xref: /openbmc/linux/arch/powerpc/kvm/book3s_hv_tm.c (revision ed84ef1c)
1 // SPDX-License-Identifier: GPL-2.0-only
2 /*
3  * Copyright 2017 Paul Mackerras, IBM Corp. <paulus@au1.ibm.com>
4  */
5 
6 #define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
7 
8 #include <linux/kvm_host.h>
9 
10 #include <asm/kvm_ppc.h>
11 #include <asm/kvm_book3s.h>
12 #include <asm/kvm_book3s_64.h>
13 #include <asm/reg.h>
14 #include <asm/ppc-opcode.h>
15 
16 static void emulate_tx_failure(struct kvm_vcpu *vcpu, u64 failure_cause)
17 {
18 	u64 texasr, tfiar;
19 	u64 msr = vcpu->arch.shregs.msr;
20 
21 	tfiar = vcpu->arch.regs.nip & ~0x3ull;
22 	texasr = (failure_cause << 56) | TEXASR_ABORT | TEXASR_FS | TEXASR_EXACT;
23 	if (MSR_TM_SUSPENDED(vcpu->arch.shregs.msr))
24 		texasr |= TEXASR_SUSP;
25 	if (msr & MSR_PR) {
26 		texasr |= TEXASR_PR;
27 		tfiar |= 1;
28 	}
29 	vcpu->arch.tfiar = tfiar;
30 	/* Preserve ROT and TL fields of existing TEXASR */
31 	vcpu->arch.texasr = (vcpu->arch.texasr & 0x3ffffff) | texasr;
32 }
33 
34 /*
35  * This gets called on a softpatch interrupt on POWER9 DD2.2 processors.
36  * We expect to find a TM-related instruction to be emulated.  The
37  * instruction image is in vcpu->arch.emul_inst.  If the guest was in
38  * TM suspended or transactional state, the checkpointed state has been
39  * reclaimed and is in the vcpu struct.  The CPU is in virtual mode in
40  * host context.
41  */
42 int kvmhv_p9_tm_emulation(struct kvm_vcpu *vcpu)
43 {
44 	u32 instr = vcpu->arch.emul_inst;
45 	u64 msr = vcpu->arch.shregs.msr;
46 	u64 newmsr, bescr;
47 	int ra, rs;
48 
49 	/*
50 	 * The TM softpatch interrupt sets NIP to the instruction following
51 	 * the faulting instruction, which is not executed. Rewind nip to the
52 	 * faulting instruction so it looks like a normal synchronous
53 	 * interrupt, then update nip in the places where the instruction is
54 	 * emulated.
55 	 */
56 	vcpu->arch.regs.nip -= 4;
57 
58 	/*
59 	 * rfid, rfebb, and mtmsrd encode bit 31 = 0 since it's a reserved bit
60 	 * in these instructions, so masking bit 31 out doesn't change these
61 	 * instructions. For treclaim., tsr., and trechkpt. instructions if bit
62 	 * 31 = 0 then they are per ISA invalid forms, however P9 UM, in section
63 	 * 4.6.10 Book II Invalid Forms, informs specifically that ignoring bit
64 	 * 31 is an acceptable way to handle these invalid forms that have
65 	 * bit 31 = 0. Moreover, for emulation purposes both forms (w/ and wo/
66 	 * bit 31 set) can generate a softpatch interrupt. Hence both forms
67 	 * are handled below for these instructions so they behave the same way.
68 	 */
69 	switch (instr & PO_XOP_OPCODE_MASK) {
70 	case PPC_INST_RFID:
71 		/* XXX do we need to check for PR=0 here? */
72 		newmsr = vcpu->arch.shregs.srr1;
73 		/* should only get here for Sx -> T1 transition */
74 		WARN_ON_ONCE(!(MSR_TM_SUSPENDED(msr) &&
75 			       MSR_TM_TRANSACTIONAL(newmsr) &&
76 			       (newmsr & MSR_TM)));
77 		newmsr = sanitize_msr(newmsr);
78 		vcpu->arch.shregs.msr = newmsr;
79 		vcpu->arch.cfar = vcpu->arch.regs.nip;
80 		vcpu->arch.regs.nip = vcpu->arch.shregs.srr0;
81 		return RESUME_GUEST;
82 
83 	case PPC_INST_RFEBB:
84 		if ((msr & MSR_PR) && (vcpu->arch.vcore->pcr & PCR_ARCH_206)) {
85 			/* generate an illegal instruction interrupt */
86 			kvmppc_core_queue_program(vcpu, SRR1_PROGILL);
87 			return RESUME_GUEST;
88 		}
89 		/* check EBB facility is available */
90 		if (!(vcpu->arch.hfscr & HFSCR_EBB)) {
91 			vcpu->arch.hfscr &= ~HFSCR_INTR_CAUSE;
92 			vcpu->arch.hfscr |= (u64)FSCR_EBB_LG << 56;
93 			vcpu->arch.trap = BOOK3S_INTERRUPT_H_FAC_UNAVAIL;
94 			return -1; /* rerun host interrupt handler */
95 		}
96 		if ((msr & MSR_PR) && !(vcpu->arch.fscr & FSCR_EBB)) {
97 			/* generate a facility unavailable interrupt */
98 			vcpu->arch.fscr &= ~FSCR_INTR_CAUSE;
99 			vcpu->arch.fscr |= (u64)FSCR_EBB_LG << 56;
100 			kvmppc_book3s_queue_irqprio(vcpu, BOOK3S_INTERRUPT_FAC_UNAVAIL);
101 			return RESUME_GUEST;
102 		}
103 		bescr = vcpu->arch.bescr;
104 		/* expect to see a S->T transition requested */
105 		WARN_ON_ONCE(!(MSR_TM_SUSPENDED(msr) &&
106 			       ((bescr >> 30) & 3) == 2));
107 		bescr &= ~BESCR_GE;
108 		if (instr & (1 << 11))
109 			bescr |= BESCR_GE;
110 		vcpu->arch.bescr = bescr;
111 		msr = (msr & ~MSR_TS_MASK) | MSR_TS_T;
112 		vcpu->arch.shregs.msr = msr;
113 		vcpu->arch.cfar = vcpu->arch.regs.nip;
114 		vcpu->arch.regs.nip = vcpu->arch.ebbrr;
115 		return RESUME_GUEST;
116 
117 	case PPC_INST_MTMSRD:
118 		/* XXX do we need to check for PR=0 here? */
119 		rs = (instr >> 21) & 0x1f;
120 		newmsr = kvmppc_get_gpr(vcpu, rs);
121 		/* check this is a Sx -> T1 transition */
122 		WARN_ON_ONCE(!(MSR_TM_SUSPENDED(msr) &&
123 			       MSR_TM_TRANSACTIONAL(newmsr) &&
124 			       (newmsr & MSR_TM)));
125 		/* mtmsrd doesn't change LE */
126 		newmsr = (newmsr & ~MSR_LE) | (msr & MSR_LE);
127 		newmsr = sanitize_msr(newmsr);
128 		vcpu->arch.shregs.msr = newmsr;
129 		vcpu->arch.regs.nip += 4;
130 		return RESUME_GUEST;
131 
132 	/* ignore bit 31, see comment above */
133 	case (PPC_INST_TSR & PO_XOP_OPCODE_MASK):
134 		/* check for PR=1 and arch 2.06 bit set in PCR */
135 		if ((msr & MSR_PR) && (vcpu->arch.vcore->pcr & PCR_ARCH_206)) {
136 			/* generate an illegal instruction interrupt */
137 			kvmppc_core_queue_program(vcpu, SRR1_PROGILL);
138 			return RESUME_GUEST;
139 		}
140 		/* check for TM disabled in the HFSCR or MSR */
141 		if (!(vcpu->arch.hfscr & HFSCR_TM)) {
142 			vcpu->arch.hfscr &= ~HFSCR_INTR_CAUSE;
143 			vcpu->arch.hfscr |= (u64)FSCR_TM_LG << 56;
144 			vcpu->arch.trap = BOOK3S_INTERRUPT_H_FAC_UNAVAIL;
145 			return -1; /* rerun host interrupt handler */
146 		}
147 		if (!(msr & MSR_TM)) {
148 			/* generate a facility unavailable interrupt */
149 			vcpu->arch.fscr &= ~FSCR_INTR_CAUSE;
150 			vcpu->arch.fscr |= (u64)FSCR_TM_LG << 56;
151 			kvmppc_book3s_queue_irqprio(vcpu,
152 						BOOK3S_INTERRUPT_FAC_UNAVAIL);
153 			return RESUME_GUEST;
154 		}
155 		/* Set CR0 to indicate previous transactional state */
156 		vcpu->arch.regs.ccr = (vcpu->arch.regs.ccr & 0x0fffffff) |
157 			(((msr & MSR_TS_MASK) >> MSR_TS_S_LG) << 29);
158 		/* L=1 => tresume, L=0 => tsuspend */
159 		if (instr & (1 << 21)) {
160 			if (MSR_TM_SUSPENDED(msr))
161 				msr = (msr & ~MSR_TS_MASK) | MSR_TS_T;
162 		} else {
163 			if (MSR_TM_TRANSACTIONAL(msr))
164 				msr = (msr & ~MSR_TS_MASK) | MSR_TS_S;
165 		}
166 		vcpu->arch.shregs.msr = msr;
167 		vcpu->arch.regs.nip += 4;
168 		return RESUME_GUEST;
169 
170 	/* ignore bit 31, see comment above */
171 	case (PPC_INST_TRECLAIM & PO_XOP_OPCODE_MASK):
172 		/* check for TM disabled in the HFSCR or MSR */
173 		if (!(vcpu->arch.hfscr & HFSCR_TM)) {
174 			vcpu->arch.hfscr &= ~HFSCR_INTR_CAUSE;
175 			vcpu->arch.hfscr |= (u64)FSCR_TM_LG << 56;
176 			vcpu->arch.trap = BOOK3S_INTERRUPT_H_FAC_UNAVAIL;
177 			return -1; /* rerun host interrupt handler */
178 		}
179 		if (!(msr & MSR_TM)) {
180 			/* generate a facility unavailable interrupt */
181 			vcpu->arch.fscr &= ~FSCR_INTR_CAUSE;
182 			vcpu->arch.fscr |= (u64)FSCR_TM_LG << 56;
183 			kvmppc_book3s_queue_irqprio(vcpu,
184 						BOOK3S_INTERRUPT_FAC_UNAVAIL);
185 			return RESUME_GUEST;
186 		}
187 		/* If no transaction active, generate TM bad thing */
188 		if (!MSR_TM_ACTIVE(msr)) {
189 			kvmppc_core_queue_program(vcpu, SRR1_PROGTM);
190 			return RESUME_GUEST;
191 		}
192 		/* If failure was not previously recorded, recompute TEXASR */
193 		if (!(vcpu->arch.orig_texasr & TEXASR_FS)) {
194 			ra = (instr >> 16) & 0x1f;
195 			if (ra)
196 				ra = kvmppc_get_gpr(vcpu, ra) & 0xff;
197 			emulate_tx_failure(vcpu, ra);
198 		}
199 
200 		copy_from_checkpoint(vcpu);
201 
202 		/* Set CR0 to indicate previous transactional state */
203 		vcpu->arch.regs.ccr = (vcpu->arch.regs.ccr & 0x0fffffff) |
204 			(((msr & MSR_TS_MASK) >> MSR_TS_S_LG) << 29);
205 		vcpu->arch.shregs.msr &= ~MSR_TS_MASK;
206 		vcpu->arch.regs.nip += 4;
207 		return RESUME_GUEST;
208 
209 	/* ignore bit 31, see comment above */
210 	case (PPC_INST_TRECHKPT & PO_XOP_OPCODE_MASK):
211 		/* XXX do we need to check for PR=0 here? */
212 		/* check for TM disabled in the HFSCR or MSR */
213 		if (!(vcpu->arch.hfscr & HFSCR_TM)) {
214 			vcpu->arch.hfscr &= ~HFSCR_INTR_CAUSE;
215 			vcpu->arch.hfscr |= (u64)FSCR_TM_LG << 56;
216 			vcpu->arch.trap = BOOK3S_INTERRUPT_H_FAC_UNAVAIL;
217 			return -1; /* rerun host interrupt handler */
218 		}
219 		if (!(msr & MSR_TM)) {
220 			/* generate a facility unavailable interrupt */
221 			vcpu->arch.fscr &= ~FSCR_INTR_CAUSE;
222 			vcpu->arch.fscr |= (u64)FSCR_TM_LG << 56;
223 			kvmppc_book3s_queue_irqprio(vcpu,
224 						BOOK3S_INTERRUPT_FAC_UNAVAIL);
225 			return RESUME_GUEST;
226 		}
227 		/* If transaction active or TEXASR[FS] = 0, bad thing */
228 		if (MSR_TM_ACTIVE(msr) || !(vcpu->arch.texasr & TEXASR_FS)) {
229 			kvmppc_core_queue_program(vcpu, SRR1_PROGTM);
230 			return RESUME_GUEST;
231 		}
232 
233 		copy_to_checkpoint(vcpu);
234 
235 		/* Set CR0 to indicate previous transactional state */
236 		vcpu->arch.regs.ccr = (vcpu->arch.regs.ccr & 0x0fffffff) |
237 			(((msr & MSR_TS_MASK) >> MSR_TS_S_LG) << 29);
238 		vcpu->arch.shregs.msr = msr | MSR_TS_S;
239 		vcpu->arch.regs.nip += 4;
240 		return RESUME_GUEST;
241 	}
242 
243 	/* What should we do here? We didn't recognize the instruction */
244 	kvmppc_core_queue_program(vcpu, SRR1_PROGILL);
245 	pr_warn_ratelimited("Unrecognized TM-related instruction %#x for emulation", instr);
246 
247 	return RESUME_GUEST;
248 }
249