]> Git Repo - qemu.git/blame - target/s390x/mmu_helper.c
accel/tcg: allow to invalidate a write TLB entry immediately
[qemu.git] / target / s390x / mmu_helper.c
CommitLineData
dfebd7a7
TH
1/*
2 * S390x MMU related functions
3 *
4 * Copyright (c) 2011 Alexander Graf
5 * Copyright (c) 2015 Thomas Huth, IBM Corporation
6 *
7 * This program is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU General Public License as published by
9 * the Free Software Foundation; either version 2 of the License, or
10 * (at your option) any later version.
11 *
12 * This program is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 * GNU General Public License for more details.
16 */
17
9615495a 18#include "qemu/osdep.h"
c3edd628
TH
19#include "qemu/error-report.h"
20#include "exec/address-spaces.h"
dfebd7a7 21#include "cpu.h"
4e58b838 22#include "internal.h"
f16bbb9b 23#include "kvm_s390x.h"
fba0a593 24#include "sysemu/kvm.h"
0f5f6691
JH
25#include "trace.h"
26#include "hw/s390x/storage-keys.h"
dfebd7a7
TH
27
28/* #define DEBUG_S390 */
29/* #define DEBUG_S390_PTE */
30/* #define DEBUG_S390_STDOUT */
31
32#ifdef DEBUG_S390
33#ifdef DEBUG_S390_STDOUT
34#define DPRINTF(fmt, ...) \
35 do { fprintf(stderr, fmt, ## __VA_ARGS__); \
013a2942 36 if (qemu_log_separate()) qemu_log(fmt, ##__VA_ARGS__); } while (0)
dfebd7a7
TH
37#else
38#define DPRINTF(fmt, ...) \
39 do { qemu_log(fmt, ## __VA_ARGS__); } while (0)
40#endif
41#else
42#define DPRINTF(fmt, ...) \
43 do { } while (0)
44#endif
45
46#ifdef DEBUG_S390_PTE
47#define PTE_DPRINTF DPRINTF
48#else
49#define PTE_DPRINTF(fmt, ...) \
50 do { } while (0)
51#endif
52
bab58bf0
TH
53/* Fetch/store bits in the translation exception code: */
54#define FS_READ 0x800
55#define FS_WRITE 0x400
dfebd7a7 56
801cdd35
TH
57static void trigger_access_exception(CPUS390XState *env, uint32_t type,
58 uint32_t ilen, uint64_t tec)
59{
60 S390CPU *cpu = s390_env_get_cpu(env);
61
62 if (kvm_enabled()) {
63 kvm_s390_access_exception(cpu, type, tec);
64 } else {
65 CPUState *cs = CPU(cpu);
66 stq_phys(cs->as, env->psa + offsetof(LowCore, trans_exc_code), tec);
67 trigger_pgm_exception(env, type, ilen);
68 }
69}
70
dfebd7a7 71static void trigger_prot_fault(CPUS390XState *env, target_ulong vaddr,
bab58bf0 72 uint64_t asc, int rw, bool exc)
dfebd7a7 73{
bab58bf0 74 uint64_t tec;
dfebd7a7 75
217a4acb 76 tec = vaddr | (rw == MMU_DATA_STORE ? FS_WRITE : FS_READ) | 4 | asc >> 46;
bab58bf0
TH
77
78 DPRINTF("%s: trans_exc_code=%016" PRIx64 "\n", __func__, tec);
dfebd7a7 79
e3e09d87
TH
80 if (!exc) {
81 return;
82 }
83
becf8217 84 trigger_access_exception(env, PGM_PROTECTION, ILEN_AUTO, tec);
dfebd7a7
TH
85}
86
87static void trigger_page_fault(CPUS390XState *env, target_ulong vaddr,
e3e09d87 88 uint32_t type, uint64_t asc, int rw, bool exc)
dfebd7a7 89{
becf8217 90 int ilen = ILEN_AUTO;
bab58bf0
TH
91 uint64_t tec;
92
217a4acb 93 tec = vaddr | (rw == MMU_DATA_STORE ? FS_WRITE : FS_READ) | asc >> 46;
dfebd7a7 94
c5b2ee4c 95 DPRINTF("%s: trans_exc_code=%016" PRIx64 "\n", __func__, tec);
e3e09d87
TH
96
97 if (!exc) {
98 return;
99 }
100
dfebd7a7 101 /* Code accesses have an undefined ilc. */
217a4acb 102 if (rw == MMU_INST_FETCH) {
dfebd7a7
TH
103 ilen = 2;
104 }
105
801cdd35 106 trigger_access_exception(env, type, ilen, tec);
dfebd7a7
TH
107}
108
109/**
110 * Translate real address to absolute (= physical)
111 * address by taking care of the prefix mapping.
112 */
f79f1ca4 113target_ulong mmu_real2abs(CPUS390XState *env, target_ulong raddr)
dfebd7a7
TH
114{
115 if (raddr < 0x2000) {
116 return raddr + env->psa; /* Map the lowcore. */
117 } else if (raddr >= env->psa && raddr < env->psa + 0x2000) {
118 return raddr - env->psa; /* Map the 0 page. */
119 }
120 return raddr;
121}
122
123/* Decode page table entry (normal 4KB page) */
124static int mmu_translate_pte(CPUS390XState *env, target_ulong vaddr,
ede59855 125 uint64_t asc, uint64_t pt_entry,
e3e09d87 126 target_ulong *raddr, int *flags, int rw, bool exc)
dfebd7a7 127{
ede59855
TH
128 if (pt_entry & _PAGE_INVALID) {
129 DPRINTF("%s: PTE=0x%" PRIx64 " invalid\n", __func__, pt_entry);
e3e09d87 130 trigger_page_fault(env, vaddr, PGM_PAGE_TRANS, asc, rw, exc);
dfebd7a7
TH
131 return -1;
132 }
b4ecbf80
TH
133 if (pt_entry & _PAGE_RES0) {
134 trigger_page_fault(env, vaddr, PGM_TRANS_SPEC, asc, rw, exc);
135 return -1;
136 }
ede59855 137 if (pt_entry & _PAGE_RO) {
dfebd7a7
TH
138 *flags &= ~PAGE_WRITE;
139 }
140
ede59855 141 *raddr = pt_entry & _ASCE_ORIGIN;
dfebd7a7 142
ede59855 143 PTE_DPRINTF("%s: PTE=0x%" PRIx64 "\n", __func__, pt_entry);
dfebd7a7
TH
144
145 return 0;
146}
147
f8f84e93
TH
148/* Decode segment table entry */
149static int mmu_translate_segment(CPUS390XState *env, target_ulong vaddr,
150 uint64_t asc, uint64_t st_entry,
e3e09d87
TH
151 target_ulong *raddr, int *flags, int rw,
152 bool exc)
dfebd7a7 153{
f8f84e93
TH
154 CPUState *cs = CPU(s390_env_get_cpu(env));
155 uint64_t origin, offs, pt_entry;
dfebd7a7 156
f8f84e93 157 if (st_entry & _SEGMENT_ENTRY_RO) {
dfebd7a7
TH
158 *flags &= ~PAGE_WRITE;
159 }
160
f8f84e93
TH
161 if ((st_entry & _SEGMENT_ENTRY_FC) && (env->cregs[0] & CR0_EDAT)) {
162 /* Decode EDAT1 segment frame absolute address (1MB page) */
163 *raddr = (st_entry & 0xfffffffffff00000ULL) | (vaddr & 0xfffff);
164 PTE_DPRINTF("%s: SEG=0x%" PRIx64 "\n", __func__, st_entry);
165 return 0;
166 }
dfebd7a7 167
f8f84e93
TH
168 /* Look up 4KB page entry */
169 origin = st_entry & _SEGMENT_ENTRY_ORIGIN;
170 offs = (vaddr & VADDR_PX) >> 9;
171 pt_entry = ldq_phys(cs->as, origin + offs);
172 PTE_DPRINTF("%s: 0x%" PRIx64 " + 0x%" PRIx64 " => 0x%016" PRIx64 "\n",
173 __func__, origin, offs, pt_entry);
e3e09d87 174 return mmu_translate_pte(env, vaddr, asc, pt_entry, raddr, flags, rw, exc);
dfebd7a7
TH
175}
176
f8f84e93
TH
177/* Decode region table entries */
178static int mmu_translate_region(CPUS390XState *env, target_ulong vaddr,
179 uint64_t asc, uint64_t entry, int level,
e3e09d87
TH
180 target_ulong *raddr, int *flags, int rw,
181 bool exc)
dfebd7a7
TH
182{
183 CPUState *cs = CPU(s390_env_get_cpu(env));
f8f84e93 184 uint64_t origin, offs, new_entry;
5d180439
TH
185 const int pchks[4] = {
186 PGM_SEGMENT_TRANS, PGM_REG_THIRD_TRANS,
187 PGM_REG_SEC_TRANS, PGM_REG_FIRST_TRANS
188 };
f8f84e93
TH
189
190 PTE_DPRINTF("%s: 0x%" PRIx64 "\n", __func__, entry);
dfebd7a7 191
f8f84e93
TH
192 origin = entry & _REGION_ENTRY_ORIGIN;
193 offs = (vaddr >> (17 + 11 * level / 4)) & 0x3ff8;
194
195 new_entry = ldq_phys(cs->as, origin + offs);
196 PTE_DPRINTF("%s: 0x%" PRIx64 " + 0x%" PRIx64 " => 0x%016" PRIx64 "\n",
197 __func__, origin, offs, new_entry);
dfebd7a7 198
f8f84e93 199 if ((new_entry & _REGION_ENTRY_INV) != 0) {
dfebd7a7 200 DPRINTF("%s: invalid region\n", __func__);
5a123b3c 201 trigger_page_fault(env, vaddr, pchks[level / 4], asc, rw, exc);
dfebd7a7
TH
202 return -1;
203 }
204
f8f84e93 205 if ((new_entry & _REGION_ENTRY_TYPE_MASK) != level) {
e3e09d87 206 trigger_page_fault(env, vaddr, PGM_TRANS_SPEC, asc, rw, exc);
dfebd7a7
TH
207 return -1;
208 }
209
dfebd7a7 210 if (level == _ASCE_TYPE_SEGMENT) {
f8f84e93 211 return mmu_translate_segment(env, vaddr, asc, new_entry, raddr, flags,
e3e09d87 212 rw, exc);
dfebd7a7 213 }
f8f84e93 214
5d180439
TH
215 /* Check region table offset and length */
216 offs = (vaddr >> (28 + 11 * (level - 4) / 4)) & 3;
217 if (offs < ((new_entry & _REGION_ENTRY_TF) >> 6)
218 || offs > (new_entry & _REGION_ENTRY_LENGTH)) {
219 DPRINTF("%s: invalid offset or len (%lx)\n", __func__, new_entry);
e3e09d87 220 trigger_page_fault(env, vaddr, pchks[level / 4 - 1], asc, rw, exc);
5d180439
TH
221 return -1;
222 }
223
43d49b01
TH
224 if ((env->cregs[0] & CR0_EDAT) && (new_entry & _REGION_ENTRY_RO)) {
225 *flags &= ~PAGE_WRITE;
226 }
227
f8f84e93
TH
228 /* yet another region */
229 return mmu_translate_region(env, vaddr, asc, new_entry, level - 4,
e3e09d87 230 raddr, flags, rw, exc);
dfebd7a7
TH
231}
232
9d77309c
TH
233static int mmu_translate_asce(CPUS390XState *env, target_ulong vaddr,
234 uint64_t asc, uint64_t asce, target_ulong *raddr,
235 int *flags, int rw, bool exc)
dfebd7a7 236{
f8f84e93 237 int level;
dfebd7a7
TH
238 int r;
239
89a41e0a
TH
240 if (asce & _ASCE_REAL_SPACE) {
241 /* direct mapping */
242 *raddr = vaddr;
243 return 0;
244 }
245
f8f84e93
TH
246 level = asce & _ASCE_TYPE_MASK;
247 switch (level) {
dfebd7a7 248 case _ASCE_TYPE_REGION1:
5d180439 249 if ((vaddr >> 62) > (asce & _ASCE_TABLE_LENGTH)) {
e3e09d87 250 trigger_page_fault(env, vaddr, PGM_REG_FIRST_TRANS, asc, rw, exc);
5d180439
TH
251 return -1;
252 }
dfebd7a7
TH
253 break;
254 case _ASCE_TYPE_REGION2:
255 if (vaddr & 0xffe0000000000000ULL) {
256 DPRINTF("%s: vaddr doesn't fit 0x%16" PRIx64
257 " 0xffe0000000000000ULL\n", __func__, vaddr);
d267571b 258 trigger_page_fault(env, vaddr, PGM_ASCE_TYPE, asc, rw, exc);
dfebd7a7
TH
259 return -1;
260 }
5d180439 261 if ((vaddr >> 51 & 3) > (asce & _ASCE_TABLE_LENGTH)) {
e3e09d87 262 trigger_page_fault(env, vaddr, PGM_REG_SEC_TRANS, asc, rw, exc);
5d180439
TH
263 return -1;
264 }
dfebd7a7
TH
265 break;
266 case _ASCE_TYPE_REGION3:
267 if (vaddr & 0xfffffc0000000000ULL) {
268 DPRINTF("%s: vaddr doesn't fit 0x%16" PRIx64
269 " 0xfffffc0000000000ULL\n", __func__, vaddr);
d267571b 270 trigger_page_fault(env, vaddr, PGM_ASCE_TYPE, asc, rw, exc);
dfebd7a7
TH
271 return -1;
272 }
5d180439 273 if ((vaddr >> 40 & 3) > (asce & _ASCE_TABLE_LENGTH)) {
e3e09d87 274 trigger_page_fault(env, vaddr, PGM_REG_THIRD_TRANS, asc, rw, exc);
5d180439
TH
275 return -1;
276 }
dfebd7a7
TH
277 break;
278 case _ASCE_TYPE_SEGMENT:
279 if (vaddr & 0xffffffff80000000ULL) {
280 DPRINTF("%s: vaddr doesn't fit 0x%16" PRIx64
281 " 0xffffffff80000000ULL\n", __func__, vaddr);
d267571b 282 trigger_page_fault(env, vaddr, PGM_ASCE_TYPE, asc, rw, exc);
dfebd7a7
TH
283 return -1;
284 }
5d180439 285 if ((vaddr >> 29 & 3) > (asce & _ASCE_TABLE_LENGTH)) {
e3e09d87 286 trigger_page_fault(env, vaddr, PGM_SEGMENT_TRANS, asc, rw, exc);
5d180439
TH
287 return -1;
288 }
dfebd7a7
TH
289 break;
290 }
291
e3e09d87
TH
292 r = mmu_translate_region(env, vaddr, asc, asce, level, raddr, flags, rw,
293 exc);
217a4acb 294 if (rw == MMU_DATA_STORE && !(*flags & PAGE_WRITE)) {
bab58bf0 295 trigger_prot_fault(env, vaddr, asc, rw, exc);
dfebd7a7
TH
296 return -1;
297 }
298
299 return r;
300}
301
e3e09d87
TH
302/**
303 * Translate a virtual (logical) address into a physical (absolute) address.
304 * @param vaddr the virtual address
305 * @param rw 0 = read, 1 = write, 2 = code fetch
306 * @param asc address space control (one of the PSW_ASC_* modes)
307 * @param raddr the translated address is stored to this pointer
308 * @param flags the PAGE_READ/WRITE/EXEC flags are stored to this pointer
631b22ea
SW
309 * @param exc true = inject a program check if a fault occurred
310 * @return 0 if the translation was successful, -1 if a fault occurred
e3e09d87 311 */
dfebd7a7 312int mmu_translate(CPUS390XState *env, target_ulong vaddr, int rw, uint64_t asc,
e3e09d87 313 target_ulong *raddr, int *flags, bool exc)
dfebd7a7 314{
0f5f6691
JH
315 static S390SKeysState *ss;
316 static S390SKeysClass *skeyclass;
dfebd7a7 317 int r = -1;
0f5f6691
JH
318 uint8_t key;
319
320 if (unlikely(!ss)) {
321 ss = s390_get_skeys_device();
322 skeyclass = S390_SKEYS_GET_CLASS(ss);
323 }
dfebd7a7
TH
324
325 *flags = PAGE_READ | PAGE_WRITE | PAGE_EXEC;
326 vaddr &= TARGET_PAGE_MASK;
327
328 if (!(env->psw.mask & PSW_MASK_DAT)) {
329 *raddr = vaddr;
330 r = 0;
331 goto out;
332 }
333
334 switch (asc) {
335 case PSW_ASC_PRIMARY:
9d77309c
TH
336 PTE_DPRINTF("%s: asc=primary\n", __func__);
337 r = mmu_translate_asce(env, vaddr, asc, env->cregs[1], raddr, flags,
338 rw, exc);
339 break;
dfebd7a7 340 case PSW_ASC_HOME:
9d77309c
TH
341 PTE_DPRINTF("%s: asc=home\n", __func__);
342 r = mmu_translate_asce(env, vaddr, asc, env->cregs[13], raddr, flags,
343 rw, exc);
dfebd7a7
TH
344 break;
345 case PSW_ASC_SECONDARY:
9d77309c 346 PTE_DPRINTF("%s: asc=secondary\n", __func__);
dfebd7a7
TH
347 /*
348 * Instruction: Primary
349 * Data: Secondary
350 */
217a4acb 351 if (rw == MMU_INST_FETCH) {
9d77309c
TH
352 r = mmu_translate_asce(env, vaddr, PSW_ASC_PRIMARY, env->cregs[1],
353 raddr, flags, rw, exc);
dfebd7a7
TH
354 *flags &= ~(PAGE_READ | PAGE_WRITE);
355 } else {
9d77309c
TH
356 r = mmu_translate_asce(env, vaddr, PSW_ASC_SECONDARY, env->cregs[7],
357 raddr, flags, rw, exc);
dfebd7a7
TH
358 *flags &= ~(PAGE_EXEC);
359 }
360 break;
361 case PSW_ASC_ACCREG:
362 default:
363 hw_error("guest switched to unknown asc mode\n");
364 break;
365 }
366
367 out:
368 /* Convert real address -> absolute address */
369 *raddr = mmu_real2abs(env, *raddr);
370
0f5f6691
JH
371 if (r == 0 && *raddr < ram_size) {
372 if (skeyclass->get_skeys(ss, *raddr / TARGET_PAGE_SIZE, 1, &key)) {
373 trace_get_skeys_nonzero(r);
374 return 0;
375 }
376
dfebd7a7 377 if (*flags & PAGE_READ) {
0f5f6691 378 key |= SK_R;
dfebd7a7
TH
379 }
380
381 if (*flags & PAGE_WRITE) {
0f5f6691
JH
382 key |= SK_C;
383 }
384
385 if (skeyclass->set_skeys(ss, *raddr / TARGET_PAGE_SIZE, 1, &key)) {
386 trace_set_skeys_nonzero(r);
387 return 0;
dfebd7a7
TH
388 }
389 }
390
391 return r;
392}
c3edd628
TH
393
394/**
395 * lowprot_enabled: Check whether low-address protection is enabled
396 */
397static bool lowprot_enabled(const CPUS390XState *env)
398{
399 if (!(env->cregs[0] & CR0_LOWPROT)) {
400 return false;
401 }
402 if (!(env->psw.mask & PSW_MASK_DAT)) {
403 return true;
404 }
405
406 /* Check the private-space control bit */
407 switch (env->psw.mask & PSW_MASK_ASC) {
408 case PSW_ASC_PRIMARY:
409 return !(env->cregs[1] & _ASCE_PRIVATE_SPACE);
410 case PSW_ASC_SECONDARY:
411 return !(env->cregs[7] & _ASCE_PRIVATE_SPACE);
412 case PSW_ASC_HOME:
413 return !(env->cregs[13] & _ASCE_PRIVATE_SPACE);
414 default:
415 /* We don't support access register mode */
416 error_report("unsupported addressing mode");
417 exit(1);
418 }
419}
420
421/**
422 * translate_pages: Translate a set of consecutive logical page addresses
423 * to absolute addresses
424 */
425static int translate_pages(S390CPU *cpu, vaddr addr, int nr_pages,
426 target_ulong *pages, bool is_write)
427{
428 bool lowprot = is_write && lowprot_enabled(&cpu->env);
429 uint64_t asc = cpu->env.psw.mask & PSW_MASK_ASC;
430 CPUS390XState *env = &cpu->env;
431 int ret, i, pflags;
432
433 for (i = 0; i < nr_pages; i++) {
434 /* Low-address protection? */
435 if (lowprot && (addr < 512 || (addr >= 4096 && addr < 4096 + 512))) {
becf8217 436 trigger_access_exception(env, PGM_PROTECTION, ILEN_AUTO, 0);
c3edd628
TH
437 return -EACCES;
438 }
439 ret = mmu_translate(env, addr, is_write, asc, &pages[i], &pflags, true);
440 if (ret) {
441 return ret;
442 }
443 if (!address_space_access_valid(&address_space_memory, pages[i],
444 TARGET_PAGE_SIZE, is_write)) {
98987d30 445 program_interrupt(env, PGM_ADDRESSING, ILEN_AUTO);
c3edd628
TH
446 return -EFAULT;
447 }
448 addr += TARGET_PAGE_SIZE;
449 }
450
451 return 0;
452}
453
454/**
455 * s390_cpu_virt_mem_rw:
456 * @laddr: the logical start address
6cb1e49d 457 * @ar: the access register number
c3edd628 458 * @hostbuf: buffer in host memory. NULL = do only checks w/o copying
631b22ea 459 * @len: length that should be transferred
c3edd628 460 * @is_write: true = write, false = read
631b22ea 461 * Returns: 0 on success, non-zero if an exception occurred
c3edd628
TH
462 *
463 * Copy from/to guest memory using logical addresses. Note that we inject a
464 * program interrupt in case there is an error while accessing the memory.
465 */
6cb1e49d 466int s390_cpu_virt_mem_rw(S390CPU *cpu, vaddr laddr, uint8_t ar, void *hostbuf,
c3edd628
TH
467 int len, bool is_write)
468{
469 int currlen, nr_pages, i;
470 target_ulong *pages;
471 int ret;
472
a9bcd1b8 473 if (kvm_enabled()) {
6cb1e49d 474 ret = kvm_s390_mem_op(cpu, laddr, ar, hostbuf, len, is_write);
a9bcd1b8
TH
475 if (ret >= 0) {
476 return ret;
477 }
478 }
479
c3edd628
TH
480 nr_pages = (((laddr & ~TARGET_PAGE_MASK) + len - 1) >> TARGET_PAGE_BITS)
481 + 1;
482 pages = g_malloc(nr_pages * sizeof(*pages));
483
484 ret = translate_pages(cpu, laddr, nr_pages, pages, is_write);
485 if (ret == 0 && hostbuf != NULL) {
486 /* Copy data by stepping through the area page by page */
487 for (i = 0; i < nr_pages; i++) {
488 currlen = MIN(len, TARGET_PAGE_SIZE - (laddr % TARGET_PAGE_SIZE));
489 cpu_physical_memory_rw(pages[i] | (laddr & ~TARGET_PAGE_MASK),
490 hostbuf, currlen, is_write);
491 laddr += currlen;
492 hostbuf += currlen;
493 len -= currlen;
494 }
495 }
496
497 g_free(pages);
498 return ret;
499}
fb66944d
DH
500
501/**
502 * Translate a real address into a physical (absolute) address.
503 * @param raddr the real address
504 * @param rw 0 = read, 1 = write, 2 = code fetch
505 * @param addr the translated address is stored to this pointer
506 * @param flags the PAGE_READ/WRITE/EXEC flags are stored to this pointer
507 * @return 0 if the translation was successful, < 0 if a fault occurred
508 */
509int mmu_translate_real(CPUS390XState *env, target_ulong raddr, int rw,
510 target_ulong *addr, int *flags)
511{
512 /* TODO: low address protection once we flush the tlb on cr changes */
513 *flags = PAGE_READ | PAGE_WRITE;
514 *addr = mmu_real2abs(env, raddr);
515
516 /* TODO: storage key handling */
517 return 0;
518}
This page took 0.260932 seconds and 4 git commands to generate.