book3s_64_mmu.c 15 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670
  1. // SPDX-License-Identifier: GPL-2.0-only
  2. /*
  3. *
  4. * Copyright SUSE Linux Products GmbH 2009
  5. *
  6. * Authors: Alexander Graf <[email protected]>
  7. */
  8. #include <linux/types.h>
  9. #include <linux/string.h>
  10. #include <linux/kvm.h>
  11. #include <linux/kvm_host.h>
  12. #include <linux/highmem.h>
  13. #include <asm/kvm_ppc.h>
  14. #include <asm/kvm_book3s.h>
  15. #include <asm/book3s/64/mmu-hash.h>
  16. /* #define DEBUG_MMU */
  17. #ifdef DEBUG_MMU
  18. #define dprintk(X...) printk(KERN_INFO X)
  19. #else
  20. #define dprintk(X...) do { } while(0)
  21. #endif
  22. static struct kvmppc_slb *kvmppc_mmu_book3s_64_find_slbe(
  23. struct kvm_vcpu *vcpu,
  24. gva_t eaddr)
  25. {
  26. int i;
  27. u64 esid = GET_ESID(eaddr);
  28. u64 esid_1t = GET_ESID_1T(eaddr);
  29. for (i = 0; i < vcpu->arch.slb_nr; i++) {
  30. u64 cmp_esid = esid;
  31. if (!vcpu->arch.slb[i].valid)
  32. continue;
  33. if (vcpu->arch.slb[i].tb)
  34. cmp_esid = esid_1t;
  35. if (vcpu->arch.slb[i].esid == cmp_esid)
  36. return &vcpu->arch.slb[i];
  37. }
  38. dprintk("KVM: No SLB entry found for 0x%lx [%llx | %llx]\n",
  39. eaddr, esid, esid_1t);
  40. for (i = 0; i < vcpu->arch.slb_nr; i++) {
  41. if (vcpu->arch.slb[i].vsid)
  42. dprintk(" %d: %c%c%c %llx %llx\n", i,
  43. vcpu->arch.slb[i].valid ? 'v' : ' ',
  44. vcpu->arch.slb[i].large ? 'l' : ' ',
  45. vcpu->arch.slb[i].tb ? 't' : ' ',
  46. vcpu->arch.slb[i].esid,
  47. vcpu->arch.slb[i].vsid);
  48. }
  49. return NULL;
  50. }
  51. static int kvmppc_slb_sid_shift(struct kvmppc_slb *slbe)
  52. {
  53. return slbe->tb ? SID_SHIFT_1T : SID_SHIFT;
  54. }
  55. static u64 kvmppc_slb_offset_mask(struct kvmppc_slb *slbe)
  56. {
  57. return (1ul << kvmppc_slb_sid_shift(slbe)) - 1;
  58. }
  59. static u64 kvmppc_slb_calc_vpn(struct kvmppc_slb *slb, gva_t eaddr)
  60. {
  61. eaddr &= kvmppc_slb_offset_mask(slb);
  62. return (eaddr >> VPN_SHIFT) |
  63. ((slb->vsid) << (kvmppc_slb_sid_shift(slb) - VPN_SHIFT));
  64. }
  65. static u64 kvmppc_mmu_book3s_64_ea_to_vp(struct kvm_vcpu *vcpu, gva_t eaddr,
  66. bool data)
  67. {
  68. struct kvmppc_slb *slb;
  69. slb = kvmppc_mmu_book3s_64_find_slbe(vcpu, eaddr);
  70. if (!slb)
  71. return 0;
  72. return kvmppc_slb_calc_vpn(slb, eaddr);
  73. }
  74. static int mmu_pagesize(int mmu_pg)
  75. {
  76. switch (mmu_pg) {
  77. case MMU_PAGE_64K:
  78. return 16;
  79. case MMU_PAGE_16M:
  80. return 24;
  81. }
  82. return 12;
  83. }
  84. static int kvmppc_mmu_book3s_64_get_pagesize(struct kvmppc_slb *slbe)
  85. {
  86. return mmu_pagesize(slbe->base_page_size);
  87. }
  88. static u32 kvmppc_mmu_book3s_64_get_page(struct kvmppc_slb *slbe, gva_t eaddr)
  89. {
  90. int p = kvmppc_mmu_book3s_64_get_pagesize(slbe);
  91. return ((eaddr & kvmppc_slb_offset_mask(slbe)) >> p);
  92. }
  93. static hva_t kvmppc_mmu_book3s_64_get_pteg(struct kvm_vcpu *vcpu,
  94. struct kvmppc_slb *slbe, gva_t eaddr,
  95. bool second)
  96. {
  97. struct kvmppc_vcpu_book3s *vcpu_book3s = to_book3s(vcpu);
  98. u64 hash, pteg, htabsize;
  99. u32 ssize;
  100. hva_t r;
  101. u64 vpn;
  102. htabsize = ((1 << ((vcpu_book3s->sdr1 & 0x1f) + 11)) - 1);
  103. vpn = kvmppc_slb_calc_vpn(slbe, eaddr);
  104. ssize = slbe->tb ? MMU_SEGSIZE_1T : MMU_SEGSIZE_256M;
  105. hash = hpt_hash(vpn, kvmppc_mmu_book3s_64_get_pagesize(slbe), ssize);
  106. if (second)
  107. hash = ~hash;
  108. hash &= ((1ULL << 39ULL) - 1ULL);
  109. hash &= htabsize;
  110. hash <<= 7ULL;
  111. pteg = vcpu_book3s->sdr1 & 0xfffffffffffc0000ULL;
  112. pteg |= hash;
  113. dprintk("MMU: page=0x%x sdr1=0x%llx pteg=0x%llx vsid=0x%llx\n",
  114. page, vcpu_book3s->sdr1, pteg, slbe->vsid);
  115. /* When running a PAPR guest, SDR1 contains a HVA address instead
  116. of a GPA */
  117. if (vcpu->arch.papr_enabled)
  118. r = pteg;
  119. else
  120. r = gfn_to_hva(vcpu->kvm, pteg >> PAGE_SHIFT);
  121. if (kvm_is_error_hva(r))
  122. return r;
  123. return r | (pteg & ~PAGE_MASK);
  124. }
  125. static u64 kvmppc_mmu_book3s_64_get_avpn(struct kvmppc_slb *slbe, gva_t eaddr)
  126. {
  127. int p = kvmppc_mmu_book3s_64_get_pagesize(slbe);
  128. u64 avpn;
  129. avpn = kvmppc_mmu_book3s_64_get_page(slbe, eaddr);
  130. avpn |= slbe->vsid << (kvmppc_slb_sid_shift(slbe) - p);
  131. if (p < 16)
  132. avpn >>= ((80 - p) - 56) - 8; /* 16 - p */
  133. else
  134. avpn <<= p - 16;
  135. return avpn;
  136. }
  137. /*
  138. * Return page size encoded in the second word of a HPTE, or
  139. * -1 for an invalid encoding for the base page size indicated by
  140. * the SLB entry. This doesn't handle mixed pagesize segments yet.
  141. */
  142. static int decode_pagesize(struct kvmppc_slb *slbe, u64 r)
  143. {
  144. switch (slbe->base_page_size) {
  145. case MMU_PAGE_64K:
  146. if ((r & 0xf000) == 0x1000)
  147. return MMU_PAGE_64K;
  148. break;
  149. case MMU_PAGE_16M:
  150. if ((r & 0xff000) == 0)
  151. return MMU_PAGE_16M;
  152. break;
  153. }
  154. return -1;
  155. }
  156. static int kvmppc_mmu_book3s_64_xlate(struct kvm_vcpu *vcpu, gva_t eaddr,
  157. struct kvmppc_pte *gpte, bool data,
  158. bool iswrite)
  159. {
  160. struct kvmppc_slb *slbe;
  161. hva_t ptegp;
  162. u64 pteg[16];
  163. u64 avpn = 0;
  164. u64 r;
  165. u64 v_val, v_mask;
  166. u64 eaddr_mask;
  167. int i;
  168. u8 pp, key = 0;
  169. bool found = false;
  170. bool second = false;
  171. int pgsize;
  172. ulong mp_ea = vcpu->arch.magic_page_ea;
  173. /* Magic page override */
  174. if (unlikely(mp_ea) &&
  175. unlikely((eaddr & ~0xfffULL) == (mp_ea & ~0xfffULL)) &&
  176. !(kvmppc_get_msr(vcpu) & MSR_PR)) {
  177. gpte->eaddr = eaddr;
  178. gpte->vpage = kvmppc_mmu_book3s_64_ea_to_vp(vcpu, eaddr, data);
  179. gpte->raddr = vcpu->arch.magic_page_pa | (gpte->raddr & 0xfff);
  180. gpte->raddr &= KVM_PAM;
  181. gpte->may_execute = true;
  182. gpte->may_read = true;
  183. gpte->may_write = true;
  184. gpte->page_size = MMU_PAGE_4K;
  185. gpte->wimg = HPTE_R_M;
  186. return 0;
  187. }
  188. slbe = kvmppc_mmu_book3s_64_find_slbe(vcpu, eaddr);
  189. if (!slbe)
  190. goto no_seg_found;
  191. avpn = kvmppc_mmu_book3s_64_get_avpn(slbe, eaddr);
  192. v_val = avpn & HPTE_V_AVPN;
  193. if (slbe->tb)
  194. v_val |= SLB_VSID_B_1T;
  195. if (slbe->large)
  196. v_val |= HPTE_V_LARGE;
  197. v_val |= HPTE_V_VALID;
  198. v_mask = SLB_VSID_B | HPTE_V_AVPN | HPTE_V_LARGE | HPTE_V_VALID |
  199. HPTE_V_SECONDARY;
  200. pgsize = slbe->large ? MMU_PAGE_16M : MMU_PAGE_4K;
  201. mutex_lock(&vcpu->kvm->arch.hpt_mutex);
  202. do_second:
  203. ptegp = kvmppc_mmu_book3s_64_get_pteg(vcpu, slbe, eaddr, second);
  204. if (kvm_is_error_hva(ptegp))
  205. goto no_page_found;
  206. if(copy_from_user(pteg, (void __user *)ptegp, sizeof(pteg))) {
  207. printk_ratelimited(KERN_ERR
  208. "KVM: Can't copy data from 0x%lx!\n", ptegp);
  209. goto no_page_found;
  210. }
  211. if ((kvmppc_get_msr(vcpu) & MSR_PR) && slbe->Kp)
  212. key = 4;
  213. else if (!(kvmppc_get_msr(vcpu) & MSR_PR) && slbe->Ks)
  214. key = 4;
  215. for (i=0; i<16; i+=2) {
  216. u64 pte0 = be64_to_cpu(pteg[i]);
  217. u64 pte1 = be64_to_cpu(pteg[i + 1]);
  218. /* Check all relevant fields of 1st dword */
  219. if ((pte0 & v_mask) == v_val) {
  220. /* If large page bit is set, check pgsize encoding */
  221. if (slbe->large &&
  222. (vcpu->arch.hflags & BOOK3S_HFLAG_MULTI_PGSIZE)) {
  223. pgsize = decode_pagesize(slbe, pte1);
  224. if (pgsize < 0)
  225. continue;
  226. }
  227. found = true;
  228. break;
  229. }
  230. }
  231. if (!found) {
  232. if (second)
  233. goto no_page_found;
  234. v_val |= HPTE_V_SECONDARY;
  235. second = true;
  236. goto do_second;
  237. }
  238. r = be64_to_cpu(pteg[i+1]);
  239. pp = (r & HPTE_R_PP) | key;
  240. if (r & HPTE_R_PP0)
  241. pp |= 8;
  242. gpte->eaddr = eaddr;
  243. gpte->vpage = kvmppc_mmu_book3s_64_ea_to_vp(vcpu, eaddr, data);
  244. eaddr_mask = (1ull << mmu_pagesize(pgsize)) - 1;
  245. gpte->raddr = (r & HPTE_R_RPN & ~eaddr_mask) | (eaddr & eaddr_mask);
  246. gpte->page_size = pgsize;
  247. gpte->may_execute = ((r & HPTE_R_N) ? false : true);
  248. if (unlikely(vcpu->arch.disable_kernel_nx) &&
  249. !(kvmppc_get_msr(vcpu) & MSR_PR))
  250. gpte->may_execute = true;
  251. gpte->may_read = false;
  252. gpte->may_write = false;
  253. gpte->wimg = r & HPTE_R_WIMG;
  254. switch (pp) {
  255. case 0:
  256. case 1:
  257. case 2:
  258. case 6:
  259. gpte->may_write = true;
  260. fallthrough;
  261. case 3:
  262. case 5:
  263. case 7:
  264. case 10:
  265. gpte->may_read = true;
  266. break;
  267. }
  268. dprintk("KVM MMU: Translated 0x%lx [0x%llx] -> 0x%llx "
  269. "-> 0x%lx\n",
  270. eaddr, avpn, gpte->vpage, gpte->raddr);
  271. /* Update PTE R and C bits, so the guest's swapper knows we used the
  272. * page */
  273. if (gpte->may_read && !(r & HPTE_R_R)) {
  274. /*
  275. * Set the accessed flag.
  276. * We have to write this back with a single byte write
  277. * because another vcpu may be accessing this on
  278. * non-PAPR platforms such as mac99, and this is
  279. * what real hardware does.
  280. */
  281. char __user *addr = (char __user *) (ptegp + (i + 1) * sizeof(u64));
  282. r |= HPTE_R_R;
  283. put_user(r >> 8, addr + 6);
  284. }
  285. if (iswrite && gpte->may_write && !(r & HPTE_R_C)) {
  286. /* Set the dirty flag */
  287. /* Use a single byte write */
  288. char __user *addr = (char __user *) (ptegp + (i + 1) * sizeof(u64));
  289. r |= HPTE_R_C;
  290. put_user(r, addr + 7);
  291. }
  292. mutex_unlock(&vcpu->kvm->arch.hpt_mutex);
  293. if (!gpte->may_read || (iswrite && !gpte->may_write))
  294. return -EPERM;
  295. return 0;
  296. no_page_found:
  297. mutex_unlock(&vcpu->kvm->arch.hpt_mutex);
  298. return -ENOENT;
  299. no_seg_found:
  300. dprintk("KVM MMU: Trigger segment fault\n");
  301. return -EINVAL;
  302. }
  303. static void kvmppc_mmu_book3s_64_slbmte(struct kvm_vcpu *vcpu, u64 rs, u64 rb)
  304. {
  305. u64 esid, esid_1t;
  306. int slb_nr;
  307. struct kvmppc_slb *slbe;
  308. dprintk("KVM MMU: slbmte(0x%llx, 0x%llx)\n", rs, rb);
  309. esid = GET_ESID(rb);
  310. esid_1t = GET_ESID_1T(rb);
  311. slb_nr = rb & 0xfff;
  312. if (slb_nr > vcpu->arch.slb_nr)
  313. return;
  314. slbe = &vcpu->arch.slb[slb_nr];
  315. slbe->large = (rs & SLB_VSID_L) ? 1 : 0;
  316. slbe->tb = (rs & SLB_VSID_B_1T) ? 1 : 0;
  317. slbe->esid = slbe->tb ? esid_1t : esid;
  318. slbe->vsid = (rs & ~SLB_VSID_B) >> (kvmppc_slb_sid_shift(slbe) - 16);
  319. slbe->valid = (rb & SLB_ESID_V) ? 1 : 0;
  320. slbe->Ks = (rs & SLB_VSID_KS) ? 1 : 0;
  321. slbe->Kp = (rs & SLB_VSID_KP) ? 1 : 0;
  322. slbe->nx = (rs & SLB_VSID_N) ? 1 : 0;
  323. slbe->class = (rs & SLB_VSID_C) ? 1 : 0;
  324. slbe->base_page_size = MMU_PAGE_4K;
  325. if (slbe->large) {
  326. if (vcpu->arch.hflags & BOOK3S_HFLAG_MULTI_PGSIZE) {
  327. switch (rs & SLB_VSID_LP) {
  328. case SLB_VSID_LP_00:
  329. slbe->base_page_size = MMU_PAGE_16M;
  330. break;
  331. case SLB_VSID_LP_01:
  332. slbe->base_page_size = MMU_PAGE_64K;
  333. break;
  334. }
  335. } else
  336. slbe->base_page_size = MMU_PAGE_16M;
  337. }
  338. slbe->orige = rb & (ESID_MASK | SLB_ESID_V);
  339. slbe->origv = rs;
  340. /* Map the new segment */
  341. kvmppc_mmu_map_segment(vcpu, esid << SID_SHIFT);
  342. }
  343. static int kvmppc_mmu_book3s_64_slbfee(struct kvm_vcpu *vcpu, gva_t eaddr,
  344. ulong *ret_slb)
  345. {
  346. struct kvmppc_slb *slbe = kvmppc_mmu_book3s_64_find_slbe(vcpu, eaddr);
  347. if (slbe) {
  348. *ret_slb = slbe->origv;
  349. return 0;
  350. }
  351. *ret_slb = 0;
  352. return -ENOENT;
  353. }
  354. static u64 kvmppc_mmu_book3s_64_slbmfee(struct kvm_vcpu *vcpu, u64 slb_nr)
  355. {
  356. struct kvmppc_slb *slbe;
  357. if (slb_nr > vcpu->arch.slb_nr)
  358. return 0;
  359. slbe = &vcpu->arch.slb[slb_nr];
  360. return slbe->orige;
  361. }
  362. static u64 kvmppc_mmu_book3s_64_slbmfev(struct kvm_vcpu *vcpu, u64 slb_nr)
  363. {
  364. struct kvmppc_slb *slbe;
  365. if (slb_nr > vcpu->arch.slb_nr)
  366. return 0;
  367. slbe = &vcpu->arch.slb[slb_nr];
  368. return slbe->origv;
  369. }
  370. static void kvmppc_mmu_book3s_64_slbie(struct kvm_vcpu *vcpu, u64 ea)
  371. {
  372. struct kvmppc_slb *slbe;
  373. u64 seg_size;
  374. dprintk("KVM MMU: slbie(0x%llx)\n", ea);
  375. slbe = kvmppc_mmu_book3s_64_find_slbe(vcpu, ea);
  376. if (!slbe)
  377. return;
  378. dprintk("KVM MMU: slbie(0x%llx, 0x%llx)\n", ea, slbe->esid);
  379. slbe->valid = false;
  380. slbe->orige = 0;
  381. slbe->origv = 0;
  382. seg_size = 1ull << kvmppc_slb_sid_shift(slbe);
  383. kvmppc_mmu_flush_segment(vcpu, ea & ~(seg_size - 1), seg_size);
  384. }
  385. static void kvmppc_mmu_book3s_64_slbia(struct kvm_vcpu *vcpu)
  386. {
  387. int i;
  388. dprintk("KVM MMU: slbia()\n");
  389. for (i = 1; i < vcpu->arch.slb_nr; i++) {
  390. vcpu->arch.slb[i].valid = false;
  391. vcpu->arch.slb[i].orige = 0;
  392. vcpu->arch.slb[i].origv = 0;
  393. }
  394. if (kvmppc_get_msr(vcpu) & MSR_IR) {
  395. kvmppc_mmu_flush_segments(vcpu);
  396. kvmppc_mmu_map_segment(vcpu, kvmppc_get_pc(vcpu));
  397. }
  398. }
  399. static void kvmppc_mmu_book3s_64_mtsrin(struct kvm_vcpu *vcpu, u32 srnum,
  400. ulong value)
  401. {
  402. u64 rb = 0, rs = 0;
  403. /*
  404. * According to Book3 2.01 mtsrin is implemented as:
  405. *
  406. * The SLB entry specified by (RB)32:35 is loaded from register
  407. * RS, as follows.
  408. *
  409. * SLBE Bit Source SLB Field
  410. *
  411. * 0:31 0x0000_0000 ESID-0:31
  412. * 32:35 (RB)32:35 ESID-32:35
  413. * 36 0b1 V
  414. * 37:61 0x00_0000|| 0b0 VSID-0:24
  415. * 62:88 (RS)37:63 VSID-25:51
  416. * 89:91 (RS)33:35 Ks Kp N
  417. * 92 (RS)36 L ((RS)36 must be 0b0)
  418. * 93 0b0 C
  419. */
  420. dprintk("KVM MMU: mtsrin(0x%x, 0x%lx)\n", srnum, value);
  421. /* ESID = srnum */
  422. rb |= (srnum & 0xf) << 28;
  423. /* Set the valid bit */
  424. rb |= 1 << 27;
  425. /* Index = ESID */
  426. rb |= srnum;
  427. /* VSID = VSID */
  428. rs |= (value & 0xfffffff) << 12;
  429. /* flags = flags */
  430. rs |= ((value >> 28) & 0x7) << 9;
  431. kvmppc_mmu_book3s_64_slbmte(vcpu, rs, rb);
  432. }
  433. static void kvmppc_mmu_book3s_64_tlbie(struct kvm_vcpu *vcpu, ulong va,
  434. bool large)
  435. {
  436. u64 mask = 0xFFFFFFFFFULL;
  437. unsigned long i;
  438. struct kvm_vcpu *v;
  439. dprintk("KVM MMU: tlbie(0x%lx)\n", va);
  440. /*
  441. * The tlbie instruction changed behaviour starting with
  442. * POWER6. POWER6 and later don't have the large page flag
  443. * in the instruction but in the RB value, along with bits
  444. * indicating page and segment sizes.
  445. */
  446. if (vcpu->arch.hflags & BOOK3S_HFLAG_NEW_TLBIE) {
  447. /* POWER6 or later */
  448. if (va & 1) { /* L bit */
  449. if ((va & 0xf000) == 0x1000)
  450. mask = 0xFFFFFFFF0ULL; /* 64k page */
  451. else
  452. mask = 0xFFFFFF000ULL; /* 16M page */
  453. }
  454. } else {
  455. /* older processors, e.g. PPC970 */
  456. if (large)
  457. mask = 0xFFFFFF000ULL;
  458. }
  459. /* flush this VA on all vcpus */
  460. kvm_for_each_vcpu(i, v, vcpu->kvm)
  461. kvmppc_mmu_pte_vflush(v, va >> 12, mask);
  462. }
  463. #ifdef CONFIG_PPC_64K_PAGES
  464. static int segment_contains_magic_page(struct kvm_vcpu *vcpu, ulong esid)
  465. {
  466. ulong mp_ea = vcpu->arch.magic_page_ea;
  467. return mp_ea && !(kvmppc_get_msr(vcpu) & MSR_PR) &&
  468. (mp_ea >> SID_SHIFT) == esid;
  469. }
  470. #endif
  471. static int kvmppc_mmu_book3s_64_esid_to_vsid(struct kvm_vcpu *vcpu, ulong esid,
  472. u64 *vsid)
  473. {
  474. ulong ea = esid << SID_SHIFT;
  475. struct kvmppc_slb *slb;
  476. u64 gvsid = esid;
  477. ulong mp_ea = vcpu->arch.magic_page_ea;
  478. int pagesize = MMU_PAGE_64K;
  479. u64 msr = kvmppc_get_msr(vcpu);
  480. if (msr & (MSR_DR|MSR_IR)) {
  481. slb = kvmppc_mmu_book3s_64_find_slbe(vcpu, ea);
  482. if (slb) {
  483. gvsid = slb->vsid;
  484. pagesize = slb->base_page_size;
  485. if (slb->tb) {
  486. gvsid <<= SID_SHIFT_1T - SID_SHIFT;
  487. gvsid |= esid & ((1ul << (SID_SHIFT_1T - SID_SHIFT)) - 1);
  488. gvsid |= VSID_1T;
  489. }
  490. }
  491. }
  492. switch (msr & (MSR_DR|MSR_IR)) {
  493. case 0:
  494. gvsid = VSID_REAL | esid;
  495. break;
  496. case MSR_IR:
  497. gvsid |= VSID_REAL_IR;
  498. break;
  499. case MSR_DR:
  500. gvsid |= VSID_REAL_DR;
  501. break;
  502. case MSR_DR|MSR_IR:
  503. if (!slb)
  504. goto no_slb;
  505. break;
  506. default:
  507. BUG();
  508. break;
  509. }
  510. #ifdef CONFIG_PPC_64K_PAGES
  511. /*
  512. * Mark this as a 64k segment if the host is using
  513. * 64k pages, the host MMU supports 64k pages and
  514. * the guest segment page size is >= 64k,
  515. * but not if this segment contains the magic page.
  516. */
  517. if (pagesize >= MMU_PAGE_64K &&
  518. mmu_psize_defs[MMU_PAGE_64K].shift &&
  519. !segment_contains_magic_page(vcpu, esid))
  520. gvsid |= VSID_64K;
  521. #endif
  522. if (kvmppc_get_msr(vcpu) & MSR_PR)
  523. gvsid |= VSID_PR;
  524. *vsid = gvsid;
  525. return 0;
  526. no_slb:
  527. /* Catch magic page case */
  528. if (unlikely(mp_ea) &&
  529. unlikely(esid == (mp_ea >> SID_SHIFT)) &&
  530. !(kvmppc_get_msr(vcpu) & MSR_PR)) {
  531. *vsid = VSID_REAL | esid;
  532. return 0;
  533. }
  534. return -EINVAL;
  535. }
  536. static bool kvmppc_mmu_book3s_64_is_dcbz32(struct kvm_vcpu *vcpu)
  537. {
  538. return (to_book3s(vcpu)->hid[5] & 0x80);
  539. }
  540. void kvmppc_mmu_book3s_64_init(struct kvm_vcpu *vcpu)
  541. {
  542. struct kvmppc_mmu *mmu = &vcpu->arch.mmu;
  543. mmu->mfsrin = NULL;
  544. mmu->mtsrin = kvmppc_mmu_book3s_64_mtsrin;
  545. mmu->slbmte = kvmppc_mmu_book3s_64_slbmte;
  546. mmu->slbmfee = kvmppc_mmu_book3s_64_slbmfee;
  547. mmu->slbmfev = kvmppc_mmu_book3s_64_slbmfev;
  548. mmu->slbfee = kvmppc_mmu_book3s_64_slbfee;
  549. mmu->slbie = kvmppc_mmu_book3s_64_slbie;
  550. mmu->slbia = kvmppc_mmu_book3s_64_slbia;
  551. mmu->xlate = kvmppc_mmu_book3s_64_xlate;
  552. mmu->tlbie = kvmppc_mmu_book3s_64_tlbie;
  553. mmu->esid_to_vsid = kvmppc_mmu_book3s_64_esid_to_vsid;
  554. mmu->ea_to_vp = kvmppc_mmu_book3s_64_ea_to_vp;
  555. mmu->is_dcbz32 = kvmppc_mmu_book3s_64_is_dcbz32;
  556. vcpu->arch.hflags |= BOOK3S_HFLAG_SLB;
  557. }