Received: by 2002:a25:ef43:0:0:0:0:0 with SMTP id w3csp595967ybm; Wed, 27 May 2020 03:19:39 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzmN+5wyab4QVxWXYj/O35//qCXI5wWwdtucJSWDAxT+4AotYJnNCR71r/K6qLDSFqi+mq3 X-Received: by 2002:a50:ed92:: with SMTP id h18mr13764932edr.190.1590574778939; Wed, 27 May 2020 03:19:38 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1590574778; cv=none; d=google.com; s=arc-20160816; b=qoH3QhJ9fiGUElzIgp60tazp0cvS2Vz9KHqyrF8KEtraB5J3eaobMyNM8fMcxNz9sV axFOeVD+g9zvkY8HRlAUbzjugewfkjpBtmYTzT2px7LRREGlZt5bUYHjg/esg7UhqbCK n2wheyFbQA/lxzNW35ftbtE6rO6nWTJ87eMmfVnU+lV57z9HAKcXIdss5Tz2wG6d6jW8 rwBmRU2crINVqHZ5EsgyWI8+HI45LhE0xgvSiZSBsuvRdzXWeQbQ/HFm3D4ddk2WM3aC 82DOAlp51jQvqlcu7+ISu7aSH8Esh/ObyRZE22BTqwdpYvGTWUSktOfFLX1S5NE3Gx1v lmzg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:cc:to:subject :message-id:date:from:in-reply-to:references:mime-version :dkim-signature; bh=/0yPaXUMvGeEuOZvv3Vg8K9ivpEmWs7M17Z9CsO0EAk=; b=HE6DIm1aCCh/pvJ0WhCPLHPzZZtK8heB0QLP57E2FiE+Qk5mUhDCX5mLodrvtYN29u i5vREZ3kOZKyQfGt0lUy6jz0671Ug1ewi/HAI6KSYdk+BkOWzpRb29FVaBQ+IlV869FN MDnNAEa7n/Cq1vmvq2KshpRO9pc6vlsSbeY9ua5z507rLZ3GzihgDIHru1b9RsT2Ogmn KVdlYKOZDnyfYKjgcPv3HCbUtvnDEyw2/ym+yCY46V7mGjx/GRJ7Y3TmEZ3NEE0x+GBg FiElrYFjhyYoSdBoNKfiEjHobJjICKALdZ7XhFM3H8Xh5M6eKnRstlQN2w7fSoCZMaW6 ribg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@sifive.com header.s=google header.b="cNSjZH/u"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id w8si1543570eji.466.2020.05.27.03.19.15; Wed, 27 May 2020 03:19:38 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@sifive.com header.s=google header.b="cNSjZH/u"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727787AbgE0GFw (ORCPT + 99 others); Wed, 27 May 2020 02:05:52 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:51052 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725267AbgE0GFw (ORCPT ); Wed, 27 May 2020 02:05:52 -0400 Received: from mail-ot1-x344.google.com (mail-ot1-x344.google.com [IPv6:2607:f8b0:4864:20::344]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 1AFBCC061A0F for ; Tue, 26 May 2020 23:05:52 -0700 (PDT) Received: by mail-ot1-x344.google.com with SMTP id z3so18317874otp.9 for ; Tue, 26 May 2020 23:05:52 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sifive.com; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc:content-transfer-encoding; bh=/0yPaXUMvGeEuOZvv3Vg8K9ivpEmWs7M17Z9CsO0EAk=; b=cNSjZH/uz0PD0RBnQoFstwhhxvQZHAmKZgeQf4CiQyVPQ8/eCWn+8dOq6gZdbkKtDX hlYqmeBP94LpVKhnVVzsrw707SX3DqRNVg/2oX2756z4GJ+SFrWi3AwF1hcaA7G/dFTN /VzlfNWKKbXnWsDpvrtzHxws5JsNba0JWzfRc6SMm90tKxkWGYWT9SZOZHhKQKO7r72x HJVKasoj5FyhO//ViNQDh9tXOXTwL5/3266moA2ZZEoRiaD28tSJymN4sHAq52fAUa0v tIYcqho0HZBYbePdaKv7dg7h/y0EgjRwS29UWsMLorN+F4LEOLtwpGNre4aSg9BtXmoC Hgbw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc:content-transfer-encoding; bh=/0yPaXUMvGeEuOZvv3Vg8K9ivpEmWs7M17Z9CsO0EAk=; b=b9l0+ex/x9qRw0QdjlsKdZNURi0jCsyA14vUdL/RSuyrJ2GgbgOfuzsIzHprmrfkmG gVrr/LZqxqzQVGFKOugMRK2bizlazyVuMBiWUuiLAp43nkzJgYAwOL9csGvW/BQj1vJw c+zdvz3iXB7nig58ZaI12HfFhPMkNT0SDt1SSApfL1dCbMWjbqeNmLZYKcXCF0KophEd 8rVOrhtKaycJcTh2BAY40ed+q1H2KlgpGhtJzDM15Rpw5RC29xHeYHwcao8YmDcCinlz i1fe/+sHZjkKm+QdCvCxtVoVlm1Md2Z7rwFjLknD1CjYjW4Uzc7a6SmRV33OH4Vv3JrI l6Vw== X-Gm-Message-State: AOAM5302N70u3xEfQsioQVvhfc/n22JjOZMRUENjEuGNjyVl0rR/WLWa Zs5Y0XL7NnpBXvzBz1e4s6lIdtV6YhW65fS1eAuZEA== X-Received: by 2002:a9d:6ac9:: with SMTP id m9mr3506634otq.33.1590559551221; Tue, 26 May 2020 23:05:51 -0700 (PDT) MIME-Version: 1.0 References: <20200524085259.24784-1-alex@ghiti.fr> <20200524085259.24784-2-alex@ghiti.fr> <6d6b09bc-32e4-4969-7020-12f9f02e557e@ghiti.fr> In-Reply-To: <6d6b09bc-32e4-4969-7020-12f9f02e557e@ghiti.fr> From: Zong Li Date: Wed, 27 May 2020 14:05:40 +0800 Message-ID: Subject: Re: [PATCH v3 1/3] riscv: Move kernel mapping to vmalloc zone To: Alex Ghiti Cc: Michael Ellerman , Benjamin Herrenschmidt , Paul Mackerras , Paul Walmsley , Palmer Dabbelt , Albert Ou , Anup Patel , Atish Patra , "linux-kernel@vger.kernel.org List" , linuxppc-dev@lists.ozlabs.org, linux-riscv Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, May 27, 2020 at 1:06 AM Alex Ghiti wrote: > > Hi Zong, > > Le 5/26/20 =C3=A0 5:43 AM, Zong Li a =C3=A9crit : > > On Sun, May 24, 2020 at 4:54 PM Alexandre Ghiti wrote: > >> This is a preparatory patch for relocatable kernel. > >> > >> The kernel used to be linked at PAGE_OFFSET address and used to be loa= ded > >> physically at the beginning of the main memory. Therefore, we could us= e > >> the linear mapping for the kernel mapping. > >> > >> But the relocated kernel base address will be different from PAGE_OFFS= ET > >> and since in the linear mapping, two different virtual addresses canno= t > >> point to the same physical address, the kernel mapping needs to lie ou= tside > >> the linear mapping. > >> > >> In addition, because modules and BPF must be close to the kernel (insi= de > >> +-2GB window), the kernel is placed at the end of the vmalloc zone min= us > >> 2GB, which leaves room for modules and BPF. The kernel could not be > >> placed at the beginning of the vmalloc zone since other vmalloc > >> allocations from the kernel could get all the +-2GB window around the > >> kernel which would prevent new modules and BPF programs to be loaded. > >> > >> Signed-off-by: Alexandre Ghiti > >> --- > >> arch/riscv/boot/loader.lds.S | 3 +- > >> arch/riscv/include/asm/page.h | 10 +++++- > >> arch/riscv/include/asm/pgtable.h | 37 +++++++++++++------- > >> arch/riscv/kernel/head.S | 3 +- > >> arch/riscv/kernel/module.c | 4 +-- > >> arch/riscv/kernel/vmlinux.lds.S | 3 +- > >> arch/riscv/mm/init.c | 58 +++++++++++++++++++++++++-----= -- > >> arch/riscv/mm/physaddr.c | 2 +- > >> 8 files changed, 87 insertions(+), 33 deletions(-) > >> > >> diff --git a/arch/riscv/boot/loader.lds.S b/arch/riscv/boot/loader.lds= .S > >> index 47a5003c2e28..62d94696a19c 100644 > >> --- a/arch/riscv/boot/loader.lds.S > >> +++ b/arch/riscv/boot/loader.lds.S > >> @@ -1,13 +1,14 @@ > >> /* SPDX-License-Identifier: GPL-2.0 */ > >> > >> #include > >> +#include > >> > >> OUTPUT_ARCH(riscv) > >> ENTRY(_start) > >> > >> SECTIONS > >> { > >> - . =3D PAGE_OFFSET; > >> + . =3D KERNEL_LINK_ADDR; > >> > >> .payload : { > >> *(.payload) > >> diff --git a/arch/riscv/include/asm/page.h b/arch/riscv/include/asm/pa= ge.h > >> index 2d50f76efe48..48bb09b6a9b7 100644 > >> --- a/arch/riscv/include/asm/page.h > >> +++ b/arch/riscv/include/asm/page.h > >> @@ -90,18 +90,26 @@ typedef struct page *pgtable_t; > >> > >> #ifdef CONFIG_MMU > >> extern unsigned long va_pa_offset; > >> +extern unsigned long va_kernel_pa_offset; > >> extern unsigned long pfn_base; > >> #define ARCH_PFN_OFFSET (pfn_base) > >> #else > >> #define va_pa_offset 0 > >> +#define va_kernel_pa_offset 0 > >> #define ARCH_PFN_OFFSET (PAGE_OFFSET >> PAGE_SHIFT) > >> #endif /* CONFIG_MMU */ > >> > >> extern unsigned long max_low_pfn; > >> extern unsigned long min_low_pfn; > >> +extern unsigned long kernel_virt_addr; > >> > >> #define __pa_to_va_nodebug(x) ((void *)((unsigned long) (x) + va_pa= _offset)) > >> -#define __va_to_pa_nodebug(x) ((unsigned long)(x) - va_pa_offset) > >> +#define linear_mapping_va_to_pa(x) ((unsigned long)(x) - va_pa_of= fset) > >> +#define kernel_mapping_va_to_pa(x) \ > >> + ((unsigned long)(x) - va_kernel_pa_offset) > >> +#define __va_to_pa_nodebug(x) \ > >> + (((x) >=3D PAGE_OFFSET) ? \ > >> + linear_mapping_va_to_pa(x) : kernel_mapping_va_to_pa(x= )) > >> > >> #ifdef CONFIG_DEBUG_VIRTUAL > >> extern phys_addr_t __virt_to_phys(unsigned long x); > >> diff --git a/arch/riscv/include/asm/pgtable.h b/arch/riscv/include/asm= /pgtable.h > >> index 35b60035b6b0..25213cfaf680 100644 > >> --- a/arch/riscv/include/asm/pgtable.h > >> +++ b/arch/riscv/include/asm/pgtable.h > >> @@ -11,23 +11,29 @@ > >> > >> #include > >> > >> -#ifndef __ASSEMBLY__ > >> - > >> -/* Page Upper Directory not used in RISC-V */ > >> -#include > >> -#include > >> -#include > >> -#include > >> - > >> -#ifdef CONFIG_MMU > >> +#ifndef CONFIG_MMU > >> +#define KERNEL_VIRT_ADDR PAGE_OFFSET > >> +#define KERNEL_LINK_ADDR PAGE_OFFSET > >> +#else > >> +/* > >> + * Leave 2GB for modules and BPF that must lie within a 2GB range aro= und > >> + * the kernel. > >> + */ > >> +#define KERNEL_VIRT_ADDR (VMALLOC_END - SZ_2G + 1) > >> +#define KERNEL_LINK_ADDR KERNEL_VIRT_ADDR > >> > >> #define VMALLOC_SIZE (KERN_VIRT_SIZE >> 1) > >> #define VMALLOC_END (PAGE_OFFSET - 1) > >> #define VMALLOC_START (PAGE_OFFSET - VMALLOC_SIZE) > >> > >> #define BPF_JIT_REGION_SIZE (SZ_128M) > >> -#define BPF_JIT_REGION_START (PAGE_OFFSET - BPF_JIT_REGION_SIZE) > >> -#define BPF_JIT_REGION_END (VMALLOC_END) > >> +#define BPF_JIT_REGION_START (kernel_virt_addr) > >> +#define BPF_JIT_REGION_END (kernel_virt_addr + BPF_JIT_REGION_SIZ= E) > > It seems to have a potential risk here, the region of bpf is > > overlapping with kernel mapping, so if kernel size is bigger than > > 128MB, bpf region would be occupied and run out by kernel mapping. Is there the risk as I mentioned? > > > >> + > >> +#ifdef CONFIG_64BIT > >> +#define VMALLOC_MODULE_START BPF_JIT_REGION_END > >> +#define VMALLOC_MODULE_END VMALLOC_END > >> +#endif > >> > > Although kernel_virt_addr is a fixed address now, I think it could be > > changed for the purpose of relocatable or KASLR, so if > > kernel_virt_addr is moved to far from VMALLOC_END than 2G, the region > > of module would be too big. > > > Yes you're right, that's wrong to allow modules to lie outside > the 2G window, thanks for noticing. > > > > In addition, the region of module could be > > +-2G around the kernel, so we don't be limited in one direction as > > before. It seems to me that the region of the module could be decided > > at runtime, for example, VMALLOC_MODULE_START is "&_end - 2G" and > > VMLLOC_MODULE_END is "&_start + 2G". > > > I had tried that, but as we need to make sure BPF region is different > from the module's > that makes the macro definitions really cumbersome. I'll give a try > again anyway. And > I tried to use _end and _start here but it failed, I have to debug this. > > > > I'm not sure whether the size of > > region of bpf has to be 128MB for some particular reason, if not, > > maybe the region of bpf could be the same with module to avoid being > > run out by module. > > > On the contrary, BPF region must not be the same as module's since in > that case, > modules could take all the space and make BPF fail. ok, I got it. Thanks for the explaining. > > > Thanks for your review Zong, > > > Alex > > > > > >> /* > >> * Roughly size the vmemmap space to be large enough to fit enough > >> @@ -57,9 +63,16 @@ > >> #define FIXADDR_SIZE PGDIR_SIZE > >> #endif > >> #define FIXADDR_START (FIXADDR_TOP - FIXADDR_SIZE) > >> - > >> #endif > >> > >> +#ifndef __ASSEMBLY__ > >> + > >> +/* Page Upper Directory not used in RISC-V */ > >> +#include > >> +#include > >> +#include > >> +#include > >> + > >> #ifdef CONFIG_64BIT > >> #include > >> #else > >> diff --git a/arch/riscv/kernel/head.S b/arch/riscv/kernel/head.S > >> index 98a406474e7d..8f5bb7731327 100644 > >> --- a/arch/riscv/kernel/head.S > >> +++ b/arch/riscv/kernel/head.S > >> @@ -49,7 +49,8 @@ ENTRY(_start) > >> #ifdef CONFIG_MMU > >> relocate: > >> /* Relocate return address */ > >> - li a1, PAGE_OFFSET > >> + la a1, kernel_virt_addr > >> + REG_L a1, 0(a1) > >> la a2, _start > >> sub a1, a1, a2 > >> add ra, ra, a1 > >> diff --git a/arch/riscv/kernel/module.c b/arch/riscv/kernel/module.c > >> index 8bbe5dbe1341..1a8fbe05accf 100644 > >> --- a/arch/riscv/kernel/module.c > >> +++ b/arch/riscv/kernel/module.c > >> @@ -392,12 +392,10 @@ int apply_relocate_add(Elf_Shdr *sechdrs, const = char *strtab, > >> } > >> > >> #if defined(CONFIG_MMU) && defined(CONFIG_64BIT) > >> -#define VMALLOC_MODULE_START \ > >> - max(PFN_ALIGN((unsigned long)&_end - SZ_2G), VMALLOC_START) > >> void *module_alloc(unsigned long size) > >> { > >> return __vmalloc_node_range(size, 1, VMALLOC_MODULE_START, > >> - VMALLOC_END, GFP_KERNEL, > >> + VMALLOC_MODULE_END, GFP_KERNEL, > >> PAGE_KERNEL_EXEC, 0, NUMA_NO_NODE= , > >> __builtin_return_address(0)); > >> } > >> diff --git a/arch/riscv/kernel/vmlinux.lds.S b/arch/riscv/kernel/vmlin= ux.lds.S > >> index 0339b6bbe11a..a9abde62909f 100644 > >> --- a/arch/riscv/kernel/vmlinux.lds.S > >> +++ b/arch/riscv/kernel/vmlinux.lds.S > >> @@ -4,7 +4,8 @@ > >> * Copyright (C) 2017 SiFive > >> */ > >> > >> -#define LOAD_OFFSET PAGE_OFFSET > >> +#include > >> +#define LOAD_OFFSET KERNEL_LINK_ADDR > >> #include > >> #include > >> #include > >> diff --git a/arch/riscv/mm/init.c b/arch/riscv/mm/init.c > >> index 27a334106708..17f108baec4f 100644 > >> --- a/arch/riscv/mm/init.c > >> +++ b/arch/riscv/mm/init.c > >> @@ -22,6 +22,9 @@ > >> > >> #include "../kernel/head.h" > >> > >> +unsigned long kernel_virt_addr =3D KERNEL_VIRT_ADDR; > >> +EXPORT_SYMBOL(kernel_virt_addr); > >> + > >> unsigned long empty_zero_page[PAGE_SIZE / sizeof(unsigned long)] > >> __page_aligne= d_bss; > >> EXPORT_SYMBOL(empty_zero_page); > >> @@ -178,8 +181,12 @@ void __init setup_bootmem(void) > >> } > >> > >> #ifdef CONFIG_MMU > >> +/* Offset between linear mapping virtual address and kernel load addr= ess */ > >> unsigned long va_pa_offset; > >> EXPORT_SYMBOL(va_pa_offset); > >> +/* Offset between kernel mapping virtual address and kernel load addr= ess */ > >> +unsigned long va_kernel_pa_offset; > >> +EXPORT_SYMBOL(va_kernel_pa_offset); > >> unsigned long pfn_base; > >> EXPORT_SYMBOL(pfn_base); > >> > >> @@ -271,7 +278,7 @@ static phys_addr_t __init alloc_pmd(uintptr_t va) > >> if (mmu_enabled) > >> return memblock_phys_alloc(PAGE_SIZE, PAGE_SIZE); > >> > >> - pmd_num =3D (va - PAGE_OFFSET) >> PGDIR_SHIFT; > >> + pmd_num =3D (va - kernel_virt_addr) >> PGDIR_SHIFT; > >> BUG_ON(pmd_num >=3D NUM_EARLY_PMDS); > >> return (uintptr_t)&early_pmd[pmd_num * PTRS_PER_PMD]; > >> } > >> @@ -372,14 +379,30 @@ static uintptr_t __init best_map_size(phys_addr_= t base, phys_addr_t size) > >> #error "setup_vm() is called from head.S before relocate so it shoul= d not use absolute addressing." > >> #endif > >> > >> +static uintptr_t load_pa, load_sz; > >> + > >> +void create_kernel_page_table(pgd_t *pgdir, uintptr_t map_size) > >> +{ > >> + uintptr_t va, end_va; > >> + > >> + end_va =3D kernel_virt_addr + load_sz; > >> + for (va =3D kernel_virt_addr; va < end_va; va +=3D map_size) > >> + create_pgd_mapping(pgdir, va, > >> + load_pa + (va - kernel_virt_addr), > >> + map_size, PAGE_KERNEL_EXEC); > >> +} > >> + > >> asmlinkage void __init setup_vm(uintptr_t dtb_pa) > >> { > >> uintptr_t va, end_va; > >> - uintptr_t load_pa =3D (uintptr_t)(&_start); > >> - uintptr_t load_sz =3D (uintptr_t)(&_end) - load_pa; > >> uintptr_t map_size =3D best_map_size(load_pa, MAX_EARLY_MAPPI= NG_SIZE); > >> > >> + load_pa =3D (uintptr_t)(&_start); > >> + load_sz =3D (uintptr_t)(&_end) - load_pa; > >> + > >> va_pa_offset =3D PAGE_OFFSET - load_pa; > >> + va_kernel_pa_offset =3D kernel_virt_addr - load_pa; > >> + > >> pfn_base =3D PFN_DOWN(load_pa); > >> > >> /* > >> @@ -402,26 +425,22 @@ asmlinkage void __init setup_vm(uintptr_t dtb_pa= ) > >> create_pmd_mapping(fixmap_pmd, FIXADDR_START, > >> (uintptr_t)fixmap_pte, PMD_SIZE, PAGE_TABL= E); > >> /* Setup trampoline PGD and PMD */ > >> - create_pgd_mapping(trampoline_pg_dir, PAGE_OFFSET, > >> + create_pgd_mapping(trampoline_pg_dir, kernel_virt_addr, > >> (uintptr_t)trampoline_pmd, PGDIR_SIZE, PAG= E_TABLE); > >> - create_pmd_mapping(trampoline_pmd, PAGE_OFFSET, > >> + create_pmd_mapping(trampoline_pmd, kernel_virt_addr, > >> load_pa, PMD_SIZE, PAGE_KERNEL_EXEC); > >> #else > >> /* Setup trampoline PGD */ > >> - create_pgd_mapping(trampoline_pg_dir, PAGE_OFFSET, > >> + create_pgd_mapping(trampoline_pg_dir, kernel_virt_addr, > >> load_pa, PGDIR_SIZE, PAGE_KERNEL_EXEC); > >> #endif > >> > >> /* > >> - * Setup early PGD covering entire kernel which will allows > >> + * Setup early PGD covering entire kernel which will allow > >> * us to reach paging_init(). We map all memory banks later > >> * in setup_vm_final() below. > >> */ > >> - end_va =3D PAGE_OFFSET + load_sz; > >> - for (va =3D PAGE_OFFSET; va < end_va; va +=3D map_size) > >> - create_pgd_mapping(early_pg_dir, va, > >> - load_pa + (va - PAGE_OFFSET), > >> - map_size, PAGE_KERNEL_EXEC); > >> + create_kernel_page_table(early_pg_dir, map_size); > >> > >> /* Create fixed mapping for early FDT parsing */ > >> end_va =3D __fix_to_virt(FIX_FDT) + FIX_FDT_SIZE; > >> @@ -441,6 +460,7 @@ static void __init setup_vm_final(void) > >> uintptr_t va, map_size; > >> phys_addr_t pa, start, end; > >> struct memblock_region *reg; > >> + static struct vm_struct vm_kernel =3D { 0 }; > >> > >> /* Set mmu_enabled flag */ > >> mmu_enabled =3D true; > >> @@ -467,10 +487,22 @@ static void __init setup_vm_final(void) > >> for (pa =3D start; pa < end; pa +=3D map_size) { > >> va =3D (uintptr_t)__va(pa); > >> create_pgd_mapping(swapper_pg_dir, va, pa, > >> - map_size, PAGE_KERNEL_EXEC)= ; > >> + map_size, PAGE_KERNEL); > >> } > >> } > >> > >> + /* Map the kernel */ > >> + create_kernel_page_table(swapper_pg_dir, PMD_SIZE); > >> + > >> + /* Reserve the vmalloc area occupied by the kernel */ > >> + vm_kernel.addr =3D (void *)kernel_virt_addr; > >> + vm_kernel.phys_addr =3D load_pa; > >> + vm_kernel.size =3D (load_sz + PMD_SIZE) & ~(PMD_SIZE - 1); > >> + vm_kernel.flags =3D VM_MAP | VM_NO_GUARD; > >> + vm_kernel.caller =3D __builtin_return_address(0); > >> + > >> + vm_area_add_early(&vm_kernel); > >> + > >> /* Clear fixmap PTE and PMD mappings */ > >> clear_fixmap(FIX_PTE); > >> clear_fixmap(FIX_PMD); > >> diff --git a/arch/riscv/mm/physaddr.c b/arch/riscv/mm/physaddr.c > >> index e8e4dcd39fed..35703d5ef5fd 100644 > >> --- a/arch/riscv/mm/physaddr.c > >> +++ b/arch/riscv/mm/physaddr.c > >> @@ -23,7 +23,7 @@ EXPORT_SYMBOL(__virt_to_phys); > >> > >> phys_addr_t __phys_addr_symbol(unsigned long x) > >> { > >> - unsigned long kernel_start =3D (unsigned long)PAGE_OFFSET; > >> + unsigned long kernel_start =3D (unsigned long)kernel_virt_addr= ; > >> unsigned long kernel_end =3D (unsigned long)_end; > >> > >> /* > >> -- > >> 2.20.1 > >>