1 /* 2 * This program is free software; you can redistribute it and/or modify 3 * it under the terms of the GNU General Public License, version 2, as 4 * published by the Free Software Foundation. 5 * 6 * This program is distributed in the hope that it will be useful, 7 * but WITHOUT ANY WARRANTY; without even the implied warranty of 8 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the 9 * GNU General Public License for more details. 10 * 11 * You should have received a copy of the GNU General Public License 12 * along with this program; if not, write to the Free Software 13 * Foundation, 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA. 14 * 15 * Copyright SUSE Linux Products GmbH 2009 16 * 17 * Authors: Alexander Graf <agraf@suse.de> 18 */ 19 20 #include <linux/types.h> 21 #include <linux/string.h> 22 #include <linux/kvm.h> 23 #include <linux/kvm_host.h> 24 #include <linux/highmem.h> 25 26 #include <asm/tlbflush.h> 27 #include <asm/kvm_ppc.h> 28 #include <asm/kvm_book3s.h> 29 30 /* #define DEBUG_MMU */ 31 32 #ifdef DEBUG_MMU 33 #define dprintk(X...) printk(KERN_INFO X) 34 #else 35 #define dprintk(X...) do { } while(0) 36 #endif 37 38 static void kvmppc_mmu_book3s_64_reset_msr(struct kvm_vcpu *vcpu) 39 { 40 kvmppc_set_msr(vcpu, MSR_SF); 41 } 42 43 static struct kvmppc_slb *kvmppc_mmu_book3s_64_find_slbe( 44 struct kvm_vcpu *vcpu, 45 gva_t eaddr) 46 { 47 int i; 48 u64 esid = GET_ESID(eaddr); 49 u64 esid_1t = GET_ESID_1T(eaddr); 50 51 for (i = 0; i < vcpu->arch.slb_nr; i++) { 52 u64 cmp_esid = esid; 53 54 if (!vcpu->arch.slb[i].valid) 55 continue; 56 57 if (vcpu->arch.slb[i].tb) 58 cmp_esid = esid_1t; 59 60 if (vcpu->arch.slb[i].esid == cmp_esid) 61 return &vcpu->arch.slb[i]; 62 } 63 64 dprintk("KVM: No SLB entry found for 0x%lx [%llx | %llx]\n", 65 eaddr, esid, esid_1t); 66 for (i = 0; i < vcpu->arch.slb_nr; i++) { 67 if (vcpu->arch.slb[i].vsid) 68 dprintk(" %d: %c%c%c %llx %llx\n", i, 69 vcpu->arch.slb[i].valid ? 'v' : ' ', 70 vcpu->arch.slb[i].large ? 'l' : ' ', 71 vcpu->arch.slb[i].tb ? 't' : ' ', 72 vcpu->arch.slb[i].esid, 73 vcpu->arch.slb[i].vsid); 74 } 75 76 return NULL; 77 } 78 79 static u64 kvmppc_mmu_book3s_64_ea_to_vp(struct kvm_vcpu *vcpu, gva_t eaddr, 80 bool data) 81 { 82 struct kvmppc_slb *slb; 83 84 slb = kvmppc_mmu_book3s_64_find_slbe(vcpu, eaddr); 85 if (!slb) 86 return 0; 87 88 if (slb->tb) 89 return (((u64)eaddr >> 12) & 0xfffffff) | 90 (((u64)slb->vsid) << 28); 91 92 return (((u64)eaddr >> 12) & 0xffff) | (((u64)slb->vsid) << 16); 93 } 94 95 static int kvmppc_mmu_book3s_64_get_pagesize(struct kvmppc_slb *slbe) 96 { 97 return slbe->large ? 24 : 12; 98 } 99 100 static u32 kvmppc_mmu_book3s_64_get_page(struct kvmppc_slb *slbe, gva_t eaddr) 101 { 102 int p = kvmppc_mmu_book3s_64_get_pagesize(slbe); 103 return ((eaddr & 0xfffffff) >> p); 104 } 105 106 static hva_t kvmppc_mmu_book3s_64_get_pteg( 107 struct kvmppc_vcpu_book3s *vcpu_book3s, 108 struct kvmppc_slb *slbe, gva_t eaddr, 109 bool second) 110 { 111 u64 hash, pteg, htabsize; 112 u32 page; 113 hva_t r; 114 115 page = kvmppc_mmu_book3s_64_get_page(slbe, eaddr); 116 htabsize = ((1 << ((vcpu_book3s->sdr1 & 0x1f) + 11)) - 1); 117 118 hash = slbe->vsid ^ page; 119 if (second) 120 hash = ~hash; 121 hash &= ((1ULL << 39ULL) - 1ULL); 122 hash &= htabsize; 123 hash <<= 7ULL; 124 125 pteg = vcpu_book3s->sdr1 & 0xfffffffffffc0000ULL; 126 pteg |= hash; 127 128 dprintk("MMU: page=0x%x sdr1=0x%llx pteg=0x%llx vsid=0x%llx\n", 129 page, vcpu_book3s->sdr1, pteg, slbe->vsid); 130 131 /* When running a PAPR guest, SDR1 contains a HVA address instead 132 of a GPA */ 133 if (vcpu_book3s->vcpu.arch.papr_enabled) 134 r = pteg; 135 else 136 r = gfn_to_hva(vcpu_book3s->vcpu.kvm, pteg >> PAGE_SHIFT); 137 138 if (kvm_is_error_hva(r)) 139 return r; 140 return r | (pteg & ~PAGE_MASK); 141 } 142 143 static u64 kvmppc_mmu_book3s_64_get_avpn(struct kvmppc_slb *slbe, gva_t eaddr) 144 { 145 int p = kvmppc_mmu_book3s_64_get_pagesize(slbe); 146 u64 avpn; 147 148 avpn = kvmppc_mmu_book3s_64_get_page(slbe, eaddr); 149 avpn |= slbe->vsid << (28 - p); 150 151 if (p < 24) 152 avpn >>= ((80 - p) - 56) - 8; 153 else 154 avpn <<= 8; 155 156 return avpn; 157 } 158 159 static int kvmppc_mmu_book3s_64_xlate(struct kvm_vcpu *vcpu, gva_t eaddr, 160 struct kvmppc_pte *gpte, bool data) 161 { 162 struct kvmppc_vcpu_book3s *vcpu_book3s = to_book3s(vcpu); 163 struct kvmppc_slb *slbe; 164 hva_t ptegp; 165 u64 pteg[16]; 166 u64 avpn = 0; 167 int i; 168 u8 key = 0; 169 bool found = false; 170 bool perm_err = false; 171 int second = 0; 172 ulong mp_ea = vcpu->arch.magic_page_ea; 173 174 /* Magic page override */ 175 if (unlikely(mp_ea) && 176 unlikely((eaddr & ~0xfffULL) == (mp_ea & ~0xfffULL)) && 177 !(vcpu->arch.shared->msr & MSR_PR)) { 178 gpte->eaddr = eaddr; 179 gpte->vpage = kvmppc_mmu_book3s_64_ea_to_vp(vcpu, eaddr, data); 180 gpte->raddr = vcpu->arch.magic_page_pa | (gpte->raddr & 0xfff); 181 gpte->raddr &= KVM_PAM; 182 gpte->may_execute = true; 183 gpte->may_read = true; 184 gpte->may_write = true; 185 186 return 0; 187 } 188 189 slbe = kvmppc_mmu_book3s_64_find_slbe(vcpu, eaddr); 190 if (!slbe) 191 goto no_seg_found; 192 193 do_second: 194 ptegp = kvmppc_mmu_book3s_64_get_pteg(vcpu_book3s, slbe, eaddr, second); 195 if (kvm_is_error_hva(ptegp)) 196 goto no_page_found; 197 198 avpn = kvmppc_mmu_book3s_64_get_avpn(slbe, eaddr); 199 200 if(copy_from_user(pteg, (void __user *)ptegp, sizeof(pteg))) { 201 printk(KERN_ERR "KVM can't copy data from 0x%lx!\n", ptegp); 202 goto no_page_found; 203 } 204 205 if ((vcpu->arch.shared->msr & MSR_PR) && slbe->Kp) 206 key = 4; 207 else if (!(vcpu->arch.shared->msr & MSR_PR) && slbe->Ks) 208 key = 4; 209 210 for (i=0; i<16; i+=2) { 211 u64 v = pteg[i]; 212 u64 r = pteg[i+1]; 213 214 /* Valid check */ 215 if (!(v & HPTE_V_VALID)) 216 continue; 217 /* Hash check */ 218 if ((v & HPTE_V_SECONDARY) != second) 219 continue; 220 221 /* AVPN compare */ 222 if (HPTE_V_AVPN_VAL(avpn) == HPTE_V_AVPN_VAL(v)) { 223 u8 pp = (r & HPTE_R_PP) | key; 224 int eaddr_mask = 0xFFF; 225 226 gpte->eaddr = eaddr; 227 gpte->vpage = kvmppc_mmu_book3s_64_ea_to_vp(vcpu, 228 eaddr, 229 data); 230 if (slbe->large) 231 eaddr_mask = 0xFFFFFF; 232 gpte->raddr = (r & HPTE_R_RPN) | (eaddr & eaddr_mask); 233 gpte->may_execute = ((r & HPTE_R_N) ? false : true); 234 gpte->may_read = false; 235 gpte->may_write = false; 236 237 switch (pp) { 238 case 0: 239 case 1: 240 case 2: 241 case 6: 242 gpte->may_write = true; 243 /* fall through */ 244 case 3: 245 case 5: 246 case 7: 247 gpte->may_read = true; 248 break; 249 } 250 251 if (!gpte->may_read) { 252 perm_err = true; 253 continue; 254 } 255 256 dprintk("KVM MMU: Translated 0x%lx [0x%llx] -> 0x%llx " 257 "-> 0x%lx\n", 258 eaddr, avpn, gpte->vpage, gpte->raddr); 259 found = true; 260 break; 261 } 262 } 263 264 /* Update PTE R and C bits, so the guest's swapper knows we used the 265 * page */ 266 if (found) { 267 u32 oldr = pteg[i+1]; 268 269 if (gpte->may_read) { 270 /* Set the accessed flag */ 271 pteg[i+1] |= HPTE_R_R; 272 } 273 if (gpte->may_write) { 274 /* Set the dirty flag */ 275 pteg[i+1] |= HPTE_R_C; 276 } else { 277 dprintk("KVM: Mapping read-only page!\n"); 278 } 279 280 /* Write back into the PTEG */ 281 if (pteg[i+1] != oldr) 282 copy_to_user((void __user *)ptegp, pteg, sizeof(pteg)); 283 284 return 0; 285 } else { 286 dprintk("KVM MMU: No PTE found (ea=0x%lx sdr1=0x%llx " 287 "ptegp=0x%lx)\n", 288 eaddr, to_book3s(vcpu)->sdr1, ptegp); 289 for (i = 0; i < 16; i += 2) 290 dprintk(" %02d: 0x%llx - 0x%llx (0x%llx)\n", 291 i, pteg[i], pteg[i+1], avpn); 292 293 if (!second) { 294 second = HPTE_V_SECONDARY; 295 goto do_second; 296 } 297 } 298 299 300 no_page_found: 301 302 303 if (perm_err) 304 return -EPERM; 305 306 return -ENOENT; 307 308 no_seg_found: 309 310 dprintk("KVM MMU: Trigger segment fault\n"); 311 return -EINVAL; 312 } 313 314 static void kvmppc_mmu_book3s_64_slbmte(struct kvm_vcpu *vcpu, u64 rs, u64 rb) 315 { 316 struct kvmppc_vcpu_book3s *vcpu_book3s; 317 u64 esid, esid_1t; 318 int slb_nr; 319 struct kvmppc_slb *slbe; 320 321 dprintk("KVM MMU: slbmte(0x%llx, 0x%llx)\n", rs, rb); 322 323 vcpu_book3s = to_book3s(vcpu); 324 325 esid = GET_ESID(rb); 326 esid_1t = GET_ESID_1T(rb); 327 slb_nr = rb & 0xfff; 328 329 if (slb_nr > vcpu->arch.slb_nr) 330 return; 331 332 slbe = &vcpu->arch.slb[slb_nr]; 333 334 slbe->large = (rs & SLB_VSID_L) ? 1 : 0; 335 slbe->tb = (rs & SLB_VSID_B_1T) ? 1 : 0; 336 slbe->esid = slbe->tb ? esid_1t : esid; 337 slbe->vsid = rs >> 12; 338 slbe->valid = (rb & SLB_ESID_V) ? 1 : 0; 339 slbe->Ks = (rs & SLB_VSID_KS) ? 1 : 0; 340 slbe->Kp = (rs & SLB_VSID_KP) ? 1 : 0; 341 slbe->nx = (rs & SLB_VSID_N) ? 1 : 0; 342 slbe->class = (rs & SLB_VSID_C) ? 1 : 0; 343 344 slbe->orige = rb & (ESID_MASK | SLB_ESID_V); 345 slbe->origv = rs; 346 347 /* Map the new segment */ 348 kvmppc_mmu_map_segment(vcpu, esid << SID_SHIFT); 349 } 350 351 static u64 kvmppc_mmu_book3s_64_slbmfee(struct kvm_vcpu *vcpu, u64 slb_nr) 352 { 353 struct kvmppc_slb *slbe; 354 355 if (slb_nr > vcpu->arch.slb_nr) 356 return 0; 357 358 slbe = &vcpu->arch.slb[slb_nr]; 359 360 return slbe->orige; 361 } 362 363 static u64 kvmppc_mmu_book3s_64_slbmfev(struct kvm_vcpu *vcpu, u64 slb_nr) 364 { 365 struct kvmppc_slb *slbe; 366 367 if (slb_nr > vcpu->arch.slb_nr) 368 return 0; 369 370 slbe = &vcpu->arch.slb[slb_nr]; 371 372 return slbe->origv; 373 } 374 375 static void kvmppc_mmu_book3s_64_slbie(struct kvm_vcpu *vcpu, u64 ea) 376 { 377 struct kvmppc_slb *slbe; 378 379 dprintk("KVM MMU: slbie(0x%llx)\n", ea); 380 381 slbe = kvmppc_mmu_book3s_64_find_slbe(vcpu, ea); 382 383 if (!slbe) 384 return; 385 386 dprintk("KVM MMU: slbie(0x%llx, 0x%llx)\n", ea, slbe->esid); 387 388 slbe->valid = false; 389 390 kvmppc_mmu_map_segment(vcpu, ea); 391 } 392 393 static void kvmppc_mmu_book3s_64_slbia(struct kvm_vcpu *vcpu) 394 { 395 int i; 396 397 dprintk("KVM MMU: slbia()\n"); 398 399 for (i = 1; i < vcpu->arch.slb_nr; i++) 400 vcpu->arch.slb[i].valid = false; 401 402 if (vcpu->arch.shared->msr & MSR_IR) { 403 kvmppc_mmu_flush_segments(vcpu); 404 kvmppc_mmu_map_segment(vcpu, kvmppc_get_pc(vcpu)); 405 } 406 } 407 408 static void kvmppc_mmu_book3s_64_mtsrin(struct kvm_vcpu *vcpu, u32 srnum, 409 ulong value) 410 { 411 u64 rb = 0, rs = 0; 412 413 /* 414 * According to Book3 2.01 mtsrin is implemented as: 415 * 416 * The SLB entry specified by (RB)32:35 is loaded from register 417 * RS, as follows. 418 * 419 * SLBE Bit Source SLB Field 420 * 421 * 0:31 0x0000_0000 ESID-0:31 422 * 32:35 (RB)32:35 ESID-32:35 423 * 36 0b1 V 424 * 37:61 0x00_0000|| 0b0 VSID-0:24 425 * 62:88 (RS)37:63 VSID-25:51 426 * 89:91 (RS)33:35 Ks Kp N 427 * 92 (RS)36 L ((RS)36 must be 0b0) 428 * 93 0b0 C 429 */ 430 431 dprintk("KVM MMU: mtsrin(0x%x, 0x%lx)\n", srnum, value); 432 433 /* ESID = srnum */ 434 rb |= (srnum & 0xf) << 28; 435 /* Set the valid bit */ 436 rb |= 1 << 27; 437 /* Index = ESID */ 438 rb |= srnum; 439 440 /* VSID = VSID */ 441 rs |= (value & 0xfffffff) << 12; 442 /* flags = flags */ 443 rs |= ((value >> 28) & 0x7) << 9; 444 445 kvmppc_mmu_book3s_64_slbmte(vcpu, rs, rb); 446 } 447 448 static void kvmppc_mmu_book3s_64_tlbie(struct kvm_vcpu *vcpu, ulong va, 449 bool large) 450 { 451 u64 mask = 0xFFFFFFFFFULL; 452 453 dprintk("KVM MMU: tlbie(0x%lx)\n", va); 454 455 if (large) 456 mask = 0xFFFFFF000ULL; 457 kvmppc_mmu_pte_vflush(vcpu, va >> 12, mask); 458 } 459 460 static int kvmppc_mmu_book3s_64_esid_to_vsid(struct kvm_vcpu *vcpu, ulong esid, 461 u64 *vsid) 462 { 463 ulong ea = esid << SID_SHIFT; 464 struct kvmppc_slb *slb; 465 u64 gvsid = esid; 466 ulong mp_ea = vcpu->arch.magic_page_ea; 467 468 if (vcpu->arch.shared->msr & (MSR_DR|MSR_IR)) { 469 slb = kvmppc_mmu_book3s_64_find_slbe(vcpu, ea); 470 if (slb) 471 gvsid = slb->vsid; 472 } 473 474 switch (vcpu->arch.shared->msr & (MSR_DR|MSR_IR)) { 475 case 0: 476 *vsid = VSID_REAL | esid; 477 break; 478 case MSR_IR: 479 *vsid = VSID_REAL_IR | gvsid; 480 break; 481 case MSR_DR: 482 *vsid = VSID_REAL_DR | gvsid; 483 break; 484 case MSR_DR|MSR_IR: 485 if (!slb) 486 goto no_slb; 487 488 *vsid = gvsid; 489 break; 490 default: 491 BUG(); 492 break; 493 } 494 495 if (vcpu->arch.shared->msr & MSR_PR) 496 *vsid |= VSID_PR; 497 498 return 0; 499 500 no_slb: 501 /* Catch magic page case */ 502 if (unlikely(mp_ea) && 503 unlikely(esid == (mp_ea >> SID_SHIFT)) && 504 !(vcpu->arch.shared->msr & MSR_PR)) { 505 *vsid = VSID_REAL | esid; 506 return 0; 507 } 508 509 return -EINVAL; 510 } 511 512 static bool kvmppc_mmu_book3s_64_is_dcbz32(struct kvm_vcpu *vcpu) 513 { 514 return (to_book3s(vcpu)->hid[5] & 0x80); 515 } 516 517 void kvmppc_mmu_book3s_64_init(struct kvm_vcpu *vcpu) 518 { 519 struct kvmppc_mmu *mmu = &vcpu->arch.mmu; 520 521 mmu->mfsrin = NULL; 522 mmu->mtsrin = kvmppc_mmu_book3s_64_mtsrin; 523 mmu->slbmte = kvmppc_mmu_book3s_64_slbmte; 524 mmu->slbmfee = kvmppc_mmu_book3s_64_slbmfee; 525 mmu->slbmfev = kvmppc_mmu_book3s_64_slbmfev; 526 mmu->slbie = kvmppc_mmu_book3s_64_slbie; 527 mmu->slbia = kvmppc_mmu_book3s_64_slbia; 528 mmu->xlate = kvmppc_mmu_book3s_64_xlate; 529 mmu->reset_msr = kvmppc_mmu_book3s_64_reset_msr; 530 mmu->tlbie = kvmppc_mmu_book3s_64_tlbie; 531 mmu->esid_to_vsid = kvmppc_mmu_book3s_64_esid_to_vsid; 532 mmu->ea_to_vp = kvmppc_mmu_book3s_64_ea_to_vp; 533 mmu->is_dcbz32 = kvmppc_mmu_book3s_64_is_dcbz32; 534 535 vcpu->arch.hflags |= BOOK3S_HFLAG_SLB; 536 } 537