Linux 6.12-rc1
[linux-block.git] / arch / s390 / mm / gmap.c
CommitLineData
ac41aaee 1// SPDX-License-Identifier: GPL-2.0
1e133ab2
MS
2/*
3 * KVM guest address space mapping code
4 *
0cd2a787 5 * Copyright IBM Corp. 2007, 2020
1e133ab2 6 * Author(s): Martin Schwidefsky <schwidefsky@de.ibm.com>
a9e00d83
JF
7 * David Hildenbrand <david@redhat.com>
8 * Janosch Frank <frankja@linux.vnet.ibm.com>
1e133ab2
MS
9 */
10
11#include <linux/kernel.h>
a520110e 12#include <linux/pagewalk.h>
1e133ab2
MS
13#include <linux/swap.h>
14#include <linux/smp.h>
15#include <linux/spinlock.h>
16#include <linux/slab.h>
17#include <linux/swapops.h>
18#include <linux/ksm.h>
19#include <linux/mman.h>
ca5999fd 20#include <linux/pgtable.h>
65d37f16 21#include <asm/page-states.h>
1e133ab2
MS
22#include <asm/pgalloc.h>
23#include <asm/gmap.h>
1954da4a 24#include <asm/page.h>
1e133ab2
MS
25#include <asm/tlb.h>
26
fd8d4e3a
DH
27#define GMAP_SHADOW_FAKE_TABLE 1ULL
28
1954da4a
HC
29static struct page *gmap_alloc_crst(void)
30{
31 struct page *page;
32
33 page = alloc_pages(GFP_KERNEL_ACCOUNT, CRST_ALLOC_ORDER);
34 if (!page)
35 return NULL;
65d37f16 36 __arch_set_page_dat(page_to_virt(page), 1UL << CRST_ALLOC_ORDER);
1954da4a
HC
37 return page;
38}
39
1e133ab2 40/**
6ea427bb 41 * gmap_alloc - allocate and initialize a guest address space
9c650d09 42 * @limit: maximum address of the gmap address space
1e133ab2
MS
43 *
44 * Returns a guest address space structure.
45 */
6ea427bb 46static struct gmap *gmap_alloc(unsigned long limit)
1e133ab2
MS
47{
48 struct gmap *gmap;
49 struct page *page;
50 unsigned long *table;
51 unsigned long etype, atype;
52
f1c1174f
HC
53 if (limit < _REGION3_SIZE) {
54 limit = _REGION3_SIZE - 1;
1e133ab2
MS
55 atype = _ASCE_TYPE_SEGMENT;
56 etype = _SEGMENT_ENTRY_EMPTY;
f1c1174f
HC
57 } else if (limit < _REGION2_SIZE) {
58 limit = _REGION2_SIZE - 1;
1e133ab2
MS
59 atype = _ASCE_TYPE_REGION3;
60 etype = _REGION3_ENTRY_EMPTY;
f1c1174f
HC
61 } else if (limit < _REGION1_SIZE) {
62 limit = _REGION1_SIZE - 1;
1e133ab2
MS
63 atype = _ASCE_TYPE_REGION2;
64 etype = _REGION2_ENTRY_EMPTY;
65 } else {
66 limit = -1UL;
67 atype = _ASCE_TYPE_REGION1;
68 etype = _REGION1_ENTRY_EMPTY;
69 }
0cd2a787 70 gmap = kzalloc(sizeof(struct gmap), GFP_KERNEL_ACCOUNT);
1e133ab2
MS
71 if (!gmap)
72 goto out;
73 INIT_LIST_HEAD(&gmap->crst_list);
4be130a0
MS
74 INIT_LIST_HEAD(&gmap->children);
75 INIT_LIST_HEAD(&gmap->pt_list);
0cd2a787
CB
76 INIT_RADIX_TREE(&gmap->guest_to_host, GFP_KERNEL_ACCOUNT);
77 INIT_RADIX_TREE(&gmap->host_to_guest, GFP_ATOMIC | __GFP_ACCOUNT);
78 INIT_RADIX_TREE(&gmap->host_to_rmap, GFP_ATOMIC | __GFP_ACCOUNT);
1e133ab2 79 spin_lock_init(&gmap->guest_table_lock);
4be130a0 80 spin_lock_init(&gmap->shadow_lock);
40e90656 81 refcount_set(&gmap->ref_count, 1);
1954da4a 82 page = gmap_alloc_crst();
1e133ab2
MS
83 if (!page)
84 goto out_free;
85 page->index = 0;
86 list_add(&page->lru, &gmap->crst_list);
079f0c21 87 table = page_to_virt(page);
1e133ab2
MS
88 crst_table_init(table, etype);
89 gmap->table = table;
90 gmap->asce = atype | _ASCE_TABLE_LENGTH |
91 _ASCE_USER_BITS | __pa(table);
92 gmap->asce_end = limit;
1e133ab2
MS
93 return gmap;
94
95out_free:
96 kfree(gmap);
97out:
98 return NULL;
99}
6ea427bb
MS
100
101/**
102 * gmap_create - create a guest address space
103 * @mm: pointer to the parent mm_struct
104 * @limit: maximum size of the gmap address space
105 *
106 * Returns a guest address space structure.
107 */
108struct gmap *gmap_create(struct mm_struct *mm, unsigned long limit)
109{
110 struct gmap *gmap;
44b6cc81 111 unsigned long gmap_asce;
6ea427bb
MS
112
113 gmap = gmap_alloc(limit);
114 if (!gmap)
115 return NULL;
116 gmap->mm = mm;
f28a4b4d 117 spin_lock(&mm->context.lock);
6ea427bb 118 list_add_rcu(&gmap->list, &mm->context.gmap_list);
44b6cc81
MS
119 if (list_is_singular(&mm->context.gmap_list))
120 gmap_asce = gmap->asce;
121 else
122 gmap_asce = -1UL;
123 WRITE_ONCE(mm->context.gmap_asce, gmap_asce);
f28a4b4d 124 spin_unlock(&mm->context.lock);
6ea427bb
MS
125 return gmap;
126}
127EXPORT_SYMBOL_GPL(gmap_create);
1e133ab2
MS
128
129static void gmap_flush_tlb(struct gmap *gmap)
130{
131 if (MACHINE_HAS_IDTE)
f0454029 132 __tlb_flush_idte(gmap->asce);
1e133ab2
MS
133 else
134 __tlb_flush_global();
135}
136
137static void gmap_radix_tree_free(struct radix_tree_root *root)
138{
139 struct radix_tree_iter iter;
140 unsigned long indices[16];
141 unsigned long index;
d12a3d60 142 void __rcu **slot;
1e133ab2
MS
143 int i, nr;
144
145 /* A radix tree is freed by deleting all of its entries */
146 index = 0;
147 do {
148 nr = 0;
149 radix_tree_for_each_slot(slot, root, &iter, index) {
150 indices[nr] = iter.index;
151 if (++nr == 16)
152 break;
153 }
154 for (i = 0; i < nr; i++) {
155 index = indices[i];
156 radix_tree_delete(root, index);
157 }
158 } while (nr > 0);
159}
160
4be130a0
MS
161static void gmap_rmap_radix_tree_free(struct radix_tree_root *root)
162{
163 struct gmap_rmap *rmap, *rnext, *head;
164 struct radix_tree_iter iter;
165 unsigned long indices[16];
166 unsigned long index;
d12a3d60 167 void __rcu **slot;
4be130a0
MS
168 int i, nr;
169
170 /* A radix tree is freed by deleting all of its entries */
171 index = 0;
172 do {
173 nr = 0;
174 radix_tree_for_each_slot(slot, root, &iter, index) {
175 indices[nr] = iter.index;
176 if (++nr == 16)
177 break;
178 }
179 for (i = 0; i < nr; i++) {
180 index = indices[i];
181 head = radix_tree_delete(root, index);
182 gmap_for_each_rmap_safe(rmap, rnext, head)
183 kfree(rmap);
184 }
185 } while (nr > 0);
186}
187
1e133ab2
MS
188/**
189 * gmap_free - free a guest address space
190 * @gmap: pointer to the guest address space structure
4be130a0
MS
191 *
192 * No locks required. There are no references to this gmap anymore.
1e133ab2 193 */
6ea427bb 194static void gmap_free(struct gmap *gmap)
1e133ab2
MS
195{
196 struct page *page, *next;
197
eea3678d
DH
198 /* Flush tlb of all gmaps (if not already done for shadows) */
199 if (!(gmap_is_shadow(gmap) && gmap->removed))
200 gmap_flush_tlb(gmap);
1e133ab2
MS
201 /* Free all segment & region tables. */
202 list_for_each_entry_safe(page, next, &gmap->crst_list, lru)
f1c1174f 203 __free_pages(page, CRST_ALLOC_ORDER);
1e133ab2
MS
204 gmap_radix_tree_free(&gmap->guest_to_host);
205 gmap_radix_tree_free(&gmap->host_to_guest);
4be130a0
MS
206
207 /* Free additional data for a shadow gmap */
208 if (gmap_is_shadow(gmap)) {
57b77b75
QZ
209 struct ptdesc *ptdesc, *n;
210
4be130a0 211 /* Free all page tables. */
57b77b75
QZ
212 list_for_each_entry_safe(ptdesc, n, &gmap->pt_list, pt_list)
213 page_table_free_pgste(ptdesc);
4be130a0
MS
214 gmap_rmap_radix_tree_free(&gmap->host_to_rmap);
215 /* Release reference to the parent */
216 gmap_put(gmap->parent);
217 }
218
1e133ab2
MS
219 kfree(gmap);
220}
6ea427bb
MS
221
222/**
223 * gmap_get - increase reference counter for guest address space
224 * @gmap: pointer to the guest address space structure
225 *
226 * Returns the gmap pointer
227 */
228struct gmap *gmap_get(struct gmap *gmap)
229{
40e90656 230 refcount_inc(&gmap->ref_count);
6ea427bb
MS
231 return gmap;
232}
233EXPORT_SYMBOL_GPL(gmap_get);
234
235/**
236 * gmap_put - decrease reference counter for guest address space
237 * @gmap: pointer to the guest address space structure
238 *
239 * If the reference counter reaches zero the guest address space is freed.
240 */
241void gmap_put(struct gmap *gmap)
242{
40e90656 243 if (refcount_dec_and_test(&gmap->ref_count))
6ea427bb
MS
244 gmap_free(gmap);
245}
246EXPORT_SYMBOL_GPL(gmap_put);
247
248/**
249 * gmap_remove - remove a guest address space but do not free it yet
250 * @gmap: pointer to the guest address space structure
251 */
252void gmap_remove(struct gmap *gmap)
253{
4be130a0 254 struct gmap *sg, *next;
44b6cc81 255 unsigned long gmap_asce;
4be130a0 256
4be130a0
MS
257 /* Remove all shadow gmaps linked to this gmap */
258 if (!list_empty(&gmap->children)) {
259 spin_lock(&gmap->shadow_lock);
260 list_for_each_entry_safe(sg, next, &gmap->children, list) {
4be130a0
MS
261 list_del(&sg->list);
262 gmap_put(sg);
263 }
264 spin_unlock(&gmap->shadow_lock);
265 }
6ea427bb 266 /* Remove gmap from the pre-mm list */
f28a4b4d 267 spin_lock(&gmap->mm->context.lock);
6ea427bb 268 list_del_rcu(&gmap->list);
44b6cc81
MS
269 if (list_empty(&gmap->mm->context.gmap_list))
270 gmap_asce = 0;
271 else if (list_is_singular(&gmap->mm->context.gmap_list))
272 gmap_asce = list_first_entry(&gmap->mm->context.gmap_list,
273 struct gmap, list)->asce;
274 else
275 gmap_asce = -1UL;
276 WRITE_ONCE(gmap->mm->context.gmap_asce, gmap_asce);
f28a4b4d 277 spin_unlock(&gmap->mm->context.lock);
6ea427bb
MS
278 synchronize_rcu();
279 /* Put reference */
280 gmap_put(gmap);
281}
282EXPORT_SYMBOL_GPL(gmap_remove);
1e133ab2
MS
283
284/**
285 * gmap_enable - switch primary space to the guest address space
286 * @gmap: pointer to the guest address space structure
287 */
288void gmap_enable(struct gmap *gmap)
289{
208da1d5 290 get_lowcore()->gmap = (unsigned long)gmap;
1e133ab2
MS
291}
292EXPORT_SYMBOL_GPL(gmap_enable);
293
294/**
295 * gmap_disable - switch back to the standard primary address space
296 * @gmap: pointer to the guest address space structure
297 */
298void gmap_disable(struct gmap *gmap)
299{
208da1d5 300 get_lowcore()->gmap = 0UL;
1e133ab2
MS
301}
302EXPORT_SYMBOL_GPL(gmap_disable);
303
37d9df98
DH
304/**
305 * gmap_get_enabled - get a pointer to the currently enabled gmap
306 *
307 * Returns a pointer to the currently enabled gmap. 0 if none is enabled.
308 */
309struct gmap *gmap_get_enabled(void)
310{
208da1d5 311 return (struct gmap *)get_lowcore()->gmap;
37d9df98
DH
312}
313EXPORT_SYMBOL_GPL(gmap_get_enabled);
314
1e133ab2 315/*
c1e8d7c6 316 * gmap_alloc_table is assumed to be called with mmap_lock held
1e133ab2
MS
317 */
318static int gmap_alloc_table(struct gmap *gmap, unsigned long *table,
319 unsigned long init, unsigned long gaddr)
320{
321 struct page *page;
322 unsigned long *new;
323
324 /* since we dont free the gmap table until gmap_free we can unlock */
1954da4a 325 page = gmap_alloc_crst();
1e133ab2
MS
326 if (!page)
327 return -ENOMEM;
079f0c21 328 new = page_to_virt(page);
1e133ab2 329 crst_table_init(new, init);
4be130a0 330 spin_lock(&gmap->guest_table_lock);
1e133ab2
MS
331 if (*table & _REGION_ENTRY_INVALID) {
332 list_add(&page->lru, &gmap->crst_list);
079f0c21 333 *table = __pa(new) | _REGION_ENTRY_LENGTH |
1e133ab2
MS
334 (*table & _REGION_ENTRY_TYPE_MASK);
335 page->index = gaddr;
336 page = NULL;
337 }
4be130a0 338 spin_unlock(&gmap->guest_table_lock);
1e133ab2 339 if (page)
f1c1174f 340 __free_pages(page, CRST_ALLOC_ORDER);
1e133ab2
MS
341 return 0;
342}
343
344/**
345 * __gmap_segment_gaddr - find virtual address from segment pointer
346 * @entry: pointer to a segment table entry in the guest address space
347 *
348 * Returns the virtual address in the guest address space for the segment
349 */
350static unsigned long __gmap_segment_gaddr(unsigned long *entry)
351{
352 struct page *page;
7e25de77 353 unsigned long offset;
1e133ab2
MS
354
355 offset = (unsigned long) entry / sizeof(unsigned long);
356 offset = (offset & (PTRS_PER_PMD - 1)) * PMD_SIZE;
7e25de77 357 page = pmd_pgtable_page((pmd_t *) entry);
1e133ab2
MS
358 return page->index + offset;
359}
360
361/**
362 * __gmap_unlink_by_vmaddr - unlink a single segment via a host address
363 * @gmap: pointer to the guest address space structure
364 * @vmaddr: address in the host process address space
365 *
366 * Returns 1 if a TLB flush is required
367 */
368static int __gmap_unlink_by_vmaddr(struct gmap *gmap, unsigned long vmaddr)
369{
370 unsigned long *entry;
371 int flush = 0;
372
4be130a0 373 BUG_ON(gmap_is_shadow(gmap));
1e133ab2
MS
374 spin_lock(&gmap->guest_table_lock);
375 entry = radix_tree_delete(&gmap->host_to_guest, vmaddr >> PMD_SHIFT);
376 if (entry) {
54397bb0
DD
377 flush = (*entry != _SEGMENT_ENTRY_EMPTY);
378 *entry = _SEGMENT_ENTRY_EMPTY;
1e133ab2
MS
379 }
380 spin_unlock(&gmap->guest_table_lock);
381 return flush;
382}
383
384/**
385 * __gmap_unmap_by_gaddr - unmap a single segment via a guest address
386 * @gmap: pointer to the guest address space structure
387 * @gaddr: address in the guest address space
388 *
389 * Returns 1 if a TLB flush is required
390 */
391static int __gmap_unmap_by_gaddr(struct gmap *gmap, unsigned long gaddr)
392{
393 unsigned long vmaddr;
394
395 vmaddr = (unsigned long) radix_tree_delete(&gmap->guest_to_host,
396 gaddr >> PMD_SHIFT);
397 return vmaddr ? __gmap_unlink_by_vmaddr(gmap, vmaddr) : 0;
398}
399
400/**
401 * gmap_unmap_segment - unmap segment from the guest address space
402 * @gmap: pointer to the guest address space structure
403 * @to: address in the guest address space
404 * @len: length of the memory area to unmap
405 *
406 * Returns 0 if the unmap succeeded, -EINVAL if not.
407 */
408int gmap_unmap_segment(struct gmap *gmap, unsigned long to, unsigned long len)
409{
410 unsigned long off;
411 int flush;
412
4be130a0 413 BUG_ON(gmap_is_shadow(gmap));
1e133ab2
MS
414 if ((to | len) & (PMD_SIZE - 1))
415 return -EINVAL;
416 if (len == 0 || to + len < to)
417 return -EINVAL;
418
419 flush = 0;
d8ed45c5 420 mmap_write_lock(gmap->mm);
1e133ab2
MS
421 for (off = 0; off < len; off += PMD_SIZE)
422 flush |= __gmap_unmap_by_gaddr(gmap, to + off);
d8ed45c5 423 mmap_write_unlock(gmap->mm);
1e133ab2
MS
424 if (flush)
425 gmap_flush_tlb(gmap);
426 return 0;
427}
428EXPORT_SYMBOL_GPL(gmap_unmap_segment);
429
430/**
431 * gmap_map_segment - map a segment to the guest address space
432 * @gmap: pointer to the guest address space structure
433 * @from: source address in the parent address space
434 * @to: target address in the guest address space
435 * @len: length of the memory area to map
436 *
437 * Returns 0 if the mmap succeeded, -EINVAL or -ENOMEM if not.
438 */
439int gmap_map_segment(struct gmap *gmap, unsigned long from,
440 unsigned long to, unsigned long len)
441{
442 unsigned long off;
443 int flush;
444
4be130a0 445 BUG_ON(gmap_is_shadow(gmap));
1e133ab2
MS
446 if ((from | to | len) & (PMD_SIZE - 1))
447 return -EINVAL;
448 if (len == 0 || from + len < from || to + len < to ||
ee71d16d 449 from + len - 1 > TASK_SIZE_MAX || to + len - 1 > gmap->asce_end)
1e133ab2
MS
450 return -EINVAL;
451
452 flush = 0;
d8ed45c5 453 mmap_write_lock(gmap->mm);
1e133ab2
MS
454 for (off = 0; off < len; off += PMD_SIZE) {
455 /* Remove old translation */
456 flush |= __gmap_unmap_by_gaddr(gmap, to + off);
457 /* Store new translation */
458 if (radix_tree_insert(&gmap->guest_to_host,
459 (to + off) >> PMD_SHIFT,
460 (void *) from + off))
461 break;
462 }
d8ed45c5 463 mmap_write_unlock(gmap->mm);
1e133ab2
MS
464 if (flush)
465 gmap_flush_tlb(gmap);
466 if (off >= len)
467 return 0;
468 gmap_unmap_segment(gmap, to, len);
469 return -ENOMEM;
470}
471EXPORT_SYMBOL_GPL(gmap_map_segment);
472
473/**
474 * __gmap_translate - translate a guest address to a user space address
475 * @gmap: pointer to guest mapping meta data structure
476 * @gaddr: guest address
477 *
478 * Returns user space address which corresponds to the guest address or
479 * -EFAULT if no such mapping exists.
480 * This function does not establish potentially missing page table entries.
c1e8d7c6 481 * The mmap_lock of the mm that belongs to the address space must be held
1e133ab2 482 * when this function gets called.
4be130a0
MS
483 *
484 * Note: Can also be called for shadow gmaps.
1e133ab2
MS
485 */
486unsigned long __gmap_translate(struct gmap *gmap, unsigned long gaddr)
487{
488 unsigned long vmaddr;
489
490 vmaddr = (unsigned long)
491 radix_tree_lookup(&gmap->guest_to_host, gaddr >> PMD_SHIFT);
4be130a0 492 /* Note: guest_to_host is empty for a shadow gmap */
1e133ab2
MS
493 return vmaddr ? (vmaddr | (gaddr & ~PMD_MASK)) : -EFAULT;
494}
495EXPORT_SYMBOL_GPL(__gmap_translate);
496
497/**
498 * gmap_translate - translate a guest address to a user space address
499 * @gmap: pointer to guest mapping meta data structure
500 * @gaddr: guest address
501 *
502 * Returns user space address which corresponds to the guest address or
503 * -EFAULT if no such mapping exists.
504 * This function does not establish potentially missing page table entries.
505 */
506unsigned long gmap_translate(struct gmap *gmap, unsigned long gaddr)
507{
508 unsigned long rc;
509
d8ed45c5 510 mmap_read_lock(gmap->mm);
1e133ab2 511 rc = __gmap_translate(gmap, gaddr);
d8ed45c5 512 mmap_read_unlock(gmap->mm);
1e133ab2
MS
513 return rc;
514}
515EXPORT_SYMBOL_GPL(gmap_translate);
516
517/**
518 * gmap_unlink - disconnect a page table from the gmap shadow tables
2e827528 519 * @mm: pointer to the parent mm_struct
1e133ab2
MS
520 * @table: pointer to the host page table
521 * @vmaddr: vm address associated with the host page table
522 */
523void gmap_unlink(struct mm_struct *mm, unsigned long *table,
524 unsigned long vmaddr)
525{
526 struct gmap *gmap;
527 int flush;
528
8ecb1a59
MS
529 rcu_read_lock();
530 list_for_each_entry_rcu(gmap, &mm->context.gmap_list, list) {
1e133ab2
MS
531 flush = __gmap_unlink_by_vmaddr(gmap, vmaddr);
532 if (flush)
533 gmap_flush_tlb(gmap);
534 }
8ecb1a59 535 rcu_read_unlock();
1e133ab2
MS
536}
537
0959e168
JF
538static void gmap_pmdp_xchg(struct gmap *gmap, pmd_t *old, pmd_t new,
539 unsigned long gaddr);
540
1e133ab2 541/**
2e827528 542 * __gmap_link - set up shadow page tables to connect a host to a guest address
1e133ab2
MS
543 * @gmap: pointer to guest mapping meta data structure
544 * @gaddr: guest address
545 * @vmaddr: vm address
546 *
547 * Returns 0 on success, -ENOMEM for out of memory conditions, and -EFAULT
548 * if the vm address is already mapped to a different guest segment.
c1e8d7c6 549 * The mmap_lock of the mm that belongs to the address space must be held
1e133ab2
MS
550 * when this function gets called.
551 */
552int __gmap_link(struct gmap *gmap, unsigned long gaddr, unsigned long vmaddr)
553{
554 struct mm_struct *mm;
555 unsigned long *table;
556 spinlock_t *ptl;
557 pgd_t *pgd;
1aea9b3f 558 p4d_t *p4d;
1e133ab2
MS
559 pud_t *pud;
560 pmd_t *pmd;
0959e168 561 u64 unprot;
1e133ab2
MS
562 int rc;
563
4be130a0 564 BUG_ON(gmap_is_shadow(gmap));
1e133ab2
MS
565 /* Create higher level tables in the gmap page table */
566 table = gmap->table;
567 if ((gmap->asce & _ASCE_TYPE_MASK) >= _ASCE_TYPE_REGION1) {
f1c1174f 568 table += (gaddr & _REGION1_INDEX) >> _REGION1_SHIFT;
1e133ab2
MS
569 if ((*table & _REGION_ENTRY_INVALID) &&
570 gmap_alloc_table(gmap, table, _REGION2_ENTRY_EMPTY,
f1c1174f 571 gaddr & _REGION1_MASK))
1e133ab2 572 return -ENOMEM;
079f0c21 573 table = __va(*table & _REGION_ENTRY_ORIGIN);
1e133ab2
MS
574 }
575 if ((gmap->asce & _ASCE_TYPE_MASK) >= _ASCE_TYPE_REGION2) {
f1c1174f 576 table += (gaddr & _REGION2_INDEX) >> _REGION2_SHIFT;
1e133ab2
MS
577 if ((*table & _REGION_ENTRY_INVALID) &&
578 gmap_alloc_table(gmap, table, _REGION3_ENTRY_EMPTY,
f1c1174f 579 gaddr & _REGION2_MASK))
1e133ab2 580 return -ENOMEM;
079f0c21 581 table = __va(*table & _REGION_ENTRY_ORIGIN);
1e133ab2
MS
582 }
583 if ((gmap->asce & _ASCE_TYPE_MASK) >= _ASCE_TYPE_REGION3) {
f1c1174f 584 table += (gaddr & _REGION3_INDEX) >> _REGION3_SHIFT;
1e133ab2
MS
585 if ((*table & _REGION_ENTRY_INVALID) &&
586 gmap_alloc_table(gmap, table, _SEGMENT_ENTRY_EMPTY,
f1c1174f 587 gaddr & _REGION3_MASK))
1e133ab2 588 return -ENOMEM;
079f0c21 589 table = __va(*table & _REGION_ENTRY_ORIGIN);
1e133ab2 590 }
f1c1174f 591 table += (gaddr & _SEGMENT_INDEX) >> _SEGMENT_SHIFT;
1e133ab2
MS
592 /* Walk the parent mm page table */
593 mm = gmap->mm;
594 pgd = pgd_offset(mm, vmaddr);
595 VM_BUG_ON(pgd_none(*pgd));
1aea9b3f
MS
596 p4d = p4d_offset(pgd, vmaddr);
597 VM_BUG_ON(p4d_none(*p4d));
598 pud = pud_offset(p4d, vmaddr);
1e133ab2 599 VM_BUG_ON(pud_none(*pud));
d08de8e2 600 /* large puds cannot yet be handled */
0a845e0f 601 if (pud_leaf(*pud))
d08de8e2 602 return -EFAULT;
1e133ab2
MS
603 pmd = pmd_offset(pud, vmaddr);
604 VM_BUG_ON(pmd_none(*pmd));
a9e00d83 605 /* Are we allowed to use huge pages? */
2f709f7b 606 if (pmd_leaf(*pmd) && !gmap->mm->context.allow_gmap_hpage_1m)
1e133ab2
MS
607 return -EFAULT;
608 /* Link gmap segment table entry location to page table. */
0cd2a787 609 rc = radix_tree_preload(GFP_KERNEL_ACCOUNT);
1e133ab2
MS
610 if (rc)
611 return rc;
612 ptl = pmd_lock(mm, pmd);
613 spin_lock(&gmap->guest_table_lock);
54397bb0 614 if (*table == _SEGMENT_ENTRY_EMPTY) {
1e133ab2
MS
615 rc = radix_tree_insert(&gmap->host_to_guest,
616 vmaddr >> PMD_SHIFT, table);
58b7e200 617 if (!rc) {
2f709f7b 618 if (pmd_leaf(*pmd)) {
0959e168
JF
619 *table = (pmd_val(*pmd) &
620 _SEGMENT_ENTRY_HARDWARE_BITS_LARGE)
621 | _SEGMENT_ENTRY_GMAP_UC;
58b7e200
JF
622 } else
623 *table = pmd_val(*pmd) &
624 _SEGMENT_ENTRY_HARDWARE_BITS;
625 }
0959e168
JF
626 } else if (*table & _SEGMENT_ENTRY_PROTECT &&
627 !(pmd_val(*pmd) & _SEGMENT_ENTRY_PROTECT)) {
628 unprot = (u64)*table;
629 unprot &= ~_SEGMENT_ENTRY_PROTECT;
630 unprot |= _SEGMENT_ENTRY_GMAP_UC;
631 gmap_pmdp_xchg(gmap, (pmd_t *)table, __pmd(unprot), gaddr);
58b7e200 632 }
1e133ab2
MS
633 spin_unlock(&gmap->guest_table_lock);
634 spin_unlock(ptl);
635 radix_tree_preload_end();
636 return rc;
637}
638
639/**
640 * gmap_fault - resolve a fault on a guest address
641 * @gmap: pointer to guest mapping meta data structure
642 * @gaddr: guest address
643 * @fault_flags: flags to pass down to handle_mm_fault()
644 *
645 * Returns 0 on success, -ENOMEM for out of memory conditions, and -EFAULT
646 * if the vm address is already mapped to a different guest segment.
647 */
648int gmap_fault(struct gmap *gmap, unsigned long gaddr,
649 unsigned int fault_flags)
650{
651 unsigned long vmaddr;
652 int rc;
653 bool unlocked;
654
d8ed45c5 655 mmap_read_lock(gmap->mm);
1e133ab2
MS
656
657retry:
658 unlocked = false;
659 vmaddr = __gmap_translate(gmap, gaddr);
660 if (IS_ERR_VALUE(vmaddr)) {
661 rc = vmaddr;
662 goto out_up;
663 }
64019a2e 664 if (fixup_user_fault(gmap->mm, vmaddr, fault_flags,
1e133ab2
MS
665 &unlocked)) {
666 rc = -EFAULT;
667 goto out_up;
668 }
669 /*
c1e8d7c6 670 * In the case that fixup_user_fault unlocked the mmap_lock during
1e133ab2
MS
671 * faultin redo __gmap_translate to not race with a map/unmap_segment.
672 */
673 if (unlocked)
674 goto retry;
675
676 rc = __gmap_link(gmap, gaddr, vmaddr);
677out_up:
d8ed45c5 678 mmap_read_unlock(gmap->mm);
1e133ab2
MS
679 return rc;
680}
681EXPORT_SYMBOL_GPL(gmap_fault);
682
683/*
c1e8d7c6 684 * this function is assumed to be called with mmap_lock held
1e133ab2
MS
685 */
686void __gmap_zap(struct gmap *gmap, unsigned long gaddr)
687{
2d8fb8f3 688 struct vm_area_struct *vma;
1e133ab2
MS
689 unsigned long vmaddr;
690 spinlock_t *ptl;
691 pte_t *ptep;
692
693 /* Find the vm address for the guest address */
694 vmaddr = (unsigned long) radix_tree_lookup(&gmap->guest_to_host,
695 gaddr >> PMD_SHIFT);
696 if (vmaddr) {
697 vmaddr |= gaddr & ~PMD_MASK;
2d8fb8f3
DH
698
699 vma = vma_lookup(gmap->mm, vmaddr);
700 if (!vma || is_vm_hugetlb_page(vma))
701 return;
702
1e133ab2
MS
703 /* Get pointer to the page table entry */
704 ptep = get_locked_pte(gmap->mm, vmaddr, &ptl);
b159f94c 705 if (likely(ptep)) {
1e133ab2 706 ptep_zap_unused(gmap->mm, vmaddr, ptep, 0);
b159f94c
DH
707 pte_unmap_unlock(ptep, ptl);
708 }
1e133ab2
MS
709 }
710}
711EXPORT_SYMBOL_GPL(__gmap_zap);
712
713void gmap_discard(struct gmap *gmap, unsigned long from, unsigned long to)
714{
715 unsigned long gaddr, vmaddr, size;
716 struct vm_area_struct *vma;
717
d8ed45c5 718 mmap_read_lock(gmap->mm);
1e133ab2
MS
719 for (gaddr = from; gaddr < to;
720 gaddr = (gaddr + PMD_SIZE) & PMD_MASK) {
721 /* Find the vm address for the guest address */
722 vmaddr = (unsigned long)
723 radix_tree_lookup(&gmap->guest_to_host,
724 gaddr >> PMD_SHIFT);
725 if (!vmaddr)
726 continue;
727 vmaddr |= gaddr & ~PMD_MASK;
728 /* Find vma in the parent mm */
729 vma = find_vma(gmap->mm, vmaddr);
1843abd0
JF
730 if (!vma)
731 continue;
7d735b9a
DD
732 /*
733 * We do not discard pages that are backed by
734 * hugetlbfs, so we don't have to refault them.
735 */
1843abd0 736 if (is_vm_hugetlb_page(vma))
7d735b9a 737 continue;
1e133ab2 738 size = min(to - gaddr, PMD_SIZE - (gaddr & ~PMD_MASK));
e9adcfec 739 zap_page_range_single(vma, vmaddr, size, NULL);
1e133ab2 740 }
d8ed45c5 741 mmap_read_unlock(gmap->mm);
1e133ab2
MS
742}
743EXPORT_SYMBOL_GPL(gmap_discard);
744
745static LIST_HEAD(gmap_notifier_list);
746static DEFINE_SPINLOCK(gmap_notifier_lock);
747
748/**
b2d73b2a 749 * gmap_register_pte_notifier - register a pte invalidation callback
1e133ab2
MS
750 * @nb: pointer to the gmap notifier block
751 */
b2d73b2a 752void gmap_register_pte_notifier(struct gmap_notifier *nb)
1e133ab2
MS
753{
754 spin_lock(&gmap_notifier_lock);
8ecb1a59 755 list_add_rcu(&nb->list, &gmap_notifier_list);
1e133ab2
MS
756 spin_unlock(&gmap_notifier_lock);
757}
b2d73b2a 758EXPORT_SYMBOL_GPL(gmap_register_pte_notifier);
1e133ab2
MS
759
760/**
b2d73b2a 761 * gmap_unregister_pte_notifier - remove a pte invalidation callback
1e133ab2
MS
762 * @nb: pointer to the gmap notifier block
763 */
b2d73b2a 764void gmap_unregister_pte_notifier(struct gmap_notifier *nb)
1e133ab2
MS
765{
766 spin_lock(&gmap_notifier_lock);
8ecb1a59 767 list_del_rcu(&nb->list);
1e133ab2 768 spin_unlock(&gmap_notifier_lock);
8ecb1a59 769 synchronize_rcu();
1e133ab2 770}
b2d73b2a 771EXPORT_SYMBOL_GPL(gmap_unregister_pte_notifier);
1e133ab2 772
414d3b07
MS
773/**
774 * gmap_call_notifier - call all registered invalidation callbacks
775 * @gmap: pointer to guest mapping meta data structure
776 * @start: start virtual address in the guest address space
777 * @end: end virtual address in the guest address space
778 */
779static void gmap_call_notifier(struct gmap *gmap, unsigned long start,
780 unsigned long end)
781{
782 struct gmap_notifier *nb;
783
784 list_for_each_entry(nb, &gmap_notifier_list, list)
785 nb->notifier_call(gmap, start, end);
786}
787
1e133ab2 788/**
b2d73b2a
MS
789 * gmap_table_walk - walk the gmap page tables
790 * @gmap: pointer to guest mapping meta data structure
791 * @gaddr: virtual address in the guest address space
4be130a0
MS
792 * @level: page table level to stop at
793 *
794 * Returns a table entry pointer for the given guest address and @level
795 * @level=0 : returns a pointer to a page table table entry (or NULL)
796 * @level=1 : returns a pointer to a segment table entry (or NULL)
797 * @level=2 : returns a pointer to a region-3 table entry (or NULL)
798 * @level=3 : returns a pointer to a region-2 table entry (or NULL)
799 * @level=4 : returns a pointer to a region-1 table entry (or NULL)
800 *
801 * Returns NULL if the gmap page tables could not be walked to the
802 * requested level.
b2d73b2a 803 *
4be130a0 804 * Note: Can also be called for shadow gmaps.
b2d73b2a
MS
805 */
806static inline unsigned long *gmap_table_walk(struct gmap *gmap,
4be130a0 807 unsigned long gaddr, int level)
b2d73b2a 808{
a1d032a4 809 const int asce_type = gmap->asce & _ASCE_TYPE_MASK;
62cf666e 810 unsigned long *table = gmap->table;
b2d73b2a 811
4be130a0
MS
812 if (gmap_is_shadow(gmap) && gmap->removed)
813 return NULL;
a1d032a4 814
62cf666e
DH
815 if (WARN_ON_ONCE(level > (asce_type >> 2) + 1))
816 return NULL;
817
a1d032a4
DH
818 if (asce_type != _ASCE_TYPE_REGION1 &&
819 gaddr & (-1UL << (31 + (asce_type >> 2) * 11)))
4be130a0 820 return NULL;
a1d032a4 821
62cf666e 822 switch (asce_type) {
b2d73b2a 823 case _ASCE_TYPE_REGION1:
f1c1174f 824 table += (gaddr & _REGION1_INDEX) >> _REGION1_SHIFT;
4be130a0
MS
825 if (level == 4)
826 break;
b2d73b2a
MS
827 if (*table & _REGION_ENTRY_INVALID)
828 return NULL;
079f0c21 829 table = __va(*table & _REGION_ENTRY_ORIGIN);
3b684a42 830 fallthrough;
b2d73b2a 831 case _ASCE_TYPE_REGION2:
f1c1174f 832 table += (gaddr & _REGION2_INDEX) >> _REGION2_SHIFT;
4be130a0
MS
833 if (level == 3)
834 break;
b2d73b2a
MS
835 if (*table & _REGION_ENTRY_INVALID)
836 return NULL;
079f0c21 837 table = __va(*table & _REGION_ENTRY_ORIGIN);
3b684a42 838 fallthrough;
b2d73b2a 839 case _ASCE_TYPE_REGION3:
f1c1174f 840 table += (gaddr & _REGION3_INDEX) >> _REGION3_SHIFT;
4be130a0
MS
841 if (level == 2)
842 break;
b2d73b2a
MS
843 if (*table & _REGION_ENTRY_INVALID)
844 return NULL;
079f0c21 845 table = __va(*table & _REGION_ENTRY_ORIGIN);
3b684a42 846 fallthrough;
b2d73b2a 847 case _ASCE_TYPE_SEGMENT:
f1c1174f 848 table += (gaddr & _SEGMENT_INDEX) >> _SEGMENT_SHIFT;
4be130a0
MS
849 if (level == 1)
850 break;
851 if (*table & _REGION_ENTRY_INVALID)
852 return NULL;
079f0c21 853 table = __va(*table & _SEGMENT_ENTRY_ORIGIN);
f1c1174f 854 table += (gaddr & _PAGE_INDEX) >> _PAGE_SHIFT;
b2d73b2a
MS
855 }
856 return table;
857}
858
859/**
860 * gmap_pte_op_walk - walk the gmap page table, get the page table lock
861 * and return the pte pointer
862 * @gmap: pointer to guest mapping meta data structure
863 * @gaddr: virtual address in the guest address space
864 * @ptl: pointer to the spinlock pointer
865 *
866 * Returns a pointer to the locked pte for a guest address, or NULL
867 */
868static pte_t *gmap_pte_op_walk(struct gmap *gmap, unsigned long gaddr,
869 spinlock_t **ptl)
870{
871 unsigned long *table;
872
96965941 873 BUG_ON(gmap_is_shadow(gmap));
b2d73b2a 874 /* Walk the gmap page table, lock and get pte pointer */
4be130a0 875 table = gmap_table_walk(gmap, gaddr, 1); /* get segment pointer */
96965941 876 if (!table || *table & _SEGMENT_ENTRY_INVALID)
b2d73b2a
MS
877 return NULL;
878 return pte_alloc_map_lock(gmap->mm, (pmd_t *) table, gaddr, ptl);
879}
880
881/**
882 * gmap_pte_op_fixup - force a page in and connect the gmap page table
883 * @gmap: pointer to guest mapping meta data structure
884 * @gaddr: virtual address in the guest address space
885 * @vmaddr: address in the host process address space
01f71917 886 * @prot: indicates access rights: PROT_NONE, PROT_READ or PROT_WRITE
b2d73b2a
MS
887 *
888 * Returns 0 if the caller can retry __gmap_translate (might fail again),
889 * -ENOMEM if out of memory and -EFAULT if anything goes wrong while fixing
890 * up or connecting the gmap page table.
891 */
892static int gmap_pte_op_fixup(struct gmap *gmap, unsigned long gaddr,
01f71917 893 unsigned long vmaddr, int prot)
b2d73b2a
MS
894{
895 struct mm_struct *mm = gmap->mm;
01f71917 896 unsigned int fault_flags;
b2d73b2a
MS
897 bool unlocked = false;
898
4be130a0 899 BUG_ON(gmap_is_shadow(gmap));
01f71917 900 fault_flags = (prot == PROT_WRITE) ? FAULT_FLAG_WRITE : 0;
64019a2e 901 if (fixup_user_fault(mm, vmaddr, fault_flags, &unlocked))
b2d73b2a
MS
902 return -EFAULT;
903 if (unlocked)
c1e8d7c6 904 /* lost mmap_lock, caller has to retry __gmap_translate */
b2d73b2a
MS
905 return 0;
906 /* Connect the page tables */
907 return __gmap_link(gmap, gaddr, vmaddr);
1e133ab2 908}
1e133ab2
MS
909
910/**
b2d73b2a 911 * gmap_pte_op_end - release the page table lock
b2f58941
HD
912 * @ptep: pointer to the locked pte
913 * @ptl: pointer to the page table spinlock
b2d73b2a 914 */
b2f58941 915static void gmap_pte_op_end(pte_t *ptep, spinlock_t *ptl)
b2d73b2a 916{
b2f58941 917 pte_unmap_unlock(ptep, ptl);
5a045bb9
JF
918}
919
920/**
921 * gmap_pmd_op_walk - walk the gmap tables, get the guest table lock
922 * and return the pmd pointer
923 * @gmap: pointer to guest mapping meta data structure
924 * @gaddr: virtual address in the guest address space
925 *
926 * Returns a pointer to the pmd for a guest address, or NULL
927 */
928static inline pmd_t *gmap_pmd_op_walk(struct gmap *gmap, unsigned long gaddr)
929{
930 pmd_t *pmdp;
931
932 BUG_ON(gmap_is_shadow(gmap));
5a045bb9 933 pmdp = (pmd_t *) gmap_table_walk(gmap, gaddr, 1);
af4bf6c3
DH
934 if (!pmdp)
935 return NULL;
5a045bb9 936
af4bf6c3
DH
937 /* without huge pages, there is no need to take the table lock */
938 if (!gmap->mm->context.allow_gmap_hpage_1m)
939 return pmd_none(*pmdp) ? NULL : pmdp;
940
941 spin_lock(&gmap->guest_table_lock);
942 if (pmd_none(*pmdp)) {
5a045bb9
JF
943 spin_unlock(&gmap->guest_table_lock);
944 return NULL;
945 }
946
947 /* 4k page table entries are locked via the pte (pte_alloc_map_lock). */
2f709f7b 948 if (!pmd_leaf(*pmdp))
5a045bb9
JF
949 spin_unlock(&gmap->guest_table_lock);
950 return pmdp;
951}
952
953/**
954 * gmap_pmd_op_end - release the guest_table_lock if needed
955 * @gmap: pointer to the guest mapping meta data structure
956 * @pmdp: pointer to the pmd
957 */
958static inline void gmap_pmd_op_end(struct gmap *gmap, pmd_t *pmdp)
959{
2f709f7b 960 if (pmd_leaf(*pmdp))
5a045bb9
JF
961 spin_unlock(&gmap->guest_table_lock);
962}
963
7c4b13a7
JF
964/*
965 * gmap_protect_pmd - remove access rights to memory and set pmd notification bits
966 * @pmdp: pointer to the pmd to be protected
967 * @prot: indicates access rights: PROT_NONE, PROT_READ or PROT_WRITE
968 * @bits: notification bits to set
969 *
970 * Returns:
971 * 0 if successfully protected
972 * -EAGAIN if a fixup is needed
973 * -EINVAL if unsupported notifier bits have been specified
974 *
c1e8d7c6 975 * Expected to be called with sg->mm->mmap_lock in read and
7c4b13a7
JF
976 * guest_table_lock held.
977 */
978static int gmap_protect_pmd(struct gmap *gmap, unsigned long gaddr,
979 pmd_t *pmdp, int prot, unsigned long bits)
980{
981 int pmd_i = pmd_val(*pmdp) & _SEGMENT_ENTRY_INVALID;
982 int pmd_p = pmd_val(*pmdp) & _SEGMENT_ENTRY_PROTECT;
0959e168 983 pmd_t new = *pmdp;
7c4b13a7
JF
984
985 /* Fixup needed */
986 if ((pmd_i && (prot != PROT_NONE)) || (pmd_p && (prot == PROT_WRITE)))
987 return -EAGAIN;
988
0959e168 989 if (prot == PROT_NONE && !pmd_i) {
e1fc74ff 990 new = set_pmd_bit(new, __pgprot(_SEGMENT_ENTRY_INVALID));
0959e168
JF
991 gmap_pmdp_xchg(gmap, pmdp, new, gaddr);
992 }
993
994 if (prot == PROT_READ && !pmd_p) {
e1fc74ff
HC
995 new = clear_pmd_bit(new, __pgprot(_SEGMENT_ENTRY_INVALID));
996 new = set_pmd_bit(new, __pgprot(_SEGMENT_ENTRY_PROTECT));
0959e168
JF
997 gmap_pmdp_xchg(gmap, pmdp, new, gaddr);
998 }
999
7c4b13a7 1000 if (bits & GMAP_NOTIFY_MPROT)
b8e3b379 1001 set_pmd(pmdp, set_pmd_bit(*pmdp, __pgprot(_SEGMENT_ENTRY_GMAP_IN)));
7c4b13a7
JF
1002
1003 /* Shadow GMAP protection needs split PMDs */
1004 if (bits & GMAP_NOTIFY_SHADOW)
1005 return -EINVAL;
1006
1007 return 0;
1008}
1009
5a045bb9
JF
1010/*
1011 * gmap_protect_pte - remove access rights to memory and set pgste bits
1012 * @gmap: pointer to guest mapping meta data structure
1013 * @gaddr: virtual address in the guest address space
1014 * @pmdp: pointer to the pmd associated with the pte
1015 * @prot: indicates access rights: PROT_NONE, PROT_READ or PROT_WRITE
2c46e974 1016 * @bits: notification bits to set
5a045bb9
JF
1017 *
1018 * Returns 0 if successfully protected, -ENOMEM if out of memory and
1019 * -EAGAIN if a fixup is needed.
1020 *
c1e8d7c6 1021 * Expected to be called with sg->mm->mmap_lock in read
5a045bb9
JF
1022 */
1023static int gmap_protect_pte(struct gmap *gmap, unsigned long gaddr,
1024 pmd_t *pmdp, int prot, unsigned long bits)
1025{
1026 int rc;
1027 pte_t *ptep;
b2f58941 1028 spinlock_t *ptl;
2c46e974 1029 unsigned long pbits = 0;
5a045bb9
JF
1030
1031 if (pmd_val(*pmdp) & _SEGMENT_ENTRY_INVALID)
1032 return -EAGAIN;
1033
1034 ptep = pte_alloc_map_lock(gmap->mm, pmdp, gaddr, &ptl);
1035 if (!ptep)
1036 return -ENOMEM;
1037
2c46e974
JF
1038 pbits |= (bits & GMAP_NOTIFY_MPROT) ? PGSTE_IN_BIT : 0;
1039 pbits |= (bits & GMAP_NOTIFY_SHADOW) ? PGSTE_VSIE_BIT : 0;
5a045bb9 1040 /* Protect and unlock. */
2c46e974 1041 rc = ptep_force_prot(gmap->mm, gaddr, ptep, prot, pbits);
b2f58941 1042 gmap_pte_op_end(ptep, ptl);
5a045bb9 1043 return rc;
b2d73b2a
MS
1044}
1045
4be130a0
MS
1046/*
1047 * gmap_protect_range - remove access rights to memory and set pgste bits
1e133ab2
MS
1048 * @gmap: pointer to guest mapping meta data structure
1049 * @gaddr: virtual address in the guest address space
1050 * @len: size of area
4be130a0
MS
1051 * @prot: indicates access rights: PROT_NONE, PROT_READ or PROT_WRITE
1052 * @bits: pgste notification bits to set
1053 *
1054 * Returns 0 if successfully protected, -ENOMEM if out of memory and
1055 * -EFAULT if gaddr is invalid (or mapping for shadows is missing).
1056 *
c1e8d7c6 1057 * Called with sg->mm->mmap_lock in read.
1e133ab2 1058 */
4be130a0
MS
1059static int gmap_protect_range(struct gmap *gmap, unsigned long gaddr,
1060 unsigned long len, int prot, unsigned long bits)
1e133ab2 1061{
7c4b13a7 1062 unsigned long vmaddr, dist;
5a045bb9 1063 pmd_t *pmdp;
4be130a0
MS
1064 int rc;
1065
96965941 1066 BUG_ON(gmap_is_shadow(gmap));
4be130a0
MS
1067 while (len) {
1068 rc = -EAGAIN;
5a045bb9
JF
1069 pmdp = gmap_pmd_op_walk(gmap, gaddr);
1070 if (pmdp) {
2f709f7b 1071 if (!pmd_leaf(*pmdp)) {
7c4b13a7
JF
1072 rc = gmap_protect_pte(gmap, gaddr, pmdp, prot,
1073 bits);
1074 if (!rc) {
1075 len -= PAGE_SIZE;
1076 gaddr += PAGE_SIZE;
1077 }
1078 } else {
1079 rc = gmap_protect_pmd(gmap, gaddr, pmdp, prot,
1080 bits);
1081 if (!rc) {
1082 dist = HPAGE_SIZE - (gaddr & ~HPAGE_MASK);
1083 len = len < dist ? 0 : len - dist;
1084 gaddr = (gaddr & HPAGE_MASK) + HPAGE_SIZE;
1085 }
5a045bb9
JF
1086 }
1087 gmap_pmd_op_end(gmap, pmdp);
4be130a0
MS
1088 }
1089 if (rc) {
7c4b13a7
JF
1090 if (rc == -EINVAL)
1091 return rc;
1092
1093 /* -EAGAIN, fixup of userspace mm and gmap */
4be130a0
MS
1094 vmaddr = __gmap_translate(gmap, gaddr);
1095 if (IS_ERR_VALUE(vmaddr))
1096 return vmaddr;
01f71917 1097 rc = gmap_pte_op_fixup(gmap, gaddr, vmaddr, prot);
4be130a0
MS
1098 if (rc)
1099 return rc;
4be130a0 1100 }
4be130a0
MS
1101 }
1102 return 0;
1103}
1e133ab2 1104
b2d73b2a
MS
1105/**
1106 * gmap_mprotect_notify - change access rights for a range of ptes and
1107 * call the notifier if any pte changes again
1e133ab2
MS
1108 * @gmap: pointer to guest mapping meta data structure
1109 * @gaddr: virtual address in the guest address space
1110 * @len: size of area
b2d73b2a 1111 * @prot: indicates access rights: PROT_NONE, PROT_READ or PROT_WRITE
1e133ab2 1112 *
b2d73b2a
MS
1113 * Returns 0 if for each page in the given range a gmap mapping exists,
1114 * the new access rights could be set and the notifier could be armed.
1115 * If the gmap mapping is missing for one or more pages -EFAULT is
1116 * returned. If no memory could be allocated -ENOMEM is returned.
1117 * This function establishes missing page table entries.
1e133ab2 1118 */
b2d73b2a
MS
1119int gmap_mprotect_notify(struct gmap *gmap, unsigned long gaddr,
1120 unsigned long len, int prot)
1e133ab2 1121{
4be130a0 1122 int rc;
1e133ab2 1123
4be130a0 1124 if ((gaddr & ~PAGE_MASK) || (len & ~PAGE_MASK) || gmap_is_shadow(gmap))
1e133ab2 1125 return -EINVAL;
b2d73b2a 1126 if (!MACHINE_HAS_ESOP && prot == PROT_READ)
1e133ab2 1127 return -EINVAL;
d8ed45c5 1128 mmap_read_lock(gmap->mm);
2c46e974 1129 rc = gmap_protect_range(gmap, gaddr, len, prot, GMAP_NOTIFY_MPROT);
d8ed45c5 1130 mmap_read_unlock(gmap->mm);
4be130a0
MS
1131 return rc;
1132}
1133EXPORT_SYMBOL_GPL(gmap_mprotect_notify);
1134
1135/**
1136 * gmap_read_table - get an unsigned long value from a guest page table using
1137 * absolute addressing, without marking the page referenced.
1138 * @gmap: pointer to guest mapping meta data structure
1139 * @gaddr: virtual address in the guest address space
1140 * @val: pointer to the unsigned long value to return
1141 *
1142 * Returns 0 if the value was read, -ENOMEM if out of memory and -EFAULT
96965941
DH
1143 * if reading using the virtual address failed. -EINVAL if called on a gmap
1144 * shadow.
4be130a0 1145 *
c1e8d7c6 1146 * Called with gmap->mm->mmap_lock in read.
4be130a0
MS
1147 */
1148int gmap_read_table(struct gmap *gmap, unsigned long gaddr, unsigned long *val)
1149{
1150 unsigned long address, vmaddr;
1151 spinlock_t *ptl;
1152 pte_t *ptep, pte;
1153 int rc;
1154
96965941
DH
1155 if (gmap_is_shadow(gmap))
1156 return -EINVAL;
1157
4be130a0 1158 while (1) {
b2d73b2a
MS
1159 rc = -EAGAIN;
1160 ptep = gmap_pte_op_walk(gmap, gaddr, &ptl);
1161 if (ptep) {
4be130a0
MS
1162 pte = *ptep;
1163 if (pte_present(pte) && (pte_val(pte) & _PAGE_READ)) {
1164 address = pte_val(pte) & PAGE_MASK;
1165 address += gaddr & ~PAGE_MASK;
079f0c21 1166 *val = *(unsigned long *)__va(address);
b8e3b379 1167 set_pte(ptep, set_pte_bit(*ptep, __pgprot(_PAGE_YOUNG)));
4be130a0
MS
1168 /* Do *NOT* clear the _PAGE_INVALID bit! */
1169 rc = 0;
1170 }
b2f58941 1171 gmap_pte_op_end(ptep, ptl);
1e133ab2 1172 }
4be130a0
MS
1173 if (!rc)
1174 break;
1175 vmaddr = __gmap_translate(gmap, gaddr);
1176 if (IS_ERR_VALUE(vmaddr)) {
1177 rc = vmaddr;
1e133ab2
MS
1178 break;
1179 }
01f71917 1180 rc = gmap_pte_op_fixup(gmap, gaddr, vmaddr, PROT_READ);
1e133ab2
MS
1181 if (rc)
1182 break;
1e133ab2 1183 }
1e133ab2
MS
1184 return rc;
1185}
4be130a0 1186EXPORT_SYMBOL_GPL(gmap_read_table);
1e133ab2
MS
1187
1188/**
4be130a0
MS
1189 * gmap_insert_rmap - add a rmap to the host_to_rmap radix tree
1190 * @sg: pointer to the shadow guest address space structure
1191 * @vmaddr: vm address associated with the rmap
1192 * @rmap: pointer to the rmap structure
1e133ab2 1193 *
4be130a0 1194 * Called with the sg->guest_table_lock
1e133ab2 1195 */
4be130a0
MS
1196static inline void gmap_insert_rmap(struct gmap *sg, unsigned long vmaddr,
1197 struct gmap_rmap *rmap)
1e133ab2 1198{
a06afe83 1199 struct gmap_rmap *temp;
d12a3d60 1200 void __rcu **slot;
1e133ab2 1201
4be130a0
MS
1202 BUG_ON(!gmap_is_shadow(sg));
1203 slot = radix_tree_lookup_slot(&sg->host_to_rmap, vmaddr >> PAGE_SHIFT);
1204 if (slot) {
1205 rmap->next = radix_tree_deref_slot_protected(slot,
1206 &sg->guest_table_lock);
a06afe83
CB
1207 for (temp = rmap->next; temp; temp = temp->next) {
1208 if (temp->raddr == rmap->raddr) {
1209 kfree(rmap);
1210 return;
1211 }
1212 }
6d75f366 1213 radix_tree_replace_slot(&sg->host_to_rmap, slot, rmap);
4be130a0
MS
1214 } else {
1215 rmap->next = NULL;
1216 radix_tree_insert(&sg->host_to_rmap, vmaddr >> PAGE_SHIFT,
1217 rmap);
1218 }
1219}
1220
1221/**
5c528db0 1222 * gmap_protect_rmap - restrict access rights to memory (RO) and create an rmap
4be130a0
MS
1223 * @sg: pointer to the shadow guest address space structure
1224 * @raddr: rmap address in the shadow gmap
1225 * @paddr: address in the parent guest address space
1226 * @len: length of the memory area to protect
4be130a0
MS
1227 *
1228 * Returns 0 if successfully protected and the rmap was created, -ENOMEM
1229 * if out of memory and -EFAULT if paddr is invalid.
1230 */
1231static int gmap_protect_rmap(struct gmap *sg, unsigned long raddr,
5c528db0 1232 unsigned long paddr, unsigned long len)
4be130a0
MS
1233{
1234 struct gmap *parent;
1235 struct gmap_rmap *rmap;
1236 unsigned long vmaddr;
1237 spinlock_t *ptl;
1238 pte_t *ptep;
1239 int rc;
1240
1241 BUG_ON(!gmap_is_shadow(sg));
1242 parent = sg->parent;
1243 while (len) {
1244 vmaddr = __gmap_translate(parent, paddr);
1245 if (IS_ERR_VALUE(vmaddr))
1246 return vmaddr;
0cd2a787 1247 rmap = kzalloc(sizeof(*rmap), GFP_KERNEL_ACCOUNT);
4be130a0
MS
1248 if (!rmap)
1249 return -ENOMEM;
1250 rmap->raddr = raddr;
0cd2a787 1251 rc = radix_tree_preload(GFP_KERNEL_ACCOUNT);
b2d73b2a 1252 if (rc) {
4be130a0
MS
1253 kfree(rmap);
1254 return rc;
1255 }
1256 rc = -EAGAIN;
1257 ptep = gmap_pte_op_walk(parent, paddr, &ptl);
1258 if (ptep) {
1259 spin_lock(&sg->guest_table_lock);
5c528db0 1260 rc = ptep_force_prot(parent->mm, paddr, ptep, PROT_READ,
4be130a0
MS
1261 PGSTE_VSIE_BIT);
1262 if (!rc)
1263 gmap_insert_rmap(sg, vmaddr, rmap);
1264 spin_unlock(&sg->guest_table_lock);
b2f58941 1265 gmap_pte_op_end(ptep, ptl);
4be130a0
MS
1266 }
1267 radix_tree_preload_end();
1268 if (rc) {
1269 kfree(rmap);
5c528db0 1270 rc = gmap_pte_op_fixup(parent, paddr, vmaddr, PROT_READ);
b2d73b2a 1271 if (rc)
4be130a0 1272 return rc;
1e133ab2 1273 continue;
1e133ab2 1274 }
4be130a0 1275 paddr += PAGE_SIZE;
b2d73b2a 1276 len -= PAGE_SIZE;
1e133ab2 1277 }
4be130a0
MS
1278 return 0;
1279}
1280
1281#define _SHADOW_RMAP_MASK 0x7
1282#define _SHADOW_RMAP_REGION1 0x5
1283#define _SHADOW_RMAP_REGION2 0x4
1284#define _SHADOW_RMAP_REGION3 0x3
1285#define _SHADOW_RMAP_SEGMENT 0x2
1286#define _SHADOW_RMAP_PGTABLE 0x1
1287
1288/**
1289 * gmap_idte_one - invalidate a single region or segment table entry
1290 * @asce: region or segment table *origin* + table-type bits
1291 * @vaddr: virtual address to identify the table entry to flush
1292 *
1293 * The invalid bit of a single region or segment table entry is set
1294 * and the associated TLB entries depending on the entry are flushed.
1295 * The table-type of the @asce identifies the portion of the @vaddr
1296 * that is used as the invalidation index.
1297 */
1298static inline void gmap_idte_one(unsigned long asce, unsigned long vaddr)
1299{
1300 asm volatile(
731efc96 1301 " idte %0,0,%1"
4be130a0
MS
1302 : : "a" (asce), "a" (vaddr) : "cc", "memory");
1303}
1304
1305/**
1306 * gmap_unshadow_page - remove a page from a shadow page table
1307 * @sg: pointer to the shadow guest address space structure
1308 * @raddr: rmap address in the shadow guest address space
1309 *
1310 * Called with the sg->guest_table_lock
1311 */
1312static void gmap_unshadow_page(struct gmap *sg, unsigned long raddr)
1313{
1314 unsigned long *table;
1315
1316 BUG_ON(!gmap_is_shadow(sg));
1317 table = gmap_table_walk(sg, raddr, 0); /* get page table pointer */
1318 if (!table || *table & _PAGE_INVALID)
1319 return;
f1c1174f 1320 gmap_call_notifier(sg, raddr, raddr + _PAGE_SIZE - 1);
4be130a0
MS
1321 ptep_unshadow_pte(sg->mm, raddr, (pte_t *) table);
1322}
1323
1324/**
1325 * __gmap_unshadow_pgt - remove all entries from a shadow page table
1326 * @sg: pointer to the shadow guest address space structure
1327 * @raddr: rmap address in the shadow guest address space
1328 * @pgt: pointer to the start of a shadow page table
1329 *
1330 * Called with the sg->guest_table_lock
1331 */
1332static void __gmap_unshadow_pgt(struct gmap *sg, unsigned long raddr,
1333 unsigned long *pgt)
1334{
1335 int i;
1336
1337 BUG_ON(!gmap_is_shadow(sg));
f1c1174f 1338 for (i = 0; i < _PAGE_ENTRIES; i++, raddr += _PAGE_SIZE)
4be130a0
MS
1339 pgt[i] = _PAGE_INVALID;
1340}
1341
1342/**
1343 * gmap_unshadow_pgt - remove a shadow page table from a segment entry
1344 * @sg: pointer to the shadow guest address space structure
1345 * @raddr: address in the shadow guest address space
1346 *
1347 * Called with the sg->guest_table_lock
1348 */
1349static void gmap_unshadow_pgt(struct gmap *sg, unsigned long raddr)
1350{
079f0c21
NB
1351 unsigned long *ste;
1352 phys_addr_t sto, pgt;
57b77b75 1353 struct ptdesc *ptdesc;
4be130a0
MS
1354
1355 BUG_ON(!gmap_is_shadow(sg));
1356 ste = gmap_table_walk(sg, raddr, 1); /* get segment pointer */
998f637c 1357 if (!ste || !(*ste & _SEGMENT_ENTRY_ORIGIN))
4be130a0 1358 return;
f1c1174f 1359 gmap_call_notifier(sg, raddr, raddr + _SEGMENT_SIZE - 1);
079f0c21 1360 sto = __pa(ste - ((raddr & _SEGMENT_INDEX) >> _SEGMENT_SHIFT));
4be130a0 1361 gmap_idte_one(sto | _ASCE_TYPE_SEGMENT, raddr);
079f0c21 1362 pgt = *ste & _SEGMENT_ENTRY_ORIGIN;
4be130a0 1363 *ste = _SEGMENT_ENTRY_EMPTY;
079f0c21 1364 __gmap_unshadow_pgt(sg, raddr, __va(pgt));
4be130a0 1365 /* Free page table */
57b77b75
QZ
1366 ptdesc = page_ptdesc(phys_to_page(pgt));
1367 list_del(&ptdesc->pt_list);
1368 page_table_free_pgste(ptdesc);
4be130a0
MS
1369}
1370
1371/**
1372 * __gmap_unshadow_sgt - remove all entries from a shadow segment table
1373 * @sg: pointer to the shadow guest address space structure
1374 * @raddr: rmap address in the shadow guest address space
1375 * @sgt: pointer to the start of a shadow segment table
1376 *
1377 * Called with the sg->guest_table_lock
1378 */
1379static void __gmap_unshadow_sgt(struct gmap *sg, unsigned long raddr,
1380 unsigned long *sgt)
1381{
57b77b75 1382 struct ptdesc *ptdesc;
079f0c21 1383 phys_addr_t pgt;
4be130a0
MS
1384 int i;
1385
1386 BUG_ON(!gmap_is_shadow(sg));
f1c1174f 1387 for (i = 0; i < _CRST_ENTRIES; i++, raddr += _SEGMENT_SIZE) {
998f637c 1388 if (!(sgt[i] & _SEGMENT_ENTRY_ORIGIN))
4be130a0 1389 continue;
079f0c21 1390 pgt = sgt[i] & _REGION_ENTRY_ORIGIN;
4be130a0 1391 sgt[i] = _SEGMENT_ENTRY_EMPTY;
079f0c21 1392 __gmap_unshadow_pgt(sg, raddr, __va(pgt));
4be130a0 1393 /* Free page table */
57b77b75
QZ
1394 ptdesc = page_ptdesc(phys_to_page(pgt));
1395 list_del(&ptdesc->pt_list);
1396 page_table_free_pgste(ptdesc);
4be130a0
MS
1397 }
1398}
1399
1400/**
1401 * gmap_unshadow_sgt - remove a shadow segment table from a region-3 entry
1402 * @sg: pointer to the shadow guest address space structure
1403 * @raddr: rmap address in the shadow guest address space
1404 *
1405 * Called with the shadow->guest_table_lock
1406 */
1407static void gmap_unshadow_sgt(struct gmap *sg, unsigned long raddr)
1408{
079f0c21
NB
1409 unsigned long r3o, *r3e;
1410 phys_addr_t sgt;
4be130a0
MS
1411 struct page *page;
1412
1413 BUG_ON(!gmap_is_shadow(sg));
1414 r3e = gmap_table_walk(sg, raddr, 2); /* get region-3 pointer */
998f637c 1415 if (!r3e || !(*r3e & _REGION_ENTRY_ORIGIN))
4be130a0 1416 return;
f1c1174f
HC
1417 gmap_call_notifier(sg, raddr, raddr + _REGION3_SIZE - 1);
1418 r3o = (unsigned long) (r3e - ((raddr & _REGION3_INDEX) >> _REGION3_SHIFT));
079f0c21
NB
1419 gmap_idte_one(__pa(r3o) | _ASCE_TYPE_REGION3, raddr);
1420 sgt = *r3e & _REGION_ENTRY_ORIGIN;
4be130a0 1421 *r3e = _REGION3_ENTRY_EMPTY;
079f0c21 1422 __gmap_unshadow_sgt(sg, raddr, __va(sgt));
4be130a0 1423 /* Free segment table */
079f0c21 1424 page = phys_to_page(sgt);
4be130a0 1425 list_del(&page->lru);
f1c1174f 1426 __free_pages(page, CRST_ALLOC_ORDER);
4be130a0
MS
1427}
1428
1429/**
1430 * __gmap_unshadow_r3t - remove all entries from a shadow region-3 table
1431 * @sg: pointer to the shadow guest address space structure
1432 * @raddr: address in the shadow guest address space
1433 * @r3t: pointer to the start of a shadow region-3 table
1434 *
1435 * Called with the sg->guest_table_lock
1436 */
1437static void __gmap_unshadow_r3t(struct gmap *sg, unsigned long raddr,
1438 unsigned long *r3t)
1439{
4be130a0 1440 struct page *page;
079f0c21 1441 phys_addr_t sgt;
4be130a0
MS
1442 int i;
1443
1444 BUG_ON(!gmap_is_shadow(sg));
f1c1174f 1445 for (i = 0; i < _CRST_ENTRIES; i++, raddr += _REGION3_SIZE) {
998f637c 1446 if (!(r3t[i] & _REGION_ENTRY_ORIGIN))
4be130a0 1447 continue;
079f0c21 1448 sgt = r3t[i] & _REGION_ENTRY_ORIGIN;
4be130a0 1449 r3t[i] = _REGION3_ENTRY_EMPTY;
079f0c21 1450 __gmap_unshadow_sgt(sg, raddr, __va(sgt));
4be130a0 1451 /* Free segment table */
079f0c21 1452 page = phys_to_page(sgt);
4be130a0 1453 list_del(&page->lru);
f1c1174f 1454 __free_pages(page, CRST_ALLOC_ORDER);
4be130a0
MS
1455 }
1456}
1457
1458/**
1459 * gmap_unshadow_r3t - remove a shadow region-3 table from a region-2 entry
1460 * @sg: pointer to the shadow guest address space structure
1461 * @raddr: rmap address in the shadow guest address space
1462 *
1463 * Called with the sg->guest_table_lock
1464 */
1465static void gmap_unshadow_r3t(struct gmap *sg, unsigned long raddr)
1466{
079f0c21
NB
1467 unsigned long r2o, *r2e;
1468 phys_addr_t r3t;
4be130a0
MS
1469 struct page *page;
1470
1471 BUG_ON(!gmap_is_shadow(sg));
1472 r2e = gmap_table_walk(sg, raddr, 3); /* get region-2 pointer */
998f637c 1473 if (!r2e || !(*r2e & _REGION_ENTRY_ORIGIN))
4be130a0 1474 return;
f1c1174f
HC
1475 gmap_call_notifier(sg, raddr, raddr + _REGION2_SIZE - 1);
1476 r2o = (unsigned long) (r2e - ((raddr & _REGION2_INDEX) >> _REGION2_SHIFT));
079f0c21
NB
1477 gmap_idte_one(__pa(r2o) | _ASCE_TYPE_REGION2, raddr);
1478 r3t = *r2e & _REGION_ENTRY_ORIGIN;
4be130a0 1479 *r2e = _REGION2_ENTRY_EMPTY;
079f0c21 1480 __gmap_unshadow_r3t(sg, raddr, __va(r3t));
4be130a0 1481 /* Free region 3 table */
079f0c21 1482 page = phys_to_page(r3t);
4be130a0 1483 list_del(&page->lru);
f1c1174f 1484 __free_pages(page, CRST_ALLOC_ORDER);
4be130a0
MS
1485}
1486
1487/**
1488 * __gmap_unshadow_r2t - remove all entries from a shadow region-2 table
1489 * @sg: pointer to the shadow guest address space structure
1490 * @raddr: rmap address in the shadow guest address space
1491 * @r2t: pointer to the start of a shadow region-2 table
1492 *
1493 * Called with the sg->guest_table_lock
1494 */
1495static void __gmap_unshadow_r2t(struct gmap *sg, unsigned long raddr,
1496 unsigned long *r2t)
1497{
079f0c21 1498 phys_addr_t r3t;
4be130a0
MS
1499 struct page *page;
1500 int i;
1501
1502 BUG_ON(!gmap_is_shadow(sg));
f1c1174f 1503 for (i = 0; i < _CRST_ENTRIES; i++, raddr += _REGION2_SIZE) {
998f637c 1504 if (!(r2t[i] & _REGION_ENTRY_ORIGIN))
4be130a0 1505 continue;
079f0c21 1506 r3t = r2t[i] & _REGION_ENTRY_ORIGIN;
4be130a0 1507 r2t[i] = _REGION2_ENTRY_EMPTY;
079f0c21 1508 __gmap_unshadow_r3t(sg, raddr, __va(r3t));
4be130a0 1509 /* Free region 3 table */
079f0c21 1510 page = phys_to_page(r3t);
4be130a0 1511 list_del(&page->lru);
f1c1174f 1512 __free_pages(page, CRST_ALLOC_ORDER);
4be130a0
MS
1513 }
1514}
1515
1516/**
1517 * gmap_unshadow_r2t - remove a shadow region-2 table from a region-1 entry
1518 * @sg: pointer to the shadow guest address space structure
1519 * @raddr: rmap address in the shadow guest address space
1520 *
1521 * Called with the sg->guest_table_lock
1522 */
1523static void gmap_unshadow_r2t(struct gmap *sg, unsigned long raddr)
1524{
079f0c21 1525 unsigned long r1o, *r1e;
4be130a0 1526 struct page *page;
079f0c21 1527 phys_addr_t r2t;
4be130a0
MS
1528
1529 BUG_ON(!gmap_is_shadow(sg));
1530 r1e = gmap_table_walk(sg, raddr, 4); /* get region-1 pointer */
998f637c 1531 if (!r1e || !(*r1e & _REGION_ENTRY_ORIGIN))
4be130a0 1532 return;
f1c1174f
HC
1533 gmap_call_notifier(sg, raddr, raddr + _REGION1_SIZE - 1);
1534 r1o = (unsigned long) (r1e - ((raddr & _REGION1_INDEX) >> _REGION1_SHIFT));
079f0c21
NB
1535 gmap_idte_one(__pa(r1o) | _ASCE_TYPE_REGION1, raddr);
1536 r2t = *r1e & _REGION_ENTRY_ORIGIN;
4be130a0 1537 *r1e = _REGION1_ENTRY_EMPTY;
079f0c21 1538 __gmap_unshadow_r2t(sg, raddr, __va(r2t));
4be130a0 1539 /* Free region 2 table */
079f0c21 1540 page = phys_to_page(r2t);
4be130a0 1541 list_del(&page->lru);
f1c1174f 1542 __free_pages(page, CRST_ALLOC_ORDER);
4be130a0
MS
1543}
1544
1545/**
1546 * __gmap_unshadow_r1t - remove all entries from a shadow region-1 table
1547 * @sg: pointer to the shadow guest address space structure
1548 * @raddr: rmap address in the shadow guest address space
1549 * @r1t: pointer to the start of a shadow region-1 table
1550 *
1551 * Called with the shadow->guest_table_lock
1552 */
1553static void __gmap_unshadow_r1t(struct gmap *sg, unsigned long raddr,
1554 unsigned long *r1t)
1555{
079f0c21 1556 unsigned long asce;
4be130a0 1557 struct page *page;
079f0c21 1558 phys_addr_t r2t;
4be130a0
MS
1559 int i;
1560
1561 BUG_ON(!gmap_is_shadow(sg));
079f0c21 1562 asce = __pa(r1t) | _ASCE_TYPE_REGION1;
f1c1174f 1563 for (i = 0; i < _CRST_ENTRIES; i++, raddr += _REGION1_SIZE) {
998f637c 1564 if (!(r1t[i] & _REGION_ENTRY_ORIGIN))
4be130a0 1565 continue;
079f0c21
NB
1566 r2t = r1t[i] & _REGION_ENTRY_ORIGIN;
1567 __gmap_unshadow_r2t(sg, raddr, __va(r2t));
4be130a0
MS
1568 /* Clear entry and flush translation r1t -> r2t */
1569 gmap_idte_one(asce, raddr);
1570 r1t[i] = _REGION1_ENTRY_EMPTY;
1571 /* Free region 2 table */
079f0c21 1572 page = phys_to_page(r2t);
4be130a0 1573 list_del(&page->lru);
f1c1174f 1574 __free_pages(page, CRST_ALLOC_ORDER);
4be130a0
MS
1575 }
1576}
1577
1578/**
1579 * gmap_unshadow - remove a shadow page table completely
1580 * @sg: pointer to the shadow guest address space structure
1581 *
1582 * Called with sg->guest_table_lock
1583 */
1584static void gmap_unshadow(struct gmap *sg)
1585{
1586 unsigned long *table;
1587
1588 BUG_ON(!gmap_is_shadow(sg));
1589 if (sg->removed)
1590 return;
1591 sg->removed = 1;
1592 gmap_call_notifier(sg, 0, -1UL);
eea3678d 1593 gmap_flush_tlb(sg);
079f0c21 1594 table = __va(sg->asce & _ASCE_ORIGIN);
4be130a0
MS
1595 switch (sg->asce & _ASCE_TYPE_MASK) {
1596 case _ASCE_TYPE_REGION1:
1597 __gmap_unshadow_r1t(sg, 0, table);
1598 break;
1599 case _ASCE_TYPE_REGION2:
1600 __gmap_unshadow_r2t(sg, 0, table);
1601 break;
1602 case _ASCE_TYPE_REGION3:
1603 __gmap_unshadow_r3t(sg, 0, table);
1604 break;
1605 case _ASCE_TYPE_SEGMENT:
1606 __gmap_unshadow_sgt(sg, 0, table);
1607 break;
1608 }
1609}
1610
1611/**
1612 * gmap_find_shadow - find a specific asce in the list of shadow tables
1613 * @parent: pointer to the parent gmap
1614 * @asce: ASCE for which the shadow table is created
5b062bd4 1615 * @edat_level: edat level to be used for the shadow translation
4be130a0
MS
1616 *
1617 * Returns the pointer to a gmap if a shadow table with the given asce is
0f7f8489
DH
1618 * already available, ERR_PTR(-EAGAIN) if another one is just being created,
1619 * otherwise NULL
4be130a0 1620 */
5b062bd4
DH
1621static struct gmap *gmap_find_shadow(struct gmap *parent, unsigned long asce,
1622 int edat_level)
4be130a0
MS
1623{
1624 struct gmap *sg;
1625
1626 list_for_each_entry(sg, &parent->children, list) {
5b062bd4
DH
1627 if (sg->orig_asce != asce || sg->edat_level != edat_level ||
1628 sg->removed)
4be130a0 1629 continue;
0f7f8489
DH
1630 if (!sg->initialized)
1631 return ERR_PTR(-EAGAIN);
40e90656 1632 refcount_inc(&sg->ref_count);
4be130a0
MS
1633 return sg;
1634 }
1635 return NULL;
1636}
1637
5b6c963b
DH
1638/**
1639 * gmap_shadow_valid - check if a shadow guest address space matches the
1640 * given properties and is still valid
1641 * @sg: pointer to the shadow guest address space structure
1642 * @asce: ASCE for which the shadow table is requested
1643 * @edat_level: edat level to be used for the shadow translation
1644 *
1645 * Returns 1 if the gmap shadow is still valid and matches the given
1646 * properties, the caller can continue using it. Returns 0 otherwise, the
1647 * caller has to request a new shadow gmap in this case.
1648 *
1649 */
1650int gmap_shadow_valid(struct gmap *sg, unsigned long asce, int edat_level)
1651{
1652 if (sg->removed)
1653 return 0;
1654 return sg->orig_asce == asce && sg->edat_level == edat_level;
1655}
1656EXPORT_SYMBOL_GPL(gmap_shadow_valid);
1657
4be130a0
MS
1658/**
1659 * gmap_shadow - create/find a shadow guest address space
1660 * @parent: pointer to the parent gmap
1661 * @asce: ASCE for which the shadow table is created
5b062bd4 1662 * @edat_level: edat level to be used for the shadow translation
4be130a0
MS
1663 *
1664 * The pages of the top level page table referred by the asce parameter
1665 * will be set to read-only and marked in the PGSTEs of the kvm process.
1666 * The shadow table will be removed automatically on any change to the
1667 * PTE mapping for the source table.
1668 *
0f7f8489
DH
1669 * Returns a guest address space structure, ERR_PTR(-ENOMEM) if out of memory,
1670 * ERR_PTR(-EAGAIN) if the caller has to retry and ERR_PTR(-EFAULT) if the
1671 * parent gmap table could not be protected.
4be130a0 1672 */
5b062bd4
DH
1673struct gmap *gmap_shadow(struct gmap *parent, unsigned long asce,
1674 int edat_level)
4be130a0
MS
1675{
1676 struct gmap *sg, *new;
1677 unsigned long limit;
1678 int rc;
1679
a9e00d83 1680 BUG_ON(parent->mm->context.allow_gmap_hpage_1m);
4be130a0
MS
1681 BUG_ON(gmap_is_shadow(parent));
1682 spin_lock(&parent->shadow_lock);
5b062bd4 1683 sg = gmap_find_shadow(parent, asce, edat_level);
4be130a0
MS
1684 spin_unlock(&parent->shadow_lock);
1685 if (sg)
1686 return sg;
1687 /* Create a new shadow gmap */
1688 limit = -1UL >> (33 - (((asce & _ASCE_TYPE_MASK) >> 2) * 11));
3218f709
DH
1689 if (asce & _ASCE_REAL_SPACE)
1690 limit = -1UL;
4be130a0
MS
1691 new = gmap_alloc(limit);
1692 if (!new)
0f7f8489 1693 return ERR_PTR(-ENOMEM);
4be130a0
MS
1694 new->mm = parent->mm;
1695 new->parent = gmap_get(parent);
fe752331 1696 new->private = parent->private;
4be130a0 1697 new->orig_asce = asce;
5b062bd4 1698 new->edat_level = edat_level;
0f7f8489
DH
1699 new->initialized = false;
1700 spin_lock(&parent->shadow_lock);
1701 /* Recheck if another CPU created the same shadow */
5b062bd4 1702 sg = gmap_find_shadow(parent, asce, edat_level);
0f7f8489
DH
1703 if (sg) {
1704 spin_unlock(&parent->shadow_lock);
1705 gmap_free(new);
1706 return sg;
1707 }
717c0555
DH
1708 if (asce & _ASCE_REAL_SPACE) {
1709 /* only allow one real-space gmap shadow */
1710 list_for_each_entry(sg, &parent->children, list) {
1711 if (sg->orig_asce & _ASCE_REAL_SPACE) {
1712 spin_lock(&sg->guest_table_lock);
1713 gmap_unshadow(sg);
1714 spin_unlock(&sg->guest_table_lock);
1715 list_del(&sg->list);
1716 gmap_put(sg);
1717 break;
1718 }
1719 }
1720 }
40e90656 1721 refcount_set(&new->ref_count, 2);
0f7f8489 1722 list_add(&new->list, &parent->children);
3218f709
DH
1723 if (asce & _ASCE_REAL_SPACE) {
1724 /* nothing to protect, return right away */
1725 new->initialized = true;
1726 spin_unlock(&parent->shadow_lock);
1727 return new;
1728 }
0f7f8489
DH
1729 spin_unlock(&parent->shadow_lock);
1730 /* protect after insertion, so it will get properly invalidated */
d8ed45c5 1731 mmap_read_lock(parent->mm);
4be130a0 1732 rc = gmap_protect_range(parent, asce & _ASCE_ORIGIN,
f1c1174f 1733 ((asce & _ASCE_TABLE_LENGTH) + 1) * PAGE_SIZE,
2c46e974 1734 PROT_READ, GMAP_NOTIFY_SHADOW);
d8ed45c5 1735 mmap_read_unlock(parent->mm);
0f7f8489
DH
1736 spin_lock(&parent->shadow_lock);
1737 new->initialized = true;
4be130a0 1738 if (rc) {
0f7f8489 1739 list_del(&new->list);
4be130a0 1740 gmap_free(new);
0f7f8489
DH
1741 new = ERR_PTR(rc);
1742 }
1743 spin_unlock(&parent->shadow_lock);
1744 return new;
4be130a0
MS
1745}
1746EXPORT_SYMBOL_GPL(gmap_shadow);
1747
1748/**
1749 * gmap_shadow_r2t - create an empty shadow region 2 table
1750 * @sg: pointer to the shadow guest address space structure
1751 * @saddr: faulting address in the shadow gmap
1752 * @r2t: parent gmap address of the region 2 table to get shadowed
3218f709 1753 * @fake: r2t references contiguous guest memory block, not a r2t
4be130a0
MS
1754 *
1755 * The r2t parameter specifies the address of the source table. The
1756 * four pages of the source table are made read-only in the parent gmap
1757 * address space. A write to the source table area @r2t will automatically
cada938a 1758 * remove the shadow r2 table and all of its descendants.
4be130a0
MS
1759 *
1760 * Returns 0 if successfully shadowed or already shadowed, -EAGAIN if the
1761 * shadow table structure is incomplete, -ENOMEM if out of memory and
1762 * -EFAULT if an address in the parent gmap could not be resolved.
1763 *
c1e8d7c6 1764 * Called with sg->mm->mmap_lock in read.
4be130a0 1765 */
3218f709
DH
1766int gmap_shadow_r2t(struct gmap *sg, unsigned long saddr, unsigned long r2t,
1767 int fake)
4be130a0
MS
1768{
1769 unsigned long raddr, origin, offset, len;
079f0c21
NB
1770 unsigned long *table;
1771 phys_addr_t s_r2t;
4be130a0
MS
1772 struct page *page;
1773 int rc;
1774
1775 BUG_ON(!gmap_is_shadow(sg));
1776 /* Allocate a shadow region second table */
1954da4a 1777 page = gmap_alloc_crst();
4be130a0
MS
1778 if (!page)
1779 return -ENOMEM;
1780 page->index = r2t & _REGION_ENTRY_ORIGIN;
3218f709
DH
1781 if (fake)
1782 page->index |= GMAP_SHADOW_FAKE_TABLE;
079f0c21 1783 s_r2t = page_to_phys(page);
4be130a0
MS
1784 /* Install shadow region second table */
1785 spin_lock(&sg->guest_table_lock);
1786 table = gmap_table_walk(sg, saddr, 4); /* get region-1 pointer */
1787 if (!table) {
1788 rc = -EAGAIN; /* Race with unshadow */
1789 goto out_free;
1790 }
1791 if (!(*table & _REGION_ENTRY_INVALID)) {
1792 rc = 0; /* Already established */
1793 goto out_free;
998f637c
DH
1794 } else if (*table & _REGION_ENTRY_ORIGIN) {
1795 rc = -EAGAIN; /* Race with shadow */
1796 goto out_free;
4be130a0 1797 }
079f0c21 1798 crst_table_init(__va(s_r2t), _REGION2_ENTRY_EMPTY);
998f637c 1799 /* mark as invalid as long as the parent table is not protected */
079f0c21 1800 *table = s_r2t | _REGION_ENTRY_LENGTH |
998f637c 1801 _REGION_ENTRY_TYPE_R1 | _REGION_ENTRY_INVALID;
fd8d4e3a
DH
1802 if (sg->edat_level >= 1)
1803 *table |= (r2t & _REGION_ENTRY_PROTECT);
4be130a0 1804 list_add(&page->lru, &sg->crst_list);
3218f709
DH
1805 if (fake) {
1806 /* nothing to protect for fake tables */
1807 *table &= ~_REGION_ENTRY_INVALID;
1808 spin_unlock(&sg->guest_table_lock);
1809 return 0;
1810 }
4be130a0
MS
1811 spin_unlock(&sg->guest_table_lock);
1812 /* Make r2t read-only in parent gmap page table */
f1c1174f 1813 raddr = (saddr & _REGION1_MASK) | _SHADOW_RMAP_REGION1;
4be130a0 1814 origin = r2t & _REGION_ENTRY_ORIGIN;
f1c1174f
HC
1815 offset = ((r2t & _REGION_ENTRY_OFFSET) >> 6) * PAGE_SIZE;
1816 len = ((r2t & _REGION_ENTRY_LENGTH) + 1) * PAGE_SIZE - offset;
5c528db0 1817 rc = gmap_protect_rmap(sg, raddr, origin + offset, len);
998f637c
DH
1818 spin_lock(&sg->guest_table_lock);
1819 if (!rc) {
1820 table = gmap_table_walk(sg, saddr, 4);
079f0c21 1821 if (!table || (*table & _REGION_ENTRY_ORIGIN) != s_r2t)
998f637c
DH
1822 rc = -EAGAIN; /* Race with unshadow */
1823 else
1824 *table &= ~_REGION_ENTRY_INVALID;
1825 } else {
4be130a0 1826 gmap_unshadow_r2t(sg, raddr);
4be130a0 1827 }
998f637c 1828 spin_unlock(&sg->guest_table_lock);
4be130a0
MS
1829 return rc;
1830out_free:
1831 spin_unlock(&sg->guest_table_lock);
f1c1174f 1832 __free_pages(page, CRST_ALLOC_ORDER);
1e133ab2
MS
1833 return rc;
1834}
4be130a0
MS
1835EXPORT_SYMBOL_GPL(gmap_shadow_r2t);
1836
1837/**
1838 * gmap_shadow_r3t - create a shadow region 3 table
1839 * @sg: pointer to the shadow guest address space structure
1840 * @saddr: faulting address in the shadow gmap
1841 * @r3t: parent gmap address of the region 3 table to get shadowed
3218f709 1842 * @fake: r3t references contiguous guest memory block, not a r3t
4be130a0
MS
1843 *
1844 * Returns 0 if successfully shadowed or already shadowed, -EAGAIN if the
1845 * shadow table structure is incomplete, -ENOMEM if out of memory and
1846 * -EFAULT if an address in the parent gmap could not be resolved.
1847 *
c1e8d7c6 1848 * Called with sg->mm->mmap_lock in read.
4be130a0 1849 */
3218f709
DH
1850int gmap_shadow_r3t(struct gmap *sg, unsigned long saddr, unsigned long r3t,
1851 int fake)
4be130a0
MS
1852{
1853 unsigned long raddr, origin, offset, len;
079f0c21
NB
1854 unsigned long *table;
1855 phys_addr_t s_r3t;
4be130a0
MS
1856 struct page *page;
1857 int rc;
1858
1859 BUG_ON(!gmap_is_shadow(sg));
1860 /* Allocate a shadow region second table */
1954da4a 1861 page = gmap_alloc_crst();
4be130a0
MS
1862 if (!page)
1863 return -ENOMEM;
1864 page->index = r3t & _REGION_ENTRY_ORIGIN;
3218f709
DH
1865 if (fake)
1866 page->index |= GMAP_SHADOW_FAKE_TABLE;
079f0c21 1867 s_r3t = page_to_phys(page);
4be130a0
MS
1868 /* Install shadow region second table */
1869 spin_lock(&sg->guest_table_lock);
1870 table = gmap_table_walk(sg, saddr, 3); /* get region-2 pointer */
1871 if (!table) {
1872 rc = -EAGAIN; /* Race with unshadow */
1873 goto out_free;
1874 }
1875 if (!(*table & _REGION_ENTRY_INVALID)) {
1876 rc = 0; /* Already established */
1877 goto out_free;
998f637c
DH
1878 } else if (*table & _REGION_ENTRY_ORIGIN) {
1879 rc = -EAGAIN; /* Race with shadow */
1493e0f9 1880 goto out_free;
4be130a0 1881 }
079f0c21 1882 crst_table_init(__va(s_r3t), _REGION3_ENTRY_EMPTY);
998f637c 1883 /* mark as invalid as long as the parent table is not protected */
079f0c21 1884 *table = s_r3t | _REGION_ENTRY_LENGTH |
998f637c 1885 _REGION_ENTRY_TYPE_R2 | _REGION_ENTRY_INVALID;
fd8d4e3a
DH
1886 if (sg->edat_level >= 1)
1887 *table |= (r3t & _REGION_ENTRY_PROTECT);
4be130a0 1888 list_add(&page->lru, &sg->crst_list);
3218f709
DH
1889 if (fake) {
1890 /* nothing to protect for fake tables */
1891 *table &= ~_REGION_ENTRY_INVALID;
1892 spin_unlock(&sg->guest_table_lock);
1893 return 0;
1894 }
4be130a0
MS
1895 spin_unlock(&sg->guest_table_lock);
1896 /* Make r3t read-only in parent gmap page table */
f1c1174f 1897 raddr = (saddr & _REGION2_MASK) | _SHADOW_RMAP_REGION2;
4be130a0 1898 origin = r3t & _REGION_ENTRY_ORIGIN;
f1c1174f
HC
1899 offset = ((r3t & _REGION_ENTRY_OFFSET) >> 6) * PAGE_SIZE;
1900 len = ((r3t & _REGION_ENTRY_LENGTH) + 1) * PAGE_SIZE - offset;
5c528db0 1901 rc = gmap_protect_rmap(sg, raddr, origin + offset, len);
998f637c
DH
1902 spin_lock(&sg->guest_table_lock);
1903 if (!rc) {
1904 table = gmap_table_walk(sg, saddr, 3);
079f0c21 1905 if (!table || (*table & _REGION_ENTRY_ORIGIN) != s_r3t)
998f637c
DH
1906 rc = -EAGAIN; /* Race with unshadow */
1907 else
1908 *table &= ~_REGION_ENTRY_INVALID;
1909 } else {
4be130a0 1910 gmap_unshadow_r3t(sg, raddr);
4be130a0 1911 }
998f637c 1912 spin_unlock(&sg->guest_table_lock);
4be130a0
MS
1913 return rc;
1914out_free:
1915 spin_unlock(&sg->guest_table_lock);
f1c1174f 1916 __free_pages(page, CRST_ALLOC_ORDER);
4be130a0
MS
1917 return rc;
1918}
1919EXPORT_SYMBOL_GPL(gmap_shadow_r3t);
1920
1921/**
1922 * gmap_shadow_sgt - create a shadow segment table
1923 * @sg: pointer to the shadow guest address space structure
1924 * @saddr: faulting address in the shadow gmap
1925 * @sgt: parent gmap address of the segment table to get shadowed
18b89809 1926 * @fake: sgt references contiguous guest memory block, not a sgt
4be130a0
MS
1927 *
1928 * Returns: 0 if successfully shadowed or already shadowed, -EAGAIN if the
1929 * shadow table structure is incomplete, -ENOMEM if out of memory and
1930 * -EFAULT if an address in the parent gmap could not be resolved.
1931 *
c1e8d7c6 1932 * Called with sg->mm->mmap_lock in read.
4be130a0 1933 */
18b89809
DH
1934int gmap_shadow_sgt(struct gmap *sg, unsigned long saddr, unsigned long sgt,
1935 int fake)
4be130a0
MS
1936{
1937 unsigned long raddr, origin, offset, len;
079f0c21
NB
1938 unsigned long *table;
1939 phys_addr_t s_sgt;
4be130a0
MS
1940 struct page *page;
1941 int rc;
1942
18b89809 1943 BUG_ON(!gmap_is_shadow(sg) || (sgt & _REGION3_ENTRY_LARGE));
4be130a0 1944 /* Allocate a shadow segment table */
1954da4a 1945 page = gmap_alloc_crst();
4be130a0
MS
1946 if (!page)
1947 return -ENOMEM;
1948 page->index = sgt & _REGION_ENTRY_ORIGIN;
18b89809
DH
1949 if (fake)
1950 page->index |= GMAP_SHADOW_FAKE_TABLE;
079f0c21 1951 s_sgt = page_to_phys(page);
4be130a0
MS
1952 /* Install shadow region second table */
1953 spin_lock(&sg->guest_table_lock);
1954 table = gmap_table_walk(sg, saddr, 2); /* get region-3 pointer */
1955 if (!table) {
1956 rc = -EAGAIN; /* Race with unshadow */
1957 goto out_free;
1958 }
1959 if (!(*table & _REGION_ENTRY_INVALID)) {
1960 rc = 0; /* Already established */
1961 goto out_free;
998f637c
DH
1962 } else if (*table & _REGION_ENTRY_ORIGIN) {
1963 rc = -EAGAIN; /* Race with shadow */
1964 goto out_free;
4be130a0 1965 }
079f0c21 1966 crst_table_init(__va(s_sgt), _SEGMENT_ENTRY_EMPTY);
998f637c 1967 /* mark as invalid as long as the parent table is not protected */
079f0c21 1968 *table = s_sgt | _REGION_ENTRY_LENGTH |
998f637c 1969 _REGION_ENTRY_TYPE_R3 | _REGION_ENTRY_INVALID;
fd8d4e3a
DH
1970 if (sg->edat_level >= 1)
1971 *table |= sgt & _REGION_ENTRY_PROTECT;
4be130a0 1972 list_add(&page->lru, &sg->crst_list);
18b89809
DH
1973 if (fake) {
1974 /* nothing to protect for fake tables */
1975 *table &= ~_REGION_ENTRY_INVALID;
1976 spin_unlock(&sg->guest_table_lock);
1977 return 0;
1978 }
4be130a0
MS
1979 spin_unlock(&sg->guest_table_lock);
1980 /* Make sgt read-only in parent gmap page table */
f1c1174f 1981 raddr = (saddr & _REGION3_MASK) | _SHADOW_RMAP_REGION3;
4be130a0 1982 origin = sgt & _REGION_ENTRY_ORIGIN;
f1c1174f
HC
1983 offset = ((sgt & _REGION_ENTRY_OFFSET) >> 6) * PAGE_SIZE;
1984 len = ((sgt & _REGION_ENTRY_LENGTH) + 1) * PAGE_SIZE - offset;
5c528db0 1985 rc = gmap_protect_rmap(sg, raddr, origin + offset, len);
998f637c
DH
1986 spin_lock(&sg->guest_table_lock);
1987 if (!rc) {
1988 table = gmap_table_walk(sg, saddr, 2);
079f0c21 1989 if (!table || (*table & _REGION_ENTRY_ORIGIN) != s_sgt)
998f637c
DH
1990 rc = -EAGAIN; /* Race with unshadow */
1991 else
1992 *table &= ~_REGION_ENTRY_INVALID;
1993 } else {
4be130a0 1994 gmap_unshadow_sgt(sg, raddr);
4be130a0 1995 }
998f637c 1996 spin_unlock(&sg->guest_table_lock);
4be130a0
MS
1997 return rc;
1998out_free:
1999 spin_unlock(&sg->guest_table_lock);
f1c1174f 2000 __free_pages(page, CRST_ALLOC_ORDER);
4be130a0
MS
2001 return rc;
2002}
2003EXPORT_SYMBOL_GPL(gmap_shadow_sgt);
2004
2005/**
2e827528 2006 * gmap_shadow_pgt_lookup - find a shadow page table
4be130a0
MS
2007 * @sg: pointer to the shadow guest address space structure
2008 * @saddr: the address in the shadow aguest address space
2009 * @pgt: parent gmap address of the page table to get shadowed
2010 * @dat_protection: if the pgtable is marked as protected by dat
fd8d4e3a 2011 * @fake: pgt references contiguous guest memory block, not a pgtable
4be130a0
MS
2012 *
2013 * Returns 0 if the shadow page table was found and -EAGAIN if the page
2014 * table was not found.
2015 *
c1e8d7c6 2016 * Called with sg->mm->mmap_lock in read.
4be130a0
MS
2017 */
2018int gmap_shadow_pgt_lookup(struct gmap *sg, unsigned long saddr,
fd8d4e3a
DH
2019 unsigned long *pgt, int *dat_protection,
2020 int *fake)
4be130a0
MS
2021{
2022 unsigned long *table;
2023 struct page *page;
2024 int rc;
2025
2026 BUG_ON(!gmap_is_shadow(sg));
2027 spin_lock(&sg->guest_table_lock);
2028 table = gmap_table_walk(sg, saddr, 1); /* get segment pointer */
2029 if (table && !(*table & _SEGMENT_ENTRY_INVALID)) {
2030 /* Shadow page tables are full pages (pte+pgste) */
2031 page = pfn_to_page(*table >> PAGE_SHIFT);
fd8d4e3a 2032 *pgt = page->index & ~GMAP_SHADOW_FAKE_TABLE;
4be130a0 2033 *dat_protection = !!(*table & _SEGMENT_ENTRY_PROTECT);
fd8d4e3a 2034 *fake = !!(page->index & GMAP_SHADOW_FAKE_TABLE);
4be130a0
MS
2035 rc = 0;
2036 } else {
2037 rc = -EAGAIN;
2038 }
2039 spin_unlock(&sg->guest_table_lock);
2040 return rc;
2041
2042}
2043EXPORT_SYMBOL_GPL(gmap_shadow_pgt_lookup);
2044
2045/**
2046 * gmap_shadow_pgt - instantiate a shadow page table
2047 * @sg: pointer to the shadow guest address space structure
2048 * @saddr: faulting address in the shadow gmap
2049 * @pgt: parent gmap address of the page table to get shadowed
fd8d4e3a 2050 * @fake: pgt references contiguous guest memory block, not a pgtable
4be130a0
MS
2051 *
2052 * Returns 0 if successfully shadowed or already shadowed, -EAGAIN if the
2053 * shadow table structure is incomplete, -ENOMEM if out of memory,
2054 * -EFAULT if an address in the parent gmap could not be resolved and
2055 *
c1e8d7c6 2056 * Called with gmap->mm->mmap_lock in read
4be130a0 2057 */
fd8d4e3a
DH
2058int gmap_shadow_pgt(struct gmap *sg, unsigned long saddr, unsigned long pgt,
2059 int fake)
4be130a0
MS
2060{
2061 unsigned long raddr, origin;
079f0c21 2062 unsigned long *table;
57b77b75 2063 struct ptdesc *ptdesc;
079f0c21 2064 phys_addr_t s_pgt;
4be130a0
MS
2065 int rc;
2066
fd8d4e3a 2067 BUG_ON(!gmap_is_shadow(sg) || (pgt & _SEGMENT_ENTRY_LARGE));
4be130a0 2068 /* Allocate a shadow page table */
57b77b75
QZ
2069 ptdesc = page_table_alloc_pgste(sg->mm);
2070 if (!ptdesc)
4be130a0 2071 return -ENOMEM;
57b77b75 2072 ptdesc->pt_index = pgt & _SEGMENT_ENTRY_ORIGIN;
fd8d4e3a 2073 if (fake)
57b77b75
QZ
2074 ptdesc->pt_index |= GMAP_SHADOW_FAKE_TABLE;
2075 s_pgt = page_to_phys(ptdesc_page(ptdesc));
4be130a0
MS
2076 /* Install shadow page table */
2077 spin_lock(&sg->guest_table_lock);
2078 table = gmap_table_walk(sg, saddr, 1); /* get segment pointer */
2079 if (!table) {
2080 rc = -EAGAIN; /* Race with unshadow */
2081 goto out_free;
2082 }
2083 if (!(*table & _SEGMENT_ENTRY_INVALID)) {
2084 rc = 0; /* Already established */
2085 goto out_free;
998f637c
DH
2086 } else if (*table & _SEGMENT_ENTRY_ORIGIN) {
2087 rc = -EAGAIN; /* Race with shadow */
2088 goto out_free;
4be130a0 2089 }
998f637c 2090 /* mark as invalid as long as the parent table is not protected */
4be130a0 2091 *table = (unsigned long) s_pgt | _SEGMENT_ENTRY |
998f637c 2092 (pgt & _SEGMENT_ENTRY_PROTECT) | _SEGMENT_ENTRY_INVALID;
57b77b75 2093 list_add(&ptdesc->pt_list, &sg->pt_list);
fd8d4e3a
DH
2094 if (fake) {
2095 /* nothing to protect for fake tables */
2096 *table &= ~_SEGMENT_ENTRY_INVALID;
2097 spin_unlock(&sg->guest_table_lock);
2098 return 0;
2099 }
4be130a0
MS
2100 spin_unlock(&sg->guest_table_lock);
2101 /* Make pgt read-only in parent gmap page table (not the pgste) */
f1c1174f 2102 raddr = (saddr & _SEGMENT_MASK) | _SHADOW_RMAP_SEGMENT;
4be130a0 2103 origin = pgt & _SEGMENT_ENTRY_ORIGIN & PAGE_MASK;
5c528db0 2104 rc = gmap_protect_rmap(sg, raddr, origin, PAGE_SIZE);
998f637c
DH
2105 spin_lock(&sg->guest_table_lock);
2106 if (!rc) {
2107 table = gmap_table_walk(sg, saddr, 1);
079f0c21 2108 if (!table || (*table & _SEGMENT_ENTRY_ORIGIN) != s_pgt)
998f637c
DH
2109 rc = -EAGAIN; /* Race with unshadow */
2110 else
2111 *table &= ~_SEGMENT_ENTRY_INVALID;
2112 } else {
4be130a0 2113 gmap_unshadow_pgt(sg, raddr);
4be130a0 2114 }
998f637c 2115 spin_unlock(&sg->guest_table_lock);
4be130a0
MS
2116 return rc;
2117out_free:
2118 spin_unlock(&sg->guest_table_lock);
57b77b75 2119 page_table_free_pgste(ptdesc);
4be130a0
MS
2120 return rc;
2121
2122}
2123EXPORT_SYMBOL_GPL(gmap_shadow_pgt);
2124
2125/**
2126 * gmap_shadow_page - create a shadow page mapping
2127 * @sg: pointer to the shadow guest address space structure
2128 * @saddr: faulting address in the shadow gmap
a9d23e71 2129 * @pte: pte in parent gmap address space to get shadowed
4be130a0
MS
2130 *
2131 * Returns 0 if successfully shadowed or already shadowed, -EAGAIN if the
2132 * shadow table structure is incomplete, -ENOMEM if out of memory and
2133 * -EFAULT if an address in the parent gmap could not be resolved.
2134 *
c1e8d7c6 2135 * Called with sg->mm->mmap_lock in read.
4be130a0 2136 */
a9d23e71 2137int gmap_shadow_page(struct gmap *sg, unsigned long saddr, pte_t pte)
4be130a0
MS
2138{
2139 struct gmap *parent;
2140 struct gmap_rmap *rmap;
a9d23e71 2141 unsigned long vmaddr, paddr;
4be130a0
MS
2142 spinlock_t *ptl;
2143 pte_t *sptep, *tptep;
01f71917 2144 int prot;
4be130a0
MS
2145 int rc;
2146
2147 BUG_ON(!gmap_is_shadow(sg));
2148 parent = sg->parent;
01f71917 2149 prot = (pte_val(pte) & _PAGE_PROTECT) ? PROT_READ : PROT_WRITE;
4be130a0 2150
0cd2a787 2151 rmap = kzalloc(sizeof(*rmap), GFP_KERNEL_ACCOUNT);
4be130a0
MS
2152 if (!rmap)
2153 return -ENOMEM;
2154 rmap->raddr = (saddr & PAGE_MASK) | _SHADOW_RMAP_PGTABLE;
2155
2156 while (1) {
a9d23e71 2157 paddr = pte_val(pte) & PAGE_MASK;
4be130a0
MS
2158 vmaddr = __gmap_translate(parent, paddr);
2159 if (IS_ERR_VALUE(vmaddr)) {
2160 rc = vmaddr;
2161 break;
2162 }
0cd2a787 2163 rc = radix_tree_preload(GFP_KERNEL_ACCOUNT);
4be130a0
MS
2164 if (rc)
2165 break;
2166 rc = -EAGAIN;
2167 sptep = gmap_pte_op_walk(parent, paddr, &ptl);
2168 if (sptep) {
2169 spin_lock(&sg->guest_table_lock);
2170 /* Get page table pointer */
2171 tptep = (pte_t *) gmap_table_walk(sg, saddr, 0);
2172 if (!tptep) {
2173 spin_unlock(&sg->guest_table_lock);
b2f58941 2174 gmap_pte_op_end(sptep, ptl);
4be130a0
MS
2175 radix_tree_preload_end();
2176 break;
2177 }
a9d23e71 2178 rc = ptep_shadow_pte(sg->mm, saddr, sptep, tptep, pte);
4be130a0
MS
2179 if (rc > 0) {
2180 /* Success and a new mapping */
2181 gmap_insert_rmap(sg, vmaddr, rmap);
2182 rmap = NULL;
2183 rc = 0;
2184 }
b2f58941 2185 gmap_pte_op_end(sptep, ptl);
4be130a0
MS
2186 spin_unlock(&sg->guest_table_lock);
2187 }
2188 radix_tree_preload_end();
2189 if (!rc)
2190 break;
01f71917 2191 rc = gmap_pte_op_fixup(parent, paddr, vmaddr, prot);
4be130a0
MS
2192 if (rc)
2193 break;
2194 }
2195 kfree(rmap);
2196 return rc;
2197}
2198EXPORT_SYMBOL_GPL(gmap_shadow_page);
2199
2e827528 2200/*
4be130a0
MS
2201 * gmap_shadow_notify - handle notifications for shadow gmap
2202 *
2203 * Called with sg->parent->shadow_lock.
2204 */
2205static void gmap_shadow_notify(struct gmap *sg, unsigned long vmaddr,
c0b4bd21 2206 unsigned long gaddr)
4be130a0
MS
2207{
2208 struct gmap_rmap *rmap, *rnext, *head;
2fa5ed7d 2209 unsigned long start, end, bits, raddr;
4be130a0
MS
2210
2211 BUG_ON(!gmap_is_shadow(sg));
4be130a0
MS
2212
2213 spin_lock(&sg->guest_table_lock);
2214 if (sg->removed) {
2215 spin_unlock(&sg->guest_table_lock);
2216 return;
2217 }
2218 /* Check for top level table */
2219 start = sg->orig_asce & _ASCE_ORIGIN;
f1c1174f 2220 end = start + ((sg->orig_asce & _ASCE_TABLE_LENGTH) + 1) * PAGE_SIZE;
3218f709
DH
2221 if (!(sg->orig_asce & _ASCE_REAL_SPACE) && gaddr >= start &&
2222 gaddr < end) {
4be130a0
MS
2223 /* The complete shadow table has to go */
2224 gmap_unshadow(sg);
2225 spin_unlock(&sg->guest_table_lock);
2226 list_del(&sg->list);
2227 gmap_put(sg);
2228 return;
2229 }
2230 /* Remove the page table tree from on specific entry */
f1c1174f 2231 head = radix_tree_delete(&sg->host_to_rmap, vmaddr >> PAGE_SHIFT);
4be130a0
MS
2232 gmap_for_each_rmap_safe(rmap, rnext, head) {
2233 bits = rmap->raddr & _SHADOW_RMAP_MASK;
2234 raddr = rmap->raddr ^ bits;
2235 switch (bits) {
2236 case _SHADOW_RMAP_REGION1:
2237 gmap_unshadow_r2t(sg, raddr);
2238 break;
2239 case _SHADOW_RMAP_REGION2:
2240 gmap_unshadow_r3t(sg, raddr);
2241 break;
2242 case _SHADOW_RMAP_REGION3:
2243 gmap_unshadow_sgt(sg, raddr);
2244 break;
2245 case _SHADOW_RMAP_SEGMENT:
2246 gmap_unshadow_pgt(sg, raddr);
2247 break;
2248 case _SHADOW_RMAP_PGTABLE:
2249 gmap_unshadow_page(sg, raddr);
2250 break;
2251 }
2252 kfree(rmap);
2253 }
2254 spin_unlock(&sg->guest_table_lock);
2255}
1e133ab2
MS
2256
2257/**
2258 * ptep_notify - call all invalidation callbacks for a specific pte.
2259 * @mm: pointer to the process mm_struct
2e827528 2260 * @vmaddr: virtual address in the process address space
1e133ab2 2261 * @pte: pointer to the page table entry
4be130a0 2262 * @bits: bits from the pgste that caused the notify call
1e133ab2
MS
2263 *
2264 * This function is assumed to be called with the page table lock held
2265 * for the pte to notify.
2266 */
4be130a0
MS
2267void ptep_notify(struct mm_struct *mm, unsigned long vmaddr,
2268 pte_t *pte, unsigned long bits)
1e133ab2 2269{
2fa5ed7d 2270 unsigned long offset, gaddr = 0;
1e133ab2 2271 unsigned long *table;
4be130a0 2272 struct gmap *gmap, *sg, *next;
1e133ab2
MS
2273
2274 offset = ((unsigned long) pte) & (255 * sizeof(pte_t));
f1c1174f 2275 offset = offset * (PAGE_SIZE / sizeof(pte_t));
8ecb1a59
MS
2276 rcu_read_lock();
2277 list_for_each_entry_rcu(gmap, &mm->context.gmap_list, list) {
2278 spin_lock(&gmap->guest_table_lock);
1e133ab2
MS
2279 table = radix_tree_lookup(&gmap->host_to_guest,
2280 vmaddr >> PMD_SHIFT);
8ecb1a59
MS
2281 if (table)
2282 gaddr = __gmap_segment_gaddr(table) + offset;
2283 spin_unlock(&gmap->guest_table_lock);
2fa5ed7d
JF
2284 if (!table)
2285 continue;
2286
2287 if (!list_empty(&gmap->children) && (bits & PGSTE_VSIE_BIT)) {
2288 spin_lock(&gmap->shadow_lock);
2289 list_for_each_entry_safe(sg, next,
2290 &gmap->children, list)
c0b4bd21 2291 gmap_shadow_notify(sg, vmaddr, gaddr);
2fa5ed7d
JF
2292 spin_unlock(&gmap->shadow_lock);
2293 }
2294 if (bits & PGSTE_IN_BIT)
8ecb1a59 2295 gmap_call_notifier(gmap, gaddr, gaddr + PAGE_SIZE - 1);
1e133ab2 2296 }
8ecb1a59 2297 rcu_read_unlock();
1e133ab2
MS
2298}
2299EXPORT_SYMBOL_GPL(ptep_notify);
2300
6a376277
JF
2301static void pmdp_notify_gmap(struct gmap *gmap, pmd_t *pmdp,
2302 unsigned long gaddr)
2303{
b8e3b379 2304 set_pmd(pmdp, clear_pmd_bit(*pmdp, __pgprot(_SEGMENT_ENTRY_GMAP_IN)));
6a376277
JF
2305 gmap_call_notifier(gmap, gaddr, gaddr + HPAGE_SIZE - 1);
2306}
2307
0959e168
JF
2308/**
2309 * gmap_pmdp_xchg - exchange a gmap pmd with another
2310 * @gmap: pointer to the guest address space structure
2311 * @pmdp: pointer to the pmd entry
2312 * @new: replacement entry
2313 * @gaddr: the affected guest address
2314 *
2315 * This function is assumed to be called with the guest_table_lock
2316 * held.
2317 */
2318static void gmap_pmdp_xchg(struct gmap *gmap, pmd_t *pmdp, pmd_t new,
2319 unsigned long gaddr)
2320{
2321 gaddr &= HPAGE_MASK;
2322 pmdp_notify_gmap(gmap, pmdp, gaddr);
e1fc74ff 2323 new = clear_pmd_bit(new, __pgprot(_SEGMENT_ENTRY_GMAP_IN));
0959e168
JF
2324 if (MACHINE_HAS_TLB_GUEST)
2325 __pmdp_idte(gaddr, (pmd_t *)pmdp, IDTE_GUEST_ASCE, gmap->asce,
2326 IDTE_GLOBAL);
2327 else if (MACHINE_HAS_IDTE)
2328 __pmdp_idte(gaddr, (pmd_t *)pmdp, 0, 0, IDTE_GLOBAL);
2329 else
2330 __pmdp_csp(pmdp);
b8e3b379 2331 set_pmd(pmdp, new);
0959e168
JF
2332}
2333
6a376277
JF
2334static void gmap_pmdp_clear(struct mm_struct *mm, unsigned long vmaddr,
2335 int purge)
2336{
2337 pmd_t *pmdp;
2338 struct gmap *gmap;
2339 unsigned long gaddr;
2340
2341 rcu_read_lock();
2342 list_for_each_entry_rcu(gmap, &mm->context.gmap_list, list) {
2343 spin_lock(&gmap->guest_table_lock);
2344 pmdp = (pmd_t *)radix_tree_delete(&gmap->host_to_guest,
2345 vmaddr >> PMD_SHIFT);
2346 if (pmdp) {
2347 gaddr = __gmap_segment_gaddr((unsigned long *)pmdp);
2348 pmdp_notify_gmap(gmap, pmdp, gaddr);
0959e168
JF
2349 WARN_ON(pmd_val(*pmdp) & ~(_SEGMENT_ENTRY_HARDWARE_BITS_LARGE |
2350 _SEGMENT_ENTRY_GMAP_UC));
6a376277
JF
2351 if (purge)
2352 __pmdp_csp(pmdp);
b8e3b379 2353 set_pmd(pmdp, __pmd(_SEGMENT_ENTRY_EMPTY));
6a376277
JF
2354 }
2355 spin_unlock(&gmap->guest_table_lock);
2356 }
2357 rcu_read_unlock();
2358}
2359
2360/**
2361 * gmap_pmdp_invalidate - invalidate all affected guest pmd entries without
2362 * flushing
2363 * @mm: pointer to the process mm_struct
2364 * @vmaddr: virtual address in the process address space
2365 */
2366void gmap_pmdp_invalidate(struct mm_struct *mm, unsigned long vmaddr)
2367{
2368 gmap_pmdp_clear(mm, vmaddr, 0);
2369}
2370EXPORT_SYMBOL_GPL(gmap_pmdp_invalidate);
2371
2372/**
2373 * gmap_pmdp_csp - csp all affected guest pmd entries
2374 * @mm: pointer to the process mm_struct
2375 * @vmaddr: virtual address in the process address space
2376 */
2377void gmap_pmdp_csp(struct mm_struct *mm, unsigned long vmaddr)
2378{
2379 gmap_pmdp_clear(mm, vmaddr, 1);
2380}
2381EXPORT_SYMBOL_GPL(gmap_pmdp_csp);
2382
2383/**
2384 * gmap_pmdp_idte_local - invalidate and clear a guest pmd entry
2385 * @mm: pointer to the process mm_struct
2386 * @vmaddr: virtual address in the process address space
2387 */
2388void gmap_pmdp_idte_local(struct mm_struct *mm, unsigned long vmaddr)
2389{
2390 unsigned long *entry, gaddr;
2391 struct gmap *gmap;
2392 pmd_t *pmdp;
2393
2394 rcu_read_lock();
2395 list_for_each_entry_rcu(gmap, &mm->context.gmap_list, list) {
2396 spin_lock(&gmap->guest_table_lock);
2397 entry = radix_tree_delete(&gmap->host_to_guest,
2398 vmaddr >> PMD_SHIFT);
2399 if (entry) {
2400 pmdp = (pmd_t *)entry;
2401 gaddr = __gmap_segment_gaddr(entry);
2402 pmdp_notify_gmap(gmap, pmdp, gaddr);
0959e168
JF
2403 WARN_ON(*entry & ~(_SEGMENT_ENTRY_HARDWARE_BITS_LARGE |
2404 _SEGMENT_ENTRY_GMAP_UC));
6a376277
JF
2405 if (MACHINE_HAS_TLB_GUEST)
2406 __pmdp_idte(gaddr, pmdp, IDTE_GUEST_ASCE,
2407 gmap->asce, IDTE_LOCAL);
2408 else if (MACHINE_HAS_IDTE)
2409 __pmdp_idte(gaddr, pmdp, 0, 0, IDTE_LOCAL);
2410 *entry = _SEGMENT_ENTRY_EMPTY;
2411 }
2412 spin_unlock(&gmap->guest_table_lock);
2413 }
2414 rcu_read_unlock();
2415}
2416EXPORT_SYMBOL_GPL(gmap_pmdp_idte_local);
2417
2418/**
2419 * gmap_pmdp_idte_global - invalidate and clear a guest pmd entry
2420 * @mm: pointer to the process mm_struct
2421 * @vmaddr: virtual address in the process address space
2422 */
2423void gmap_pmdp_idte_global(struct mm_struct *mm, unsigned long vmaddr)
2424{
2425 unsigned long *entry, gaddr;
2426 struct gmap *gmap;
2427 pmd_t *pmdp;
2428
2429 rcu_read_lock();
2430 list_for_each_entry_rcu(gmap, &mm->context.gmap_list, list) {
2431 spin_lock(&gmap->guest_table_lock);
2432 entry = radix_tree_delete(&gmap->host_to_guest,
2433 vmaddr >> PMD_SHIFT);
2434 if (entry) {
2435 pmdp = (pmd_t *)entry;
2436 gaddr = __gmap_segment_gaddr(entry);
2437 pmdp_notify_gmap(gmap, pmdp, gaddr);
0959e168
JF
2438 WARN_ON(*entry & ~(_SEGMENT_ENTRY_HARDWARE_BITS_LARGE |
2439 _SEGMENT_ENTRY_GMAP_UC));
6a376277
JF
2440 if (MACHINE_HAS_TLB_GUEST)
2441 __pmdp_idte(gaddr, pmdp, IDTE_GUEST_ASCE,
2442 gmap->asce, IDTE_GLOBAL);
2443 else if (MACHINE_HAS_IDTE)
2444 __pmdp_idte(gaddr, pmdp, 0, 0, IDTE_GLOBAL);
2445 else
2446 __pmdp_csp(pmdp);
2447 *entry = _SEGMENT_ENTRY_EMPTY;
2448 }
2449 spin_unlock(&gmap->guest_table_lock);
2450 }
2451 rcu_read_unlock();
2452}
2453EXPORT_SYMBOL_GPL(gmap_pmdp_idte_global);
2454
0959e168
JF
2455/**
2456 * gmap_test_and_clear_dirty_pmd - test and reset segment dirty status
2457 * @gmap: pointer to guest address space
2458 * @pmdp: pointer to the pmd to be tested
2459 * @gaddr: virtual address in the guest address space
2460 *
2461 * This function is assumed to be called with the guest_table_lock
2462 * held.
2463 */
ffbd2685
VG
2464static bool gmap_test_and_clear_dirty_pmd(struct gmap *gmap, pmd_t *pmdp,
2465 unsigned long gaddr)
0959e168
JF
2466{
2467 if (pmd_val(*pmdp) & _SEGMENT_ENTRY_INVALID)
2468 return false;
2469
2470 /* Already protected memory, which did not change is clean */
2471 if (pmd_val(*pmdp) & _SEGMENT_ENTRY_PROTECT &&
2472 !(pmd_val(*pmdp) & _SEGMENT_ENTRY_GMAP_UC))
2473 return false;
2474
2475 /* Clear UC indication and reset protection */
b8e3b379 2476 set_pmd(pmdp, clear_pmd_bit(*pmdp, __pgprot(_SEGMENT_ENTRY_GMAP_UC)));
0959e168
JF
2477 gmap_protect_pmd(gmap, gaddr, pmdp, PROT_READ, 0);
2478 return true;
2479}
2480
2481/**
2482 * gmap_sync_dirty_log_pmd - set bitmap based on dirty status of segment
2483 * @gmap: pointer to guest address space
2484 * @bitmap: dirty bitmap for this pmd
2485 * @gaddr: virtual address in the guest address space
2486 * @vmaddr: virtual address in the host address space
2487 *
2488 * This function is assumed to be called with the guest_table_lock
2489 * held.
2490 */
2491void gmap_sync_dirty_log_pmd(struct gmap *gmap, unsigned long bitmap[4],
2492 unsigned long gaddr, unsigned long vmaddr)
2493{
2494 int i;
2495 pmd_t *pmdp;
2496 pte_t *ptep;
2497 spinlock_t *ptl;
2498
2499 pmdp = gmap_pmd_op_walk(gmap, gaddr);
2500 if (!pmdp)
2501 return;
2502
2f709f7b 2503 if (pmd_leaf(*pmdp)) {
0959e168
JF
2504 if (gmap_test_and_clear_dirty_pmd(gmap, pmdp, gaddr))
2505 bitmap_fill(bitmap, _PAGE_ENTRIES);
2506 } else {
2507 for (i = 0; i < _PAGE_ENTRIES; i++, vmaddr += PAGE_SIZE) {
2508 ptep = pte_alloc_map_lock(gmap->mm, pmdp, vmaddr, &ptl);
2509 if (!ptep)
2510 continue;
2511 if (ptep_test_and_clear_uc(gmap->mm, vmaddr, ptep))
2512 set_bit(i, bitmap);
b2f58941 2513 pte_unmap_unlock(ptep, ptl);
0959e168
JF
2514 }
2515 }
2516 gmap_pmd_op_end(gmap, pmdp);
2517}
2518EXPORT_SYMBOL_GPL(gmap_sync_dirty_log_pmd);
2519
ba925fa3
GS
2520#ifdef CONFIG_TRANSPARENT_HUGEPAGE
2521static int thp_split_walk_pmd_entry(pmd_t *pmd, unsigned long addr,
2522 unsigned long end, struct mm_walk *walk)
2523{
2524 struct vm_area_struct *vma = walk->vma;
2525
2526 split_huge_pmd(vma, pmd, addr);
2527 return 0;
2528}
2529
2530static const struct mm_walk_ops thp_split_walk_ops = {
2531 .pmd_entry = thp_split_walk_pmd_entry,
49b06385 2532 .walk_lock = PGWALK_WRLOCK_VERIFY,
ba925fa3
GS
2533};
2534
1e133ab2
MS
2535static inline void thp_split_mm(struct mm_struct *mm)
2536{
1e133ab2 2537 struct vm_area_struct *vma;
e7b6b990 2538 VMA_ITERATOR(vmi, mm, 0);
1e133ab2 2539
e7b6b990 2540 for_each_vma(vmi, vma) {
1c71222e 2541 vm_flags_mod(vma, VM_NOHUGEPAGE, VM_HUGEPAGE);
ba925fa3 2542 walk_page_vma(vma, &thp_split_walk_ops, NULL);
1e133ab2
MS
2543 }
2544 mm->def_flags |= VM_NOHUGEPAGE;
1e133ab2 2545}
ba925fa3
GS
2546#else
2547static inline void thp_split_mm(struct mm_struct *mm)
2548{
2549}
2550#endif /* CONFIG_TRANSPARENT_HUGEPAGE */
1e133ab2
MS
2551
2552/*
2553 * switch on pgstes for its userspace process (for kvm)
2554 */
2555int s390_enable_sie(void)
2556{
2557 struct mm_struct *mm = current->mm;
2558
2559 /* Do we have pgstes? if yes, we are done */
2560 if (mm_has_pgste(mm))
2561 return 0;
2562 /* Fail if the page tables are 2K */
2563 if (!mm_alloc_pgste(mm))
2564 return -EINVAL;
d8ed45c5 2565 mmap_write_lock(mm);
1e133ab2
MS
2566 mm->context.has_pgste = 1;
2567 /* split thp mappings and disable thp for future mappings */
2568 thp_split_mm(mm);
d8ed45c5 2569 mmap_write_unlock(mm);
1e133ab2
MS
2570 return 0;
2571}
2572EXPORT_SYMBOL_GPL(s390_enable_sie);
2573
06201e00
DH
2574static int find_zeropage_pte_entry(pte_t *pte, unsigned long addr,
2575 unsigned long end, struct mm_walk *walk)
fa0c5eab 2576{
06201e00
DH
2577 unsigned long *found_addr = walk->private;
2578
2579 /* Return 1 of the page is a zeropage. */
2580 if (is_zero_pfn(pte_pfn(*pte))) {
2581 /*
2582 * Shared zeropage in e.g., a FS DAX mapping? We cannot do the
2583 * right thing and likely don't care: FAULT_FLAG_UNSHARE
2584 * currently only works in COW mappings, which is also where
2585 * mm_forbids_zeropage() is checked.
2586 */
2587 if (!is_cow_mapping(walk->vma->vm_flags))
2588 return -EFAULT;
2589
2590 *found_addr = addr;
2591 return 1;
2592 }
2593 return 0;
2594}
2595
2596static const struct mm_walk_ops find_zeropage_ops = {
2597 .pte_entry = find_zeropage_pte_entry,
2598 .walk_lock = PGWALK_WRLOCK,
2599};
2600
2601/*
2602 * Unshare all shared zeropages, replacing them by anonymous pages. Note that
2603 * we cannot simply zap all shared zeropages, because this could later
2604 * trigger unexpected userfaultfd missing events.
2605 *
2606 * This must be called after mm->context.allow_cow_sharing was
2607 * set to 0, to avoid future mappings of shared zeropages.
2608 *
2609 * mm contracts with s390, that even if mm were to remove a page table,
2610 * and racing with walk_page_range_vma() calling pte_offset_map_lock()
2611 * would fail, it will never insert a page table containing empty zero
2612 * pages once mm_forbids_zeropage(mm) i.e.
2613 * mm->context.allow_cow_sharing is set to 0.
2614 */
2615static int __s390_unshare_zeropages(struct mm_struct *mm)
2616{
2617 struct vm_area_struct *vma;
2618 VMA_ITERATOR(vmi, mm, 0);
2619 unsigned long addr;
2620 vm_fault_t fault;
2621 int rc;
2622
2623 for_each_vma(vmi, vma) {
2624 /*
2625 * We could only look at COW mappings, but it's more future
2626 * proof to catch unexpected zeropages in other mappings and
2627 * fail.
2628 */
2629 if ((vma->vm_flags & VM_PFNMAP) || is_vm_hugetlb_page(vma))
2630 continue;
2631 addr = vma->vm_start;
2632
2633retry:
2634 rc = walk_page_range_vma(vma, addr, vma->vm_end,
2635 &find_zeropage_ops, &addr);
2636 if (rc < 0)
2637 return rc;
2638 else if (!rc)
2639 continue;
2640
2641 /* addr was updated by find_zeropage_pte_entry() */
2642 fault = handle_mm_fault(vma, addr,
2643 FAULT_FLAG_UNSHARE | FAULT_FLAG_REMOTE,
2644 NULL);
2645 if (fault & VM_FAULT_OOM)
2646 return -ENOMEM;
2647 /*
2648 * See break_ksm(): even after handle_mm_fault() returned 0, we
2649 * must start the lookup from the current address, because
2650 * handle_mm_fault() may back out if there's any difficulty.
2651 *
2652 * VM_FAULT_SIGBUS and VM_FAULT_SIGSEGV are unexpected but
2653 * maybe they could trigger in the future on concurrent
2654 * truncation. In that case, the shared zeropage would be gone
2655 * and we can simply retry and make progress.
2656 */
2657 cond_resched();
2658 goto retry;
2659 }
2660
2661 return 0;
2662}
2663
2664static int __s390_disable_cow_sharing(struct mm_struct *mm)
2665{
2666 int rc;
2667
2668 if (!mm->context.allow_cow_sharing)
2669 return 0;
2670
2671 mm->context.allow_cow_sharing = 0;
2672
2673 /* Replace all shared zeropages by anonymous pages. */
2674 rc = __s390_unshare_zeropages(mm);
d7597f59
SR
2675 /*
2676 * Make sure to disable KSM (if enabled for the whole process or
2677 * individual VMAs). Note that nothing currently hinders user space
2678 * from re-enabling it.
2679 */
06201e00
DH
2680 if (!rc)
2681 rc = ksm_disable(mm);
2682 if (rc)
2683 mm->context.allow_cow_sharing = 1;
2684 return rc;
2685}
2686
2687/*
2688 * Disable most COW-sharing of memory pages for the whole process:
2689 * (1) Disable KSM and unmerge/unshare any KSM pages.
2690 * (2) Disallow shared zeropages and unshare any zerpages that are mapped.
2691 *
2692 * Not that we currently don't bother with COW-shared pages that are shared
2693 * with parent/child processes due to fork().
2694 */
2695int s390_disable_cow_sharing(void)
2696{
2697 int rc;
2698
2699 mmap_write_lock(current->mm);
2700 rc = __s390_disable_cow_sharing(current->mm);
2701 mmap_write_unlock(current->mm);
2702 return rc;
fa0c5eab 2703}
06201e00 2704EXPORT_SYMBOL_GPL(s390_disable_cow_sharing);
fa0c5eab 2705
1e133ab2
MS
2706/*
2707 * Enable storage key handling from now on and initialize the storage
2708 * keys with the default key.
2709 */
964c2c05
DD
2710static int __s390_enable_skey_pte(pte_t *pte, unsigned long addr,
2711 unsigned long next, struct mm_walk *walk)
1e133ab2 2712{
1e133ab2
MS
2713 /* Clear storage key */
2714 ptep_zap_key(walk->mm, addr, pte);
2715 return 0;
2716}
2717
6d594627
CB
2718/*
2719 * Give a chance to schedule after setting a key to 256 pages.
2720 * We only hold the mm lock, which is a rwsem and the kvm srcu.
2721 * Both can sleep.
2722 */
2723static int __s390_enable_skey_pmd(pmd_t *pmd, unsigned long addr,
2724 unsigned long next, struct mm_walk *walk)
2725{
2726 cond_resched();
2727 return 0;
2728}
2729
964c2c05
DD
2730static int __s390_enable_skey_hugetlb(pte_t *pte, unsigned long addr,
2731 unsigned long hmask, unsigned long next,
2732 struct mm_walk *walk)
2733{
2734 pmd_t *pmd = (pmd_t *)pte;
2735 unsigned long start, end;
1433b36e 2736 struct folio *folio = page_folio(pmd_page(*pmd));
964c2c05
DD
2737
2738 /*
2739 * The write check makes sure we do not set a key on shared
2740 * memory. This is needed as the walker does not differentiate
2741 * between actual guest memory and the process executable or
2742 * shared libraries.
2743 */
2744 if (pmd_val(*pmd) & _SEGMENT_ENTRY_INVALID ||
2745 !(pmd_val(*pmd) & _SEGMENT_ENTRY_WRITE))
2746 return 0;
2747
2748 start = pmd_val(*pmd) & HPAGE_MASK;
843c3280 2749 end = start + HPAGE_SIZE;
964c2c05 2750 __storage_key_init_range(start, end);
1433b36e 2751 set_bit(PG_arch_1, &folio->flags);
6d594627 2752 cond_resched();
964c2c05
DD
2753 return 0;
2754}
2755
7b86ac33
CH
2756static const struct mm_walk_ops enable_skey_walk_ops = {
2757 .hugetlb_entry = __s390_enable_skey_hugetlb,
2758 .pte_entry = __s390_enable_skey_pte,
6d594627 2759 .pmd_entry = __s390_enable_skey_pmd,
49b06385 2760 .walk_lock = PGWALK_WRLOCK,
7b86ac33
CH
2761};
2762
1e133ab2
MS
2763int s390_enable_skey(void)
2764{
1e133ab2 2765 struct mm_struct *mm = current->mm;
1e133ab2
MS
2766 int rc = 0;
2767
d8ed45c5 2768 mmap_write_lock(mm);
55531b74 2769 if (mm_uses_skeys(mm))
1e133ab2
MS
2770 goto out_up;
2771
55531b74 2772 mm->context.uses_skeys = 1;
06201e00 2773 rc = __s390_disable_cow_sharing(mm);
fa0c5eab
JF
2774 if (rc) {
2775 mm->context.uses_skeys = 0;
2776 goto out_up;
1e133ab2 2777 }
7b86ac33 2778 walk_page_range(mm, 0, TASK_SIZE, &enable_skey_walk_ops, NULL);
1e133ab2
MS
2779
2780out_up:
d8ed45c5 2781 mmap_write_unlock(mm);
1e133ab2
MS
2782 return rc;
2783}
2784EXPORT_SYMBOL_GPL(s390_enable_skey);
2785
2786/*
2787 * Reset CMMA state, make all pages stable again.
2788 */
2789static int __s390_reset_cmma(pte_t *pte, unsigned long addr,
2790 unsigned long next, struct mm_walk *walk)
2791{
2792 ptep_zap_unused(walk->mm, addr, pte, 1);
2793 return 0;
2794}
2795
7b86ac33
CH
2796static const struct mm_walk_ops reset_cmma_walk_ops = {
2797 .pte_entry = __s390_reset_cmma,
49b06385 2798 .walk_lock = PGWALK_WRLOCK,
7b86ac33
CH
2799};
2800
1e133ab2
MS
2801void s390_reset_cmma(struct mm_struct *mm)
2802{
d8ed45c5 2803 mmap_write_lock(mm);
7b86ac33 2804 walk_page_range(mm, 0, TASK_SIZE, &reset_cmma_walk_ops, NULL);
d8ed45c5 2805 mmap_write_unlock(mm);
1e133ab2
MS
2806}
2807EXPORT_SYMBOL_GPL(s390_reset_cmma);
12748007 2808
6f73517d
CI
2809#define GATHER_GET_PAGES 32
2810
2811struct reset_walk_state {
2812 unsigned long next;
2813 unsigned long count;
2814 unsigned long pfns[GATHER_GET_PAGES];
2815};
2816
2817static int s390_gather_pages(pte_t *ptep, unsigned long addr,
2818 unsigned long next, struct mm_walk *walk)
12748007 2819{
6f73517d 2820 struct reset_walk_state *p = walk->private;
12748007
CB
2821 pte_t pte = READ_ONCE(*ptep);
2822
6f73517d
CI
2823 if (pte_present(pte)) {
2824 /* we have a reference from the mapping, take an extra one */
2825 get_page(phys_to_page(pte_val(pte)));
2826 p->pfns[p->count] = phys_to_pfn(pte_val(pte));
2827 p->next = next;
2828 p->count++;
2829 }
2830 return p->count >= GATHER_GET_PAGES;
12748007
CB
2831}
2832
6f73517d
CI
2833static const struct mm_walk_ops gather_pages_ops = {
2834 .pte_entry = s390_gather_pages,
49b06385 2835 .walk_lock = PGWALK_RDLOCK,
12748007
CB
2836};
2837
6f73517d
CI
2838/*
2839 * Call the Destroy secure page UVC on each page in the given array of PFNs.
2840 * Each page needs to have an extra reference, which will be released here.
2841 */
2842void s390_uv_destroy_pfns(unsigned long count, unsigned long *pfns)
12748007 2843{
70631506 2844 struct folio *folio;
6f73517d
CI
2845 unsigned long i;
2846
2847 for (i = 0; i < count; i++) {
70631506 2848 folio = pfn_folio(pfns[i]);
6f73517d 2849 /* we always have an extra reference */
70631506 2850 uv_destroy_folio(folio);
6f73517d 2851 /* get rid of the extra reference */
70631506 2852 folio_put(folio);
6f73517d
CI
2853 cond_resched();
2854 }
2855}
2856EXPORT_SYMBOL_GPL(s390_uv_destroy_pfns);
2857
2858/**
2859 * __s390_uv_destroy_range - Call the destroy secure page UVC on each page
2860 * in the given range of the given address space.
2861 * @mm: the mm to operate on
2862 * @start: the start of the range
2863 * @end: the end of the range
2864 * @interruptible: if not 0, stop when a fatal signal is received
2865 *
2866 * Walk the given range of the given address space and call the destroy
2867 * secure page UVC on each page. Optionally exit early if a fatal signal is
2868 * pending.
2869 *
2870 * Return: 0 on success, -EINTR if the function stopped before completing
2871 */
2872int __s390_uv_destroy_range(struct mm_struct *mm, unsigned long start,
2873 unsigned long end, bool interruptible)
2874{
2875 struct reset_walk_state state = { .next = start };
2876 int r = 1;
2877
2878 while (r > 0) {
2879 state.count = 0;
2880 mmap_read_lock(mm);
2881 r = walk_page_range(mm, state.next, end, &gather_pages_ops, &state);
2882 mmap_read_unlock(mm);
2883 cond_resched();
2884 s390_uv_destroy_pfns(state.count, state.pfns);
2885 if (interruptible && fatal_signal_pending(current))
2886 return -EINTR;
2887 }
2888 return 0;
12748007 2889}
6f73517d 2890EXPORT_SYMBOL_GPL(__s390_uv_destroy_range);
faa2f72c
CI
2891
2892/**
2893 * s390_unlist_old_asce - Remove the topmost level of page tables from the
2894 * list of page tables of the gmap.
2895 * @gmap: the gmap whose table is to be removed
2896 *
2897 * On s390x, KVM keeps a list of all pages containing the page tables of the
2898 * gmap (the CRST list). This list is used at tear down time to free all
2899 * pages that are now not needed anymore.
2900 *
2901 * This function removes the topmost page of the tree (the one pointed to by
2902 * the ASCE) from the CRST list.
2903 *
2904 * This means that it will not be freed when the VM is torn down, and needs
2905 * to be handled separately by the caller, unless a leak is actually
2906 * intended. Notice that this function will only remove the page from the
2907 * list, the page will still be used as a top level page table (and ASCE).
2908 */
2909void s390_unlist_old_asce(struct gmap *gmap)
2910{
2911 struct page *old;
2912
2913 old = virt_to_page(gmap->table);
2914 spin_lock(&gmap->guest_table_lock);
2915 list_del(&old->lru);
2916 /*
2917 * Sometimes the topmost page might need to be "removed" multiple
2918 * times, for example if the VM is rebooted into secure mode several
2919 * times concurrently, or if s390_replace_asce fails after calling
2920 * s390_remove_old_asce and is attempted again later. In that case
2921 * the old asce has been removed from the list, and therefore it
2922 * will not be freed when the VM terminates, but the ASCE is still
2923 * in use and still pointed to.
2924 * A subsequent call to replace_asce will follow the pointer and try
2925 * to remove the same page from the list again.
2926 * Therefore it's necessary that the page of the ASCE has valid
2927 * pointers, so list_del can work (and do nothing) without
2928 * dereferencing stale or invalid pointers.
2929 */
2930 INIT_LIST_HEAD(&old->lru);
2931 spin_unlock(&gmap->guest_table_lock);
2932}
2933EXPORT_SYMBOL_GPL(s390_unlist_old_asce);
2934
2935/**
2936 * s390_replace_asce - Try to replace the current ASCE of a gmap with a copy
2937 * @gmap: the gmap whose ASCE needs to be replaced
2938 *
292a7d6f
CI
2939 * If the ASCE is a SEGMENT type then this function will return -EINVAL,
2940 * otherwise the pointers in the host_to_guest radix tree will keep pointing
2941 * to the wrong pages, causing use-after-free and memory corruption.
faa2f72c
CI
2942 * If the allocation of the new top level page table fails, the ASCE is not
2943 * replaced.
2944 * In any case, the old ASCE is always removed from the gmap CRST list.
2945 * Therefore the caller has to make sure to save a pointer to it
2946 * beforehand, unless a leak is actually intended.
2947 */
2948int s390_replace_asce(struct gmap *gmap)
2949{
2950 unsigned long asce;
2951 struct page *page;
2952 void *table;
2953
2954 s390_unlist_old_asce(gmap);
2955
292a7d6f
CI
2956 /* Replacing segment type ASCEs would cause serious issues */
2957 if ((gmap->asce & _ASCE_TYPE_MASK) == _ASCE_TYPE_SEGMENT)
2958 return -EINVAL;
2959
1954da4a 2960 page = gmap_alloc_crst();
faa2f72c
CI
2961 if (!page)
2962 return -ENOMEM;
c2fceb59 2963 page->index = 0;
faa2f72c
CI
2964 table = page_to_virt(page);
2965 memcpy(table, gmap->table, 1UL << (CRST_ALLOC_ORDER + PAGE_SHIFT));
2966
2967 /*
2968 * The caller has to deal with the old ASCE, but here we make sure
2969 * the new one is properly added to the CRST list, so that
2970 * it will be freed when the VM is torn down.
2971 */
2972 spin_lock(&gmap->guest_table_lock);
2973 list_add(&page->lru, &gmap->crst_list);
2974 spin_unlock(&gmap->guest_table_lock);
2975
2976 /* Set new table origin while preserving existing ASCE control bits */
2977 asce = (gmap->asce & ~_ASCE_ORIGIN) | __pa(table);
2978 WRITE_ONCE(gmap->asce, asce);
2979 WRITE_ONCE(gmap->mm->context.gmap_asce, asce);
2980 WRITE_ONCE(gmap->table, table);
2981
2982 return 0;
2983}
2984EXPORT_SYMBOL_GPL(s390_replace_asce);