]> git.proxmox.com Git - mirror_ubuntu-zesty-kernel.git/blame - arch/powerpc/kvm/powerpc.c
KVM: PPC: Fix SREGS documentation reference
[mirror_ubuntu-zesty-kernel.git] / arch / powerpc / kvm / powerpc.c
CommitLineData
bbf45ba5
HB
1/*
2 * This program is free software; you can redistribute it and/or modify
3 * it under the terms of the GNU General Public License, version 2, as
4 * published by the Free Software Foundation.
5 *
6 * This program is distributed in the hope that it will be useful,
7 * but WITHOUT ANY WARRANTY; without even the implied warranty of
8 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
9 * GNU General Public License for more details.
10 *
11 * You should have received a copy of the GNU General Public License
12 * along with this program; if not, write to the Free Software
13 * Foundation, 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
14 *
15 * Copyright IBM Corp. 2007
16 *
17 * Authors: Hollis Blanchard <hollisb@us.ibm.com>
18 * Christian Ehrhardt <ehrhardt@linux.vnet.ibm.com>
19 */
20
21#include <linux/errno.h>
22#include <linux/err.h>
23#include <linux/kvm_host.h>
bbf45ba5 24#include <linux/vmalloc.h>
544c6761 25#include <linux/hrtimer.h>
bbf45ba5 26#include <linux/fs.h>
5a0e3ad6 27#include <linux/slab.h>
bbf45ba5
HB
28#include <asm/cputable.h>
29#include <asm/uaccess.h>
30#include <asm/kvm_ppc.h>
83aae4a8 31#include <asm/tlbflush.h>
371fefd6 32#include <asm/cputhreads.h>
bd2be683 33#include <asm/irqflags.h>
73e75b41 34#include "timing.h"
fad7b9b5 35#include "../mm/mmu_decl.h"
bbf45ba5 36
46f43c6e
MT
37#define CREATE_TRACE_POINTS
38#include "trace.h"
39
bbf45ba5
HB
40int kvm_arch_vcpu_runnable(struct kvm_vcpu *v)
41{
9202e076 42 return !!(v->arch.pending_exceptions) ||
dfd4d47e 43 v->requests;
bbf45ba5
HB
44}
45
b6d33834
CD
46int kvm_arch_vcpu_should_kick(struct kvm_vcpu *vcpu)
47{
48 return 1;
49}
50
03d25c5b
AG
51#ifndef CONFIG_KVM_BOOK3S_64_HV
52/*
53 * Common checks before entering the guest world. Call with interrupts
54 * disabled.
55 *
7ee78855
AG
56 * returns:
57 *
58 * == 1 if we're ready to go into guest state
59 * <= 0 if we need to go back to the host with return value
03d25c5b
AG
60 */
61int kvmppc_prepare_to_enter(struct kvm_vcpu *vcpu)
62{
7ee78855 63 int r = 1;
03d25c5b
AG
64
65 WARN_ON_ONCE(!irqs_disabled());
66 while (true) {
67 if (need_resched()) {
68 local_irq_enable();
69 cond_resched();
70 local_irq_disable();
71 continue;
72 }
73
74 if (signal_pending(current)) {
7ee78855
AG
75 kvmppc_account_exit(vcpu, SIGNAL_EXITS);
76 vcpu->run->exit_reason = KVM_EXIT_INTR;
77 r = -EINTR;
03d25c5b
AG
78 break;
79 }
80
5bd1cf11
SW
81 vcpu->mode = IN_GUEST_MODE;
82
83 /*
84 * Reading vcpu->requests must happen after setting vcpu->mode,
85 * so we don't miss a request because the requester sees
86 * OUTSIDE_GUEST_MODE and assumes we'll be checking requests
87 * before next entering the guest (and thus doesn't IPI).
88 */
03d25c5b 89 smp_mb();
5bd1cf11 90
03d25c5b
AG
91 if (vcpu->requests) {
92 /* Make sure we process requests preemptable */
93 local_irq_enable();
94 trace_kvm_check_requests(vcpu);
7c973a2e 95 r = kvmppc_core_check_requests(vcpu);
03d25c5b 96 local_irq_disable();
7c973a2e
AG
97 if (r > 0)
98 continue;
99 break;
03d25c5b
AG
100 }
101
102 if (kvmppc_core_prepare_to_enter(vcpu)) {
103 /* interrupts got enabled in between, so we
104 are back at square 1 */
105 continue;
106 }
107
bd2be683
AG
108#ifdef CONFIG_PPC64
109 /* lazy EE magic */
110 hard_irq_disable();
111 if (lazy_irq_pending()) {
112 /* Got an interrupt in between, try again */
113 local_irq_enable();
114 local_irq_disable();
3766a4c6 115 kvm_guest_exit();
bd2be683
AG
116 continue;
117 }
118
119 trace_hardirqs_on();
120#endif
121
3766a4c6 122 kvm_guest_enter();
03d25c5b
AG
123 break;
124 }
125
126 return r;
127}
128#endif /* CONFIG_KVM_BOOK3S_64_HV */
129
2a342ed5
AG
130int kvmppc_kvm_pv(struct kvm_vcpu *vcpu)
131{
132 int nr = kvmppc_get_gpr(vcpu, 11);
133 int r;
134 unsigned long __maybe_unused param1 = kvmppc_get_gpr(vcpu, 3);
135 unsigned long __maybe_unused param2 = kvmppc_get_gpr(vcpu, 4);
136 unsigned long __maybe_unused param3 = kvmppc_get_gpr(vcpu, 5);
137 unsigned long __maybe_unused param4 = kvmppc_get_gpr(vcpu, 6);
138 unsigned long r2 = 0;
139
140 if (!(vcpu->arch.shared->msr & MSR_SF)) {
141 /* 32 bit mode */
142 param1 &= 0xffffffff;
143 param2 &= 0xffffffff;
144 param3 &= 0xffffffff;
145 param4 &= 0xffffffff;
146 }
147
148 switch (nr) {
fdcf8bd7 149 case KVM_HCALL_TOKEN(KVM_HC_PPC_MAP_MAGIC_PAGE):
5fc87407
AG
150 {
151 vcpu->arch.magic_page_pa = param1;
152 vcpu->arch.magic_page_ea = param2;
153
b5904972 154 r2 = KVM_MAGIC_FEAT_SR | KVM_MAGIC_FEAT_MAS0_TO_SPRG7;
7508e16c 155
fdcf8bd7 156 r = EV_SUCCESS;
5fc87407
AG
157 break;
158 }
fdcf8bd7
SY
159 case KVM_HCALL_TOKEN(KVM_HC_FEATURES):
160 r = EV_SUCCESS;
bf7ca4bd 161#if defined(CONFIG_PPC_BOOK3S) || defined(CONFIG_KVM_E500V2)
a4cd8b23 162 /* XXX Missing magic page on 44x */
5fc87407
AG
163 r2 |= (1 << KVM_FEATURE_MAGIC_PAGE);
164#endif
2a342ed5
AG
165
166 /* Second return value is in r4 */
2a342ed5 167 break;
9202e076
LYB
168 case EV_HCALL_TOKEN(EV_IDLE):
169 r = EV_SUCCESS;
170 kvm_vcpu_block(vcpu);
171 clear_bit(KVM_REQ_UNHALT, &vcpu->requests);
172 break;
2a342ed5 173 default:
fdcf8bd7 174 r = EV_UNIMPLEMENTED;
2a342ed5
AG
175 break;
176 }
177
7508e16c
AG
178 kvmppc_set_gpr(vcpu, 4, r2);
179
2a342ed5
AG
180 return r;
181}
bbf45ba5 182
af8f38b3
AG
183int kvmppc_sanity_check(struct kvm_vcpu *vcpu)
184{
185 int r = false;
186
187 /* We have to know what CPU to virtualize */
188 if (!vcpu->arch.pvr)
189 goto out;
190
191 /* PAPR only works with book3s_64 */
192 if ((vcpu->arch.cpu_type != KVM_CPU_3S_64) && vcpu->arch.papr_enabled)
193 goto out;
194
195#ifdef CONFIG_KVM_BOOK3S_64_HV
196 /* HV KVM can only do PAPR mode for now */
197 if (!vcpu->arch.papr_enabled)
198 goto out;
199#endif
200
d30f6e48
SW
201#ifdef CONFIG_KVM_BOOKE_HV
202 if (!cpu_has_feature(CPU_FTR_EMB_HV))
203 goto out;
204#endif
205
af8f38b3
AG
206 r = true;
207
208out:
209 vcpu->arch.sane = r;
210 return r ? 0 : -EINVAL;
211}
212
bbf45ba5
HB
213int kvmppc_emulate_mmio(struct kvm_run *run, struct kvm_vcpu *vcpu)
214{
215 enum emulation_result er;
216 int r;
217
218 er = kvmppc_emulate_instruction(run, vcpu);
219 switch (er) {
220 case EMULATE_DONE:
221 /* Future optimization: only reload non-volatiles if they were
222 * actually modified. */
223 r = RESUME_GUEST_NV;
224 break;
225 case EMULATE_DO_MMIO:
226 run->exit_reason = KVM_EXIT_MMIO;
227 /* We must reload nonvolatiles because "update" load/store
228 * instructions modify register state. */
229 /* Future optimization: only reload non-volatiles if they were
230 * actually modified. */
231 r = RESUME_HOST_NV;
232 break;
233 case EMULATE_FAIL:
234 /* XXX Deliver Program interrupt to guest. */
235 printk(KERN_EMERG "%s: emulation failed (%08x)\n", __func__,
c7f38f46 236 kvmppc_get_last_inst(vcpu));
bbf45ba5
HB
237 r = RESUME_HOST;
238 break;
239 default:
240 BUG();
241 }
242
243 return r;
244}
245
10474ae8 246int kvm_arch_hardware_enable(void *garbage)
bbf45ba5 247{
10474ae8 248 return 0;
bbf45ba5
HB
249}
250
251void kvm_arch_hardware_disable(void *garbage)
252{
253}
254
255int kvm_arch_hardware_setup(void)
256{
257 return 0;
258}
259
260void kvm_arch_hardware_unsetup(void)
261{
262}
263
264void kvm_arch_check_processor_compat(void *rtn)
265{
9dd921cf 266 *(int *)rtn = kvmppc_core_check_processor_compat();
bbf45ba5
HB
267}
268
e08b9637 269int kvm_arch_init_vm(struct kvm *kvm, unsigned long type)
bbf45ba5 270{
e08b9637
CO
271 if (type)
272 return -EINVAL;
273
f9e0554d 274 return kvmppc_core_init_vm(kvm);
bbf45ba5
HB
275}
276
d89f5eff 277void kvm_arch_destroy_vm(struct kvm *kvm)
bbf45ba5
HB
278{
279 unsigned int i;
988a2cae 280 struct kvm_vcpu *vcpu;
bbf45ba5 281
988a2cae
GN
282 kvm_for_each_vcpu(i, vcpu, kvm)
283 kvm_arch_vcpu_free(vcpu);
284
285 mutex_lock(&kvm->lock);
286 for (i = 0; i < atomic_read(&kvm->online_vcpus); i++)
287 kvm->vcpus[i] = NULL;
288
289 atomic_set(&kvm->online_vcpus, 0);
f9e0554d
PM
290
291 kvmppc_core_destroy_vm(kvm);
292
988a2cae 293 mutex_unlock(&kvm->lock);
bbf45ba5
HB
294}
295
ad8ba2cd
SY
296void kvm_arch_sync_events(struct kvm *kvm)
297{
298}
299
bbf45ba5
HB
300int kvm_dev_ioctl_check_extension(long ext)
301{
302 int r;
303
304 switch (ext) {
5ce941ee
SW
305#ifdef CONFIG_BOOKE
306 case KVM_CAP_PPC_BOOKE_SREGS:
f61c94bb 307 case KVM_CAP_PPC_BOOKE_WATCHDOG:
5ce941ee 308#else
e15a1137 309 case KVM_CAP_PPC_SEGSTATE:
1022fc3d 310 case KVM_CAP_PPC_HIOR:
930b412a 311 case KVM_CAP_PPC_PAPR:
5ce941ee 312#endif
18978768 313 case KVM_CAP_PPC_UNSET_IRQ:
7b4203e8 314 case KVM_CAP_PPC_IRQ_LEVEL:
71fbfd5f 315 case KVM_CAP_ENABLE_CAP:
e24ed81f 316 case KVM_CAP_ONE_REG:
0e673fb6 317 case KVM_CAP_IOEVENTFD:
de56a948
PM
318 r = 1;
319 break;
320#ifndef CONFIG_KVM_BOOK3S_64_HV
321 case KVM_CAP_PPC_PAIRED_SINGLES:
ad0a048b 322 case KVM_CAP_PPC_OSI:
15711e9c 323 case KVM_CAP_PPC_GET_PVINFO:
bf7ca4bd 324#if defined(CONFIG_KVM_E500V2) || defined(CONFIG_KVM_E500MC)
dc83b8bc
SW
325 case KVM_CAP_SW_TLB:
326#endif
e15a1137
AG
327 r = 1;
328 break;
588968b6
LV
329 case KVM_CAP_COALESCED_MMIO:
330 r = KVM_COALESCED_MMIO_PAGE_OFFSET;
331 break;
54738c09 332#endif
f31e65e1 333#ifdef CONFIG_PPC_BOOK3S_64
54738c09 334 case KVM_CAP_SPAPR_TCE:
32fad281 335 case KVM_CAP_PPC_ALLOC_HTAB:
54738c09
DG
336 r = 1;
337 break;
f31e65e1
BH
338#endif /* CONFIG_PPC_BOOK3S_64 */
339#ifdef CONFIG_KVM_BOOK3S_64_HV
371fefd6
PM
340 case KVM_CAP_PPC_SMT:
341 r = threads_per_core;
342 break;
aa04b4cc
PM
343 case KVM_CAP_PPC_RMA:
344 r = 1;
9e368f29
PM
345 /* PPC970 requires an RMA */
346 if (cpu_has_feature(CPU_FTR_ARCH_201))
347 r = 2;
aa04b4cc 348 break;
f4800b1f 349#endif
342d3db7 350 case KVM_CAP_SYNC_MMU:
f4800b1f 351#ifdef CONFIG_KVM_BOOK3S_64_HV
342d3db7 352 r = cpu_has_feature(CPU_FTR_ARCH_206) ? 1 : 0;
f4800b1f
AG
353#elif defined(KVM_ARCH_WANT_MMU_NOTIFIER)
354 r = 1;
355#else
356 r = 0;
a2932923
PM
357 break;
358#endif
359#ifdef CONFIG_KVM_BOOK3S_64_HV
360 case KVM_CAP_PPC_HTAB_FD:
361 r = 1;
362 break;
de56a948 363#endif
f4800b1f 364 break;
b5434032
ME
365 case KVM_CAP_NR_VCPUS:
366 /*
367 * Recommending a number of CPUs is somewhat arbitrary; we
368 * return the number of present CPUs for -HV (since a host
369 * will have secondary threads "offline"), and for other KVM
370 * implementations just count online CPUs.
371 */
372#ifdef CONFIG_KVM_BOOK3S_64_HV
373 r = num_present_cpus();
374#else
375 r = num_online_cpus();
376#endif
377 break;
378 case KVM_CAP_MAX_VCPUS:
379 r = KVM_MAX_VCPUS;
380 break;
5b74716e
BH
381#ifdef CONFIG_PPC_BOOK3S_64
382 case KVM_CAP_PPC_GET_SMMU_INFO:
383 r = 1;
384 break;
385#endif
bbf45ba5
HB
386 default:
387 r = 0;
388 break;
389 }
390 return r;
391
392}
393
394long kvm_arch_dev_ioctl(struct file *filp,
395 unsigned int ioctl, unsigned long arg)
396{
397 return -EINVAL;
398}
399
db3fe4eb
TY
400void kvm_arch_free_memslot(struct kvm_memory_slot *free,
401 struct kvm_memory_slot *dont)
402{
a66b48c3 403 kvmppc_core_free_memslot(free, dont);
db3fe4eb
TY
404}
405
406int kvm_arch_create_memslot(struct kvm_memory_slot *slot, unsigned long npages)
407{
a66b48c3 408 return kvmppc_core_create_memslot(slot, npages);
db3fe4eb
TY
409}
410
f7784b8e
MT
411int kvm_arch_prepare_memory_region(struct kvm *kvm,
412 struct kvm_memory_slot *memslot,
413 struct kvm_memory_slot old,
414 struct kvm_userspace_memory_region *mem,
f82a8cfe 415 bool user_alloc)
bbf45ba5 416{
a66b48c3 417 return kvmppc_core_prepare_memory_region(kvm, memslot, mem);
bbf45ba5
HB
418}
419
f7784b8e
MT
420void kvm_arch_commit_memory_region(struct kvm *kvm,
421 struct kvm_userspace_memory_region *mem,
422 struct kvm_memory_slot old,
f82a8cfe 423 bool user_alloc)
f7784b8e 424{
dfe49dbd 425 kvmppc_core_commit_memory_region(kvm, mem, old);
f7784b8e
MT
426}
427
2df72e9b
MT
428void kvm_arch_flush_shadow_all(struct kvm *kvm)
429{
430}
f7784b8e 431
2df72e9b
MT
432void kvm_arch_flush_shadow_memslot(struct kvm *kvm,
433 struct kvm_memory_slot *slot)
34d4cb8f 434{
dfe49dbd 435 kvmppc_core_flush_memslot(kvm, slot);
34d4cb8f
MT
436}
437
bbf45ba5
HB
438struct kvm_vcpu *kvm_arch_vcpu_create(struct kvm *kvm, unsigned int id)
439{
73e75b41
HB
440 struct kvm_vcpu *vcpu;
441 vcpu = kvmppc_core_vcpu_create(kvm, id);
03cdab53
ME
442 if (!IS_ERR(vcpu)) {
443 vcpu->arch.wqp = &vcpu->wq;
06056bfb 444 kvmppc_create_vcpu_debugfs(vcpu, id);
03cdab53 445 }
73e75b41 446 return vcpu;
bbf45ba5
HB
447}
448
42897d86
MT
449int kvm_arch_vcpu_postcreate(struct kvm_vcpu *vcpu)
450{
451 return 0;
452}
453
bbf45ba5
HB
454void kvm_arch_vcpu_free(struct kvm_vcpu *vcpu)
455{
a595405d
AG
456 /* Make sure we're not using the vcpu anymore */
457 hrtimer_cancel(&vcpu->arch.dec_timer);
458 tasklet_kill(&vcpu->arch.tasklet);
459
73e75b41 460 kvmppc_remove_vcpu_debugfs(vcpu);
db93f574 461 kvmppc_core_vcpu_free(vcpu);
bbf45ba5
HB
462}
463
464void kvm_arch_vcpu_destroy(struct kvm_vcpu *vcpu)
465{
466 kvm_arch_vcpu_free(vcpu);
467}
468
469int kvm_cpu_has_pending_timer(struct kvm_vcpu *vcpu)
470{
9dd921cf 471 return kvmppc_core_pending_dec(vcpu);
bbf45ba5
HB
472}
473
544c6761
AG
474/*
475 * low level hrtimer wake routine. Because this runs in hardirq context
476 * we schedule a tasklet to do the real work.
477 */
478enum hrtimer_restart kvmppc_decrementer_wakeup(struct hrtimer *timer)
479{
480 struct kvm_vcpu *vcpu;
481
482 vcpu = container_of(timer, struct kvm_vcpu, arch.dec_timer);
483 tasklet_schedule(&vcpu->arch.tasklet);
484
485 return HRTIMER_NORESTART;
486}
487
bbf45ba5
HB
488int kvm_arch_vcpu_init(struct kvm_vcpu *vcpu)
489{
f61c94bb
BB
490 int ret;
491
544c6761
AG
492 hrtimer_init(&vcpu->arch.dec_timer, CLOCK_REALTIME, HRTIMER_MODE_ABS);
493 tasklet_init(&vcpu->arch.tasklet, kvmppc_decrementer_func, (ulong)vcpu);
494 vcpu->arch.dec_timer.function = kvmppc_decrementer_wakeup;
de56a948 495 vcpu->arch.dec_expires = ~(u64)0;
bbf45ba5 496
09000adb
BB
497#ifdef CONFIG_KVM_EXIT_TIMING
498 mutex_init(&vcpu->arch.exit_timing_lock);
499#endif
f61c94bb
BB
500 ret = kvmppc_subarch_vcpu_init(vcpu);
501 return ret;
bbf45ba5
HB
502}
503
504void kvm_arch_vcpu_uninit(struct kvm_vcpu *vcpu)
505{
ecc0981f 506 kvmppc_mmu_destroy(vcpu);
f61c94bb 507 kvmppc_subarch_vcpu_uninit(vcpu);
bbf45ba5
HB
508}
509
510void kvm_arch_vcpu_load(struct kvm_vcpu *vcpu, int cpu)
511{
eab17672
SW
512#ifdef CONFIG_BOOKE
513 /*
514 * vrsave (formerly usprg0) isn't used by Linux, but may
515 * be used by the guest.
516 *
517 * On non-booke this is associated with Altivec and
518 * is handled by code in book3s.c.
519 */
520 mtspr(SPRN_VRSAVE, vcpu->arch.vrsave);
521#endif
9dd921cf 522 kvmppc_core_vcpu_load(vcpu, cpu);
bbf45ba5
HB
523}
524
525void kvm_arch_vcpu_put(struct kvm_vcpu *vcpu)
526{
9dd921cf 527 kvmppc_core_vcpu_put(vcpu);
eab17672
SW
528#ifdef CONFIG_BOOKE
529 vcpu->arch.vrsave = mfspr(SPRN_VRSAVE);
530#endif
bbf45ba5
HB
531}
532
d0bfb940 533int kvm_arch_vcpu_ioctl_set_guest_debug(struct kvm_vcpu *vcpu,
f5d0906b 534 struct kvm_guest_debug *dbg)
bbf45ba5 535{
f5d0906b 536 return -EINVAL;
bbf45ba5
HB
537}
538
539static void kvmppc_complete_dcr_load(struct kvm_vcpu *vcpu,
540 struct kvm_run *run)
541{
8e5b26b5 542 kvmppc_set_gpr(vcpu, vcpu->arch.io_gpr, run->dcr.data);
bbf45ba5
HB
543}
544
545static void kvmppc_complete_mmio_load(struct kvm_vcpu *vcpu,
546 struct kvm_run *run)
547{
69b61833 548 u64 uninitialized_var(gpr);
bbf45ba5 549
8e5b26b5 550 if (run->mmio.len > sizeof(gpr)) {
bbf45ba5
HB
551 printk(KERN_ERR "bad MMIO length: %d\n", run->mmio.len);
552 return;
553 }
554
555 if (vcpu->arch.mmio_is_bigendian) {
556 switch (run->mmio.len) {
b104d066 557 case 8: gpr = *(u64 *)run->mmio.data; break;
8e5b26b5
AG
558 case 4: gpr = *(u32 *)run->mmio.data; break;
559 case 2: gpr = *(u16 *)run->mmio.data; break;
560 case 1: gpr = *(u8 *)run->mmio.data; break;
bbf45ba5
HB
561 }
562 } else {
563 /* Convert BE data from userland back to LE. */
564 switch (run->mmio.len) {
8e5b26b5
AG
565 case 4: gpr = ld_le32((u32 *)run->mmio.data); break;
566 case 2: gpr = ld_le16((u16 *)run->mmio.data); break;
567 case 1: gpr = *(u8 *)run->mmio.data; break;
bbf45ba5
HB
568 }
569 }
8e5b26b5 570
3587d534
AG
571 if (vcpu->arch.mmio_sign_extend) {
572 switch (run->mmio.len) {
573#ifdef CONFIG_PPC64
574 case 4:
575 gpr = (s64)(s32)gpr;
576 break;
577#endif
578 case 2:
579 gpr = (s64)(s16)gpr;
580 break;
581 case 1:
582 gpr = (s64)(s8)gpr;
583 break;
584 }
585 }
586
8e5b26b5 587 kvmppc_set_gpr(vcpu, vcpu->arch.io_gpr, gpr);
b104d066 588
b3c5d3c2
AG
589 switch (vcpu->arch.io_gpr & KVM_MMIO_REG_EXT_MASK) {
590 case KVM_MMIO_REG_GPR:
b104d066
AG
591 kvmppc_set_gpr(vcpu, vcpu->arch.io_gpr, gpr);
592 break;
b3c5d3c2
AG
593 case KVM_MMIO_REG_FPR:
594 vcpu->arch.fpr[vcpu->arch.io_gpr & KVM_MMIO_REG_MASK] = gpr;
b104d066 595 break;
287d5611 596#ifdef CONFIG_PPC_BOOK3S
b3c5d3c2
AG
597 case KVM_MMIO_REG_QPR:
598 vcpu->arch.qpr[vcpu->arch.io_gpr & KVM_MMIO_REG_MASK] = gpr;
b104d066 599 break;
b3c5d3c2
AG
600 case KVM_MMIO_REG_FQPR:
601 vcpu->arch.fpr[vcpu->arch.io_gpr & KVM_MMIO_REG_MASK] = gpr;
602 vcpu->arch.qpr[vcpu->arch.io_gpr & KVM_MMIO_REG_MASK] = gpr;
b104d066 603 break;
287d5611 604#endif
b104d066
AG
605 default:
606 BUG();
607 }
bbf45ba5
HB
608}
609
610int kvmppc_handle_load(struct kvm_run *run, struct kvm_vcpu *vcpu,
611 unsigned int rt, unsigned int bytes, int is_bigendian)
612{
613 if (bytes > sizeof(run->mmio.data)) {
614 printk(KERN_ERR "%s: bad MMIO length: %d\n", __func__,
615 run->mmio.len);
616 }
617
618 run->mmio.phys_addr = vcpu->arch.paddr_accessed;
619 run->mmio.len = bytes;
620 run->mmio.is_write = 0;
621
622 vcpu->arch.io_gpr = rt;
623 vcpu->arch.mmio_is_bigendian = is_bigendian;
624 vcpu->mmio_needed = 1;
625 vcpu->mmio_is_write = 0;
3587d534 626 vcpu->arch.mmio_sign_extend = 0;
bbf45ba5 627
0e673fb6
AG
628 if (!kvm_io_bus_read(vcpu->kvm, KVM_MMIO_BUS, run->mmio.phys_addr,
629 bytes, &run->mmio.data)) {
630 kvmppc_complete_mmio_load(vcpu, run);
631 vcpu->mmio_needed = 0;
632 return EMULATE_DONE;
633 }
634
bbf45ba5
HB
635 return EMULATE_DO_MMIO;
636}
637
3587d534
AG
638/* Same as above, but sign extends */
639int kvmppc_handle_loads(struct kvm_run *run, struct kvm_vcpu *vcpu,
640 unsigned int rt, unsigned int bytes, int is_bigendian)
641{
642 int r;
643
3587d534 644 vcpu->arch.mmio_sign_extend = 1;
0e673fb6 645 r = kvmppc_handle_load(run, vcpu, rt, bytes, is_bigendian);
3587d534
AG
646
647 return r;
648}
649
bbf45ba5 650int kvmppc_handle_store(struct kvm_run *run, struct kvm_vcpu *vcpu,
b104d066 651 u64 val, unsigned int bytes, int is_bigendian)
bbf45ba5
HB
652{
653 void *data = run->mmio.data;
654
655 if (bytes > sizeof(run->mmio.data)) {
656 printk(KERN_ERR "%s: bad MMIO length: %d\n", __func__,
657 run->mmio.len);
658 }
659
660 run->mmio.phys_addr = vcpu->arch.paddr_accessed;
661 run->mmio.len = bytes;
662 run->mmio.is_write = 1;
663 vcpu->mmio_needed = 1;
664 vcpu->mmio_is_write = 1;
665
666 /* Store the value at the lowest bytes in 'data'. */
667 if (is_bigendian) {
668 switch (bytes) {
b104d066 669 case 8: *(u64 *)data = val; break;
bbf45ba5
HB
670 case 4: *(u32 *)data = val; break;
671 case 2: *(u16 *)data = val; break;
672 case 1: *(u8 *)data = val; break;
673 }
674 } else {
675 /* Store LE value into 'data'. */
676 switch (bytes) {
677 case 4: st_le32(data, val); break;
678 case 2: st_le16(data, val); break;
679 case 1: *(u8 *)data = val; break;
680 }
681 }
682
0e673fb6
AG
683 if (!kvm_io_bus_write(vcpu->kvm, KVM_MMIO_BUS, run->mmio.phys_addr,
684 bytes, &run->mmio.data)) {
685 kvmppc_complete_mmio_load(vcpu, run);
686 vcpu->mmio_needed = 0;
687 return EMULATE_DONE;
688 }
689
bbf45ba5
HB
690 return EMULATE_DO_MMIO;
691}
692
693int kvm_arch_vcpu_ioctl_run(struct kvm_vcpu *vcpu, struct kvm_run *run)
694{
695 int r;
696 sigset_t sigsaved;
697
698 if (vcpu->sigset_active)
699 sigprocmask(SIG_SETMASK, &vcpu->sigset, &sigsaved);
700
701 if (vcpu->mmio_needed) {
702 if (!vcpu->mmio_is_write)
703 kvmppc_complete_mmio_load(vcpu, run);
704 vcpu->mmio_needed = 0;
705 } else if (vcpu->arch.dcr_needed) {
706 if (!vcpu->arch.dcr_is_write)
707 kvmppc_complete_dcr_load(vcpu, run);
708 vcpu->arch.dcr_needed = 0;
ad0a048b
AG
709 } else if (vcpu->arch.osi_needed) {
710 u64 *gprs = run->osi.gprs;
711 int i;
712
713 for (i = 0; i < 32; i++)
714 kvmppc_set_gpr(vcpu, i, gprs[i]);
715 vcpu->arch.osi_needed = 0;
de56a948
PM
716 } else if (vcpu->arch.hcall_needed) {
717 int i;
718
719 kvmppc_set_gpr(vcpu, 3, run->papr_hcall.ret);
720 for (i = 0; i < 9; ++i)
721 kvmppc_set_gpr(vcpu, 4 + i, run->papr_hcall.args[i]);
722 vcpu->arch.hcall_needed = 0;
bbf45ba5
HB
723 }
724
df6909e5 725 r = kvmppc_vcpu_run(run, vcpu);
bbf45ba5
HB
726
727 if (vcpu->sigset_active)
728 sigprocmask(SIG_SETMASK, &sigsaved, NULL);
729
730 return r;
731}
732
733int kvm_vcpu_ioctl_interrupt(struct kvm_vcpu *vcpu, struct kvm_interrupt *irq)
734{
19ccb76a 735 if (irq->irq == KVM_INTERRUPT_UNSET) {
18978768 736 kvmppc_core_dequeue_external(vcpu, irq);
19ccb76a
PM
737 return 0;
738 }
739
740 kvmppc_core_queue_external(vcpu, irq);
b6d33834 741
dfd4d47e 742 kvm_vcpu_kick(vcpu);
45c5eb67 743
bbf45ba5
HB
744 return 0;
745}
746
71fbfd5f
AG
747static int kvm_vcpu_ioctl_enable_cap(struct kvm_vcpu *vcpu,
748 struct kvm_enable_cap *cap)
749{
750 int r;
751
752 if (cap->flags)
753 return -EINVAL;
754
755 switch (cap->cap) {
ad0a048b
AG
756 case KVM_CAP_PPC_OSI:
757 r = 0;
758 vcpu->arch.osi_enabled = true;
759 break;
930b412a
AG
760 case KVM_CAP_PPC_PAPR:
761 r = 0;
762 vcpu->arch.papr_enabled = true;
763 break;
f61c94bb
BB
764#ifdef CONFIG_BOOKE
765 case KVM_CAP_PPC_BOOKE_WATCHDOG:
766 r = 0;
767 vcpu->arch.watchdog_enabled = true;
768 break;
769#endif
bf7ca4bd 770#if defined(CONFIG_KVM_E500V2) || defined(CONFIG_KVM_E500MC)
dc83b8bc
SW
771 case KVM_CAP_SW_TLB: {
772 struct kvm_config_tlb cfg;
773 void __user *user_ptr = (void __user *)(uintptr_t)cap->args[0];
774
775 r = -EFAULT;
776 if (copy_from_user(&cfg, user_ptr, sizeof(cfg)))
777 break;
778
779 r = kvm_vcpu_ioctl_config_tlb(vcpu, &cfg);
780 break;
781 }
782#endif
71fbfd5f
AG
783 default:
784 r = -EINVAL;
785 break;
786 }
787
af8f38b3
AG
788 if (!r)
789 r = kvmppc_sanity_check(vcpu);
790
71fbfd5f
AG
791 return r;
792}
793
bbf45ba5
HB
794int kvm_arch_vcpu_ioctl_get_mpstate(struct kvm_vcpu *vcpu,
795 struct kvm_mp_state *mp_state)
796{
797 return -EINVAL;
798}
799
800int kvm_arch_vcpu_ioctl_set_mpstate(struct kvm_vcpu *vcpu,
801 struct kvm_mp_state *mp_state)
802{
803 return -EINVAL;
804}
805
806long kvm_arch_vcpu_ioctl(struct file *filp,
807 unsigned int ioctl, unsigned long arg)
808{
809 struct kvm_vcpu *vcpu = filp->private_data;
810 void __user *argp = (void __user *)arg;
811 long r;
812
93736624
AK
813 switch (ioctl) {
814 case KVM_INTERRUPT: {
bbf45ba5
HB
815 struct kvm_interrupt irq;
816 r = -EFAULT;
817 if (copy_from_user(&irq, argp, sizeof(irq)))
93736624 818 goto out;
bbf45ba5 819 r = kvm_vcpu_ioctl_interrupt(vcpu, &irq);
93736624 820 goto out;
bbf45ba5 821 }
19483d14 822
71fbfd5f
AG
823 case KVM_ENABLE_CAP:
824 {
825 struct kvm_enable_cap cap;
826 r = -EFAULT;
827 if (copy_from_user(&cap, argp, sizeof(cap)))
828 goto out;
829 r = kvm_vcpu_ioctl_enable_cap(vcpu, &cap);
830 break;
831 }
dc83b8bc 832
e24ed81f
AG
833 case KVM_SET_ONE_REG:
834 case KVM_GET_ONE_REG:
835 {
836 struct kvm_one_reg reg;
837 r = -EFAULT;
838 if (copy_from_user(&reg, argp, sizeof(reg)))
839 goto out;
840 if (ioctl == KVM_SET_ONE_REG)
841 r = kvm_vcpu_ioctl_set_one_reg(vcpu, &reg);
842 else
843 r = kvm_vcpu_ioctl_get_one_reg(vcpu, &reg);
844 break;
845 }
846
bf7ca4bd 847#if defined(CONFIG_KVM_E500V2) || defined(CONFIG_KVM_E500MC)
dc83b8bc
SW
848 case KVM_DIRTY_TLB: {
849 struct kvm_dirty_tlb dirty;
850 r = -EFAULT;
851 if (copy_from_user(&dirty, argp, sizeof(dirty)))
852 goto out;
853 r = kvm_vcpu_ioctl_dirty_tlb(vcpu, &dirty);
854 break;
855 }
856#endif
bbf45ba5
HB
857 default:
858 r = -EINVAL;
859 }
860
861out:
862 return r;
863}
864
5b1c1493
CO
865int kvm_arch_vcpu_fault(struct kvm_vcpu *vcpu, struct vm_fault *vmf)
866{
867 return VM_FAULT_SIGBUS;
868}
869
15711e9c
AG
870static int kvm_vm_ioctl_get_pvinfo(struct kvm_ppc_pvinfo *pvinfo)
871{
784bafac
SY
872 u32 inst_nop = 0x60000000;
873#ifdef CONFIG_KVM_BOOKE_HV
874 u32 inst_sc1 = 0x44000022;
875 pvinfo->hcall[0] = inst_sc1;
876 pvinfo->hcall[1] = inst_nop;
877 pvinfo->hcall[2] = inst_nop;
878 pvinfo->hcall[3] = inst_nop;
879#else
15711e9c
AG
880 u32 inst_lis = 0x3c000000;
881 u32 inst_ori = 0x60000000;
15711e9c
AG
882 u32 inst_sc = 0x44000002;
883 u32 inst_imm_mask = 0xffff;
884
885 /*
886 * The hypercall to get into KVM from within guest context is as
887 * follows:
888 *
889 * lis r0, r0, KVM_SC_MAGIC_R0@h
890 * ori r0, KVM_SC_MAGIC_R0@l
891 * sc
892 * nop
893 */
894 pvinfo->hcall[0] = inst_lis | ((KVM_SC_MAGIC_R0 >> 16) & inst_imm_mask);
895 pvinfo->hcall[1] = inst_ori | (KVM_SC_MAGIC_R0 & inst_imm_mask);
896 pvinfo->hcall[2] = inst_sc;
897 pvinfo->hcall[3] = inst_nop;
784bafac 898#endif
15711e9c 899
9202e076
LYB
900 pvinfo->flags = KVM_PPC_PVINFO_FLAGS_EV_IDLE;
901
15711e9c
AG
902 return 0;
903}
904
bbf45ba5
HB
905long kvm_arch_vm_ioctl(struct file *filp,
906 unsigned int ioctl, unsigned long arg)
907{
15711e9c 908 void __user *argp = (void __user *)arg;
bbf45ba5
HB
909 long r;
910
911 switch (ioctl) {
15711e9c
AG
912 case KVM_PPC_GET_PVINFO: {
913 struct kvm_ppc_pvinfo pvinfo;
d8cdddcd 914 memset(&pvinfo, 0, sizeof(pvinfo));
15711e9c
AG
915 r = kvm_vm_ioctl_get_pvinfo(&pvinfo);
916 if (copy_to_user(argp, &pvinfo, sizeof(pvinfo))) {
917 r = -EFAULT;
918 goto out;
919 }
920
921 break;
922 }
f31e65e1 923#ifdef CONFIG_PPC_BOOK3S_64
54738c09
DG
924 case KVM_CREATE_SPAPR_TCE: {
925 struct kvm_create_spapr_tce create_tce;
926 struct kvm *kvm = filp->private_data;
927
928 r = -EFAULT;
929 if (copy_from_user(&create_tce, argp, sizeof(create_tce)))
930 goto out;
931 r = kvm_vm_ioctl_create_spapr_tce(kvm, &create_tce);
932 goto out;
933 }
f31e65e1 934#endif /* CONFIG_PPC_BOOK3S_64 */
aa04b4cc 935
f31e65e1 936#ifdef CONFIG_KVM_BOOK3S_64_HV
aa04b4cc
PM
937 case KVM_ALLOCATE_RMA: {
938 struct kvm *kvm = filp->private_data;
939 struct kvm_allocate_rma rma;
940
941 r = kvm_vm_ioctl_allocate_rma(kvm, &rma);
942 if (r >= 0 && copy_to_user(argp, &rma, sizeof(rma)))
943 r = -EFAULT;
944 break;
945 }
32fad281
PM
946
947 case KVM_PPC_ALLOCATE_HTAB: {
948 struct kvm *kvm = filp->private_data;
949 u32 htab_order;
950
951 r = -EFAULT;
952 if (get_user(htab_order, (u32 __user *)argp))
953 break;
954 r = kvmppc_alloc_reset_hpt(kvm, &htab_order);
955 if (r)
956 break;
957 r = -EFAULT;
958 if (put_user(htab_order, (u32 __user *)argp))
959 break;
960 r = 0;
961 break;
962 }
a2932923
PM
963
964 case KVM_PPC_GET_HTAB_FD: {
965 struct kvm *kvm = filp->private_data;
966 struct kvm_get_htab_fd ghf;
967
968 r = -EFAULT;
969 if (copy_from_user(&ghf, argp, sizeof(ghf)))
970 break;
971 r = kvm_vm_ioctl_get_htab_fd(kvm, &ghf);
972 break;
973 }
54738c09
DG
974#endif /* CONFIG_KVM_BOOK3S_64_HV */
975
5b74716e
BH
976#ifdef CONFIG_PPC_BOOK3S_64
977 case KVM_PPC_GET_SMMU_INFO: {
978 struct kvm *kvm = filp->private_data;
979 struct kvm_ppc_smmu_info info;
980
981 memset(&info, 0, sizeof(info));
982 r = kvm_vm_ioctl_get_smmu_info(kvm, &info);
983 if (r >= 0 && copy_to_user(argp, &info, sizeof(info)))
984 r = -EFAULT;
985 break;
986 }
987#endif /* CONFIG_PPC_BOOK3S_64 */
bbf45ba5 988 default:
367e1319 989 r = -ENOTTY;
bbf45ba5
HB
990 }
991
15711e9c 992out:
bbf45ba5
HB
993 return r;
994}
995
043cc4d7
SW
996static unsigned long lpid_inuse[BITS_TO_LONGS(KVMPPC_NR_LPIDS)];
997static unsigned long nr_lpids;
998
999long kvmppc_alloc_lpid(void)
1000{
1001 long lpid;
1002
1003 do {
1004 lpid = find_first_zero_bit(lpid_inuse, KVMPPC_NR_LPIDS);
1005 if (lpid >= nr_lpids) {
1006 pr_err("%s: No LPIDs free\n", __func__);
1007 return -ENOMEM;
1008 }
1009 } while (test_and_set_bit(lpid, lpid_inuse));
1010
1011 return lpid;
1012}
1013
1014void kvmppc_claim_lpid(long lpid)
1015{
1016 set_bit(lpid, lpid_inuse);
1017}
1018
1019void kvmppc_free_lpid(long lpid)
1020{
1021 clear_bit(lpid, lpid_inuse);
1022}
1023
1024void kvmppc_init_lpid(unsigned long nr_lpids_param)
1025{
1026 nr_lpids = min_t(unsigned long, KVMPPC_NR_LPIDS, nr_lpids_param);
1027 memset(lpid_inuse, 0, sizeof(lpid_inuse));
1028}
1029
bbf45ba5
HB
1030int kvm_arch_init(void *opaque)
1031{
1032 return 0;
1033}
1034
1035void kvm_arch_exit(void)
1036{
1037}