1 // SPDX-License-Identifier: GPL-2.0-only 2 /* 3 * Copyright (C) 2009. SUSE Linux Products GmbH. All rights reserved. 4 * 5 * Authors: 6 * Alexander Graf <agraf@suse.de> 7 * Kevin Wolf <mail@kevin-wolf.de> 8 * 9 * Description: 10 * This file is derived from arch/powerpc/kvm/44x.c, 11 * by Hollis Blanchard <hollisb@us.ibm.com>. 12 */ 13 14 #include <linux/kvm_host.h> 15 #include <linux/err.h> 16 #include <linux/export.h> 17 #include <linux/slab.h> 18 #include <linux/module.h> 19 #include <linux/miscdevice.h> 20 #include <linux/gfp.h> 21 #include <linux/sched.h> 22 #include <linux/vmalloc.h> 23 #include <linux/highmem.h> 24 25 #include <asm/reg.h> 26 #include <asm/cputable.h> 27 #include <asm/cacheflush.h> 28 #include <linux/uaccess.h> 29 #include <asm/io.h> 30 #include <asm/kvm_ppc.h> 31 #include <asm/kvm_book3s.h> 32 #include <asm/mmu_context.h> 33 #include <asm/page.h> 34 #include <asm/xive.h> 35 36 #include "book3s.h" 37 #include "trace.h" 38 39 #define VM_STAT(x) offsetof(struct kvm, stat.x), KVM_STAT_VM 40 #define VCPU_STAT(x) offsetof(struct kvm_vcpu, stat.x), KVM_STAT_VCPU 41 42 /* #define EXIT_DEBUG */ 43 44 struct kvm_stats_debugfs_item debugfs_entries[] = { 45 { "exits", VCPU_STAT(sum_exits) }, 46 { "mmio", VCPU_STAT(mmio_exits) }, 47 { "sig", VCPU_STAT(signal_exits) }, 48 { "sysc", VCPU_STAT(syscall_exits) }, 49 { "inst_emu", VCPU_STAT(emulated_inst_exits) }, 50 { "dec", VCPU_STAT(dec_exits) }, 51 { "ext_intr", VCPU_STAT(ext_intr_exits) }, 52 { "queue_intr", VCPU_STAT(queue_intr) }, 53 { "halt_poll_success_ns", VCPU_STAT(halt_poll_success_ns) }, 54 { "halt_poll_fail_ns", VCPU_STAT(halt_poll_fail_ns) }, 55 { "halt_wait_ns", VCPU_STAT(halt_wait_ns) }, 56 { "halt_successful_poll", VCPU_STAT(halt_successful_poll), }, 57 { "halt_attempted_poll", VCPU_STAT(halt_attempted_poll), }, 58 { "halt_successful_wait", VCPU_STAT(halt_successful_wait) }, 59 { "halt_poll_invalid", VCPU_STAT(halt_poll_invalid) }, 60 { "halt_wakeup", VCPU_STAT(halt_wakeup) }, 61 { "pf_storage", VCPU_STAT(pf_storage) }, 62 { "sp_storage", VCPU_STAT(sp_storage) }, 63 { "pf_instruc", VCPU_STAT(pf_instruc) }, 64 { "sp_instruc", VCPU_STAT(sp_instruc) }, 65 { "ld", VCPU_STAT(ld) }, 66 { "ld_slow", VCPU_STAT(ld_slow) }, 67 { "st", VCPU_STAT(st) }, 68 { "st_slow", VCPU_STAT(st_slow) }, 69 { "pthru_all", VCPU_STAT(pthru_all) }, 70 { "pthru_host", VCPU_STAT(pthru_host) }, 71 { "pthru_bad_aff", VCPU_STAT(pthru_bad_aff) }, 72 { "largepages_2M", VM_STAT(num_2M_pages) }, 73 { "largepages_1G", VM_STAT(num_1G_pages) }, 74 { NULL } 75 }; 76 77 void kvmppc_unfixup_split_real(struct kvm_vcpu *vcpu) 78 { 79 if (vcpu->arch.hflags & BOOK3S_HFLAG_SPLIT_HACK) { 80 ulong pc = kvmppc_get_pc(vcpu); 81 ulong lr = kvmppc_get_lr(vcpu); 82 if ((pc & SPLIT_HACK_MASK) == SPLIT_HACK_OFFS) 83 kvmppc_set_pc(vcpu, pc & ~SPLIT_HACK_MASK); 84 if ((lr & SPLIT_HACK_MASK) == SPLIT_HACK_OFFS) 85 kvmppc_set_lr(vcpu, lr & ~SPLIT_HACK_MASK); 86 vcpu->arch.hflags &= ~BOOK3S_HFLAG_SPLIT_HACK; 87 } 88 } 89 EXPORT_SYMBOL_GPL(kvmppc_unfixup_split_real); 90 91 static inline unsigned long kvmppc_interrupt_offset(struct kvm_vcpu *vcpu) 92 { 93 if (!is_kvmppc_hv_enabled(vcpu->kvm)) 94 return to_book3s(vcpu)->hior; 95 return 0; 96 } 97 98 static inline void kvmppc_update_int_pending(struct kvm_vcpu *vcpu, 99 unsigned long pending_now, unsigned long old_pending) 100 { 101 if (is_kvmppc_hv_enabled(vcpu->kvm)) 102 return; 103 if (pending_now) 104 kvmppc_set_int_pending(vcpu, 1); 105 else if (old_pending) 106 kvmppc_set_int_pending(vcpu, 0); 107 } 108 109 static inline bool kvmppc_critical_section(struct kvm_vcpu *vcpu) 110 { 111 ulong crit_raw; 112 ulong crit_r1; 113 bool crit; 114 115 if (is_kvmppc_hv_enabled(vcpu->kvm)) 116 return false; 117 118 crit_raw = kvmppc_get_critical(vcpu); 119 crit_r1 = kvmppc_get_gpr(vcpu, 1); 120 121 /* Truncate crit indicators in 32 bit mode */ 122 if (!(kvmppc_get_msr(vcpu) & MSR_SF)) { 123 crit_raw &= 0xffffffff; 124 crit_r1 &= 0xffffffff; 125 } 126 127 /* Critical section when crit == r1 */ 128 crit = (crit_raw == crit_r1); 129 /* ... and we're in supervisor mode */ 130 crit = crit && !(kvmppc_get_msr(vcpu) & MSR_PR); 131 132 return crit; 133 } 134 135 void kvmppc_inject_interrupt(struct kvm_vcpu *vcpu, int vec, u64 flags) 136 { 137 kvmppc_unfixup_split_real(vcpu); 138 kvmppc_set_srr0(vcpu, kvmppc_get_pc(vcpu)); 139 kvmppc_set_srr1(vcpu, (kvmppc_get_msr(vcpu) & ~0x783f0000ul) | flags); 140 kvmppc_set_pc(vcpu, kvmppc_interrupt_offset(vcpu) + vec); 141 vcpu->arch.mmu.reset_msr(vcpu); 142 } 143 144 static int kvmppc_book3s_vec2irqprio(unsigned int vec) 145 { 146 unsigned int prio; 147 148 switch (vec) { 149 case 0x100: prio = BOOK3S_IRQPRIO_SYSTEM_RESET; break; 150 case 0x200: prio = BOOK3S_IRQPRIO_MACHINE_CHECK; break; 151 case 0x300: prio = BOOK3S_IRQPRIO_DATA_STORAGE; break; 152 case 0x380: prio = BOOK3S_IRQPRIO_DATA_SEGMENT; break; 153 case 0x400: prio = BOOK3S_IRQPRIO_INST_STORAGE; break; 154 case 0x480: prio = BOOK3S_IRQPRIO_INST_SEGMENT; break; 155 case 0x500: prio = BOOK3S_IRQPRIO_EXTERNAL; break; 156 case 0x600: prio = BOOK3S_IRQPRIO_ALIGNMENT; break; 157 case 0x700: prio = BOOK3S_IRQPRIO_PROGRAM; break; 158 case 0x800: prio = BOOK3S_IRQPRIO_FP_UNAVAIL; break; 159 case 0x900: prio = BOOK3S_IRQPRIO_DECREMENTER; break; 160 case 0xc00: prio = BOOK3S_IRQPRIO_SYSCALL; break; 161 case 0xd00: prio = BOOK3S_IRQPRIO_DEBUG; break; 162 case 0xf20: prio = BOOK3S_IRQPRIO_ALTIVEC; break; 163 case 0xf40: prio = BOOK3S_IRQPRIO_VSX; break; 164 case 0xf60: prio = BOOK3S_IRQPRIO_FAC_UNAVAIL; break; 165 default: prio = BOOK3S_IRQPRIO_MAX; break; 166 } 167 168 return prio; 169 } 170 171 void kvmppc_book3s_dequeue_irqprio(struct kvm_vcpu *vcpu, 172 unsigned int vec) 173 { 174 unsigned long old_pending = vcpu->arch.pending_exceptions; 175 176 clear_bit(kvmppc_book3s_vec2irqprio(vec), 177 &vcpu->arch.pending_exceptions); 178 179 kvmppc_update_int_pending(vcpu, vcpu->arch.pending_exceptions, 180 old_pending); 181 } 182 183 void kvmppc_book3s_queue_irqprio(struct kvm_vcpu *vcpu, unsigned int vec) 184 { 185 vcpu->stat.queue_intr++; 186 187 set_bit(kvmppc_book3s_vec2irqprio(vec), 188 &vcpu->arch.pending_exceptions); 189 #ifdef EXIT_DEBUG 190 printk(KERN_INFO "Queueing interrupt %x\n", vec); 191 #endif 192 } 193 EXPORT_SYMBOL_GPL(kvmppc_book3s_queue_irqprio); 194 195 void kvmppc_core_queue_machine_check(struct kvm_vcpu *vcpu, ulong flags) 196 { 197 /* might as well deliver this straight away */ 198 kvmppc_inject_interrupt(vcpu, BOOK3S_INTERRUPT_MACHINE_CHECK, flags); 199 } 200 EXPORT_SYMBOL_GPL(kvmppc_core_queue_machine_check); 201 202 void kvmppc_core_queue_program(struct kvm_vcpu *vcpu, ulong flags) 203 { 204 /* might as well deliver this straight away */ 205 kvmppc_inject_interrupt(vcpu, BOOK3S_INTERRUPT_PROGRAM, flags); 206 } 207 EXPORT_SYMBOL_GPL(kvmppc_core_queue_program); 208 209 void kvmppc_core_queue_fpunavail(struct kvm_vcpu *vcpu) 210 { 211 /* might as well deliver this straight away */ 212 kvmppc_inject_interrupt(vcpu, BOOK3S_INTERRUPT_FP_UNAVAIL, 0); 213 } 214 215 void kvmppc_core_queue_vec_unavail(struct kvm_vcpu *vcpu) 216 { 217 /* might as well deliver this straight away */ 218 kvmppc_inject_interrupt(vcpu, BOOK3S_INTERRUPT_ALTIVEC, 0); 219 } 220 221 void kvmppc_core_queue_vsx_unavail(struct kvm_vcpu *vcpu) 222 { 223 /* might as well deliver this straight away */ 224 kvmppc_inject_interrupt(vcpu, BOOK3S_INTERRUPT_VSX, 0); 225 } 226 227 void kvmppc_core_queue_dec(struct kvm_vcpu *vcpu) 228 { 229 kvmppc_book3s_queue_irqprio(vcpu, BOOK3S_INTERRUPT_DECREMENTER); 230 } 231 EXPORT_SYMBOL_GPL(kvmppc_core_queue_dec); 232 233 int kvmppc_core_pending_dec(struct kvm_vcpu *vcpu) 234 { 235 return test_bit(BOOK3S_IRQPRIO_DECREMENTER, &vcpu->arch.pending_exceptions); 236 } 237 EXPORT_SYMBOL_GPL(kvmppc_core_pending_dec); 238 239 void kvmppc_core_dequeue_dec(struct kvm_vcpu *vcpu) 240 { 241 kvmppc_book3s_dequeue_irqprio(vcpu, BOOK3S_INTERRUPT_DECREMENTER); 242 } 243 EXPORT_SYMBOL_GPL(kvmppc_core_dequeue_dec); 244 245 void kvmppc_core_queue_external(struct kvm_vcpu *vcpu, 246 struct kvm_interrupt *irq) 247 { 248 /* 249 * This case (KVM_INTERRUPT_SET) should never actually arise for 250 * a pseries guest (because pseries guests expect their interrupt 251 * controllers to continue asserting an external interrupt request 252 * until it is acknowledged at the interrupt controller), but is 253 * included to avoid ABI breakage and potentially for other 254 * sorts of guest. 255 * 256 * There is a subtlety here: HV KVM does not test the 257 * external_oneshot flag in the code that synthesizes 258 * external interrupts for the guest just before entering 259 * the guest. That is OK even if userspace did do a 260 * KVM_INTERRUPT_SET on a pseries guest vcpu, because the 261 * caller (kvm_vcpu_ioctl_interrupt) does a kvm_vcpu_kick() 262 * which ends up doing a smp_send_reschedule(), which will 263 * pull the guest all the way out to the host, meaning that 264 * we will call kvmppc_core_prepare_to_enter() before entering 265 * the guest again, and that will handle the external_oneshot 266 * flag correctly. 267 */ 268 if (irq->irq == KVM_INTERRUPT_SET) 269 vcpu->arch.external_oneshot = 1; 270 271 kvmppc_book3s_queue_irqprio(vcpu, BOOK3S_INTERRUPT_EXTERNAL); 272 } 273 274 void kvmppc_core_dequeue_external(struct kvm_vcpu *vcpu) 275 { 276 kvmppc_book3s_dequeue_irqprio(vcpu, BOOK3S_INTERRUPT_EXTERNAL); 277 } 278 279 void kvmppc_core_queue_data_storage(struct kvm_vcpu *vcpu, ulong dar, 280 ulong flags) 281 { 282 kvmppc_set_dar(vcpu, dar); 283 kvmppc_set_dsisr(vcpu, flags); 284 kvmppc_inject_interrupt(vcpu, BOOK3S_INTERRUPT_DATA_STORAGE, 0); 285 } 286 EXPORT_SYMBOL_GPL(kvmppc_core_queue_data_storage); 287 288 void kvmppc_core_queue_inst_storage(struct kvm_vcpu *vcpu, ulong flags) 289 { 290 kvmppc_inject_interrupt(vcpu, BOOK3S_INTERRUPT_INST_STORAGE, flags); 291 } 292 EXPORT_SYMBOL_GPL(kvmppc_core_queue_inst_storage); 293 294 static int kvmppc_book3s_irqprio_deliver(struct kvm_vcpu *vcpu, 295 unsigned int priority) 296 { 297 int deliver = 1; 298 int vec = 0; 299 bool crit = kvmppc_critical_section(vcpu); 300 301 switch (priority) { 302 case BOOK3S_IRQPRIO_DECREMENTER: 303 deliver = (kvmppc_get_msr(vcpu) & MSR_EE) && !crit; 304 vec = BOOK3S_INTERRUPT_DECREMENTER; 305 break; 306 case BOOK3S_IRQPRIO_EXTERNAL: 307 deliver = (kvmppc_get_msr(vcpu) & MSR_EE) && !crit; 308 vec = BOOK3S_INTERRUPT_EXTERNAL; 309 break; 310 case BOOK3S_IRQPRIO_SYSTEM_RESET: 311 vec = BOOK3S_INTERRUPT_SYSTEM_RESET; 312 break; 313 case BOOK3S_IRQPRIO_MACHINE_CHECK: 314 vec = BOOK3S_INTERRUPT_MACHINE_CHECK; 315 break; 316 case BOOK3S_IRQPRIO_DATA_STORAGE: 317 vec = BOOK3S_INTERRUPT_DATA_STORAGE; 318 break; 319 case BOOK3S_IRQPRIO_INST_STORAGE: 320 vec = BOOK3S_INTERRUPT_INST_STORAGE; 321 break; 322 case BOOK3S_IRQPRIO_DATA_SEGMENT: 323 vec = BOOK3S_INTERRUPT_DATA_SEGMENT; 324 break; 325 case BOOK3S_IRQPRIO_INST_SEGMENT: 326 vec = BOOK3S_INTERRUPT_INST_SEGMENT; 327 break; 328 case BOOK3S_IRQPRIO_ALIGNMENT: 329 vec = BOOK3S_INTERRUPT_ALIGNMENT; 330 break; 331 case BOOK3S_IRQPRIO_PROGRAM: 332 vec = BOOK3S_INTERRUPT_PROGRAM; 333 break; 334 case BOOK3S_IRQPRIO_VSX: 335 vec = BOOK3S_INTERRUPT_VSX; 336 break; 337 case BOOK3S_IRQPRIO_ALTIVEC: 338 vec = BOOK3S_INTERRUPT_ALTIVEC; 339 break; 340 case BOOK3S_IRQPRIO_FP_UNAVAIL: 341 vec = BOOK3S_INTERRUPT_FP_UNAVAIL; 342 break; 343 case BOOK3S_IRQPRIO_SYSCALL: 344 vec = BOOK3S_INTERRUPT_SYSCALL; 345 break; 346 case BOOK3S_IRQPRIO_DEBUG: 347 vec = BOOK3S_INTERRUPT_TRACE; 348 break; 349 case BOOK3S_IRQPRIO_PERFORMANCE_MONITOR: 350 vec = BOOK3S_INTERRUPT_PERFMON; 351 break; 352 case BOOK3S_IRQPRIO_FAC_UNAVAIL: 353 vec = BOOK3S_INTERRUPT_FAC_UNAVAIL; 354 break; 355 default: 356 deliver = 0; 357 printk(KERN_ERR "KVM: Unknown interrupt: 0x%x\n", priority); 358 break; 359 } 360 361 #if 0 362 printk(KERN_INFO "Deliver interrupt 0x%x? %x\n", vec, deliver); 363 #endif 364 365 if (deliver) 366 kvmppc_inject_interrupt(vcpu, vec, 0); 367 368 return deliver; 369 } 370 371 /* 372 * This function determines if an irqprio should be cleared once issued. 373 */ 374 static bool clear_irqprio(struct kvm_vcpu *vcpu, unsigned int priority) 375 { 376 switch (priority) { 377 case BOOK3S_IRQPRIO_DECREMENTER: 378 /* DEC interrupts get cleared by mtdec */ 379 return false; 380 case BOOK3S_IRQPRIO_EXTERNAL: 381 /* 382 * External interrupts get cleared by userspace 383 * except when set by the KVM_INTERRUPT ioctl with 384 * KVM_INTERRUPT_SET (not KVM_INTERRUPT_SET_LEVEL). 385 */ 386 if (vcpu->arch.external_oneshot) { 387 vcpu->arch.external_oneshot = 0; 388 return true; 389 } 390 return false; 391 } 392 393 return true; 394 } 395 396 int kvmppc_core_prepare_to_enter(struct kvm_vcpu *vcpu) 397 { 398 unsigned long *pending = &vcpu->arch.pending_exceptions; 399 unsigned long old_pending = vcpu->arch.pending_exceptions; 400 unsigned int priority; 401 402 #ifdef EXIT_DEBUG 403 if (vcpu->arch.pending_exceptions) 404 printk(KERN_EMERG "KVM: Check pending: %lx\n", vcpu->arch.pending_exceptions); 405 #endif 406 priority = __ffs(*pending); 407 while (priority < BOOK3S_IRQPRIO_MAX) { 408 if (kvmppc_book3s_irqprio_deliver(vcpu, priority) && 409 clear_irqprio(vcpu, priority)) { 410 clear_bit(priority, &vcpu->arch.pending_exceptions); 411 break; 412 } 413 414 priority = find_next_bit(pending, 415 BITS_PER_BYTE * sizeof(*pending), 416 priority + 1); 417 } 418 419 /* Tell the guest about our interrupt status */ 420 kvmppc_update_int_pending(vcpu, *pending, old_pending); 421 422 return 0; 423 } 424 EXPORT_SYMBOL_GPL(kvmppc_core_prepare_to_enter); 425 426 kvm_pfn_t kvmppc_gpa_to_pfn(struct kvm_vcpu *vcpu, gpa_t gpa, bool writing, 427 bool *writable) 428 { 429 ulong mp_pa = vcpu->arch.magic_page_pa & KVM_PAM; 430 gfn_t gfn = gpa >> PAGE_SHIFT; 431 432 if (!(kvmppc_get_msr(vcpu) & MSR_SF)) 433 mp_pa = (uint32_t)mp_pa; 434 435 /* Magic page override */ 436 gpa &= ~0xFFFULL; 437 if (unlikely(mp_pa) && unlikely((gpa & KVM_PAM) == mp_pa)) { 438 ulong shared_page = ((ulong)vcpu->arch.shared) & PAGE_MASK; 439 kvm_pfn_t pfn; 440 441 pfn = (kvm_pfn_t)virt_to_phys((void*)shared_page) >> PAGE_SHIFT; 442 get_page(pfn_to_page(pfn)); 443 if (writable) 444 *writable = true; 445 return pfn; 446 } 447 448 return gfn_to_pfn_prot(vcpu->kvm, gfn, writing, writable); 449 } 450 EXPORT_SYMBOL_GPL(kvmppc_gpa_to_pfn); 451 452 int kvmppc_xlate(struct kvm_vcpu *vcpu, ulong eaddr, enum xlate_instdata xlid, 453 enum xlate_readwrite xlrw, struct kvmppc_pte *pte) 454 { 455 bool data = (xlid == XLATE_DATA); 456 bool iswrite = (xlrw == XLATE_WRITE); 457 int relocated = (kvmppc_get_msr(vcpu) & (data ? MSR_DR : MSR_IR)); 458 int r; 459 460 if (relocated) { 461 r = vcpu->arch.mmu.xlate(vcpu, eaddr, pte, data, iswrite); 462 } else { 463 pte->eaddr = eaddr; 464 pte->raddr = eaddr & KVM_PAM; 465 pte->vpage = VSID_REAL | eaddr >> 12; 466 pte->may_read = true; 467 pte->may_write = true; 468 pte->may_execute = true; 469 r = 0; 470 471 if ((kvmppc_get_msr(vcpu) & (MSR_IR | MSR_DR)) == MSR_DR && 472 !data) { 473 if ((vcpu->arch.hflags & BOOK3S_HFLAG_SPLIT_HACK) && 474 ((eaddr & SPLIT_HACK_MASK) == SPLIT_HACK_OFFS)) 475 pte->raddr &= ~SPLIT_HACK_MASK; 476 } 477 } 478 479 return r; 480 } 481 482 int kvmppc_load_last_inst(struct kvm_vcpu *vcpu, 483 enum instruction_fetch_type type, u32 *inst) 484 { 485 ulong pc = kvmppc_get_pc(vcpu); 486 int r; 487 488 if (type == INST_SC) 489 pc -= 4; 490 491 r = kvmppc_ld(vcpu, &pc, sizeof(u32), inst, false); 492 if (r == EMULATE_DONE) 493 return r; 494 else 495 return EMULATE_AGAIN; 496 } 497 EXPORT_SYMBOL_GPL(kvmppc_load_last_inst); 498 499 int kvm_arch_vcpu_setup(struct kvm_vcpu *vcpu) 500 { 501 return 0; 502 } 503 504 int kvmppc_subarch_vcpu_init(struct kvm_vcpu *vcpu) 505 { 506 return 0; 507 } 508 509 void kvmppc_subarch_vcpu_uninit(struct kvm_vcpu *vcpu) 510 { 511 } 512 513 int kvm_arch_vcpu_ioctl_get_sregs(struct kvm_vcpu *vcpu, 514 struct kvm_sregs *sregs) 515 { 516 int ret; 517 518 vcpu_load(vcpu); 519 ret = vcpu->kvm->arch.kvm_ops->get_sregs(vcpu, sregs); 520 vcpu_put(vcpu); 521 522 return ret; 523 } 524 525 int kvm_arch_vcpu_ioctl_set_sregs(struct kvm_vcpu *vcpu, 526 struct kvm_sregs *sregs) 527 { 528 int ret; 529 530 vcpu_load(vcpu); 531 ret = vcpu->kvm->arch.kvm_ops->set_sregs(vcpu, sregs); 532 vcpu_put(vcpu); 533 534 return ret; 535 } 536 537 int kvm_arch_vcpu_ioctl_get_regs(struct kvm_vcpu *vcpu, struct kvm_regs *regs) 538 { 539 int i; 540 541 regs->pc = kvmppc_get_pc(vcpu); 542 regs->cr = kvmppc_get_cr(vcpu); 543 regs->ctr = kvmppc_get_ctr(vcpu); 544 regs->lr = kvmppc_get_lr(vcpu); 545 regs->xer = kvmppc_get_xer(vcpu); 546 regs->msr = kvmppc_get_msr(vcpu); 547 regs->srr0 = kvmppc_get_srr0(vcpu); 548 regs->srr1 = kvmppc_get_srr1(vcpu); 549 regs->pid = vcpu->arch.pid; 550 regs->sprg0 = kvmppc_get_sprg0(vcpu); 551 regs->sprg1 = kvmppc_get_sprg1(vcpu); 552 regs->sprg2 = kvmppc_get_sprg2(vcpu); 553 regs->sprg3 = kvmppc_get_sprg3(vcpu); 554 regs->sprg4 = kvmppc_get_sprg4(vcpu); 555 regs->sprg5 = kvmppc_get_sprg5(vcpu); 556 regs->sprg6 = kvmppc_get_sprg6(vcpu); 557 regs->sprg7 = kvmppc_get_sprg7(vcpu); 558 559 for (i = 0; i < ARRAY_SIZE(regs->gpr); i++) 560 regs->gpr[i] = kvmppc_get_gpr(vcpu, i); 561 562 return 0; 563 } 564 565 int kvm_arch_vcpu_ioctl_set_regs(struct kvm_vcpu *vcpu, struct kvm_regs *regs) 566 { 567 int i; 568 569 kvmppc_set_pc(vcpu, regs->pc); 570 kvmppc_set_cr(vcpu, regs->cr); 571 kvmppc_set_ctr(vcpu, regs->ctr); 572 kvmppc_set_lr(vcpu, regs->lr); 573 kvmppc_set_xer(vcpu, regs->xer); 574 kvmppc_set_msr(vcpu, regs->msr); 575 kvmppc_set_srr0(vcpu, regs->srr0); 576 kvmppc_set_srr1(vcpu, regs->srr1); 577 kvmppc_set_sprg0(vcpu, regs->sprg0); 578 kvmppc_set_sprg1(vcpu, regs->sprg1); 579 kvmppc_set_sprg2(vcpu, regs->sprg2); 580 kvmppc_set_sprg3(vcpu, regs->sprg3); 581 kvmppc_set_sprg4(vcpu, regs->sprg4); 582 kvmppc_set_sprg5(vcpu, regs->sprg5); 583 kvmppc_set_sprg6(vcpu, regs->sprg6); 584 kvmppc_set_sprg7(vcpu, regs->sprg7); 585 586 for (i = 0; i < ARRAY_SIZE(regs->gpr); i++) 587 kvmppc_set_gpr(vcpu, i, regs->gpr[i]); 588 589 return 0; 590 } 591 592 int kvm_arch_vcpu_ioctl_get_fpu(struct kvm_vcpu *vcpu, struct kvm_fpu *fpu) 593 { 594 return -ENOTSUPP; 595 } 596 597 int kvm_arch_vcpu_ioctl_set_fpu(struct kvm_vcpu *vcpu, struct kvm_fpu *fpu) 598 { 599 return -ENOTSUPP; 600 } 601 602 int kvmppc_get_one_reg(struct kvm_vcpu *vcpu, u64 id, 603 union kvmppc_one_reg *val) 604 { 605 int r = 0; 606 long int i; 607 608 r = vcpu->kvm->arch.kvm_ops->get_one_reg(vcpu, id, val); 609 if (r == -EINVAL) { 610 r = 0; 611 switch (id) { 612 case KVM_REG_PPC_DAR: 613 *val = get_reg_val(id, kvmppc_get_dar(vcpu)); 614 break; 615 case KVM_REG_PPC_DSISR: 616 *val = get_reg_val(id, kvmppc_get_dsisr(vcpu)); 617 break; 618 case KVM_REG_PPC_FPR0 ... KVM_REG_PPC_FPR31: 619 i = id - KVM_REG_PPC_FPR0; 620 *val = get_reg_val(id, VCPU_FPR(vcpu, i)); 621 break; 622 case KVM_REG_PPC_FPSCR: 623 *val = get_reg_val(id, vcpu->arch.fp.fpscr); 624 break; 625 #ifdef CONFIG_VSX 626 case KVM_REG_PPC_VSR0 ... KVM_REG_PPC_VSR31: 627 if (cpu_has_feature(CPU_FTR_VSX)) { 628 i = id - KVM_REG_PPC_VSR0; 629 val->vsxval[0] = vcpu->arch.fp.fpr[i][0]; 630 val->vsxval[1] = vcpu->arch.fp.fpr[i][1]; 631 } else { 632 r = -ENXIO; 633 } 634 break; 635 #endif /* CONFIG_VSX */ 636 case KVM_REG_PPC_DEBUG_INST: 637 *val = get_reg_val(id, INS_TW); 638 break; 639 #ifdef CONFIG_KVM_XICS 640 case KVM_REG_PPC_ICP_STATE: 641 if (!vcpu->arch.icp && !vcpu->arch.xive_vcpu) { 642 r = -ENXIO; 643 break; 644 } 645 if (xics_on_xive()) 646 *val = get_reg_val(id, kvmppc_xive_get_icp(vcpu)); 647 else 648 *val = get_reg_val(id, kvmppc_xics_get_icp(vcpu)); 649 break; 650 #endif /* CONFIG_KVM_XICS */ 651 #ifdef CONFIG_KVM_XIVE 652 case KVM_REG_PPC_VP_STATE: 653 if (!vcpu->arch.xive_vcpu) { 654 r = -ENXIO; 655 break; 656 } 657 if (xive_enabled()) 658 r = kvmppc_xive_native_get_vp(vcpu, val); 659 else 660 r = -ENXIO; 661 break; 662 #endif /* CONFIG_KVM_XIVE */ 663 case KVM_REG_PPC_FSCR: 664 *val = get_reg_val(id, vcpu->arch.fscr); 665 break; 666 case KVM_REG_PPC_TAR: 667 *val = get_reg_val(id, vcpu->arch.tar); 668 break; 669 case KVM_REG_PPC_EBBHR: 670 *val = get_reg_val(id, vcpu->arch.ebbhr); 671 break; 672 case KVM_REG_PPC_EBBRR: 673 *val = get_reg_val(id, vcpu->arch.ebbrr); 674 break; 675 case KVM_REG_PPC_BESCR: 676 *val = get_reg_val(id, vcpu->arch.bescr); 677 break; 678 case KVM_REG_PPC_IC: 679 *val = get_reg_val(id, vcpu->arch.ic); 680 break; 681 default: 682 r = -EINVAL; 683 break; 684 } 685 } 686 687 return r; 688 } 689 690 int kvmppc_set_one_reg(struct kvm_vcpu *vcpu, u64 id, 691 union kvmppc_one_reg *val) 692 { 693 int r = 0; 694 long int i; 695 696 r = vcpu->kvm->arch.kvm_ops->set_one_reg(vcpu, id, val); 697 if (r == -EINVAL) { 698 r = 0; 699 switch (id) { 700 case KVM_REG_PPC_DAR: 701 kvmppc_set_dar(vcpu, set_reg_val(id, *val)); 702 break; 703 case KVM_REG_PPC_DSISR: 704 kvmppc_set_dsisr(vcpu, set_reg_val(id, *val)); 705 break; 706 case KVM_REG_PPC_FPR0 ... KVM_REG_PPC_FPR31: 707 i = id - KVM_REG_PPC_FPR0; 708 VCPU_FPR(vcpu, i) = set_reg_val(id, *val); 709 break; 710 case KVM_REG_PPC_FPSCR: 711 vcpu->arch.fp.fpscr = set_reg_val(id, *val); 712 break; 713 #ifdef CONFIG_VSX 714 case KVM_REG_PPC_VSR0 ... KVM_REG_PPC_VSR31: 715 if (cpu_has_feature(CPU_FTR_VSX)) { 716 i = id - KVM_REG_PPC_VSR0; 717 vcpu->arch.fp.fpr[i][0] = val->vsxval[0]; 718 vcpu->arch.fp.fpr[i][1] = val->vsxval[1]; 719 } else { 720 r = -ENXIO; 721 } 722 break; 723 #endif /* CONFIG_VSX */ 724 #ifdef CONFIG_KVM_XICS 725 case KVM_REG_PPC_ICP_STATE: 726 if (!vcpu->arch.icp && !vcpu->arch.xive_vcpu) { 727 r = -ENXIO; 728 break; 729 } 730 if (xics_on_xive()) 731 r = kvmppc_xive_set_icp(vcpu, set_reg_val(id, *val)); 732 else 733 r = kvmppc_xics_set_icp(vcpu, set_reg_val(id, *val)); 734 break; 735 #endif /* CONFIG_KVM_XICS */ 736 #ifdef CONFIG_KVM_XIVE 737 case KVM_REG_PPC_VP_STATE: 738 if (!vcpu->arch.xive_vcpu) { 739 r = -ENXIO; 740 break; 741 } 742 if (xive_enabled()) 743 r = kvmppc_xive_native_set_vp(vcpu, val); 744 else 745 r = -ENXIO; 746 break; 747 #endif /* CONFIG_KVM_XIVE */ 748 case KVM_REG_PPC_FSCR: 749 vcpu->arch.fscr = set_reg_val(id, *val); 750 break; 751 case KVM_REG_PPC_TAR: 752 vcpu->arch.tar = set_reg_val(id, *val); 753 break; 754 case KVM_REG_PPC_EBBHR: 755 vcpu->arch.ebbhr = set_reg_val(id, *val); 756 break; 757 case KVM_REG_PPC_EBBRR: 758 vcpu->arch.ebbrr = set_reg_val(id, *val); 759 break; 760 case KVM_REG_PPC_BESCR: 761 vcpu->arch.bescr = set_reg_val(id, *val); 762 break; 763 case KVM_REG_PPC_IC: 764 vcpu->arch.ic = set_reg_val(id, *val); 765 break; 766 default: 767 r = -EINVAL; 768 break; 769 } 770 } 771 772 return r; 773 } 774 775 void kvmppc_core_vcpu_load(struct kvm_vcpu *vcpu, int cpu) 776 { 777 vcpu->kvm->arch.kvm_ops->vcpu_load(vcpu, cpu); 778 } 779 780 void kvmppc_core_vcpu_put(struct kvm_vcpu *vcpu) 781 { 782 vcpu->kvm->arch.kvm_ops->vcpu_put(vcpu); 783 } 784 785 void kvmppc_set_msr(struct kvm_vcpu *vcpu, u64 msr) 786 { 787 vcpu->kvm->arch.kvm_ops->set_msr(vcpu, msr); 788 } 789 EXPORT_SYMBOL_GPL(kvmppc_set_msr); 790 791 int kvmppc_vcpu_run(struct kvm_run *kvm_run, struct kvm_vcpu *vcpu) 792 { 793 return vcpu->kvm->arch.kvm_ops->vcpu_run(kvm_run, vcpu); 794 } 795 796 int kvm_arch_vcpu_ioctl_translate(struct kvm_vcpu *vcpu, 797 struct kvm_translation *tr) 798 { 799 return 0; 800 } 801 802 int kvm_arch_vcpu_ioctl_set_guest_debug(struct kvm_vcpu *vcpu, 803 struct kvm_guest_debug *dbg) 804 { 805 vcpu_load(vcpu); 806 vcpu->guest_debug = dbg->control; 807 vcpu_put(vcpu); 808 return 0; 809 } 810 811 void kvmppc_decrementer_func(struct kvm_vcpu *vcpu) 812 { 813 kvmppc_core_queue_dec(vcpu); 814 kvm_vcpu_kick(vcpu); 815 } 816 817 struct kvm_vcpu *kvmppc_core_vcpu_create(struct kvm *kvm, unsigned int id) 818 { 819 return kvm->arch.kvm_ops->vcpu_create(kvm, id); 820 } 821 822 void kvmppc_core_vcpu_free(struct kvm_vcpu *vcpu) 823 { 824 vcpu->kvm->arch.kvm_ops->vcpu_free(vcpu); 825 } 826 827 int kvmppc_core_check_requests(struct kvm_vcpu *vcpu) 828 { 829 return vcpu->kvm->arch.kvm_ops->check_requests(vcpu); 830 } 831 832 int kvm_vm_ioctl_get_dirty_log(struct kvm *kvm, struct kvm_dirty_log *log) 833 { 834 return kvm->arch.kvm_ops->get_dirty_log(kvm, log); 835 } 836 837 void kvmppc_core_free_memslot(struct kvm *kvm, struct kvm_memory_slot *free, 838 struct kvm_memory_slot *dont) 839 { 840 kvm->arch.kvm_ops->free_memslot(free, dont); 841 } 842 843 int kvmppc_core_create_memslot(struct kvm *kvm, struct kvm_memory_slot *slot, 844 unsigned long npages) 845 { 846 return kvm->arch.kvm_ops->create_memslot(slot, npages); 847 } 848 849 void kvmppc_core_flush_memslot(struct kvm *kvm, struct kvm_memory_slot *memslot) 850 { 851 kvm->arch.kvm_ops->flush_memslot(kvm, memslot); 852 } 853 854 int kvmppc_core_prepare_memory_region(struct kvm *kvm, 855 struct kvm_memory_slot *memslot, 856 const struct kvm_userspace_memory_region *mem) 857 { 858 return kvm->arch.kvm_ops->prepare_memory_region(kvm, memslot, mem); 859 } 860 861 void kvmppc_core_commit_memory_region(struct kvm *kvm, 862 const struct kvm_userspace_memory_region *mem, 863 const struct kvm_memory_slot *old, 864 const struct kvm_memory_slot *new, 865 enum kvm_mr_change change) 866 { 867 kvm->arch.kvm_ops->commit_memory_region(kvm, mem, old, new, change); 868 } 869 870 int kvm_unmap_hva_range(struct kvm *kvm, unsigned long start, unsigned long end) 871 { 872 return kvm->arch.kvm_ops->unmap_hva_range(kvm, start, end); 873 } 874 875 int kvm_age_hva(struct kvm *kvm, unsigned long start, unsigned long end) 876 { 877 return kvm->arch.kvm_ops->age_hva(kvm, start, end); 878 } 879 880 int kvm_test_age_hva(struct kvm *kvm, unsigned long hva) 881 { 882 return kvm->arch.kvm_ops->test_age_hva(kvm, hva); 883 } 884 885 int kvm_set_spte_hva(struct kvm *kvm, unsigned long hva, pte_t pte) 886 { 887 kvm->arch.kvm_ops->set_spte_hva(kvm, hva, pte); 888 return 0; 889 } 890 891 void kvmppc_mmu_destroy(struct kvm_vcpu *vcpu) 892 { 893 vcpu->kvm->arch.kvm_ops->mmu_destroy(vcpu); 894 } 895 896 int kvmppc_core_init_vm(struct kvm *kvm) 897 { 898 899 #ifdef CONFIG_PPC64 900 INIT_LIST_HEAD_RCU(&kvm->arch.spapr_tce_tables); 901 INIT_LIST_HEAD(&kvm->arch.rtas_tokens); 902 mutex_init(&kvm->arch.rtas_token_lock); 903 #endif 904 905 return kvm->arch.kvm_ops->init_vm(kvm); 906 } 907 908 void kvmppc_core_destroy_vm(struct kvm *kvm) 909 { 910 kvm->arch.kvm_ops->destroy_vm(kvm); 911 912 #ifdef CONFIG_PPC64 913 kvmppc_rtas_tokens_free(kvm); 914 WARN_ON(!list_empty(&kvm->arch.spapr_tce_tables)); 915 #endif 916 917 #ifdef CONFIG_KVM_XICS 918 /* 919 * Free the XIVE devices which are not directly freed by the 920 * device 'release' method 921 */ 922 kfree(kvm->arch.xive_devices.native); 923 kvm->arch.xive_devices.native = NULL; 924 kfree(kvm->arch.xive_devices.xics_on_xive); 925 kvm->arch.xive_devices.xics_on_xive = NULL; 926 #endif /* CONFIG_KVM_XICS */ 927 } 928 929 int kvmppc_h_logical_ci_load(struct kvm_vcpu *vcpu) 930 { 931 unsigned long size = kvmppc_get_gpr(vcpu, 4); 932 unsigned long addr = kvmppc_get_gpr(vcpu, 5); 933 u64 buf; 934 int srcu_idx; 935 int ret; 936 937 if (!is_power_of_2(size) || (size > sizeof(buf))) 938 return H_TOO_HARD; 939 940 srcu_idx = srcu_read_lock(&vcpu->kvm->srcu); 941 ret = kvm_io_bus_read(vcpu, KVM_MMIO_BUS, addr, size, &buf); 942 srcu_read_unlock(&vcpu->kvm->srcu, srcu_idx); 943 if (ret != 0) 944 return H_TOO_HARD; 945 946 switch (size) { 947 case 1: 948 kvmppc_set_gpr(vcpu, 4, *(u8 *)&buf); 949 break; 950 951 case 2: 952 kvmppc_set_gpr(vcpu, 4, be16_to_cpu(*(__be16 *)&buf)); 953 break; 954 955 case 4: 956 kvmppc_set_gpr(vcpu, 4, be32_to_cpu(*(__be32 *)&buf)); 957 break; 958 959 case 8: 960 kvmppc_set_gpr(vcpu, 4, be64_to_cpu(*(__be64 *)&buf)); 961 break; 962 963 default: 964 BUG(); 965 } 966 967 return H_SUCCESS; 968 } 969 EXPORT_SYMBOL_GPL(kvmppc_h_logical_ci_load); 970 971 int kvmppc_h_logical_ci_store(struct kvm_vcpu *vcpu) 972 { 973 unsigned long size = kvmppc_get_gpr(vcpu, 4); 974 unsigned long addr = kvmppc_get_gpr(vcpu, 5); 975 unsigned long val = kvmppc_get_gpr(vcpu, 6); 976 u64 buf; 977 int srcu_idx; 978 int ret; 979 980 switch (size) { 981 case 1: 982 *(u8 *)&buf = val; 983 break; 984 985 case 2: 986 *(__be16 *)&buf = cpu_to_be16(val); 987 break; 988 989 case 4: 990 *(__be32 *)&buf = cpu_to_be32(val); 991 break; 992 993 case 8: 994 *(__be64 *)&buf = cpu_to_be64(val); 995 break; 996 997 default: 998 return H_TOO_HARD; 999 } 1000 1001 srcu_idx = srcu_read_lock(&vcpu->kvm->srcu); 1002 ret = kvm_io_bus_write(vcpu, KVM_MMIO_BUS, addr, size, &buf); 1003 srcu_read_unlock(&vcpu->kvm->srcu, srcu_idx); 1004 if (ret != 0) 1005 return H_TOO_HARD; 1006 1007 return H_SUCCESS; 1008 } 1009 EXPORT_SYMBOL_GPL(kvmppc_h_logical_ci_store); 1010 1011 int kvmppc_core_check_processor_compat(void) 1012 { 1013 /* 1014 * We always return 0 for book3s. We check 1015 * for compatibility while loading the HV 1016 * or PR module 1017 */ 1018 return 0; 1019 } 1020 1021 int kvmppc_book3s_hcall_implemented(struct kvm *kvm, unsigned long hcall) 1022 { 1023 return kvm->arch.kvm_ops->hcall_implemented(hcall); 1024 } 1025 1026 #ifdef CONFIG_KVM_XICS 1027 int kvm_set_irq(struct kvm *kvm, int irq_source_id, u32 irq, int level, 1028 bool line_status) 1029 { 1030 if (xics_on_xive()) 1031 return kvmppc_xive_set_irq(kvm, irq_source_id, irq, level, 1032 line_status); 1033 else 1034 return kvmppc_xics_set_irq(kvm, irq_source_id, irq, level, 1035 line_status); 1036 } 1037 1038 int kvm_arch_set_irq_inatomic(struct kvm_kernel_irq_routing_entry *irq_entry, 1039 struct kvm *kvm, int irq_source_id, 1040 int level, bool line_status) 1041 { 1042 return kvm_set_irq(kvm, irq_source_id, irq_entry->gsi, 1043 level, line_status); 1044 } 1045 static int kvmppc_book3s_set_irq(struct kvm_kernel_irq_routing_entry *e, 1046 struct kvm *kvm, int irq_source_id, int level, 1047 bool line_status) 1048 { 1049 return kvm_set_irq(kvm, irq_source_id, e->gsi, level, line_status); 1050 } 1051 1052 int kvm_irq_map_gsi(struct kvm *kvm, 1053 struct kvm_kernel_irq_routing_entry *entries, int gsi) 1054 { 1055 entries->gsi = gsi; 1056 entries->type = KVM_IRQ_ROUTING_IRQCHIP; 1057 entries->set = kvmppc_book3s_set_irq; 1058 entries->irqchip.irqchip = 0; 1059 entries->irqchip.pin = gsi; 1060 return 1; 1061 } 1062 1063 int kvm_irq_map_chip_pin(struct kvm *kvm, unsigned irqchip, unsigned pin) 1064 { 1065 return pin; 1066 } 1067 1068 #endif /* CONFIG_KVM_XICS */ 1069 1070 static int kvmppc_book3s_init(void) 1071 { 1072 int r; 1073 1074 r = kvm_init(NULL, sizeof(struct kvm_vcpu), 0, THIS_MODULE); 1075 if (r) 1076 return r; 1077 #ifdef CONFIG_KVM_BOOK3S_32_HANDLER 1078 r = kvmppc_book3s_init_pr(); 1079 #endif 1080 1081 #ifdef CONFIG_KVM_XICS 1082 #ifdef CONFIG_KVM_XIVE 1083 if (xics_on_xive()) { 1084 kvmppc_xive_init_module(); 1085 kvm_register_device_ops(&kvm_xive_ops, KVM_DEV_TYPE_XICS); 1086 kvmppc_xive_native_init_module(); 1087 kvm_register_device_ops(&kvm_xive_native_ops, 1088 KVM_DEV_TYPE_XIVE); 1089 } else 1090 #endif 1091 kvm_register_device_ops(&kvm_xics_ops, KVM_DEV_TYPE_XICS); 1092 #endif 1093 return r; 1094 } 1095 1096 static void kvmppc_book3s_exit(void) 1097 { 1098 #ifdef CONFIG_KVM_XICS 1099 if (xics_on_xive()) { 1100 kvmppc_xive_exit_module(); 1101 kvmppc_xive_native_exit_module(); 1102 } 1103 #endif 1104 #ifdef CONFIG_KVM_BOOK3S_32_HANDLER 1105 kvmppc_book3s_exit_pr(); 1106 #endif 1107 kvm_exit(); 1108 } 1109 1110 module_init(kvmppc_book3s_init); 1111 module_exit(kvmppc_book3s_exit); 1112 1113 /* On 32bit this is our one and only kernel module */ 1114 #ifdef CONFIG_KVM_BOOK3S_32_HANDLER 1115 MODULE_ALIAS_MISCDEV(KVM_MINOR); 1116 MODULE_ALIAS("devname:kvm"); 1117 #endif 1118