1 /* 2 * This program is free software; you can redistribute it and/or modify 3 * it under the terms of the GNU General Public License, version 2, as 4 * published by the Free Software Foundation. 5 * 6 * This program is distributed in the hope that it will be useful, 7 * but WITHOUT ANY WARRANTY; without even the implied warranty of 8 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the 9 * GNU General Public License for more details. 10 * 11 * You should have received a copy of the GNU General Public License 12 * along with this program; if not, write to the Free Software 13 * Foundation, 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA. 14 * 15 * Copyright SUSE Linux Products GmbH 2009 16 * 17 * Authors: Alexander Graf <agraf@suse.de> 18 */ 19 20 #include <linux/types.h> 21 #include <linux/string.h> 22 #include <linux/kvm.h> 23 #include <linux/kvm_host.h> 24 #include <linux/highmem.h> 25 26 #include <asm/tlbflush.h> 27 #include <asm/kvm_ppc.h> 28 #include <asm/kvm_book3s.h> 29 30 /* #define DEBUG_MMU */ 31 32 #ifdef DEBUG_MMU 33 #define dprintk(X...) printk(KERN_INFO X) 34 #else 35 #define dprintk(X...) do { } while(0) 36 #endif 37 38 static void kvmppc_mmu_book3s_64_reset_msr(struct kvm_vcpu *vcpu) 39 { 40 kvmppc_set_msr(vcpu, MSR_SF); 41 } 42 43 static struct kvmppc_slb *kvmppc_mmu_book3s_64_find_slbe( 44 struct kvmppc_vcpu_book3s *vcpu_book3s, 45 gva_t eaddr) 46 { 47 int i; 48 u64 esid = GET_ESID(eaddr); 49 u64 esid_1t = GET_ESID_1T(eaddr); 50 51 for (i = 0; i < vcpu_book3s->slb_nr; i++) { 52 u64 cmp_esid = esid; 53 54 if (!vcpu_book3s->slb[i].valid) 55 continue; 56 57 if (vcpu_book3s->slb[i].tb) 58 cmp_esid = esid_1t; 59 60 if (vcpu_book3s->slb[i].esid == cmp_esid) 61 return &vcpu_book3s->slb[i]; 62 } 63 64 dprintk("KVM: No SLB entry found for 0x%lx [%llx | %llx]\n", 65 eaddr, esid, esid_1t); 66 for (i = 0; i < vcpu_book3s->slb_nr; i++) { 67 if (vcpu_book3s->slb[i].vsid) 68 dprintk(" %d: %c%c%c %llx %llx\n", i, 69 vcpu_book3s->slb[i].valid ? 'v' : ' ', 70 vcpu_book3s->slb[i].large ? 'l' : ' ', 71 vcpu_book3s->slb[i].tb ? 't' : ' ', 72 vcpu_book3s->slb[i].esid, 73 vcpu_book3s->slb[i].vsid); 74 } 75 76 return NULL; 77 } 78 79 static u64 kvmppc_mmu_book3s_64_ea_to_vp(struct kvm_vcpu *vcpu, gva_t eaddr, 80 bool data) 81 { 82 struct kvmppc_slb *slb; 83 84 slb = kvmppc_mmu_book3s_64_find_slbe(to_book3s(vcpu), eaddr); 85 if (!slb) 86 return 0; 87 88 if (slb->tb) 89 return (((u64)eaddr >> 12) & 0xfffffff) | 90 (((u64)slb->vsid) << 28); 91 92 return (((u64)eaddr >> 12) & 0xffff) | (((u64)slb->vsid) << 16); 93 } 94 95 static int kvmppc_mmu_book3s_64_get_pagesize(struct kvmppc_slb *slbe) 96 { 97 return slbe->large ? 24 : 12; 98 } 99 100 static u32 kvmppc_mmu_book3s_64_get_page(struct kvmppc_slb *slbe, gva_t eaddr) 101 { 102 int p = kvmppc_mmu_book3s_64_get_pagesize(slbe); 103 return ((eaddr & 0xfffffff) >> p); 104 } 105 106 static hva_t kvmppc_mmu_book3s_64_get_pteg( 107 struct kvmppc_vcpu_book3s *vcpu_book3s, 108 struct kvmppc_slb *slbe, gva_t eaddr, 109 bool second) 110 { 111 u64 hash, pteg, htabsize; 112 u32 page; 113 hva_t r; 114 115 page = kvmppc_mmu_book3s_64_get_page(slbe, eaddr); 116 htabsize = ((1 << ((vcpu_book3s->sdr1 & 0x1f) + 11)) - 1); 117 118 hash = slbe->vsid ^ page; 119 if (second) 120 hash = ~hash; 121 hash &= ((1ULL << 39ULL) - 1ULL); 122 hash &= htabsize; 123 hash <<= 7ULL; 124 125 pteg = vcpu_book3s->sdr1 & 0xfffffffffffc0000ULL; 126 pteg |= hash; 127 128 dprintk("MMU: page=0x%x sdr1=0x%llx pteg=0x%llx vsid=0x%llx\n", 129 page, vcpu_book3s->sdr1, pteg, slbe->vsid); 130 131 r = gfn_to_hva(vcpu_book3s->vcpu.kvm, pteg >> PAGE_SHIFT); 132 if (kvm_is_error_hva(r)) 133 return r; 134 return r | (pteg & ~PAGE_MASK); 135 } 136 137 static u64 kvmppc_mmu_book3s_64_get_avpn(struct kvmppc_slb *slbe, gva_t eaddr) 138 { 139 int p = kvmppc_mmu_book3s_64_get_pagesize(slbe); 140 u64 avpn; 141 142 avpn = kvmppc_mmu_book3s_64_get_page(slbe, eaddr); 143 avpn |= slbe->vsid << (28 - p); 144 145 if (p < 24) 146 avpn >>= ((80 - p) - 56) - 8; 147 else 148 avpn <<= 8; 149 150 return avpn; 151 } 152 153 static int kvmppc_mmu_book3s_64_xlate(struct kvm_vcpu *vcpu, gva_t eaddr, 154 struct kvmppc_pte *gpte, bool data) 155 { 156 struct kvmppc_vcpu_book3s *vcpu_book3s = to_book3s(vcpu); 157 struct kvmppc_slb *slbe; 158 hva_t ptegp; 159 u64 pteg[16]; 160 u64 avpn = 0; 161 int i; 162 u8 key = 0; 163 bool found = false; 164 bool perm_err = false; 165 int second = 0; 166 ulong mp_ea = vcpu->arch.magic_page_ea; 167 168 /* Magic page override */ 169 if (unlikely(mp_ea) && 170 unlikely((eaddr & ~0xfffULL) == (mp_ea & ~0xfffULL)) && 171 !(vcpu->arch.shared->msr & MSR_PR)) { 172 gpte->eaddr = eaddr; 173 gpte->vpage = kvmppc_mmu_book3s_64_ea_to_vp(vcpu, eaddr, data); 174 gpte->raddr = vcpu->arch.magic_page_pa | (gpte->raddr & 0xfff); 175 gpte->raddr &= KVM_PAM; 176 gpte->may_execute = true; 177 gpte->may_read = true; 178 gpte->may_write = true; 179 180 return 0; 181 } 182 183 slbe = kvmppc_mmu_book3s_64_find_slbe(vcpu_book3s, eaddr); 184 if (!slbe) 185 goto no_seg_found; 186 187 do_second: 188 ptegp = kvmppc_mmu_book3s_64_get_pteg(vcpu_book3s, slbe, eaddr, second); 189 if (kvm_is_error_hva(ptegp)) 190 goto no_page_found; 191 192 avpn = kvmppc_mmu_book3s_64_get_avpn(slbe, eaddr); 193 194 if(copy_from_user(pteg, (void __user *)ptegp, sizeof(pteg))) { 195 printk(KERN_ERR "KVM can't copy data from 0x%lx!\n", ptegp); 196 goto no_page_found; 197 } 198 199 if ((vcpu->arch.shared->msr & MSR_PR) && slbe->Kp) 200 key = 4; 201 else if (!(vcpu->arch.shared->msr & MSR_PR) && slbe->Ks) 202 key = 4; 203 204 for (i=0; i<16; i+=2) { 205 u64 v = pteg[i]; 206 u64 r = pteg[i+1]; 207 208 /* Valid check */ 209 if (!(v & HPTE_V_VALID)) 210 continue; 211 /* Hash check */ 212 if ((v & HPTE_V_SECONDARY) != second) 213 continue; 214 215 /* AVPN compare */ 216 if (HPTE_V_AVPN_VAL(avpn) == HPTE_V_AVPN_VAL(v)) { 217 u8 pp = (r & HPTE_R_PP) | key; 218 int eaddr_mask = 0xFFF; 219 220 gpte->eaddr = eaddr; 221 gpte->vpage = kvmppc_mmu_book3s_64_ea_to_vp(vcpu, 222 eaddr, 223 data); 224 if (slbe->large) 225 eaddr_mask = 0xFFFFFF; 226 gpte->raddr = (r & HPTE_R_RPN) | (eaddr & eaddr_mask); 227 gpte->may_execute = ((r & HPTE_R_N) ? false : true); 228 gpte->may_read = false; 229 gpte->may_write = false; 230 231 switch (pp) { 232 case 0: 233 case 1: 234 case 2: 235 case 6: 236 gpte->may_write = true; 237 /* fall through */ 238 case 3: 239 case 5: 240 case 7: 241 gpte->may_read = true; 242 break; 243 } 244 245 if (!gpte->may_read) { 246 perm_err = true; 247 continue; 248 } 249 250 dprintk("KVM MMU: Translated 0x%lx [0x%llx] -> 0x%llx " 251 "-> 0x%lx\n", 252 eaddr, avpn, gpte->vpage, gpte->raddr); 253 found = true; 254 break; 255 } 256 } 257 258 /* Update PTE R and C bits, so the guest's swapper knows we used the 259 * page */ 260 if (found) { 261 u32 oldr = pteg[i+1]; 262 263 if (gpte->may_read) { 264 /* Set the accessed flag */ 265 pteg[i+1] |= HPTE_R_R; 266 } 267 if (gpte->may_write) { 268 /* Set the dirty flag */ 269 pteg[i+1] |= HPTE_R_C; 270 } else { 271 dprintk("KVM: Mapping read-only page!\n"); 272 } 273 274 /* Write back into the PTEG */ 275 if (pteg[i+1] != oldr) 276 copy_to_user((void __user *)ptegp, pteg, sizeof(pteg)); 277 278 return 0; 279 } else { 280 dprintk("KVM MMU: No PTE found (ea=0x%lx sdr1=0x%llx " 281 "ptegp=0x%lx)\n", 282 eaddr, to_book3s(vcpu)->sdr1, ptegp); 283 for (i = 0; i < 16; i += 2) 284 dprintk(" %02d: 0x%llx - 0x%llx (0x%llx)\n", 285 i, pteg[i], pteg[i+1], avpn); 286 287 if (!second) { 288 second = HPTE_V_SECONDARY; 289 goto do_second; 290 } 291 } 292 293 294 no_page_found: 295 296 297 if (perm_err) 298 return -EPERM; 299 300 return -ENOENT; 301 302 no_seg_found: 303 304 dprintk("KVM MMU: Trigger segment fault\n"); 305 return -EINVAL; 306 } 307 308 static void kvmppc_mmu_book3s_64_slbmte(struct kvm_vcpu *vcpu, u64 rs, u64 rb) 309 { 310 struct kvmppc_vcpu_book3s *vcpu_book3s; 311 u64 esid, esid_1t; 312 int slb_nr; 313 struct kvmppc_slb *slbe; 314 315 dprintk("KVM MMU: slbmte(0x%llx, 0x%llx)\n", rs, rb); 316 317 vcpu_book3s = to_book3s(vcpu); 318 319 esid = GET_ESID(rb); 320 esid_1t = GET_ESID_1T(rb); 321 slb_nr = rb & 0xfff; 322 323 if (slb_nr > vcpu_book3s->slb_nr) 324 return; 325 326 slbe = &vcpu_book3s->slb[slb_nr]; 327 328 slbe->large = (rs & SLB_VSID_L) ? 1 : 0; 329 slbe->tb = (rs & SLB_VSID_B_1T) ? 1 : 0; 330 slbe->esid = slbe->tb ? esid_1t : esid; 331 slbe->vsid = rs >> 12; 332 slbe->valid = (rb & SLB_ESID_V) ? 1 : 0; 333 slbe->Ks = (rs & SLB_VSID_KS) ? 1 : 0; 334 slbe->Kp = (rs & SLB_VSID_KP) ? 1 : 0; 335 slbe->nx = (rs & SLB_VSID_N) ? 1 : 0; 336 slbe->class = (rs & SLB_VSID_C) ? 1 : 0; 337 338 slbe->orige = rb & (ESID_MASK | SLB_ESID_V); 339 slbe->origv = rs; 340 341 /* Map the new segment */ 342 kvmppc_mmu_map_segment(vcpu, esid << SID_SHIFT); 343 } 344 345 static u64 kvmppc_mmu_book3s_64_slbmfee(struct kvm_vcpu *vcpu, u64 slb_nr) 346 { 347 struct kvmppc_vcpu_book3s *vcpu_book3s = to_book3s(vcpu); 348 struct kvmppc_slb *slbe; 349 350 if (slb_nr > vcpu_book3s->slb_nr) 351 return 0; 352 353 slbe = &vcpu_book3s->slb[slb_nr]; 354 355 return slbe->orige; 356 } 357 358 static u64 kvmppc_mmu_book3s_64_slbmfev(struct kvm_vcpu *vcpu, u64 slb_nr) 359 { 360 struct kvmppc_vcpu_book3s *vcpu_book3s = to_book3s(vcpu); 361 struct kvmppc_slb *slbe; 362 363 if (slb_nr > vcpu_book3s->slb_nr) 364 return 0; 365 366 slbe = &vcpu_book3s->slb[slb_nr]; 367 368 return slbe->origv; 369 } 370 371 static void kvmppc_mmu_book3s_64_slbie(struct kvm_vcpu *vcpu, u64 ea) 372 { 373 struct kvmppc_vcpu_book3s *vcpu_book3s = to_book3s(vcpu); 374 struct kvmppc_slb *slbe; 375 376 dprintk("KVM MMU: slbie(0x%llx)\n", ea); 377 378 slbe = kvmppc_mmu_book3s_64_find_slbe(vcpu_book3s, ea); 379 380 if (!slbe) 381 return; 382 383 dprintk("KVM MMU: slbie(0x%llx, 0x%llx)\n", ea, slbe->esid); 384 385 slbe->valid = false; 386 387 kvmppc_mmu_map_segment(vcpu, ea); 388 } 389 390 static void kvmppc_mmu_book3s_64_slbia(struct kvm_vcpu *vcpu) 391 { 392 struct kvmppc_vcpu_book3s *vcpu_book3s = to_book3s(vcpu); 393 int i; 394 395 dprintk("KVM MMU: slbia()\n"); 396 397 for (i = 1; i < vcpu_book3s->slb_nr; i++) 398 vcpu_book3s->slb[i].valid = false; 399 400 if (vcpu->arch.shared->msr & MSR_IR) { 401 kvmppc_mmu_flush_segments(vcpu); 402 kvmppc_mmu_map_segment(vcpu, kvmppc_get_pc(vcpu)); 403 } 404 } 405 406 static void kvmppc_mmu_book3s_64_mtsrin(struct kvm_vcpu *vcpu, u32 srnum, 407 ulong value) 408 { 409 u64 rb = 0, rs = 0; 410 411 /* 412 * According to Book3 2.01 mtsrin is implemented as: 413 * 414 * The SLB entry specified by (RB)32:35 is loaded from register 415 * RS, as follows. 416 * 417 * SLBE Bit Source SLB Field 418 * 419 * 0:31 0x0000_0000 ESID-0:31 420 * 32:35 (RB)32:35 ESID-32:35 421 * 36 0b1 V 422 * 37:61 0x00_0000|| 0b0 VSID-0:24 423 * 62:88 (RS)37:63 VSID-25:51 424 * 89:91 (RS)33:35 Ks Kp N 425 * 92 (RS)36 L ((RS)36 must be 0b0) 426 * 93 0b0 C 427 */ 428 429 dprintk("KVM MMU: mtsrin(0x%x, 0x%lx)\n", srnum, value); 430 431 /* ESID = srnum */ 432 rb |= (srnum & 0xf) << 28; 433 /* Set the valid bit */ 434 rb |= 1 << 27; 435 /* Index = ESID */ 436 rb |= srnum; 437 438 /* VSID = VSID */ 439 rs |= (value & 0xfffffff) << 12; 440 /* flags = flags */ 441 rs |= ((value >> 28) & 0x7) << 9; 442 443 kvmppc_mmu_book3s_64_slbmte(vcpu, rs, rb); 444 } 445 446 static void kvmppc_mmu_book3s_64_tlbie(struct kvm_vcpu *vcpu, ulong va, 447 bool large) 448 { 449 u64 mask = 0xFFFFFFFFFULL; 450 451 dprintk("KVM MMU: tlbie(0x%lx)\n", va); 452 453 if (large) 454 mask = 0xFFFFFF000ULL; 455 kvmppc_mmu_pte_vflush(vcpu, va >> 12, mask); 456 } 457 458 static int kvmppc_mmu_book3s_64_esid_to_vsid(struct kvm_vcpu *vcpu, ulong esid, 459 u64 *vsid) 460 { 461 ulong ea = esid << SID_SHIFT; 462 struct kvmppc_slb *slb; 463 u64 gvsid = esid; 464 ulong mp_ea = vcpu->arch.magic_page_ea; 465 466 if (vcpu->arch.shared->msr & (MSR_DR|MSR_IR)) { 467 slb = kvmppc_mmu_book3s_64_find_slbe(to_book3s(vcpu), ea); 468 if (slb) 469 gvsid = slb->vsid; 470 } 471 472 switch (vcpu->arch.shared->msr & (MSR_DR|MSR_IR)) { 473 case 0: 474 *vsid = VSID_REAL | esid; 475 break; 476 case MSR_IR: 477 *vsid = VSID_REAL_IR | gvsid; 478 break; 479 case MSR_DR: 480 *vsid = VSID_REAL_DR | gvsid; 481 break; 482 case MSR_DR|MSR_IR: 483 if (!slb) 484 goto no_slb; 485 486 *vsid = gvsid; 487 break; 488 default: 489 BUG(); 490 break; 491 } 492 493 if (vcpu->arch.shared->msr & MSR_PR) 494 *vsid |= VSID_PR; 495 496 return 0; 497 498 no_slb: 499 /* Catch magic page case */ 500 if (unlikely(mp_ea) && 501 unlikely(esid == (mp_ea >> SID_SHIFT)) && 502 !(vcpu->arch.shared->msr & MSR_PR)) { 503 *vsid = VSID_REAL | esid; 504 return 0; 505 } 506 507 return -EINVAL; 508 } 509 510 static bool kvmppc_mmu_book3s_64_is_dcbz32(struct kvm_vcpu *vcpu) 511 { 512 return (to_book3s(vcpu)->hid[5] & 0x80); 513 } 514 515 void kvmppc_mmu_book3s_64_init(struct kvm_vcpu *vcpu) 516 { 517 struct kvmppc_mmu *mmu = &vcpu->arch.mmu; 518 519 mmu->mfsrin = NULL; 520 mmu->mtsrin = kvmppc_mmu_book3s_64_mtsrin; 521 mmu->slbmte = kvmppc_mmu_book3s_64_slbmte; 522 mmu->slbmfee = kvmppc_mmu_book3s_64_slbmfee; 523 mmu->slbmfev = kvmppc_mmu_book3s_64_slbmfev; 524 mmu->slbie = kvmppc_mmu_book3s_64_slbie; 525 mmu->slbia = kvmppc_mmu_book3s_64_slbia; 526 mmu->xlate = kvmppc_mmu_book3s_64_xlate; 527 mmu->reset_msr = kvmppc_mmu_book3s_64_reset_msr; 528 mmu->tlbie = kvmppc_mmu_book3s_64_tlbie; 529 mmu->esid_to_vsid = kvmppc_mmu_book3s_64_esid_to_vsid; 530 mmu->ea_to_vp = kvmppc_mmu_book3s_64_ea_to_vp; 531 mmu->is_dcbz32 = kvmppc_mmu_book3s_64_is_dcbz32; 532 533 vcpu->arch.hflags |= BOOK3S_HFLAG_SLB; 534 } 535