diff options
author | Linus Torvalds <torvalds@linux-foundation.org> | 2013-02-24 16:07:18 -0500 |
---|---|---|
committer | Linus Torvalds <torvalds@linux-foundation.org> | 2013-02-24 16:07:18 -0500 |
commit | 89f883372fa60f604d136924baf3e89ff1870e9e (patch) | |
tree | cb69b0a14957945ba00d3d392bf9ccbbef56f3b8 /arch/powerpc | |
parent | 9e2d59ad580d590134285f361a0e80f0e98c0207 (diff) | |
parent | 6b73a96065e89dc9fa75ba4f78b1aa3a3bbd0470 (diff) |
Merge tag 'kvm-3.9-1' of git://git.kernel.org/pub/scm/virt/kvm/kvm
Pull KVM updates from Marcelo Tosatti:
"KVM updates for the 3.9 merge window, including x86 real mode
emulation fixes, stronger memory slot interface restrictions, mmu_lock
spinlock hold time reduction, improved handling of large page faults
on shadow, initial APICv HW acceleration support, s390 channel IO
based virtio, amongst others"
* tag 'kvm-3.9-1' of git://git.kernel.org/pub/scm/virt/kvm/kvm: (143 commits)
Revert "KVM: MMU: lazily drop large spte"
x86: pvclock kvm: align allocation size to page size
KVM: nVMX: Remove redundant get_vmcs12 from nested_vmx_exit_handled_msr
x86 emulator: fix parity calculation for AAD instruction
KVM: PPC: BookE: Handle alignment interrupts
booke: Added DBCR4 SPR number
KVM: PPC: booke: Allow multiple exception types
KVM: PPC: booke: use vcpu reference from thread_struct
KVM: Remove user_alloc from struct kvm_memory_slot
KVM: VMX: disable apicv by default
KVM: s390: Fix handling of iscs.
KVM: MMU: cleanup __direct_map
KVM: MMU: remove pt_access in mmu_set_spte
KVM: MMU: cleanup mapping-level
KVM: MMU: lazily drop large spte
KVM: VMX: cleanup vmx_set_cr0().
KVM: VMX: add missing exit names to VMX_EXIT_REASONS array
KVM: VMX: disable SMEP feature when guest is in non-paging mode
KVM: Remove duplicate text in api.txt
Revert "KVM: MMU: split kvm_mmu_free_page"
...
Diffstat (limited to 'arch/powerpc')
-rw-r--r-- | arch/powerpc/include/asm/kvm_host.h | 8 | ||||
-rw-r--r-- | arch/powerpc/include/asm/kvm_ppc.h | 12 | ||||
-rw-r--r-- | arch/powerpc/include/asm/reg.h | 2 | ||||
-rw-r--r-- | arch/powerpc/include/asm/reg_booke.h | 1 | ||||
-rw-r--r-- | arch/powerpc/include/uapi/asm/kvm.h | 6 | ||||
-rw-r--r-- | arch/powerpc/kernel/asm-offsets.c | 2 | ||||
-rw-r--r-- | arch/powerpc/kvm/Makefile | 9 | ||||
-rw-r--r-- | arch/powerpc/kvm/book3s_emulate.c | 30 | ||||
-rw-r--r-- | arch/powerpc/kvm/book3s_hv.c | 2 | ||||
-rw-r--r-- | arch/powerpc/kvm/book3s_pr.c | 5 | ||||
-rw-r--r-- | arch/powerpc/kvm/booke.c | 70 | ||||
-rw-r--r-- | arch/powerpc/kvm/booke.h | 1 | ||||
-rw-r--r-- | arch/powerpc/kvm/booke_emulate.c | 3 | ||||
-rw-r--r-- | arch/powerpc/kvm/booke_interrupts.S | 49 | ||||
-rw-r--r-- | arch/powerpc/kvm/e500.c | 16 | ||||
-rw-r--r-- | arch/powerpc/kvm/e500.h | 1 | ||||
-rw-r--r-- | arch/powerpc/kvm/e500_mmu.c (renamed from arch/powerpc/kvm/e500_tlb.c) | 659 | ||||
-rw-r--r-- | arch/powerpc/kvm/e500_mmu_host.c | 699 | ||||
-rw-r--r-- | arch/powerpc/kvm/e500_mmu_host.h | 18 | ||||
-rw-r--r-- | arch/powerpc/kvm/emulate.c | 5 | ||||
-rw-r--r-- | arch/powerpc/kvm/powerpc.c | 17 |
21 files changed, 931 insertions, 684 deletions
diff --git a/arch/powerpc/include/asm/kvm_host.h b/arch/powerpc/include/asm/kvm_host.h index 03d7beae89a0..d1bb86074721 100644 --- a/arch/powerpc/include/asm/kvm_host.h +++ b/arch/powerpc/include/asm/kvm_host.h | |||
@@ -37,10 +37,8 @@ | |||
37 | 37 | ||
38 | #define KVM_MAX_VCPUS NR_CPUS | 38 | #define KVM_MAX_VCPUS NR_CPUS |
39 | #define KVM_MAX_VCORES NR_CPUS | 39 | #define KVM_MAX_VCORES NR_CPUS |
40 | #define KVM_MEMORY_SLOTS 32 | 40 | #define KVM_USER_MEM_SLOTS 32 |
41 | /* memory slots that does not exposed to userspace */ | 41 | #define KVM_MEM_SLOTS_NUM KVM_USER_MEM_SLOTS |
42 | #define KVM_PRIVATE_MEM_SLOTS 4 | ||
43 | #define KVM_MEM_SLOTS_NUM (KVM_MEMORY_SLOTS + KVM_PRIVATE_MEM_SLOTS) | ||
44 | 42 | ||
45 | #ifdef CONFIG_KVM_MMIO | 43 | #ifdef CONFIG_KVM_MMIO |
46 | #define KVM_COALESCED_MMIO_PAGE_OFFSET 1 | 44 | #define KVM_COALESCED_MMIO_PAGE_OFFSET 1 |
@@ -523,6 +521,8 @@ struct kvm_vcpu_arch { | |||
523 | u8 sane; | 521 | u8 sane; |
524 | u8 cpu_type; | 522 | u8 cpu_type; |
525 | u8 hcall_needed; | 523 | u8 hcall_needed; |
524 | u8 epr_enabled; | ||
525 | u8 epr_needed; | ||
526 | 526 | ||
527 | u32 cpr0_cfgaddr; /* holds the last set cpr0_cfgaddr */ | 527 | u32 cpr0_cfgaddr; /* holds the last set cpr0_cfgaddr */ |
528 | 528 | ||
diff --git a/arch/powerpc/include/asm/kvm_ppc.h b/arch/powerpc/include/asm/kvm_ppc.h index 572aa7530619..44a657adf416 100644 --- a/arch/powerpc/include/asm/kvm_ppc.h +++ b/arch/powerpc/include/asm/kvm_ppc.h | |||
@@ -44,12 +44,11 @@ enum emulation_result { | |||
44 | EMULATE_DO_DCR, /* kvm_run filled with DCR request */ | 44 | EMULATE_DO_DCR, /* kvm_run filled with DCR request */ |
45 | EMULATE_FAIL, /* can't emulate this instruction */ | 45 | EMULATE_FAIL, /* can't emulate this instruction */ |
46 | EMULATE_AGAIN, /* something went wrong. go again */ | 46 | EMULATE_AGAIN, /* something went wrong. go again */ |
47 | EMULATE_DO_PAPR, /* kvm_run filled with PAPR request */ | ||
47 | }; | 48 | }; |
48 | 49 | ||
49 | extern int kvmppc_vcpu_run(struct kvm_run *kvm_run, struct kvm_vcpu *vcpu); | 50 | extern int kvmppc_vcpu_run(struct kvm_run *kvm_run, struct kvm_vcpu *vcpu); |
50 | extern int __kvmppc_vcpu_run(struct kvm_run *kvm_run, struct kvm_vcpu *vcpu); | 51 | extern int __kvmppc_vcpu_run(struct kvm_run *kvm_run, struct kvm_vcpu *vcpu); |
51 | extern char kvmppc_handlers_start[]; | ||
52 | extern unsigned long kvmppc_handler_len; | ||
53 | extern void kvmppc_handler_highmem(void); | 52 | extern void kvmppc_handler_highmem(void); |
54 | 53 | ||
55 | extern void kvmppc_dump_vcpu(struct kvm_vcpu *vcpu); | 54 | extern void kvmppc_dump_vcpu(struct kvm_vcpu *vcpu); |
@@ -263,6 +262,15 @@ static inline void kvm_linear_init(void) | |||
263 | {} | 262 | {} |
264 | #endif | 263 | #endif |
265 | 264 | ||
265 | static inline void kvmppc_set_epr(struct kvm_vcpu *vcpu, u32 epr) | ||
266 | { | ||
267 | #ifdef CONFIG_KVM_BOOKE_HV | ||
268 | mtspr(SPRN_GEPR, epr); | ||
269 | #elif defined(CONFIG_BOOKE) | ||
270 | vcpu->arch.epr = epr; | ||
271 | #endif | ||
272 | } | ||
273 | |||
266 | int kvm_vcpu_ioctl_config_tlb(struct kvm_vcpu *vcpu, | 274 | int kvm_vcpu_ioctl_config_tlb(struct kvm_vcpu *vcpu, |
267 | struct kvm_config_tlb *cfg); | 275 | struct kvm_config_tlb *cfg); |
268 | int kvm_vcpu_ioctl_dirty_tlb(struct kvm_vcpu *vcpu, | 276 | int kvm_vcpu_ioctl_dirty_tlb(struct kvm_vcpu *vcpu, |
diff --git a/arch/powerpc/include/asm/reg.h b/arch/powerpc/include/asm/reg.h index 7035e608f3fa..e66586122030 100644 --- a/arch/powerpc/include/asm/reg.h +++ b/arch/powerpc/include/asm/reg.h | |||
@@ -956,8 +956,6 @@ | |||
956 | #define SPRN_SPRG_RSCRATCH_DBG SPRN_SPRG9 | 956 | #define SPRN_SPRG_RSCRATCH_DBG SPRN_SPRG9 |
957 | #define SPRN_SPRG_WSCRATCH_DBG SPRN_SPRG9 | 957 | #define SPRN_SPRG_WSCRATCH_DBG SPRN_SPRG9 |
958 | #endif | 958 | #endif |
959 | #define SPRN_SPRG_RVCPU SPRN_SPRG1 | ||
960 | #define SPRN_SPRG_WVCPU SPRN_SPRG1 | ||
961 | #endif | 959 | #endif |
962 | 960 | ||
963 | #ifdef CONFIG_8xx | 961 | #ifdef CONFIG_8xx |
diff --git a/arch/powerpc/include/asm/reg_booke.h b/arch/powerpc/include/asm/reg_booke.h index e07e6af5e1ff..b417de3cc2c4 100644 --- a/arch/powerpc/include/asm/reg_booke.h +++ b/arch/powerpc/include/asm/reg_booke.h | |||
@@ -56,6 +56,7 @@ | |||
56 | #define SPRN_SPRG7W 0x117 /* Special Purpose Register General 7 Write */ | 56 | #define SPRN_SPRG7W 0x117 /* Special Purpose Register General 7 Write */ |
57 | #define SPRN_EPCR 0x133 /* Embedded Processor Control Register */ | 57 | #define SPRN_EPCR 0x133 /* Embedded Processor Control Register */ |
58 | #define SPRN_DBCR2 0x136 /* Debug Control Register 2 */ | 58 | #define SPRN_DBCR2 0x136 /* Debug Control Register 2 */ |
59 | #define SPRN_DBCR4 0x233 /* Debug Control Register 4 */ | ||
59 | #define SPRN_MSRP 0x137 /* MSR Protect Register */ | 60 | #define SPRN_MSRP 0x137 /* MSR Protect Register */ |
60 | #define SPRN_IAC3 0x13A /* Instruction Address Compare 3 */ | 61 | #define SPRN_IAC3 0x13A /* Instruction Address Compare 3 */ |
61 | #define SPRN_IAC4 0x13B /* Instruction Address Compare 4 */ | 62 | #define SPRN_IAC4 0x13B /* Instruction Address Compare 4 */ |
diff --git a/arch/powerpc/include/uapi/asm/kvm.h b/arch/powerpc/include/uapi/asm/kvm.h index 2fba8a66fb10..16064d00adb9 100644 --- a/arch/powerpc/include/uapi/asm/kvm.h +++ b/arch/powerpc/include/uapi/asm/kvm.h | |||
@@ -114,7 +114,10 @@ struct kvm_regs { | |||
114 | /* Embedded Floating Point (SPE) -- IVOR32-34 if KVM_SREGS_E_IVOR */ | 114 | /* Embedded Floating Point (SPE) -- IVOR32-34 if KVM_SREGS_E_IVOR */ |
115 | #define KVM_SREGS_E_SPE (1 << 9) | 115 | #define KVM_SREGS_E_SPE (1 << 9) |
116 | 116 | ||
117 | /* External Proxy (EXP) -- EPR */ | 117 | /* |
118 | * DEPRECATED! USE ONE_REG FOR THIS ONE! | ||
119 | * External Proxy (EXP) -- EPR | ||
120 | */ | ||
118 | #define KVM_SREGS_EXP (1 << 10) | 121 | #define KVM_SREGS_EXP (1 << 10) |
119 | 122 | ||
120 | /* External PID (E.PD) -- EPSC/EPLC */ | 123 | /* External PID (E.PD) -- EPSC/EPLC */ |
@@ -412,5 +415,6 @@ struct kvm_get_htab_header { | |||
412 | #define KVM_REG_PPC_VPA_DTL (KVM_REG_PPC | KVM_REG_SIZE_U128 | 0x84) | 415 | #define KVM_REG_PPC_VPA_DTL (KVM_REG_PPC | KVM_REG_SIZE_U128 | 0x84) |
413 | 416 | ||
414 | #define KVM_REG_PPC_EPCR (KVM_REG_PPC | KVM_REG_SIZE_U32 | 0x85) | 417 | #define KVM_REG_PPC_EPCR (KVM_REG_PPC | KVM_REG_SIZE_U32 | 0x85) |
418 | #define KVM_REG_PPC_EPR (KVM_REG_PPC | KVM_REG_SIZE_U32 | 0x86) | ||
415 | 419 | ||
416 | #endif /* __LINUX_KVM_POWERPC_H */ | 420 | #endif /* __LINUX_KVM_POWERPC_H */ |
diff --git a/arch/powerpc/kernel/asm-offsets.c b/arch/powerpc/kernel/asm-offsets.c index 781190367292..b6c17ec9b169 100644 --- a/arch/powerpc/kernel/asm-offsets.c +++ b/arch/powerpc/kernel/asm-offsets.c | |||
@@ -118,7 +118,7 @@ int main(void) | |||
118 | #ifdef CONFIG_KVM_BOOK3S_32_HANDLER | 118 | #ifdef CONFIG_KVM_BOOK3S_32_HANDLER |
119 | DEFINE(THREAD_KVM_SVCPU, offsetof(struct thread_struct, kvm_shadow_vcpu)); | 119 | DEFINE(THREAD_KVM_SVCPU, offsetof(struct thread_struct, kvm_shadow_vcpu)); |
120 | #endif | 120 | #endif |
121 | #ifdef CONFIG_KVM_BOOKE_HV | 121 | #if defined(CONFIG_KVM) && defined(CONFIG_BOOKE) |
122 | DEFINE(THREAD_KVM_VCPU, offsetof(struct thread_struct, kvm_vcpu)); | 122 | DEFINE(THREAD_KVM_VCPU, offsetof(struct thread_struct, kvm_vcpu)); |
123 | #endif | 123 | #endif |
124 | 124 | ||
diff --git a/arch/powerpc/kvm/Makefile b/arch/powerpc/kvm/Makefile index 1e473d46322c..b772eded8c26 100644 --- a/arch/powerpc/kvm/Makefile +++ b/arch/powerpc/kvm/Makefile | |||
@@ -10,7 +10,8 @@ common-objs-y = $(addprefix ../../../virt/kvm/, kvm_main.o coalesced_mmio.o \ | |||
10 | eventfd.o) | 10 | eventfd.o) |
11 | 11 | ||
12 | CFLAGS_44x_tlb.o := -I. | 12 | CFLAGS_44x_tlb.o := -I. |
13 | CFLAGS_e500_tlb.o := -I. | 13 | CFLAGS_e500_mmu.o := -I. |
14 | CFLAGS_e500_mmu_host.o := -I. | ||
14 | CFLAGS_emulate.o := -I. | 15 | CFLAGS_emulate.o := -I. |
15 | 16 | ||
16 | common-objs-y += powerpc.o emulate.o | 17 | common-objs-y += powerpc.o emulate.o |
@@ -35,7 +36,8 @@ kvm-e500-objs := \ | |||
35 | booke_emulate.o \ | 36 | booke_emulate.o \ |
36 | booke_interrupts.o \ | 37 | booke_interrupts.o \ |
37 | e500.o \ | 38 | e500.o \ |
38 | e500_tlb.o \ | 39 | e500_mmu.o \ |
40 | e500_mmu_host.o \ | ||
39 | e500_emulate.o | 41 | e500_emulate.o |
40 | kvm-objs-$(CONFIG_KVM_E500V2) := $(kvm-e500-objs) | 42 | kvm-objs-$(CONFIG_KVM_E500V2) := $(kvm-e500-objs) |
41 | 43 | ||
@@ -45,7 +47,8 @@ kvm-e500mc-objs := \ | |||
45 | booke_emulate.o \ | 47 | booke_emulate.o \ |
46 | bookehv_interrupts.o \ | 48 | bookehv_interrupts.o \ |
47 | e500mc.o \ | 49 | e500mc.o \ |
48 | e500_tlb.o \ | 50 | e500_mmu.o \ |
51 | e500_mmu_host.o \ | ||
49 | e500_emulate.o | 52 | e500_emulate.o |
50 | kvm-objs-$(CONFIG_KVM_E500MC) := $(kvm-e500mc-objs) | 53 | kvm-objs-$(CONFIG_KVM_E500MC) := $(kvm-e500mc-objs) |
51 | 54 | ||
diff --git a/arch/powerpc/kvm/book3s_emulate.c b/arch/powerpc/kvm/book3s_emulate.c index d31a716f7f2b..836c56975e21 100644 --- a/arch/powerpc/kvm/book3s_emulate.c +++ b/arch/powerpc/kvm/book3s_emulate.c | |||
@@ -34,6 +34,8 @@ | |||
34 | #define OP_31_XOP_MTSRIN 242 | 34 | #define OP_31_XOP_MTSRIN 242 |
35 | #define OP_31_XOP_TLBIEL 274 | 35 | #define OP_31_XOP_TLBIEL 274 |
36 | #define OP_31_XOP_TLBIE 306 | 36 | #define OP_31_XOP_TLBIE 306 |
37 | /* Opcode is officially reserved, reuse it as sc 1 when sc 1 doesn't trap */ | ||
38 | #define OP_31_XOP_FAKE_SC1 308 | ||
37 | #define OP_31_XOP_SLBMTE 402 | 39 | #define OP_31_XOP_SLBMTE 402 |
38 | #define OP_31_XOP_SLBIE 434 | 40 | #define OP_31_XOP_SLBIE 434 |
39 | #define OP_31_XOP_SLBIA 498 | 41 | #define OP_31_XOP_SLBIA 498 |
@@ -170,6 +172,32 @@ int kvmppc_core_emulate_op(struct kvm_run *run, struct kvm_vcpu *vcpu, | |||
170 | vcpu->arch.mmu.tlbie(vcpu, addr, large); | 172 | vcpu->arch.mmu.tlbie(vcpu, addr, large); |
171 | break; | 173 | break; |
172 | } | 174 | } |
175 | #ifdef CONFIG_KVM_BOOK3S_64_PR | ||
176 | case OP_31_XOP_FAKE_SC1: | ||
177 | { | ||
178 | /* SC 1 papr hypercalls */ | ||
179 | ulong cmd = kvmppc_get_gpr(vcpu, 3); | ||
180 | int i; | ||
181 | |||
182 | if ((vcpu->arch.shared->msr & MSR_PR) || | ||
183 | !vcpu->arch.papr_enabled) { | ||
184 | emulated = EMULATE_FAIL; | ||
185 | break; | ||
186 | } | ||
187 | |||
188 | if (kvmppc_h_pr(vcpu, cmd) == EMULATE_DONE) | ||
189 | break; | ||
190 | |||
191 | run->papr_hcall.nr = cmd; | ||
192 | for (i = 0; i < 9; ++i) { | ||
193 | ulong gpr = kvmppc_get_gpr(vcpu, 4 + i); | ||
194 | run->papr_hcall.args[i] = gpr; | ||
195 | } | ||
196 | |||
197 | emulated = EMULATE_DO_PAPR; | ||
198 | break; | ||
199 | } | ||
200 | #endif | ||
173 | case OP_31_XOP_EIOIO: | 201 | case OP_31_XOP_EIOIO: |
174 | break; | 202 | break; |
175 | case OP_31_XOP_SLBMTE: | 203 | case OP_31_XOP_SLBMTE: |
@@ -427,6 +455,7 @@ int kvmppc_core_emulate_mtspr(struct kvm_vcpu *vcpu, int sprn, ulong spr_val) | |||
427 | case SPRN_PMC3_GEKKO: | 455 | case SPRN_PMC3_GEKKO: |
428 | case SPRN_PMC4_GEKKO: | 456 | case SPRN_PMC4_GEKKO: |
429 | case SPRN_WPAR_GEKKO: | 457 | case SPRN_WPAR_GEKKO: |
458 | case SPRN_MSSSR0: | ||
430 | break; | 459 | break; |
431 | unprivileged: | 460 | unprivileged: |
432 | default: | 461 | default: |
@@ -523,6 +552,7 @@ int kvmppc_core_emulate_mfspr(struct kvm_vcpu *vcpu, int sprn, ulong *spr_val) | |||
523 | case SPRN_PMC3_GEKKO: | 552 | case SPRN_PMC3_GEKKO: |
524 | case SPRN_PMC4_GEKKO: | 553 | case SPRN_PMC4_GEKKO: |
525 | case SPRN_WPAR_GEKKO: | 554 | case SPRN_WPAR_GEKKO: |
555 | case SPRN_MSSSR0: | ||
526 | *spr_val = 0; | 556 | *spr_val = 0; |
527 | break; | 557 | break; |
528 | default: | 558 | default: |
diff --git a/arch/powerpc/kvm/book3s_hv.c b/arch/powerpc/kvm/book3s_hv.c index 71d0c90b62bf..80dcc53a1aba 100644 --- a/arch/powerpc/kvm/book3s_hv.c +++ b/arch/powerpc/kvm/book3s_hv.c | |||
@@ -1549,7 +1549,7 @@ int kvm_vm_ioctl_get_dirty_log(struct kvm *kvm, struct kvm_dirty_log *log) | |||
1549 | mutex_lock(&kvm->slots_lock); | 1549 | mutex_lock(&kvm->slots_lock); |
1550 | 1550 | ||
1551 | r = -EINVAL; | 1551 | r = -EINVAL; |
1552 | if (log->slot >= KVM_MEMORY_SLOTS) | 1552 | if (log->slot >= KVM_USER_MEM_SLOTS) |
1553 | goto out; | 1553 | goto out; |
1554 | 1554 | ||
1555 | memslot = id_to_memslot(kvm->memslots, log->slot); | 1555 | memslot = id_to_memslot(kvm->memslots, log->slot); |
diff --git a/arch/powerpc/kvm/book3s_pr.c b/arch/powerpc/kvm/book3s_pr.c index 6702442ca818..5e93438afb06 100644 --- a/arch/powerpc/kvm/book3s_pr.c +++ b/arch/powerpc/kvm/book3s_pr.c | |||
@@ -762,6 +762,11 @@ program_interrupt: | |||
762 | run->exit_reason = KVM_EXIT_MMIO; | 762 | run->exit_reason = KVM_EXIT_MMIO; |
763 | r = RESUME_HOST_NV; | 763 | r = RESUME_HOST_NV; |
764 | break; | 764 | break; |
765 | case EMULATE_DO_PAPR: | ||
766 | run->exit_reason = KVM_EXIT_PAPR_HCALL; | ||
767 | vcpu->arch.hcall_needed = 1; | ||
768 | r = RESUME_HOST_NV; | ||
769 | break; | ||
765 | default: | 770 | default: |
766 | BUG(); | 771 | BUG(); |
767 | } | 772 | } |
diff --git a/arch/powerpc/kvm/booke.c b/arch/powerpc/kvm/booke.c index 69f114015780..020923e43134 100644 --- a/arch/powerpc/kvm/booke.c +++ b/arch/powerpc/kvm/booke.c | |||
@@ -182,6 +182,14 @@ static void kvmppc_core_queue_inst_storage(struct kvm_vcpu *vcpu, | |||
182 | kvmppc_booke_queue_irqprio(vcpu, BOOKE_IRQPRIO_INST_STORAGE); | 182 | kvmppc_booke_queue_irqprio(vcpu, BOOKE_IRQPRIO_INST_STORAGE); |
183 | } | 183 | } |
184 | 184 | ||
185 | static void kvmppc_core_queue_alignment(struct kvm_vcpu *vcpu, ulong dear_flags, | ||
186 | ulong esr_flags) | ||
187 | { | ||
188 | vcpu->arch.queued_dear = dear_flags; | ||
189 | vcpu->arch.queued_esr = esr_flags; | ||
190 | kvmppc_booke_queue_irqprio(vcpu, BOOKE_IRQPRIO_ALIGNMENT); | ||
191 | } | ||
192 | |||
185 | void kvmppc_core_queue_program(struct kvm_vcpu *vcpu, ulong esr_flags) | 193 | void kvmppc_core_queue_program(struct kvm_vcpu *vcpu, ulong esr_flags) |
186 | { | 194 | { |
187 | vcpu->arch.queued_esr = esr_flags; | 195 | vcpu->arch.queued_esr = esr_flags; |
@@ -300,13 +308,22 @@ static void set_guest_esr(struct kvm_vcpu *vcpu, u32 esr) | |||
300 | #endif | 308 | #endif |
301 | } | 309 | } |
302 | 310 | ||
311 | static unsigned long get_guest_epr(struct kvm_vcpu *vcpu) | ||
312 | { | ||
313 | #ifdef CONFIG_KVM_BOOKE_HV | ||
314 | return mfspr(SPRN_GEPR); | ||
315 | #else | ||
316 | return vcpu->arch.epr; | ||
317 | #endif | ||
318 | } | ||
319 | |||
303 | /* Deliver the interrupt of the corresponding priority, if possible. */ | 320 | /* Deliver the interrupt of the corresponding priority, if possible. */ |
304 | static int kvmppc_booke_irqprio_deliver(struct kvm_vcpu *vcpu, | 321 | static int kvmppc_booke_irqprio_deliver(struct kvm_vcpu *vcpu, |
305 | unsigned int priority) | 322 | unsigned int priority) |
306 | { | 323 | { |
307 | int allowed = 0; | 324 | int allowed = 0; |
308 | ulong msr_mask = 0; | 325 | ulong msr_mask = 0; |
309 | bool update_esr = false, update_dear = false; | 326 | bool update_esr = false, update_dear = false, update_epr = false; |
310 | ulong crit_raw = vcpu->arch.shared->critical; | 327 | ulong crit_raw = vcpu->arch.shared->critical; |
311 | ulong crit_r1 = kvmppc_get_gpr(vcpu, 1); | 328 | ulong crit_r1 = kvmppc_get_gpr(vcpu, 1); |
312 | bool crit; | 329 | bool crit; |
@@ -330,9 +347,13 @@ static int kvmppc_booke_irqprio_deliver(struct kvm_vcpu *vcpu, | |||
330 | keep_irq = true; | 347 | keep_irq = true; |
331 | } | 348 | } |
332 | 349 | ||
350 | if ((priority == BOOKE_IRQPRIO_EXTERNAL) && vcpu->arch.epr_enabled) | ||
351 | update_epr = true; | ||
352 | |||
333 | switch (priority) { | 353 | switch (priority) { |
334 | case BOOKE_IRQPRIO_DTLB_MISS: | 354 | case BOOKE_IRQPRIO_DTLB_MISS: |
335 | case BOOKE_IRQPRIO_DATA_STORAGE: | 355 | case BOOKE_IRQPRIO_DATA_STORAGE: |
356 | case BOOKE_IRQPRIO_ALIGNMENT: | ||
336 | update_dear = true; | 357 | update_dear = true; |
337 | /* fall through */ | 358 | /* fall through */ |
338 | case BOOKE_IRQPRIO_INST_STORAGE: | 359 | case BOOKE_IRQPRIO_INST_STORAGE: |
@@ -346,7 +367,6 @@ static int kvmppc_booke_irqprio_deliver(struct kvm_vcpu *vcpu, | |||
346 | case BOOKE_IRQPRIO_SPE_FP_DATA: | 367 | case BOOKE_IRQPRIO_SPE_FP_DATA: |
347 | case BOOKE_IRQPRIO_SPE_FP_ROUND: | 368 | case BOOKE_IRQPRIO_SPE_FP_ROUND: |
348 | case BOOKE_IRQPRIO_AP_UNAVAIL: | 369 | case BOOKE_IRQPRIO_AP_UNAVAIL: |
349 | case BOOKE_IRQPRIO_ALIGNMENT: | ||
350 | allowed = 1; | 370 | allowed = 1; |
351 | msr_mask = MSR_CE | MSR_ME | MSR_DE; | 371 | msr_mask = MSR_CE | MSR_ME | MSR_DE; |
352 | int_class = INT_CLASS_NONCRIT; | 372 | int_class = INT_CLASS_NONCRIT; |
@@ -408,6 +428,8 @@ static int kvmppc_booke_irqprio_deliver(struct kvm_vcpu *vcpu, | |||
408 | set_guest_esr(vcpu, vcpu->arch.queued_esr); | 428 | set_guest_esr(vcpu, vcpu->arch.queued_esr); |
409 | if (update_dear == true) | 429 | if (update_dear == true) |
410 | set_guest_dear(vcpu, vcpu->arch.queued_dear); | 430 | set_guest_dear(vcpu, vcpu->arch.queued_dear); |
431 | if (update_epr == true) | ||
432 | kvm_make_request(KVM_REQ_EPR_EXIT, vcpu); | ||
411 | 433 | ||
412 | new_msr &= msr_mask; | 434 | new_msr &= msr_mask; |
413 | #if defined(CONFIG_64BIT) | 435 | #if defined(CONFIG_64BIT) |
@@ -581,6 +603,11 @@ int kvmppc_core_prepare_to_enter(struct kvm_vcpu *vcpu) | |||
581 | 603 | ||
582 | kvmppc_core_check_exceptions(vcpu); | 604 | kvmppc_core_check_exceptions(vcpu); |
583 | 605 | ||
606 | if (vcpu->requests) { | ||
607 | /* Exception delivery raised request; start over */ | ||
608 | return 1; | ||
609 | } | ||
610 | |||
584 | if (vcpu->arch.shared->msr & MSR_WE) { | 611 | if (vcpu->arch.shared->msr & MSR_WE) { |
585 | local_irq_enable(); | 612 | local_irq_enable(); |
586 | kvm_vcpu_block(vcpu); | 613 | kvm_vcpu_block(vcpu); |
@@ -610,6 +637,13 @@ int kvmppc_core_check_requests(struct kvm_vcpu *vcpu) | |||
610 | r = 0; | 637 | r = 0; |
611 | } | 638 | } |
612 | 639 | ||
640 | if (kvm_check_request(KVM_REQ_EPR_EXIT, vcpu)) { | ||
641 | vcpu->run->epr.epr = 0; | ||
642 | vcpu->arch.epr_needed = true; | ||
643 | vcpu->run->exit_reason = KVM_EXIT_EPR; | ||
644 | r = 0; | ||
645 | } | ||
646 | |||
613 | return r; | 647 | return r; |
614 | } | 648 | } |
615 | 649 | ||
@@ -945,6 +979,12 @@ int kvmppc_handle_exit(struct kvm_run *run, struct kvm_vcpu *vcpu, | |||
945 | r = RESUME_GUEST; | 979 | r = RESUME_GUEST; |
946 | break; | 980 | break; |
947 | 981 | ||
982 | case BOOKE_INTERRUPT_ALIGNMENT: | ||
983 | kvmppc_core_queue_alignment(vcpu, vcpu->arch.fault_dear, | ||
984 | vcpu->arch.fault_esr); | ||
985 | r = RESUME_GUEST; | ||
986 | break; | ||
987 | |||
948 | #ifdef CONFIG_KVM_BOOKE_HV | 988 | #ifdef CONFIG_KVM_BOOKE_HV |
949 | case BOOKE_INTERRUPT_HV_SYSCALL: | 989 | case BOOKE_INTERRUPT_HV_SYSCALL: |
950 | if (!(vcpu->arch.shared->msr & MSR_PR)) { | 990 | if (!(vcpu->arch.shared->msr & MSR_PR)) { |
@@ -1388,6 +1428,11 @@ int kvm_vcpu_ioctl_get_one_reg(struct kvm_vcpu *vcpu, struct kvm_one_reg *reg) | |||
1388 | &vcpu->arch.dbg_reg.dac[dac], sizeof(u64)); | 1428 | &vcpu->arch.dbg_reg.dac[dac], sizeof(u64)); |
1389 | break; | 1429 | break; |
1390 | } | 1430 | } |
1431 | case KVM_REG_PPC_EPR: { | ||
1432 | u32 epr = get_guest_epr(vcpu); | ||
1433 | r = put_user(epr, (u32 __user *)(long)reg->addr); | ||
1434 | break; | ||
1435 | } | ||
1391 | #if defined(CONFIG_64BIT) | 1436 | #if defined(CONFIG_64BIT) |
1392 | case KVM_REG_PPC_EPCR: | 1437 | case KVM_REG_PPC_EPCR: |
1393 | r = put_user(vcpu->arch.epcr, (u32 __user *)(long)reg->addr); | 1438 | r = put_user(vcpu->arch.epcr, (u32 __user *)(long)reg->addr); |
@@ -1420,6 +1465,13 @@ int kvm_vcpu_ioctl_set_one_reg(struct kvm_vcpu *vcpu, struct kvm_one_reg *reg) | |||
1420 | (u64 __user *)(long)reg->addr, sizeof(u64)); | 1465 | (u64 __user *)(long)reg->addr, sizeof(u64)); |
1421 | break; | 1466 | break; |
1422 | } | 1467 | } |
1468 | case KVM_REG_PPC_EPR: { | ||
1469 | u32 new_epr; | ||
1470 | r = get_user(new_epr, (u32 __user *)(long)reg->addr); | ||
1471 | if (!r) | ||
1472 | kvmppc_set_epr(vcpu, new_epr); | ||
1473 | break; | ||
1474 | } | ||
1423 | #if defined(CONFIG_64BIT) | 1475 | #if defined(CONFIG_64BIT) |
1424 | case KVM_REG_PPC_EPCR: { | 1476 | case KVM_REG_PPC_EPCR: { |
1425 | u32 new_epcr; | 1477 | u32 new_epcr; |
@@ -1556,7 +1608,9 @@ int __init kvmppc_booke_init(void) | |||
1556 | { | 1608 | { |
1557 | #ifndef CONFIG_KVM_BOOKE_HV | 1609 | #ifndef CONFIG_KVM_BOOKE_HV |
1558 | unsigned long ivor[16]; | 1610 | unsigned long ivor[16]; |
1611 | unsigned long *handler = kvmppc_booke_handler_addr; | ||
1559 | unsigned long max_ivor = 0; | 1612 | unsigned long max_ivor = 0; |
1613 | unsigned long handler_len; | ||
1560 | int i; | 1614 | int i; |
1561 | 1615 | ||
1562 | /* We install our own exception handlers by hijacking IVPR. IVPR must | 1616 | /* We install our own exception handlers by hijacking IVPR. IVPR must |
@@ -1589,14 +1643,16 @@ int __init kvmppc_booke_init(void) | |||
1589 | 1643 | ||
1590 | for (i = 0; i < 16; i++) { | 1644 | for (i = 0; i < 16; i++) { |
1591 | if (ivor[i] > max_ivor) | 1645 | if (ivor[i] > max_ivor) |
1592 | max_ivor = ivor[i]; | 1646 | max_ivor = i; |
1593 | 1647 | ||
1648 | handler_len = handler[i + 1] - handler[i]; | ||
1594 | memcpy((void *)kvmppc_booke_handlers + ivor[i], | 1649 | memcpy((void *)kvmppc_booke_handlers + ivor[i], |
1595 | kvmppc_handlers_start + i * kvmppc_handler_len, | 1650 | (void *)handler[i], handler_len); |
1596 | kvmppc_handler_len); | ||
1597 | } | 1651 | } |
1598 | flush_icache_range(kvmppc_booke_handlers, | 1652 | |
1599 | kvmppc_booke_handlers + max_ivor + kvmppc_handler_len); | 1653 | handler_len = handler[max_ivor + 1] - handler[max_ivor]; |
1654 | flush_icache_range(kvmppc_booke_handlers, kvmppc_booke_handlers + | ||
1655 | ivor[max_ivor] + handler_len); | ||
1600 | #endif /* !BOOKE_HV */ | 1656 | #endif /* !BOOKE_HV */ |
1601 | return 0; | 1657 | return 0; |
1602 | } | 1658 | } |
diff --git a/arch/powerpc/kvm/booke.h b/arch/powerpc/kvm/booke.h index e9b88e433f64..5fd1ba693579 100644 --- a/arch/powerpc/kvm/booke.h +++ b/arch/powerpc/kvm/booke.h | |||
@@ -65,6 +65,7 @@ | |||
65 | (1 << BOOKE_IRQPRIO_CRITICAL)) | 65 | (1 << BOOKE_IRQPRIO_CRITICAL)) |
66 | 66 | ||
67 | extern unsigned long kvmppc_booke_handlers; | 67 | extern unsigned long kvmppc_booke_handlers; |
68 | extern unsigned long kvmppc_booke_handler_addr[]; | ||
68 | 69 | ||
69 | void kvmppc_set_msr(struct kvm_vcpu *vcpu, u32 new_msr); | 70 | void kvmppc_set_msr(struct kvm_vcpu *vcpu, u32 new_msr); |
70 | void kvmppc_mmu_msr_notify(struct kvm_vcpu *vcpu, u32 old_msr); | 71 | void kvmppc_mmu_msr_notify(struct kvm_vcpu *vcpu, u32 old_msr); |
diff --git a/arch/powerpc/kvm/booke_emulate.c b/arch/powerpc/kvm/booke_emulate.c index 4685b8cf2249..27a4b2877c10 100644 --- a/arch/powerpc/kvm/booke_emulate.c +++ b/arch/powerpc/kvm/booke_emulate.c | |||
@@ -269,6 +269,9 @@ int kvmppc_booke_emulate_mfspr(struct kvm_vcpu *vcpu, int sprn, ulong *spr_val) | |||
269 | case SPRN_ESR: | 269 | case SPRN_ESR: |
270 | *spr_val = vcpu->arch.shared->esr; | 270 | *spr_val = vcpu->arch.shared->esr; |
271 | break; | 271 | break; |
272 | case SPRN_EPR: | ||
273 | *spr_val = vcpu->arch.epr; | ||
274 | break; | ||
272 | case SPRN_CSRR0: | 275 | case SPRN_CSRR0: |
273 | *spr_val = vcpu->arch.csrr0; | 276 | *spr_val = vcpu->arch.csrr0; |
274 | break; | 277 | break; |
diff --git a/arch/powerpc/kvm/booke_interrupts.S b/arch/powerpc/kvm/booke_interrupts.S index bb46b32f9813..f4bb55c96517 100644 --- a/arch/powerpc/kvm/booke_interrupts.S +++ b/arch/powerpc/kvm/booke_interrupts.S | |||
@@ -45,18 +45,21 @@ | |||
45 | (1<<BOOKE_INTERRUPT_DEBUG)) | 45 | (1<<BOOKE_INTERRUPT_DEBUG)) |
46 | 46 | ||
47 | #define NEED_DEAR_MASK ((1<<BOOKE_INTERRUPT_DATA_STORAGE) | \ | 47 | #define NEED_DEAR_MASK ((1<<BOOKE_INTERRUPT_DATA_STORAGE) | \ |
48 | (1<<BOOKE_INTERRUPT_DTLB_MISS)) | 48 | (1<<BOOKE_INTERRUPT_DTLB_MISS) | \ |
49 | (1<<BOOKE_INTERRUPT_ALIGNMENT)) | ||
49 | 50 | ||
50 | #define NEED_ESR_MASK ((1<<BOOKE_INTERRUPT_DATA_STORAGE) | \ | 51 | #define NEED_ESR_MASK ((1<<BOOKE_INTERRUPT_DATA_STORAGE) | \ |
51 | (1<<BOOKE_INTERRUPT_INST_STORAGE) | \ | 52 | (1<<BOOKE_INTERRUPT_INST_STORAGE) | \ |
52 | (1<<BOOKE_INTERRUPT_PROGRAM) | \ | 53 | (1<<BOOKE_INTERRUPT_PROGRAM) | \ |
53 | (1<<BOOKE_INTERRUPT_DTLB_MISS)) | 54 | (1<<BOOKE_INTERRUPT_DTLB_MISS) | \ |
55 | (1<<BOOKE_INTERRUPT_ALIGNMENT)) | ||
54 | 56 | ||
55 | .macro KVM_HANDLER ivor_nr scratch srr0 | 57 | .macro KVM_HANDLER ivor_nr scratch srr0 |
56 | _GLOBAL(kvmppc_handler_\ivor_nr) | 58 | _GLOBAL(kvmppc_handler_\ivor_nr) |
57 | /* Get pointer to vcpu and record exit number. */ | 59 | /* Get pointer to vcpu and record exit number. */ |
58 | mtspr \scratch , r4 | 60 | mtspr \scratch , r4 |
59 | mfspr r4, SPRN_SPRG_RVCPU | 61 | mfspr r4, SPRN_SPRG_THREAD |
62 | lwz r4, THREAD_KVM_VCPU(r4) | ||
60 | stw r3, VCPU_GPR(R3)(r4) | 63 | stw r3, VCPU_GPR(R3)(r4) |
61 | stw r5, VCPU_GPR(R5)(r4) | 64 | stw r5, VCPU_GPR(R5)(r4) |
62 | stw r6, VCPU_GPR(R6)(r4) | 65 | stw r6, VCPU_GPR(R6)(r4) |
@@ -73,6 +76,14 @@ _GLOBAL(kvmppc_handler_\ivor_nr) | |||
73 | bctr | 76 | bctr |
74 | .endm | 77 | .endm |
75 | 78 | ||
79 | .macro KVM_HANDLER_ADDR ivor_nr | ||
80 | .long kvmppc_handler_\ivor_nr | ||
81 | .endm | ||
82 | |||
83 | .macro KVM_HANDLER_END | ||
84 | .long kvmppc_handlers_end | ||
85 | .endm | ||
86 | |||
76 | _GLOBAL(kvmppc_handlers_start) | 87 | _GLOBAL(kvmppc_handlers_start) |
77 | KVM_HANDLER BOOKE_INTERRUPT_CRITICAL SPRN_SPRG_RSCRATCH_CRIT SPRN_CSRR0 | 88 | KVM_HANDLER BOOKE_INTERRUPT_CRITICAL SPRN_SPRG_RSCRATCH_CRIT SPRN_CSRR0 |
78 | KVM_HANDLER BOOKE_INTERRUPT_MACHINE_CHECK SPRN_SPRG_RSCRATCH_MC SPRN_MCSRR0 | 89 | KVM_HANDLER BOOKE_INTERRUPT_MACHINE_CHECK SPRN_SPRG_RSCRATCH_MC SPRN_MCSRR0 |
@@ -93,9 +104,7 @@ KVM_HANDLER BOOKE_INTERRUPT_DEBUG SPRN_SPRG_RSCRATCH_CRIT SPRN_CSRR0 | |||
93 | KVM_HANDLER BOOKE_INTERRUPT_SPE_UNAVAIL SPRN_SPRG_RSCRATCH0 SPRN_SRR0 | 104 | KVM_HANDLER BOOKE_INTERRUPT_SPE_UNAVAIL SPRN_SPRG_RSCRATCH0 SPRN_SRR0 |
94 | KVM_HANDLER BOOKE_INTERRUPT_SPE_FP_DATA SPRN_SPRG_RSCRATCH0 SPRN_SRR0 | 105 | KVM_HANDLER BOOKE_INTERRUPT_SPE_FP_DATA SPRN_SPRG_RSCRATCH0 SPRN_SRR0 |
95 | KVM_HANDLER BOOKE_INTERRUPT_SPE_FP_ROUND SPRN_SPRG_RSCRATCH0 SPRN_SRR0 | 106 | KVM_HANDLER BOOKE_INTERRUPT_SPE_FP_ROUND SPRN_SPRG_RSCRATCH0 SPRN_SRR0 |
96 | 107 | _GLOBAL(kvmppc_handlers_end) | |
97 | _GLOBAL(kvmppc_handler_len) | ||
98 | .long kvmppc_handler_1 - kvmppc_handler_0 | ||
99 | 108 | ||
100 | /* Registers: | 109 | /* Registers: |
101 | * SPRG_SCRATCH0: guest r4 | 110 | * SPRG_SCRATCH0: guest r4 |
@@ -402,9 +411,6 @@ lightweight_exit: | |||
402 | lwz r8, kvmppc_booke_handlers@l(r8) | 411 | lwz r8, kvmppc_booke_handlers@l(r8) |
403 | mtspr SPRN_IVPR, r8 | 412 | mtspr SPRN_IVPR, r8 |
404 | 413 | ||
405 | /* Save vcpu pointer for the exception handlers. */ | ||
406 | mtspr SPRN_SPRG_WVCPU, r4 | ||
407 | |||
408 | lwz r5, VCPU_SHARED(r4) | 414 | lwz r5, VCPU_SHARED(r4) |
409 | 415 | ||
410 | /* Can't switch the stack pointer until after IVPR is switched, | 416 | /* Can't switch the stack pointer until after IVPR is switched, |
@@ -463,6 +469,31 @@ lightweight_exit: | |||
463 | lwz r4, VCPU_GPR(R4)(r4) | 469 | lwz r4, VCPU_GPR(R4)(r4) |
464 | rfi | 470 | rfi |
465 | 471 | ||
472 | .data | ||
473 | .align 4 | ||
474 | .globl kvmppc_booke_handler_addr | ||
475 | kvmppc_booke_handler_addr: | ||
476 | KVM_HANDLER_ADDR BOOKE_INTERRUPT_CRITICAL | ||
477 | KVM_HANDLER_ADDR BOOKE_INTERRUPT_MACHINE_CHECK | ||
478 | KVM_HANDLER_ADDR BOOKE_INTERRUPT_DATA_STORAGE | ||
479 | KVM_HANDLER_ADDR BOOKE_INTERRUPT_INST_STORAGE | ||
480 | KVM_HANDLER_ADDR BOOKE_INTERRUPT_EXTERNAL | ||
481 | KVM_HANDLER_ADDR BOOKE_INTERRUPT_ALIGNMENT | ||
482 | KVM_HANDLER_ADDR BOOKE_INTERRUPT_PROGRAM | ||
483 | KVM_HANDLER_ADDR BOOKE_INTERRUPT_FP_UNAVAIL | ||
484 | KVM_HANDLER_ADDR BOOKE_INTERRUPT_SYSCALL | ||
485 | KVM_HANDLER_ADDR BOOKE_INTERRUPT_AP_UNAVAIL | ||
486 | KVM_HANDLER_ADDR BOOKE_INTERRUPT_DECREMENTER | ||
487 | KVM_HANDLER_ADDR BOOKE_INTERRUPT_FIT | ||
488 | KVM_HANDLER_ADDR BOOKE_INTERRUPT_WATCHDOG | ||
489 | KVM_HANDLER_ADDR BOOKE_INTERRUPT_DTLB_MISS | ||
490 | KVM_HANDLER_ADDR BOOKE_INTERRUPT_ITLB_MISS | ||
491 | KVM_HANDLER_ADDR BOOKE_INTERRUPT_DEBUG | ||
492 | KVM_HANDLER_ADDR BOOKE_INTERRUPT_SPE_UNAVAIL | ||
493 | KVM_HANDLER_ADDR BOOKE_INTERRUPT_SPE_FP_DATA | ||
494 | KVM_HANDLER_ADDR BOOKE_INTERRUPT_SPE_FP_ROUND | ||
495 | KVM_HANDLER_END /*Always keep this in end*/ | ||
496 | |||
466 | #ifdef CONFIG_SPE | 497 | #ifdef CONFIG_SPE |
467 | _GLOBAL(kvmppc_save_guest_spe) | 498 | _GLOBAL(kvmppc_save_guest_spe) |
468 | cmpi 0,r3,0 | 499 | cmpi 0,r3,0 |
diff --git a/arch/powerpc/kvm/e500.c b/arch/powerpc/kvm/e500.c index b479ed77c515..6dd4de7802bf 100644 --- a/arch/powerpc/kvm/e500.c +++ b/arch/powerpc/kvm/e500.c | |||
@@ -491,6 +491,9 @@ static int __init kvmppc_e500_init(void) | |||
491 | { | 491 | { |
492 | int r, i; | 492 | int r, i; |
493 | unsigned long ivor[3]; | 493 | unsigned long ivor[3]; |
494 | /* Process remaining handlers above the generic first 16 */ | ||
495 | unsigned long *handler = &kvmppc_booke_handler_addr[16]; | ||
496 | unsigned long handler_len; | ||
494 | unsigned long max_ivor = 0; | 497 | unsigned long max_ivor = 0; |
495 | 498 | ||
496 | r = kvmppc_core_check_processor_compat(); | 499 | r = kvmppc_core_check_processor_compat(); |
@@ -506,15 +509,16 @@ static int __init kvmppc_e500_init(void) | |||
506 | ivor[1] = mfspr(SPRN_IVOR33); | 509 | ivor[1] = mfspr(SPRN_IVOR33); |
507 | ivor[2] = mfspr(SPRN_IVOR34); | 510 | ivor[2] = mfspr(SPRN_IVOR34); |
508 | for (i = 0; i < 3; i++) { | 511 | for (i = 0; i < 3; i++) { |
509 | if (ivor[i] > max_ivor) | 512 | if (ivor[i] > ivor[max_ivor]) |
510 | max_ivor = ivor[i]; | 513 | max_ivor = i; |
511 | 514 | ||
515 | handler_len = handler[i + 1] - handler[i]; | ||
512 | memcpy((void *)kvmppc_booke_handlers + ivor[i], | 516 | memcpy((void *)kvmppc_booke_handlers + ivor[i], |
513 | kvmppc_handlers_start + (i + 16) * kvmppc_handler_len, | 517 | (void *)handler[i], handler_len); |
514 | kvmppc_handler_len); | ||
515 | } | 518 | } |
516 | flush_icache_range(kvmppc_booke_handlers, | 519 | handler_len = handler[max_ivor + 1] - handler[max_ivor]; |
517 | kvmppc_booke_handlers + max_ivor + kvmppc_handler_len); | 520 | flush_icache_range(kvmppc_booke_handlers, kvmppc_booke_handlers + |
521 | ivor[max_ivor] + handler_len); | ||
518 | 522 | ||
519 | return kvm_init(NULL, sizeof(struct kvmppc_vcpu_e500), 0, THIS_MODULE); | 523 | return kvm_init(NULL, sizeof(struct kvmppc_vcpu_e500), 0, THIS_MODULE); |
520 | } | 524 | } |
diff --git a/arch/powerpc/kvm/e500.h b/arch/powerpc/kvm/e500.h index c70d37ed770a..41cefd43655f 100644 --- a/arch/powerpc/kvm/e500.h +++ b/arch/powerpc/kvm/e500.h | |||
@@ -28,6 +28,7 @@ | |||
28 | 28 | ||
29 | #define E500_TLB_VALID 1 | 29 | #define E500_TLB_VALID 1 |
30 | #define E500_TLB_BITMAP 2 | 30 | #define E500_TLB_BITMAP 2 |
31 | #define E500_TLB_TLB0 (1 << 2) | ||
31 | 32 | ||
32 | struct tlbe_ref { | 33 | struct tlbe_ref { |
33 | pfn_t pfn; | 34 | pfn_t pfn; |
diff --git a/arch/powerpc/kvm/e500_tlb.c b/arch/powerpc/kvm/e500_mmu.c index cf3f18012371..5c4475983f78 100644 --- a/arch/powerpc/kvm/e500_tlb.c +++ b/arch/powerpc/kvm/e500_mmu.c | |||
@@ -1,10 +1,11 @@ | |||
1 | /* | 1 | /* |
2 | * Copyright (C) 2008-2011 Freescale Semiconductor, Inc. All rights reserved. | 2 | * Copyright (C) 2008-2013 Freescale Semiconductor, Inc. All rights reserved. |
3 | * | 3 | * |
4 | * Author: Yu Liu, yu.liu@freescale.com | 4 | * Author: Yu Liu, yu.liu@freescale.com |
5 | * Scott Wood, scottwood@freescale.com | 5 | * Scott Wood, scottwood@freescale.com |
6 | * Ashish Kalra, ashish.kalra@freescale.com | 6 | * Ashish Kalra, ashish.kalra@freescale.com |
7 | * Varun Sethi, varun.sethi@freescale.com | 7 | * Varun Sethi, varun.sethi@freescale.com |
8 | * Alexander Graf, agraf@suse.de | ||
8 | * | 9 | * |
9 | * Description: | 10 | * Description: |
10 | * This file is based on arch/powerpc/kvm/44x_tlb.c, | 11 | * This file is based on arch/powerpc/kvm/44x_tlb.c, |
@@ -33,10 +34,7 @@ | |||
33 | #include "e500.h" | 34 | #include "e500.h" |
34 | #include "trace.h" | 35 | #include "trace.h" |
35 | #include "timing.h" | 36 | #include "timing.h" |
36 | 37 | #include "e500_mmu_host.h" | |
37 | #define to_htlb1_esel(esel) (host_tlb_params[1].entries - (esel) - 1) | ||
38 | |||
39 | static struct kvmppc_e500_tlb_params host_tlb_params[E500_TLB_NUM]; | ||
40 | 38 | ||
41 | static inline unsigned int gtlb0_get_next_victim( | 39 | static inline unsigned int gtlb0_get_next_victim( |
42 | struct kvmppc_vcpu_e500 *vcpu_e500) | 40 | struct kvmppc_vcpu_e500 *vcpu_e500) |
@@ -50,174 +48,6 @@ static inline unsigned int gtlb0_get_next_victim( | |||
50 | return victim; | 48 | return victim; |
51 | } | 49 | } |
52 | 50 | ||
53 | static inline unsigned int tlb1_max_shadow_size(void) | ||
54 | { | ||
55 | /* reserve one entry for magic page */ | ||
56 | return host_tlb_params[1].entries - tlbcam_index - 1; | ||
57 | } | ||
58 | |||
59 | static inline int tlbe_is_writable(struct kvm_book3e_206_tlb_entry *tlbe) | ||
60 | { | ||
61 | return tlbe->mas7_3 & (MAS3_SW|MAS3_UW); | ||
62 | } | ||
63 | |||
64 | static inline u32 e500_shadow_mas3_attrib(u32 mas3, int usermode) | ||
65 | { | ||
66 | /* Mask off reserved bits. */ | ||
67 | mas3 &= MAS3_ATTRIB_MASK; | ||
68 | |||
69 | #ifndef CONFIG_KVM_BOOKE_HV | ||
70 | if (!usermode) { | ||
71 | /* Guest is in supervisor mode, | ||
72 | * so we need to translate guest | ||
73 | * supervisor permissions into user permissions. */ | ||
74 | mas3 &= ~E500_TLB_USER_PERM_MASK; | ||
75 | mas3 |= (mas3 & E500_TLB_SUPER_PERM_MASK) << 1; | ||
76 | } | ||
77 | mas3 |= E500_TLB_SUPER_PERM_MASK; | ||
78 | #endif | ||
79 | return mas3; | ||
80 | } | ||
81 | |||
82 | static inline u32 e500_shadow_mas2_attrib(u32 mas2, int usermode) | ||
83 | { | ||
84 | #ifdef CONFIG_SMP | ||
85 | return (mas2 & MAS2_ATTRIB_MASK) | MAS2_M; | ||
86 | #else | ||
87 | return mas2 & MAS2_ATTRIB_MASK; | ||
88 | #endif | ||
89 | } | ||
90 | |||
91 | /* | ||
92 | * writing shadow tlb entry to host TLB | ||
93 | */ | ||
94 | static inline void __write_host_tlbe(struct kvm_book3e_206_tlb_entry *stlbe, | ||
95 | uint32_t mas0) | ||
96 | { | ||
97 | unsigned long flags; | ||
98 | |||
99 | local_irq_save(flags); | ||
100 | mtspr(SPRN_MAS0, mas0); | ||
101 | mtspr(SPRN_MAS1, stlbe->mas1); | ||
102 | mtspr(SPRN_MAS2, (unsigned long)stlbe->mas2); | ||
103 | mtspr(SPRN_MAS3, (u32)stlbe->mas7_3); | ||
104 | mtspr(SPRN_MAS7, (u32)(stlbe->mas7_3 >> 32)); | ||
105 | #ifdef CONFIG_KVM_BOOKE_HV | ||
106 | mtspr(SPRN_MAS8, stlbe->mas8); | ||
107 | #endif | ||
108 | asm volatile("isync; tlbwe" : : : "memory"); | ||
109 | |||
110 | #ifdef CONFIG_KVM_BOOKE_HV | ||
111 | /* Must clear mas8 for other host tlbwe's */ | ||
112 | mtspr(SPRN_MAS8, 0); | ||
113 | isync(); | ||
114 | #endif | ||
115 | local_irq_restore(flags); | ||
116 | |||
117 | trace_kvm_booke206_stlb_write(mas0, stlbe->mas8, stlbe->mas1, | ||
118 | stlbe->mas2, stlbe->mas7_3); | ||
119 | } | ||
120 | |||
121 | /* | ||
122 | * Acquire a mas0 with victim hint, as if we just took a TLB miss. | ||
123 | * | ||
124 | * We don't care about the address we're searching for, other than that it's | ||
125 | * in the right set and is not present in the TLB. Using a zero PID and a | ||
126 | * userspace address means we don't have to set and then restore MAS5, or | ||
127 | * calculate a proper MAS6 value. | ||
128 | */ | ||
129 | static u32 get_host_mas0(unsigned long eaddr) | ||
130 | { | ||
131 | unsigned long flags; | ||
132 | u32 mas0; | ||
133 | |||
134 | local_irq_save(flags); | ||
135 | mtspr(SPRN_MAS6, 0); | ||
136 | asm volatile("tlbsx 0, %0" : : "b" (eaddr & ~CONFIG_PAGE_OFFSET)); | ||
137 | mas0 = mfspr(SPRN_MAS0); | ||
138 | local_irq_restore(flags); | ||
139 | |||
140 | return mas0; | ||
141 | } | ||
142 | |||
143 | /* sesel is for tlb1 only */ | ||
144 | static inline void write_host_tlbe(struct kvmppc_vcpu_e500 *vcpu_e500, | ||
145 | int tlbsel, int sesel, struct kvm_book3e_206_tlb_entry *stlbe) | ||
146 | { | ||
147 | u32 mas0; | ||
148 | |||
149 | if (tlbsel == 0) { | ||
150 | mas0 = get_host_mas0(stlbe->mas2); | ||
151 | __write_host_tlbe(stlbe, mas0); | ||
152 | } else { | ||
153 | __write_host_tlbe(stlbe, | ||
154 | MAS0_TLBSEL(1) | | ||
155 | MAS0_ESEL(to_htlb1_esel(sesel))); | ||
156 | } | ||
157 | } | ||
158 | |||
159 | #ifdef CONFIG_KVM_E500V2 | ||
160 | void kvmppc_map_magic(struct kvm_vcpu *vcpu) | ||
161 | { | ||
162 | struct kvmppc_vcpu_e500 *vcpu_e500 = to_e500(vcpu); | ||
163 | struct kvm_book3e_206_tlb_entry magic; | ||
164 | ulong shared_page = ((ulong)vcpu->arch.shared) & PAGE_MASK; | ||
165 | unsigned int stid; | ||
166 | pfn_t pfn; | ||
167 | |||
168 | pfn = (pfn_t)virt_to_phys((void *)shared_page) >> PAGE_SHIFT; | ||
169 | get_page(pfn_to_page(pfn)); | ||
170 | |||
171 | preempt_disable(); | ||
172 | stid = kvmppc_e500_get_sid(vcpu_e500, 0, 0, 0, 0); | ||
173 | |||
174 | magic.mas1 = MAS1_VALID | MAS1_TS | MAS1_TID(stid) | | ||
175 | MAS1_TSIZE(BOOK3E_PAGESZ_4K); | ||
176 | magic.mas2 = vcpu->arch.magic_page_ea | MAS2_M; | ||
177 | magic.mas7_3 = ((u64)pfn << PAGE_SHIFT) | | ||
178 | MAS3_SW | MAS3_SR | MAS3_UW | MAS3_UR; | ||
179 | magic.mas8 = 0; | ||
180 | |||
181 | __write_host_tlbe(&magic, MAS0_TLBSEL(1) | MAS0_ESEL(tlbcam_index)); | ||
182 | preempt_enable(); | ||
183 | } | ||
184 | #endif | ||
185 | |||
186 | static void inval_gtlbe_on_host(struct kvmppc_vcpu_e500 *vcpu_e500, | ||
187 | int tlbsel, int esel) | ||
188 | { | ||
189 | struct kvm_book3e_206_tlb_entry *gtlbe = | ||
190 | get_entry(vcpu_e500, tlbsel, esel); | ||
191 | |||
192 | if (tlbsel == 1 && | ||
193 | vcpu_e500->gtlb_priv[1][esel].ref.flags & E500_TLB_BITMAP) { | ||
194 | u64 tmp = vcpu_e500->g2h_tlb1_map[esel]; | ||
195 | int hw_tlb_indx; | ||
196 | unsigned long flags; | ||
197 | |||
198 | local_irq_save(flags); | ||
199 | while (tmp) { | ||
200 | hw_tlb_indx = __ilog2_u64(tmp & -tmp); | ||
201 | mtspr(SPRN_MAS0, | ||
202 | MAS0_TLBSEL(1) | | ||
203 | MAS0_ESEL(to_htlb1_esel(hw_tlb_indx))); | ||
204 | mtspr(SPRN_MAS1, 0); | ||
205 | asm volatile("tlbwe"); | ||
206 | vcpu_e500->h2g_tlb1_rmap[hw_tlb_indx] = 0; | ||
207 | tmp &= tmp - 1; | ||
208 | } | ||
209 | mb(); | ||
210 | vcpu_e500->g2h_tlb1_map[esel] = 0; | ||
211 | vcpu_e500->gtlb_priv[1][esel].ref.flags &= ~E500_TLB_BITMAP; | ||
212 | local_irq_restore(flags); | ||
213 | |||
214 | return; | ||
215 | } | ||
216 | |||
217 | /* Guest tlbe is backed by at most one host tlbe per shadow pid. */ | ||
218 | kvmppc_e500_tlbil_one(vcpu_e500, gtlbe); | ||
219 | } | ||
220 | |||
221 | static int tlb0_set_base(gva_t addr, int sets, int ways) | 51 | static int tlb0_set_base(gva_t addr, int sets, int ways) |
222 | { | 52 | { |
223 | int set_base; | 53 | int set_base; |
@@ -296,70 +126,6 @@ static int kvmppc_e500_tlb_index(struct kvmppc_vcpu_e500 *vcpu_e500, | |||
296 | return -1; | 126 | return -1; |
297 | } | 127 | } |
298 | 128 | ||
299 | static inline void kvmppc_e500_ref_setup(struct tlbe_ref *ref, | ||
300 | struct kvm_book3e_206_tlb_entry *gtlbe, | ||
301 | pfn_t pfn) | ||
302 | { | ||
303 | ref->pfn = pfn; | ||
304 | ref->flags = E500_TLB_VALID; | ||
305 | |||
306 | if (tlbe_is_writable(gtlbe)) | ||
307 | kvm_set_pfn_dirty(pfn); | ||
308 | } | ||
309 | |||
310 | static inline void kvmppc_e500_ref_release(struct tlbe_ref *ref) | ||
311 | { | ||
312 | if (ref->flags & E500_TLB_VALID) { | ||
313 | trace_kvm_booke206_ref_release(ref->pfn, ref->flags); | ||
314 | ref->flags = 0; | ||
315 | } | ||
316 | } | ||
317 | |||
318 | static void clear_tlb1_bitmap(struct kvmppc_vcpu_e500 *vcpu_e500) | ||
319 | { | ||
320 | if (vcpu_e500->g2h_tlb1_map) | ||
321 | memset(vcpu_e500->g2h_tlb1_map, 0, | ||
322 | sizeof(u64) * vcpu_e500->gtlb_params[1].entries); | ||
323 | if (vcpu_e500->h2g_tlb1_rmap) | ||
324 | memset(vcpu_e500->h2g_tlb1_rmap, 0, | ||
325 | sizeof(unsigned int) * host_tlb_params[1].entries); | ||
326 | } | ||
327 | |||
328 | static void clear_tlb_privs(struct kvmppc_vcpu_e500 *vcpu_e500) | ||
329 | { | ||
330 | int tlbsel = 0; | ||
331 | int i; | ||
332 | |||
333 | for (i = 0; i < vcpu_e500->gtlb_params[tlbsel].entries; i++) { | ||
334 | struct tlbe_ref *ref = | ||
335 | &vcpu_e500->gtlb_priv[tlbsel][i].ref; | ||
336 | kvmppc_e500_ref_release(ref); | ||
337 | } | ||
338 | } | ||
339 | |||
340 | static void clear_tlb_refs(struct kvmppc_vcpu_e500 *vcpu_e500) | ||
341 | { | ||
342 | int stlbsel = 1; | ||
343 | int i; | ||
344 | |||
345 | kvmppc_e500_tlbil_all(vcpu_e500); | ||
346 | |||
347 | for (i = 0; i < host_tlb_params[stlbsel].entries; i++) { | ||
348 | struct tlbe_ref *ref = | ||
349 | &vcpu_e500->tlb_refs[stlbsel][i]; | ||
350 | kvmppc_e500_ref_release(ref); | ||
351 | } | ||
352 | |||
353 | clear_tlb_privs(vcpu_e500); | ||
354 | } | ||
355 | |||
356 | void kvmppc_core_flush_tlb(struct kvm_vcpu *vcpu) | ||
357 | { | ||
358 | struct kvmppc_vcpu_e500 *vcpu_e500 = to_e500(vcpu); | ||
359 | clear_tlb_refs(vcpu_e500); | ||
360 | clear_tlb1_bitmap(vcpu_e500); | ||
361 | } | ||
362 | |||
363 | static inline void kvmppc_e500_deliver_tlb_miss(struct kvm_vcpu *vcpu, | 129 | static inline void kvmppc_e500_deliver_tlb_miss(struct kvm_vcpu *vcpu, |
364 | unsigned int eaddr, int as) | 130 | unsigned int eaddr, int as) |
365 | { | 131 | { |
@@ -385,216 +151,6 @@ static inline void kvmppc_e500_deliver_tlb_miss(struct kvm_vcpu *vcpu, | |||
385 | | (as ? MAS6_SAS : 0); | 151 | | (as ? MAS6_SAS : 0); |
386 | } | 152 | } |
387 | 153 | ||
388 | /* TID must be supplied by the caller */ | ||
389 | static inline void kvmppc_e500_setup_stlbe( | ||
390 | struct kvm_vcpu *vcpu, | ||
391 | struct kvm_book3e_206_tlb_entry *gtlbe, | ||
392 | int tsize, struct tlbe_ref *ref, u64 gvaddr, | ||
393 | struct kvm_book3e_206_tlb_entry *stlbe) | ||
394 | { | ||
395 | pfn_t pfn = ref->pfn; | ||
396 | u32 pr = vcpu->arch.shared->msr & MSR_PR; | ||
397 | |||
398 | BUG_ON(!(ref->flags & E500_TLB_VALID)); | ||
399 | |||
400 | /* Force IPROT=0 for all guest mappings. */ | ||
401 | stlbe->mas1 = MAS1_TSIZE(tsize) | get_tlb_sts(gtlbe) | MAS1_VALID; | ||
402 | stlbe->mas2 = (gvaddr & MAS2_EPN) | | ||
403 | e500_shadow_mas2_attrib(gtlbe->mas2, pr); | ||
404 | stlbe->mas7_3 = ((u64)pfn << PAGE_SHIFT) | | ||
405 | e500_shadow_mas3_attrib(gtlbe->mas7_3, pr); | ||
406 | |||
407 | #ifdef CONFIG_KVM_BOOKE_HV | ||
408 | stlbe->mas8 = MAS8_TGS | vcpu->kvm->arch.lpid; | ||
409 | #endif | ||
410 | } | ||
411 | |||
412 | static inline void kvmppc_e500_shadow_map(struct kvmppc_vcpu_e500 *vcpu_e500, | ||
413 | u64 gvaddr, gfn_t gfn, struct kvm_book3e_206_tlb_entry *gtlbe, | ||
414 | int tlbsel, struct kvm_book3e_206_tlb_entry *stlbe, | ||
415 | struct tlbe_ref *ref) | ||
416 | { | ||
417 | struct kvm_memory_slot *slot; | ||
418 | unsigned long pfn = 0; /* silence GCC warning */ | ||
419 | unsigned long hva; | ||
420 | int pfnmap = 0; | ||
421 | int tsize = BOOK3E_PAGESZ_4K; | ||
422 | |||
423 | /* | ||
424 | * Translate guest physical to true physical, acquiring | ||
425 | * a page reference if it is normal, non-reserved memory. | ||
426 | * | ||
427 | * gfn_to_memslot() must succeed because otherwise we wouldn't | ||
428 | * have gotten this far. Eventually we should just pass the slot | ||
429 | * pointer through from the first lookup. | ||
430 | */ | ||
431 | slot = gfn_to_memslot(vcpu_e500->vcpu.kvm, gfn); | ||
432 | hva = gfn_to_hva_memslot(slot, gfn); | ||
433 | |||
434 | if (tlbsel == 1) { | ||
435 | struct vm_area_struct *vma; | ||
436 | down_read(¤t->mm->mmap_sem); | ||
437 | |||
438 | vma = find_vma(current->mm, hva); | ||
439 | if (vma && hva >= vma->vm_start && | ||
440 | (vma->vm_flags & VM_PFNMAP)) { | ||
441 | /* | ||
442 | * This VMA is a physically contiguous region (e.g. | ||
443 | * /dev/mem) that bypasses normal Linux page | ||
444 | * management. Find the overlap between the | ||
445 | * vma and the memslot. | ||
446 | */ | ||
447 | |||
448 | unsigned long start, end; | ||
449 | unsigned long slot_start, slot_end; | ||
450 | |||
451 | pfnmap = 1; | ||
452 | |||
453 | start = vma->vm_pgoff; | ||
454 | end = start + | ||
455 | ((vma->vm_end - vma->vm_start) >> PAGE_SHIFT); | ||
456 | |||
457 | pfn = start + ((hva - vma->vm_start) >> PAGE_SHIFT); | ||
458 | |||
459 | slot_start = pfn - (gfn - slot->base_gfn); | ||
460 | slot_end = slot_start + slot->npages; | ||
461 | |||
462 | if (start < slot_start) | ||
463 | start = slot_start; | ||
464 | if (end > slot_end) | ||
465 | end = slot_end; | ||
466 | |||
467 | tsize = (gtlbe->mas1 & MAS1_TSIZE_MASK) >> | ||
468 | MAS1_TSIZE_SHIFT; | ||
469 | |||
470 | /* | ||
471 | * e500 doesn't implement the lowest tsize bit, | ||
472 | * or 1K pages. | ||
473 | */ | ||
474 | tsize = max(BOOK3E_PAGESZ_4K, tsize & ~1); | ||
475 | |||
476 | /* | ||
477 | * Now find the largest tsize (up to what the guest | ||
478 | * requested) that will cover gfn, stay within the | ||
479 | * range, and for which gfn and pfn are mutually | ||
480 | * aligned. | ||
481 | */ | ||
482 | |||
483 | for (; tsize > BOOK3E_PAGESZ_4K; tsize -= 2) { | ||
484 | unsigned long gfn_start, gfn_end, tsize_pages; | ||
485 | tsize_pages = 1 << (tsize - 2); | ||
486 | |||
487 | gfn_start = gfn & ~(tsize_pages - 1); | ||
488 | gfn_end = gfn_start + tsize_pages; | ||
489 | |||
490 | if (gfn_start + pfn - gfn < start) | ||
491 | continue; | ||
492 | if (gfn_end + pfn - gfn > end) | ||
493 | continue; | ||
494 | if ((gfn & (tsize_pages - 1)) != | ||
495 | (pfn & (tsize_pages - 1))) | ||
496 | continue; | ||
497 | |||
498 | gvaddr &= ~((tsize_pages << PAGE_SHIFT) - 1); | ||
499 | pfn &= ~(tsize_pages - 1); | ||
500 | break; | ||
501 | } | ||
502 | } else if (vma && hva >= vma->vm_start && | ||
503 | (vma->vm_flags & VM_HUGETLB)) { | ||
504 | unsigned long psize = vma_kernel_pagesize(vma); | ||
505 | |||
506 | tsize = (gtlbe->mas1 & MAS1_TSIZE_MASK) >> | ||
507 | MAS1_TSIZE_SHIFT; | ||
508 | |||
509 | /* | ||
510 | * Take the largest page size that satisfies both host | ||
511 | * and guest mapping | ||
512 | */ | ||
513 | tsize = min(__ilog2(psize) - 10, tsize); | ||
514 | |||
515 | /* | ||
516 | * e500 doesn't implement the lowest tsize bit, | ||
517 | * or 1K pages. | ||
518 | */ | ||
519 | tsize = max(BOOK3E_PAGESZ_4K, tsize & ~1); | ||
520 | } | ||
521 | |||
522 | up_read(¤t->mm->mmap_sem); | ||
523 | } | ||
524 | |||
525 | if (likely(!pfnmap)) { | ||
526 | unsigned long tsize_pages = 1 << (tsize + 10 - PAGE_SHIFT); | ||
527 | pfn = gfn_to_pfn_memslot(slot, gfn); | ||
528 | if (is_error_noslot_pfn(pfn)) { | ||
529 | printk(KERN_ERR "Couldn't get real page for gfn %lx!\n", | ||
530 | (long)gfn); | ||
531 | return; | ||
532 | } | ||
533 | |||
534 | /* Align guest and physical address to page map boundaries */ | ||
535 | pfn &= ~(tsize_pages - 1); | ||
536 | gvaddr &= ~((tsize_pages << PAGE_SHIFT) - 1); | ||
537 | } | ||
538 | |||
539 | /* Drop old ref and setup new one. */ | ||
540 | kvmppc_e500_ref_release(ref); | ||
541 | kvmppc_e500_ref_setup(ref, gtlbe, pfn); | ||
542 | |||
543 | kvmppc_e500_setup_stlbe(&vcpu_e500->vcpu, gtlbe, tsize, | ||
544 | ref, gvaddr, stlbe); | ||
545 | |||
546 | /* Clear i-cache for new pages */ | ||
547 | kvmppc_mmu_flush_icache(pfn); | ||
548 | |||
549 | /* Drop refcount on page, so that mmu notifiers can clear it */ | ||
550 | kvm_release_pfn_clean(pfn); | ||
551 | } | ||
552 | |||
553 | /* XXX only map the one-one case, for now use TLB0 */ | ||
554 | static void kvmppc_e500_tlb0_map(struct kvmppc_vcpu_e500 *vcpu_e500, | ||
555 | int esel, | ||
556 | struct kvm_book3e_206_tlb_entry *stlbe) | ||
557 | { | ||
558 | struct kvm_book3e_206_tlb_entry *gtlbe; | ||
559 | struct tlbe_ref *ref; | ||
560 | |||
561 | gtlbe = get_entry(vcpu_e500, 0, esel); | ||
562 | ref = &vcpu_e500->gtlb_priv[0][esel].ref; | ||
563 | |||
564 | kvmppc_e500_shadow_map(vcpu_e500, get_tlb_eaddr(gtlbe), | ||
565 | get_tlb_raddr(gtlbe) >> PAGE_SHIFT, | ||
566 | gtlbe, 0, stlbe, ref); | ||
567 | } | ||
568 | |||
569 | /* Caller must ensure that the specified guest TLB entry is safe to insert into | ||
570 | * the shadow TLB. */ | ||
571 | /* XXX for both one-one and one-to-many , for now use TLB1 */ | ||
572 | static int kvmppc_e500_tlb1_map(struct kvmppc_vcpu_e500 *vcpu_e500, | ||
573 | u64 gvaddr, gfn_t gfn, struct kvm_book3e_206_tlb_entry *gtlbe, | ||
574 | struct kvm_book3e_206_tlb_entry *stlbe, int esel) | ||
575 | { | ||
576 | struct tlbe_ref *ref; | ||
577 | unsigned int victim; | ||
578 | |||
579 | victim = vcpu_e500->host_tlb1_nv++; | ||
580 | |||
581 | if (unlikely(vcpu_e500->host_tlb1_nv >= tlb1_max_shadow_size())) | ||
582 | vcpu_e500->host_tlb1_nv = 0; | ||
583 | |||
584 | ref = &vcpu_e500->tlb_refs[1][victim]; | ||
585 | kvmppc_e500_shadow_map(vcpu_e500, gvaddr, gfn, gtlbe, 1, stlbe, ref); | ||
586 | |||
587 | vcpu_e500->g2h_tlb1_map[esel] |= (u64)1 << victim; | ||
588 | vcpu_e500->gtlb_priv[1][esel].ref.flags |= E500_TLB_BITMAP; | ||
589 | if (vcpu_e500->h2g_tlb1_rmap[victim]) { | ||
590 | unsigned int idx = vcpu_e500->h2g_tlb1_rmap[victim]; | ||
591 | vcpu_e500->g2h_tlb1_map[idx] &= ~(1ULL << victim); | ||
592 | } | ||
593 | vcpu_e500->h2g_tlb1_rmap[victim] = esel; | ||
594 | |||
595 | return victim; | ||
596 | } | ||
597 | |||
598 | static void kvmppc_recalc_tlb1map_range(struct kvmppc_vcpu_e500 *vcpu_e500) | 154 | static void kvmppc_recalc_tlb1map_range(struct kvmppc_vcpu_e500 *vcpu_e500) |
599 | { | 155 | { |
600 | int size = vcpu_e500->gtlb_params[1].entries; | 156 | int size = vcpu_e500->gtlb_params[1].entries; |
@@ -683,8 +239,8 @@ int kvmppc_e500_emul_mt_mmucsr0(struct kvmppc_vcpu_e500 *vcpu_e500, ulong value) | |||
683 | for (esel = 0; esel < vcpu_e500->gtlb_params[1].entries; esel++) | 239 | for (esel = 0; esel < vcpu_e500->gtlb_params[1].entries; esel++) |
684 | kvmppc_e500_gtlbe_invalidate(vcpu_e500, 1, esel); | 240 | kvmppc_e500_gtlbe_invalidate(vcpu_e500, 1, esel); |
685 | 241 | ||
686 | /* Invalidate all vcpu id mappings */ | 242 | /* Invalidate all host shadow mappings */ |
687 | kvmppc_e500_tlbil_all(vcpu_e500); | 243 | kvmppc_core_flush_tlb(&vcpu_e500->vcpu); |
688 | 244 | ||
689 | return EMULATE_DONE; | 245 | return EMULATE_DONE; |
690 | } | 246 | } |
@@ -713,8 +269,8 @@ int kvmppc_e500_emul_tlbivax(struct kvm_vcpu *vcpu, gva_t ea) | |||
713 | kvmppc_e500_gtlbe_invalidate(vcpu_e500, tlbsel, esel); | 269 | kvmppc_e500_gtlbe_invalidate(vcpu_e500, tlbsel, esel); |
714 | } | 270 | } |
715 | 271 | ||
716 | /* Invalidate all vcpu id mappings */ | 272 | /* Invalidate all host shadow mappings */ |
717 | kvmppc_e500_tlbil_all(vcpu_e500); | 273 | kvmppc_core_flush_tlb(&vcpu_e500->vcpu); |
718 | 274 | ||
719 | return EMULATE_DONE; | 275 | return EMULATE_DONE; |
720 | } | 276 | } |
@@ -834,27 +390,11 @@ int kvmppc_e500_emul_tlbsx(struct kvm_vcpu *vcpu, gva_t ea) | |||
834 | return EMULATE_DONE; | 390 | return EMULATE_DONE; |
835 | } | 391 | } |
836 | 392 | ||
837 | /* sesel is for tlb1 only */ | ||
838 | static void write_stlbe(struct kvmppc_vcpu_e500 *vcpu_e500, | ||
839 | struct kvm_book3e_206_tlb_entry *gtlbe, | ||
840 | struct kvm_book3e_206_tlb_entry *stlbe, | ||
841 | int stlbsel, int sesel) | ||
842 | { | ||
843 | int stid; | ||
844 | |||
845 | preempt_disable(); | ||
846 | stid = kvmppc_e500_get_tlb_stid(&vcpu_e500->vcpu, gtlbe); | ||
847 | |||
848 | stlbe->mas1 |= MAS1_TID(stid); | ||
849 | write_host_tlbe(vcpu_e500, stlbsel, sesel, stlbe); | ||
850 | preempt_enable(); | ||
851 | } | ||
852 | |||
853 | int kvmppc_e500_emul_tlbwe(struct kvm_vcpu *vcpu) | 393 | int kvmppc_e500_emul_tlbwe(struct kvm_vcpu *vcpu) |
854 | { | 394 | { |
855 | struct kvmppc_vcpu_e500 *vcpu_e500 = to_e500(vcpu); | 395 | struct kvmppc_vcpu_e500 *vcpu_e500 = to_e500(vcpu); |
856 | struct kvm_book3e_206_tlb_entry *gtlbe, stlbe; | 396 | struct kvm_book3e_206_tlb_entry *gtlbe; |
857 | int tlbsel, esel, stlbsel, sesel; | 397 | int tlbsel, esel; |
858 | int recal = 0; | 398 | int recal = 0; |
859 | 399 | ||
860 | tlbsel = get_tlb_tlbsel(vcpu); | 400 | tlbsel = get_tlb_tlbsel(vcpu); |
@@ -892,40 +432,16 @@ int kvmppc_e500_emul_tlbwe(struct kvm_vcpu *vcpu) | |||
892 | 432 | ||
893 | /* Invalidate shadow mappings for the about-to-be-clobbered TLBE. */ | 433 | /* Invalidate shadow mappings for the about-to-be-clobbered TLBE. */ |
894 | if (tlbe_is_host_safe(vcpu, gtlbe)) { | 434 | if (tlbe_is_host_safe(vcpu, gtlbe)) { |
895 | u64 eaddr; | 435 | u64 eaddr = get_tlb_eaddr(gtlbe); |
896 | u64 raddr; | 436 | u64 raddr = get_tlb_raddr(gtlbe); |
897 | 437 | ||
898 | switch (tlbsel) { | 438 | if (tlbsel == 0) { |
899 | case 0: | ||
900 | /* TLB0 */ | ||
901 | gtlbe->mas1 &= ~MAS1_TSIZE(~0); | 439 | gtlbe->mas1 &= ~MAS1_TSIZE(~0); |
902 | gtlbe->mas1 |= MAS1_TSIZE(BOOK3E_PAGESZ_4K); | 440 | gtlbe->mas1 |= MAS1_TSIZE(BOOK3E_PAGESZ_4K); |
903 | |||
904 | stlbsel = 0; | ||
905 | kvmppc_e500_tlb0_map(vcpu_e500, esel, &stlbe); | ||
906 | sesel = 0; /* unused */ | ||
907 | |||
908 | break; | ||
909 | |||
910 | case 1: | ||
911 | /* TLB1 */ | ||
912 | eaddr = get_tlb_eaddr(gtlbe); | ||
913 | raddr = get_tlb_raddr(gtlbe); | ||
914 | |||
915 | /* Create a 4KB mapping on the host. | ||
916 | * If the guest wanted a large page, | ||
917 | * only the first 4KB is mapped here and the rest | ||
918 | * are mapped on the fly. */ | ||
919 | stlbsel = 1; | ||
920 | sesel = kvmppc_e500_tlb1_map(vcpu_e500, eaddr, | ||
921 | raddr >> PAGE_SHIFT, gtlbe, &stlbe, esel); | ||
922 | break; | ||
923 | |||
924 | default: | ||
925 | BUG(); | ||
926 | } | 441 | } |
927 | 442 | ||
928 | write_stlbe(vcpu_e500, gtlbe, &stlbe, stlbsel, sesel); | 443 | /* Premap the faulting page */ |
444 | kvmppc_mmu_map(vcpu, eaddr, raddr, index_of(tlbsel, esel)); | ||
929 | } | 445 | } |
930 | 446 | ||
931 | kvmppc_set_exit_type(vcpu, EMULATED_TLBWE_EXITS); | 447 | kvmppc_set_exit_type(vcpu, EMULATED_TLBWE_EXITS); |
@@ -1019,100 +535,14 @@ void kvmppc_mmu_destroy(struct kvm_vcpu *vcpu) | |||
1019 | { | 535 | { |
1020 | } | 536 | } |
1021 | 537 | ||
1022 | void kvmppc_mmu_map(struct kvm_vcpu *vcpu, u64 eaddr, gpa_t gpaddr, | ||
1023 | unsigned int index) | ||
1024 | { | ||
1025 | struct kvmppc_vcpu_e500 *vcpu_e500 = to_e500(vcpu); | ||
1026 | struct tlbe_priv *priv; | ||
1027 | struct kvm_book3e_206_tlb_entry *gtlbe, stlbe; | ||
1028 | int tlbsel = tlbsel_of(index); | ||
1029 | int esel = esel_of(index); | ||
1030 | int stlbsel, sesel; | ||
1031 | |||
1032 | gtlbe = get_entry(vcpu_e500, tlbsel, esel); | ||
1033 | |||
1034 | switch (tlbsel) { | ||
1035 | case 0: | ||
1036 | stlbsel = 0; | ||
1037 | sesel = 0; /* unused */ | ||
1038 | priv = &vcpu_e500->gtlb_priv[tlbsel][esel]; | ||
1039 | |||
1040 | /* Only triggers after clear_tlb_refs */ | ||
1041 | if (unlikely(!(priv->ref.flags & E500_TLB_VALID))) | ||
1042 | kvmppc_e500_tlb0_map(vcpu_e500, esel, &stlbe); | ||
1043 | else | ||
1044 | kvmppc_e500_setup_stlbe(vcpu, gtlbe, BOOK3E_PAGESZ_4K, | ||
1045 | &priv->ref, eaddr, &stlbe); | ||
1046 | break; | ||
1047 | |||
1048 | case 1: { | ||
1049 | gfn_t gfn = gpaddr >> PAGE_SHIFT; | ||
1050 | |||
1051 | stlbsel = 1; | ||
1052 | sesel = kvmppc_e500_tlb1_map(vcpu_e500, eaddr, gfn, | ||
1053 | gtlbe, &stlbe, esel); | ||
1054 | break; | ||
1055 | } | ||
1056 | |||
1057 | default: | ||
1058 | BUG(); | ||
1059 | break; | ||
1060 | } | ||
1061 | |||
1062 | write_stlbe(vcpu_e500, gtlbe, &stlbe, stlbsel, sesel); | ||
1063 | } | ||
1064 | |||
1065 | /************* MMU Notifiers *************/ | ||
1066 | |||
1067 | int kvm_unmap_hva(struct kvm *kvm, unsigned long hva) | ||
1068 | { | ||
1069 | trace_kvm_unmap_hva(hva); | ||
1070 | |||
1071 | /* | ||
1072 | * Flush all shadow tlb entries everywhere. This is slow, but | ||
1073 | * we are 100% sure that we catch the to be unmapped page | ||
1074 | */ | ||
1075 | kvm_flush_remote_tlbs(kvm); | ||
1076 | |||
1077 | return 0; | ||
1078 | } | ||
1079 | |||
1080 | int kvm_unmap_hva_range(struct kvm *kvm, unsigned long start, unsigned long end) | ||
1081 | { | ||
1082 | /* kvm_unmap_hva flushes everything anyways */ | ||
1083 | kvm_unmap_hva(kvm, start); | ||
1084 | |||
1085 | return 0; | ||
1086 | } | ||
1087 | |||
1088 | int kvm_age_hva(struct kvm *kvm, unsigned long hva) | ||
1089 | { | ||
1090 | /* XXX could be more clever ;) */ | ||
1091 | return 0; | ||
1092 | } | ||
1093 | |||
1094 | int kvm_test_age_hva(struct kvm *kvm, unsigned long hva) | ||
1095 | { | ||
1096 | /* XXX could be more clever ;) */ | ||
1097 | return 0; | ||
1098 | } | ||
1099 | |||
1100 | void kvm_set_spte_hva(struct kvm *kvm, unsigned long hva, pte_t pte) | ||
1101 | { | ||
1102 | /* The page will get remapped properly on its next fault */ | ||
1103 | kvm_unmap_hva(kvm, hva); | ||
1104 | } | ||
1105 | |||
1106 | /*****************************************/ | 538 | /*****************************************/ |
1107 | 539 | ||
1108 | static void free_gtlb(struct kvmppc_vcpu_e500 *vcpu_e500) | 540 | static void free_gtlb(struct kvmppc_vcpu_e500 *vcpu_e500) |
1109 | { | 541 | { |
1110 | int i; | 542 | int i; |
1111 | 543 | ||
1112 | clear_tlb1_bitmap(vcpu_e500); | 544 | kvmppc_core_flush_tlb(&vcpu_e500->vcpu); |
1113 | kfree(vcpu_e500->g2h_tlb1_map); | 545 | kfree(vcpu_e500->g2h_tlb1_map); |
1114 | |||
1115 | clear_tlb_refs(vcpu_e500); | ||
1116 | kfree(vcpu_e500->gtlb_priv[0]); | 546 | kfree(vcpu_e500->gtlb_priv[0]); |
1117 | kfree(vcpu_e500->gtlb_priv[1]); | 547 | kfree(vcpu_e500->gtlb_priv[1]); |
1118 | 548 | ||
@@ -1303,7 +733,7 @@ int kvm_vcpu_ioctl_dirty_tlb(struct kvm_vcpu *vcpu, | |||
1303 | { | 733 | { |
1304 | struct kvmppc_vcpu_e500 *vcpu_e500 = to_e500(vcpu); | 734 | struct kvmppc_vcpu_e500 *vcpu_e500 = to_e500(vcpu); |
1305 | kvmppc_recalc_tlb1map_range(vcpu_e500); | 735 | kvmppc_recalc_tlb1map_range(vcpu_e500); |
1306 | clear_tlb_refs(vcpu_e500); | 736 | kvmppc_core_flush_tlb(vcpu); |
1307 | return 0; | 737 | return 0; |
1308 | } | 738 | } |
1309 | 739 | ||
@@ -1313,37 +743,8 @@ int kvmppc_e500_tlb_init(struct kvmppc_vcpu_e500 *vcpu_e500) | |||
1313 | int entry_size = sizeof(struct kvm_book3e_206_tlb_entry); | 743 | int entry_size = sizeof(struct kvm_book3e_206_tlb_entry); |
1314 | int entries = KVM_E500_TLB0_SIZE + KVM_E500_TLB1_SIZE; | 744 | int entries = KVM_E500_TLB0_SIZE + KVM_E500_TLB1_SIZE; |
1315 | 745 | ||
1316 | host_tlb_params[0].entries = mfspr(SPRN_TLB0CFG) & TLBnCFG_N_ENTRY; | 746 | if (e500_mmu_host_init(vcpu_e500)) |
1317 | host_tlb_params[1].entries = mfspr(SPRN_TLB1CFG) & TLBnCFG_N_ENTRY; | 747 | goto err; |
1318 | |||
1319 | /* | ||
1320 | * This should never happen on real e500 hardware, but is | ||
1321 | * architecturally possible -- e.g. in some weird nested | ||
1322 | * virtualization case. | ||
1323 | */ | ||
1324 | if (host_tlb_params[0].entries == 0 || | ||
1325 | host_tlb_params[1].entries == 0) { | ||
1326 | pr_err("%s: need to know host tlb size\n", __func__); | ||
1327 | return -ENODEV; | ||
1328 | } | ||
1329 | |||
1330 | host_tlb_params[0].ways = (mfspr(SPRN_TLB0CFG) & TLBnCFG_ASSOC) >> | ||
1331 | TLBnCFG_ASSOC_SHIFT; | ||
1332 | host_tlb_params[1].ways = host_tlb_params[1].entries; | ||
1333 | |||
1334 | if (!is_power_of_2(host_tlb_params[0].entries) || | ||
1335 | !is_power_of_2(host_tlb_params[0].ways) || | ||
1336 | host_tlb_params[0].entries < host_tlb_params[0].ways || | ||
1337 | host_tlb_params[0].ways == 0) { | ||
1338 | pr_err("%s: bad tlb0 host config: %u entries %u ways\n", | ||
1339 | __func__, host_tlb_params[0].entries, | ||
1340 | host_tlb_params[0].ways); | ||
1341 | return -ENODEV; | ||
1342 | } | ||
1343 | |||
1344 | host_tlb_params[0].sets = | ||
1345 | host_tlb_params[0].entries / host_tlb_params[0].ways; | ||
1346 | host_tlb_params[1].sets = 1; | ||
1347 | 748 | ||
1348 | vcpu_e500->gtlb_params[0].entries = KVM_E500_TLB0_SIZE; | 749 | vcpu_e500->gtlb_params[0].entries = KVM_E500_TLB0_SIZE; |
1349 | vcpu_e500->gtlb_params[1].entries = KVM_E500_TLB1_SIZE; | 750 | vcpu_e500->gtlb_params[1].entries = KVM_E500_TLB1_SIZE; |
@@ -1362,18 +763,6 @@ int kvmppc_e500_tlb_init(struct kvmppc_vcpu_e500 *vcpu_e500) | |||
1362 | vcpu_e500->gtlb_offset[0] = 0; | 763 | vcpu_e500->gtlb_offset[0] = 0; |
1363 | vcpu_e500->gtlb_offset[1] = KVM_E500_TLB0_SIZE; | 764 | vcpu_e500->gtlb_offset[1] = KVM_E500_TLB0_SIZE; |
1364 | 765 | ||
1365 | vcpu_e500->tlb_refs[0] = | ||
1366 | kzalloc(sizeof(struct tlbe_ref) * host_tlb_params[0].entries, | ||
1367 | GFP_KERNEL); | ||
1368 | if (!vcpu_e500->tlb_refs[0]) | ||
1369 | goto err; | ||
1370 | |||
1371 | vcpu_e500->tlb_refs[1] = | ||
1372 | kzalloc(sizeof(struct tlbe_ref) * host_tlb_params[1].entries, | ||
1373 | GFP_KERNEL); | ||
1374 | if (!vcpu_e500->tlb_refs[1]) | ||
1375 | goto err; | ||
1376 | |||
1377 | vcpu_e500->gtlb_priv[0] = kzalloc(sizeof(struct tlbe_ref) * | 766 | vcpu_e500->gtlb_priv[0] = kzalloc(sizeof(struct tlbe_ref) * |
1378 | vcpu_e500->gtlb_params[0].entries, | 767 | vcpu_e500->gtlb_params[0].entries, |
1379 | GFP_KERNEL); | 768 | GFP_KERNEL); |
@@ -1392,12 +781,6 @@ int kvmppc_e500_tlb_init(struct kvmppc_vcpu_e500 *vcpu_e500) | |||
1392 | if (!vcpu_e500->g2h_tlb1_map) | 781 | if (!vcpu_e500->g2h_tlb1_map) |
1393 | goto err; | 782 | goto err; |
1394 | 783 | ||
1395 | vcpu_e500->h2g_tlb1_rmap = kzalloc(sizeof(unsigned int) * | ||
1396 | host_tlb_params[1].entries, | ||
1397 | GFP_KERNEL); | ||
1398 | if (!vcpu_e500->h2g_tlb1_rmap) | ||
1399 | goto err; | ||
1400 | |||
1401 | /* Init TLB configuration register */ | 784 | /* Init TLB configuration register */ |
1402 | vcpu->arch.tlbcfg[0] = mfspr(SPRN_TLB0CFG) & | 785 | vcpu->arch.tlbcfg[0] = mfspr(SPRN_TLB0CFG) & |
1403 | ~(TLBnCFG_N_ENTRY | TLBnCFG_ASSOC); | 786 | ~(TLBnCFG_N_ENTRY | TLBnCFG_ASSOC); |
@@ -1416,15 +799,11 @@ int kvmppc_e500_tlb_init(struct kvmppc_vcpu_e500 *vcpu_e500) | |||
1416 | 799 | ||
1417 | err: | 800 | err: |
1418 | free_gtlb(vcpu_e500); | 801 | free_gtlb(vcpu_e500); |
1419 | kfree(vcpu_e500->tlb_refs[0]); | ||
1420 | kfree(vcpu_e500->tlb_refs[1]); | ||
1421 | return -1; | 802 | return -1; |
1422 | } | 803 | } |
1423 | 804 | ||
1424 | void kvmppc_e500_tlb_uninit(struct kvmppc_vcpu_e500 *vcpu_e500) | 805 | void kvmppc_e500_tlb_uninit(struct kvmppc_vcpu_e500 *vcpu_e500) |
1425 | { | 806 | { |
1426 | free_gtlb(vcpu_e500); | 807 | free_gtlb(vcpu_e500); |
1427 | kfree(vcpu_e500->h2g_tlb1_rmap); | 808 | e500_mmu_host_uninit(vcpu_e500); |
1428 | kfree(vcpu_e500->tlb_refs[0]); | ||
1429 | kfree(vcpu_e500->tlb_refs[1]); | ||
1430 | } | 809 | } |
diff --git a/arch/powerpc/kvm/e500_mmu_host.c b/arch/powerpc/kvm/e500_mmu_host.c new file mode 100644 index 000000000000..a222edfb9a9b --- /dev/null +++ b/arch/powerpc/kvm/e500_mmu_host.c | |||
@@ -0,0 +1,699 @@ | |||
1 | /* | ||
2 | * Copyright (C) 2008-2013 Freescale Semiconductor, Inc. All rights reserved. | ||
3 | * | ||
4 | * Author: Yu Liu, yu.liu@freescale.com | ||
5 | * Scott Wood, scottwood@freescale.com | ||
6 | * Ashish Kalra, ashish.kalra@freescale.com | ||
7 | * Varun Sethi, varun.sethi@freescale.com | ||
8 | * Alexander Graf, agraf@suse.de | ||
9 | * | ||
10 | * Description: | ||
11 | * This file is based on arch/powerpc/kvm/44x_tlb.c, | ||
12 | * by Hollis Blanchard <hollisb@us.ibm.com>. | ||
13 | * | ||
14 | * This program is free software; you can redistribute it and/or modify | ||
15 | * it under the terms of the GNU General Public License, version 2, as | ||
16 | * published by the Free Software Foundation. | ||
17 | */ | ||
18 | |||
19 | #include <linux/kernel.h> | ||
20 | #include <linux/types.h> | ||
21 | #include <linux/slab.h> | ||
22 | #include <linux/string.h> | ||
23 | #include <linux/kvm.h> | ||
24 | #include <linux/kvm_host.h> | ||
25 | #include <linux/highmem.h> | ||
26 | #include <linux/log2.h> | ||
27 | #include <linux/uaccess.h> | ||
28 | #include <linux/sched.h> | ||
29 | #include <linux/rwsem.h> | ||
30 | #include <linux/vmalloc.h> | ||
31 | #include <linux/hugetlb.h> | ||
32 | #include <asm/kvm_ppc.h> | ||
33 | |||
34 | #include "e500.h" | ||
35 | #include "trace.h" | ||
36 | #include "timing.h" | ||
37 | #include "e500_mmu_host.h" | ||
38 | |||
39 | #define to_htlb1_esel(esel) (host_tlb_params[1].entries - (esel) - 1) | ||
40 | |||
41 | static struct kvmppc_e500_tlb_params host_tlb_params[E500_TLB_NUM]; | ||
42 | |||
43 | static inline unsigned int tlb1_max_shadow_size(void) | ||
44 | { | ||
45 | /* reserve one entry for magic page */ | ||
46 | return host_tlb_params[1].entries - tlbcam_index - 1; | ||
47 | } | ||
48 | |||
49 | static inline u32 e500_shadow_mas3_attrib(u32 mas3, int usermode) | ||
50 | { | ||
51 | /* Mask off reserved bits. */ | ||
52 | mas3 &= MAS3_ATTRIB_MASK; | ||
53 | |||
54 | #ifndef CONFIG_KVM_BOOKE_HV | ||
55 | if (!usermode) { | ||
56 | /* Guest is in supervisor mode, | ||
57 | * so we need to translate guest | ||
58 | * supervisor permissions into user permissions. */ | ||
59 | mas3 &= ~E500_TLB_USER_PERM_MASK; | ||
60 | mas3 |= (mas3 & E500_TLB_SUPER_PERM_MASK) << 1; | ||
61 | } | ||
62 | mas3 |= E500_TLB_SUPER_PERM_MASK; | ||
63 | #endif | ||
64 | return mas3; | ||
65 | } | ||
66 | |||
67 | static inline u32 e500_shadow_mas2_attrib(u32 mas2, int usermode) | ||
68 | { | ||
69 | #ifdef CONFIG_SMP | ||
70 | return (mas2 & MAS2_ATTRIB_MASK) | MAS2_M; | ||
71 | #else | ||
72 | return mas2 & MAS2_ATTRIB_MASK; | ||
73 | #endif | ||
74 | } | ||
75 | |||
76 | /* | ||
77 | * writing shadow tlb entry to host TLB | ||
78 | */ | ||
79 | static inline void __write_host_tlbe(struct kvm_book3e_206_tlb_entry *stlbe, | ||
80 | uint32_t mas0) | ||
81 | { | ||
82 | unsigned long flags; | ||
83 | |||
84 | local_irq_save(flags); | ||
85 | mtspr(SPRN_MAS0, mas0); | ||
86 | mtspr(SPRN_MAS1, stlbe->mas1); | ||
87 | mtspr(SPRN_MAS2, (unsigned long)stlbe->mas2); | ||
88 | mtspr(SPRN_MAS3, (u32)stlbe->mas7_3); | ||
89 | mtspr(SPRN_MAS7, (u32)(stlbe->mas7_3 >> 32)); | ||
90 | #ifdef CONFIG_KVM_BOOKE_HV | ||
91 | mtspr(SPRN_MAS8, stlbe->mas8); | ||
92 | #endif | ||
93 | asm volatile("isync; tlbwe" : : : "memory"); | ||
94 | |||
95 | #ifdef CONFIG_KVM_BOOKE_HV | ||
96 | /* Must clear mas8 for other host tlbwe's */ | ||
97 | mtspr(SPRN_MAS8, 0); | ||
98 | isync(); | ||
99 | #endif | ||
100 | local_irq_restore(flags); | ||
101 | |||
102 | trace_kvm_booke206_stlb_write(mas0, stlbe->mas8, stlbe->mas1, | ||
103 | stlbe->mas2, stlbe->mas7_3); | ||
104 | } | ||
105 | |||
106 | /* | ||
107 | * Acquire a mas0 with victim hint, as if we just took a TLB miss. | ||
108 | * | ||
109 | * We don't care about the address we're searching for, other than that it's | ||
110 | * in the right set and is not present in the TLB. Using a zero PID and a | ||
111 | * userspace address means we don't have to set and then restore MAS5, or | ||
112 | * calculate a proper MAS6 value. | ||
113 | */ | ||
114 | static u32 get_host_mas0(unsigned long eaddr) | ||
115 | { | ||
116 | unsigned long flags; | ||
117 | u32 mas0; | ||
118 | |||
119 | local_irq_save(flags); | ||
120 | mtspr(SPRN_MAS6, 0); | ||
121 | asm volatile("tlbsx 0, %0" : : "b" (eaddr & ~CONFIG_PAGE_OFFSET)); | ||
122 | mas0 = mfspr(SPRN_MAS0); | ||
123 | local_irq_restore(flags); | ||
124 | |||
125 | return mas0; | ||
126 | } | ||
127 | |||
128 | /* sesel is for tlb1 only */ | ||
129 | static inline void write_host_tlbe(struct kvmppc_vcpu_e500 *vcpu_e500, | ||
130 | int tlbsel, int sesel, struct kvm_book3e_206_tlb_entry *stlbe) | ||
131 | { | ||
132 | u32 mas0; | ||
133 | |||
134 | if (tlbsel == 0) { | ||
135 | mas0 = get_host_mas0(stlbe->mas2); | ||
136 | __write_host_tlbe(stlbe, mas0); | ||
137 | } else { | ||
138 | __write_host_tlbe(stlbe, | ||
139 | MAS0_TLBSEL(1) | | ||
140 | MAS0_ESEL(to_htlb1_esel(sesel))); | ||
141 | } | ||
142 | } | ||
143 | |||
144 | /* sesel is for tlb1 only */ | ||
145 | static void write_stlbe(struct kvmppc_vcpu_e500 *vcpu_e500, | ||
146 | struct kvm_book3e_206_tlb_entry *gtlbe, | ||
147 | struct kvm_book3e_206_tlb_entry *stlbe, | ||
148 | int stlbsel, int sesel) | ||
149 | { | ||
150 | int stid; | ||
151 | |||
152 | preempt_disable(); | ||
153 | stid = kvmppc_e500_get_tlb_stid(&vcpu_e500->vcpu, gtlbe); | ||
154 | |||
155 | stlbe->mas1 |= MAS1_TID(stid); | ||
156 | write_host_tlbe(vcpu_e500, stlbsel, sesel, stlbe); | ||
157 | preempt_enable(); | ||
158 | } | ||
159 | |||
160 | #ifdef CONFIG_KVM_E500V2 | ||
161 | /* XXX should be a hook in the gva2hpa translation */ | ||
162 | void kvmppc_map_magic(struct kvm_vcpu *vcpu) | ||
163 | { | ||
164 | struct kvmppc_vcpu_e500 *vcpu_e500 = to_e500(vcpu); | ||
165 | struct kvm_book3e_206_tlb_entry magic; | ||
166 | ulong shared_page = ((ulong)vcpu->arch.shared) & PAGE_MASK; | ||
167 | unsigned int stid; | ||
168 | pfn_t pfn; | ||
169 | |||
170 | pfn = (pfn_t)virt_to_phys((void *)shared_page) >> PAGE_SHIFT; | ||
171 | get_page(pfn_to_page(pfn)); | ||
172 | |||
173 | preempt_disable(); | ||
174 | stid = kvmppc_e500_get_sid(vcpu_e500, 0, 0, 0, 0); | ||
175 | |||
176 | magic.mas1 = MAS1_VALID | MAS1_TS | MAS1_TID(stid) | | ||
177 | MAS1_TSIZE(BOOK3E_PAGESZ_4K); | ||
178 | magic.mas2 = vcpu->arch.magic_page_ea | MAS2_M; | ||
179 | magic.mas7_3 = ((u64)pfn << PAGE_SHIFT) | | ||
180 | MAS3_SW | MAS3_SR | MAS3_UW | MAS3_UR; | ||
181 | magic.mas8 = 0; | ||
182 | |||
183 | __write_host_tlbe(&magic, MAS0_TLBSEL(1) | MAS0_ESEL(tlbcam_index)); | ||
184 | preempt_enable(); | ||
185 | } | ||
186 | #endif | ||
187 | |||
188 | void inval_gtlbe_on_host(struct kvmppc_vcpu_e500 *vcpu_e500, int tlbsel, | ||
189 | int esel) | ||
190 | { | ||
191 | struct kvm_book3e_206_tlb_entry *gtlbe = | ||
192 | get_entry(vcpu_e500, tlbsel, esel); | ||
193 | struct tlbe_ref *ref = &vcpu_e500->gtlb_priv[tlbsel][esel].ref; | ||
194 | |||
195 | /* Don't bother with unmapped entries */ | ||
196 | if (!(ref->flags & E500_TLB_VALID)) | ||
197 | return; | ||
198 | |||
199 | if (tlbsel == 1 && ref->flags & E500_TLB_BITMAP) { | ||
200 | u64 tmp = vcpu_e500->g2h_tlb1_map[esel]; | ||
201 | int hw_tlb_indx; | ||
202 | unsigned long flags; | ||
203 | |||
204 | local_irq_save(flags); | ||
205 | while (tmp) { | ||
206 | hw_tlb_indx = __ilog2_u64(tmp & -tmp); | ||
207 | mtspr(SPRN_MAS0, | ||
208 | MAS0_TLBSEL(1) | | ||
209 | MAS0_ESEL(to_htlb1_esel(hw_tlb_indx))); | ||
210 | mtspr(SPRN_MAS1, 0); | ||
211 | asm volatile("tlbwe"); | ||
212 | vcpu_e500->h2g_tlb1_rmap[hw_tlb_indx] = 0; | ||
213 | tmp &= tmp - 1; | ||
214 | } | ||
215 | mb(); | ||
216 | vcpu_e500->g2h_tlb1_map[esel] = 0; | ||
217 | ref->flags &= ~(E500_TLB_BITMAP | E500_TLB_VALID); | ||
218 | local_irq_restore(flags); | ||
219 | } | ||
220 | |||
221 | if (tlbsel == 1 && ref->flags & E500_TLB_TLB0) { | ||
222 | /* | ||
223 | * TLB1 entry is backed by 4k pages. This should happen | ||
224 | * rarely and is not worth optimizing. Invalidate everything. | ||
225 | */ | ||
226 | kvmppc_e500_tlbil_all(vcpu_e500); | ||
227 | ref->flags &= ~(E500_TLB_TLB0 | E500_TLB_VALID); | ||
228 | } | ||
229 | |||
230 | /* Already invalidated in between */ | ||
231 | if (!(ref->flags & E500_TLB_VALID)) | ||
232 | return; | ||
233 | |||
234 | /* Guest tlbe is backed by at most one host tlbe per shadow pid. */ | ||
235 | kvmppc_e500_tlbil_one(vcpu_e500, gtlbe); | ||
236 | |||
237 | /* Mark the TLB as not backed by the host anymore */ | ||
238 | ref->flags &= ~E500_TLB_VALID; | ||
239 | } | ||
240 | |||
241 | static inline int tlbe_is_writable(struct kvm_book3e_206_tlb_entry *tlbe) | ||
242 | { | ||
243 | return tlbe->mas7_3 & (MAS3_SW|MAS3_UW); | ||
244 | } | ||
245 | |||
246 | static inline void kvmppc_e500_ref_setup(struct tlbe_ref *ref, | ||
247 | struct kvm_book3e_206_tlb_entry *gtlbe, | ||
248 | pfn_t pfn) | ||
249 | { | ||
250 | ref->pfn = pfn; | ||
251 | ref->flags = E500_TLB_VALID; | ||
252 | |||
253 | if (tlbe_is_writable(gtlbe)) | ||
254 | kvm_set_pfn_dirty(pfn); | ||
255 | } | ||
256 | |||
257 | static inline void kvmppc_e500_ref_release(struct tlbe_ref *ref) | ||
258 | { | ||
259 | if (ref->flags & E500_TLB_VALID) { | ||
260 | trace_kvm_booke206_ref_release(ref->pfn, ref->flags); | ||
261 | ref->flags = 0; | ||
262 | } | ||
263 | } | ||
264 | |||
265 | static void clear_tlb1_bitmap(struct kvmppc_vcpu_e500 *vcpu_e500) | ||
266 | { | ||
267 | if (vcpu_e500->g2h_tlb1_map) | ||
268 | memset(vcpu_e500->g2h_tlb1_map, 0, | ||
269 | sizeof(u64) * vcpu_e500->gtlb_params[1].entries); | ||
270 | if (vcpu_e500->h2g_tlb1_rmap) | ||
271 | memset(vcpu_e500->h2g_tlb1_rmap, 0, | ||
272 | sizeof(unsigned int) * host_tlb_params[1].entries); | ||
273 | } | ||
274 | |||
275 | static void clear_tlb_privs(struct kvmppc_vcpu_e500 *vcpu_e500) | ||
276 | { | ||
277 | int tlbsel = 0; | ||
278 | int i; | ||
279 | |||
280 | for (i = 0; i < vcpu_e500->gtlb_params[tlbsel].entries; i++) { | ||
281 | struct tlbe_ref *ref = | ||
282 | &vcpu_e500->gtlb_priv[tlbsel][i].ref; | ||
283 | kvmppc_e500_ref_release(ref); | ||
284 | } | ||
285 | } | ||
286 | |||
287 | static void clear_tlb_refs(struct kvmppc_vcpu_e500 *vcpu_e500) | ||
288 | { | ||
289 | int stlbsel = 1; | ||
290 | int i; | ||
291 | |||
292 | kvmppc_e500_tlbil_all(vcpu_e500); | ||
293 | |||
294 | for (i = 0; i < host_tlb_params[stlbsel].entries; i++) { | ||
295 | struct tlbe_ref *ref = | ||
296 | &vcpu_e500->tlb_refs[stlbsel][i]; | ||
297 | kvmppc_e500_ref_release(ref); | ||
298 | } | ||
299 | |||
300 | clear_tlb_privs(vcpu_e500); | ||
301 | } | ||
302 | |||
303 | void kvmppc_core_flush_tlb(struct kvm_vcpu *vcpu) | ||
304 | { | ||
305 | struct kvmppc_vcpu_e500 *vcpu_e500 = to_e500(vcpu); | ||
306 | clear_tlb_refs(vcpu_e500); | ||
307 | clear_tlb1_bitmap(vcpu_e500); | ||
308 | } | ||
309 | |||
310 | /* TID must be supplied by the caller */ | ||
311 | static void kvmppc_e500_setup_stlbe( | ||
312 | struct kvm_vcpu *vcpu, | ||
313 | struct kvm_book3e_206_tlb_entry *gtlbe, | ||
314 | int tsize, struct tlbe_ref *ref, u64 gvaddr, | ||
315 | struct kvm_book3e_206_tlb_entry *stlbe) | ||
316 | { | ||
317 | pfn_t pfn = ref->pfn; | ||
318 | u32 pr = vcpu->arch.shared->msr & MSR_PR; | ||
319 | |||
320 | BUG_ON(!(ref->flags & E500_TLB_VALID)); | ||
321 | |||
322 | /* Force IPROT=0 for all guest mappings. */ | ||
323 | stlbe->mas1 = MAS1_TSIZE(tsize) | get_tlb_sts(gtlbe) | MAS1_VALID; | ||
324 | stlbe->mas2 = (gvaddr & MAS2_EPN) | | ||
325 | e500_shadow_mas2_attrib(gtlbe->mas2, pr); | ||
326 | stlbe->mas7_3 = ((u64)pfn << PAGE_SHIFT) | | ||
327 | e500_shadow_mas3_attrib(gtlbe->mas7_3, pr); | ||
328 | |||
329 | #ifdef CONFIG_KVM_BOOKE_HV | ||
330 | stlbe->mas8 = MAS8_TGS | vcpu->kvm->arch.lpid; | ||
331 | #endif | ||
332 | } | ||
333 | |||
334 | static inline int kvmppc_e500_shadow_map(struct kvmppc_vcpu_e500 *vcpu_e500, | ||
335 | u64 gvaddr, gfn_t gfn, struct kvm_book3e_206_tlb_entry *gtlbe, | ||
336 | int tlbsel, struct kvm_book3e_206_tlb_entry *stlbe, | ||
337 | struct tlbe_ref *ref) | ||
338 | { | ||
339 | struct kvm_memory_slot *slot; | ||
340 | unsigned long pfn = 0; /* silence GCC warning */ | ||
341 | unsigned long hva; | ||
342 | int pfnmap = 0; | ||
343 | int tsize = BOOK3E_PAGESZ_4K; | ||
344 | |||
345 | /* | ||
346 | * Translate guest physical to true physical, acquiring | ||
347 | * a page reference if it is normal, non-reserved memory. | ||
348 | * | ||
349 | * gfn_to_memslot() must succeed because otherwise we wouldn't | ||
350 | * have gotten this far. Eventually we should just pass the slot | ||
351 | * pointer through from the first lookup. | ||
352 | */ | ||
353 | slot = gfn_to_memslot(vcpu_e500->vcpu.kvm, gfn); | ||
354 | hva = gfn_to_hva_memslot(slot, gfn); | ||
355 | |||
356 | if (tlbsel == 1) { | ||
357 | struct vm_area_struct *vma; | ||
358 | down_read(¤t->mm->mmap_sem); | ||
359 | |||
360 | vma = find_vma(current->mm, hva); | ||
361 | if (vma && hva >= vma->vm_start && | ||
362 | (vma->vm_flags & VM_PFNMAP)) { | ||
363 | /* | ||
364 | * This VMA is a physically contiguous region (e.g. | ||
365 | * /dev/mem) that bypasses normal Linux page | ||
366 | * management. Find the overlap between the | ||
367 | * vma and the memslot. | ||
368 | */ | ||
369 | |||
370 | unsigned long start, end; | ||
371 | unsigned long slot_start, slot_end; | ||
372 | |||
373 | pfnmap = 1; | ||
374 | |||
375 | start = vma->vm_pgoff; | ||
376 | end = start + | ||
377 | ((vma->vm_end - vma->vm_start) >> PAGE_SHIFT); | ||
378 | |||
379 | pfn = start + ((hva - vma->vm_start) >> PAGE_SHIFT); | ||
380 | |||
381 | slot_start = pfn - (gfn - slot->base_gfn); | ||
382 | slot_end = slot_start + slot->npages; | ||
383 | |||
384 | if (start < slot_start) | ||
385 | start = slot_start; | ||
386 | if (end > slot_end) | ||
387 | end = slot_end; | ||
388 | |||
389 | tsize = (gtlbe->mas1 & MAS1_TSIZE_MASK) >> | ||
390 | MAS1_TSIZE_SHIFT; | ||
391 | |||
392 | /* | ||
393 | * e500 doesn't implement the lowest tsize bit, | ||
394 | * or 1K pages. | ||
395 | */ | ||
396 | tsize = max(BOOK3E_PAGESZ_4K, tsize & ~1); | ||
397 | |||
398 | /* | ||
399 | * Now find the largest tsize (up to what the guest | ||
400 | * requested) that will cover gfn, stay within the | ||
401 | * range, and for which gfn and pfn are mutually | ||
402 | * aligned. | ||
403 | */ | ||
404 | |||
405 | for (; tsize > BOOK3E_PAGESZ_4K; tsize -= 2) { | ||
406 | unsigned long gfn_start, gfn_end, tsize_pages; | ||
407 | tsize_pages = 1 << (tsize - 2); | ||
408 | |||
409 | gfn_start = gfn & ~(tsize_pages - 1); | ||
410 | gfn_end = gfn_start + tsize_pages; | ||
411 | |||
412 | if (gfn_start + pfn - gfn < start) | ||
413 | continue; | ||
414 | if (gfn_end + pfn - gfn > end) | ||
415 | continue; | ||
416 | if ((gfn & (tsize_pages - 1)) != | ||
417 | (pfn & (tsize_pages - 1))) | ||
418 | continue; | ||
419 | |||
420 | gvaddr &= ~((tsize_pages << PAGE_SHIFT) - 1); | ||
421 | pfn &= ~(tsize_pages - 1); | ||
422 | break; | ||
423 | } | ||
424 | } else if (vma && hva >= vma->vm_start && | ||
425 | (vma->vm_flags & VM_HUGETLB)) { | ||
426 | unsigned long psize = vma_kernel_pagesize(vma); | ||
427 | |||
428 | tsize = (gtlbe->mas1 & MAS1_TSIZE_MASK) >> | ||
429 | MAS1_TSIZE_SHIFT; | ||
430 | |||
431 | /* | ||
432 | * Take the largest page size that satisfies both host | ||
433 | * and guest mapping | ||
434 | */ | ||
435 | tsize = min(__ilog2(psize) - 10, tsize); | ||
436 | |||
437 | /* | ||
438 | * e500 doesn't implement the lowest tsize bit, | ||
439 | * or 1K pages. | ||
440 | */ | ||
441 | tsize = max(BOOK3E_PAGESZ_4K, tsize & ~1); | ||
442 | } | ||
443 | |||
444 | up_read(¤t->mm->mmap_sem); | ||
445 | } | ||
446 | |||
447 | if (likely(!pfnmap)) { | ||
448 | unsigned long tsize_pages = 1 << (tsize + 10 - PAGE_SHIFT); | ||
449 | pfn = gfn_to_pfn_memslot(slot, gfn); | ||
450 | if (is_error_noslot_pfn(pfn)) { | ||
451 | printk(KERN_ERR "Couldn't get real page for gfn %lx!\n", | ||
452 | (long)gfn); | ||
453 | return -EINVAL; | ||
454 | } | ||
455 | |||
456 | /* Align guest and physical address to page map boundaries */ | ||
457 | pfn &= ~(tsize_pages - 1); | ||
458 | gvaddr &= ~((tsize_pages << PAGE_SHIFT) - 1); | ||
459 | } | ||
460 | |||
461 | /* Drop old ref and setup new one. */ | ||
462 | kvmppc_e500_ref_release(ref); | ||
463 | kvmppc_e500_ref_setup(ref, gtlbe, pfn); | ||
464 | |||
465 | kvmppc_e500_setup_stlbe(&vcpu_e500->vcpu, gtlbe, tsize, | ||
466 | ref, gvaddr, stlbe); | ||
467 | |||
468 | /* Clear i-cache for new pages */ | ||
469 | kvmppc_mmu_flush_icache(pfn); | ||
470 | |||
471 | /* Drop refcount on page, so that mmu notifiers can clear it */ | ||
472 | kvm_release_pfn_clean(pfn); | ||
473 | |||
474 | return 0; | ||
475 | } | ||
476 | |||
477 | /* XXX only map the one-one case, for now use TLB0 */ | ||
478 | static int kvmppc_e500_tlb0_map(struct kvmppc_vcpu_e500 *vcpu_e500, int esel, | ||
479 | struct kvm_book3e_206_tlb_entry *stlbe) | ||
480 | { | ||
481 | struct kvm_book3e_206_tlb_entry *gtlbe; | ||
482 | struct tlbe_ref *ref; | ||
483 | int stlbsel = 0; | ||
484 | int sesel = 0; | ||
485 | int r; | ||
486 | |||
487 | gtlbe = get_entry(vcpu_e500, 0, esel); | ||
488 | ref = &vcpu_e500->gtlb_priv[0][esel].ref; | ||
489 | |||
490 | r = kvmppc_e500_shadow_map(vcpu_e500, get_tlb_eaddr(gtlbe), | ||
491 | get_tlb_raddr(gtlbe) >> PAGE_SHIFT, | ||
492 | gtlbe, 0, stlbe, ref); | ||
493 | if (r) | ||
494 | return r; | ||
495 | |||
496 | write_stlbe(vcpu_e500, gtlbe, stlbe, stlbsel, sesel); | ||
497 | |||
498 | return 0; | ||
499 | } | ||
500 | |||
501 | static int kvmppc_e500_tlb1_map_tlb1(struct kvmppc_vcpu_e500 *vcpu_e500, | ||
502 | struct tlbe_ref *ref, | ||
503 | int esel) | ||
504 | { | ||
505 | unsigned int sesel = vcpu_e500->host_tlb1_nv++; | ||
506 | |||
507 | if (unlikely(vcpu_e500->host_tlb1_nv >= tlb1_max_shadow_size())) | ||
508 | vcpu_e500->host_tlb1_nv = 0; | ||
509 | |||
510 | vcpu_e500->tlb_refs[1][sesel] = *ref; | ||
511 | vcpu_e500->g2h_tlb1_map[esel] |= (u64)1 << sesel; | ||
512 | vcpu_e500->gtlb_priv[1][esel].ref.flags |= E500_TLB_BITMAP; | ||
513 | if (vcpu_e500->h2g_tlb1_rmap[sesel]) { | ||
514 | unsigned int idx = vcpu_e500->h2g_tlb1_rmap[sesel]; | ||
515 | vcpu_e500->g2h_tlb1_map[idx] &= ~(1ULL << sesel); | ||
516 | } | ||
517 | vcpu_e500->h2g_tlb1_rmap[sesel] = esel; | ||
518 | |||
519 | return sesel; | ||
520 | } | ||
521 | |||
522 | /* Caller must ensure that the specified guest TLB entry is safe to insert into | ||
523 | * the shadow TLB. */ | ||
524 | /* For both one-one and one-to-many */ | ||
525 | static int kvmppc_e500_tlb1_map(struct kvmppc_vcpu_e500 *vcpu_e500, | ||
526 | u64 gvaddr, gfn_t gfn, struct kvm_book3e_206_tlb_entry *gtlbe, | ||
527 | struct kvm_book3e_206_tlb_entry *stlbe, int esel) | ||
528 | { | ||
529 | struct tlbe_ref ref; | ||
530 | int sesel; | ||
531 | int r; | ||
532 | |||
533 | ref.flags = 0; | ||
534 | r = kvmppc_e500_shadow_map(vcpu_e500, gvaddr, gfn, gtlbe, 1, stlbe, | ||
535 | &ref); | ||
536 | if (r) | ||
537 | return r; | ||
538 | |||
539 | /* Use TLB0 when we can only map a page with 4k */ | ||
540 | if (get_tlb_tsize(stlbe) == BOOK3E_PAGESZ_4K) { | ||
541 | vcpu_e500->gtlb_priv[1][esel].ref.flags |= E500_TLB_TLB0; | ||
542 | write_stlbe(vcpu_e500, gtlbe, stlbe, 0, 0); | ||
543 | return 0; | ||
544 | } | ||
545 | |||
546 | /* Otherwise map into TLB1 */ | ||
547 | sesel = kvmppc_e500_tlb1_map_tlb1(vcpu_e500, &ref, esel); | ||
548 | write_stlbe(vcpu_e500, gtlbe, stlbe, 1, sesel); | ||
549 | |||
550 | return 0; | ||
551 | } | ||
552 | |||
553 | void kvmppc_mmu_map(struct kvm_vcpu *vcpu, u64 eaddr, gpa_t gpaddr, | ||
554 | unsigned int index) | ||
555 | { | ||
556 | struct kvmppc_vcpu_e500 *vcpu_e500 = to_e500(vcpu); | ||
557 | struct tlbe_priv *priv; | ||
558 | struct kvm_book3e_206_tlb_entry *gtlbe, stlbe; | ||
559 | int tlbsel = tlbsel_of(index); | ||
560 | int esel = esel_of(index); | ||
561 | |||
562 | gtlbe = get_entry(vcpu_e500, tlbsel, esel); | ||
563 | |||
564 | switch (tlbsel) { | ||
565 | case 0: | ||
566 | priv = &vcpu_e500->gtlb_priv[tlbsel][esel]; | ||
567 | |||
568 | /* Triggers after clear_tlb_refs or on initial mapping */ | ||
569 | if (!(priv->ref.flags & E500_TLB_VALID)) { | ||
570 | kvmppc_e500_tlb0_map(vcpu_e500, esel, &stlbe); | ||
571 | } else { | ||
572 | kvmppc_e500_setup_stlbe(vcpu, gtlbe, BOOK3E_PAGESZ_4K, | ||
573 | &priv->ref, eaddr, &stlbe); | ||
574 | write_stlbe(vcpu_e500, gtlbe, &stlbe, 0, 0); | ||
575 | } | ||
576 | break; | ||
577 | |||
578 | case 1: { | ||
579 | gfn_t gfn = gpaddr >> PAGE_SHIFT; | ||
580 | kvmppc_e500_tlb1_map(vcpu_e500, eaddr, gfn, gtlbe, &stlbe, | ||
581 | esel); | ||
582 | break; | ||
583 | } | ||
584 | |||
585 | default: | ||
586 | BUG(); | ||
587 | break; | ||
588 | } | ||
589 | } | ||
590 | |||
591 | /************* MMU Notifiers *************/ | ||
592 | |||
593 | int kvm_unmap_hva(struct kvm *kvm, unsigned long hva) | ||
594 | { | ||
595 | trace_kvm_unmap_hva(hva); | ||
596 | |||
597 | /* | ||
598 | * Flush all shadow tlb entries everywhere. This is slow, but | ||
599 | * we are 100% sure that we catch the to be unmapped page | ||
600 | */ | ||
601 | kvm_flush_remote_tlbs(kvm); | ||
602 | |||
603 | return 0; | ||
604 | } | ||
605 | |||
606 | int kvm_unmap_hva_range(struct kvm *kvm, unsigned long start, unsigned long end) | ||
607 | { | ||
608 | /* kvm_unmap_hva flushes everything anyways */ | ||
609 | kvm_unmap_hva(kvm, start); | ||
610 | |||
611 | return 0; | ||
612 | } | ||
613 | |||
614 | int kvm_age_hva(struct kvm *kvm, unsigned long hva) | ||
615 | { | ||
616 | /* XXX could be more clever ;) */ | ||
617 | return 0; | ||
618 | } | ||
619 | |||
620 | int kvm_test_age_hva(struct kvm *kvm, unsigned long hva) | ||
621 | { | ||
622 | /* XXX could be more clever ;) */ | ||
623 | return 0; | ||
624 | } | ||
625 | |||
626 | void kvm_set_spte_hva(struct kvm *kvm, unsigned long hva, pte_t pte) | ||
627 | { | ||
628 | /* The page will get remapped properly on its next fault */ | ||
629 | kvm_unmap_hva(kvm, hva); | ||
630 | } | ||
631 | |||
632 | /*****************************************/ | ||
633 | |||
634 | int e500_mmu_host_init(struct kvmppc_vcpu_e500 *vcpu_e500) | ||
635 | { | ||
636 | host_tlb_params[0].entries = mfspr(SPRN_TLB0CFG) & TLBnCFG_N_ENTRY; | ||
637 | host_tlb_params[1].entries = mfspr(SPRN_TLB1CFG) & TLBnCFG_N_ENTRY; | ||
638 | |||
639 | /* | ||
640 | * This should never happen on real e500 hardware, but is | ||
641 | * architecturally possible -- e.g. in some weird nested | ||
642 | * virtualization case. | ||
643 | */ | ||
644 | if (host_tlb_params[0].entries == 0 || | ||
645 | host_tlb_params[1].entries == 0) { | ||
646 | pr_err("%s: need to know host tlb size\n", __func__); | ||
647 | return -ENODEV; | ||
648 | } | ||
649 | |||
650 | host_tlb_params[0].ways = (mfspr(SPRN_TLB0CFG) & TLBnCFG_ASSOC) >> | ||
651 | TLBnCFG_ASSOC_SHIFT; | ||
652 | host_tlb_params[1].ways = host_tlb_params[1].entries; | ||
653 | |||
654 | if (!is_power_of_2(host_tlb_params[0].entries) || | ||
655 | !is_power_of_2(host_tlb_params[0].ways) || | ||
656 | host_tlb_params[0].entries < host_tlb_params[0].ways || | ||
657 | host_tlb_params[0].ways == 0) { | ||
658 | pr_err("%s: bad tlb0 host config: %u entries %u ways\n", | ||
659 | __func__, host_tlb_params[0].entries, | ||
660 | host_tlb_params[0].ways); | ||
661 | return -ENODEV; | ||
662 | } | ||
663 | |||
664 | host_tlb_params[0].sets = | ||
665 | host_tlb_params[0].entries / host_tlb_params[0].ways; | ||
666 | host_tlb_params[1].sets = 1; | ||
667 | |||
668 | vcpu_e500->tlb_refs[0] = | ||
669 | kzalloc(sizeof(struct tlbe_ref) * host_tlb_params[0].entries, | ||
670 | GFP_KERNEL); | ||
671 | if (!vcpu_e500->tlb_refs[0]) | ||
672 | goto err; | ||
673 | |||
674 | vcpu_e500->tlb_refs[1] = | ||
675 | kzalloc(sizeof(struct tlbe_ref) * host_tlb_params[1].entries, | ||
676 | GFP_KERNEL); | ||
677 | if (!vcpu_e500->tlb_refs[1]) | ||
678 | goto err; | ||
679 | |||
680 | vcpu_e500->h2g_tlb1_rmap = kzalloc(sizeof(unsigned int) * | ||
681 | host_tlb_params[1].entries, | ||
682 | GFP_KERNEL); | ||
683 | if (!vcpu_e500->h2g_tlb1_rmap) | ||
684 | goto err; | ||
685 | |||
686 | return 0; | ||
687 | |||
688 | err: | ||
689 | kfree(vcpu_e500->tlb_refs[0]); | ||
690 | kfree(vcpu_e500->tlb_refs[1]); | ||
691 | return -EINVAL; | ||
692 | } | ||
693 | |||
694 | void e500_mmu_host_uninit(struct kvmppc_vcpu_e500 *vcpu_e500) | ||
695 | { | ||
696 | kfree(vcpu_e500->h2g_tlb1_rmap); | ||
697 | kfree(vcpu_e500->tlb_refs[0]); | ||
698 | kfree(vcpu_e500->tlb_refs[1]); | ||
699 | } | ||
diff --git a/arch/powerpc/kvm/e500_mmu_host.h b/arch/powerpc/kvm/e500_mmu_host.h new file mode 100644 index 000000000000..7624835b76c7 --- /dev/null +++ b/arch/powerpc/kvm/e500_mmu_host.h | |||
@@ -0,0 +1,18 @@ | |||
1 | /* | ||
2 | * Copyright (C) 2008-2013 Freescale Semiconductor, Inc. All rights reserved. | ||
3 | * | ||
4 | * This program is free software; you can redistribute it and/or modify | ||
5 | * it under the terms of the GNU General Public License, version 2, as | ||
6 | * published by the Free Software Foundation. | ||
7 | */ | ||
8 | |||
9 | #ifndef KVM_E500_MMU_HOST_H | ||
10 | #define KVM_E500_MMU_HOST_H | ||
11 | |||
12 | void inval_gtlbe_on_host(struct kvmppc_vcpu_e500 *vcpu_e500, int tlbsel, | ||
13 | int esel); | ||
14 | |||
15 | int e500_mmu_host_init(struct kvmppc_vcpu_e500 *vcpu_e500); | ||
16 | void e500_mmu_host_uninit(struct kvmppc_vcpu_e500 *vcpu_e500); | ||
17 | |||
18 | #endif /* KVM_E500_MMU_HOST_H */ | ||
diff --git a/arch/powerpc/kvm/emulate.c b/arch/powerpc/kvm/emulate.c index 9d9cddc5b346..7a73b6f72a8b 100644 --- a/arch/powerpc/kvm/emulate.c +++ b/arch/powerpc/kvm/emulate.c | |||
@@ -150,8 +150,6 @@ static int kvmppc_emulate_mtspr(struct kvm_vcpu *vcpu, int sprn, int rs) | |||
150 | case SPRN_TBWL: break; | 150 | case SPRN_TBWL: break; |
151 | case SPRN_TBWU: break; | 151 | case SPRN_TBWU: break; |
152 | 152 | ||
153 | case SPRN_MSSSR0: break; | ||
154 | |||
155 | case SPRN_DEC: | 153 | case SPRN_DEC: |
156 | vcpu->arch.dec = spr_val; | 154 | vcpu->arch.dec = spr_val; |
157 | kvmppc_emulate_dec(vcpu); | 155 | kvmppc_emulate_dec(vcpu); |
@@ -202,9 +200,6 @@ static int kvmppc_emulate_mfspr(struct kvm_vcpu *vcpu, int sprn, int rt) | |||
202 | case SPRN_PIR: | 200 | case SPRN_PIR: |
203 | spr_val = vcpu->vcpu_id; | 201 | spr_val = vcpu->vcpu_id; |
204 | break; | 202 | break; |
205 | case SPRN_MSSSR0: | ||
206 | spr_val = 0; | ||
207 | break; | ||
208 | 203 | ||
209 | /* Note: mftb and TBRL/TBWL are user-accessible, so | 204 | /* Note: mftb and TBRL/TBWL are user-accessible, so |
210 | * the guest can always access the real TB anyways. | 205 | * the guest can always access the real TB anyways. |
diff --git a/arch/powerpc/kvm/powerpc.c b/arch/powerpc/kvm/powerpc.c index 70739a089560..934413cd3a1b 100644 --- a/arch/powerpc/kvm/powerpc.c +++ b/arch/powerpc/kvm/powerpc.c | |||
@@ -237,7 +237,8 @@ int kvmppc_emulate_mmio(struct kvm_run *run, struct kvm_vcpu *vcpu) | |||
237 | r = RESUME_HOST; | 237 | r = RESUME_HOST; |
238 | break; | 238 | break; |
239 | default: | 239 | default: |
240 | BUG(); | 240 | WARN_ON(1); |
241 | r = RESUME_GUEST; | ||
241 | } | 242 | } |
242 | 243 | ||
243 | return r; | 244 | return r; |
@@ -305,6 +306,7 @@ int kvm_dev_ioctl_check_extension(long ext) | |||
305 | #ifdef CONFIG_BOOKE | 306 | #ifdef CONFIG_BOOKE |
306 | case KVM_CAP_PPC_BOOKE_SREGS: | 307 | case KVM_CAP_PPC_BOOKE_SREGS: |
307 | case KVM_CAP_PPC_BOOKE_WATCHDOG: | 308 | case KVM_CAP_PPC_BOOKE_WATCHDOG: |
309 | case KVM_CAP_PPC_EPR: | ||
308 | #else | 310 | #else |
309 | case KVM_CAP_PPC_SEGSTATE: | 311 | case KVM_CAP_PPC_SEGSTATE: |
310 | case KVM_CAP_PPC_HIOR: | 312 | case KVM_CAP_PPC_HIOR: |
@@ -412,7 +414,7 @@ int kvm_arch_prepare_memory_region(struct kvm *kvm, | |||
412 | struct kvm_memory_slot *memslot, | 414 | struct kvm_memory_slot *memslot, |
413 | struct kvm_memory_slot old, | 415 | struct kvm_memory_slot old, |
414 | struct kvm_userspace_memory_region *mem, | 416 | struct kvm_userspace_memory_region *mem, |
415 | int user_alloc) | 417 | bool user_alloc) |
416 | { | 418 | { |
417 | return kvmppc_core_prepare_memory_region(kvm, memslot, mem); | 419 | return kvmppc_core_prepare_memory_region(kvm, memslot, mem); |
418 | } | 420 | } |
@@ -420,7 +422,7 @@ int kvm_arch_prepare_memory_region(struct kvm *kvm, | |||
420 | void kvm_arch_commit_memory_region(struct kvm *kvm, | 422 | void kvm_arch_commit_memory_region(struct kvm *kvm, |
421 | struct kvm_userspace_memory_region *mem, | 423 | struct kvm_userspace_memory_region *mem, |
422 | struct kvm_memory_slot old, | 424 | struct kvm_memory_slot old, |
423 | int user_alloc) | 425 | bool user_alloc) |
424 | { | 426 | { |
425 | kvmppc_core_commit_memory_region(kvm, mem, old); | 427 | kvmppc_core_commit_memory_region(kvm, mem, old); |
426 | } | 428 | } |
@@ -720,6 +722,11 @@ int kvm_arch_vcpu_ioctl_run(struct kvm_vcpu *vcpu, struct kvm_run *run) | |||
720 | for (i = 0; i < 9; ++i) | 722 | for (i = 0; i < 9; ++i) |
721 | kvmppc_set_gpr(vcpu, 4 + i, run->papr_hcall.args[i]); | 723 | kvmppc_set_gpr(vcpu, 4 + i, run->papr_hcall.args[i]); |
722 | vcpu->arch.hcall_needed = 0; | 724 | vcpu->arch.hcall_needed = 0; |
725 | #ifdef CONFIG_BOOKE | ||
726 | } else if (vcpu->arch.epr_needed) { | ||
727 | kvmppc_set_epr(vcpu, run->epr.epr); | ||
728 | vcpu->arch.epr_needed = 0; | ||
729 | #endif | ||
723 | } | 730 | } |
724 | 731 | ||
725 | r = kvmppc_vcpu_run(run, vcpu); | 732 | r = kvmppc_vcpu_run(run, vcpu); |
@@ -761,6 +768,10 @@ static int kvm_vcpu_ioctl_enable_cap(struct kvm_vcpu *vcpu, | |||
761 | r = 0; | 768 | r = 0; |
762 | vcpu->arch.papr_enabled = true; | 769 | vcpu->arch.papr_enabled = true; |
763 | break; | 770 | break; |
771 | case KVM_CAP_PPC_EPR: | ||
772 | r = 0; | ||
773 | vcpu->arch.epr_enabled = cap->args[0]; | ||
774 | break; | ||
764 | #ifdef CONFIG_BOOKE | 775 | #ifdef CONFIG_BOOKE |
765 | case KVM_CAP_PPC_BOOKE_WATCHDOG: | 776 | case KVM_CAP_PPC_BOOKE_WATCHDOG: |
766 | r = 0; | 777 | r = 0; |