book3s_emulate.c 25 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072
  1. // SPDX-License-Identifier: GPL-2.0-only
  2. /*
  3. *
  4. * Copyright SUSE Linux Products GmbH 2009
  5. *
  6. * Authors: Alexander Graf <[email protected]>
  7. */
  8. #include <asm/kvm_ppc.h>
  9. #include <asm/disassemble.h>
  10. #include <asm/kvm_book3s.h>
  11. #include <asm/reg.h>
  12. #include <asm/switch_to.h>
  13. #include <asm/time.h>
  14. #include <asm/tm.h>
  15. #include "book3s.h"
  16. #include <asm/asm-prototypes.h>
  17. #define OP_19_XOP_RFID 18
  18. #define OP_19_XOP_RFI 50
  19. #define OP_31_XOP_MFMSR 83
  20. #define OP_31_XOP_MTMSR 146
  21. #define OP_31_XOP_MTMSRD 178
  22. #define OP_31_XOP_MTSR 210
  23. #define OP_31_XOP_MTSRIN 242
  24. #define OP_31_XOP_TLBIEL 274
  25. /* Opcode is officially reserved, reuse it as sc 1 when sc 1 doesn't trap */
  26. #define OP_31_XOP_FAKE_SC1 308
  27. #define OP_31_XOP_SLBMTE 402
  28. #define OP_31_XOP_SLBIE 434
  29. #define OP_31_XOP_SLBIA 498
  30. #define OP_31_XOP_MFSR 595
  31. #define OP_31_XOP_MFSRIN 659
  32. #define OP_31_XOP_DCBA 758
  33. #define OP_31_XOP_SLBMFEV 851
  34. #define OP_31_XOP_EIOIO 854
  35. #define OP_31_XOP_SLBMFEE 915
  36. #define OP_31_XOP_SLBFEE 979
  37. #define OP_31_XOP_TBEGIN 654
  38. #define OP_31_XOP_TABORT 910
  39. #define OP_31_XOP_TRECLAIM 942
  40. #define OP_31_XOP_TRCHKPT 1006
  41. /* DCBZ is actually 1014, but we patch it to 1010 so we get a trap */
  42. #define OP_31_XOP_DCBZ 1010
  43. #define OP_LFS 48
  44. #define OP_LFD 50
  45. #define OP_STFS 52
  46. #define OP_STFD 54
  47. #define SPRN_GQR0 912
  48. #define SPRN_GQR1 913
  49. #define SPRN_GQR2 914
  50. #define SPRN_GQR3 915
  51. #define SPRN_GQR4 916
  52. #define SPRN_GQR5 917
  53. #define SPRN_GQR6 918
  54. #define SPRN_GQR7 919
  55. enum priv_level {
  56. PRIV_PROBLEM = 0,
  57. PRIV_SUPER = 1,
  58. PRIV_HYPER = 2,
  59. };
  60. static bool spr_allowed(struct kvm_vcpu *vcpu, enum priv_level level)
  61. {
  62. /* PAPR VMs only access supervisor SPRs */
  63. if (vcpu->arch.papr_enabled && (level > PRIV_SUPER))
  64. return false;
  65. /* Limit user space to its own small SPR set */
  66. if ((kvmppc_get_msr(vcpu) & MSR_PR) && level > PRIV_PROBLEM)
  67. return false;
  68. return true;
  69. }
  70. #ifdef CONFIG_PPC_TRANSACTIONAL_MEM
  71. static inline void kvmppc_copyto_vcpu_tm(struct kvm_vcpu *vcpu)
  72. {
  73. memcpy(&vcpu->arch.gpr_tm[0], &vcpu->arch.regs.gpr[0],
  74. sizeof(vcpu->arch.gpr_tm));
  75. memcpy(&vcpu->arch.fp_tm, &vcpu->arch.fp,
  76. sizeof(struct thread_fp_state));
  77. memcpy(&vcpu->arch.vr_tm, &vcpu->arch.vr,
  78. sizeof(struct thread_vr_state));
  79. vcpu->arch.ppr_tm = vcpu->arch.ppr;
  80. vcpu->arch.dscr_tm = vcpu->arch.dscr;
  81. vcpu->arch.amr_tm = vcpu->arch.amr;
  82. vcpu->arch.ctr_tm = vcpu->arch.regs.ctr;
  83. vcpu->arch.tar_tm = vcpu->arch.tar;
  84. vcpu->arch.lr_tm = vcpu->arch.regs.link;
  85. vcpu->arch.cr_tm = vcpu->arch.regs.ccr;
  86. vcpu->arch.xer_tm = vcpu->arch.regs.xer;
  87. vcpu->arch.vrsave_tm = vcpu->arch.vrsave;
  88. }
  89. static inline void kvmppc_copyfrom_vcpu_tm(struct kvm_vcpu *vcpu)
  90. {
  91. memcpy(&vcpu->arch.regs.gpr[0], &vcpu->arch.gpr_tm[0],
  92. sizeof(vcpu->arch.regs.gpr));
  93. memcpy(&vcpu->arch.fp, &vcpu->arch.fp_tm,
  94. sizeof(struct thread_fp_state));
  95. memcpy(&vcpu->arch.vr, &vcpu->arch.vr_tm,
  96. sizeof(struct thread_vr_state));
  97. vcpu->arch.ppr = vcpu->arch.ppr_tm;
  98. vcpu->arch.dscr = vcpu->arch.dscr_tm;
  99. vcpu->arch.amr = vcpu->arch.amr_tm;
  100. vcpu->arch.regs.ctr = vcpu->arch.ctr_tm;
  101. vcpu->arch.tar = vcpu->arch.tar_tm;
  102. vcpu->arch.regs.link = vcpu->arch.lr_tm;
  103. vcpu->arch.regs.ccr = vcpu->arch.cr_tm;
  104. vcpu->arch.regs.xer = vcpu->arch.xer_tm;
  105. vcpu->arch.vrsave = vcpu->arch.vrsave_tm;
  106. }
  107. static void kvmppc_emulate_treclaim(struct kvm_vcpu *vcpu, int ra_val)
  108. {
  109. unsigned long guest_msr = kvmppc_get_msr(vcpu);
  110. int fc_val = ra_val ? ra_val : 1;
  111. uint64_t texasr;
  112. /* CR0 = 0 | MSR[TS] | 0 */
  113. vcpu->arch.regs.ccr = (vcpu->arch.regs.ccr & ~(CR0_MASK << CR0_SHIFT)) |
  114. (((guest_msr & MSR_TS_MASK) >> (MSR_TS_S_LG - 1))
  115. << CR0_SHIFT);
  116. preempt_disable();
  117. tm_enable();
  118. texasr = mfspr(SPRN_TEXASR);
  119. kvmppc_save_tm_pr(vcpu);
  120. kvmppc_copyfrom_vcpu_tm(vcpu);
  121. /* failure recording depends on Failure Summary bit */
  122. if (!(texasr & TEXASR_FS)) {
  123. texasr &= ~TEXASR_FC;
  124. texasr |= ((u64)fc_val << TEXASR_FC_LG) | TEXASR_FS;
  125. texasr &= ~(TEXASR_PR | TEXASR_HV);
  126. if (kvmppc_get_msr(vcpu) & MSR_PR)
  127. texasr |= TEXASR_PR;
  128. if (kvmppc_get_msr(vcpu) & MSR_HV)
  129. texasr |= TEXASR_HV;
  130. vcpu->arch.texasr = texasr;
  131. vcpu->arch.tfiar = kvmppc_get_pc(vcpu);
  132. mtspr(SPRN_TEXASR, texasr);
  133. mtspr(SPRN_TFIAR, vcpu->arch.tfiar);
  134. }
  135. tm_disable();
  136. /*
  137. * treclaim need quit to non-transactional state.
  138. */
  139. guest_msr &= ~(MSR_TS_MASK);
  140. kvmppc_set_msr(vcpu, guest_msr);
  141. preempt_enable();
  142. if (vcpu->arch.shadow_fscr & FSCR_TAR)
  143. mtspr(SPRN_TAR, vcpu->arch.tar);
  144. }
  145. static void kvmppc_emulate_trchkpt(struct kvm_vcpu *vcpu)
  146. {
  147. unsigned long guest_msr = kvmppc_get_msr(vcpu);
  148. preempt_disable();
  149. /*
  150. * need flush FP/VEC/VSX to vcpu save area before
  151. * copy.
  152. */
  153. kvmppc_giveup_ext(vcpu, MSR_VSX);
  154. kvmppc_giveup_fac(vcpu, FSCR_TAR_LG);
  155. kvmppc_copyto_vcpu_tm(vcpu);
  156. kvmppc_save_tm_sprs(vcpu);
  157. /*
  158. * as a result of trecheckpoint. set TS to suspended.
  159. */
  160. guest_msr &= ~(MSR_TS_MASK);
  161. guest_msr |= MSR_TS_S;
  162. kvmppc_set_msr(vcpu, guest_msr);
  163. kvmppc_restore_tm_pr(vcpu);
  164. preempt_enable();
  165. }
  166. /* emulate tabort. at guest privilege state */
  167. void kvmppc_emulate_tabort(struct kvm_vcpu *vcpu, int ra_val)
  168. {
  169. /* currently we only emulate tabort. but no emulation of other
  170. * tabort variants since there is no kernel usage of them at
  171. * present.
  172. */
  173. unsigned long guest_msr = kvmppc_get_msr(vcpu);
  174. uint64_t org_texasr;
  175. preempt_disable();
  176. tm_enable();
  177. org_texasr = mfspr(SPRN_TEXASR);
  178. tm_abort(ra_val);
  179. /* CR0 = 0 | MSR[TS] | 0 */
  180. vcpu->arch.regs.ccr = (vcpu->arch.regs.ccr & ~(CR0_MASK << CR0_SHIFT)) |
  181. (((guest_msr & MSR_TS_MASK) >> (MSR_TS_S_LG - 1))
  182. << CR0_SHIFT);
  183. vcpu->arch.texasr = mfspr(SPRN_TEXASR);
  184. /* failure recording depends on Failure Summary bit,
  185. * and tabort will be treated as nops in non-transactional
  186. * state.
  187. */
  188. if (!(org_texasr & TEXASR_FS) &&
  189. MSR_TM_ACTIVE(guest_msr)) {
  190. vcpu->arch.texasr &= ~(TEXASR_PR | TEXASR_HV);
  191. if (guest_msr & MSR_PR)
  192. vcpu->arch.texasr |= TEXASR_PR;
  193. if (guest_msr & MSR_HV)
  194. vcpu->arch.texasr |= TEXASR_HV;
  195. vcpu->arch.tfiar = kvmppc_get_pc(vcpu);
  196. }
  197. tm_disable();
  198. preempt_enable();
  199. }
  200. #endif
  201. int kvmppc_core_emulate_op_pr(struct kvm_vcpu *vcpu,
  202. unsigned int inst, int *advance)
  203. {
  204. int emulated = EMULATE_DONE;
  205. int rt = get_rt(inst);
  206. int rs = get_rs(inst);
  207. int ra = get_ra(inst);
  208. int rb = get_rb(inst);
  209. u32 inst_sc = 0x44000002;
  210. switch (get_op(inst)) {
  211. case 0:
  212. emulated = EMULATE_FAIL;
  213. if ((kvmppc_get_msr(vcpu) & MSR_LE) &&
  214. (inst == swab32(inst_sc))) {
  215. /*
  216. * This is the byte reversed syscall instruction of our
  217. * hypercall handler. Early versions of LE Linux didn't
  218. * swap the instructions correctly and ended up in
  219. * illegal instructions.
  220. * Just always fail hypercalls on these broken systems.
  221. */
  222. kvmppc_set_gpr(vcpu, 3, EV_UNIMPLEMENTED);
  223. kvmppc_set_pc(vcpu, kvmppc_get_pc(vcpu) + 4);
  224. emulated = EMULATE_DONE;
  225. }
  226. break;
  227. case 19:
  228. switch (get_xop(inst)) {
  229. case OP_19_XOP_RFID:
  230. case OP_19_XOP_RFI: {
  231. unsigned long srr1 = kvmppc_get_srr1(vcpu);
  232. #ifdef CONFIG_PPC_TRANSACTIONAL_MEM
  233. unsigned long cur_msr = kvmppc_get_msr(vcpu);
  234. /*
  235. * add rules to fit in ISA specification regarding TM
  236. * state transition in TM disable/Suspended state,
  237. * and target TM state is TM inactive(00) state. (the
  238. * change should be suppressed).
  239. */
  240. if (((cur_msr & MSR_TM) == 0) &&
  241. ((srr1 & MSR_TM) == 0) &&
  242. MSR_TM_SUSPENDED(cur_msr) &&
  243. !MSR_TM_ACTIVE(srr1))
  244. srr1 |= MSR_TS_S;
  245. #endif
  246. kvmppc_set_pc(vcpu, kvmppc_get_srr0(vcpu));
  247. kvmppc_set_msr(vcpu, srr1);
  248. *advance = 0;
  249. break;
  250. }
  251. default:
  252. emulated = EMULATE_FAIL;
  253. break;
  254. }
  255. break;
  256. case 31:
  257. switch (get_xop(inst)) {
  258. case OP_31_XOP_MFMSR:
  259. kvmppc_set_gpr(vcpu, rt, kvmppc_get_msr(vcpu));
  260. break;
  261. case OP_31_XOP_MTMSRD:
  262. {
  263. ulong rs_val = kvmppc_get_gpr(vcpu, rs);
  264. if (inst & 0x10000) {
  265. ulong new_msr = kvmppc_get_msr(vcpu);
  266. new_msr &= ~(MSR_RI | MSR_EE);
  267. new_msr |= rs_val & (MSR_RI | MSR_EE);
  268. kvmppc_set_msr_fast(vcpu, new_msr);
  269. } else
  270. kvmppc_set_msr(vcpu, rs_val);
  271. break;
  272. }
  273. case OP_31_XOP_MTMSR:
  274. kvmppc_set_msr(vcpu, kvmppc_get_gpr(vcpu, rs));
  275. break;
  276. case OP_31_XOP_MFSR:
  277. {
  278. int srnum;
  279. srnum = kvmppc_get_field(inst, 12 + 32, 15 + 32);
  280. if (vcpu->arch.mmu.mfsrin) {
  281. u32 sr;
  282. sr = vcpu->arch.mmu.mfsrin(vcpu, srnum);
  283. kvmppc_set_gpr(vcpu, rt, sr);
  284. }
  285. break;
  286. }
  287. case OP_31_XOP_MFSRIN:
  288. {
  289. int srnum;
  290. srnum = (kvmppc_get_gpr(vcpu, rb) >> 28) & 0xf;
  291. if (vcpu->arch.mmu.mfsrin) {
  292. u32 sr;
  293. sr = vcpu->arch.mmu.mfsrin(vcpu, srnum);
  294. kvmppc_set_gpr(vcpu, rt, sr);
  295. }
  296. break;
  297. }
  298. case OP_31_XOP_MTSR:
  299. vcpu->arch.mmu.mtsrin(vcpu,
  300. (inst >> 16) & 0xf,
  301. kvmppc_get_gpr(vcpu, rs));
  302. break;
  303. case OP_31_XOP_MTSRIN:
  304. vcpu->arch.mmu.mtsrin(vcpu,
  305. (kvmppc_get_gpr(vcpu, rb) >> 28) & 0xf,
  306. kvmppc_get_gpr(vcpu, rs));
  307. break;
  308. case OP_31_XOP_TLBIE:
  309. case OP_31_XOP_TLBIEL:
  310. {
  311. bool large = (inst & 0x00200000) ? true : false;
  312. ulong addr = kvmppc_get_gpr(vcpu, rb);
  313. vcpu->arch.mmu.tlbie(vcpu, addr, large);
  314. break;
  315. }
  316. #ifdef CONFIG_PPC_BOOK3S_64
  317. case OP_31_XOP_FAKE_SC1:
  318. {
  319. /* SC 1 papr hypercalls */
  320. ulong cmd = kvmppc_get_gpr(vcpu, 3);
  321. int i;
  322. if ((kvmppc_get_msr(vcpu) & MSR_PR) ||
  323. !vcpu->arch.papr_enabled) {
  324. emulated = EMULATE_FAIL;
  325. break;
  326. }
  327. if (kvmppc_h_pr(vcpu, cmd) == EMULATE_DONE)
  328. break;
  329. vcpu->run->papr_hcall.nr = cmd;
  330. for (i = 0; i < 9; ++i) {
  331. ulong gpr = kvmppc_get_gpr(vcpu, 4 + i);
  332. vcpu->run->papr_hcall.args[i] = gpr;
  333. }
  334. vcpu->run->exit_reason = KVM_EXIT_PAPR_HCALL;
  335. vcpu->arch.hcall_needed = 1;
  336. emulated = EMULATE_EXIT_USER;
  337. break;
  338. }
  339. #endif
  340. case OP_31_XOP_EIOIO:
  341. break;
  342. case OP_31_XOP_SLBMTE:
  343. if (!vcpu->arch.mmu.slbmte)
  344. return EMULATE_FAIL;
  345. vcpu->arch.mmu.slbmte(vcpu,
  346. kvmppc_get_gpr(vcpu, rs),
  347. kvmppc_get_gpr(vcpu, rb));
  348. break;
  349. case OP_31_XOP_SLBIE:
  350. if (!vcpu->arch.mmu.slbie)
  351. return EMULATE_FAIL;
  352. vcpu->arch.mmu.slbie(vcpu,
  353. kvmppc_get_gpr(vcpu, rb));
  354. break;
  355. case OP_31_XOP_SLBIA:
  356. if (!vcpu->arch.mmu.slbia)
  357. return EMULATE_FAIL;
  358. vcpu->arch.mmu.slbia(vcpu);
  359. break;
  360. case OP_31_XOP_SLBFEE:
  361. if (!(inst & 1) || !vcpu->arch.mmu.slbfee) {
  362. return EMULATE_FAIL;
  363. } else {
  364. ulong b, t;
  365. ulong cr = kvmppc_get_cr(vcpu) & ~CR0_MASK;
  366. b = kvmppc_get_gpr(vcpu, rb);
  367. if (!vcpu->arch.mmu.slbfee(vcpu, b, &t))
  368. cr |= 2 << CR0_SHIFT;
  369. kvmppc_set_gpr(vcpu, rt, t);
  370. /* copy XER[SO] bit to CR0[SO] */
  371. cr |= (vcpu->arch.regs.xer & 0x80000000) >>
  372. (31 - CR0_SHIFT);
  373. kvmppc_set_cr(vcpu, cr);
  374. }
  375. break;
  376. case OP_31_XOP_SLBMFEE:
  377. if (!vcpu->arch.mmu.slbmfee) {
  378. emulated = EMULATE_FAIL;
  379. } else {
  380. ulong t, rb_val;
  381. rb_val = kvmppc_get_gpr(vcpu, rb);
  382. t = vcpu->arch.mmu.slbmfee(vcpu, rb_val);
  383. kvmppc_set_gpr(vcpu, rt, t);
  384. }
  385. break;
  386. case OP_31_XOP_SLBMFEV:
  387. if (!vcpu->arch.mmu.slbmfev) {
  388. emulated = EMULATE_FAIL;
  389. } else {
  390. ulong t, rb_val;
  391. rb_val = kvmppc_get_gpr(vcpu, rb);
  392. t = vcpu->arch.mmu.slbmfev(vcpu, rb_val);
  393. kvmppc_set_gpr(vcpu, rt, t);
  394. }
  395. break;
  396. case OP_31_XOP_DCBA:
  397. /* Gets treated as NOP */
  398. break;
  399. case OP_31_XOP_DCBZ:
  400. {
  401. ulong rb_val = kvmppc_get_gpr(vcpu, rb);
  402. ulong ra_val = 0;
  403. ulong addr, vaddr;
  404. u32 zeros[8] = { 0, 0, 0, 0, 0, 0, 0, 0 };
  405. u32 dsisr;
  406. int r;
  407. if (ra)
  408. ra_val = kvmppc_get_gpr(vcpu, ra);
  409. addr = (ra_val + rb_val) & ~31ULL;
  410. if (!(kvmppc_get_msr(vcpu) & MSR_SF))
  411. addr &= 0xffffffff;
  412. vaddr = addr;
  413. r = kvmppc_st(vcpu, &addr, 32, zeros, true);
  414. if ((r == -ENOENT) || (r == -EPERM)) {
  415. *advance = 0;
  416. kvmppc_set_dar(vcpu, vaddr);
  417. vcpu->arch.fault_dar = vaddr;
  418. dsisr = DSISR_ISSTORE;
  419. if (r == -ENOENT)
  420. dsisr |= DSISR_NOHPTE;
  421. else if (r == -EPERM)
  422. dsisr |= DSISR_PROTFAULT;
  423. kvmppc_set_dsisr(vcpu, dsisr);
  424. vcpu->arch.fault_dsisr = dsisr;
  425. kvmppc_book3s_queue_irqprio(vcpu,
  426. BOOK3S_INTERRUPT_DATA_STORAGE);
  427. }
  428. break;
  429. }
  430. #ifdef CONFIG_PPC_TRANSACTIONAL_MEM
  431. case OP_31_XOP_TBEGIN:
  432. {
  433. if (!cpu_has_feature(CPU_FTR_TM))
  434. break;
  435. if (!(kvmppc_get_msr(vcpu) & MSR_TM)) {
  436. kvmppc_trigger_fac_interrupt(vcpu, FSCR_TM_LG);
  437. emulated = EMULATE_AGAIN;
  438. break;
  439. }
  440. if (!(kvmppc_get_msr(vcpu) & MSR_PR)) {
  441. preempt_disable();
  442. vcpu->arch.regs.ccr = (CR0_TBEGIN_FAILURE |
  443. (vcpu->arch.regs.ccr & ~(CR0_MASK << CR0_SHIFT)));
  444. vcpu->arch.texasr = (TEXASR_FS | TEXASR_EXACT |
  445. (((u64)(TM_CAUSE_EMULATE | TM_CAUSE_PERSISTENT))
  446. << TEXASR_FC_LG));
  447. if ((inst >> 21) & 0x1)
  448. vcpu->arch.texasr |= TEXASR_ROT;
  449. if (kvmppc_get_msr(vcpu) & MSR_HV)
  450. vcpu->arch.texasr |= TEXASR_HV;
  451. vcpu->arch.tfhar = kvmppc_get_pc(vcpu) + 4;
  452. vcpu->arch.tfiar = kvmppc_get_pc(vcpu);
  453. kvmppc_restore_tm_sprs(vcpu);
  454. preempt_enable();
  455. } else
  456. emulated = EMULATE_FAIL;
  457. break;
  458. }
  459. case OP_31_XOP_TABORT:
  460. {
  461. ulong guest_msr = kvmppc_get_msr(vcpu);
  462. unsigned long ra_val = 0;
  463. if (!cpu_has_feature(CPU_FTR_TM))
  464. break;
  465. if (!(kvmppc_get_msr(vcpu) & MSR_TM)) {
  466. kvmppc_trigger_fac_interrupt(vcpu, FSCR_TM_LG);
  467. emulated = EMULATE_AGAIN;
  468. break;
  469. }
  470. /* only emulate for privilege guest, since problem state
  471. * guest can run with TM enabled and we don't expect to
  472. * trap at here for that case.
  473. */
  474. WARN_ON(guest_msr & MSR_PR);
  475. if (ra)
  476. ra_val = kvmppc_get_gpr(vcpu, ra);
  477. kvmppc_emulate_tabort(vcpu, ra_val);
  478. break;
  479. }
  480. case OP_31_XOP_TRECLAIM:
  481. {
  482. ulong guest_msr = kvmppc_get_msr(vcpu);
  483. unsigned long ra_val = 0;
  484. if (!cpu_has_feature(CPU_FTR_TM))
  485. break;
  486. if (!(kvmppc_get_msr(vcpu) & MSR_TM)) {
  487. kvmppc_trigger_fac_interrupt(vcpu, FSCR_TM_LG);
  488. emulated = EMULATE_AGAIN;
  489. break;
  490. }
  491. /* generate interrupts based on priorities */
  492. if (guest_msr & MSR_PR) {
  493. /* Privileged Instruction type Program Interrupt */
  494. kvmppc_core_queue_program(vcpu, SRR1_PROGPRIV);
  495. emulated = EMULATE_AGAIN;
  496. break;
  497. }
  498. if (!MSR_TM_ACTIVE(guest_msr)) {
  499. /* TM bad thing interrupt */
  500. kvmppc_core_queue_program(vcpu, SRR1_PROGTM);
  501. emulated = EMULATE_AGAIN;
  502. break;
  503. }
  504. if (ra)
  505. ra_val = kvmppc_get_gpr(vcpu, ra);
  506. kvmppc_emulate_treclaim(vcpu, ra_val);
  507. break;
  508. }
  509. case OP_31_XOP_TRCHKPT:
  510. {
  511. ulong guest_msr = kvmppc_get_msr(vcpu);
  512. unsigned long texasr;
  513. if (!cpu_has_feature(CPU_FTR_TM))
  514. break;
  515. if (!(kvmppc_get_msr(vcpu) & MSR_TM)) {
  516. kvmppc_trigger_fac_interrupt(vcpu, FSCR_TM_LG);
  517. emulated = EMULATE_AGAIN;
  518. break;
  519. }
  520. /* generate interrupt based on priorities */
  521. if (guest_msr & MSR_PR) {
  522. /* Privileged Instruction type Program Intr */
  523. kvmppc_core_queue_program(vcpu, SRR1_PROGPRIV);
  524. emulated = EMULATE_AGAIN;
  525. break;
  526. }
  527. tm_enable();
  528. texasr = mfspr(SPRN_TEXASR);
  529. tm_disable();
  530. if (MSR_TM_ACTIVE(guest_msr) ||
  531. !(texasr & (TEXASR_FS))) {
  532. /* TM bad thing interrupt */
  533. kvmppc_core_queue_program(vcpu, SRR1_PROGTM);
  534. emulated = EMULATE_AGAIN;
  535. break;
  536. }
  537. kvmppc_emulate_trchkpt(vcpu);
  538. break;
  539. }
  540. #endif
  541. default:
  542. emulated = EMULATE_FAIL;
  543. }
  544. break;
  545. default:
  546. emulated = EMULATE_FAIL;
  547. }
  548. if (emulated == EMULATE_FAIL)
  549. emulated = kvmppc_emulate_paired_single(vcpu);
  550. return emulated;
  551. }
  552. void kvmppc_set_bat(struct kvm_vcpu *vcpu, struct kvmppc_bat *bat, bool upper,
  553. u32 val)
  554. {
  555. if (upper) {
  556. /* Upper BAT */
  557. u32 bl = (val >> 2) & 0x7ff;
  558. bat->bepi_mask = (~bl << 17);
  559. bat->bepi = val & 0xfffe0000;
  560. bat->vs = (val & 2) ? 1 : 0;
  561. bat->vp = (val & 1) ? 1 : 0;
  562. bat->raw = (bat->raw & 0xffffffff00000000ULL) | val;
  563. } else {
  564. /* Lower BAT */
  565. bat->brpn = val & 0xfffe0000;
  566. bat->wimg = (val >> 3) & 0xf;
  567. bat->pp = val & 3;
  568. bat->raw = (bat->raw & 0x00000000ffffffffULL) | ((u64)val << 32);
  569. }
  570. }
  571. static struct kvmppc_bat *kvmppc_find_bat(struct kvm_vcpu *vcpu, int sprn)
  572. {
  573. struct kvmppc_vcpu_book3s *vcpu_book3s = to_book3s(vcpu);
  574. struct kvmppc_bat *bat;
  575. switch (sprn) {
  576. case SPRN_IBAT0U ... SPRN_IBAT3L:
  577. bat = &vcpu_book3s->ibat[(sprn - SPRN_IBAT0U) / 2];
  578. break;
  579. case SPRN_IBAT4U ... SPRN_IBAT7L:
  580. bat = &vcpu_book3s->ibat[4 + ((sprn - SPRN_IBAT4U) / 2)];
  581. break;
  582. case SPRN_DBAT0U ... SPRN_DBAT3L:
  583. bat = &vcpu_book3s->dbat[(sprn - SPRN_DBAT0U) / 2];
  584. break;
  585. case SPRN_DBAT4U ... SPRN_DBAT7L:
  586. bat = &vcpu_book3s->dbat[4 + ((sprn - SPRN_DBAT4U) / 2)];
  587. break;
  588. default:
  589. BUG();
  590. }
  591. return bat;
  592. }
  593. int kvmppc_core_emulate_mtspr_pr(struct kvm_vcpu *vcpu, int sprn, ulong spr_val)
  594. {
  595. int emulated = EMULATE_DONE;
  596. switch (sprn) {
  597. case SPRN_SDR1:
  598. if (!spr_allowed(vcpu, PRIV_HYPER))
  599. goto unprivileged;
  600. to_book3s(vcpu)->sdr1 = spr_val;
  601. break;
  602. case SPRN_DSISR:
  603. kvmppc_set_dsisr(vcpu, spr_val);
  604. break;
  605. case SPRN_DAR:
  606. kvmppc_set_dar(vcpu, spr_val);
  607. break;
  608. case SPRN_HIOR:
  609. to_book3s(vcpu)->hior = spr_val;
  610. break;
  611. case SPRN_IBAT0U ... SPRN_IBAT3L:
  612. case SPRN_IBAT4U ... SPRN_IBAT7L:
  613. case SPRN_DBAT0U ... SPRN_DBAT3L:
  614. case SPRN_DBAT4U ... SPRN_DBAT7L:
  615. {
  616. struct kvmppc_bat *bat = kvmppc_find_bat(vcpu, sprn);
  617. kvmppc_set_bat(vcpu, bat, !(sprn % 2), (u32)spr_val);
  618. /* BAT writes happen so rarely that we're ok to flush
  619. * everything here */
  620. kvmppc_mmu_pte_flush(vcpu, 0, 0);
  621. kvmppc_mmu_flush_segments(vcpu);
  622. break;
  623. }
  624. case SPRN_HID0:
  625. to_book3s(vcpu)->hid[0] = spr_val;
  626. break;
  627. case SPRN_HID1:
  628. to_book3s(vcpu)->hid[1] = spr_val;
  629. break;
  630. case SPRN_HID2:
  631. to_book3s(vcpu)->hid[2] = spr_val;
  632. break;
  633. case SPRN_HID2_GEKKO:
  634. to_book3s(vcpu)->hid[2] = spr_val;
  635. /* HID2.PSE controls paired single on gekko */
  636. switch (vcpu->arch.pvr) {
  637. case 0x00080200: /* lonestar 2.0 */
  638. case 0x00088202: /* lonestar 2.2 */
  639. case 0x70000100: /* gekko 1.0 */
  640. case 0x00080100: /* gekko 2.0 */
  641. case 0x00083203: /* gekko 2.3a */
  642. case 0x00083213: /* gekko 2.3b */
  643. case 0x00083204: /* gekko 2.4 */
  644. case 0x00083214: /* gekko 2.4e (8SE) - retail HW2 */
  645. case 0x00087200: /* broadway */
  646. if (vcpu->arch.hflags & BOOK3S_HFLAG_NATIVE_PS) {
  647. /* Native paired singles */
  648. } else if (spr_val & (1 << 29)) { /* HID2.PSE */
  649. vcpu->arch.hflags |= BOOK3S_HFLAG_PAIRED_SINGLE;
  650. kvmppc_giveup_ext(vcpu, MSR_FP);
  651. } else {
  652. vcpu->arch.hflags &= ~BOOK3S_HFLAG_PAIRED_SINGLE;
  653. }
  654. break;
  655. }
  656. break;
  657. case SPRN_HID4:
  658. case SPRN_HID4_GEKKO:
  659. to_book3s(vcpu)->hid[4] = spr_val;
  660. break;
  661. case SPRN_HID5:
  662. to_book3s(vcpu)->hid[5] = spr_val;
  663. /* guest HID5 set can change is_dcbz32 */
  664. if (vcpu->arch.mmu.is_dcbz32(vcpu) &&
  665. (mfmsr() & MSR_HV))
  666. vcpu->arch.hflags |= BOOK3S_HFLAG_DCBZ32;
  667. break;
  668. case SPRN_GQR0:
  669. case SPRN_GQR1:
  670. case SPRN_GQR2:
  671. case SPRN_GQR3:
  672. case SPRN_GQR4:
  673. case SPRN_GQR5:
  674. case SPRN_GQR6:
  675. case SPRN_GQR7:
  676. to_book3s(vcpu)->gqr[sprn - SPRN_GQR0] = spr_val;
  677. break;
  678. #ifdef CONFIG_PPC_BOOK3S_64
  679. case SPRN_FSCR:
  680. kvmppc_set_fscr(vcpu, spr_val);
  681. break;
  682. case SPRN_BESCR:
  683. vcpu->arch.bescr = spr_val;
  684. break;
  685. case SPRN_EBBHR:
  686. vcpu->arch.ebbhr = spr_val;
  687. break;
  688. case SPRN_EBBRR:
  689. vcpu->arch.ebbrr = spr_val;
  690. break;
  691. #ifdef CONFIG_PPC_TRANSACTIONAL_MEM
  692. case SPRN_TFHAR:
  693. case SPRN_TEXASR:
  694. case SPRN_TFIAR:
  695. if (!cpu_has_feature(CPU_FTR_TM))
  696. break;
  697. if (!(kvmppc_get_msr(vcpu) & MSR_TM)) {
  698. kvmppc_trigger_fac_interrupt(vcpu, FSCR_TM_LG);
  699. emulated = EMULATE_AGAIN;
  700. break;
  701. }
  702. if (MSR_TM_ACTIVE(kvmppc_get_msr(vcpu)) &&
  703. !((MSR_TM_SUSPENDED(kvmppc_get_msr(vcpu))) &&
  704. (sprn == SPRN_TFHAR))) {
  705. /* it is illegal to mtspr() TM regs in
  706. * other than non-transactional state, with
  707. * the exception of TFHAR in suspend state.
  708. */
  709. kvmppc_core_queue_program(vcpu, SRR1_PROGTM);
  710. emulated = EMULATE_AGAIN;
  711. break;
  712. }
  713. tm_enable();
  714. if (sprn == SPRN_TFHAR)
  715. mtspr(SPRN_TFHAR, spr_val);
  716. else if (sprn == SPRN_TEXASR)
  717. mtspr(SPRN_TEXASR, spr_val);
  718. else
  719. mtspr(SPRN_TFIAR, spr_val);
  720. tm_disable();
  721. break;
  722. #endif
  723. #endif
  724. case SPRN_ICTC:
  725. case SPRN_THRM1:
  726. case SPRN_THRM2:
  727. case SPRN_THRM3:
  728. case SPRN_CTRLF:
  729. case SPRN_CTRLT:
  730. case SPRN_L2CR:
  731. case SPRN_DSCR:
  732. case SPRN_MMCR0_GEKKO:
  733. case SPRN_MMCR1_GEKKO:
  734. case SPRN_PMC1_GEKKO:
  735. case SPRN_PMC2_GEKKO:
  736. case SPRN_PMC3_GEKKO:
  737. case SPRN_PMC4_GEKKO:
  738. case SPRN_WPAR_GEKKO:
  739. case SPRN_MSSSR0:
  740. case SPRN_DABR:
  741. #ifdef CONFIG_PPC_BOOK3S_64
  742. case SPRN_MMCRS:
  743. case SPRN_MMCRA:
  744. case SPRN_MMCR0:
  745. case SPRN_MMCR1:
  746. case SPRN_MMCR2:
  747. case SPRN_UMMCR2:
  748. case SPRN_UAMOR:
  749. case SPRN_IAMR:
  750. case SPRN_AMR:
  751. #endif
  752. break;
  753. unprivileged:
  754. default:
  755. pr_info_ratelimited("KVM: invalid SPR write: %d\n", sprn);
  756. if (sprn & 0x10) {
  757. if (kvmppc_get_msr(vcpu) & MSR_PR) {
  758. kvmppc_core_queue_program(vcpu, SRR1_PROGPRIV);
  759. emulated = EMULATE_AGAIN;
  760. }
  761. } else {
  762. if ((kvmppc_get_msr(vcpu) & MSR_PR) || sprn == 0) {
  763. kvmppc_core_queue_program(vcpu, SRR1_PROGILL);
  764. emulated = EMULATE_AGAIN;
  765. }
  766. }
  767. break;
  768. }
  769. return emulated;
  770. }
  771. int kvmppc_core_emulate_mfspr_pr(struct kvm_vcpu *vcpu, int sprn, ulong *spr_val)
  772. {
  773. int emulated = EMULATE_DONE;
  774. switch (sprn) {
  775. case SPRN_IBAT0U ... SPRN_IBAT3L:
  776. case SPRN_IBAT4U ... SPRN_IBAT7L:
  777. case SPRN_DBAT0U ... SPRN_DBAT3L:
  778. case SPRN_DBAT4U ... SPRN_DBAT7L:
  779. {
  780. struct kvmppc_bat *bat = kvmppc_find_bat(vcpu, sprn);
  781. if (sprn % 2)
  782. *spr_val = bat->raw >> 32;
  783. else
  784. *spr_val = bat->raw;
  785. break;
  786. }
  787. case SPRN_SDR1:
  788. if (!spr_allowed(vcpu, PRIV_HYPER))
  789. goto unprivileged;
  790. *spr_val = to_book3s(vcpu)->sdr1;
  791. break;
  792. case SPRN_DSISR:
  793. *spr_val = kvmppc_get_dsisr(vcpu);
  794. break;
  795. case SPRN_DAR:
  796. *spr_val = kvmppc_get_dar(vcpu);
  797. break;
  798. case SPRN_HIOR:
  799. *spr_val = to_book3s(vcpu)->hior;
  800. break;
  801. case SPRN_HID0:
  802. *spr_val = to_book3s(vcpu)->hid[0];
  803. break;
  804. case SPRN_HID1:
  805. *spr_val = to_book3s(vcpu)->hid[1];
  806. break;
  807. case SPRN_HID2:
  808. case SPRN_HID2_GEKKO:
  809. *spr_val = to_book3s(vcpu)->hid[2];
  810. break;
  811. case SPRN_HID4:
  812. case SPRN_HID4_GEKKO:
  813. *spr_val = to_book3s(vcpu)->hid[4];
  814. break;
  815. case SPRN_HID5:
  816. *spr_val = to_book3s(vcpu)->hid[5];
  817. break;
  818. case SPRN_CFAR:
  819. case SPRN_DSCR:
  820. *spr_val = 0;
  821. break;
  822. case SPRN_PURR:
  823. /*
  824. * On exit we would have updated purr
  825. */
  826. *spr_val = vcpu->arch.purr;
  827. break;
  828. case SPRN_SPURR:
  829. /*
  830. * On exit we would have updated spurr
  831. */
  832. *spr_val = vcpu->arch.spurr;
  833. break;
  834. case SPRN_VTB:
  835. *spr_val = to_book3s(vcpu)->vtb;
  836. break;
  837. case SPRN_IC:
  838. *spr_val = vcpu->arch.ic;
  839. break;
  840. case SPRN_GQR0:
  841. case SPRN_GQR1:
  842. case SPRN_GQR2:
  843. case SPRN_GQR3:
  844. case SPRN_GQR4:
  845. case SPRN_GQR5:
  846. case SPRN_GQR6:
  847. case SPRN_GQR7:
  848. *spr_val = to_book3s(vcpu)->gqr[sprn - SPRN_GQR0];
  849. break;
  850. #ifdef CONFIG_PPC_BOOK3S_64
  851. case SPRN_FSCR:
  852. *spr_val = vcpu->arch.fscr;
  853. break;
  854. case SPRN_BESCR:
  855. *spr_val = vcpu->arch.bescr;
  856. break;
  857. case SPRN_EBBHR:
  858. *spr_val = vcpu->arch.ebbhr;
  859. break;
  860. case SPRN_EBBRR:
  861. *spr_val = vcpu->arch.ebbrr;
  862. break;
  863. #ifdef CONFIG_PPC_TRANSACTIONAL_MEM
  864. case SPRN_TFHAR:
  865. case SPRN_TEXASR:
  866. case SPRN_TFIAR:
  867. if (!cpu_has_feature(CPU_FTR_TM))
  868. break;
  869. if (!(kvmppc_get_msr(vcpu) & MSR_TM)) {
  870. kvmppc_trigger_fac_interrupt(vcpu, FSCR_TM_LG);
  871. emulated = EMULATE_AGAIN;
  872. break;
  873. }
  874. tm_enable();
  875. if (sprn == SPRN_TFHAR)
  876. *spr_val = mfspr(SPRN_TFHAR);
  877. else if (sprn == SPRN_TEXASR)
  878. *spr_val = mfspr(SPRN_TEXASR);
  879. else if (sprn == SPRN_TFIAR)
  880. *spr_val = mfspr(SPRN_TFIAR);
  881. tm_disable();
  882. break;
  883. #endif
  884. #endif
  885. case SPRN_THRM1:
  886. case SPRN_THRM2:
  887. case SPRN_THRM3:
  888. case SPRN_CTRLF:
  889. case SPRN_CTRLT:
  890. case SPRN_L2CR:
  891. case SPRN_MMCR0_GEKKO:
  892. case SPRN_MMCR1_GEKKO:
  893. case SPRN_PMC1_GEKKO:
  894. case SPRN_PMC2_GEKKO:
  895. case SPRN_PMC3_GEKKO:
  896. case SPRN_PMC4_GEKKO:
  897. case SPRN_WPAR_GEKKO:
  898. case SPRN_MSSSR0:
  899. case SPRN_DABR:
  900. #ifdef CONFIG_PPC_BOOK3S_64
  901. case SPRN_MMCRS:
  902. case SPRN_MMCRA:
  903. case SPRN_MMCR0:
  904. case SPRN_MMCR1:
  905. case SPRN_MMCR2:
  906. case SPRN_UMMCR2:
  907. case SPRN_TIR:
  908. case SPRN_UAMOR:
  909. case SPRN_IAMR:
  910. case SPRN_AMR:
  911. #endif
  912. *spr_val = 0;
  913. break;
  914. default:
  915. unprivileged:
  916. pr_info_ratelimited("KVM: invalid SPR read: %d\n", sprn);
  917. if (sprn & 0x10) {
  918. if (kvmppc_get_msr(vcpu) & MSR_PR) {
  919. kvmppc_core_queue_program(vcpu, SRR1_PROGPRIV);
  920. emulated = EMULATE_AGAIN;
  921. }
  922. } else {
  923. if ((kvmppc_get_msr(vcpu) & MSR_PR) || sprn == 0 ||
  924. sprn == 4 || sprn == 5 || sprn == 6) {
  925. kvmppc_core_queue_program(vcpu, SRR1_PROGILL);
  926. emulated = EMULATE_AGAIN;
  927. }
  928. }
  929. break;
  930. }
  931. return emulated;
  932. }
  933. u32 kvmppc_alignment_dsisr(struct kvm_vcpu *vcpu, unsigned int inst)
  934. {
  935. return make_dsisr(inst);
  936. }
  937. ulong kvmppc_alignment_dar(struct kvm_vcpu *vcpu, unsigned int inst)
  938. {
  939. #ifdef CONFIG_PPC_BOOK3S_64
  940. /*
  941. * Linux's fix_alignment() assumes that DAR is valid, so can we
  942. */
  943. return vcpu->arch.fault_dar;
  944. #else
  945. ulong dar = 0;
  946. ulong ra = get_ra(inst);
  947. ulong rb = get_rb(inst);
  948. switch (get_op(inst)) {
  949. case OP_LFS:
  950. case OP_LFD:
  951. case OP_STFD:
  952. case OP_STFS:
  953. if (ra)
  954. dar = kvmppc_get_gpr(vcpu, ra);
  955. dar += (s32)((s16)inst);
  956. break;
  957. case 31:
  958. if (ra)
  959. dar = kvmppc_get_gpr(vcpu, ra);
  960. dar += kvmppc_get_gpr(vcpu, rb);
  961. break;
  962. default:
  963. printk(KERN_INFO "KVM: Unaligned instruction 0x%x\n", inst);
  964. break;
  965. }
  966. return dar;
  967. #endif
  968. }