kvm: powerpc: booke: Move booke related tracepoints to separate header
[deliverable/linux.git] / arch / powerpc / kvm / powerpc.c
CommitLineData
bbf45ba5
HB
1/*
2 * This program is free software; you can redistribute it and/or modify
3 * it under the terms of the GNU General Public License, version 2, as
4 * published by the Free Software Foundation.
5 *
6 * This program is distributed in the hope that it will be useful,
7 * but WITHOUT ANY WARRANTY; without even the implied warranty of
8 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
9 * GNU General Public License for more details.
10 *
11 * You should have received a copy of the GNU General Public License
12 * along with this program; if not, write to the Free Software
13 * Foundation, 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
14 *
15 * Copyright IBM Corp. 2007
16 *
17 * Authors: Hollis Blanchard <hollisb@us.ibm.com>
18 * Christian Ehrhardt <ehrhardt@linux.vnet.ibm.com>
19 */
20
21#include <linux/errno.h>
22#include <linux/err.h>
23#include <linux/kvm_host.h>
bbf45ba5 24#include <linux/vmalloc.h>
544c6761 25#include <linux/hrtimer.h>
bbf45ba5 26#include <linux/fs.h>
5a0e3ad6 27#include <linux/slab.h>
eb1e4f43 28#include <linux/file.h>
bbf45ba5
HB
29#include <asm/cputable.h>
30#include <asm/uaccess.h>
31#include <asm/kvm_ppc.h>
83aae4a8 32#include <asm/tlbflush.h>
371fefd6 33#include <asm/cputhreads.h>
bd2be683 34#include <asm/irqflags.h>
73e75b41 35#include "timing.h"
5efdb4be 36#include "irq.h"
fad7b9b5 37#include "../mm/mmu_decl.h"
bbf45ba5 38
46f43c6e
MT
39#define CREATE_TRACE_POINTS
40#include "trace.h"
41
3a167bea
AK
42struct kvmppc_ops *kvmppc_ops;
43
bbf45ba5
HB
44int kvm_arch_vcpu_runnable(struct kvm_vcpu *v)
45{
9202e076 46 return !!(v->arch.pending_exceptions) ||
dfd4d47e 47 v->requests;
bbf45ba5
HB
48}
49
b6d33834
CD
50int kvm_arch_vcpu_should_kick(struct kvm_vcpu *vcpu)
51{
52 return 1;
53}
54
03d25c5b
AG
55/*
56 * Common checks before entering the guest world. Call with interrupts
57 * disabled.
58 *
7ee78855
AG
59 * returns:
60 *
61 * == 1 if we're ready to go into guest state
62 * <= 0 if we need to go back to the host with return value
03d25c5b
AG
63 */
64int kvmppc_prepare_to_enter(struct kvm_vcpu *vcpu)
65{
7ee78855 66 int r = 1;
03d25c5b
AG
67
68 WARN_ON_ONCE(!irqs_disabled());
69 while (true) {
70 if (need_resched()) {
71 local_irq_enable();
72 cond_resched();
73 local_irq_disable();
74 continue;
75 }
76
77 if (signal_pending(current)) {
7ee78855
AG
78 kvmppc_account_exit(vcpu, SIGNAL_EXITS);
79 vcpu->run->exit_reason = KVM_EXIT_INTR;
80 r = -EINTR;
03d25c5b
AG
81 break;
82 }
83
5bd1cf11
SW
84 vcpu->mode = IN_GUEST_MODE;
85
86 /*
87 * Reading vcpu->requests must happen after setting vcpu->mode,
88 * so we don't miss a request because the requester sees
89 * OUTSIDE_GUEST_MODE and assumes we'll be checking requests
90 * before next entering the guest (and thus doesn't IPI).
91 */
03d25c5b 92 smp_mb();
5bd1cf11 93
03d25c5b
AG
94 if (vcpu->requests) {
95 /* Make sure we process requests preemptable */
96 local_irq_enable();
97 trace_kvm_check_requests(vcpu);
7c973a2e 98 r = kvmppc_core_check_requests(vcpu);
03d25c5b 99 local_irq_disable();
7c973a2e
AG
100 if (r > 0)
101 continue;
102 break;
03d25c5b
AG
103 }
104
105 if (kvmppc_core_prepare_to_enter(vcpu)) {
106 /* interrupts got enabled in between, so we
107 are back at square 1 */
108 continue;
109 }
110
bd2be683
AG
111#ifdef CONFIG_PPC64
112 /* lazy EE magic */
113 hard_irq_disable();
114 if (lazy_irq_pending()) {
115 /* Got an interrupt in between, try again */
116 local_irq_enable();
117 local_irq_disable();
3766a4c6 118 kvm_guest_exit();
bd2be683
AG
119 continue;
120 }
bd2be683
AG
121#endif
122
3766a4c6 123 kvm_guest_enter();
03d25c5b
AG
124 break;
125 }
126
127 return r;
128}
03d25c5b 129
2a342ed5
AG
130int kvmppc_kvm_pv(struct kvm_vcpu *vcpu)
131{
132 int nr = kvmppc_get_gpr(vcpu, 11);
133 int r;
134 unsigned long __maybe_unused param1 = kvmppc_get_gpr(vcpu, 3);
135 unsigned long __maybe_unused param2 = kvmppc_get_gpr(vcpu, 4);
136 unsigned long __maybe_unused param3 = kvmppc_get_gpr(vcpu, 5);
137 unsigned long __maybe_unused param4 = kvmppc_get_gpr(vcpu, 6);
138 unsigned long r2 = 0;
139
140 if (!(vcpu->arch.shared->msr & MSR_SF)) {
141 /* 32 bit mode */
142 param1 &= 0xffffffff;
143 param2 &= 0xffffffff;
144 param3 &= 0xffffffff;
145 param4 &= 0xffffffff;
146 }
147
148 switch (nr) {
fdcf8bd7 149 case KVM_HCALL_TOKEN(KVM_HC_PPC_MAP_MAGIC_PAGE):
5fc87407
AG
150 {
151 vcpu->arch.magic_page_pa = param1;
152 vcpu->arch.magic_page_ea = param2;
153
b5904972 154 r2 = KVM_MAGIC_FEAT_SR | KVM_MAGIC_FEAT_MAS0_TO_SPRG7;
7508e16c 155
fdcf8bd7 156 r = EV_SUCCESS;
5fc87407
AG
157 break;
158 }
fdcf8bd7
SY
159 case KVM_HCALL_TOKEN(KVM_HC_FEATURES):
160 r = EV_SUCCESS;
bf7ca4bd 161#if defined(CONFIG_PPC_BOOK3S) || defined(CONFIG_KVM_E500V2)
a4cd8b23 162 /* XXX Missing magic page on 44x */
5fc87407
AG
163 r2 |= (1 << KVM_FEATURE_MAGIC_PAGE);
164#endif
2a342ed5
AG
165
166 /* Second return value is in r4 */
2a342ed5 167 break;
9202e076
LYB
168 case EV_HCALL_TOKEN(EV_IDLE):
169 r = EV_SUCCESS;
170 kvm_vcpu_block(vcpu);
171 clear_bit(KVM_REQ_UNHALT, &vcpu->requests);
172 break;
2a342ed5 173 default:
fdcf8bd7 174 r = EV_UNIMPLEMENTED;
2a342ed5
AG
175 break;
176 }
177
7508e16c
AG
178 kvmppc_set_gpr(vcpu, 4, r2);
179
2a342ed5
AG
180 return r;
181}
bbf45ba5 182
af8f38b3
AG
183int kvmppc_sanity_check(struct kvm_vcpu *vcpu)
184{
185 int r = false;
186
187 /* We have to know what CPU to virtualize */
188 if (!vcpu->arch.pvr)
189 goto out;
190
191 /* PAPR only works with book3s_64 */
192 if ((vcpu->arch.cpu_type != KVM_CPU_3S_64) && vcpu->arch.papr_enabled)
193 goto out;
194
af8f38b3 195 /* HV KVM can only do PAPR mode for now */
699cc876 196 if (!vcpu->arch.papr_enabled && kvmppc_ops->is_hv_enabled)
af8f38b3 197 goto out;
af8f38b3 198
d30f6e48
SW
199#ifdef CONFIG_KVM_BOOKE_HV
200 if (!cpu_has_feature(CPU_FTR_EMB_HV))
201 goto out;
202#endif
203
af8f38b3
AG
204 r = true;
205
206out:
207 vcpu->arch.sane = r;
208 return r ? 0 : -EINVAL;
209}
210
bbf45ba5
HB
211int kvmppc_emulate_mmio(struct kvm_run *run, struct kvm_vcpu *vcpu)
212{
213 enum emulation_result er;
214 int r;
215
216 er = kvmppc_emulate_instruction(run, vcpu);
217 switch (er) {
218 case EMULATE_DONE:
219 /* Future optimization: only reload non-volatiles if they were
220 * actually modified. */
221 r = RESUME_GUEST_NV;
222 break;
223 case EMULATE_DO_MMIO:
224 run->exit_reason = KVM_EXIT_MMIO;
225 /* We must reload nonvolatiles because "update" load/store
226 * instructions modify register state. */
227 /* Future optimization: only reload non-volatiles if they were
228 * actually modified. */
229 r = RESUME_HOST_NV;
230 break;
231 case EMULATE_FAIL:
232 /* XXX Deliver Program interrupt to guest. */
233 printk(KERN_EMERG "%s: emulation failed (%08x)\n", __func__,
c7f38f46 234 kvmppc_get_last_inst(vcpu));
bbf45ba5
HB
235 r = RESUME_HOST;
236 break;
237 default:
5a33169e
AG
238 WARN_ON(1);
239 r = RESUME_GUEST;
bbf45ba5
HB
240 }
241
242 return r;
243}
244
10474ae8 245int kvm_arch_hardware_enable(void *garbage)
bbf45ba5 246{
10474ae8 247 return 0;
bbf45ba5
HB
248}
249
250void kvm_arch_hardware_disable(void *garbage)
251{
252}
253
254int kvm_arch_hardware_setup(void)
255{
256 return 0;
257}
258
259void kvm_arch_hardware_unsetup(void)
260{
261}
262
263void kvm_arch_check_processor_compat(void *rtn)
264{
9dd921cf 265 *(int *)rtn = kvmppc_core_check_processor_compat();
bbf45ba5
HB
266}
267
e08b9637 268int kvm_arch_init_vm(struct kvm *kvm, unsigned long type)
bbf45ba5 269{
e08b9637
CO
270 if (type)
271 return -EINVAL;
272
f9e0554d 273 return kvmppc_core_init_vm(kvm);
bbf45ba5
HB
274}
275
d89f5eff 276void kvm_arch_destroy_vm(struct kvm *kvm)
bbf45ba5
HB
277{
278 unsigned int i;
988a2cae 279 struct kvm_vcpu *vcpu;
bbf45ba5 280
988a2cae
GN
281 kvm_for_each_vcpu(i, vcpu, kvm)
282 kvm_arch_vcpu_free(vcpu);
283
284 mutex_lock(&kvm->lock);
285 for (i = 0; i < atomic_read(&kvm->online_vcpus); i++)
286 kvm->vcpus[i] = NULL;
287
288 atomic_set(&kvm->online_vcpus, 0);
f9e0554d
PM
289
290 kvmppc_core_destroy_vm(kvm);
291
988a2cae 292 mutex_unlock(&kvm->lock);
bbf45ba5
HB
293}
294
ad8ba2cd
SY
295void kvm_arch_sync_events(struct kvm *kvm)
296{
297}
298
bbf45ba5
HB
299int kvm_dev_ioctl_check_extension(long ext)
300{
301 int r;
302
303 switch (ext) {
5ce941ee
SW
304#ifdef CONFIG_BOOKE
305 case KVM_CAP_PPC_BOOKE_SREGS:
f61c94bb 306 case KVM_CAP_PPC_BOOKE_WATCHDOG:
1c810636 307 case KVM_CAP_PPC_EPR:
5ce941ee 308#else
e15a1137 309 case KVM_CAP_PPC_SEGSTATE:
1022fc3d 310 case KVM_CAP_PPC_HIOR:
930b412a 311 case KVM_CAP_PPC_PAPR:
5ce941ee 312#endif
18978768 313 case KVM_CAP_PPC_UNSET_IRQ:
7b4203e8 314 case KVM_CAP_PPC_IRQ_LEVEL:
71fbfd5f 315 case KVM_CAP_ENABLE_CAP:
e24ed81f 316 case KVM_CAP_ONE_REG:
0e673fb6 317 case KVM_CAP_IOEVENTFD:
5df554ad 318 case KVM_CAP_DEVICE_CTRL:
de56a948
PM
319 r = 1;
320 break;
de56a948 321 case KVM_CAP_PPC_PAIRED_SINGLES:
ad0a048b 322 case KVM_CAP_PPC_OSI:
15711e9c 323 case KVM_CAP_PPC_GET_PVINFO:
bf7ca4bd 324#if defined(CONFIG_KVM_E500V2) || defined(CONFIG_KVM_E500MC)
dc83b8bc 325 case KVM_CAP_SW_TLB:
eb1e4f43 326#endif
699cc876
AK
327 /* We support this only for PR */
328 r = !kvmppc_ops->is_hv_enabled;
e15a1137 329 break;
699cc876 330#ifdef CONFIG_KVM_MMIO
588968b6
LV
331 case KVM_CAP_COALESCED_MMIO:
332 r = KVM_COALESCED_MMIO_PAGE_OFFSET;
333 break;
54738c09 334#endif
699cc876
AK
335#ifdef CONFIG_KVM_MPIC
336 case KVM_CAP_IRQ_MPIC:
337 r = 1;
338 break;
339#endif
340
f31e65e1 341#ifdef CONFIG_PPC_BOOK3S_64
54738c09 342 case KVM_CAP_SPAPR_TCE:
32fad281 343 case KVM_CAP_PPC_ALLOC_HTAB:
8e591cb7 344 case KVM_CAP_PPC_RTAS:
5975a2e0
PM
345#ifdef CONFIG_KVM_XICS
346 case KVM_CAP_IRQ_XICS:
347#endif
54738c09
DG
348 r = 1;
349 break;
f31e65e1 350#endif /* CONFIG_PPC_BOOK3S_64 */
699cc876 351#ifdef CONFIG_KVM_BOOK3S_HV_POSSIBLE
371fefd6 352 case KVM_CAP_PPC_SMT:
699cc876
AK
353 if (kvmppc_ops->is_hv_enabled)
354 r = threads_per_core;
355 else
356 r = 0;
371fefd6 357 break;
aa04b4cc 358 case KVM_CAP_PPC_RMA:
699cc876 359 r = kvmppc_ops->is_hv_enabled;
9e368f29 360 /* PPC970 requires an RMA */
699cc876 361 if (r && cpu_has_feature(CPU_FTR_ARCH_201))
9e368f29 362 r = 2;
aa04b4cc 363 break;
f4800b1f 364#endif
342d3db7 365 case KVM_CAP_SYNC_MMU:
699cc876
AK
366#ifdef CONFIG_KVM_BOOK3S_HV_POSSIBLE
367 if (kvmppc_ops->is_hv_enabled)
368 r = cpu_has_feature(CPU_FTR_ARCH_206) ? 1 : 0;
369 else
370 r = 0;
f4800b1f
AG
371#elif defined(KVM_ARCH_WANT_MMU_NOTIFIER)
372 r = 1;
373#else
374 r = 0;
a2932923 375#endif
699cc876
AK
376 break;
377#ifdef CONFIG_KVM_BOOK3S_HV_POSSIBLE
a2932923 378 case KVM_CAP_PPC_HTAB_FD:
699cc876 379 r = kvmppc_ops->is_hv_enabled;
a2932923 380 break;
de56a948 381#endif
b5434032
ME
382 case KVM_CAP_NR_VCPUS:
383 /*
384 * Recommending a number of CPUs is somewhat arbitrary; we
385 * return the number of present CPUs for -HV (since a host
386 * will have secondary threads "offline"), and for other KVM
387 * implementations just count online CPUs.
388 */
699cc876
AK
389 if (kvmppc_ops->is_hv_enabled)
390 r = num_present_cpus();
391 else
392 r = num_online_cpus();
b5434032
ME
393 break;
394 case KVM_CAP_MAX_VCPUS:
395 r = KVM_MAX_VCPUS;
396 break;
5b74716e
BH
397#ifdef CONFIG_PPC_BOOK3S_64
398 case KVM_CAP_PPC_GET_SMMU_INFO:
399 r = 1;
400 break;
401#endif
bbf45ba5
HB
402 default:
403 r = 0;
404 break;
405 }
406 return r;
407
408}
409
410long kvm_arch_dev_ioctl(struct file *filp,
411 unsigned int ioctl, unsigned long arg)
412{
413 return -EINVAL;
414}
415
db3fe4eb
TY
416void kvm_arch_free_memslot(struct kvm_memory_slot *free,
417 struct kvm_memory_slot *dont)
418{
a66b48c3 419 kvmppc_core_free_memslot(free, dont);
db3fe4eb
TY
420}
421
422int kvm_arch_create_memslot(struct kvm_memory_slot *slot, unsigned long npages)
423{
a66b48c3 424 return kvmppc_core_create_memslot(slot, npages);
db3fe4eb
TY
425}
426
e59dbe09
TY
427void kvm_arch_memslots_updated(struct kvm *kvm)
428{
429}
430
f7784b8e 431int kvm_arch_prepare_memory_region(struct kvm *kvm,
462fce46 432 struct kvm_memory_slot *memslot,
7b6195a9
TY
433 struct kvm_userspace_memory_region *mem,
434 enum kvm_mr_change change)
bbf45ba5 435{
a66b48c3 436 return kvmppc_core_prepare_memory_region(kvm, memslot, mem);
bbf45ba5
HB
437}
438
f7784b8e 439void kvm_arch_commit_memory_region(struct kvm *kvm,
462fce46 440 struct kvm_userspace_memory_region *mem,
8482644a
TY
441 const struct kvm_memory_slot *old,
442 enum kvm_mr_change change)
f7784b8e 443{
dfe49dbd 444 kvmppc_core_commit_memory_region(kvm, mem, old);
f7784b8e
MT
445}
446
2df72e9b
MT
447void kvm_arch_flush_shadow_all(struct kvm *kvm)
448{
449}
f7784b8e 450
2df72e9b
MT
451void kvm_arch_flush_shadow_memslot(struct kvm *kvm,
452 struct kvm_memory_slot *slot)
34d4cb8f 453{
dfe49dbd 454 kvmppc_core_flush_memslot(kvm, slot);
34d4cb8f
MT
455}
456
bbf45ba5
HB
457struct kvm_vcpu *kvm_arch_vcpu_create(struct kvm *kvm, unsigned int id)
458{
73e75b41
HB
459 struct kvm_vcpu *vcpu;
460 vcpu = kvmppc_core_vcpu_create(kvm, id);
03cdab53
ME
461 if (!IS_ERR(vcpu)) {
462 vcpu->arch.wqp = &vcpu->wq;
06056bfb 463 kvmppc_create_vcpu_debugfs(vcpu, id);
03cdab53 464 }
73e75b41 465 return vcpu;
bbf45ba5
HB
466}
467
42897d86
MT
468int kvm_arch_vcpu_postcreate(struct kvm_vcpu *vcpu)
469{
470 return 0;
471}
472
bbf45ba5
HB
473void kvm_arch_vcpu_free(struct kvm_vcpu *vcpu)
474{
a595405d
AG
475 /* Make sure we're not using the vcpu anymore */
476 hrtimer_cancel(&vcpu->arch.dec_timer);
477 tasklet_kill(&vcpu->arch.tasklet);
478
73e75b41 479 kvmppc_remove_vcpu_debugfs(vcpu);
eb1e4f43
SW
480
481 switch (vcpu->arch.irq_type) {
482 case KVMPPC_IRQ_MPIC:
483 kvmppc_mpic_disconnect_vcpu(vcpu->arch.mpic, vcpu);
484 break;
bc5ad3f3
BH
485 case KVMPPC_IRQ_XICS:
486 kvmppc_xics_free_icp(vcpu);
487 break;
eb1e4f43
SW
488 }
489
db93f574 490 kvmppc_core_vcpu_free(vcpu);
bbf45ba5
HB
491}
492
493void kvm_arch_vcpu_destroy(struct kvm_vcpu *vcpu)
494{
495 kvm_arch_vcpu_free(vcpu);
496}
497
498int kvm_cpu_has_pending_timer(struct kvm_vcpu *vcpu)
499{
9dd921cf 500 return kvmppc_core_pending_dec(vcpu);
bbf45ba5
HB
501}
502
544c6761
AG
503/*
504 * low level hrtimer wake routine. Because this runs in hardirq context
505 * we schedule a tasklet to do the real work.
506 */
507enum hrtimer_restart kvmppc_decrementer_wakeup(struct hrtimer *timer)
508{
509 struct kvm_vcpu *vcpu;
510
511 vcpu = container_of(timer, struct kvm_vcpu, arch.dec_timer);
512 tasklet_schedule(&vcpu->arch.tasklet);
513
514 return HRTIMER_NORESTART;
515}
516
bbf45ba5
HB
517int kvm_arch_vcpu_init(struct kvm_vcpu *vcpu)
518{
f61c94bb
BB
519 int ret;
520
544c6761
AG
521 hrtimer_init(&vcpu->arch.dec_timer, CLOCK_REALTIME, HRTIMER_MODE_ABS);
522 tasklet_init(&vcpu->arch.tasklet, kvmppc_decrementer_func, (ulong)vcpu);
523 vcpu->arch.dec_timer.function = kvmppc_decrementer_wakeup;
de56a948 524 vcpu->arch.dec_expires = ~(u64)0;
bbf45ba5 525
09000adb
BB
526#ifdef CONFIG_KVM_EXIT_TIMING
527 mutex_init(&vcpu->arch.exit_timing_lock);
528#endif
f61c94bb
BB
529 ret = kvmppc_subarch_vcpu_init(vcpu);
530 return ret;
bbf45ba5
HB
531}
532
533void kvm_arch_vcpu_uninit(struct kvm_vcpu *vcpu)
534{
ecc0981f 535 kvmppc_mmu_destroy(vcpu);
f61c94bb 536 kvmppc_subarch_vcpu_uninit(vcpu);
bbf45ba5
HB
537}
538
539void kvm_arch_vcpu_load(struct kvm_vcpu *vcpu, int cpu)
540{
eab17672
SW
541#ifdef CONFIG_BOOKE
542 /*
543 * vrsave (formerly usprg0) isn't used by Linux, but may
544 * be used by the guest.
545 *
546 * On non-booke this is associated with Altivec and
547 * is handled by code in book3s.c.
548 */
549 mtspr(SPRN_VRSAVE, vcpu->arch.vrsave);
550#endif
9dd921cf 551 kvmppc_core_vcpu_load(vcpu, cpu);
bbf45ba5
HB
552}
553
554void kvm_arch_vcpu_put(struct kvm_vcpu *vcpu)
555{
9dd921cf 556 kvmppc_core_vcpu_put(vcpu);
eab17672
SW
557#ifdef CONFIG_BOOKE
558 vcpu->arch.vrsave = mfspr(SPRN_VRSAVE);
559#endif
bbf45ba5
HB
560}
561
bbf45ba5
HB
562static void kvmppc_complete_dcr_load(struct kvm_vcpu *vcpu,
563 struct kvm_run *run)
564{
8e5b26b5 565 kvmppc_set_gpr(vcpu, vcpu->arch.io_gpr, run->dcr.data);
bbf45ba5
HB
566}
567
568static void kvmppc_complete_mmio_load(struct kvm_vcpu *vcpu,
569 struct kvm_run *run)
570{
69b61833 571 u64 uninitialized_var(gpr);
bbf45ba5 572
8e5b26b5 573 if (run->mmio.len > sizeof(gpr)) {
bbf45ba5
HB
574 printk(KERN_ERR "bad MMIO length: %d\n", run->mmio.len);
575 return;
576 }
577
578 if (vcpu->arch.mmio_is_bigendian) {
579 switch (run->mmio.len) {
b104d066 580 case 8: gpr = *(u64 *)run->mmio.data; break;
8e5b26b5
AG
581 case 4: gpr = *(u32 *)run->mmio.data; break;
582 case 2: gpr = *(u16 *)run->mmio.data; break;
583 case 1: gpr = *(u8 *)run->mmio.data; break;
bbf45ba5
HB
584 }
585 } else {
586 /* Convert BE data from userland back to LE. */
587 switch (run->mmio.len) {
8e5b26b5
AG
588 case 4: gpr = ld_le32((u32 *)run->mmio.data); break;
589 case 2: gpr = ld_le16((u16 *)run->mmio.data); break;
590 case 1: gpr = *(u8 *)run->mmio.data; break;
bbf45ba5
HB
591 }
592 }
8e5b26b5 593
3587d534
AG
594 if (vcpu->arch.mmio_sign_extend) {
595 switch (run->mmio.len) {
596#ifdef CONFIG_PPC64
597 case 4:
598 gpr = (s64)(s32)gpr;
599 break;
600#endif
601 case 2:
602 gpr = (s64)(s16)gpr;
603 break;
604 case 1:
605 gpr = (s64)(s8)gpr;
606 break;
607 }
608 }
609
8e5b26b5 610 kvmppc_set_gpr(vcpu, vcpu->arch.io_gpr, gpr);
b104d066 611
b3c5d3c2
AG
612 switch (vcpu->arch.io_gpr & KVM_MMIO_REG_EXT_MASK) {
613 case KVM_MMIO_REG_GPR:
b104d066
AG
614 kvmppc_set_gpr(vcpu, vcpu->arch.io_gpr, gpr);
615 break;
b3c5d3c2
AG
616 case KVM_MMIO_REG_FPR:
617 vcpu->arch.fpr[vcpu->arch.io_gpr & KVM_MMIO_REG_MASK] = gpr;
b104d066 618 break;
287d5611 619#ifdef CONFIG_PPC_BOOK3S
b3c5d3c2
AG
620 case KVM_MMIO_REG_QPR:
621 vcpu->arch.qpr[vcpu->arch.io_gpr & KVM_MMIO_REG_MASK] = gpr;
b104d066 622 break;
b3c5d3c2
AG
623 case KVM_MMIO_REG_FQPR:
624 vcpu->arch.fpr[vcpu->arch.io_gpr & KVM_MMIO_REG_MASK] = gpr;
625 vcpu->arch.qpr[vcpu->arch.io_gpr & KVM_MMIO_REG_MASK] = gpr;
b104d066 626 break;
287d5611 627#endif
b104d066
AG
628 default:
629 BUG();
630 }
bbf45ba5
HB
631}
632
633int kvmppc_handle_load(struct kvm_run *run, struct kvm_vcpu *vcpu,
634 unsigned int rt, unsigned int bytes, int is_bigendian)
635{
ed840ee9
SW
636 int idx, ret;
637
bbf45ba5
HB
638 if (bytes > sizeof(run->mmio.data)) {
639 printk(KERN_ERR "%s: bad MMIO length: %d\n", __func__,
640 run->mmio.len);
641 }
642
643 run->mmio.phys_addr = vcpu->arch.paddr_accessed;
644 run->mmio.len = bytes;
645 run->mmio.is_write = 0;
646
647 vcpu->arch.io_gpr = rt;
648 vcpu->arch.mmio_is_bigendian = is_bigendian;
649 vcpu->mmio_needed = 1;
650 vcpu->mmio_is_write = 0;
3587d534 651 vcpu->arch.mmio_sign_extend = 0;
bbf45ba5 652
ed840ee9
SW
653 idx = srcu_read_lock(&vcpu->kvm->srcu);
654
655 ret = kvm_io_bus_read(vcpu->kvm, KVM_MMIO_BUS, run->mmio.phys_addr,
656 bytes, &run->mmio.data);
657
658 srcu_read_unlock(&vcpu->kvm->srcu, idx);
659
660 if (!ret) {
0e673fb6
AG
661 kvmppc_complete_mmio_load(vcpu, run);
662 vcpu->mmio_needed = 0;
663 return EMULATE_DONE;
664 }
665
bbf45ba5
HB
666 return EMULATE_DO_MMIO;
667}
668
3587d534
AG
669/* Same as above, but sign extends */
670int kvmppc_handle_loads(struct kvm_run *run, struct kvm_vcpu *vcpu,
671 unsigned int rt, unsigned int bytes, int is_bigendian)
672{
673 int r;
674
3587d534 675 vcpu->arch.mmio_sign_extend = 1;
0e673fb6 676 r = kvmppc_handle_load(run, vcpu, rt, bytes, is_bigendian);
3587d534
AG
677
678 return r;
679}
680
bbf45ba5 681int kvmppc_handle_store(struct kvm_run *run, struct kvm_vcpu *vcpu,
b104d066 682 u64 val, unsigned int bytes, int is_bigendian)
bbf45ba5
HB
683{
684 void *data = run->mmio.data;
ed840ee9 685 int idx, ret;
bbf45ba5
HB
686
687 if (bytes > sizeof(run->mmio.data)) {
688 printk(KERN_ERR "%s: bad MMIO length: %d\n", __func__,
689 run->mmio.len);
690 }
691
692 run->mmio.phys_addr = vcpu->arch.paddr_accessed;
693 run->mmio.len = bytes;
694 run->mmio.is_write = 1;
695 vcpu->mmio_needed = 1;
696 vcpu->mmio_is_write = 1;
697
698 /* Store the value at the lowest bytes in 'data'. */
699 if (is_bigendian) {
700 switch (bytes) {
b104d066 701 case 8: *(u64 *)data = val; break;
bbf45ba5
HB
702 case 4: *(u32 *)data = val; break;
703 case 2: *(u16 *)data = val; break;
704 case 1: *(u8 *)data = val; break;
705 }
706 } else {
707 /* Store LE value into 'data'. */
708 switch (bytes) {
709 case 4: st_le32(data, val); break;
710 case 2: st_le16(data, val); break;
711 case 1: *(u8 *)data = val; break;
712 }
713 }
714
ed840ee9
SW
715 idx = srcu_read_lock(&vcpu->kvm->srcu);
716
717 ret = kvm_io_bus_write(vcpu->kvm, KVM_MMIO_BUS, run->mmio.phys_addr,
718 bytes, &run->mmio.data);
719
720 srcu_read_unlock(&vcpu->kvm->srcu, idx);
721
722 if (!ret) {
0e673fb6
AG
723 vcpu->mmio_needed = 0;
724 return EMULATE_DONE;
725 }
726
bbf45ba5
HB
727 return EMULATE_DO_MMIO;
728}
729
730int kvm_arch_vcpu_ioctl_run(struct kvm_vcpu *vcpu, struct kvm_run *run)
731{
732 int r;
733 sigset_t sigsaved;
734
735 if (vcpu->sigset_active)
736 sigprocmask(SIG_SETMASK, &vcpu->sigset, &sigsaved);
737
738 if (vcpu->mmio_needed) {
739 if (!vcpu->mmio_is_write)
740 kvmppc_complete_mmio_load(vcpu, run);
741 vcpu->mmio_needed = 0;
742 } else if (vcpu->arch.dcr_needed) {
743 if (!vcpu->arch.dcr_is_write)
744 kvmppc_complete_dcr_load(vcpu, run);
745 vcpu->arch.dcr_needed = 0;
ad0a048b
AG
746 } else if (vcpu->arch.osi_needed) {
747 u64 *gprs = run->osi.gprs;
748 int i;
749
750 for (i = 0; i < 32; i++)
751 kvmppc_set_gpr(vcpu, i, gprs[i]);
752 vcpu->arch.osi_needed = 0;
de56a948
PM
753 } else if (vcpu->arch.hcall_needed) {
754 int i;
755
756 kvmppc_set_gpr(vcpu, 3, run->papr_hcall.ret);
757 for (i = 0; i < 9; ++i)
758 kvmppc_set_gpr(vcpu, 4 + i, run->papr_hcall.args[i]);
759 vcpu->arch.hcall_needed = 0;
1c810636
AG
760#ifdef CONFIG_BOOKE
761 } else if (vcpu->arch.epr_needed) {
762 kvmppc_set_epr(vcpu, run->epr.epr);
763 vcpu->arch.epr_needed = 0;
764#endif
bbf45ba5
HB
765 }
766
df6909e5 767 r = kvmppc_vcpu_run(run, vcpu);
bbf45ba5
HB
768
769 if (vcpu->sigset_active)
770 sigprocmask(SIG_SETMASK, &sigsaved, NULL);
771
772 return r;
773}
774
775int kvm_vcpu_ioctl_interrupt(struct kvm_vcpu *vcpu, struct kvm_interrupt *irq)
776{
19ccb76a 777 if (irq->irq == KVM_INTERRUPT_UNSET) {
4fe27d2a 778 kvmppc_core_dequeue_external(vcpu);
19ccb76a
PM
779 return 0;
780 }
781
782 kvmppc_core_queue_external(vcpu, irq);
b6d33834 783
dfd4d47e 784 kvm_vcpu_kick(vcpu);
45c5eb67 785
bbf45ba5
HB
786 return 0;
787}
788
71fbfd5f
AG
789static int kvm_vcpu_ioctl_enable_cap(struct kvm_vcpu *vcpu,
790 struct kvm_enable_cap *cap)
791{
792 int r;
793
794 if (cap->flags)
795 return -EINVAL;
796
797 switch (cap->cap) {
ad0a048b
AG
798 case KVM_CAP_PPC_OSI:
799 r = 0;
800 vcpu->arch.osi_enabled = true;
801 break;
930b412a
AG
802 case KVM_CAP_PPC_PAPR:
803 r = 0;
804 vcpu->arch.papr_enabled = true;
805 break;
1c810636
AG
806 case KVM_CAP_PPC_EPR:
807 r = 0;
5df554ad
SW
808 if (cap->args[0])
809 vcpu->arch.epr_flags |= KVMPPC_EPR_USER;
810 else
811 vcpu->arch.epr_flags &= ~KVMPPC_EPR_USER;
1c810636 812 break;
f61c94bb
BB
813#ifdef CONFIG_BOOKE
814 case KVM_CAP_PPC_BOOKE_WATCHDOG:
815 r = 0;
816 vcpu->arch.watchdog_enabled = true;
817 break;
818#endif
bf7ca4bd 819#if defined(CONFIG_KVM_E500V2) || defined(CONFIG_KVM_E500MC)
dc83b8bc
SW
820 case KVM_CAP_SW_TLB: {
821 struct kvm_config_tlb cfg;
822 void __user *user_ptr = (void __user *)(uintptr_t)cap->args[0];
823
824 r = -EFAULT;
825 if (copy_from_user(&cfg, user_ptr, sizeof(cfg)))
826 break;
827
828 r = kvm_vcpu_ioctl_config_tlb(vcpu, &cfg);
829 break;
eb1e4f43
SW
830 }
831#endif
832#ifdef CONFIG_KVM_MPIC
833 case KVM_CAP_IRQ_MPIC: {
70abaded 834 struct fd f;
eb1e4f43
SW
835 struct kvm_device *dev;
836
837 r = -EBADF;
70abaded
AV
838 f = fdget(cap->args[0]);
839 if (!f.file)
eb1e4f43
SW
840 break;
841
842 r = -EPERM;
70abaded 843 dev = kvm_device_from_filp(f.file);
eb1e4f43
SW
844 if (dev)
845 r = kvmppc_mpic_connect_vcpu(dev, vcpu, cap->args[1]);
846
70abaded 847 fdput(f);
eb1e4f43 848 break;
dc83b8bc
SW
849 }
850#endif
5975a2e0
PM
851#ifdef CONFIG_KVM_XICS
852 case KVM_CAP_IRQ_XICS: {
70abaded 853 struct fd f;
5975a2e0
PM
854 struct kvm_device *dev;
855
856 r = -EBADF;
70abaded
AV
857 f = fdget(cap->args[0]);
858 if (!f.file)
5975a2e0
PM
859 break;
860
861 r = -EPERM;
70abaded 862 dev = kvm_device_from_filp(f.file);
5975a2e0
PM
863 if (dev)
864 r = kvmppc_xics_connect_vcpu(dev, vcpu, cap->args[1]);
865
70abaded 866 fdput(f);
5975a2e0
PM
867 break;
868 }
869#endif /* CONFIG_KVM_XICS */
71fbfd5f
AG
870 default:
871 r = -EINVAL;
872 break;
873 }
874
af8f38b3
AG
875 if (!r)
876 r = kvmppc_sanity_check(vcpu);
877
71fbfd5f
AG
878 return r;
879}
880
bbf45ba5
HB
881int kvm_arch_vcpu_ioctl_get_mpstate(struct kvm_vcpu *vcpu,
882 struct kvm_mp_state *mp_state)
883{
884 return -EINVAL;
885}
886
887int kvm_arch_vcpu_ioctl_set_mpstate(struct kvm_vcpu *vcpu,
888 struct kvm_mp_state *mp_state)
889{
890 return -EINVAL;
891}
892
893long kvm_arch_vcpu_ioctl(struct file *filp,
894 unsigned int ioctl, unsigned long arg)
895{
896 struct kvm_vcpu *vcpu = filp->private_data;
897 void __user *argp = (void __user *)arg;
898 long r;
899
93736624
AK
900 switch (ioctl) {
901 case KVM_INTERRUPT: {
bbf45ba5
HB
902 struct kvm_interrupt irq;
903 r = -EFAULT;
904 if (copy_from_user(&irq, argp, sizeof(irq)))
93736624 905 goto out;
bbf45ba5 906 r = kvm_vcpu_ioctl_interrupt(vcpu, &irq);
93736624 907 goto out;
bbf45ba5 908 }
19483d14 909
71fbfd5f
AG
910 case KVM_ENABLE_CAP:
911 {
912 struct kvm_enable_cap cap;
913 r = -EFAULT;
914 if (copy_from_user(&cap, argp, sizeof(cap)))
915 goto out;
916 r = kvm_vcpu_ioctl_enable_cap(vcpu, &cap);
917 break;
918 }
dc83b8bc 919
e24ed81f
AG
920 case KVM_SET_ONE_REG:
921 case KVM_GET_ONE_REG:
922 {
923 struct kvm_one_reg reg;
924 r = -EFAULT;
925 if (copy_from_user(&reg, argp, sizeof(reg)))
926 goto out;
927 if (ioctl == KVM_SET_ONE_REG)
928 r = kvm_vcpu_ioctl_set_one_reg(vcpu, &reg);
929 else
930 r = kvm_vcpu_ioctl_get_one_reg(vcpu, &reg);
931 break;
932 }
933
bf7ca4bd 934#if defined(CONFIG_KVM_E500V2) || defined(CONFIG_KVM_E500MC)
dc83b8bc
SW
935 case KVM_DIRTY_TLB: {
936 struct kvm_dirty_tlb dirty;
937 r = -EFAULT;
938 if (copy_from_user(&dirty, argp, sizeof(dirty)))
939 goto out;
940 r = kvm_vcpu_ioctl_dirty_tlb(vcpu, &dirty);
941 break;
942 }
943#endif
bbf45ba5
HB
944 default:
945 r = -EINVAL;
946 }
947
948out:
949 return r;
950}
951
5b1c1493
CO
952int kvm_arch_vcpu_fault(struct kvm_vcpu *vcpu, struct vm_fault *vmf)
953{
954 return VM_FAULT_SIGBUS;
955}
956
15711e9c
AG
957static int kvm_vm_ioctl_get_pvinfo(struct kvm_ppc_pvinfo *pvinfo)
958{
784bafac
SY
959 u32 inst_nop = 0x60000000;
960#ifdef CONFIG_KVM_BOOKE_HV
961 u32 inst_sc1 = 0x44000022;
962 pvinfo->hcall[0] = inst_sc1;
963 pvinfo->hcall[1] = inst_nop;
964 pvinfo->hcall[2] = inst_nop;
965 pvinfo->hcall[3] = inst_nop;
966#else
15711e9c
AG
967 u32 inst_lis = 0x3c000000;
968 u32 inst_ori = 0x60000000;
15711e9c
AG
969 u32 inst_sc = 0x44000002;
970 u32 inst_imm_mask = 0xffff;
971
972 /*
973 * The hypercall to get into KVM from within guest context is as
974 * follows:
975 *
976 * lis r0, r0, KVM_SC_MAGIC_R0@h
977 * ori r0, KVM_SC_MAGIC_R0@l
978 * sc
979 * nop
980 */
981 pvinfo->hcall[0] = inst_lis | ((KVM_SC_MAGIC_R0 >> 16) & inst_imm_mask);
982 pvinfo->hcall[1] = inst_ori | (KVM_SC_MAGIC_R0 & inst_imm_mask);
983 pvinfo->hcall[2] = inst_sc;
984 pvinfo->hcall[3] = inst_nop;
784bafac 985#endif
15711e9c 986
9202e076
LYB
987 pvinfo->flags = KVM_PPC_PVINFO_FLAGS_EV_IDLE;
988
15711e9c
AG
989 return 0;
990}
991
5efdb4be
AG
992int kvm_vm_ioctl_irq_line(struct kvm *kvm, struct kvm_irq_level *irq_event,
993 bool line_status)
994{
995 if (!irqchip_in_kernel(kvm))
996 return -ENXIO;
997
998 irq_event->status = kvm_set_irq(kvm, KVM_USERSPACE_IRQ_SOURCE_ID,
999 irq_event->irq, irq_event->level,
1000 line_status);
1001 return 0;
1002}
1003
bbf45ba5
HB
1004long kvm_arch_vm_ioctl(struct file *filp,
1005 unsigned int ioctl, unsigned long arg)
1006{
5df554ad 1007 struct kvm *kvm __maybe_unused = filp->private_data;
15711e9c 1008 void __user *argp = (void __user *)arg;
bbf45ba5
HB
1009 long r;
1010
1011 switch (ioctl) {
15711e9c
AG
1012 case KVM_PPC_GET_PVINFO: {
1013 struct kvm_ppc_pvinfo pvinfo;
d8cdddcd 1014 memset(&pvinfo, 0, sizeof(pvinfo));
15711e9c
AG
1015 r = kvm_vm_ioctl_get_pvinfo(&pvinfo);
1016 if (copy_to_user(argp, &pvinfo, sizeof(pvinfo))) {
1017 r = -EFAULT;
1018 goto out;
1019 }
1020
1021 break;
1022 }
f31e65e1 1023#ifdef CONFIG_PPC_BOOK3S_64
54738c09
DG
1024 case KVM_CREATE_SPAPR_TCE: {
1025 struct kvm_create_spapr_tce create_tce;
54738c09
DG
1026
1027 r = -EFAULT;
1028 if (copy_from_user(&create_tce, argp, sizeof(create_tce)))
1029 goto out;
1030 r = kvm_vm_ioctl_create_spapr_tce(kvm, &create_tce);
1031 goto out;
1032 }
5b74716e 1033 case KVM_PPC_GET_SMMU_INFO: {
5b74716e
BH
1034 struct kvm_ppc_smmu_info info;
1035
1036 memset(&info, 0, sizeof(info));
3a167bea 1037 r = kvmppc_ops->get_smmu_info(kvm, &info);
5b74716e
BH
1038 if (r >= 0 && copy_to_user(argp, &info, sizeof(info)))
1039 r = -EFAULT;
1040 break;
1041 }
8e591cb7
ME
1042 case KVM_PPC_RTAS_DEFINE_TOKEN: {
1043 struct kvm *kvm = filp->private_data;
1044
1045 r = kvm_vm_ioctl_rtas_define_token(kvm, argp);
1046 break;
1047 }
3a167bea
AK
1048 default:
1049 r = kvmppc_ops->arch_vm_ioctl(filp, ioctl, arg);
1050
1051#else /* CONFIG_PPC_BOOK3S_64 */
bbf45ba5 1052 default:
367e1319 1053 r = -ENOTTY;
3a167bea 1054#endif
bbf45ba5 1055 }
15711e9c 1056out:
bbf45ba5
HB
1057 return r;
1058}
1059
043cc4d7
SW
1060static unsigned long lpid_inuse[BITS_TO_LONGS(KVMPPC_NR_LPIDS)];
1061static unsigned long nr_lpids;
1062
1063long kvmppc_alloc_lpid(void)
1064{
1065 long lpid;
1066
1067 do {
1068 lpid = find_first_zero_bit(lpid_inuse, KVMPPC_NR_LPIDS);
1069 if (lpid >= nr_lpids) {
1070 pr_err("%s: No LPIDs free\n", __func__);
1071 return -ENOMEM;
1072 }
1073 } while (test_and_set_bit(lpid, lpid_inuse));
1074
1075 return lpid;
1076}
1077
1078void kvmppc_claim_lpid(long lpid)
1079{
1080 set_bit(lpid, lpid_inuse);
1081}
1082
1083void kvmppc_free_lpid(long lpid)
1084{
1085 clear_bit(lpid, lpid_inuse);
1086}
1087
1088void kvmppc_init_lpid(unsigned long nr_lpids_param)
1089{
1090 nr_lpids = min_t(unsigned long, KVMPPC_NR_LPIDS, nr_lpids_param);
1091 memset(lpid_inuse, 0, sizeof(lpid_inuse));
1092}
1093
bbf45ba5
HB
1094int kvm_arch_init(void *opaque)
1095{
3a167bea
AK
1096 if (kvmppc_ops) {
1097 printk(KERN_ERR "kvm: already loaded the other module\n");
1098 return -EEXIST;
1099 }
1100 kvmppc_ops = (struct kvmppc_ops *)opaque;
bbf45ba5
HB
1101 return 0;
1102}
1103
1104void kvm_arch_exit(void)
1105{
3a167bea 1106 kvmppc_ops = NULL;
bbf45ba5 1107}
This page took 0.371263 seconds and 5 git commands to generate.