1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072 |
- // SPDX-License-Identifier: GPL-2.0-only
- /*
- *
- * Copyright SUSE Linux Products GmbH 2009
- *
- * Authors: Alexander Graf <[email protected]>
- */
- #include <asm/kvm_ppc.h>
- #include <asm/disassemble.h>
- #include <asm/kvm_book3s.h>
- #include <asm/reg.h>
- #include <asm/switch_to.h>
- #include <asm/time.h>
- #include <asm/tm.h>
- #include "book3s.h"
- #include <asm/asm-prototypes.h>
- #define OP_19_XOP_RFID 18
- #define OP_19_XOP_RFI 50
- #define OP_31_XOP_MFMSR 83
- #define OP_31_XOP_MTMSR 146
- #define OP_31_XOP_MTMSRD 178
- #define OP_31_XOP_MTSR 210
- #define OP_31_XOP_MTSRIN 242
- #define OP_31_XOP_TLBIEL 274
- /* Opcode is officially reserved, reuse it as sc 1 when sc 1 doesn't trap */
- #define OP_31_XOP_FAKE_SC1 308
- #define OP_31_XOP_SLBMTE 402
- #define OP_31_XOP_SLBIE 434
- #define OP_31_XOP_SLBIA 498
- #define OP_31_XOP_MFSR 595
- #define OP_31_XOP_MFSRIN 659
- #define OP_31_XOP_DCBA 758
- #define OP_31_XOP_SLBMFEV 851
- #define OP_31_XOP_EIOIO 854
- #define OP_31_XOP_SLBMFEE 915
- #define OP_31_XOP_SLBFEE 979
- #define OP_31_XOP_TBEGIN 654
- #define OP_31_XOP_TABORT 910
- #define OP_31_XOP_TRECLAIM 942
- #define OP_31_XOP_TRCHKPT 1006
- /* DCBZ is actually 1014, but we patch it to 1010 so we get a trap */
- #define OP_31_XOP_DCBZ 1010
- #define OP_LFS 48
- #define OP_LFD 50
- #define OP_STFS 52
- #define OP_STFD 54
- #define SPRN_GQR0 912
- #define SPRN_GQR1 913
- #define SPRN_GQR2 914
- #define SPRN_GQR3 915
- #define SPRN_GQR4 916
- #define SPRN_GQR5 917
- #define SPRN_GQR6 918
- #define SPRN_GQR7 919
- enum priv_level {
- PRIV_PROBLEM = 0,
- PRIV_SUPER = 1,
- PRIV_HYPER = 2,
- };
- static bool spr_allowed(struct kvm_vcpu *vcpu, enum priv_level level)
- {
- /* PAPR VMs only access supervisor SPRs */
- if (vcpu->arch.papr_enabled && (level > PRIV_SUPER))
- return false;
- /* Limit user space to its own small SPR set */
- if ((kvmppc_get_msr(vcpu) & MSR_PR) && level > PRIV_PROBLEM)
- return false;
- return true;
- }
- #ifdef CONFIG_PPC_TRANSACTIONAL_MEM
- static inline void kvmppc_copyto_vcpu_tm(struct kvm_vcpu *vcpu)
- {
- memcpy(&vcpu->arch.gpr_tm[0], &vcpu->arch.regs.gpr[0],
- sizeof(vcpu->arch.gpr_tm));
- memcpy(&vcpu->arch.fp_tm, &vcpu->arch.fp,
- sizeof(struct thread_fp_state));
- memcpy(&vcpu->arch.vr_tm, &vcpu->arch.vr,
- sizeof(struct thread_vr_state));
- vcpu->arch.ppr_tm = vcpu->arch.ppr;
- vcpu->arch.dscr_tm = vcpu->arch.dscr;
- vcpu->arch.amr_tm = vcpu->arch.amr;
- vcpu->arch.ctr_tm = vcpu->arch.regs.ctr;
- vcpu->arch.tar_tm = vcpu->arch.tar;
- vcpu->arch.lr_tm = vcpu->arch.regs.link;
- vcpu->arch.cr_tm = vcpu->arch.regs.ccr;
- vcpu->arch.xer_tm = vcpu->arch.regs.xer;
- vcpu->arch.vrsave_tm = vcpu->arch.vrsave;
- }
- static inline void kvmppc_copyfrom_vcpu_tm(struct kvm_vcpu *vcpu)
- {
- memcpy(&vcpu->arch.regs.gpr[0], &vcpu->arch.gpr_tm[0],
- sizeof(vcpu->arch.regs.gpr));
- memcpy(&vcpu->arch.fp, &vcpu->arch.fp_tm,
- sizeof(struct thread_fp_state));
- memcpy(&vcpu->arch.vr, &vcpu->arch.vr_tm,
- sizeof(struct thread_vr_state));
- vcpu->arch.ppr = vcpu->arch.ppr_tm;
- vcpu->arch.dscr = vcpu->arch.dscr_tm;
- vcpu->arch.amr = vcpu->arch.amr_tm;
- vcpu->arch.regs.ctr = vcpu->arch.ctr_tm;
- vcpu->arch.tar = vcpu->arch.tar_tm;
- vcpu->arch.regs.link = vcpu->arch.lr_tm;
- vcpu->arch.regs.ccr = vcpu->arch.cr_tm;
- vcpu->arch.regs.xer = vcpu->arch.xer_tm;
- vcpu->arch.vrsave = vcpu->arch.vrsave_tm;
- }
- static void kvmppc_emulate_treclaim(struct kvm_vcpu *vcpu, int ra_val)
- {
- unsigned long guest_msr = kvmppc_get_msr(vcpu);
- int fc_val = ra_val ? ra_val : 1;
- uint64_t texasr;
- /* CR0 = 0 | MSR[TS] | 0 */
- vcpu->arch.regs.ccr = (vcpu->arch.regs.ccr & ~(CR0_MASK << CR0_SHIFT)) |
- (((guest_msr & MSR_TS_MASK) >> (MSR_TS_S_LG - 1))
- << CR0_SHIFT);
- preempt_disable();
- tm_enable();
- texasr = mfspr(SPRN_TEXASR);
- kvmppc_save_tm_pr(vcpu);
- kvmppc_copyfrom_vcpu_tm(vcpu);
- /* failure recording depends on Failure Summary bit */
- if (!(texasr & TEXASR_FS)) {
- texasr &= ~TEXASR_FC;
- texasr |= ((u64)fc_val << TEXASR_FC_LG) | TEXASR_FS;
- texasr &= ~(TEXASR_PR | TEXASR_HV);
- if (kvmppc_get_msr(vcpu) & MSR_PR)
- texasr |= TEXASR_PR;
- if (kvmppc_get_msr(vcpu) & MSR_HV)
- texasr |= TEXASR_HV;
- vcpu->arch.texasr = texasr;
- vcpu->arch.tfiar = kvmppc_get_pc(vcpu);
- mtspr(SPRN_TEXASR, texasr);
- mtspr(SPRN_TFIAR, vcpu->arch.tfiar);
- }
- tm_disable();
- /*
- * treclaim need quit to non-transactional state.
- */
- guest_msr &= ~(MSR_TS_MASK);
- kvmppc_set_msr(vcpu, guest_msr);
- preempt_enable();
- if (vcpu->arch.shadow_fscr & FSCR_TAR)
- mtspr(SPRN_TAR, vcpu->arch.tar);
- }
- static void kvmppc_emulate_trchkpt(struct kvm_vcpu *vcpu)
- {
- unsigned long guest_msr = kvmppc_get_msr(vcpu);
- preempt_disable();
- /*
- * need flush FP/VEC/VSX to vcpu save area before
- * copy.
- */
- kvmppc_giveup_ext(vcpu, MSR_VSX);
- kvmppc_giveup_fac(vcpu, FSCR_TAR_LG);
- kvmppc_copyto_vcpu_tm(vcpu);
- kvmppc_save_tm_sprs(vcpu);
- /*
- * as a result of trecheckpoint. set TS to suspended.
- */
- guest_msr &= ~(MSR_TS_MASK);
- guest_msr |= MSR_TS_S;
- kvmppc_set_msr(vcpu, guest_msr);
- kvmppc_restore_tm_pr(vcpu);
- preempt_enable();
- }
- /* emulate tabort. at guest privilege state */
- void kvmppc_emulate_tabort(struct kvm_vcpu *vcpu, int ra_val)
- {
- /* currently we only emulate tabort. but no emulation of other
- * tabort variants since there is no kernel usage of them at
- * present.
- */
- unsigned long guest_msr = kvmppc_get_msr(vcpu);
- uint64_t org_texasr;
- preempt_disable();
- tm_enable();
- org_texasr = mfspr(SPRN_TEXASR);
- tm_abort(ra_val);
- /* CR0 = 0 | MSR[TS] | 0 */
- vcpu->arch.regs.ccr = (vcpu->arch.regs.ccr & ~(CR0_MASK << CR0_SHIFT)) |
- (((guest_msr & MSR_TS_MASK) >> (MSR_TS_S_LG - 1))
- << CR0_SHIFT);
- vcpu->arch.texasr = mfspr(SPRN_TEXASR);
- /* failure recording depends on Failure Summary bit,
- * and tabort will be treated as nops in non-transactional
- * state.
- */
- if (!(org_texasr & TEXASR_FS) &&
- MSR_TM_ACTIVE(guest_msr)) {
- vcpu->arch.texasr &= ~(TEXASR_PR | TEXASR_HV);
- if (guest_msr & MSR_PR)
- vcpu->arch.texasr |= TEXASR_PR;
- if (guest_msr & MSR_HV)
- vcpu->arch.texasr |= TEXASR_HV;
- vcpu->arch.tfiar = kvmppc_get_pc(vcpu);
- }
- tm_disable();
- preempt_enable();
- }
- #endif
- int kvmppc_core_emulate_op_pr(struct kvm_vcpu *vcpu,
- unsigned int inst, int *advance)
- {
- int emulated = EMULATE_DONE;
- int rt = get_rt(inst);
- int rs = get_rs(inst);
- int ra = get_ra(inst);
- int rb = get_rb(inst);
- u32 inst_sc = 0x44000002;
- switch (get_op(inst)) {
- case 0:
- emulated = EMULATE_FAIL;
- if ((kvmppc_get_msr(vcpu) & MSR_LE) &&
- (inst == swab32(inst_sc))) {
- /*
- * This is the byte reversed syscall instruction of our
- * hypercall handler. Early versions of LE Linux didn't
- * swap the instructions correctly and ended up in
- * illegal instructions.
- * Just always fail hypercalls on these broken systems.
- */
- kvmppc_set_gpr(vcpu, 3, EV_UNIMPLEMENTED);
- kvmppc_set_pc(vcpu, kvmppc_get_pc(vcpu) + 4);
- emulated = EMULATE_DONE;
- }
- break;
- case 19:
- switch (get_xop(inst)) {
- case OP_19_XOP_RFID:
- case OP_19_XOP_RFI: {
- unsigned long srr1 = kvmppc_get_srr1(vcpu);
- #ifdef CONFIG_PPC_TRANSACTIONAL_MEM
- unsigned long cur_msr = kvmppc_get_msr(vcpu);
- /*
- * add rules to fit in ISA specification regarding TM
- * state transition in TM disable/Suspended state,
- * and target TM state is TM inactive(00) state. (the
- * change should be suppressed).
- */
- if (((cur_msr & MSR_TM) == 0) &&
- ((srr1 & MSR_TM) == 0) &&
- MSR_TM_SUSPENDED(cur_msr) &&
- !MSR_TM_ACTIVE(srr1))
- srr1 |= MSR_TS_S;
- #endif
- kvmppc_set_pc(vcpu, kvmppc_get_srr0(vcpu));
- kvmppc_set_msr(vcpu, srr1);
- *advance = 0;
- break;
- }
- default:
- emulated = EMULATE_FAIL;
- break;
- }
- break;
- case 31:
- switch (get_xop(inst)) {
- case OP_31_XOP_MFMSR:
- kvmppc_set_gpr(vcpu, rt, kvmppc_get_msr(vcpu));
- break;
- case OP_31_XOP_MTMSRD:
- {
- ulong rs_val = kvmppc_get_gpr(vcpu, rs);
- if (inst & 0x10000) {
- ulong new_msr = kvmppc_get_msr(vcpu);
- new_msr &= ~(MSR_RI | MSR_EE);
- new_msr |= rs_val & (MSR_RI | MSR_EE);
- kvmppc_set_msr_fast(vcpu, new_msr);
- } else
- kvmppc_set_msr(vcpu, rs_val);
- break;
- }
- case OP_31_XOP_MTMSR:
- kvmppc_set_msr(vcpu, kvmppc_get_gpr(vcpu, rs));
- break;
- case OP_31_XOP_MFSR:
- {
- int srnum;
- srnum = kvmppc_get_field(inst, 12 + 32, 15 + 32);
- if (vcpu->arch.mmu.mfsrin) {
- u32 sr;
- sr = vcpu->arch.mmu.mfsrin(vcpu, srnum);
- kvmppc_set_gpr(vcpu, rt, sr);
- }
- break;
- }
- case OP_31_XOP_MFSRIN:
- {
- int srnum;
- srnum = (kvmppc_get_gpr(vcpu, rb) >> 28) & 0xf;
- if (vcpu->arch.mmu.mfsrin) {
- u32 sr;
- sr = vcpu->arch.mmu.mfsrin(vcpu, srnum);
- kvmppc_set_gpr(vcpu, rt, sr);
- }
- break;
- }
- case OP_31_XOP_MTSR:
- vcpu->arch.mmu.mtsrin(vcpu,
- (inst >> 16) & 0xf,
- kvmppc_get_gpr(vcpu, rs));
- break;
- case OP_31_XOP_MTSRIN:
- vcpu->arch.mmu.mtsrin(vcpu,
- (kvmppc_get_gpr(vcpu, rb) >> 28) & 0xf,
- kvmppc_get_gpr(vcpu, rs));
- break;
- case OP_31_XOP_TLBIE:
- case OP_31_XOP_TLBIEL:
- {
- bool large = (inst & 0x00200000) ? true : false;
- ulong addr = kvmppc_get_gpr(vcpu, rb);
- vcpu->arch.mmu.tlbie(vcpu, addr, large);
- break;
- }
- #ifdef CONFIG_PPC_BOOK3S_64
- case OP_31_XOP_FAKE_SC1:
- {
- /* SC 1 papr hypercalls */
- ulong cmd = kvmppc_get_gpr(vcpu, 3);
- int i;
- if ((kvmppc_get_msr(vcpu) & MSR_PR) ||
- !vcpu->arch.papr_enabled) {
- emulated = EMULATE_FAIL;
- break;
- }
- if (kvmppc_h_pr(vcpu, cmd) == EMULATE_DONE)
- break;
- vcpu->run->papr_hcall.nr = cmd;
- for (i = 0; i < 9; ++i) {
- ulong gpr = kvmppc_get_gpr(vcpu, 4 + i);
- vcpu->run->papr_hcall.args[i] = gpr;
- }
- vcpu->run->exit_reason = KVM_EXIT_PAPR_HCALL;
- vcpu->arch.hcall_needed = 1;
- emulated = EMULATE_EXIT_USER;
- break;
- }
- #endif
- case OP_31_XOP_EIOIO:
- break;
- case OP_31_XOP_SLBMTE:
- if (!vcpu->arch.mmu.slbmte)
- return EMULATE_FAIL;
- vcpu->arch.mmu.slbmte(vcpu,
- kvmppc_get_gpr(vcpu, rs),
- kvmppc_get_gpr(vcpu, rb));
- break;
- case OP_31_XOP_SLBIE:
- if (!vcpu->arch.mmu.slbie)
- return EMULATE_FAIL;
- vcpu->arch.mmu.slbie(vcpu,
- kvmppc_get_gpr(vcpu, rb));
- break;
- case OP_31_XOP_SLBIA:
- if (!vcpu->arch.mmu.slbia)
- return EMULATE_FAIL;
- vcpu->arch.mmu.slbia(vcpu);
- break;
- case OP_31_XOP_SLBFEE:
- if (!(inst & 1) || !vcpu->arch.mmu.slbfee) {
- return EMULATE_FAIL;
- } else {
- ulong b, t;
- ulong cr = kvmppc_get_cr(vcpu) & ~CR0_MASK;
- b = kvmppc_get_gpr(vcpu, rb);
- if (!vcpu->arch.mmu.slbfee(vcpu, b, &t))
- cr |= 2 << CR0_SHIFT;
- kvmppc_set_gpr(vcpu, rt, t);
- /* copy XER[SO] bit to CR0[SO] */
- cr |= (vcpu->arch.regs.xer & 0x80000000) >>
- (31 - CR0_SHIFT);
- kvmppc_set_cr(vcpu, cr);
- }
- break;
- case OP_31_XOP_SLBMFEE:
- if (!vcpu->arch.mmu.slbmfee) {
- emulated = EMULATE_FAIL;
- } else {
- ulong t, rb_val;
- rb_val = kvmppc_get_gpr(vcpu, rb);
- t = vcpu->arch.mmu.slbmfee(vcpu, rb_val);
- kvmppc_set_gpr(vcpu, rt, t);
- }
- break;
- case OP_31_XOP_SLBMFEV:
- if (!vcpu->arch.mmu.slbmfev) {
- emulated = EMULATE_FAIL;
- } else {
- ulong t, rb_val;
- rb_val = kvmppc_get_gpr(vcpu, rb);
- t = vcpu->arch.mmu.slbmfev(vcpu, rb_val);
- kvmppc_set_gpr(vcpu, rt, t);
- }
- break;
- case OP_31_XOP_DCBA:
- /* Gets treated as NOP */
- break;
- case OP_31_XOP_DCBZ:
- {
- ulong rb_val = kvmppc_get_gpr(vcpu, rb);
- ulong ra_val = 0;
- ulong addr, vaddr;
- u32 zeros[8] = { 0, 0, 0, 0, 0, 0, 0, 0 };
- u32 dsisr;
- int r;
- if (ra)
- ra_val = kvmppc_get_gpr(vcpu, ra);
- addr = (ra_val + rb_val) & ~31ULL;
- if (!(kvmppc_get_msr(vcpu) & MSR_SF))
- addr &= 0xffffffff;
- vaddr = addr;
- r = kvmppc_st(vcpu, &addr, 32, zeros, true);
- if ((r == -ENOENT) || (r == -EPERM)) {
- *advance = 0;
- kvmppc_set_dar(vcpu, vaddr);
- vcpu->arch.fault_dar = vaddr;
- dsisr = DSISR_ISSTORE;
- if (r == -ENOENT)
- dsisr |= DSISR_NOHPTE;
- else if (r == -EPERM)
- dsisr |= DSISR_PROTFAULT;
- kvmppc_set_dsisr(vcpu, dsisr);
- vcpu->arch.fault_dsisr = dsisr;
- kvmppc_book3s_queue_irqprio(vcpu,
- BOOK3S_INTERRUPT_DATA_STORAGE);
- }
- break;
- }
- #ifdef CONFIG_PPC_TRANSACTIONAL_MEM
- case OP_31_XOP_TBEGIN:
- {
- if (!cpu_has_feature(CPU_FTR_TM))
- break;
- if (!(kvmppc_get_msr(vcpu) & MSR_TM)) {
- kvmppc_trigger_fac_interrupt(vcpu, FSCR_TM_LG);
- emulated = EMULATE_AGAIN;
- break;
- }
- if (!(kvmppc_get_msr(vcpu) & MSR_PR)) {
- preempt_disable();
- vcpu->arch.regs.ccr = (CR0_TBEGIN_FAILURE |
- (vcpu->arch.regs.ccr & ~(CR0_MASK << CR0_SHIFT)));
- vcpu->arch.texasr = (TEXASR_FS | TEXASR_EXACT |
- (((u64)(TM_CAUSE_EMULATE | TM_CAUSE_PERSISTENT))
- << TEXASR_FC_LG));
- if ((inst >> 21) & 0x1)
- vcpu->arch.texasr |= TEXASR_ROT;
- if (kvmppc_get_msr(vcpu) & MSR_HV)
- vcpu->arch.texasr |= TEXASR_HV;
- vcpu->arch.tfhar = kvmppc_get_pc(vcpu) + 4;
- vcpu->arch.tfiar = kvmppc_get_pc(vcpu);
- kvmppc_restore_tm_sprs(vcpu);
- preempt_enable();
- } else
- emulated = EMULATE_FAIL;
- break;
- }
- case OP_31_XOP_TABORT:
- {
- ulong guest_msr = kvmppc_get_msr(vcpu);
- unsigned long ra_val = 0;
- if (!cpu_has_feature(CPU_FTR_TM))
- break;
- if (!(kvmppc_get_msr(vcpu) & MSR_TM)) {
- kvmppc_trigger_fac_interrupt(vcpu, FSCR_TM_LG);
- emulated = EMULATE_AGAIN;
- break;
- }
- /* only emulate for privilege guest, since problem state
- * guest can run with TM enabled and we don't expect to
- * trap at here for that case.
- */
- WARN_ON(guest_msr & MSR_PR);
- if (ra)
- ra_val = kvmppc_get_gpr(vcpu, ra);
- kvmppc_emulate_tabort(vcpu, ra_val);
- break;
- }
- case OP_31_XOP_TRECLAIM:
- {
- ulong guest_msr = kvmppc_get_msr(vcpu);
- unsigned long ra_val = 0;
- if (!cpu_has_feature(CPU_FTR_TM))
- break;
- if (!(kvmppc_get_msr(vcpu) & MSR_TM)) {
- kvmppc_trigger_fac_interrupt(vcpu, FSCR_TM_LG);
- emulated = EMULATE_AGAIN;
- break;
- }
- /* generate interrupts based on priorities */
- if (guest_msr & MSR_PR) {
- /* Privileged Instruction type Program Interrupt */
- kvmppc_core_queue_program(vcpu, SRR1_PROGPRIV);
- emulated = EMULATE_AGAIN;
- break;
- }
- if (!MSR_TM_ACTIVE(guest_msr)) {
- /* TM bad thing interrupt */
- kvmppc_core_queue_program(vcpu, SRR1_PROGTM);
- emulated = EMULATE_AGAIN;
- break;
- }
- if (ra)
- ra_val = kvmppc_get_gpr(vcpu, ra);
- kvmppc_emulate_treclaim(vcpu, ra_val);
- break;
- }
- case OP_31_XOP_TRCHKPT:
- {
- ulong guest_msr = kvmppc_get_msr(vcpu);
- unsigned long texasr;
- if (!cpu_has_feature(CPU_FTR_TM))
- break;
- if (!(kvmppc_get_msr(vcpu) & MSR_TM)) {
- kvmppc_trigger_fac_interrupt(vcpu, FSCR_TM_LG);
- emulated = EMULATE_AGAIN;
- break;
- }
- /* generate interrupt based on priorities */
- if (guest_msr & MSR_PR) {
- /* Privileged Instruction type Program Intr */
- kvmppc_core_queue_program(vcpu, SRR1_PROGPRIV);
- emulated = EMULATE_AGAIN;
- break;
- }
- tm_enable();
- texasr = mfspr(SPRN_TEXASR);
- tm_disable();
- if (MSR_TM_ACTIVE(guest_msr) ||
- !(texasr & (TEXASR_FS))) {
- /* TM bad thing interrupt */
- kvmppc_core_queue_program(vcpu, SRR1_PROGTM);
- emulated = EMULATE_AGAIN;
- break;
- }
- kvmppc_emulate_trchkpt(vcpu);
- break;
- }
- #endif
- default:
- emulated = EMULATE_FAIL;
- }
- break;
- default:
- emulated = EMULATE_FAIL;
- }
- if (emulated == EMULATE_FAIL)
- emulated = kvmppc_emulate_paired_single(vcpu);
- return emulated;
- }
- void kvmppc_set_bat(struct kvm_vcpu *vcpu, struct kvmppc_bat *bat, bool upper,
- u32 val)
- {
- if (upper) {
- /* Upper BAT */
- u32 bl = (val >> 2) & 0x7ff;
- bat->bepi_mask = (~bl << 17);
- bat->bepi = val & 0xfffe0000;
- bat->vs = (val & 2) ? 1 : 0;
- bat->vp = (val & 1) ? 1 : 0;
- bat->raw = (bat->raw & 0xffffffff00000000ULL) | val;
- } else {
- /* Lower BAT */
- bat->brpn = val & 0xfffe0000;
- bat->wimg = (val >> 3) & 0xf;
- bat->pp = val & 3;
- bat->raw = (bat->raw & 0x00000000ffffffffULL) | ((u64)val << 32);
- }
- }
- static struct kvmppc_bat *kvmppc_find_bat(struct kvm_vcpu *vcpu, int sprn)
- {
- struct kvmppc_vcpu_book3s *vcpu_book3s = to_book3s(vcpu);
- struct kvmppc_bat *bat;
- switch (sprn) {
- case SPRN_IBAT0U ... SPRN_IBAT3L:
- bat = &vcpu_book3s->ibat[(sprn - SPRN_IBAT0U) / 2];
- break;
- case SPRN_IBAT4U ... SPRN_IBAT7L:
- bat = &vcpu_book3s->ibat[4 + ((sprn - SPRN_IBAT4U) / 2)];
- break;
- case SPRN_DBAT0U ... SPRN_DBAT3L:
- bat = &vcpu_book3s->dbat[(sprn - SPRN_DBAT0U) / 2];
- break;
- case SPRN_DBAT4U ... SPRN_DBAT7L:
- bat = &vcpu_book3s->dbat[4 + ((sprn - SPRN_DBAT4U) / 2)];
- break;
- default:
- BUG();
- }
- return bat;
- }
- int kvmppc_core_emulate_mtspr_pr(struct kvm_vcpu *vcpu, int sprn, ulong spr_val)
- {
- int emulated = EMULATE_DONE;
- switch (sprn) {
- case SPRN_SDR1:
- if (!spr_allowed(vcpu, PRIV_HYPER))
- goto unprivileged;
- to_book3s(vcpu)->sdr1 = spr_val;
- break;
- case SPRN_DSISR:
- kvmppc_set_dsisr(vcpu, spr_val);
- break;
- case SPRN_DAR:
- kvmppc_set_dar(vcpu, spr_val);
- break;
- case SPRN_HIOR:
- to_book3s(vcpu)->hior = spr_val;
- break;
- case SPRN_IBAT0U ... SPRN_IBAT3L:
- case SPRN_IBAT4U ... SPRN_IBAT7L:
- case SPRN_DBAT0U ... SPRN_DBAT3L:
- case SPRN_DBAT4U ... SPRN_DBAT7L:
- {
- struct kvmppc_bat *bat = kvmppc_find_bat(vcpu, sprn);
- kvmppc_set_bat(vcpu, bat, !(sprn % 2), (u32)spr_val);
- /* BAT writes happen so rarely that we're ok to flush
- * everything here */
- kvmppc_mmu_pte_flush(vcpu, 0, 0);
- kvmppc_mmu_flush_segments(vcpu);
- break;
- }
- case SPRN_HID0:
- to_book3s(vcpu)->hid[0] = spr_val;
- break;
- case SPRN_HID1:
- to_book3s(vcpu)->hid[1] = spr_val;
- break;
- case SPRN_HID2:
- to_book3s(vcpu)->hid[2] = spr_val;
- break;
- case SPRN_HID2_GEKKO:
- to_book3s(vcpu)->hid[2] = spr_val;
- /* HID2.PSE controls paired single on gekko */
- switch (vcpu->arch.pvr) {
- case 0x00080200: /* lonestar 2.0 */
- case 0x00088202: /* lonestar 2.2 */
- case 0x70000100: /* gekko 1.0 */
- case 0x00080100: /* gekko 2.0 */
- case 0x00083203: /* gekko 2.3a */
- case 0x00083213: /* gekko 2.3b */
- case 0x00083204: /* gekko 2.4 */
- case 0x00083214: /* gekko 2.4e (8SE) - retail HW2 */
- case 0x00087200: /* broadway */
- if (vcpu->arch.hflags & BOOK3S_HFLAG_NATIVE_PS) {
- /* Native paired singles */
- } else if (spr_val & (1 << 29)) { /* HID2.PSE */
- vcpu->arch.hflags |= BOOK3S_HFLAG_PAIRED_SINGLE;
- kvmppc_giveup_ext(vcpu, MSR_FP);
- } else {
- vcpu->arch.hflags &= ~BOOK3S_HFLAG_PAIRED_SINGLE;
- }
- break;
- }
- break;
- case SPRN_HID4:
- case SPRN_HID4_GEKKO:
- to_book3s(vcpu)->hid[4] = spr_val;
- break;
- case SPRN_HID5:
- to_book3s(vcpu)->hid[5] = spr_val;
- /* guest HID5 set can change is_dcbz32 */
- if (vcpu->arch.mmu.is_dcbz32(vcpu) &&
- (mfmsr() & MSR_HV))
- vcpu->arch.hflags |= BOOK3S_HFLAG_DCBZ32;
- break;
- case SPRN_GQR0:
- case SPRN_GQR1:
- case SPRN_GQR2:
- case SPRN_GQR3:
- case SPRN_GQR4:
- case SPRN_GQR5:
- case SPRN_GQR6:
- case SPRN_GQR7:
- to_book3s(vcpu)->gqr[sprn - SPRN_GQR0] = spr_val;
- break;
- #ifdef CONFIG_PPC_BOOK3S_64
- case SPRN_FSCR:
- kvmppc_set_fscr(vcpu, spr_val);
- break;
- case SPRN_BESCR:
- vcpu->arch.bescr = spr_val;
- break;
- case SPRN_EBBHR:
- vcpu->arch.ebbhr = spr_val;
- break;
- case SPRN_EBBRR:
- vcpu->arch.ebbrr = spr_val;
- break;
- #ifdef CONFIG_PPC_TRANSACTIONAL_MEM
- case SPRN_TFHAR:
- case SPRN_TEXASR:
- case SPRN_TFIAR:
- if (!cpu_has_feature(CPU_FTR_TM))
- break;
- if (!(kvmppc_get_msr(vcpu) & MSR_TM)) {
- kvmppc_trigger_fac_interrupt(vcpu, FSCR_TM_LG);
- emulated = EMULATE_AGAIN;
- break;
- }
- if (MSR_TM_ACTIVE(kvmppc_get_msr(vcpu)) &&
- !((MSR_TM_SUSPENDED(kvmppc_get_msr(vcpu))) &&
- (sprn == SPRN_TFHAR))) {
- /* it is illegal to mtspr() TM regs in
- * other than non-transactional state, with
- * the exception of TFHAR in suspend state.
- */
- kvmppc_core_queue_program(vcpu, SRR1_PROGTM);
- emulated = EMULATE_AGAIN;
- break;
- }
- tm_enable();
- if (sprn == SPRN_TFHAR)
- mtspr(SPRN_TFHAR, spr_val);
- else if (sprn == SPRN_TEXASR)
- mtspr(SPRN_TEXASR, spr_val);
- else
- mtspr(SPRN_TFIAR, spr_val);
- tm_disable();
- break;
- #endif
- #endif
- case SPRN_ICTC:
- case SPRN_THRM1:
- case SPRN_THRM2:
- case SPRN_THRM3:
- case SPRN_CTRLF:
- case SPRN_CTRLT:
- case SPRN_L2CR:
- case SPRN_DSCR:
- case SPRN_MMCR0_GEKKO:
- case SPRN_MMCR1_GEKKO:
- case SPRN_PMC1_GEKKO:
- case SPRN_PMC2_GEKKO:
- case SPRN_PMC3_GEKKO:
- case SPRN_PMC4_GEKKO:
- case SPRN_WPAR_GEKKO:
- case SPRN_MSSSR0:
- case SPRN_DABR:
- #ifdef CONFIG_PPC_BOOK3S_64
- case SPRN_MMCRS:
- case SPRN_MMCRA:
- case SPRN_MMCR0:
- case SPRN_MMCR1:
- case SPRN_MMCR2:
- case SPRN_UMMCR2:
- case SPRN_UAMOR:
- case SPRN_IAMR:
- case SPRN_AMR:
- #endif
- break;
- unprivileged:
- default:
- pr_info_ratelimited("KVM: invalid SPR write: %d\n", sprn);
- if (sprn & 0x10) {
- if (kvmppc_get_msr(vcpu) & MSR_PR) {
- kvmppc_core_queue_program(vcpu, SRR1_PROGPRIV);
- emulated = EMULATE_AGAIN;
- }
- } else {
- if ((kvmppc_get_msr(vcpu) & MSR_PR) || sprn == 0) {
- kvmppc_core_queue_program(vcpu, SRR1_PROGILL);
- emulated = EMULATE_AGAIN;
- }
- }
- break;
- }
- return emulated;
- }
- int kvmppc_core_emulate_mfspr_pr(struct kvm_vcpu *vcpu, int sprn, ulong *spr_val)
- {
- int emulated = EMULATE_DONE;
- switch (sprn) {
- case SPRN_IBAT0U ... SPRN_IBAT3L:
- case SPRN_IBAT4U ... SPRN_IBAT7L:
- case SPRN_DBAT0U ... SPRN_DBAT3L:
- case SPRN_DBAT4U ... SPRN_DBAT7L:
- {
- struct kvmppc_bat *bat = kvmppc_find_bat(vcpu, sprn);
- if (sprn % 2)
- *spr_val = bat->raw >> 32;
- else
- *spr_val = bat->raw;
- break;
- }
- case SPRN_SDR1:
- if (!spr_allowed(vcpu, PRIV_HYPER))
- goto unprivileged;
- *spr_val = to_book3s(vcpu)->sdr1;
- break;
- case SPRN_DSISR:
- *spr_val = kvmppc_get_dsisr(vcpu);
- break;
- case SPRN_DAR:
- *spr_val = kvmppc_get_dar(vcpu);
- break;
- case SPRN_HIOR:
- *spr_val = to_book3s(vcpu)->hior;
- break;
- case SPRN_HID0:
- *spr_val = to_book3s(vcpu)->hid[0];
- break;
- case SPRN_HID1:
- *spr_val = to_book3s(vcpu)->hid[1];
- break;
- case SPRN_HID2:
- case SPRN_HID2_GEKKO:
- *spr_val = to_book3s(vcpu)->hid[2];
- break;
- case SPRN_HID4:
- case SPRN_HID4_GEKKO:
- *spr_val = to_book3s(vcpu)->hid[4];
- break;
- case SPRN_HID5:
- *spr_val = to_book3s(vcpu)->hid[5];
- break;
- case SPRN_CFAR:
- case SPRN_DSCR:
- *spr_val = 0;
- break;
- case SPRN_PURR:
- /*
- * On exit we would have updated purr
- */
- *spr_val = vcpu->arch.purr;
- break;
- case SPRN_SPURR:
- /*
- * On exit we would have updated spurr
- */
- *spr_val = vcpu->arch.spurr;
- break;
- case SPRN_VTB:
- *spr_val = to_book3s(vcpu)->vtb;
- break;
- case SPRN_IC:
- *spr_val = vcpu->arch.ic;
- break;
- case SPRN_GQR0:
- case SPRN_GQR1:
- case SPRN_GQR2:
- case SPRN_GQR3:
- case SPRN_GQR4:
- case SPRN_GQR5:
- case SPRN_GQR6:
- case SPRN_GQR7:
- *spr_val = to_book3s(vcpu)->gqr[sprn - SPRN_GQR0];
- break;
- #ifdef CONFIG_PPC_BOOK3S_64
- case SPRN_FSCR:
- *spr_val = vcpu->arch.fscr;
- break;
- case SPRN_BESCR:
- *spr_val = vcpu->arch.bescr;
- break;
- case SPRN_EBBHR:
- *spr_val = vcpu->arch.ebbhr;
- break;
- case SPRN_EBBRR:
- *spr_val = vcpu->arch.ebbrr;
- break;
- #ifdef CONFIG_PPC_TRANSACTIONAL_MEM
- case SPRN_TFHAR:
- case SPRN_TEXASR:
- case SPRN_TFIAR:
- if (!cpu_has_feature(CPU_FTR_TM))
- break;
- if (!(kvmppc_get_msr(vcpu) & MSR_TM)) {
- kvmppc_trigger_fac_interrupt(vcpu, FSCR_TM_LG);
- emulated = EMULATE_AGAIN;
- break;
- }
- tm_enable();
- if (sprn == SPRN_TFHAR)
- *spr_val = mfspr(SPRN_TFHAR);
- else if (sprn == SPRN_TEXASR)
- *spr_val = mfspr(SPRN_TEXASR);
- else if (sprn == SPRN_TFIAR)
- *spr_val = mfspr(SPRN_TFIAR);
- tm_disable();
- break;
- #endif
- #endif
- case SPRN_THRM1:
- case SPRN_THRM2:
- case SPRN_THRM3:
- case SPRN_CTRLF:
- case SPRN_CTRLT:
- case SPRN_L2CR:
- case SPRN_MMCR0_GEKKO:
- case SPRN_MMCR1_GEKKO:
- case SPRN_PMC1_GEKKO:
- case SPRN_PMC2_GEKKO:
- case SPRN_PMC3_GEKKO:
- case SPRN_PMC4_GEKKO:
- case SPRN_WPAR_GEKKO:
- case SPRN_MSSSR0:
- case SPRN_DABR:
- #ifdef CONFIG_PPC_BOOK3S_64
- case SPRN_MMCRS:
- case SPRN_MMCRA:
- case SPRN_MMCR0:
- case SPRN_MMCR1:
- case SPRN_MMCR2:
- case SPRN_UMMCR2:
- case SPRN_TIR:
- case SPRN_UAMOR:
- case SPRN_IAMR:
- case SPRN_AMR:
- #endif
- *spr_val = 0;
- break;
- default:
- unprivileged:
- pr_info_ratelimited("KVM: invalid SPR read: %d\n", sprn);
- if (sprn & 0x10) {
- if (kvmppc_get_msr(vcpu) & MSR_PR) {
- kvmppc_core_queue_program(vcpu, SRR1_PROGPRIV);
- emulated = EMULATE_AGAIN;
- }
- } else {
- if ((kvmppc_get_msr(vcpu) & MSR_PR) || sprn == 0 ||
- sprn == 4 || sprn == 5 || sprn == 6) {
- kvmppc_core_queue_program(vcpu, SRR1_PROGILL);
- emulated = EMULATE_AGAIN;
- }
- }
- break;
- }
- return emulated;
- }
- u32 kvmppc_alignment_dsisr(struct kvm_vcpu *vcpu, unsigned int inst)
- {
- return make_dsisr(inst);
- }
- ulong kvmppc_alignment_dar(struct kvm_vcpu *vcpu, unsigned int inst)
- {
- #ifdef CONFIG_PPC_BOOK3S_64
- /*
- * Linux's fix_alignment() assumes that DAR is valid, so can we
- */
- return vcpu->arch.fault_dar;
- #else
- ulong dar = 0;
- ulong ra = get_ra(inst);
- ulong rb = get_rb(inst);
- switch (get_op(inst)) {
- case OP_LFS:
- case OP_LFD:
- case OP_STFD:
- case OP_STFS:
- if (ra)
- dar = kvmppc_get_gpr(vcpu, ra);
- dar += (s32)((s16)inst);
- break;
- case 31:
- if (ra)
- dar = kvmppc_get_gpr(vcpu, ra);
- dar += kvmppc_get_gpr(vcpu, rb);
- break;
- default:
- printk(KERN_INFO "KVM: Unaligned instruction 0x%x\n", inst);
- break;
- }
- return dar;
- #endif
- }
|