Commit | Line | Data |
---|---|---|
1da177e4 LT |
1 | /* |
2 | * PowerPC64 SLB support. | |
3 | * | |
4 | * Copyright (C) 2004 David Gibson <dwg@au.ibm.com>, IBM | |
5cdcd9d6 | 5 | * Based on earlier code written by: |
1da177e4 LT |
6 | * Dave Engebretsen and Mike Corrigan {engebret|mikejc}@us.ibm.com |
7 | * Copyright (c) 2001 Dave Engebretsen | |
8 | * Copyright (C) 2002 Anton Blanchard <anton@au.ibm.com>, IBM | |
9 | * | |
10 | * | |
11 | * This program is free software; you can redistribute it and/or | |
12 | * modify it under the terms of the GNU General Public License | |
13 | * as published by the Free Software Foundation; either version | |
14 | * 2 of the License, or (at your option) any later version. | |
15 | */ | |
16 | ||
1da177e4 LT |
17 | #include <asm/pgtable.h> |
18 | #include <asm/mmu.h> | |
19 | #include <asm/mmu_context.h> | |
20 | #include <asm/paca.h> | |
21 | #include <asm/cputable.h> | |
3c726f8d | 22 | #include <asm/cacheflush.h> |
2f6093c8 MN |
23 | #include <asm/smp.h> |
24 | #include <linux/compiler.h> | |
aa39be09 | 25 | #include <asm/udbg.h> |
b68a70c4 | 26 | #include <asm/code-patching.h> |
3c726f8d | 27 | |
1d15010c AK |
28 | enum slb_index { |
29 | LINEAR_INDEX = 0, /* Kernel linear map (0xc000000000000000) */ | |
30 | VMALLOC_INDEX = 1, /* Kernel virtual map (0xd000000000000000) */ | |
31 | KSTACK_INDEX = 2, /* Kernel stack map */ | |
32 | }; | |
1da177e4 | 33 | |
3c726f8d | 34 | extern void slb_allocate_realmode(unsigned long ea); |
3c726f8d BH |
35 | |
36 | static void slb_allocate(unsigned long ea) | |
37 | { | |
38 | /* Currently, we do real mode for all SLBs including user, but | |
39 | * that will change if we bring back dynamic VSIDs | |
40 | */ | |
41 | slb_allocate_realmode(ea); | |
42 | } | |
1da177e4 | 43 | |
3b575064 PM |
44 | #define slb_esid_mask(ssize) \ |
45 | (((ssize) == MMU_SEGSIZE_256M)? ESID_MASK: ESID_MASK_1T) | |
46 | ||
1189be65 | 47 | static inline unsigned long mk_esid_data(unsigned long ea, int ssize, |
1d15010c | 48 | enum slb_index index) |
1da177e4 | 49 | { |
1d15010c | 50 | return (ea & slb_esid_mask(ssize)) | SLB_ESID_V | index; |
1da177e4 LT |
51 | } |
52 | ||
1189be65 PM |
53 | static inline unsigned long mk_vsid_data(unsigned long ea, int ssize, |
54 | unsigned long flags) | |
1da177e4 | 55 | { |
1189be65 PM |
56 | return (get_kernel_vsid(ea, ssize) << slb_vsid_shift(ssize)) | flags | |
57 | ((unsigned long) ssize << SLB_VSID_SSIZE_SHIFT); | |
1da177e4 LT |
58 | } |
59 | ||
1189be65 | 60 | static inline void slb_shadow_update(unsigned long ea, int ssize, |
67439b76 | 61 | unsigned long flags, |
1d15010c | 62 | enum slb_index index) |
1da177e4 | 63 | { |
26cd835e ME |
64 | struct slb_shadow *p = get_slb_shadow(); |
65 | ||
2f6093c8 MN |
66 | /* |
67 | * Clear the ESID first so the entry is not valid while we are | |
00efee7d MN |
68 | * updating it. No write barriers are needed here, provided |
69 | * we only update the current CPU's SLB shadow buffer. | |
2f6093c8 | 70 | */ |
26cd835e ME |
71 | p->save_area[index].esid = 0; |
72 | p->save_area[index].vsid = cpu_to_be64(mk_vsid_data(ea, ssize, flags)); | |
73 | p->save_area[index].esid = cpu_to_be64(mk_esid_data(ea, ssize, index)); | |
2f6093c8 MN |
74 | } |
75 | ||
1d15010c | 76 | static inline void slb_shadow_clear(enum slb_index index) |
2f6093c8 | 77 | { |
1d15010c | 78 | get_slb_shadow()->save_area[index].esid = 0; |
1da177e4 LT |
79 | } |
80 | ||
1189be65 PM |
81 | static inline void create_shadowed_slbe(unsigned long ea, int ssize, |
82 | unsigned long flags, | |
1d15010c | 83 | enum slb_index index) |
175587cc PM |
84 | { |
85 | /* | |
86 | * Updating the shadow buffer before writing the SLB ensures | |
87 | * we don't get a stale entry here if we get preempted by PHYP | |
88 | * between these two statements. | |
89 | */ | |
1d15010c | 90 | slb_shadow_update(ea, ssize, flags, index); |
175587cc PM |
91 | |
92 | asm volatile("slbmte %0,%1" : | |
1189be65 | 93 | : "r" (mk_vsid_data(ea, ssize, flags)), |
1d15010c | 94 | "r" (mk_esid_data(ea, ssize, index)) |
175587cc PM |
95 | : "memory" ); |
96 | } | |
97 | ||
9c1e1052 | 98 | static void __slb_flush_and_rebolt(void) |
1da177e4 LT |
99 | { |
100 | /* If you change this make sure you change SLB_NUM_BOLTED | |
d8d164a9 | 101 | * and PR KVM appropriately too. */ |
bf72aeba | 102 | unsigned long linear_llp, vmalloc_llp, lflags, vflags; |
1189be65 | 103 | unsigned long ksp_esid_data, ksp_vsid_data; |
1da177e4 | 104 | |
3c726f8d | 105 | linear_llp = mmu_psize_defs[mmu_linear_psize].sllp; |
bf72aeba | 106 | vmalloc_llp = mmu_psize_defs[mmu_vmalloc_psize].sllp; |
3c726f8d | 107 | lflags = SLB_VSID_KERNEL | linear_llp; |
bf72aeba | 108 | vflags = SLB_VSID_KERNEL | vmalloc_llp; |
1da177e4 | 109 | |
1d15010c | 110 | ksp_esid_data = mk_esid_data(get_paca()->kstack, mmu_kernel_ssize, KSTACK_INDEX); |
1189be65 | 111 | if ((ksp_esid_data & ~0xfffffffUL) <= PAGE_OFFSET) { |
1da177e4 | 112 | ksp_esid_data &= ~SLB_ESID_V; |
1189be65 | 113 | ksp_vsid_data = 0; |
1d15010c | 114 | slb_shadow_clear(KSTACK_INDEX); |
edd0622b PM |
115 | } else { |
116 | /* Update stack entry; others don't change */ | |
1d15010c | 117 | slb_shadow_update(get_paca()->kstack, mmu_kernel_ssize, lflags, KSTACK_INDEX); |
7ffcf8ec | 118 | ksp_vsid_data = |
1d15010c | 119 | be64_to_cpu(get_slb_shadow()->save_area[KSTACK_INDEX].vsid); |
edd0622b | 120 | } |
2f6093c8 | 121 | |
1da177e4 LT |
122 | /* We need to do this all in asm, so we're sure we don't touch |
123 | * the stack between the slbia and rebolting it. */ | |
124 | asm volatile("isync\n" | |
125 | "slbia\n" | |
126 | /* Slot 1 - first VMALLOC segment */ | |
127 | "slbmte %0,%1\n" | |
128 | /* Slot 2 - kernel stack */ | |
129 | "slbmte %2,%3\n" | |
130 | "isync" | |
1189be65 PM |
131 | :: "r"(mk_vsid_data(VMALLOC_START, mmu_kernel_ssize, vflags)), |
132 | "r"(mk_esid_data(VMALLOC_START, mmu_kernel_ssize, 1)), | |
133 | "r"(ksp_vsid_data), | |
1da177e4 LT |
134 | "r"(ksp_esid_data) |
135 | : "memory"); | |
136 | } | |
137 | ||
9c1e1052 PM |
138 | void slb_flush_and_rebolt(void) |
139 | { | |
140 | ||
141 | WARN_ON(!irqs_disabled()); | |
142 | ||
143 | /* | |
144 | * We can't take a PMU exception in the following code, so hard | |
145 | * disable interrupts. | |
146 | */ | |
147 | hard_irq_disable(); | |
148 | ||
149 | __slb_flush_and_rebolt(); | |
150 | get_paca()->slb_cache_ptr = 0; | |
151 | } | |
152 | ||
67439b76 MN |
153 | void slb_vmalloc_update(void) |
154 | { | |
155 | unsigned long vflags; | |
156 | ||
157 | vflags = SLB_VSID_KERNEL | mmu_psize_defs[mmu_vmalloc_psize].sllp; | |
1d15010c | 158 | slb_shadow_update(VMALLOC_START, mmu_kernel_ssize, vflags, VMALLOC_INDEX); |
67439b76 MN |
159 | slb_flush_and_rebolt(); |
160 | } | |
161 | ||
465ccab9 | 162 | /* Helper function to compare esids. There are four cases to handle. |
163 | * 1. The system is not 1T segment size capable. Use the GET_ESID compare. | |
164 | * 2. The system is 1T capable, both addresses are < 1T, use the GET_ESID compare. | |
165 | * 3. The system is 1T capable, only one of the two addresses is > 1T. This is not a match. | |
166 | * 4. The system is 1T capable, both addresses are > 1T, use the GET_ESID_1T macro to compare. | |
167 | */ | |
168 | static inline int esids_match(unsigned long addr1, unsigned long addr2) | |
169 | { | |
170 | int esid_1t_count; | |
171 | ||
172 | /* System is not 1T segment size capable. */ | |
44ae3ab3 | 173 | if (!mmu_has_feature(MMU_FTR_1T_SEGMENT)) |
465ccab9 | 174 | return (GET_ESID(addr1) == GET_ESID(addr2)); |
175 | ||
176 | esid_1t_count = (((addr1 >> SID_SHIFT_1T) != 0) + | |
177 | ((addr2 >> SID_SHIFT_1T) != 0)); | |
178 | ||
179 | /* both addresses are < 1T */ | |
180 | if (esid_1t_count == 0) | |
181 | return (GET_ESID(addr1) == GET_ESID(addr2)); | |
182 | ||
183 | /* One address < 1T, the other > 1T. Not a match */ | |
184 | if (esid_1t_count == 1) | |
185 | return 0; | |
186 | ||
187 | /* Both addresses are > 1T. */ | |
188 | return (GET_ESID_1T(addr1) == GET_ESID_1T(addr2)); | |
189 | } | |
190 | ||
1da177e4 LT |
191 | /* Flush all user entries from the segment table of the current processor. */ |
192 | void switch_slb(struct task_struct *tsk, struct mm_struct *mm) | |
193 | { | |
9c1e1052 | 194 | unsigned long offset; |
1189be65 | 195 | unsigned long slbie_data = 0; |
1da177e4 LT |
196 | unsigned long pc = KSTK_EIP(tsk); |
197 | unsigned long stack = KSTK_ESP(tsk); | |
de4376c2 | 198 | unsigned long exec_base; |
1da177e4 | 199 | |
9c1e1052 PM |
200 | /* |
201 | * We need interrupts hard-disabled here, not just soft-disabled, | |
202 | * so that a PMU interrupt can't occur, which might try to access | |
203 | * user memory (to get a stack trace) and possible cause an SLB miss | |
204 | * which would update the slb_cache/slb_cache_ptr fields in the PACA. | |
205 | */ | |
206 | hard_irq_disable(); | |
207 | offset = get_paca()->slb_cache_ptr; | |
44ae3ab3 | 208 | if (!mmu_has_feature(MMU_FTR_NO_SLBIE_B) && |
f66bce5e | 209 | offset <= SLB_CACHE_ENTRIES) { |
1da177e4 LT |
210 | int i; |
211 | asm volatile("isync" : : : "memory"); | |
212 | for (i = 0; i < offset; i++) { | |
1189be65 PM |
213 | slbie_data = (unsigned long)get_paca()->slb_cache[i] |
214 | << SID_SHIFT; /* EA */ | |
215 | slbie_data |= user_segment_size(slbie_data) | |
216 | << SLBIE_SSIZE_SHIFT; | |
217 | slbie_data |= SLBIE_C; /* C set for user addresses */ | |
218 | asm volatile("slbie %0" : : "r" (slbie_data)); | |
1da177e4 LT |
219 | } |
220 | asm volatile("isync" : : : "memory"); | |
221 | } else { | |
9c1e1052 | 222 | __slb_flush_and_rebolt(); |
1da177e4 LT |
223 | } |
224 | ||
225 | /* Workaround POWER5 < DD2.1 issue */ | |
226 | if (offset == 1 || offset > SLB_CACHE_ENTRIES) | |
1189be65 | 227 | asm volatile("slbie %0" : : "r" (slbie_data)); |
1da177e4 LT |
228 | |
229 | get_paca()->slb_cache_ptr = 0; | |
c395465d | 230 | copy_mm_to_paca(&mm->context); |
1da177e4 LT |
231 | |
232 | /* | |
233 | * preload some userspace segments into the SLB. | |
de4376c2 AB |
234 | * Almost all 32 and 64bit PowerPC executables are linked at |
235 | * 0x10000000 so it makes sense to preload this segment. | |
1da177e4 | 236 | */ |
de4376c2 | 237 | exec_base = 0x10000000; |
1da177e4 | 238 | |
5eb9bac0 | 239 | if (is_kernel_addr(pc) || is_kernel_addr(stack) || |
de4376c2 | 240 | is_kernel_addr(exec_base)) |
1da177e4 LT |
241 | return; |
242 | ||
5eb9bac0 | 243 | slb_allocate(pc); |
1da177e4 | 244 | |
5eb9bac0 AB |
245 | if (!esids_match(pc, stack)) |
246 | slb_allocate(stack); | |
1da177e4 | 247 | |
de4376c2 AB |
248 | if (!esids_match(pc, exec_base) && |
249 | !esids_match(stack, exec_base)) | |
250 | slb_allocate(exec_base); | |
1da177e4 LT |
251 | } |
252 | ||
3c726f8d BH |
253 | static inline void patch_slb_encoding(unsigned int *insn_addr, |
254 | unsigned int immed) | |
255 | { | |
79d0be74 AK |
256 | |
257 | /* | |
258 | * This function patches either an li or a cmpldi instruction with | |
259 | * a new immediate value. This relies on the fact that both li | |
260 | * (which is actually addi) and cmpldi both take a 16-bit immediate | |
261 | * value, and it is situated in the same location in the instruction, | |
262 | * ie. bits 16-31 (Big endian bit order) or the lower 16 bits. | |
263 | * The signedness of the immediate operand differs between the two | |
264 | * instructions however this code is only ever patching a small value, | |
265 | * much less than 1 << 15, so we can get away with it. | |
266 | * To patch the value we read the existing instruction, clear the | |
267 | * immediate value, and or in our new value, then write the instruction | |
268 | * back. | |
269 | */ | |
270 | unsigned int insn = (*insn_addr & 0xffff0000) | immed; | |
b68a70c4 | 271 | patch_instruction(insn_addr, insn); |
3c726f8d BH |
272 | } |
273 | ||
b86206e4 AB |
274 | extern u32 slb_miss_kernel_load_linear[]; |
275 | extern u32 slb_miss_kernel_load_io[]; | |
276 | extern u32 slb_compare_rr_to_size[]; | |
277 | extern u32 slb_miss_kernel_load_vmemmap[]; | |
278 | ||
46db2f86 BK |
279 | void slb_set_size(u16 size) |
280 | { | |
46db2f86 BK |
281 | if (mmu_slb_size == size) |
282 | return; | |
283 | ||
284 | mmu_slb_size = size; | |
285 | patch_slb_encoding(slb_compare_rr_to_size, mmu_slb_size); | |
286 | } | |
287 | ||
1da177e4 LT |
288 | void slb_initialize(void) |
289 | { | |
bf72aeba | 290 | unsigned long linear_llp, vmalloc_llp, io_llp; |
56291e19 | 291 | unsigned long lflags, vflags; |
3c726f8d | 292 | static int slb_encoding_inited; |
cec08e7a | 293 | #ifdef CONFIG_SPARSEMEM_VMEMMAP |
cec08e7a BH |
294 | unsigned long vmemmap_llp; |
295 | #endif | |
3c726f8d BH |
296 | |
297 | /* Prepare our SLB miss handler based on our page size */ | |
298 | linear_llp = mmu_psize_defs[mmu_linear_psize].sllp; | |
bf72aeba PM |
299 | io_llp = mmu_psize_defs[mmu_io_psize].sllp; |
300 | vmalloc_llp = mmu_psize_defs[mmu_vmalloc_psize].sllp; | |
301 | get_paca()->vmalloc_sllp = SLB_VSID_KERNEL | vmalloc_llp; | |
cec08e7a BH |
302 | #ifdef CONFIG_SPARSEMEM_VMEMMAP |
303 | vmemmap_llp = mmu_psize_defs[mmu_vmemmap_psize].sllp; | |
304 | #endif | |
3c726f8d BH |
305 | if (!slb_encoding_inited) { |
306 | slb_encoding_inited = 1; | |
307 | patch_slb_encoding(slb_miss_kernel_load_linear, | |
308 | SLB_VSID_KERNEL | linear_llp); | |
bf72aeba PM |
309 | patch_slb_encoding(slb_miss_kernel_load_io, |
310 | SLB_VSID_KERNEL | io_llp); | |
584f8b71 MN |
311 | patch_slb_encoding(slb_compare_rr_to_size, |
312 | mmu_slb_size); | |
3c726f8d | 313 | |
651e2dd2 ME |
314 | pr_devel("SLB: linear LLP = %04lx\n", linear_llp); |
315 | pr_devel("SLB: io LLP = %04lx\n", io_llp); | |
cec08e7a BH |
316 | |
317 | #ifdef CONFIG_SPARSEMEM_VMEMMAP | |
318 | patch_slb_encoding(slb_miss_kernel_load_vmemmap, | |
319 | SLB_VSID_KERNEL | vmemmap_llp); | |
651e2dd2 | 320 | pr_devel("SLB: vmemmap LLP = %04lx\n", vmemmap_llp); |
cec08e7a | 321 | #endif |
3c726f8d BH |
322 | } |
323 | ||
56291e19 SR |
324 | get_paca()->stab_rr = SLB_NUM_BOLTED; |
325 | ||
3c726f8d | 326 | lflags = SLB_VSID_KERNEL | linear_llp; |
bf72aeba | 327 | vflags = SLB_VSID_KERNEL | vmalloc_llp; |
1da177e4 | 328 | |
2be682af | 329 | /* Invalidate the entire SLB (even entry 0) & all the ERATS */ |
175587cc PM |
330 | asm volatile("isync":::"memory"); |
331 | asm volatile("slbmte %0,%0"::"r" (0) : "memory"); | |
332 | asm volatile("isync; slbia; isync":::"memory"); | |
1d15010c AK |
333 | create_shadowed_slbe(PAGE_OFFSET, mmu_kernel_ssize, lflags, LINEAR_INDEX); |
334 | create_shadowed_slbe(VMALLOC_START, mmu_kernel_ssize, vflags, VMALLOC_INDEX); | |
175587cc | 335 | |
3b575064 PM |
336 | /* For the boot cpu, we're running on the stack in init_thread_union, |
337 | * which is in the first segment of the linear mapping, and also | |
338 | * get_paca()->kstack hasn't been initialized yet. | |
339 | * For secondary cpus, we need to bolt the kernel stack entry now. | |
340 | */ | |
1d15010c | 341 | slb_shadow_clear(KSTACK_INDEX); |
3b575064 PM |
342 | if (raw_smp_processor_id() != boot_cpuid && |
343 | (get_paca()->kstack & slb_esid_mask(mmu_kernel_ssize)) > PAGE_OFFSET) | |
344 | create_shadowed_slbe(get_paca()->kstack, | |
1d15010c | 345 | mmu_kernel_ssize, lflags, KSTACK_INDEX); |
dfbe0d3b | 346 | |
175587cc | 347 | asm volatile("isync":::"memory"); |
1da177e4 | 348 | } |