137c43753SMarc Zyngier /* 237c43753SMarc Zyngier * Copyright (C) 2012,2013 - ARM Ltd 337c43753SMarc Zyngier * Author: Marc Zyngier <marc.zyngier@arm.com> 437c43753SMarc Zyngier * 537c43753SMarc Zyngier * This program is free software; you can redistribute it and/or modify 637c43753SMarc Zyngier * it under the terms of the GNU General Public License version 2 as 737c43753SMarc Zyngier * published by the Free Software Foundation. 837c43753SMarc Zyngier * 937c43753SMarc Zyngier * This program is distributed in the hope that it will be useful, 1037c43753SMarc Zyngier * but WITHOUT ANY WARRANTY; without even the implied warranty of 1137c43753SMarc Zyngier * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the 1237c43753SMarc Zyngier * GNU General Public License for more details. 1337c43753SMarc Zyngier * 1437c43753SMarc Zyngier * You should have received a copy of the GNU General Public License 1537c43753SMarc Zyngier * along with this program. If not, see <http://www.gnu.org/licenses/>. 1637c43753SMarc Zyngier */ 1737c43753SMarc Zyngier 1837c43753SMarc Zyngier #ifndef __ARM64_KVM_MMU_H__ 1937c43753SMarc Zyngier #define __ARM64_KVM_MMU_H__ 2037c43753SMarc Zyngier 2137c43753SMarc Zyngier #include <asm/page.h> 2237c43753SMarc Zyngier #include <asm/memory.h> 2320475f78SVladimir Murzin #include <asm/cpufeature.h> 2437c43753SMarc Zyngier 2537c43753SMarc Zyngier /* 26cedbb8b7SMarc Zyngier * As ARMv8.0 only has the TTBR0_EL2 register, we cannot express 2737c43753SMarc Zyngier * "negative" addresses. This makes it impossible to directly share 2837c43753SMarc Zyngier * mappings with the kernel. 2937c43753SMarc Zyngier * 3037c43753SMarc Zyngier * Instead, give the HYP mode its own VA region at a fixed offset from 3137c43753SMarc Zyngier * the kernel by just masking the top bits (which are all ones for a 3282a81bffSMarc Zyngier * kernel address). We need to find out how many bits to mask. 33cedbb8b7SMarc Zyngier * 3482a81bffSMarc Zyngier * We want to build a set of page tables that cover both parts of the 3582a81bffSMarc Zyngier * idmap (the trampoline page used to initialize EL2), and our normal 3682a81bffSMarc Zyngier * runtime VA space, at the same time. 3782a81bffSMarc Zyngier * 3882a81bffSMarc Zyngier * Given that the kernel uses VA_BITS for its entire address space, 3982a81bffSMarc Zyngier * and that half of that space (VA_BITS - 1) is used for the linear 4082a81bffSMarc Zyngier * mapping, we can also limit the EL2 space to (VA_BITS - 1). 4182a81bffSMarc Zyngier * 4282a81bffSMarc Zyngier * The main question is "Within the VA_BITS space, does EL2 use the 4382a81bffSMarc Zyngier * top or the bottom half of that space to shadow the kernel's linear 4482a81bffSMarc Zyngier * mapping?". As we need to idmap the trampoline page, this is 4582a81bffSMarc Zyngier * determined by the range in which this page lives. 4682a81bffSMarc Zyngier * 4782a81bffSMarc Zyngier * If the page is in the bottom half, we have to use the top half. If 4882a81bffSMarc Zyngier * the page is in the top half, we have to use the bottom half: 4982a81bffSMarc Zyngier * 5082a81bffSMarc Zyngier * T = __virt_to_phys(__hyp_idmap_text_start) 5182a81bffSMarc Zyngier * if (T & BIT(VA_BITS - 1)) 5282a81bffSMarc Zyngier * HYP_VA_MIN = 0 //idmap in upper half 5382a81bffSMarc Zyngier * else 5482a81bffSMarc Zyngier * HYP_VA_MIN = 1 << (VA_BITS - 1) 5582a81bffSMarc Zyngier * HYP_VA_MAX = HYP_VA_MIN + (1 << (VA_BITS - 1)) - 1 5682a81bffSMarc Zyngier * 5782a81bffSMarc Zyngier * This of course assumes that the trampoline page exists within the 5882a81bffSMarc Zyngier * VA_BITS range. If it doesn't, then it means we're in the odd case 5982a81bffSMarc Zyngier * where the kernel idmap (as well as HYP) uses more levels than the 6082a81bffSMarc Zyngier * kernel runtime page tables (as seen when the kernel is configured 6182a81bffSMarc Zyngier * for 4k pages, 39bits VA, and yet memory lives just above that 6282a81bffSMarc Zyngier * limit, forcing the idmap to use 4 levels of page tables while the 6382a81bffSMarc Zyngier * kernel itself only uses 3). In this particular case, it doesn't 6482a81bffSMarc Zyngier * matter which side of VA_BITS we use, as we're guaranteed not to 6582a81bffSMarc Zyngier * conflict with anything. 6682a81bffSMarc Zyngier * 6782a81bffSMarc Zyngier * When using VHE, there are no separate hyp mappings and all KVM 6882a81bffSMarc Zyngier * functionality is already mapped as part of the main kernel 6982a81bffSMarc Zyngier * mappings, and none of this applies in that case. 7037c43753SMarc Zyngier */ 71*d53d9bc6SMarc Zyngier 72*d53d9bc6SMarc Zyngier #define HYP_PAGE_OFFSET_HIGH_MASK ((UL(1) << VA_BITS) - 1) 73*d53d9bc6SMarc Zyngier #define HYP_PAGE_OFFSET_LOW_MASK ((UL(1) << (VA_BITS - 1)) - 1) 74*d53d9bc6SMarc Zyngier 75*d53d9bc6SMarc Zyngier /* Temporary compat define */ 76*d53d9bc6SMarc Zyngier #define HYP_PAGE_OFFSET_MASK HYP_PAGE_OFFSET_HIGH_MASK 7737c43753SMarc Zyngier 7837c43753SMarc Zyngier /* 7937c43753SMarc Zyngier * Our virtual mapping for the idmap-ed MMU-enable code. Must be 8037c43753SMarc Zyngier * shared across all the page-tables. Conveniently, we use the last 8137c43753SMarc Zyngier * possible page, where no kernel mapping will ever exist. 8237c43753SMarc Zyngier */ 8337c43753SMarc Zyngier #define TRAMPOLINE_VA (HYP_PAGE_OFFSET_MASK & PAGE_MASK) 8437c43753SMarc Zyngier 8537c43753SMarc Zyngier #ifdef __ASSEMBLY__ 8637c43753SMarc Zyngier 87cedbb8b7SMarc Zyngier #include <asm/alternative.h> 88cedbb8b7SMarc Zyngier #include <asm/cpufeature.h> 89cedbb8b7SMarc Zyngier 9037c43753SMarc Zyngier /* 9137c43753SMarc Zyngier * Convert a kernel VA into a HYP VA. 9237c43753SMarc Zyngier * reg: VA to be converted. 9337c43753SMarc Zyngier */ 9437c43753SMarc Zyngier .macro kern_hyp_va reg 95cedbb8b7SMarc Zyngier alternative_if_not ARM64_HAS_VIRT_HOST_EXTN 9637c43753SMarc Zyngier and \reg, \reg, #HYP_PAGE_OFFSET_MASK 97cedbb8b7SMarc Zyngier alternative_else 98cedbb8b7SMarc Zyngier nop 99cedbb8b7SMarc Zyngier alternative_endif 10037c43753SMarc Zyngier .endm 10137c43753SMarc Zyngier 10237c43753SMarc Zyngier #else 10337c43753SMarc Zyngier 10438f791a4SChristoffer Dall #include <asm/pgalloc.h> 10537c43753SMarc Zyngier #include <asm/cachetype.h> 10637c43753SMarc Zyngier #include <asm/cacheflush.h> 107e4c5a685SArd Biesheuvel #include <asm/mmu_context.h> 108e4c5a685SArd Biesheuvel #include <asm/pgtable.h> 10937c43753SMarc Zyngier 110fd16fe68SMarc Zyngier #define KERN_TO_HYP(kva) ((unsigned long)kva & HYP_PAGE_OFFSET_MASK) 11137c43753SMarc Zyngier 11237c43753SMarc Zyngier /* 113dbff124eSJoel Schopp * We currently only support a 40bit IPA. 11437c43753SMarc Zyngier */ 115dbff124eSJoel Schopp #define KVM_PHYS_SHIFT (40) 11637c43753SMarc Zyngier #define KVM_PHYS_SIZE (1UL << KVM_PHYS_SHIFT) 11737c43753SMarc Zyngier #define KVM_PHYS_MASK (KVM_PHYS_SIZE - 1UL) 11837c43753SMarc Zyngier 119c0ef6326SSuzuki K Poulose #include <asm/stage2_pgtable.h> 120c0ef6326SSuzuki K Poulose 121c8dddecdSMarc Zyngier int create_hyp_mappings(void *from, void *to, pgprot_t prot); 12237c43753SMarc Zyngier int create_hyp_io_mappings(void *from, void *to, phys_addr_t); 12337c43753SMarc Zyngier void free_boot_hyp_pgd(void); 12437c43753SMarc Zyngier void free_hyp_pgds(void); 12537c43753SMarc Zyngier 126957db105SChristoffer Dall void stage2_unmap_vm(struct kvm *kvm); 12737c43753SMarc Zyngier int kvm_alloc_stage2_pgd(struct kvm *kvm); 12837c43753SMarc Zyngier void kvm_free_stage2_pgd(struct kvm *kvm); 12937c43753SMarc Zyngier int kvm_phys_addr_ioremap(struct kvm *kvm, phys_addr_t guest_ipa, 130c40f2f8fSArd Biesheuvel phys_addr_t pa, unsigned long size, bool writable); 13137c43753SMarc Zyngier 13237c43753SMarc Zyngier int kvm_handle_guest_abort(struct kvm_vcpu *vcpu, struct kvm_run *run); 13337c43753SMarc Zyngier 13437c43753SMarc Zyngier void kvm_mmu_free_memory_caches(struct kvm_vcpu *vcpu); 13537c43753SMarc Zyngier 13637c43753SMarc Zyngier phys_addr_t kvm_mmu_get_httbr(void); 13737c43753SMarc Zyngier phys_addr_t kvm_mmu_get_boot_httbr(void); 13837c43753SMarc Zyngier phys_addr_t kvm_get_idmap_vector(void); 13967f69197SAKASHI Takahiro phys_addr_t kvm_get_idmap_start(void); 14037c43753SMarc Zyngier int kvm_mmu_init(void); 14137c43753SMarc Zyngier void kvm_clear_hyp_idmap(void); 14237c43753SMarc Zyngier 14337c43753SMarc Zyngier #define kvm_set_pte(ptep, pte) set_pte(ptep, pte) 144ad361f09SChristoffer Dall #define kvm_set_pmd(pmdp, pmd) set_pmd(pmdp, pmd) 14537c43753SMarc Zyngier 14637c43753SMarc Zyngier static inline void kvm_clean_pgd(pgd_t *pgd) {} 14738f791a4SChristoffer Dall static inline void kvm_clean_pmd(pmd_t *pmd) {} 14837c43753SMarc Zyngier static inline void kvm_clean_pmd_entry(pmd_t *pmd) {} 14937c43753SMarc Zyngier static inline void kvm_clean_pte(pte_t *pte) {} 15037c43753SMarc Zyngier static inline void kvm_clean_pte_entry(pte_t *pte) {} 15137c43753SMarc Zyngier 15206485053SCatalin Marinas static inline pte_t kvm_s2pte_mkwrite(pte_t pte) 15337c43753SMarc Zyngier { 15406485053SCatalin Marinas pte_val(pte) |= PTE_S2_RDWR; 15506485053SCatalin Marinas return pte; 15637c43753SMarc Zyngier } 15737c43753SMarc Zyngier 15806485053SCatalin Marinas static inline pmd_t kvm_s2pmd_mkwrite(pmd_t pmd) 159ad361f09SChristoffer Dall { 16006485053SCatalin Marinas pmd_val(pmd) |= PMD_S2_RDWR; 16106485053SCatalin Marinas return pmd; 162ad361f09SChristoffer Dall } 163ad361f09SChristoffer Dall 1648199ed0eSMario Smarduch static inline void kvm_set_s2pte_readonly(pte_t *pte) 1658199ed0eSMario Smarduch { 16606485053SCatalin Marinas pteval_t pteval; 16706485053SCatalin Marinas unsigned long tmp; 16806485053SCatalin Marinas 16906485053SCatalin Marinas asm volatile("// kvm_set_s2pte_readonly\n" 17006485053SCatalin Marinas " prfm pstl1strm, %2\n" 17106485053SCatalin Marinas "1: ldxr %0, %2\n" 17206485053SCatalin Marinas " and %0, %0, %3 // clear PTE_S2_RDWR\n" 17306485053SCatalin Marinas " orr %0, %0, %4 // set PTE_S2_RDONLY\n" 17406485053SCatalin Marinas " stxr %w1, %0, %2\n" 17506485053SCatalin Marinas " cbnz %w1, 1b\n" 17606485053SCatalin Marinas : "=&r" (pteval), "=&r" (tmp), "+Q" (pte_val(*pte)) 17706485053SCatalin Marinas : "L" (~PTE_S2_RDWR), "L" (PTE_S2_RDONLY)); 1788199ed0eSMario Smarduch } 1798199ed0eSMario Smarduch 1808199ed0eSMario Smarduch static inline bool kvm_s2pte_readonly(pte_t *pte) 1818199ed0eSMario Smarduch { 1828199ed0eSMario Smarduch return (pte_val(*pte) & PTE_S2_RDWR) == PTE_S2_RDONLY; 1838199ed0eSMario Smarduch } 1848199ed0eSMario Smarduch 1858199ed0eSMario Smarduch static inline void kvm_set_s2pmd_readonly(pmd_t *pmd) 1868199ed0eSMario Smarduch { 18706485053SCatalin Marinas kvm_set_s2pte_readonly((pte_t *)pmd); 1888199ed0eSMario Smarduch } 1898199ed0eSMario Smarduch 1908199ed0eSMario Smarduch static inline bool kvm_s2pmd_readonly(pmd_t *pmd) 1918199ed0eSMario Smarduch { 19206485053SCatalin Marinas return kvm_s2pte_readonly((pte_t *)pmd); 19338f791a4SChristoffer Dall } 19438f791a4SChristoffer Dall 1954f853a71SChristoffer Dall static inline bool kvm_page_empty(void *ptr) 1964f853a71SChristoffer Dall { 1974f853a71SChristoffer Dall struct page *ptr_page = virt_to_page(ptr); 1984f853a71SChristoffer Dall return page_count(ptr_page) == 1; 1994f853a71SChristoffer Dall } 2004f853a71SChristoffer Dall 20166f877faSSuzuki K Poulose #define hyp_pte_table_empty(ptep) kvm_page_empty(ptep) 20238f791a4SChristoffer Dall 20338f791a4SChristoffer Dall #ifdef __PAGETABLE_PMD_FOLDED 20466f877faSSuzuki K Poulose #define hyp_pmd_table_empty(pmdp) (0) 2054f853a71SChristoffer Dall #else 20666f877faSSuzuki K Poulose #define hyp_pmd_table_empty(pmdp) kvm_page_empty(pmdp) 2074f853a71SChristoffer Dall #endif 20838f791a4SChristoffer Dall 20938f791a4SChristoffer Dall #ifdef __PAGETABLE_PUD_FOLDED 21066f877faSSuzuki K Poulose #define hyp_pud_table_empty(pudp) (0) 21138f791a4SChristoffer Dall #else 21266f877faSSuzuki K Poulose #define hyp_pud_table_empty(pudp) kvm_page_empty(pudp) 21338f791a4SChristoffer Dall #endif 2144f853a71SChristoffer Dall 21537c43753SMarc Zyngier struct kvm; 21637c43753SMarc Zyngier 2172d58b733SMarc Zyngier #define kvm_flush_dcache_to_poc(a,l) __flush_dcache_area((a), (l)) 2182d58b733SMarc Zyngier 2192d58b733SMarc Zyngier static inline bool vcpu_has_cache_enabled(struct kvm_vcpu *vcpu) 2202d58b733SMarc Zyngier { 2212d58b733SMarc Zyngier return (vcpu_sys_reg(vcpu, SCTLR_EL1) & 0b101) == 0b101; 2222d58b733SMarc Zyngier } 2232d58b733SMarc Zyngier 224ba049e93SDan Williams static inline void __coherent_cache_guest_page(struct kvm_vcpu *vcpu, 225ba049e93SDan Williams kvm_pfn_t pfn, 226840f4bfbSLaszlo Ersek unsigned long size, 227840f4bfbSLaszlo Ersek bool ipa_uncached) 22837c43753SMarc Zyngier { 2290d3e4d4fSMarc Zyngier void *va = page_address(pfn_to_page(pfn)); 2300d3e4d4fSMarc Zyngier 231840f4bfbSLaszlo Ersek if (!vcpu_has_cache_enabled(vcpu) || ipa_uncached) 2320d3e4d4fSMarc Zyngier kvm_flush_dcache_to_poc(va, size); 2332d58b733SMarc Zyngier 23437c43753SMarc Zyngier if (!icache_is_aliasing()) { /* PIPT */ 2350d3e4d4fSMarc Zyngier flush_icache_range((unsigned long)va, 2360d3e4d4fSMarc Zyngier (unsigned long)va + size); 23737c43753SMarc Zyngier } else if (!icache_is_aivivt()) { /* non ASID-tagged VIVT */ 23837c43753SMarc Zyngier /* any kind of VIPT cache */ 23937c43753SMarc Zyngier __flush_icache_all(); 24037c43753SMarc Zyngier } 24137c43753SMarc Zyngier } 24237c43753SMarc Zyngier 243363ef89fSMarc Zyngier static inline void __kvm_flush_dcache_pte(pte_t pte) 244363ef89fSMarc Zyngier { 245363ef89fSMarc Zyngier struct page *page = pte_page(pte); 246363ef89fSMarc Zyngier kvm_flush_dcache_to_poc(page_address(page), PAGE_SIZE); 247363ef89fSMarc Zyngier } 248363ef89fSMarc Zyngier 249363ef89fSMarc Zyngier static inline void __kvm_flush_dcache_pmd(pmd_t pmd) 250363ef89fSMarc Zyngier { 251363ef89fSMarc Zyngier struct page *page = pmd_page(pmd); 252363ef89fSMarc Zyngier kvm_flush_dcache_to_poc(page_address(page), PMD_SIZE); 253363ef89fSMarc Zyngier } 254363ef89fSMarc Zyngier 255363ef89fSMarc Zyngier static inline void __kvm_flush_dcache_pud(pud_t pud) 256363ef89fSMarc Zyngier { 257363ef89fSMarc Zyngier struct page *page = pud_page(pud); 258363ef89fSMarc Zyngier kvm_flush_dcache_to_poc(page_address(page), PUD_SIZE); 259363ef89fSMarc Zyngier } 260363ef89fSMarc Zyngier 2614fda342cSSantosh Shilimkar #define kvm_virt_to_phys(x) __virt_to_phys((unsigned long)(x)) 26237c43753SMarc Zyngier 2633c1e7165SMarc Zyngier void kvm_set_way_flush(struct kvm_vcpu *vcpu); 2643c1e7165SMarc Zyngier void kvm_toggle_cache(struct kvm_vcpu *vcpu, bool was_enabled); 2659d218a1fSMarc Zyngier 266e4c5a685SArd Biesheuvel static inline bool __kvm_cpu_uses_extended_idmap(void) 267e4c5a685SArd Biesheuvel { 268e4c5a685SArd Biesheuvel return __cpu_uses_extended_idmap(); 269e4c5a685SArd Biesheuvel } 270e4c5a685SArd Biesheuvel 271e4c5a685SArd Biesheuvel static inline void __kvm_extend_hypmap(pgd_t *boot_hyp_pgd, 272e4c5a685SArd Biesheuvel pgd_t *hyp_pgd, 273e4c5a685SArd Biesheuvel pgd_t *merged_hyp_pgd, 274e4c5a685SArd Biesheuvel unsigned long hyp_idmap_start) 275e4c5a685SArd Biesheuvel { 276e4c5a685SArd Biesheuvel int idmap_idx; 277e4c5a685SArd Biesheuvel 278e4c5a685SArd Biesheuvel /* 279e4c5a685SArd Biesheuvel * Use the first entry to access the HYP mappings. It is 280e4c5a685SArd Biesheuvel * guaranteed to be free, otherwise we wouldn't use an 281e4c5a685SArd Biesheuvel * extended idmap. 282e4c5a685SArd Biesheuvel */ 283e4c5a685SArd Biesheuvel VM_BUG_ON(pgd_val(merged_hyp_pgd[0])); 284e4c5a685SArd Biesheuvel merged_hyp_pgd[0] = __pgd(__pa(hyp_pgd) | PMD_TYPE_TABLE); 285e4c5a685SArd Biesheuvel 286e4c5a685SArd Biesheuvel /* 287e4c5a685SArd Biesheuvel * Create another extended level entry that points to the boot HYP map, 288e4c5a685SArd Biesheuvel * which contains an ID mapping of the HYP init code. We essentially 289e4c5a685SArd Biesheuvel * merge the boot and runtime HYP maps by doing so, but they don't 290e4c5a685SArd Biesheuvel * overlap anyway, so this is fine. 291e4c5a685SArd Biesheuvel */ 292e4c5a685SArd Biesheuvel idmap_idx = hyp_idmap_start >> VA_BITS; 293e4c5a685SArd Biesheuvel VM_BUG_ON(pgd_val(merged_hyp_pgd[idmap_idx])); 294e4c5a685SArd Biesheuvel merged_hyp_pgd[idmap_idx] = __pgd(__pa(boot_hyp_pgd) | PMD_TYPE_TABLE); 295e4c5a685SArd Biesheuvel } 296e4c5a685SArd Biesheuvel 29720475f78SVladimir Murzin static inline unsigned int kvm_get_vmid_bits(void) 29820475f78SVladimir Murzin { 29920475f78SVladimir Murzin int reg = read_system_reg(SYS_ID_AA64MMFR1_EL1); 30020475f78SVladimir Murzin 30128c5dcb2SSuzuki K Poulose return (cpuid_feature_extract_unsigned_field(reg, ID_AA64MMFR1_VMIDBITS_SHIFT) == 2) ? 16 : 8; 30220475f78SVladimir Murzin } 30320475f78SVladimir Murzin 30437c43753SMarc Zyngier #endif /* __ASSEMBLY__ */ 30537c43753SMarc Zyngier #endif /* __ARM64_KVM_MMU_H__ */ 306