Merge remote-tracking branch 'kvm-ppc-paulus/kvm-ppc-next'
[deliverable/linux.git] / arch / powerpc / kvm / book3s_hv_rmhandlers.S
CommitLineData
de56a948
PM
1/*
2 * This program is free software; you can redistribute it and/or modify
3 * it under the terms of the GNU General Public License, version 2, as
4 * published by the Free Software Foundation.
5 *
6 * This program is distributed in the hope that it will be useful,
7 * but WITHOUT ANY WARRANTY; without even the implied warranty of
8 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
9 * GNU General Public License for more details.
10 *
11 * Copyright 2011 Paul Mackerras, IBM Corp. <paulus@au1.ibm.com>
12 *
13 * Derived from book3s_rmhandlers.S and other files, which are:
14 *
15 * Copyright SUSE Linux Products GmbH 2009
16 *
17 * Authors: Alexander Graf <agraf@suse.de>
18 */
19
20#include <asm/ppc_asm.h>
21#include <asm/kvm_asm.h>
22#include <asm/reg.h>
177339d7 23#include <asm/mmu.h>
de56a948 24#include <asm/page.h>
177339d7
PM
25#include <asm/ptrace.h>
26#include <asm/hvcall.h>
de56a948
PM
27#include <asm/asm-offsets.h>
28#include <asm/exception-64s.h>
f0888f70 29#include <asm/kvm_book3s_asm.h>
f64e8084 30#include <asm/book3s/64/mmu-hash.h>
e4e38121 31#include <asm/tm.h>
fd7bacbc 32#include <asm/opal.h>
e4e38121
MN
33
34#define VCPU_GPRS_TM(reg) (((reg) * ULONG_SIZE) + VCPU_GPR_TM)
de56a948 35
e0b7ec05
PM
36/* Values in HSTATE_NAPPING(r13) */
37#define NAPPING_CEDE 1
38#define NAPPING_NOVCPU 2
39
de56a948 40/*
19ccb76a 41 * Call kvmppc_hv_entry in real mode.
de56a948
PM
42 * Must be called with interrupts hard-disabled.
43 *
44 * Input Registers:
45 *
46 * LR = return address to continue at after eventually re-enabling MMU
47 */
6ed179b6 48_GLOBAL_TOC(kvmppc_hv_entry_trampoline)
218309b7
PM
49 mflr r0
50 std r0, PPC_LR_STKOFF(r1)
51 stdu r1, -112(r1)
de56a948 52 mfmsr r10
218309b7 53 LOAD_REG_ADDR(r5, kvmppc_call_hv_entry)
de56a948
PM
54 li r0,MSR_RI
55 andc r0,r10,r0
56 li r6,MSR_IR | MSR_DR
57 andc r6,r10,r6
58 mtmsrd r0,1 /* clear RI in MSR */
59 mtsrr0 r5
60 mtsrr1 r6
61 RFI
62
218309b7 63kvmppc_call_hv_entry:
e0b7ec05 64 ld r4, HSTATE_KVM_VCPU(r13)
218309b7
PM
65 bl kvmppc_hv_entry
66
67 /* Back from guest - restore host state and return to caller */
68
eee7ff9d 69BEGIN_FTR_SECTION
218309b7
PM
70 /* Restore host DABR and DABRX */
71 ld r5,HSTATE_DABR(r13)
72 li r6,7
73 mtspr SPRN_DABR,r5
74 mtspr SPRN_DABRX,r6
eee7ff9d 75END_FTR_SECTION_IFCLR(CPU_FTR_ARCH_207S)
218309b7
PM
76
77 /* Restore SPRG3 */
9d378dfa
SW
78 ld r3,PACA_SPRG_VDSO(r13)
79 mtspr SPRN_SPRG_VDSO_WRITE,r3
218309b7 80
218309b7
PM
81 /* Reload the host's PMU registers */
82 ld r3, PACALPPACAPTR(r13) /* is the host using the PMU? */
83 lbz r4, LPPACA_PMCINUSE(r3)
84 cmpwi r4, 0
85 beq 23f /* skip if not */
9bc01a9b 86BEGIN_FTR_SECTION
9a4fc4ea 87 ld r3, HSTATE_MMCR0(r13)
9bc01a9b
PM
88 andi. r4, r3, MMCR0_PMAO_SYNC | MMCR0_PMAO
89 cmpwi r4, MMCR0_PMAO
90 beql kvmppc_fix_pmao
91END_FTR_SECTION_IFSET(CPU_FTR_PMAO_BUG)
9a4fc4ea
ME
92 lwz r3, HSTATE_PMC1(r13)
93 lwz r4, HSTATE_PMC2(r13)
94 lwz r5, HSTATE_PMC3(r13)
95 lwz r6, HSTATE_PMC4(r13)
96 lwz r8, HSTATE_PMC5(r13)
97 lwz r9, HSTATE_PMC6(r13)
218309b7
PM
98 mtspr SPRN_PMC1, r3
99 mtspr SPRN_PMC2, r4
100 mtspr SPRN_PMC3, r5
101 mtspr SPRN_PMC4, r6
102 mtspr SPRN_PMC5, r8
103 mtspr SPRN_PMC6, r9
9a4fc4ea
ME
104 ld r3, HSTATE_MMCR0(r13)
105 ld r4, HSTATE_MMCR1(r13)
106 ld r5, HSTATE_MMCRA(r13)
107 ld r6, HSTATE_SIAR(r13)
108 ld r7, HSTATE_SDAR(r13)
218309b7
PM
109 mtspr SPRN_MMCR1, r4
110 mtspr SPRN_MMCRA, r5
72cde5a8
PM
111 mtspr SPRN_SIAR, r6
112 mtspr SPRN_SDAR, r7
113BEGIN_FTR_SECTION
9a4fc4ea
ME
114 ld r8, HSTATE_MMCR2(r13)
115 ld r9, HSTATE_SIER(r13)
72cde5a8
PM
116 mtspr SPRN_MMCR2, r8
117 mtspr SPRN_SIER, r9
118END_FTR_SECTION_IFSET(CPU_FTR_ARCH_207S)
218309b7
PM
119 mtspr SPRN_MMCR0, r3
120 isync
12123:
122
e0b7ec05
PM
123 /*
124 * Reload DEC. HDEC interrupts were disabled when
125 * we reloaded the host's LPCR value.
126 */
127 ld r3, HSTATE_DECEXP(r13)
128 mftb r4
129 subf r4, r4, r3
130 mtspr SPRN_DEC, r4
131
b4deba5c
PM
132 /* hwthread_req may have got set by cede or no vcpu, so clear it */
133 li r0, 0
134 stb r0, HSTATE_HWTHREAD_REQ(r13)
135
218309b7
PM
136 /*
137 * For external and machine check interrupts, we need
138 * to call the Linux handler to process the interrupt.
139 * We do that by jumping to absolute address 0x500 for
140 * external interrupts, or the machine_check_fwnmi label
141 * for machine checks (since firmware might have patched
142 * the vector area at 0x200). The [h]rfid at the end of the
143 * handler will return to the book3s_hv_interrupts.S code.
144 * For other interrupts we do the rfid to get back
145 * to the book3s_hv_interrupts.S code here.
146 */
147 ld r8, 112+PPC_LR_STKOFF(r1)
148 addi r1, r1, 112
149 ld r7, HSTATE_HOST_MSR(r13)
150
151 cmpwi cr1, r12, BOOK3S_INTERRUPT_MACHINE_CHECK
152 cmpwi r12, BOOK3S_INTERRUPT_EXTERNAL
218309b7 153 beq 11f
70aa3961
GS
154 cmpwi r12, BOOK3S_INTERRUPT_H_DOORBELL
155 beq 15f /* Invoke the H_DOORBELL handler */
0869b6fd
MS
156 cmpwi cr2, r12, BOOK3S_INTERRUPT_HMI
157 beq cr2, 14f /* HMI check */
218309b7
PM
158
159 /* RFI into the highmem handler, or branch to interrupt handler */
160 mfmsr r6
161 li r0, MSR_RI
162 andc r6, r6, r0
163 mtmsrd r6, 1 /* Clear RI in MSR */
164 mtsrr0 r8
165 mtsrr1 r7
218309b7
PM
166 beq cr1, 13f /* machine check */
167 RFI
168
169 /* On POWER7, we have external interrupts set to use HSRR0/1 */
17011: mtspr SPRN_HSRR0, r8
171 mtspr SPRN_HSRR1, r7
172 ba 0x500
173
17413: b machine_check_fwnmi
175
0869b6fd
MS
17614: mtspr SPRN_HSRR0, r8
177 mtspr SPRN_HSRR1, r7
178 b hmi_exception_after_realmode
179
70aa3961
GS
18015: mtspr SPRN_HSRR0, r8
181 mtspr SPRN_HSRR1, r7
182 ba 0xe80
183
e0b7ec05
PM
184kvmppc_primary_no_guest:
185 /* We handle this much like a ceded vcpu */
fd6d53b1
PM
186 /* put the HDEC into the DEC, since HDEC interrupts don't wake us */
187 mfspr r3, SPRN_HDEC
188 mtspr SPRN_DEC, r3
6af27c84
PM
189 /*
190 * Make sure the primary has finished the MMU switch.
191 * We should never get here on a secondary thread, but
192 * check it for robustness' sake.
193 */
194 ld r5, HSTATE_KVM_VCORE(r13)
19565: lbz r0, VCORE_IN_GUEST(r5)
196 cmpwi r0, 0
197 beq 65b
198 /* Set LPCR. */
199 ld r8,VCORE_LPCR(r5)
200 mtspr SPRN_LPCR,r8
201 isync
e0b7ec05
PM
202 /* set our bit in napping_threads */
203 ld r5, HSTATE_KVM_VCORE(r13)
204 lbz r7, HSTATE_PTID(r13)
205 li r0, 1
206 sld r0, r0, r7
207 addi r6, r5, VCORE_NAPPING_THREADS
2081: lwarx r3, 0, r6
209 or r3, r3, r0
210 stwcx. r3, 0, r6
211 bne 1b
7d6c40da 212 /* order napping_threads update vs testing entry_exit_map */
e0b7ec05
PM
213 isync
214 li r12, 0
215 lwz r7, VCORE_ENTRY_EXIT(r5)
216 cmpwi r7, 0x100
217 bge kvm_novcpu_exit /* another thread already exiting */
218 li r3, NAPPING_NOVCPU
219 stb r3, HSTATE_NAPPING(r13)
e0b7ec05 220
ccc07772 221 li r3, 0 /* Don't wake on privileged (OS) doorbell */
e0b7ec05
PM
222 b kvm_do_nap
223
37f55d30
SW
224/*
225 * kvm_novcpu_wakeup
226 * Entered from kvm_start_guest if kvm_hstate.napping is set
227 * to NAPPING_NOVCPU
228 * r2 = kernel TOC
229 * r13 = paca
230 */
e0b7ec05
PM
231kvm_novcpu_wakeup:
232 ld r1, HSTATE_HOST_R1(r13)
233 ld r5, HSTATE_KVM_VCORE(r13)
234 li r0, 0
235 stb r0, HSTATE_NAPPING(r13)
e0b7ec05 236
e3bbbbfa
PM
237 /* check the wake reason */
238 bl kvmppc_check_wake_reason
6af27c84 239
37f55d30
SW
240 /*
241 * Restore volatile registers since we could have called
242 * a C routine in kvmppc_check_wake_reason.
243 * r5 = VCORE
244 */
245 ld r5, HSTATE_KVM_VCORE(r13)
246
e0b7ec05 247 /* see if any other thread is already exiting */
e0b7ec05
PM
248 lwz r0, VCORE_ENTRY_EXIT(r5)
249 cmpwi r0, 0x100
250 bge kvm_novcpu_exit
251
252 /* clear our bit in napping_threads */
253 lbz r7, HSTATE_PTID(r13)
254 li r0, 1
255 sld r0, r0, r7
256 addi r6, r5, VCORE_NAPPING_THREADS
e3bbbbfa
PM
2574: lwarx r7, 0, r6
258 andc r7, r7, r0
259 stwcx. r7, 0, r6
e0b7ec05
PM
260 bne 4b
261
e3bbbbfa 262 /* See if the wake reason means we need to exit */
e0b7ec05
PM
263 cmpdi r3, 0
264 bge kvm_novcpu_exit
e0b7ec05 265
fd6d53b1
PM
266 /* See if our timeslice has expired (HDEC is negative) */
267 mfspr r0, SPRN_HDEC
268 li r12, BOOK3S_INTERRUPT_HV_DECREMENTER
269 cmpwi r0, 0
270 blt kvm_novcpu_exit
271
e0b7ec05
PM
272 /* Got an IPI but other vcpus aren't yet exiting, must be a latecomer */
273 ld r4, HSTATE_KVM_VCPU(r13)
274 cmpdi r4, 0
b6c295df
PM
275 beq kvmppc_primary_no_guest
276
277#ifdef CONFIG_KVM_BOOK3S_HV_EXIT_TIMING
278 addi r3, r4, VCPU_TB_RMENTRY
279 bl kvmhv_start_timing
280#endif
281 b kvmppc_got_guest
e0b7ec05
PM
282
283kvm_novcpu_exit:
6af27c84
PM
284#ifdef CONFIG_KVM_BOOK3S_HV_EXIT_TIMING
285 ld r4, HSTATE_KVM_VCPU(r13)
286 cmpdi r4, 0
287 beq 13f
288 addi r3, r4, VCPU_TB_RMEXIT
289 bl kvmhv_accumulate_time
290#endif
eddb60fb
PM
29113: mr r3, r12
292 stw r12, 112-4(r1)
293 bl kvmhv_commence_exit
294 nop
295 lwz r12, 112-4(r1)
6af27c84 296 b kvmhv_switch_to_host
e0b7ec05 297
371fefd6 298/*
e0b7ec05 299 * We come in here when wakened from nap mode.
371fefd6
PM
300 * Relocation is off and most register values are lost.
301 * r13 points to the PACA.
302 */
303 .globl kvm_start_guest
304kvm_start_guest:
fd17dc7b
PM
305
306 /* Set runlatch bit the minute you wake up from nap */
1f09c3ed
PM
307 mfspr r0, SPRN_CTRLF
308 ori r0, r0, 1
309 mtspr SPRN_CTRLT, r0
fd17dc7b 310
19ccb76a
PM
311 ld r2,PACATOC(r13)
312
f0888f70
PM
313 li r0,KVM_HWTHREAD_IN_KVM
314 stb r0,HSTATE_HWTHREAD_STATE(r13)
371fefd6 315
f0888f70
PM
316 /* NV GPR values from power7_idle() will no longer be valid */
317 li r0,1
318 stb r0,PACA_NAPSTATELOST(r13)
371fefd6 319
4619ac88
PM
320 /* were we napping due to cede? */
321 lbz r0,HSTATE_NAPPING(r13)
e0b7ec05
PM
322 cmpwi r0,NAPPING_CEDE
323 beq kvm_end_cede
324 cmpwi r0,NAPPING_NOVCPU
325 beq kvm_novcpu_wakeup
326
327 ld r1,PACAEMERGSP(r13)
328 subi r1,r1,STACK_FRAME_OVERHEAD
4619ac88
PM
329
330 /*
331 * We weren't napping due to cede, so this must be a secondary
332 * thread being woken up to run a guest, or being woken up due
333 * to a stray IPI. (Or due to some machine check or hypervisor
334 * maintenance interrupt while the core is in KVM.)
335 */
f0888f70
PM
336
337 /* Check the wake reason in SRR1 to see why we got here */
e3bbbbfa 338 bl kvmppc_check_wake_reason
37f55d30
SW
339 /*
340 * kvmppc_check_wake_reason could invoke a C routine, but we
341 * have no volatile registers to restore when we return.
342 */
343
e3bbbbfa
PM
344 cmpdi r3, 0
345 bge kvm_no_guest
371fefd6 346
b4deba5c
PM
347 /* get vcore pointer, NULL if we have nothing to run */
348 ld r5,HSTATE_KVM_VCORE(r13)
349 cmpdi r5,0
350 /* if we have no vcore to run, go back to sleep */
7b444c67 351 beq kvm_no_guest
f0888f70 352
56548fc0
PM
353kvm_secondary_got_guest:
354
e0b7ec05 355 /* Set HSTATE_DSCR(r13) to something sensible */
1db36525 356 ld r6, PACA_DSCR_DEFAULT(r13)
e0b7ec05 357 std r6, HSTATE_DSCR(r13)
2fde6d20 358
b4deba5c
PM
359 /* On thread 0 of a subcore, set HDEC to max */
360 lbz r4, HSTATE_PTID(r13)
361 cmpwi r4, 0
362 bne 63f
363 lis r6, 0x7fff
364 ori r6, r6, 0xffff
365 mtspr SPRN_HDEC, r6
366 /* and set per-LPAR registers, if doing dynamic micro-threading */
367 ld r6, HSTATE_SPLIT_MODE(r13)
368 cmpdi r6, 0
369 beq 63f
370 ld r0, KVM_SPLIT_RPR(r6)
371 mtspr SPRN_RPR, r0
372 ld r0, KVM_SPLIT_PMMAR(r6)
373 mtspr SPRN_PMMAR, r0
374 ld r0, KVM_SPLIT_LDBAR(r6)
375 mtspr SPRN_LDBAR, r0
376 isync
37763:
378 /* Order load of vcpu after load of vcore */
5d5b99cd 379 lwsync
b4deba5c 380 ld r4, HSTATE_KVM_VCPU(r13)
e0b7ec05 381 bl kvmppc_hv_entry
218309b7
PM
382
383 /* Back from the guest, go back to nap */
b4deba5c 384 /* Clear our vcpu and vcore pointers so we don't come back in early */
218309b7 385 li r0, 0
b4deba5c 386 std r0, HSTATE_KVM_VCPU(r13)
f019b7ad 387 /*
b4deba5c 388 * Once we clear HSTATE_KVM_VCORE(r13), the code in
5d5b99cd
PM
389 * kvmppc_run_core() is going to assume that all our vcpu
390 * state is visible in memory. This lwsync makes sure
391 * that that is true.
f019b7ad 392 */
218309b7 393 lwsync
b4deba5c 394 std r0, HSTATE_KVM_VCORE(r13)
218309b7 395
fd7bacbc
MS
396 /*
397 * All secondaries exiting guest will fall through this path.
398 * Before proceeding, just check for HMI interrupt and
399 * invoke opal hmi handler. By now we are sure that the
400 * primary thread on this core/subcore has already made partition
401 * switch/TB resync and we are good to call opal hmi handler.
402 */
403 cmpwi r12, BOOK3S_INTERRUPT_HMI
404 bne kvm_no_guest
405
406 li r3,0 /* NULL argument */
407 bl hmi_exception_realmode
56548fc0
PM
408/*
409 * At this point we have finished executing in the guest.
410 * We need to wait for hwthread_req to become zero, since
411 * we may not turn on the MMU while hwthread_req is non-zero.
412 * While waiting we also need to check if we get given a vcpu to run.
413 */
218309b7 414kvm_no_guest:
56548fc0
PM
415 lbz r3, HSTATE_HWTHREAD_REQ(r13)
416 cmpwi r3, 0
417 bne 53f
418 HMT_MEDIUM
419 li r0, KVM_HWTHREAD_IN_KERNEL
218309b7 420 stb r0, HSTATE_HWTHREAD_STATE(r13)
56548fc0
PM
421 /* need to recheck hwthread_req after a barrier, to avoid race */
422 sync
423 lbz r3, HSTATE_HWTHREAD_REQ(r13)
424 cmpwi r3, 0
425 bne 54f
426/*
5fa6b6bd 427 * We jump to pnv_wakeup_loss, which will return to the caller
56548fc0
PM
428 * of power7_nap in the powernv cpu offline loop. The value we
429 * put in r3 becomes the return value for power7_nap.
430 */
218309b7
PM
431 li r3, LPCR_PECE0
432 mfspr r4, SPRN_LPCR
433 rlwimi r4, r3, 0, LPCR_PECE0 | LPCR_PECE1
434 mtspr SPRN_LPCR, r4
56548fc0 435 li r3, 0
5fa6b6bd 436 b pnv_wakeup_loss
56548fc0
PM
437
43853: HMT_LOW
b4deba5c
PM
439 ld r5, HSTATE_KVM_VCORE(r13)
440 cmpdi r5, 0
441 bne 60f
442 ld r3, HSTATE_SPLIT_MODE(r13)
443 cmpdi r3, 0
444 beq kvm_no_guest
445 lbz r0, KVM_SPLIT_DO_NAP(r3)
446 cmpwi r0, 0
56548fc0
PM
447 beq kvm_no_guest
448 HMT_MEDIUM
b4deba5c
PM
449 b kvm_unsplit_nap
45060: HMT_MEDIUM
56548fc0
PM
451 b kvm_secondary_got_guest
452
45354: li r0, KVM_HWTHREAD_IN_KVM
454 stb r0, HSTATE_HWTHREAD_STATE(r13)
455 b kvm_no_guest
218309b7 456
b4deba5c
PM
457/*
458 * Here the primary thread is trying to return the core to
459 * whole-core mode, so we need to nap.
460 */
461kvm_unsplit_nap:
fd7bacbc
MS
462 /*
463 * When secondaries are napping in kvm_unsplit_nap() with
464 * hwthread_req = 1, HMI goes ignored even though subcores are
465 * already exited the guest. Hence HMI keeps waking up secondaries
466 * from nap in a loop and secondaries always go back to nap since
467 * no vcore is assigned to them. This makes impossible for primary
468 * thread to get hold of secondary threads resulting into a soft
469 * lockup in KVM path.
470 *
471 * Let us check if HMI is pending and handle it before we go to nap.
472 */
473 cmpwi r12, BOOK3S_INTERRUPT_HMI
474 bne 55f
475 li r3, 0 /* NULL argument */
476 bl hmi_exception_realmode
47755:
7f235328
GS
478 /*
479 * Ensure that secondary doesn't nap when it has
480 * its vcore pointer set.
481 */
482 sync /* matches smp_mb() before setting split_info.do_nap */
483 ld r0, HSTATE_KVM_VCORE(r13)
484 cmpdi r0, 0
485 bne kvm_no_guest
b4deba5c
PM
486 /* clear any pending message */
487BEGIN_FTR_SECTION
488 lis r6, (PPC_DBELL_SERVER << (63-36))@h
489 PPC_MSGCLR(6)
490END_FTR_SECTION_IFSET(CPU_FTR_ARCH_207S)
491 /* Set kvm_split_mode.napped[tid] = 1 */
492 ld r3, HSTATE_SPLIT_MODE(r13)
493 li r0, 1
494 lhz r4, PACAPACAINDEX(r13)
495 clrldi r4, r4, 61 /* micro-threading => P8 => 8 threads/core */
496 addi r4, r4, KVM_SPLIT_NAPPED
497 stbx r0, r3, r4
498 /* Check the do_nap flag again after setting napped[] */
499 sync
500 lbz r0, KVM_SPLIT_DO_NAP(r3)
501 cmpwi r0, 0
502 beq 57f
503 li r3, (LPCR_PECEDH | LPCR_PECE0) >> 4
504 mfspr r4, SPRN_LPCR
505 rlwimi r4, r3, 4, (LPCR_PECEDP | LPCR_PECEDH | LPCR_PECE0 | LPCR_PECE1)
506 mtspr SPRN_LPCR, r4
507 isync
508 std r0, HSTATE_SCRATCH0(r13)
509 ptesync
510 ld r0, HSTATE_SCRATCH0(r13)
5111: cmpd r0, r0
512 bne 1b
513 nap
514 b .
515
51657: li r0, 0
517 stbx r0, r3, r4
518 b kvm_no_guest
519
218309b7
PM
520/******************************************************************************
521 * *
522 * Entry code *
523 * *
524 *****************************************************************************/
525
de56a948
PM
526.global kvmppc_hv_entry
527kvmppc_hv_entry:
528
529 /* Required state:
530 *
e0b7ec05 531 * R4 = vcpu pointer (or NULL)
de56a948
PM
532 * MSR = ~IR|DR
533 * R13 = PACA
534 * R1 = host R1
06a29e42 535 * R2 = TOC
de56a948
PM
536 * all other volatile GPRS = free
537 */
538 mflr r0
218309b7
PM
539 std r0, PPC_LR_STKOFF(r1)
540 stdu r1, -112(r1)
de56a948 541
de56a948
PM
542 /* Save R1 in the PACA */
543 std r1, HSTATE_HOST_R1(r13)
544
44a3add8
PM
545 li r6, KVM_GUEST_MODE_HOST_HV
546 stb r6, HSTATE_IN_GUEST(r13)
547
b6c295df
PM
548#ifdef CONFIG_KVM_BOOK3S_HV_EXIT_TIMING
549 /* Store initial timestamp */
550 cmpdi r4, 0
551 beq 1f
552 addi r3, r4, VCPU_TB_RMENTRY
553 bl kvmhv_start_timing
5541:
555#endif
de56a948
PM
556 /* Clear out SLB */
557 li r6,0
558 slbmte r6,r6
559 slbia
560 ptesync
561
9e368f29 562 /*
c17b98cf 563 * POWER7/POWER8 host -> guest partition switch code.
9e368f29
PM
564 * We don't have to lock against concurrent tlbies,
565 * but we do have to coordinate across hardware threads.
566 */
7d6c40da
PM
567 /* Set bit in entry map iff exit map is zero. */
568 ld r5, HSTATE_KVM_VCORE(r13)
569 li r7, 1
570 lbz r6, HSTATE_PTID(r13)
571 sld r7, r7, r6
572 addi r9, r5, VCORE_ENTRY_EXIT
57321: lwarx r3, 0, r9
574 cmpwi r3, 0x100 /* any threads starting to exit? */
371fefd6 575 bge secondary_too_late /* if so we're too late to the party */
7d6c40da
PM
576 or r3, r3, r7
577 stwcx. r3, 0, r9
371fefd6
PM
578 bne 21b
579
580 /* Primary thread switches to guest partition. */
e0b7ec05 581 ld r9,VCORE_KVM(r5) /* pointer to struct kvm */
371fefd6 582 cmpwi r6,0
6af27c84 583 bne 10f
de56a948
PM
584 ld r6,KVM_SDR1(r9)
585 lwz r7,KVM_LPID(r9)
586 li r0,LPID_RSVD /* switch to reserved LPID */
587 mtspr SPRN_LPID,r0
588 ptesync
589 mtspr SPRN_SDR1,r6 /* switch to partition page table */
590 mtspr SPRN_LPID,r7
591 isync
1b400ba0
PM
592
593 /* See if we need to flush the TLB */
594 lhz r6,PACAPACAINDEX(r13) /* test_bit(cpu, need_tlb_flush) */
595 clrldi r7,r6,64-6 /* extract bit number (6 bits) */
596 srdi r6,r6,6 /* doubleword number */
597 sldi r6,r6,3 /* address offset */
598 add r6,r6,r9
599 addi r6,r6,KVM_NEED_FLUSH /* dword in kvm->arch.need_tlb_flush */
371fefd6 600 li r0,1
1b400ba0
PM
601 sld r0,r0,r7
602 ld r7,0(r6)
603 and. r7,r7,r0
604 beq 22f
60523: ldarx r7,0,r6 /* if set, clear the bit */
606 andc r7,r7,r0
607 stdcx. r7,0,r6
608 bne 23b
ca252055
PM
609 /* Flush the TLB of any entries for this LPID */
610 /* use arch 2.07S as a proxy for POWER8 */
611BEGIN_FTR_SECTION
612 li r6,512 /* POWER8 has 512 sets */
613FTR_SECTION_ELSE
614 li r6,128 /* POWER7 has 128 sets */
615ALT_FTR_SECTION_END_IFSET(CPU_FTR_ARCH_207S)
1b400ba0
PM
616 mtctr r6
617 li r7,0x800 /* IS field = 0b10 */
618 ptesync
61928: tlbiel r7
620 addi r7,r7,0x1000
621 bdnz 28b
622 ptesync
623
93b0f4dc
PM
624 /* Add timebase offset onto timebase */
62522: ld r8,VCORE_TB_OFFSET(r5)
626 cmpdi r8,0
627 beq 37f
628 mftb r6 /* current host timebase */
629 add r8,r8,r6
630 mtspr SPRN_TBU40,r8 /* update upper 40 bits */
631 mftb r7 /* check if lower 24 bits overflowed */
632 clrldi r6,r6,40
633 clrldi r7,r7,40
634 cmpld r7,r6
635 bge 37f
636 addis r8,r8,0x100 /* if so, increment upper 40 bits */
637 mtspr SPRN_TBU40,r8
638
388cc6e1
PM
639 /* Load guest PCR value to select appropriate compat mode */
64037: ld r7, VCORE_PCR(r5)
641 cmpdi r7, 0
642 beq 38f
643 mtspr SPRN_PCR, r7
64438:
b005255e
MN
645
646BEGIN_FTR_SECTION
647 /* DPDES is shared between threads */
648 ld r8, VCORE_DPDES(r5)
649 mtspr SPRN_DPDES, r8
650END_FTR_SECTION_IFSET(CPU_FTR_ARCH_207S)
651
fd7bacbc
MS
652 /* Mark the subcore state as inside guest */
653 bl kvmppc_subcore_enter_guest
654 nop
655 ld r5, HSTATE_KVM_VCORE(r13)
656 ld r4, HSTATE_KVM_VCPU(r13)
388cc6e1 657 li r0,1
371fefd6 658 stb r0,VCORE_IN_GUEST(r5) /* signal secondaries to continue */
9e368f29 659
e0b7ec05 660 /* Do we have a guest vcpu to run? */
6af27c84 66110: cmpdi r4, 0
e0b7ec05
PM
662 beq kvmppc_primary_no_guest
663kvmppc_got_guest:
de56a948
PM
664
665 /* Load up guest SLB entries */
e0b7ec05 666 lwz r5,VCPU_SLB_MAX(r4)
de56a948
PM
667 cmpwi r5,0
668 beq 9f
669 mtctr r5
670 addi r6,r4,VCPU_SLB
6711: ld r8,VCPU_SLB_E(r6)
672 ld r9,VCPU_SLB_V(r6)
673 slbmte r9,r8
674 addi r6,r6,VCPU_SLB_SIZE
675 bdnz 1b
6769:
e0b7ec05
PM
677 /* Increment yield count if they have a VPA */
678 ld r3, VCPU_VPA(r4)
679 cmpdi r3, 0
680 beq 25f
0865a583
AG
681 li r6, LPPACA_YIELDCOUNT
682 LWZX_BE r5, r3, r6
e0b7ec05 683 addi r5, r5, 1
0865a583 684 STWX_BE r5, r3, r6
e0b7ec05
PM
685 li r6, 1
686 stb r6, VCPU_VPA_DIRTY(r4)
68725:
688
e0b7ec05
PM
689 /* Save purr/spurr */
690 mfspr r5,SPRN_PURR
691 mfspr r6,SPRN_SPURR
692 std r5,HSTATE_PURR(r13)
693 std r6,HSTATE_SPURR(r13)
694 ld r7,VCPU_PURR(r4)
695 ld r8,VCPU_SPURR(r4)
696 mtspr SPRN_PURR,r7
697 mtspr SPRN_SPURR,r8
e0b7ec05
PM
698
699BEGIN_FTR_SECTION
700 /* Set partition DABR */
701 /* Do this before re-enabling PMU to avoid P7 DABR corruption bug */
8563bf52 702 lwz r5,VCPU_DABRX(r4)
e0b7ec05
PM
703 ld r6,VCPU_DABR(r4)
704 mtspr SPRN_DABRX,r5
705 mtspr SPRN_DABR,r6
e0b7ec05 706 isync
e0b7ec05
PM
707END_FTR_SECTION_IFCLR(CPU_FTR_ARCH_207S)
708
e4e38121
MN
709#ifdef CONFIG_PPC_TRANSACTIONAL_MEM
710BEGIN_FTR_SECTION
f024ee09
PM
711 bl kvmppc_restore_tm
712END_FTR_SECTION_IFSET(CPU_FTR_TM)
e4e38121
MN
713#endif
714
e0b7ec05
PM
715 /* Load guest PMU registers */
716 /* R4 is live here (vcpu pointer) */
717 li r3, 1
718 sldi r3, r3, 31 /* MMCR0_FC (freeze counters) bit */
719 mtspr SPRN_MMCR0, r3 /* freeze all counters, disable ints */
720 isync
9bc01a9b
PM
721BEGIN_FTR_SECTION
722 ld r3, VCPU_MMCR(r4)
723 andi. r5, r3, MMCR0_PMAO_SYNC | MMCR0_PMAO
724 cmpwi r5, MMCR0_PMAO
725 beql kvmppc_fix_pmao
726END_FTR_SECTION_IFSET(CPU_FTR_PMAO_BUG)
e0b7ec05
PM
727 lwz r3, VCPU_PMC(r4) /* always load up guest PMU registers */
728 lwz r5, VCPU_PMC + 4(r4) /* to prevent information leak */
729 lwz r6, VCPU_PMC + 8(r4)
730 lwz r7, VCPU_PMC + 12(r4)
731 lwz r8, VCPU_PMC + 16(r4)
732 lwz r9, VCPU_PMC + 20(r4)
e0b7ec05
PM
733 mtspr SPRN_PMC1, r3
734 mtspr SPRN_PMC2, r5
735 mtspr SPRN_PMC3, r6
736 mtspr SPRN_PMC4, r7
737 mtspr SPRN_PMC5, r8
738 mtspr SPRN_PMC6, r9
e0b7ec05
PM
739 ld r3, VCPU_MMCR(r4)
740 ld r5, VCPU_MMCR + 8(r4)
741 ld r6, VCPU_MMCR + 16(r4)
742 ld r7, VCPU_SIAR(r4)
743 ld r8, VCPU_SDAR(r4)
744 mtspr SPRN_MMCR1, r5
745 mtspr SPRN_MMCRA, r6
746 mtspr SPRN_SIAR, r7
747 mtspr SPRN_SDAR, r8
b005255e
MN
748BEGIN_FTR_SECTION
749 ld r5, VCPU_MMCR + 24(r4)
750 ld r6, VCPU_SIER(r4)
751 lwz r7, VCPU_PMC + 24(r4)
752 lwz r8, VCPU_PMC + 28(r4)
753 ld r9, VCPU_MMCR + 32(r4)
754 mtspr SPRN_MMCR2, r5
755 mtspr SPRN_SIER, r6
756 mtspr SPRN_SPMC1, r7
757 mtspr SPRN_SPMC2, r8
758 mtspr SPRN_MMCRS, r9
759END_FTR_SECTION_IFSET(CPU_FTR_ARCH_207S)
e0b7ec05
PM
760 mtspr SPRN_MMCR0, r3
761 isync
762
763 /* Load up FP, VMX and VSX registers */
764 bl kvmppc_load_fp
765
766 ld r14, VCPU_GPR(R14)(r4)
767 ld r15, VCPU_GPR(R15)(r4)
768 ld r16, VCPU_GPR(R16)(r4)
769 ld r17, VCPU_GPR(R17)(r4)
770 ld r18, VCPU_GPR(R18)(r4)
771 ld r19, VCPU_GPR(R19)(r4)
772 ld r20, VCPU_GPR(R20)(r4)
773 ld r21, VCPU_GPR(R21)(r4)
774 ld r22, VCPU_GPR(R22)(r4)
775 ld r23, VCPU_GPR(R23)(r4)
776 ld r24, VCPU_GPR(R24)(r4)
777 ld r25, VCPU_GPR(R25)(r4)
778 ld r26, VCPU_GPR(R26)(r4)
779 ld r27, VCPU_GPR(R27)(r4)
780 ld r28, VCPU_GPR(R28)(r4)
781 ld r29, VCPU_GPR(R29)(r4)
782 ld r30, VCPU_GPR(R30)(r4)
783 ld r31, VCPU_GPR(R31)(r4)
784
e0b7ec05
PM
785 /* Switch DSCR to guest value */
786 ld r5, VCPU_DSCR(r4)
787 mtspr SPRN_DSCR, r5
e0b7ec05 788
b005255e 789BEGIN_FTR_SECTION
c17b98cf 790 /* Skip next section on POWER7 */
b005255e
MN
791 b 8f
792END_FTR_SECTION_IFCLR(CPU_FTR_ARCH_207S)
b005255e
MN
793 /* Load up POWER8-specific registers */
794 ld r5, VCPU_IAMR(r4)
795 lwz r6, VCPU_PSPB(r4)
796 ld r7, VCPU_FSCR(r4)
797 mtspr SPRN_IAMR, r5
798 mtspr SPRN_PSPB, r6
799 mtspr SPRN_FSCR, r7
800 ld r5, VCPU_DAWR(r4)
801 ld r6, VCPU_DAWRX(r4)
802 ld r7, VCPU_CIABR(r4)
803 ld r8, VCPU_TAR(r4)
804 mtspr SPRN_DAWR, r5
805 mtspr SPRN_DAWRX, r6
806 mtspr SPRN_CIABR, r7
807 mtspr SPRN_TAR, r8
808 ld r5, VCPU_IC(r4)
809 ld r6, VCPU_VTB(r4)
810 mtspr SPRN_IC, r5
811 mtspr SPRN_VTB, r6
7b490411 812 ld r8, VCPU_EBBHR(r4)
b005255e
MN
813 mtspr SPRN_EBBHR, r8
814 ld r5, VCPU_EBBRR(r4)
815 ld r6, VCPU_BESCR(r4)
816 ld r7, VCPU_CSIGR(r4)
817 ld r8, VCPU_TACR(r4)
818 mtspr SPRN_EBBRR, r5
819 mtspr SPRN_BESCR, r6
820 mtspr SPRN_CSIGR, r7
821 mtspr SPRN_TACR, r8
822 ld r5, VCPU_TCSCR(r4)
823 ld r6, VCPU_ACOP(r4)
824 lwz r7, VCPU_GUEST_PID(r4)
825 ld r8, VCPU_WORT(r4)
826 mtspr SPRN_TCSCR, r5
827 mtspr SPRN_ACOP, r6
828 mtspr SPRN_PID, r7
829 mtspr SPRN_WORT, r8
8308:
831
e0b7ec05
PM
832 /*
833 * Set the decrementer to the guest decrementer.
834 */
835 ld r8,VCPU_DEC_EXPIRES(r4)
c5fb80d3
PM
836 /* r8 is a host timebase value here, convert to guest TB */
837 ld r5,HSTATE_KVM_VCORE(r13)
838 ld r6,VCORE_TB_OFFSET(r5)
839 add r8,r8,r6
e0b7ec05
PM
840 mftb r7
841 subf r3,r7,r8
842 mtspr SPRN_DEC,r3
843 stw r3,VCPU_DEC(r4)
844
845 ld r5, VCPU_SPRG0(r4)
846 ld r6, VCPU_SPRG1(r4)
847 ld r7, VCPU_SPRG2(r4)
848 ld r8, VCPU_SPRG3(r4)
849 mtspr SPRN_SPRG0, r5
850 mtspr SPRN_SPRG1, r6
851 mtspr SPRN_SPRG2, r7
852 mtspr SPRN_SPRG3, r8
853
854 /* Load up DAR and DSISR */
855 ld r5, VCPU_DAR(r4)
856 lwz r6, VCPU_DSISR(r4)
857 mtspr SPRN_DAR, r5
858 mtspr SPRN_DSISR, r6
859
e0b7ec05
PM
860 /* Restore AMR and UAMOR, set AMOR to all 1s */
861 ld r5,VCPU_AMR(r4)
862 ld r6,VCPU_UAMOR(r4)
863 li r7,-1
864 mtspr SPRN_AMR,r5
865 mtspr SPRN_UAMOR,r6
866 mtspr SPRN_AMOR,r7
de56a948
PM
867
868 /* Restore state of CTRL run bit; assume 1 on entry */
869 lwz r5,VCPU_CTRL(r4)
870 andi. r5,r5,1
871 bne 4f
872 mfspr r6,SPRN_CTRLF
873 clrrdi r6,r6,1
874 mtspr SPRN_CTRLT,r6
8754:
6af27c84
PM
876 /* Secondary threads wait for primary to have done partition switch */
877 ld r5, HSTATE_KVM_VCORE(r13)
878 lbz r6, HSTATE_PTID(r13)
879 cmpwi r6, 0
880 beq 21f
881 lbz r0, VCORE_IN_GUEST(r5)
882 cmpwi r0, 0
883 bne 21f
884 HMT_LOW
b4deba5c
PM
88520: lwz r3, VCORE_ENTRY_EXIT(r5)
886 cmpwi r3, 0x100
887 bge no_switch_exit
888 lbz r0, VCORE_IN_GUEST(r5)
6af27c84
PM
889 cmpwi r0, 0
890 beq 20b
891 HMT_MEDIUM
89221:
893 /* Set LPCR. */
894 ld r8,VCORE_LPCR(r5)
895 mtspr SPRN_LPCR,r8
896 isync
897
898 /* Check if HDEC expires soon */
899 mfspr r3, SPRN_HDEC
900 cmpwi r3, 512 /* 1 microsecond */
901 blt hdec_soon
902
37f55d30 903deliver_guest_interrupt:
de56a948 904 ld r6, VCPU_CTR(r4)
c63517c2 905 ld r7, VCPU_XER(r4)
de56a948
PM
906
907 mtctr r6
908 mtxer r7
909
e3bbbbfa 910kvmppc_cede_reentry: /* r4 = vcpu, r13 = paca */
4619ac88
PM
911 ld r10, VCPU_PC(r4)
912 ld r11, VCPU_MSR(r4)
de56a948
PM
913 ld r6, VCPU_SRR0(r4)
914 ld r7, VCPU_SRR1(r4)
e3bbbbfa
PM
915 mtspr SPRN_SRR0, r6
916 mtspr SPRN_SRR1, r7
de56a948 917
4619ac88 918 /* r11 = vcpu->arch.msr & ~MSR_HV */
de56a948
PM
919 rldicl r11, r11, 63 - MSR_HV_LG, 1
920 rotldi r11, r11, 1 + MSR_HV_LG
921 ori r11, r11, MSR_ME
922
19ccb76a 923 /* Check if we can deliver an external or decrementer interrupt now */
e3bbbbfa
PM
924 ld r0, VCPU_PENDING_EXC(r4)
925 rldicl r0, r0, 64 - BOOK3S_IRQPRIO_EXTERNAL_LEVEL, 63
926 cmpdi cr1, r0, 0
927 andi. r8, r11, MSR_EE
e3bbbbfa
PM
928 mfspr r8, SPRN_LPCR
929 /* Insert EXTERNAL_LEVEL bit into LPCR at the MER bit position */
930 rldimi r8, r0, LPCR_MER_SH, 63 - LPCR_MER_SH
931 mtspr SPRN_LPCR, r8
19ccb76a 932 isync
19ccb76a 933 beq 5f
e3bbbbfa
PM
934 li r0, BOOK3S_INTERRUPT_EXTERNAL
935 bne cr1, 12f
936 mfspr r0, SPRN_DEC
937 cmpwi r0, 0
938 li r0, BOOK3S_INTERRUPT_DECREMENTER
939 bge 5f
19ccb76a 940
e3bbbbfa 94112: mtspr SPRN_SRR0, r10
19ccb76a 942 mr r10,r0
e3bbbbfa 943 mtspr SPRN_SRR1, r11
e4e38121
MN
944 mr r9, r4
945 bl kvmppc_msr_interrupt
e3bbbbfa 9465:
19ccb76a 947
27025a60
LPF
948/*
949 * Required state:
950 * R4 = vcpu
951 * R10: value for HSRR0
952 * R11: value for HSRR1
953 * R13 = PACA
954 */
de56a948 955fast_guest_return:
4619ac88
PM
956 li r0,0
957 stb r0,VCPU_CEDED(r4) /* cancel cede */
de56a948
PM
958 mtspr SPRN_HSRR0,r10
959 mtspr SPRN_HSRR1,r11
960
961 /* Activate guest mode, so faults get handled by KVM */
44a3add8 962 li r9, KVM_GUEST_MODE_GUEST_HV
de56a948
PM
963 stb r9, HSTATE_IN_GUEST(r13)
964
b6c295df
PM
965#ifdef CONFIG_KVM_BOOK3S_HV_EXIT_TIMING
966 /* Accumulate timing */
967 addi r3, r4, VCPU_TB_GUEST
968 bl kvmhv_accumulate_time
969#endif
970
de56a948
PM
971 /* Enter guest */
972
0acb9111
PM
973BEGIN_FTR_SECTION
974 ld r5, VCPU_CFAR(r4)
975 mtspr SPRN_CFAR, r5
976END_FTR_SECTION_IFSET(CPU_FTR_CFAR)
4b8473c9
PM
977BEGIN_FTR_SECTION
978 ld r0, VCPU_PPR(r4)
979END_FTR_SECTION_IFSET(CPU_FTR_HAS_PPR)
0acb9111 980
de56a948
PM
981 ld r5, VCPU_LR(r4)
982 lwz r6, VCPU_CR(r4)
983 mtlr r5
984 mtcr r6
985
c75df6f9
MN
986 ld r1, VCPU_GPR(R1)(r4)
987 ld r2, VCPU_GPR(R2)(r4)
988 ld r3, VCPU_GPR(R3)(r4)
989 ld r5, VCPU_GPR(R5)(r4)
990 ld r6, VCPU_GPR(R6)(r4)
991 ld r7, VCPU_GPR(R7)(r4)
992 ld r8, VCPU_GPR(R8)(r4)
993 ld r9, VCPU_GPR(R9)(r4)
994 ld r10, VCPU_GPR(R10)(r4)
995 ld r11, VCPU_GPR(R11)(r4)
996 ld r12, VCPU_GPR(R12)(r4)
997 ld r13, VCPU_GPR(R13)(r4)
998
4b8473c9
PM
999BEGIN_FTR_SECTION
1000 mtspr SPRN_PPR, r0
1001END_FTR_SECTION_IFSET(CPU_FTR_HAS_PPR)
1002 ld r0, VCPU_GPR(R0)(r4)
c75df6f9 1003 ld r4, VCPU_GPR(R4)(r4)
de56a948
PM
1004
1005 hrfid
1006 b .
1007
b6c295df 1008secondary_too_late:
6af27c84 1009 li r12, 0
b6c295df
PM
1010 cmpdi r4, 0
1011 beq 11f
6af27c84
PM
1012 stw r12, VCPU_TRAP(r4)
1013#ifdef CONFIG_KVM_BOOK3S_HV_EXIT_TIMING
b6c295df
PM
1014 addi r3, r4, VCPU_TB_RMEXIT
1015 bl kvmhv_accumulate_time
6af27c84 1016#endif
b6c295df
PM
101711: b kvmhv_switch_to_host
1018
b4deba5c
PM
1019no_switch_exit:
1020 HMT_MEDIUM
1021 li r12, 0
1022 b 12f
b6c295df 1023hdec_soon:
6af27c84 1024 li r12, BOOK3S_INTERRUPT_HV_DECREMENTER
b4deba5c 102512: stw r12, VCPU_TRAP(r4)
6af27c84
PM
1026 mr r9, r4
1027#ifdef CONFIG_KVM_BOOK3S_HV_EXIT_TIMING
b6c295df
PM
1028 addi r3, r4, VCPU_TB_RMEXIT
1029 bl kvmhv_accumulate_time
b6c295df 1030#endif
6af27c84 1031 b guest_exit_cont
b6c295df 1032
de56a948
PM
1033/******************************************************************************
1034 * *
1035 * Exit code *
1036 * *
1037 *****************************************************************************/
1038
1039/*
1040 * We come here from the first-level interrupt handlers.
1041 */
dd96b2c2
AK
1042 .globl kvmppc_interrupt_hv
1043kvmppc_interrupt_hv:
de56a948
PM
1044 /*
1045 * Register contents:
1046 * R12 = interrupt vector
1047 * R13 = PACA
1048 * guest CR, R12 saved in shadow VCPU SCRATCH1/0
1049 * guest R13 saved in SPRN_SCRATCH0
1050 */
36e7bb38 1051 std r9, HSTATE_SCRATCH2(r13)
44a3add8
PM
1052
1053 lbz r9, HSTATE_IN_GUEST(r13)
1054 cmpwi r9, KVM_GUEST_MODE_HOST_HV
1055 beq kvmppc_bad_host_intr
dd96b2c2
AK
1056#ifdef CONFIG_KVM_BOOK3S_PR_POSSIBLE
1057 cmpwi r9, KVM_GUEST_MODE_GUEST
36e7bb38 1058 ld r9, HSTATE_SCRATCH2(r13)
dd96b2c2
AK
1059 beq kvmppc_interrupt_pr
1060#endif
44a3add8
PM
1061 /* We're now back in the host but in guest MMU context */
1062 li r9, KVM_GUEST_MODE_HOST_HV
1063 stb r9, HSTATE_IN_GUEST(r13)
1064
de56a948
PM
1065 ld r9, HSTATE_KVM_VCPU(r13)
1066
1067 /* Save registers */
1068
c75df6f9
MN
1069 std r0, VCPU_GPR(R0)(r9)
1070 std r1, VCPU_GPR(R1)(r9)
1071 std r2, VCPU_GPR(R2)(r9)
1072 std r3, VCPU_GPR(R3)(r9)
1073 std r4, VCPU_GPR(R4)(r9)
1074 std r5, VCPU_GPR(R5)(r9)
1075 std r6, VCPU_GPR(R6)(r9)
1076 std r7, VCPU_GPR(R7)(r9)
1077 std r8, VCPU_GPR(R8)(r9)
36e7bb38 1078 ld r0, HSTATE_SCRATCH2(r13)
c75df6f9
MN
1079 std r0, VCPU_GPR(R9)(r9)
1080 std r10, VCPU_GPR(R10)(r9)
1081 std r11, VCPU_GPR(R11)(r9)
de56a948
PM
1082 ld r3, HSTATE_SCRATCH0(r13)
1083 lwz r4, HSTATE_SCRATCH1(r13)
c75df6f9 1084 std r3, VCPU_GPR(R12)(r9)
de56a948 1085 stw r4, VCPU_CR(r9)
0acb9111
PM
1086BEGIN_FTR_SECTION
1087 ld r3, HSTATE_CFAR(r13)
1088 std r3, VCPU_CFAR(r9)
1089END_FTR_SECTION_IFSET(CPU_FTR_CFAR)
4b8473c9
PM
1090BEGIN_FTR_SECTION
1091 ld r4, HSTATE_PPR(r13)
1092 std r4, VCPU_PPR(r9)
1093END_FTR_SECTION_IFSET(CPU_FTR_HAS_PPR)
de56a948
PM
1094
1095 /* Restore R1/R2 so we can handle faults */
1096 ld r1, HSTATE_HOST_R1(r13)
1097 ld r2, PACATOC(r13)
1098
1099 mfspr r10, SPRN_SRR0
1100 mfspr r11, SPRN_SRR1
1101 std r10, VCPU_SRR0(r9)
1102 std r11, VCPU_SRR1(r9)
1103 andi. r0, r12, 2 /* need to read HSRR0/1? */
1104 beq 1f
1105 mfspr r10, SPRN_HSRR0
1106 mfspr r11, SPRN_HSRR1
1107 clrrdi r12, r12, 2
11081: std r10, VCPU_PC(r9)
1109 std r11, VCPU_MSR(r9)
1110
1111 GET_SCRATCH0(r3)
1112 mflr r4
c75df6f9 1113 std r3, VCPU_GPR(R13)(r9)
de56a948
PM
1114 std r4, VCPU_LR(r9)
1115
de56a948
PM
1116 stw r12,VCPU_TRAP(r9)
1117
b6c295df
PM
1118#ifdef CONFIG_KVM_BOOK3S_HV_EXIT_TIMING
1119 addi r3, r9, VCPU_TB_RMINTR
1120 mr r4, r9
1121 bl kvmhv_accumulate_time
1122 ld r5, VCPU_GPR(R5)(r9)
1123 ld r6, VCPU_GPR(R6)(r9)
1124 ld r7, VCPU_GPR(R7)(r9)
1125 ld r8, VCPU_GPR(R8)(r9)
1126#endif
1127
4a157d61 1128 /* Save HEIR (HV emulation assist reg) in emul_inst
697d3899
PM
1129 if this is an HEI (HV emulation interrupt, e40) */
1130 li r3,KVM_INST_FETCH_FAILED
2bf27601 1131 stw r3,VCPU_LAST_INST(r9)
697d3899
PM
1132 cmpwi r12,BOOK3S_INTERRUPT_H_EMUL_ASSIST
1133 bne 11f
1134 mfspr r3,SPRN_HEIR
4a157d61 113511: stw r3,VCPU_HEIR(r9)
697d3899
PM
1136
1137 /* these are volatile across C function calls */
1138 mfctr r3
1139 mfxer r4
1140 std r3, VCPU_CTR(r9)
c63517c2 1141 std r4, VCPU_XER(r9)
697d3899 1142
697d3899
PM
1143 /* If this is a page table miss then see if it's theirs or ours */
1144 cmpwi r12, BOOK3S_INTERRUPT_H_DATA_STORAGE
1145 beq kvmppc_hdsi
342d3db7
PM
1146 cmpwi r12, BOOK3S_INTERRUPT_H_INST_STORAGE
1147 beq kvmppc_hisi
697d3899 1148
de56a948
PM
1149 /* See if this is a leftover HDEC interrupt */
1150 cmpwi r12,BOOK3S_INTERRUPT_HV_DECREMENTER
1151 bne 2f
1152 mfspr r3,SPRN_HDEC
1153 cmpwi r3,0
1f09c3ed
PM
1154 mr r4,r9
1155 bge fast_guest_return
de56a948 11562:
697d3899 1157 /* See if this is an hcall we can handle in real mode */
a8606e20
PM
1158 cmpwi r12,BOOK3S_INTERRUPT_SYSCALL
1159 beq hcall_try_real_mode
de56a948 1160
66feed61
PM
1161 /* Hypervisor doorbell - exit only if host IPI flag set */
1162 cmpwi r12, BOOK3S_INTERRUPT_H_DOORBELL
1163 bne 3f
1164 lbz r0, HSTATE_HOST_IPI(r13)
06554d9f 1165 cmpwi r0, 0
66feed61
PM
1166 beq 4f
1167 b guest_exit_cont
11683:
54695c30
BH
1169 /* External interrupt ? */
1170 cmpwi r12, BOOK3S_INTERRUPT_EXTERNAL
1f09c3ed 1171 bne+ guest_exit_cont
54695c30
BH
1172
1173 /* External interrupt, first check for host_ipi. If this is
1174 * set, we know the host wants us out so let's do it now
1175 */
c934243c 1176 bl kvmppc_read_intr
37f55d30
SW
1177
1178 /*
1179 * Restore the active volatile registers after returning from
1180 * a C function.
1181 */
1182 ld r9, HSTATE_KVM_VCPU(r13)
1183 li r12, BOOK3S_INTERRUPT_EXTERNAL
1184
1185 /*
1186 * kvmppc_read_intr return codes:
1187 *
1188 * Exit to host (r3 > 0)
1189 * 1 An interrupt is pending that needs to be handled by the host
1190 * Exit guest and return to host by branching to guest_exit_cont
1191 *
f7af5209
SW
1192 * 2 Passthrough that needs completion in the host
1193 * Exit guest and return to host by branching to guest_exit_cont
1194 * However, we also set r12 to BOOK3S_INTERRUPT_HV_RM_HARD
1195 * to indicate to the host to complete handling the interrupt
1196 *
37f55d30
SW
1197 * Before returning to guest, we check if any CPU is heading out
1198 * to the host and if so, we head out also. If no CPUs are heading
1199 * check return values <= 0.
1200 *
1201 * Return to guest (r3 <= 0)
1202 * 0 No external interrupt is pending
1203 * -1 A guest wakeup IPI (which has now been cleared)
1204 * In either case, we return to guest to deliver any pending
1205 * guest interrupts.
e3c13e56
SW
1206 *
1207 * -2 A PCI passthrough external interrupt was handled
1208 * (interrupt was delivered directly to guest)
1209 * Return to guest to deliver any pending guest interrupts.
37f55d30
SW
1210 */
1211
f7af5209
SW
1212 cmpdi r3, 1
1213 ble 1f
1214
1215 /* Return code = 2 */
1216 li r12, BOOK3S_INTERRUPT_HV_RM_HARD
1217 stw r12, VCPU_TRAP(r9)
1218 b guest_exit_cont
1219
12201: /* Return code <= 1 */
c934243c 1221 cmpdi r3, 0
1f09c3ed 1222 bgt guest_exit_cont
54695c30 1223
37f55d30 1224 /* Return code <= 0 */
66feed61 12254: ld r5, HSTATE_KVM_VCORE(r13)
4619ac88
PM
1226 lwz r0, VCORE_ENTRY_EXIT(r5)
1227 cmpwi r0, 0x100
e3bbbbfa 1228 mr r4, r9
1f09c3ed 1229 blt deliver_guest_interrupt
de56a948 1230
b4072df4 1231guest_exit_cont: /* r9 = vcpu, r12 = trap, r13 = paca */
de56a948 1232 /* Save more register state */
de56a948
PM
1233 mfdar r6
1234 mfdsisr r7
de56a948
PM
1235 std r6, VCPU_DAR(r9)
1236 stw r7, VCPU_DSISR(r9)
697d3899 1237 /* don't overwrite fault_dar/fault_dsisr if HDSI */
de56a948 1238 cmpwi r12,BOOK3S_INTERRUPT_H_DATA_STORAGE
6af27c84 1239 beq mc_cont
697d3899 1240 std r6, VCPU_FAULT_DAR(r9)
de56a948
PM
1241 stw r7, VCPU_FAULT_DSISR(r9)
1242
b4072df4
PM
1243 /* See if it is a machine check */
1244 cmpwi r12, BOOK3S_INTERRUPT_MACHINE_CHECK
1245 beq machine_check_realmode
1246mc_cont:
b6c295df
PM
1247#ifdef CONFIG_KVM_BOOK3S_HV_EXIT_TIMING
1248 addi r3, r9, VCPU_TB_RMEXIT
1249 mr r4, r9
1250 bl kvmhv_accumulate_time
1251#endif
b4072df4 1252
7e022e71 1253 mr r3, r12
6af27c84
PM
1254 /* Increment exit count, poke other threads to exit */
1255 bl kvmhv_commence_exit
eddb60fb
PM
1256 nop
1257 ld r9, HSTATE_KVM_VCPU(r13)
1258 lwz r12, VCPU_TRAP(r9)
6af27c84 1259
ec257165
PM
1260 /* Stop others sending VCPU interrupts to this physical CPU */
1261 li r0, -1
1262 stw r0, VCPU_CPU(r9)
1263 stw r0, VCPU_THREAD_CPU(r9)
1264
de56a948 1265 /* Save guest CTRL register, set runlatch to 1 */
6af27c84 1266 mfspr r6,SPRN_CTRLF
de56a948
PM
1267 stw r6,VCPU_CTRL(r9)
1268 andi. r0,r6,1
1269 bne 4f
1270 ori r6,r6,1
1271 mtspr SPRN_CTRLT,r6
12724:
1273 /* Read the guest SLB and save it away */
1274 lwz r0,VCPU_SLB_NR(r9) /* number of entries in SLB */
1275 mtctr r0
1276 li r6,0
1277 addi r7,r9,VCPU_SLB
1278 li r5,0
12791: slbmfee r8,r6
1280 andis. r0,r8,SLB_ESID_V@h
1281 beq 2f
1282 add r8,r8,r6 /* put index in */
1283 slbmfev r3,r6
1284 std r8,VCPU_SLB_E(r7)
1285 std r3,VCPU_SLB_V(r7)
1286 addi r7,r7,VCPU_SLB_SIZE
1287 addi r5,r5,1
12882: addi r6,r6,1
1289 bdnz 1b
1290 stw r5,VCPU_SLB_MAX(r9)
1291
1292 /*
1293 * Save the guest PURR/SPURR
1294 */
1295 mfspr r5,SPRN_PURR
1296 mfspr r6,SPRN_SPURR
1297 ld r7,VCPU_PURR(r9)
1298 ld r8,VCPU_SPURR(r9)
1299 std r5,VCPU_PURR(r9)
1300 std r6,VCPU_SPURR(r9)
1301 subf r5,r7,r5
1302 subf r6,r8,r6
1303
1304 /*
1305 * Restore host PURR/SPURR and add guest times
1306 * so that the time in the guest gets accounted.
1307 */
1308 ld r3,HSTATE_PURR(r13)
1309 ld r4,HSTATE_SPURR(r13)
1310 add r3,r3,r5
1311 add r4,r4,r6
1312 mtspr SPRN_PURR,r3
1313 mtspr SPRN_SPURR,r4
1314
e0b7ec05
PM
1315 /* Save DEC */
1316 mfspr r5,SPRN_DEC
1317 mftb r6
1318 extsw r5,r5
1319 add r5,r5,r6
c5fb80d3
PM
1320 /* r5 is a guest timebase value here, convert to host TB */
1321 ld r3,HSTATE_KVM_VCORE(r13)
1322 ld r4,VCORE_TB_OFFSET(r3)
1323 subf r5,r4,r5
e0b7ec05
PM
1324 std r5,VCPU_DEC_EXPIRES(r9)
1325
b005255e
MN
1326BEGIN_FTR_SECTION
1327 b 8f
1328END_FTR_SECTION_IFCLR(CPU_FTR_ARCH_207S)
b005255e
MN
1329 /* Save POWER8-specific registers */
1330 mfspr r5, SPRN_IAMR
1331 mfspr r6, SPRN_PSPB
1332 mfspr r7, SPRN_FSCR
1333 std r5, VCPU_IAMR(r9)
1334 stw r6, VCPU_PSPB(r9)
1335 std r7, VCPU_FSCR(r9)
1336 mfspr r5, SPRN_IC
1337 mfspr r6, SPRN_VTB
1338 mfspr r7, SPRN_TAR
1339 std r5, VCPU_IC(r9)
1340 std r6, VCPU_VTB(r9)
1341 std r7, VCPU_TAR(r9)
7b490411 1342 mfspr r8, SPRN_EBBHR
b005255e
MN
1343 std r8, VCPU_EBBHR(r9)
1344 mfspr r5, SPRN_EBBRR
1345 mfspr r6, SPRN_BESCR
1346 mfspr r7, SPRN_CSIGR
1347 mfspr r8, SPRN_TACR
1348 std r5, VCPU_EBBRR(r9)
1349 std r6, VCPU_BESCR(r9)
1350 std r7, VCPU_CSIGR(r9)
1351 std r8, VCPU_TACR(r9)
1352 mfspr r5, SPRN_TCSCR
1353 mfspr r6, SPRN_ACOP
1354 mfspr r7, SPRN_PID
1355 mfspr r8, SPRN_WORT
1356 std r5, VCPU_TCSCR(r9)
1357 std r6, VCPU_ACOP(r9)
1358 stw r7, VCPU_GUEST_PID(r9)
1359 std r8, VCPU_WORT(r9)
ccec4456
PM
1360 /*
1361 * Restore various registers to 0, where non-zero values
1362 * set by the guest could disrupt the host.
1363 */
1364 li r0, 0
1365 mtspr SPRN_IAMR, r0
1366 mtspr SPRN_CIABR, r0
1367 mtspr SPRN_DAWRX, r0
1368 mtspr SPRN_TCSCR, r0
1369 mtspr SPRN_WORT, r0
1370 /* Set MMCRS to 1<<31 to freeze and disable the SPMC counters */
1371 li r0, 1
1372 sldi r0, r0, 31
1373 mtspr SPRN_MMCRS, r0
b005255e
MN
13748:
1375
e0b7ec05 1376 /* Save and reset AMR and UAMOR before turning on the MMU */
e0b7ec05
PM
1377 mfspr r5,SPRN_AMR
1378 mfspr r6,SPRN_UAMOR
1379 std r5,VCPU_AMR(r9)
1380 std r6,VCPU_UAMOR(r9)
1381 li r6,0
1382 mtspr SPRN_AMR,r6
e0b7ec05
PM
1383
1384 /* Switch DSCR back to host value */
e0b7ec05
PM
1385 mfspr r8, SPRN_DSCR
1386 ld r7, HSTATE_DSCR(r13)
1387 std r8, VCPU_DSCR(r9)
1388 mtspr SPRN_DSCR, r7
e0b7ec05
PM
1389
1390 /* Save non-volatile GPRs */
1391 std r14, VCPU_GPR(R14)(r9)
1392 std r15, VCPU_GPR(R15)(r9)
1393 std r16, VCPU_GPR(R16)(r9)
1394 std r17, VCPU_GPR(R17)(r9)
1395 std r18, VCPU_GPR(R18)(r9)
1396 std r19, VCPU_GPR(R19)(r9)
1397 std r20, VCPU_GPR(R20)(r9)
1398 std r21, VCPU_GPR(R21)(r9)
1399 std r22, VCPU_GPR(R22)(r9)
1400 std r23, VCPU_GPR(R23)(r9)
1401 std r24, VCPU_GPR(R24)(r9)
1402 std r25, VCPU_GPR(R25)(r9)
1403 std r26, VCPU_GPR(R26)(r9)
1404 std r27, VCPU_GPR(R27)(r9)
1405 std r28, VCPU_GPR(R28)(r9)
1406 std r29, VCPU_GPR(R29)(r9)
1407 std r30, VCPU_GPR(R30)(r9)
1408 std r31, VCPU_GPR(R31)(r9)
1409
1410 /* Save SPRGs */
1411 mfspr r3, SPRN_SPRG0
1412 mfspr r4, SPRN_SPRG1
1413 mfspr r5, SPRN_SPRG2
1414 mfspr r6, SPRN_SPRG3
1415 std r3, VCPU_SPRG0(r9)
1416 std r4, VCPU_SPRG1(r9)
1417 std r5, VCPU_SPRG2(r9)
1418 std r6, VCPU_SPRG3(r9)
1419
1420 /* save FP state */
1421 mr r3, r9
1422 bl kvmppc_save_fp
de56a948 1423
0a8eccef
PM
1424#ifdef CONFIG_PPC_TRANSACTIONAL_MEM
1425BEGIN_FTR_SECTION
f024ee09
PM
1426 bl kvmppc_save_tm
1427END_FTR_SECTION_IFSET(CPU_FTR_TM)
0a8eccef
PM
1428#endif
1429
e0b7ec05
PM
1430 /* Increment yield count if they have a VPA */
1431 ld r8, VCPU_VPA(r9) /* do they have a VPA? */
1432 cmpdi r8, 0
1433 beq 25f
0865a583
AG
1434 li r4, LPPACA_YIELDCOUNT
1435 LWZX_BE r3, r8, r4
e0b7ec05 1436 addi r3, r3, 1
0865a583 1437 STWX_BE r3, r8, r4
e0b7ec05
PM
1438 li r3, 1
1439 stb r3, VCPU_VPA_DIRTY(r9)
144025:
1441 /* Save PMU registers if requested */
1442 /* r8 and cr0.eq are live here */
9bc01a9b
PM
1443BEGIN_FTR_SECTION
1444 /*
1445 * POWER8 seems to have a hardware bug where setting
1446 * MMCR0[PMAE] along with MMCR0[PMC1CE] and/or MMCR0[PMCjCE]
1447 * when some counters are already negative doesn't seem
1448 * to cause a performance monitor alert (and hence interrupt).
1449 * The effect of this is that when saving the PMU state,
1450 * if there is no PMU alert pending when we read MMCR0
1451 * before freezing the counters, but one becomes pending
1452 * before we read the counters, we lose it.
1453 * To work around this, we need a way to freeze the counters
1454 * before reading MMCR0. Normally, freezing the counters
1455 * is done by writing MMCR0 (to set MMCR0[FC]) which
1456 * unavoidably writes MMCR0[PMA0] as well. On POWER8,
1457 * we can also freeze the counters using MMCR2, by writing
1458 * 1s to all the counter freeze condition bits (there are
1459 * 9 bits each for 6 counters).
1460 */
1461 li r3, -1 /* set all freeze bits */
1462 clrrdi r3, r3, 10
1463 mfspr r10, SPRN_MMCR2
1464 mtspr SPRN_MMCR2, r3
1465 isync
1466END_FTR_SECTION_IFSET(CPU_FTR_ARCH_207S)
e0b7ec05
PM
1467 li r3, 1
1468 sldi r3, r3, 31 /* MMCR0_FC (freeze counters) bit */
1469 mfspr r4, SPRN_MMCR0 /* save MMCR0 */
1470 mtspr SPRN_MMCR0, r3 /* freeze all counters, disable ints */
1471 mfspr r6, SPRN_MMCRA
c17b98cf 1472 /* Clear MMCRA in order to disable SDAR updates */
e0b7ec05
PM
1473 li r7, 0
1474 mtspr SPRN_MMCRA, r7
e0b7ec05
PM
1475 isync
1476 beq 21f /* if no VPA, save PMU stuff anyway */
1477 lbz r7, LPPACA_PMCINUSE(r8)
1478 cmpwi r7, 0 /* did they ask for PMU stuff to be saved? */
1479 bne 21f
1480 std r3, VCPU_MMCR(r9) /* if not, set saved MMCR0 to FC */
1481 b 22f
148221: mfspr r5, SPRN_MMCR1
1483 mfspr r7, SPRN_SIAR
1484 mfspr r8, SPRN_SDAR
1485 std r4, VCPU_MMCR(r9)
1486 std r5, VCPU_MMCR + 8(r9)
1487 std r6, VCPU_MMCR + 16(r9)
9bc01a9b
PM
1488BEGIN_FTR_SECTION
1489 std r10, VCPU_MMCR + 24(r9)
1490END_FTR_SECTION_IFSET(CPU_FTR_ARCH_207S)
e0b7ec05
PM
1491 std r7, VCPU_SIAR(r9)
1492 std r8, VCPU_SDAR(r9)
1493 mfspr r3, SPRN_PMC1
1494 mfspr r4, SPRN_PMC2
1495 mfspr r5, SPRN_PMC3
1496 mfspr r6, SPRN_PMC4
1497 mfspr r7, SPRN_PMC5
1498 mfspr r8, SPRN_PMC6
e0b7ec05
PM
1499 stw r3, VCPU_PMC(r9)
1500 stw r4, VCPU_PMC + 4(r9)
1501 stw r5, VCPU_PMC + 8(r9)
1502 stw r6, VCPU_PMC + 12(r9)
1503 stw r7, VCPU_PMC + 16(r9)
1504 stw r8, VCPU_PMC + 20(r9)
b005255e 1505BEGIN_FTR_SECTION
b005255e
MN
1506 mfspr r5, SPRN_SIER
1507 mfspr r6, SPRN_SPMC1
1508 mfspr r7, SPRN_SPMC2
1509 mfspr r8, SPRN_MMCRS
b005255e
MN
1510 std r5, VCPU_SIER(r9)
1511 stw r6, VCPU_PMC + 24(r9)
1512 stw r7, VCPU_PMC + 28(r9)
1513 std r8, VCPU_MMCR + 32(r9)
1514 lis r4, 0x8000
1515 mtspr SPRN_MMCRS, r4
1516END_FTR_SECTION_IFSET(CPU_FTR_ARCH_207S)
e0b7ec05 151722:
de56a948
PM
1518 /* Clear out SLB */
1519 li r5,0
1520 slbmte r5,r5
1521 slbia
1522 ptesync
1523
9e368f29 1524 /*
c17b98cf 1525 * POWER7/POWER8 guest -> host partition switch code.
9e368f29
PM
1526 * We don't have to lock against tlbies but we do
1527 * have to coordinate the hardware threads.
1528 */
b6c295df 1529kvmhv_switch_to_host:
371fefd6 1530 /* Secondary threads wait for primary to do partition switch */
6af27c84 1531 ld r5,HSTATE_KVM_VCORE(r13)
e0b7ec05
PM
1532 ld r4,VCORE_KVM(r5) /* pointer to struct kvm */
1533 lbz r3,HSTATE_PTID(r13)
371fefd6
PM
1534 cmpwi r3,0
1535 beq 15f
1536 HMT_LOW
153713: lbz r3,VCORE_IN_GUEST(r5)
1538 cmpwi r3,0
1539 bne 13b
1540 HMT_MEDIUM
1541 b 16f
1542
1543 /* Primary thread waits for all the secondaries to exit guest */
154415: lwz r3,VCORE_ENTRY_EXIT(r5)
b4deba5c 1545 rlwinm r0,r3,32-8,0xff
371fefd6
PM
1546 clrldi r3,r3,56
1547 cmpw r3,r0
1548 bne 15b
1549 isync
1550
b4deba5c
PM
1551 /* Did we actually switch to the guest at all? */
1552 lbz r6, VCORE_IN_GUEST(r5)
1553 cmpwi r6, 0
1554 beq 19f
1555
371fefd6 1556 /* Primary thread switches back to host partition */
de56a948
PM
1557 ld r6,KVM_HOST_SDR1(r4)
1558 lwz r7,KVM_HOST_LPID(r4)
1559 li r8,LPID_RSVD /* switch to reserved LPID */
1560 mtspr SPRN_LPID,r8
1561 ptesync
1562 mtspr SPRN_SDR1,r6 /* switch to partition page table */
1563 mtspr SPRN_LPID,r7
1564 isync
93b0f4dc 1565
b005255e
MN
1566BEGIN_FTR_SECTION
1567 /* DPDES is shared between threads */
1568 mfspr r7, SPRN_DPDES
1569 std r7, VCORE_DPDES(r5)
1570 /* clear DPDES so we don't get guest doorbells in the host */
1571 li r8, 0
1572 mtspr SPRN_DPDES, r8
1573END_FTR_SECTION_IFSET(CPU_FTR_ARCH_207S)
1574
fd7bacbc
MS
1575 /* If HMI, call kvmppc_realmode_hmi_handler() */
1576 cmpwi r12, BOOK3S_INTERRUPT_HMI
1577 bne 27f
1578 bl kvmppc_realmode_hmi_handler
1579 nop
1580 li r12, BOOK3S_INTERRUPT_HMI
1581 /*
1582 * At this point kvmppc_realmode_hmi_handler would have resync-ed
1583 * the TB. Hence it is not required to subtract guest timebase
1584 * offset from timebase. So, skip it.
1585 *
1586 * Also, do not call kvmppc_subcore_exit_guest() because it has
1587 * been invoked as part of kvmppc_realmode_hmi_handler().
1588 */
1589 b 30f
1590
159127:
93b0f4dc
PM
1592 /* Subtract timebase offset from timebase */
1593 ld r8,VCORE_TB_OFFSET(r5)
1594 cmpdi r8,0
1595 beq 17f
c5fb80d3 1596 mftb r6 /* current guest timebase */
93b0f4dc
PM
1597 subf r8,r8,r6
1598 mtspr SPRN_TBU40,r8 /* update upper 40 bits */
1599 mftb r7 /* check if lower 24 bits overflowed */
1600 clrldi r6,r6,40
1601 clrldi r7,r7,40
1602 cmpld r7,r6
1603 bge 17f
1604 addis r8,r8,0x100 /* if so, increment upper 40 bits */
1605 mtspr SPRN_TBU40,r8
1606
fd7bacbc
MS
160717: bl kvmppc_subcore_exit_guest
1608 nop
160930: ld r5,HSTATE_KVM_VCORE(r13)
1610 ld r4,VCORE_KVM(r5) /* pointer to struct kvm */
1611
388cc6e1 1612 /* Reset PCR */
fd7bacbc 1613 ld r0, VCORE_PCR(r5)
388cc6e1
PM
1614 cmpdi r0, 0
1615 beq 18f
1616 li r0, 0
1617 mtspr SPRN_PCR, r0
161818:
93b0f4dc 1619 /* Signal secondary CPUs to continue */
371fefd6 1620 stb r0,VCORE_IN_GUEST(r5)
b4deba5c 162119: lis r8,0x7fff /* MAX_INT@h */
de56a948
PM
1622 mtspr SPRN_HDEC,r8
1623
371fefd6 162416: ld r8,KVM_HOST_LPCR(r4)
de56a948
PM
1625 mtspr SPRN_LPCR,r8
1626 isync
1627
1628 /* load host SLB entries */
c17b98cf 1629 ld r8,PACA_SLBSHADOWPTR(r13)
de56a948
PM
1630
1631 .rept SLB_NUM_BOLTED
0865a583
AG
1632 li r3, SLBSHADOW_SAVEAREA
1633 LDX_BE r5, r8, r3
1634 addi r3, r3, 8
1635 LDX_BE r6, r8, r3
de56a948
PM
1636 andis. r7,r5,SLB_ESID_V@h
1637 beq 1f
1638 slbmte r6,r5
16391: addi r8,r8,16
1640 .endr
1641
b6c295df
PM
1642#ifdef CONFIG_KVM_BOOK3S_HV_EXIT_TIMING
1643 /* Finish timing, if we have a vcpu */
1644 ld r4, HSTATE_KVM_VCPU(r13)
1645 cmpdi r4, 0
1646 li r3, 0
1647 beq 2f
1648 bl kvmhv_accumulate_time
16492:
1650#endif
44a3add8
PM
1651 /* Unset guest mode */
1652 li r0, KVM_GUEST_MODE_NONE
1653 stb r0, HSTATE_IN_GUEST(r13)
1654
218309b7
PM
1655 ld r0, 112+PPC_LR_STKOFF(r1)
1656 addi r1, r1, 112
1657 mtlr r0
1658 blr
b4072df4 1659
697d3899
PM
1660/*
1661 * Check whether an HDSI is an HPTE not found fault or something else.
1662 * If it is an HPTE not found fault that is due to the guest accessing
1663 * a page that they have mapped but which we have paged out, then
1664 * we continue on with the guest exit path. In all other cases,
1665 * reflect the HDSI to the guest as a DSI.
1666 */
1667kvmppc_hdsi:
1668 mfspr r4, SPRN_HDAR
1669 mfspr r6, SPRN_HDSISR
4cf302bc
PM
1670 /* HPTE not found fault or protection fault? */
1671 andis. r0, r6, (DSISR_NOHPTE | DSISR_PROTFAULT)@h
697d3899
PM
1672 beq 1f /* if not, send it to the guest */
1673 andi. r0, r11, MSR_DR /* data relocation enabled? */
1674 beq 3f
1675 clrrdi r0, r4, 28
c75df6f9 1676 PPC_SLBFEE_DOT(R5, R0) /* if so, look up SLB */
cf29b215
PM
1677 li r0, BOOK3S_INTERRUPT_DATA_SEGMENT
1678 bne 7f /* if no SLB entry found */
697d3899
PM
16794: std r4, VCPU_FAULT_DAR(r9)
1680 stw r6, VCPU_FAULT_DSISR(r9)
1681
1682 /* Search the hash table. */
1683 mr r3, r9 /* vcpu pointer */
342d3db7 1684 li r7, 1 /* data fault */
b1576fec 1685 bl kvmppc_hpte_hv_fault
697d3899
PM
1686 ld r9, HSTATE_KVM_VCPU(r13)
1687 ld r10, VCPU_PC(r9)
1688 ld r11, VCPU_MSR(r9)
1689 li r12, BOOK3S_INTERRUPT_H_DATA_STORAGE
1690 cmpdi r3, 0 /* retry the instruction */
1691 beq 6f
1692 cmpdi r3, -1 /* handle in kernel mode */
b4072df4 1693 beq guest_exit_cont
697d3899
PM
1694 cmpdi r3, -2 /* MMIO emulation; need instr word */
1695 beq 2f
1696
cf29b215 1697 /* Synthesize a DSI (or DSegI) for the guest */
697d3899
PM
1698 ld r4, VCPU_FAULT_DAR(r9)
1699 mr r6, r3
cf29b215 17001: li r0, BOOK3S_INTERRUPT_DATA_STORAGE
697d3899 1701 mtspr SPRN_DSISR, r6
cf29b215 17027: mtspr SPRN_DAR, r4
697d3899
PM
1703 mtspr SPRN_SRR0, r10
1704 mtspr SPRN_SRR1, r11
cf29b215 1705 mr r10, r0
e4e38121 1706 bl kvmppc_msr_interrupt
b4072df4 1707fast_interrupt_c_return:
697d3899 17086: ld r7, VCPU_CTR(r9)
c63517c2 1709 ld r8, VCPU_XER(r9)
697d3899
PM
1710 mtctr r7
1711 mtxer r8
1712 mr r4, r9
1713 b fast_guest_return
1714
17153: ld r5, VCPU_KVM(r9) /* not relocated, use VRMA */
1716 ld r5, KVM_VRMA_SLB_V(r5)
1717 b 4b
1718
1719 /* If this is for emulated MMIO, load the instruction word */
17202: li r8, KVM_INST_FETCH_FAILED /* In case lwz faults */
1721
1722 /* Set guest mode to 'jump over instruction' so if lwz faults
1723 * we'll just continue at the next IP. */
1724 li r0, KVM_GUEST_MODE_SKIP
1725 stb r0, HSTATE_IN_GUEST(r13)
1726
1727 /* Do the access with MSR:DR enabled */
1728 mfmsr r3
1729 ori r4, r3, MSR_DR /* Enable paging for data */
1730 mtmsrd r4
1731 lwz r8, 0(r10)
1732 mtmsrd r3
1733
1734 /* Store the result */
1735 stw r8, VCPU_LAST_INST(r9)
1736
1737 /* Unset guest mode. */
44a3add8 1738 li r0, KVM_GUEST_MODE_HOST_HV
697d3899 1739 stb r0, HSTATE_IN_GUEST(r13)
b4072df4 1740 b guest_exit_cont
de56a948 1741
342d3db7
PM
1742/*
1743 * Similarly for an HISI, reflect it to the guest as an ISI unless
1744 * it is an HPTE not found fault for a page that we have paged out.
1745 */
1746kvmppc_hisi:
1747 andis. r0, r11, SRR1_ISI_NOPT@h
1748 beq 1f
1749 andi. r0, r11, MSR_IR /* instruction relocation enabled? */
1750 beq 3f
1751 clrrdi r0, r10, 28
c75df6f9 1752 PPC_SLBFEE_DOT(R5, R0) /* if so, look up SLB */
cf29b215
PM
1753 li r0, BOOK3S_INTERRUPT_INST_SEGMENT
1754 bne 7f /* if no SLB entry found */
342d3db7
PM
17554:
1756 /* Search the hash table. */
1757 mr r3, r9 /* vcpu pointer */
1758 mr r4, r10
1759 mr r6, r11
1760 li r7, 0 /* instruction fault */
b1576fec 1761 bl kvmppc_hpte_hv_fault
342d3db7
PM
1762 ld r9, HSTATE_KVM_VCPU(r13)
1763 ld r10, VCPU_PC(r9)
1764 ld r11, VCPU_MSR(r9)
1765 li r12, BOOK3S_INTERRUPT_H_INST_STORAGE
1766 cmpdi r3, 0 /* retry the instruction */
b4072df4 1767 beq fast_interrupt_c_return
342d3db7 1768 cmpdi r3, -1 /* handle in kernel mode */
b4072df4 1769 beq guest_exit_cont
342d3db7 1770
cf29b215 1771 /* Synthesize an ISI (or ISegI) for the guest */
342d3db7 1772 mr r11, r3
cf29b215
PM
17731: li r0, BOOK3S_INTERRUPT_INST_STORAGE
17747: mtspr SPRN_SRR0, r10
342d3db7 1775 mtspr SPRN_SRR1, r11
cf29b215 1776 mr r10, r0
e4e38121 1777 bl kvmppc_msr_interrupt
b4072df4 1778 b fast_interrupt_c_return
342d3db7
PM
1779
17803: ld r6, VCPU_KVM(r9) /* not relocated, use VRMA */
1781 ld r5, KVM_VRMA_SLB_V(r6)
1782 b 4b
1783
a8606e20
PM
1784/*
1785 * Try to handle an hcall in real mode.
1786 * Returns to the guest if we handle it, or continues on up to
1787 * the kernel if we can't (i.e. if we don't have a handler for
1788 * it, or if the handler returns H_TOO_HARD).
1f09c3ed
PM
1789 *
1790 * r5 - r8 contain hcall args,
1791 * r9 = vcpu, r10 = pc, r11 = msr, r12 = trap, r13 = paca
a8606e20 1792 */
a8606e20 1793hcall_try_real_mode:
c75df6f9 1794 ld r3,VCPU_GPR(R3)(r9)
a8606e20 1795 andi. r0,r11,MSR_PR
27025a60
LPF
1796 /* sc 1 from userspace - reflect to guest syscall */
1797 bne sc_1_fast_return
a8606e20
PM
1798 clrrdi r3,r3,2
1799 cmpldi r3,hcall_real_table_end - hcall_real_table
b4072df4 1800 bge guest_exit_cont
699a0ea0
PM
1801 /* See if this hcall is enabled for in-kernel handling */
1802 ld r4, VCPU_KVM(r9)
1803 srdi r0, r3, 8 /* r0 = (r3 / 4) >> 6 */
1804 sldi r0, r0, 3 /* index into kvm->arch.enabled_hcalls[] */
1805 add r4, r4, r0
1806 ld r0, KVM_ENABLED_HCALLS(r4)
1807 rlwinm r4, r3, 32-2, 0x3f /* r4 = (r3 / 4) & 0x3f */
1808 srd r0, r0, r4
1809 andi. r0, r0, 1
1810 beq guest_exit_cont
1811 /* Get pointer to handler, if any, and call it */
a8606e20 1812 LOAD_REG_ADDR(r4, hcall_real_table)
4baa1d87 1813 lwax r3,r3,r4
a8606e20 1814 cmpwi r3,0
b4072df4 1815 beq guest_exit_cont
05a308c7
AB
1816 add r12,r3,r4
1817 mtctr r12
a8606e20 1818 mr r3,r9 /* get vcpu pointer */
c75df6f9 1819 ld r4,VCPU_GPR(R4)(r9)
a8606e20
PM
1820 bctrl
1821 cmpdi r3,H_TOO_HARD
1822 beq hcall_real_fallback
1823 ld r4,HSTATE_KVM_VCPU(r13)
c75df6f9 1824 std r3,VCPU_GPR(R3)(r4)
a8606e20
PM
1825 ld r10,VCPU_PC(r4)
1826 ld r11,VCPU_MSR(r4)
1827 b fast_guest_return
1828
27025a60
LPF
1829sc_1_fast_return:
1830 mtspr SPRN_SRR0,r10
1831 mtspr SPRN_SRR1,r11
1832 li r10, BOOK3S_INTERRUPT_SYSCALL
e4e38121 1833 bl kvmppc_msr_interrupt
27025a60
LPF
1834 mr r4,r9
1835 b fast_guest_return
1836
a8606e20
PM
1837 /* We've attempted a real mode hcall, but it's punted it back
1838 * to userspace. We need to restore some clobbered volatiles
1839 * before resuming the pass-it-to-qemu path */
1840hcall_real_fallback:
1841 li r12,BOOK3S_INTERRUPT_SYSCALL
1842 ld r9, HSTATE_KVM_VCPU(r13)
a8606e20 1843
b4072df4 1844 b guest_exit_cont
a8606e20
PM
1845
1846 .globl hcall_real_table
1847hcall_real_table:
1848 .long 0 /* 0 - unused */
c1fb0194
AB
1849 .long DOTSYM(kvmppc_h_remove) - hcall_real_table
1850 .long DOTSYM(kvmppc_h_enter) - hcall_real_table
1851 .long DOTSYM(kvmppc_h_read) - hcall_real_table
cdeee518
PM
1852 .long DOTSYM(kvmppc_h_clear_mod) - hcall_real_table
1853 .long DOTSYM(kvmppc_h_clear_ref) - hcall_real_table
c1fb0194
AB
1854 .long DOTSYM(kvmppc_h_protect) - hcall_real_table
1855 .long DOTSYM(kvmppc_h_get_tce) - hcall_real_table
31217db7 1856 .long DOTSYM(kvmppc_rm_h_put_tce) - hcall_real_table
a8606e20 1857 .long 0 /* 0x24 - H_SET_SPRG0 */
c1fb0194 1858 .long DOTSYM(kvmppc_h_set_dabr) - hcall_real_table
a8606e20
PM
1859 .long 0 /* 0x2c */
1860 .long 0 /* 0x30 */
1861 .long 0 /* 0x34 */
1862 .long 0 /* 0x38 */
1863 .long 0 /* 0x3c */
1864 .long 0 /* 0x40 */
1865 .long 0 /* 0x44 */
1866 .long 0 /* 0x48 */
1867 .long 0 /* 0x4c */
1868 .long 0 /* 0x50 */
1869 .long 0 /* 0x54 */
1870 .long 0 /* 0x58 */
1871 .long 0 /* 0x5c */
1872 .long 0 /* 0x60 */
e7d26f28 1873#ifdef CONFIG_KVM_XICS
c1fb0194
AB
1874 .long DOTSYM(kvmppc_rm_h_eoi) - hcall_real_table
1875 .long DOTSYM(kvmppc_rm_h_cppr) - hcall_real_table
1876 .long DOTSYM(kvmppc_rm_h_ipi) - hcall_real_table
e7d26f28 1877 .long 0 /* 0x70 - H_IPOLL */
c1fb0194 1878 .long DOTSYM(kvmppc_rm_h_xirr) - hcall_real_table
e7d26f28
BH
1879#else
1880 .long 0 /* 0x64 - H_EOI */
1881 .long 0 /* 0x68 - H_CPPR */
1882 .long 0 /* 0x6c - H_IPI */
1883 .long 0 /* 0x70 - H_IPOLL */
1884 .long 0 /* 0x74 - H_XIRR */
1885#endif
a8606e20
PM
1886 .long 0 /* 0x78 */
1887 .long 0 /* 0x7c */
1888 .long 0 /* 0x80 */
1889 .long 0 /* 0x84 */
1890 .long 0 /* 0x88 */
1891 .long 0 /* 0x8c */
1892 .long 0 /* 0x90 */
1893 .long 0 /* 0x94 */
1894 .long 0 /* 0x98 */
1895 .long 0 /* 0x9c */
1896 .long 0 /* 0xa0 */
1897 .long 0 /* 0xa4 */
1898 .long 0 /* 0xa8 */
1899 .long 0 /* 0xac */
1900 .long 0 /* 0xb0 */
1901 .long 0 /* 0xb4 */
1902 .long 0 /* 0xb8 */
1903 .long 0 /* 0xbc */
1904 .long 0 /* 0xc0 */
1905 .long 0 /* 0xc4 */
1906 .long 0 /* 0xc8 */
1907 .long 0 /* 0xcc */
1908 .long 0 /* 0xd0 */
1909 .long 0 /* 0xd4 */
1910 .long 0 /* 0xd8 */
1911 .long 0 /* 0xdc */
c1fb0194 1912 .long DOTSYM(kvmppc_h_cede) - hcall_real_table
90fd09f8 1913 .long DOTSYM(kvmppc_rm_h_confer) - hcall_real_table
a8606e20
PM
1914 .long 0 /* 0xe8 */
1915 .long 0 /* 0xec */
1916 .long 0 /* 0xf0 */
1917 .long 0 /* 0xf4 */
1918 .long 0 /* 0xf8 */
1919 .long 0 /* 0xfc */
1920 .long 0 /* 0x100 */
1921 .long 0 /* 0x104 */
1922 .long 0 /* 0x108 */
1923 .long 0 /* 0x10c */
1924 .long 0 /* 0x110 */
1925 .long 0 /* 0x114 */
1926 .long 0 /* 0x118 */
1927 .long 0 /* 0x11c */
1928 .long 0 /* 0x120 */
c1fb0194 1929 .long DOTSYM(kvmppc_h_bulk_remove) - hcall_real_table
8563bf52
PM
1930 .long 0 /* 0x128 */
1931 .long 0 /* 0x12c */
1932 .long 0 /* 0x130 */
c1fb0194 1933 .long DOTSYM(kvmppc_h_set_xdabr) - hcall_real_table
31217db7 1934 .long DOTSYM(kvmppc_rm_h_stuff_tce) - hcall_real_table
d3695aa4 1935 .long DOTSYM(kvmppc_rm_h_put_tce_indirect) - hcall_real_table
e928e9cb
ME
1936 .long 0 /* 0x140 */
1937 .long 0 /* 0x144 */
1938 .long 0 /* 0x148 */
1939 .long 0 /* 0x14c */
1940 .long 0 /* 0x150 */
1941 .long 0 /* 0x154 */
1942 .long 0 /* 0x158 */
1943 .long 0 /* 0x15c */
1944 .long 0 /* 0x160 */
1945 .long 0 /* 0x164 */
1946 .long 0 /* 0x168 */
1947 .long 0 /* 0x16c */
1948 .long 0 /* 0x170 */
1949 .long 0 /* 0x174 */
1950 .long 0 /* 0x178 */
1951 .long 0 /* 0x17c */
1952 .long 0 /* 0x180 */
1953 .long 0 /* 0x184 */
1954 .long 0 /* 0x188 */
1955 .long 0 /* 0x18c */
1956 .long 0 /* 0x190 */
1957 .long 0 /* 0x194 */
1958 .long 0 /* 0x198 */
1959 .long 0 /* 0x19c */
1960 .long 0 /* 0x1a0 */
1961 .long 0 /* 0x1a4 */
1962 .long 0 /* 0x1a8 */
1963 .long 0 /* 0x1ac */
1964 .long 0 /* 0x1b0 */
1965 .long 0 /* 0x1b4 */
1966 .long 0 /* 0x1b8 */
1967 .long 0 /* 0x1bc */
1968 .long 0 /* 0x1c0 */
1969 .long 0 /* 0x1c4 */
1970 .long 0 /* 0x1c8 */
1971 .long 0 /* 0x1cc */
1972 .long 0 /* 0x1d0 */
1973 .long 0 /* 0x1d4 */
1974 .long 0 /* 0x1d8 */
1975 .long 0 /* 0x1dc */
1976 .long 0 /* 0x1e0 */
1977 .long 0 /* 0x1e4 */
1978 .long 0 /* 0x1e8 */
1979 .long 0 /* 0x1ec */
1980 .long 0 /* 0x1f0 */
1981 .long 0 /* 0x1f4 */
1982 .long 0 /* 0x1f8 */
1983 .long 0 /* 0x1fc */
1984 .long 0 /* 0x200 */
1985 .long 0 /* 0x204 */
1986 .long 0 /* 0x208 */
1987 .long 0 /* 0x20c */
1988 .long 0 /* 0x210 */
1989 .long 0 /* 0x214 */
1990 .long 0 /* 0x218 */
1991 .long 0 /* 0x21c */
1992 .long 0 /* 0x220 */
1993 .long 0 /* 0x224 */
1994 .long 0 /* 0x228 */
1995 .long 0 /* 0x22c */
1996 .long 0 /* 0x230 */
1997 .long 0 /* 0x234 */
1998 .long 0 /* 0x238 */
1999 .long 0 /* 0x23c */
2000 .long 0 /* 0x240 */
2001 .long 0 /* 0x244 */
2002 .long 0 /* 0x248 */
2003 .long 0 /* 0x24c */
2004 .long 0 /* 0x250 */
2005 .long 0 /* 0x254 */
2006 .long 0 /* 0x258 */
2007 .long 0 /* 0x25c */
2008 .long 0 /* 0x260 */
2009 .long 0 /* 0x264 */
2010 .long 0 /* 0x268 */
2011 .long 0 /* 0x26c */
2012 .long 0 /* 0x270 */
2013 .long 0 /* 0x274 */
2014 .long 0 /* 0x278 */
2015 .long 0 /* 0x27c */
2016 .long 0 /* 0x280 */
2017 .long 0 /* 0x284 */
2018 .long 0 /* 0x288 */
2019 .long 0 /* 0x28c */
2020 .long 0 /* 0x290 */
2021 .long 0 /* 0x294 */
2022 .long 0 /* 0x298 */
2023 .long 0 /* 0x29c */
2024 .long 0 /* 0x2a0 */
2025 .long 0 /* 0x2a4 */
2026 .long 0 /* 0x2a8 */
2027 .long 0 /* 0x2ac */
2028 .long 0 /* 0x2b0 */
2029 .long 0 /* 0x2b4 */
2030 .long 0 /* 0x2b8 */
2031 .long 0 /* 0x2bc */
2032 .long 0 /* 0x2c0 */
2033 .long 0 /* 0x2c4 */
2034 .long 0 /* 0x2c8 */
2035 .long 0 /* 0x2cc */
2036 .long 0 /* 0x2d0 */
2037 .long 0 /* 0x2d4 */
2038 .long 0 /* 0x2d8 */
2039 .long 0 /* 0x2dc */
2040 .long 0 /* 0x2e0 */
2041 .long 0 /* 0x2e4 */
2042 .long 0 /* 0x2e8 */
2043 .long 0 /* 0x2ec */
2044 .long 0 /* 0x2f0 */
2045 .long 0 /* 0x2f4 */
2046 .long 0 /* 0x2f8 */
2047 .long 0 /* 0x2fc */
2048 .long DOTSYM(kvmppc_h_random) - hcall_real_table
ae2113a4 2049 .globl hcall_real_table_end
a8606e20
PM
2050hcall_real_table_end:
2051
8563bf52
PM
2052_GLOBAL(kvmppc_h_set_xdabr)
2053 andi. r0, r5, DABRX_USER | DABRX_KERNEL
2054 beq 6f
2055 li r0, DABRX_USER | DABRX_KERNEL | DABRX_BTI
2056 andc. r0, r5, r0
2057 beq 3f
20586: li r3, H_PARAMETER
2059 blr
2060
a8606e20 2061_GLOBAL(kvmppc_h_set_dabr)
8563bf52
PM
2062 li r5, DABRX_USER | DABRX_KERNEL
20633:
eee7ff9d
MN
2064BEGIN_FTR_SECTION
2065 b 2f
2066END_FTR_SECTION_IFSET(CPU_FTR_ARCH_207S)
a8606e20 2067 std r4,VCPU_DABR(r3)
8563bf52
PM
2068 stw r5, VCPU_DABRX(r3)
2069 mtspr SPRN_DABRX, r5
8943633c
PM
2070 /* Work around P7 bug where DABR can get corrupted on mtspr */
20711: mtspr SPRN_DABR,r4
2072 mfspr r5, SPRN_DABR
2073 cmpd r4, r5
2074 bne 1b
2075 isync
a8606e20
PM
2076 li r3,0
2077 blr
2078
8563bf52
PM
2079 /* Emulate H_SET_DABR/X on P8 for the sake of compat mode guests */
20802: rlwimi r5, r4, 5, DAWRX_DR | DAWRX_DW
760a7364 2081 rlwimi r5, r4, 2, DAWRX_WT
8563bf52
PM
2082 clrrdi r4, r4, 3
2083 std r4, VCPU_DAWR(r3)
2084 std r5, VCPU_DAWRX(r3)
2085 mtspr SPRN_DAWR, r4
2086 mtspr SPRN_DAWRX, r5
2087 li r3, 0
a8606e20
PM
2088 blr
2089
1f09c3ed 2090_GLOBAL(kvmppc_h_cede) /* r3 = vcpu pointer, r11 = msr, r13 = paca */
19ccb76a
PM
2091 ori r11,r11,MSR_EE
2092 std r11,VCPU_MSR(r3)
2093 li r0,1
2094 stb r0,VCPU_CEDED(r3)
2095 sync /* order setting ceded vs. testing prodded */
2096 lbz r5,VCPU_PRODDED(r3)
2097 cmpwi r5,0
04f995a5 2098 bne kvm_cede_prodded
6af27c84
PM
2099 li r12,0 /* set trap to 0 to say hcall is handled */
2100 stw r12,VCPU_TRAP(r3)
19ccb76a 2101 li r0,H_SUCCESS
c75df6f9 2102 std r0,VCPU_GPR(R3)(r3)
19ccb76a
PM
2103
2104 /*
2105 * Set our bit in the bitmask of napping threads unless all the
2106 * other threads are already napping, in which case we send this
2107 * up to the host.
2108 */
2109 ld r5,HSTATE_KVM_VCORE(r13)
e0b7ec05 2110 lbz r6,HSTATE_PTID(r13)
19ccb76a
PM
2111 lwz r8,VCORE_ENTRY_EXIT(r5)
2112 clrldi r8,r8,56
2113 li r0,1
2114 sld r0,r0,r6
2115 addi r6,r5,VCORE_NAPPING_THREADS
211631: lwarx r4,0,r6
2117 or r4,r4,r0
7d6c40da
PM
2118 cmpw r4,r8
2119 beq kvm_cede_exit
19ccb76a
PM
2120 stwcx. r4,0,r6
2121 bne 31b
7d6c40da 2122 /* order napping_threads update vs testing entry_exit_map */
f019b7ad 2123 isync
e0b7ec05 2124 li r0,NAPPING_CEDE
19ccb76a 2125 stb r0,HSTATE_NAPPING(r13)
19ccb76a
PM
2126 lwz r7,VCORE_ENTRY_EXIT(r5)
2127 cmpwi r7,0x100
2128 bge 33f /* another thread already exiting */
2129
2130/*
2131 * Although not specifically required by the architecture, POWER7
2132 * preserves the following registers in nap mode, even if an SMT mode
2133 * switch occurs: SLB entries, PURR, SPURR, AMOR, UAMOR, AMR, SPRG0-3,
2134 * DAR, DSISR, DABR, DABRX, DSCR, PMCx, MMCRx, SIAR, SDAR.
2135 */
2136 /* Save non-volatile GPRs */
c75df6f9
MN
2137 std r14, VCPU_GPR(R14)(r3)
2138 std r15, VCPU_GPR(R15)(r3)
2139 std r16, VCPU_GPR(R16)(r3)
2140 std r17, VCPU_GPR(R17)(r3)
2141 std r18, VCPU_GPR(R18)(r3)
2142 std r19, VCPU_GPR(R19)(r3)
2143 std r20, VCPU_GPR(R20)(r3)
2144 std r21, VCPU_GPR(R21)(r3)
2145 std r22, VCPU_GPR(R22)(r3)
2146 std r23, VCPU_GPR(R23)(r3)
2147 std r24, VCPU_GPR(R24)(r3)
2148 std r25, VCPU_GPR(R25)(r3)
2149 std r26, VCPU_GPR(R26)(r3)
2150 std r27, VCPU_GPR(R27)(r3)
2151 std r28, VCPU_GPR(R28)(r3)
2152 std r29, VCPU_GPR(R29)(r3)
2153 std r30, VCPU_GPR(R30)(r3)
2154 std r31, VCPU_GPR(R31)(r3)
19ccb76a
PM
2155
2156 /* save FP state */
595e4f7e 2157 bl kvmppc_save_fp
19ccb76a 2158
93d17397
PM
2159#ifdef CONFIG_PPC_TRANSACTIONAL_MEM
2160BEGIN_FTR_SECTION
2161 ld r9, HSTATE_KVM_VCPU(r13)
2162 bl kvmppc_save_tm
2163END_FTR_SECTION_IFSET(CPU_FTR_TM)
2164#endif
2165
fd6d53b1
PM
2166 /*
2167 * Set DEC to the smaller of DEC and HDEC, so that we wake
2168 * no later than the end of our timeslice (HDEC interrupts
2169 * don't wake us from nap).
2170 */
2171 mfspr r3, SPRN_DEC
2172 mfspr r4, SPRN_HDEC
2173 mftb r5
2174 cmpw r3, r4
2175 ble 67f
2176 mtspr SPRN_DEC, r4
217767:
2178 /* save expiry time of guest decrementer */
2179 extsw r3, r3
2180 add r3, r3, r5
2181 ld r4, HSTATE_KVM_VCPU(r13)
2182 ld r5, HSTATE_KVM_VCORE(r13)
2183 ld r6, VCORE_TB_OFFSET(r5)
2184 subf r3, r6, r3 /* convert to host TB value */
2185 std r3, VCPU_DEC_EXPIRES(r4)
2186
b6c295df
PM
2187#ifdef CONFIG_KVM_BOOK3S_HV_EXIT_TIMING
2188 ld r4, HSTATE_KVM_VCPU(r13)
2189 addi r3, r4, VCPU_TB_CEDE
2190 bl kvmhv_accumulate_time
2191#endif
2192
ccc07772
PM
2193 lis r3, LPCR_PECEDP@h /* Do wake on privileged doorbell */
2194
19ccb76a 2195 /*
aa31e843 2196 * Take a nap until a decrementer or external or doobell interrupt
ccc07772 2197 * occurs, with PECE1 and PECE0 set in LPCR.
66feed61 2198 * On POWER8, set PECEDH, and if we are ceding, also set PECEDP.
ccc07772 2199 * Also clear the runlatch bit before napping.
19ccb76a 2200 */
56548fc0 2201kvm_do_nap:
1f09c3ed
PM
2202 mfspr r0, SPRN_CTRLF
2203 clrrdi r0, r0, 1
2204 mtspr SPRN_CTRLT, r0
582b910e 2205
f0888f70
PM
2206 li r0,1
2207 stb r0,HSTATE_HWTHREAD_REQ(r13)
19ccb76a
PM
2208 mfspr r5,SPRN_LPCR
2209 ori r5,r5,LPCR_PECE0 | LPCR_PECE1
aa31e843 2210BEGIN_FTR_SECTION
66feed61 2211 ori r5, r5, LPCR_PECEDH
ccc07772 2212 rlwimi r5, r3, 0, LPCR_PECEDP
aa31e843 2213END_FTR_SECTION_IFSET(CPU_FTR_ARCH_207S)
19ccb76a
PM
2214 mtspr SPRN_LPCR,r5
2215 isync
2216 li r0, 0
2217 std r0, HSTATE_SCRATCH0(r13)
2218 ptesync
2219 ld r0, HSTATE_SCRATCH0(r13)
22201: cmpd r0, r0
2221 bne 1b
2222 nap
2223 b .
2224
e3bbbbfa
PM
222533: mr r4, r3
2226 li r3, 0
2227 li r12, 0
2228 b 34f
2229
19ccb76a 2230kvm_end_cede:
4619ac88
PM
2231 /* get vcpu pointer */
2232 ld r4, HSTATE_KVM_VCPU(r13)
2233
19ccb76a
PM
2234 /* Woken by external or decrementer interrupt */
2235 ld r1, HSTATE_HOST_R1(r13)
19ccb76a 2236
b6c295df
PM
2237#ifdef CONFIG_KVM_BOOK3S_HV_EXIT_TIMING
2238 addi r3, r4, VCPU_TB_RMINTR
2239 bl kvmhv_accumulate_time
2240#endif
2241
93d17397
PM
2242#ifdef CONFIG_PPC_TRANSACTIONAL_MEM
2243BEGIN_FTR_SECTION
2244 bl kvmppc_restore_tm
2245END_FTR_SECTION_IFSET(CPU_FTR_TM)
2246#endif
2247
19ccb76a
PM
2248 /* load up FP state */
2249 bl kvmppc_load_fp
2250
fd6d53b1
PM
2251 /* Restore guest decrementer */
2252 ld r3, VCPU_DEC_EXPIRES(r4)
2253 ld r5, HSTATE_KVM_VCORE(r13)
2254 ld r6, VCORE_TB_OFFSET(r5)
2255 add r3, r3, r6 /* convert host TB to guest TB value */
2256 mftb r7
2257 subf r3, r7, r3
2258 mtspr SPRN_DEC, r3
2259
19ccb76a 2260 /* Load NV GPRS */
c75df6f9
MN
2261 ld r14, VCPU_GPR(R14)(r4)
2262 ld r15, VCPU_GPR(R15)(r4)
2263 ld r16, VCPU_GPR(R16)(r4)
2264 ld r17, VCPU_GPR(R17)(r4)
2265 ld r18, VCPU_GPR(R18)(r4)
2266 ld r19, VCPU_GPR(R19)(r4)
2267 ld r20, VCPU_GPR(R20)(r4)
2268 ld r21, VCPU_GPR(R21)(r4)
2269 ld r22, VCPU_GPR(R22)(r4)
2270 ld r23, VCPU_GPR(R23)(r4)
2271 ld r24, VCPU_GPR(R24)(r4)
2272 ld r25, VCPU_GPR(R25)(r4)
2273 ld r26, VCPU_GPR(R26)(r4)
2274 ld r27, VCPU_GPR(R27)(r4)
2275 ld r28, VCPU_GPR(R28)(r4)
2276 ld r29, VCPU_GPR(R29)(r4)
2277 ld r30, VCPU_GPR(R30)(r4)
2278 ld r31, VCPU_GPR(R31)(r4)
37f55d30 2279
e3bbbbfa
PM
2280 /* Check the wake reason in SRR1 to see why we got here */
2281 bl kvmppc_check_wake_reason
19ccb76a 2282
37f55d30
SW
2283 /*
2284 * Restore volatile registers since we could have called a
2285 * C routine in kvmppc_check_wake_reason
2286 * r4 = VCPU
2287 * r3 tells us whether we need to return to host or not
2288 * WARNING: it gets checked further down:
2289 * should not modify r3 until this check is done.
2290 */
2291 ld r4, HSTATE_KVM_VCPU(r13)
2292
19ccb76a 2293 /* clear our bit in vcore->napping_threads */
e3bbbbfa
PM
229434: ld r5,HSTATE_KVM_VCORE(r13)
2295 lbz r7,HSTATE_PTID(r13)
19ccb76a 2296 li r0,1
e3bbbbfa 2297 sld r0,r0,r7
19ccb76a
PM
2298 addi r6,r5,VCORE_NAPPING_THREADS
229932: lwarx r7,0,r6
2300 andc r7,r7,r0
2301 stwcx. r7,0,r6
2302 bne 32b
2303 li r0,0
2304 stb r0,HSTATE_NAPPING(r13)
2305
37f55d30 2306 /* See if the wake reason saved in r3 means we need to exit */
e3bbbbfa 2307 stw r12, VCPU_TRAP(r4)
4619ac88 2308 mr r9, r4
e3bbbbfa
PM
2309 cmpdi r3, 0
2310 bgt guest_exit_cont
4619ac88 2311
19ccb76a
PM
2312 /* see if any other thread is already exiting */
2313 lwz r0,VCORE_ENTRY_EXIT(r5)
2314 cmpwi r0,0x100
e3bbbbfa 2315 bge guest_exit_cont
19ccb76a 2316
e3bbbbfa 2317 b kvmppc_cede_reentry /* if not go back to guest */
19ccb76a
PM
2318
2319 /* cede when already previously prodded case */
04f995a5
PM
2320kvm_cede_prodded:
2321 li r0,0
19ccb76a
PM
2322 stb r0,VCPU_PRODDED(r3)
2323 sync /* order testing prodded vs. clearing ceded */
2324 stb r0,VCPU_CEDED(r3)
2325 li r3,H_SUCCESS
2326 blr
2327
2328 /* we've ceded but we want to give control to the host */
04f995a5 2329kvm_cede_exit:
6af27c84
PM
2330 ld r9, HSTATE_KVM_VCPU(r13)
2331 b guest_exit_cont
19ccb76a 2332
b4072df4
PM
2333 /* Try to handle a machine check in real mode */
2334machine_check_realmode:
2335 mr r3, r9 /* get vcpu pointer */
b1576fec 2336 bl kvmppc_realmode_machine_check
b4072df4 2337 nop
b4072df4
PM
2338 ld r9, HSTATE_KVM_VCPU(r13)
2339 li r12, BOOK3S_INTERRUPT_MACHINE_CHECK
74845bc2
MS
2340 /*
2341 * Deliver unhandled/fatal (e.g. UE) MCE errors to guest through
2342 * machine check interrupt (set HSRR0 to 0x200). And for handled
2343 * errors (no-fatal), just go back to guest execution with current
2344 * HSRR0 instead of exiting guest. This new approach will inject
2345 * machine check to guest for fatal error causing guest to crash.
2346 *
2347 * The old code used to return to host for unhandled errors which
2348 * was causing guest to hang with soft lockups inside guest and
2349 * makes it difficult to recover guest instance.
966d713e
MS
2350 *
2351 * if we receive machine check with MSR(RI=0) then deliver it to
2352 * guest as machine check causing guest to crash.
74845bc2 2353 */
74845bc2 2354 ld r11, VCPU_MSR(r9)
1c9e3d51
PM
2355 rldicl. r0, r11, 64-MSR_HV_LG, 63 /* check if it happened in HV mode */
2356 bne mc_cont /* if so, exit to host */
966d713e
MS
2357 andi. r10, r11, MSR_RI /* check for unrecoverable exception */
2358 beq 1f /* Deliver a machine check to guest */
2359 ld r10, VCPU_PC(r9)
2360 cmpdi r3, 0 /* Did we handle MCE ? */
74845bc2 2361 bne 2f /* Continue guest execution. */
b4072df4 2362 /* If not, deliver a machine check. SRR0/1 are already set */
966d713e 23631: li r10, BOOK3S_INTERRUPT_MACHINE_CHECK
e4e38121 2364 bl kvmppc_msr_interrupt
74845bc2 23652: b fast_interrupt_c_return
b4072df4 2366
e3bbbbfa
PM
2367/*
2368 * Check the reason we woke from nap, and take appropriate action.
1f09c3ed 2369 * Returns (in r3):
e3bbbbfa
PM
2370 * 0 if nothing needs to be done
2371 * 1 if something happened that needs to be handled by the host
66feed61 2372 * -1 if there was a guest wakeup (IPI or msgsnd)
e3c13e56
SW
2373 * -2 if we handled a PCI passthrough interrupt (returned by
2374 * kvmppc_read_intr only)
e3bbbbfa
PM
2375 *
2376 * Also sets r12 to the interrupt vector for any interrupt that needs
2377 * to be handled now by the host (0x500 for external interrupt), or zero.
37f55d30
SW
2378 * Modifies all volatile registers (since it may call a C function).
2379 * This routine calls kvmppc_read_intr, a C function, if an external
2380 * interrupt is pending.
e3bbbbfa
PM
2381 */
2382kvmppc_check_wake_reason:
2383 mfspr r6, SPRN_SRR1
aa31e843
PM
2384BEGIN_FTR_SECTION
2385 rlwinm r6, r6, 45-31, 0xf /* extract wake reason field (P8) */
2386FTR_SECTION_ELSE
2387 rlwinm r6, r6, 45-31, 0xe /* P7 wake reason field is 3 bits */
2388ALT_FTR_SECTION_END_IFSET(CPU_FTR_ARCH_207S)
2389 cmpwi r6, 8 /* was it an external interrupt? */
37f55d30 2390 beq 7f /* if so, see what it was */
e3bbbbfa
PM
2391 li r3, 0
2392 li r12, 0
2393 cmpwi r6, 6 /* was it the decrementer? */
2394 beq 0f
aa31e843
PM
2395BEGIN_FTR_SECTION
2396 cmpwi r6, 5 /* privileged doorbell? */
2397 beq 0f
5d00f66b
PM
2398 cmpwi r6, 3 /* hypervisor doorbell? */
2399 beq 3f
aa31e843 2400END_FTR_SECTION_IFSET(CPU_FTR_ARCH_207S)
fd7bacbc
MS
2401 cmpwi r6, 0xa /* Hypervisor maintenance ? */
2402 beq 4f
e3bbbbfa
PM
2403 li r3, 1 /* anything else, return 1 */
24040: blr
2405
5d00f66b
PM
2406 /* hypervisor doorbell */
24073: li r12, BOOK3S_INTERRUPT_H_DOORBELL
70aa3961
GS
2408
2409 /*
2410 * Clear the doorbell as we will invoke the handler
2411 * explicitly in the guest exit path.
2412 */
2413 lis r6, (PPC_DBELL_SERVER << (63-36))@h
2414 PPC_MSGCLR(6)
66feed61 2415 /* see if it's a host IPI */
5d00f66b 2416 li r3, 1
66feed61
PM
2417 lbz r0, HSTATE_HOST_IPI(r13)
2418 cmpwi r0, 0
2419 bnelr
70aa3961 2420 /* if not, return -1 */
66feed61 2421 li r3, -1
5d00f66b
PM
2422 blr
2423
fd7bacbc
MS
2424 /* Woken up due to Hypervisor maintenance interrupt */
24254: li r12, BOOK3S_INTERRUPT_HMI
2426 li r3, 1
2427 blr
2428
37f55d30
SW
2429 /* external interrupt - create a stack frame so we can call C */
24307: mflr r0
2431 std r0, PPC_LR_STKOFF(r1)
2432 stdu r1, -PPC_MIN_STKFRM(r1)
2433 bl kvmppc_read_intr
2434 nop
2435 li r12, BOOK3S_INTERRUPT_EXTERNAL
f7af5209
SW
2436 cmpdi r3, 1
2437 ble 1f
2438
2439 /*
2440 * Return code of 2 means PCI passthrough interrupt, but
2441 * we need to return back to host to complete handling the
2442 * interrupt. Trap reason is expected in r12 by guest
2443 * exit code.
2444 */
2445 li r12, BOOK3S_INTERRUPT_HV_RM_HARD
24461:
37f55d30
SW
2447 ld r0, PPC_MIN_STKFRM+PPC_LR_STKOFF(r1)
2448 addi r1, r1, PPC_MIN_STKFRM
2449 mtlr r0
2450 blr
371fefd6 2451
de56a948
PM
2452/*
2453 * Save away FP, VMX and VSX registers.
2454 * r3 = vcpu pointer
595e4f7e
PM
2455 * N.B. r30 and r31 are volatile across this function,
2456 * thus it is not callable from C.
a8606e20 2457 */
595e4f7e
PM
2458kvmppc_save_fp:
2459 mflr r30
2460 mr r31,r3
8943633c
PM
2461 mfmsr r5
2462 ori r8,r5,MSR_FP
de56a948
PM
2463#ifdef CONFIG_ALTIVEC
2464BEGIN_FTR_SECTION
2465 oris r8,r8,MSR_VEC@h
2466END_FTR_SECTION_IFSET(CPU_FTR_ALTIVEC)
2467#endif
2468#ifdef CONFIG_VSX
2469BEGIN_FTR_SECTION
2470 oris r8,r8,MSR_VSX@h
2471END_FTR_SECTION_IFSET(CPU_FTR_VSX)
2472#endif
2473 mtmsrd r8
595e4f7e 2474 addi r3,r3,VCPU_FPRS
9bf163f8 2475 bl store_fp_state
de56a948
PM
2476#ifdef CONFIG_ALTIVEC
2477BEGIN_FTR_SECTION
595e4f7e 2478 addi r3,r31,VCPU_VRS
9bf163f8 2479 bl store_vr_state
de56a948
PM
2480END_FTR_SECTION_IFSET(CPU_FTR_ALTIVEC)
2481#endif
2482 mfspr r6,SPRN_VRSAVE
e724f080 2483 stw r6,VCPU_VRSAVE(r31)
595e4f7e 2484 mtlr r30
de56a948
PM
2485 blr
2486
2487/*
2488 * Load up FP, VMX and VSX registers
2489 * r4 = vcpu pointer
595e4f7e
PM
2490 * N.B. r30 and r31 are volatile across this function,
2491 * thus it is not callable from C.
de56a948 2492 */
de56a948 2493kvmppc_load_fp:
595e4f7e
PM
2494 mflr r30
2495 mr r31,r4
de56a948
PM
2496 mfmsr r9
2497 ori r8,r9,MSR_FP
2498#ifdef CONFIG_ALTIVEC
2499BEGIN_FTR_SECTION
2500 oris r8,r8,MSR_VEC@h
2501END_FTR_SECTION_IFSET(CPU_FTR_ALTIVEC)
2502#endif
2503#ifdef CONFIG_VSX
2504BEGIN_FTR_SECTION
2505 oris r8,r8,MSR_VSX@h
2506END_FTR_SECTION_IFSET(CPU_FTR_VSX)
2507#endif
2508 mtmsrd r8
595e4f7e 2509 addi r3,r4,VCPU_FPRS
9bf163f8 2510 bl load_fp_state
de56a948
PM
2511#ifdef CONFIG_ALTIVEC
2512BEGIN_FTR_SECTION
595e4f7e 2513 addi r3,r31,VCPU_VRS
9bf163f8 2514 bl load_vr_state
de56a948
PM
2515END_FTR_SECTION_IFSET(CPU_FTR_ALTIVEC)
2516#endif
e724f080 2517 lwz r7,VCPU_VRSAVE(r31)
de56a948 2518 mtspr SPRN_VRSAVE,r7
595e4f7e
PM
2519 mtlr r30
2520 mr r4,r31
de56a948 2521 blr
44a3add8 2522
f024ee09
PM
2523#ifdef CONFIG_PPC_TRANSACTIONAL_MEM
2524/*
2525 * Save transactional state and TM-related registers.
2526 * Called with r9 pointing to the vcpu struct.
2527 * This can modify all checkpointed registers, but
2528 * restores r1, r2 and r9 (vcpu pointer) before exit.
2529 */
2530kvmppc_save_tm:
2531 mflr r0
2532 std r0, PPC_LR_STKOFF(r1)
2533
2534 /* Turn on TM. */
2535 mfmsr r8
2536 li r0, 1
2537 rldimi r8, r0, MSR_TM_LG, 63-MSR_TM_LG
2538 mtmsrd r8
2539
2540 ld r5, VCPU_MSR(r9)
2541 rldicl. r5, r5, 64 - MSR_TS_S_LG, 62
2542 beq 1f /* TM not active in guest. */
2543
2544 std r1, HSTATE_HOST_R1(r13)
2545 li r3, TM_CAUSE_KVM_RESCHED
2546
2547 /* Clear the MSR RI since r1, r13 are all going to be foobar. */
2548 li r5, 0
2549 mtmsrd r5, 1
2550
2551 /* All GPRs are volatile at this point. */
2552 TRECLAIM(R3)
2553
2554 /* Temporarily store r13 and r9 so we have some regs to play with */
2555 SET_SCRATCH0(r13)
2556 GET_PACA(r13)
2557 std r9, PACATMSCRATCH(r13)
2558 ld r9, HSTATE_KVM_VCPU(r13)
2559
2560 /* Get a few more GPRs free. */
2561 std r29, VCPU_GPRS_TM(29)(r9)
2562 std r30, VCPU_GPRS_TM(30)(r9)
2563 std r31, VCPU_GPRS_TM(31)(r9)
2564
2565 /* Save away PPR and DSCR soon so don't run with user values. */
2566 mfspr r31, SPRN_PPR
2567 HMT_MEDIUM
2568 mfspr r30, SPRN_DSCR
2569 ld r29, HSTATE_DSCR(r13)
2570 mtspr SPRN_DSCR, r29
2571
2572 /* Save all but r9, r13 & r29-r31 */
2573 reg = 0
2574 .rept 29
2575 .if (reg != 9) && (reg != 13)
2576 std reg, VCPU_GPRS_TM(reg)(r9)
2577 .endif
2578 reg = reg + 1
2579 .endr
2580 /* ... now save r13 */
2581 GET_SCRATCH0(r4)
2582 std r4, VCPU_GPRS_TM(13)(r9)
2583 /* ... and save r9 */
2584 ld r4, PACATMSCRATCH(r13)
2585 std r4, VCPU_GPRS_TM(9)(r9)
2586
2587 /* Reload stack pointer and TOC. */
2588 ld r1, HSTATE_HOST_R1(r13)
2589 ld r2, PACATOC(r13)
2590
2591 /* Set MSR RI now we have r1 and r13 back. */
2592 li r5, MSR_RI
2593 mtmsrd r5, 1
2594
2595 /* Save away checkpinted SPRs. */
2596 std r31, VCPU_PPR_TM(r9)
2597 std r30, VCPU_DSCR_TM(r9)
2598 mflr r5
2599 mfcr r6
2600 mfctr r7
2601 mfspr r8, SPRN_AMR
2602 mfspr r10, SPRN_TAR
2603 std r5, VCPU_LR_TM(r9)
2604 stw r6, VCPU_CR_TM(r9)
2605 std r7, VCPU_CTR_TM(r9)
2606 std r8, VCPU_AMR_TM(r9)
2607 std r10, VCPU_TAR_TM(r9)
2608
2609 /* Restore r12 as trap number. */
2610 lwz r12, VCPU_TRAP(r9)
2611
2612 /* Save FP/VSX. */
2613 addi r3, r9, VCPU_FPRS_TM
2614 bl store_fp_state
2615 addi r3, r9, VCPU_VRS_TM
2616 bl store_vr_state
2617 mfspr r6, SPRN_VRSAVE
2618 stw r6, VCPU_VRSAVE_TM(r9)
26191:
2620 /*
2621 * We need to save these SPRs after the treclaim so that the software
2622 * error code is recorded correctly in the TEXASR. Also the user may
2623 * change these outside of a transaction, so they must always be
2624 * context switched.
2625 */
2626 mfspr r5, SPRN_TFHAR
2627 mfspr r6, SPRN_TFIAR
2628 mfspr r7, SPRN_TEXASR
2629 std r5, VCPU_TFHAR(r9)
2630 std r6, VCPU_TFIAR(r9)
2631 std r7, VCPU_TEXASR(r9)
2632
2633 ld r0, PPC_LR_STKOFF(r1)
2634 mtlr r0
2635 blr
2636
2637/*
2638 * Restore transactional state and TM-related registers.
2639 * Called with r4 pointing to the vcpu struct.
2640 * This potentially modifies all checkpointed registers.
2641 * It restores r1, r2, r4 from the PACA.
2642 */
2643kvmppc_restore_tm:
2644 mflr r0
2645 std r0, PPC_LR_STKOFF(r1)
2646
2647 /* Turn on TM/FP/VSX/VMX so we can restore them. */
2648 mfmsr r5
2649 li r6, MSR_TM >> 32
2650 sldi r6, r6, 32
2651 or r5, r5, r6
2652 ori r5, r5, MSR_FP
2653 oris r5, r5, (MSR_VEC | MSR_VSX)@h
2654 mtmsrd r5
2655
2656 /*
2657 * The user may change these outside of a transaction, so they must
2658 * always be context switched.
2659 */
2660 ld r5, VCPU_TFHAR(r4)
2661 ld r6, VCPU_TFIAR(r4)
2662 ld r7, VCPU_TEXASR(r4)
2663 mtspr SPRN_TFHAR, r5
2664 mtspr SPRN_TFIAR, r6
2665 mtspr SPRN_TEXASR, r7
2666
2667 ld r5, VCPU_MSR(r4)
2668 rldicl. r5, r5, 64 - MSR_TS_S_LG, 62
2669 beqlr /* TM not active in guest */
2670 std r1, HSTATE_HOST_R1(r13)
2671
2672 /* Make sure the failure summary is set, otherwise we'll program check
2673 * when we trechkpt. It's possible that this might have been not set
2674 * on a kvmppc_set_one_reg() call but we shouldn't let this crash the
2675 * host.
2676 */
2677 oris r7, r7, (TEXASR_FS)@h
2678 mtspr SPRN_TEXASR, r7
2679
2680 /*
2681 * We need to load up the checkpointed state for the guest.
2682 * We need to do this early as it will blow away any GPRs, VSRs and
2683 * some SPRs.
2684 */
2685
2686 mr r31, r4
2687 addi r3, r31, VCPU_FPRS_TM
2688 bl load_fp_state
2689 addi r3, r31, VCPU_VRS_TM
2690 bl load_vr_state
2691 mr r4, r31
2692 lwz r7, VCPU_VRSAVE_TM(r4)
2693 mtspr SPRN_VRSAVE, r7
2694
2695 ld r5, VCPU_LR_TM(r4)
2696 lwz r6, VCPU_CR_TM(r4)
2697 ld r7, VCPU_CTR_TM(r4)
2698 ld r8, VCPU_AMR_TM(r4)
2699 ld r9, VCPU_TAR_TM(r4)
2700 mtlr r5
2701 mtcr r6
2702 mtctr r7
2703 mtspr SPRN_AMR, r8
2704 mtspr SPRN_TAR, r9
2705
2706 /*
2707 * Load up PPR and DSCR values but don't put them in the actual SPRs
2708 * till the last moment to avoid running with userspace PPR and DSCR for
2709 * too long.
2710 */
2711 ld r29, VCPU_DSCR_TM(r4)
2712 ld r30, VCPU_PPR_TM(r4)
2713
2714 std r2, PACATMSCRATCH(r13) /* Save TOC */
2715
2716 /* Clear the MSR RI since r1, r13 are all going to be foobar. */
2717 li r5, 0
2718 mtmsrd r5, 1
2719
2720 /* Load GPRs r0-r28 */
2721 reg = 0
2722 .rept 29
2723 ld reg, VCPU_GPRS_TM(reg)(r31)
2724 reg = reg + 1
2725 .endr
2726
2727 mtspr SPRN_DSCR, r29
2728 mtspr SPRN_PPR, r30
2729
2730 /* Load final GPRs */
2731 ld 29, VCPU_GPRS_TM(29)(r31)
2732 ld 30, VCPU_GPRS_TM(30)(r31)
2733 ld 31, VCPU_GPRS_TM(31)(r31)
2734
2735 /* TM checkpointed state is now setup. All GPRs are now volatile. */
2736 TRECHKPT
2737
2738 /* Now let's get back the state we need. */
2739 HMT_MEDIUM
2740 GET_PACA(r13)
2741 ld r29, HSTATE_DSCR(r13)
2742 mtspr SPRN_DSCR, r29
2743 ld r4, HSTATE_KVM_VCPU(r13)
2744 ld r1, HSTATE_HOST_R1(r13)
2745 ld r2, PACATMSCRATCH(r13)
2746
2747 /* Set the MSR RI since we have our registers back. */
2748 li r5, MSR_RI
2749 mtmsrd r5, 1
2750
2751 ld r0, PPC_LR_STKOFF(r1)
2752 mtlr r0
2753 blr
2754#endif
2755
44a3add8
PM
2756/*
2757 * We come here if we get any exception or interrupt while we are
2758 * executing host real mode code while in guest MMU context.
2759 * For now just spin, but we should do something better.
2760 */
2761kvmppc_bad_host_intr:
2762 b .
e4e38121
MN
2763
2764/*
2765 * This mimics the MSR transition on IRQ delivery. The new guest MSR is taken
2766 * from VCPU_INTR_MSR and is modified based on the required TM state changes.
2767 * r11 has the guest MSR value (in/out)
2768 * r9 has a vcpu pointer (in)
2769 * r0 is used as a scratch register
2770 */
2771kvmppc_msr_interrupt:
2772 rldicl r0, r11, 64 - MSR_TS_S_LG, 62
2773 cmpwi r0, 2 /* Check if we are in transactional state.. */
2774 ld r11, VCPU_INTR_MSR(r9)
2775 bne 1f
2776 /* ... if transactional, change to suspended */
2777 li r0, 1
27781: rldimi r11, r0, MSR_TS_S_LG, 63 - MSR_TS_T_LG
2779 blr
9bc01a9b
PM
2780
2781/*
2782 * This works around a hardware bug on POWER8E processors, where
2783 * writing a 1 to the MMCR0[PMAO] bit doesn't generate a
2784 * performance monitor interrupt. Instead, when we need to have
2785 * an interrupt pending, we have to arrange for a counter to overflow.
2786 */
2787kvmppc_fix_pmao:
2788 li r3, 0
2789 mtspr SPRN_MMCR2, r3
2790 lis r3, (MMCR0_PMXE | MMCR0_FCECE)@h
2791 ori r3, r3, MMCR0_PMCjCE | MMCR0_C56RUN
2792 mtspr SPRN_MMCR0, r3
2793 lis r3, 0x7fff
2794 ori r3, r3, 0xffff
2795 mtspr SPRN_PMC6, r3
2796 isync
2797 blr
b6c295df
PM
2798
2799#ifdef CONFIG_KVM_BOOK3S_HV_EXIT_TIMING
2800/*
2801 * Start timing an activity
2802 * r3 = pointer to time accumulation struct, r4 = vcpu
2803 */
2804kvmhv_start_timing:
2805 ld r5, HSTATE_KVM_VCORE(r13)
2806 lbz r6, VCORE_IN_GUEST(r5)
2807 cmpwi r6, 0
2808 beq 5f /* if in guest, need to */
2809 ld r6, VCORE_TB_OFFSET(r5) /* subtract timebase offset */
28105: mftb r5
2811 subf r5, r6, r5
2812 std r3, VCPU_CUR_ACTIVITY(r4)
2813 std r5, VCPU_ACTIVITY_START(r4)
2814 blr
2815
2816/*
2817 * Accumulate time to one activity and start another.
2818 * r3 = pointer to new time accumulation struct, r4 = vcpu
2819 */
2820kvmhv_accumulate_time:
2821 ld r5, HSTATE_KVM_VCORE(r13)
2822 lbz r8, VCORE_IN_GUEST(r5)
2823 cmpwi r8, 0
2824 beq 4f /* if in guest, need to */
2825 ld r8, VCORE_TB_OFFSET(r5) /* subtract timebase offset */
28264: ld r5, VCPU_CUR_ACTIVITY(r4)
2827 ld r6, VCPU_ACTIVITY_START(r4)
2828 std r3, VCPU_CUR_ACTIVITY(r4)
2829 mftb r7
2830 subf r7, r8, r7
2831 std r7, VCPU_ACTIVITY_START(r4)
2832 cmpdi r5, 0
2833 beqlr
2834 subf r3, r6, r7
2835 ld r8, TAS_SEQCOUNT(r5)
2836 cmpdi r8, 0
2837 addi r8, r8, 1
2838 std r8, TAS_SEQCOUNT(r5)
2839 lwsync
2840 ld r7, TAS_TOTAL(r5)
2841 add r7, r7, r3
2842 std r7, TAS_TOTAL(r5)
2843 ld r6, TAS_MIN(r5)
2844 ld r7, TAS_MAX(r5)
2845 beq 3f
2846 cmpd r3, r6
2847 bge 1f
28483: std r3, TAS_MIN(r5)
28491: cmpd r3, r7
2850 ble 2f
2851 std r3, TAS_MAX(r5)
28522: lwsync
2853 addi r8, r8, 1
2854 std r8, TAS_SEQCOUNT(r5)
2855 blr
2856#endif
This page took 0.347426 seconds and 5 git commands to generate.