]>
Commit | Line | Data |
---|---|---|
342cd0ab CD |
1 | /* |
2 | * Copyright (C) 2012 - Virtual Open Systems and Columbia University | |
3 | * Author: Christoffer Dall <c.dall@virtualopensystems.com> | |
4 | * | |
5 | * This program is free software; you can redistribute it and/or modify | |
6 | * it under the terms of the GNU General Public License, version 2, as | |
7 | * published by the Free Software Foundation. | |
8 | * | |
9 | * This program is distributed in the hope that it will be useful, | |
10 | * but WITHOUT ANY WARRANTY; without even the implied warranty of | |
11 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
12 | * GNU General Public License for more details. | |
13 | * | |
14 | * You should have received a copy of the GNU General Public License | |
15 | * along with this program; if not, write to the Free Software | |
16 | * Foundation, 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA. | |
17 | */ | |
18 | ||
19 | #ifndef __ARM_KVM_MMU_H__ | |
20 | #define __ARM_KVM_MMU_H__ | |
21 | ||
5a677ce0 MZ |
22 | #include <asm/memory.h> |
23 | #include <asm/page.h> | |
c62ee2b2 | 24 | |
06e8c3b0 MZ |
25 | /* |
26 | * We directly use the kernel VA for the HYP, as we can directly share | |
27 | * the mapping (HTTBR "covers" TTBR1). | |
28 | */ | |
6c41a413 | 29 | #define kern_hyp_va(kva) (kva) |
06e8c3b0 | 30 | |
c7588eb4 MZ |
31 | /* Contrary to arm64, there is no need to generate a PC-relative address */ |
32 | #define hyp_symbol_addr(s) \ | |
33 | ({ \ | |
34 | typeof(s) *addr = &(s); \ | |
35 | addr; \ | |
36 | }) | |
37 | ||
38f791a4 CD |
38 | /* |
39 | * KVM_MMU_CACHE_MIN_PAGES is the number of stage2 page table translation levels. | |
40 | */ | |
41 | #define KVM_MMU_CACHE_MIN_PAGES 2 | |
42 | ||
5a677ce0 MZ |
43 | #ifndef __ASSEMBLY__ |
44 | ||
363ef89f | 45 | #include <linux/highmem.h> |
5a677ce0 MZ |
46 | #include <asm/cacheflush.h> |
47 | #include <asm/pgalloc.h> | |
b1ae9a30 | 48 | #include <asm/stage2_pgtable.h> |
5a677ce0 | 49 | |
c8dddecd | 50 | int create_hyp_mappings(void *from, void *to, pgprot_t prot); |
342cd0ab | 51 | int create_hyp_io_mappings(void *from, void *to, phys_addr_t); |
4f728276 | 52 | void free_hyp_pgds(void); |
342cd0ab | 53 | |
957db105 | 54 | void stage2_unmap_vm(struct kvm *kvm); |
d5d8184d CD |
55 | int kvm_alloc_stage2_pgd(struct kvm *kvm); |
56 | void kvm_free_stage2_pgd(struct kvm *kvm); | |
57 | int kvm_phys_addr_ioremap(struct kvm *kvm, phys_addr_t guest_ipa, | |
c40f2f8f | 58 | phys_addr_t pa, unsigned long size, bool writable); |
d5d8184d CD |
59 | |
60 | int kvm_handle_guest_abort(struct kvm_vcpu *vcpu, struct kvm_run *run); | |
61 | ||
62 | void kvm_mmu_free_memory_caches(struct kvm_vcpu *vcpu); | |
63 | ||
342cd0ab | 64 | phys_addr_t kvm_mmu_get_httbr(void); |
5a677ce0 | 65 | phys_addr_t kvm_get_idmap_vector(void); |
342cd0ab CD |
66 | int kvm_mmu_init(void); |
67 | void kvm_clear_hyp_idmap(void); | |
94f8e641 | 68 | |
ad361f09 CD |
69 | static inline void kvm_set_pmd(pmd_t *pmd, pmd_t new_pmd) |
70 | { | |
71 | *pmd = new_pmd; | |
dcadda14 | 72 | dsb(ishst); |
ad361f09 CD |
73 | } |
74 | ||
c62ee2b2 MZ |
75 | static inline void kvm_set_pte(pte_t *pte, pte_t new_pte) |
76 | { | |
0963e5d0 | 77 | *pte = new_pte; |
dcadda14 | 78 | dsb(ishst); |
c62ee2b2 MZ |
79 | } |
80 | ||
06485053 | 81 | static inline pte_t kvm_s2pte_mkwrite(pte_t pte) |
c62ee2b2 | 82 | { |
06485053 CM |
83 | pte_val(pte) |= L_PTE_S2_RDWR; |
84 | return pte; | |
c62ee2b2 MZ |
85 | } |
86 | ||
06485053 | 87 | static inline pmd_t kvm_s2pmd_mkwrite(pmd_t pmd) |
ad361f09 | 88 | { |
06485053 CM |
89 | pmd_val(pmd) |= L_PMD_S2_RDWR; |
90 | return pmd; | |
ad361f09 CD |
91 | } |
92 | ||
c6473555 MS |
93 | static inline void kvm_set_s2pte_readonly(pte_t *pte) |
94 | { | |
95 | pte_val(*pte) = (pte_val(*pte) & ~L_PTE_S2_RDWR) | L_PTE_S2_RDONLY; | |
96 | } | |
97 | ||
98 | static inline bool kvm_s2pte_readonly(pte_t *pte) | |
99 | { | |
100 | return (pte_val(*pte) & L_PTE_S2_RDWR) == L_PTE_S2_RDONLY; | |
101 | } | |
102 | ||
103 | static inline void kvm_set_s2pmd_readonly(pmd_t *pmd) | |
104 | { | |
105 | pmd_val(*pmd) = (pmd_val(*pmd) & ~L_PMD_S2_RDWR) | L_PMD_S2_RDONLY; | |
106 | } | |
107 | ||
108 | static inline bool kvm_s2pmd_readonly(pmd_t *pmd) | |
109 | { | |
110 | return (pmd_val(*pmd) & L_PMD_S2_RDWR) == L_PMD_S2_RDONLY; | |
111 | } | |
112 | ||
4f853a71 CD |
113 | static inline bool kvm_page_empty(void *ptr) |
114 | { | |
115 | struct page *ptr_page = virt_to_page(ptr); | |
116 | return page_count(ptr_page) == 1; | |
117 | } | |
118 | ||
38f791a4 CD |
119 | #define kvm_pte_table_empty(kvm, ptep) kvm_page_empty(ptep) |
120 | #define kvm_pmd_table_empty(kvm, pmdp) kvm_page_empty(pmdp) | |
b1d030a7 | 121 | #define kvm_pud_table_empty(kvm, pudp) false |
4f853a71 | 122 | |
b1d030a7 SP |
123 | #define hyp_pte_table_empty(ptep) kvm_page_empty(ptep) |
124 | #define hyp_pmd_table_empty(pmdp) kvm_page_empty(pmdp) | |
125 | #define hyp_pud_table_empty(pudp) false | |
4f853a71 | 126 | |
c62ee2b2 MZ |
127 | struct kvm; |
128 | ||
15979300 MZ |
129 | #define kvm_flush_dcache_to_poc(a,l) __cpuc_flush_dcache_area((a), (l)) |
130 | ||
131 | static inline bool vcpu_has_cache_enabled(struct kvm_vcpu *vcpu) | |
132 | { | |
fb32a52a | 133 | return (vcpu_cp15(vcpu, c1_SCTLR) & 0b101) == 0b101; |
15979300 MZ |
134 | } |
135 | ||
ba049e93 DW |
136 | static inline void __coherent_cache_guest_page(struct kvm_vcpu *vcpu, |
137 | kvm_pfn_t pfn, | |
13b7756c | 138 | unsigned long size) |
c62ee2b2 MZ |
139 | { |
140 | /* | |
141 | * If we are going to insert an instruction page and the icache is | |
142 | * either VIPT or PIPT, there is a potential problem where the host | |
143 | * (or another VM) may have used the same page as this guest, and we | |
144 | * read incorrect data from the icache. If we're using a PIPT cache, | |
145 | * we can invalidate just that page, but if we are using a VIPT cache | |
146 | * we need to invalidate the entire icache - damn shame - as written | |
147 | * in the ARM ARM (DDI 0406C.b - Page B3-1393). | |
148 | * | |
149 | * VIVT caches are tagged using both the ASID and the VMID and doesn't | |
150 | * need any kind of flushing (DDI 0406C.b - Page B3-1392). | |
0d3e4d4f MZ |
151 | * |
152 | * We need to do this through a kernel mapping (using the | |
153 | * user-space mapping has proved to be the wrong | |
154 | * solution). For that, we need to kmap one page at a time, | |
155 | * and iterate over the range. | |
c62ee2b2 | 156 | */ |
0d3e4d4f | 157 | |
a050dfb2 | 158 | VM_BUG_ON(size & ~PAGE_MASK); |
0d3e4d4f | 159 | |
0d3e4d4f MZ |
160 | while (size) { |
161 | void *va = kmap_atomic_pfn(pfn); | |
162 | ||
8f36ebaf | 163 | kvm_flush_dcache_to_poc(va, PAGE_SIZE); |
0d3e4d4f MZ |
164 | |
165 | if (icache_is_pipt()) | |
166 | __cpuc_coherent_user_range((unsigned long)va, | |
167 | (unsigned long)va + PAGE_SIZE); | |
168 | ||
169 | size -= PAGE_SIZE; | |
170 | pfn++; | |
171 | ||
172 | kunmap_atomic(va); | |
173 | } | |
174 | ||
0d3e4d4f | 175 | if (!icache_is_pipt() && !icache_is_vivt_asid_tagged()) { |
c62ee2b2 MZ |
176 | /* any kind of VIPT cache */ |
177 | __flush_icache_all(); | |
178 | } | |
179 | } | |
180 | ||
363ef89f MZ |
181 | static inline void __kvm_flush_dcache_pte(pte_t pte) |
182 | { | |
183 | void *va = kmap_atomic(pte_page(pte)); | |
184 | ||
185 | kvm_flush_dcache_to_poc(va, PAGE_SIZE); | |
186 | ||
187 | kunmap_atomic(va); | |
188 | } | |
189 | ||
190 | static inline void __kvm_flush_dcache_pmd(pmd_t pmd) | |
191 | { | |
192 | unsigned long size = PMD_SIZE; | |
ba049e93 | 193 | kvm_pfn_t pfn = pmd_pfn(pmd); |
363ef89f MZ |
194 | |
195 | while (size) { | |
196 | void *va = kmap_atomic_pfn(pfn); | |
197 | ||
198 | kvm_flush_dcache_to_poc(va, PAGE_SIZE); | |
199 | ||
200 | pfn++; | |
201 | size -= PAGE_SIZE; | |
202 | ||
203 | kunmap_atomic(va); | |
204 | } | |
205 | } | |
206 | ||
207 | static inline void __kvm_flush_dcache_pud(pud_t pud) | |
208 | { | |
209 | } | |
210 | ||
4fda342c | 211 | #define kvm_virt_to_phys(x) virt_to_idmap((unsigned long)(x)) |
5a677ce0 | 212 | |
3c1e7165 MZ |
213 | void kvm_set_way_flush(struct kvm_vcpu *vcpu); |
214 | void kvm_toggle_cache(struct kvm_vcpu *vcpu, bool was_enabled); | |
9d218a1f | 215 | |
e4c5a685 AB |
216 | static inline bool __kvm_cpu_uses_extended_idmap(void) |
217 | { | |
218 | return false; | |
219 | } | |
220 | ||
221 | static inline void __kvm_extend_hypmap(pgd_t *boot_hyp_pgd, | |
222 | pgd_t *hyp_pgd, | |
223 | pgd_t *merged_hyp_pgd, | |
224 | unsigned long hyp_idmap_start) { } | |
225 | ||
20475f78 VM |
226 | static inline unsigned int kvm_get_vmid_bits(void) |
227 | { | |
228 | return 8; | |
229 | } | |
230 | ||
b9c628f6 AP |
231 | /* |
232 | * We are not in the kvm->srcu critical section most of the time, so we take | |
233 | * the SRCU read lock here. Since we copy the data from the user page, we | |
234 | * can immediately drop the lock again. | |
235 | */ | |
236 | static inline int kvm_read_guest_lock(struct kvm *kvm, | |
237 | gpa_t gpa, void *data, unsigned long len) | |
238 | { | |
239 | int srcu_idx = srcu_read_lock(&kvm->srcu); | |
240 | int ret = kvm_read_guest(kvm, gpa, data, len); | |
241 | ||
242 | srcu_read_unlock(&kvm->srcu, srcu_idx); | |
243 | ||
244 | return ret; | |
245 | } | |
246 | ||
bc3eb3e9 MZ |
247 | static inline void *kvm_get_hyp_vector(void) |
248 | { | |
d806cd47 MZ |
249 | switch(read_cpuid_part()) { |
250 | #ifdef CONFIG_HARDEN_BRANCH_PREDICTOR | |
251 | case ARM_CPU_PART_CORTEX_A12: | |
252 | case ARM_CPU_PART_CORTEX_A17: | |
253 | { | |
254 | extern char __kvm_hyp_vector_bp_inv[]; | |
255 | return kvm_ksym_ref(__kvm_hyp_vector_bp_inv); | |
256 | } | |
257 | ||
fe06829c | 258 | case ARM_CPU_PART_BRAHMA_B15: |
2b0b4d26 MZ |
259 | case ARM_CPU_PART_CORTEX_A15: |
260 | { | |
261 | extern char __kvm_hyp_vector_ic_inv[]; | |
262 | return kvm_ksym_ref(__kvm_hyp_vector_ic_inv); | |
263 | } | |
d806cd47 MZ |
264 | #endif |
265 | default: | |
266 | { | |
267 | extern char __kvm_hyp_vector[]; | |
268 | return kvm_ksym_ref(__kvm_hyp_vector); | |
269 | } | |
270 | } | |
bc3eb3e9 MZ |
271 | } |
272 | ||
273 | static inline int kvm_map_vectors(void) | |
274 | { | |
275 | return 0; | |
276 | } | |
277 | ||
9ae6a587 MZ |
278 | static inline int hyp_map_aux_data(void) |
279 | { | |
280 | return 0; | |
281 | } | |
282 | ||
5a677ce0 MZ |
283 | #endif /* !__ASSEMBLY__ */ |
284 | ||
342cd0ab | 285 | #endif /* __ARM_KVM_MMU_H__ */ |