Linux Kernel  3.7.1
 All Data Structures Namespaces Files Functions Variables Typedefs Enumerations Enumerator Macros Groups Pages
book3s_64_mmu.c
Go to the documentation of this file.
1 /*
2  * This program is free software; you can redistribute it and/or modify
3  * it under the terms of the GNU General Public License, version 2, as
4  * published by the Free Software Foundation.
5  *
6  * This program is distributed in the hope that it will be useful,
7  * but WITHOUT ANY WARRANTY; without even the implied warranty of
8  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
9  * GNU General Public License for more details.
10  *
11  * You should have received a copy of the GNU General Public License
12  * along with this program; if not, write to the Free Software
13  * Foundation, 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
14  *
15  * Copyright SUSE Linux Products GmbH 2009
16  *
17  * Authors: Alexander Graf <[email protected]>
18  */
19 
20 #include <linux/types.h>
21 #include <linux/string.h>
22 #include <linux/kvm.h>
23 #include <linux/kvm_host.h>
24 #include <linux/highmem.h>
25 
26 #include <asm/tlbflush.h>
27 #include <asm/kvm_ppc.h>
28 #include <asm/kvm_book3s.h>
29 
30 /* #define DEBUG_MMU */
31 
32 #ifdef DEBUG_MMU
33 #define dprintk(X...) printk(KERN_INFO X)
34 #else
35 #define dprintk(X...) do { } while(0)
36 #endif
37 
38 static void kvmppc_mmu_book3s_64_reset_msr(struct kvm_vcpu *vcpu)
39 {
40  kvmppc_set_msr(vcpu, MSR_SF);
41 }
42 
43 static struct kvmppc_slb *kvmppc_mmu_book3s_64_find_slbe(
44  struct kvm_vcpu *vcpu,
45  gva_t eaddr)
46 {
47  int i;
48  u64 esid = GET_ESID(eaddr);
49  u64 esid_1t = GET_ESID_1T(eaddr);
50 
51  for (i = 0; i < vcpu->arch.slb_nr; i++) {
52  u64 cmp_esid = esid;
53 
54  if (!vcpu->arch.slb[i].valid)
55  continue;
56 
57  if (vcpu->arch.slb[i].tb)
58  cmp_esid = esid_1t;
59 
60  if (vcpu->arch.slb[i].esid == cmp_esid)
61  return &vcpu->arch.slb[i];
62  }
63 
64  dprintk("KVM: No SLB entry found for 0x%lx [%llx | %llx]\n",
65  eaddr, esid, esid_1t);
66  for (i = 0; i < vcpu->arch.slb_nr; i++) {
67  if (vcpu->arch.slb[i].vsid)
68  dprintk(" %d: %c%c%c %llx %llx\n", i,
69  vcpu->arch.slb[i].valid ? 'v' : ' ',
70  vcpu->arch.slb[i].large ? 'l' : ' ',
71  vcpu->arch.slb[i].tb ? 't' : ' ',
72  vcpu->arch.slb[i].esid,
73  vcpu->arch.slb[i].vsid);
74  }
75 
76  return NULL;
77 }
78 
79 static u64 kvmppc_mmu_book3s_64_ea_to_vp(struct kvm_vcpu *vcpu, gva_t eaddr,
80  bool data)
81 {
82  struct kvmppc_slb *slb;
83 
84  slb = kvmppc_mmu_book3s_64_find_slbe(vcpu, eaddr);
85  if (!slb)
86  return 0;
87 
88  if (slb->tb)
89  return (((u64)eaddr >> 12) & 0xfffffff) |
90  (((u64)slb->vsid) << 28);
91 
92  return (((u64)eaddr >> 12) & 0xffff) | (((u64)slb->vsid) << 16);
93 }
94 
95 static int kvmppc_mmu_book3s_64_get_pagesize(struct kvmppc_slb *slbe)
96 {
97  return slbe->large ? 24 : 12;
98 }
99 
100 static u32 kvmppc_mmu_book3s_64_get_page(struct kvmppc_slb *slbe, gva_t eaddr)
101 {
102  int p = kvmppc_mmu_book3s_64_get_pagesize(slbe);
103  return ((eaddr & 0xfffffff) >> p);
104 }
105 
106 static hva_t kvmppc_mmu_book3s_64_get_pteg(
107  struct kvmppc_vcpu_book3s *vcpu_book3s,
108  struct kvmppc_slb *slbe, gva_t eaddr,
109  bool second)
110 {
111  u64 hash, pteg, htabsize;
112  u32 page;
113  hva_t r;
114 
115  page = kvmppc_mmu_book3s_64_get_page(slbe, eaddr);
116  htabsize = ((1 << ((vcpu_book3s->sdr1 & 0x1f) + 11)) - 1);
117 
118  hash = slbe->vsid ^ page;
119  if (second)
120  hash = ~hash;
121  hash &= ((1ULL << 39ULL) - 1ULL);
122  hash &= htabsize;
123  hash <<= 7ULL;
124 
125  pteg = vcpu_book3s->sdr1 & 0xfffffffffffc0000ULL;
126  pteg |= hash;
127 
128  dprintk("MMU: page=0x%x sdr1=0x%llx pteg=0x%llx vsid=0x%llx\n",
129  page, vcpu_book3s->sdr1, pteg, slbe->vsid);
130 
131  /* When running a PAPR guest, SDR1 contains a HVA address instead
132  of a GPA */
133  if (vcpu_book3s->vcpu.arch.papr_enabled)
134  r = pteg;
135  else
136  r = gfn_to_hva(vcpu_book3s->vcpu.kvm, pteg >> PAGE_SHIFT);
137 
138  if (kvm_is_error_hva(r))
139  return r;
140  return r | (pteg & ~PAGE_MASK);
141 }
142 
143 static u64 kvmppc_mmu_book3s_64_get_avpn(struct kvmppc_slb *slbe, gva_t eaddr)
144 {
145  int p = kvmppc_mmu_book3s_64_get_pagesize(slbe);
146  u64 avpn;
147 
148  avpn = kvmppc_mmu_book3s_64_get_page(slbe, eaddr);
149  avpn |= slbe->vsid << (28 - p);
150 
151  if (p < 24)
152  avpn >>= ((80 - p) - 56) - 8;
153  else
154  avpn <<= 8;
155 
156  return avpn;
157 }
158 
159 static int kvmppc_mmu_book3s_64_xlate(struct kvm_vcpu *vcpu, gva_t eaddr,
160  struct kvmppc_pte *gpte, bool data)
161 {
162  struct kvmppc_vcpu_book3s *vcpu_book3s = to_book3s(vcpu);
163  struct kvmppc_slb *slbe;
164  hva_t ptegp;
165  u64 pteg[16];
166  u64 avpn = 0;
167  int i;
168  u8 key = 0;
169  bool found = false;
170  bool perm_err = false;
171  int second = 0;
172  ulong mp_ea = vcpu->arch.magic_page_ea;
173 
174  /* Magic page override */
175  if (unlikely(mp_ea) &&
176  unlikely((eaddr & ~0xfffULL) == (mp_ea & ~0xfffULL)) &&
177  !(vcpu->arch.shared->msr & MSR_PR)) {
178  gpte->eaddr = eaddr;
179  gpte->vpage = kvmppc_mmu_book3s_64_ea_to_vp(vcpu, eaddr, data);
180  gpte->raddr = vcpu->arch.magic_page_pa | (gpte->raddr & 0xfff);
181  gpte->raddr &= KVM_PAM;
182  gpte->may_execute = true;
183  gpte->may_read = true;
184  gpte->may_write = true;
185 
186  return 0;
187  }
188 
189  slbe = kvmppc_mmu_book3s_64_find_slbe(vcpu, eaddr);
190  if (!slbe)
191  goto no_seg_found;
192 
193 do_second:
194  ptegp = kvmppc_mmu_book3s_64_get_pteg(vcpu_book3s, slbe, eaddr, second);
195  if (kvm_is_error_hva(ptegp))
196  goto no_page_found;
197 
198  avpn = kvmppc_mmu_book3s_64_get_avpn(slbe, eaddr);
199 
200  if(copy_from_user(pteg, (void __user *)ptegp, sizeof(pteg))) {
201  printk(KERN_ERR "KVM can't copy data from 0x%lx!\n", ptegp);
202  goto no_page_found;
203  }
204 
205  if ((vcpu->arch.shared->msr & MSR_PR) && slbe->Kp)
206  key = 4;
207  else if (!(vcpu->arch.shared->msr & MSR_PR) && slbe->Ks)
208  key = 4;
209 
210  for (i=0; i<16; i+=2) {
211  u64 v = pteg[i];
212  u64 r = pteg[i+1];
213 
214  /* Valid check */
215  if (!(v & HPTE_V_VALID))
216  continue;
217  /* Hash check */
218  if ((v & HPTE_V_SECONDARY) != second)
219  continue;
220 
221  /* AVPN compare */
222  if (HPTE_V_AVPN_VAL(avpn) == HPTE_V_AVPN_VAL(v)) {
223  u8 pp = (r & HPTE_R_PP) | key;
224  int eaddr_mask = 0xFFF;
225 
226  gpte->eaddr = eaddr;
227  gpte->vpage = kvmppc_mmu_book3s_64_ea_to_vp(vcpu,
228  eaddr,
229  data);
230  if (slbe->large)
231  eaddr_mask = 0xFFFFFF;
232  gpte->raddr = (r & HPTE_R_RPN) | (eaddr & eaddr_mask);
233  gpte->may_execute = ((r & HPTE_R_N) ? false : true);
234  gpte->may_read = false;
235  gpte->may_write = false;
236 
237  switch (pp) {
238  case 0:
239  case 1:
240  case 2:
241  case 6:
242  gpte->may_write = true;
243  /* fall through */
244  case 3:
245  case 5:
246  case 7:
247  gpte->may_read = true;
248  break;
249  }
250 
251  if (!gpte->may_read) {
252  perm_err = true;
253  continue;
254  }
255 
256  dprintk("KVM MMU: Translated 0x%lx [0x%llx] -> 0x%llx "
257  "-> 0x%lx\n",
258  eaddr, avpn, gpte->vpage, gpte->raddr);
259  found = true;
260  break;
261  }
262  }
263 
264  /* Update PTE R and C bits, so the guest's swapper knows we used the
265  * page */
266  if (found) {
267  u32 oldr = pteg[i+1];
268 
269  if (gpte->may_read) {
270  /* Set the accessed flag */
271  pteg[i+1] |= HPTE_R_R;
272  }
273  if (gpte->may_write) {
274  /* Set the dirty flag */
275  pteg[i+1] |= HPTE_R_C;
276  } else {
277  dprintk("KVM: Mapping read-only page!\n");
278  }
279 
280  /* Write back into the PTEG */
281  if (pteg[i+1] != oldr)
282  copy_to_user((void __user *)ptegp, pteg, sizeof(pteg));
283 
284  return 0;
285  } else {
286  dprintk("KVM MMU: No PTE found (ea=0x%lx sdr1=0x%llx "
287  "ptegp=0x%lx)\n",
288  eaddr, to_book3s(vcpu)->sdr1, ptegp);
289  for (i = 0; i < 16; i += 2)
290  dprintk(" %02d: 0x%llx - 0x%llx (0x%llx)\n",
291  i, pteg[i], pteg[i+1], avpn);
292 
293  if (!second) {
294  second = HPTE_V_SECONDARY;
295  goto do_second;
296  }
297  }
298 
299 
300 no_page_found:
301 
302 
303  if (perm_err)
304  return -EPERM;
305 
306  return -ENOENT;
307 
308 no_seg_found:
309 
310  dprintk("KVM MMU: Trigger segment fault\n");
311  return -EINVAL;
312 }
313 
314 static void kvmppc_mmu_book3s_64_slbmte(struct kvm_vcpu *vcpu, u64 rs, u64 rb)
315 {
316  struct kvmppc_vcpu_book3s *vcpu_book3s;
317  u64 esid, esid_1t;
318  int slb_nr;
319  struct kvmppc_slb *slbe;
320 
321  dprintk("KVM MMU: slbmte(0x%llx, 0x%llx)\n", rs, rb);
322 
323  vcpu_book3s = to_book3s(vcpu);
324 
325  esid = GET_ESID(rb);
326  esid_1t = GET_ESID_1T(rb);
327  slb_nr = rb & 0xfff;
328 
329  if (slb_nr > vcpu->arch.slb_nr)
330  return;
331 
332  slbe = &vcpu->arch.slb[slb_nr];
333 
334  slbe->large = (rs & SLB_VSID_L) ? 1 : 0;
335  slbe->tb = (rs & SLB_VSID_B_1T) ? 1 : 0;
336  slbe->esid = slbe->tb ? esid_1t : esid;
337  slbe->vsid = rs >> 12;
338  slbe->valid = (rb & SLB_ESID_V) ? 1 : 0;
339  slbe->Ks = (rs & SLB_VSID_KS) ? 1 : 0;
340  slbe->Kp = (rs & SLB_VSID_KP) ? 1 : 0;
341  slbe->nx = (rs & SLB_VSID_N) ? 1 : 0;
342  slbe->class = (rs & SLB_VSID_C) ? 1 : 0;
343 
344  slbe->orige = rb & (ESID_MASK | SLB_ESID_V);
345  slbe->origv = rs;
346 
347  /* Map the new segment */
348  kvmppc_mmu_map_segment(vcpu, esid << SID_SHIFT);
349 }
350 
351 static u64 kvmppc_mmu_book3s_64_slbmfee(struct kvm_vcpu *vcpu, u64 slb_nr)
352 {
353  struct kvmppc_slb *slbe;
354 
355  if (slb_nr > vcpu->arch.slb_nr)
356  return 0;
357 
358  slbe = &vcpu->arch.slb[slb_nr];
359 
360  return slbe->orige;
361 }
362 
363 static u64 kvmppc_mmu_book3s_64_slbmfev(struct kvm_vcpu *vcpu, u64 slb_nr)
364 {
365  struct kvmppc_slb *slbe;
366 
367  if (slb_nr > vcpu->arch.slb_nr)
368  return 0;
369 
370  slbe = &vcpu->arch.slb[slb_nr];
371 
372  return slbe->origv;
373 }
374 
375 static void kvmppc_mmu_book3s_64_slbie(struct kvm_vcpu *vcpu, u64 ea)
376 {
377  struct kvmppc_slb *slbe;
378 
379  dprintk("KVM MMU: slbie(0x%llx)\n", ea);
380 
381  slbe = kvmppc_mmu_book3s_64_find_slbe(vcpu, ea);
382 
383  if (!slbe)
384  return;
385 
386  dprintk("KVM MMU: slbie(0x%llx, 0x%llx)\n", ea, slbe->esid);
387 
388  slbe->valid = false;
389 
390  kvmppc_mmu_map_segment(vcpu, ea);
391 }
392 
393 static void kvmppc_mmu_book3s_64_slbia(struct kvm_vcpu *vcpu)
394 {
395  int i;
396 
397  dprintk("KVM MMU: slbia()\n");
398 
399  for (i = 1; i < vcpu->arch.slb_nr; i++)
400  vcpu->arch.slb[i].valid = false;
401 
402  if (vcpu->arch.shared->msr & MSR_IR) {
404  kvmppc_mmu_map_segment(vcpu, kvmppc_get_pc(vcpu));
405  }
406 }
407 
408 static void kvmppc_mmu_book3s_64_mtsrin(struct kvm_vcpu *vcpu, u32 srnum,
409  ulong value)
410 {
411  u64 rb = 0, rs = 0;
412 
413  /*
414  * According to Book3 2.01 mtsrin is implemented as:
415  *
416  * The SLB entry specified by (RB)32:35 is loaded from register
417  * RS, as follows.
418  *
419  * SLBE Bit Source SLB Field
420  *
421  * 0:31 0x0000_0000 ESID-0:31
422  * 32:35 (RB)32:35 ESID-32:35
423  * 36 0b1 V
424  * 37:61 0x00_0000|| 0b0 VSID-0:24
425  * 62:88 (RS)37:63 VSID-25:51
426  * 89:91 (RS)33:35 Ks Kp N
427  * 92 (RS)36 L ((RS)36 must be 0b0)
428  * 93 0b0 C
429  */
430 
431  dprintk("KVM MMU: mtsrin(0x%x, 0x%lx)\n", srnum, value);
432 
433  /* ESID = srnum */
434  rb |= (srnum & 0xf) << 28;
435  /* Set the valid bit */
436  rb |= 1 << 27;
437  /* Index = ESID */
438  rb |= srnum;
439 
440  /* VSID = VSID */
441  rs |= (value & 0xfffffff) << 12;
442  /* flags = flags */
443  rs |= ((value >> 28) & 0x7) << 9;
444 
445  kvmppc_mmu_book3s_64_slbmte(vcpu, rs, rb);
446 }
447 
448 static void kvmppc_mmu_book3s_64_tlbie(struct kvm_vcpu *vcpu, ulong va,
449  bool large)
450 {
451  u64 mask = 0xFFFFFFFFFULL;
452 
453  dprintk("KVM MMU: tlbie(0x%lx)\n", va);
454 
455  if (large)
456  mask = 0xFFFFFF000ULL;
457  kvmppc_mmu_pte_vflush(vcpu, va >> 12, mask);
458 }
459 
460 static int kvmppc_mmu_book3s_64_esid_to_vsid(struct kvm_vcpu *vcpu, ulong esid,
461  u64 *vsid)
462 {
463  ulong ea = esid << SID_SHIFT;
464  struct kvmppc_slb *slb;
465  u64 gvsid = esid;
466  ulong mp_ea = vcpu->arch.magic_page_ea;
467 
468  if (vcpu->arch.shared->msr & (MSR_DR|MSR_IR)) {
469  slb = kvmppc_mmu_book3s_64_find_slbe(vcpu, ea);
470  if (slb)
471  gvsid = slb->vsid;
472  }
473 
474  switch (vcpu->arch.shared->msr & (MSR_DR|MSR_IR)) {
475  case 0:
476  *vsid = VSID_REAL | esid;
477  break;
478  case MSR_IR:
479  *vsid = VSID_REAL_IR | gvsid;
480  break;
481  case MSR_DR:
482  *vsid = VSID_REAL_DR | gvsid;
483  break;
484  case MSR_DR|MSR_IR:
485  if (!slb)
486  goto no_slb;
487 
488  *vsid = gvsid;
489  break;
490  default:
491  BUG();
492  break;
493  }
494 
495  if (vcpu->arch.shared->msr & MSR_PR)
496  *vsid |= VSID_PR;
497 
498  return 0;
499 
500 no_slb:
501  /* Catch magic page case */
502  if (unlikely(mp_ea) &&
503  unlikely(esid == (mp_ea >> SID_SHIFT)) &&
504  !(vcpu->arch.shared->msr & MSR_PR)) {
505  *vsid = VSID_REAL | esid;
506  return 0;
507  }
508 
509  return -EINVAL;
510 }
511 
512 static bool kvmppc_mmu_book3s_64_is_dcbz32(struct kvm_vcpu *vcpu)
513 {
514  return (to_book3s(vcpu)->hid[5] & 0x80);
515 }
516 
518 {
519  struct kvmppc_mmu *mmu = &vcpu->arch.mmu;
520 
521  mmu->mfsrin = NULL;
522  mmu->mtsrin = kvmppc_mmu_book3s_64_mtsrin;
523  mmu->slbmte = kvmppc_mmu_book3s_64_slbmte;
524  mmu->slbmfee = kvmppc_mmu_book3s_64_slbmfee;
525  mmu->slbmfev = kvmppc_mmu_book3s_64_slbmfev;
526  mmu->slbie = kvmppc_mmu_book3s_64_slbie;
527  mmu->slbia = kvmppc_mmu_book3s_64_slbia;
528  mmu->xlate = kvmppc_mmu_book3s_64_xlate;
529  mmu->reset_msr = kvmppc_mmu_book3s_64_reset_msr;
530  mmu->tlbie = kvmppc_mmu_book3s_64_tlbie;
531  mmu->esid_to_vsid = kvmppc_mmu_book3s_64_esid_to_vsid;
532  mmu->ea_to_vp = kvmppc_mmu_book3s_64_ea_to_vp;
533  mmu->is_dcbz32 = kvmppc_mmu_book3s_64_is_dcbz32;
534 
535  vcpu->arch.hflags |= BOOK3S_HFLAG_SLB;
536 }