Lines Matching refs:kernelbase

209  * value or to 0 (to configure all available memory) via eeprom(1M). kernelbase
212 * kernelbase being set too high.
421 * 0xC3000000 -|-----------------------|- kernelbase / userlimit (floating)
519 * kernelbase: On a 32-bit kernel the default value of 0xd4000000 will be
522 * bytes, the following shows the values of kernelbase and kernel heap
526 * mem size for kernelbase kernel heap
538 * kernelbase is less than the abi minimum of 0xc0000000 for memory
542 * of kernelbase to balance out the need of user applications.
548 uintptr_t kernelbase;
1421 cmn_err(CE_NOTE, "!kernelbase cannot be changed on 64-bit "
1423 kernelbase = segkpm_base - KERNEL_REDZONE_SIZE;
1428 * We configure kernelbase based on:
1430 * 1. user specified kernelbase via eeprom command. Value cannot exceed
1434 * On large memory systems we must lower kernelbase to allow
1440 kernelbase = eprom_kernelbase & mmu.level_mask[1];
1441 if (kernelbase > KERNELBASE_MAX)
1442 kernelbase = KERNELBASE_MAX;
1444 kernelbase = (uintptr_t)KERNELBASE;
1445 kernelbase -= ROUND_UP_4MEG(2 * valloc_sz);
1447 ASSERT((kernelbase & mmu.level_offset[1]) == 0);
1454 PRM_DEBUG(kernelbase);
1464 * Now that we know the real value of kernelbase,
1474 *(uintptr_t *)&_kernelbase = kernelbase;
1475 *(uintptr_t *)&_userlimit = kernelbase;
1493 if (kernelheap >= ekernelheap || (uintptr_t)kernelheap < kernelbase)
1495 " use eeprom for lower kernelbase or smaller segmapsize");
1541 if (eprom_kernelbase && (eprom_kernelbase != kernelbase))
1542 cmn_err(CE_WARN, "kernelbase value, User specified 0x%lx, "
1544 (uintptr_t)eprom_kernelbase, (uintptr_t)kernelbase);
1548 if (kernelbase < (uintptr_t)KERNELBASE_ABI_MIN) {
1549 cmn_err(CE_NOTE, "!kernelbase set to 0x%lx, system is not "
1550 "i386 ABI compliant.", (uintptr_t)kernelbase);
1963 segmap_start = ROUND_UP_LPAGE(kernelbase);
2027 * KERNEL_TEXT and below kernelbase) is dealt with correctly.
2045 protect_boot_range(0, kernelbase, 1);
2107 toxic_bit_map_len = btop((ulong_t)(valloc_base - kernelbase));
2524 postbootkernelbase = kernelbase;
2809 * Ensure that the red zone at kernelbase is never accessible.
2812 (void) as_setprot(&kas, (caddr_t)kernelbase, KERNEL_REDZONE_SIZE, 0);
3113 if (BOP_GETPROPLEN(bootops, "kernelbase") > sizeof (prop) ||
3114 BOP_GETPROP(bootops, "kernelbase", prop) < 0 ||
3310 ASSERT(v >= kernelbase);
3313 start = btop(v - kernelbase);
3314 end = btop(v + size - 1 - kernelbase);
3332 ASSERT(v >= kernelbase);
3335 start = btop(v - kernelbase);
3336 end = btop(v + size - 1 - kernelbase);
3369 if (v >= valloc_base || eaddr < kernelbase)
3375 if (v < kernelbase)
3376 v = kernelbase;
3377 start = btop(v - kernelbase);
3378 end = btop(eaddr - kernelbase);
3385 v = kernelbase + ptob(start);