]> git.proxmox.com Git - mirror_ubuntu-bionic-kernel.git/blob - arch/powerpc/kvm/book3s_64_mmu.c
powerpc: Update default configurations
[mirror_ubuntu-bionic-kernel.git] / arch / powerpc / kvm / book3s_64_mmu.c
1 /*
2 * This program is free software; you can redistribute it and/or modify
3 * it under the terms of the GNU General Public License, version 2, as
4 * published by the Free Software Foundation.
5 *
6 * This program is distributed in the hope that it will be useful,
7 * but WITHOUT ANY WARRANTY; without even the implied warranty of
8 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
9 * GNU General Public License for more details.
10 *
11 * You should have received a copy of the GNU General Public License
12 * along with this program; if not, write to the Free Software
13 * Foundation, 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
14 *
15 * Copyright SUSE Linux Products GmbH 2009
16 *
17 * Authors: Alexander Graf <agraf@suse.de>
18 */
19
20 #include <linux/types.h>
21 #include <linux/string.h>
22 #include <linux/kvm.h>
23 #include <linux/kvm_host.h>
24 #include <linux/highmem.h>
25
26 #include <asm/tlbflush.h>
27 #include <asm/kvm_ppc.h>
28 #include <asm/kvm_book3s.h>
29
30 /* #define DEBUG_MMU */
31
32 #ifdef DEBUG_MMU
33 #define dprintk(X...) printk(KERN_INFO X)
34 #else
35 #define dprintk(X...) do { } while(0)
36 #endif
37
38 static void kvmppc_mmu_book3s_64_reset_msr(struct kvm_vcpu *vcpu)
39 {
40 kvmppc_set_msr(vcpu, MSR_SF);
41 }
42
43 static struct kvmppc_slb *kvmppc_mmu_book3s_64_find_slbe(
44 struct kvm_vcpu *vcpu,
45 gva_t eaddr)
46 {
47 int i;
48 u64 esid = GET_ESID(eaddr);
49 u64 esid_1t = GET_ESID_1T(eaddr);
50
51 for (i = 0; i < vcpu->arch.slb_nr; i++) {
52 u64 cmp_esid = esid;
53
54 if (!vcpu->arch.slb[i].valid)
55 continue;
56
57 if (vcpu->arch.slb[i].tb)
58 cmp_esid = esid_1t;
59
60 if (vcpu->arch.slb[i].esid == cmp_esid)
61 return &vcpu->arch.slb[i];
62 }
63
64 dprintk("KVM: No SLB entry found for 0x%lx [%llx | %llx]\n",
65 eaddr, esid, esid_1t);
66 for (i = 0; i < vcpu->arch.slb_nr; i++) {
67 if (vcpu->arch.slb[i].vsid)
68 dprintk(" %d: %c%c%c %llx %llx\n", i,
69 vcpu->arch.slb[i].valid ? 'v' : ' ',
70 vcpu->arch.slb[i].large ? 'l' : ' ',
71 vcpu->arch.slb[i].tb ? 't' : ' ',
72 vcpu->arch.slb[i].esid,
73 vcpu->arch.slb[i].vsid);
74 }
75
76 return NULL;
77 }
78
79 static u64 kvmppc_mmu_book3s_64_ea_to_vp(struct kvm_vcpu *vcpu, gva_t eaddr,
80 bool data)
81 {
82 struct kvmppc_slb *slb;
83
84 slb = kvmppc_mmu_book3s_64_find_slbe(vcpu, eaddr);
85 if (!slb)
86 return 0;
87
88 if (slb->tb)
89 return (((u64)eaddr >> 12) & 0xfffffff) |
90 (((u64)slb->vsid) << 28);
91
92 return (((u64)eaddr >> 12) & 0xffff) | (((u64)slb->vsid) << 16);
93 }
94
95 static int kvmppc_mmu_book3s_64_get_pagesize(struct kvmppc_slb *slbe)
96 {
97 return slbe->large ? 24 : 12;
98 }
99
100 static u32 kvmppc_mmu_book3s_64_get_page(struct kvmppc_slb *slbe, gva_t eaddr)
101 {
102 int p = kvmppc_mmu_book3s_64_get_pagesize(slbe);
103 return ((eaddr & 0xfffffff) >> p);
104 }
105
106 static hva_t kvmppc_mmu_book3s_64_get_pteg(
107 struct kvmppc_vcpu_book3s *vcpu_book3s,
108 struct kvmppc_slb *slbe, gva_t eaddr,
109 bool second)
110 {
111 u64 hash, pteg, htabsize;
112 u32 page;
113 hva_t r;
114
115 page = kvmppc_mmu_book3s_64_get_page(slbe, eaddr);
116 htabsize = ((1 << ((vcpu_book3s->sdr1 & 0x1f) + 11)) - 1);
117
118 hash = slbe->vsid ^ page;
119 if (second)
120 hash = ~hash;
121 hash &= ((1ULL << 39ULL) - 1ULL);
122 hash &= htabsize;
123 hash <<= 7ULL;
124
125 pteg = vcpu_book3s->sdr1 & 0xfffffffffffc0000ULL;
126 pteg |= hash;
127
128 dprintk("MMU: page=0x%x sdr1=0x%llx pteg=0x%llx vsid=0x%llx\n",
129 page, vcpu_book3s->sdr1, pteg, slbe->vsid);
130
131 /* When running a PAPR guest, SDR1 contains a HVA address instead
132 of a GPA */
133 if (vcpu_book3s->vcpu.arch.papr_enabled)
134 r = pteg;
135 else
136 r = gfn_to_hva(vcpu_book3s->vcpu.kvm, pteg >> PAGE_SHIFT);
137
138 if (kvm_is_error_hva(r))
139 return r;
140 return r | (pteg & ~PAGE_MASK);
141 }
142
143 static u64 kvmppc_mmu_book3s_64_get_avpn(struct kvmppc_slb *slbe, gva_t eaddr)
144 {
145 int p = kvmppc_mmu_book3s_64_get_pagesize(slbe);
146 u64 avpn;
147
148 avpn = kvmppc_mmu_book3s_64_get_page(slbe, eaddr);
149 avpn |= slbe->vsid << (28 - p);
150
151 if (p < 24)
152 avpn >>= ((80 - p) - 56) - 8;
153 else
154 avpn <<= 8;
155
156 return avpn;
157 }
158
159 static int kvmppc_mmu_book3s_64_xlate(struct kvm_vcpu *vcpu, gva_t eaddr,
160 struct kvmppc_pte *gpte, bool data)
161 {
162 struct kvmppc_vcpu_book3s *vcpu_book3s = to_book3s(vcpu);
163 struct kvmppc_slb *slbe;
164 hva_t ptegp;
165 u64 pteg[16];
166 u64 avpn = 0;
167 int i;
168 u8 key = 0;
169 bool found = false;
170 bool perm_err = false;
171 int second = 0;
172 ulong mp_ea = vcpu->arch.magic_page_ea;
173
174 /* Magic page override */
175 if (unlikely(mp_ea) &&
176 unlikely((eaddr & ~0xfffULL) == (mp_ea & ~0xfffULL)) &&
177 !(vcpu->arch.shared->msr & MSR_PR)) {
178 gpte->eaddr = eaddr;
179 gpte->vpage = kvmppc_mmu_book3s_64_ea_to_vp(vcpu, eaddr, data);
180 gpte->raddr = vcpu->arch.magic_page_pa | (gpte->raddr & 0xfff);
181 gpte->raddr &= KVM_PAM;
182 gpte->may_execute = true;
183 gpte->may_read = true;
184 gpte->may_write = true;
185
186 return 0;
187 }
188
189 slbe = kvmppc_mmu_book3s_64_find_slbe(vcpu, eaddr);
190 if (!slbe)
191 goto no_seg_found;
192
193 do_second:
194 ptegp = kvmppc_mmu_book3s_64_get_pteg(vcpu_book3s, slbe, eaddr, second);
195 if (kvm_is_error_hva(ptegp))
196 goto no_page_found;
197
198 avpn = kvmppc_mmu_book3s_64_get_avpn(slbe, eaddr);
199
200 if(copy_from_user(pteg, (void __user *)ptegp, sizeof(pteg))) {
201 printk(KERN_ERR "KVM can't copy data from 0x%lx!\n", ptegp);
202 goto no_page_found;
203 }
204
205 if ((vcpu->arch.shared->msr & MSR_PR) && slbe->Kp)
206 key = 4;
207 else if (!(vcpu->arch.shared->msr & MSR_PR) && slbe->Ks)
208 key = 4;
209
210 for (i=0; i<16; i+=2) {
211 u64 v = pteg[i];
212 u64 r = pteg[i+1];
213
214 /* Valid check */
215 if (!(v & HPTE_V_VALID))
216 continue;
217 /* Hash check */
218 if ((v & HPTE_V_SECONDARY) != second)
219 continue;
220
221 /* AVPN compare */
222 if (HPTE_V_AVPN_VAL(avpn) == HPTE_V_AVPN_VAL(v)) {
223 u8 pp = (r & HPTE_R_PP) | key;
224 int eaddr_mask = 0xFFF;
225
226 gpte->eaddr = eaddr;
227 gpte->vpage = kvmppc_mmu_book3s_64_ea_to_vp(vcpu,
228 eaddr,
229 data);
230 if (slbe->large)
231 eaddr_mask = 0xFFFFFF;
232 gpte->raddr = (r & HPTE_R_RPN) | (eaddr & eaddr_mask);
233 gpte->may_execute = ((r & HPTE_R_N) ? false : true);
234 gpte->may_read = false;
235 gpte->may_write = false;
236
237 switch (pp) {
238 case 0:
239 case 1:
240 case 2:
241 case 6:
242 gpte->may_write = true;
243 /* fall through */
244 case 3:
245 case 5:
246 case 7:
247 gpte->may_read = true;
248 break;
249 }
250
251 if (!gpte->may_read) {
252 perm_err = true;
253 continue;
254 }
255
256 dprintk("KVM MMU: Translated 0x%lx [0x%llx] -> 0x%llx "
257 "-> 0x%lx\n",
258 eaddr, avpn, gpte->vpage, gpte->raddr);
259 found = true;
260 break;
261 }
262 }
263
264 /* Update PTE R and C bits, so the guest's swapper knows we used the
265 * page */
266 if (found) {
267 u32 oldr = pteg[i+1];
268
269 if (gpte->may_read) {
270 /* Set the accessed flag */
271 pteg[i+1] |= HPTE_R_R;
272 }
273 if (gpte->may_write) {
274 /* Set the dirty flag */
275 pteg[i+1] |= HPTE_R_C;
276 } else {
277 dprintk("KVM: Mapping read-only page!\n");
278 }
279
280 /* Write back into the PTEG */
281 if (pteg[i+1] != oldr)
282 copy_to_user((void __user *)ptegp, pteg, sizeof(pteg));
283
284 return 0;
285 } else {
286 dprintk("KVM MMU: No PTE found (ea=0x%lx sdr1=0x%llx "
287 "ptegp=0x%lx)\n",
288 eaddr, to_book3s(vcpu)->sdr1, ptegp);
289 for (i = 0; i < 16; i += 2)
290 dprintk(" %02d: 0x%llx - 0x%llx (0x%llx)\n",
291 i, pteg[i], pteg[i+1], avpn);
292
293 if (!second) {
294 second = HPTE_V_SECONDARY;
295 goto do_second;
296 }
297 }
298
299
300 no_page_found:
301
302
303 if (perm_err)
304 return -EPERM;
305
306 return -ENOENT;
307
308 no_seg_found:
309
310 dprintk("KVM MMU: Trigger segment fault\n");
311 return -EINVAL;
312 }
313
314 static void kvmppc_mmu_book3s_64_slbmte(struct kvm_vcpu *vcpu, u64 rs, u64 rb)
315 {
316 struct kvmppc_vcpu_book3s *vcpu_book3s;
317 u64 esid, esid_1t;
318 int slb_nr;
319 struct kvmppc_slb *slbe;
320
321 dprintk("KVM MMU: slbmte(0x%llx, 0x%llx)\n", rs, rb);
322
323 vcpu_book3s = to_book3s(vcpu);
324
325 esid = GET_ESID(rb);
326 esid_1t = GET_ESID_1T(rb);
327 slb_nr = rb & 0xfff;
328
329 if (slb_nr > vcpu->arch.slb_nr)
330 return;
331
332 slbe = &vcpu->arch.slb[slb_nr];
333
334 slbe->large = (rs & SLB_VSID_L) ? 1 : 0;
335 slbe->tb = (rs & SLB_VSID_B_1T) ? 1 : 0;
336 slbe->esid = slbe->tb ? esid_1t : esid;
337 slbe->vsid = rs >> 12;
338 slbe->valid = (rb & SLB_ESID_V) ? 1 : 0;
339 slbe->Ks = (rs & SLB_VSID_KS) ? 1 : 0;
340 slbe->Kp = (rs & SLB_VSID_KP) ? 1 : 0;
341 slbe->nx = (rs & SLB_VSID_N) ? 1 : 0;
342 slbe->class = (rs & SLB_VSID_C) ? 1 : 0;
343
344 slbe->orige = rb & (ESID_MASK | SLB_ESID_V);
345 slbe->origv = rs;
346
347 /* Map the new segment */
348 kvmppc_mmu_map_segment(vcpu, esid << SID_SHIFT);
349 }
350
351 static u64 kvmppc_mmu_book3s_64_slbmfee(struct kvm_vcpu *vcpu, u64 slb_nr)
352 {
353 struct kvmppc_slb *slbe;
354
355 if (slb_nr > vcpu->arch.slb_nr)
356 return 0;
357
358 slbe = &vcpu->arch.slb[slb_nr];
359
360 return slbe->orige;
361 }
362
363 static u64 kvmppc_mmu_book3s_64_slbmfev(struct kvm_vcpu *vcpu, u64 slb_nr)
364 {
365 struct kvmppc_slb *slbe;
366
367 if (slb_nr > vcpu->arch.slb_nr)
368 return 0;
369
370 slbe = &vcpu->arch.slb[slb_nr];
371
372 return slbe->origv;
373 }
374
375 static void kvmppc_mmu_book3s_64_slbie(struct kvm_vcpu *vcpu, u64 ea)
376 {
377 struct kvmppc_slb *slbe;
378
379 dprintk("KVM MMU: slbie(0x%llx)\n", ea);
380
381 slbe = kvmppc_mmu_book3s_64_find_slbe(vcpu, ea);
382
383 if (!slbe)
384 return;
385
386 dprintk("KVM MMU: slbie(0x%llx, 0x%llx)\n", ea, slbe->esid);
387
388 slbe->valid = false;
389
390 kvmppc_mmu_map_segment(vcpu, ea);
391 }
392
393 static void kvmppc_mmu_book3s_64_slbia(struct kvm_vcpu *vcpu)
394 {
395 int i;
396
397 dprintk("KVM MMU: slbia()\n");
398
399 for (i = 1; i < vcpu->arch.slb_nr; i++)
400 vcpu->arch.slb[i].valid = false;
401
402 if (vcpu->arch.shared->msr & MSR_IR) {
403 kvmppc_mmu_flush_segments(vcpu);
404 kvmppc_mmu_map_segment(vcpu, kvmppc_get_pc(vcpu));
405 }
406 }
407
408 static void kvmppc_mmu_book3s_64_mtsrin(struct kvm_vcpu *vcpu, u32 srnum,
409 ulong value)
410 {
411 u64 rb = 0, rs = 0;
412
413 /*
414 * According to Book3 2.01 mtsrin is implemented as:
415 *
416 * The SLB entry specified by (RB)32:35 is loaded from register
417 * RS, as follows.
418 *
419 * SLBE Bit Source SLB Field
420 *
421 * 0:31 0x0000_0000 ESID-0:31
422 * 32:35 (RB)32:35 ESID-32:35
423 * 36 0b1 V
424 * 37:61 0x00_0000|| 0b0 VSID-0:24
425 * 62:88 (RS)37:63 VSID-25:51
426 * 89:91 (RS)33:35 Ks Kp N
427 * 92 (RS)36 L ((RS)36 must be 0b0)
428 * 93 0b0 C
429 */
430
431 dprintk("KVM MMU: mtsrin(0x%x, 0x%lx)\n", srnum, value);
432
433 /* ESID = srnum */
434 rb |= (srnum & 0xf) << 28;
435 /* Set the valid bit */
436 rb |= 1 << 27;
437 /* Index = ESID */
438 rb |= srnum;
439
440 /* VSID = VSID */
441 rs |= (value & 0xfffffff) << 12;
442 /* flags = flags */
443 rs |= ((value >> 28) & 0x7) << 9;
444
445 kvmppc_mmu_book3s_64_slbmte(vcpu, rs, rb);
446 }
447
448 static void kvmppc_mmu_book3s_64_tlbie(struct kvm_vcpu *vcpu, ulong va,
449 bool large)
450 {
451 u64 mask = 0xFFFFFFFFFULL;
452
453 dprintk("KVM MMU: tlbie(0x%lx)\n", va);
454
455 if (large)
456 mask = 0xFFFFFF000ULL;
457 kvmppc_mmu_pte_vflush(vcpu, va >> 12, mask);
458 }
459
460 static int kvmppc_mmu_book3s_64_esid_to_vsid(struct kvm_vcpu *vcpu, ulong esid,
461 u64 *vsid)
462 {
463 ulong ea = esid << SID_SHIFT;
464 struct kvmppc_slb *slb;
465 u64 gvsid = esid;
466 ulong mp_ea = vcpu->arch.magic_page_ea;
467
468 if (vcpu->arch.shared->msr & (MSR_DR|MSR_IR)) {
469 slb = kvmppc_mmu_book3s_64_find_slbe(vcpu, ea);
470 if (slb)
471 gvsid = slb->vsid;
472 }
473
474 switch (vcpu->arch.shared->msr & (MSR_DR|MSR_IR)) {
475 case 0:
476 *vsid = VSID_REAL | esid;
477 break;
478 case MSR_IR:
479 *vsid = VSID_REAL_IR | gvsid;
480 break;
481 case MSR_DR:
482 *vsid = VSID_REAL_DR | gvsid;
483 break;
484 case MSR_DR|MSR_IR:
485 if (!slb)
486 goto no_slb;
487
488 *vsid = gvsid;
489 break;
490 default:
491 BUG();
492 break;
493 }
494
495 if (vcpu->arch.shared->msr & MSR_PR)
496 *vsid |= VSID_PR;
497
498 return 0;
499
500 no_slb:
501 /* Catch magic page case */
502 if (unlikely(mp_ea) &&
503 unlikely(esid == (mp_ea >> SID_SHIFT)) &&
504 !(vcpu->arch.shared->msr & MSR_PR)) {
505 *vsid = VSID_REAL | esid;
506 return 0;
507 }
508
509 return -EINVAL;
510 }
511
512 static bool kvmppc_mmu_book3s_64_is_dcbz32(struct kvm_vcpu *vcpu)
513 {
514 return (to_book3s(vcpu)->hid[5] & 0x80);
515 }
516
517 void kvmppc_mmu_book3s_64_init(struct kvm_vcpu *vcpu)
518 {
519 struct kvmppc_mmu *mmu = &vcpu->arch.mmu;
520
521 mmu->mfsrin = NULL;
522 mmu->mtsrin = kvmppc_mmu_book3s_64_mtsrin;
523 mmu->slbmte = kvmppc_mmu_book3s_64_slbmte;
524 mmu->slbmfee = kvmppc_mmu_book3s_64_slbmfee;
525 mmu->slbmfev = kvmppc_mmu_book3s_64_slbmfev;
526 mmu->slbie = kvmppc_mmu_book3s_64_slbie;
527 mmu->slbia = kvmppc_mmu_book3s_64_slbia;
528 mmu->xlate = kvmppc_mmu_book3s_64_xlate;
529 mmu->reset_msr = kvmppc_mmu_book3s_64_reset_msr;
530 mmu->tlbie = kvmppc_mmu_book3s_64_tlbie;
531 mmu->esid_to_vsid = kvmppc_mmu_book3s_64_esid_to_vsid;
532 mmu->ea_to_vp = kvmppc_mmu_book3s_64_ea_to_vp;
533 mmu->is_dcbz32 = kvmppc_mmu_book3s_64_is_dcbz32;
534
535 vcpu->arch.hflags |= BOOK3S_HFLAG_SLB;
536 }