1 // SPDX-License-Identifier: GPL-2.0-only 2 /* 3 * Copyright (C) 2009. SUSE Linux Products GmbH. All rights reserved. 4 * 5 * Authors: 6 * Alexander Graf <agraf@suse.de> 7 * Kevin Wolf <mail@kevin-wolf.de> 8 * 9 * Description: 10 * This file is derived from arch/powerpc/kvm/44x.c, 11 * by Hollis Blanchard <hollisb@us.ibm.com>. 12 */ 13 14 #include <linux/kvm_host.h> 15 #include <linux/err.h> 16 #include <linux/export.h> 17 #include <linux/slab.h> 18 #include <linux/module.h> 19 #include <linux/miscdevice.h> 20 #include <linux/gfp.h> 21 #include <linux/sched.h> 22 #include <linux/vmalloc.h> 23 #include <linux/highmem.h> 24 25 #include <asm/reg.h> 26 #include <asm/cputable.h> 27 #include <asm/cacheflush.h> 28 #include <linux/uaccess.h> 29 #include <asm/io.h> 30 #include <asm/kvm_ppc.h> 31 #include <asm/kvm_book3s.h> 32 #include <asm/mmu_context.h> 33 #include <asm/page.h> 34 #include <asm/xive.h> 35 36 #include "book3s.h" 37 #include "trace.h" 38 39 #define VM_STAT(x, ...) offsetof(struct kvm, stat.x), KVM_STAT_VM, ## __VA_ARGS__ 40 #define VCPU_STAT(x, ...) offsetof(struct kvm_vcpu, stat.x), KVM_STAT_VCPU, ## __VA_ARGS__ 41 42 /* #define EXIT_DEBUG */ 43 44 struct kvm_stats_debugfs_item debugfs_entries[] = { 45 { "exits", VCPU_STAT(sum_exits) }, 46 { "mmio", VCPU_STAT(mmio_exits) }, 47 { "sig", VCPU_STAT(signal_exits) }, 48 { "sysc", VCPU_STAT(syscall_exits) }, 49 { "inst_emu", VCPU_STAT(emulated_inst_exits) }, 50 { "dec", VCPU_STAT(dec_exits) }, 51 { "ext_intr", VCPU_STAT(ext_intr_exits) }, 52 { "queue_intr", VCPU_STAT(queue_intr) }, 53 { "halt_poll_success_ns", VCPU_STAT(halt_poll_success_ns) }, 54 { "halt_poll_fail_ns", VCPU_STAT(halt_poll_fail_ns) }, 55 { "halt_wait_ns", VCPU_STAT(halt_wait_ns) }, 56 { "halt_successful_poll", VCPU_STAT(halt_successful_poll), }, 57 { "halt_attempted_poll", VCPU_STAT(halt_attempted_poll), }, 58 { "halt_successful_wait", VCPU_STAT(halt_successful_wait) }, 59 { "halt_poll_invalid", VCPU_STAT(halt_poll_invalid) }, 60 { "halt_wakeup", VCPU_STAT(halt_wakeup) }, 61 { "pf_storage", VCPU_STAT(pf_storage) }, 62 { "sp_storage", VCPU_STAT(sp_storage) }, 63 { "pf_instruc", VCPU_STAT(pf_instruc) }, 64 { "sp_instruc", VCPU_STAT(sp_instruc) }, 65 { "ld", VCPU_STAT(ld) }, 66 { "ld_slow", VCPU_STAT(ld_slow) }, 67 { "st", VCPU_STAT(st) }, 68 { "st_slow", VCPU_STAT(st_slow) }, 69 { "pthru_all", VCPU_STAT(pthru_all) }, 70 { "pthru_host", VCPU_STAT(pthru_host) }, 71 { "pthru_bad_aff", VCPU_STAT(pthru_bad_aff) }, 72 { "largepages_2M", VM_STAT(num_2M_pages, .mode = 0444) }, 73 { "largepages_1G", VM_STAT(num_1G_pages, .mode = 0444) }, 74 { NULL } 75 }; 76 77 static inline void kvmppc_update_int_pending(struct kvm_vcpu *vcpu, 78 unsigned long pending_now, unsigned long old_pending) 79 { 80 if (is_kvmppc_hv_enabled(vcpu->kvm)) 81 return; 82 if (pending_now) 83 kvmppc_set_int_pending(vcpu, 1); 84 else if (old_pending) 85 kvmppc_set_int_pending(vcpu, 0); 86 } 87 88 static inline bool kvmppc_critical_section(struct kvm_vcpu *vcpu) 89 { 90 ulong crit_raw; 91 ulong crit_r1; 92 bool crit; 93 94 if (is_kvmppc_hv_enabled(vcpu->kvm)) 95 return false; 96 97 crit_raw = kvmppc_get_critical(vcpu); 98 crit_r1 = kvmppc_get_gpr(vcpu, 1); 99 100 /* Truncate crit indicators in 32 bit mode */ 101 if (!(kvmppc_get_msr(vcpu) & MSR_SF)) { 102 crit_raw &= 0xffffffff; 103 crit_r1 &= 0xffffffff; 104 } 105 106 /* Critical section when crit == r1 */ 107 crit = (crit_raw == crit_r1); 108 /* ... and we're in supervisor mode */ 109 crit = crit && !(kvmppc_get_msr(vcpu) & MSR_PR); 110 111 return crit; 112 } 113 114 void kvmppc_inject_interrupt(struct kvm_vcpu *vcpu, int vec, u64 flags) 115 { 116 vcpu->kvm->arch.kvm_ops->inject_interrupt(vcpu, vec, flags); 117 } 118 119 static int kvmppc_book3s_vec2irqprio(unsigned int vec) 120 { 121 unsigned int prio; 122 123 switch (vec) { 124 case 0x100: prio = BOOK3S_IRQPRIO_SYSTEM_RESET; break; 125 case 0x200: prio = BOOK3S_IRQPRIO_MACHINE_CHECK; break; 126 case 0x300: prio = BOOK3S_IRQPRIO_DATA_STORAGE; break; 127 case 0x380: prio = BOOK3S_IRQPRIO_DATA_SEGMENT; break; 128 case 0x400: prio = BOOK3S_IRQPRIO_INST_STORAGE; break; 129 case 0x480: prio = BOOK3S_IRQPRIO_INST_SEGMENT; break; 130 case 0x500: prio = BOOK3S_IRQPRIO_EXTERNAL; break; 131 case 0x600: prio = BOOK3S_IRQPRIO_ALIGNMENT; break; 132 case 0x700: prio = BOOK3S_IRQPRIO_PROGRAM; break; 133 case 0x800: prio = BOOK3S_IRQPRIO_FP_UNAVAIL; break; 134 case 0x900: prio = BOOK3S_IRQPRIO_DECREMENTER; break; 135 case 0xc00: prio = BOOK3S_IRQPRIO_SYSCALL; break; 136 case 0xd00: prio = BOOK3S_IRQPRIO_DEBUG; break; 137 case 0xf20: prio = BOOK3S_IRQPRIO_ALTIVEC; break; 138 case 0xf40: prio = BOOK3S_IRQPRIO_VSX; break; 139 case 0xf60: prio = BOOK3S_IRQPRIO_FAC_UNAVAIL; break; 140 default: prio = BOOK3S_IRQPRIO_MAX; break; 141 } 142 143 return prio; 144 } 145 146 void kvmppc_book3s_dequeue_irqprio(struct kvm_vcpu *vcpu, 147 unsigned int vec) 148 { 149 unsigned long old_pending = vcpu->arch.pending_exceptions; 150 151 clear_bit(kvmppc_book3s_vec2irqprio(vec), 152 &vcpu->arch.pending_exceptions); 153 154 kvmppc_update_int_pending(vcpu, vcpu->arch.pending_exceptions, 155 old_pending); 156 } 157 158 void kvmppc_book3s_queue_irqprio(struct kvm_vcpu *vcpu, unsigned int vec) 159 { 160 vcpu->stat.queue_intr++; 161 162 set_bit(kvmppc_book3s_vec2irqprio(vec), 163 &vcpu->arch.pending_exceptions); 164 #ifdef EXIT_DEBUG 165 printk(KERN_INFO "Queueing interrupt %x\n", vec); 166 #endif 167 } 168 EXPORT_SYMBOL_GPL(kvmppc_book3s_queue_irqprio); 169 170 void kvmppc_core_queue_machine_check(struct kvm_vcpu *vcpu, ulong flags) 171 { 172 /* might as well deliver this straight away */ 173 kvmppc_inject_interrupt(vcpu, BOOK3S_INTERRUPT_MACHINE_CHECK, flags); 174 } 175 EXPORT_SYMBOL_GPL(kvmppc_core_queue_machine_check); 176 177 void kvmppc_core_queue_program(struct kvm_vcpu *vcpu, ulong flags) 178 { 179 /* might as well deliver this straight away */ 180 kvmppc_inject_interrupt(vcpu, BOOK3S_INTERRUPT_PROGRAM, flags); 181 } 182 EXPORT_SYMBOL_GPL(kvmppc_core_queue_program); 183 184 void kvmppc_core_queue_fpunavail(struct kvm_vcpu *vcpu) 185 { 186 /* might as well deliver this straight away */ 187 kvmppc_inject_interrupt(vcpu, BOOK3S_INTERRUPT_FP_UNAVAIL, 0); 188 } 189 190 void kvmppc_core_queue_vec_unavail(struct kvm_vcpu *vcpu) 191 { 192 /* might as well deliver this straight away */ 193 kvmppc_inject_interrupt(vcpu, BOOK3S_INTERRUPT_ALTIVEC, 0); 194 } 195 196 void kvmppc_core_queue_vsx_unavail(struct kvm_vcpu *vcpu) 197 { 198 /* might as well deliver this straight away */ 199 kvmppc_inject_interrupt(vcpu, BOOK3S_INTERRUPT_VSX, 0); 200 } 201 202 void kvmppc_core_queue_dec(struct kvm_vcpu *vcpu) 203 { 204 kvmppc_book3s_queue_irqprio(vcpu, BOOK3S_INTERRUPT_DECREMENTER); 205 } 206 EXPORT_SYMBOL_GPL(kvmppc_core_queue_dec); 207 208 int kvmppc_core_pending_dec(struct kvm_vcpu *vcpu) 209 { 210 return test_bit(BOOK3S_IRQPRIO_DECREMENTER, &vcpu->arch.pending_exceptions); 211 } 212 EXPORT_SYMBOL_GPL(kvmppc_core_pending_dec); 213 214 void kvmppc_core_dequeue_dec(struct kvm_vcpu *vcpu) 215 { 216 kvmppc_book3s_dequeue_irqprio(vcpu, BOOK3S_INTERRUPT_DECREMENTER); 217 } 218 EXPORT_SYMBOL_GPL(kvmppc_core_dequeue_dec); 219 220 void kvmppc_core_queue_external(struct kvm_vcpu *vcpu, 221 struct kvm_interrupt *irq) 222 { 223 /* 224 * This case (KVM_INTERRUPT_SET) should never actually arise for 225 * a pseries guest (because pseries guests expect their interrupt 226 * controllers to continue asserting an external interrupt request 227 * until it is acknowledged at the interrupt controller), but is 228 * included to avoid ABI breakage and potentially for other 229 * sorts of guest. 230 * 231 * There is a subtlety here: HV KVM does not test the 232 * external_oneshot flag in the code that synthesizes 233 * external interrupts for the guest just before entering 234 * the guest. That is OK even if userspace did do a 235 * KVM_INTERRUPT_SET on a pseries guest vcpu, because the 236 * caller (kvm_vcpu_ioctl_interrupt) does a kvm_vcpu_kick() 237 * which ends up doing a smp_send_reschedule(), which will 238 * pull the guest all the way out to the host, meaning that 239 * we will call kvmppc_core_prepare_to_enter() before entering 240 * the guest again, and that will handle the external_oneshot 241 * flag correctly. 242 */ 243 if (irq->irq == KVM_INTERRUPT_SET) 244 vcpu->arch.external_oneshot = 1; 245 246 kvmppc_book3s_queue_irqprio(vcpu, BOOK3S_INTERRUPT_EXTERNAL); 247 } 248 249 void kvmppc_core_dequeue_external(struct kvm_vcpu *vcpu) 250 { 251 kvmppc_book3s_dequeue_irqprio(vcpu, BOOK3S_INTERRUPT_EXTERNAL); 252 } 253 254 void kvmppc_core_queue_data_storage(struct kvm_vcpu *vcpu, ulong dar, 255 ulong flags) 256 { 257 kvmppc_set_dar(vcpu, dar); 258 kvmppc_set_dsisr(vcpu, flags); 259 kvmppc_inject_interrupt(vcpu, BOOK3S_INTERRUPT_DATA_STORAGE, 0); 260 } 261 EXPORT_SYMBOL_GPL(kvmppc_core_queue_data_storage); 262 263 void kvmppc_core_queue_inst_storage(struct kvm_vcpu *vcpu, ulong flags) 264 { 265 kvmppc_inject_interrupt(vcpu, BOOK3S_INTERRUPT_INST_STORAGE, flags); 266 } 267 EXPORT_SYMBOL_GPL(kvmppc_core_queue_inst_storage); 268 269 static int kvmppc_book3s_irqprio_deliver(struct kvm_vcpu *vcpu, 270 unsigned int priority) 271 { 272 int deliver = 1; 273 int vec = 0; 274 bool crit = kvmppc_critical_section(vcpu); 275 276 switch (priority) { 277 case BOOK3S_IRQPRIO_DECREMENTER: 278 deliver = (kvmppc_get_msr(vcpu) & MSR_EE) && !crit; 279 vec = BOOK3S_INTERRUPT_DECREMENTER; 280 break; 281 case BOOK3S_IRQPRIO_EXTERNAL: 282 deliver = (kvmppc_get_msr(vcpu) & MSR_EE) && !crit; 283 vec = BOOK3S_INTERRUPT_EXTERNAL; 284 break; 285 case BOOK3S_IRQPRIO_SYSTEM_RESET: 286 vec = BOOK3S_INTERRUPT_SYSTEM_RESET; 287 break; 288 case BOOK3S_IRQPRIO_MACHINE_CHECK: 289 vec = BOOK3S_INTERRUPT_MACHINE_CHECK; 290 break; 291 case BOOK3S_IRQPRIO_DATA_STORAGE: 292 vec = BOOK3S_INTERRUPT_DATA_STORAGE; 293 break; 294 case BOOK3S_IRQPRIO_INST_STORAGE: 295 vec = BOOK3S_INTERRUPT_INST_STORAGE; 296 break; 297 case BOOK3S_IRQPRIO_DATA_SEGMENT: 298 vec = BOOK3S_INTERRUPT_DATA_SEGMENT; 299 break; 300 case BOOK3S_IRQPRIO_INST_SEGMENT: 301 vec = BOOK3S_INTERRUPT_INST_SEGMENT; 302 break; 303 case BOOK3S_IRQPRIO_ALIGNMENT: 304 vec = BOOK3S_INTERRUPT_ALIGNMENT; 305 break; 306 case BOOK3S_IRQPRIO_PROGRAM: 307 vec = BOOK3S_INTERRUPT_PROGRAM; 308 break; 309 case BOOK3S_IRQPRIO_VSX: 310 vec = BOOK3S_INTERRUPT_VSX; 311 break; 312 case BOOK3S_IRQPRIO_ALTIVEC: 313 vec = BOOK3S_INTERRUPT_ALTIVEC; 314 break; 315 case BOOK3S_IRQPRIO_FP_UNAVAIL: 316 vec = BOOK3S_INTERRUPT_FP_UNAVAIL; 317 break; 318 case BOOK3S_IRQPRIO_SYSCALL: 319 vec = BOOK3S_INTERRUPT_SYSCALL; 320 break; 321 case BOOK3S_IRQPRIO_DEBUG: 322 vec = BOOK3S_INTERRUPT_TRACE; 323 break; 324 case BOOK3S_IRQPRIO_PERFORMANCE_MONITOR: 325 vec = BOOK3S_INTERRUPT_PERFMON; 326 break; 327 case BOOK3S_IRQPRIO_FAC_UNAVAIL: 328 vec = BOOK3S_INTERRUPT_FAC_UNAVAIL; 329 break; 330 default: 331 deliver = 0; 332 printk(KERN_ERR "KVM: Unknown interrupt: 0x%x\n", priority); 333 break; 334 } 335 336 #if 0 337 printk(KERN_INFO "Deliver interrupt 0x%x? %x\n", vec, deliver); 338 #endif 339 340 if (deliver) 341 kvmppc_inject_interrupt(vcpu, vec, 0); 342 343 return deliver; 344 } 345 346 /* 347 * This function determines if an irqprio should be cleared once issued. 348 */ 349 static bool clear_irqprio(struct kvm_vcpu *vcpu, unsigned int priority) 350 { 351 switch (priority) { 352 case BOOK3S_IRQPRIO_DECREMENTER: 353 /* DEC interrupts get cleared by mtdec */ 354 return false; 355 case BOOK3S_IRQPRIO_EXTERNAL: 356 /* 357 * External interrupts get cleared by userspace 358 * except when set by the KVM_INTERRUPT ioctl with 359 * KVM_INTERRUPT_SET (not KVM_INTERRUPT_SET_LEVEL). 360 */ 361 if (vcpu->arch.external_oneshot) { 362 vcpu->arch.external_oneshot = 0; 363 return true; 364 } 365 return false; 366 } 367 368 return true; 369 } 370 371 int kvmppc_core_prepare_to_enter(struct kvm_vcpu *vcpu) 372 { 373 unsigned long *pending = &vcpu->arch.pending_exceptions; 374 unsigned long old_pending = vcpu->arch.pending_exceptions; 375 unsigned int priority; 376 377 #ifdef EXIT_DEBUG 378 if (vcpu->arch.pending_exceptions) 379 printk(KERN_EMERG "KVM: Check pending: %lx\n", vcpu->arch.pending_exceptions); 380 #endif 381 priority = __ffs(*pending); 382 while (priority < BOOK3S_IRQPRIO_MAX) { 383 if (kvmppc_book3s_irqprio_deliver(vcpu, priority) && 384 clear_irqprio(vcpu, priority)) { 385 clear_bit(priority, &vcpu->arch.pending_exceptions); 386 break; 387 } 388 389 priority = find_next_bit(pending, 390 BITS_PER_BYTE * sizeof(*pending), 391 priority + 1); 392 } 393 394 /* Tell the guest about our interrupt status */ 395 kvmppc_update_int_pending(vcpu, *pending, old_pending); 396 397 return 0; 398 } 399 EXPORT_SYMBOL_GPL(kvmppc_core_prepare_to_enter); 400 401 kvm_pfn_t kvmppc_gpa_to_pfn(struct kvm_vcpu *vcpu, gpa_t gpa, bool writing, 402 bool *writable) 403 { 404 ulong mp_pa = vcpu->arch.magic_page_pa & KVM_PAM; 405 gfn_t gfn = gpa >> PAGE_SHIFT; 406 407 if (!(kvmppc_get_msr(vcpu) & MSR_SF)) 408 mp_pa = (uint32_t)mp_pa; 409 410 /* Magic page override */ 411 gpa &= ~0xFFFULL; 412 if (unlikely(mp_pa) && unlikely((gpa & KVM_PAM) == mp_pa)) { 413 ulong shared_page = ((ulong)vcpu->arch.shared) & PAGE_MASK; 414 kvm_pfn_t pfn; 415 416 pfn = (kvm_pfn_t)virt_to_phys((void*)shared_page) >> PAGE_SHIFT; 417 get_page(pfn_to_page(pfn)); 418 if (writable) 419 *writable = true; 420 return pfn; 421 } 422 423 return gfn_to_pfn_prot(vcpu->kvm, gfn, writing, writable); 424 } 425 EXPORT_SYMBOL_GPL(kvmppc_gpa_to_pfn); 426 427 int kvmppc_xlate(struct kvm_vcpu *vcpu, ulong eaddr, enum xlate_instdata xlid, 428 enum xlate_readwrite xlrw, struct kvmppc_pte *pte) 429 { 430 bool data = (xlid == XLATE_DATA); 431 bool iswrite = (xlrw == XLATE_WRITE); 432 int relocated = (kvmppc_get_msr(vcpu) & (data ? MSR_DR : MSR_IR)); 433 int r; 434 435 if (relocated) { 436 r = vcpu->arch.mmu.xlate(vcpu, eaddr, pte, data, iswrite); 437 } else { 438 pte->eaddr = eaddr; 439 pte->raddr = eaddr & KVM_PAM; 440 pte->vpage = VSID_REAL | eaddr >> 12; 441 pte->may_read = true; 442 pte->may_write = true; 443 pte->may_execute = true; 444 r = 0; 445 446 if ((kvmppc_get_msr(vcpu) & (MSR_IR | MSR_DR)) == MSR_DR && 447 !data) { 448 if ((vcpu->arch.hflags & BOOK3S_HFLAG_SPLIT_HACK) && 449 ((eaddr & SPLIT_HACK_MASK) == SPLIT_HACK_OFFS)) 450 pte->raddr &= ~SPLIT_HACK_MASK; 451 } 452 } 453 454 return r; 455 } 456 457 int kvmppc_load_last_inst(struct kvm_vcpu *vcpu, 458 enum instruction_fetch_type type, u32 *inst) 459 { 460 ulong pc = kvmppc_get_pc(vcpu); 461 int r; 462 463 if (type == INST_SC) 464 pc -= 4; 465 466 r = kvmppc_ld(vcpu, &pc, sizeof(u32), inst, false); 467 if (r == EMULATE_DONE) 468 return r; 469 else 470 return EMULATE_AGAIN; 471 } 472 EXPORT_SYMBOL_GPL(kvmppc_load_last_inst); 473 474 int kvm_arch_vcpu_setup(struct kvm_vcpu *vcpu) 475 { 476 return 0; 477 } 478 479 int kvmppc_subarch_vcpu_init(struct kvm_vcpu *vcpu) 480 { 481 return 0; 482 } 483 484 void kvmppc_subarch_vcpu_uninit(struct kvm_vcpu *vcpu) 485 { 486 } 487 488 int kvm_arch_vcpu_ioctl_get_sregs(struct kvm_vcpu *vcpu, 489 struct kvm_sregs *sregs) 490 { 491 int ret; 492 493 vcpu_load(vcpu); 494 ret = vcpu->kvm->arch.kvm_ops->get_sregs(vcpu, sregs); 495 vcpu_put(vcpu); 496 497 return ret; 498 } 499 500 int kvm_arch_vcpu_ioctl_set_sregs(struct kvm_vcpu *vcpu, 501 struct kvm_sregs *sregs) 502 { 503 int ret; 504 505 vcpu_load(vcpu); 506 ret = vcpu->kvm->arch.kvm_ops->set_sregs(vcpu, sregs); 507 vcpu_put(vcpu); 508 509 return ret; 510 } 511 512 int kvm_arch_vcpu_ioctl_get_regs(struct kvm_vcpu *vcpu, struct kvm_regs *regs) 513 { 514 int i; 515 516 regs->pc = kvmppc_get_pc(vcpu); 517 regs->cr = kvmppc_get_cr(vcpu); 518 regs->ctr = kvmppc_get_ctr(vcpu); 519 regs->lr = kvmppc_get_lr(vcpu); 520 regs->xer = kvmppc_get_xer(vcpu); 521 regs->msr = kvmppc_get_msr(vcpu); 522 regs->srr0 = kvmppc_get_srr0(vcpu); 523 regs->srr1 = kvmppc_get_srr1(vcpu); 524 regs->pid = vcpu->arch.pid; 525 regs->sprg0 = kvmppc_get_sprg0(vcpu); 526 regs->sprg1 = kvmppc_get_sprg1(vcpu); 527 regs->sprg2 = kvmppc_get_sprg2(vcpu); 528 regs->sprg3 = kvmppc_get_sprg3(vcpu); 529 regs->sprg4 = kvmppc_get_sprg4(vcpu); 530 regs->sprg5 = kvmppc_get_sprg5(vcpu); 531 regs->sprg6 = kvmppc_get_sprg6(vcpu); 532 regs->sprg7 = kvmppc_get_sprg7(vcpu); 533 534 for (i = 0; i < ARRAY_SIZE(regs->gpr); i++) 535 regs->gpr[i] = kvmppc_get_gpr(vcpu, i); 536 537 return 0; 538 } 539 540 int kvm_arch_vcpu_ioctl_set_regs(struct kvm_vcpu *vcpu, struct kvm_regs *regs) 541 { 542 int i; 543 544 kvmppc_set_pc(vcpu, regs->pc); 545 kvmppc_set_cr(vcpu, regs->cr); 546 kvmppc_set_ctr(vcpu, regs->ctr); 547 kvmppc_set_lr(vcpu, regs->lr); 548 kvmppc_set_xer(vcpu, regs->xer); 549 kvmppc_set_msr(vcpu, regs->msr); 550 kvmppc_set_srr0(vcpu, regs->srr0); 551 kvmppc_set_srr1(vcpu, regs->srr1); 552 kvmppc_set_sprg0(vcpu, regs->sprg0); 553 kvmppc_set_sprg1(vcpu, regs->sprg1); 554 kvmppc_set_sprg2(vcpu, regs->sprg2); 555 kvmppc_set_sprg3(vcpu, regs->sprg3); 556 kvmppc_set_sprg4(vcpu, regs->sprg4); 557 kvmppc_set_sprg5(vcpu, regs->sprg5); 558 kvmppc_set_sprg6(vcpu, regs->sprg6); 559 kvmppc_set_sprg7(vcpu, regs->sprg7); 560 561 for (i = 0; i < ARRAY_SIZE(regs->gpr); i++) 562 kvmppc_set_gpr(vcpu, i, regs->gpr[i]); 563 564 return 0; 565 } 566 567 int kvm_arch_vcpu_ioctl_get_fpu(struct kvm_vcpu *vcpu, struct kvm_fpu *fpu) 568 { 569 return -ENOTSUPP; 570 } 571 572 int kvm_arch_vcpu_ioctl_set_fpu(struct kvm_vcpu *vcpu, struct kvm_fpu *fpu) 573 { 574 return -ENOTSUPP; 575 } 576 577 int kvmppc_get_one_reg(struct kvm_vcpu *vcpu, u64 id, 578 union kvmppc_one_reg *val) 579 { 580 int r = 0; 581 long int i; 582 583 r = vcpu->kvm->arch.kvm_ops->get_one_reg(vcpu, id, val); 584 if (r == -EINVAL) { 585 r = 0; 586 switch (id) { 587 case KVM_REG_PPC_DAR: 588 *val = get_reg_val(id, kvmppc_get_dar(vcpu)); 589 break; 590 case KVM_REG_PPC_DSISR: 591 *val = get_reg_val(id, kvmppc_get_dsisr(vcpu)); 592 break; 593 case KVM_REG_PPC_FPR0 ... KVM_REG_PPC_FPR31: 594 i = id - KVM_REG_PPC_FPR0; 595 *val = get_reg_val(id, VCPU_FPR(vcpu, i)); 596 break; 597 case KVM_REG_PPC_FPSCR: 598 *val = get_reg_val(id, vcpu->arch.fp.fpscr); 599 break; 600 #ifdef CONFIG_VSX 601 case KVM_REG_PPC_VSR0 ... KVM_REG_PPC_VSR31: 602 if (cpu_has_feature(CPU_FTR_VSX)) { 603 i = id - KVM_REG_PPC_VSR0; 604 val->vsxval[0] = vcpu->arch.fp.fpr[i][0]; 605 val->vsxval[1] = vcpu->arch.fp.fpr[i][1]; 606 } else { 607 r = -ENXIO; 608 } 609 break; 610 #endif /* CONFIG_VSX */ 611 case KVM_REG_PPC_DEBUG_INST: 612 *val = get_reg_val(id, INS_TW); 613 break; 614 #ifdef CONFIG_KVM_XICS 615 case KVM_REG_PPC_ICP_STATE: 616 if (!vcpu->arch.icp && !vcpu->arch.xive_vcpu) { 617 r = -ENXIO; 618 break; 619 } 620 if (xics_on_xive()) 621 *val = get_reg_val(id, kvmppc_xive_get_icp(vcpu)); 622 else 623 *val = get_reg_val(id, kvmppc_xics_get_icp(vcpu)); 624 break; 625 #endif /* CONFIG_KVM_XICS */ 626 #ifdef CONFIG_KVM_XIVE 627 case KVM_REG_PPC_VP_STATE: 628 if (!vcpu->arch.xive_vcpu) { 629 r = -ENXIO; 630 break; 631 } 632 if (xive_enabled()) 633 r = kvmppc_xive_native_get_vp(vcpu, val); 634 else 635 r = -ENXIO; 636 break; 637 #endif /* CONFIG_KVM_XIVE */ 638 case KVM_REG_PPC_FSCR: 639 *val = get_reg_val(id, vcpu->arch.fscr); 640 break; 641 case KVM_REG_PPC_TAR: 642 *val = get_reg_val(id, vcpu->arch.tar); 643 break; 644 case KVM_REG_PPC_EBBHR: 645 *val = get_reg_val(id, vcpu->arch.ebbhr); 646 break; 647 case KVM_REG_PPC_EBBRR: 648 *val = get_reg_val(id, vcpu->arch.ebbrr); 649 break; 650 case KVM_REG_PPC_BESCR: 651 *val = get_reg_val(id, vcpu->arch.bescr); 652 break; 653 case KVM_REG_PPC_IC: 654 *val = get_reg_val(id, vcpu->arch.ic); 655 break; 656 default: 657 r = -EINVAL; 658 break; 659 } 660 } 661 662 return r; 663 } 664 665 int kvmppc_set_one_reg(struct kvm_vcpu *vcpu, u64 id, 666 union kvmppc_one_reg *val) 667 { 668 int r = 0; 669 long int i; 670 671 r = vcpu->kvm->arch.kvm_ops->set_one_reg(vcpu, id, val); 672 if (r == -EINVAL) { 673 r = 0; 674 switch (id) { 675 case KVM_REG_PPC_DAR: 676 kvmppc_set_dar(vcpu, set_reg_val(id, *val)); 677 break; 678 case KVM_REG_PPC_DSISR: 679 kvmppc_set_dsisr(vcpu, set_reg_val(id, *val)); 680 break; 681 case KVM_REG_PPC_FPR0 ... KVM_REG_PPC_FPR31: 682 i = id - KVM_REG_PPC_FPR0; 683 VCPU_FPR(vcpu, i) = set_reg_val(id, *val); 684 break; 685 case KVM_REG_PPC_FPSCR: 686 vcpu->arch.fp.fpscr = set_reg_val(id, *val); 687 break; 688 #ifdef CONFIG_VSX 689 case KVM_REG_PPC_VSR0 ... KVM_REG_PPC_VSR31: 690 if (cpu_has_feature(CPU_FTR_VSX)) { 691 i = id - KVM_REG_PPC_VSR0; 692 vcpu->arch.fp.fpr[i][0] = val->vsxval[0]; 693 vcpu->arch.fp.fpr[i][1] = val->vsxval[1]; 694 } else { 695 r = -ENXIO; 696 } 697 break; 698 #endif /* CONFIG_VSX */ 699 #ifdef CONFIG_KVM_XICS 700 case KVM_REG_PPC_ICP_STATE: 701 if (!vcpu->arch.icp && !vcpu->arch.xive_vcpu) { 702 r = -ENXIO; 703 break; 704 } 705 if (xics_on_xive()) 706 r = kvmppc_xive_set_icp(vcpu, set_reg_val(id, *val)); 707 else 708 r = kvmppc_xics_set_icp(vcpu, set_reg_val(id, *val)); 709 break; 710 #endif /* CONFIG_KVM_XICS */ 711 #ifdef CONFIG_KVM_XIVE 712 case KVM_REG_PPC_VP_STATE: 713 if (!vcpu->arch.xive_vcpu) { 714 r = -ENXIO; 715 break; 716 } 717 if (xive_enabled()) 718 r = kvmppc_xive_native_set_vp(vcpu, val); 719 else 720 r = -ENXIO; 721 break; 722 #endif /* CONFIG_KVM_XIVE */ 723 case KVM_REG_PPC_FSCR: 724 vcpu->arch.fscr = set_reg_val(id, *val); 725 break; 726 case KVM_REG_PPC_TAR: 727 vcpu->arch.tar = set_reg_val(id, *val); 728 break; 729 case KVM_REG_PPC_EBBHR: 730 vcpu->arch.ebbhr = set_reg_val(id, *val); 731 break; 732 case KVM_REG_PPC_EBBRR: 733 vcpu->arch.ebbrr = set_reg_val(id, *val); 734 break; 735 case KVM_REG_PPC_BESCR: 736 vcpu->arch.bescr = set_reg_val(id, *val); 737 break; 738 case KVM_REG_PPC_IC: 739 vcpu->arch.ic = set_reg_val(id, *val); 740 break; 741 default: 742 r = -EINVAL; 743 break; 744 } 745 } 746 747 return r; 748 } 749 750 void kvmppc_core_vcpu_load(struct kvm_vcpu *vcpu, int cpu) 751 { 752 vcpu->kvm->arch.kvm_ops->vcpu_load(vcpu, cpu); 753 } 754 755 void kvmppc_core_vcpu_put(struct kvm_vcpu *vcpu) 756 { 757 vcpu->kvm->arch.kvm_ops->vcpu_put(vcpu); 758 } 759 760 void kvmppc_set_msr(struct kvm_vcpu *vcpu, u64 msr) 761 { 762 vcpu->kvm->arch.kvm_ops->set_msr(vcpu, msr); 763 } 764 EXPORT_SYMBOL_GPL(kvmppc_set_msr); 765 766 int kvmppc_vcpu_run(struct kvm_run *kvm_run, struct kvm_vcpu *vcpu) 767 { 768 return vcpu->kvm->arch.kvm_ops->vcpu_run(kvm_run, vcpu); 769 } 770 771 int kvm_arch_vcpu_ioctl_translate(struct kvm_vcpu *vcpu, 772 struct kvm_translation *tr) 773 { 774 return 0; 775 } 776 777 int kvm_arch_vcpu_ioctl_set_guest_debug(struct kvm_vcpu *vcpu, 778 struct kvm_guest_debug *dbg) 779 { 780 vcpu_load(vcpu); 781 vcpu->guest_debug = dbg->control; 782 vcpu_put(vcpu); 783 return 0; 784 } 785 786 void kvmppc_decrementer_func(struct kvm_vcpu *vcpu) 787 { 788 kvmppc_core_queue_dec(vcpu); 789 kvm_vcpu_kick(vcpu); 790 } 791 792 struct kvm_vcpu *kvmppc_core_vcpu_create(struct kvm *kvm, unsigned int id) 793 { 794 return kvm->arch.kvm_ops->vcpu_create(kvm, id); 795 } 796 797 void kvmppc_core_vcpu_free(struct kvm_vcpu *vcpu) 798 { 799 vcpu->kvm->arch.kvm_ops->vcpu_free(vcpu); 800 } 801 802 int kvmppc_core_check_requests(struct kvm_vcpu *vcpu) 803 { 804 return vcpu->kvm->arch.kvm_ops->check_requests(vcpu); 805 } 806 807 int kvm_vm_ioctl_get_dirty_log(struct kvm *kvm, struct kvm_dirty_log *log) 808 { 809 return kvm->arch.kvm_ops->get_dirty_log(kvm, log); 810 } 811 812 void kvmppc_core_free_memslot(struct kvm *kvm, struct kvm_memory_slot *free, 813 struct kvm_memory_slot *dont) 814 { 815 kvm->arch.kvm_ops->free_memslot(free, dont); 816 } 817 818 int kvmppc_core_create_memslot(struct kvm *kvm, struct kvm_memory_slot *slot, 819 unsigned long npages) 820 { 821 return kvm->arch.kvm_ops->create_memslot(slot, npages); 822 } 823 824 void kvmppc_core_flush_memslot(struct kvm *kvm, struct kvm_memory_slot *memslot) 825 { 826 kvm->arch.kvm_ops->flush_memslot(kvm, memslot); 827 } 828 829 int kvmppc_core_prepare_memory_region(struct kvm *kvm, 830 struct kvm_memory_slot *memslot, 831 const struct kvm_userspace_memory_region *mem) 832 { 833 return kvm->arch.kvm_ops->prepare_memory_region(kvm, memslot, mem); 834 } 835 836 void kvmppc_core_commit_memory_region(struct kvm *kvm, 837 const struct kvm_userspace_memory_region *mem, 838 const struct kvm_memory_slot *old, 839 const struct kvm_memory_slot *new, 840 enum kvm_mr_change change) 841 { 842 kvm->arch.kvm_ops->commit_memory_region(kvm, mem, old, new, change); 843 } 844 845 int kvm_unmap_hva_range(struct kvm *kvm, unsigned long start, unsigned long end) 846 { 847 return kvm->arch.kvm_ops->unmap_hva_range(kvm, start, end); 848 } 849 850 int kvm_age_hva(struct kvm *kvm, unsigned long start, unsigned long end) 851 { 852 return kvm->arch.kvm_ops->age_hva(kvm, start, end); 853 } 854 855 int kvm_test_age_hva(struct kvm *kvm, unsigned long hva) 856 { 857 return kvm->arch.kvm_ops->test_age_hva(kvm, hva); 858 } 859 860 int kvm_set_spte_hva(struct kvm *kvm, unsigned long hva, pte_t pte) 861 { 862 kvm->arch.kvm_ops->set_spte_hva(kvm, hva, pte); 863 return 0; 864 } 865 866 void kvmppc_mmu_destroy(struct kvm_vcpu *vcpu) 867 { 868 vcpu->kvm->arch.kvm_ops->mmu_destroy(vcpu); 869 } 870 871 int kvmppc_core_init_vm(struct kvm *kvm) 872 { 873 874 #ifdef CONFIG_PPC64 875 INIT_LIST_HEAD_RCU(&kvm->arch.spapr_tce_tables); 876 INIT_LIST_HEAD(&kvm->arch.rtas_tokens); 877 mutex_init(&kvm->arch.rtas_token_lock); 878 #endif 879 880 return kvm->arch.kvm_ops->init_vm(kvm); 881 } 882 883 void kvmppc_core_destroy_vm(struct kvm *kvm) 884 { 885 kvm->arch.kvm_ops->destroy_vm(kvm); 886 887 #ifdef CONFIG_PPC64 888 kvmppc_rtas_tokens_free(kvm); 889 WARN_ON(!list_empty(&kvm->arch.spapr_tce_tables)); 890 #endif 891 892 #ifdef CONFIG_KVM_XICS 893 /* 894 * Free the XIVE devices which are not directly freed by the 895 * device 'release' method 896 */ 897 kfree(kvm->arch.xive_devices.native); 898 kvm->arch.xive_devices.native = NULL; 899 kfree(kvm->arch.xive_devices.xics_on_xive); 900 kvm->arch.xive_devices.xics_on_xive = NULL; 901 #endif /* CONFIG_KVM_XICS */ 902 } 903 904 int kvmppc_h_logical_ci_load(struct kvm_vcpu *vcpu) 905 { 906 unsigned long size = kvmppc_get_gpr(vcpu, 4); 907 unsigned long addr = kvmppc_get_gpr(vcpu, 5); 908 u64 buf; 909 int srcu_idx; 910 int ret; 911 912 if (!is_power_of_2(size) || (size > sizeof(buf))) 913 return H_TOO_HARD; 914 915 srcu_idx = srcu_read_lock(&vcpu->kvm->srcu); 916 ret = kvm_io_bus_read(vcpu, KVM_MMIO_BUS, addr, size, &buf); 917 srcu_read_unlock(&vcpu->kvm->srcu, srcu_idx); 918 if (ret != 0) 919 return H_TOO_HARD; 920 921 switch (size) { 922 case 1: 923 kvmppc_set_gpr(vcpu, 4, *(u8 *)&buf); 924 break; 925 926 case 2: 927 kvmppc_set_gpr(vcpu, 4, be16_to_cpu(*(__be16 *)&buf)); 928 break; 929 930 case 4: 931 kvmppc_set_gpr(vcpu, 4, be32_to_cpu(*(__be32 *)&buf)); 932 break; 933 934 case 8: 935 kvmppc_set_gpr(vcpu, 4, be64_to_cpu(*(__be64 *)&buf)); 936 break; 937 938 default: 939 BUG(); 940 } 941 942 return H_SUCCESS; 943 } 944 EXPORT_SYMBOL_GPL(kvmppc_h_logical_ci_load); 945 946 int kvmppc_h_logical_ci_store(struct kvm_vcpu *vcpu) 947 { 948 unsigned long size = kvmppc_get_gpr(vcpu, 4); 949 unsigned long addr = kvmppc_get_gpr(vcpu, 5); 950 unsigned long val = kvmppc_get_gpr(vcpu, 6); 951 u64 buf; 952 int srcu_idx; 953 int ret; 954 955 switch (size) { 956 case 1: 957 *(u8 *)&buf = val; 958 break; 959 960 case 2: 961 *(__be16 *)&buf = cpu_to_be16(val); 962 break; 963 964 case 4: 965 *(__be32 *)&buf = cpu_to_be32(val); 966 break; 967 968 case 8: 969 *(__be64 *)&buf = cpu_to_be64(val); 970 break; 971 972 default: 973 return H_TOO_HARD; 974 } 975 976 srcu_idx = srcu_read_lock(&vcpu->kvm->srcu); 977 ret = kvm_io_bus_write(vcpu, KVM_MMIO_BUS, addr, size, &buf); 978 srcu_read_unlock(&vcpu->kvm->srcu, srcu_idx); 979 if (ret != 0) 980 return H_TOO_HARD; 981 982 return H_SUCCESS; 983 } 984 EXPORT_SYMBOL_GPL(kvmppc_h_logical_ci_store); 985 986 int kvmppc_core_check_processor_compat(void) 987 { 988 /* 989 * We always return 0 for book3s. We check 990 * for compatibility while loading the HV 991 * or PR module 992 */ 993 return 0; 994 } 995 996 int kvmppc_book3s_hcall_implemented(struct kvm *kvm, unsigned long hcall) 997 { 998 return kvm->arch.kvm_ops->hcall_implemented(hcall); 999 } 1000 1001 #ifdef CONFIG_KVM_XICS 1002 int kvm_set_irq(struct kvm *kvm, int irq_source_id, u32 irq, int level, 1003 bool line_status) 1004 { 1005 if (xics_on_xive()) 1006 return kvmppc_xive_set_irq(kvm, irq_source_id, irq, level, 1007 line_status); 1008 else 1009 return kvmppc_xics_set_irq(kvm, irq_source_id, irq, level, 1010 line_status); 1011 } 1012 1013 int kvm_arch_set_irq_inatomic(struct kvm_kernel_irq_routing_entry *irq_entry, 1014 struct kvm *kvm, int irq_source_id, 1015 int level, bool line_status) 1016 { 1017 return kvm_set_irq(kvm, irq_source_id, irq_entry->gsi, 1018 level, line_status); 1019 } 1020 static int kvmppc_book3s_set_irq(struct kvm_kernel_irq_routing_entry *e, 1021 struct kvm *kvm, int irq_source_id, int level, 1022 bool line_status) 1023 { 1024 return kvm_set_irq(kvm, irq_source_id, e->gsi, level, line_status); 1025 } 1026 1027 int kvm_irq_map_gsi(struct kvm *kvm, 1028 struct kvm_kernel_irq_routing_entry *entries, int gsi) 1029 { 1030 entries->gsi = gsi; 1031 entries->type = KVM_IRQ_ROUTING_IRQCHIP; 1032 entries->set = kvmppc_book3s_set_irq; 1033 entries->irqchip.irqchip = 0; 1034 entries->irqchip.pin = gsi; 1035 return 1; 1036 } 1037 1038 int kvm_irq_map_chip_pin(struct kvm *kvm, unsigned irqchip, unsigned pin) 1039 { 1040 return pin; 1041 } 1042 1043 #endif /* CONFIG_KVM_XICS */ 1044 1045 static int kvmppc_book3s_init(void) 1046 { 1047 int r; 1048 1049 r = kvm_init(NULL, sizeof(struct kvm_vcpu), 0, THIS_MODULE); 1050 if (r) 1051 return r; 1052 #ifdef CONFIG_KVM_BOOK3S_32_HANDLER 1053 r = kvmppc_book3s_init_pr(); 1054 #endif 1055 1056 #ifdef CONFIG_KVM_XICS 1057 #ifdef CONFIG_KVM_XIVE 1058 if (xics_on_xive()) { 1059 kvmppc_xive_init_module(); 1060 kvm_register_device_ops(&kvm_xive_ops, KVM_DEV_TYPE_XICS); 1061 if (kvmppc_xive_native_supported()) { 1062 kvmppc_xive_native_init_module(); 1063 kvm_register_device_ops(&kvm_xive_native_ops, 1064 KVM_DEV_TYPE_XIVE); 1065 } 1066 } else 1067 #endif 1068 kvm_register_device_ops(&kvm_xics_ops, KVM_DEV_TYPE_XICS); 1069 #endif 1070 return r; 1071 } 1072 1073 static void kvmppc_book3s_exit(void) 1074 { 1075 #ifdef CONFIG_KVM_XICS 1076 if (xics_on_xive()) { 1077 kvmppc_xive_exit_module(); 1078 kvmppc_xive_native_exit_module(); 1079 } 1080 #endif 1081 #ifdef CONFIG_KVM_BOOK3S_32_HANDLER 1082 kvmppc_book3s_exit_pr(); 1083 #endif 1084 kvm_exit(); 1085 } 1086 1087 module_init(kvmppc_book3s_init); 1088 module_exit(kvmppc_book3s_exit); 1089 1090 /* On 32bit this is our one and only kernel module */ 1091 #ifdef CONFIG_KVM_BOOK3S_32_HANDLER 1092 MODULE_ALIAS_MISCDEV(KVM_MINOR); 1093 MODULE_ALIAS("devname:kvm"); 1094 #endif 1095