Lines Matching defs:kernelbase
208 * value or to 0 (to configure all available memory) via eeprom(1M). kernelbase
211 * kernelbase being set too high.
414 * 0xC3000000 -|-----------------------|- kernelbase / userlimit (floating)
512 * kernelbase: On a 32-bit kernel the default value of 0xd4000000 will be
515 * bytes, the following shows the values of kernelbase and kernel heap
519 * mem size for kernelbase kernel heap
531 * kernelbase is less than the abi minimum of 0xc0000000 for memory
535 * of kernelbase to balance out the need of user applications.
541 uintptr_t kernelbase;
1334 cmn_err(CE_NOTE, "!kernelbase cannot be changed on 64-bit "
1336 kernelbase = segkpm_base - KERNEL_REDZONE_SIZE;
1341 * We configure kernelbase based on:
1343 * 1. user specified kernelbase via eeprom command. Value cannot exceed
1347 * On large memory systems we must lower kernelbase to allow
1353 kernelbase = eprom_kernelbase & mmu.level_mask[1];
1354 if (kernelbase > KERNELBASE_MAX)
1355 kernelbase = KERNELBASE_MAX;
1357 kernelbase = (uintptr_t)KERNELBASE;
1358 kernelbase -= ROUND_UP_4MEG(2 * valloc_sz);
1360 ASSERT((kernelbase & mmu.level_offset[1]) == 0);
1367 PRM_DEBUG(kernelbase);
1377 * Now that we know the real value of kernelbase,
1387 *(uintptr_t *)&_kernelbase = kernelbase;
1388 *(uintptr_t *)&_userlimit = kernelbase;
1406 if (kernelheap >= ekernelheap || (uintptr_t)kernelheap < kernelbase)
1408 " use eeprom for lower kernelbase or smaller segmapsize");
1454 if (eprom_kernelbase && (eprom_kernelbase != kernelbase))
1455 cmn_err(CE_WARN, "kernelbase value, User specified 0x%lx, "
1457 (uintptr_t)eprom_kernelbase, (uintptr_t)kernelbase);
1461 if (kernelbase < (uintptr_t)KERNELBASE_ABI_MIN) {
1462 cmn_err(CE_NOTE, "!kernelbase set to 0x%lx, system is not "
1463 "i386 ABI compliant.", (uintptr_t)kernelbase);
1857 segmap_start = ROUND_UP_LPAGE(kernelbase);
1921 * KERNEL_TEXT and below kernelbase) is dealt with correctly.
1939 protect_boot_range(0, kernelbase, 1);
2001 toxic_bit_map_len = btop((ulong_t)(valloc_base - kernelbase));
2418 postbootkernelbase = kernelbase;
2703 * Ensure that the red zone at kernelbase is never accessible.
2706 (void) as_setprot(&kas, (caddr_t)kernelbase, KERNEL_REDZONE_SIZE, 0);
3007 if (BOP_GETPROPLEN(bootops, "kernelbase") > sizeof (prop) ||
3008 BOP_GETPROP(bootops, "kernelbase", prop) < 0 ||
3204 ASSERT(v >= kernelbase);
3207 start = btop(v - kernelbase);
3208 end = btop(v + size - 1 - kernelbase);
3226 ASSERT(v >= kernelbase);
3229 start = btop(v - kernelbase);
3230 end = btop(v + size - 1 - kernelbase);
3263 if (v >= valloc_base || eaddr < kernelbase)
3269 if (v < kernelbase)
3270 v = kernelbase;
3271 start = btop(v - kernelbase);
3272 end = btop(eaddr - kernelbase);
3279 v = kernelbase + ptob(start);