1 /*
2  * Copyright (C) 2011. Freescale Inc. All rights reserved.
3  *
4  * Authors:
5  *    Alexander Graf <agraf@suse.de>
6  *    Paul Mackerras <paulus@samba.org>
7  *
8  * Description:
9  *
10  * Hypercall handling for running PAPR guests in PR KVM on Book 3S
11  * processors.
12  *
13  * This program is free software; you can redistribute it and/or modify
14  * it under the terms of the GNU General Public License, version 2, as
15  * published by the Free Software Foundation.
16  */
17 
18 #include <linux/anon_inodes.h>
19 
20 #include <linux/uaccess.h>
21 #include <asm/kvm_ppc.h>
22 #include <asm/kvm_book3s.h>
23 
24 #define HPTE_SIZE	16		/* bytes per HPT entry */
25 
26 static unsigned long get_pteg_addr(struct kvm_vcpu *vcpu, long pte_index)
27 {
28 	struct kvmppc_vcpu_book3s *vcpu_book3s = to_book3s(vcpu);
29 	unsigned long pteg_addr;
30 
31 	pte_index <<= 4;
32 	pte_index &= ((1 << ((vcpu_book3s->sdr1 & 0x1f) + 11)) - 1) << 7 | 0x70;
33 	pteg_addr = vcpu_book3s->sdr1 & 0xfffffffffffc0000ULL;
34 	pteg_addr |= pte_index;
35 
36 	return pteg_addr;
37 }
38 
39 static int kvmppc_h_pr_enter(struct kvm_vcpu *vcpu)
40 {
41 	long flags = kvmppc_get_gpr(vcpu, 4);
42 	long pte_index = kvmppc_get_gpr(vcpu, 5);
43 	__be64 pteg[2 * 8];
44 	__be64 *hpte;
45 	unsigned long pteg_addr, i;
46 	long int ret;
47 
48 	i = pte_index & 7;
49 	pte_index &= ~7UL;
50 	pteg_addr = get_pteg_addr(vcpu, pte_index);
51 
52 	mutex_lock(&vcpu->kvm->arch.hpt_mutex);
53 	copy_from_user(pteg, (void __user *)pteg_addr, sizeof(pteg));
54 	hpte = pteg;
55 
56 	ret = H_PTEG_FULL;
57 	if (likely((flags & H_EXACT) == 0)) {
58 		for (i = 0; ; ++i) {
59 			if (i == 8)
60 				goto done;
61 			if ((be64_to_cpu(*hpte) & HPTE_V_VALID) == 0)
62 				break;
63 			hpte += 2;
64 		}
65 	} else {
66 		hpte += i * 2;
67 		if (*hpte & HPTE_V_VALID)
68 			goto done;
69 	}
70 
71 	hpte[0] = cpu_to_be64(kvmppc_get_gpr(vcpu, 6));
72 	hpte[1] = cpu_to_be64(kvmppc_get_gpr(vcpu, 7));
73 	pteg_addr += i * HPTE_SIZE;
74 	copy_to_user((void __user *)pteg_addr, hpte, HPTE_SIZE);
75 	kvmppc_set_gpr(vcpu, 4, pte_index | i);
76 	ret = H_SUCCESS;
77 
78  done:
79 	mutex_unlock(&vcpu->kvm->arch.hpt_mutex);
80 	kvmppc_set_gpr(vcpu, 3, ret);
81 
82 	return EMULATE_DONE;
83 }
84 
85 static int kvmppc_h_pr_remove(struct kvm_vcpu *vcpu)
86 {
87 	unsigned long flags= kvmppc_get_gpr(vcpu, 4);
88 	unsigned long pte_index = kvmppc_get_gpr(vcpu, 5);
89 	unsigned long avpn = kvmppc_get_gpr(vcpu, 6);
90 	unsigned long v = 0, pteg, rb;
91 	unsigned long pte[2];
92 	long int ret;
93 
94 	pteg = get_pteg_addr(vcpu, pte_index);
95 	mutex_lock(&vcpu->kvm->arch.hpt_mutex);
96 	copy_from_user(pte, (void __user *)pteg, sizeof(pte));
97 	pte[0] = be64_to_cpu((__force __be64)pte[0]);
98 	pte[1] = be64_to_cpu((__force __be64)pte[1]);
99 
100 	ret = H_NOT_FOUND;
101 	if ((pte[0] & HPTE_V_VALID) == 0 ||
102 	    ((flags & H_AVPN) && (pte[0] & ~0x7fUL) != avpn) ||
103 	    ((flags & H_ANDCOND) && (pte[0] & avpn) != 0))
104 		goto done;
105 
106 	copy_to_user((void __user *)pteg, &v, sizeof(v));
107 
108 	rb = compute_tlbie_rb(pte[0], pte[1], pte_index);
109 	vcpu->arch.mmu.tlbie(vcpu, rb, rb & 1 ? true : false);
110 
111 	ret = H_SUCCESS;
112 	kvmppc_set_gpr(vcpu, 4, pte[0]);
113 	kvmppc_set_gpr(vcpu, 5, pte[1]);
114 
115  done:
116 	mutex_unlock(&vcpu->kvm->arch.hpt_mutex);
117 	kvmppc_set_gpr(vcpu, 3, ret);
118 
119 	return EMULATE_DONE;
120 }
121 
122 /* Request defs for kvmppc_h_pr_bulk_remove() */
123 #define H_BULK_REMOVE_TYPE             0xc000000000000000ULL
124 #define   H_BULK_REMOVE_REQUEST        0x4000000000000000ULL
125 #define   H_BULK_REMOVE_RESPONSE       0x8000000000000000ULL
126 #define   H_BULK_REMOVE_END            0xc000000000000000ULL
127 #define H_BULK_REMOVE_CODE             0x3000000000000000ULL
128 #define   H_BULK_REMOVE_SUCCESS        0x0000000000000000ULL
129 #define   H_BULK_REMOVE_NOT_FOUND      0x1000000000000000ULL
130 #define   H_BULK_REMOVE_PARM           0x2000000000000000ULL
131 #define   H_BULK_REMOVE_HW             0x3000000000000000ULL
132 #define H_BULK_REMOVE_RC               0x0c00000000000000ULL
133 #define H_BULK_REMOVE_FLAGS            0x0300000000000000ULL
134 #define   H_BULK_REMOVE_ABSOLUTE       0x0000000000000000ULL
135 #define   H_BULK_REMOVE_ANDCOND        0x0100000000000000ULL
136 #define   H_BULK_REMOVE_AVPN           0x0200000000000000ULL
137 #define H_BULK_REMOVE_PTEX             0x00ffffffffffffffULL
138 #define H_BULK_REMOVE_MAX_BATCH        4
139 
140 static int kvmppc_h_pr_bulk_remove(struct kvm_vcpu *vcpu)
141 {
142 	int i;
143 	int paramnr = 4;
144 	int ret = H_SUCCESS;
145 
146 	mutex_lock(&vcpu->kvm->arch.hpt_mutex);
147 	for (i = 0; i < H_BULK_REMOVE_MAX_BATCH; i++) {
148 		unsigned long tsh = kvmppc_get_gpr(vcpu, paramnr+(2*i));
149 		unsigned long tsl = kvmppc_get_gpr(vcpu, paramnr+(2*i)+1);
150 		unsigned long pteg, rb, flags;
151 		unsigned long pte[2];
152 		unsigned long v = 0;
153 
154 		if ((tsh & H_BULK_REMOVE_TYPE) == H_BULK_REMOVE_END) {
155 			break; /* Exit success */
156 		} else if ((tsh & H_BULK_REMOVE_TYPE) !=
157 			   H_BULK_REMOVE_REQUEST) {
158 			ret = H_PARAMETER;
159 			break; /* Exit fail */
160 		}
161 
162 		tsh &= H_BULK_REMOVE_PTEX | H_BULK_REMOVE_FLAGS;
163 		tsh |= H_BULK_REMOVE_RESPONSE;
164 
165 		if ((tsh & H_BULK_REMOVE_ANDCOND) &&
166 		    (tsh & H_BULK_REMOVE_AVPN)) {
167 			tsh |= H_BULK_REMOVE_PARM;
168 			kvmppc_set_gpr(vcpu, paramnr+(2*i), tsh);
169 			ret = H_PARAMETER;
170 			break; /* Exit fail */
171 		}
172 
173 		pteg = get_pteg_addr(vcpu, tsh & H_BULK_REMOVE_PTEX);
174 		copy_from_user(pte, (void __user *)pteg, sizeof(pte));
175 		pte[0] = be64_to_cpu((__force __be64)pte[0]);
176 		pte[1] = be64_to_cpu((__force __be64)pte[1]);
177 
178 		/* tsl = AVPN */
179 		flags = (tsh & H_BULK_REMOVE_FLAGS) >> 26;
180 
181 		if ((pte[0] & HPTE_V_VALID) == 0 ||
182 		    ((flags & H_AVPN) && (pte[0] & ~0x7fUL) != tsl) ||
183 		    ((flags & H_ANDCOND) && (pte[0] & tsl) != 0)) {
184 			tsh |= H_BULK_REMOVE_NOT_FOUND;
185 		} else {
186 			/* Splat the pteg in (userland) hpt */
187 			copy_to_user((void __user *)pteg, &v, sizeof(v));
188 
189 			rb = compute_tlbie_rb(pte[0], pte[1],
190 					      tsh & H_BULK_REMOVE_PTEX);
191 			vcpu->arch.mmu.tlbie(vcpu, rb, rb & 1 ? true : false);
192 			tsh |= H_BULK_REMOVE_SUCCESS;
193 			tsh |= (pte[1] & (HPTE_R_C | HPTE_R_R)) << 43;
194 		}
195 		kvmppc_set_gpr(vcpu, paramnr+(2*i), tsh);
196 	}
197 	mutex_unlock(&vcpu->kvm->arch.hpt_mutex);
198 	kvmppc_set_gpr(vcpu, 3, ret);
199 
200 	return EMULATE_DONE;
201 }
202 
203 static int kvmppc_h_pr_protect(struct kvm_vcpu *vcpu)
204 {
205 	unsigned long flags = kvmppc_get_gpr(vcpu, 4);
206 	unsigned long pte_index = kvmppc_get_gpr(vcpu, 5);
207 	unsigned long avpn = kvmppc_get_gpr(vcpu, 6);
208 	unsigned long rb, pteg, r, v;
209 	unsigned long pte[2];
210 	long int ret;
211 
212 	pteg = get_pteg_addr(vcpu, pte_index);
213 	mutex_lock(&vcpu->kvm->arch.hpt_mutex);
214 	copy_from_user(pte, (void __user *)pteg, sizeof(pte));
215 	pte[0] = be64_to_cpu((__force __be64)pte[0]);
216 	pte[1] = be64_to_cpu((__force __be64)pte[1]);
217 
218 	ret = H_NOT_FOUND;
219 	if ((pte[0] & HPTE_V_VALID) == 0 ||
220 	    ((flags & H_AVPN) && (pte[0] & ~0x7fUL) != avpn))
221 		goto done;
222 
223 	v = pte[0];
224 	r = pte[1];
225 	r &= ~(HPTE_R_PP0 | HPTE_R_PP | HPTE_R_N | HPTE_R_KEY_HI |
226 	       HPTE_R_KEY_LO);
227 	r |= (flags << 55) & HPTE_R_PP0;
228 	r |= (flags << 48) & HPTE_R_KEY_HI;
229 	r |= flags & (HPTE_R_PP | HPTE_R_N | HPTE_R_KEY_LO);
230 
231 	pte[1] = r;
232 
233 	rb = compute_tlbie_rb(v, r, pte_index);
234 	vcpu->arch.mmu.tlbie(vcpu, rb, rb & 1 ? true : false);
235 	pte[0] = (__force u64)cpu_to_be64(pte[0]);
236 	pte[1] = (__force u64)cpu_to_be64(pte[1]);
237 	copy_to_user((void __user *)pteg, pte, sizeof(pte));
238 	ret = H_SUCCESS;
239 
240  done:
241 	mutex_unlock(&vcpu->kvm->arch.hpt_mutex);
242 	kvmppc_set_gpr(vcpu, 3, ret);
243 
244 	return EMULATE_DONE;
245 }
246 
247 static int kvmppc_h_pr_put_tce(struct kvm_vcpu *vcpu)
248 {
249 	unsigned long liobn = kvmppc_get_gpr(vcpu, 4);
250 	unsigned long ioba = kvmppc_get_gpr(vcpu, 5);
251 	unsigned long tce = kvmppc_get_gpr(vcpu, 6);
252 	long rc;
253 
254 	rc = kvmppc_h_put_tce(vcpu, liobn, ioba, tce);
255 	if (rc == H_TOO_HARD)
256 		return EMULATE_FAIL;
257 	kvmppc_set_gpr(vcpu, 3, rc);
258 	return EMULATE_DONE;
259 }
260 
261 static int kvmppc_h_pr_logical_ci_load(struct kvm_vcpu *vcpu)
262 {
263 	long rc;
264 
265 	rc = kvmppc_h_logical_ci_load(vcpu);
266 	if (rc == H_TOO_HARD)
267 		return EMULATE_FAIL;
268 	kvmppc_set_gpr(vcpu, 3, rc);
269 	return EMULATE_DONE;
270 }
271 
272 static int kvmppc_h_pr_logical_ci_store(struct kvm_vcpu *vcpu)
273 {
274 	long rc;
275 
276 	rc = kvmppc_h_logical_ci_store(vcpu);
277 	if (rc == H_TOO_HARD)
278 		return EMULATE_FAIL;
279 	kvmppc_set_gpr(vcpu, 3, rc);
280 	return EMULATE_DONE;
281 }
282 
283 static int kvmppc_h_pr_put_tce_indirect(struct kvm_vcpu *vcpu)
284 {
285 	unsigned long liobn = kvmppc_get_gpr(vcpu, 4);
286 	unsigned long ioba = kvmppc_get_gpr(vcpu, 5);
287 	unsigned long tce = kvmppc_get_gpr(vcpu, 6);
288 	unsigned long npages = kvmppc_get_gpr(vcpu, 7);
289 	long rc;
290 
291 	rc = kvmppc_h_put_tce_indirect(vcpu, liobn, ioba,
292 			tce, npages);
293 	if (rc == H_TOO_HARD)
294 		return EMULATE_FAIL;
295 	kvmppc_set_gpr(vcpu, 3, rc);
296 	return EMULATE_DONE;
297 }
298 
299 static int kvmppc_h_pr_stuff_tce(struct kvm_vcpu *vcpu)
300 {
301 	unsigned long liobn = kvmppc_get_gpr(vcpu, 4);
302 	unsigned long ioba = kvmppc_get_gpr(vcpu, 5);
303 	unsigned long tce_value = kvmppc_get_gpr(vcpu, 6);
304 	unsigned long npages = kvmppc_get_gpr(vcpu, 7);
305 	long rc;
306 
307 	rc = kvmppc_h_stuff_tce(vcpu, liobn, ioba, tce_value, npages);
308 	if (rc == H_TOO_HARD)
309 		return EMULATE_FAIL;
310 	kvmppc_set_gpr(vcpu, 3, rc);
311 	return EMULATE_DONE;
312 }
313 
314 static int kvmppc_h_pr_xics_hcall(struct kvm_vcpu *vcpu, u32 cmd)
315 {
316 	long rc = kvmppc_xics_hcall(vcpu, cmd);
317 	kvmppc_set_gpr(vcpu, 3, rc);
318 	return EMULATE_DONE;
319 }
320 
321 int kvmppc_h_pr(struct kvm_vcpu *vcpu, unsigned long cmd)
322 {
323 	int rc, idx;
324 
325 	if (cmd <= MAX_HCALL_OPCODE &&
326 	    !test_bit(cmd/4, vcpu->kvm->arch.enabled_hcalls))
327 		return EMULATE_FAIL;
328 
329 	switch (cmd) {
330 	case H_ENTER:
331 		return kvmppc_h_pr_enter(vcpu);
332 	case H_REMOVE:
333 		return kvmppc_h_pr_remove(vcpu);
334 	case H_PROTECT:
335 		return kvmppc_h_pr_protect(vcpu);
336 	case H_BULK_REMOVE:
337 		return kvmppc_h_pr_bulk_remove(vcpu);
338 	case H_PUT_TCE:
339 		return kvmppc_h_pr_put_tce(vcpu);
340 	case H_PUT_TCE_INDIRECT:
341 		return kvmppc_h_pr_put_tce_indirect(vcpu);
342 	case H_STUFF_TCE:
343 		return kvmppc_h_pr_stuff_tce(vcpu);
344 	case H_CEDE:
345 		kvmppc_set_msr_fast(vcpu, kvmppc_get_msr(vcpu) | MSR_EE);
346 		kvm_vcpu_block(vcpu);
347 		clear_bit(KVM_REQ_UNHALT, &vcpu->requests);
348 		vcpu->stat.halt_wakeup++;
349 		return EMULATE_DONE;
350 	case H_LOGICAL_CI_LOAD:
351 		return kvmppc_h_pr_logical_ci_load(vcpu);
352 	case H_LOGICAL_CI_STORE:
353 		return kvmppc_h_pr_logical_ci_store(vcpu);
354 	case H_XIRR:
355 	case H_CPPR:
356 	case H_EOI:
357 	case H_IPI:
358 	case H_IPOLL:
359 	case H_XIRR_X:
360 		if (kvmppc_xics_enabled(vcpu))
361 			return kvmppc_h_pr_xics_hcall(vcpu, cmd);
362 		break;
363 	case H_RTAS:
364 		if (list_empty(&vcpu->kvm->arch.rtas_tokens))
365 			break;
366 		idx = srcu_read_lock(&vcpu->kvm->srcu);
367 		rc = kvmppc_rtas_hcall(vcpu);
368 		srcu_read_unlock(&vcpu->kvm->srcu, idx);
369 		if (rc)
370 			break;
371 		kvmppc_set_gpr(vcpu, 3, 0);
372 		return EMULATE_DONE;
373 	}
374 
375 	return EMULATE_FAIL;
376 }
377 
378 int kvmppc_hcall_impl_pr(unsigned long cmd)
379 {
380 	switch (cmd) {
381 	case H_ENTER:
382 	case H_REMOVE:
383 	case H_PROTECT:
384 	case H_BULK_REMOVE:
385 	case H_PUT_TCE:
386 	case H_CEDE:
387 	case H_LOGICAL_CI_LOAD:
388 	case H_LOGICAL_CI_STORE:
389 #ifdef CONFIG_KVM_XICS
390 	case H_XIRR:
391 	case H_CPPR:
392 	case H_EOI:
393 	case H_IPI:
394 	case H_IPOLL:
395 	case H_XIRR_X:
396 #endif
397 		return 1;
398 	}
399 	return 0;
400 }
401 
402 /*
403  * List of hcall numbers to enable by default.
404  * For compatibility with old userspace, we enable by default
405  * all hcalls that were implemented before the hcall-enabling
406  * facility was added.  Note this list should not include H_RTAS.
407  */
408 static unsigned int default_hcall_list[] = {
409 	H_ENTER,
410 	H_REMOVE,
411 	H_PROTECT,
412 	H_BULK_REMOVE,
413 	H_PUT_TCE,
414 	H_CEDE,
415 #ifdef CONFIG_KVM_XICS
416 	H_XIRR,
417 	H_CPPR,
418 	H_EOI,
419 	H_IPI,
420 	H_IPOLL,
421 	H_XIRR_X,
422 #endif
423 	0
424 };
425 
426 void kvmppc_pr_init_default_hcalls(struct kvm *kvm)
427 {
428 	int i;
429 	unsigned int hcall;
430 
431 	for (i = 0; default_hcall_list[i]; ++i) {
432 		hcall = default_hcall_list[i];
433 		WARN_ON(!kvmppc_hcall_impl_pr(hcall));
434 		__set_bit(hcall / 4, kvm->arch.enabled_hcalls);
435 	}
436 }
437