| /* |
| * PowerPC64 SLB support. |
| * |
| * Copyright (C) 2004 David Gibson <dwg@au.ibm.com>, IBM |
| * Based on earlier code written by: |
| * Dave Engebretsen and Mike Corrigan {engebret|mikejc}@us.ibm.com |
| * Copyright (c) 2001 Dave Engebretsen |
| * Copyright (C) 2002 Anton Blanchard <anton@au.ibm.com>, IBM |
| * |
| * |
| * This program is free software; you can redistribute it and/or |
| * modify it under the terms of the GNU General Public License |
| * as published by the Free Software Foundation; either version |
| * 2 of the License, or (at your option) any later version. |
| */ |
| |
| #include <asm/pgtable.h> |
| #include <asm/mmu.h> |
| #include <asm/mmu_context.h> |
| #include <asm/paca.h> |
| #include <asm/cputable.h> |
| #include <asm/cacheflush.h> |
| #include <asm/smp.h> |
| #include <linux/compiler.h> |
| #include <asm/udbg.h> |
| #include <asm/code-patching.h> |
| |
| enum slb_index { |
| LINEAR_INDEX = 0, /* Kernel linear map (0xc000000000000000) */ |
| VMALLOC_INDEX = 1, /* Kernel virtual map (0xd000000000000000) */ |
| KSTACK_INDEX = 2, /* Kernel stack map */ |
| }; |
| |
| extern void slb_allocate_realmode(unsigned long ea); |
| extern void slb_allocate_user(unsigned long ea); |
| |
| static void slb_allocate(unsigned long ea) |
| { |
| /* Currently, we do real mode for all SLBs including user, but |
| * that will change if we bring back dynamic VSIDs |
| */ |
| slb_allocate_realmode(ea); |
| } |
| |
| #define slb_esid_mask(ssize) \ |
| (((ssize) == MMU_SEGSIZE_256M)? ESID_MASK: ESID_MASK_1T) |
| |
| static inline unsigned long mk_esid_data(unsigned long ea, int ssize, |
| enum slb_index index) |
| { |
| return (ea & slb_esid_mask(ssize)) | SLB_ESID_V | index; |
| } |
| |
| static inline unsigned long mk_vsid_data(unsigned long ea, int ssize, |
| unsigned long flags) |
| { |
| return (get_kernel_vsid(ea, ssize) << slb_vsid_shift(ssize)) | flags | |
| ((unsigned long) ssize << SLB_VSID_SSIZE_SHIFT); |
| } |
| |
| static inline void slb_shadow_update(unsigned long ea, int ssize, |
| unsigned long flags, |
| enum slb_index index) |
| { |
| struct slb_shadow *p = get_slb_shadow(); |
| |
| /* |
| * Clear the ESID first so the entry is not valid while we are |
| * updating it. No write barriers are needed here, provided |
| * we only update the current CPU's SLB shadow buffer. |
| */ |
| WRITE_ONCE(p->save_area[index].esid, 0); |
| WRITE_ONCE(p->save_area[index].vsid, cpu_to_be64(mk_vsid_data(ea, ssize, flags))); |
| WRITE_ONCE(p->save_area[index].esid, cpu_to_be64(mk_esid_data(ea, ssize, index))); |
| } |
| |
| static inline void slb_shadow_clear(enum slb_index index) |
| { |
| WRITE_ONCE(get_slb_shadow()->save_area[index].esid, 0); |
| } |
| |
| static inline void create_shadowed_slbe(unsigned long ea, int ssize, |
| unsigned long flags, |
| enum slb_index index) |
| { |
| /* |
| * Updating the shadow buffer before writing the SLB ensures |
| * we don't get a stale entry here if we get preempted by PHYP |
| * between these two statements. |
| */ |
| slb_shadow_update(ea, ssize, flags, index); |
| |
| asm volatile("slbmte %0,%1" : |
| : "r" (mk_vsid_data(ea, ssize, flags)), |
| "r" (mk_esid_data(ea, ssize, index)) |
| : "memory" ); |
| } |
| |
| static void __slb_flush_and_rebolt(void) |
| { |
| /* If you change this make sure you change SLB_NUM_BOLTED |
| * and PR KVM appropriately too. */ |
| unsigned long linear_llp, vmalloc_llp, lflags, vflags; |
| unsigned long ksp_esid_data, ksp_vsid_data; |
| |
| linear_llp = mmu_psize_defs[mmu_linear_psize].sllp; |
| vmalloc_llp = mmu_psize_defs[mmu_vmalloc_psize].sllp; |
| lflags = SLB_VSID_KERNEL | linear_llp; |
| vflags = SLB_VSID_KERNEL | vmalloc_llp; |
| |
| ksp_esid_data = mk_esid_data(get_paca()->kstack, mmu_kernel_ssize, KSTACK_INDEX); |
| if ((ksp_esid_data & ~0xfffffffUL) <= PAGE_OFFSET) { |
| ksp_esid_data &= ~SLB_ESID_V; |
| ksp_vsid_data = 0; |
| slb_shadow_clear(KSTACK_INDEX); |
| } else { |
| /* Update stack entry; others don't change */ |
| slb_shadow_update(get_paca()->kstack, mmu_kernel_ssize, lflags, KSTACK_INDEX); |
| ksp_vsid_data = |
| be64_to_cpu(get_slb_shadow()->save_area[KSTACK_INDEX].vsid); |
| } |
| |
| /* We need to do this all in asm, so we're sure we don't touch |
| * the stack between the slbia and rebolting it. */ |
| asm volatile("isync\n" |
| "slbia\n" |
| /* Slot 1 - first VMALLOC segment */ |
| "slbmte %0,%1\n" |
| /* Slot 2 - kernel stack */ |
| "slbmte %2,%3\n" |
| "isync" |
| :: "r"(mk_vsid_data(VMALLOC_START, mmu_kernel_ssize, vflags)), |
| "r"(mk_esid_data(VMALLOC_START, mmu_kernel_ssize, 1)), |
| "r"(ksp_vsid_data), |
| "r"(ksp_esid_data) |
| : "memory"); |
| } |
| |
| void slb_flush_and_rebolt(void) |
| { |
| |
| WARN_ON(!irqs_disabled()); |
| |
| /* |
| * We can't take a PMU exception in the following code, so hard |
| * disable interrupts. |
| */ |
| hard_irq_disable(); |
| |
| __slb_flush_and_rebolt(); |
| get_paca()->slb_cache_ptr = 0; |
| } |
| |
| void slb_vmalloc_update(void) |
| { |
| unsigned long vflags; |
| |
| vflags = SLB_VSID_KERNEL | mmu_psize_defs[mmu_vmalloc_psize].sllp; |
| slb_shadow_update(VMALLOC_START, mmu_kernel_ssize, vflags, VMALLOC_INDEX); |
| slb_flush_and_rebolt(); |
| } |
| |
| /* Helper function to compare esids. There are four cases to handle. |
| * 1. The system is not 1T segment size capable. Use the GET_ESID compare. |
| * 2. The system is 1T capable, both addresses are < 1T, use the GET_ESID compare. |
| * 3. The system is 1T capable, only one of the two addresses is > 1T. This is not a match. |
| * 4. The system is 1T capable, both addresses are > 1T, use the GET_ESID_1T macro to compare. |
| */ |
| static inline int esids_match(unsigned long addr1, unsigned long addr2) |
| { |
| int esid_1t_count; |
| |
| /* System is not 1T segment size capable. */ |
| if (!mmu_has_feature(MMU_FTR_1T_SEGMENT)) |
| return (GET_ESID(addr1) == GET_ESID(addr2)); |
| |
| esid_1t_count = (((addr1 >> SID_SHIFT_1T) != 0) + |
| ((addr2 >> SID_SHIFT_1T) != 0)); |
| |
| /* both addresses are < 1T */ |
| if (esid_1t_count == 0) |
| return (GET_ESID(addr1) == GET_ESID(addr2)); |
| |
| /* One address < 1T, the other > 1T. Not a match */ |
| if (esid_1t_count == 1) |
| return 0; |
| |
| /* Both addresses are > 1T. */ |
| return (GET_ESID_1T(addr1) == GET_ESID_1T(addr2)); |
| } |
| |
| /* Flush all user entries from the segment table of the current processor. */ |
| void switch_slb(struct task_struct *tsk, struct mm_struct *mm) |
| { |
| unsigned long offset; |
| unsigned long slbie_data = 0; |
| unsigned long pc = KSTK_EIP(tsk); |
| unsigned long stack = KSTK_ESP(tsk); |
| unsigned long exec_base; |
| |
| /* |
| * We need interrupts hard-disabled here, not just soft-disabled, |
| * so that a PMU interrupt can't occur, which might try to access |
| * user memory (to get a stack trace) and possible cause an SLB miss |
| * which would update the slb_cache/slb_cache_ptr fields in the PACA. |
| */ |
| hard_irq_disable(); |
| offset = get_paca()->slb_cache_ptr; |
| if (!mmu_has_feature(MMU_FTR_NO_SLBIE_B) && |
| offset <= SLB_CACHE_ENTRIES) { |
| int i; |
| asm volatile("isync" : : : "memory"); |
| for (i = 0; i < offset; i++) { |
| slbie_data = (unsigned long)get_paca()->slb_cache[i] |
| << SID_SHIFT; /* EA */ |
| slbie_data |= user_segment_size(slbie_data) |
| << SLBIE_SSIZE_SHIFT; |
| slbie_data |= SLBIE_C; /* C set for user addresses */ |
| asm volatile("slbie %0" : : "r" (slbie_data)); |
| } |
| asm volatile("isync" : : : "memory"); |
| } else { |
| __slb_flush_and_rebolt(); |
| } |
| |
| /* Workaround POWER5 < DD2.1 issue */ |
| if (offset == 1 || offset > SLB_CACHE_ENTRIES) |
| asm volatile("slbie %0" : : "r" (slbie_data)); |
| |
| get_paca()->slb_cache_ptr = 0; |
| get_paca()->context = mm->context; |
| |
| /* |
| * preload some userspace segments into the SLB. |
| * Almost all 32 and 64bit PowerPC executables are linked at |
| * 0x10000000 so it makes sense to preload this segment. |
| */ |
| exec_base = 0x10000000; |
| |
| if (is_kernel_addr(pc) || is_kernel_addr(stack) || |
| is_kernel_addr(exec_base)) |
| return; |
| |
| slb_allocate(pc); |
| |
| if (!esids_match(pc, stack)) |
| slb_allocate(stack); |
| |
| if (!esids_match(pc, exec_base) && |
| !esids_match(stack, exec_base)) |
| slb_allocate(exec_base); |
| } |
| |
| static inline void patch_slb_encoding(unsigned int *insn_addr, |
| unsigned int immed) |
| { |
| |
| /* |
| * This function patches either an li or a cmpldi instruction with |
| * a new immediate value. This relies on the fact that both li |
| * (which is actually addi) and cmpldi both take a 16-bit immediate |
| * value, and it is situated in the same location in the instruction, |
| * ie. bits 16-31 (Big endian bit order) or the lower 16 bits. |
| * The signedness of the immediate operand differs between the two |
| * instructions however this code is only ever patching a small value, |
| * much less than 1 << 15, so we can get away with it. |
| * To patch the value we read the existing instruction, clear the |
| * immediate value, and or in our new value, then write the instruction |
| * back. |
| */ |
| unsigned int insn = (*insn_addr & 0xffff0000) | immed; |
| patch_instruction(insn_addr, insn); |
| } |
| |
| extern u32 slb_miss_kernel_load_linear[]; |
| extern u32 slb_miss_kernel_load_io[]; |
| extern u32 slb_compare_rr_to_size[]; |
| extern u32 slb_miss_kernel_load_vmemmap[]; |
| |
| void slb_set_size(u16 size) |
| { |
| if (mmu_slb_size == size) |
| return; |
| |
| mmu_slb_size = size; |
| patch_slb_encoding(slb_compare_rr_to_size, mmu_slb_size); |
| } |
| |
| void slb_initialize(void) |
| { |
| unsigned long linear_llp, vmalloc_llp, io_llp; |
| unsigned long lflags, vflags; |
| static int slb_encoding_inited; |
| #ifdef CONFIG_SPARSEMEM_VMEMMAP |
| unsigned long vmemmap_llp; |
| #endif |
| |
| /* Prepare our SLB miss handler based on our page size */ |
| linear_llp = mmu_psize_defs[mmu_linear_psize].sllp; |
| io_llp = mmu_psize_defs[mmu_io_psize].sllp; |
| vmalloc_llp = mmu_psize_defs[mmu_vmalloc_psize].sllp; |
| get_paca()->vmalloc_sllp = SLB_VSID_KERNEL | vmalloc_llp; |
| #ifdef CONFIG_SPARSEMEM_VMEMMAP |
| vmemmap_llp = mmu_psize_defs[mmu_vmemmap_psize].sllp; |
| #endif |
| if (!slb_encoding_inited) { |
| slb_encoding_inited = 1; |
| patch_slb_encoding(slb_miss_kernel_load_linear, |
| SLB_VSID_KERNEL | linear_llp); |
| patch_slb_encoding(slb_miss_kernel_load_io, |
| SLB_VSID_KERNEL | io_llp); |
| patch_slb_encoding(slb_compare_rr_to_size, |
| mmu_slb_size); |
| |
| pr_devel("SLB: linear LLP = %04lx\n", linear_llp); |
| pr_devel("SLB: io LLP = %04lx\n", io_llp); |
| |
| #ifdef CONFIG_SPARSEMEM_VMEMMAP |
| patch_slb_encoding(slb_miss_kernel_load_vmemmap, |
| SLB_VSID_KERNEL | vmemmap_llp); |
| pr_devel("SLB: vmemmap LLP = %04lx\n", vmemmap_llp); |
| #endif |
| } |
| |
| get_paca()->stab_rr = SLB_NUM_BOLTED; |
| |
| lflags = SLB_VSID_KERNEL | linear_llp; |
| vflags = SLB_VSID_KERNEL | vmalloc_llp; |
| |
| /* Invalidate the entire SLB (even entry 0) & all the ERATS */ |
| asm volatile("isync":::"memory"); |
| asm volatile("slbmte %0,%0"::"r" (0) : "memory"); |
| asm volatile("isync; slbia; isync":::"memory"); |
| create_shadowed_slbe(PAGE_OFFSET, mmu_kernel_ssize, lflags, LINEAR_INDEX); |
| create_shadowed_slbe(VMALLOC_START, mmu_kernel_ssize, vflags, VMALLOC_INDEX); |
| |
| /* For the boot cpu, we're running on the stack in init_thread_union, |
| * which is in the first segment of the linear mapping, and also |
| * get_paca()->kstack hasn't been initialized yet. |
| * For secondary cpus, we need to bolt the kernel stack entry now. |
| */ |
| slb_shadow_clear(KSTACK_INDEX); |
| if (raw_smp_processor_id() != boot_cpuid && |
| (get_paca()->kstack & slb_esid_mask(mmu_kernel_ssize)) > PAGE_OFFSET) |
| create_shadowed_slbe(get_paca()->kstack, |
| mmu_kernel_ssize, lflags, KSTACK_INDEX); |
| |
| asm volatile("isync":::"memory"); |
| } |