summaryrefslogtreecommitdiff
path: root/arch/s390/boot/startup.c
diff options
context:
space:
mode:
authorVasily Gorbik <gor@linux.ibm.com>2023-01-23 15:24:17 +0100
committerHeiko Carstens <hca@linux.ibm.com>2023-01-31 18:56:36 +0100
commite966ccf836e8964edf984adc4b4af5f3a3e07de6 (patch)
tree613f16e8b7a85f316477180a7303c0f96316bf5c /arch/s390/boot/startup.c
parent2213d44e140f979f4b60c3c0f8dd56d151cc8692 (diff)
s390/boot: avoid mapping standby memory
Commit bb1520d581a3 ("s390/mm: start kernel with DAT enabled") doesn't consider online memory holes due to potential memory offlining and erroneously creates pgtables for stand-by memory, which bear RW+X attribute and trigger a warning: RANGE SIZE STATE REMOVABLE BLOCK 0x0000000000000000-0x0000000c3fffffff 49G online yes 0-48 0x0000000c40000000-0x0000000c7fffffff 1G offline 49 0x0000000c80000000-0x0000000fffffffff 14G online yes 50-63 0x0000001000000000-0x00000013ffffffff 16G offline 64-79 s390/mm: Found insecure W+X mapping at address 0xc40000000 WARNING: CPU: 14 PID: 1 at arch/s390/mm/dump_pagetables.c:142 note_page+0x2cc/0x2d8 Map only online memory ranges which fit within identity mapping limit. Fixes: bb1520d581a3 ("s390/mm: start kernel with DAT enabled") Reviewed-by: Alexander Gordeev <agordeev@linux.ibm.com> Signed-off-by: Vasily Gorbik <gor@linux.ibm.com> Signed-off-by: Heiko Carstens <hca@linux.ibm.com>
Diffstat (limited to 'arch/s390/boot/startup.c')
-rw-r--r--arch/s390/boot/startup.c4
1 files changed, 1 insertions, 3 deletions
diff --git a/arch/s390/boot/startup.c b/arch/s390/boot/startup.c
index cb4b743a5e17..c9dfd7e09233 100644
--- a/arch/s390/boot/startup.c
+++ b/arch/s390/boot/startup.c
@@ -278,7 +278,6 @@ void startup_kernel(void)
unsigned long random_lma;
unsigned long safe_addr;
unsigned long asce_limit;
- unsigned long online_end;
void *img;
psw_t psw;
@@ -303,7 +302,6 @@ void startup_kernel(void)
setup_ident_map_size(detect_memory());
setup_vmalloc_size();
asce_limit = setup_kernel_memory_layout();
- online_end = min(get_mem_detect_end(), ident_map_size);
if (IS_ENABLED(CONFIG_RANDOMIZE_BASE) && kaslr_enabled) {
random_lma = get_random_base(safe_addr);
@@ -335,7 +333,7 @@ void startup_kernel(void)
*/
clear_bss_section();
handle_relocs(__kaslr_offset);
- setup_vmem(online_end, asce_limit);
+ setup_vmem(ident_map_size, asce_limit);
copy_bootdata();
if (__kaslr_offset) {