Commit | Line | Data |
---|---|---|
1da177e4 LT |
1 | /* |
2 | * PowerPC64 SLB support. | |
3 | * | |
4 | * Copyright (C) 2004 David Gibson <dwg@au.ibm.com>, IBM | |
5cdcd9d6 | 5 | * Based on earlier code written by: |
1da177e4 LT |
6 | * Dave Engebretsen and Mike Corrigan {engebret|mikejc}@us.ibm.com |
7 | * Copyright (c) 2001 Dave Engebretsen | |
8 | * Copyright (C) 2002 Anton Blanchard <anton@au.ibm.com>, IBM | |
9 | * | |
10 | * | |
11 | * This program is free software; you can redistribute it and/or | |
12 | * modify it under the terms of the GNU General Public License | |
13 | * as published by the Free Software Foundation; either version | |
14 | * 2 of the License, or (at your option) any later version. | |
15 | */ | |
16 | ||
1da177e4 LT |
17 | #include <asm/pgtable.h> |
18 | #include <asm/mmu.h> | |
19 | #include <asm/mmu_context.h> | |
20 | #include <asm/paca.h> | |
21 | #include <asm/cputable.h> | |
3c726f8d | 22 | #include <asm/cacheflush.h> |
2f6093c8 MN |
23 | #include <asm/smp.h> |
24 | #include <linux/compiler.h> | |
aa39be09 | 25 | #include <asm/udbg.h> |
b68a70c4 | 26 | #include <asm/code-patching.h> |
3c726f8d | 27 | |
1d15010c AK |
28 | enum slb_index { |
29 | LINEAR_INDEX = 0, /* Kernel linear map (0xc000000000000000) */ | |
30 | VMALLOC_INDEX = 1, /* Kernel virtual map (0xd000000000000000) */ | |
31 | KSTACK_INDEX = 2, /* Kernel stack map */ | |
32 | }; | |
1da177e4 | 33 | |
3c726f8d BH |
34 | extern void slb_allocate_realmode(unsigned long ea); |
35 | extern void slb_allocate_user(unsigned long ea); | |
36 | ||
37 | static void slb_allocate(unsigned long ea) | |
38 | { | |
39 | /* Currently, we do real mode for all SLBs including user, but | |
40 | * that will change if we bring back dynamic VSIDs | |
41 | */ | |
42 | slb_allocate_realmode(ea); | |
43 | } | |
1da177e4 | 44 | |
3b575064 PM |
45 | #define slb_esid_mask(ssize) \ |
46 | (((ssize) == MMU_SEGSIZE_256M)? ESID_MASK: ESID_MASK_1T) | |
47 | ||
1189be65 | 48 | static inline unsigned long mk_esid_data(unsigned long ea, int ssize, |
1d15010c | 49 | enum slb_index index) |
1da177e4 | 50 | { |
1d15010c | 51 | return (ea & slb_esid_mask(ssize)) | SLB_ESID_V | index; |
1da177e4 LT |
52 | } |
53 | ||
1189be65 PM |
54 | static inline unsigned long mk_vsid_data(unsigned long ea, int ssize, |
55 | unsigned long flags) | |
1da177e4 | 56 | { |
1189be65 PM |
57 | return (get_kernel_vsid(ea, ssize) << slb_vsid_shift(ssize)) | flags | |
58 | ((unsigned long) ssize << SLB_VSID_SSIZE_SHIFT); | |
1da177e4 LT |
59 | } |
60 | ||
1189be65 | 61 | static inline void slb_shadow_update(unsigned long ea, int ssize, |
67439b76 | 62 | unsigned long flags, |
1d15010c | 63 | enum slb_index index) |
1da177e4 | 64 | { |
2f6093c8 MN |
65 | /* |
66 | * Clear the ESID first so the entry is not valid while we are | |
00efee7d MN |
67 | * updating it. No write barriers are needed here, provided |
68 | * we only update the current CPU's SLB shadow buffer. | |
2f6093c8 | 69 | */ |
1d15010c AK |
70 | get_slb_shadow()->save_area[index].esid = 0; |
71 | get_slb_shadow()->save_area[index].vsid = | |
7ffcf8ec | 72 | cpu_to_be64(mk_vsid_data(ea, ssize, flags)); |
1d15010c AK |
73 | get_slb_shadow()->save_area[index].esid = |
74 | cpu_to_be64(mk_esid_data(ea, ssize, index)); | |
2f6093c8 MN |
75 | } |
76 | ||
1d15010c | 77 | static inline void slb_shadow_clear(enum slb_index index) |
2f6093c8 | 78 | { |
1d15010c | 79 | get_slb_shadow()->save_area[index].esid = 0; |
1da177e4 LT |
80 | } |
81 | ||
1189be65 PM |
82 | static inline void create_shadowed_slbe(unsigned long ea, int ssize, |
83 | unsigned long flags, | |
1d15010c | 84 | enum slb_index index) |
175587cc PM |
85 | { |
86 | /* | |
87 | * Updating the shadow buffer before writing the SLB ensures | |
88 | * we don't get a stale entry here if we get preempted by PHYP | |
89 | * between these two statements. | |
90 | */ | |
1d15010c | 91 | slb_shadow_update(ea, ssize, flags, index); |
175587cc PM |
92 | |
93 | asm volatile("slbmte %0,%1" : | |
1189be65 | 94 | : "r" (mk_vsid_data(ea, ssize, flags)), |
1d15010c | 95 | "r" (mk_esid_data(ea, ssize, index)) |
175587cc PM |
96 | : "memory" ); |
97 | } | |
98 | ||
9c1e1052 | 99 | static void __slb_flush_and_rebolt(void) |
1da177e4 LT |
100 | { |
101 | /* If you change this make sure you change SLB_NUM_BOLTED | |
d8d164a9 | 102 | * and PR KVM appropriately too. */ |
bf72aeba | 103 | unsigned long linear_llp, vmalloc_llp, lflags, vflags; |
1189be65 | 104 | unsigned long ksp_esid_data, ksp_vsid_data; |
1da177e4 | 105 | |
3c726f8d | 106 | linear_llp = mmu_psize_defs[mmu_linear_psize].sllp; |
bf72aeba | 107 | vmalloc_llp = mmu_psize_defs[mmu_vmalloc_psize].sllp; |
3c726f8d | 108 | lflags = SLB_VSID_KERNEL | linear_llp; |
bf72aeba | 109 | vflags = SLB_VSID_KERNEL | vmalloc_llp; |
1da177e4 | 110 | |
1d15010c | 111 | ksp_esid_data = mk_esid_data(get_paca()->kstack, mmu_kernel_ssize, KSTACK_INDEX); |
1189be65 | 112 | if ((ksp_esid_data & ~0xfffffffUL) <= PAGE_OFFSET) { |
1da177e4 | 113 | ksp_esid_data &= ~SLB_ESID_V; |
1189be65 | 114 | ksp_vsid_data = 0; |
1d15010c | 115 | slb_shadow_clear(KSTACK_INDEX); |
edd0622b PM |
116 | } else { |
117 | /* Update stack entry; others don't change */ | |
1d15010c | 118 | slb_shadow_update(get_paca()->kstack, mmu_kernel_ssize, lflags, KSTACK_INDEX); |
7ffcf8ec | 119 | ksp_vsid_data = |
1d15010c | 120 | be64_to_cpu(get_slb_shadow()->save_area[KSTACK_INDEX].vsid); |
edd0622b | 121 | } |
2f6093c8 | 122 | |
1da177e4 LT |
123 | /* We need to do this all in asm, so we're sure we don't touch |
124 | * the stack between the slbia and rebolting it. */ | |
125 | asm volatile("isync\n" | |
126 | "slbia\n" | |
127 | /* Slot 1 - first VMALLOC segment */ | |
128 | "slbmte %0,%1\n" | |
129 | /* Slot 2 - kernel stack */ | |
130 | "slbmte %2,%3\n" | |
131 | "isync" | |
1189be65 PM |
132 | :: "r"(mk_vsid_data(VMALLOC_START, mmu_kernel_ssize, vflags)), |
133 | "r"(mk_esid_data(VMALLOC_START, mmu_kernel_ssize, 1)), | |
134 | "r"(ksp_vsid_data), | |
1da177e4 LT |
135 | "r"(ksp_esid_data) |
136 | : "memory"); | |
137 | } | |
138 | ||
9c1e1052 PM |
139 | void slb_flush_and_rebolt(void) |
140 | { | |
141 | ||
142 | WARN_ON(!irqs_disabled()); | |
143 | ||
144 | /* | |
145 | * We can't take a PMU exception in the following code, so hard | |
146 | * disable interrupts. | |
147 | */ | |
148 | hard_irq_disable(); | |
149 | ||
150 | __slb_flush_and_rebolt(); | |
151 | get_paca()->slb_cache_ptr = 0; | |
152 | } | |
153 | ||
67439b76 MN |
154 | void slb_vmalloc_update(void) |
155 | { | |
156 | unsigned long vflags; | |
157 | ||
158 | vflags = SLB_VSID_KERNEL | mmu_psize_defs[mmu_vmalloc_psize].sllp; | |
1d15010c | 159 | slb_shadow_update(VMALLOC_START, mmu_kernel_ssize, vflags, VMALLOC_INDEX); |
67439b76 MN |
160 | slb_flush_and_rebolt(); |
161 | } | |
162 | ||
465ccab9 | 163 | /* Helper function to compare esids. There are four cases to handle. |
164 | * 1. The system is not 1T segment size capable. Use the GET_ESID compare. | |
165 | * 2. The system is 1T capable, both addresses are < 1T, use the GET_ESID compare. | |
166 | * 3. The system is 1T capable, only one of the two addresses is > 1T. This is not a match. | |
167 | * 4. The system is 1T capable, both addresses are > 1T, use the GET_ESID_1T macro to compare. | |
168 | */ | |
169 | static inline int esids_match(unsigned long addr1, unsigned long addr2) | |
170 | { | |
171 | int esid_1t_count; | |
172 | ||
173 | /* System is not 1T segment size capable. */ | |
44ae3ab3 | 174 | if (!mmu_has_feature(MMU_FTR_1T_SEGMENT)) |
465ccab9 | 175 | return (GET_ESID(addr1) == GET_ESID(addr2)); |
176 | ||
177 | esid_1t_count = (((addr1 >> SID_SHIFT_1T) != 0) + | |
178 | ((addr2 >> SID_SHIFT_1T) != 0)); | |
179 | ||
180 | /* both addresses are < 1T */ | |
181 | if (esid_1t_count == 0) | |
182 | return (GET_ESID(addr1) == GET_ESID(addr2)); | |
183 | ||
184 | /* One address < 1T, the other > 1T. Not a match */ | |
185 | if (esid_1t_count == 1) | |
186 | return 0; | |
187 | ||
188 | /* Both addresses are > 1T. */ | |
189 | return (GET_ESID_1T(addr1) == GET_ESID_1T(addr2)); | |
190 | } | |
191 | ||
1da177e4 LT |
192 | /* Flush all user entries from the segment table of the current processor. */ |
193 | void switch_slb(struct task_struct *tsk, struct mm_struct *mm) | |
194 | { | |
9c1e1052 | 195 | unsigned long offset; |
1189be65 | 196 | unsigned long slbie_data = 0; |
1da177e4 LT |
197 | unsigned long pc = KSTK_EIP(tsk); |
198 | unsigned long stack = KSTK_ESP(tsk); | |
de4376c2 | 199 | unsigned long exec_base; |
1da177e4 | 200 | |
9c1e1052 PM |
201 | /* |
202 | * We need interrupts hard-disabled here, not just soft-disabled, | |
203 | * so that a PMU interrupt can't occur, which might try to access | |
204 | * user memory (to get a stack trace) and possible cause an SLB miss | |
205 | * which would update the slb_cache/slb_cache_ptr fields in the PACA. | |
206 | */ | |
207 | hard_irq_disable(); | |
208 | offset = get_paca()->slb_cache_ptr; | |
44ae3ab3 | 209 | if (!mmu_has_feature(MMU_FTR_NO_SLBIE_B) && |
f66bce5e | 210 | offset <= SLB_CACHE_ENTRIES) { |
1da177e4 LT |
211 | int i; |
212 | asm volatile("isync" : : : "memory"); | |
213 | for (i = 0; i < offset; i++) { | |
1189be65 PM |
214 | slbie_data = (unsigned long)get_paca()->slb_cache[i] |
215 | << SID_SHIFT; /* EA */ | |
216 | slbie_data |= user_segment_size(slbie_data) | |
217 | << SLBIE_SSIZE_SHIFT; | |
218 | slbie_data |= SLBIE_C; /* C set for user addresses */ | |
219 | asm volatile("slbie %0" : : "r" (slbie_data)); | |
1da177e4 LT |
220 | } |
221 | asm volatile("isync" : : : "memory"); | |
222 | } else { | |
9c1e1052 | 223 | __slb_flush_and_rebolt(); |
1da177e4 LT |
224 | } |
225 | ||
226 | /* Workaround POWER5 < DD2.1 issue */ | |
227 | if (offset == 1 || offset > SLB_CACHE_ENTRIES) | |
1189be65 | 228 | asm volatile("slbie %0" : : "r" (slbie_data)); |
1da177e4 LT |
229 | |
230 | get_paca()->slb_cache_ptr = 0; | |
231 | get_paca()->context = mm->context; | |
232 | ||
233 | /* | |
234 | * preload some userspace segments into the SLB. | |
de4376c2 AB |
235 | * Almost all 32 and 64bit PowerPC executables are linked at |
236 | * 0x10000000 so it makes sense to preload this segment. | |
1da177e4 | 237 | */ |
de4376c2 | 238 | exec_base = 0x10000000; |
1da177e4 | 239 | |
5eb9bac0 | 240 | if (is_kernel_addr(pc) || is_kernel_addr(stack) || |
de4376c2 | 241 | is_kernel_addr(exec_base)) |
1da177e4 LT |
242 | return; |
243 | ||
5eb9bac0 | 244 | slb_allocate(pc); |
1da177e4 | 245 | |
5eb9bac0 AB |
246 | if (!esids_match(pc, stack)) |
247 | slb_allocate(stack); | |
1da177e4 | 248 | |
de4376c2 AB |
249 | if (!esids_match(pc, exec_base) && |
250 | !esids_match(stack, exec_base)) | |
251 | slb_allocate(exec_base); | |
1da177e4 LT |
252 | } |
253 | ||
3c726f8d BH |
254 | static inline void patch_slb_encoding(unsigned int *insn_addr, |
255 | unsigned int immed) | |
256 | { | |
79d0be74 AK |
257 | |
258 | /* | |
259 | * This function patches either an li or a cmpldi instruction with | |
260 | * a new immediate value. This relies on the fact that both li | |
261 | * (which is actually addi) and cmpldi both take a 16-bit immediate | |
262 | * value, and it is situated in the same location in the instruction, | |
263 | * ie. bits 16-31 (Big endian bit order) or the lower 16 bits. | |
264 | * The signedness of the immediate operand differs between the two | |
265 | * instructions however this code is only ever patching a small value, | |
266 | * much less than 1 << 15, so we can get away with it. | |
267 | * To patch the value we read the existing instruction, clear the | |
268 | * immediate value, and or in our new value, then write the instruction | |
269 | * back. | |
270 | */ | |
271 | unsigned int insn = (*insn_addr & 0xffff0000) | immed; | |
b68a70c4 | 272 | patch_instruction(insn_addr, insn); |
3c726f8d BH |
273 | } |
274 | ||
b86206e4 AB |
275 | extern u32 slb_miss_kernel_load_linear[]; |
276 | extern u32 slb_miss_kernel_load_io[]; | |
277 | extern u32 slb_compare_rr_to_size[]; | |
278 | extern u32 slb_miss_kernel_load_vmemmap[]; | |
279 | ||
46db2f86 BK |
280 | void slb_set_size(u16 size) |
281 | { | |
46db2f86 BK |
282 | if (mmu_slb_size == size) |
283 | return; | |
284 | ||
285 | mmu_slb_size = size; | |
286 | patch_slb_encoding(slb_compare_rr_to_size, mmu_slb_size); | |
287 | } | |
288 | ||
1da177e4 LT |
289 | void slb_initialize(void) |
290 | { | |
bf72aeba | 291 | unsigned long linear_llp, vmalloc_llp, io_llp; |
56291e19 | 292 | unsigned long lflags, vflags; |
3c726f8d | 293 | static int slb_encoding_inited; |
cec08e7a | 294 | #ifdef CONFIG_SPARSEMEM_VMEMMAP |
cec08e7a BH |
295 | unsigned long vmemmap_llp; |
296 | #endif | |
3c726f8d BH |
297 | |
298 | /* Prepare our SLB miss handler based on our page size */ | |
299 | linear_llp = mmu_psize_defs[mmu_linear_psize].sllp; | |
bf72aeba PM |
300 | io_llp = mmu_psize_defs[mmu_io_psize].sllp; |
301 | vmalloc_llp = mmu_psize_defs[mmu_vmalloc_psize].sllp; | |
302 | get_paca()->vmalloc_sllp = SLB_VSID_KERNEL | vmalloc_llp; | |
cec08e7a BH |
303 | #ifdef CONFIG_SPARSEMEM_VMEMMAP |
304 | vmemmap_llp = mmu_psize_defs[mmu_vmemmap_psize].sllp; | |
305 | #endif | |
3c726f8d BH |
306 | if (!slb_encoding_inited) { |
307 | slb_encoding_inited = 1; | |
308 | patch_slb_encoding(slb_miss_kernel_load_linear, | |
309 | SLB_VSID_KERNEL | linear_llp); | |
bf72aeba PM |
310 | patch_slb_encoding(slb_miss_kernel_load_io, |
311 | SLB_VSID_KERNEL | io_llp); | |
584f8b71 MN |
312 | patch_slb_encoding(slb_compare_rr_to_size, |
313 | mmu_slb_size); | |
3c726f8d | 314 | |
651e2dd2 ME |
315 | pr_devel("SLB: linear LLP = %04lx\n", linear_llp); |
316 | pr_devel("SLB: io LLP = %04lx\n", io_llp); | |
cec08e7a BH |
317 | |
318 | #ifdef CONFIG_SPARSEMEM_VMEMMAP | |
319 | patch_slb_encoding(slb_miss_kernel_load_vmemmap, | |
320 | SLB_VSID_KERNEL | vmemmap_llp); | |
651e2dd2 | 321 | pr_devel("SLB: vmemmap LLP = %04lx\n", vmemmap_llp); |
cec08e7a | 322 | #endif |
3c726f8d BH |
323 | } |
324 | ||
56291e19 SR |
325 | get_paca()->stab_rr = SLB_NUM_BOLTED; |
326 | ||
3c726f8d | 327 | lflags = SLB_VSID_KERNEL | linear_llp; |
bf72aeba | 328 | vflags = SLB_VSID_KERNEL | vmalloc_llp; |
1da177e4 | 329 | |
2be682af | 330 | /* Invalidate the entire SLB (even entry 0) & all the ERATS */ |
175587cc PM |
331 | asm volatile("isync":::"memory"); |
332 | asm volatile("slbmte %0,%0"::"r" (0) : "memory"); | |
333 | asm volatile("isync; slbia; isync":::"memory"); | |
1d15010c AK |
334 | create_shadowed_slbe(PAGE_OFFSET, mmu_kernel_ssize, lflags, LINEAR_INDEX); |
335 | create_shadowed_slbe(VMALLOC_START, mmu_kernel_ssize, vflags, VMALLOC_INDEX); | |
175587cc | 336 | |
3b575064 PM |
337 | /* For the boot cpu, we're running on the stack in init_thread_union, |
338 | * which is in the first segment of the linear mapping, and also | |
339 | * get_paca()->kstack hasn't been initialized yet. | |
340 | * For secondary cpus, we need to bolt the kernel stack entry now. | |
341 | */ | |
1d15010c | 342 | slb_shadow_clear(KSTACK_INDEX); |
3b575064 PM |
343 | if (raw_smp_processor_id() != boot_cpuid && |
344 | (get_paca()->kstack & slb_esid_mask(mmu_kernel_ssize)) > PAGE_OFFSET) | |
345 | create_shadowed_slbe(get_paca()->kstack, | |
1d15010c | 346 | mmu_kernel_ssize, lflags, KSTACK_INDEX); |
dfbe0d3b | 347 | |
175587cc | 348 | asm volatile("isync":::"memory"); |
1da177e4 | 349 | } |