Loading...
1// SPDX-License-Identifier: GPL-2.0-only
2/*
3 * Copyright (C) 2009. SUSE Linux Products GmbH. All rights reserved.
4 *
5 * Authors:
6 * Alexander Graf <agraf@suse.de>
7 * Kevin Wolf <mail@kevin-wolf.de>
8 *
9 * Description:
10 * This file is derived from arch/powerpc/kvm/44x.c,
11 * by Hollis Blanchard <hollisb@us.ibm.com>.
12 */
13
14#include <linux/kvm_host.h>
15#include <linux/err.h>
16#include <linux/export.h>
17#include <linux/slab.h>
18#include <linux/module.h>
19#include <linux/miscdevice.h>
20#include <linux/gfp.h>
21#include <linux/sched.h>
22#include <linux/vmalloc.h>
23#include <linux/highmem.h>
24
25#include <asm/reg.h>
26#include <asm/cputable.h>
27#include <asm/cacheflush.h>
28#include <linux/uaccess.h>
29#include <asm/io.h>
30#include <asm/kvm_ppc.h>
31#include <asm/kvm_book3s.h>
32#include <asm/mmu_context.h>
33#include <asm/page.h>
34#include <asm/xive.h>
35
36#include "book3s.h"
37#include "trace.h"
38
39/* #define EXIT_DEBUG */
40
41const struct _kvm_stats_desc kvm_vm_stats_desc[] = {
42 KVM_GENERIC_VM_STATS(),
43 STATS_DESC_ICOUNTER(VM, num_2M_pages),
44 STATS_DESC_ICOUNTER(VM, num_1G_pages)
45};
46
47const struct kvm_stats_header kvm_vm_stats_header = {
48 .name_size = KVM_STATS_NAME_SIZE,
49 .num_desc = ARRAY_SIZE(kvm_vm_stats_desc),
50 .id_offset = sizeof(struct kvm_stats_header),
51 .desc_offset = sizeof(struct kvm_stats_header) + KVM_STATS_NAME_SIZE,
52 .data_offset = sizeof(struct kvm_stats_header) + KVM_STATS_NAME_SIZE +
53 sizeof(kvm_vm_stats_desc),
54};
55
56const struct _kvm_stats_desc kvm_vcpu_stats_desc[] = {
57 KVM_GENERIC_VCPU_STATS(),
58 STATS_DESC_COUNTER(VCPU, sum_exits),
59 STATS_DESC_COUNTER(VCPU, mmio_exits),
60 STATS_DESC_COUNTER(VCPU, signal_exits),
61 STATS_DESC_COUNTER(VCPU, light_exits),
62 STATS_DESC_COUNTER(VCPU, itlb_real_miss_exits),
63 STATS_DESC_COUNTER(VCPU, itlb_virt_miss_exits),
64 STATS_DESC_COUNTER(VCPU, dtlb_real_miss_exits),
65 STATS_DESC_COUNTER(VCPU, dtlb_virt_miss_exits),
66 STATS_DESC_COUNTER(VCPU, syscall_exits),
67 STATS_DESC_COUNTER(VCPU, isi_exits),
68 STATS_DESC_COUNTER(VCPU, dsi_exits),
69 STATS_DESC_COUNTER(VCPU, emulated_inst_exits),
70 STATS_DESC_COUNTER(VCPU, dec_exits),
71 STATS_DESC_COUNTER(VCPU, ext_intr_exits),
72 STATS_DESC_COUNTER(VCPU, halt_successful_wait),
73 STATS_DESC_COUNTER(VCPU, dbell_exits),
74 STATS_DESC_COUNTER(VCPU, gdbell_exits),
75 STATS_DESC_COUNTER(VCPU, ld),
76 STATS_DESC_COUNTER(VCPU, st),
77 STATS_DESC_COUNTER(VCPU, pf_storage),
78 STATS_DESC_COUNTER(VCPU, pf_instruc),
79 STATS_DESC_COUNTER(VCPU, sp_storage),
80 STATS_DESC_COUNTER(VCPU, sp_instruc),
81 STATS_DESC_COUNTER(VCPU, queue_intr),
82 STATS_DESC_COUNTER(VCPU, ld_slow),
83 STATS_DESC_COUNTER(VCPU, st_slow),
84 STATS_DESC_COUNTER(VCPU, pthru_all),
85 STATS_DESC_COUNTER(VCPU, pthru_host),
86 STATS_DESC_COUNTER(VCPU, pthru_bad_aff)
87};
88
89const struct kvm_stats_header kvm_vcpu_stats_header = {
90 .name_size = KVM_STATS_NAME_SIZE,
91 .num_desc = ARRAY_SIZE(kvm_vcpu_stats_desc),
92 .id_offset = sizeof(struct kvm_stats_header),
93 .desc_offset = sizeof(struct kvm_stats_header) + KVM_STATS_NAME_SIZE,
94 .data_offset = sizeof(struct kvm_stats_header) + KVM_STATS_NAME_SIZE +
95 sizeof(kvm_vcpu_stats_desc),
96};
97
98static inline void kvmppc_update_int_pending(struct kvm_vcpu *vcpu,
99 unsigned long pending_now, unsigned long old_pending)
100{
101 if (is_kvmppc_hv_enabled(vcpu->kvm))
102 return;
103 if (pending_now)
104 kvmppc_set_int_pending(vcpu, 1);
105 else if (old_pending)
106 kvmppc_set_int_pending(vcpu, 0);
107}
108
109static inline bool kvmppc_critical_section(struct kvm_vcpu *vcpu)
110{
111 ulong crit_raw;
112 ulong crit_r1;
113 bool crit;
114
115 if (is_kvmppc_hv_enabled(vcpu->kvm))
116 return false;
117
118 crit_raw = kvmppc_get_critical(vcpu);
119 crit_r1 = kvmppc_get_gpr(vcpu, 1);
120
121 /* Truncate crit indicators in 32 bit mode */
122 if (!(kvmppc_get_msr(vcpu) & MSR_SF)) {
123 crit_raw &= 0xffffffff;
124 crit_r1 &= 0xffffffff;
125 }
126
127 /* Critical section when crit == r1 */
128 crit = (crit_raw == crit_r1);
129 /* ... and we're in supervisor mode */
130 crit = crit && !(kvmppc_get_msr(vcpu) & MSR_PR);
131
132 return crit;
133}
134
135void kvmppc_inject_interrupt(struct kvm_vcpu *vcpu, int vec, u64 flags)
136{
137 vcpu->kvm->arch.kvm_ops->inject_interrupt(vcpu, vec, flags);
138}
139
140static int kvmppc_book3s_vec2irqprio(unsigned int vec)
141{
142 unsigned int prio;
143
144 switch (vec) {
145 case 0x100: prio = BOOK3S_IRQPRIO_SYSTEM_RESET; break;
146 case 0x200: prio = BOOK3S_IRQPRIO_MACHINE_CHECK; break;
147 case 0x300: prio = BOOK3S_IRQPRIO_DATA_STORAGE; break;
148 case 0x380: prio = BOOK3S_IRQPRIO_DATA_SEGMENT; break;
149 case 0x400: prio = BOOK3S_IRQPRIO_INST_STORAGE; break;
150 case 0x480: prio = BOOK3S_IRQPRIO_INST_SEGMENT; break;
151 case 0x500: prio = BOOK3S_IRQPRIO_EXTERNAL; break;
152 case 0x600: prio = BOOK3S_IRQPRIO_ALIGNMENT; break;
153 case 0x700: prio = BOOK3S_IRQPRIO_PROGRAM; break;
154 case 0x800: prio = BOOK3S_IRQPRIO_FP_UNAVAIL; break;
155 case 0x900: prio = BOOK3S_IRQPRIO_DECREMENTER; break;
156 case 0xc00: prio = BOOK3S_IRQPRIO_SYSCALL; break;
157 case 0xd00: prio = BOOK3S_IRQPRIO_DEBUG; break;
158 case 0xf20: prio = BOOK3S_IRQPRIO_ALTIVEC; break;
159 case 0xf40: prio = BOOK3S_IRQPRIO_VSX; break;
160 case 0xf60: prio = BOOK3S_IRQPRIO_FAC_UNAVAIL; break;
161 default: prio = BOOK3S_IRQPRIO_MAX; break;
162 }
163
164 return prio;
165}
166
167void kvmppc_book3s_dequeue_irqprio(struct kvm_vcpu *vcpu,
168 unsigned int vec)
169{
170 unsigned long old_pending = vcpu->arch.pending_exceptions;
171
172 clear_bit(kvmppc_book3s_vec2irqprio(vec),
173 &vcpu->arch.pending_exceptions);
174
175 kvmppc_update_int_pending(vcpu, vcpu->arch.pending_exceptions,
176 old_pending);
177}
178
179void kvmppc_book3s_queue_irqprio(struct kvm_vcpu *vcpu, unsigned int vec)
180{
181 vcpu->stat.queue_intr++;
182
183 set_bit(kvmppc_book3s_vec2irqprio(vec),
184 &vcpu->arch.pending_exceptions);
185#ifdef EXIT_DEBUG
186 printk(KERN_INFO "Queueing interrupt %x\n", vec);
187#endif
188}
189EXPORT_SYMBOL_GPL(kvmppc_book3s_queue_irqprio);
190
191void kvmppc_core_queue_machine_check(struct kvm_vcpu *vcpu, ulong srr1_flags)
192{
193 /* might as well deliver this straight away */
194 kvmppc_inject_interrupt(vcpu, BOOK3S_INTERRUPT_MACHINE_CHECK, srr1_flags);
195}
196EXPORT_SYMBOL_GPL(kvmppc_core_queue_machine_check);
197
198void kvmppc_core_queue_syscall(struct kvm_vcpu *vcpu)
199{
200 kvmppc_inject_interrupt(vcpu, BOOK3S_INTERRUPT_SYSCALL, 0);
201}
202EXPORT_SYMBOL(kvmppc_core_queue_syscall);
203
204void kvmppc_core_queue_program(struct kvm_vcpu *vcpu, ulong srr1_flags)
205{
206 /* might as well deliver this straight away */
207 kvmppc_inject_interrupt(vcpu, BOOK3S_INTERRUPT_PROGRAM, srr1_flags);
208}
209EXPORT_SYMBOL_GPL(kvmppc_core_queue_program);
210
211void kvmppc_core_queue_fpunavail(struct kvm_vcpu *vcpu, ulong srr1_flags)
212{
213 /* might as well deliver this straight away */
214 kvmppc_inject_interrupt(vcpu, BOOK3S_INTERRUPT_FP_UNAVAIL, srr1_flags);
215}
216
217void kvmppc_core_queue_vec_unavail(struct kvm_vcpu *vcpu, ulong srr1_flags)
218{
219 /* might as well deliver this straight away */
220 kvmppc_inject_interrupt(vcpu, BOOK3S_INTERRUPT_ALTIVEC, srr1_flags);
221}
222
223void kvmppc_core_queue_vsx_unavail(struct kvm_vcpu *vcpu, ulong srr1_flags)
224{
225 /* might as well deliver this straight away */
226 kvmppc_inject_interrupt(vcpu, BOOK3S_INTERRUPT_VSX, srr1_flags);
227}
228
229void kvmppc_core_queue_dec(struct kvm_vcpu *vcpu)
230{
231 kvmppc_book3s_queue_irqprio(vcpu, BOOK3S_INTERRUPT_DECREMENTER);
232}
233EXPORT_SYMBOL_GPL(kvmppc_core_queue_dec);
234
235int kvmppc_core_pending_dec(struct kvm_vcpu *vcpu)
236{
237 return test_bit(BOOK3S_IRQPRIO_DECREMENTER, &vcpu->arch.pending_exceptions);
238}
239EXPORT_SYMBOL_GPL(kvmppc_core_pending_dec);
240
241void kvmppc_core_dequeue_dec(struct kvm_vcpu *vcpu)
242{
243 kvmppc_book3s_dequeue_irqprio(vcpu, BOOK3S_INTERRUPT_DECREMENTER);
244}
245EXPORT_SYMBOL_GPL(kvmppc_core_dequeue_dec);
246
247void kvmppc_core_queue_external(struct kvm_vcpu *vcpu,
248 struct kvm_interrupt *irq)
249{
250 /*
251 * This case (KVM_INTERRUPT_SET) should never actually arise for
252 * a pseries guest (because pseries guests expect their interrupt
253 * controllers to continue asserting an external interrupt request
254 * until it is acknowledged at the interrupt controller), but is
255 * included to avoid ABI breakage and potentially for other
256 * sorts of guest.
257 *
258 * There is a subtlety here: HV KVM does not test the
259 * external_oneshot flag in the code that synthesizes
260 * external interrupts for the guest just before entering
261 * the guest. That is OK even if userspace did do a
262 * KVM_INTERRUPT_SET on a pseries guest vcpu, because the
263 * caller (kvm_vcpu_ioctl_interrupt) does a kvm_vcpu_kick()
264 * which ends up doing a smp_send_reschedule(), which will
265 * pull the guest all the way out to the host, meaning that
266 * we will call kvmppc_core_prepare_to_enter() before entering
267 * the guest again, and that will handle the external_oneshot
268 * flag correctly.
269 */
270 if (irq->irq == KVM_INTERRUPT_SET)
271 vcpu->arch.external_oneshot = 1;
272
273 kvmppc_book3s_queue_irqprio(vcpu, BOOK3S_INTERRUPT_EXTERNAL);
274}
275
276void kvmppc_core_dequeue_external(struct kvm_vcpu *vcpu)
277{
278 kvmppc_book3s_dequeue_irqprio(vcpu, BOOK3S_INTERRUPT_EXTERNAL);
279}
280
281void kvmppc_core_queue_data_storage(struct kvm_vcpu *vcpu, ulong srr1_flags,
282 ulong dar, ulong dsisr)
283{
284 kvmppc_set_dar(vcpu, dar);
285 kvmppc_set_dsisr(vcpu, dsisr);
286 kvmppc_inject_interrupt(vcpu, BOOK3S_INTERRUPT_DATA_STORAGE, srr1_flags);
287}
288EXPORT_SYMBOL_GPL(kvmppc_core_queue_data_storage);
289
290void kvmppc_core_queue_inst_storage(struct kvm_vcpu *vcpu, ulong srr1_flags)
291{
292 kvmppc_inject_interrupt(vcpu, BOOK3S_INTERRUPT_INST_STORAGE, srr1_flags);
293}
294EXPORT_SYMBOL_GPL(kvmppc_core_queue_inst_storage);
295
296static int kvmppc_book3s_irqprio_deliver(struct kvm_vcpu *vcpu,
297 unsigned int priority)
298{
299 int deliver = 1;
300 int vec = 0;
301 bool crit = kvmppc_critical_section(vcpu);
302
303 switch (priority) {
304 case BOOK3S_IRQPRIO_DECREMENTER:
305 deliver = !kvmhv_is_nestedv2() && (kvmppc_get_msr(vcpu) & MSR_EE) && !crit;
306 vec = BOOK3S_INTERRUPT_DECREMENTER;
307 break;
308 case BOOK3S_IRQPRIO_EXTERNAL:
309 deliver = !kvmhv_is_nestedv2() && (kvmppc_get_msr(vcpu) & MSR_EE) && !crit;
310 vec = BOOK3S_INTERRUPT_EXTERNAL;
311 break;
312 case BOOK3S_IRQPRIO_SYSTEM_RESET:
313 vec = BOOK3S_INTERRUPT_SYSTEM_RESET;
314 break;
315 case BOOK3S_IRQPRIO_MACHINE_CHECK:
316 vec = BOOK3S_INTERRUPT_MACHINE_CHECK;
317 break;
318 case BOOK3S_IRQPRIO_DATA_STORAGE:
319 vec = BOOK3S_INTERRUPT_DATA_STORAGE;
320 break;
321 case BOOK3S_IRQPRIO_INST_STORAGE:
322 vec = BOOK3S_INTERRUPT_INST_STORAGE;
323 break;
324 case BOOK3S_IRQPRIO_DATA_SEGMENT:
325 vec = BOOK3S_INTERRUPT_DATA_SEGMENT;
326 break;
327 case BOOK3S_IRQPRIO_INST_SEGMENT:
328 vec = BOOK3S_INTERRUPT_INST_SEGMENT;
329 break;
330 case BOOK3S_IRQPRIO_ALIGNMENT:
331 vec = BOOK3S_INTERRUPT_ALIGNMENT;
332 break;
333 case BOOK3S_IRQPRIO_PROGRAM:
334 vec = BOOK3S_INTERRUPT_PROGRAM;
335 break;
336 case BOOK3S_IRQPRIO_VSX:
337 vec = BOOK3S_INTERRUPT_VSX;
338 break;
339 case BOOK3S_IRQPRIO_ALTIVEC:
340 vec = BOOK3S_INTERRUPT_ALTIVEC;
341 break;
342 case BOOK3S_IRQPRIO_FP_UNAVAIL:
343 vec = BOOK3S_INTERRUPT_FP_UNAVAIL;
344 break;
345 case BOOK3S_IRQPRIO_SYSCALL:
346 vec = BOOK3S_INTERRUPT_SYSCALL;
347 break;
348 case BOOK3S_IRQPRIO_DEBUG:
349 vec = BOOK3S_INTERRUPT_TRACE;
350 break;
351 case BOOK3S_IRQPRIO_PERFORMANCE_MONITOR:
352 vec = BOOK3S_INTERRUPT_PERFMON;
353 break;
354 case BOOK3S_IRQPRIO_FAC_UNAVAIL:
355 vec = BOOK3S_INTERRUPT_FAC_UNAVAIL;
356 break;
357 default:
358 deliver = 0;
359 printk(KERN_ERR "KVM: Unknown interrupt: 0x%x\n", priority);
360 break;
361 }
362
363#if 0
364 printk(KERN_INFO "Deliver interrupt 0x%x? %x\n", vec, deliver);
365#endif
366
367 if (deliver)
368 kvmppc_inject_interrupt(vcpu, vec, 0);
369
370 return deliver;
371}
372
373/*
374 * This function determines if an irqprio should be cleared once issued.
375 */
376static bool clear_irqprio(struct kvm_vcpu *vcpu, unsigned int priority)
377{
378 switch (priority) {
379 case BOOK3S_IRQPRIO_DECREMENTER:
380 /* DEC interrupts get cleared by mtdec */
381 return false;
382 case BOOK3S_IRQPRIO_EXTERNAL:
383 /*
384 * External interrupts get cleared by userspace
385 * except when set by the KVM_INTERRUPT ioctl with
386 * KVM_INTERRUPT_SET (not KVM_INTERRUPT_SET_LEVEL).
387 */
388 if (vcpu->arch.external_oneshot) {
389 vcpu->arch.external_oneshot = 0;
390 return true;
391 }
392 return false;
393 }
394
395 return true;
396}
397
398int kvmppc_core_prepare_to_enter(struct kvm_vcpu *vcpu)
399{
400 unsigned long *pending = &vcpu->arch.pending_exceptions;
401 unsigned long old_pending = vcpu->arch.pending_exceptions;
402 unsigned int priority;
403
404#ifdef EXIT_DEBUG
405 if (vcpu->arch.pending_exceptions)
406 printk(KERN_EMERG "KVM: Check pending: %lx\n", vcpu->arch.pending_exceptions);
407#endif
408 priority = __ffs(*pending);
409 while (priority < BOOK3S_IRQPRIO_MAX) {
410 if (kvmppc_book3s_irqprio_deliver(vcpu, priority) &&
411 clear_irqprio(vcpu, priority)) {
412 clear_bit(priority, &vcpu->arch.pending_exceptions);
413 break;
414 }
415
416 priority = find_next_bit(pending,
417 BITS_PER_BYTE * sizeof(*pending),
418 priority + 1);
419 }
420
421 /* Tell the guest about our interrupt status */
422 kvmppc_update_int_pending(vcpu, *pending, old_pending);
423
424 return 0;
425}
426EXPORT_SYMBOL_GPL(kvmppc_core_prepare_to_enter);
427
428kvm_pfn_t kvmppc_gpa_to_pfn(struct kvm_vcpu *vcpu, gpa_t gpa, bool writing,
429 bool *writable)
430{
431 ulong mp_pa = vcpu->arch.magic_page_pa & KVM_PAM;
432 gfn_t gfn = gpa >> PAGE_SHIFT;
433
434 if (!(kvmppc_get_msr(vcpu) & MSR_SF))
435 mp_pa = (uint32_t)mp_pa;
436
437 /* Magic page override */
438 gpa &= ~0xFFFULL;
439 if (unlikely(mp_pa) && unlikely((gpa & KVM_PAM) == mp_pa)) {
440 ulong shared_page = ((ulong)vcpu->arch.shared) & PAGE_MASK;
441 kvm_pfn_t pfn;
442
443 pfn = (kvm_pfn_t)virt_to_phys((void*)shared_page) >> PAGE_SHIFT;
444 get_page(pfn_to_page(pfn));
445 if (writable)
446 *writable = true;
447 return pfn;
448 }
449
450 return gfn_to_pfn_prot(vcpu->kvm, gfn, writing, writable);
451}
452EXPORT_SYMBOL_GPL(kvmppc_gpa_to_pfn);
453
454int kvmppc_xlate(struct kvm_vcpu *vcpu, ulong eaddr, enum xlate_instdata xlid,
455 enum xlate_readwrite xlrw, struct kvmppc_pte *pte)
456{
457 bool data = (xlid == XLATE_DATA);
458 bool iswrite = (xlrw == XLATE_WRITE);
459 int relocated = (kvmppc_get_msr(vcpu) & (data ? MSR_DR : MSR_IR));
460 int r;
461
462 if (relocated) {
463 r = vcpu->arch.mmu.xlate(vcpu, eaddr, pte, data, iswrite);
464 } else {
465 pte->eaddr = eaddr;
466 pte->raddr = eaddr & KVM_PAM;
467 pte->vpage = VSID_REAL | eaddr >> 12;
468 pte->may_read = true;
469 pte->may_write = true;
470 pte->may_execute = true;
471 r = 0;
472
473 if ((kvmppc_get_msr(vcpu) & (MSR_IR | MSR_DR)) == MSR_DR &&
474 !data) {
475 if ((vcpu->arch.hflags & BOOK3S_HFLAG_SPLIT_HACK) &&
476 ((eaddr & SPLIT_HACK_MASK) == SPLIT_HACK_OFFS))
477 pte->raddr &= ~SPLIT_HACK_MASK;
478 }
479 }
480
481 return r;
482}
483
484/*
485 * Returns prefixed instructions with the prefix in the high 32 bits
486 * of *inst and suffix in the low 32 bits. This is the same convention
487 * as used in HEIR, vcpu->arch.last_inst and vcpu->arch.emul_inst.
488 * Like vcpu->arch.last_inst but unlike vcpu->arch.emul_inst, each
489 * half of the value needs byte-swapping if the guest endianness is
490 * different from the host endianness.
491 */
492int kvmppc_load_last_inst(struct kvm_vcpu *vcpu,
493 enum instruction_fetch_type type, unsigned long *inst)
494{
495 ulong pc = kvmppc_get_pc(vcpu);
496 int r;
497 u32 iw;
498
499 if (type == INST_SC)
500 pc -= 4;
501
502 r = kvmppc_ld(vcpu, &pc, sizeof(u32), &iw, false);
503 if (r != EMULATE_DONE)
504 return EMULATE_AGAIN;
505 /*
506 * If [H]SRR1 indicates that the instruction that caused the
507 * current interrupt is a prefixed instruction, get the suffix.
508 */
509 if (kvmppc_get_msr(vcpu) & SRR1_PREFIXED) {
510 u32 suffix;
511 pc += 4;
512 r = kvmppc_ld(vcpu, &pc, sizeof(u32), &suffix, false);
513 if (r != EMULATE_DONE)
514 return EMULATE_AGAIN;
515 *inst = ((u64)iw << 32) | suffix;
516 } else {
517 *inst = iw;
518 }
519 return r;
520}
521EXPORT_SYMBOL_GPL(kvmppc_load_last_inst);
522
523int kvmppc_subarch_vcpu_init(struct kvm_vcpu *vcpu)
524{
525 return 0;
526}
527
528void kvmppc_subarch_vcpu_uninit(struct kvm_vcpu *vcpu)
529{
530}
531
532int kvm_arch_vcpu_ioctl_get_sregs(struct kvm_vcpu *vcpu,
533 struct kvm_sregs *sregs)
534{
535 int ret;
536
537 vcpu_load(vcpu);
538 ret = vcpu->kvm->arch.kvm_ops->get_sregs(vcpu, sregs);
539 vcpu_put(vcpu);
540
541 return ret;
542}
543
544int kvm_arch_vcpu_ioctl_set_sregs(struct kvm_vcpu *vcpu,
545 struct kvm_sregs *sregs)
546{
547 int ret;
548
549 vcpu_load(vcpu);
550 ret = vcpu->kvm->arch.kvm_ops->set_sregs(vcpu, sregs);
551 vcpu_put(vcpu);
552
553 return ret;
554}
555
556int kvm_arch_vcpu_ioctl_get_regs(struct kvm_vcpu *vcpu, struct kvm_regs *regs)
557{
558 int i;
559
560 regs->pc = kvmppc_get_pc(vcpu);
561 regs->cr = kvmppc_get_cr(vcpu);
562 regs->ctr = kvmppc_get_ctr(vcpu);
563 regs->lr = kvmppc_get_lr(vcpu);
564 regs->xer = kvmppc_get_xer(vcpu);
565 regs->msr = kvmppc_get_msr(vcpu);
566 regs->srr0 = kvmppc_get_srr0(vcpu);
567 regs->srr1 = kvmppc_get_srr1(vcpu);
568 regs->pid = kvmppc_get_pid(vcpu);
569 regs->sprg0 = kvmppc_get_sprg0(vcpu);
570 regs->sprg1 = kvmppc_get_sprg1(vcpu);
571 regs->sprg2 = kvmppc_get_sprg2(vcpu);
572 regs->sprg3 = kvmppc_get_sprg3(vcpu);
573 regs->sprg4 = kvmppc_get_sprg4(vcpu);
574 regs->sprg5 = kvmppc_get_sprg5(vcpu);
575 regs->sprg6 = kvmppc_get_sprg6(vcpu);
576 regs->sprg7 = kvmppc_get_sprg7(vcpu);
577
578 for (i = 0; i < ARRAY_SIZE(regs->gpr); i++)
579 regs->gpr[i] = kvmppc_get_gpr(vcpu, i);
580
581 return 0;
582}
583
584int kvm_arch_vcpu_ioctl_set_regs(struct kvm_vcpu *vcpu, struct kvm_regs *regs)
585{
586 int i;
587
588 kvmppc_set_pc(vcpu, regs->pc);
589 kvmppc_set_cr(vcpu, regs->cr);
590 kvmppc_set_ctr(vcpu, regs->ctr);
591 kvmppc_set_lr(vcpu, regs->lr);
592 kvmppc_set_xer(vcpu, regs->xer);
593 kvmppc_set_msr(vcpu, regs->msr);
594 kvmppc_set_srr0(vcpu, regs->srr0);
595 kvmppc_set_srr1(vcpu, regs->srr1);
596 kvmppc_set_sprg0(vcpu, regs->sprg0);
597 kvmppc_set_sprg1(vcpu, regs->sprg1);
598 kvmppc_set_sprg2(vcpu, regs->sprg2);
599 kvmppc_set_sprg3(vcpu, regs->sprg3);
600 kvmppc_set_sprg4(vcpu, regs->sprg4);
601 kvmppc_set_sprg5(vcpu, regs->sprg5);
602 kvmppc_set_sprg6(vcpu, regs->sprg6);
603 kvmppc_set_sprg7(vcpu, regs->sprg7);
604
605 for (i = 0; i < ARRAY_SIZE(regs->gpr); i++)
606 kvmppc_set_gpr(vcpu, i, regs->gpr[i]);
607
608 return 0;
609}
610
611int kvm_arch_vcpu_ioctl_get_fpu(struct kvm_vcpu *vcpu, struct kvm_fpu *fpu)
612{
613 return -EOPNOTSUPP;
614}
615
616int kvm_arch_vcpu_ioctl_set_fpu(struct kvm_vcpu *vcpu, struct kvm_fpu *fpu)
617{
618 return -EOPNOTSUPP;
619}
620
621int kvmppc_get_one_reg(struct kvm_vcpu *vcpu, u64 id,
622 union kvmppc_one_reg *val)
623{
624 int r = 0;
625 long int i;
626
627 r = vcpu->kvm->arch.kvm_ops->get_one_reg(vcpu, id, val);
628 if (r == -EINVAL) {
629 r = 0;
630 switch (id) {
631 case KVM_REG_PPC_DAR:
632 *val = get_reg_val(id, kvmppc_get_dar(vcpu));
633 break;
634 case KVM_REG_PPC_DSISR:
635 *val = get_reg_val(id, kvmppc_get_dsisr(vcpu));
636 break;
637 case KVM_REG_PPC_FPR0 ... KVM_REG_PPC_FPR31:
638 i = id - KVM_REG_PPC_FPR0;
639 *val = get_reg_val(id, kvmppc_get_fpr(vcpu, i));
640 break;
641 case KVM_REG_PPC_FPSCR:
642 *val = get_reg_val(id, kvmppc_get_fpscr(vcpu));
643 break;
644#ifdef CONFIG_VSX
645 case KVM_REG_PPC_VSR0 ... KVM_REG_PPC_VSR31:
646 if (cpu_has_feature(CPU_FTR_VSX)) {
647 i = id - KVM_REG_PPC_VSR0;
648 val->vsxval[0] = kvmppc_get_vsx_fpr(vcpu, i, 0);
649 val->vsxval[1] = kvmppc_get_vsx_fpr(vcpu, i, 1);
650 } else {
651 r = -ENXIO;
652 }
653 break;
654#endif /* CONFIG_VSX */
655 case KVM_REG_PPC_DEBUG_INST:
656 *val = get_reg_val(id, INS_TW);
657 break;
658#ifdef CONFIG_KVM_XICS
659 case KVM_REG_PPC_ICP_STATE:
660 if (!vcpu->arch.icp && !vcpu->arch.xive_vcpu) {
661 r = -ENXIO;
662 break;
663 }
664 if (xics_on_xive())
665 *val = get_reg_val(id, kvmppc_xive_get_icp(vcpu));
666 else
667 *val = get_reg_val(id, kvmppc_xics_get_icp(vcpu));
668 break;
669#endif /* CONFIG_KVM_XICS */
670#ifdef CONFIG_KVM_XIVE
671 case KVM_REG_PPC_VP_STATE:
672 if (!vcpu->arch.xive_vcpu) {
673 r = -ENXIO;
674 break;
675 }
676 if (xive_enabled())
677 r = kvmppc_xive_native_get_vp(vcpu, val);
678 else
679 r = -ENXIO;
680 break;
681#endif /* CONFIG_KVM_XIVE */
682 case KVM_REG_PPC_FSCR:
683 *val = get_reg_val(id, vcpu->arch.fscr);
684 break;
685 case KVM_REG_PPC_TAR:
686 *val = get_reg_val(id, kvmppc_get_tar(vcpu));
687 break;
688 case KVM_REG_PPC_EBBHR:
689 *val = get_reg_val(id, kvmppc_get_ebbhr(vcpu));
690 break;
691 case KVM_REG_PPC_EBBRR:
692 *val = get_reg_val(id, kvmppc_get_ebbrr(vcpu));
693 break;
694 case KVM_REG_PPC_BESCR:
695 *val = get_reg_val(id, kvmppc_get_bescr(vcpu));
696 break;
697 case KVM_REG_PPC_IC:
698 *val = get_reg_val(id, kvmppc_get_ic(vcpu));
699 break;
700 default:
701 r = -EINVAL;
702 break;
703 }
704 }
705
706 return r;
707}
708
709int kvmppc_set_one_reg(struct kvm_vcpu *vcpu, u64 id,
710 union kvmppc_one_reg *val)
711{
712 int r = 0;
713 long int i;
714
715 r = vcpu->kvm->arch.kvm_ops->set_one_reg(vcpu, id, val);
716 if (r == -EINVAL) {
717 r = 0;
718 switch (id) {
719 case KVM_REG_PPC_DAR:
720 kvmppc_set_dar(vcpu, set_reg_val(id, *val));
721 break;
722 case KVM_REG_PPC_DSISR:
723 kvmppc_set_dsisr(vcpu, set_reg_val(id, *val));
724 break;
725 case KVM_REG_PPC_FPR0 ... KVM_REG_PPC_FPR31:
726 i = id - KVM_REG_PPC_FPR0;
727 kvmppc_set_fpr(vcpu, i, set_reg_val(id, *val));
728 break;
729 case KVM_REG_PPC_FPSCR:
730 vcpu->arch.fp.fpscr = set_reg_val(id, *val);
731 break;
732#ifdef CONFIG_VSX
733 case KVM_REG_PPC_VSR0 ... KVM_REG_PPC_VSR31:
734 if (cpu_has_feature(CPU_FTR_VSX)) {
735 i = id - KVM_REG_PPC_VSR0;
736 kvmppc_set_vsx_fpr(vcpu, i, 0, val->vsxval[0]);
737 kvmppc_set_vsx_fpr(vcpu, i, 1, val->vsxval[1]);
738 } else {
739 r = -ENXIO;
740 }
741 break;
742#endif /* CONFIG_VSX */
743#ifdef CONFIG_KVM_XICS
744 case KVM_REG_PPC_ICP_STATE:
745 if (!vcpu->arch.icp && !vcpu->arch.xive_vcpu) {
746 r = -ENXIO;
747 break;
748 }
749 if (xics_on_xive())
750 r = kvmppc_xive_set_icp(vcpu, set_reg_val(id, *val));
751 else
752 r = kvmppc_xics_set_icp(vcpu, set_reg_val(id, *val));
753 break;
754#endif /* CONFIG_KVM_XICS */
755#ifdef CONFIG_KVM_XIVE
756 case KVM_REG_PPC_VP_STATE:
757 if (!vcpu->arch.xive_vcpu) {
758 r = -ENXIO;
759 break;
760 }
761 if (xive_enabled())
762 r = kvmppc_xive_native_set_vp(vcpu, val);
763 else
764 r = -ENXIO;
765 break;
766#endif /* CONFIG_KVM_XIVE */
767 case KVM_REG_PPC_FSCR:
768 kvmppc_set_fpscr(vcpu, set_reg_val(id, *val));
769 break;
770 case KVM_REG_PPC_TAR:
771 kvmppc_set_tar(vcpu, set_reg_val(id, *val));
772 break;
773 case KVM_REG_PPC_EBBHR:
774 kvmppc_set_ebbhr(vcpu, set_reg_val(id, *val));
775 break;
776 case KVM_REG_PPC_EBBRR:
777 kvmppc_set_ebbrr(vcpu, set_reg_val(id, *val));
778 break;
779 case KVM_REG_PPC_BESCR:
780 kvmppc_set_bescr(vcpu, set_reg_val(id, *val));
781 break;
782 case KVM_REG_PPC_IC:
783 kvmppc_set_ic(vcpu, set_reg_val(id, *val));
784 break;
785 default:
786 r = -EINVAL;
787 break;
788 }
789 }
790
791 return r;
792}
793
794void kvmppc_core_vcpu_load(struct kvm_vcpu *vcpu, int cpu)
795{
796 vcpu->kvm->arch.kvm_ops->vcpu_load(vcpu, cpu);
797}
798
799void kvmppc_core_vcpu_put(struct kvm_vcpu *vcpu)
800{
801 vcpu->kvm->arch.kvm_ops->vcpu_put(vcpu);
802}
803
804void kvmppc_set_msr(struct kvm_vcpu *vcpu, u64 msr)
805{
806 vcpu->kvm->arch.kvm_ops->set_msr(vcpu, msr);
807}
808EXPORT_SYMBOL_GPL(kvmppc_set_msr);
809
810int kvmppc_vcpu_run(struct kvm_vcpu *vcpu)
811{
812 return vcpu->kvm->arch.kvm_ops->vcpu_run(vcpu);
813}
814
815int kvm_arch_vcpu_ioctl_translate(struct kvm_vcpu *vcpu,
816 struct kvm_translation *tr)
817{
818 return 0;
819}
820
821int kvm_arch_vcpu_ioctl_set_guest_debug(struct kvm_vcpu *vcpu,
822 struct kvm_guest_debug *dbg)
823{
824 vcpu_load(vcpu);
825 vcpu->guest_debug = dbg->control;
826 vcpu_put(vcpu);
827 return 0;
828}
829
830void kvmppc_decrementer_func(struct kvm_vcpu *vcpu)
831{
832 kvmppc_core_queue_dec(vcpu);
833 kvm_vcpu_kick(vcpu);
834}
835
836int kvmppc_core_vcpu_create(struct kvm_vcpu *vcpu)
837{
838 return vcpu->kvm->arch.kvm_ops->vcpu_create(vcpu);
839}
840
841void kvmppc_core_vcpu_free(struct kvm_vcpu *vcpu)
842{
843 vcpu->kvm->arch.kvm_ops->vcpu_free(vcpu);
844}
845
846int kvmppc_core_check_requests(struct kvm_vcpu *vcpu)
847{
848 return vcpu->kvm->arch.kvm_ops->check_requests(vcpu);
849}
850
851void kvm_arch_sync_dirty_log(struct kvm *kvm, struct kvm_memory_slot *memslot)
852{
853
854}
855
856int kvm_vm_ioctl_get_dirty_log(struct kvm *kvm, struct kvm_dirty_log *log)
857{
858 return kvm->arch.kvm_ops->get_dirty_log(kvm, log);
859}
860
861void kvmppc_core_free_memslot(struct kvm *kvm, struct kvm_memory_slot *slot)
862{
863 kvm->arch.kvm_ops->free_memslot(slot);
864}
865
866void kvmppc_core_flush_memslot(struct kvm *kvm, struct kvm_memory_slot *memslot)
867{
868 kvm->arch.kvm_ops->flush_memslot(kvm, memslot);
869}
870
871int kvmppc_core_prepare_memory_region(struct kvm *kvm,
872 const struct kvm_memory_slot *old,
873 struct kvm_memory_slot *new,
874 enum kvm_mr_change change)
875{
876 return kvm->arch.kvm_ops->prepare_memory_region(kvm, old, new, change);
877}
878
879void kvmppc_core_commit_memory_region(struct kvm *kvm,
880 struct kvm_memory_slot *old,
881 const struct kvm_memory_slot *new,
882 enum kvm_mr_change change)
883{
884 kvm->arch.kvm_ops->commit_memory_region(kvm, old, new, change);
885}
886
887bool kvm_unmap_gfn_range(struct kvm *kvm, struct kvm_gfn_range *range)
888{
889 return kvm->arch.kvm_ops->unmap_gfn_range(kvm, range);
890}
891
892bool kvm_age_gfn(struct kvm *kvm, struct kvm_gfn_range *range)
893{
894 return kvm->arch.kvm_ops->age_gfn(kvm, range);
895}
896
897bool kvm_test_age_gfn(struct kvm *kvm, struct kvm_gfn_range *range)
898{
899 return kvm->arch.kvm_ops->test_age_gfn(kvm, range);
900}
901
902bool kvm_set_spte_gfn(struct kvm *kvm, struct kvm_gfn_range *range)
903{
904 return kvm->arch.kvm_ops->set_spte_gfn(kvm, range);
905}
906
907int kvmppc_core_init_vm(struct kvm *kvm)
908{
909
910#ifdef CONFIG_PPC64
911 INIT_LIST_HEAD_RCU(&kvm->arch.spapr_tce_tables);
912 INIT_LIST_HEAD(&kvm->arch.rtas_tokens);
913 mutex_init(&kvm->arch.rtas_token_lock);
914#endif
915
916 return kvm->arch.kvm_ops->init_vm(kvm);
917}
918
919void kvmppc_core_destroy_vm(struct kvm *kvm)
920{
921 kvm->arch.kvm_ops->destroy_vm(kvm);
922
923#ifdef CONFIG_PPC64
924 kvmppc_rtas_tokens_free(kvm);
925 WARN_ON(!list_empty(&kvm->arch.spapr_tce_tables));
926#endif
927
928#ifdef CONFIG_KVM_XICS
929 /*
930 * Free the XIVE and XICS devices which are not directly freed by the
931 * device 'release' method
932 */
933 kfree(kvm->arch.xive_devices.native);
934 kvm->arch.xive_devices.native = NULL;
935 kfree(kvm->arch.xive_devices.xics_on_xive);
936 kvm->arch.xive_devices.xics_on_xive = NULL;
937 kfree(kvm->arch.xics_device);
938 kvm->arch.xics_device = NULL;
939#endif /* CONFIG_KVM_XICS */
940}
941
942int kvmppc_h_logical_ci_load(struct kvm_vcpu *vcpu)
943{
944 unsigned long size = kvmppc_get_gpr(vcpu, 4);
945 unsigned long addr = kvmppc_get_gpr(vcpu, 5);
946 u64 buf;
947 int srcu_idx;
948 int ret;
949
950 if (!is_power_of_2(size) || (size > sizeof(buf)))
951 return H_TOO_HARD;
952
953 srcu_idx = srcu_read_lock(&vcpu->kvm->srcu);
954 ret = kvm_io_bus_read(vcpu, KVM_MMIO_BUS, addr, size, &buf);
955 srcu_read_unlock(&vcpu->kvm->srcu, srcu_idx);
956 if (ret != 0)
957 return H_TOO_HARD;
958
959 switch (size) {
960 case 1:
961 kvmppc_set_gpr(vcpu, 4, *(u8 *)&buf);
962 break;
963
964 case 2:
965 kvmppc_set_gpr(vcpu, 4, be16_to_cpu(*(__be16 *)&buf));
966 break;
967
968 case 4:
969 kvmppc_set_gpr(vcpu, 4, be32_to_cpu(*(__be32 *)&buf));
970 break;
971
972 case 8:
973 kvmppc_set_gpr(vcpu, 4, be64_to_cpu(*(__be64 *)&buf));
974 break;
975
976 default:
977 BUG();
978 }
979
980 return H_SUCCESS;
981}
982EXPORT_SYMBOL_GPL(kvmppc_h_logical_ci_load);
983
984int kvmppc_h_logical_ci_store(struct kvm_vcpu *vcpu)
985{
986 unsigned long size = kvmppc_get_gpr(vcpu, 4);
987 unsigned long addr = kvmppc_get_gpr(vcpu, 5);
988 unsigned long val = kvmppc_get_gpr(vcpu, 6);
989 u64 buf;
990 int srcu_idx;
991 int ret;
992
993 switch (size) {
994 case 1:
995 *(u8 *)&buf = val;
996 break;
997
998 case 2:
999 *(__be16 *)&buf = cpu_to_be16(val);
1000 break;
1001
1002 case 4:
1003 *(__be32 *)&buf = cpu_to_be32(val);
1004 break;
1005
1006 case 8:
1007 *(__be64 *)&buf = cpu_to_be64(val);
1008 break;
1009
1010 default:
1011 return H_TOO_HARD;
1012 }
1013
1014 srcu_idx = srcu_read_lock(&vcpu->kvm->srcu);
1015 ret = kvm_io_bus_write(vcpu, KVM_MMIO_BUS, addr, size, &buf);
1016 srcu_read_unlock(&vcpu->kvm->srcu, srcu_idx);
1017 if (ret != 0)
1018 return H_TOO_HARD;
1019
1020 return H_SUCCESS;
1021}
1022EXPORT_SYMBOL_GPL(kvmppc_h_logical_ci_store);
1023
1024int kvmppc_book3s_hcall_implemented(struct kvm *kvm, unsigned long hcall)
1025{
1026 return kvm->arch.kvm_ops->hcall_implemented(hcall);
1027}
1028
1029#ifdef CONFIG_KVM_XICS
1030int kvm_set_irq(struct kvm *kvm, int irq_source_id, u32 irq, int level,
1031 bool line_status)
1032{
1033 if (xics_on_xive())
1034 return kvmppc_xive_set_irq(kvm, irq_source_id, irq, level,
1035 line_status);
1036 else
1037 return kvmppc_xics_set_irq(kvm, irq_source_id, irq, level,
1038 line_status);
1039}
1040
1041int kvm_arch_set_irq_inatomic(struct kvm_kernel_irq_routing_entry *irq_entry,
1042 struct kvm *kvm, int irq_source_id,
1043 int level, bool line_status)
1044{
1045 return kvm_set_irq(kvm, irq_source_id, irq_entry->gsi,
1046 level, line_status);
1047}
1048static int kvmppc_book3s_set_irq(struct kvm_kernel_irq_routing_entry *e,
1049 struct kvm *kvm, int irq_source_id, int level,
1050 bool line_status)
1051{
1052 return kvm_set_irq(kvm, irq_source_id, e->gsi, level, line_status);
1053}
1054
1055int kvm_irq_map_gsi(struct kvm *kvm,
1056 struct kvm_kernel_irq_routing_entry *entries, int gsi)
1057{
1058 entries->gsi = gsi;
1059 entries->type = KVM_IRQ_ROUTING_IRQCHIP;
1060 entries->set = kvmppc_book3s_set_irq;
1061 entries->irqchip.irqchip = 0;
1062 entries->irqchip.pin = gsi;
1063 return 1;
1064}
1065
1066int kvm_irq_map_chip_pin(struct kvm *kvm, unsigned irqchip, unsigned pin)
1067{
1068 return pin;
1069}
1070
1071#endif /* CONFIG_KVM_XICS */
1072
1073static int kvmppc_book3s_init(void)
1074{
1075 int r;
1076
1077 r = kvm_init(sizeof(struct kvm_vcpu), 0, THIS_MODULE);
1078 if (r)
1079 return r;
1080#ifdef CONFIG_KVM_BOOK3S_32_HANDLER
1081 r = kvmppc_book3s_init_pr();
1082#endif
1083
1084#ifdef CONFIG_KVM_XICS
1085#ifdef CONFIG_KVM_XIVE
1086 if (xics_on_xive()) {
1087 kvm_register_device_ops(&kvm_xive_ops, KVM_DEV_TYPE_XICS);
1088 if (kvmppc_xive_native_supported())
1089 kvm_register_device_ops(&kvm_xive_native_ops,
1090 KVM_DEV_TYPE_XIVE);
1091 } else
1092#endif
1093 kvm_register_device_ops(&kvm_xics_ops, KVM_DEV_TYPE_XICS);
1094#endif
1095 return r;
1096}
1097
1098static void kvmppc_book3s_exit(void)
1099{
1100#ifdef CONFIG_KVM_BOOK3S_32_HANDLER
1101 kvmppc_book3s_exit_pr();
1102#endif
1103 kvm_exit();
1104}
1105
1106module_init(kvmppc_book3s_init);
1107module_exit(kvmppc_book3s_exit);
1108
1109/* On 32bit this is our one and only kernel module */
1110#ifdef CONFIG_KVM_BOOK3S_32_HANDLER
1111MODULE_ALIAS_MISCDEV(KVM_MINOR);
1112MODULE_ALIAS("devname:kvm");
1113#endif
1// SPDX-License-Identifier: GPL-2.0-only
2/*
3 * Copyright (C) 2009. SUSE Linux Products GmbH. All rights reserved.
4 *
5 * Authors:
6 * Alexander Graf <agraf@suse.de>
7 * Kevin Wolf <mail@kevin-wolf.de>
8 *
9 * Description:
10 * This file is derived from arch/powerpc/kvm/44x.c,
11 * by Hollis Blanchard <hollisb@us.ibm.com>.
12 */
13
14#include <linux/kvm_host.h>
15#include <linux/err.h>
16#include <linux/export.h>
17#include <linux/slab.h>
18#include <linux/module.h>
19#include <linux/miscdevice.h>
20#include <linux/gfp.h>
21#include <linux/sched.h>
22#include <linux/vmalloc.h>
23#include <linux/highmem.h>
24
25#include <asm/reg.h>
26#include <asm/cputable.h>
27#include <asm/cacheflush.h>
28#include <linux/uaccess.h>
29#include <asm/io.h>
30#include <asm/kvm_ppc.h>
31#include <asm/kvm_book3s.h>
32#include <asm/mmu_context.h>
33#include <asm/page.h>
34#include <asm/xive.h>
35
36#include "book3s.h"
37#include "trace.h"
38
39/* #define EXIT_DEBUG */
40
41const struct _kvm_stats_desc kvm_vm_stats_desc[] = {
42 KVM_GENERIC_VM_STATS(),
43 STATS_DESC_ICOUNTER(VM, num_2M_pages),
44 STATS_DESC_ICOUNTER(VM, num_1G_pages)
45};
46
47const struct kvm_stats_header kvm_vm_stats_header = {
48 .name_size = KVM_STATS_NAME_SIZE,
49 .num_desc = ARRAY_SIZE(kvm_vm_stats_desc),
50 .id_offset = sizeof(struct kvm_stats_header),
51 .desc_offset = sizeof(struct kvm_stats_header) + KVM_STATS_NAME_SIZE,
52 .data_offset = sizeof(struct kvm_stats_header) + KVM_STATS_NAME_SIZE +
53 sizeof(kvm_vm_stats_desc),
54};
55
56const struct _kvm_stats_desc kvm_vcpu_stats_desc[] = {
57 KVM_GENERIC_VCPU_STATS(),
58 STATS_DESC_COUNTER(VCPU, sum_exits),
59 STATS_DESC_COUNTER(VCPU, mmio_exits),
60 STATS_DESC_COUNTER(VCPU, signal_exits),
61 STATS_DESC_COUNTER(VCPU, light_exits),
62 STATS_DESC_COUNTER(VCPU, itlb_real_miss_exits),
63 STATS_DESC_COUNTER(VCPU, itlb_virt_miss_exits),
64 STATS_DESC_COUNTER(VCPU, dtlb_real_miss_exits),
65 STATS_DESC_COUNTER(VCPU, dtlb_virt_miss_exits),
66 STATS_DESC_COUNTER(VCPU, syscall_exits),
67 STATS_DESC_COUNTER(VCPU, isi_exits),
68 STATS_DESC_COUNTER(VCPU, dsi_exits),
69 STATS_DESC_COUNTER(VCPU, emulated_inst_exits),
70 STATS_DESC_COUNTER(VCPU, dec_exits),
71 STATS_DESC_COUNTER(VCPU, ext_intr_exits),
72 STATS_DESC_COUNTER(VCPU, halt_successful_wait),
73 STATS_DESC_COUNTER(VCPU, dbell_exits),
74 STATS_DESC_COUNTER(VCPU, gdbell_exits),
75 STATS_DESC_COUNTER(VCPU, ld),
76 STATS_DESC_COUNTER(VCPU, st),
77 STATS_DESC_COUNTER(VCPU, pf_storage),
78 STATS_DESC_COUNTER(VCPU, pf_instruc),
79 STATS_DESC_COUNTER(VCPU, sp_storage),
80 STATS_DESC_COUNTER(VCPU, sp_instruc),
81 STATS_DESC_COUNTER(VCPU, queue_intr),
82 STATS_DESC_COUNTER(VCPU, ld_slow),
83 STATS_DESC_COUNTER(VCPU, st_slow),
84 STATS_DESC_COUNTER(VCPU, pthru_all),
85 STATS_DESC_COUNTER(VCPU, pthru_host),
86 STATS_DESC_COUNTER(VCPU, pthru_bad_aff)
87};
88
89const struct kvm_stats_header kvm_vcpu_stats_header = {
90 .name_size = KVM_STATS_NAME_SIZE,
91 .num_desc = ARRAY_SIZE(kvm_vcpu_stats_desc),
92 .id_offset = sizeof(struct kvm_stats_header),
93 .desc_offset = sizeof(struct kvm_stats_header) + KVM_STATS_NAME_SIZE,
94 .data_offset = sizeof(struct kvm_stats_header) + KVM_STATS_NAME_SIZE +
95 sizeof(kvm_vcpu_stats_desc),
96};
97
98static inline void kvmppc_update_int_pending(struct kvm_vcpu *vcpu,
99 unsigned long pending_now, unsigned long old_pending)
100{
101 if (is_kvmppc_hv_enabled(vcpu->kvm))
102 return;
103 if (pending_now)
104 kvmppc_set_int_pending(vcpu, 1);
105 else if (old_pending)
106 kvmppc_set_int_pending(vcpu, 0);
107}
108
109static inline bool kvmppc_critical_section(struct kvm_vcpu *vcpu)
110{
111 ulong crit_raw;
112 ulong crit_r1;
113 bool crit;
114
115 if (is_kvmppc_hv_enabled(vcpu->kvm))
116 return false;
117
118 crit_raw = kvmppc_get_critical(vcpu);
119 crit_r1 = kvmppc_get_gpr(vcpu, 1);
120
121 /* Truncate crit indicators in 32 bit mode */
122 if (!(kvmppc_get_msr(vcpu) & MSR_SF)) {
123 crit_raw &= 0xffffffff;
124 crit_r1 &= 0xffffffff;
125 }
126
127 /* Critical section when crit == r1 */
128 crit = (crit_raw == crit_r1);
129 /* ... and we're in supervisor mode */
130 crit = crit && !(kvmppc_get_msr(vcpu) & MSR_PR);
131
132 return crit;
133}
134
135void kvmppc_inject_interrupt(struct kvm_vcpu *vcpu, int vec, u64 flags)
136{
137 vcpu->kvm->arch.kvm_ops->inject_interrupt(vcpu, vec, flags);
138}
139
140static int kvmppc_book3s_vec2irqprio(unsigned int vec)
141{
142 unsigned int prio;
143
144 switch (vec) {
145 case 0x100: prio = BOOK3S_IRQPRIO_SYSTEM_RESET; break;
146 case 0x200: prio = BOOK3S_IRQPRIO_MACHINE_CHECK; break;
147 case 0x300: prio = BOOK3S_IRQPRIO_DATA_STORAGE; break;
148 case 0x380: prio = BOOK3S_IRQPRIO_DATA_SEGMENT; break;
149 case 0x400: prio = BOOK3S_IRQPRIO_INST_STORAGE; break;
150 case 0x480: prio = BOOK3S_IRQPRIO_INST_SEGMENT; break;
151 case 0x500: prio = BOOK3S_IRQPRIO_EXTERNAL; break;
152 case 0x600: prio = BOOK3S_IRQPRIO_ALIGNMENT; break;
153 case 0x700: prio = BOOK3S_IRQPRIO_PROGRAM; break;
154 case 0x800: prio = BOOK3S_IRQPRIO_FP_UNAVAIL; break;
155 case 0x900: prio = BOOK3S_IRQPRIO_DECREMENTER; break;
156 case 0xc00: prio = BOOK3S_IRQPRIO_SYSCALL; break;
157 case 0xd00: prio = BOOK3S_IRQPRIO_DEBUG; break;
158 case 0xf20: prio = BOOK3S_IRQPRIO_ALTIVEC; break;
159 case 0xf40: prio = BOOK3S_IRQPRIO_VSX; break;
160 case 0xf60: prio = BOOK3S_IRQPRIO_FAC_UNAVAIL; break;
161 default: prio = BOOK3S_IRQPRIO_MAX; break;
162 }
163
164 return prio;
165}
166
167void kvmppc_book3s_dequeue_irqprio(struct kvm_vcpu *vcpu,
168 unsigned int vec)
169{
170 unsigned long old_pending = vcpu->arch.pending_exceptions;
171
172 clear_bit(kvmppc_book3s_vec2irqprio(vec),
173 &vcpu->arch.pending_exceptions);
174
175 kvmppc_update_int_pending(vcpu, vcpu->arch.pending_exceptions,
176 old_pending);
177}
178
179void kvmppc_book3s_queue_irqprio(struct kvm_vcpu *vcpu, unsigned int vec)
180{
181 vcpu->stat.queue_intr++;
182
183 set_bit(kvmppc_book3s_vec2irqprio(vec),
184 &vcpu->arch.pending_exceptions);
185#ifdef EXIT_DEBUG
186 printk(KERN_INFO "Queueing interrupt %x\n", vec);
187#endif
188}
189EXPORT_SYMBOL_GPL(kvmppc_book3s_queue_irqprio);
190
191void kvmppc_core_queue_machine_check(struct kvm_vcpu *vcpu, ulong flags)
192{
193 /* might as well deliver this straight away */
194 kvmppc_inject_interrupt(vcpu, BOOK3S_INTERRUPT_MACHINE_CHECK, flags);
195}
196EXPORT_SYMBOL_GPL(kvmppc_core_queue_machine_check);
197
198void kvmppc_core_queue_syscall(struct kvm_vcpu *vcpu)
199{
200 kvmppc_inject_interrupt(vcpu, BOOK3S_INTERRUPT_SYSCALL, 0);
201}
202EXPORT_SYMBOL(kvmppc_core_queue_syscall);
203
204void kvmppc_core_queue_program(struct kvm_vcpu *vcpu, ulong flags)
205{
206 /* might as well deliver this straight away */
207 kvmppc_inject_interrupt(vcpu, BOOK3S_INTERRUPT_PROGRAM, flags);
208}
209EXPORT_SYMBOL_GPL(kvmppc_core_queue_program);
210
211void kvmppc_core_queue_fpunavail(struct kvm_vcpu *vcpu)
212{
213 /* might as well deliver this straight away */
214 kvmppc_inject_interrupt(vcpu, BOOK3S_INTERRUPT_FP_UNAVAIL, 0);
215}
216
217void kvmppc_core_queue_vec_unavail(struct kvm_vcpu *vcpu)
218{
219 /* might as well deliver this straight away */
220 kvmppc_inject_interrupt(vcpu, BOOK3S_INTERRUPT_ALTIVEC, 0);
221}
222
223void kvmppc_core_queue_vsx_unavail(struct kvm_vcpu *vcpu)
224{
225 /* might as well deliver this straight away */
226 kvmppc_inject_interrupt(vcpu, BOOK3S_INTERRUPT_VSX, 0);
227}
228
229void kvmppc_core_queue_dec(struct kvm_vcpu *vcpu)
230{
231 kvmppc_book3s_queue_irqprio(vcpu, BOOK3S_INTERRUPT_DECREMENTER);
232}
233EXPORT_SYMBOL_GPL(kvmppc_core_queue_dec);
234
235int kvmppc_core_pending_dec(struct kvm_vcpu *vcpu)
236{
237 return test_bit(BOOK3S_IRQPRIO_DECREMENTER, &vcpu->arch.pending_exceptions);
238}
239EXPORT_SYMBOL_GPL(kvmppc_core_pending_dec);
240
241void kvmppc_core_dequeue_dec(struct kvm_vcpu *vcpu)
242{
243 kvmppc_book3s_dequeue_irqprio(vcpu, BOOK3S_INTERRUPT_DECREMENTER);
244}
245EXPORT_SYMBOL_GPL(kvmppc_core_dequeue_dec);
246
247void kvmppc_core_queue_external(struct kvm_vcpu *vcpu,
248 struct kvm_interrupt *irq)
249{
250 /*
251 * This case (KVM_INTERRUPT_SET) should never actually arise for
252 * a pseries guest (because pseries guests expect their interrupt
253 * controllers to continue asserting an external interrupt request
254 * until it is acknowledged at the interrupt controller), but is
255 * included to avoid ABI breakage and potentially for other
256 * sorts of guest.
257 *
258 * There is a subtlety here: HV KVM does not test the
259 * external_oneshot flag in the code that synthesizes
260 * external interrupts for the guest just before entering
261 * the guest. That is OK even if userspace did do a
262 * KVM_INTERRUPT_SET on a pseries guest vcpu, because the
263 * caller (kvm_vcpu_ioctl_interrupt) does a kvm_vcpu_kick()
264 * which ends up doing a smp_send_reschedule(), which will
265 * pull the guest all the way out to the host, meaning that
266 * we will call kvmppc_core_prepare_to_enter() before entering
267 * the guest again, and that will handle the external_oneshot
268 * flag correctly.
269 */
270 if (irq->irq == KVM_INTERRUPT_SET)
271 vcpu->arch.external_oneshot = 1;
272
273 kvmppc_book3s_queue_irqprio(vcpu, BOOK3S_INTERRUPT_EXTERNAL);
274}
275
276void kvmppc_core_dequeue_external(struct kvm_vcpu *vcpu)
277{
278 kvmppc_book3s_dequeue_irqprio(vcpu, BOOK3S_INTERRUPT_EXTERNAL);
279}
280
281void kvmppc_core_queue_data_storage(struct kvm_vcpu *vcpu, ulong dar,
282 ulong flags)
283{
284 kvmppc_set_dar(vcpu, dar);
285 kvmppc_set_dsisr(vcpu, flags);
286 kvmppc_inject_interrupt(vcpu, BOOK3S_INTERRUPT_DATA_STORAGE, 0);
287}
288EXPORT_SYMBOL_GPL(kvmppc_core_queue_data_storage);
289
290void kvmppc_core_queue_inst_storage(struct kvm_vcpu *vcpu, ulong flags)
291{
292 kvmppc_inject_interrupt(vcpu, BOOK3S_INTERRUPT_INST_STORAGE, flags);
293}
294EXPORT_SYMBOL_GPL(kvmppc_core_queue_inst_storage);
295
296static int kvmppc_book3s_irqprio_deliver(struct kvm_vcpu *vcpu,
297 unsigned int priority)
298{
299 int deliver = 1;
300 int vec = 0;
301 bool crit = kvmppc_critical_section(vcpu);
302
303 switch (priority) {
304 case BOOK3S_IRQPRIO_DECREMENTER:
305 deliver = (kvmppc_get_msr(vcpu) & MSR_EE) && !crit;
306 vec = BOOK3S_INTERRUPT_DECREMENTER;
307 break;
308 case BOOK3S_IRQPRIO_EXTERNAL:
309 deliver = (kvmppc_get_msr(vcpu) & MSR_EE) && !crit;
310 vec = BOOK3S_INTERRUPT_EXTERNAL;
311 break;
312 case BOOK3S_IRQPRIO_SYSTEM_RESET:
313 vec = BOOK3S_INTERRUPT_SYSTEM_RESET;
314 break;
315 case BOOK3S_IRQPRIO_MACHINE_CHECK:
316 vec = BOOK3S_INTERRUPT_MACHINE_CHECK;
317 break;
318 case BOOK3S_IRQPRIO_DATA_STORAGE:
319 vec = BOOK3S_INTERRUPT_DATA_STORAGE;
320 break;
321 case BOOK3S_IRQPRIO_INST_STORAGE:
322 vec = BOOK3S_INTERRUPT_INST_STORAGE;
323 break;
324 case BOOK3S_IRQPRIO_DATA_SEGMENT:
325 vec = BOOK3S_INTERRUPT_DATA_SEGMENT;
326 break;
327 case BOOK3S_IRQPRIO_INST_SEGMENT:
328 vec = BOOK3S_INTERRUPT_INST_SEGMENT;
329 break;
330 case BOOK3S_IRQPRIO_ALIGNMENT:
331 vec = BOOK3S_INTERRUPT_ALIGNMENT;
332 break;
333 case BOOK3S_IRQPRIO_PROGRAM:
334 vec = BOOK3S_INTERRUPT_PROGRAM;
335 break;
336 case BOOK3S_IRQPRIO_VSX:
337 vec = BOOK3S_INTERRUPT_VSX;
338 break;
339 case BOOK3S_IRQPRIO_ALTIVEC:
340 vec = BOOK3S_INTERRUPT_ALTIVEC;
341 break;
342 case BOOK3S_IRQPRIO_FP_UNAVAIL:
343 vec = BOOK3S_INTERRUPT_FP_UNAVAIL;
344 break;
345 case BOOK3S_IRQPRIO_SYSCALL:
346 vec = BOOK3S_INTERRUPT_SYSCALL;
347 break;
348 case BOOK3S_IRQPRIO_DEBUG:
349 vec = BOOK3S_INTERRUPT_TRACE;
350 break;
351 case BOOK3S_IRQPRIO_PERFORMANCE_MONITOR:
352 vec = BOOK3S_INTERRUPT_PERFMON;
353 break;
354 case BOOK3S_IRQPRIO_FAC_UNAVAIL:
355 vec = BOOK3S_INTERRUPT_FAC_UNAVAIL;
356 break;
357 default:
358 deliver = 0;
359 printk(KERN_ERR "KVM: Unknown interrupt: 0x%x\n", priority);
360 break;
361 }
362
363#if 0
364 printk(KERN_INFO "Deliver interrupt 0x%x? %x\n", vec, deliver);
365#endif
366
367 if (deliver)
368 kvmppc_inject_interrupt(vcpu, vec, 0);
369
370 return deliver;
371}
372
373/*
374 * This function determines if an irqprio should be cleared once issued.
375 */
376static bool clear_irqprio(struct kvm_vcpu *vcpu, unsigned int priority)
377{
378 switch (priority) {
379 case BOOK3S_IRQPRIO_DECREMENTER:
380 /* DEC interrupts get cleared by mtdec */
381 return false;
382 case BOOK3S_IRQPRIO_EXTERNAL:
383 /*
384 * External interrupts get cleared by userspace
385 * except when set by the KVM_INTERRUPT ioctl with
386 * KVM_INTERRUPT_SET (not KVM_INTERRUPT_SET_LEVEL).
387 */
388 if (vcpu->arch.external_oneshot) {
389 vcpu->arch.external_oneshot = 0;
390 return true;
391 }
392 return false;
393 }
394
395 return true;
396}
397
398int kvmppc_core_prepare_to_enter(struct kvm_vcpu *vcpu)
399{
400 unsigned long *pending = &vcpu->arch.pending_exceptions;
401 unsigned long old_pending = vcpu->arch.pending_exceptions;
402 unsigned int priority;
403
404#ifdef EXIT_DEBUG
405 if (vcpu->arch.pending_exceptions)
406 printk(KERN_EMERG "KVM: Check pending: %lx\n", vcpu->arch.pending_exceptions);
407#endif
408 priority = __ffs(*pending);
409 while (priority < BOOK3S_IRQPRIO_MAX) {
410 if (kvmppc_book3s_irqprio_deliver(vcpu, priority) &&
411 clear_irqprio(vcpu, priority)) {
412 clear_bit(priority, &vcpu->arch.pending_exceptions);
413 break;
414 }
415
416 priority = find_next_bit(pending,
417 BITS_PER_BYTE * sizeof(*pending),
418 priority + 1);
419 }
420
421 /* Tell the guest about our interrupt status */
422 kvmppc_update_int_pending(vcpu, *pending, old_pending);
423
424 return 0;
425}
426EXPORT_SYMBOL_GPL(kvmppc_core_prepare_to_enter);
427
428kvm_pfn_t kvmppc_gpa_to_pfn(struct kvm_vcpu *vcpu, gpa_t gpa, bool writing,
429 bool *writable)
430{
431 ulong mp_pa = vcpu->arch.magic_page_pa & KVM_PAM;
432 gfn_t gfn = gpa >> PAGE_SHIFT;
433
434 if (!(kvmppc_get_msr(vcpu) & MSR_SF))
435 mp_pa = (uint32_t)mp_pa;
436
437 /* Magic page override */
438 gpa &= ~0xFFFULL;
439 if (unlikely(mp_pa) && unlikely((gpa & KVM_PAM) == mp_pa)) {
440 ulong shared_page = ((ulong)vcpu->arch.shared) & PAGE_MASK;
441 kvm_pfn_t pfn;
442
443 pfn = (kvm_pfn_t)virt_to_phys((void*)shared_page) >> PAGE_SHIFT;
444 get_page(pfn_to_page(pfn));
445 if (writable)
446 *writable = true;
447 return pfn;
448 }
449
450 return gfn_to_pfn_prot(vcpu->kvm, gfn, writing, writable);
451}
452EXPORT_SYMBOL_GPL(kvmppc_gpa_to_pfn);
453
454int kvmppc_xlate(struct kvm_vcpu *vcpu, ulong eaddr, enum xlate_instdata xlid,
455 enum xlate_readwrite xlrw, struct kvmppc_pte *pte)
456{
457 bool data = (xlid == XLATE_DATA);
458 bool iswrite = (xlrw == XLATE_WRITE);
459 int relocated = (kvmppc_get_msr(vcpu) & (data ? MSR_DR : MSR_IR));
460 int r;
461
462 if (relocated) {
463 r = vcpu->arch.mmu.xlate(vcpu, eaddr, pte, data, iswrite);
464 } else {
465 pte->eaddr = eaddr;
466 pte->raddr = eaddr & KVM_PAM;
467 pte->vpage = VSID_REAL | eaddr >> 12;
468 pte->may_read = true;
469 pte->may_write = true;
470 pte->may_execute = true;
471 r = 0;
472
473 if ((kvmppc_get_msr(vcpu) & (MSR_IR | MSR_DR)) == MSR_DR &&
474 !data) {
475 if ((vcpu->arch.hflags & BOOK3S_HFLAG_SPLIT_HACK) &&
476 ((eaddr & SPLIT_HACK_MASK) == SPLIT_HACK_OFFS))
477 pte->raddr &= ~SPLIT_HACK_MASK;
478 }
479 }
480
481 return r;
482}
483
484int kvmppc_load_last_inst(struct kvm_vcpu *vcpu,
485 enum instruction_fetch_type type, u32 *inst)
486{
487 ulong pc = kvmppc_get_pc(vcpu);
488 int r;
489
490 if (type == INST_SC)
491 pc -= 4;
492
493 r = kvmppc_ld(vcpu, &pc, sizeof(u32), inst, false);
494 if (r == EMULATE_DONE)
495 return r;
496 else
497 return EMULATE_AGAIN;
498}
499EXPORT_SYMBOL_GPL(kvmppc_load_last_inst);
500
501int kvmppc_subarch_vcpu_init(struct kvm_vcpu *vcpu)
502{
503 return 0;
504}
505
506void kvmppc_subarch_vcpu_uninit(struct kvm_vcpu *vcpu)
507{
508}
509
510int kvm_arch_vcpu_ioctl_get_sregs(struct kvm_vcpu *vcpu,
511 struct kvm_sregs *sregs)
512{
513 int ret;
514
515 vcpu_load(vcpu);
516 ret = vcpu->kvm->arch.kvm_ops->get_sregs(vcpu, sregs);
517 vcpu_put(vcpu);
518
519 return ret;
520}
521
522int kvm_arch_vcpu_ioctl_set_sregs(struct kvm_vcpu *vcpu,
523 struct kvm_sregs *sregs)
524{
525 int ret;
526
527 vcpu_load(vcpu);
528 ret = vcpu->kvm->arch.kvm_ops->set_sregs(vcpu, sregs);
529 vcpu_put(vcpu);
530
531 return ret;
532}
533
534int kvm_arch_vcpu_ioctl_get_regs(struct kvm_vcpu *vcpu, struct kvm_regs *regs)
535{
536 int i;
537
538 regs->pc = kvmppc_get_pc(vcpu);
539 regs->cr = kvmppc_get_cr(vcpu);
540 regs->ctr = kvmppc_get_ctr(vcpu);
541 regs->lr = kvmppc_get_lr(vcpu);
542 regs->xer = kvmppc_get_xer(vcpu);
543 regs->msr = kvmppc_get_msr(vcpu);
544 regs->srr0 = kvmppc_get_srr0(vcpu);
545 regs->srr1 = kvmppc_get_srr1(vcpu);
546 regs->pid = vcpu->arch.pid;
547 regs->sprg0 = kvmppc_get_sprg0(vcpu);
548 regs->sprg1 = kvmppc_get_sprg1(vcpu);
549 regs->sprg2 = kvmppc_get_sprg2(vcpu);
550 regs->sprg3 = kvmppc_get_sprg3(vcpu);
551 regs->sprg4 = kvmppc_get_sprg4(vcpu);
552 regs->sprg5 = kvmppc_get_sprg5(vcpu);
553 regs->sprg6 = kvmppc_get_sprg6(vcpu);
554 regs->sprg7 = kvmppc_get_sprg7(vcpu);
555
556 for (i = 0; i < ARRAY_SIZE(regs->gpr); i++)
557 regs->gpr[i] = kvmppc_get_gpr(vcpu, i);
558
559 return 0;
560}
561
562int kvm_arch_vcpu_ioctl_set_regs(struct kvm_vcpu *vcpu, struct kvm_regs *regs)
563{
564 int i;
565
566 kvmppc_set_pc(vcpu, regs->pc);
567 kvmppc_set_cr(vcpu, regs->cr);
568 kvmppc_set_ctr(vcpu, regs->ctr);
569 kvmppc_set_lr(vcpu, regs->lr);
570 kvmppc_set_xer(vcpu, regs->xer);
571 kvmppc_set_msr(vcpu, regs->msr);
572 kvmppc_set_srr0(vcpu, regs->srr0);
573 kvmppc_set_srr1(vcpu, regs->srr1);
574 kvmppc_set_sprg0(vcpu, regs->sprg0);
575 kvmppc_set_sprg1(vcpu, regs->sprg1);
576 kvmppc_set_sprg2(vcpu, regs->sprg2);
577 kvmppc_set_sprg3(vcpu, regs->sprg3);
578 kvmppc_set_sprg4(vcpu, regs->sprg4);
579 kvmppc_set_sprg5(vcpu, regs->sprg5);
580 kvmppc_set_sprg6(vcpu, regs->sprg6);
581 kvmppc_set_sprg7(vcpu, regs->sprg7);
582
583 for (i = 0; i < ARRAY_SIZE(regs->gpr); i++)
584 kvmppc_set_gpr(vcpu, i, regs->gpr[i]);
585
586 return 0;
587}
588
589int kvm_arch_vcpu_ioctl_get_fpu(struct kvm_vcpu *vcpu, struct kvm_fpu *fpu)
590{
591 return -EOPNOTSUPP;
592}
593
594int kvm_arch_vcpu_ioctl_set_fpu(struct kvm_vcpu *vcpu, struct kvm_fpu *fpu)
595{
596 return -EOPNOTSUPP;
597}
598
599int kvmppc_get_one_reg(struct kvm_vcpu *vcpu, u64 id,
600 union kvmppc_one_reg *val)
601{
602 int r = 0;
603 long int i;
604
605 r = vcpu->kvm->arch.kvm_ops->get_one_reg(vcpu, id, val);
606 if (r == -EINVAL) {
607 r = 0;
608 switch (id) {
609 case KVM_REG_PPC_DAR:
610 *val = get_reg_val(id, kvmppc_get_dar(vcpu));
611 break;
612 case KVM_REG_PPC_DSISR:
613 *val = get_reg_val(id, kvmppc_get_dsisr(vcpu));
614 break;
615 case KVM_REG_PPC_FPR0 ... KVM_REG_PPC_FPR31:
616 i = id - KVM_REG_PPC_FPR0;
617 *val = get_reg_val(id, VCPU_FPR(vcpu, i));
618 break;
619 case KVM_REG_PPC_FPSCR:
620 *val = get_reg_val(id, vcpu->arch.fp.fpscr);
621 break;
622#ifdef CONFIG_VSX
623 case KVM_REG_PPC_VSR0 ... KVM_REG_PPC_VSR31:
624 if (cpu_has_feature(CPU_FTR_VSX)) {
625 i = id - KVM_REG_PPC_VSR0;
626 val->vsxval[0] = vcpu->arch.fp.fpr[i][0];
627 val->vsxval[1] = vcpu->arch.fp.fpr[i][1];
628 } else {
629 r = -ENXIO;
630 }
631 break;
632#endif /* CONFIG_VSX */
633 case KVM_REG_PPC_DEBUG_INST:
634 *val = get_reg_val(id, INS_TW);
635 break;
636#ifdef CONFIG_KVM_XICS
637 case KVM_REG_PPC_ICP_STATE:
638 if (!vcpu->arch.icp && !vcpu->arch.xive_vcpu) {
639 r = -ENXIO;
640 break;
641 }
642 if (xics_on_xive())
643 *val = get_reg_val(id, kvmppc_xive_get_icp(vcpu));
644 else
645 *val = get_reg_val(id, kvmppc_xics_get_icp(vcpu));
646 break;
647#endif /* CONFIG_KVM_XICS */
648#ifdef CONFIG_KVM_XIVE
649 case KVM_REG_PPC_VP_STATE:
650 if (!vcpu->arch.xive_vcpu) {
651 r = -ENXIO;
652 break;
653 }
654 if (xive_enabled())
655 r = kvmppc_xive_native_get_vp(vcpu, val);
656 else
657 r = -ENXIO;
658 break;
659#endif /* CONFIG_KVM_XIVE */
660 case KVM_REG_PPC_FSCR:
661 *val = get_reg_val(id, vcpu->arch.fscr);
662 break;
663 case KVM_REG_PPC_TAR:
664 *val = get_reg_val(id, vcpu->arch.tar);
665 break;
666 case KVM_REG_PPC_EBBHR:
667 *val = get_reg_val(id, vcpu->arch.ebbhr);
668 break;
669 case KVM_REG_PPC_EBBRR:
670 *val = get_reg_val(id, vcpu->arch.ebbrr);
671 break;
672 case KVM_REG_PPC_BESCR:
673 *val = get_reg_val(id, vcpu->arch.bescr);
674 break;
675 case KVM_REG_PPC_IC:
676 *val = get_reg_val(id, vcpu->arch.ic);
677 break;
678 default:
679 r = -EINVAL;
680 break;
681 }
682 }
683
684 return r;
685}
686
687int kvmppc_set_one_reg(struct kvm_vcpu *vcpu, u64 id,
688 union kvmppc_one_reg *val)
689{
690 int r = 0;
691 long int i;
692
693 r = vcpu->kvm->arch.kvm_ops->set_one_reg(vcpu, id, val);
694 if (r == -EINVAL) {
695 r = 0;
696 switch (id) {
697 case KVM_REG_PPC_DAR:
698 kvmppc_set_dar(vcpu, set_reg_val(id, *val));
699 break;
700 case KVM_REG_PPC_DSISR:
701 kvmppc_set_dsisr(vcpu, set_reg_val(id, *val));
702 break;
703 case KVM_REG_PPC_FPR0 ... KVM_REG_PPC_FPR31:
704 i = id - KVM_REG_PPC_FPR0;
705 VCPU_FPR(vcpu, i) = set_reg_val(id, *val);
706 break;
707 case KVM_REG_PPC_FPSCR:
708 vcpu->arch.fp.fpscr = set_reg_val(id, *val);
709 break;
710#ifdef CONFIG_VSX
711 case KVM_REG_PPC_VSR0 ... KVM_REG_PPC_VSR31:
712 if (cpu_has_feature(CPU_FTR_VSX)) {
713 i = id - KVM_REG_PPC_VSR0;
714 vcpu->arch.fp.fpr[i][0] = val->vsxval[0];
715 vcpu->arch.fp.fpr[i][1] = val->vsxval[1];
716 } else {
717 r = -ENXIO;
718 }
719 break;
720#endif /* CONFIG_VSX */
721#ifdef CONFIG_KVM_XICS
722 case KVM_REG_PPC_ICP_STATE:
723 if (!vcpu->arch.icp && !vcpu->arch.xive_vcpu) {
724 r = -ENXIO;
725 break;
726 }
727 if (xics_on_xive())
728 r = kvmppc_xive_set_icp(vcpu, set_reg_val(id, *val));
729 else
730 r = kvmppc_xics_set_icp(vcpu, set_reg_val(id, *val));
731 break;
732#endif /* CONFIG_KVM_XICS */
733#ifdef CONFIG_KVM_XIVE
734 case KVM_REG_PPC_VP_STATE:
735 if (!vcpu->arch.xive_vcpu) {
736 r = -ENXIO;
737 break;
738 }
739 if (xive_enabled())
740 r = kvmppc_xive_native_set_vp(vcpu, val);
741 else
742 r = -ENXIO;
743 break;
744#endif /* CONFIG_KVM_XIVE */
745 case KVM_REG_PPC_FSCR:
746 vcpu->arch.fscr = set_reg_val(id, *val);
747 break;
748 case KVM_REG_PPC_TAR:
749 vcpu->arch.tar = set_reg_val(id, *val);
750 break;
751 case KVM_REG_PPC_EBBHR:
752 vcpu->arch.ebbhr = set_reg_val(id, *val);
753 break;
754 case KVM_REG_PPC_EBBRR:
755 vcpu->arch.ebbrr = set_reg_val(id, *val);
756 break;
757 case KVM_REG_PPC_BESCR:
758 vcpu->arch.bescr = set_reg_val(id, *val);
759 break;
760 case KVM_REG_PPC_IC:
761 vcpu->arch.ic = set_reg_val(id, *val);
762 break;
763 default:
764 r = -EINVAL;
765 break;
766 }
767 }
768
769 return r;
770}
771
772void kvmppc_core_vcpu_load(struct kvm_vcpu *vcpu, int cpu)
773{
774 vcpu->kvm->arch.kvm_ops->vcpu_load(vcpu, cpu);
775}
776
777void kvmppc_core_vcpu_put(struct kvm_vcpu *vcpu)
778{
779 vcpu->kvm->arch.kvm_ops->vcpu_put(vcpu);
780}
781
782void kvmppc_set_msr(struct kvm_vcpu *vcpu, u64 msr)
783{
784 vcpu->kvm->arch.kvm_ops->set_msr(vcpu, msr);
785}
786EXPORT_SYMBOL_GPL(kvmppc_set_msr);
787
788int kvmppc_vcpu_run(struct kvm_vcpu *vcpu)
789{
790 return vcpu->kvm->arch.kvm_ops->vcpu_run(vcpu);
791}
792
793int kvm_arch_vcpu_ioctl_translate(struct kvm_vcpu *vcpu,
794 struct kvm_translation *tr)
795{
796 return 0;
797}
798
799int kvm_arch_vcpu_ioctl_set_guest_debug(struct kvm_vcpu *vcpu,
800 struct kvm_guest_debug *dbg)
801{
802 vcpu_load(vcpu);
803 vcpu->guest_debug = dbg->control;
804 vcpu_put(vcpu);
805 return 0;
806}
807
808void kvmppc_decrementer_func(struct kvm_vcpu *vcpu)
809{
810 kvmppc_core_queue_dec(vcpu);
811 kvm_vcpu_kick(vcpu);
812}
813
814int kvmppc_core_vcpu_create(struct kvm_vcpu *vcpu)
815{
816 return vcpu->kvm->arch.kvm_ops->vcpu_create(vcpu);
817}
818
819void kvmppc_core_vcpu_free(struct kvm_vcpu *vcpu)
820{
821 vcpu->kvm->arch.kvm_ops->vcpu_free(vcpu);
822}
823
824int kvmppc_core_check_requests(struct kvm_vcpu *vcpu)
825{
826 return vcpu->kvm->arch.kvm_ops->check_requests(vcpu);
827}
828
829void kvm_arch_sync_dirty_log(struct kvm *kvm, struct kvm_memory_slot *memslot)
830{
831
832}
833
834int kvm_vm_ioctl_get_dirty_log(struct kvm *kvm, struct kvm_dirty_log *log)
835{
836 return kvm->arch.kvm_ops->get_dirty_log(kvm, log);
837}
838
839void kvmppc_core_free_memslot(struct kvm *kvm, struct kvm_memory_slot *slot)
840{
841 kvm->arch.kvm_ops->free_memslot(slot);
842}
843
844void kvmppc_core_flush_memslot(struct kvm *kvm, struct kvm_memory_slot *memslot)
845{
846 kvm->arch.kvm_ops->flush_memslot(kvm, memslot);
847}
848
849int kvmppc_core_prepare_memory_region(struct kvm *kvm,
850 const struct kvm_memory_slot *old,
851 struct kvm_memory_slot *new,
852 enum kvm_mr_change change)
853{
854 return kvm->arch.kvm_ops->prepare_memory_region(kvm, old, new, change);
855}
856
857void kvmppc_core_commit_memory_region(struct kvm *kvm,
858 struct kvm_memory_slot *old,
859 const struct kvm_memory_slot *new,
860 enum kvm_mr_change change)
861{
862 kvm->arch.kvm_ops->commit_memory_region(kvm, old, new, change);
863}
864
865bool kvm_unmap_gfn_range(struct kvm *kvm, struct kvm_gfn_range *range)
866{
867 return kvm->arch.kvm_ops->unmap_gfn_range(kvm, range);
868}
869
870bool kvm_age_gfn(struct kvm *kvm, struct kvm_gfn_range *range)
871{
872 return kvm->arch.kvm_ops->age_gfn(kvm, range);
873}
874
875bool kvm_test_age_gfn(struct kvm *kvm, struct kvm_gfn_range *range)
876{
877 return kvm->arch.kvm_ops->test_age_gfn(kvm, range);
878}
879
880bool kvm_set_spte_gfn(struct kvm *kvm, struct kvm_gfn_range *range)
881{
882 return kvm->arch.kvm_ops->set_spte_gfn(kvm, range);
883}
884
885int kvmppc_core_init_vm(struct kvm *kvm)
886{
887
888#ifdef CONFIG_PPC64
889 INIT_LIST_HEAD_RCU(&kvm->arch.spapr_tce_tables);
890 INIT_LIST_HEAD(&kvm->arch.rtas_tokens);
891 mutex_init(&kvm->arch.rtas_token_lock);
892#endif
893
894 return kvm->arch.kvm_ops->init_vm(kvm);
895}
896
897void kvmppc_core_destroy_vm(struct kvm *kvm)
898{
899 kvm->arch.kvm_ops->destroy_vm(kvm);
900
901#ifdef CONFIG_PPC64
902 kvmppc_rtas_tokens_free(kvm);
903 WARN_ON(!list_empty(&kvm->arch.spapr_tce_tables));
904#endif
905
906#ifdef CONFIG_KVM_XICS
907 /*
908 * Free the XIVE and XICS devices which are not directly freed by the
909 * device 'release' method
910 */
911 kfree(kvm->arch.xive_devices.native);
912 kvm->arch.xive_devices.native = NULL;
913 kfree(kvm->arch.xive_devices.xics_on_xive);
914 kvm->arch.xive_devices.xics_on_xive = NULL;
915 kfree(kvm->arch.xics_device);
916 kvm->arch.xics_device = NULL;
917#endif /* CONFIG_KVM_XICS */
918}
919
920int kvmppc_h_logical_ci_load(struct kvm_vcpu *vcpu)
921{
922 unsigned long size = kvmppc_get_gpr(vcpu, 4);
923 unsigned long addr = kvmppc_get_gpr(vcpu, 5);
924 u64 buf;
925 int srcu_idx;
926 int ret;
927
928 if (!is_power_of_2(size) || (size > sizeof(buf)))
929 return H_TOO_HARD;
930
931 srcu_idx = srcu_read_lock(&vcpu->kvm->srcu);
932 ret = kvm_io_bus_read(vcpu, KVM_MMIO_BUS, addr, size, &buf);
933 srcu_read_unlock(&vcpu->kvm->srcu, srcu_idx);
934 if (ret != 0)
935 return H_TOO_HARD;
936
937 switch (size) {
938 case 1:
939 kvmppc_set_gpr(vcpu, 4, *(u8 *)&buf);
940 break;
941
942 case 2:
943 kvmppc_set_gpr(vcpu, 4, be16_to_cpu(*(__be16 *)&buf));
944 break;
945
946 case 4:
947 kvmppc_set_gpr(vcpu, 4, be32_to_cpu(*(__be32 *)&buf));
948 break;
949
950 case 8:
951 kvmppc_set_gpr(vcpu, 4, be64_to_cpu(*(__be64 *)&buf));
952 break;
953
954 default:
955 BUG();
956 }
957
958 return H_SUCCESS;
959}
960EXPORT_SYMBOL_GPL(kvmppc_h_logical_ci_load);
961
962int kvmppc_h_logical_ci_store(struct kvm_vcpu *vcpu)
963{
964 unsigned long size = kvmppc_get_gpr(vcpu, 4);
965 unsigned long addr = kvmppc_get_gpr(vcpu, 5);
966 unsigned long val = kvmppc_get_gpr(vcpu, 6);
967 u64 buf;
968 int srcu_idx;
969 int ret;
970
971 switch (size) {
972 case 1:
973 *(u8 *)&buf = val;
974 break;
975
976 case 2:
977 *(__be16 *)&buf = cpu_to_be16(val);
978 break;
979
980 case 4:
981 *(__be32 *)&buf = cpu_to_be32(val);
982 break;
983
984 case 8:
985 *(__be64 *)&buf = cpu_to_be64(val);
986 break;
987
988 default:
989 return H_TOO_HARD;
990 }
991
992 srcu_idx = srcu_read_lock(&vcpu->kvm->srcu);
993 ret = kvm_io_bus_write(vcpu, KVM_MMIO_BUS, addr, size, &buf);
994 srcu_read_unlock(&vcpu->kvm->srcu, srcu_idx);
995 if (ret != 0)
996 return H_TOO_HARD;
997
998 return H_SUCCESS;
999}
1000EXPORT_SYMBOL_GPL(kvmppc_h_logical_ci_store);
1001
1002int kvmppc_core_check_processor_compat(void)
1003{
1004 /*
1005 * We always return 0 for book3s. We check
1006 * for compatibility while loading the HV
1007 * or PR module
1008 */
1009 return 0;
1010}
1011
1012int kvmppc_book3s_hcall_implemented(struct kvm *kvm, unsigned long hcall)
1013{
1014 return kvm->arch.kvm_ops->hcall_implemented(hcall);
1015}
1016
1017#ifdef CONFIG_KVM_XICS
1018int kvm_set_irq(struct kvm *kvm, int irq_source_id, u32 irq, int level,
1019 bool line_status)
1020{
1021 if (xics_on_xive())
1022 return kvmppc_xive_set_irq(kvm, irq_source_id, irq, level,
1023 line_status);
1024 else
1025 return kvmppc_xics_set_irq(kvm, irq_source_id, irq, level,
1026 line_status);
1027}
1028
1029int kvm_arch_set_irq_inatomic(struct kvm_kernel_irq_routing_entry *irq_entry,
1030 struct kvm *kvm, int irq_source_id,
1031 int level, bool line_status)
1032{
1033 return kvm_set_irq(kvm, irq_source_id, irq_entry->gsi,
1034 level, line_status);
1035}
1036static int kvmppc_book3s_set_irq(struct kvm_kernel_irq_routing_entry *e,
1037 struct kvm *kvm, int irq_source_id, int level,
1038 bool line_status)
1039{
1040 return kvm_set_irq(kvm, irq_source_id, e->gsi, level, line_status);
1041}
1042
1043int kvm_irq_map_gsi(struct kvm *kvm,
1044 struct kvm_kernel_irq_routing_entry *entries, int gsi)
1045{
1046 entries->gsi = gsi;
1047 entries->type = KVM_IRQ_ROUTING_IRQCHIP;
1048 entries->set = kvmppc_book3s_set_irq;
1049 entries->irqchip.irqchip = 0;
1050 entries->irqchip.pin = gsi;
1051 return 1;
1052}
1053
1054int kvm_irq_map_chip_pin(struct kvm *kvm, unsigned irqchip, unsigned pin)
1055{
1056 return pin;
1057}
1058
1059#endif /* CONFIG_KVM_XICS */
1060
1061static int kvmppc_book3s_init(void)
1062{
1063 int r;
1064
1065 r = kvm_init(NULL, sizeof(struct kvm_vcpu), 0, THIS_MODULE);
1066 if (r)
1067 return r;
1068#ifdef CONFIG_KVM_BOOK3S_32_HANDLER
1069 r = kvmppc_book3s_init_pr();
1070#endif
1071
1072#ifdef CONFIG_KVM_XICS
1073#ifdef CONFIG_KVM_XIVE
1074 if (xics_on_xive()) {
1075 kvm_register_device_ops(&kvm_xive_ops, KVM_DEV_TYPE_XICS);
1076 if (kvmppc_xive_native_supported())
1077 kvm_register_device_ops(&kvm_xive_native_ops,
1078 KVM_DEV_TYPE_XIVE);
1079 } else
1080#endif
1081 kvm_register_device_ops(&kvm_xics_ops, KVM_DEV_TYPE_XICS);
1082#endif
1083 return r;
1084}
1085
1086static void kvmppc_book3s_exit(void)
1087{
1088#ifdef CONFIG_KVM_BOOK3S_32_HANDLER
1089 kvmppc_book3s_exit_pr();
1090#endif
1091 kvm_exit();
1092}
1093
1094module_init(kvmppc_book3s_init);
1095module_exit(kvmppc_book3s_exit);
1096
1097/* On 32bit this is our one and only kernel module */
1098#ifdef CONFIG_KVM_BOOK3S_32_HANDLER
1099MODULE_ALIAS_MISCDEV(KVM_MINOR);
1100MODULE_ALIAS("devname:kvm");
1101#endif