KVM: PPC: Only WARN on invalid emulation
[deliverable/linux.git] / arch / powerpc / kvm / powerpc.c
CommitLineData
bbf45ba5
HB
1/*
2 * This program is free software; you can redistribute it and/or modify
3 * it under the terms of the GNU General Public License, version 2, as
4 * published by the Free Software Foundation.
5 *
6 * This program is distributed in the hope that it will be useful,
7 * but WITHOUT ANY WARRANTY; without even the implied warranty of
8 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
9 * GNU General Public License for more details.
10 *
11 * You should have received a copy of the GNU General Public License
12 * along with this program; if not, write to the Free Software
13 * Foundation, 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
14 *
15 * Copyright IBM Corp. 2007
16 *
17 * Authors: Hollis Blanchard <hollisb@us.ibm.com>
18 * Christian Ehrhardt <ehrhardt@linux.vnet.ibm.com>
19 */
20
21#include <linux/errno.h>
22#include <linux/err.h>
23#include <linux/kvm_host.h>
bbf45ba5 24#include <linux/vmalloc.h>
544c6761 25#include <linux/hrtimer.h>
bbf45ba5 26#include <linux/fs.h>
5a0e3ad6 27#include <linux/slab.h>
bbf45ba5
HB
28#include <asm/cputable.h>
29#include <asm/uaccess.h>
30#include <asm/kvm_ppc.h>
83aae4a8 31#include <asm/tlbflush.h>
371fefd6 32#include <asm/cputhreads.h>
bd2be683 33#include <asm/irqflags.h>
73e75b41 34#include "timing.h"
fad7b9b5 35#include "../mm/mmu_decl.h"
bbf45ba5 36
46f43c6e
MT
37#define CREATE_TRACE_POINTS
38#include "trace.h"
39
bbf45ba5
HB
40int kvm_arch_vcpu_runnable(struct kvm_vcpu *v)
41{
9202e076 42 return !!(v->arch.pending_exceptions) ||
dfd4d47e 43 v->requests;
bbf45ba5
HB
44}
45
b6d33834
CD
46int kvm_arch_vcpu_should_kick(struct kvm_vcpu *vcpu)
47{
48 return 1;
49}
50
03d25c5b
AG
51#ifndef CONFIG_KVM_BOOK3S_64_HV
52/*
53 * Common checks before entering the guest world. Call with interrupts
54 * disabled.
55 *
7ee78855
AG
56 * returns:
57 *
58 * == 1 if we're ready to go into guest state
59 * <= 0 if we need to go back to the host with return value
03d25c5b
AG
60 */
61int kvmppc_prepare_to_enter(struct kvm_vcpu *vcpu)
62{
7ee78855 63 int r = 1;
03d25c5b
AG
64
65 WARN_ON_ONCE(!irqs_disabled());
66 while (true) {
67 if (need_resched()) {
68 local_irq_enable();
69 cond_resched();
70 local_irq_disable();
71 continue;
72 }
73
74 if (signal_pending(current)) {
7ee78855
AG
75 kvmppc_account_exit(vcpu, SIGNAL_EXITS);
76 vcpu->run->exit_reason = KVM_EXIT_INTR;
77 r = -EINTR;
03d25c5b
AG
78 break;
79 }
80
5bd1cf11
SW
81 vcpu->mode = IN_GUEST_MODE;
82
83 /*
84 * Reading vcpu->requests must happen after setting vcpu->mode,
85 * so we don't miss a request because the requester sees
86 * OUTSIDE_GUEST_MODE and assumes we'll be checking requests
87 * before next entering the guest (and thus doesn't IPI).
88 */
03d25c5b 89 smp_mb();
5bd1cf11 90
03d25c5b
AG
91 if (vcpu->requests) {
92 /* Make sure we process requests preemptable */
93 local_irq_enable();
94 trace_kvm_check_requests(vcpu);
7c973a2e 95 r = kvmppc_core_check_requests(vcpu);
03d25c5b 96 local_irq_disable();
7c973a2e
AG
97 if (r > 0)
98 continue;
99 break;
03d25c5b
AG
100 }
101
102 if (kvmppc_core_prepare_to_enter(vcpu)) {
103 /* interrupts got enabled in between, so we
104 are back at square 1 */
105 continue;
106 }
107
bd2be683
AG
108#ifdef CONFIG_PPC64
109 /* lazy EE magic */
110 hard_irq_disable();
111 if (lazy_irq_pending()) {
112 /* Got an interrupt in between, try again */
113 local_irq_enable();
114 local_irq_disable();
3766a4c6 115 kvm_guest_exit();
bd2be683
AG
116 continue;
117 }
118
119 trace_hardirqs_on();
120#endif
121
3766a4c6 122 kvm_guest_enter();
03d25c5b
AG
123 break;
124 }
125
126 return r;
127}
128#endif /* CONFIG_KVM_BOOK3S_64_HV */
129
2a342ed5
AG
130int kvmppc_kvm_pv(struct kvm_vcpu *vcpu)
131{
132 int nr = kvmppc_get_gpr(vcpu, 11);
133 int r;
134 unsigned long __maybe_unused param1 = kvmppc_get_gpr(vcpu, 3);
135 unsigned long __maybe_unused param2 = kvmppc_get_gpr(vcpu, 4);
136 unsigned long __maybe_unused param3 = kvmppc_get_gpr(vcpu, 5);
137 unsigned long __maybe_unused param4 = kvmppc_get_gpr(vcpu, 6);
138 unsigned long r2 = 0;
139
140 if (!(vcpu->arch.shared->msr & MSR_SF)) {
141 /* 32 bit mode */
142 param1 &= 0xffffffff;
143 param2 &= 0xffffffff;
144 param3 &= 0xffffffff;
145 param4 &= 0xffffffff;
146 }
147
148 switch (nr) {
fdcf8bd7 149 case KVM_HCALL_TOKEN(KVM_HC_PPC_MAP_MAGIC_PAGE):
5fc87407
AG
150 {
151 vcpu->arch.magic_page_pa = param1;
152 vcpu->arch.magic_page_ea = param2;
153
b5904972 154 r2 = KVM_MAGIC_FEAT_SR | KVM_MAGIC_FEAT_MAS0_TO_SPRG7;
7508e16c 155
fdcf8bd7 156 r = EV_SUCCESS;
5fc87407
AG
157 break;
158 }
fdcf8bd7
SY
159 case KVM_HCALL_TOKEN(KVM_HC_FEATURES):
160 r = EV_SUCCESS;
bf7ca4bd 161#if defined(CONFIG_PPC_BOOK3S) || defined(CONFIG_KVM_E500V2)
a4cd8b23 162 /* XXX Missing magic page on 44x */
5fc87407
AG
163 r2 |= (1 << KVM_FEATURE_MAGIC_PAGE);
164#endif
2a342ed5
AG
165
166 /* Second return value is in r4 */
2a342ed5 167 break;
9202e076
LYB
168 case EV_HCALL_TOKEN(EV_IDLE):
169 r = EV_SUCCESS;
170 kvm_vcpu_block(vcpu);
171 clear_bit(KVM_REQ_UNHALT, &vcpu->requests);
172 break;
2a342ed5 173 default:
fdcf8bd7 174 r = EV_UNIMPLEMENTED;
2a342ed5
AG
175 break;
176 }
177
7508e16c
AG
178 kvmppc_set_gpr(vcpu, 4, r2);
179
2a342ed5
AG
180 return r;
181}
bbf45ba5 182
af8f38b3
AG
183int kvmppc_sanity_check(struct kvm_vcpu *vcpu)
184{
185 int r = false;
186
187 /* We have to know what CPU to virtualize */
188 if (!vcpu->arch.pvr)
189 goto out;
190
191 /* PAPR only works with book3s_64 */
192 if ((vcpu->arch.cpu_type != KVM_CPU_3S_64) && vcpu->arch.papr_enabled)
193 goto out;
194
195#ifdef CONFIG_KVM_BOOK3S_64_HV
196 /* HV KVM can only do PAPR mode for now */
197 if (!vcpu->arch.papr_enabled)
198 goto out;
199#endif
200
d30f6e48
SW
201#ifdef CONFIG_KVM_BOOKE_HV
202 if (!cpu_has_feature(CPU_FTR_EMB_HV))
203 goto out;
204#endif
205
af8f38b3
AG
206 r = true;
207
208out:
209 vcpu->arch.sane = r;
210 return r ? 0 : -EINVAL;
211}
212
bbf45ba5
HB
213int kvmppc_emulate_mmio(struct kvm_run *run, struct kvm_vcpu *vcpu)
214{
215 enum emulation_result er;
216 int r;
217
218 er = kvmppc_emulate_instruction(run, vcpu);
219 switch (er) {
220 case EMULATE_DONE:
221 /* Future optimization: only reload non-volatiles if they were
222 * actually modified. */
223 r = RESUME_GUEST_NV;
224 break;
225 case EMULATE_DO_MMIO:
226 run->exit_reason = KVM_EXIT_MMIO;
227 /* We must reload nonvolatiles because "update" load/store
228 * instructions modify register state. */
229 /* Future optimization: only reload non-volatiles if they were
230 * actually modified. */
231 r = RESUME_HOST_NV;
232 break;
233 case EMULATE_FAIL:
234 /* XXX Deliver Program interrupt to guest. */
235 printk(KERN_EMERG "%s: emulation failed (%08x)\n", __func__,
c7f38f46 236 kvmppc_get_last_inst(vcpu));
bbf45ba5
HB
237 r = RESUME_HOST;
238 break;
239 default:
5a33169e
AG
240 WARN_ON(1);
241 r = RESUME_GUEST;
bbf45ba5
HB
242 }
243
244 return r;
245}
246
10474ae8 247int kvm_arch_hardware_enable(void *garbage)
bbf45ba5 248{
10474ae8 249 return 0;
bbf45ba5
HB
250}
251
252void kvm_arch_hardware_disable(void *garbage)
253{
254}
255
256int kvm_arch_hardware_setup(void)
257{
258 return 0;
259}
260
261void kvm_arch_hardware_unsetup(void)
262{
263}
264
265void kvm_arch_check_processor_compat(void *rtn)
266{
9dd921cf 267 *(int *)rtn = kvmppc_core_check_processor_compat();
bbf45ba5
HB
268}
269
e08b9637 270int kvm_arch_init_vm(struct kvm *kvm, unsigned long type)
bbf45ba5 271{
e08b9637
CO
272 if (type)
273 return -EINVAL;
274
f9e0554d 275 return kvmppc_core_init_vm(kvm);
bbf45ba5
HB
276}
277
d89f5eff 278void kvm_arch_destroy_vm(struct kvm *kvm)
bbf45ba5
HB
279{
280 unsigned int i;
988a2cae 281 struct kvm_vcpu *vcpu;
bbf45ba5 282
988a2cae
GN
283 kvm_for_each_vcpu(i, vcpu, kvm)
284 kvm_arch_vcpu_free(vcpu);
285
286 mutex_lock(&kvm->lock);
287 for (i = 0; i < atomic_read(&kvm->online_vcpus); i++)
288 kvm->vcpus[i] = NULL;
289
290 atomic_set(&kvm->online_vcpus, 0);
f9e0554d
PM
291
292 kvmppc_core_destroy_vm(kvm);
293
988a2cae 294 mutex_unlock(&kvm->lock);
bbf45ba5
HB
295}
296
ad8ba2cd
SY
297void kvm_arch_sync_events(struct kvm *kvm)
298{
299}
300
bbf45ba5
HB
301int kvm_dev_ioctl_check_extension(long ext)
302{
303 int r;
304
305 switch (ext) {
5ce941ee
SW
306#ifdef CONFIG_BOOKE
307 case KVM_CAP_PPC_BOOKE_SREGS:
f61c94bb 308 case KVM_CAP_PPC_BOOKE_WATCHDOG:
5ce941ee 309#else
e15a1137 310 case KVM_CAP_PPC_SEGSTATE:
1022fc3d 311 case KVM_CAP_PPC_HIOR:
930b412a 312 case KVM_CAP_PPC_PAPR:
5ce941ee 313#endif
18978768 314 case KVM_CAP_PPC_UNSET_IRQ:
7b4203e8 315 case KVM_CAP_PPC_IRQ_LEVEL:
71fbfd5f 316 case KVM_CAP_ENABLE_CAP:
e24ed81f 317 case KVM_CAP_ONE_REG:
0e673fb6 318 case KVM_CAP_IOEVENTFD:
de56a948
PM
319 r = 1;
320 break;
321#ifndef CONFIG_KVM_BOOK3S_64_HV
322 case KVM_CAP_PPC_PAIRED_SINGLES:
ad0a048b 323 case KVM_CAP_PPC_OSI:
15711e9c 324 case KVM_CAP_PPC_GET_PVINFO:
bf7ca4bd 325#if defined(CONFIG_KVM_E500V2) || defined(CONFIG_KVM_E500MC)
dc83b8bc
SW
326 case KVM_CAP_SW_TLB:
327#endif
e15a1137
AG
328 r = 1;
329 break;
588968b6
LV
330 case KVM_CAP_COALESCED_MMIO:
331 r = KVM_COALESCED_MMIO_PAGE_OFFSET;
332 break;
54738c09 333#endif
f31e65e1 334#ifdef CONFIG_PPC_BOOK3S_64
54738c09 335 case KVM_CAP_SPAPR_TCE:
32fad281 336 case KVM_CAP_PPC_ALLOC_HTAB:
54738c09
DG
337 r = 1;
338 break;
f31e65e1
BH
339#endif /* CONFIG_PPC_BOOK3S_64 */
340#ifdef CONFIG_KVM_BOOK3S_64_HV
371fefd6
PM
341 case KVM_CAP_PPC_SMT:
342 r = threads_per_core;
343 break;
aa04b4cc
PM
344 case KVM_CAP_PPC_RMA:
345 r = 1;
9e368f29
PM
346 /* PPC970 requires an RMA */
347 if (cpu_has_feature(CPU_FTR_ARCH_201))
348 r = 2;
aa04b4cc 349 break;
f4800b1f 350#endif
342d3db7 351 case KVM_CAP_SYNC_MMU:
f4800b1f 352#ifdef CONFIG_KVM_BOOK3S_64_HV
342d3db7 353 r = cpu_has_feature(CPU_FTR_ARCH_206) ? 1 : 0;
f4800b1f
AG
354#elif defined(KVM_ARCH_WANT_MMU_NOTIFIER)
355 r = 1;
356#else
357 r = 0;
a2932923
PM
358 break;
359#endif
360#ifdef CONFIG_KVM_BOOK3S_64_HV
361 case KVM_CAP_PPC_HTAB_FD:
362 r = 1;
363 break;
de56a948 364#endif
f4800b1f 365 break;
b5434032
ME
366 case KVM_CAP_NR_VCPUS:
367 /*
368 * Recommending a number of CPUs is somewhat arbitrary; we
369 * return the number of present CPUs for -HV (since a host
370 * will have secondary threads "offline"), and for other KVM
371 * implementations just count online CPUs.
372 */
373#ifdef CONFIG_KVM_BOOK3S_64_HV
374 r = num_present_cpus();
375#else
376 r = num_online_cpus();
377#endif
378 break;
379 case KVM_CAP_MAX_VCPUS:
380 r = KVM_MAX_VCPUS;
381 break;
5b74716e
BH
382#ifdef CONFIG_PPC_BOOK3S_64
383 case KVM_CAP_PPC_GET_SMMU_INFO:
384 r = 1;
385 break;
386#endif
bbf45ba5
HB
387 default:
388 r = 0;
389 break;
390 }
391 return r;
392
393}
394
395long kvm_arch_dev_ioctl(struct file *filp,
396 unsigned int ioctl, unsigned long arg)
397{
398 return -EINVAL;
399}
400
db3fe4eb
TY
401void kvm_arch_free_memslot(struct kvm_memory_slot *free,
402 struct kvm_memory_slot *dont)
403{
a66b48c3 404 kvmppc_core_free_memslot(free, dont);
db3fe4eb
TY
405}
406
407int kvm_arch_create_memslot(struct kvm_memory_slot *slot, unsigned long npages)
408{
a66b48c3 409 return kvmppc_core_create_memslot(slot, npages);
db3fe4eb
TY
410}
411
f7784b8e
MT
412int kvm_arch_prepare_memory_region(struct kvm *kvm,
413 struct kvm_memory_slot *memslot,
414 struct kvm_memory_slot old,
415 struct kvm_userspace_memory_region *mem,
f82a8cfe 416 bool user_alloc)
bbf45ba5 417{
a66b48c3 418 return kvmppc_core_prepare_memory_region(kvm, memslot, mem);
bbf45ba5
HB
419}
420
f7784b8e
MT
421void kvm_arch_commit_memory_region(struct kvm *kvm,
422 struct kvm_userspace_memory_region *mem,
423 struct kvm_memory_slot old,
f82a8cfe 424 bool user_alloc)
f7784b8e 425{
dfe49dbd 426 kvmppc_core_commit_memory_region(kvm, mem, old);
f7784b8e
MT
427}
428
2df72e9b
MT
429void kvm_arch_flush_shadow_all(struct kvm *kvm)
430{
431}
f7784b8e 432
2df72e9b
MT
433void kvm_arch_flush_shadow_memslot(struct kvm *kvm,
434 struct kvm_memory_slot *slot)
34d4cb8f 435{
dfe49dbd 436 kvmppc_core_flush_memslot(kvm, slot);
34d4cb8f
MT
437}
438
bbf45ba5
HB
439struct kvm_vcpu *kvm_arch_vcpu_create(struct kvm *kvm, unsigned int id)
440{
73e75b41
HB
441 struct kvm_vcpu *vcpu;
442 vcpu = kvmppc_core_vcpu_create(kvm, id);
03cdab53
ME
443 if (!IS_ERR(vcpu)) {
444 vcpu->arch.wqp = &vcpu->wq;
06056bfb 445 kvmppc_create_vcpu_debugfs(vcpu, id);
03cdab53 446 }
73e75b41 447 return vcpu;
bbf45ba5
HB
448}
449
42897d86
MT
450int kvm_arch_vcpu_postcreate(struct kvm_vcpu *vcpu)
451{
452 return 0;
453}
454
bbf45ba5
HB
455void kvm_arch_vcpu_free(struct kvm_vcpu *vcpu)
456{
a595405d
AG
457 /* Make sure we're not using the vcpu anymore */
458 hrtimer_cancel(&vcpu->arch.dec_timer);
459 tasklet_kill(&vcpu->arch.tasklet);
460
73e75b41 461 kvmppc_remove_vcpu_debugfs(vcpu);
db93f574 462 kvmppc_core_vcpu_free(vcpu);
bbf45ba5
HB
463}
464
465void kvm_arch_vcpu_destroy(struct kvm_vcpu *vcpu)
466{
467 kvm_arch_vcpu_free(vcpu);
468}
469
470int kvm_cpu_has_pending_timer(struct kvm_vcpu *vcpu)
471{
9dd921cf 472 return kvmppc_core_pending_dec(vcpu);
bbf45ba5
HB
473}
474
544c6761
AG
475/*
476 * low level hrtimer wake routine. Because this runs in hardirq context
477 * we schedule a tasklet to do the real work.
478 */
479enum hrtimer_restart kvmppc_decrementer_wakeup(struct hrtimer *timer)
480{
481 struct kvm_vcpu *vcpu;
482
483 vcpu = container_of(timer, struct kvm_vcpu, arch.dec_timer);
484 tasklet_schedule(&vcpu->arch.tasklet);
485
486 return HRTIMER_NORESTART;
487}
488
bbf45ba5
HB
489int kvm_arch_vcpu_init(struct kvm_vcpu *vcpu)
490{
f61c94bb
BB
491 int ret;
492
544c6761
AG
493 hrtimer_init(&vcpu->arch.dec_timer, CLOCK_REALTIME, HRTIMER_MODE_ABS);
494 tasklet_init(&vcpu->arch.tasklet, kvmppc_decrementer_func, (ulong)vcpu);
495 vcpu->arch.dec_timer.function = kvmppc_decrementer_wakeup;
de56a948 496 vcpu->arch.dec_expires = ~(u64)0;
bbf45ba5 497
09000adb
BB
498#ifdef CONFIG_KVM_EXIT_TIMING
499 mutex_init(&vcpu->arch.exit_timing_lock);
500#endif
f61c94bb
BB
501 ret = kvmppc_subarch_vcpu_init(vcpu);
502 return ret;
bbf45ba5
HB
503}
504
505void kvm_arch_vcpu_uninit(struct kvm_vcpu *vcpu)
506{
ecc0981f 507 kvmppc_mmu_destroy(vcpu);
f61c94bb 508 kvmppc_subarch_vcpu_uninit(vcpu);
bbf45ba5
HB
509}
510
511void kvm_arch_vcpu_load(struct kvm_vcpu *vcpu, int cpu)
512{
eab17672
SW
513#ifdef CONFIG_BOOKE
514 /*
515 * vrsave (formerly usprg0) isn't used by Linux, but may
516 * be used by the guest.
517 *
518 * On non-booke this is associated with Altivec and
519 * is handled by code in book3s.c.
520 */
521 mtspr(SPRN_VRSAVE, vcpu->arch.vrsave);
522#endif
9dd921cf 523 kvmppc_core_vcpu_load(vcpu, cpu);
bbf45ba5
HB
524}
525
526void kvm_arch_vcpu_put(struct kvm_vcpu *vcpu)
527{
9dd921cf 528 kvmppc_core_vcpu_put(vcpu);
eab17672
SW
529#ifdef CONFIG_BOOKE
530 vcpu->arch.vrsave = mfspr(SPRN_VRSAVE);
531#endif
bbf45ba5
HB
532}
533
d0bfb940 534int kvm_arch_vcpu_ioctl_set_guest_debug(struct kvm_vcpu *vcpu,
f5d0906b 535 struct kvm_guest_debug *dbg)
bbf45ba5 536{
f5d0906b 537 return -EINVAL;
bbf45ba5
HB
538}
539
540static void kvmppc_complete_dcr_load(struct kvm_vcpu *vcpu,
541 struct kvm_run *run)
542{
8e5b26b5 543 kvmppc_set_gpr(vcpu, vcpu->arch.io_gpr, run->dcr.data);
bbf45ba5
HB
544}
545
546static void kvmppc_complete_mmio_load(struct kvm_vcpu *vcpu,
547 struct kvm_run *run)
548{
69b61833 549 u64 uninitialized_var(gpr);
bbf45ba5 550
8e5b26b5 551 if (run->mmio.len > sizeof(gpr)) {
bbf45ba5
HB
552 printk(KERN_ERR "bad MMIO length: %d\n", run->mmio.len);
553 return;
554 }
555
556 if (vcpu->arch.mmio_is_bigendian) {
557 switch (run->mmio.len) {
b104d066 558 case 8: gpr = *(u64 *)run->mmio.data; break;
8e5b26b5
AG
559 case 4: gpr = *(u32 *)run->mmio.data; break;
560 case 2: gpr = *(u16 *)run->mmio.data; break;
561 case 1: gpr = *(u8 *)run->mmio.data; break;
bbf45ba5
HB
562 }
563 } else {
564 /* Convert BE data from userland back to LE. */
565 switch (run->mmio.len) {
8e5b26b5
AG
566 case 4: gpr = ld_le32((u32 *)run->mmio.data); break;
567 case 2: gpr = ld_le16((u16 *)run->mmio.data); break;
568 case 1: gpr = *(u8 *)run->mmio.data; break;
bbf45ba5
HB
569 }
570 }
8e5b26b5 571
3587d534
AG
572 if (vcpu->arch.mmio_sign_extend) {
573 switch (run->mmio.len) {
574#ifdef CONFIG_PPC64
575 case 4:
576 gpr = (s64)(s32)gpr;
577 break;
578#endif
579 case 2:
580 gpr = (s64)(s16)gpr;
581 break;
582 case 1:
583 gpr = (s64)(s8)gpr;
584 break;
585 }
586 }
587
8e5b26b5 588 kvmppc_set_gpr(vcpu, vcpu->arch.io_gpr, gpr);
b104d066 589
b3c5d3c2
AG
590 switch (vcpu->arch.io_gpr & KVM_MMIO_REG_EXT_MASK) {
591 case KVM_MMIO_REG_GPR:
b104d066
AG
592 kvmppc_set_gpr(vcpu, vcpu->arch.io_gpr, gpr);
593 break;
b3c5d3c2
AG
594 case KVM_MMIO_REG_FPR:
595 vcpu->arch.fpr[vcpu->arch.io_gpr & KVM_MMIO_REG_MASK] = gpr;
b104d066 596 break;
287d5611 597#ifdef CONFIG_PPC_BOOK3S
b3c5d3c2
AG
598 case KVM_MMIO_REG_QPR:
599 vcpu->arch.qpr[vcpu->arch.io_gpr & KVM_MMIO_REG_MASK] = gpr;
b104d066 600 break;
b3c5d3c2
AG
601 case KVM_MMIO_REG_FQPR:
602 vcpu->arch.fpr[vcpu->arch.io_gpr & KVM_MMIO_REG_MASK] = gpr;
603 vcpu->arch.qpr[vcpu->arch.io_gpr & KVM_MMIO_REG_MASK] = gpr;
b104d066 604 break;
287d5611 605#endif
b104d066
AG
606 default:
607 BUG();
608 }
bbf45ba5
HB
609}
610
611int kvmppc_handle_load(struct kvm_run *run, struct kvm_vcpu *vcpu,
612 unsigned int rt, unsigned int bytes, int is_bigendian)
613{
614 if (bytes > sizeof(run->mmio.data)) {
615 printk(KERN_ERR "%s: bad MMIO length: %d\n", __func__,
616 run->mmio.len);
617 }
618
619 run->mmio.phys_addr = vcpu->arch.paddr_accessed;
620 run->mmio.len = bytes;
621 run->mmio.is_write = 0;
622
623 vcpu->arch.io_gpr = rt;
624 vcpu->arch.mmio_is_bigendian = is_bigendian;
625 vcpu->mmio_needed = 1;
626 vcpu->mmio_is_write = 0;
3587d534 627 vcpu->arch.mmio_sign_extend = 0;
bbf45ba5 628
0e673fb6
AG
629 if (!kvm_io_bus_read(vcpu->kvm, KVM_MMIO_BUS, run->mmio.phys_addr,
630 bytes, &run->mmio.data)) {
631 kvmppc_complete_mmio_load(vcpu, run);
632 vcpu->mmio_needed = 0;
633 return EMULATE_DONE;
634 }
635
bbf45ba5
HB
636 return EMULATE_DO_MMIO;
637}
638
3587d534
AG
639/* Same as above, but sign extends */
640int kvmppc_handle_loads(struct kvm_run *run, struct kvm_vcpu *vcpu,
641 unsigned int rt, unsigned int bytes, int is_bigendian)
642{
643 int r;
644
3587d534 645 vcpu->arch.mmio_sign_extend = 1;
0e673fb6 646 r = kvmppc_handle_load(run, vcpu, rt, bytes, is_bigendian);
3587d534
AG
647
648 return r;
649}
650
bbf45ba5 651int kvmppc_handle_store(struct kvm_run *run, struct kvm_vcpu *vcpu,
b104d066 652 u64 val, unsigned int bytes, int is_bigendian)
bbf45ba5
HB
653{
654 void *data = run->mmio.data;
655
656 if (bytes > sizeof(run->mmio.data)) {
657 printk(KERN_ERR "%s: bad MMIO length: %d\n", __func__,
658 run->mmio.len);
659 }
660
661 run->mmio.phys_addr = vcpu->arch.paddr_accessed;
662 run->mmio.len = bytes;
663 run->mmio.is_write = 1;
664 vcpu->mmio_needed = 1;
665 vcpu->mmio_is_write = 1;
666
667 /* Store the value at the lowest bytes in 'data'. */
668 if (is_bigendian) {
669 switch (bytes) {
b104d066 670 case 8: *(u64 *)data = val; break;
bbf45ba5
HB
671 case 4: *(u32 *)data = val; break;
672 case 2: *(u16 *)data = val; break;
673 case 1: *(u8 *)data = val; break;
674 }
675 } else {
676 /* Store LE value into 'data'. */
677 switch (bytes) {
678 case 4: st_le32(data, val); break;
679 case 2: st_le16(data, val); break;
680 case 1: *(u8 *)data = val; break;
681 }
682 }
683
0e673fb6
AG
684 if (!kvm_io_bus_write(vcpu->kvm, KVM_MMIO_BUS, run->mmio.phys_addr,
685 bytes, &run->mmio.data)) {
686 kvmppc_complete_mmio_load(vcpu, run);
687 vcpu->mmio_needed = 0;
688 return EMULATE_DONE;
689 }
690
bbf45ba5
HB
691 return EMULATE_DO_MMIO;
692}
693
694int kvm_arch_vcpu_ioctl_run(struct kvm_vcpu *vcpu, struct kvm_run *run)
695{
696 int r;
697 sigset_t sigsaved;
698
699 if (vcpu->sigset_active)
700 sigprocmask(SIG_SETMASK, &vcpu->sigset, &sigsaved);
701
702 if (vcpu->mmio_needed) {
703 if (!vcpu->mmio_is_write)
704 kvmppc_complete_mmio_load(vcpu, run);
705 vcpu->mmio_needed = 0;
706 } else if (vcpu->arch.dcr_needed) {
707 if (!vcpu->arch.dcr_is_write)
708 kvmppc_complete_dcr_load(vcpu, run);
709 vcpu->arch.dcr_needed = 0;
ad0a048b
AG
710 } else if (vcpu->arch.osi_needed) {
711 u64 *gprs = run->osi.gprs;
712 int i;
713
714 for (i = 0; i < 32; i++)
715 kvmppc_set_gpr(vcpu, i, gprs[i]);
716 vcpu->arch.osi_needed = 0;
de56a948
PM
717 } else if (vcpu->arch.hcall_needed) {
718 int i;
719
720 kvmppc_set_gpr(vcpu, 3, run->papr_hcall.ret);
721 for (i = 0; i < 9; ++i)
722 kvmppc_set_gpr(vcpu, 4 + i, run->papr_hcall.args[i]);
723 vcpu->arch.hcall_needed = 0;
bbf45ba5
HB
724 }
725
df6909e5 726 r = kvmppc_vcpu_run(run, vcpu);
bbf45ba5
HB
727
728 if (vcpu->sigset_active)
729 sigprocmask(SIG_SETMASK, &sigsaved, NULL);
730
731 return r;
732}
733
734int kvm_vcpu_ioctl_interrupt(struct kvm_vcpu *vcpu, struct kvm_interrupt *irq)
735{
19ccb76a 736 if (irq->irq == KVM_INTERRUPT_UNSET) {
18978768 737 kvmppc_core_dequeue_external(vcpu, irq);
19ccb76a
PM
738 return 0;
739 }
740
741 kvmppc_core_queue_external(vcpu, irq);
b6d33834 742
dfd4d47e 743 kvm_vcpu_kick(vcpu);
45c5eb67 744
bbf45ba5
HB
745 return 0;
746}
747
71fbfd5f
AG
748static int kvm_vcpu_ioctl_enable_cap(struct kvm_vcpu *vcpu,
749 struct kvm_enable_cap *cap)
750{
751 int r;
752
753 if (cap->flags)
754 return -EINVAL;
755
756 switch (cap->cap) {
ad0a048b
AG
757 case KVM_CAP_PPC_OSI:
758 r = 0;
759 vcpu->arch.osi_enabled = true;
760 break;
930b412a
AG
761 case KVM_CAP_PPC_PAPR:
762 r = 0;
763 vcpu->arch.papr_enabled = true;
764 break;
f61c94bb
BB
765#ifdef CONFIG_BOOKE
766 case KVM_CAP_PPC_BOOKE_WATCHDOG:
767 r = 0;
768 vcpu->arch.watchdog_enabled = true;
769 break;
770#endif
bf7ca4bd 771#if defined(CONFIG_KVM_E500V2) || defined(CONFIG_KVM_E500MC)
dc83b8bc
SW
772 case KVM_CAP_SW_TLB: {
773 struct kvm_config_tlb cfg;
774 void __user *user_ptr = (void __user *)(uintptr_t)cap->args[0];
775
776 r = -EFAULT;
777 if (copy_from_user(&cfg, user_ptr, sizeof(cfg)))
778 break;
779
780 r = kvm_vcpu_ioctl_config_tlb(vcpu, &cfg);
781 break;
782 }
783#endif
71fbfd5f
AG
784 default:
785 r = -EINVAL;
786 break;
787 }
788
af8f38b3
AG
789 if (!r)
790 r = kvmppc_sanity_check(vcpu);
791
71fbfd5f
AG
792 return r;
793}
794
bbf45ba5
HB
795int kvm_arch_vcpu_ioctl_get_mpstate(struct kvm_vcpu *vcpu,
796 struct kvm_mp_state *mp_state)
797{
798 return -EINVAL;
799}
800
801int kvm_arch_vcpu_ioctl_set_mpstate(struct kvm_vcpu *vcpu,
802 struct kvm_mp_state *mp_state)
803{
804 return -EINVAL;
805}
806
807long kvm_arch_vcpu_ioctl(struct file *filp,
808 unsigned int ioctl, unsigned long arg)
809{
810 struct kvm_vcpu *vcpu = filp->private_data;
811 void __user *argp = (void __user *)arg;
812 long r;
813
93736624
AK
814 switch (ioctl) {
815 case KVM_INTERRUPT: {
bbf45ba5
HB
816 struct kvm_interrupt irq;
817 r = -EFAULT;
818 if (copy_from_user(&irq, argp, sizeof(irq)))
93736624 819 goto out;
bbf45ba5 820 r = kvm_vcpu_ioctl_interrupt(vcpu, &irq);
93736624 821 goto out;
bbf45ba5 822 }
19483d14 823
71fbfd5f
AG
824 case KVM_ENABLE_CAP:
825 {
826 struct kvm_enable_cap cap;
827 r = -EFAULT;
828 if (copy_from_user(&cap, argp, sizeof(cap)))
829 goto out;
830 r = kvm_vcpu_ioctl_enable_cap(vcpu, &cap);
831 break;
832 }
dc83b8bc 833
e24ed81f
AG
834 case KVM_SET_ONE_REG:
835 case KVM_GET_ONE_REG:
836 {
837 struct kvm_one_reg reg;
838 r = -EFAULT;
839 if (copy_from_user(&reg, argp, sizeof(reg)))
840 goto out;
841 if (ioctl == KVM_SET_ONE_REG)
842 r = kvm_vcpu_ioctl_set_one_reg(vcpu, &reg);
843 else
844 r = kvm_vcpu_ioctl_get_one_reg(vcpu, &reg);
845 break;
846 }
847
bf7ca4bd 848#if defined(CONFIG_KVM_E500V2) || defined(CONFIG_KVM_E500MC)
dc83b8bc
SW
849 case KVM_DIRTY_TLB: {
850 struct kvm_dirty_tlb dirty;
851 r = -EFAULT;
852 if (copy_from_user(&dirty, argp, sizeof(dirty)))
853 goto out;
854 r = kvm_vcpu_ioctl_dirty_tlb(vcpu, &dirty);
855 break;
856 }
857#endif
bbf45ba5
HB
858 default:
859 r = -EINVAL;
860 }
861
862out:
863 return r;
864}
865
5b1c1493
CO
866int kvm_arch_vcpu_fault(struct kvm_vcpu *vcpu, struct vm_fault *vmf)
867{
868 return VM_FAULT_SIGBUS;
869}
870
15711e9c
AG
871static int kvm_vm_ioctl_get_pvinfo(struct kvm_ppc_pvinfo *pvinfo)
872{
784bafac
SY
873 u32 inst_nop = 0x60000000;
874#ifdef CONFIG_KVM_BOOKE_HV
875 u32 inst_sc1 = 0x44000022;
876 pvinfo->hcall[0] = inst_sc1;
877 pvinfo->hcall[1] = inst_nop;
878 pvinfo->hcall[2] = inst_nop;
879 pvinfo->hcall[3] = inst_nop;
880#else
15711e9c
AG
881 u32 inst_lis = 0x3c000000;
882 u32 inst_ori = 0x60000000;
15711e9c
AG
883 u32 inst_sc = 0x44000002;
884 u32 inst_imm_mask = 0xffff;
885
886 /*
887 * The hypercall to get into KVM from within guest context is as
888 * follows:
889 *
890 * lis r0, r0, KVM_SC_MAGIC_R0@h
891 * ori r0, KVM_SC_MAGIC_R0@l
892 * sc
893 * nop
894 */
895 pvinfo->hcall[0] = inst_lis | ((KVM_SC_MAGIC_R0 >> 16) & inst_imm_mask);
896 pvinfo->hcall[1] = inst_ori | (KVM_SC_MAGIC_R0 & inst_imm_mask);
897 pvinfo->hcall[2] = inst_sc;
898 pvinfo->hcall[3] = inst_nop;
784bafac 899#endif
15711e9c 900
9202e076
LYB
901 pvinfo->flags = KVM_PPC_PVINFO_FLAGS_EV_IDLE;
902
15711e9c
AG
903 return 0;
904}
905
bbf45ba5
HB
906long kvm_arch_vm_ioctl(struct file *filp,
907 unsigned int ioctl, unsigned long arg)
908{
15711e9c 909 void __user *argp = (void __user *)arg;
bbf45ba5
HB
910 long r;
911
912 switch (ioctl) {
15711e9c
AG
913 case KVM_PPC_GET_PVINFO: {
914 struct kvm_ppc_pvinfo pvinfo;
d8cdddcd 915 memset(&pvinfo, 0, sizeof(pvinfo));
15711e9c
AG
916 r = kvm_vm_ioctl_get_pvinfo(&pvinfo);
917 if (copy_to_user(argp, &pvinfo, sizeof(pvinfo))) {
918 r = -EFAULT;
919 goto out;
920 }
921
922 break;
923 }
f31e65e1 924#ifdef CONFIG_PPC_BOOK3S_64
54738c09
DG
925 case KVM_CREATE_SPAPR_TCE: {
926 struct kvm_create_spapr_tce create_tce;
927 struct kvm *kvm = filp->private_data;
928
929 r = -EFAULT;
930 if (copy_from_user(&create_tce, argp, sizeof(create_tce)))
931 goto out;
932 r = kvm_vm_ioctl_create_spapr_tce(kvm, &create_tce);
933 goto out;
934 }
f31e65e1 935#endif /* CONFIG_PPC_BOOK3S_64 */
aa04b4cc 936
f31e65e1 937#ifdef CONFIG_KVM_BOOK3S_64_HV
aa04b4cc
PM
938 case KVM_ALLOCATE_RMA: {
939 struct kvm *kvm = filp->private_data;
940 struct kvm_allocate_rma rma;
941
942 r = kvm_vm_ioctl_allocate_rma(kvm, &rma);
943 if (r >= 0 && copy_to_user(argp, &rma, sizeof(rma)))
944 r = -EFAULT;
945 break;
946 }
32fad281
PM
947
948 case KVM_PPC_ALLOCATE_HTAB: {
949 struct kvm *kvm = filp->private_data;
950 u32 htab_order;
951
952 r = -EFAULT;
953 if (get_user(htab_order, (u32 __user *)argp))
954 break;
955 r = kvmppc_alloc_reset_hpt(kvm, &htab_order);
956 if (r)
957 break;
958 r = -EFAULT;
959 if (put_user(htab_order, (u32 __user *)argp))
960 break;
961 r = 0;
962 break;
963 }
a2932923
PM
964
965 case KVM_PPC_GET_HTAB_FD: {
966 struct kvm *kvm = filp->private_data;
967 struct kvm_get_htab_fd ghf;
968
969 r = -EFAULT;
970 if (copy_from_user(&ghf, argp, sizeof(ghf)))
971 break;
972 r = kvm_vm_ioctl_get_htab_fd(kvm, &ghf);
973 break;
974 }
54738c09
DG
975#endif /* CONFIG_KVM_BOOK3S_64_HV */
976
5b74716e
BH
977#ifdef CONFIG_PPC_BOOK3S_64
978 case KVM_PPC_GET_SMMU_INFO: {
979 struct kvm *kvm = filp->private_data;
980 struct kvm_ppc_smmu_info info;
981
982 memset(&info, 0, sizeof(info));
983 r = kvm_vm_ioctl_get_smmu_info(kvm, &info);
984 if (r >= 0 && copy_to_user(argp, &info, sizeof(info)))
985 r = -EFAULT;
986 break;
987 }
988#endif /* CONFIG_PPC_BOOK3S_64 */
bbf45ba5 989 default:
367e1319 990 r = -ENOTTY;
bbf45ba5
HB
991 }
992
15711e9c 993out:
bbf45ba5
HB
994 return r;
995}
996
043cc4d7
SW
997static unsigned long lpid_inuse[BITS_TO_LONGS(KVMPPC_NR_LPIDS)];
998static unsigned long nr_lpids;
999
1000long kvmppc_alloc_lpid(void)
1001{
1002 long lpid;
1003
1004 do {
1005 lpid = find_first_zero_bit(lpid_inuse, KVMPPC_NR_LPIDS);
1006 if (lpid >= nr_lpids) {
1007 pr_err("%s: No LPIDs free\n", __func__);
1008 return -ENOMEM;
1009 }
1010 } while (test_and_set_bit(lpid, lpid_inuse));
1011
1012 return lpid;
1013}
1014
1015void kvmppc_claim_lpid(long lpid)
1016{
1017 set_bit(lpid, lpid_inuse);
1018}
1019
1020void kvmppc_free_lpid(long lpid)
1021{
1022 clear_bit(lpid, lpid_inuse);
1023}
1024
1025void kvmppc_init_lpid(unsigned long nr_lpids_param)
1026{
1027 nr_lpids = min_t(unsigned long, KVMPPC_NR_LPIDS, nr_lpids_param);
1028 memset(lpid_inuse, 0, sizeof(lpid_inuse));
1029}
1030
bbf45ba5
HB
1031int kvm_arch_init(void *opaque)
1032{
1033 return 0;
1034}
1035
1036void kvm_arch_exit(void)
1037{
1038}
This page took 0.497837 seconds and 5 git commands to generate.