]> git.proxmox.com Git - mirror_ubuntu-bionic-kernel.git/blob - arch/x86/mm/ioremap.c
Merge remote-tracking branches 'asoc/fix/topology', 'asoc/fix/adau17x1', 'asoc/fix...
[mirror_ubuntu-bionic-kernel.git] / arch / x86 / mm / ioremap.c
1 /*
2 * Re-map IO memory to kernel address space so that we can access it.
3 * This is needed for high PCI addresses that aren't mapped in the
4 * 640k-1MB IO memory area on PC's
5 *
6 * (C) Copyright 1995 1996 Linus Torvalds
7 */
8
9 #include <linux/bootmem.h>
10 #include <linux/init.h>
11 #include <linux/io.h>
12 #include <linux/ioport.h>
13 #include <linux/slab.h>
14 #include <linux/vmalloc.h>
15 #include <linux/mmiotrace.h>
16 #include <linux/mem_encrypt.h>
17 #include <linux/efi.h>
18
19 #include <asm/set_memory.h>
20 #include <asm/e820/api.h>
21 #include <asm/fixmap.h>
22 #include <asm/pgtable.h>
23 #include <asm/tlbflush.h>
24 #include <asm/pgalloc.h>
25 #include <asm/pat.h>
26 #include <asm/setup.h>
27
28 #include "physaddr.h"
29
30 /*
31 * Fix up the linear direct mapping of the kernel to avoid cache attribute
32 * conflicts.
33 */
34 int ioremap_change_attr(unsigned long vaddr, unsigned long size,
35 enum page_cache_mode pcm)
36 {
37 unsigned long nrpages = size >> PAGE_SHIFT;
38 int err;
39
40 switch (pcm) {
41 case _PAGE_CACHE_MODE_UC:
42 default:
43 err = _set_memory_uc(vaddr, nrpages);
44 break;
45 case _PAGE_CACHE_MODE_WC:
46 err = _set_memory_wc(vaddr, nrpages);
47 break;
48 case _PAGE_CACHE_MODE_WT:
49 err = _set_memory_wt(vaddr, nrpages);
50 break;
51 case _PAGE_CACHE_MODE_WB:
52 err = _set_memory_wb(vaddr, nrpages);
53 break;
54 }
55
56 return err;
57 }
58
59 static int __ioremap_check_ram(unsigned long start_pfn, unsigned long nr_pages,
60 void *arg)
61 {
62 unsigned long i;
63
64 for (i = 0; i < nr_pages; ++i)
65 if (pfn_valid(start_pfn + i) &&
66 !PageReserved(pfn_to_page(start_pfn + i)))
67 return 1;
68
69 return 0;
70 }
71
72 /*
73 * Remap an arbitrary physical address space into the kernel virtual
74 * address space. It transparently creates kernel huge I/O mapping when
75 * the physical address is aligned by a huge page size (1GB or 2MB) and
76 * the requested size is at least the huge page size.
77 *
78 * NOTE: MTRRs can override PAT memory types with a 4KB granularity.
79 * Therefore, the mapping code falls back to use a smaller page toward 4KB
80 * when a mapping range is covered by non-WB type of MTRRs.
81 *
82 * NOTE! We need to allow non-page-aligned mappings too: we will obviously
83 * have to convert them into an offset in a page-aligned mapping, but the
84 * caller shouldn't need to know that small detail.
85 */
86 static void __iomem *__ioremap_caller(resource_size_t phys_addr,
87 unsigned long size, enum page_cache_mode pcm, void *caller)
88 {
89 unsigned long offset, vaddr;
90 resource_size_t pfn, last_pfn, last_addr;
91 const resource_size_t unaligned_phys_addr = phys_addr;
92 const unsigned long unaligned_size = size;
93 struct vm_struct *area;
94 enum page_cache_mode new_pcm;
95 pgprot_t prot;
96 int retval;
97 void __iomem *ret_addr;
98
99 /* Don't allow wraparound or zero size */
100 last_addr = phys_addr + size - 1;
101 if (!size || last_addr < phys_addr)
102 return NULL;
103
104 if (!phys_addr_valid(phys_addr)) {
105 printk(KERN_WARNING "ioremap: invalid physical address %llx\n",
106 (unsigned long long)phys_addr);
107 WARN_ON_ONCE(1);
108 return NULL;
109 }
110
111 /*
112 * Don't allow anybody to remap normal RAM that we're using..
113 */
114 pfn = phys_addr >> PAGE_SHIFT;
115 last_pfn = last_addr >> PAGE_SHIFT;
116 if (walk_system_ram_range(pfn, last_pfn - pfn + 1, NULL,
117 __ioremap_check_ram) == 1) {
118 WARN_ONCE(1, "ioremap on RAM at %pa - %pa\n",
119 &phys_addr, &last_addr);
120 return NULL;
121 }
122
123 /*
124 * Mappings have to be page-aligned
125 */
126 offset = phys_addr & ~PAGE_MASK;
127 phys_addr &= PHYSICAL_PAGE_MASK;
128 size = PAGE_ALIGN(last_addr+1) - phys_addr;
129
130 retval = reserve_memtype(phys_addr, (u64)phys_addr + size,
131 pcm, &new_pcm);
132 if (retval) {
133 printk(KERN_ERR "ioremap reserve_memtype failed %d\n", retval);
134 return NULL;
135 }
136
137 if (pcm != new_pcm) {
138 if (!is_new_memtype_allowed(phys_addr, size, pcm, new_pcm)) {
139 printk(KERN_ERR
140 "ioremap error for 0x%llx-0x%llx, requested 0x%x, got 0x%x\n",
141 (unsigned long long)phys_addr,
142 (unsigned long long)(phys_addr + size),
143 pcm, new_pcm);
144 goto err_free_memtype;
145 }
146 pcm = new_pcm;
147 }
148
149 prot = PAGE_KERNEL_IO;
150 switch (pcm) {
151 case _PAGE_CACHE_MODE_UC:
152 default:
153 prot = __pgprot(pgprot_val(prot) |
154 cachemode2protval(_PAGE_CACHE_MODE_UC));
155 break;
156 case _PAGE_CACHE_MODE_UC_MINUS:
157 prot = __pgprot(pgprot_val(prot) |
158 cachemode2protval(_PAGE_CACHE_MODE_UC_MINUS));
159 break;
160 case _PAGE_CACHE_MODE_WC:
161 prot = __pgprot(pgprot_val(prot) |
162 cachemode2protval(_PAGE_CACHE_MODE_WC));
163 break;
164 case _PAGE_CACHE_MODE_WT:
165 prot = __pgprot(pgprot_val(prot) |
166 cachemode2protval(_PAGE_CACHE_MODE_WT));
167 break;
168 case _PAGE_CACHE_MODE_WB:
169 break;
170 }
171
172 /*
173 * Ok, go for it..
174 */
175 area = get_vm_area_caller(size, VM_IOREMAP, caller);
176 if (!area)
177 goto err_free_memtype;
178 area->phys_addr = phys_addr;
179 vaddr = (unsigned long) area->addr;
180
181 if (kernel_map_sync_memtype(phys_addr, size, pcm))
182 goto err_free_area;
183
184 if (ioremap_page_range(vaddr, vaddr + size, phys_addr, prot))
185 goto err_free_area;
186
187 ret_addr = (void __iomem *) (vaddr + offset);
188 mmiotrace_ioremap(unaligned_phys_addr, unaligned_size, ret_addr);
189
190 /*
191 * Check if the request spans more than any BAR in the iomem resource
192 * tree.
193 */
194 if (iomem_map_sanity_check(unaligned_phys_addr, unaligned_size))
195 pr_warn("caller %pS mapping multiple BARs\n", caller);
196
197 return ret_addr;
198 err_free_area:
199 free_vm_area(area);
200 err_free_memtype:
201 free_memtype(phys_addr, phys_addr + size);
202 return NULL;
203 }
204
205 /**
206 * ioremap_nocache - map bus memory into CPU space
207 * @phys_addr: bus address of the memory
208 * @size: size of the resource to map
209 *
210 * ioremap_nocache performs a platform specific sequence of operations to
211 * make bus memory CPU accessible via the readb/readw/readl/writeb/
212 * writew/writel functions and the other mmio helpers. The returned
213 * address is not guaranteed to be usable directly as a virtual
214 * address.
215 *
216 * This version of ioremap ensures that the memory is marked uncachable
217 * on the CPU as well as honouring existing caching rules from things like
218 * the PCI bus. Note that there are other caches and buffers on many
219 * busses. In particular driver authors should read up on PCI writes
220 *
221 * It's useful if some control registers are in such an area and
222 * write combining or read caching is not desirable:
223 *
224 * Must be freed with iounmap.
225 */
226 void __iomem *ioremap_nocache(resource_size_t phys_addr, unsigned long size)
227 {
228 /*
229 * Ideally, this should be:
230 * pat_enabled() ? _PAGE_CACHE_MODE_UC : _PAGE_CACHE_MODE_UC_MINUS;
231 *
232 * Till we fix all X drivers to use ioremap_wc(), we will use
233 * UC MINUS. Drivers that are certain they need or can already
234 * be converted over to strong UC can use ioremap_uc().
235 */
236 enum page_cache_mode pcm = _PAGE_CACHE_MODE_UC_MINUS;
237
238 return __ioremap_caller(phys_addr, size, pcm,
239 __builtin_return_address(0));
240 }
241 EXPORT_SYMBOL(ioremap_nocache);
242
243 /**
244 * ioremap_uc - map bus memory into CPU space as strongly uncachable
245 * @phys_addr: bus address of the memory
246 * @size: size of the resource to map
247 *
248 * ioremap_uc performs a platform specific sequence of operations to
249 * make bus memory CPU accessible via the readb/readw/readl/writeb/
250 * writew/writel functions and the other mmio helpers. The returned
251 * address is not guaranteed to be usable directly as a virtual
252 * address.
253 *
254 * This version of ioremap ensures that the memory is marked with a strong
255 * preference as completely uncachable on the CPU when possible. For non-PAT
256 * systems this ends up setting page-attribute flags PCD=1, PWT=1. For PAT
257 * systems this will set the PAT entry for the pages as strong UC. This call
258 * will honor existing caching rules from things like the PCI bus. Note that
259 * there are other caches and buffers on many busses. In particular driver
260 * authors should read up on PCI writes.
261 *
262 * It's useful if some control registers are in such an area and
263 * write combining or read caching is not desirable:
264 *
265 * Must be freed with iounmap.
266 */
267 void __iomem *ioremap_uc(resource_size_t phys_addr, unsigned long size)
268 {
269 enum page_cache_mode pcm = _PAGE_CACHE_MODE_UC;
270
271 return __ioremap_caller(phys_addr, size, pcm,
272 __builtin_return_address(0));
273 }
274 EXPORT_SYMBOL_GPL(ioremap_uc);
275
276 /**
277 * ioremap_wc - map memory into CPU space write combined
278 * @phys_addr: bus address of the memory
279 * @size: size of the resource to map
280 *
281 * This version of ioremap ensures that the memory is marked write combining.
282 * Write combining allows faster writes to some hardware devices.
283 *
284 * Must be freed with iounmap.
285 */
286 void __iomem *ioremap_wc(resource_size_t phys_addr, unsigned long size)
287 {
288 return __ioremap_caller(phys_addr, size, _PAGE_CACHE_MODE_WC,
289 __builtin_return_address(0));
290 }
291 EXPORT_SYMBOL(ioremap_wc);
292
293 /**
294 * ioremap_wt - map memory into CPU space write through
295 * @phys_addr: bus address of the memory
296 * @size: size of the resource to map
297 *
298 * This version of ioremap ensures that the memory is marked write through.
299 * Write through stores data into memory while keeping the cache up-to-date.
300 *
301 * Must be freed with iounmap.
302 */
303 void __iomem *ioremap_wt(resource_size_t phys_addr, unsigned long size)
304 {
305 return __ioremap_caller(phys_addr, size, _PAGE_CACHE_MODE_WT,
306 __builtin_return_address(0));
307 }
308 EXPORT_SYMBOL(ioremap_wt);
309
310 void __iomem *ioremap_cache(resource_size_t phys_addr, unsigned long size)
311 {
312 return __ioremap_caller(phys_addr, size, _PAGE_CACHE_MODE_WB,
313 __builtin_return_address(0));
314 }
315 EXPORT_SYMBOL(ioremap_cache);
316
317 void __iomem *ioremap_prot(resource_size_t phys_addr, unsigned long size,
318 unsigned long prot_val)
319 {
320 return __ioremap_caller(phys_addr, size,
321 pgprot2cachemode(__pgprot(prot_val)),
322 __builtin_return_address(0));
323 }
324 EXPORT_SYMBOL(ioremap_prot);
325
326 /**
327 * iounmap - Free a IO remapping
328 * @addr: virtual address from ioremap_*
329 *
330 * Caller must ensure there is only one unmapping for the same pointer.
331 */
332 void iounmap(volatile void __iomem *addr)
333 {
334 struct vm_struct *p, *o;
335
336 if ((void __force *)addr <= high_memory)
337 return;
338
339 /*
340 * The PCI/ISA range special-casing was removed from __ioremap()
341 * so this check, in theory, can be removed. However, there are
342 * cases where iounmap() is called for addresses not obtained via
343 * ioremap() (vga16fb for example). Add a warning so that these
344 * cases can be caught and fixed.
345 */
346 if ((void __force *)addr >= phys_to_virt(ISA_START_ADDRESS) &&
347 (void __force *)addr < phys_to_virt(ISA_END_ADDRESS)) {
348 WARN(1, "iounmap() called for ISA range not obtained using ioremap()\n");
349 return;
350 }
351
352 addr = (volatile void __iomem *)
353 (PAGE_MASK & (unsigned long __force)addr);
354
355 mmiotrace_iounmap(addr);
356
357 /* Use the vm area unlocked, assuming the caller
358 ensures there isn't another iounmap for the same address
359 in parallel. Reuse of the virtual address is prevented by
360 leaving it in the global lists until we're done with it.
361 cpa takes care of the direct mappings. */
362 p = find_vm_area((void __force *)addr);
363
364 if (!p) {
365 printk(KERN_ERR "iounmap: bad address %p\n", addr);
366 dump_stack();
367 return;
368 }
369
370 free_memtype(p->phys_addr, p->phys_addr + get_vm_area_size(p));
371
372 /* Finally remove it */
373 o = remove_vm_area((void __force *)addr);
374 BUG_ON(p != o || o == NULL);
375 kfree(p);
376 }
377 EXPORT_SYMBOL(iounmap);
378
379 int __init arch_ioremap_pud_supported(void)
380 {
381 #ifdef CONFIG_X86_64
382 return boot_cpu_has(X86_FEATURE_GBPAGES);
383 #else
384 return 0;
385 #endif
386 }
387
388 int __init arch_ioremap_pmd_supported(void)
389 {
390 return boot_cpu_has(X86_FEATURE_PSE);
391 }
392
393 /*
394 * Convert a physical pointer to a virtual kernel pointer for /dev/mem
395 * access
396 */
397 void *xlate_dev_mem_ptr(phys_addr_t phys)
398 {
399 unsigned long start = phys & PAGE_MASK;
400 unsigned long offset = phys & ~PAGE_MASK;
401 void *vaddr;
402
403 /* memremap() maps if RAM, otherwise falls back to ioremap() */
404 vaddr = memremap(start, PAGE_SIZE, MEMREMAP_WB);
405
406 /* Only add the offset on success and return NULL if memremap() failed */
407 if (vaddr)
408 vaddr += offset;
409
410 return vaddr;
411 }
412
413 void unxlate_dev_mem_ptr(phys_addr_t phys, void *addr)
414 {
415 memunmap((void *)((unsigned long)addr & PAGE_MASK));
416 }
417
418 /*
419 * Examine the physical address to determine if it is an area of memory
420 * that should be mapped decrypted. If the memory is not part of the
421 * kernel usable area it was accessed and created decrypted, so these
422 * areas should be mapped decrypted. And since the encryption key can
423 * change across reboots, persistent memory should also be mapped
424 * decrypted.
425 */
426 static bool memremap_should_map_decrypted(resource_size_t phys_addr,
427 unsigned long size)
428 {
429 int is_pmem;
430
431 /*
432 * Check if the address is part of a persistent memory region.
433 * This check covers areas added by E820, EFI and ACPI.
434 */
435 is_pmem = region_intersects(phys_addr, size, IORESOURCE_MEM,
436 IORES_DESC_PERSISTENT_MEMORY);
437 if (is_pmem != REGION_DISJOINT)
438 return true;
439
440 /*
441 * Check if the non-volatile attribute is set for an EFI
442 * reserved area.
443 */
444 if (efi_enabled(EFI_BOOT)) {
445 switch (efi_mem_type(phys_addr)) {
446 case EFI_RESERVED_TYPE:
447 if (efi_mem_attributes(phys_addr) & EFI_MEMORY_NV)
448 return true;
449 break;
450 default:
451 break;
452 }
453 }
454
455 /* Check if the address is outside kernel usable area */
456 switch (e820__get_entry_type(phys_addr, phys_addr + size - 1)) {
457 case E820_TYPE_RESERVED:
458 case E820_TYPE_ACPI:
459 case E820_TYPE_NVS:
460 case E820_TYPE_UNUSABLE:
461 case E820_TYPE_PRAM:
462 return true;
463 default:
464 break;
465 }
466
467 return false;
468 }
469
470 /*
471 * Examine the physical address to determine if it is EFI data. Check
472 * it against the boot params structure and EFI tables and memory types.
473 */
474 static bool memremap_is_efi_data(resource_size_t phys_addr,
475 unsigned long size)
476 {
477 u64 paddr;
478
479 /* Check if the address is part of EFI boot/runtime data */
480 if (!efi_enabled(EFI_BOOT))
481 return false;
482
483 paddr = boot_params.efi_info.efi_memmap_hi;
484 paddr <<= 32;
485 paddr |= boot_params.efi_info.efi_memmap;
486 if (phys_addr == paddr)
487 return true;
488
489 paddr = boot_params.efi_info.efi_systab_hi;
490 paddr <<= 32;
491 paddr |= boot_params.efi_info.efi_systab;
492 if (phys_addr == paddr)
493 return true;
494
495 if (efi_is_table_address(phys_addr))
496 return true;
497
498 switch (efi_mem_type(phys_addr)) {
499 case EFI_BOOT_SERVICES_DATA:
500 case EFI_RUNTIME_SERVICES_DATA:
501 return true;
502 default:
503 break;
504 }
505
506 return false;
507 }
508
509 /*
510 * Examine the physical address to determine if it is boot data by checking
511 * it against the boot params setup_data chain.
512 */
513 static bool memremap_is_setup_data(resource_size_t phys_addr,
514 unsigned long size)
515 {
516 struct setup_data *data;
517 u64 paddr, paddr_next;
518
519 paddr = boot_params.hdr.setup_data;
520 while (paddr) {
521 unsigned int len;
522
523 if (phys_addr == paddr)
524 return true;
525
526 data = memremap(paddr, sizeof(*data),
527 MEMREMAP_WB | MEMREMAP_DEC);
528
529 paddr_next = data->next;
530 len = data->len;
531
532 memunmap(data);
533
534 if ((phys_addr > paddr) && (phys_addr < (paddr + len)))
535 return true;
536
537 paddr = paddr_next;
538 }
539
540 return false;
541 }
542
543 /*
544 * Examine the physical address to determine if it is boot data by checking
545 * it against the boot params setup_data chain (early boot version).
546 */
547 static bool __init early_memremap_is_setup_data(resource_size_t phys_addr,
548 unsigned long size)
549 {
550 struct setup_data *data;
551 u64 paddr, paddr_next;
552
553 paddr = boot_params.hdr.setup_data;
554 while (paddr) {
555 unsigned int len;
556
557 if (phys_addr == paddr)
558 return true;
559
560 data = early_memremap_decrypted(paddr, sizeof(*data));
561
562 paddr_next = data->next;
563 len = data->len;
564
565 early_memunmap(data, sizeof(*data));
566
567 if ((phys_addr > paddr) && (phys_addr < (paddr + len)))
568 return true;
569
570 paddr = paddr_next;
571 }
572
573 return false;
574 }
575
576 /*
577 * Architecture function to determine if RAM remap is allowed. By default, a
578 * RAM remap will map the data as encrypted. Determine if a RAM remap should
579 * not be done so that the data will be mapped decrypted.
580 */
581 bool arch_memremap_can_ram_remap(resource_size_t phys_addr, unsigned long size,
582 unsigned long flags)
583 {
584 if (!sme_active())
585 return true;
586
587 if (flags & MEMREMAP_ENC)
588 return true;
589
590 if (flags & MEMREMAP_DEC)
591 return false;
592
593 if (memremap_is_setup_data(phys_addr, size) ||
594 memremap_is_efi_data(phys_addr, size) ||
595 memremap_should_map_decrypted(phys_addr, size))
596 return false;
597
598 return true;
599 }
600
601 /*
602 * Architecture override of __weak function to adjust the protection attributes
603 * used when remapping memory. By default, early_memremap() will map the data
604 * as encrypted. Determine if an encrypted mapping should not be done and set
605 * the appropriate protection attributes.
606 */
607 pgprot_t __init early_memremap_pgprot_adjust(resource_size_t phys_addr,
608 unsigned long size,
609 pgprot_t prot)
610 {
611 if (!sme_active())
612 return prot;
613
614 if (early_memremap_is_setup_data(phys_addr, size) ||
615 memremap_is_efi_data(phys_addr, size) ||
616 memremap_should_map_decrypted(phys_addr, size))
617 prot = pgprot_decrypted(prot);
618 else
619 prot = pgprot_encrypted(prot);
620
621 return prot;
622 }
623
624 bool phys_mem_access_encrypted(unsigned long phys_addr, unsigned long size)
625 {
626 return arch_memremap_can_ram_remap(phys_addr, size, 0);
627 }
628
629 #ifdef CONFIG_ARCH_USE_MEMREMAP_PROT
630 /* Remap memory with encryption */
631 void __init *early_memremap_encrypted(resource_size_t phys_addr,
632 unsigned long size)
633 {
634 return early_memremap_prot(phys_addr, size, __PAGE_KERNEL_ENC);
635 }
636
637 /*
638 * Remap memory with encryption and write-protected - cannot be called
639 * before pat_init() is called
640 */
641 void __init *early_memremap_encrypted_wp(resource_size_t phys_addr,
642 unsigned long size)
643 {
644 /* Be sure the write-protect PAT entry is set for write-protect */
645 if (__pte2cachemode_tbl[_PAGE_CACHE_MODE_WP] != _PAGE_CACHE_MODE_WP)
646 return NULL;
647
648 return early_memremap_prot(phys_addr, size, __PAGE_KERNEL_ENC_WP);
649 }
650
651 /* Remap memory without encryption */
652 void __init *early_memremap_decrypted(resource_size_t phys_addr,
653 unsigned long size)
654 {
655 return early_memremap_prot(phys_addr, size, __PAGE_KERNEL_NOENC);
656 }
657
658 /*
659 * Remap memory without encryption and write-protected - cannot be called
660 * before pat_init() is called
661 */
662 void __init *early_memremap_decrypted_wp(resource_size_t phys_addr,
663 unsigned long size)
664 {
665 /* Be sure the write-protect PAT entry is set for write-protect */
666 if (__pte2cachemode_tbl[_PAGE_CACHE_MODE_WP] != _PAGE_CACHE_MODE_WP)
667 return NULL;
668
669 return early_memremap_prot(phys_addr, size, __PAGE_KERNEL_NOENC_WP);
670 }
671 #endif /* CONFIG_ARCH_USE_MEMREMAP_PROT */
672
673 static pte_t bm_pte[PAGE_SIZE/sizeof(pte_t)] __page_aligned_bss;
674
675 static inline pmd_t * __init early_ioremap_pmd(unsigned long addr)
676 {
677 /* Don't assume we're using swapper_pg_dir at this point */
678 pgd_t *base = __va(read_cr3_pa());
679 pgd_t *pgd = &base[pgd_index(addr)];
680 p4d_t *p4d = p4d_offset(pgd, addr);
681 pud_t *pud = pud_offset(p4d, addr);
682 pmd_t *pmd = pmd_offset(pud, addr);
683
684 return pmd;
685 }
686
687 static inline pte_t * __init early_ioremap_pte(unsigned long addr)
688 {
689 return &bm_pte[pte_index(addr)];
690 }
691
692 bool __init is_early_ioremap_ptep(pte_t *ptep)
693 {
694 return ptep >= &bm_pte[0] && ptep < &bm_pte[PAGE_SIZE/sizeof(pte_t)];
695 }
696
697 void __init early_ioremap_init(void)
698 {
699 pmd_t *pmd;
700
701 #ifdef CONFIG_X86_64
702 BUILD_BUG_ON((fix_to_virt(0) + PAGE_SIZE) & ((1 << PMD_SHIFT) - 1));
703 #else
704 WARN_ON((fix_to_virt(0) + PAGE_SIZE) & ((1 << PMD_SHIFT) - 1));
705 #endif
706
707 early_ioremap_setup();
708
709 pmd = early_ioremap_pmd(fix_to_virt(FIX_BTMAP_BEGIN));
710 memset(bm_pte, 0, sizeof(bm_pte));
711 pmd_populate_kernel(&init_mm, pmd, bm_pte);
712
713 /*
714 * The boot-ioremap range spans multiple pmds, for which
715 * we are not prepared:
716 */
717 #define __FIXADDR_TOP (-PAGE_SIZE)
718 BUILD_BUG_ON((__fix_to_virt(FIX_BTMAP_BEGIN) >> PMD_SHIFT)
719 != (__fix_to_virt(FIX_BTMAP_END) >> PMD_SHIFT));
720 #undef __FIXADDR_TOP
721 if (pmd != early_ioremap_pmd(fix_to_virt(FIX_BTMAP_END))) {
722 WARN_ON(1);
723 printk(KERN_WARNING "pmd %p != %p\n",
724 pmd, early_ioremap_pmd(fix_to_virt(FIX_BTMAP_END)));
725 printk(KERN_WARNING "fix_to_virt(FIX_BTMAP_BEGIN): %08lx\n",
726 fix_to_virt(FIX_BTMAP_BEGIN));
727 printk(KERN_WARNING "fix_to_virt(FIX_BTMAP_END): %08lx\n",
728 fix_to_virt(FIX_BTMAP_END));
729
730 printk(KERN_WARNING "FIX_BTMAP_END: %d\n", FIX_BTMAP_END);
731 printk(KERN_WARNING "FIX_BTMAP_BEGIN: %d\n",
732 FIX_BTMAP_BEGIN);
733 }
734 }
735
736 void __init __early_set_fixmap(enum fixed_addresses idx,
737 phys_addr_t phys, pgprot_t flags)
738 {
739 unsigned long addr = __fix_to_virt(idx);
740 pte_t *pte;
741
742 if (idx >= __end_of_fixed_addresses) {
743 BUG();
744 return;
745 }
746 pte = early_ioremap_pte(addr);
747
748 if (pgprot_val(flags))
749 set_pte(pte, pfn_pte(phys >> PAGE_SHIFT, flags));
750 else
751 pte_clear(&init_mm, addr, pte);
752 __flush_tlb_one(addr);
753 }