Commit | Line | Data |
---|---|---|
0254f074 AG |
1 | /* |
2 | * Copyright (C) 2011. Freescale Inc. All rights reserved. | |
3 | * | |
4 | * Authors: | |
5 | * Alexander Graf <agraf@suse.de> | |
6 | * Paul Mackerras <paulus@samba.org> | |
7 | * | |
8 | * Description: | |
9 | * | |
10 | * Hypercall handling for running PAPR guests in PR KVM on Book 3S | |
11 | * processors. | |
12 | * | |
13 | * This program is free software; you can redistribute it and/or modify | |
14 | * it under the terms of the GNU General Public License, version 2, as | |
15 | * published by the Free Software Foundation. | |
16 | */ | |
17 | ||
f31e65e1 BH |
18 | #include <linux/anon_inodes.h> |
19 | ||
0254f074 AG |
20 | #include <asm/uaccess.h> |
21 | #include <asm/kvm_ppc.h> | |
22 | #include <asm/kvm_book3s.h> | |
23 | ||
5cd92a95 PM |
24 | #define HPTE_SIZE 16 /* bytes per HPT entry */ |
25 | ||
0254f074 AG |
26 | static unsigned long get_pteg_addr(struct kvm_vcpu *vcpu, long pte_index) |
27 | { | |
28 | struct kvmppc_vcpu_book3s *vcpu_book3s = to_book3s(vcpu); | |
29 | unsigned long pteg_addr; | |
30 | ||
31 | pte_index <<= 4; | |
32 | pte_index &= ((1 << ((vcpu_book3s->sdr1 & 0x1f) + 11)) - 1) << 7 | 0x70; | |
33 | pteg_addr = vcpu_book3s->sdr1 & 0xfffffffffffc0000ULL; | |
34 | pteg_addr |= pte_index; | |
35 | ||
36 | return pteg_addr; | |
37 | } | |
38 | ||
39 | static int kvmppc_h_pr_enter(struct kvm_vcpu *vcpu) | |
40 | { | |
41 | long flags = kvmppc_get_gpr(vcpu, 4); | |
42 | long pte_index = kvmppc_get_gpr(vcpu, 5); | |
f396df35 AG |
43 | __be64 pteg[2 * 8]; |
44 | __be64 *hpte; | |
45 | unsigned long pteg_addr, i; | |
5cd92a95 | 46 | long int ret; |
0254f074 | 47 | |
5cd92a95 | 48 | i = pte_index & 7; |
0254f074 AG |
49 | pte_index &= ~7UL; |
50 | pteg_addr = get_pteg_addr(vcpu, pte_index); | |
51 | ||
9308ab8e | 52 | mutex_lock(&vcpu->kvm->arch.hpt_mutex); |
0254f074 AG |
53 | copy_from_user(pteg, (void __user *)pteg_addr, sizeof(pteg)); |
54 | hpte = pteg; | |
55 | ||
5cd92a95 | 56 | ret = H_PTEG_FULL; |
0254f074 | 57 | if (likely((flags & H_EXACT) == 0)) { |
0254f074 AG |
58 | for (i = 0; ; ++i) { |
59 | if (i == 8) | |
5cd92a95 | 60 | goto done; |
1692aa3f | 61 | if ((be64_to_cpu(*hpte) & HPTE_V_VALID) == 0) |
0254f074 AG |
62 | break; |
63 | hpte += 2; | |
64 | } | |
65 | } else { | |
0254f074 | 66 | hpte += i * 2; |
5cd92a95 PM |
67 | if (*hpte & HPTE_V_VALID) |
68 | goto done; | |
0254f074 AG |
69 | } |
70 | ||
1692aa3f AG |
71 | hpte[0] = cpu_to_be64(kvmppc_get_gpr(vcpu, 6)); |
72 | hpte[1] = cpu_to_be64(kvmppc_get_gpr(vcpu, 7)); | |
5cd92a95 PM |
73 | pteg_addr += i * HPTE_SIZE; |
74 | copy_to_user((void __user *)pteg_addr, hpte, HPTE_SIZE); | |
0254f074 | 75 | kvmppc_set_gpr(vcpu, 4, pte_index | i); |
5cd92a95 PM |
76 | ret = H_SUCCESS; |
77 | ||
78 | done: | |
9308ab8e | 79 | mutex_unlock(&vcpu->kvm->arch.hpt_mutex); |
5cd92a95 | 80 | kvmppc_set_gpr(vcpu, 3, ret); |
0254f074 AG |
81 | |
82 | return EMULATE_DONE; | |
83 | } | |
84 | ||
85 | static int kvmppc_h_pr_remove(struct kvm_vcpu *vcpu) | |
86 | { | |
87 | unsigned long flags= kvmppc_get_gpr(vcpu, 4); | |
88 | unsigned long pte_index = kvmppc_get_gpr(vcpu, 5); | |
89 | unsigned long avpn = kvmppc_get_gpr(vcpu, 6); | |
90 | unsigned long v = 0, pteg, rb; | |
91 | unsigned long pte[2]; | |
9308ab8e | 92 | long int ret; |
0254f074 AG |
93 | |
94 | pteg = get_pteg_addr(vcpu, pte_index); | |
9308ab8e | 95 | mutex_lock(&vcpu->kvm->arch.hpt_mutex); |
0254f074 | 96 | copy_from_user(pte, (void __user *)pteg, sizeof(pte)); |
f396df35 AG |
97 | pte[0] = be64_to_cpu((__force __be64)pte[0]); |
98 | pte[1] = be64_to_cpu((__force __be64)pte[1]); | |
0254f074 | 99 | |
9308ab8e | 100 | ret = H_NOT_FOUND; |
0254f074 AG |
101 | if ((pte[0] & HPTE_V_VALID) == 0 || |
102 | ((flags & H_AVPN) && (pte[0] & ~0x7fUL) != avpn) || | |
9308ab8e PM |
103 | ((flags & H_ANDCOND) && (pte[0] & avpn) != 0)) |
104 | goto done; | |
0254f074 AG |
105 | |
106 | copy_to_user((void __user *)pteg, &v, sizeof(v)); | |
107 | ||
108 | rb = compute_tlbie_rb(pte[0], pte[1], pte_index); | |
109 | vcpu->arch.mmu.tlbie(vcpu, rb, rb & 1 ? true : false); | |
110 | ||
9308ab8e | 111 | ret = H_SUCCESS; |
0254f074 AG |
112 | kvmppc_set_gpr(vcpu, 4, pte[0]); |
113 | kvmppc_set_gpr(vcpu, 5, pte[1]); | |
114 | ||
9308ab8e PM |
115 | done: |
116 | mutex_unlock(&vcpu->kvm->arch.hpt_mutex); | |
117 | kvmppc_set_gpr(vcpu, 3, ret); | |
118 | ||
0254f074 AG |
119 | return EMULATE_DONE; |
120 | } | |
121 | ||
3aaefef2 ME |
122 | /* Request defs for kvmppc_h_pr_bulk_remove() */ |
123 | #define H_BULK_REMOVE_TYPE 0xc000000000000000ULL | |
124 | #define H_BULK_REMOVE_REQUEST 0x4000000000000000ULL | |
125 | #define H_BULK_REMOVE_RESPONSE 0x8000000000000000ULL | |
126 | #define H_BULK_REMOVE_END 0xc000000000000000ULL | |
127 | #define H_BULK_REMOVE_CODE 0x3000000000000000ULL | |
128 | #define H_BULK_REMOVE_SUCCESS 0x0000000000000000ULL | |
129 | #define H_BULK_REMOVE_NOT_FOUND 0x1000000000000000ULL | |
130 | #define H_BULK_REMOVE_PARM 0x2000000000000000ULL | |
131 | #define H_BULK_REMOVE_HW 0x3000000000000000ULL | |
132 | #define H_BULK_REMOVE_RC 0x0c00000000000000ULL | |
133 | #define H_BULK_REMOVE_FLAGS 0x0300000000000000ULL | |
134 | #define H_BULK_REMOVE_ABSOLUTE 0x0000000000000000ULL | |
135 | #define H_BULK_REMOVE_ANDCOND 0x0100000000000000ULL | |
136 | #define H_BULK_REMOVE_AVPN 0x0200000000000000ULL | |
137 | #define H_BULK_REMOVE_PTEX 0x00ffffffffffffffULL | |
138 | #define H_BULK_REMOVE_MAX_BATCH 4 | |
139 | ||
140 | static int kvmppc_h_pr_bulk_remove(struct kvm_vcpu *vcpu) | |
141 | { | |
142 | int i; | |
143 | int paramnr = 4; | |
144 | int ret = H_SUCCESS; | |
145 | ||
9308ab8e | 146 | mutex_lock(&vcpu->kvm->arch.hpt_mutex); |
3aaefef2 ME |
147 | for (i = 0; i < H_BULK_REMOVE_MAX_BATCH; i++) { |
148 | unsigned long tsh = kvmppc_get_gpr(vcpu, paramnr+(2*i)); | |
149 | unsigned long tsl = kvmppc_get_gpr(vcpu, paramnr+(2*i)+1); | |
150 | unsigned long pteg, rb, flags; | |
151 | unsigned long pte[2]; | |
152 | unsigned long v = 0; | |
153 | ||
154 | if ((tsh & H_BULK_REMOVE_TYPE) == H_BULK_REMOVE_END) { | |
155 | break; /* Exit success */ | |
156 | } else if ((tsh & H_BULK_REMOVE_TYPE) != | |
157 | H_BULK_REMOVE_REQUEST) { | |
158 | ret = H_PARAMETER; | |
159 | break; /* Exit fail */ | |
160 | } | |
161 | ||
162 | tsh &= H_BULK_REMOVE_PTEX | H_BULK_REMOVE_FLAGS; | |
163 | tsh |= H_BULK_REMOVE_RESPONSE; | |
164 | ||
165 | if ((tsh & H_BULK_REMOVE_ANDCOND) && | |
166 | (tsh & H_BULK_REMOVE_AVPN)) { | |
167 | tsh |= H_BULK_REMOVE_PARM; | |
168 | kvmppc_set_gpr(vcpu, paramnr+(2*i), tsh); | |
169 | ret = H_PARAMETER; | |
170 | break; /* Exit fail */ | |
171 | } | |
172 | ||
173 | pteg = get_pteg_addr(vcpu, tsh & H_BULK_REMOVE_PTEX); | |
174 | copy_from_user(pte, (void __user *)pteg, sizeof(pte)); | |
f396df35 AG |
175 | pte[0] = be64_to_cpu((__force __be64)pte[0]); |
176 | pte[1] = be64_to_cpu((__force __be64)pte[1]); | |
3aaefef2 ME |
177 | |
178 | /* tsl = AVPN */ | |
179 | flags = (tsh & H_BULK_REMOVE_FLAGS) >> 26; | |
180 | ||
181 | if ((pte[0] & HPTE_V_VALID) == 0 || | |
182 | ((flags & H_AVPN) && (pte[0] & ~0x7fUL) != tsl) || | |
183 | ((flags & H_ANDCOND) && (pte[0] & tsl) != 0)) { | |
184 | tsh |= H_BULK_REMOVE_NOT_FOUND; | |
185 | } else { | |
186 | /* Splat the pteg in (userland) hpt */ | |
187 | copy_to_user((void __user *)pteg, &v, sizeof(v)); | |
188 | ||
189 | rb = compute_tlbie_rb(pte[0], pte[1], | |
190 | tsh & H_BULK_REMOVE_PTEX); | |
191 | vcpu->arch.mmu.tlbie(vcpu, rb, rb & 1 ? true : false); | |
192 | tsh |= H_BULK_REMOVE_SUCCESS; | |
193 | tsh |= (pte[1] & (HPTE_R_C | HPTE_R_R)) << 43; | |
194 | } | |
195 | kvmppc_set_gpr(vcpu, paramnr+(2*i), tsh); | |
196 | } | |
9308ab8e | 197 | mutex_unlock(&vcpu->kvm->arch.hpt_mutex); |
3aaefef2 ME |
198 | kvmppc_set_gpr(vcpu, 3, ret); |
199 | ||
200 | return EMULATE_DONE; | |
201 | } | |
202 | ||
0254f074 AG |
203 | static int kvmppc_h_pr_protect(struct kvm_vcpu *vcpu) |
204 | { | |
205 | unsigned long flags = kvmppc_get_gpr(vcpu, 4); | |
206 | unsigned long pte_index = kvmppc_get_gpr(vcpu, 5); | |
207 | unsigned long avpn = kvmppc_get_gpr(vcpu, 6); | |
208 | unsigned long rb, pteg, r, v; | |
209 | unsigned long pte[2]; | |
9308ab8e | 210 | long int ret; |
0254f074 AG |
211 | |
212 | pteg = get_pteg_addr(vcpu, pte_index); | |
9308ab8e | 213 | mutex_lock(&vcpu->kvm->arch.hpt_mutex); |
0254f074 | 214 | copy_from_user(pte, (void __user *)pteg, sizeof(pte)); |
f396df35 AG |
215 | pte[0] = be64_to_cpu((__force __be64)pte[0]); |
216 | pte[1] = be64_to_cpu((__force __be64)pte[1]); | |
0254f074 | 217 | |
9308ab8e | 218 | ret = H_NOT_FOUND; |
0254f074 | 219 | if ((pte[0] & HPTE_V_VALID) == 0 || |
9308ab8e PM |
220 | ((flags & H_AVPN) && (pte[0] & ~0x7fUL) != avpn)) |
221 | goto done; | |
0254f074 AG |
222 | |
223 | v = pte[0]; | |
224 | r = pte[1]; | |
225 | r &= ~(HPTE_R_PP0 | HPTE_R_PP | HPTE_R_N | HPTE_R_KEY_HI | | |
226 | HPTE_R_KEY_LO); | |
227 | r |= (flags << 55) & HPTE_R_PP0; | |
228 | r |= (flags << 48) & HPTE_R_KEY_HI; | |
229 | r |= flags & (HPTE_R_PP | HPTE_R_N | HPTE_R_KEY_LO); | |
230 | ||
231 | pte[1] = r; | |
232 | ||
233 | rb = compute_tlbie_rb(v, r, pte_index); | |
234 | vcpu->arch.mmu.tlbie(vcpu, rb, rb & 1 ? true : false); | |
f396df35 AG |
235 | pte[0] = (__force u64)cpu_to_be64(pte[0]); |
236 | pte[1] = (__force u64)cpu_to_be64(pte[1]); | |
0254f074 | 237 | copy_to_user((void __user *)pteg, pte, sizeof(pte)); |
9308ab8e | 238 | ret = H_SUCCESS; |
0254f074 | 239 | |
9308ab8e PM |
240 | done: |
241 | mutex_unlock(&vcpu->kvm->arch.hpt_mutex); | |
242 | kvmppc_set_gpr(vcpu, 3, ret); | |
0254f074 AG |
243 | |
244 | return EMULATE_DONE; | |
245 | } | |
246 | ||
f31e65e1 BH |
247 | static int kvmppc_h_pr_put_tce(struct kvm_vcpu *vcpu) |
248 | { | |
249 | unsigned long liobn = kvmppc_get_gpr(vcpu, 4); | |
250 | unsigned long ioba = kvmppc_get_gpr(vcpu, 5); | |
251 | unsigned long tce = kvmppc_get_gpr(vcpu, 6); | |
252 | long rc; | |
253 | ||
254 | rc = kvmppc_h_put_tce(vcpu, liobn, ioba, tce); | |
255 | if (rc == H_TOO_HARD) | |
256 | return EMULATE_FAIL; | |
257 | kvmppc_set_gpr(vcpu, 3, rc); | |
258 | return EMULATE_DONE; | |
259 | } | |
260 | ||
bc5ad3f3 BH |
261 | static int kvmppc_h_pr_xics_hcall(struct kvm_vcpu *vcpu, u32 cmd) |
262 | { | |
263 | long rc = kvmppc_xics_hcall(vcpu, cmd); | |
264 | kvmppc_set_gpr(vcpu, 3, rc); | |
265 | return EMULATE_DONE; | |
266 | } | |
267 | ||
0254f074 AG |
268 | int kvmppc_h_pr(struct kvm_vcpu *vcpu, unsigned long cmd) |
269 | { | |
699a0ea0 PM |
270 | if (cmd <= MAX_HCALL_OPCODE && |
271 | !test_bit(cmd/4, vcpu->kvm->arch.enabled_hcalls)) | |
272 | return EMULATE_FAIL; | |
273 | ||
0254f074 AG |
274 | switch (cmd) { |
275 | case H_ENTER: | |
276 | return kvmppc_h_pr_enter(vcpu); | |
277 | case H_REMOVE: | |
278 | return kvmppc_h_pr_remove(vcpu); | |
279 | case H_PROTECT: | |
280 | return kvmppc_h_pr_protect(vcpu); | |
281 | case H_BULK_REMOVE: | |
3aaefef2 | 282 | return kvmppc_h_pr_bulk_remove(vcpu); |
f31e65e1 BH |
283 | case H_PUT_TCE: |
284 | return kvmppc_h_pr_put_tce(vcpu); | |
0254f074 | 285 | case H_CEDE: |
5deb8e7a | 286 | kvmppc_set_msr_fast(vcpu, kvmppc_get_msr(vcpu) | MSR_EE); |
0254f074 | 287 | kvm_vcpu_block(vcpu); |
966cd0f3 | 288 | clear_bit(KVM_REQ_UNHALT, &vcpu->requests); |
0254f074 AG |
289 | vcpu->stat.halt_wakeup++; |
290 | return EMULATE_DONE; | |
bc5ad3f3 BH |
291 | case H_XIRR: |
292 | case H_CPPR: | |
293 | case H_EOI: | |
294 | case H_IPI: | |
8e44ddc3 PM |
295 | case H_IPOLL: |
296 | case H_XIRR_X: | |
bc5ad3f3 BH |
297 | if (kvmppc_xics_enabled(vcpu)) |
298 | return kvmppc_h_pr_xics_hcall(vcpu, cmd); | |
299 | break; | |
8e591cb7 ME |
300 | case H_RTAS: |
301 | if (list_empty(&vcpu->kvm->arch.rtas_tokens)) | |
302 | return RESUME_HOST; | |
303 | if (kvmppc_rtas_hcall(vcpu)) | |
304 | break; | |
305 | kvmppc_set_gpr(vcpu, 3, 0); | |
306 | return EMULATE_DONE; | |
0254f074 AG |
307 | } |
308 | ||
309 | return EMULATE_FAIL; | |
310 | } | |
699a0ea0 PM |
311 | |
312 | ||
313 | /* | |
314 | * List of hcall numbers to enable by default. | |
315 | * For compatibility with old userspace, we enable by default | |
316 | * all hcalls that were implemented before the hcall-enabling | |
317 | * facility was added. Note this list should not include H_RTAS. | |
318 | */ | |
319 | static unsigned int default_hcall_list[] = { | |
320 | H_ENTER, | |
321 | H_REMOVE, | |
322 | H_PROTECT, | |
323 | H_BULK_REMOVE, | |
324 | H_PUT_TCE, | |
325 | H_CEDE, | |
326 | #ifdef CONFIG_KVM_XICS | |
327 | H_XIRR, | |
328 | H_CPPR, | |
329 | H_EOI, | |
330 | H_IPI, | |
331 | H_IPOLL, | |
332 | H_XIRR_X, | |
333 | #endif | |
334 | 0 | |
335 | }; | |
336 | ||
337 | void kvmppc_pr_init_default_hcalls(struct kvm *kvm) | |
338 | { | |
339 | int i; | |
340 | ||
341 | for (i = 0; default_hcall_list[i]; ++i) | |
342 | __set_bit(default_hcall_list[i] / 4, kvm->arch.enabled_hcalls); | |
343 | } |