s390/mm: prevent and break zero page mappings in case of storage keys
[deliverable/linux.git] / arch / s390 / include / asm / pgtable.h
CommitLineData
1da177e4 1/*
1da177e4 2 * S390 version
a53c8fab 3 * Copyright IBM Corp. 1999, 2000
1da177e4
LT
4 * Author(s): Hartmut Penner (hp@de.ibm.com)
5 * Ulrich Weigand (weigand@de.ibm.com)
6 * Martin Schwidefsky (schwidefsky@de.ibm.com)
7 *
8 * Derived from "include/asm-i386/pgtable.h"
9 */
10
11#ifndef _ASM_S390_PGTABLE_H
12#define _ASM_S390_PGTABLE_H
13
1da177e4
LT
14/*
15 * The Linux memory management assumes a three-level page table setup. For
16 * s390 31 bit we "fold" the mid level into the top-level page table, so
17 * that we physically have the same two-level page table as the s390 mmu
18 * expects in 31 bit mode. For s390 64 bit we use three of the five levels
19 * the hardware provides (region first and region second tables are not
20 * used).
21 *
22 * The "pgd_xxx()" functions are trivial for a folded two-level
23 * setup: the pgd is never bad, and a pmd always exists (as it's folded
24 * into the pgd entry)
25 *
26 * This file contains the functions and defines necessary to modify and use
27 * the S390 page table tree.
28 */
29#ifndef __ASSEMBLY__
9789db08 30#include <linux/sched.h>
2dcea57a 31#include <linux/mm_types.h>
abf09bed 32#include <linux/page-flags.h>
527e30b4 33#include <linux/radix-tree.h>
1da177e4 34#include <asm/bug.h>
b2fa47e6 35#include <asm/page.h>
1da177e4 36
1da177e4
LT
37extern pgd_t swapper_pg_dir[] __attribute__ ((aligned (4096)));
38extern void paging_init(void);
2b67fc46 39extern void vmem_map_init(void);
1da177e4
LT
40
41/*
42 * The S390 doesn't have any external MMU info: the kernel page
43 * tables contain all the necessary information.
44 */
4b3073e1 45#define update_mmu_cache(vma, address, ptep) do { } while (0)
b113da65 46#define update_mmu_cache_pmd(vma, address, ptep) do { } while (0)
1da177e4
LT
47
48/*
238ec4ef 49 * ZERO_PAGE is a global shared page that is always zero; used
1da177e4
LT
50 * for zero-mapped memory areas etc..
51 */
238ec4ef
MS
52
53extern unsigned long empty_zero_page;
54extern unsigned long zero_page_mask;
55
56#define ZERO_PAGE(vaddr) \
57 (virt_to_page((void *)(empty_zero_page + \
58 (((unsigned long)(vaddr)) &zero_page_mask))))
816422ad 59#define __HAVE_COLOR_ZERO_PAGE
238ec4ef 60
4f2e2903 61/* TODO: s390 cannot support io_remap_pfn_range... */
1da177e4
LT
62#endif /* !__ASSEMBLY__ */
63
64/*
65 * PMD_SHIFT determines the size of the area a second-level page
66 * table can map
67 * PGDIR_SHIFT determines what a third-level page table entry can map
68 */
f4815ac6 69#ifndef CONFIG_64BIT
146e4b3c
MS
70# define PMD_SHIFT 20
71# define PUD_SHIFT 20
72# define PGDIR_SHIFT 20
f4815ac6 73#else /* CONFIG_64BIT */
146e4b3c 74# define PMD_SHIFT 20
190a1d72 75# define PUD_SHIFT 31
5a216a20 76# define PGDIR_SHIFT 42
f4815ac6 77#endif /* CONFIG_64BIT */
1da177e4
LT
78
79#define PMD_SIZE (1UL << PMD_SHIFT)
80#define PMD_MASK (~(PMD_SIZE-1))
190a1d72
MS
81#define PUD_SIZE (1UL << PUD_SHIFT)
82#define PUD_MASK (~(PUD_SIZE-1))
5a216a20
MS
83#define PGDIR_SIZE (1UL << PGDIR_SHIFT)
84#define PGDIR_MASK (~(PGDIR_SIZE-1))
1da177e4
LT
85
86/*
87 * entries per page directory level: the S390 is two-level, so
88 * we don't really have any PMD directory physically.
89 * for S390 segment-table entries are combined to one PGD
90 * that leads to 1024 pte per pgd
91 */
146e4b3c 92#define PTRS_PER_PTE 256
f4815ac6 93#ifndef CONFIG_64BIT
146e4b3c 94#define PTRS_PER_PMD 1
5a216a20 95#define PTRS_PER_PUD 1
f4815ac6 96#else /* CONFIG_64BIT */
146e4b3c 97#define PTRS_PER_PMD 2048
5a216a20 98#define PTRS_PER_PUD 2048
f4815ac6 99#endif /* CONFIG_64BIT */
146e4b3c 100#define PTRS_PER_PGD 2048
1da177e4 101
d455a369
HD
102#define FIRST_USER_ADDRESS 0
103
1da177e4
LT
104#define pte_ERROR(e) \
105 printk("%s:%d: bad pte %p.\n", __FILE__, __LINE__, (void *) pte_val(e))
106#define pmd_ERROR(e) \
107 printk("%s:%d: bad pmd %p.\n", __FILE__, __LINE__, (void *) pmd_val(e))
190a1d72
MS
108#define pud_ERROR(e) \
109 printk("%s:%d: bad pud %p.\n", __FILE__, __LINE__, (void *) pud_val(e))
1da177e4
LT
110#define pgd_ERROR(e) \
111 printk("%s:%d: bad pgd %p.\n", __FILE__, __LINE__, (void *) pgd_val(e))
112
113#ifndef __ASSEMBLY__
114/*
c972cc60
HC
115 * The vmalloc and module area will always be on the topmost area of the kernel
116 * mapping. We reserve 96MB (31bit) / 128GB (64bit) for vmalloc and modules.
117 * On 64 bit kernels we have a 2GB area at the top of the vmalloc area where
118 * modules will reside. That makes sure that inter module branches always
119 * happen without trampolines and in addition the placement within a 2GB frame
120 * is branch prediction unit friendly.
8b62bc96 121 */
239a6425 122extern unsigned long VMALLOC_START;
14045ebf
MS
123extern unsigned long VMALLOC_END;
124extern struct page *vmemmap;
239a6425 125
14045ebf 126#define VMEM_MAX_PHYS ((unsigned long) vmemmap)
5fd9c6e2 127
c972cc60
HC
128#ifdef CONFIG_64BIT
129extern unsigned long MODULES_VADDR;
130extern unsigned long MODULES_END;
131#define MODULES_VADDR MODULES_VADDR
132#define MODULES_END MODULES_END
133#define MODULES_LEN (1UL << 31)
134#endif
135
1da177e4
LT
136/*
137 * A 31 bit pagetable entry of S390 has following format:
138 * | PFRA | | OS |
139 * 0 0IP0
140 * 00000000001111111111222222222233
141 * 01234567890123456789012345678901
142 *
143 * I Page-Invalid Bit: Page is not available for address-translation
144 * P Page-Protection Bit: Store access not possible for page
145 *
146 * A 31 bit segmenttable entry of S390 has following format:
147 * | P-table origin | |PTL
148 * 0 IC
149 * 00000000001111111111222222222233
150 * 01234567890123456789012345678901
151 *
152 * I Segment-Invalid Bit: Segment is not available for address-translation
153 * C Common-Segment Bit: Segment is not private (PoP 3-30)
154 * PTL Page-Table-Length: Page-table length (PTL+1*16 entries -> up to 256)
155 *
156 * The 31 bit segmenttable origin of S390 has following format:
157 *
158 * |S-table origin | | STL |
159 * X **GPS
160 * 00000000001111111111222222222233
161 * 01234567890123456789012345678901
162 *
163 * X Space-Switch event:
164 * G Segment-Invalid Bit: *
165 * P Private-Space Bit: Segment is not private (PoP 3-30)
166 * S Storage-Alteration:
167 * STL Segment-Table-Length: Segment-table length (STL+1*16 entries -> up to 2048)
168 *
169 * A 64 bit pagetable entry of S390 has following format:
6a985c61 170 * | PFRA |0IPC| OS |
1da177e4
LT
171 * 0000000000111111111122222222223333333333444444444455555555556666
172 * 0123456789012345678901234567890123456789012345678901234567890123
173 *
174 * I Page-Invalid Bit: Page is not available for address-translation
175 * P Page-Protection Bit: Store access not possible for page
6a985c61 176 * C Change-bit override: HW is not required to set change bit
1da177e4
LT
177 *
178 * A 64 bit segmenttable entry of S390 has following format:
179 * | P-table origin | TT
180 * 0000000000111111111122222222223333333333444444444455555555556666
181 * 0123456789012345678901234567890123456789012345678901234567890123
182 *
183 * I Segment-Invalid Bit: Segment is not available for address-translation
184 * C Common-Segment Bit: Segment is not private (PoP 3-30)
185 * P Page-Protection Bit: Store access not possible for page
186 * TT Type 00
187 *
188 * A 64 bit region table entry of S390 has following format:
189 * | S-table origin | TF TTTL
190 * 0000000000111111111122222222223333333333444444444455555555556666
191 * 0123456789012345678901234567890123456789012345678901234567890123
192 *
193 * I Segment-Invalid Bit: Segment is not available for address-translation
194 * TT Type 01
195 * TF
190a1d72 196 * TL Table length
1da177e4
LT
197 *
198 * The 64 bit regiontable origin of S390 has following format:
199 * | region table origon | DTTL
200 * 0000000000111111111122222222223333333333444444444455555555556666
201 * 0123456789012345678901234567890123456789012345678901234567890123
202 *
203 * X Space-Switch event:
204 * G Segment-Invalid Bit:
205 * P Private-Space Bit:
206 * S Storage-Alteration:
207 * R Real space
208 * TL Table-Length:
209 *
210 * A storage key has the following format:
211 * | ACC |F|R|C|0|
212 * 0 3 4 5 6 7
213 * ACC: access key
214 * F : fetch protection bit
215 * R : referenced bit
216 * C : changed bit
217 */
218
219/* Hardware bits in the page table entry */
e5098611 220#define _PAGE_PROTECT 0x200 /* HW read-only bit */
83377484 221#define _PAGE_INVALID 0x400 /* HW invalid bit */
e5098611 222#define _PAGE_LARGE 0x800 /* Bit to mark a large pte */
3610cce8
MS
223
224/* Software bits in the page table entry */
e5098611
MS
225#define _PAGE_PRESENT 0x001 /* SW pte present bit */
226#define _PAGE_TYPE 0x002 /* SW pte type bit */
227#define _PAGE_YOUNG 0x004 /* SW pte young bit */
228#define _PAGE_DIRTY 0x008 /* SW pte dirty bit */
0944fe3f
MS
229#define _PAGE_READ 0x010 /* SW pte read bit */
230#define _PAGE_WRITE 0x020 /* SW pte write bit */
231#define _PAGE_SPECIAL 0x040 /* SW associated with special page */
b31288fa 232#define _PAGE_UNUSED 0x080 /* SW bit for pgste usage state */
a08cb629 233#define __HAVE_ARCH_PTE_SPECIAL
1da177e4 234
138c9021 235/* Set of bits not changed in pte_modify */
6a5c1482
HC
236#define _PAGE_CHG_MASK (PAGE_MASK | _PAGE_SPECIAL | _PAGE_DIRTY | \
237 _PAGE_YOUNG)
53492b1d 238
83377484 239/*
e5098611
MS
240 * handle_pte_fault uses pte_present, pte_none and pte_file to find out the
241 * pte type WITHOUT holding the page table lock. The _PAGE_PRESENT bit
242 * is used to distinguish present from not-present ptes. It is changed only
243 * with the page table lock held.
83377484 244 *
e5098611
MS
245 * The following table gives the different possible bit combinations for
246 * the pte hardware and software bits in the last 12 bits of a pte:
83377484 247 *
0944fe3f
MS
248 * 842100000000
249 * 000084210000
250 * 000000008421
251 * .IR...wrdytp
252 * empty .10...000000
253 * swap .10...xxxx10
254 * file .11...xxxxx0
255 * prot-none, clean, old .11...000001
256 * prot-none, clean, young .11...000101
257 * prot-none, dirty, old .10...001001
258 * prot-none, dirty, young .10...001101
259 * read-only, clean, old .11...010001
260 * read-only, clean, young .01...010101
261 * read-only, dirty, old .11...011001
262 * read-only, dirty, young .01...011101
263 * read-write, clean, old .11...110001
264 * read-write, clean, young .01...110101
265 * read-write, dirty, old .10...111001
266 * read-write, dirty, young .00...111101
e5098611
MS
267 *
268 * pte_present is true for the bit pattern .xx...xxxxx1, (pte & 0x001) == 0x001
269 * pte_none is true for the bit pattern .10...xxxx00, (pte & 0x603) == 0x400
270 * pte_file is true for the bit pattern .11...xxxxx0, (pte & 0x601) == 0x600
271 * pte_swap is true for the bit pattern .10...xxxx10, (pte & 0x603) == 0x402
83377484
MS
272 */
273
f4815ac6 274#ifndef CONFIG_64BIT
1da177e4 275
3610cce8
MS
276/* Bits in the segment table address-space-control-element */
277#define _ASCE_SPACE_SWITCH 0x80000000UL /* space switch event */
278#define _ASCE_ORIGIN_MASK 0x7ffff000UL /* segment table origin */
279#define _ASCE_PRIVATE_SPACE 0x100 /* private space control */
280#define _ASCE_ALT_EVENT 0x80 /* storage alteration event control */
281#define _ASCE_TABLE_LENGTH 0x7f /* 128 x 64 entries = 8k */
1da177e4 282
3610cce8 283/* Bits in the segment table entry */
0944fe3f 284#define _SEGMENT_ENTRY_BITS 0x7fffffffUL /* Valid segment table bits */
3610cce8 285#define _SEGMENT_ENTRY_ORIGIN 0x7fffffc0UL /* page table origin */
e5098611
MS
286#define _SEGMENT_ENTRY_PROTECT 0x200 /* page protection bit */
287#define _SEGMENT_ENTRY_INVALID 0x20 /* invalid segment table entry */
3610cce8
MS
288#define _SEGMENT_ENTRY_COMMON 0x10 /* common segment bit */
289#define _SEGMENT_ENTRY_PTL 0x0f /* page table length */
152125b7
MS
290
291#define _SEGMENT_ENTRY_DIRTY 0 /* No sw dirty bit for 31-bit */
292#define _SEGMENT_ENTRY_YOUNG 0 /* No sw young bit for 31-bit */
293#define _SEGMENT_ENTRY_READ 0 /* No sw read bit for 31-bit */
294#define _SEGMENT_ENTRY_WRITE 0 /* No sw write bit for 31-bit */
295#define _SEGMENT_ENTRY_LARGE 0 /* No large pages for 31-bit */
296#define _SEGMENT_ENTRY_BITS_LARGE 0
297#define _SEGMENT_ENTRY_ORIGIN_LARGE 0
1da177e4 298
3610cce8 299#define _SEGMENT_ENTRY (_SEGMENT_ENTRY_PTL)
e5098611 300#define _SEGMENT_ENTRY_EMPTY (_SEGMENT_ENTRY_INVALID)
1da177e4 301
0944fe3f
MS
302/*
303 * Segment table entry encoding (I = invalid, R = read-only bit):
304 * ..R...I.....
305 * prot-none ..1...1.....
306 * read-only ..1...0.....
307 * read-write ..0...0.....
308 * empty ..0...1.....
309 */
310
6c61cfe9 311/* Page status table bits for virtualization */
0d0dafc1
MS
312#define PGSTE_ACC_BITS 0xf0000000UL
313#define PGSTE_FP_BIT 0x08000000UL
314#define PGSTE_PCL_BIT 0x00800000UL
315#define PGSTE_HR_BIT 0x00400000UL
316#define PGSTE_HC_BIT 0x00200000UL
317#define PGSTE_GR_BIT 0x00040000UL
318#define PGSTE_GC_BIT 0x00020000UL
0a61b222
MS
319#define PGSTE_UC_BIT 0x00008000UL /* user dirty (migration) */
320#define PGSTE_IN_BIT 0x00004000UL /* IPTE notify bit */
6c61cfe9 321
f4815ac6 322#else /* CONFIG_64BIT */
1da177e4 323
3610cce8
MS
324/* Bits in the segment/region table address-space-control-element */
325#define _ASCE_ORIGIN ~0xfffUL/* segment table origin */
326#define _ASCE_PRIVATE_SPACE 0x100 /* private space control */
327#define _ASCE_ALT_EVENT 0x80 /* storage alteration event control */
328#define _ASCE_SPACE_SWITCH 0x40 /* space switch event */
329#define _ASCE_REAL_SPACE 0x20 /* real space control */
330#define _ASCE_TYPE_MASK 0x0c /* asce table type mask */
331#define _ASCE_TYPE_REGION1 0x0c /* region first table type */
332#define _ASCE_TYPE_REGION2 0x08 /* region second table type */
333#define _ASCE_TYPE_REGION3 0x04 /* region third table type */
334#define _ASCE_TYPE_SEGMENT 0x00 /* segment table type */
335#define _ASCE_TABLE_LENGTH 0x03 /* region table length */
336
337/* Bits in the region table entry */
338#define _REGION_ENTRY_ORIGIN ~0xfffUL/* region/segment table origin */
e5098611
MS
339#define _REGION_ENTRY_PROTECT 0x200 /* region protection bit */
340#define _REGION_ENTRY_INVALID 0x20 /* invalid region table entry */
3610cce8
MS
341#define _REGION_ENTRY_TYPE_MASK 0x0c /* region/segment table type mask */
342#define _REGION_ENTRY_TYPE_R1 0x0c /* region first table type */
343#define _REGION_ENTRY_TYPE_R2 0x08 /* region second table type */
344#define _REGION_ENTRY_TYPE_R3 0x04 /* region third table type */
345#define _REGION_ENTRY_LENGTH 0x03 /* region third length */
346
347#define _REGION1_ENTRY (_REGION_ENTRY_TYPE_R1 | _REGION_ENTRY_LENGTH)
e5098611 348#define _REGION1_ENTRY_EMPTY (_REGION_ENTRY_TYPE_R1 | _REGION_ENTRY_INVALID)
3610cce8 349#define _REGION2_ENTRY (_REGION_ENTRY_TYPE_R2 | _REGION_ENTRY_LENGTH)
e5098611 350#define _REGION2_ENTRY_EMPTY (_REGION_ENTRY_TYPE_R2 | _REGION_ENTRY_INVALID)
3610cce8 351#define _REGION3_ENTRY (_REGION_ENTRY_TYPE_R3 | _REGION_ENTRY_LENGTH)
e5098611 352#define _REGION3_ENTRY_EMPTY (_REGION_ENTRY_TYPE_R3 | _REGION_ENTRY_INVALID)
3610cce8 353
18da2369 354#define _REGION3_ENTRY_LARGE 0x400 /* RTTE-format control, large page */
1819ed1f 355#define _REGION3_ENTRY_RO 0x200 /* page protection bit */
18da2369 356
1da177e4 357/* Bits in the segment table entry */
0944fe3f 358#define _SEGMENT_ENTRY_BITS 0xfffffffffffffe33UL
152125b7 359#define _SEGMENT_ENTRY_BITS_LARGE 0xfffffffffff0ff33UL
ea81531d 360#define _SEGMENT_ENTRY_ORIGIN_LARGE ~0xfffffUL /* large page address */
3610cce8 361#define _SEGMENT_ENTRY_ORIGIN ~0x7ffUL/* segment table origin */
e5098611
MS
362#define _SEGMENT_ENTRY_PROTECT 0x200 /* page protection bit */
363#define _SEGMENT_ENTRY_INVALID 0x20 /* invalid segment table entry */
1da177e4 364
3610cce8 365#define _SEGMENT_ENTRY (0)
e5098611 366#define _SEGMENT_ENTRY_EMPTY (_SEGMENT_ENTRY_INVALID)
3610cce8 367
152125b7
MS
368#define _SEGMENT_ENTRY_DIRTY 0x2000 /* SW segment dirty bit */
369#define _SEGMENT_ENTRY_YOUNG 0x1000 /* SW segment young bit */
370#define _SEGMENT_ENTRY_SPLIT 0x0800 /* THP splitting bit */
371#define _SEGMENT_ENTRY_LARGE 0x0400 /* STE-format control, large page */
152125b7
MS
372#define _SEGMENT_ENTRY_READ 0x0002 /* SW segment read bit */
373#define _SEGMENT_ENTRY_WRITE 0x0001 /* SW segment write bit */
0944fe3f
MS
374
375/*
376 * Segment table entry encoding (R = read-only, I = invalid, y = young bit):
152125b7
MS
377 * dy..R...I...wr
378 * prot-none, clean, old 00..1...1...00
379 * prot-none, clean, young 01..1...1...00
380 * prot-none, dirty, old 10..1...1...00
381 * prot-none, dirty, young 11..1...1...00
382 * read-only, clean, old 00..1...1...01
383 * read-only, clean, young 01..1...0...01
384 * read-only, dirty, old 10..1...1...01
385 * read-only, dirty, young 11..1...0...01
386 * read-write, clean, old 00..1...1...11
387 * read-write, clean, young 01..1...0...11
388 * read-write, dirty, old 10..0...1...11
389 * read-write, dirty, young 11..0...0...11
0944fe3f
MS
390 * The segment table origin is used to distinguish empty (origin==0) from
391 * read-write, old segment table entries (origin!=0)
392 */
e5098611 393
152125b7 394#define _SEGMENT_ENTRY_SPLIT_BIT 11 /* THP splitting bit number */
1ae1c1d0 395
6c61cfe9 396/* Page status table bits for virtualization */
0d0dafc1
MS
397#define PGSTE_ACC_BITS 0xf000000000000000UL
398#define PGSTE_FP_BIT 0x0800000000000000UL
399#define PGSTE_PCL_BIT 0x0080000000000000UL
400#define PGSTE_HR_BIT 0x0040000000000000UL
401#define PGSTE_HC_BIT 0x0020000000000000UL
402#define PGSTE_GR_BIT 0x0004000000000000UL
403#define PGSTE_GC_BIT 0x0002000000000000UL
0a61b222
MS
404#define PGSTE_UC_BIT 0x0000800000000000UL /* user dirty (migration) */
405#define PGSTE_IN_BIT 0x0000400000000000UL /* IPTE notify bit */
6c61cfe9 406
f4815ac6 407#endif /* CONFIG_64BIT */
1da177e4 408
b31288fa
KW
409/* Guest Page State used for virtualization */
410#define _PGSTE_GPS_ZERO 0x0000000080000000UL
411#define _PGSTE_GPS_USAGE_MASK 0x0000000003000000UL
412#define _PGSTE_GPS_USAGE_STABLE 0x0000000000000000UL
413#define _PGSTE_GPS_USAGE_UNUSED 0x0000000001000000UL
414
1da177e4 415/*
3610cce8
MS
416 * A user page table pointer has the space-switch-event bit, the
417 * private-space-control bit and the storage-alteration-event-control
418 * bit set. A kernel page table pointer doesn't need them.
1da177e4 419 */
3610cce8
MS
420#define _ASCE_USER_BITS (_ASCE_SPACE_SWITCH | _ASCE_PRIVATE_SPACE | \
421 _ASCE_ALT_EVENT)
1da177e4 422
1da177e4 423/*
9282ed92 424 * Page protection definitions.
1da177e4 425 */
e5098611 426#define PAGE_NONE __pgprot(_PAGE_PRESENT | _PAGE_INVALID)
0944fe3f
MS
427#define PAGE_READ __pgprot(_PAGE_PRESENT | _PAGE_READ | \
428 _PAGE_INVALID | _PAGE_PROTECT)
429#define PAGE_WRITE __pgprot(_PAGE_PRESENT | _PAGE_READ | _PAGE_WRITE | \
430 _PAGE_INVALID | _PAGE_PROTECT)
431
432#define PAGE_SHARED __pgprot(_PAGE_PRESENT | _PAGE_READ | _PAGE_WRITE | \
433 _PAGE_YOUNG | _PAGE_DIRTY)
434#define PAGE_KERNEL __pgprot(_PAGE_PRESENT | _PAGE_READ | _PAGE_WRITE | \
435 _PAGE_YOUNG | _PAGE_DIRTY)
436#define PAGE_KERNEL_RO __pgprot(_PAGE_PRESENT | _PAGE_READ | _PAGE_YOUNG | \
437 _PAGE_PROTECT)
1da177e4
LT
438
439/*
043d0708
MS
440 * On s390 the page table entry has an invalid bit and a read-only bit.
441 * Read permission implies execute permission and write permission
442 * implies read permission.
1da177e4
LT
443 */
444 /*xwr*/
9282ed92 445#define __P000 PAGE_NONE
e5098611
MS
446#define __P001 PAGE_READ
447#define __P010 PAGE_READ
448#define __P011 PAGE_READ
449#define __P100 PAGE_READ
450#define __P101 PAGE_READ
451#define __P110 PAGE_READ
452#define __P111 PAGE_READ
9282ed92
GS
453
454#define __S000 PAGE_NONE
e5098611
MS
455#define __S001 PAGE_READ
456#define __S010 PAGE_WRITE
457#define __S011 PAGE_WRITE
458#define __S100 PAGE_READ
459#define __S101 PAGE_READ
460#define __S110 PAGE_WRITE
461#define __S111 PAGE_WRITE
1da177e4 462
106c992a
GS
463/*
464 * Segment entry (large page) protection definitions.
465 */
e5098611
MS
466#define SEGMENT_NONE __pgprot(_SEGMENT_ENTRY_INVALID | \
467 _SEGMENT_ENTRY_PROTECT)
152125b7
MS
468#define SEGMENT_READ __pgprot(_SEGMENT_ENTRY_PROTECT | \
469 _SEGMENT_ENTRY_READ)
470#define SEGMENT_WRITE __pgprot(_SEGMENT_ENTRY_READ | \
471 _SEGMENT_ENTRY_WRITE)
106c992a 472
b2fa47e6
MS
473static inline int mm_has_pgste(struct mm_struct *mm)
474{
475#ifdef CONFIG_PGSTE
476 if (unlikely(mm->context.has_pgste))
477 return 1;
478#endif
479 return 0;
480}
65eef335 481
2faee8ff
DD
482/*
483 * In the case that a guest uses storage keys
484 * faults should no longer be backed by zero pages
485 */
486#define mm_forbids_zeropage mm_use_skey
65eef335
DD
487static inline int mm_use_skey(struct mm_struct *mm)
488{
489#ifdef CONFIG_PGSTE
490 if (mm->context.use_skey)
491 return 1;
492#endif
493 return 0;
494}
495
1da177e4
LT
496/*
497 * pgd/pmd/pte query functions
498 */
f4815ac6 499#ifndef CONFIG_64BIT
1da177e4 500
4448aaf0
AB
501static inline int pgd_present(pgd_t pgd) { return 1; }
502static inline int pgd_none(pgd_t pgd) { return 0; }
503static inline int pgd_bad(pgd_t pgd) { return 0; }
1da177e4 504
190a1d72
MS
505static inline int pud_present(pud_t pud) { return 1; }
506static inline int pud_none(pud_t pud) { return 0; }
18da2369 507static inline int pud_large(pud_t pud) { return 0; }
190a1d72
MS
508static inline int pud_bad(pud_t pud) { return 0; }
509
f4815ac6 510#else /* CONFIG_64BIT */
1da177e4 511
5a216a20
MS
512static inline int pgd_present(pgd_t pgd)
513{
6252d702
MS
514 if ((pgd_val(pgd) & _REGION_ENTRY_TYPE_MASK) < _REGION_ENTRY_TYPE_R2)
515 return 1;
5a216a20
MS
516 return (pgd_val(pgd) & _REGION_ENTRY_ORIGIN) != 0UL;
517}
518
519static inline int pgd_none(pgd_t pgd)
520{
6252d702
MS
521 if ((pgd_val(pgd) & _REGION_ENTRY_TYPE_MASK) < _REGION_ENTRY_TYPE_R2)
522 return 0;
e5098611 523 return (pgd_val(pgd) & _REGION_ENTRY_INVALID) != 0UL;
5a216a20
MS
524}
525
526static inline int pgd_bad(pgd_t pgd)
527{
6252d702
MS
528 /*
529 * With dynamic page table levels the pgd can be a region table
530 * entry or a segment table entry. Check for the bit that are
531 * invalid for either table entry.
532 */
5a216a20 533 unsigned long mask =
e5098611 534 ~_SEGMENT_ENTRY_ORIGIN & ~_REGION_ENTRY_INVALID &
5a216a20
MS
535 ~_REGION_ENTRY_TYPE_MASK & ~_REGION_ENTRY_LENGTH;
536 return (pgd_val(pgd) & mask) != 0;
537}
190a1d72
MS
538
539static inline int pud_present(pud_t pud)
1da177e4 540{
6252d702
MS
541 if ((pud_val(pud) & _REGION_ENTRY_TYPE_MASK) < _REGION_ENTRY_TYPE_R3)
542 return 1;
0d017923 543 return (pud_val(pud) & _REGION_ENTRY_ORIGIN) != 0UL;
1da177e4
LT
544}
545
190a1d72 546static inline int pud_none(pud_t pud)
1da177e4 547{
6252d702
MS
548 if ((pud_val(pud) & _REGION_ENTRY_TYPE_MASK) < _REGION_ENTRY_TYPE_R3)
549 return 0;
e5098611 550 return (pud_val(pud) & _REGION_ENTRY_INVALID) != 0UL;
1da177e4
LT
551}
552
18da2369
HC
553static inline int pud_large(pud_t pud)
554{
555 if ((pud_val(pud) & _REGION_ENTRY_TYPE_MASK) != _REGION_ENTRY_TYPE_R3)
556 return 0;
557 return !!(pud_val(pud) & _REGION3_ENTRY_LARGE);
558}
559
190a1d72 560static inline int pud_bad(pud_t pud)
1da177e4 561{
6252d702
MS
562 /*
563 * With dynamic page table levels the pud can be a region table
564 * entry or a segment table entry. Check for the bit that are
565 * invalid for either table entry.
566 */
5a216a20 567 unsigned long mask =
e5098611 568 ~_SEGMENT_ENTRY_ORIGIN & ~_REGION_ENTRY_INVALID &
5a216a20
MS
569 ~_REGION_ENTRY_TYPE_MASK & ~_REGION_ENTRY_LENGTH;
570 return (pud_val(pud) & mask) != 0;
1da177e4
LT
571}
572
f4815ac6 573#endif /* CONFIG_64BIT */
3610cce8 574
4448aaf0 575static inline int pmd_present(pmd_t pmd)
1da177e4 576{
e5098611 577 return pmd_val(pmd) != _SEGMENT_ENTRY_INVALID;
1da177e4
LT
578}
579
4448aaf0 580static inline int pmd_none(pmd_t pmd)
1da177e4 581{
e5098611 582 return pmd_val(pmd) == _SEGMENT_ENTRY_INVALID;
1da177e4
LT
583}
584
378b1e7a
HC
585static inline int pmd_large(pmd_t pmd)
586{
e5098611 587 return (pmd_val(pmd) & _SEGMENT_ENTRY_LARGE) != 0;
378b1e7a
HC
588}
589
152125b7 590static inline int pmd_pfn(pmd_t pmd)
0944fe3f 591{
152125b7
MS
592 unsigned long origin_mask;
593
594 origin_mask = _SEGMENT_ENTRY_ORIGIN;
595 if (pmd_large(pmd))
596 origin_mask = _SEGMENT_ENTRY_ORIGIN_LARGE;
597 return (pmd_val(pmd) & origin_mask) >> PAGE_SHIFT;
0944fe3f
MS
598}
599
4448aaf0 600static inline int pmd_bad(pmd_t pmd)
1da177e4 601{
0944fe3f
MS
602 if (pmd_large(pmd))
603 return (pmd_val(pmd) & ~_SEGMENT_ENTRY_BITS_LARGE) != 0;
0944fe3f 604 return (pmd_val(pmd) & ~_SEGMENT_ENTRY_BITS) != 0;
1da177e4
LT
605}
606
75077afb
GS
607#define __HAVE_ARCH_PMDP_SPLITTING_FLUSH
608extern void pmdp_splitting_flush(struct vm_area_struct *vma,
609 unsigned long addr, pmd_t *pmdp);
610
1ae1c1d0
GS
611#define __HAVE_ARCH_PMDP_SET_ACCESS_FLAGS
612extern int pmdp_set_access_flags(struct vm_area_struct *vma,
613 unsigned long address, pmd_t *pmdp,
614 pmd_t entry, int dirty);
615
616#define __HAVE_ARCH_PMDP_CLEAR_YOUNG_FLUSH
617extern int pmdp_clear_flush_young(struct vm_area_struct *vma,
618 unsigned long address, pmd_t *pmdp);
619
620#define __HAVE_ARCH_PMD_WRITE
621static inline int pmd_write(pmd_t pmd)
622{
152125b7
MS
623 return (pmd_val(pmd) & _SEGMENT_ENTRY_WRITE) != 0;
624}
625
626static inline int pmd_dirty(pmd_t pmd)
627{
628 int dirty = 1;
629 if (pmd_large(pmd))
630 dirty = (pmd_val(pmd) & _SEGMENT_ENTRY_DIRTY) != 0;
631 return dirty;
1ae1c1d0
GS
632}
633
634static inline int pmd_young(pmd_t pmd)
635{
152125b7
MS
636 int young = 1;
637 if (pmd_large(pmd))
0944fe3f 638 young = (pmd_val(pmd) & _SEGMENT_ENTRY_YOUNG) != 0;
0944fe3f 639 return young;
1ae1c1d0
GS
640}
641
e5098611 642static inline int pte_present(pte_t pte)
1da177e4 643{
e5098611
MS
644 /* Bit pattern: (pte & 0x001) == 0x001 */
645 return (pte_val(pte) & _PAGE_PRESENT) != 0;
1da177e4
LT
646}
647
e5098611 648static inline int pte_none(pte_t pte)
1da177e4 649{
e5098611
MS
650 /* Bit pattern: pte == 0x400 */
651 return pte_val(pte) == _PAGE_INVALID;
1da177e4
LT
652}
653
b31288fa
KW
654static inline int pte_swap(pte_t pte)
655{
656 /* Bit pattern: (pte & 0x603) == 0x402 */
657 return (pte_val(pte) & (_PAGE_INVALID | _PAGE_PROTECT |
658 _PAGE_TYPE | _PAGE_PRESENT))
659 == (_PAGE_INVALID | _PAGE_TYPE);
660}
661
4448aaf0 662static inline int pte_file(pte_t pte)
1da177e4 663{
e5098611
MS
664 /* Bit pattern: (pte & 0x601) == 0x600 */
665 return (pte_val(pte) & (_PAGE_INVALID | _PAGE_PROTECT | _PAGE_PRESENT))
666 == (_PAGE_INVALID | _PAGE_PROTECT);
1da177e4
LT
667}
668
7e675137
NP
669static inline int pte_special(pte_t pte)
670{
a08cb629 671 return (pte_val(pte) & _PAGE_SPECIAL);
7e675137
NP
672}
673
ba8a9229 674#define __HAVE_ARCH_PTE_SAME
b2fa47e6
MS
675static inline int pte_same(pte_t a, pte_t b)
676{
677 return pte_val(a) == pte_val(b);
678}
1da177e4 679
b2fa47e6 680static inline pgste_t pgste_get_lock(pte_t *ptep)
5b7baf05 681{
b2fa47e6 682 unsigned long new = 0;
5b7baf05 683#ifdef CONFIG_PGSTE
b2fa47e6
MS
684 unsigned long old;
685
5b7baf05 686 preempt_disable();
b2fa47e6
MS
687 asm(
688 " lg %0,%2\n"
689 "0: lgr %1,%0\n"
0d0dafc1
MS
690 " nihh %0,0xff7f\n" /* clear PCL bit in old */
691 " oihh %1,0x0080\n" /* set PCL bit in new */
b2fa47e6
MS
692 " csg %0,%1,%2\n"
693 " jl 0b\n"
694 : "=&d" (old), "=&d" (new), "=Q" (ptep[PTRS_PER_PTE])
a8f6e7f7 695 : "Q" (ptep[PTRS_PER_PTE]) : "cc", "memory");
5b7baf05 696#endif
b2fa47e6 697 return __pgste(new);
5b7baf05
CB
698}
699
b2fa47e6 700static inline void pgste_set_unlock(pte_t *ptep, pgste_t pgste)
5b7baf05
CB
701{
702#ifdef CONFIG_PGSTE
b2fa47e6 703 asm(
0d0dafc1 704 " nihh %1,0xff7f\n" /* clear PCL bit */
b2fa47e6
MS
705 " stg %1,%0\n"
706 : "=Q" (ptep[PTRS_PER_PTE])
a8f6e7f7
CB
707 : "d" (pgste_val(pgste)), "Q" (ptep[PTRS_PER_PTE])
708 : "cc", "memory");
5b7baf05
CB
709 preempt_enable();
710#endif
711}
712
d56c893d
MS
713static inline pgste_t pgste_get(pte_t *ptep)
714{
715 unsigned long pgste = 0;
716#ifdef CONFIG_PGSTE
717 pgste = *(unsigned long *)(ptep + PTRS_PER_PTE);
718#endif
719 return __pgste(pgste);
720}
721
3a82603b
CB
722static inline void pgste_set(pte_t *ptep, pgste_t pgste)
723{
724#ifdef CONFIG_PGSTE
725 *(pgste_t *)(ptep + PTRS_PER_PTE) = pgste;
726#endif
727}
728
65eef335
DD
729static inline pgste_t pgste_update_all(pte_t *ptep, pgste_t pgste,
730 struct mm_struct *mm)
5b7baf05
CB
731{
732#ifdef CONFIG_PGSTE
0944fe3f 733 unsigned long address, bits, skey;
b2fa47e6 734
65eef335 735 if (!mm_use_skey(mm) || pte_val(*ptep) & _PAGE_INVALID)
09b53883 736 return pgste;
a43a9d93 737 address = pte_val(*ptep) & PAGE_MASK;
0944fe3f 738 skey = (unsigned long) page_get_storage_key(address);
b2fa47e6 739 bits = skey & (_PAGE_CHANGED | _PAGE_REFERENCED);
b2fa47e6 740 /* Transfer page changed & referenced bit to guest bits in pgste */
0d0dafc1 741 pgste_val(pgste) |= bits << 48; /* GR bit & GC bit */
b2fa47e6 742 /* Copy page access key and fetch protection bit to pgste */
0944fe3f
MS
743 pgste_val(pgste) &= ~(PGSTE_ACC_BITS | PGSTE_FP_BIT);
744 pgste_val(pgste) |= (skey & (_PAGE_ACC_BITS | _PAGE_FP_BIT)) << 56;
b2fa47e6
MS
745#endif
746 return pgste;
747
748}
749
65eef335
DD
750static inline void pgste_set_key(pte_t *ptep, pgste_t pgste, pte_t entry,
751 struct mm_struct *mm)
b2fa47e6
MS
752{
753#ifdef CONFIG_PGSTE
a43a9d93 754 unsigned long address;
338679f7 755 unsigned long nkey;
b2fa47e6 756
65eef335 757 if (!mm_use_skey(mm) || pte_val(entry) & _PAGE_INVALID)
09b53883 758 return;
338679f7 759 VM_BUG_ON(!(pte_val(*ptep) & _PAGE_INVALID));
09b53883 760 address = pte_val(entry) & PAGE_MASK;
338679f7
CB
761 /*
762 * Set page access key and fetch protection bit from pgste.
763 * The guest C/R information is still in the PGSTE, set real
764 * key C/R to 0.
765 */
fe489bf4 766 nkey = (pgste_val(pgste) & (PGSTE_ACC_BITS | PGSTE_FP_BIT)) >> 56;
0a61b222 767 nkey |= (pgste_val(pgste) & (PGSTE_GR_BIT | PGSTE_GC_BIT)) >> 48;
338679f7 768 page_set_storage_key(address, nkey, 0);
5b7baf05
CB
769#endif
770}
771
0a61b222 772static inline pgste_t pgste_set_pte(pte_t *ptep, pgste_t pgste, pte_t entry)
abf09bed 773{
0a61b222
MS
774 if ((pte_val(entry) & _PAGE_PRESENT) &&
775 (pte_val(entry) & _PAGE_WRITE) &&
776 !(pte_val(entry) & _PAGE_INVALID)) {
777 if (!MACHINE_HAS_ESOP) {
778 /*
779 * Without enhanced suppression-on-protection force
780 * the dirty bit on for all writable ptes.
781 */
782 pte_val(entry) |= _PAGE_DIRTY;
783 pte_val(entry) &= ~_PAGE_PROTECT;
784 }
785 if (!(pte_val(entry) & _PAGE_PROTECT))
786 /* This pte allows write access, set user-dirty */
787 pgste_val(pgste) |= PGSTE_UC_BIT;
abf09bed
MS
788 }
789 *ptep = entry;
0a61b222 790 return pgste;
abf09bed
MS
791}
792
e5992f2e
MS
793/**
794 * struct gmap_struct - guest address space
527e30b4 795 * @crst_list: list of all crst tables used in the guest address space
e5992f2e 796 * @mm: pointer to the parent mm_struct
527e30b4
MS
797 * @guest_to_host: radix tree with guest to host address translation
798 * @host_to_guest: radix tree with pointer to segment table entries
799 * @guest_table_lock: spinlock to protect all entries in the guest page table
e5992f2e 800 * @table: pointer to the page directory
480e5926 801 * @asce: address space control element for gmap page table
24eb3a82 802 * @pfault_enabled: defines if pfaults are applicable for the guest
e5992f2e
MS
803 */
804struct gmap {
805 struct list_head list;
527e30b4 806 struct list_head crst_list;
e5992f2e 807 struct mm_struct *mm;
527e30b4
MS
808 struct radix_tree_root guest_to_host;
809 struct radix_tree_root host_to_guest;
810 spinlock_t guest_table_lock;
e5992f2e 811 unsigned long *table;
480e5926 812 unsigned long asce;
c6c956b8 813 unsigned long asce_end;
2c70fe44 814 void *private;
24eb3a82 815 bool pfault_enabled;
e5992f2e
MS
816};
817
d3383632
MS
818/**
819 * struct gmap_notifier - notify function block for page invalidation
820 * @notifier_call: address of callback function
821 */
822struct gmap_notifier {
823 struct list_head list;
6e0a0431 824 void (*notifier_call)(struct gmap *gmap, unsigned long gaddr);
d3383632
MS
825};
826
c6c956b8 827struct gmap *gmap_alloc(struct mm_struct *mm, unsigned long limit);
e5992f2e
MS
828void gmap_free(struct gmap *gmap);
829void gmap_enable(struct gmap *gmap);
830void gmap_disable(struct gmap *gmap);
831int gmap_map_segment(struct gmap *gmap, unsigned long from,
d3383632 832 unsigned long to, unsigned long len);
e5992f2e 833int gmap_unmap_segment(struct gmap *gmap, unsigned long to, unsigned long len);
6e0a0431
MS
834unsigned long __gmap_translate(struct gmap *, unsigned long gaddr);
835unsigned long gmap_translate(struct gmap *, unsigned long gaddr);
527e30b4
MS
836int __gmap_link(struct gmap *gmap, unsigned long gaddr, unsigned long vmaddr);
837int gmap_fault(struct gmap *, unsigned long gaddr, unsigned int fault_flags);
6e0a0431
MS
838void gmap_discard(struct gmap *, unsigned long from, unsigned long to);
839void __gmap_zap(struct gmap *, unsigned long gaddr);
a0bf4f14
DD
840bool gmap_test_and_clear_dirty(unsigned long address, struct gmap *);
841
e5992f2e 842
d3383632
MS
843void gmap_register_ipte_notifier(struct gmap_notifier *);
844void gmap_unregister_ipte_notifier(struct gmap_notifier *);
845int gmap_ipte_notify(struct gmap *, unsigned long start, unsigned long len);
9da4e380 846void gmap_do_ipte_notify(struct mm_struct *, unsigned long addr, pte_t *);
d3383632
MS
847
848static inline pgste_t pgste_ipte_notify(struct mm_struct *mm,
55dbbdd9 849 unsigned long addr,
d3383632
MS
850 pte_t *ptep, pgste_t pgste)
851{
852#ifdef CONFIG_PGSTE
0d0dafc1
MS
853 if (pgste_val(pgste) & PGSTE_IN_BIT) {
854 pgste_val(pgste) &= ~PGSTE_IN_BIT;
9da4e380 855 gmap_do_ipte_notify(mm, addr, ptep);
d3383632
MS
856 }
857#endif
858 return pgste;
859}
860
b2fa47e6
MS
861/*
862 * Certain architectures need to do special things when PTEs
863 * within a page table are directly modified. Thus, the following
864 * hook is made available.
865 */
866static inline void set_pte_at(struct mm_struct *mm, unsigned long addr,
867 pte_t *ptep, pte_t entry)
868{
869 pgste_t pgste;
870
871 if (mm_has_pgste(mm)) {
872 pgste = pgste_get_lock(ptep);
b31288fa 873 pgste_val(pgste) &= ~_PGSTE_GPS_ZERO;
65eef335 874 pgste_set_key(ptep, pgste, entry, mm);
0a61b222 875 pgste = pgste_set_pte(ptep, pgste, entry);
b2fa47e6 876 pgste_set_unlock(ptep, pgste);
abf09bed 877 } else {
b2fa47e6 878 *ptep = entry;
abf09bed 879 }
b2fa47e6
MS
880}
881
1da177e4
LT
882/*
883 * query functions pte_write/pte_dirty/pte_young only work if
884 * pte_present() is true. Undefined behaviour if not..
885 */
4448aaf0 886static inline int pte_write(pte_t pte)
1da177e4 887{
e5098611 888 return (pte_val(pte) & _PAGE_WRITE) != 0;
1da177e4
LT
889}
890
4448aaf0 891static inline int pte_dirty(pte_t pte)
1da177e4 892{
e5098611 893 return (pte_val(pte) & _PAGE_DIRTY) != 0;
1da177e4
LT
894}
895
4448aaf0 896static inline int pte_young(pte_t pte)
1da177e4 897{
0944fe3f 898 return (pte_val(pte) & _PAGE_YOUNG) != 0;
1da177e4
LT
899}
900
b31288fa
KW
901#define __HAVE_ARCH_PTE_UNUSED
902static inline int pte_unused(pte_t pte)
903{
904 return pte_val(pte) & _PAGE_UNUSED;
905}
906
1da177e4
LT
907/*
908 * pgd/pmd/pte modification functions
909 */
910
b2fa47e6 911static inline void pgd_clear(pgd_t *pgd)
5a216a20 912{
f4815ac6 913#ifdef CONFIG_64BIT
6252d702
MS
914 if ((pgd_val(*pgd) & _REGION_ENTRY_TYPE_MASK) == _REGION_ENTRY_TYPE_R2)
915 pgd_val(*pgd) = _REGION2_ENTRY_EMPTY;
b2fa47e6 916#endif
5a216a20
MS
917}
918
b2fa47e6 919static inline void pud_clear(pud_t *pud)
1da177e4 920{
f4815ac6 921#ifdef CONFIG_64BIT
6252d702
MS
922 if ((pud_val(*pud) & _REGION_ENTRY_TYPE_MASK) == _REGION_ENTRY_TYPE_R3)
923 pud_val(*pud) = _REGION3_ENTRY_EMPTY;
b2fa47e6 924#endif
1da177e4
LT
925}
926
b2fa47e6 927static inline void pmd_clear(pmd_t *pmdp)
1da177e4 928{
e5098611 929 pmd_val(*pmdp) = _SEGMENT_ENTRY_INVALID;
1da177e4
LT
930}
931
4448aaf0 932static inline void pte_clear(struct mm_struct *mm, unsigned long addr, pte_t *ptep)
1da177e4 933{
e5098611 934 pte_val(*ptep) = _PAGE_INVALID;
1da177e4
LT
935}
936
937/*
938 * The following pte modification functions only work if
939 * pte_present() is true. Undefined behaviour if not..
940 */
4448aaf0 941static inline pte_t pte_modify(pte_t pte, pgprot_t newprot)
1da177e4 942{
138c9021 943 pte_val(pte) &= _PAGE_CHG_MASK;
1da177e4 944 pte_val(pte) |= pgprot_val(newprot);
0944fe3f
MS
945 /*
946 * newprot for PAGE_NONE, PAGE_READ and PAGE_WRITE has the
947 * invalid bit set, clear it again for readable, young pages
948 */
949 if ((pte_val(pte) & _PAGE_YOUNG) && (pte_val(pte) & _PAGE_READ))
950 pte_val(pte) &= ~_PAGE_INVALID;
951 /*
952 * newprot for PAGE_READ and PAGE_WRITE has the page protection
953 * bit set, clear it again for writable, dirty pages
954 */
e5098611
MS
955 if ((pte_val(pte) & _PAGE_DIRTY) && (pte_val(pte) & _PAGE_WRITE))
956 pte_val(pte) &= ~_PAGE_PROTECT;
1da177e4
LT
957 return pte;
958}
959
4448aaf0 960static inline pte_t pte_wrprotect(pte_t pte)
1da177e4 961{
e5098611
MS
962 pte_val(pte) &= ~_PAGE_WRITE;
963 pte_val(pte) |= _PAGE_PROTECT;
1da177e4
LT
964 return pte;
965}
966
4448aaf0 967static inline pte_t pte_mkwrite(pte_t pte)
1da177e4 968{
e5098611
MS
969 pte_val(pte) |= _PAGE_WRITE;
970 if (pte_val(pte) & _PAGE_DIRTY)
971 pte_val(pte) &= ~_PAGE_PROTECT;
1da177e4
LT
972 return pte;
973}
974
4448aaf0 975static inline pte_t pte_mkclean(pte_t pte)
1da177e4 976{
e5098611
MS
977 pte_val(pte) &= ~_PAGE_DIRTY;
978 pte_val(pte) |= _PAGE_PROTECT;
1da177e4
LT
979 return pte;
980}
981
4448aaf0 982static inline pte_t pte_mkdirty(pte_t pte)
1da177e4 983{
e5098611
MS
984 pte_val(pte) |= _PAGE_DIRTY;
985 if (pte_val(pte) & _PAGE_WRITE)
986 pte_val(pte) &= ~_PAGE_PROTECT;
1da177e4
LT
987 return pte;
988}
989
4448aaf0 990static inline pte_t pte_mkold(pte_t pte)
1da177e4 991{
e5098611 992 pte_val(pte) &= ~_PAGE_YOUNG;
0944fe3f 993 pte_val(pte) |= _PAGE_INVALID;
1da177e4
LT
994 return pte;
995}
996
4448aaf0 997static inline pte_t pte_mkyoung(pte_t pte)
1da177e4 998{
0944fe3f
MS
999 pte_val(pte) |= _PAGE_YOUNG;
1000 if (pte_val(pte) & _PAGE_READ)
1001 pte_val(pte) &= ~_PAGE_INVALID;
1da177e4
LT
1002 return pte;
1003}
1004
7e675137
NP
1005static inline pte_t pte_mkspecial(pte_t pte)
1006{
a08cb629 1007 pte_val(pte) |= _PAGE_SPECIAL;
7e675137
NP
1008 return pte;
1009}
1010
84afdcee
HC
1011#ifdef CONFIG_HUGETLB_PAGE
1012static inline pte_t pte_mkhuge(pte_t pte)
1013{
e5098611 1014 pte_val(pte) |= _PAGE_LARGE;
84afdcee
HC
1015 return pte;
1016}
1017#endif
1018
9282ed92 1019static inline void __ptep_ipte(unsigned long address, pte_t *ptep)
1da177e4 1020{
53e857f3
MS
1021 unsigned long pto = (unsigned long) ptep;
1022
f4815ac6 1023#ifndef CONFIG_64BIT
53e857f3
MS
1024 /* pto in ESA mode must point to the start of the segment table */
1025 pto &= 0x7ffffc00;
9282ed92 1026#endif
53e857f3
MS
1027 /* Invalidation + global TLB flush for the pte */
1028 asm volatile(
1029 " ipte %2,%3"
1030 : "=m" (*ptep) : "m" (*ptep), "a" (pto), "a" (address));
1031}
1032
1b948d6c
MS
1033static inline void __ptep_ipte_local(unsigned long address, pte_t *ptep)
1034{
1035 unsigned long pto = (unsigned long) ptep;
1036
1037#ifndef CONFIG_64BIT
1038 /* pto in ESA mode must point to the start of the segment table */
1039 pto &= 0x7ffffc00;
1040#endif
1041 /* Invalidation + local TLB flush for the pte */
1042 asm volatile(
1043 " .insn rrf,0xb2210000,%2,%3,0,1"
1044 : "=m" (*ptep) : "m" (*ptep), "a" (pto), "a" (address));
1045}
1046
cfb0b241
HC
1047static inline void __ptep_ipte_range(unsigned long address, int nr, pte_t *ptep)
1048{
1049 unsigned long pto = (unsigned long) ptep;
1050
1051#ifndef CONFIG_64BIT
1052 /* pto in ESA mode must point to the start of the segment table */
1053 pto &= 0x7ffffc00;
1054#endif
1055 /* Invalidate a range of ptes + global TLB flush of the ptes */
1056 do {
1057 asm volatile(
1058 " .insn rrf,0xb2210000,%2,%0,%1,0"
1059 : "+a" (address), "+a" (nr) : "a" (pto) : "memory");
1060 } while (nr != 255);
1061}
1062
53e857f3
MS
1063static inline void ptep_flush_direct(struct mm_struct *mm,
1064 unsigned long address, pte_t *ptep)
1065{
1b948d6c
MS
1066 int active, count;
1067
53e857f3
MS
1068 if (pte_val(*ptep) & _PAGE_INVALID)
1069 return;
1b948d6c
MS
1070 active = (mm == current->active_mm) ? 1 : 0;
1071 count = atomic_add_return(0x10000, &mm->context.attach_count);
1072 if (MACHINE_HAS_TLB_LC && (count & 0xffff) <= active &&
1073 cpumask_equal(mm_cpumask(mm), cpumask_of(smp_processor_id())))
1074 __ptep_ipte_local(address, ptep);
1075 else
1076 __ptep_ipte(address, ptep);
1077 atomic_sub(0x10000, &mm->context.attach_count);
9282ed92
GS
1078}
1079
5c474a1e
MS
1080static inline void ptep_flush_lazy(struct mm_struct *mm,
1081 unsigned long address, pte_t *ptep)
1082{
53e857f3 1083 int active, count;
5c474a1e 1084
53e857f3
MS
1085 if (pte_val(*ptep) & _PAGE_INVALID)
1086 return;
1087 active = (mm == current->active_mm) ? 1 : 0;
1088 count = atomic_add_return(0x10000, &mm->context.attach_count);
1089 if ((count & 0xffff) <= active) {
1090 pte_val(*ptep) |= _PAGE_INVALID;
5c474a1e 1091 mm->context.flush_mm = 1;
53e857f3
MS
1092 } else
1093 __ptep_ipte(address, ptep);
1094 atomic_sub(0x10000, &mm->context.attach_count);
5c474a1e
MS
1095}
1096
0a61b222
MS
1097/*
1098 * Get (and clear) the user dirty bit for a pte.
1099 */
1100static inline int ptep_test_and_clear_user_dirty(struct mm_struct *mm,
1101 unsigned long addr,
1102 pte_t *ptep)
1103{
1104 pgste_t pgste;
1105 pte_t pte;
1106 int dirty;
1107
1108 if (!mm_has_pgste(mm))
1109 return 0;
1110 pgste = pgste_get_lock(ptep);
1111 dirty = !!(pgste_val(pgste) & PGSTE_UC_BIT);
1112 pgste_val(pgste) &= ~PGSTE_UC_BIT;
1113 pte = *ptep;
1114 if (dirty && (pte_val(pte) & _PAGE_PRESENT)) {
55dbbdd9 1115 pgste = pgste_ipte_notify(mm, addr, ptep, pgste);
0a61b222
MS
1116 __ptep_ipte(addr, ptep);
1117 if (MACHINE_HAS_ESOP || !(pte_val(pte) & _PAGE_WRITE))
1118 pte_val(pte) |= _PAGE_PROTECT;
1119 else
1120 pte_val(pte) |= _PAGE_INVALID;
1121 *ptep = pte;
1122 }
1123 pgste_set_unlock(ptep, pgste);
1124 return dirty;
1125}
1126
0944fe3f
MS
1127#define __HAVE_ARCH_PTEP_TEST_AND_CLEAR_YOUNG
1128static inline int ptep_test_and_clear_young(struct vm_area_struct *vma,
1129 unsigned long addr, pte_t *ptep)
1130{
1131 pgste_t pgste;
3e03d4c4 1132 pte_t pte, oldpte;
0944fe3f
MS
1133 int young;
1134
1135 if (mm_has_pgste(vma->vm_mm)) {
1136 pgste = pgste_get_lock(ptep);
55dbbdd9 1137 pgste = pgste_ipte_notify(vma->vm_mm, addr, ptep, pgste);
0944fe3f
MS
1138 }
1139
3e03d4c4 1140 oldpte = pte = *ptep;
53e857f3 1141 ptep_flush_direct(vma->vm_mm, addr, ptep);
0944fe3f
MS
1142 young = pte_young(pte);
1143 pte = pte_mkold(pte);
1144
1145 if (mm_has_pgste(vma->vm_mm)) {
3e03d4c4 1146 pgste = pgste_update_all(&oldpte, pgste, vma->vm_mm);
0a61b222 1147 pgste = pgste_set_pte(ptep, pgste, pte);
0944fe3f
MS
1148 pgste_set_unlock(ptep, pgste);
1149 } else
1150 *ptep = pte;
1151
1152 return young;
1153}
1154
1155#define __HAVE_ARCH_PTEP_CLEAR_YOUNG_FLUSH
1156static inline int ptep_clear_flush_young(struct vm_area_struct *vma,
1157 unsigned long address, pte_t *ptep)
1158{
1159 return ptep_test_and_clear_young(vma, address, ptep);
1160}
1161
ba8a9229
MS
1162/*
1163 * This is hard to understand. ptep_get_and_clear and ptep_clear_flush
1164 * both clear the TLB for the unmapped pte. The reason is that
1165 * ptep_get_and_clear is used in common code (e.g. change_pte_range)
1166 * to modify an active pte. The sequence is
1167 * 1) ptep_get_and_clear
1168 * 2) set_pte_at
1169 * 3) flush_tlb_range
1170 * On s390 the tlb needs to get flushed with the modification of the pte
1171 * if the pte is active. The only way how this can be implemented is to
1172 * have ptep_get_and_clear do the tlb flush. In exchange flush_tlb_range
1173 * is a nop.
1174 */
1175#define __HAVE_ARCH_PTEP_GET_AND_CLEAR
b2fa47e6
MS
1176static inline pte_t ptep_get_and_clear(struct mm_struct *mm,
1177 unsigned long address, pte_t *ptep)
1178{
1179 pgste_t pgste;
1180 pte_t pte;
1181
d3383632 1182 if (mm_has_pgste(mm)) {
b2fa47e6 1183 pgste = pgste_get_lock(ptep);
55dbbdd9 1184 pgste = pgste_ipte_notify(mm, address, ptep, pgste);
d3383632 1185 }
b2fa47e6
MS
1186
1187 pte = *ptep;
5c474a1e 1188 ptep_flush_lazy(mm, address, ptep);
e5098611 1189 pte_val(*ptep) = _PAGE_INVALID;
b2fa47e6
MS
1190
1191 if (mm_has_pgste(mm)) {
65eef335 1192 pgste = pgste_update_all(&pte, pgste, mm);
b2fa47e6
MS
1193 pgste_set_unlock(ptep, pgste);
1194 }
1195 return pte;
1196}
1197
1198#define __HAVE_ARCH_PTEP_MODIFY_PROT_TRANSACTION
1199static inline pte_t ptep_modify_prot_start(struct mm_struct *mm,
1200 unsigned long address,
1201 pte_t *ptep)
1202{
d3383632 1203 pgste_t pgste;
b2fa47e6
MS
1204 pte_t pte;
1205
d3383632
MS
1206 if (mm_has_pgste(mm)) {
1207 pgste = pgste_get_lock(ptep);
55dbbdd9 1208 pgste_ipte_notify(mm, address, ptep, pgste);
d3383632 1209 }
b2fa47e6
MS
1210
1211 pte = *ptep;
5c474a1e 1212 ptep_flush_lazy(mm, address, ptep);
b56433cb 1213
3a82603b 1214 if (mm_has_pgste(mm)) {
65eef335 1215 pgste = pgste_update_all(&pte, pgste, mm);
3a82603b
CB
1216 pgste_set(ptep, pgste);
1217 }
b2fa47e6
MS
1218 return pte;
1219}
1220
1221static inline void ptep_modify_prot_commit(struct mm_struct *mm,
1222 unsigned long address,
1223 pte_t *ptep, pte_t pte)
1224{
b56433cb
CB
1225 pgste_t pgste;
1226
abf09bed 1227 if (mm_has_pgste(mm)) {
d56c893d 1228 pgste = pgste_get(ptep);
65eef335 1229 pgste_set_key(ptep, pgste, pte, mm);
0a61b222 1230 pgste = pgste_set_pte(ptep, pgste, pte);
b56433cb 1231 pgste_set_unlock(ptep, pgste);
abf09bed
MS
1232 } else
1233 *ptep = pte;
b2fa47e6 1234}
ba8a9229
MS
1235
1236#define __HAVE_ARCH_PTEP_CLEAR_FLUSH
f0e47c22
MS
1237static inline pte_t ptep_clear_flush(struct vm_area_struct *vma,
1238 unsigned long address, pte_t *ptep)
1239{
b2fa47e6
MS
1240 pgste_t pgste;
1241 pte_t pte;
1242
d3383632 1243 if (mm_has_pgste(vma->vm_mm)) {
b2fa47e6 1244 pgste = pgste_get_lock(ptep);
55dbbdd9 1245 pgste = pgste_ipte_notify(vma->vm_mm, address, ptep, pgste);
d3383632 1246 }
b2fa47e6
MS
1247
1248 pte = *ptep;
53e857f3 1249 ptep_flush_direct(vma->vm_mm, address, ptep);
e5098611 1250 pte_val(*ptep) = _PAGE_INVALID;
b2fa47e6
MS
1251
1252 if (mm_has_pgste(vma->vm_mm)) {
b31288fa
KW
1253 if ((pgste_val(pgste) & _PGSTE_GPS_USAGE_MASK) ==
1254 _PGSTE_GPS_USAGE_UNUSED)
1255 pte_val(pte) |= _PAGE_UNUSED;
65eef335 1256 pgste = pgste_update_all(&pte, pgste, vma->vm_mm);
b2fa47e6
MS
1257 pgste_set_unlock(ptep, pgste);
1258 }
1da177e4
LT
1259 return pte;
1260}
1261
ba8a9229
MS
1262/*
1263 * The batched pte unmap code uses ptep_get_and_clear_full to clear the
1264 * ptes. Here an optimization is possible. tlb_gather_mmu flushes all
1265 * tlbs of an mm if it can guarantee that the ptes of the mm_struct
1266 * cannot be accessed while the batched unmap is running. In this case
1267 * full==1 and a simple pte_clear is enough. See tlb.h.
1268 */
1269#define __HAVE_ARCH_PTEP_GET_AND_CLEAR_FULL
1270static inline pte_t ptep_get_and_clear_full(struct mm_struct *mm,
b2fa47e6 1271 unsigned long address,
ba8a9229 1272 pte_t *ptep, int full)
1da177e4 1273{
b2fa47e6
MS
1274 pgste_t pgste;
1275 pte_t pte;
1276
a055f66a 1277 if (!full && mm_has_pgste(mm)) {
b2fa47e6 1278 pgste = pgste_get_lock(ptep);
55dbbdd9 1279 pgste = pgste_ipte_notify(mm, address, ptep, pgste);
d3383632 1280 }
ba8a9229 1281
b2fa47e6
MS
1282 pte = *ptep;
1283 if (!full)
5c474a1e 1284 ptep_flush_lazy(mm, address, ptep);
e5098611 1285 pte_val(*ptep) = _PAGE_INVALID;
b2fa47e6 1286
a055f66a 1287 if (!full && mm_has_pgste(mm)) {
65eef335 1288 pgste = pgste_update_all(&pte, pgste, mm);
b2fa47e6
MS
1289 pgste_set_unlock(ptep, pgste);
1290 }
ba8a9229 1291 return pte;
1da177e4
LT
1292}
1293
ba8a9229 1294#define __HAVE_ARCH_PTEP_SET_WRPROTECT
b2fa47e6
MS
1295static inline pte_t ptep_set_wrprotect(struct mm_struct *mm,
1296 unsigned long address, pte_t *ptep)
1297{
1298 pgste_t pgste;
1299 pte_t pte = *ptep;
1300
1301 if (pte_write(pte)) {
d3383632 1302 if (mm_has_pgste(mm)) {
b2fa47e6 1303 pgste = pgste_get_lock(ptep);
55dbbdd9 1304 pgste = pgste_ipte_notify(mm, address, ptep, pgste);
d3383632 1305 }
b2fa47e6 1306
5c474a1e 1307 ptep_flush_lazy(mm, address, ptep);
abf09bed 1308 pte = pte_wrprotect(pte);
b2fa47e6 1309
abf09bed 1310 if (mm_has_pgste(mm)) {
0a61b222 1311 pgste = pgste_set_pte(ptep, pgste, pte);
b2fa47e6 1312 pgste_set_unlock(ptep, pgste);
abf09bed
MS
1313 } else
1314 *ptep = pte;
b2fa47e6
MS
1315 }
1316 return pte;
1317}
ba8a9229
MS
1318
1319#define __HAVE_ARCH_PTEP_SET_ACCESS_FLAGS
b2fa47e6
MS
1320static inline int ptep_set_access_flags(struct vm_area_struct *vma,
1321 unsigned long address, pte_t *ptep,
1322 pte_t entry, int dirty)
1323{
1324 pgste_t pgste;
1325
1326 if (pte_same(*ptep, entry))
1327 return 0;
d3383632 1328 if (mm_has_pgste(vma->vm_mm)) {
b2fa47e6 1329 pgste = pgste_get_lock(ptep);
55dbbdd9 1330 pgste = pgste_ipte_notify(vma->vm_mm, address, ptep, pgste);
d3383632 1331 }
b2fa47e6 1332
53e857f3 1333 ptep_flush_direct(vma->vm_mm, address, ptep);
b2fa47e6 1334
abf09bed 1335 if (mm_has_pgste(vma->vm_mm)) {
1951497d 1336 pgste_set_key(ptep, pgste, entry, vma->vm_mm);
0a61b222 1337 pgste = pgste_set_pte(ptep, pgste, entry);
b2fa47e6 1338 pgste_set_unlock(ptep, pgste);
abf09bed
MS
1339 } else
1340 *ptep = entry;
b2fa47e6
MS
1341 return 1;
1342}
1da177e4 1343
1da177e4
LT
1344/*
1345 * Conversion functions: convert a page and protection to a page entry,
1346 * and a page entry and page directory to the page they refer to.
1347 */
1348static inline pte_t mk_pte_phys(unsigned long physpage, pgprot_t pgprot)
1349{
1350 pte_t __pte;
1351 pte_val(__pte) = physpage + pgprot_val(pgprot);
0944fe3f 1352 return pte_mkyoung(__pte);
1da177e4
LT
1353}
1354
2dcea57a
HC
1355static inline pte_t mk_pte(struct page *page, pgprot_t pgprot)
1356{
0b2b6e1d 1357 unsigned long physpage = page_to_phys(page);
abf09bed 1358 pte_t __pte = mk_pte_phys(physpage, pgprot);
1da177e4 1359
e5098611
MS
1360 if (pte_write(__pte) && PageDirty(page))
1361 __pte = pte_mkdirty(__pte);
abf09bed 1362 return __pte;
2dcea57a
HC
1363}
1364
190a1d72
MS
1365#define pgd_index(address) (((address) >> PGDIR_SHIFT) & (PTRS_PER_PGD-1))
1366#define pud_index(address) (((address) >> PUD_SHIFT) & (PTRS_PER_PUD-1))
1367#define pmd_index(address) (((address) >> PMD_SHIFT) & (PTRS_PER_PMD-1))
1368#define pte_index(address) (((address) >> PAGE_SHIFT) & (PTRS_PER_PTE-1))
1da177e4 1369
190a1d72
MS
1370#define pgd_offset(mm, address) ((mm)->pgd + pgd_index(address))
1371#define pgd_offset_k(address) pgd_offset(&init_mm, address)
1da177e4 1372
f4815ac6 1373#ifndef CONFIG_64BIT
1da177e4 1374
190a1d72
MS
1375#define pmd_deref(pmd) (pmd_val(pmd) & _SEGMENT_ENTRY_ORIGIN)
1376#define pud_deref(pmd) ({ BUG(); 0UL; })
1377#define pgd_deref(pmd) ({ BUG(); 0UL; })
46a82b2d 1378
190a1d72
MS
1379#define pud_offset(pgd, address) ((pud_t *) pgd)
1380#define pmd_offset(pud, address) ((pmd_t *) pud + pmd_index(address))
1da177e4 1381
f4815ac6 1382#else /* CONFIG_64BIT */
1da177e4 1383
190a1d72
MS
1384#define pmd_deref(pmd) (pmd_val(pmd) & _SEGMENT_ENTRY_ORIGIN)
1385#define pud_deref(pud) (pud_val(pud) & _REGION_ENTRY_ORIGIN)
5a216a20 1386#define pgd_deref(pgd) (pgd_val(pgd) & _REGION_ENTRY_ORIGIN)
1da177e4 1387
5a216a20
MS
1388static inline pud_t *pud_offset(pgd_t *pgd, unsigned long address)
1389{
6252d702
MS
1390 pud_t *pud = (pud_t *) pgd;
1391 if ((pgd_val(*pgd) & _REGION_ENTRY_TYPE_MASK) == _REGION_ENTRY_TYPE_R2)
1392 pud = (pud_t *) pgd_deref(*pgd);
5a216a20
MS
1393 return pud + pud_index(address);
1394}
1da177e4 1395
190a1d72 1396static inline pmd_t *pmd_offset(pud_t *pud, unsigned long address)
1da177e4 1397{
6252d702
MS
1398 pmd_t *pmd = (pmd_t *) pud;
1399 if ((pud_val(*pud) & _REGION_ENTRY_TYPE_MASK) == _REGION_ENTRY_TYPE_R3)
1400 pmd = (pmd_t *) pud_deref(*pud);
190a1d72 1401 return pmd + pmd_index(address);
1da177e4
LT
1402}
1403
f4815ac6 1404#endif /* CONFIG_64BIT */
1da177e4 1405
190a1d72
MS
1406#define pfn_pte(pfn,pgprot) mk_pte_phys(__pa((pfn) << PAGE_SHIFT),(pgprot))
1407#define pte_pfn(x) (pte_val(x) >> PAGE_SHIFT)
1408#define pte_page(x) pfn_to_page(pte_pfn(x))
1da177e4 1409
152125b7 1410#define pmd_page(pmd) pfn_to_page(pmd_pfn(pmd))
1da177e4 1411
190a1d72
MS
1412/* Find an entry in the lowest level page table.. */
1413#define pte_offset(pmd, addr) ((pte_t *) pmd_deref(*(pmd)) + pte_index(addr))
1414#define pte_offset_kernel(pmd, address) pte_offset(pmd,address)
1da177e4 1415#define pte_offset_map(pmd, address) pte_offset_kernel(pmd, address)
1da177e4 1416#define pte_unmap(pte) do { } while (0)
1da177e4 1417
106c992a 1418#if defined(CONFIG_TRANSPARENT_HUGEPAGE) || defined(CONFIG_HUGETLB_PAGE)
1ae1c1d0
GS
1419static inline unsigned long massage_pgprot_pmd(pgprot_t pgprot)
1420{
d8e7a33d 1421 /*
e5098611 1422 * pgprot is PAGE_NONE, PAGE_READ, or PAGE_WRITE (see __Pxxx / __Sxxx)
d8e7a33d
GS
1423 * Convert to segment table entry format.
1424 */
1425 if (pgprot_val(pgprot) == pgprot_val(PAGE_NONE))
1426 return pgprot_val(SEGMENT_NONE);
e5098611
MS
1427 if (pgprot_val(pgprot) == pgprot_val(PAGE_READ))
1428 return pgprot_val(SEGMENT_READ);
1429 return pgprot_val(SEGMENT_WRITE);
1ae1c1d0
GS
1430}
1431
152125b7 1432static inline pmd_t pmd_wrprotect(pmd_t pmd)
0944fe3f 1433{
152125b7
MS
1434 pmd_val(pmd) &= ~_SEGMENT_ENTRY_WRITE;
1435 pmd_val(pmd) |= _SEGMENT_ENTRY_PROTECT;
1436 return pmd;
1437}
1438
1439static inline pmd_t pmd_mkwrite(pmd_t pmd)
1440{
1441 pmd_val(pmd) |= _SEGMENT_ENTRY_WRITE;
1442 if (pmd_large(pmd) && !(pmd_val(pmd) & _SEGMENT_ENTRY_DIRTY))
1443 return pmd;
1444 pmd_val(pmd) &= ~_SEGMENT_ENTRY_PROTECT;
1445 return pmd;
1446}
1447
1448static inline pmd_t pmd_mkclean(pmd_t pmd)
1449{
1450 if (pmd_large(pmd)) {
1451 pmd_val(pmd) &= ~_SEGMENT_ENTRY_DIRTY;
0944fe3f 1452 pmd_val(pmd) |= _SEGMENT_ENTRY_PROTECT;
152125b7
MS
1453 }
1454 return pmd;
1455}
1456
1457static inline pmd_t pmd_mkdirty(pmd_t pmd)
1458{
1459 if (pmd_large(pmd)) {
1460 pmd_val(pmd) |= _SEGMENT_ENTRY_DIRTY;
1461 if (pmd_val(pmd) & _SEGMENT_ENTRY_WRITE)
1462 pmd_val(pmd) &= ~_SEGMENT_ENTRY_PROTECT;
1463 }
1464 return pmd;
1465}
1466
1467static inline pmd_t pmd_mkyoung(pmd_t pmd)
1468{
1469 if (pmd_large(pmd)) {
0944fe3f 1470 pmd_val(pmd) |= _SEGMENT_ENTRY_YOUNG;
152125b7
MS
1471 if (pmd_val(pmd) & _SEGMENT_ENTRY_READ)
1472 pmd_val(pmd) &= ~_SEGMENT_ENTRY_INVALID;
0944fe3f 1473 }
0944fe3f
MS
1474 return pmd;
1475}
1476
1477static inline pmd_t pmd_mkold(pmd_t pmd)
1478{
152125b7 1479 if (pmd_large(pmd)) {
0944fe3f
MS
1480 pmd_val(pmd) &= ~_SEGMENT_ENTRY_YOUNG;
1481 pmd_val(pmd) |= _SEGMENT_ENTRY_INVALID;
1482 }
0944fe3f
MS
1483 return pmd;
1484}
1485
1ae1c1d0
GS
1486static inline pmd_t pmd_modify(pmd_t pmd, pgprot_t newprot)
1487{
152125b7
MS
1488 if (pmd_large(pmd)) {
1489 pmd_val(pmd) &= _SEGMENT_ENTRY_ORIGIN_LARGE |
1490 _SEGMENT_ENTRY_DIRTY | _SEGMENT_ENTRY_YOUNG |
1491 _SEGMENT_ENTRY_LARGE | _SEGMENT_ENTRY_SPLIT;
1492 pmd_val(pmd) |= massage_pgprot_pmd(newprot);
1493 if (!(pmd_val(pmd) & _SEGMENT_ENTRY_DIRTY))
1494 pmd_val(pmd) |= _SEGMENT_ENTRY_PROTECT;
1495 if (!(pmd_val(pmd) & _SEGMENT_ENTRY_YOUNG))
1496 pmd_val(pmd) |= _SEGMENT_ENTRY_INVALID;
1497 return pmd;
1498 }
1499 pmd_val(pmd) &= _SEGMENT_ENTRY_ORIGIN;
1ae1c1d0
GS
1500 pmd_val(pmd) |= massage_pgprot_pmd(newprot);
1501 return pmd;
1502}
1503
106c992a 1504static inline pmd_t mk_pmd_phys(unsigned long physpage, pgprot_t pgprot)
1ae1c1d0 1505{
106c992a
GS
1506 pmd_t __pmd;
1507 pmd_val(__pmd) = physpage + massage_pgprot_pmd(pgprot);
152125b7 1508 return __pmd;
1ae1c1d0
GS
1509}
1510
106c992a
GS
1511#endif /* CONFIG_TRANSPARENT_HUGEPAGE || CONFIG_HUGETLB_PAGE */
1512
1b948d6c
MS
1513static inline void __pmdp_csp(pmd_t *pmdp)
1514{
1515 register unsigned long reg2 asm("2") = pmd_val(*pmdp);
1516 register unsigned long reg3 asm("3") = pmd_val(*pmdp) |
1517 _SEGMENT_ENTRY_INVALID;
1518 register unsigned long reg4 asm("4") = ((unsigned long) pmdp) + 5;
1519
1520 asm volatile(
1521 " csp %1,%3"
1522 : "=m" (*pmdp)
1523 : "d" (reg2), "d" (reg3), "d" (reg4), "m" (*pmdp) : "cc");
1524}
1525
1526static inline void __pmdp_idte(unsigned long address, pmd_t *pmdp)
1527{
1528 unsigned long sto;
1529
1530 sto = (unsigned long) pmdp - pmd_index(address) * sizeof(pmd_t);
1531 asm volatile(
1532 " .insn rrf,0xb98e0000,%2,%3,0,0"
1533 : "=m" (*pmdp)
1534 : "m" (*pmdp), "a" (sto), "a" ((address & HPAGE_MASK))
1535 : "cc" );
1536}
1537
1538static inline void __pmdp_idte_local(unsigned long address, pmd_t *pmdp)
1539{
1540 unsigned long sto;
1541
1542 sto = (unsigned long) pmdp - pmd_index(address) * sizeof(pmd_t);
1543 asm volatile(
1544 " .insn rrf,0xb98e0000,%2,%3,0,1"
1545 : "=m" (*pmdp)
1546 : "m" (*pmdp), "a" (sto), "a" ((address & HPAGE_MASK))
1547 : "cc" );
1548}
1549
1550static inline void pmdp_flush_direct(struct mm_struct *mm,
1551 unsigned long address, pmd_t *pmdp)
1552{
1553 int active, count;
1554
1555 if (pmd_val(*pmdp) & _SEGMENT_ENTRY_INVALID)
1556 return;
1557 if (!MACHINE_HAS_IDTE) {
1558 __pmdp_csp(pmdp);
1559 return;
1560 }
1561 active = (mm == current->active_mm) ? 1 : 0;
1562 count = atomic_add_return(0x10000, &mm->context.attach_count);
1563 if (MACHINE_HAS_TLB_LC && (count & 0xffff) <= active &&
1564 cpumask_equal(mm_cpumask(mm), cpumask_of(smp_processor_id())))
1565 __pmdp_idte_local(address, pmdp);
1566 else
1567 __pmdp_idte(address, pmdp);
1568 atomic_sub(0x10000, &mm->context.attach_count);
1569}
1570
3eabaee9
MS
1571static inline void pmdp_flush_lazy(struct mm_struct *mm,
1572 unsigned long address, pmd_t *pmdp)
1573{
53e857f3 1574 int active, count;
3eabaee9 1575
1b948d6c
MS
1576 if (pmd_val(*pmdp) & _SEGMENT_ENTRY_INVALID)
1577 return;
53e857f3
MS
1578 active = (mm == current->active_mm) ? 1 : 0;
1579 count = atomic_add_return(0x10000, &mm->context.attach_count);
1580 if ((count & 0xffff) <= active) {
1581 pmd_val(*pmdp) |= _SEGMENT_ENTRY_INVALID;
3eabaee9 1582 mm->context.flush_mm = 1;
1b948d6c
MS
1583 } else if (MACHINE_HAS_IDTE)
1584 __pmdp_idte(address, pmdp);
1585 else
1586 __pmdp_csp(pmdp);
53e857f3 1587 atomic_sub(0x10000, &mm->context.attach_count);
3eabaee9
MS
1588}
1589
106c992a
GS
1590#ifdef CONFIG_TRANSPARENT_HUGEPAGE
1591
1592#define __HAVE_ARCH_PGTABLE_DEPOSIT
6b0b50b0
AK
1593extern void pgtable_trans_huge_deposit(struct mm_struct *mm, pmd_t *pmdp,
1594 pgtable_t pgtable);
106c992a
GS
1595
1596#define __HAVE_ARCH_PGTABLE_WITHDRAW
6b0b50b0 1597extern pgtable_t pgtable_trans_huge_withdraw(struct mm_struct *mm, pmd_t *pmdp);
106c992a
GS
1598
1599static inline int pmd_trans_splitting(pmd_t pmd)
1600{
152125b7
MS
1601 return (pmd_val(pmd) & _SEGMENT_ENTRY_LARGE) &&
1602 (pmd_val(pmd) & _SEGMENT_ENTRY_SPLIT);
106c992a
GS
1603}
1604
1605static inline void set_pmd_at(struct mm_struct *mm, unsigned long addr,
1606 pmd_t *pmdp, pmd_t entry)
1607{
106c992a
GS
1608 *pmdp = entry;
1609}
1610
1611static inline pmd_t pmd_mkhuge(pmd_t pmd)
1612{
1613 pmd_val(pmd) |= _SEGMENT_ENTRY_LARGE;
152125b7
MS
1614 pmd_val(pmd) |= _SEGMENT_ENTRY_YOUNG;
1615 pmd_val(pmd) |= _SEGMENT_ENTRY_PROTECT;
1ae1c1d0
GS
1616 return pmd;
1617}
1618
1ae1c1d0
GS
1619#define __HAVE_ARCH_PMDP_TEST_AND_CLEAR_YOUNG
1620static inline int pmdp_test_and_clear_young(struct vm_area_struct *vma,
1621 unsigned long address, pmd_t *pmdp)
1622{
0944fe3f 1623 pmd_t pmd;
1ae1c1d0 1624
0944fe3f 1625 pmd = *pmdp;
1b948d6c 1626 pmdp_flush_direct(vma->vm_mm, address, pmdp);
0944fe3f
MS
1627 *pmdp = pmd_mkold(pmd);
1628 return pmd_young(pmd);
1ae1c1d0
GS
1629}
1630
1631#define __HAVE_ARCH_PMDP_GET_AND_CLEAR
1632static inline pmd_t pmdp_get_and_clear(struct mm_struct *mm,
1633 unsigned long address, pmd_t *pmdp)
1634{
1635 pmd_t pmd = *pmdp;
1636
1b948d6c 1637 pmdp_flush_direct(mm, address, pmdp);
1ae1c1d0
GS
1638 pmd_clear(pmdp);
1639 return pmd;
1640}
1641
1642#define __HAVE_ARCH_PMDP_CLEAR_FLUSH
1643static inline pmd_t pmdp_clear_flush(struct vm_area_struct *vma,
1644 unsigned long address, pmd_t *pmdp)
1645{
1646 return pmdp_get_and_clear(vma->vm_mm, address, pmdp);
1647}
1648
1649#define __HAVE_ARCH_PMDP_INVALIDATE
1650static inline void pmdp_invalidate(struct vm_area_struct *vma,
1651 unsigned long address, pmd_t *pmdp)
1652{
1b948d6c 1653 pmdp_flush_direct(vma->vm_mm, address, pmdp);
1ae1c1d0
GS
1654}
1655
be328650
GS
1656#define __HAVE_ARCH_PMDP_SET_WRPROTECT
1657static inline void pmdp_set_wrprotect(struct mm_struct *mm,
1658 unsigned long address, pmd_t *pmdp)
1659{
1660 pmd_t pmd = *pmdp;
1661
1662 if (pmd_write(pmd)) {
1b948d6c 1663 pmdp_flush_direct(mm, address, pmdp);
be328650
GS
1664 set_pmd_at(mm, address, pmdp, pmd_wrprotect(pmd));
1665 }
1666}
1667
1ae1c1d0
GS
1668#define pfn_pmd(pfn, pgprot) mk_pmd_phys(__pa((pfn) << PAGE_SHIFT), (pgprot))
1669#define mk_pmd(page, pgprot) pfn_pmd(page_to_pfn(page), (pgprot))
1670
1671static inline int pmd_trans_huge(pmd_t pmd)
1672{
1673 return pmd_val(pmd) & _SEGMENT_ENTRY_LARGE;
1674}
1675
1676static inline int has_transparent_hugepage(void)
1677{
1678 return MACHINE_HAS_HPAGE ? 1 : 0;
1679}
75077afb
GS
1680#endif /* CONFIG_TRANSPARENT_HUGEPAGE */
1681
1da177e4
LT
1682/*
1683 * 31 bit swap entry format:
1684 * A page-table entry has some bits we have to treat in a special way.
1685 * Bits 0, 20 and bit 23 have to be zero, otherwise an specification
1686 * exception will occur instead of a page translation exception. The
1687 * specifiation exception has the bad habit not to store necessary
1688 * information in the lowcore.
e5098611
MS
1689 * Bits 21, 22, 30 and 31 are used to indicate the page type.
1690 * A swap pte is indicated by bit pattern (pte & 0x603) == 0x402
1da177e4
LT
1691 * This leaves the bits 1-19 and bits 24-29 to store type and offset.
1692 * We use the 5 bits from 25-29 for the type and the 20 bits from 1-19
1693 * plus 24 for the offset.
1694 * 0| offset |0110|o|type |00|
1695 * 0 0000000001111111111 2222 2 22222 33
1696 * 0 1234567890123456789 0123 4 56789 01
1697 *
1698 * 64 bit swap entry format:
1699 * A page-table entry has some bits we have to treat in a special way.
1700 * Bits 52 and bit 55 have to be zero, otherwise an specification
1701 * exception will occur instead of a page translation exception. The
1702 * specifiation exception has the bad habit not to store necessary
1703 * information in the lowcore.
e5098611
MS
1704 * Bits 53, 54, 62 and 63 are used to indicate the page type.
1705 * A swap pte is indicated by bit pattern (pte & 0x603) == 0x402
1da177e4
LT
1706 * This leaves the bits 0-51 and bits 56-61 to store type and offset.
1707 * We use the 5 bits from 57-61 for the type and the 53 bits from 0-51
1708 * plus 56 for the offset.
1709 * | offset |0110|o|type |00|
1710 * 0000000000111111111122222222223333333333444444444455 5555 5 55566 66
1711 * 0123456789012345678901234567890123456789012345678901 2345 6 78901 23
1712 */
f4815ac6 1713#ifndef CONFIG_64BIT
1da177e4
LT
1714#define __SWP_OFFSET_MASK (~0UL >> 12)
1715#else
1716#define __SWP_OFFSET_MASK (~0UL >> 11)
1717#endif
4448aaf0 1718static inline pte_t mk_swap_pte(unsigned long type, unsigned long offset)
1da177e4
LT
1719{
1720 pte_t pte;
1721 offset &= __SWP_OFFSET_MASK;
e5098611 1722 pte_val(pte) = _PAGE_INVALID | _PAGE_TYPE | ((type & 0x1f) << 2) |
1da177e4
LT
1723 ((offset & 1UL) << 7) | ((offset & ~1UL) << 11);
1724 return pte;
1725}
1726
1727#define __swp_type(entry) (((entry).val >> 2) & 0x1f)
1728#define __swp_offset(entry) (((entry).val >> 11) | (((entry).val >> 7) & 1))
1729#define __swp_entry(type,offset) ((swp_entry_t) { pte_val(mk_swap_pte((type),(offset))) })
1730
1731#define __pte_to_swp_entry(pte) ((swp_entry_t) { pte_val(pte) })
1732#define __swp_entry_to_pte(x) ((pte_t) { (x).val })
1733
f4815ac6 1734#ifndef CONFIG_64BIT
1da177e4 1735# define PTE_FILE_MAX_BITS 26
f4815ac6 1736#else /* CONFIG_64BIT */
1da177e4 1737# define PTE_FILE_MAX_BITS 59
f4815ac6 1738#endif /* CONFIG_64BIT */
1da177e4
LT
1739
1740#define pte_to_pgoff(__pte) \
1741 ((((__pte).pte >> 12) << 7) + (((__pte).pte >> 1) & 0x7f))
1742
1743#define pgoff_to_pte(__off) \
1744 ((pte_t) { ((((__off) & 0x7f) << 1) + (((__off) >> 7) << 12)) \
e5098611 1745 | _PAGE_INVALID | _PAGE_PROTECT })
1da177e4
LT
1746
1747#endif /* !__ASSEMBLY__ */
1748
1749#define kern_addr_valid(addr) (1)
1750
17f34580
HC
1751extern int vmem_add_mapping(unsigned long start, unsigned long size);
1752extern int vmem_remove_mapping(unsigned long start, unsigned long size);
402b0862 1753extern int s390_enable_sie(void);
934bc131 1754extern void s390_enable_skey(void);
a13cff31 1755extern void s390_reset_cmma(struct mm_struct *mm);
f4eb07c1 1756
1da177e4
LT
1757/*
1758 * No page table caches to initialise
1759 */
765a0cac
HC
1760static inline void pgtable_cache_init(void) { }
1761static inline void check_pgt_cache(void) { }
1da177e4 1762
1da177e4
LT
1763#include <asm-generic/pgtable.h>
1764
1765#endif /* _S390_PAGE_H */
This page took 0.907233 seconds and 5 git commands to generate.