-03-09 21:52:07 +0100371 early_pgtable_alloc, flags);
Mark Rutland068a17a2016-01-25 11:45:12 +0000372 return;
Laura Abbottda141702015-01-21 17:36:06 -0800373 }
374
Mark Rutland068a17a2016-01-25 11:45:12 +0000375 /*
Ard Biesheuvel9fdc14c52016-06-23 15:53:17 +0200376 * This block overlaps the kernel text/rodata mappings.
Ard Biesheuvelf9040772016-02-16 13:52:40 +0100377 * Map the portion(s) which don't overlap.
Mark Rutland068a17a2016-01-25 11:45:12 +0000378 */
379 if (start < kernel_start)
380 __create_pgd_mapping(pgd, start,
381 __phys_to_virt(start),
382 kernel_start - start, PAGE_KERNEL,
Ard Biesheuvelc0951362017-03-09 21:52:07 +0100383 early_pgtable_alloc, flags);
Mark Rutland068a17a2016-01-25 11:45:12 +0000384 if (kernel_end < end)
385 __create_pgd_mapping(pgd, kernel_end,
386 __phys_to_virt(kernel_end),
387 end - kernel_end, PAGE_KERNEL,
Ard Biesheuvelc0951362017-03-09 21:52:07 +0100388 early_pgtable_alloc, flags);
Ard Biesheuvelf9040772016-02-16 13:52:40 +0100389
390 /*
Ard Biesheuvel5ea53062017-03-09 21:52:01 +0100391 * Map the linear alias of the [_text, __init_begin) interval
392 * as non-executable now, and remove the write permission in
393 * mark_linear_text_alias_ro() below (which will be called after
394 * alternative patching has completed). This makes the contents
395 * of the region accessible to subsystems such as hibernate,
396 * but protects it from inadvertent modification or execution.
Ard Biesheuvelf9040772016-02-16 13:52:40 +0100397 */
398 __create_pgd_mapping(pgd, kernel_start, __phys_to_virt(kernel_start),
Ard Biesheuvel5ea53062017-03-09 21:52:01 +0100399 kernel_end - kernel_start, PAGE_KERNEL,
Ard Biesheuvelc0951362017-03-09 21:52:07 +0100400 early_pgtable_alloc, 0);
Laura Abbottda141702015-01-21 17:36:06 -0800401}
Laura Abbottda141702015-01-21 17:36:06 -0800402
Ard Biesheuvel5ea53062017-03-09 21:52:01 +0100403void __init mark_linear_text_alias_ro(void)
404{
405 /*
406 * Remove the write permissions from the linear alias of .text/.rodata
407 */
408 update_mapping_prot(__pa_symbol(_text), (unsigned long)lm_alias(_text),
409 (unsigned long)__init_begin - (unsigned long)_text,
410 PAGE_KERNEL_RO);
411}
412
Mark Rutland068a17a2016-01-25 11:45:12 +0000413static void __init map_mem(pgd_t *pgd)
Catalin Marinasc1cc1552012-03-05 11:49:27 +0000414{
415 struct memblock_region *reg;
Steve Capperf6bc87c2013-04-30 11:00:33 +0100416
Catalin Marinasc1cc1552012-03-05 11:49:27 +0000417 /* map all the memory banks */
418 for_each_memblock(memory, reg) {
419 phys_addr_t start = reg->base;
420 phys_addr_t end = start + reg->size;
421
422 if (start >= end)
423 break;
Ard Biesheuvel68709f42015-11-30 13:28:16 +0100424 if (memblock_is_nomap(reg))
425 continue;
Catalin Marinasc1cc1552012-03-05 11:49:27 +0000426
Mark Rutland068a17a2016-01-25 11:45:12 +0000427 __map_memblock(pgd, start, end);
Catalin Marinasc1cc1552012-03-05 11:49:27 +0000428 }
429}
430
Laura Abbottda141702015-01-21 17:36:06 -0800431void mark_rodata_ro(void)
432{
Jeremy Linton2f39b5f2016-02-19 11:50:32 -0600433 unsigned long section_size;
Ard Biesheuvelf9040772016-02-16 13:52:40 +0100434
Jeremy Linton2f39b5f2016-02-19 11:50:32 -0600435 /*
Ard Biesheuvel9fdc14c52016-06-23 15:53:17 +0200436 * mark .rodata as read only. Use __init_begin rather than __end_rodata
437 * to cover NOTES and EXCEPTION_TABLE.
Jeremy Linton2f39b5f2016-02-19 11:50:32 -0600438 */
Ard Biesheuvel9fdc14c52016-06-23 15:53:17 +0200439 section_size = (unsigned long)__init_begin - (unsigned long)__start_rodata;
Ard Biesheuvelaa8c09b2017-03-09 21:52:00 +0100440 update_mapping_prot(__pa_symbol(__start_rodata), (unsigned long)__start_rodata,
Jeremy Linton2f39b5f2016-02-19 11:50:32 -0600441 section_size, PAGE_KERNEL_RO);
Ard Biesheuvele98216b2016-10-21 12:22:56 +0100442
Laura Abbott1404d6f2016-10-27 09:27:34 -0700443 debug_checkwx();
Laura Abbottda141702015-01-21 17:36:06 -0800444}
Laura Abbottda141702015-01-21 17:36:06 -0800445
Ard Biesheuvel2c09ec02016-03-30 17:43:06 +0200446static void __init map_kernel_segment(pgd_t *pgd, void *va_start, void *va_end,
447 pgprot_t prot, struct vm_struct *vma)
Mark Rutland068a17a2016-01-25 11:45:12 +0000448{
Laura Abbott2077be62017-01-10 13:35:49 -0800449 phys_addr_t pa_start = __pa_symbol(va_start);
Mark Rutland068a17a2016-01-25 11:45:12 +0000450 unsigned long size = va_end - va_start;
451
452 BUG_ON(!PAGE_ALIGNED(pa_start));
453 BUG_ON(!PAGE_ALIGNED(size));
454
455 __create_pgd_mapping(pgd, pa_start, (unsigned long)va_start, size, prot,
Ard Biesheuvelc0951362017-03-09 21:52:07 +0100456 early_pgtable_alloc, 0);
Ard Biesheuvelf9040772016-02-16 13:52:40 +0100457
458 vma->addr = va_start;
459 vma->phys_addr = pa_start;
460 vma->size = size;
461 vma->flags = VM_MAP;
462 vma->caller = __builtin_return_address(0);
463
464 vm_area_add_early(vma);
Mark Rutland068a17a2016-01-25 11:45:12 +0000465}
466
Ard Biesheuvel28b066d2017-03-09 21:52:02 +0100467static int __init parse_rodata(char *arg)
468{
469 return strtobool(arg, &rodata_enabled);
470}
471early_param("rodata", parse_rodata);
472
Mark Rutland068a17a2016-01-25 11:45:12 +0000473/*
474 * Create fine-grained mappings for the kernel.
475 */
476static void __init map_kernel(pgd_t *pgd)
477{
Ard Biesheuvel2ebe088b2017-03-09 21:52:03 +0100478 static struct vm_struct vmlinux_text, vmlinux_rodata, vmlinux_inittext,
479 vmlinux_initdata, vmlinux_data;
Mark Rutland068a17a2016-01-25 11:45:12 +0000480
Ard Biesheuvel28b066d2017-03-09 21:52:02 +0100481 /*
482 * External debuggers may need to write directly to the text
483 * mapping to install SW breakpoints. Allow this (only) when
484 * explicitly requested with rodata=off.
485 */
486 pgprot_t text_prot = rodata_enabled ? PAGE_KERNEL_ROX : PAGE_KERNEL_EXEC;
487
488 map_kernel_segment(pgd, _text, _etext, text_prot, &vmlinux_text);
Ard Biesheuvel2ebe088b2017-03-09 21:52:03 +0100489 map_kernel_segment(pgd, __start_rodata, __inittext_begin, PAGE_KERNEL,
490 &vmlinux_rodata);
491 map_kernel_segment(pgd, __inittext_begin, __inittext_end, text_prot,
492 &vmlinux_inittext);
493 map_kernel_segment(pgd, __initdata_begin, __initdata_end, PAGE_KERNEL,
494 &vmlinux_initdata);
Ard Biesheuvel2c09ec02016-03-30 17:43:06 +0200495 map_kernel_segment(pgd, _data, _end, PAGE_KERNEL, &vmlinux_data);
Mark Rutland068a17a2016-01-25 11:45:12 +0000496
Ard Biesheuvelf9040772016-02-16 13:52:40 +0100497 if (!pgd_val(*pgd_offset_raw(pgd, FIXADDR_START))) {
498 /*
499 * The fixmap falls in a separate pgd to the kernel, and doesn't
500 * live in the carveout for the swapper_pg_dir. We can simply
501 * re-use the existing dir for the fixmap.
502 */
503 set_pgd(pgd_offset_raw(pgd, FIXADDR_START),
504 *pgd_offset_k(FIXADDR_START));
505 } else if (CONFIG_PGTABLE_LEVELS > 3) {
506 /*
507 * The fixmap shares its top level pgd entry with the kernel
508 * mapping. This can really only occur when we are running
509 * with 16k/4 levels, so we can simply reuse the pud level
510 * entry instead.
511 */
512 BUG_ON(!IS_ENABLED(CONFIG_ARM64_16K_PAGES));
513 set_pud(pud_set_fixmap_offset(pgd, FIXADDR_START),
Laura Abbott2077be62017-01-10 13:35:49 -0800514 __pud(__pa_symbol(bm_pmd) | PUD_TYPE_TABLE));
Ard Biesheuvelf9040772016-02-16 13:52:40 +0100515 pud_clear_fixmap();
516 } else {
517 BUG();
518 }
Mark Rutland068a17a2016-01-25 11:45:12 +0000519
520 kasan_copy_shadow(pgd);
521}
522
Catalin Marinasc1cc1552012-03-05 11:49:27 +0000523/*
524 * paging_init() sets up the page tables, initialises the zone memory
525 * maps and sets up the zero page.
526 */
527void __init paging_init(void)
528{
Mark Rutland068a17a2016-01-25 11:45:12 +0000529 phys_addr_t pgd_phys = early_pgtable_alloc();
530 pgd_t *pgd = pgd_set_fixmap(pgd_phys);
531
532 map_kernel(pgd);
533 map_mem(pgd);
534
535 /*
536 * We want to reuse the original swapper_pg_dir so we don't have to
537 * communicate the new address to non-coherent secondaries in
538 * secondary_entry, and so cpu_switch_mm can generate the address with
539 * adrp+add rather than a load from some global variable.
540 *
541 * To do this we need to go via a temporary pgd.
542 */
543 cpu_replace_ttbr1(__va(pgd_phys));
Arnd Bergmann12f043f2017-02-14 22:27:01 +0100544 memcpy(swapper_pg_dir, pgd, PGD_SIZE);
Laura Abbott2077be62017-01-10 13:35:49 -0800545 cpu_replace_ttbr1(lm_alias(swapper_pg_dir));
Mark Rutland068a17a2016-01-25 11:45:12 +0000546
547 pgd_clear_fixmap();
548 memblock_free(pgd_phys, PAGE_SIZE);
549
550 /*
551 * We only reuse the PGD from the swapper_pg_dir, not the pud + pmd
552 * allocated with it.
553 */
Laura Abbott2077be62017-01-10 13:35:49 -0800554 memblock_free(__pa_symbol(swapper_pg_dir) + PAGE_SIZE,
Mark Rutland068a17a2016-01-25 11:45:12 +0000555 SWAPPER_DIR_SIZE - PAGE_SIZE);
Catalin Marinasc1cc1552012-03-05 11:49:27 +0000556}
557
558/*
Catalin Marinasc1cc1552012-03-05 11:49:27 +0000559 * Check whether a kernel address is valid (derived from arch/x86/).
560 */
561int kern_addr_valid(unsigned long addr)
562{
563 pgd_t *pgd;
564 pud_t *pud;
565 pmd_t *pmd;
566 pte_t *pte;
567
568 if ((((long)addr) >> VA_BITS) != -1UL)
569 return 0;
570
571 pgd = pgd_offset_k(addr);
572 if (pgd_none(*pgd))
573 return 0;
574
575 pud = pud_offset(pgd, addr);
576 if (pud_none(*pud))
577 return 0;
578
Steve Capper206a2a72014-05-06 14:02:27 +0100579 if (pud_sect(*pud))
580 return pfn_valid(pud_pfn(*pud));
581
Catalin Marinasc1cc1552012-03-05 11:49:27 +0000582 pmd = pmd_offset(pud, addr);
583 if (pmd_none(*pmd))
584 return 0;
585
Dave Andersonda6e4cb2014-04-15 18:53:24 +0100586 if (pmd_sect(*pmd))
587 return pfn_valid(pmd_pfn(*pmd));
588
Catalin Marinasc1cc1552012-03-05 11:49:27 +0000589 pte = pte_offset_kernel(pmd, addr);
590 if (pte_none(*pte))
591 return 0;
592
593 return pfn_valid(pte_pfn(*pte));
594}
595#ifdef CONFIG_SPARSEMEM_VMEMMAP
Suzuki K. Pouloseb433dce2015-10-19 14:19:28 +0100596#if !ARM64_SWAPPER_USES_SECTION_MAPS
Johannes Weiner0aad8182013-04-29 15:07:50 -0700597int __meminit vmemmap_populate(unsigned long start, unsigned long end, int node)
Catalin Marinasc1cc1552012-03-05 11:49:27 +0000598{
Johannes Weiner0aad8182013-04-29 15:07:50 -0700599 return vmemmap_populate_basepages(start, end, node);
Catalin Marinasc1cc1552012-03-05 11:49:27 +0000600}
Suzuki K. Pouloseb433dce2015-10-19 14:19:28 +0100601#else /* !ARM64_SWAPPER_USES_SECTION_MAPS */
Johannes Weiner0aad8182013-04-29 15:07:50 -0700602int __meminit vmemmap_populate(unsigned long start, unsigned long end, int node)
Catalin Marinasc1cc1552012-03-05 11:49:27 +0000603{
Johannes Weiner0aad8182013-04-29 15:07:50 -0700604 unsigned long addr = start;
Catalin Marinasc1cc1552012-03-05 11:49:27 +0000605 unsigned long next;
606 pgd_t *pgd;
607 pud_t *pud;
608 pmd_t *pmd;
609
610 do {
611 next = pmd_addr_end(addr, end);
612
613 pgd = vmemmap_pgd_populate(addr, node);
614 if (!pgd)
615 return -ENOMEM;
616
617 pud = vmemmap_pud_populate(pgd, addr, node);
618 if (!pud)
619 return -ENOMEM;
620
621 pmd = pmd_offset(pud, addr);
622 if (pmd_none(*pmd)) {
623 void *p = NULL;
624
625 p = vmemmap_alloc_block_buf(PMD_SIZE, node);
626 if (!p)
627 return -ENOMEM;
628
Catalin Marinasa501e322014-04-03 15:57:15 +0100629 set_pmd(pmd, __pmd(__pa(p) | PROT_SECT_NORMAL));
Catalin Marinasc1cc1552012-03-05 11:49:27 +0000630 } else
631 vmemmap_verify((pte_t *)pmd, node, addr, next);
632 } while (addr = next, addr != end);
633
634 return 0;
635}
636#endif /* CONFIG_ARM64_64K_PAGES */
Johannes Weiner0aad8182013-04-29 15:07:50 -0700637void vmemmap_free(unsigned long start, unsigned long end)
Tang Chen01975182013-02-22 16:33:08 -0800638{
639}
Catalin Marinasc1cc1552012-03-05 11:49:27 +0000640#endif /* CONFIG_SPARSEMEM_VMEMMAP */
Laura Abbottaf86e592014-11-21 21:50:42 +0000641
Laura Abbottaf86e592014-11-21 21:50:42 +0000642static inline pud_t * fixmap_pud(unsigned long addr)
643{
644 pgd_t *pgd = pgd_offset_k(addr);
645
646 BUG_ON(pgd_none(*pgd) || pgd_bad(*pgd));
647
Ard Biesheuvel157962f2016-02-16 13:52:38 +0100648 return pud_offset_kimg(pgd, addr);
Laura Abbottaf86e592014-11-21 21:50:42 +0000649}
650
651static inline pmd_t * fixmap_pmd(unsigned long addr)
652{
653 pud_t *pud = fixmap_pud(addr);
654
655 BUG_ON(pud_none(*pud) || pud_bad(*pud));
656
Ard Biesheuvel157962f2016-02-16 13:52:38 +0100657 return pmd_offset_kimg(pud, addr);
Laura Abbottaf86e592014-11-21 21:50:42 +0000658}
659
660static inline pte_t * fixmap_pte(unsigned long addr)
661{
Ard Biesheuvel157962f2016-02-16 13:52:38 +0100662 return &bm_pte[pte_index(addr)];
Laura Abbottaf86e592014-11-21 21:50:42 +0000663}
664
Laura Abbott2077be62017-01-10 13:35:49 -0800665/*
666 * The p*d_populate functions call virt_to_phys implicitly so they can't be used
667 * directly on kernel symbols (bm_p*d). This function is called too early to use
668 * lm_alias so __p*d_populate functions must be used to populate with the
669 * physical address from __pa_symbol.
670 */
Laura Abbottaf86e592014-11-21 21:50:42 +0000671void __init early_fixmap_init(void)
672{
673 pgd_t *pgd;
674 pud_t *pud;
675 pmd_t *pmd;
676 unsigned long addr = FIXADDR_START;
677
678 pgd = pgd_offset_k(addr);
Ard Biesheuvelf80fb3a2016-01-26 14:12:01 +0100679 if (CONFIG_PGTABLE_LEVELS > 3 &&
Laura Abbott2077be62017-01-10 13:35:49 -0800680 !(pgd_none(*pgd) || pgd_page_paddr(*pgd) == __pa_symbol(bm_pud))) {
Ard Biesheuvelf9040772016-02-16 13:52:40 +0100681 /*
682 * We only end up here if the kernel mapping and the fixmap
683 * share the top level pgd entry, which should only happen on
684 * 16k/4 levels configurations.
685 */
686 BUG_ON(!IS_ENABLED(CONFIG_ARM64_16K_PAGES));
687 pud = pud_offset_kimg(pgd, addr);
688 } else {
Laura Abbott2077be62017-01-10 13:35:49 -0800689 if (pgd_none(*pgd))
690 __pgd_populate(pgd, __pa_symbol(bm_pud), PUD_TYPE_TABLE);
Ard Biesheuvelf9040772016-02-16 13:52:40 +0100691 pud = fixmap_pud(addr);
692 }
Laura Abbott2077be62017-01-10 13:35:49 -0800693 if (pud_none(*pud))
694 __pud_populate(pud, __pa_symbol(bm_pmd), PMD_TYPE_TABLE);
Ard Biesheuvel157962f2016-02-16 13:52:38 +0100695 pmd = fixmap_pmd(addr);
Laura Abbott2077be62017-01-10 13:35:49 -0800696 __pmd_populate(pmd, __pa_symbol(bm_pte), PMD_TYPE_TABLE);
Laura Abbottaf86e592014-11-21 21:50:42 +0000697
698 /*
699 * The boot-ioremap range spans multiple pmds, for which
Ard Biesheuvel157962f2016-02-16 13:52:38 +0100700 * we are not prepared:
Laura Abbottaf86e592014-11-21 21:50:42 +0000701 */
702 BUILD_BUG_ON((__fix_to_virt(FIX_BTMAP_BEGIN) >> PMD_SHIFT)
703 != (__fix_to_virt(FIX_BTMAP_END) >> PMD_SHIFT));
704
705 if ((pmd != fixmap_pmd(fix_to_virt(FIX_BTMAP_BEGIN)))
706 || pmd != fixmap_pmd(fix_to_virt(FIX_BTMAP_END))) {
707 WARN_ON(1);
708 pr_warn("pmd %p != %p, %p\n",
709 pmd, fixmap_pmd(fix_to_virt(FIX_BTMAP_BEGIN)),
710 fixmap_pmd(fix_to_virt(FIX_BTMAP_END)));
711 pr_warn("fix_to_virt(FIX_BTMAP_BEGIN): %08lx\n",
712 fix_to_virt(FIX_BTMAP_BEGIN));
713 pr_warn("fix_to_virt(FIX_BTMAP_END): %08lx\n",
714 fix_to_virt(FIX_BTMAP_END));
715
716 pr_warn("FIX_BTMAP_END: %d\n", FIX_BTMAP_END);
717 pr_warn("FIX_BTMAP_BEGIN: %d\n", FIX_BTMAP_BEGIN);
718 }
719}
720
721void __set_fixmap(enum fixed_addresses idx,
722 phys_addr_t phys, pgprot_t flags)
723{
724 unsigned long addr = __fix_to_virt(idx);
725 pte_t *pte;
726
Mark Rutlandb63dbef2015-03-04 13:27:35 +0000727 BUG_ON(idx <= FIX_HOLE || idx >= __end_of_fixed_addresses);
Laura Abbottaf86e592014-11-21 21:50:42 +0000728
729 pte = fixmap_pte(addr);
730
731 if (pgprot_val(flags)) {
732 set_pte(pte, pfn_pte(phys >> PAGE_SHIFT, flags));
733 } else {
734 pte_clear(&init_mm, addr, pte);
735 flush_tlb_kernel_range(addr, addr+PAGE_SIZE);
736 }
737}
Ard Biesheuvel61bd93c2015-06-01 13:40:32 +0200738
Ard Biesheuvelf80fb3a2016-01-26 14:12:01 +0100739void *__init __fixmap_remap_fdt(phys_addr_t dt_phys, int *size, pgprot_t prot)
Ard Biesheuvel61bd93c2015-06-01 13:40:32 +0200740{
741 const u64 dt_virt_base = __fix_to_virt(FIX_FDT);
Ard Biesheuvelf80fb3a2016-01-26 14:12:01 +0100742 int offset;
Ard Biesheuvel61bd93c2015-06-01 13:40:32 +0200743 void *dt_virt;
744
745 /*
746 * Check whether the physical FDT address is set and meets the minimum
747 * alignment requirement. Since we are relying on MIN_FDT_ALIGN to be
Ard Biesheuvel04a84812016-08-01 13:29:31 +0200748 * at least 8 bytes so that we can always access the magic and size
749 * fields of the FDT header after mapping the first chunk, double check
750 * here if that is indeed the case.
Ard Biesheuvel61bd93c2015-06-01 13:40:32 +0200751 */
752 BUILD_BUG_ON(MIN_FDT_ALIGN < 8);
753 if (!dt_phys || dt_phys % MIN_FDT_ALIGN)
754 return NULL;
755
756 /*
757 * Make sure that the FDT region can be mapped without the need to
758 * allocate additional translation table pages, so that it is safe
Laura Abbott132233a2016-02-05 16:24:46 -0800759 * to call create_mapping_noalloc() this early.
Ard Biesheuvel61bd93c2015-06-01 13:40:32 +0200760 *
761 * On 64k pages, the FDT will be mapped using PTEs, so we need to
762 * be in the same PMD as the rest of the fixmap.
763 * On 4k pages, we'll use section mappings for the FDT so we only
764 * have to be in the same PUD.
765 */
766 BUILD_BUG_ON(dt_virt_base % SZ_2M);
767
Suzuki K. Pouloseb433dce2015-10-19 14:19:28 +0100768 BUILD_BUG_ON(__fix_to_virt(FIX_FDT_END) >> SWAPPER_TABLE_SHIFT !=
769 __fix_to_virt(FIX_BTMAP_BEGIN) >> SWAPPER_TABLE_SHIFT);
Ard Biesheuvel61bd93c2015-06-01 13:40:32 +0200770
Suzuki K. Pouloseb433dce2015-10-19 14:19:28 +0100771 offset = dt_phys % SWAPPER_BLOCK_SIZE;
Ard Biesheuvel61bd93c2015-06-01 13:40:32 +0200772 dt_virt = (void *)dt_virt_base + offset;
773
774 /* map the first chunk so we can read the size from the header */
Laura Abbott132233a2016-02-05 16:24:46 -0800775 create_mapping_noalloc(round_down(dt_phys, SWAPPER_BLOCK_SIZE),
776 dt_virt_base, SWAPPER_BLOCK_SIZE, prot);
Ard Biesheuvel61bd93c2015-06-01 13:40:32 +0200777
Ard Biesheuvel04a84812016-08-01 13:29:31 +0200778 if (fdt_magic(dt_virt) != FDT_MAGIC)
Ard Biesheuvel61bd93c2015-06-01 13:40:32 +0200779 return NULL;
780
Ard Biesheuvelf80fb3a2016-01-26 14:12:01 +0100781 *size = fdt_totalsize(dt_virt);
782 if (*size > MAX_FDT_SIZE)
Ard Biesheuvel61bd93c2015-06-01 13:40:32 +0200783 return NULL;
784
Ard Biesheuvelf80fb3a2016-01-26 14:12:01 +0100785 if (offset + *size > SWAPPER_BLOCK_SIZE)
Laura Abbott132233a2016-02-05 16:24:46 -0800786 create_mapping_noalloc(round_down(dt_phys, SWAPPER_BLOCK_SIZE), dt_virt_base,
Ard Biesheuvelf80fb3a2016-01-26 14:12:01 +0100787 round_up(offset + *size, SWAPPER_BLOCK_SIZE), prot);
788
789 return dt_virt;
790}
791
792void *__init fixmap_remap_fdt(phys_addr_t dt_phys)
793{
794 void *dt_virt;
795 int size;
796
797 dt_virt = __fixmap_remap_fdt(dt_phys, &size, PAGE_KERNEL_RO);
798 if (!dt_virt)
799 return NULL;
Ard Biesheuvel61bd93c2015-06-01 13:40:32 +0200800
801 memblock_reserve(dt_phys, size);
Ard Biesheuvel61bd93c2015-06-01 13:40:32 +0200802 return dt_virt;
803}
Ard Biesheuvel324420b2016-02-16 13:52:35 +0100804
805int __init arch_ioremap_pud_supported(void)
806{
807 /* only 4k granule supports level 1 block mappings */
808 return IS_ENABLED(CONFIG_ARM64_4K_PAGES);
809}
810
811int __init arch_ioremap_pmd_supported(void)
812{
813 return 1;
814}
815
816int pud_set_huge(pud_t *pud, phys_addr_t phys, pgprot_t prot)
817{
818 BUG_ON(phys & ~PUD_MASK);
819 set_pud(pud, __pud(phys | PUD_TYPE_SECT | pgprot_val(mk_sect_prot(prot))));
820 return 1;
821}
822
823int pmd_set_huge(pmd_t *pmd, phys_addr_t phys, pgprot_t prot)
824{
825 BUG_ON(phys & ~PMD_MASK);
826 set_pmd(pmd, __pmd(phys | PMD_TYPE_SECT | pgprot_val(mk_sect_prot(prot))));
827 return 1;
828}
829
830int pud_clear_huge(pud_t *pud)
831{
832 if (!pud_sect(*pud))
833 return 0;
834 pud_clear(pud);
835 return 1;
836}
837
838int pmd_clear_huge(pmd_t *pmd)
839{
840 if (!pmd_sect(*pmd))
841 return 0;
842 pmd_clear(pmd);
843 return 1;
844}