xref: /openbmc/linux/arch/arm64/include/asm/kvm_mmu.h (revision d53d9bc65289dc50b42587313466594e4d611f0f)
137c43753SMarc Zyngier /*
237c43753SMarc Zyngier  * Copyright (C) 2012,2013 - ARM Ltd
337c43753SMarc Zyngier  * Author: Marc Zyngier <marc.zyngier@arm.com>
437c43753SMarc Zyngier  *
537c43753SMarc Zyngier  * This program is free software; you can redistribute it and/or modify
637c43753SMarc Zyngier  * it under the terms of the GNU General Public License version 2 as
737c43753SMarc Zyngier  * published by the Free Software Foundation.
837c43753SMarc Zyngier  *
937c43753SMarc Zyngier  * This program is distributed in the hope that it will be useful,
1037c43753SMarc Zyngier  * but WITHOUT ANY WARRANTY; without even the implied warranty of
1137c43753SMarc Zyngier  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
1237c43753SMarc Zyngier  * GNU General Public License for more details.
1337c43753SMarc Zyngier  *
1437c43753SMarc Zyngier  * You should have received a copy of the GNU General Public License
1537c43753SMarc Zyngier  * along with this program.  If not, see <http://www.gnu.org/licenses/>.
1637c43753SMarc Zyngier  */
1737c43753SMarc Zyngier 
1837c43753SMarc Zyngier #ifndef __ARM64_KVM_MMU_H__
1937c43753SMarc Zyngier #define __ARM64_KVM_MMU_H__
2037c43753SMarc Zyngier 
2137c43753SMarc Zyngier #include <asm/page.h>
2237c43753SMarc Zyngier #include <asm/memory.h>
2320475f78SVladimir Murzin #include <asm/cpufeature.h>
2437c43753SMarc Zyngier 
2537c43753SMarc Zyngier /*
26cedbb8b7SMarc Zyngier  * As ARMv8.0 only has the TTBR0_EL2 register, we cannot express
2737c43753SMarc Zyngier  * "negative" addresses. This makes it impossible to directly share
2837c43753SMarc Zyngier  * mappings with the kernel.
2937c43753SMarc Zyngier  *
3037c43753SMarc Zyngier  * Instead, give the HYP mode its own VA region at a fixed offset from
3137c43753SMarc Zyngier  * the kernel by just masking the top bits (which are all ones for a
3282a81bffSMarc Zyngier  * kernel address). We need to find out how many bits to mask.
33cedbb8b7SMarc Zyngier  *
3482a81bffSMarc Zyngier  * We want to build a set of page tables that cover both parts of the
3582a81bffSMarc Zyngier  * idmap (the trampoline page used to initialize EL2), and our normal
3682a81bffSMarc Zyngier  * runtime VA space, at the same time.
3782a81bffSMarc Zyngier  *
3882a81bffSMarc Zyngier  * Given that the kernel uses VA_BITS for its entire address space,
3982a81bffSMarc Zyngier  * and that half of that space (VA_BITS - 1) is used for the linear
4082a81bffSMarc Zyngier  * mapping, we can also limit the EL2 space to (VA_BITS - 1).
4182a81bffSMarc Zyngier  *
4282a81bffSMarc Zyngier  * The main question is "Within the VA_BITS space, does EL2 use the
4382a81bffSMarc Zyngier  * top or the bottom half of that space to shadow the kernel's linear
4482a81bffSMarc Zyngier  * mapping?". As we need to idmap the trampoline page, this is
4582a81bffSMarc Zyngier  * determined by the range in which this page lives.
4682a81bffSMarc Zyngier  *
4782a81bffSMarc Zyngier  * If the page is in the bottom half, we have to use the top half. If
4882a81bffSMarc Zyngier  * the page is in the top half, we have to use the bottom half:
4982a81bffSMarc Zyngier  *
5082a81bffSMarc Zyngier  * T = __virt_to_phys(__hyp_idmap_text_start)
5182a81bffSMarc Zyngier  * if (T & BIT(VA_BITS - 1))
5282a81bffSMarc Zyngier  *	HYP_VA_MIN = 0  //idmap in upper half
5382a81bffSMarc Zyngier  * else
5482a81bffSMarc Zyngier  *	HYP_VA_MIN = 1 << (VA_BITS - 1)
5582a81bffSMarc Zyngier  * HYP_VA_MAX = HYP_VA_MIN + (1 << (VA_BITS - 1)) - 1
5682a81bffSMarc Zyngier  *
5782a81bffSMarc Zyngier  * This of course assumes that the trampoline page exists within the
5882a81bffSMarc Zyngier  * VA_BITS range. If it doesn't, then it means we're in the odd case
5982a81bffSMarc Zyngier  * where the kernel idmap (as well as HYP) uses more levels than the
6082a81bffSMarc Zyngier  * kernel runtime page tables (as seen when the kernel is configured
6182a81bffSMarc Zyngier  * for 4k pages, 39bits VA, and yet memory lives just above that
6282a81bffSMarc Zyngier  * limit, forcing the idmap to use 4 levels of page tables while the
6382a81bffSMarc Zyngier  * kernel itself only uses 3). In this particular case, it doesn't
6482a81bffSMarc Zyngier  * matter which side of VA_BITS we use, as we're guaranteed not to
6582a81bffSMarc Zyngier  * conflict with anything.
6682a81bffSMarc Zyngier  *
6782a81bffSMarc Zyngier  * When using VHE, there are no separate hyp mappings and all KVM
6882a81bffSMarc Zyngier  * functionality is already mapped as part of the main kernel
6982a81bffSMarc Zyngier  * mappings, and none of this applies in that case.
7037c43753SMarc Zyngier  */
71*d53d9bc6SMarc Zyngier 
72*d53d9bc6SMarc Zyngier #define HYP_PAGE_OFFSET_HIGH_MASK	((UL(1) << VA_BITS) - 1)
73*d53d9bc6SMarc Zyngier #define HYP_PAGE_OFFSET_LOW_MASK	((UL(1) << (VA_BITS - 1)) - 1)
74*d53d9bc6SMarc Zyngier 
75*d53d9bc6SMarc Zyngier /* Temporary compat define */
76*d53d9bc6SMarc Zyngier #define HYP_PAGE_OFFSET_MASK		HYP_PAGE_OFFSET_HIGH_MASK
7737c43753SMarc Zyngier 
7837c43753SMarc Zyngier /*
7937c43753SMarc Zyngier  * Our virtual mapping for the idmap-ed MMU-enable code. Must be
8037c43753SMarc Zyngier  * shared across all the page-tables. Conveniently, we use the last
8137c43753SMarc Zyngier  * possible page, where no kernel mapping will ever exist.
8237c43753SMarc Zyngier  */
8337c43753SMarc Zyngier #define TRAMPOLINE_VA		(HYP_PAGE_OFFSET_MASK & PAGE_MASK)
8437c43753SMarc Zyngier 
8537c43753SMarc Zyngier #ifdef __ASSEMBLY__
8637c43753SMarc Zyngier 
87cedbb8b7SMarc Zyngier #include <asm/alternative.h>
88cedbb8b7SMarc Zyngier #include <asm/cpufeature.h>
89cedbb8b7SMarc Zyngier 
9037c43753SMarc Zyngier /*
9137c43753SMarc Zyngier  * Convert a kernel VA into a HYP VA.
9237c43753SMarc Zyngier  * reg: VA to be converted.
9337c43753SMarc Zyngier  */
9437c43753SMarc Zyngier .macro kern_hyp_va	reg
95cedbb8b7SMarc Zyngier alternative_if_not ARM64_HAS_VIRT_HOST_EXTN
9637c43753SMarc Zyngier 	and	\reg, \reg, #HYP_PAGE_OFFSET_MASK
97cedbb8b7SMarc Zyngier alternative_else
98cedbb8b7SMarc Zyngier 	nop
99cedbb8b7SMarc Zyngier alternative_endif
10037c43753SMarc Zyngier .endm
10137c43753SMarc Zyngier 
10237c43753SMarc Zyngier #else
10337c43753SMarc Zyngier 
10438f791a4SChristoffer Dall #include <asm/pgalloc.h>
10537c43753SMarc Zyngier #include <asm/cachetype.h>
10637c43753SMarc Zyngier #include <asm/cacheflush.h>
107e4c5a685SArd Biesheuvel #include <asm/mmu_context.h>
108e4c5a685SArd Biesheuvel #include <asm/pgtable.h>
10937c43753SMarc Zyngier 
110fd16fe68SMarc Zyngier #define KERN_TO_HYP(kva)	((unsigned long)kva & HYP_PAGE_OFFSET_MASK)
11137c43753SMarc Zyngier 
11237c43753SMarc Zyngier /*
113dbff124eSJoel Schopp  * We currently only support a 40bit IPA.
11437c43753SMarc Zyngier  */
115dbff124eSJoel Schopp #define KVM_PHYS_SHIFT	(40)
11637c43753SMarc Zyngier #define KVM_PHYS_SIZE	(1UL << KVM_PHYS_SHIFT)
11737c43753SMarc Zyngier #define KVM_PHYS_MASK	(KVM_PHYS_SIZE - 1UL)
11837c43753SMarc Zyngier 
119c0ef6326SSuzuki K Poulose #include <asm/stage2_pgtable.h>
120c0ef6326SSuzuki K Poulose 
121c8dddecdSMarc Zyngier int create_hyp_mappings(void *from, void *to, pgprot_t prot);
12237c43753SMarc Zyngier int create_hyp_io_mappings(void *from, void *to, phys_addr_t);
12337c43753SMarc Zyngier void free_boot_hyp_pgd(void);
12437c43753SMarc Zyngier void free_hyp_pgds(void);
12537c43753SMarc Zyngier 
126957db105SChristoffer Dall void stage2_unmap_vm(struct kvm *kvm);
12737c43753SMarc Zyngier int kvm_alloc_stage2_pgd(struct kvm *kvm);
12837c43753SMarc Zyngier void kvm_free_stage2_pgd(struct kvm *kvm);
12937c43753SMarc Zyngier int kvm_phys_addr_ioremap(struct kvm *kvm, phys_addr_t guest_ipa,
130c40f2f8fSArd Biesheuvel 			  phys_addr_t pa, unsigned long size, bool writable);
13137c43753SMarc Zyngier 
13237c43753SMarc Zyngier int kvm_handle_guest_abort(struct kvm_vcpu *vcpu, struct kvm_run *run);
13337c43753SMarc Zyngier 
13437c43753SMarc Zyngier void kvm_mmu_free_memory_caches(struct kvm_vcpu *vcpu);
13537c43753SMarc Zyngier 
13637c43753SMarc Zyngier phys_addr_t kvm_mmu_get_httbr(void);
13737c43753SMarc Zyngier phys_addr_t kvm_mmu_get_boot_httbr(void);
13837c43753SMarc Zyngier phys_addr_t kvm_get_idmap_vector(void);
13967f69197SAKASHI Takahiro phys_addr_t kvm_get_idmap_start(void);
14037c43753SMarc Zyngier int kvm_mmu_init(void);
14137c43753SMarc Zyngier void kvm_clear_hyp_idmap(void);
14237c43753SMarc Zyngier 
14337c43753SMarc Zyngier #define	kvm_set_pte(ptep, pte)		set_pte(ptep, pte)
144ad361f09SChristoffer Dall #define	kvm_set_pmd(pmdp, pmd)		set_pmd(pmdp, pmd)
14537c43753SMarc Zyngier 
14637c43753SMarc Zyngier static inline void kvm_clean_pgd(pgd_t *pgd) {}
14738f791a4SChristoffer Dall static inline void kvm_clean_pmd(pmd_t *pmd) {}
14837c43753SMarc Zyngier static inline void kvm_clean_pmd_entry(pmd_t *pmd) {}
14937c43753SMarc Zyngier static inline void kvm_clean_pte(pte_t *pte) {}
15037c43753SMarc Zyngier static inline void kvm_clean_pte_entry(pte_t *pte) {}
15137c43753SMarc Zyngier 
15206485053SCatalin Marinas static inline pte_t kvm_s2pte_mkwrite(pte_t pte)
15337c43753SMarc Zyngier {
15406485053SCatalin Marinas 	pte_val(pte) |= PTE_S2_RDWR;
15506485053SCatalin Marinas 	return pte;
15637c43753SMarc Zyngier }
15737c43753SMarc Zyngier 
15806485053SCatalin Marinas static inline pmd_t kvm_s2pmd_mkwrite(pmd_t pmd)
159ad361f09SChristoffer Dall {
16006485053SCatalin Marinas 	pmd_val(pmd) |= PMD_S2_RDWR;
16106485053SCatalin Marinas 	return pmd;
162ad361f09SChristoffer Dall }
163ad361f09SChristoffer Dall 
1648199ed0eSMario Smarduch static inline void kvm_set_s2pte_readonly(pte_t *pte)
1658199ed0eSMario Smarduch {
16606485053SCatalin Marinas 	pteval_t pteval;
16706485053SCatalin Marinas 	unsigned long tmp;
16806485053SCatalin Marinas 
16906485053SCatalin Marinas 	asm volatile("//	kvm_set_s2pte_readonly\n"
17006485053SCatalin Marinas 	"	prfm	pstl1strm, %2\n"
17106485053SCatalin Marinas 	"1:	ldxr	%0, %2\n"
17206485053SCatalin Marinas 	"	and	%0, %0, %3		// clear PTE_S2_RDWR\n"
17306485053SCatalin Marinas 	"	orr	%0, %0, %4		// set PTE_S2_RDONLY\n"
17406485053SCatalin Marinas 	"	stxr	%w1, %0, %2\n"
17506485053SCatalin Marinas 	"	cbnz	%w1, 1b\n"
17606485053SCatalin Marinas 	: "=&r" (pteval), "=&r" (tmp), "+Q" (pte_val(*pte))
17706485053SCatalin Marinas 	: "L" (~PTE_S2_RDWR), "L" (PTE_S2_RDONLY));
1788199ed0eSMario Smarduch }
1798199ed0eSMario Smarduch 
1808199ed0eSMario Smarduch static inline bool kvm_s2pte_readonly(pte_t *pte)
1818199ed0eSMario Smarduch {
1828199ed0eSMario Smarduch 	return (pte_val(*pte) & PTE_S2_RDWR) == PTE_S2_RDONLY;
1838199ed0eSMario Smarduch }
1848199ed0eSMario Smarduch 
1858199ed0eSMario Smarduch static inline void kvm_set_s2pmd_readonly(pmd_t *pmd)
1868199ed0eSMario Smarduch {
18706485053SCatalin Marinas 	kvm_set_s2pte_readonly((pte_t *)pmd);
1888199ed0eSMario Smarduch }
1898199ed0eSMario Smarduch 
1908199ed0eSMario Smarduch static inline bool kvm_s2pmd_readonly(pmd_t *pmd)
1918199ed0eSMario Smarduch {
19206485053SCatalin Marinas 	return kvm_s2pte_readonly((pte_t *)pmd);
19338f791a4SChristoffer Dall }
19438f791a4SChristoffer Dall 
1954f853a71SChristoffer Dall static inline bool kvm_page_empty(void *ptr)
1964f853a71SChristoffer Dall {
1974f853a71SChristoffer Dall 	struct page *ptr_page = virt_to_page(ptr);
1984f853a71SChristoffer Dall 	return page_count(ptr_page) == 1;
1994f853a71SChristoffer Dall }
2004f853a71SChristoffer Dall 
20166f877faSSuzuki K Poulose #define hyp_pte_table_empty(ptep) kvm_page_empty(ptep)
20238f791a4SChristoffer Dall 
20338f791a4SChristoffer Dall #ifdef __PAGETABLE_PMD_FOLDED
20466f877faSSuzuki K Poulose #define hyp_pmd_table_empty(pmdp) (0)
2054f853a71SChristoffer Dall #else
20666f877faSSuzuki K Poulose #define hyp_pmd_table_empty(pmdp) kvm_page_empty(pmdp)
2074f853a71SChristoffer Dall #endif
20838f791a4SChristoffer Dall 
20938f791a4SChristoffer Dall #ifdef __PAGETABLE_PUD_FOLDED
21066f877faSSuzuki K Poulose #define hyp_pud_table_empty(pudp) (0)
21138f791a4SChristoffer Dall #else
21266f877faSSuzuki K Poulose #define hyp_pud_table_empty(pudp) kvm_page_empty(pudp)
21338f791a4SChristoffer Dall #endif
2144f853a71SChristoffer Dall 
21537c43753SMarc Zyngier struct kvm;
21637c43753SMarc Zyngier 
2172d58b733SMarc Zyngier #define kvm_flush_dcache_to_poc(a,l)	__flush_dcache_area((a), (l))
2182d58b733SMarc Zyngier 
2192d58b733SMarc Zyngier static inline bool vcpu_has_cache_enabled(struct kvm_vcpu *vcpu)
2202d58b733SMarc Zyngier {
2212d58b733SMarc Zyngier 	return (vcpu_sys_reg(vcpu, SCTLR_EL1) & 0b101) == 0b101;
2222d58b733SMarc Zyngier }
2232d58b733SMarc Zyngier 
224ba049e93SDan Williams static inline void __coherent_cache_guest_page(struct kvm_vcpu *vcpu,
225ba049e93SDan Williams 					       kvm_pfn_t pfn,
226840f4bfbSLaszlo Ersek 					       unsigned long size,
227840f4bfbSLaszlo Ersek 					       bool ipa_uncached)
22837c43753SMarc Zyngier {
2290d3e4d4fSMarc Zyngier 	void *va = page_address(pfn_to_page(pfn));
2300d3e4d4fSMarc Zyngier 
231840f4bfbSLaszlo Ersek 	if (!vcpu_has_cache_enabled(vcpu) || ipa_uncached)
2320d3e4d4fSMarc Zyngier 		kvm_flush_dcache_to_poc(va, size);
2332d58b733SMarc Zyngier 
23437c43753SMarc Zyngier 	if (!icache_is_aliasing()) {		/* PIPT */
2350d3e4d4fSMarc Zyngier 		flush_icache_range((unsigned long)va,
2360d3e4d4fSMarc Zyngier 				   (unsigned long)va + size);
23737c43753SMarc Zyngier 	} else if (!icache_is_aivivt()) {	/* non ASID-tagged VIVT */
23837c43753SMarc Zyngier 		/* any kind of VIPT cache */
23937c43753SMarc Zyngier 		__flush_icache_all();
24037c43753SMarc Zyngier 	}
24137c43753SMarc Zyngier }
24237c43753SMarc Zyngier 
243363ef89fSMarc Zyngier static inline void __kvm_flush_dcache_pte(pte_t pte)
244363ef89fSMarc Zyngier {
245363ef89fSMarc Zyngier 	struct page *page = pte_page(pte);
246363ef89fSMarc Zyngier 	kvm_flush_dcache_to_poc(page_address(page), PAGE_SIZE);
247363ef89fSMarc Zyngier }
248363ef89fSMarc Zyngier 
249363ef89fSMarc Zyngier static inline void __kvm_flush_dcache_pmd(pmd_t pmd)
250363ef89fSMarc Zyngier {
251363ef89fSMarc Zyngier 	struct page *page = pmd_page(pmd);
252363ef89fSMarc Zyngier 	kvm_flush_dcache_to_poc(page_address(page), PMD_SIZE);
253363ef89fSMarc Zyngier }
254363ef89fSMarc Zyngier 
255363ef89fSMarc Zyngier static inline void __kvm_flush_dcache_pud(pud_t pud)
256363ef89fSMarc Zyngier {
257363ef89fSMarc Zyngier 	struct page *page = pud_page(pud);
258363ef89fSMarc Zyngier 	kvm_flush_dcache_to_poc(page_address(page), PUD_SIZE);
259363ef89fSMarc Zyngier }
260363ef89fSMarc Zyngier 
2614fda342cSSantosh Shilimkar #define kvm_virt_to_phys(x)		__virt_to_phys((unsigned long)(x))
26237c43753SMarc Zyngier 
2633c1e7165SMarc Zyngier void kvm_set_way_flush(struct kvm_vcpu *vcpu);
2643c1e7165SMarc Zyngier void kvm_toggle_cache(struct kvm_vcpu *vcpu, bool was_enabled);
2659d218a1fSMarc Zyngier 
266e4c5a685SArd Biesheuvel static inline bool __kvm_cpu_uses_extended_idmap(void)
267e4c5a685SArd Biesheuvel {
268e4c5a685SArd Biesheuvel 	return __cpu_uses_extended_idmap();
269e4c5a685SArd Biesheuvel }
270e4c5a685SArd Biesheuvel 
271e4c5a685SArd Biesheuvel static inline void __kvm_extend_hypmap(pgd_t *boot_hyp_pgd,
272e4c5a685SArd Biesheuvel 				       pgd_t *hyp_pgd,
273e4c5a685SArd Biesheuvel 				       pgd_t *merged_hyp_pgd,
274e4c5a685SArd Biesheuvel 				       unsigned long hyp_idmap_start)
275e4c5a685SArd Biesheuvel {
276e4c5a685SArd Biesheuvel 	int idmap_idx;
277e4c5a685SArd Biesheuvel 
278e4c5a685SArd Biesheuvel 	/*
279e4c5a685SArd Biesheuvel 	 * Use the first entry to access the HYP mappings. It is
280e4c5a685SArd Biesheuvel 	 * guaranteed to be free, otherwise we wouldn't use an
281e4c5a685SArd Biesheuvel 	 * extended idmap.
282e4c5a685SArd Biesheuvel 	 */
283e4c5a685SArd Biesheuvel 	VM_BUG_ON(pgd_val(merged_hyp_pgd[0]));
284e4c5a685SArd Biesheuvel 	merged_hyp_pgd[0] = __pgd(__pa(hyp_pgd) | PMD_TYPE_TABLE);
285e4c5a685SArd Biesheuvel 
286e4c5a685SArd Biesheuvel 	/*
287e4c5a685SArd Biesheuvel 	 * Create another extended level entry that points to the boot HYP map,
288e4c5a685SArd Biesheuvel 	 * which contains an ID mapping of the HYP init code. We essentially
289e4c5a685SArd Biesheuvel 	 * merge the boot and runtime HYP maps by doing so, but they don't
290e4c5a685SArd Biesheuvel 	 * overlap anyway, so this is fine.
291e4c5a685SArd Biesheuvel 	 */
292e4c5a685SArd Biesheuvel 	idmap_idx = hyp_idmap_start >> VA_BITS;
293e4c5a685SArd Biesheuvel 	VM_BUG_ON(pgd_val(merged_hyp_pgd[idmap_idx]));
294e4c5a685SArd Biesheuvel 	merged_hyp_pgd[idmap_idx] = __pgd(__pa(boot_hyp_pgd) | PMD_TYPE_TABLE);
295e4c5a685SArd Biesheuvel }
296e4c5a685SArd Biesheuvel 
29720475f78SVladimir Murzin static inline unsigned int kvm_get_vmid_bits(void)
29820475f78SVladimir Murzin {
29920475f78SVladimir Murzin 	int reg = read_system_reg(SYS_ID_AA64MMFR1_EL1);
30020475f78SVladimir Murzin 
30128c5dcb2SSuzuki K Poulose 	return (cpuid_feature_extract_unsigned_field(reg, ID_AA64MMFR1_VMIDBITS_SHIFT) == 2) ? 16 : 8;
30220475f78SVladimir Murzin }
30320475f78SVladimir Murzin 
30437c43753SMarc Zyngier #endif /* __ASSEMBLY__ */
30537c43753SMarc Zyngier #endif /* __ARM64_KVM_MMU_H__ */
306