1b71c9e2fSAlexander Graf /* 2b71c9e2fSAlexander Graf * Copyright (C) 2008-2013 Freescale Semiconductor, Inc. All rights reserved. 3b71c9e2fSAlexander Graf * 4b71c9e2fSAlexander Graf * Author: Yu Liu, yu.liu@freescale.com 5b71c9e2fSAlexander Graf * Scott Wood, scottwood@freescale.com 6b71c9e2fSAlexander Graf * Ashish Kalra, ashish.kalra@freescale.com 7b71c9e2fSAlexander Graf * Varun Sethi, varun.sethi@freescale.com 8b71c9e2fSAlexander Graf * Alexander Graf, agraf@suse.de 9b71c9e2fSAlexander Graf * 10b71c9e2fSAlexander Graf * Description: 11b71c9e2fSAlexander Graf * This file is based on arch/powerpc/kvm/44x_tlb.c, 12b71c9e2fSAlexander Graf * by Hollis Blanchard <hollisb@us.ibm.com>. 13b71c9e2fSAlexander Graf * 14b71c9e2fSAlexander Graf * This program is free software; you can redistribute it and/or modify 15b71c9e2fSAlexander Graf * it under the terms of the GNU General Public License, version 2, as 16b71c9e2fSAlexander Graf * published by the Free Software Foundation. 17b71c9e2fSAlexander Graf */ 18b71c9e2fSAlexander Graf 19b71c9e2fSAlexander Graf #include <linux/kernel.h> 20b71c9e2fSAlexander Graf #include <linux/types.h> 21b71c9e2fSAlexander Graf #include <linux/slab.h> 22b71c9e2fSAlexander Graf #include <linux/string.h> 23b71c9e2fSAlexander Graf #include <linux/kvm.h> 24b71c9e2fSAlexander Graf #include <linux/kvm_host.h> 25b71c9e2fSAlexander Graf #include <linux/highmem.h> 26b71c9e2fSAlexander Graf #include <linux/log2.h> 27b71c9e2fSAlexander Graf #include <linux/uaccess.h> 28589ee628SIngo Molnar #include <linux/sched/mm.h> 29b71c9e2fSAlexander Graf #include <linux/rwsem.h> 30b71c9e2fSAlexander Graf #include <linux/vmalloc.h> 31b71c9e2fSAlexander Graf #include <linux/hugetlb.h> 32b71c9e2fSAlexander Graf #include <asm/kvm_ppc.h> 33b71c9e2fSAlexander Graf 34b71c9e2fSAlexander Graf #include "e500.h" 35b71c9e2fSAlexander Graf #include "timing.h" 36b71c9e2fSAlexander Graf #include "e500_mmu_host.h" 37b71c9e2fSAlexander Graf 38dba291f2SAneesh Kumar K.V #include "trace_booke.h" 39dba291f2SAneesh Kumar K.V 40b71c9e2fSAlexander Graf #define to_htlb1_esel(esel) (host_tlb_params[1].entries - (esel) - 1) 41b71c9e2fSAlexander Graf 42b71c9e2fSAlexander Graf static struct kvmppc_e500_tlb_params host_tlb_params[E500_TLB_NUM]; 43b71c9e2fSAlexander Graf 44b71c9e2fSAlexander Graf static inline unsigned int tlb1_max_shadow_size(void) 45b71c9e2fSAlexander Graf { 46b71c9e2fSAlexander Graf /* reserve one entry for magic page */ 47b71c9e2fSAlexander Graf return host_tlb_params[1].entries - tlbcam_index - 1; 48b71c9e2fSAlexander Graf } 49b71c9e2fSAlexander Graf 50b71c9e2fSAlexander Graf static inline u32 e500_shadow_mas3_attrib(u32 mas3, int usermode) 51b71c9e2fSAlexander Graf { 52b71c9e2fSAlexander Graf /* Mask off reserved bits. */ 53b71c9e2fSAlexander Graf mas3 &= MAS3_ATTRIB_MASK; 54b71c9e2fSAlexander Graf 55b71c9e2fSAlexander Graf #ifndef CONFIG_KVM_BOOKE_HV 56b71c9e2fSAlexander Graf if (!usermode) { 57b71c9e2fSAlexander Graf /* Guest is in supervisor mode, 58b71c9e2fSAlexander Graf * so we need to translate guest 59b71c9e2fSAlexander Graf * supervisor permissions into user permissions. */ 60b71c9e2fSAlexander Graf mas3 &= ~E500_TLB_USER_PERM_MASK; 61b71c9e2fSAlexander Graf mas3 |= (mas3 & E500_TLB_SUPER_PERM_MASK) << 1; 62b71c9e2fSAlexander Graf } 63b71c9e2fSAlexander Graf mas3 |= E500_TLB_SUPER_PERM_MASK; 64b71c9e2fSAlexander Graf #endif 65b71c9e2fSAlexander Graf return mas3; 66b71c9e2fSAlexander Graf } 67b71c9e2fSAlexander Graf 68b71c9e2fSAlexander Graf /* 69b71c9e2fSAlexander Graf * writing shadow tlb entry to host TLB 70b71c9e2fSAlexander Graf */ 71b71c9e2fSAlexander Graf static inline void __write_host_tlbe(struct kvm_book3e_206_tlb_entry *stlbe, 72188e267cSMihai Caraman uint32_t mas0, 73188e267cSMihai Caraman uint32_t lpid) 74b71c9e2fSAlexander Graf { 75b71c9e2fSAlexander Graf unsigned long flags; 76b71c9e2fSAlexander Graf 77b71c9e2fSAlexander Graf local_irq_save(flags); 78b71c9e2fSAlexander Graf mtspr(SPRN_MAS0, mas0); 79b71c9e2fSAlexander Graf mtspr(SPRN_MAS1, stlbe->mas1); 80b71c9e2fSAlexander Graf mtspr(SPRN_MAS2, (unsigned long)stlbe->mas2); 81b71c9e2fSAlexander Graf mtspr(SPRN_MAS3, (u32)stlbe->mas7_3); 82b71c9e2fSAlexander Graf mtspr(SPRN_MAS7, (u32)(stlbe->mas7_3 >> 32)); 83b71c9e2fSAlexander Graf #ifdef CONFIG_KVM_BOOKE_HV 84188e267cSMihai Caraman mtspr(SPRN_MAS8, MAS8_TGS | get_thread_specific_lpid(lpid)); 85b71c9e2fSAlexander Graf #endif 86b71c9e2fSAlexander Graf asm volatile("isync; tlbwe" : : : "memory"); 87b71c9e2fSAlexander Graf 88b71c9e2fSAlexander Graf #ifdef CONFIG_KVM_BOOKE_HV 89b71c9e2fSAlexander Graf /* Must clear mas8 for other host tlbwe's */ 90b71c9e2fSAlexander Graf mtspr(SPRN_MAS8, 0); 91b71c9e2fSAlexander Graf isync(); 92b71c9e2fSAlexander Graf #endif 93b71c9e2fSAlexander Graf local_irq_restore(flags); 94b71c9e2fSAlexander Graf 95b71c9e2fSAlexander Graf trace_kvm_booke206_stlb_write(mas0, stlbe->mas8, stlbe->mas1, 96b71c9e2fSAlexander Graf stlbe->mas2, stlbe->mas7_3); 97b71c9e2fSAlexander Graf } 98b71c9e2fSAlexander Graf 99b71c9e2fSAlexander Graf /* 100b71c9e2fSAlexander Graf * Acquire a mas0 with victim hint, as if we just took a TLB miss. 101b71c9e2fSAlexander Graf * 102b71c9e2fSAlexander Graf * We don't care about the address we're searching for, other than that it's 103b71c9e2fSAlexander Graf * in the right set and is not present in the TLB. Using a zero PID and a 104b71c9e2fSAlexander Graf * userspace address means we don't have to set and then restore MAS5, or 105b71c9e2fSAlexander Graf * calculate a proper MAS6 value. 106b71c9e2fSAlexander Graf */ 107b71c9e2fSAlexander Graf static u32 get_host_mas0(unsigned long eaddr) 108b71c9e2fSAlexander Graf { 109b71c9e2fSAlexander Graf unsigned long flags; 110b71c9e2fSAlexander Graf u32 mas0; 111d57cef91SMihai Caraman u32 mas4; 112b71c9e2fSAlexander Graf 113b71c9e2fSAlexander Graf local_irq_save(flags); 114b71c9e2fSAlexander Graf mtspr(SPRN_MAS6, 0); 115d57cef91SMihai Caraman mas4 = mfspr(SPRN_MAS4); 116d57cef91SMihai Caraman mtspr(SPRN_MAS4, mas4 & ~MAS4_TLBSEL_MASK); 117b71c9e2fSAlexander Graf asm volatile("tlbsx 0, %0" : : "b" (eaddr & ~CONFIG_PAGE_OFFSET)); 118b71c9e2fSAlexander Graf mas0 = mfspr(SPRN_MAS0); 119d57cef91SMihai Caraman mtspr(SPRN_MAS4, mas4); 120b71c9e2fSAlexander Graf local_irq_restore(flags); 121b71c9e2fSAlexander Graf 122b71c9e2fSAlexander Graf return mas0; 123b71c9e2fSAlexander Graf } 124b71c9e2fSAlexander Graf 125b71c9e2fSAlexander Graf /* sesel is for tlb1 only */ 126b71c9e2fSAlexander Graf static inline void write_host_tlbe(struct kvmppc_vcpu_e500 *vcpu_e500, 127b71c9e2fSAlexander Graf int tlbsel, int sesel, struct kvm_book3e_206_tlb_entry *stlbe) 128b71c9e2fSAlexander Graf { 129b71c9e2fSAlexander Graf u32 mas0; 130b71c9e2fSAlexander Graf 131b71c9e2fSAlexander Graf if (tlbsel == 0) { 132b71c9e2fSAlexander Graf mas0 = get_host_mas0(stlbe->mas2); 133188e267cSMihai Caraman __write_host_tlbe(stlbe, mas0, vcpu_e500->vcpu.kvm->arch.lpid); 134b71c9e2fSAlexander Graf } else { 135b71c9e2fSAlexander Graf __write_host_tlbe(stlbe, 136b71c9e2fSAlexander Graf MAS0_TLBSEL(1) | 137188e267cSMihai Caraman MAS0_ESEL(to_htlb1_esel(sesel)), 138188e267cSMihai Caraman vcpu_e500->vcpu.kvm->arch.lpid); 139b71c9e2fSAlexander Graf } 140b71c9e2fSAlexander Graf } 141b71c9e2fSAlexander Graf 142b71c9e2fSAlexander Graf /* sesel is for tlb1 only */ 143b71c9e2fSAlexander Graf static void write_stlbe(struct kvmppc_vcpu_e500 *vcpu_e500, 144b71c9e2fSAlexander Graf struct kvm_book3e_206_tlb_entry *gtlbe, 145b71c9e2fSAlexander Graf struct kvm_book3e_206_tlb_entry *stlbe, 146b71c9e2fSAlexander Graf int stlbsel, int sesel) 147b71c9e2fSAlexander Graf { 148b71c9e2fSAlexander Graf int stid; 149b71c9e2fSAlexander Graf 150b71c9e2fSAlexander Graf preempt_disable(); 151b71c9e2fSAlexander Graf stid = kvmppc_e500_get_tlb_stid(&vcpu_e500->vcpu, gtlbe); 152b71c9e2fSAlexander Graf 153b71c9e2fSAlexander Graf stlbe->mas1 |= MAS1_TID(stid); 154b71c9e2fSAlexander Graf write_host_tlbe(vcpu_e500, stlbsel, sesel, stlbe); 155b71c9e2fSAlexander Graf preempt_enable(); 156b71c9e2fSAlexander Graf } 157b71c9e2fSAlexander Graf 158b71c9e2fSAlexander Graf #ifdef CONFIG_KVM_E500V2 159b71c9e2fSAlexander Graf /* XXX should be a hook in the gva2hpa translation */ 160b71c9e2fSAlexander Graf void kvmppc_map_magic(struct kvm_vcpu *vcpu) 161b71c9e2fSAlexander Graf { 162b71c9e2fSAlexander Graf struct kvmppc_vcpu_e500 *vcpu_e500 = to_e500(vcpu); 163b71c9e2fSAlexander Graf struct kvm_book3e_206_tlb_entry magic; 164b71c9e2fSAlexander Graf ulong shared_page = ((ulong)vcpu->arch.shared) & PAGE_MASK; 165b71c9e2fSAlexander Graf unsigned int stid; 166ba049e93SDan Williams kvm_pfn_t pfn; 167b71c9e2fSAlexander Graf 168ba049e93SDan Williams pfn = (kvm_pfn_t)virt_to_phys((void *)shared_page) >> PAGE_SHIFT; 169b71c9e2fSAlexander Graf get_page(pfn_to_page(pfn)); 170b71c9e2fSAlexander Graf 171b71c9e2fSAlexander Graf preempt_disable(); 172b71c9e2fSAlexander Graf stid = kvmppc_e500_get_sid(vcpu_e500, 0, 0, 0, 0); 173b71c9e2fSAlexander Graf 174b71c9e2fSAlexander Graf magic.mas1 = MAS1_VALID | MAS1_TS | MAS1_TID(stid) | 175b71c9e2fSAlexander Graf MAS1_TSIZE(BOOK3E_PAGESZ_4K); 176b71c9e2fSAlexander Graf magic.mas2 = vcpu->arch.magic_page_ea | MAS2_M; 177b71c9e2fSAlexander Graf magic.mas7_3 = ((u64)pfn << PAGE_SHIFT) | 178b71c9e2fSAlexander Graf MAS3_SW | MAS3_SR | MAS3_UW | MAS3_UR; 179b71c9e2fSAlexander Graf magic.mas8 = 0; 180b71c9e2fSAlexander Graf 181188e267cSMihai Caraman __write_host_tlbe(&magic, MAS0_TLBSEL(1) | MAS0_ESEL(tlbcam_index), 0); 182b71c9e2fSAlexander Graf preempt_enable(); 183b71c9e2fSAlexander Graf } 184b71c9e2fSAlexander Graf #endif 185b71c9e2fSAlexander Graf 186b71c9e2fSAlexander Graf void inval_gtlbe_on_host(struct kvmppc_vcpu_e500 *vcpu_e500, int tlbsel, 187b71c9e2fSAlexander Graf int esel) 188b71c9e2fSAlexander Graf { 189b71c9e2fSAlexander Graf struct kvm_book3e_206_tlb_entry *gtlbe = 190b71c9e2fSAlexander Graf get_entry(vcpu_e500, tlbsel, esel); 191b71c9e2fSAlexander Graf struct tlbe_ref *ref = &vcpu_e500->gtlb_priv[tlbsel][esel].ref; 192b71c9e2fSAlexander Graf 193b71c9e2fSAlexander Graf /* Don't bother with unmapped entries */ 1944d2be6f7SScott Wood if (!(ref->flags & E500_TLB_VALID)) { 1954d2be6f7SScott Wood WARN(ref->flags & (E500_TLB_BITMAP | E500_TLB_TLB0), 1964d2be6f7SScott Wood "%s: flags %x\n", __func__, ref->flags); 1974d2be6f7SScott Wood WARN_ON(tlbsel == 1 && vcpu_e500->g2h_tlb1_map[esel]); 1984d2be6f7SScott Wood } 199b71c9e2fSAlexander Graf 200b71c9e2fSAlexander Graf if (tlbsel == 1 && ref->flags & E500_TLB_BITMAP) { 201b71c9e2fSAlexander Graf u64 tmp = vcpu_e500->g2h_tlb1_map[esel]; 202b71c9e2fSAlexander Graf int hw_tlb_indx; 203b71c9e2fSAlexander Graf unsigned long flags; 204b71c9e2fSAlexander Graf 205b71c9e2fSAlexander Graf local_irq_save(flags); 206b71c9e2fSAlexander Graf while (tmp) { 207b71c9e2fSAlexander Graf hw_tlb_indx = __ilog2_u64(tmp & -tmp); 208b71c9e2fSAlexander Graf mtspr(SPRN_MAS0, 209b71c9e2fSAlexander Graf MAS0_TLBSEL(1) | 210b71c9e2fSAlexander Graf MAS0_ESEL(to_htlb1_esel(hw_tlb_indx))); 211b71c9e2fSAlexander Graf mtspr(SPRN_MAS1, 0); 212b71c9e2fSAlexander Graf asm volatile("tlbwe"); 213b71c9e2fSAlexander Graf vcpu_e500->h2g_tlb1_rmap[hw_tlb_indx] = 0; 214b71c9e2fSAlexander Graf tmp &= tmp - 1; 215b71c9e2fSAlexander Graf } 216b71c9e2fSAlexander Graf mb(); 217b71c9e2fSAlexander Graf vcpu_e500->g2h_tlb1_map[esel] = 0; 218b71c9e2fSAlexander Graf ref->flags &= ~(E500_TLB_BITMAP | E500_TLB_VALID); 219b71c9e2fSAlexander Graf local_irq_restore(flags); 220b71c9e2fSAlexander Graf } 221b71c9e2fSAlexander Graf 222c015c62bSAlexander Graf if (tlbsel == 1 && ref->flags & E500_TLB_TLB0) { 223c015c62bSAlexander Graf /* 224c015c62bSAlexander Graf * TLB1 entry is backed by 4k pages. This should happen 225c015c62bSAlexander Graf * rarely and is not worth optimizing. Invalidate everything. 226c015c62bSAlexander Graf */ 227c015c62bSAlexander Graf kvmppc_e500_tlbil_all(vcpu_e500); 228c015c62bSAlexander Graf ref->flags &= ~(E500_TLB_TLB0 | E500_TLB_VALID); 229c015c62bSAlexander Graf } 230c015c62bSAlexander Graf 23130a91fe2SBharat Bhushan /* 23230a91fe2SBharat Bhushan * If TLB entry is still valid then it's a TLB0 entry, and thus 23330a91fe2SBharat Bhushan * backed by at most one host tlbe per shadow pid 23430a91fe2SBharat Bhushan */ 23530a91fe2SBharat Bhushan if (ref->flags & E500_TLB_VALID) 236b71c9e2fSAlexander Graf kvmppc_e500_tlbil_one(vcpu_e500, gtlbe); 237b71c9e2fSAlexander Graf 238b71c9e2fSAlexander Graf /* Mark the TLB as not backed by the host anymore */ 23930a91fe2SBharat Bhushan ref->flags = 0; 240b71c9e2fSAlexander Graf } 241b71c9e2fSAlexander Graf 242b71c9e2fSAlexander Graf static inline int tlbe_is_writable(struct kvm_book3e_206_tlb_entry *tlbe) 243b71c9e2fSAlexander Graf { 244b71c9e2fSAlexander Graf return tlbe->mas7_3 & (MAS3_SW|MAS3_UW); 245b71c9e2fSAlexander Graf } 246b71c9e2fSAlexander Graf 247b71c9e2fSAlexander Graf static inline void kvmppc_e500_ref_setup(struct tlbe_ref *ref, 248b71c9e2fSAlexander Graf struct kvm_book3e_206_tlb_entry *gtlbe, 249ba049e93SDan Williams kvm_pfn_t pfn, unsigned int wimg) 250b71c9e2fSAlexander Graf { 251b71c9e2fSAlexander Graf ref->pfn = pfn; 25230a91fe2SBharat Bhushan ref->flags = E500_TLB_VALID; 253b71c9e2fSAlexander Graf 25408c9a188SBharat Bhushan /* Use guest supplied MAS2_G and MAS2_E */ 25508c9a188SBharat Bhushan ref->flags |= (gtlbe->mas2 & MAS2_ATTRIB_MASK) | wimg; 25608c9a188SBharat Bhushan 25784e4d632SBharat Bhushan /* Mark the page accessed */ 25884e4d632SBharat Bhushan kvm_set_pfn_accessed(pfn); 25984e4d632SBharat Bhushan 260b71c9e2fSAlexander Graf if (tlbe_is_writable(gtlbe)) 261b71c9e2fSAlexander Graf kvm_set_pfn_dirty(pfn); 262b71c9e2fSAlexander Graf } 263b71c9e2fSAlexander Graf 264b71c9e2fSAlexander Graf static inline void kvmppc_e500_ref_release(struct tlbe_ref *ref) 265b71c9e2fSAlexander Graf { 266b71c9e2fSAlexander Graf if (ref->flags & E500_TLB_VALID) { 2674d2be6f7SScott Wood /* FIXME: don't log bogus pfn for TLB1 */ 268b71c9e2fSAlexander Graf trace_kvm_booke206_ref_release(ref->pfn, ref->flags); 269b71c9e2fSAlexander Graf ref->flags = 0; 270b71c9e2fSAlexander Graf } 271b71c9e2fSAlexander Graf } 272b71c9e2fSAlexander Graf 273483ba97cSAlexander Graf static void clear_tlb1_bitmap(struct kvmppc_vcpu_e500 *vcpu_e500) 274b71c9e2fSAlexander Graf { 275b71c9e2fSAlexander Graf if (vcpu_e500->g2h_tlb1_map) 276b71c9e2fSAlexander Graf memset(vcpu_e500->g2h_tlb1_map, 0, 277b71c9e2fSAlexander Graf sizeof(u64) * vcpu_e500->gtlb_params[1].entries); 278b71c9e2fSAlexander Graf if (vcpu_e500->h2g_tlb1_rmap) 279b71c9e2fSAlexander Graf memset(vcpu_e500->h2g_tlb1_rmap, 0, 280b71c9e2fSAlexander Graf sizeof(unsigned int) * host_tlb_params[1].entries); 281b71c9e2fSAlexander Graf } 282b71c9e2fSAlexander Graf 283b71c9e2fSAlexander Graf static void clear_tlb_privs(struct kvmppc_vcpu_e500 *vcpu_e500) 284b71c9e2fSAlexander Graf { 2854d2be6f7SScott Wood int tlbsel; 286b71c9e2fSAlexander Graf int i; 287b71c9e2fSAlexander Graf 2884d2be6f7SScott Wood for (tlbsel = 0; tlbsel <= 1; tlbsel++) { 289b71c9e2fSAlexander Graf for (i = 0; i < vcpu_e500->gtlb_params[tlbsel].entries; i++) { 290b71c9e2fSAlexander Graf struct tlbe_ref *ref = 291b71c9e2fSAlexander Graf &vcpu_e500->gtlb_priv[tlbsel][i].ref; 292b71c9e2fSAlexander Graf kvmppc_e500_ref_release(ref); 293b71c9e2fSAlexander Graf } 294b71c9e2fSAlexander Graf } 295b71c9e2fSAlexander Graf } 296b71c9e2fSAlexander Graf 297b71c9e2fSAlexander Graf void kvmppc_core_flush_tlb(struct kvm_vcpu *vcpu) 298b71c9e2fSAlexander Graf { 299b71c9e2fSAlexander Graf struct kvmppc_vcpu_e500 *vcpu_e500 = to_e500(vcpu); 3004d2be6f7SScott Wood kvmppc_e500_tlbil_all(vcpu_e500); 3014d2be6f7SScott Wood clear_tlb_privs(vcpu_e500); 302b71c9e2fSAlexander Graf clear_tlb1_bitmap(vcpu_e500); 303b71c9e2fSAlexander Graf } 304b71c9e2fSAlexander Graf 305b71c9e2fSAlexander Graf /* TID must be supplied by the caller */ 306b71c9e2fSAlexander Graf static void kvmppc_e500_setup_stlbe( 307b71c9e2fSAlexander Graf struct kvm_vcpu *vcpu, 308b71c9e2fSAlexander Graf struct kvm_book3e_206_tlb_entry *gtlbe, 309b71c9e2fSAlexander Graf int tsize, struct tlbe_ref *ref, u64 gvaddr, 310b71c9e2fSAlexander Graf struct kvm_book3e_206_tlb_entry *stlbe) 311b71c9e2fSAlexander Graf { 312ba049e93SDan Williams kvm_pfn_t pfn = ref->pfn; 313b71c9e2fSAlexander Graf u32 pr = vcpu->arch.shared->msr & MSR_PR; 314b71c9e2fSAlexander Graf 315b71c9e2fSAlexander Graf BUG_ON(!(ref->flags & E500_TLB_VALID)); 316b71c9e2fSAlexander Graf 317b71c9e2fSAlexander Graf /* Force IPROT=0 for all guest mappings. */ 318b71c9e2fSAlexander Graf stlbe->mas1 = MAS1_TSIZE(tsize) | get_tlb_sts(gtlbe) | MAS1_VALID; 31908c9a188SBharat Bhushan stlbe->mas2 = (gvaddr & MAS2_EPN) | (ref->flags & E500_TLB_MAS2_ATTR); 320b71c9e2fSAlexander Graf stlbe->mas7_3 = ((u64)pfn << PAGE_SHIFT) | 321b71c9e2fSAlexander Graf e500_shadow_mas3_attrib(gtlbe->mas7_3, pr); 322b71c9e2fSAlexander Graf } 323b71c9e2fSAlexander Graf 324b71c9e2fSAlexander Graf static inline int kvmppc_e500_shadow_map(struct kvmppc_vcpu_e500 *vcpu_e500, 325b71c9e2fSAlexander Graf u64 gvaddr, gfn_t gfn, struct kvm_book3e_206_tlb_entry *gtlbe, 326b71c9e2fSAlexander Graf int tlbsel, struct kvm_book3e_206_tlb_entry *stlbe, 327b71c9e2fSAlexander Graf struct tlbe_ref *ref) 328b71c9e2fSAlexander Graf { 329b71c9e2fSAlexander Graf struct kvm_memory_slot *slot; 330b71c9e2fSAlexander Graf unsigned long pfn = 0; /* silence GCC warning */ 331b71c9e2fSAlexander Graf unsigned long hva; 332b71c9e2fSAlexander Graf int pfnmap = 0; 333b71c9e2fSAlexander Graf int tsize = BOOK3E_PAGESZ_4K; 33440fde70dSBharat Bhushan int ret = 0; 33540fde70dSBharat Bhushan unsigned long mmu_seq; 33640fde70dSBharat Bhushan struct kvm *kvm = vcpu_e500->vcpu.kvm; 33708c9a188SBharat Bhushan unsigned long tsize_pages = 0; 33808c9a188SBharat Bhushan pte_t *ptep; 33908c9a188SBharat Bhushan unsigned int wimg = 0; 34008c9a188SBharat Bhushan pgd_t *pgdir; 341691e95fdSAneesh Kumar K.V unsigned long flags; 34240fde70dSBharat Bhushan 34340fde70dSBharat Bhushan /* used to check for invalidations in progress */ 34440fde70dSBharat Bhushan mmu_seq = kvm->mmu_notifier_seq; 34540fde70dSBharat Bhushan smp_rmb(); 346b71c9e2fSAlexander Graf 347b71c9e2fSAlexander Graf /* 348b71c9e2fSAlexander Graf * Translate guest physical to true physical, acquiring 349b71c9e2fSAlexander Graf * a page reference if it is normal, non-reserved memory. 350b71c9e2fSAlexander Graf * 351b71c9e2fSAlexander Graf * gfn_to_memslot() must succeed because otherwise we wouldn't 352b71c9e2fSAlexander Graf * have gotten this far. Eventually we should just pass the slot 353b71c9e2fSAlexander Graf * pointer through from the first lookup. 354b71c9e2fSAlexander Graf */ 355b71c9e2fSAlexander Graf slot = gfn_to_memslot(vcpu_e500->vcpu.kvm, gfn); 356b71c9e2fSAlexander Graf hva = gfn_to_hva_memslot(slot, gfn); 357b71c9e2fSAlexander Graf 358b71c9e2fSAlexander Graf if (tlbsel == 1) { 359b71c9e2fSAlexander Graf struct vm_area_struct *vma; 360b71c9e2fSAlexander Graf down_read(¤t->mm->mmap_sem); 361b71c9e2fSAlexander Graf 362b71c9e2fSAlexander Graf vma = find_vma(current->mm, hva); 363b71c9e2fSAlexander Graf if (vma && hva >= vma->vm_start && 364b71c9e2fSAlexander Graf (vma->vm_flags & VM_PFNMAP)) { 365b71c9e2fSAlexander Graf /* 366b71c9e2fSAlexander Graf * This VMA is a physically contiguous region (e.g. 367b71c9e2fSAlexander Graf * /dev/mem) that bypasses normal Linux page 368b71c9e2fSAlexander Graf * management. Find the overlap between the 369b71c9e2fSAlexander Graf * vma and the memslot. 370b71c9e2fSAlexander Graf */ 371b71c9e2fSAlexander Graf 372b71c9e2fSAlexander Graf unsigned long start, end; 373b71c9e2fSAlexander Graf unsigned long slot_start, slot_end; 374b71c9e2fSAlexander Graf 375b71c9e2fSAlexander Graf pfnmap = 1; 376b71c9e2fSAlexander Graf 377b71c9e2fSAlexander Graf start = vma->vm_pgoff; 378b71c9e2fSAlexander Graf end = start + 379b71c9e2fSAlexander Graf ((vma->vm_end - vma->vm_start) >> PAGE_SHIFT); 380b71c9e2fSAlexander Graf 381b71c9e2fSAlexander Graf pfn = start + ((hva - vma->vm_start) >> PAGE_SHIFT); 382b71c9e2fSAlexander Graf 383b71c9e2fSAlexander Graf slot_start = pfn - (gfn - slot->base_gfn); 384b71c9e2fSAlexander Graf slot_end = slot_start + slot->npages; 385b71c9e2fSAlexander Graf 386b71c9e2fSAlexander Graf if (start < slot_start) 387b71c9e2fSAlexander Graf start = slot_start; 388b71c9e2fSAlexander Graf if (end > slot_end) 389b71c9e2fSAlexander Graf end = slot_end; 390b71c9e2fSAlexander Graf 391b71c9e2fSAlexander Graf tsize = (gtlbe->mas1 & MAS1_TSIZE_MASK) >> 392b71c9e2fSAlexander Graf MAS1_TSIZE_SHIFT; 393b71c9e2fSAlexander Graf 394b71c9e2fSAlexander Graf /* 395b71c9e2fSAlexander Graf * e500 doesn't implement the lowest tsize bit, 396b71c9e2fSAlexander Graf * or 1K pages. 397b71c9e2fSAlexander Graf */ 398b71c9e2fSAlexander Graf tsize = max(BOOK3E_PAGESZ_4K, tsize & ~1); 399b71c9e2fSAlexander Graf 400b71c9e2fSAlexander Graf /* 401b71c9e2fSAlexander Graf * Now find the largest tsize (up to what the guest 402b71c9e2fSAlexander Graf * requested) that will cover gfn, stay within the 403b71c9e2fSAlexander Graf * range, and for which gfn and pfn are mutually 404b71c9e2fSAlexander Graf * aligned. 405b71c9e2fSAlexander Graf */ 406b71c9e2fSAlexander Graf 407b71c9e2fSAlexander Graf for (; tsize > BOOK3E_PAGESZ_4K; tsize -= 2) { 40808c9a188SBharat Bhushan unsigned long gfn_start, gfn_end; 409224f3632STudor Laurentiu tsize_pages = 1UL << (tsize - 2); 410b71c9e2fSAlexander Graf 411b71c9e2fSAlexander Graf gfn_start = gfn & ~(tsize_pages - 1); 412b71c9e2fSAlexander Graf gfn_end = gfn_start + tsize_pages; 413b71c9e2fSAlexander Graf 414b71c9e2fSAlexander Graf if (gfn_start + pfn - gfn < start) 415b71c9e2fSAlexander Graf continue; 416b71c9e2fSAlexander Graf if (gfn_end + pfn - gfn > end) 417b71c9e2fSAlexander Graf continue; 418b71c9e2fSAlexander Graf if ((gfn & (tsize_pages - 1)) != 419b71c9e2fSAlexander Graf (pfn & (tsize_pages - 1))) 420b71c9e2fSAlexander Graf continue; 421b71c9e2fSAlexander Graf 422b71c9e2fSAlexander Graf gvaddr &= ~((tsize_pages << PAGE_SHIFT) - 1); 423b71c9e2fSAlexander Graf pfn &= ~(tsize_pages - 1); 424b71c9e2fSAlexander Graf break; 425b71c9e2fSAlexander Graf } 426b71c9e2fSAlexander Graf } else if (vma && hva >= vma->vm_start && 427b71c9e2fSAlexander Graf (vma->vm_flags & VM_HUGETLB)) { 428b71c9e2fSAlexander Graf unsigned long psize = vma_kernel_pagesize(vma); 429b71c9e2fSAlexander Graf 430b71c9e2fSAlexander Graf tsize = (gtlbe->mas1 & MAS1_TSIZE_MASK) >> 431b71c9e2fSAlexander Graf MAS1_TSIZE_SHIFT; 432b71c9e2fSAlexander Graf 433b71c9e2fSAlexander Graf /* 434b71c9e2fSAlexander Graf * Take the largest page size that satisfies both host 435b71c9e2fSAlexander Graf * and guest mapping 436b71c9e2fSAlexander Graf */ 437b71c9e2fSAlexander Graf tsize = min(__ilog2(psize) - 10, tsize); 438b71c9e2fSAlexander Graf 439b71c9e2fSAlexander Graf /* 440b71c9e2fSAlexander Graf * e500 doesn't implement the lowest tsize bit, 441b71c9e2fSAlexander Graf * or 1K pages. 442b71c9e2fSAlexander Graf */ 443b71c9e2fSAlexander Graf tsize = max(BOOK3E_PAGESZ_4K, tsize & ~1); 444b71c9e2fSAlexander Graf } 445b71c9e2fSAlexander Graf 446b71c9e2fSAlexander Graf up_read(¤t->mm->mmap_sem); 447b71c9e2fSAlexander Graf } 448b71c9e2fSAlexander Graf 449b71c9e2fSAlexander Graf if (likely(!pfnmap)) { 450224f3632STudor Laurentiu tsize_pages = 1UL << (tsize + 10 - PAGE_SHIFT); 451b71c9e2fSAlexander Graf pfn = gfn_to_pfn_memslot(slot, gfn); 452b71c9e2fSAlexander Graf if (is_error_noslot_pfn(pfn)) { 45308c9a188SBharat Bhushan if (printk_ratelimit()) 45408c9a188SBharat Bhushan pr_err("%s: real page not found for gfn %lx\n", 45508c9a188SBharat Bhushan __func__, (long)gfn); 456b71c9e2fSAlexander Graf return -EINVAL; 457b71c9e2fSAlexander Graf } 458b71c9e2fSAlexander Graf 459b71c9e2fSAlexander Graf /* Align guest and physical address to page map boundaries */ 460b71c9e2fSAlexander Graf pfn &= ~(tsize_pages - 1); 461b71c9e2fSAlexander Graf gvaddr &= ~((tsize_pages << PAGE_SHIFT) - 1); 462b71c9e2fSAlexander Graf } 463b71c9e2fSAlexander Graf 46440fde70dSBharat Bhushan spin_lock(&kvm->mmu_lock); 46540fde70dSBharat Bhushan if (mmu_notifier_retry(kvm, mmu_seq)) { 46640fde70dSBharat Bhushan ret = -EAGAIN; 46740fde70dSBharat Bhushan goto out; 46840fde70dSBharat Bhushan } 46940fde70dSBharat Bhushan 47008c9a188SBharat Bhushan 47108c9a188SBharat Bhushan pgdir = vcpu_e500->vcpu.arch.pgdir; 472691e95fdSAneesh Kumar K.V /* 473691e95fdSAneesh Kumar K.V * We are just looking at the wimg bits, so we don't 474691e95fdSAneesh Kumar K.V * care much about the trans splitting bit. 475691e95fdSAneesh Kumar K.V * We are holding kvm->mmu_lock so a notifier invalidate 476691e95fdSAneesh Kumar K.V * can't run hence pfn won't change. 477691e95fdSAneesh Kumar K.V */ 478691e95fdSAneesh Kumar K.V local_irq_save(flags); 479891121e6SAneesh Kumar K.V ptep = find_linux_pte_or_hugepte(pgdir, hva, NULL, NULL); 4805e1d44aeSAneesh Kumar K.V if (ptep) { 4815e1d44aeSAneesh Kumar K.V pte_t pte = READ_ONCE(*ptep); 4825e1d44aeSAneesh Kumar K.V 483691e95fdSAneesh Kumar K.V if (pte_present(pte)) { 4845e1d44aeSAneesh Kumar K.V wimg = (pte_val(pte) >> PTE_WIMGE_SHIFT) & 4855e1d44aeSAneesh Kumar K.V MAS2_WIMGE_MASK; 486691e95fdSAneesh Kumar K.V local_irq_restore(flags); 487691e95fdSAneesh Kumar K.V } else { 488691e95fdSAneesh Kumar K.V local_irq_restore(flags); 4895e1d44aeSAneesh Kumar K.V pr_err_ratelimited("%s: pte not present: gfn %lx,pfn %lx\n", 49008c9a188SBharat Bhushan __func__, (long)gfn, pfn); 491511c6681SMihai Caraman ret = -EINVAL; 492511c6681SMihai Caraman goto out; 49308c9a188SBharat Bhushan } 4945e1d44aeSAneesh Kumar K.V } 49508c9a188SBharat Bhushan kvmppc_e500_ref_setup(ref, gtlbe, pfn, wimg); 496b71c9e2fSAlexander Graf 497b71c9e2fSAlexander Graf kvmppc_e500_setup_stlbe(&vcpu_e500->vcpu, gtlbe, tsize, 498b71c9e2fSAlexander Graf ref, gvaddr, stlbe); 499b71c9e2fSAlexander Graf 500b71c9e2fSAlexander Graf /* Clear i-cache for new pages */ 501b71c9e2fSAlexander Graf kvmppc_mmu_flush_icache(pfn); 502b71c9e2fSAlexander Graf 50340fde70dSBharat Bhushan out: 50440fde70dSBharat Bhushan spin_unlock(&kvm->mmu_lock); 50540fde70dSBharat Bhushan 506b71c9e2fSAlexander Graf /* Drop refcount on page, so that mmu notifiers can clear it */ 507b71c9e2fSAlexander Graf kvm_release_pfn_clean(pfn); 508b71c9e2fSAlexander Graf 50940fde70dSBharat Bhushan return ret; 510b71c9e2fSAlexander Graf } 511b71c9e2fSAlexander Graf 512b71c9e2fSAlexander Graf /* XXX only map the one-one case, for now use TLB0 */ 513b71c9e2fSAlexander Graf static int kvmppc_e500_tlb0_map(struct kvmppc_vcpu_e500 *vcpu_e500, int esel, 514b71c9e2fSAlexander Graf struct kvm_book3e_206_tlb_entry *stlbe) 515b71c9e2fSAlexander Graf { 516b71c9e2fSAlexander Graf struct kvm_book3e_206_tlb_entry *gtlbe; 517b71c9e2fSAlexander Graf struct tlbe_ref *ref; 518b71c9e2fSAlexander Graf int stlbsel = 0; 519b71c9e2fSAlexander Graf int sesel = 0; 520b71c9e2fSAlexander Graf int r; 521b71c9e2fSAlexander Graf 522b71c9e2fSAlexander Graf gtlbe = get_entry(vcpu_e500, 0, esel); 523b71c9e2fSAlexander Graf ref = &vcpu_e500->gtlb_priv[0][esel].ref; 524b71c9e2fSAlexander Graf 525b71c9e2fSAlexander Graf r = kvmppc_e500_shadow_map(vcpu_e500, get_tlb_eaddr(gtlbe), 526b71c9e2fSAlexander Graf get_tlb_raddr(gtlbe) >> PAGE_SHIFT, 527b71c9e2fSAlexander Graf gtlbe, 0, stlbe, ref); 528b71c9e2fSAlexander Graf if (r) 529b71c9e2fSAlexander Graf return r; 530b71c9e2fSAlexander Graf 531b71c9e2fSAlexander Graf write_stlbe(vcpu_e500, gtlbe, stlbe, stlbsel, sesel); 532b71c9e2fSAlexander Graf 533b71c9e2fSAlexander Graf return 0; 534b71c9e2fSAlexander Graf } 535b71c9e2fSAlexander Graf 536c015c62bSAlexander Graf static int kvmppc_e500_tlb1_map_tlb1(struct kvmppc_vcpu_e500 *vcpu_e500, 537c015c62bSAlexander Graf struct tlbe_ref *ref, 538c015c62bSAlexander Graf int esel) 539b71c9e2fSAlexander Graf { 540c015c62bSAlexander Graf unsigned int sesel = vcpu_e500->host_tlb1_nv++; 541b71c9e2fSAlexander Graf 542b71c9e2fSAlexander Graf if (unlikely(vcpu_e500->host_tlb1_nv >= tlb1_max_shadow_size())) 543b71c9e2fSAlexander Graf vcpu_e500->host_tlb1_nv = 0; 544b71c9e2fSAlexander Graf 545b71c9e2fSAlexander Graf if (vcpu_e500->h2g_tlb1_rmap[sesel]) { 5466b2ba1a9SScott Wood unsigned int idx = vcpu_e500->h2g_tlb1_rmap[sesel] - 1; 547b71c9e2fSAlexander Graf vcpu_e500->g2h_tlb1_map[idx] &= ~(1ULL << sesel); 548b71c9e2fSAlexander Graf } 54966a5fecdSScott Wood 55066a5fecdSScott Wood vcpu_e500->gtlb_priv[1][esel].ref.flags |= E500_TLB_BITMAP; 55166a5fecdSScott Wood vcpu_e500->g2h_tlb1_map[esel] |= (u64)1 << sesel; 5526b2ba1a9SScott Wood vcpu_e500->h2g_tlb1_rmap[sesel] = esel + 1; 5534d2be6f7SScott Wood WARN_ON(!(ref->flags & E500_TLB_VALID)); 554b71c9e2fSAlexander Graf 555c015c62bSAlexander Graf return sesel; 556c015c62bSAlexander Graf } 557c015c62bSAlexander Graf 558c015c62bSAlexander Graf /* Caller must ensure that the specified guest TLB entry is safe to insert into 559c015c62bSAlexander Graf * the shadow TLB. */ 560c015c62bSAlexander Graf /* For both one-one and one-to-many */ 561c015c62bSAlexander Graf static int kvmppc_e500_tlb1_map(struct kvmppc_vcpu_e500 *vcpu_e500, 562c015c62bSAlexander Graf u64 gvaddr, gfn_t gfn, struct kvm_book3e_206_tlb_entry *gtlbe, 563c015c62bSAlexander Graf struct kvm_book3e_206_tlb_entry *stlbe, int esel) 564c015c62bSAlexander Graf { 5654d2be6f7SScott Wood struct tlbe_ref *ref = &vcpu_e500->gtlb_priv[1][esel].ref; 566c015c62bSAlexander Graf int sesel; 567c015c62bSAlexander Graf int r; 568c015c62bSAlexander Graf 569c015c62bSAlexander Graf r = kvmppc_e500_shadow_map(vcpu_e500, gvaddr, gfn, gtlbe, 1, stlbe, 5704d2be6f7SScott Wood ref); 571c015c62bSAlexander Graf if (r) 572c015c62bSAlexander Graf return r; 573c015c62bSAlexander Graf 574c015c62bSAlexander Graf /* Use TLB0 when we can only map a page with 4k */ 575c015c62bSAlexander Graf if (get_tlb_tsize(stlbe) == BOOK3E_PAGESZ_4K) { 576c015c62bSAlexander Graf vcpu_e500->gtlb_priv[1][esel].ref.flags |= E500_TLB_TLB0; 577c015c62bSAlexander Graf write_stlbe(vcpu_e500, gtlbe, stlbe, 0, 0); 578c015c62bSAlexander Graf return 0; 579c015c62bSAlexander Graf } 580c015c62bSAlexander Graf 581c015c62bSAlexander Graf /* Otherwise map into TLB1 */ 5824d2be6f7SScott Wood sesel = kvmppc_e500_tlb1_map_tlb1(vcpu_e500, ref, esel); 583c015c62bSAlexander Graf write_stlbe(vcpu_e500, gtlbe, stlbe, 1, sesel); 584b71c9e2fSAlexander Graf 585b71c9e2fSAlexander Graf return 0; 586b71c9e2fSAlexander Graf } 587b71c9e2fSAlexander Graf 588b71c9e2fSAlexander Graf void kvmppc_mmu_map(struct kvm_vcpu *vcpu, u64 eaddr, gpa_t gpaddr, 589b71c9e2fSAlexander Graf unsigned int index) 590b71c9e2fSAlexander Graf { 591b71c9e2fSAlexander Graf struct kvmppc_vcpu_e500 *vcpu_e500 = to_e500(vcpu); 592b71c9e2fSAlexander Graf struct tlbe_priv *priv; 593b71c9e2fSAlexander Graf struct kvm_book3e_206_tlb_entry *gtlbe, stlbe; 594b71c9e2fSAlexander Graf int tlbsel = tlbsel_of(index); 595b71c9e2fSAlexander Graf int esel = esel_of(index); 596b71c9e2fSAlexander Graf 597b71c9e2fSAlexander Graf gtlbe = get_entry(vcpu_e500, tlbsel, esel); 598b71c9e2fSAlexander Graf 599b71c9e2fSAlexander Graf switch (tlbsel) { 600b71c9e2fSAlexander Graf case 0: 601b71c9e2fSAlexander Graf priv = &vcpu_e500->gtlb_priv[tlbsel][esel]; 602b71c9e2fSAlexander Graf 6034d2be6f7SScott Wood /* Triggers after clear_tlb_privs or on initial mapping */ 604b71c9e2fSAlexander Graf if (!(priv->ref.flags & E500_TLB_VALID)) { 605b71c9e2fSAlexander Graf kvmppc_e500_tlb0_map(vcpu_e500, esel, &stlbe); 606b71c9e2fSAlexander Graf } else { 607b71c9e2fSAlexander Graf kvmppc_e500_setup_stlbe(vcpu, gtlbe, BOOK3E_PAGESZ_4K, 608b71c9e2fSAlexander Graf &priv->ref, eaddr, &stlbe); 609b71c9e2fSAlexander Graf write_stlbe(vcpu_e500, gtlbe, &stlbe, 0, 0); 610b71c9e2fSAlexander Graf } 611b71c9e2fSAlexander Graf break; 612b71c9e2fSAlexander Graf 613b71c9e2fSAlexander Graf case 1: { 614b71c9e2fSAlexander Graf gfn_t gfn = gpaddr >> PAGE_SHIFT; 615b71c9e2fSAlexander Graf kvmppc_e500_tlb1_map(vcpu_e500, eaddr, gfn, gtlbe, &stlbe, 616b71c9e2fSAlexander Graf esel); 617b71c9e2fSAlexander Graf break; 618b71c9e2fSAlexander Graf } 619b71c9e2fSAlexander Graf 620b71c9e2fSAlexander Graf default: 621b71c9e2fSAlexander Graf BUG(); 622b71c9e2fSAlexander Graf break; 623b71c9e2fSAlexander Graf } 624b71c9e2fSAlexander Graf } 625b71c9e2fSAlexander Graf 626f5250471SMihai Caraman #ifdef CONFIG_KVM_BOOKE_HV 627f5250471SMihai Caraman int kvmppc_load_last_inst(struct kvm_vcpu *vcpu, enum instruction_type type, 628f5250471SMihai Caraman u32 *instr) 629f5250471SMihai Caraman { 630f5250471SMihai Caraman gva_t geaddr; 631f5250471SMihai Caraman hpa_t addr; 632f5250471SMihai Caraman hfn_t pfn; 633f5250471SMihai Caraman hva_t eaddr; 634f5250471SMihai Caraman u32 mas1, mas2, mas3; 635f5250471SMihai Caraman u64 mas7_mas3; 636f5250471SMihai Caraman struct page *page; 637f5250471SMihai Caraman unsigned int addr_space, psize_shift; 638f5250471SMihai Caraman bool pr; 639f5250471SMihai Caraman unsigned long flags; 640f5250471SMihai Caraman 641f5250471SMihai Caraman /* Search TLB for guest pc to get the real address */ 642f5250471SMihai Caraman geaddr = kvmppc_get_pc(vcpu); 643f5250471SMihai Caraman 644f5250471SMihai Caraman addr_space = (vcpu->arch.shared->msr & MSR_IS) >> MSR_IR_LG; 645f5250471SMihai Caraman 646f5250471SMihai Caraman local_irq_save(flags); 647f5250471SMihai Caraman mtspr(SPRN_MAS6, (vcpu->arch.pid << MAS6_SPID_SHIFT) | addr_space); 648188e267cSMihai Caraman mtspr(SPRN_MAS5, MAS5_SGS | get_lpid(vcpu)); 649f5250471SMihai Caraman asm volatile("tlbsx 0, %[geaddr]\n" : : 650f5250471SMihai Caraman [geaddr] "r" (geaddr)); 651f5250471SMihai Caraman mtspr(SPRN_MAS5, 0); 652f5250471SMihai Caraman mtspr(SPRN_MAS8, 0); 653f5250471SMihai Caraman mas1 = mfspr(SPRN_MAS1); 654f5250471SMihai Caraman mas2 = mfspr(SPRN_MAS2); 655f5250471SMihai Caraman mas3 = mfspr(SPRN_MAS3); 656f5250471SMihai Caraman #ifdef CONFIG_64BIT 657f5250471SMihai Caraman mas7_mas3 = mfspr(SPRN_MAS7_MAS3); 658f5250471SMihai Caraman #else 659f5250471SMihai Caraman mas7_mas3 = ((u64)mfspr(SPRN_MAS7) << 32) | mas3; 660f5250471SMihai Caraman #endif 661f5250471SMihai Caraman local_irq_restore(flags); 662f5250471SMihai Caraman 663f5250471SMihai Caraman /* 664f5250471SMihai Caraman * If the TLB entry for guest pc was evicted, return to the guest. 665f5250471SMihai Caraman * There are high chances to find a valid TLB entry next time. 666f5250471SMihai Caraman */ 667f5250471SMihai Caraman if (!(mas1 & MAS1_VALID)) 668f5250471SMihai Caraman return EMULATE_AGAIN; 669f5250471SMihai Caraman 670f5250471SMihai Caraman /* 671f5250471SMihai Caraman * Another thread may rewrite the TLB entry in parallel, don't 672f5250471SMihai Caraman * execute from the address if the execute permission is not set 673f5250471SMihai Caraman */ 674f5250471SMihai Caraman pr = vcpu->arch.shared->msr & MSR_PR; 675f5250471SMihai Caraman if (unlikely((pr && !(mas3 & MAS3_UX)) || 676f5250471SMihai Caraman (!pr && !(mas3 & MAS3_SX)))) { 677f5250471SMihai Caraman pr_err_ratelimited( 6786774def6SMasanari Iida "%s: Instruction emulation from guest address %08lx without execute permission\n", 679f5250471SMihai Caraman __func__, geaddr); 680f5250471SMihai Caraman return EMULATE_AGAIN; 681f5250471SMihai Caraman } 682f5250471SMihai Caraman 683f5250471SMihai Caraman /* 684f5250471SMihai Caraman * The real address will be mapped by a cacheable, memory coherent, 685f5250471SMihai Caraman * write-back page. Check for mismatches when LRAT is used. 686f5250471SMihai Caraman */ 687f5250471SMihai Caraman if (has_feature(vcpu, VCPU_FTR_MMU_V2) && 688f5250471SMihai Caraman unlikely((mas2 & MAS2_I) || (mas2 & MAS2_W) || !(mas2 & MAS2_M))) { 689f5250471SMihai Caraman pr_err_ratelimited( 6906774def6SMasanari Iida "%s: Instruction emulation from guest address %08lx mismatches storage attributes\n", 691f5250471SMihai Caraman __func__, geaddr); 692f5250471SMihai Caraman return EMULATE_AGAIN; 693f5250471SMihai Caraman } 694f5250471SMihai Caraman 695f5250471SMihai Caraman /* Get pfn */ 696f5250471SMihai Caraman psize_shift = MAS1_GET_TSIZE(mas1) + 10; 697f5250471SMihai Caraman addr = (mas7_mas3 & (~0ULL << psize_shift)) | 698f5250471SMihai Caraman (geaddr & ((1ULL << psize_shift) - 1ULL)); 699f5250471SMihai Caraman pfn = addr >> PAGE_SHIFT; 700f5250471SMihai Caraman 701f5250471SMihai Caraman /* Guard against emulation from devices area */ 702f5250471SMihai Caraman if (unlikely(!page_is_ram(pfn))) { 7036774def6SMasanari Iida pr_err_ratelimited("%s: Instruction emulation from non-RAM host address %08llx is not supported\n", 704f5250471SMihai Caraman __func__, addr); 705f5250471SMihai Caraman return EMULATE_AGAIN; 706f5250471SMihai Caraman } 707f5250471SMihai Caraman 708f5250471SMihai Caraman /* Map a page and get guest's instruction */ 709f5250471SMihai Caraman page = pfn_to_page(pfn); 710f5250471SMihai Caraman eaddr = (unsigned long)kmap_atomic(page); 711f5250471SMihai Caraman *instr = *(u32 *)(eaddr | (unsigned long)(addr & ~PAGE_MASK)); 712f5250471SMihai Caraman kunmap_atomic((u32 *)eaddr); 713f5250471SMihai Caraman 714f5250471SMihai Caraman return EMULATE_DONE; 715f5250471SMihai Caraman } 716f5250471SMihai Caraman #else 71751f04726SMihai Caraman int kvmppc_load_last_inst(struct kvm_vcpu *vcpu, enum instruction_type type, 71851f04726SMihai Caraman u32 *instr) 71951f04726SMihai Caraman { 72051f04726SMihai Caraman return EMULATE_AGAIN; 72151f04726SMihai Caraman } 722f5250471SMihai Caraman #endif 72351f04726SMihai Caraman 724b71c9e2fSAlexander Graf /************* MMU Notifiers *************/ 725b71c9e2fSAlexander Graf 726b71c9e2fSAlexander Graf int kvm_unmap_hva(struct kvm *kvm, unsigned long hva) 727b71c9e2fSAlexander Graf { 728b71c9e2fSAlexander Graf trace_kvm_unmap_hva(hva); 729b71c9e2fSAlexander Graf 730b71c9e2fSAlexander Graf /* 731b71c9e2fSAlexander Graf * Flush all shadow tlb entries everywhere. This is slow, but 732b71c9e2fSAlexander Graf * we are 100% sure that we catch the to be unmapped page 733b71c9e2fSAlexander Graf */ 734b71c9e2fSAlexander Graf kvm_flush_remote_tlbs(kvm); 735b71c9e2fSAlexander Graf 736b71c9e2fSAlexander Graf return 0; 737b71c9e2fSAlexander Graf } 738b71c9e2fSAlexander Graf 739b71c9e2fSAlexander Graf int kvm_unmap_hva_range(struct kvm *kvm, unsigned long start, unsigned long end) 740b71c9e2fSAlexander Graf { 741b71c9e2fSAlexander Graf /* kvm_unmap_hva flushes everything anyways */ 742b71c9e2fSAlexander Graf kvm_unmap_hva(kvm, start); 743b71c9e2fSAlexander Graf 744b71c9e2fSAlexander Graf return 0; 745b71c9e2fSAlexander Graf } 746b71c9e2fSAlexander Graf 74757128468SAndres Lagar-Cavilla int kvm_age_hva(struct kvm *kvm, unsigned long start, unsigned long end) 748b71c9e2fSAlexander Graf { 749b71c9e2fSAlexander Graf /* XXX could be more clever ;) */ 750b71c9e2fSAlexander Graf return 0; 751b71c9e2fSAlexander Graf } 752b71c9e2fSAlexander Graf 753b71c9e2fSAlexander Graf int kvm_test_age_hva(struct kvm *kvm, unsigned long hva) 754b71c9e2fSAlexander Graf { 755b71c9e2fSAlexander Graf /* XXX could be more clever ;) */ 756b71c9e2fSAlexander Graf return 0; 757b71c9e2fSAlexander Graf } 758b71c9e2fSAlexander Graf 759b71c9e2fSAlexander Graf void kvm_set_spte_hva(struct kvm *kvm, unsigned long hva, pte_t pte) 760b71c9e2fSAlexander Graf { 761b71c9e2fSAlexander Graf /* The page will get remapped properly on its next fault */ 762b71c9e2fSAlexander Graf kvm_unmap_hva(kvm, hva); 763b71c9e2fSAlexander Graf } 764b71c9e2fSAlexander Graf 765b71c9e2fSAlexander Graf /*****************************************/ 766b71c9e2fSAlexander Graf 767b71c9e2fSAlexander Graf int e500_mmu_host_init(struct kvmppc_vcpu_e500 *vcpu_e500) 768b71c9e2fSAlexander Graf { 769b71c9e2fSAlexander Graf host_tlb_params[0].entries = mfspr(SPRN_TLB0CFG) & TLBnCFG_N_ENTRY; 770b71c9e2fSAlexander Graf host_tlb_params[1].entries = mfspr(SPRN_TLB1CFG) & TLBnCFG_N_ENTRY; 771b71c9e2fSAlexander Graf 772b71c9e2fSAlexander Graf /* 773b71c9e2fSAlexander Graf * This should never happen on real e500 hardware, but is 774b71c9e2fSAlexander Graf * architecturally possible -- e.g. in some weird nested 775b71c9e2fSAlexander Graf * virtualization case. 776b71c9e2fSAlexander Graf */ 777b71c9e2fSAlexander Graf if (host_tlb_params[0].entries == 0 || 778b71c9e2fSAlexander Graf host_tlb_params[1].entries == 0) { 779b71c9e2fSAlexander Graf pr_err("%s: need to know host tlb size\n", __func__); 780b71c9e2fSAlexander Graf return -ENODEV; 781b71c9e2fSAlexander Graf } 782b71c9e2fSAlexander Graf 783b71c9e2fSAlexander Graf host_tlb_params[0].ways = (mfspr(SPRN_TLB0CFG) & TLBnCFG_ASSOC) >> 784b71c9e2fSAlexander Graf TLBnCFG_ASSOC_SHIFT; 785b71c9e2fSAlexander Graf host_tlb_params[1].ways = host_tlb_params[1].entries; 786b71c9e2fSAlexander Graf 787b71c9e2fSAlexander Graf if (!is_power_of_2(host_tlb_params[0].entries) || 788b71c9e2fSAlexander Graf !is_power_of_2(host_tlb_params[0].ways) || 789b71c9e2fSAlexander Graf host_tlb_params[0].entries < host_tlb_params[0].ways || 790b71c9e2fSAlexander Graf host_tlb_params[0].ways == 0) { 791b71c9e2fSAlexander Graf pr_err("%s: bad tlb0 host config: %u entries %u ways\n", 792b71c9e2fSAlexander Graf __func__, host_tlb_params[0].entries, 793b71c9e2fSAlexander Graf host_tlb_params[0].ways); 794b71c9e2fSAlexander Graf return -ENODEV; 795b71c9e2fSAlexander Graf } 796b71c9e2fSAlexander Graf 797b71c9e2fSAlexander Graf host_tlb_params[0].sets = 798b71c9e2fSAlexander Graf host_tlb_params[0].entries / host_tlb_params[0].ways; 799b71c9e2fSAlexander Graf host_tlb_params[1].sets = 1; 800*37655490SMarkus Elfring vcpu_e500->h2g_tlb1_rmap = kcalloc(host_tlb_params[1].entries, 801*37655490SMarkus Elfring sizeof(*vcpu_e500->h2g_tlb1_rmap), 802b71c9e2fSAlexander Graf GFP_KERNEL); 803b71c9e2fSAlexander Graf if (!vcpu_e500->h2g_tlb1_rmap) 8044d2be6f7SScott Wood return -EINVAL; 805b71c9e2fSAlexander Graf 806b71c9e2fSAlexander Graf return 0; 807b71c9e2fSAlexander Graf } 808b71c9e2fSAlexander Graf 809b71c9e2fSAlexander Graf void e500_mmu_host_uninit(struct kvmppc_vcpu_e500 *vcpu_e500) 810b71c9e2fSAlexander Graf { 811b71c9e2fSAlexander Graf kfree(vcpu_e500->h2g_tlb1_rmap); 812b71c9e2fSAlexander Graf } 813