]> git.proxmox.com Git - mirror_ubuntu-artful-kernel.git/blame - arch/x86/kernel/head64.c
x86/boot: Pass in size to early cmdline parsing
[mirror_ubuntu-artful-kernel.git] / arch / x86 / kernel / head64.c
CommitLineData
1da177e4 1/*
835c34a1 2 * prepare to run common code
1da177e4
LT
3 *
4 * Copyright (C) 2000 Andrea Arcangeli <andrea@suse.de> SuSE
1da177e4
LT
5 */
6
7#include <linux/init.h>
8#include <linux/linkage.h>
9#include <linux/types.h>
10#include <linux/kernel.h>
11#include <linux/string.h>
12#include <linux/percpu.h>
eaf76e8b 13#include <linux/start_kernel.h>
8b664aa6 14#include <linux/io.h>
72d7c3b3 15#include <linux/memblock.h>
1da177e4
LT
16
17#include <asm/processor.h>
18#include <asm/proto.h>
19#include <asm/smp.h>
1da177e4
LT
20#include <asm/setup.h>
21#include <asm/desc.h>
f6c2e333 22#include <asm/pgtable.h>
cfd243d4 23#include <asm/tlbflush.h>
2bc0414e 24#include <asm/sections.h>
718fc13b 25#include <asm/kdebug.h>
75175278 26#include <asm/e820.h>
47a3d5da 27#include <asm/bios_ebda.h>
5dcd14ec 28#include <asm/bootparam_utils.h>
feddc9de 29#include <asm/microcode.h>
ef7f0d6a 30#include <asm/kasan.h>
1da177e4 31
8170e6be
PA
32/*
33 * Manage page tables very early on.
34 */
35extern pgd_t early_level4_pgt[PTRS_PER_PGD];
36extern pmd_t early_dynamic_pgts[EARLY_DYNAMIC_PAGE_TABLES][PTRS_PER_PMD];
37static unsigned int __initdata next_early_pgt = 2;
5e427ec2 38pmdval_t early_pmd_flags = __PAGE_KERNEL_LARGE & ~(_PAGE_GLOBAL | _PAGE_NX);
8170e6be
PA
39
40/* Wipe all early page tables except for the kernel symbol map */
41static void __init reset_early_page_tables(void)
cfd243d4 42{
5e9ebbd8 43 memset(early_level4_pgt, 0, sizeof(pgd_t)*(PTRS_PER_PGD-1));
8170e6be 44 next_early_pgt = 0;
ef7f0d6a 45 write_cr3(__pa_nodebug(early_level4_pgt));
8170e6be
PA
46}
47
48/* Create a new PMD entry */
49int __init early_make_pgtable(unsigned long address)
50{
51 unsigned long physaddr = address - __PAGE_OFFSET;
8170e6be 52 pgdval_t pgd, *pgd_p;
6b9c75ac 53 pudval_t pud, *pud_p;
8170e6be
PA
54 pmdval_t pmd, *pmd_p;
55
56 /* Invalid address or early pgt is done ? */
ef7f0d6a 57 if (physaddr >= MAXMEM || read_cr3() != __pa_nodebug(early_level4_pgt))
8170e6be
PA
58 return -1;
59
6b9c75ac
YL
60again:
61 pgd_p = &early_level4_pgt[pgd_index(address)].pgd;
8170e6be
PA
62 pgd = *pgd_p;
63
64 /*
65 * The use of __START_KERNEL_map rather than __PAGE_OFFSET here is
66 * critical -- __PAGE_OFFSET would point us back into the dynamic
67 * range and we might end up looping forever...
68 */
6b9c75ac 69 if (pgd)
8170e6be 70 pud_p = (pudval_t *)((pgd & PTE_PFN_MASK) + __START_KERNEL_map - phys_base);
6b9c75ac
YL
71 else {
72 if (next_early_pgt >= EARLY_DYNAMIC_PAGE_TABLES) {
8170e6be 73 reset_early_page_tables();
6b9c75ac
YL
74 goto again;
75 }
8170e6be
PA
76
77 pud_p = (pudval_t *)early_dynamic_pgts[next_early_pgt++];
5e9ebbd8 78 memset(pud_p, 0, sizeof(pud_p) * PTRS_PER_PUD);
8170e6be
PA
79 *pgd_p = (pgdval_t)pud_p - __START_KERNEL_map + phys_base + _KERNPG_TABLE;
80 }
6b9c75ac
YL
81 pud_p += pud_index(address);
82 pud = *pud_p;
8170e6be 83
6b9c75ac
YL
84 if (pud)
85 pmd_p = (pmdval_t *)((pud & PTE_PFN_MASK) + __START_KERNEL_map - phys_base);
86 else {
87 if (next_early_pgt >= EARLY_DYNAMIC_PAGE_TABLES) {
88 reset_early_page_tables();
89 goto again;
90 }
91
92 pmd_p = (pmdval_t *)early_dynamic_pgts[next_early_pgt++];
5e9ebbd8 93 memset(pmd_p, 0, sizeof(pmd_p) * PTRS_PER_PMD);
6b9c75ac
YL
94 *pud_p = (pudval_t)pmd_p - __START_KERNEL_map + phys_base + _KERNPG_TABLE;
95 }
78d77df7 96 pmd = (physaddr & PMD_MASK) + early_pmd_flags;
6b9c75ac 97 pmd_p[pmd_index(address)] = pmd;
8170e6be
PA
98
99 return 0;
cfd243d4
VG
100}
101
1da177e4
LT
102/* Don't add a printk in there. printk relies on the PDA which is not initialized
103 yet. */
104static void __init clear_bss(void)
105{
1da177e4 106 memset(__bss_start, 0,
2bc0414e 107 (unsigned long) __bss_stop - (unsigned long) __bss_start);
1da177e4
LT
108}
109
f1da834c
YL
110static unsigned long get_cmd_line_ptr(void)
111{
112 unsigned long cmd_line_ptr = boot_params.hdr.cmd_line_ptr;
113
ee92d815
YL
114 cmd_line_ptr |= (u64)boot_params.ext_cmd_line_ptr << 32;
115
f1da834c
YL
116 return cmd_line_ptr;
117}
118
1da177e4
LT
119static void __init copy_bootdata(char *real_mode_data)
120{
1da177e4 121 char * command_line;
f1da834c 122 unsigned long cmd_line_ptr;
1da177e4 123
30c82645 124 memcpy(&boot_params, real_mode_data, sizeof boot_params);
5dcd14ec 125 sanitize_boot_params(&boot_params);
f1da834c
YL
126 cmd_line_ptr = get_cmd_line_ptr();
127 if (cmd_line_ptr) {
128 command_line = __va(cmd_line_ptr);
30c82645 129 memcpy(boot_command_line, command_line, COMMAND_LINE_SIZE);
1da177e4 130 }
1da177e4
LT
131}
132
2605fc21 133asmlinkage __visible void __init x86_64_start_kernel(char * real_mode_data)
1da177e4 134{
1da177e4
LT
135 int i;
136
b4e0409a
IM
137 /*
138 * Build-time sanity checks on the kernel image and module
139 * area mappings. (these are purely build-time and produce no code)
140 */
8e3c2a8c
BP
141 BUILD_BUG_ON(MODULES_VADDR < __START_KERNEL_map);
142 BUILD_BUG_ON(MODULES_VADDR - __START_KERNEL_map < KERNEL_IMAGE_SIZE);
b4e0409a 143 BUILD_BUG_ON(MODULES_LEN + KERNEL_IMAGE_SIZE > 2*PUD_SIZE);
8e3c2a8c 144 BUILD_BUG_ON((__START_KERNEL_map & ~PMD_MASK) != 0);
b4e0409a
IM
145 BUILD_BUG_ON((MODULES_VADDR & ~PMD_MASK) != 0);
146 BUILD_BUG_ON(!(MODULES_VADDR > __START_KERNEL));
147 BUILD_BUG_ON(!(((MODULES_END - 1) & PGDIR_MASK) ==
148 (__START_KERNEL & PGDIR_MASK)));
66d4bdf2 149 BUILD_BUG_ON(__fix_to_virt(__end_of_fixed_addresses) <= MODULES_END);
b4e0409a 150
1e02ce4c
AL
151 cr4_init_shadow();
152
8170e6be
PA
153 /* Kill off the identity-map trampoline */
154 reset_early_page_tables();
155
3df0af0e
YL
156 clear_bss();
157
d0f77d4d
AR
158 clear_page(init_level4_pgt);
159
5d5aa3cf
AP
160 kasan_early_init();
161
ac630dd9 162 for (i = 0; i < NUM_EXCEPTION_VECTORS; i++)
425be567 163 set_intr_gate(i, early_idt_handler_array[i]);
9d1c6e7c 164 load_idt((const struct desc_ptr *)&idt_descr);
f6c2e333 165
fa2bbce9
YL
166 copy_bootdata(__va(real_mode_data));
167
feddc9de
FY
168 /*
169 * Load microcode early on BSP.
170 */
171 load_ucode_bsp();
172
8170e6be
PA
173 /* set init_level4_pgt kernel high mapping*/
174 init_level4_pgt[511] = early_level4_pgt[511];
175
f97013fd
JF
176 x86_64_start_reservations(real_mode_data);
177}
178
179void __init x86_64_start_reservations(char *real_mode_data)
180{
fa2bbce9
YL
181 /* version is always not zero if it is copied */
182 if (!boot_params.hdr.version)
183 copy_bootdata(__va(real_mode_data));
9de819fe 184
47a3d5da 185 reserve_ebda_region();
75175278 186
1da177e4
LT
187 start_kernel();
188}