mirror of
https://github.com/tbsdtv/linux_media.git
synced 2025-07-23 12:43:29 +02:00
Define KASAN_SHADOW_OFFSET,KASAN_SHADOW_START and KASAN_SHADOW_END for the Arm kernel address sanitizer. We are "stealing" lowmem (the 4GB addressable by a 32bit architecture) out of the virtual address space to use as shadow memory for KASan as follows: +----+ 0xffffffff | | | | |-> Static kernel image (vmlinux) BSS and page table | |/ +----+ PAGE_OFFSET | | | | |-> Loadable kernel modules virtual address space area | |/ +----+ MODULES_VADDR = KASAN_SHADOW_END | | | | |-> The shadow area of kernel virtual address. | |/ +----+-> TASK_SIZE (start of kernel space) = KASAN_SHADOW_START the | | shadow address of MODULES_VADDR | | | | | | | | |-> The user space area in lowmem. The kernel address | | | sanitizer do not use this space, nor does it map it. | | | | | | | | | | | | | |/ ------ 0 0 .. TASK_SIZE is the memory that can be used by shared userspace/kernelspace. It us used for userspace processes and for passing parameters and memory buffers in system calls etc. We do not need to shadow this area. KASAN_SHADOW_START: This value begins with the MODULE_VADDR's shadow address. It is the start of kernel virtual space. Since we have modules to load, we need to cover also that area with shadow memory so we can find memory bugs in modules. KASAN_SHADOW_END This value is the 0x100000000's shadow address: the mapping that would be after the end of the kernel memory at 0xffffffff. It is the end of kernel address sanitizer shadow area. It is also the start of the module area. KASAN_SHADOW_OFFSET: This value is used to map an address to the corresponding shadow address by the following formula: shadow_addr = (address >> 3) + KASAN_SHADOW_OFFSET; As you would expect, >> 3 is equal to dividing by 8, meaning each byte in the shadow memory covers 8 bytes of kernel memory, so one bit shadow memory per byte of kernel memory is used. The KASAN_SHADOW_OFFSET is provided in a Kconfig option depending on the VMSPLIT layout of the system: the kernel and userspace can split up lowmem in different ways according to needs, so we calculate the shadow offset depending on this. When kasan is enabled, the definition of TASK_SIZE is not an 8-bit rotated constant, so we need to modify the TASK_SIZE access code in the *.s file. The kernel and modules may use different amounts of memory, according to the VMSPLIT configuration, which in turn determines the PAGE_OFFSET. We use the following KASAN_SHADOW_OFFSETs depending on how the virtual memory is split up: - 0x1f000000 if we have 1G userspace / 3G kernelspace split: - The kernel address space is 3G (0xc0000000) - PAGE_OFFSET is then set to 0x40000000 so the kernel static image (vmlinux) uses addresses 0x40000000 .. 0xffffffff - On top of that we have the MODULES_VADDR which under the worst case (using ARM instructions) is PAGE_OFFSET - 16M (0x01000000) = 0x3f000000 so the modules use addresses 0x3f000000 .. 0x3fffffff - So the addresses 0x3f000000 .. 0xffffffff need to be covered with shadow memory. That is 0xc1000000 bytes of memory. - 1/8 of that is needed for its shadow memory, so 0x18200000 bytes of shadow memory is needed. We "steal" that from the remaining lowmem. - The KASAN_SHADOW_START becomes 0x26e00000, to KASAN_SHADOW_END at 0x3effffff. - Now we can calculate the KASAN_SHADOW_OFFSET for any kernel address as 0x3f000000 needs to map to the first byte of shadow memory and 0xffffffff needs to map to the last byte of shadow memory. Since: SHADOW_ADDR = (address >> 3) + KASAN_SHADOW_OFFSET 0x26e00000 = (0x3f000000 >> 3) + KASAN_SHADOW_OFFSET KASAN_SHADOW_OFFSET = 0x26e00000 - (0x3f000000 >> 3) KASAN_SHADOW_OFFSET = 0x26e00000 - 0x07e00000 KASAN_SHADOW_OFFSET = 0x1f000000 - 0x5f000000 if we have 2G userspace / 2G kernelspace split: - The kernel space is 2G (0x80000000) - PAGE_OFFSET is set to 0x80000000 so the kernel static image uses 0x80000000 .. 0xffffffff. - On top of that we have the MODULES_VADDR which under the worst case (using ARM instructions) is PAGE_OFFSET - 16M (0x01000000) = 0x7f000000 so the modules use addresses 0x7f000000 .. 0x7fffffff - So the addresses 0x7f000000 .. 0xffffffff need to be covered with shadow memory. That is 0x81000000 bytes of memory. - 1/8 of that is needed for its shadow memory, so 0x10200000 bytes of shadow memory is needed. We "steal" that from the remaining lowmem. - The KASAN_SHADOW_START becomes 0x6ee00000, to KASAN_SHADOW_END at 0x7effffff. - Now we can calculate the KASAN_SHADOW_OFFSET for any kernel address as 0x7f000000 needs to map to the first byte of shadow memory and 0xffffffff needs to map to the last byte of shadow memory. Since: SHADOW_ADDR = (address >> 3) + KASAN_SHADOW_OFFSET 0x6ee00000 = (0x7f000000 >> 3) + KASAN_SHADOW_OFFSET KASAN_SHADOW_OFFSET = 0x6ee00000 - (0x7f000000 >> 3) KASAN_SHADOW_OFFSET = 0x6ee00000 - 0x0fe00000 KASAN_SHADOW_OFFSET = 0x5f000000 - 0x9f000000 if we have 3G userspace / 1G kernelspace split, and this is the default split for ARM: - The kernel address space is 1GB (0x40000000) - PAGE_OFFSET is set to 0xc0000000 so the kernel static image uses 0xc0000000 .. 0xffffffff. - On top of that we have the MODULES_VADDR which under the worst case (using ARM instructions) is PAGE_OFFSET - 16M (0x01000000) = 0xbf000000 so the modules use addresses 0xbf000000 .. 0xbfffffff - So the addresses 0xbf000000 .. 0xffffffff need to be covered with shadow memory. That is 0x41000000 bytes of memory. - 1/8 of that is needed for its shadow memory, so 0x08200000 bytes of shadow memory is needed. We "steal" that from the remaining lowmem. - The KASAN_SHADOW_START becomes 0xb6e00000, to KASAN_SHADOW_END at 0xbfffffff. - Now we can calculate the KASAN_SHADOW_OFFSET for any kernel address as 0xbf000000 needs to map to the first byte of shadow memory and 0xffffffff needs to map to the last byte of shadow memory. Since: SHADOW_ADDR = (address >> 3) + KASAN_SHADOW_OFFSET 0xb6e00000 = (0xbf000000 >> 3) + KASAN_SHADOW_OFFSET KASAN_SHADOW_OFFSET = 0xb6e00000 - (0xbf000000 >> 3) KASAN_SHADOW_OFFSET = 0xb6e00000 - 0x17e00000 KASAN_SHADOW_OFFSET = 0x9f000000 - 0x8f000000 if we have 3G userspace / 1G kernelspace with full 1 GB low memory (VMSPLIT_3G_OPT): - The kernel address space is 1GB (0x40000000) - PAGE_OFFSET is set to 0xb0000000 so the kernel static image uses 0xb0000000 .. 0xffffffff. - On top of that we have the MODULES_VADDR which under the worst case (using ARM instructions) is PAGE_OFFSET - 16M (0x01000000) = 0xaf000000 so the modules use addresses 0xaf000000 .. 0xaffffff - So the addresses 0xaf000000 .. 0xffffffff need to be covered with shadow memory. That is 0x51000000 bytes of memory. - 1/8 of that is needed for its shadow memory, so 0x0a200000 bytes of shadow memory is needed. We "steal" that from the remaining lowmem. - The KASAN_SHADOW_START becomes 0xa4e00000, to KASAN_SHADOW_END at 0xaeffffff. - Now we can calculate the KASAN_SHADOW_OFFSET for any kernel address as 0xaf000000 needs to map to the first byte of shadow memory and 0xffffffff needs to map to the last byte of shadow memory. Since: SHADOW_ADDR = (address >> 3) + KASAN_SHADOW_OFFSET 0xa4e00000 = (0xaf000000 >> 3) + KASAN_SHADOW_OFFSET KASAN_SHADOW_OFFSET = 0xa4e00000 - (0xaf000000 >> 3) KASAN_SHADOW_OFFSET = 0xa4e00000 - 0x15e00000 KASAN_SHADOW_OFFSET = 0x8f000000 - The default value of 0xffffffff for KASAN_SHADOW_OFFSET is an error value. We should always match one of the above shadow offsets. When we do this, TASK_SIZE will sometimes get a bit odd values that will not fit into immediate mov assembly instructions. To account for this, we need to rewrite some assembly using TASK_SIZE like this: - mov r1, #TASK_SIZE + ldr r1, =TASK_SIZE or - cmp r4, #TASK_SIZE + ldr r0, =TASK_SIZE + cmp r4, r0 this is done to avoid the immediate #TASK_SIZE that need to fit into a limited number of bits. Cc: Andrey Ryabinin <aryabinin@virtuozzo.com> Cc: Alexander Potapenko <glider@google.com> Cc: Dmitry Vyukov <dvyukov@google.com> Cc: kasan-dev@googlegroups.com Cc: Mike Rapoport <rppt@linux.ibm.com> Reviewed-by: Ard Biesheuvel <ardb@kernel.org> Tested-by: Ard Biesheuvel <ardb@kernel.org> # QEMU/KVM/mach-virt/LPAE/8G Tested-by: Florian Fainelli <f.fainelli@gmail.com> # Brahma SoCs Tested-by: Ahmad Fatoum <a.fatoum@pengutronix.de> # i.MX6Q Reported-by: Ard Biesheuvel <ardb@kernel.org> Signed-off-by: Abbott Liu <liuwenliang@huawei.com> Signed-off-by: Florian Fainelli <f.fainelli@gmail.com> Signed-off-by: Linus Walleij <linus.walleij@linaro.org> Signed-off-by: Russell King <rmk+kernel@armlinux.org.uk>
383 lines
10 KiB
C
383 lines
10 KiB
C
/* SPDX-License-Identifier: GPL-2.0-only */
|
|
/*
|
|
* arch/arm/include/asm/memory.h
|
|
*
|
|
* Copyright (C) 2000-2002 Russell King
|
|
* modification for nommu, Hyok S. Choi, 2004
|
|
*
|
|
* Note: this file should not be included by non-asm/.h files
|
|
*/
|
|
#ifndef __ASM_ARM_MEMORY_H
|
|
#define __ASM_ARM_MEMORY_H
|
|
|
|
#include <linux/compiler.h>
|
|
#include <linux/const.h>
|
|
#include <linux/types.h>
|
|
#include <linux/sizes.h>
|
|
|
|
#ifdef CONFIG_NEED_MACH_MEMORY_H
|
|
#include <mach/memory.h>
|
|
#endif
|
|
#include <asm/kasan_def.h>
|
|
|
|
/* PAGE_OFFSET - the virtual address of the start of the kernel image */
|
|
#define PAGE_OFFSET UL(CONFIG_PAGE_OFFSET)
|
|
|
|
#ifdef CONFIG_MMU
|
|
|
|
/*
|
|
* TASK_SIZE - the maximum size of a user space task.
|
|
* TASK_UNMAPPED_BASE - the lower boundary of the mmap VM area
|
|
*/
|
|
#ifndef CONFIG_KASAN
|
|
#define TASK_SIZE (UL(CONFIG_PAGE_OFFSET) - UL(SZ_16M))
|
|
#else
|
|
#define TASK_SIZE (KASAN_SHADOW_START)
|
|
#endif
|
|
#define TASK_UNMAPPED_BASE ALIGN(TASK_SIZE / 3, SZ_16M)
|
|
|
|
/*
|
|
* The maximum size of a 26-bit user space task.
|
|
*/
|
|
#define TASK_SIZE_26 (UL(1) << 26)
|
|
|
|
/*
|
|
* The module space lives between the addresses given by TASK_SIZE
|
|
* and PAGE_OFFSET - it must be within 32MB of the kernel text.
|
|
*/
|
|
#ifndef CONFIG_THUMB2_KERNEL
|
|
#define MODULES_VADDR (PAGE_OFFSET - SZ_16M)
|
|
#else
|
|
/* smaller range for Thumb-2 symbols relocation (2^24)*/
|
|
#define MODULES_VADDR (PAGE_OFFSET - SZ_8M)
|
|
#endif
|
|
|
|
#if TASK_SIZE > MODULES_VADDR
|
|
#error Top of user space clashes with start of module space
|
|
#endif
|
|
|
|
/*
|
|
* The highmem pkmap virtual space shares the end of the module area.
|
|
*/
|
|
#ifdef CONFIG_HIGHMEM
|
|
#define MODULES_END (PAGE_OFFSET - PMD_SIZE)
|
|
#else
|
|
#define MODULES_END (PAGE_OFFSET)
|
|
#endif
|
|
|
|
/*
|
|
* The XIP kernel gets mapped at the bottom of the module vm area.
|
|
* Since we use sections to map it, this macro replaces the physical address
|
|
* with its virtual address while keeping offset from the base section.
|
|
*/
|
|
#define XIP_VIRT_ADDR(physaddr) (MODULES_VADDR + ((physaddr) & 0x000fffff))
|
|
|
|
#define FDT_FIXED_BASE UL(0xff800000)
|
|
#define FDT_FIXED_SIZE (2 * PMD_SIZE)
|
|
#define FDT_VIRT_ADDR(physaddr) ((void *)(FDT_FIXED_BASE | (physaddr) % PMD_SIZE))
|
|
|
|
#if !defined(CONFIG_SMP) && !defined(CONFIG_ARM_LPAE)
|
|
/*
|
|
* Allow 16MB-aligned ioremap pages
|
|
*/
|
|
#define IOREMAP_MAX_ORDER 24
|
|
#endif
|
|
|
|
#define VECTORS_BASE UL(0xffff0000)
|
|
|
|
#else /* CONFIG_MMU */
|
|
|
|
#ifndef __ASSEMBLY__
|
|
extern unsigned long setup_vectors_base(void);
|
|
extern unsigned long vectors_base;
|
|
#define VECTORS_BASE vectors_base
|
|
#endif
|
|
|
|
/*
|
|
* The limitation of user task size can grow up to the end of free ram region.
|
|
* It is difficult to define and perhaps will never meet the original meaning
|
|
* of this define that was meant to.
|
|
* Fortunately, there is no reference for this in noMMU mode, for now.
|
|
*/
|
|
#define TASK_SIZE UL(0xffffffff)
|
|
|
|
#ifndef TASK_UNMAPPED_BASE
|
|
#define TASK_UNMAPPED_BASE UL(0x00000000)
|
|
#endif
|
|
|
|
#ifndef END_MEM
|
|
#define END_MEM (UL(CONFIG_DRAM_BASE) + CONFIG_DRAM_SIZE)
|
|
#endif
|
|
|
|
/*
|
|
* The module can be at any place in ram in nommu mode.
|
|
*/
|
|
#define MODULES_END (END_MEM)
|
|
#define MODULES_VADDR PAGE_OFFSET
|
|
|
|
#define XIP_VIRT_ADDR(physaddr) (physaddr)
|
|
#define FDT_VIRT_ADDR(physaddr) ((void *)(physaddr))
|
|
|
|
#endif /* !CONFIG_MMU */
|
|
|
|
#ifdef CONFIG_XIP_KERNEL
|
|
#define KERNEL_START _sdata
|
|
#else
|
|
#define KERNEL_START _stext
|
|
#endif
|
|
#define KERNEL_END _end
|
|
|
|
/*
|
|
* We fix the TCM memories max 32 KiB ITCM resp DTCM at these
|
|
* locations
|
|
*/
|
|
#ifdef CONFIG_HAVE_TCM
|
|
#define ITCM_OFFSET UL(0xfffe0000)
|
|
#define DTCM_OFFSET UL(0xfffe8000)
|
|
#endif
|
|
|
|
/*
|
|
* Convert a page to/from a physical address
|
|
*/
|
|
#define page_to_phys(page) (__pfn_to_phys(page_to_pfn(page)))
|
|
#define phys_to_page(phys) (pfn_to_page(__phys_to_pfn(phys)))
|
|
|
|
/*
|
|
* PLAT_PHYS_OFFSET is the offset (from zero) of the start of physical
|
|
* memory. This is used for XIP and NoMMU kernels, and on platforms that don't
|
|
* have CONFIG_ARM_PATCH_PHYS_VIRT. Assembly code must always use
|
|
* PLAT_PHYS_OFFSET and not PHYS_OFFSET.
|
|
*/
|
|
#define PLAT_PHYS_OFFSET UL(CONFIG_PHYS_OFFSET)
|
|
|
|
#ifdef CONFIG_XIP_KERNEL
|
|
/*
|
|
* When referencing data in RAM from the XIP region in a relative manner
|
|
* with the MMU off, we need the relative offset between the two physical
|
|
* addresses. The macro below achieves this, which is:
|
|
* __pa(v_data) - __xip_pa(v_text)
|
|
*/
|
|
#define PHYS_RELATIVE(v_data, v_text) \
|
|
(((v_data) - PAGE_OFFSET + PLAT_PHYS_OFFSET) - \
|
|
((v_text) - XIP_VIRT_ADDR(CONFIG_XIP_PHYS_ADDR) + \
|
|
CONFIG_XIP_PHYS_ADDR))
|
|
#else
|
|
#define PHYS_RELATIVE(v_data, v_text) ((v_data) - (v_text))
|
|
#endif
|
|
|
|
#ifndef __ASSEMBLY__
|
|
|
|
/*
|
|
* Physical vs virtual RAM address space conversion. These are
|
|
* private definitions which should NOT be used outside memory.h
|
|
* files. Use virt_to_phys/phys_to_virt/__pa/__va instead.
|
|
*
|
|
* PFNs are used to describe any physical page; this means
|
|
* PFN 0 == physical address 0.
|
|
*/
|
|
|
|
#if defined(CONFIG_ARM_PATCH_PHYS_VIRT)
|
|
|
|
/*
|
|
* Constants used to force the right instruction encodings and shifts
|
|
* so that all we need to do is modify the 8-bit constant field.
|
|
*/
|
|
#define __PV_BITS_31_24 0x81000000
|
|
#define __PV_BITS_7_0 0x81
|
|
|
|
extern unsigned long __pv_phys_pfn_offset;
|
|
extern u64 __pv_offset;
|
|
extern void fixup_pv_table(const void *, unsigned long);
|
|
extern const void *__pv_table_begin, *__pv_table_end;
|
|
|
|
#define PHYS_OFFSET ((phys_addr_t)__pv_phys_pfn_offset << PAGE_SHIFT)
|
|
#define PHYS_PFN_OFFSET (__pv_phys_pfn_offset)
|
|
|
|
#define __pv_stub(from,to,instr,type) \
|
|
__asm__("@ __pv_stub\n" \
|
|
"1: " instr " %0, %1, %2\n" \
|
|
" .pushsection .pv_table,\"a\"\n" \
|
|
" .long 1b\n" \
|
|
" .popsection\n" \
|
|
: "=r" (to) \
|
|
: "r" (from), "I" (type))
|
|
|
|
#define __pv_stub_mov_hi(t) \
|
|
__asm__ volatile("@ __pv_stub_mov\n" \
|
|
"1: mov %R0, %1\n" \
|
|
" .pushsection .pv_table,\"a\"\n" \
|
|
" .long 1b\n" \
|
|
" .popsection\n" \
|
|
: "=r" (t) \
|
|
: "I" (__PV_BITS_7_0))
|
|
|
|
#define __pv_add_carry_stub(x, y) \
|
|
__asm__ volatile("@ __pv_add_carry_stub\n" \
|
|
"1: adds %Q0, %1, %2\n" \
|
|
" adc %R0, %R0, #0\n" \
|
|
" .pushsection .pv_table,\"a\"\n" \
|
|
" .long 1b\n" \
|
|
" .popsection\n" \
|
|
: "+r" (y) \
|
|
: "r" (x), "I" (__PV_BITS_31_24) \
|
|
: "cc")
|
|
|
|
static inline phys_addr_t __virt_to_phys_nodebug(unsigned long x)
|
|
{
|
|
phys_addr_t t;
|
|
|
|
if (sizeof(phys_addr_t) == 4) {
|
|
__pv_stub(x, t, "add", __PV_BITS_31_24);
|
|
} else {
|
|
__pv_stub_mov_hi(t);
|
|
__pv_add_carry_stub(x, t);
|
|
}
|
|
return t;
|
|
}
|
|
|
|
static inline unsigned long __phys_to_virt(phys_addr_t x)
|
|
{
|
|
unsigned long t;
|
|
|
|
/*
|
|
* 'unsigned long' cast discard upper word when
|
|
* phys_addr_t is 64 bit, and makes sure that inline
|
|
* assembler expression receives 32 bit argument
|
|
* in place where 'r' 32 bit operand is expected.
|
|
*/
|
|
__pv_stub((unsigned long) x, t, "sub", __PV_BITS_31_24);
|
|
return t;
|
|
}
|
|
|
|
#else
|
|
|
|
#define PHYS_OFFSET PLAT_PHYS_OFFSET
|
|
#define PHYS_PFN_OFFSET ((unsigned long)(PHYS_OFFSET >> PAGE_SHIFT))
|
|
|
|
static inline phys_addr_t __virt_to_phys_nodebug(unsigned long x)
|
|
{
|
|
return (phys_addr_t)x - PAGE_OFFSET + PHYS_OFFSET;
|
|
}
|
|
|
|
static inline unsigned long __phys_to_virt(phys_addr_t x)
|
|
{
|
|
return x - PHYS_OFFSET + PAGE_OFFSET;
|
|
}
|
|
|
|
#endif
|
|
|
|
#define virt_to_pfn(kaddr) \
|
|
((((unsigned long)(kaddr) - PAGE_OFFSET) >> PAGE_SHIFT) + \
|
|
PHYS_PFN_OFFSET)
|
|
|
|
#define __pa_symbol_nodebug(x) __virt_to_phys_nodebug((x))
|
|
|
|
#ifdef CONFIG_DEBUG_VIRTUAL
|
|
extern phys_addr_t __virt_to_phys(unsigned long x);
|
|
extern phys_addr_t __phys_addr_symbol(unsigned long x);
|
|
#else
|
|
#define __virt_to_phys(x) __virt_to_phys_nodebug(x)
|
|
#define __phys_addr_symbol(x) __pa_symbol_nodebug(x)
|
|
#endif
|
|
|
|
/*
|
|
* These are *only* valid on the kernel direct mapped RAM memory.
|
|
* Note: Drivers should NOT use these. They are the wrong
|
|
* translation for translating DMA addresses. Use the driver
|
|
* DMA support - see dma-mapping.h.
|
|
*/
|
|
#define virt_to_phys virt_to_phys
|
|
static inline phys_addr_t virt_to_phys(const volatile void *x)
|
|
{
|
|
return __virt_to_phys((unsigned long)(x));
|
|
}
|
|
|
|
#define phys_to_virt phys_to_virt
|
|
static inline void *phys_to_virt(phys_addr_t x)
|
|
{
|
|
return (void *)__phys_to_virt(x);
|
|
}
|
|
|
|
/*
|
|
* Drivers should NOT use these either.
|
|
*/
|
|
#define __pa(x) __virt_to_phys((unsigned long)(x))
|
|
#define __pa_symbol(x) __phys_addr_symbol(RELOC_HIDE((unsigned long)(x), 0))
|
|
#define __va(x) ((void *)__phys_to_virt((phys_addr_t)(x)))
|
|
#define pfn_to_kaddr(pfn) __va((phys_addr_t)(pfn) << PAGE_SHIFT)
|
|
|
|
extern long long arch_phys_to_idmap_offset;
|
|
|
|
/*
|
|
* These are for systems that have a hardware interconnect supported alias
|
|
* of physical memory for idmap purposes. Most cases should leave these
|
|
* untouched. Note: this can only return addresses less than 4GiB.
|
|
*/
|
|
static inline bool arm_has_idmap_alias(void)
|
|
{
|
|
return IS_ENABLED(CONFIG_MMU) && arch_phys_to_idmap_offset != 0;
|
|
}
|
|
|
|
#define IDMAP_INVALID_ADDR ((u32)~0)
|
|
|
|
static inline unsigned long phys_to_idmap(phys_addr_t addr)
|
|
{
|
|
if (IS_ENABLED(CONFIG_MMU) && arch_phys_to_idmap_offset) {
|
|
addr += arch_phys_to_idmap_offset;
|
|
if (addr > (u32)~0)
|
|
addr = IDMAP_INVALID_ADDR;
|
|
}
|
|
return addr;
|
|
}
|
|
|
|
static inline phys_addr_t idmap_to_phys(unsigned long idmap)
|
|
{
|
|
phys_addr_t addr = idmap;
|
|
|
|
if (IS_ENABLED(CONFIG_MMU) && arch_phys_to_idmap_offset)
|
|
addr -= arch_phys_to_idmap_offset;
|
|
|
|
return addr;
|
|
}
|
|
|
|
static inline unsigned long __virt_to_idmap(unsigned long x)
|
|
{
|
|
return phys_to_idmap(__virt_to_phys(x));
|
|
}
|
|
|
|
#define virt_to_idmap(x) __virt_to_idmap((unsigned long)(x))
|
|
|
|
/*
|
|
* Virtual <-> DMA view memory address translations
|
|
* Again, these are *only* valid on the kernel direct mapped RAM
|
|
* memory. Use of these is *deprecated* (and that doesn't mean
|
|
* use the __ prefixed forms instead.) See dma-mapping.h.
|
|
*/
|
|
#ifndef __virt_to_bus
|
|
#define __virt_to_bus __virt_to_phys
|
|
#define __bus_to_virt __phys_to_virt
|
|
#define __pfn_to_bus(x) __pfn_to_phys(x)
|
|
#define __bus_to_pfn(x) __phys_to_pfn(x)
|
|
#endif
|
|
|
|
/*
|
|
* Conversion between a struct page and a physical address.
|
|
*
|
|
* page_to_pfn(page) convert a struct page * to a PFN number
|
|
* pfn_to_page(pfn) convert a _valid_ PFN number to struct page *
|
|
*
|
|
* virt_to_page(k) convert a _valid_ virtual address to struct page *
|
|
* virt_addr_valid(k) indicates whether a virtual address is valid
|
|
*/
|
|
#define ARCH_PFN_OFFSET PHYS_PFN_OFFSET
|
|
|
|
#define virt_to_page(kaddr) pfn_to_page(virt_to_pfn(kaddr))
|
|
#define virt_addr_valid(kaddr) (((unsigned long)(kaddr) >= PAGE_OFFSET && (unsigned long)(kaddr) < (unsigned long)high_memory) \
|
|
&& pfn_valid(virt_to_pfn(kaddr)))
|
|
|
|
#endif
|
|
|
|
#include <asm-generic/memory_model.h>
|
|
|
|
#endif
|