book3s_mmu_hpte.c 8.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347
  1. /*
  2. * Copyright (C) 2010 SUSE Linux Products GmbH. All rights reserved.
  3. *
  4. * Authors:
  5. * Alexander Graf <agraf@suse.de>
  6. *
  7. * This program is free software; you can redistribute it and/or modify
  8. * it under the terms of the GNU General Public License, version 2, as
  9. * published by the Free Software Foundation.
  10. *
  11. * This program is distributed in the hope that it will be useful,
  12. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  13. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  14. * GNU General Public License for more details.
  15. *
  16. * You should have received a copy of the GNU General Public License
  17. * along with this program; if not, write to the Free Software
  18. * Foundation, 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
  19. */
  20. #include <linux/kvm_host.h>
  21. #include <linux/hash.h>
  22. #include <linux/slab.h>
  23. #include <asm/kvm_ppc.h>
  24. #include <asm/kvm_book3s.h>
  25. #include <asm/machdep.h>
  26. #include <asm/mmu_context.h>
  27. #include <asm/hw_irq.h>
  28. #define PTE_SIZE 12
  29. /* #define DEBUG_MMU */
  30. #ifdef DEBUG_MMU
  31. #define dprintk_mmu(a, ...) printk(KERN_INFO a, __VA_ARGS__)
  32. #else
  33. #define dprintk_mmu(a, ...) do { } while(0)
  34. #endif
  35. static struct kmem_cache *hpte_cache;
  36. static inline u64 kvmppc_mmu_hash_pte(u64 eaddr)
  37. {
  38. return hash_64(eaddr >> PTE_SIZE, HPTEG_HASH_BITS_PTE);
  39. }
  40. static inline u64 kvmppc_mmu_hash_pte_long(u64 eaddr)
  41. {
  42. return hash_64((eaddr & 0x0ffff000) >> PTE_SIZE,
  43. HPTEG_HASH_BITS_PTE_LONG);
  44. }
  45. static inline u64 kvmppc_mmu_hash_vpte(u64 vpage)
  46. {
  47. return hash_64(vpage & 0xfffffffffULL, HPTEG_HASH_BITS_VPTE);
  48. }
  49. static inline u64 kvmppc_mmu_hash_vpte_long(u64 vpage)
  50. {
  51. return hash_64((vpage & 0xffffff000ULL) >> 12,
  52. HPTEG_HASH_BITS_VPTE_LONG);
  53. }
  54. void kvmppc_mmu_hpte_cache_map(struct kvm_vcpu *vcpu, struct hpte_cache *pte)
  55. {
  56. u64 index;
  57. spin_lock(&vcpu->arch.mmu_lock);
  58. /* Add to ePTE list */
  59. index = kvmppc_mmu_hash_pte(pte->pte.eaddr);
  60. hlist_add_head_rcu(&pte->list_pte, &vcpu->arch.hpte_hash_pte[index]);
  61. /* Add to ePTE_long list */
  62. index = kvmppc_mmu_hash_pte_long(pte->pte.eaddr);
  63. hlist_add_head_rcu(&pte->list_pte_long,
  64. &vcpu->arch.hpte_hash_pte_long[index]);
  65. /* Add to vPTE list */
  66. index = kvmppc_mmu_hash_vpte(pte->pte.vpage);
  67. hlist_add_head_rcu(&pte->list_vpte, &vcpu->arch.hpte_hash_vpte[index]);
  68. /* Add to vPTE_long list */
  69. index = kvmppc_mmu_hash_vpte_long(pte->pte.vpage);
  70. hlist_add_head_rcu(&pte->list_vpte_long,
  71. &vcpu->arch.hpte_hash_vpte_long[index]);
  72. spin_unlock(&vcpu->arch.mmu_lock);
  73. }
  74. static void free_pte_rcu(struct rcu_head *head)
  75. {
  76. struct hpte_cache *pte = container_of(head, struct hpte_cache, rcu_head);
  77. kmem_cache_free(hpte_cache, pte);
  78. }
  79. static void invalidate_pte(struct kvm_vcpu *vcpu, struct hpte_cache *pte)
  80. {
  81. /* pte already invalidated? */
  82. if (hlist_unhashed(&pte->list_pte))
  83. return;
  84. dprintk_mmu("KVM: Flushing SPT: 0x%lx (0x%llx) -> 0x%llx\n",
  85. pte->pte.eaddr, pte->pte.vpage, pte->host_va);
  86. /* Different for 32 and 64 bit */
  87. kvmppc_mmu_invalidate_pte(vcpu, pte);
  88. spin_lock(&vcpu->arch.mmu_lock);
  89. hlist_del_init_rcu(&pte->list_pte);
  90. hlist_del_init_rcu(&pte->list_pte_long);
  91. hlist_del_init_rcu(&pte->list_vpte);
  92. hlist_del_init_rcu(&pte->list_vpte_long);
  93. spin_unlock(&vcpu->arch.mmu_lock);
  94. if (pte->pte.may_write)
  95. kvm_release_pfn_dirty(pte->pfn);
  96. else
  97. kvm_release_pfn_clean(pte->pfn);
  98. vcpu->arch.hpte_cache_count--;
  99. call_rcu(&pte->rcu_head, free_pte_rcu);
  100. }
  101. static void kvmppc_mmu_pte_flush_all(struct kvm_vcpu *vcpu)
  102. {
  103. struct hpte_cache *pte;
  104. struct hlist_node *node;
  105. int i;
  106. rcu_read_lock();
  107. for (i = 0; i < HPTEG_HASH_NUM_VPTE_LONG; i++) {
  108. struct hlist_head *list = &vcpu->arch.hpte_hash_vpte_long[i];
  109. hlist_for_each_entry_rcu(pte, node, list, list_vpte_long)
  110. invalidate_pte(vcpu, pte);
  111. }
  112. rcu_read_unlock();
  113. }
  114. static void kvmppc_mmu_pte_flush_page(struct kvm_vcpu *vcpu, ulong guest_ea)
  115. {
  116. struct hlist_head *list;
  117. struct hlist_node *node;
  118. struct hpte_cache *pte;
  119. /* Find the list of entries in the map */
  120. list = &vcpu->arch.hpte_hash_pte[kvmppc_mmu_hash_pte(guest_ea)];
  121. rcu_read_lock();
  122. /* Check the list for matching entries and invalidate */
  123. hlist_for_each_entry_rcu(pte, node, list, list_pte)
  124. if ((pte->pte.eaddr & ~0xfffUL) == guest_ea)
  125. invalidate_pte(vcpu, pte);
  126. rcu_read_unlock();
  127. }
  128. static void kvmppc_mmu_pte_flush_long(struct kvm_vcpu *vcpu, ulong guest_ea)
  129. {
  130. struct hlist_head *list;
  131. struct hlist_node *node;
  132. struct hpte_cache *pte;
  133. /* Find the list of entries in the map */
  134. list = &vcpu->arch.hpte_hash_pte_long[
  135. kvmppc_mmu_hash_pte_long(guest_ea)];
  136. rcu_read_lock();
  137. /* Check the list for matching entries and invalidate */
  138. hlist_for_each_entry_rcu(pte, node, list, list_pte_long)
  139. if ((pte->pte.eaddr & 0x0ffff000UL) == guest_ea)
  140. invalidate_pte(vcpu, pte);
  141. rcu_read_unlock();
  142. }
  143. void kvmppc_mmu_pte_flush(struct kvm_vcpu *vcpu, ulong guest_ea, ulong ea_mask)
  144. {
  145. dprintk_mmu("KVM: Flushing %d Shadow PTEs: 0x%lx & 0x%lx\n",
  146. vcpu->arch.hpte_cache_count, guest_ea, ea_mask);
  147. guest_ea &= ea_mask;
  148. switch (ea_mask) {
  149. case ~0xfffUL:
  150. kvmppc_mmu_pte_flush_page(vcpu, guest_ea);
  151. break;
  152. case 0x0ffff000:
  153. kvmppc_mmu_pte_flush_long(vcpu, guest_ea);
  154. break;
  155. case 0:
  156. /* Doing a complete flush -> start from scratch */
  157. kvmppc_mmu_pte_flush_all(vcpu);
  158. break;
  159. default:
  160. WARN_ON(1);
  161. break;
  162. }
  163. }
  164. /* Flush with mask 0xfffffffff */
  165. static void kvmppc_mmu_pte_vflush_short(struct kvm_vcpu *vcpu, u64 guest_vp)
  166. {
  167. struct hlist_head *list;
  168. struct hlist_node *node;
  169. struct hpte_cache *pte;
  170. u64 vp_mask = 0xfffffffffULL;
  171. list = &vcpu->arch.hpte_hash_vpte[kvmppc_mmu_hash_vpte(guest_vp)];
  172. rcu_read_lock();
  173. /* Check the list for matching entries and invalidate */
  174. hlist_for_each_entry_rcu(pte, node, list, list_vpte)
  175. if ((pte->pte.vpage & vp_mask) == guest_vp)
  176. invalidate_pte(vcpu, pte);
  177. rcu_read_unlock();
  178. }
  179. /* Flush with mask 0xffffff000 */
  180. static void kvmppc_mmu_pte_vflush_long(struct kvm_vcpu *vcpu, u64 guest_vp)
  181. {
  182. struct hlist_head *list;
  183. struct hlist_node *node;
  184. struct hpte_cache *pte;
  185. u64 vp_mask = 0xffffff000ULL;
  186. list = &vcpu->arch.hpte_hash_vpte_long[
  187. kvmppc_mmu_hash_vpte_long(guest_vp)];
  188. rcu_read_lock();
  189. /* Check the list for matching entries and invalidate */
  190. hlist_for_each_entry_rcu(pte, node, list, list_vpte_long)
  191. if ((pte->pte.vpage & vp_mask) == guest_vp)
  192. invalidate_pte(vcpu, pte);
  193. rcu_read_unlock();
  194. }
  195. void kvmppc_mmu_pte_vflush(struct kvm_vcpu *vcpu, u64 guest_vp, u64 vp_mask)
  196. {
  197. dprintk_mmu("KVM: Flushing %d Shadow vPTEs: 0x%llx & 0x%llx\n",
  198. vcpu->arch.hpte_cache_count, guest_vp, vp_mask);
  199. guest_vp &= vp_mask;
  200. switch(vp_mask) {
  201. case 0xfffffffffULL:
  202. kvmppc_mmu_pte_vflush_short(vcpu, guest_vp);
  203. break;
  204. case 0xffffff000ULL:
  205. kvmppc_mmu_pte_vflush_long(vcpu, guest_vp);
  206. break;
  207. default:
  208. WARN_ON(1);
  209. return;
  210. }
  211. }
  212. void kvmppc_mmu_pte_pflush(struct kvm_vcpu *vcpu, ulong pa_start, ulong pa_end)
  213. {
  214. struct hlist_node *node;
  215. struct hpte_cache *pte;
  216. int i;
  217. dprintk_mmu("KVM: Flushing %d Shadow pPTEs: 0x%lx - 0x%lx\n",
  218. vcpu->arch.hpte_cache_count, pa_start, pa_end);
  219. rcu_read_lock();
  220. for (i = 0; i < HPTEG_HASH_NUM_VPTE_LONG; i++) {
  221. struct hlist_head *list = &vcpu->arch.hpte_hash_vpte_long[i];
  222. hlist_for_each_entry_rcu(pte, node, list, list_vpte_long)
  223. if ((pte->pte.raddr >= pa_start) &&
  224. (pte->pte.raddr < pa_end))
  225. invalidate_pte(vcpu, pte);
  226. }
  227. rcu_read_unlock();
  228. }
  229. struct hpte_cache *kvmppc_mmu_hpte_cache_next(struct kvm_vcpu *vcpu)
  230. {
  231. struct hpte_cache *pte;
  232. pte = kmem_cache_zalloc(hpte_cache, GFP_KERNEL);
  233. vcpu->arch.hpte_cache_count++;
  234. if (vcpu->arch.hpte_cache_count == HPTEG_CACHE_NUM)
  235. kvmppc_mmu_pte_flush_all(vcpu);
  236. return pte;
  237. }
  238. void kvmppc_mmu_hpte_destroy(struct kvm_vcpu *vcpu)
  239. {
  240. kvmppc_mmu_pte_flush(vcpu, 0, 0);
  241. }
  242. static void kvmppc_mmu_hpte_init_hash(struct hlist_head *hash_list, int len)
  243. {
  244. int i;
  245. for (i = 0; i < len; i++)
  246. INIT_HLIST_HEAD(&hash_list[i]);
  247. }
  248. int kvmppc_mmu_hpte_init(struct kvm_vcpu *vcpu)
  249. {
  250. /* init hpte lookup hashes */
  251. kvmppc_mmu_hpte_init_hash(vcpu->arch.hpte_hash_pte,
  252. ARRAY_SIZE(vcpu->arch.hpte_hash_pte));
  253. kvmppc_mmu_hpte_init_hash(vcpu->arch.hpte_hash_pte_long,
  254. ARRAY_SIZE(vcpu->arch.hpte_hash_pte_long));
  255. kvmppc_mmu_hpte_init_hash(vcpu->arch.hpte_hash_vpte,
  256. ARRAY_SIZE(vcpu->arch.hpte_hash_vpte));
  257. kvmppc_mmu_hpte_init_hash(vcpu->arch.hpte_hash_vpte_long,
  258. ARRAY_SIZE(vcpu->arch.hpte_hash_vpte_long));
  259. spin_lock_init(&vcpu->arch.mmu_lock);
  260. return 0;
  261. }
  262. int kvmppc_mmu_hpte_sysinit(void)
  263. {
  264. /* init hpte slab cache */
  265. hpte_cache = kmem_cache_create("kvm-spt", sizeof(struct hpte_cache),
  266. sizeof(struct hpte_cache), 0, NULL);
  267. return 0;
  268. }
  269. void kvmppc_mmu_hpte_sysexit(void)
  270. {
  271. kmem_cache_destroy(hpte_cache);
  272. }