blob: 1a162e559753b5ef97def181ad94f574eac28218 [file] [log] [blame]
Greg Kroah-Hartmanb2441312017-11-01 15:07:57 +01001/* SPDX-License-Identifier: GPL-2.0 */
H. Peter Anvin05e4d312008-10-23 00:01:39 -07002#ifndef _ASM_X86_XEN_PAGE_H
3#define _ASM_X86_XEN_PAGE_H
Isaku Yamahata20e71f2e2008-04-02 10:53:58 -07004
Jeremy Fitzhardingeecbf29c2008-12-16 12:37:07 -08005#include <linux/kernel.h>
6#include <linux/types.h>
7#include <linux/spinlock.h>
Isaku Yamahata20e71f2e2008-04-02 10:53:58 -07008#include <linux/pfn.h>
Ian Campbell7e775062010-09-30 12:37:26 +01009#include <linux/mm.h>
Ingo Molnar7fd5cf02017-01-30 10:01:20 +010010#include <linux/device.h>
Isaku Yamahata20e71f2e2008-04-02 10:53:58 -070011
Juergen Gross1457d8c2018-11-07 18:01:00 +010012#include <asm/extable.h>
Jeremy Fitzhardingeecbf29c2008-12-16 12:37:07 -080013#include <asm/page.h>
Isaku Yamahata20e71f2e2008-04-02 10:53:58 -070014
Jeremy Fitzhardingeecbf29c2008-12-16 12:37:07 -080015#include <xen/interface/xen.h>
Julien Grall008c3202015-06-19 17:49:03 +010016#include <xen/interface/grant_table.h>
Isaku Yamahata20e71f2e2008-04-02 10:53:58 -070017#include <xen/features.h>
18
19/* Xen machine address */
20typedef struct xmaddr {
21 phys_addr_t maddr;
22} xmaddr_t;
23
24/* Xen pseudo-physical address */
25typedef struct xpaddr {
26 phys_addr_t paddr;
27} xpaddr_t;
28
Juergen Gross6f0e8bf2017-10-27 19:49:37 +020029#ifdef CONFIG_X86_64
30#define XEN_PHYSICAL_MASK __sme_clr((1UL << 52) - 1)
31#else
32#define XEN_PHYSICAL_MASK __PHYSICAL_MASK
33#endif
34
35#define XEN_PTE_MFN_MASK ((pteval_t)(((signed long)PAGE_MASK) & \
36 XEN_PHYSICAL_MASK))
37
Isaku Yamahata20e71f2e2008-04-02 10:53:58 -070038#define XMADDR(x) ((xmaddr_t) { .maddr = (x) })
39#define XPADDR(x) ((xpaddr_t) { .paddr = (x) })
40
41/**** MACHINE <-> PHYSICAL CONVERSION MACROS ****/
42#define INVALID_P2M_ENTRY (~0UL)
Konrad Rzeszutek Wilkf4cec352011-01-18 20:15:21 -050043#define FOREIGN_FRAME_BIT (1UL<<(BITS_PER_LONG-1))
44#define IDENTITY_FRAME_BIT (1UL<<(BITS_PER_LONG-2))
Isaku Yamahata20e71f2e2008-04-02 10:53:58 -070045#define FOREIGN_FRAME(m) ((m) | FOREIGN_FRAME_BIT)
Konrad Rzeszutek Wilkf4cec352011-01-18 20:15:21 -050046#define IDENTITY_FRAME(m) ((m) | IDENTITY_FRAME_BIT)
Isaku Yamahata20e71f2e2008-04-02 10:53:58 -070047
Juergen Grosscb3eb852015-07-17 06:51:37 +020048#define P2M_PER_PAGE (PAGE_SIZE / sizeof(unsigned long))
49
Ian Campbell7e775062010-09-30 12:37:26 +010050extern unsigned long *machine_to_phys_mapping;
Jan Beulichccbcdf72011-08-16 15:07:41 +010051extern unsigned long machine_to_phys_nr;
Juergen Gross5b8e7d82014-11-28 11:53:55 +010052extern unsigned long *xen_p2m_addr;
53extern unsigned long xen_p2m_size;
54extern unsigned long xen_max_p2m_pfn;
Jeremy Fitzhardinge8006ec32008-05-26 23:31:19 +010055
David Vrabel8edfcf82015-07-22 14:48:09 +010056extern int xen_alloc_p2m_entry(unsigned long pfn);
57
Jeremy Fitzhardinged451bb72008-05-26 23:31:18 +010058extern unsigned long get_phys_to_machine(unsigned long pfn);
Jeremy Fitzhardingec3798062010-08-27 13:42:04 -070059extern bool set_phys_to_machine(unsigned long pfn, unsigned long mfn);
Konrad Rzeszutek Wilk6eaa4122011-01-18 20:09:41 -050060extern bool __set_phys_to_machine(unsigned long pfn, unsigned long mfn);
Juergen Grosscb3eb852015-07-17 06:51:37 +020061extern unsigned long __init set_phys_range_identity(unsigned long pfn_s,
62 unsigned long pfn_e);
Isaku Yamahata20e71f2e2008-04-02 10:53:58 -070063
Vitaly Kuznetsov3d4ebdb2017-03-14 18:35:52 +010064#ifdef CONFIG_XEN_PV
Zoltan Kiss1429d462014-02-27 15:55:30 +000065extern int set_foreign_p2m_mapping(struct gnttab_map_grant_ref *map_ops,
66 struct gnttab_map_grant_ref *kmap_ops,
67 struct page **pages, unsigned int count);
Zoltan Kiss1429d462014-02-27 15:55:30 +000068extern int clear_foreign_p2m_mapping(struct gnttab_unmap_grant_ref *unmap_ops,
David Vrabel853d0282015-01-05 14:13:41 +000069 struct gnttab_unmap_grant_ref *kunmap_ops,
Zoltan Kiss1429d462014-02-27 15:55:30 +000070 struct page **pages, unsigned int count);
Vitaly Kuznetsov3d4ebdb2017-03-14 18:35:52 +010071#else
72static inline int
73set_foreign_p2m_mapping(struct gnttab_map_grant_ref *map_ops,
74 struct gnttab_map_grant_ref *kmap_ops,
75 struct page **pages, unsigned int count)
76{
77 return 0;
78}
79
80static inline int
81clear_foreign_p2m_mapping(struct gnttab_unmap_grant_ref *unmap_ops,
82 struct gnttab_unmap_grant_ref *kunmap_ops,
83 struct page **pages, unsigned int count)
84{
85 return 0;
86}
87#endif
Jeremy Fitzhardinge448f28312010-12-15 13:19:33 +000088
Juergen Gross0aad5682014-11-28 11:53:57 +010089/*
Juergen Gross90fff3e2014-12-05 13:28:04 +010090 * Helper functions to write or read unsigned long values to/from
91 * memory, when the access may fault.
92 */
93static inline int xen_safe_write_ulong(unsigned long *addr, unsigned long val)
94{
Juergen Gross1457d8c2018-11-07 18:01:00 +010095 int ret = 0;
96
97 asm volatile("1: mov %[val], %[ptr]\n"
98 "2:\n"
99 ".section .fixup, \"ax\"\n"
100 "3: sub $1, %[ret]\n"
101 " jmp 2b\n"
102 ".previous\n"
103 _ASM_EXTABLE(1b, 3b)
104 : [ret] "+r" (ret), [ptr] "=m" (*addr)
105 : [val] "r" (val));
106
107 return ret;
Juergen Gross90fff3e2014-12-05 13:28:04 +0100108}
109
Juergen Gross1457d8c2018-11-07 18:01:00 +0100110static inline int xen_safe_read_ulong(const unsigned long *addr,
111 unsigned long *val)
Juergen Gross90fff3e2014-12-05 13:28:04 +0100112{
Juergen Gross1457d8c2018-11-07 18:01:00 +0100113 int ret = 0;
114 unsigned long rval = ~0ul;
115
116 asm volatile("1: mov %[ptr], %[rval]\n"
117 "2:\n"
118 ".section .fixup, \"ax\"\n"
119 "3: sub $1, %[ret]\n"
120 " jmp 2b\n"
121 ".previous\n"
122 _ASM_EXTABLE(1b, 3b)
123 : [ret] "+r" (ret), [rval] "+r" (rval)
124 : [ptr] "m" (*addr));
125 *val = rval;
126
127 return ret;
Juergen Gross90fff3e2014-12-05 13:28:04 +0100128}
129
Vitaly Kuznetsov3d4ebdb2017-03-14 18:35:52 +0100130#ifdef CONFIG_XEN_PV
Juergen Gross90fff3e2014-12-05 13:28:04 +0100131/*
Juergen Gross0aad5682014-11-28 11:53:57 +0100132 * When to use pfn_to_mfn(), __pfn_to_mfn() or get_phys_to_machine():
133 * - pfn_to_mfn() returns either INVALID_P2M_ENTRY or the mfn. No indicator
134 * bits (identity or foreign) are set.
135 * - __pfn_to_mfn() returns the found entry of the p2m table. A possibly set
136 * identity or foreign indicator will be still set. __pfn_to_mfn() is
Juergen Gross054954e2014-11-28 11:53:58 +0100137 * encapsulating get_phys_to_machine() which is called in special cases only.
138 * - get_phys_to_machine() is to be called by __pfn_to_mfn() only in special
139 * cases needing an extended handling.
Juergen Gross0aad5682014-11-28 11:53:57 +0100140 */
141static inline unsigned long __pfn_to_mfn(unsigned long pfn)
142{
Juergen Gross054954e2014-11-28 11:53:58 +0100143 unsigned long mfn;
144
145 if (pfn < xen_p2m_size)
146 mfn = xen_p2m_addr[pfn];
147 else if (unlikely(pfn < xen_max_p2m_pfn))
148 return get_phys_to_machine(pfn);
149 else
150 return IDENTITY_FRAME(pfn);
151
152 if (unlikely(mfn == INVALID_P2M_ENTRY))
153 return get_phys_to_machine(pfn);
154
155 return mfn;
Juergen Gross0aad5682014-11-28 11:53:57 +0100156}
Vitaly Kuznetsov3d4ebdb2017-03-14 18:35:52 +0100157#else
158static inline unsigned long __pfn_to_mfn(unsigned long pfn)
159{
160 return pfn;
161}
162#endif
Juergen Gross0aad5682014-11-28 11:53:57 +0100163
Isaku Yamahata20e71f2e2008-04-02 10:53:58 -0700164static inline unsigned long pfn_to_mfn(unsigned long pfn)
165{
Jeremy Fitzhardingecfd89512010-08-31 14:06:22 -0700166 unsigned long mfn;
167
Julien Grall0df4f262015-08-07 17:34:37 +0100168 /*
169 * Some x86 code are still using pfn_to_mfn instead of
170 * pfn_to_mfn. This will have to be removed when we figured
171 * out which call.
172 */
Isaku Yamahata20e71f2e2008-04-02 10:53:58 -0700173 if (xen_feature(XENFEAT_auto_translated_physmap))
174 return pfn;
175
Juergen Gross0aad5682014-11-28 11:53:57 +0100176 mfn = __pfn_to_mfn(pfn);
Jeremy Fitzhardingecfd89512010-08-31 14:06:22 -0700177
178 if (mfn != INVALID_P2M_ENTRY)
Konrad Rzeszutek Wilkf4cec352011-01-18 20:15:21 -0500179 mfn &= ~(FOREIGN_FRAME_BIT | IDENTITY_FRAME_BIT);
Jeremy Fitzhardingecfd89512010-08-31 14:06:22 -0700180
181 return mfn;
Isaku Yamahata20e71f2e2008-04-02 10:53:58 -0700182}
183
184static inline int phys_to_machine_mapping_valid(unsigned long pfn)
185{
186 if (xen_feature(XENFEAT_auto_translated_physmap))
187 return 1;
188
Juergen Gross0aad5682014-11-28 11:53:57 +0100189 return __pfn_to_mfn(pfn) != INVALID_P2M_ENTRY;
Isaku Yamahata20e71f2e2008-04-02 10:53:58 -0700190}
191
David Vrabel01606762013-09-13 15:13:30 +0100192static inline unsigned long mfn_to_pfn_no_overrides(unsigned long mfn)
Isaku Yamahata20e71f2e2008-04-02 10:53:58 -0700193{
194 unsigned long pfn;
David Vrabel01606762013-09-13 15:13:30 +0100195 int ret;
Isaku Yamahata20e71f2e2008-04-02 10:53:58 -0700196
David Vrabel01606762013-09-13 15:13:30 +0100197 if (unlikely(mfn >= machine_to_phys_nr))
198 return ~0;
199
Isaku Yamahata20e71f2e2008-04-02 10:53:58 -0700200 /*
201 * The array access can fail (e.g., device space beyond end of RAM).
202 * In such cases it doesn't matter what we return (we return garbage),
203 * but we must handle the fault without crashing!
204 */
Juergen Gross90fff3e2014-12-05 13:28:04 +0100205 ret = xen_safe_read_ulong(&machine_to_phys_mapping[mfn], &pfn);
Stefano Stabellini706cc9d2011-02-02 18:32:59 +0000206 if (ret < 0)
David Vrabel01606762013-09-13 15:13:30 +0100207 return ~0;
208
209 return pfn;
210}
211
212static inline unsigned long mfn_to_pfn(unsigned long mfn)
213{
214 unsigned long pfn;
215
Julien Grall0df4f262015-08-07 17:34:37 +0100216 /*
217 * Some x86 code are still using mfn_to_pfn instead of
218 * gfn_to_pfn. This will have to be removed when we figure
219 * out which call.
220 */
David Vrabel01606762013-09-13 15:13:30 +0100221 if (xen_feature(XENFEAT_auto_translated_physmap))
222 return mfn;
223
224 pfn = mfn_to_pfn_no_overrides(mfn);
David Vrabel0bb599f2015-01-05 17:06:01 +0000225 if (__pfn_to_mfn(pfn) != mfn)
226 pfn = ~0;
Stefano Stabellini706cc9d2011-02-02 18:32:59 +0000227
Zoltan Kiss1429d462014-02-27 15:55:30 +0000228 /*
David Vrabel0bb599f2015-01-05 17:06:01 +0000229 * pfn is ~0 if there are no entries in the m2p for mfn or the
230 * entry doesn't map back to the mfn.
Jeremy Fitzhardinge448f28312010-12-15 13:19:33 +0000231 */
Juergen Gross0aad5682014-11-28 11:53:57 +0100232 if (pfn == ~0 && __pfn_to_mfn(mfn) == IDENTITY_FRAME(mfn))
Stefano Stabellini706cc9d2011-02-02 18:32:59 +0000233 pfn = mfn;
Jeremy Fitzhardinge448f28312010-12-15 13:19:33 +0000234
Isaku Yamahata20e71f2e2008-04-02 10:53:58 -0700235 return pfn;
236}
237
238static inline xmaddr_t phys_to_machine(xpaddr_t phys)
239{
240 unsigned offset = phys.paddr & ~PAGE_MASK;
Jeremy Fitzhardinge947d0492008-09-11 01:31:48 -0700241 return XMADDR(PFN_PHYS(pfn_to_mfn(PFN_DOWN(phys.paddr))) | offset);
Isaku Yamahata20e71f2e2008-04-02 10:53:58 -0700242}
243
244static inline xpaddr_t machine_to_phys(xmaddr_t machine)
245{
246 unsigned offset = machine.maddr & ~PAGE_MASK;
Jeremy Fitzhardinge947d0492008-09-11 01:31:48 -0700247 return XPADDR(PFN_PHYS(mfn_to_pfn(PFN_DOWN(machine.maddr))) | offset);
Isaku Yamahata20e71f2e2008-04-02 10:53:58 -0700248}
249
Julien Grall0df4f262015-08-07 17:34:37 +0100250/* Pseudo-physical <-> Guest conversion */
251static inline unsigned long pfn_to_gfn(unsigned long pfn)
252{
253 if (xen_feature(XENFEAT_auto_translated_physmap))
254 return pfn;
255 else
256 return pfn_to_mfn(pfn);
257}
258
259static inline unsigned long gfn_to_pfn(unsigned long gfn)
260{
261 if (xen_feature(XENFEAT_auto_translated_physmap))
262 return gfn;
263 else
264 return mfn_to_pfn(gfn);
265}
266
Julien Grall32e09872015-08-07 17:34:35 +0100267/* Pseudo-physical <-> Bus conversion */
Julien Grall0df4f262015-08-07 17:34:37 +0100268#define pfn_to_bfn(pfn) pfn_to_gfn(pfn)
269#define bfn_to_pfn(bfn) gfn_to_pfn(bfn)
Julien Grall32e09872015-08-07 17:34:35 +0100270
Isaku Yamahata20e71f2e2008-04-02 10:53:58 -0700271/*
272 * We detect special mappings in one of two ways:
273 * 1. If the MFN is an I/O page then Xen will set the m2p entry
274 * to be outside our maximum possible pseudophys range.
275 * 2. If the MFN belongs to a different domain then we will certainly
276 * not have MFN in our p2m table. Conversely, if the page is ours,
277 * then we'll have p2m(m2p(MFN))==MFN.
278 * If we detect a special mapping then it doesn't have a 'struct page'.
279 * We force !pfn_valid() by returning an out-of-range pointer.
280 *
281 * NB. These checks require that, for any MFN that is not in our reservation,
282 * there is no PFN such that p2m(PFN) == MFN. Otherwise we can get confused if
283 * we are foreign-mapping the MFN, and the other domain as m2p(MFN) == PFN.
284 * Yikes! Various places must poke in INVALID_P2M_ENTRY for safety.
285 *
286 * NB2. When deliberately mapping foreign pages into the p2m table, you *must*
287 * use FOREIGN_FRAME(). This will cause pte_pfn() to choke on it, as we
288 * require. In all the cases we care about, the FOREIGN_FRAME bit is
289 * masked (e.g., pfn_to_mfn()) so behaviour there is correct.
290 */
Julien Grall32e09872015-08-07 17:34:35 +0100291static inline unsigned long bfn_to_local_pfn(unsigned long mfn)
Isaku Yamahata20e71f2e2008-04-02 10:53:58 -0700292{
Mukesh Rathorfc590ef2013-12-13 12:09:28 -0500293 unsigned long pfn;
294
295 if (xen_feature(XENFEAT_auto_translated_physmap))
296 return mfn;
297
298 pfn = mfn_to_pfn(mfn);
Juergen Gross0aad5682014-11-28 11:53:57 +0100299 if (__pfn_to_mfn(pfn) != mfn)
Jeremy Fitzhardingec0011db2010-02-04 14:46:34 -0800300 return -1; /* force !pfn_valid() */
Isaku Yamahata20e71f2e2008-04-02 10:53:58 -0700301 return pfn;
302}
303
Isaku Yamahata20e71f2e2008-04-02 10:53:58 -0700304/* VIRT <-> MACHINE conversion */
305#define virt_to_machine(v) (phys_to_machine(XPADDR(__pa(v))))
Alex Nixonb40bf532009-02-09 12:05:46 -0800306#define virt_to_pfn(v) (PFN_DOWN(__pa(v)))
307#define virt_to_mfn(v) (pfn_to_mfn(virt_to_pfn(v)))
Isaku Yamahata20e71f2e2008-04-02 10:53:58 -0700308#define mfn_to_virt(m) (__va(mfn_to_pfn(m) << PAGE_SHIFT))
309
Julien Grall0df4f262015-08-07 17:34:37 +0100310/* VIRT <-> GUEST conversion */
311#define virt_to_gfn(v) (pfn_to_gfn(virt_to_pfn(v)))
312#define gfn_to_virt(g) (__va(gfn_to_pfn(g) << PAGE_SHIFT))
313
Isaku Yamahata20e71f2e2008-04-02 10:53:58 -0700314static inline unsigned long pte_mfn(pte_t pte)
315{
Juergen Gross6f0e8bf2017-10-27 19:49:37 +0200316 return (pte.pte & XEN_PTE_MFN_MASK) >> PAGE_SHIFT;
Isaku Yamahata20e71f2e2008-04-02 10:53:58 -0700317}
318
319static inline pte_t mfn_pte(unsigned long page_nr, pgprot_t pgprot)
320{
321 pte_t pte;
322
323 pte.pte = ((phys_addr_t)page_nr << PAGE_SHIFT) |
Jeremy Fitzhardingeb5348162009-02-04 18:33:38 -0800324 massage_pgprot(pgprot);
Isaku Yamahata20e71f2e2008-04-02 10:53:58 -0700325
326 return pte;
327}
328
329static inline pteval_t pte_val_ma(pte_t pte)
330{
331 return pte.pte;
332}
333
334static inline pte_t __pte_ma(pteval_t x)
335{
336 return (pte_t) { .pte = x };
337}
338
Isaku Yamahata20e71f2e2008-04-02 10:53:58 -0700339#define pmd_val_ma(v) ((v).pmd)
Jeremy Fitzhardingef6e58732008-07-08 15:06:38 -0700340#ifdef __PAGETABLE_PUD_FOLDED
Kirill A. Shutemovf2a6a702017-03-17 21:55:15 +0300341#define pud_val_ma(v) ((v).p4d.pgd.pgd)
Jeremy Fitzhardingef6e58732008-07-08 15:06:38 -0700342#else
343#define pud_val_ma(v) ((v).pud)
344#endif
Isaku Yamahata20e71f2e2008-04-02 10:53:58 -0700345#define __pmd_ma(x) ((pmd_t) { (x) } )
Isaku Yamahata20e71f2e2008-04-02 10:53:58 -0700346
Kirill A. Shutemovf2a6a702017-03-17 21:55:15 +0300347#ifdef __PAGETABLE_P4D_FOLDED
348#define p4d_val_ma(x) ((x).pgd.pgd)
349#else
350#define p4d_val_ma(x) ((x).p4d)
351#endif
Isaku Yamahata20e71f2e2008-04-02 10:53:58 -0700352
Jeremy Fitzhardingece803e72008-07-08 15:06:55 -0700353xmaddr_t arbitrary_virt_to_machine(void *address);
Jeremy Fitzhardinge9976b392009-02-27 09:19:26 -0800354unsigned long arbitrary_virt_to_mfn(void *vaddr);
Isaku Yamahata20e71f2e2008-04-02 10:53:58 -0700355void make_lowmem_page_readonly(void *vaddr);
356void make_lowmem_page_readwrite(void *vaddr);
357
Tom Rixeef02412020-11-27 08:07:07 -0800358#define xen_remap(cookie, size) ioremap((cookie), (size))
Konrad Rzeszutek Wilkefaf30a2014-01-06 10:40:36 -0500359#define xen_unmap(cookie) iounmap((cookie))
Stefano Stabellini3216dce2013-02-19 13:59:19 +0000360
Stefano Stabellinia4dba132014-11-21 11:07:39 +0000361static inline bool xen_arch_need_swiotlb(struct device *dev,
Julien Grall291be102015-09-09 15:17:33 +0100362 phys_addr_t phys,
363 dma_addr_t dev_addr)
Stefano Stabellinia4dba132014-11-21 11:07:39 +0000364{
365 return false;
366}
367
Stefano Stabellini87465152015-04-24 10:16:40 +0100368static inline unsigned long xen_get_swiotlb_free_pages(unsigned int order)
369{
370 return __get_free_pages(__GFP_NOWARN, order);
371}
372
H. Peter Anvin05e4d312008-10-23 00:01:39 -0700373#endif /* _ASM_X86_XEN_PAGE_H */