]> git.proxmox.com Git - mirror_ubuntu-bionic-kernel.git/blame - arch/powerpc/kvm/powerpc.c
KVM: set_memory_region: Refactor prepare_memory_region()
[mirror_ubuntu-bionic-kernel.git] / arch / powerpc / kvm / powerpc.c
CommitLineData
bbf45ba5
HB
1/*
2 * This program is free software; you can redistribute it and/or modify
3 * it under the terms of the GNU General Public License, version 2, as
4 * published by the Free Software Foundation.
5 *
6 * This program is distributed in the hope that it will be useful,
7 * but WITHOUT ANY WARRANTY; without even the implied warranty of
8 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
9 * GNU General Public License for more details.
10 *
11 * You should have received a copy of the GNU General Public License
12 * along with this program; if not, write to the Free Software
13 * Foundation, 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
14 *
15 * Copyright IBM Corp. 2007
16 *
17 * Authors: Hollis Blanchard <hollisb@us.ibm.com>
18 * Christian Ehrhardt <ehrhardt@linux.vnet.ibm.com>
19 */
20
21#include <linux/errno.h>
22#include <linux/err.h>
23#include <linux/kvm_host.h>
bbf45ba5 24#include <linux/vmalloc.h>
544c6761 25#include <linux/hrtimer.h>
bbf45ba5 26#include <linux/fs.h>
5a0e3ad6 27#include <linux/slab.h>
bbf45ba5
HB
28#include <asm/cputable.h>
29#include <asm/uaccess.h>
30#include <asm/kvm_ppc.h>
83aae4a8 31#include <asm/tlbflush.h>
371fefd6 32#include <asm/cputhreads.h>
bd2be683 33#include <asm/irqflags.h>
73e75b41 34#include "timing.h"
fad7b9b5 35#include "../mm/mmu_decl.h"
bbf45ba5 36
46f43c6e
MT
37#define CREATE_TRACE_POINTS
38#include "trace.h"
39
bbf45ba5
HB
40int kvm_arch_vcpu_runnable(struct kvm_vcpu *v)
41{
9202e076 42 return !!(v->arch.pending_exceptions) ||
dfd4d47e 43 v->requests;
bbf45ba5
HB
44}
45
b6d33834
CD
46int kvm_arch_vcpu_should_kick(struct kvm_vcpu *vcpu)
47{
48 return 1;
49}
50
03d25c5b
AG
51#ifndef CONFIG_KVM_BOOK3S_64_HV
52/*
53 * Common checks before entering the guest world. Call with interrupts
54 * disabled.
55 *
7ee78855
AG
56 * returns:
57 *
58 * == 1 if we're ready to go into guest state
59 * <= 0 if we need to go back to the host with return value
03d25c5b
AG
60 */
61int kvmppc_prepare_to_enter(struct kvm_vcpu *vcpu)
62{
7ee78855 63 int r = 1;
03d25c5b
AG
64
65 WARN_ON_ONCE(!irqs_disabled());
66 while (true) {
67 if (need_resched()) {
68 local_irq_enable();
69 cond_resched();
70 local_irq_disable();
71 continue;
72 }
73
74 if (signal_pending(current)) {
7ee78855
AG
75 kvmppc_account_exit(vcpu, SIGNAL_EXITS);
76 vcpu->run->exit_reason = KVM_EXIT_INTR;
77 r = -EINTR;
03d25c5b
AG
78 break;
79 }
80
5bd1cf11
SW
81 vcpu->mode = IN_GUEST_MODE;
82
83 /*
84 * Reading vcpu->requests must happen after setting vcpu->mode,
85 * so we don't miss a request because the requester sees
86 * OUTSIDE_GUEST_MODE and assumes we'll be checking requests
87 * before next entering the guest (and thus doesn't IPI).
88 */
03d25c5b 89 smp_mb();
5bd1cf11 90
03d25c5b
AG
91 if (vcpu->requests) {
92 /* Make sure we process requests preemptable */
93 local_irq_enable();
94 trace_kvm_check_requests(vcpu);
7c973a2e 95 r = kvmppc_core_check_requests(vcpu);
03d25c5b 96 local_irq_disable();
7c973a2e
AG
97 if (r > 0)
98 continue;
99 break;
03d25c5b
AG
100 }
101
102 if (kvmppc_core_prepare_to_enter(vcpu)) {
103 /* interrupts got enabled in between, so we
104 are back at square 1 */
105 continue;
106 }
107
bd2be683
AG
108#ifdef CONFIG_PPC64
109 /* lazy EE magic */
110 hard_irq_disable();
111 if (lazy_irq_pending()) {
112 /* Got an interrupt in between, try again */
113 local_irq_enable();
114 local_irq_disable();
3766a4c6 115 kvm_guest_exit();
bd2be683
AG
116 continue;
117 }
118
119 trace_hardirqs_on();
120#endif
121
3766a4c6 122 kvm_guest_enter();
03d25c5b
AG
123 break;
124 }
125
126 return r;
127}
128#endif /* CONFIG_KVM_BOOK3S_64_HV */
129
2a342ed5
AG
130int kvmppc_kvm_pv(struct kvm_vcpu *vcpu)
131{
132 int nr = kvmppc_get_gpr(vcpu, 11);
133 int r;
134 unsigned long __maybe_unused param1 = kvmppc_get_gpr(vcpu, 3);
135 unsigned long __maybe_unused param2 = kvmppc_get_gpr(vcpu, 4);
136 unsigned long __maybe_unused param3 = kvmppc_get_gpr(vcpu, 5);
137 unsigned long __maybe_unused param4 = kvmppc_get_gpr(vcpu, 6);
138 unsigned long r2 = 0;
139
140 if (!(vcpu->arch.shared->msr & MSR_SF)) {
141 /* 32 bit mode */
142 param1 &= 0xffffffff;
143 param2 &= 0xffffffff;
144 param3 &= 0xffffffff;
145 param4 &= 0xffffffff;
146 }
147
148 switch (nr) {
fdcf8bd7 149 case KVM_HCALL_TOKEN(KVM_HC_PPC_MAP_MAGIC_PAGE):
5fc87407
AG
150 {
151 vcpu->arch.magic_page_pa = param1;
152 vcpu->arch.magic_page_ea = param2;
153
b5904972 154 r2 = KVM_MAGIC_FEAT_SR | KVM_MAGIC_FEAT_MAS0_TO_SPRG7;
7508e16c 155
fdcf8bd7 156 r = EV_SUCCESS;
5fc87407
AG
157 break;
158 }
fdcf8bd7
SY
159 case KVM_HCALL_TOKEN(KVM_HC_FEATURES):
160 r = EV_SUCCESS;
bf7ca4bd 161#if defined(CONFIG_PPC_BOOK3S) || defined(CONFIG_KVM_E500V2)
a4cd8b23 162 /* XXX Missing magic page on 44x */
5fc87407
AG
163 r2 |= (1 << KVM_FEATURE_MAGIC_PAGE);
164#endif
2a342ed5
AG
165
166 /* Second return value is in r4 */
2a342ed5 167 break;
9202e076
LYB
168 case EV_HCALL_TOKEN(EV_IDLE):
169 r = EV_SUCCESS;
170 kvm_vcpu_block(vcpu);
171 clear_bit(KVM_REQ_UNHALT, &vcpu->requests);
172 break;
2a342ed5 173 default:
fdcf8bd7 174 r = EV_UNIMPLEMENTED;
2a342ed5
AG
175 break;
176 }
177
7508e16c
AG
178 kvmppc_set_gpr(vcpu, 4, r2);
179
2a342ed5
AG
180 return r;
181}
bbf45ba5 182
af8f38b3
AG
183int kvmppc_sanity_check(struct kvm_vcpu *vcpu)
184{
185 int r = false;
186
187 /* We have to know what CPU to virtualize */
188 if (!vcpu->arch.pvr)
189 goto out;
190
191 /* PAPR only works with book3s_64 */
192 if ((vcpu->arch.cpu_type != KVM_CPU_3S_64) && vcpu->arch.papr_enabled)
193 goto out;
194
195#ifdef CONFIG_KVM_BOOK3S_64_HV
196 /* HV KVM can only do PAPR mode for now */
197 if (!vcpu->arch.papr_enabled)
198 goto out;
199#endif
200
d30f6e48
SW
201#ifdef CONFIG_KVM_BOOKE_HV
202 if (!cpu_has_feature(CPU_FTR_EMB_HV))
203 goto out;
204#endif
205
af8f38b3
AG
206 r = true;
207
208out:
209 vcpu->arch.sane = r;
210 return r ? 0 : -EINVAL;
211}
212
bbf45ba5
HB
213int kvmppc_emulate_mmio(struct kvm_run *run, struct kvm_vcpu *vcpu)
214{
215 enum emulation_result er;
216 int r;
217
218 er = kvmppc_emulate_instruction(run, vcpu);
219 switch (er) {
220 case EMULATE_DONE:
221 /* Future optimization: only reload non-volatiles if they were
222 * actually modified. */
223 r = RESUME_GUEST_NV;
224 break;
225 case EMULATE_DO_MMIO:
226 run->exit_reason = KVM_EXIT_MMIO;
227 /* We must reload nonvolatiles because "update" load/store
228 * instructions modify register state. */
229 /* Future optimization: only reload non-volatiles if they were
230 * actually modified. */
231 r = RESUME_HOST_NV;
232 break;
233 case EMULATE_FAIL:
234 /* XXX Deliver Program interrupt to guest. */
235 printk(KERN_EMERG "%s: emulation failed (%08x)\n", __func__,
c7f38f46 236 kvmppc_get_last_inst(vcpu));
bbf45ba5
HB
237 r = RESUME_HOST;
238 break;
239 default:
5a33169e
AG
240 WARN_ON(1);
241 r = RESUME_GUEST;
bbf45ba5
HB
242 }
243
244 return r;
245}
246
10474ae8 247int kvm_arch_hardware_enable(void *garbage)
bbf45ba5 248{
10474ae8 249 return 0;
bbf45ba5
HB
250}
251
252void kvm_arch_hardware_disable(void *garbage)
253{
254}
255
256int kvm_arch_hardware_setup(void)
257{
258 return 0;
259}
260
261void kvm_arch_hardware_unsetup(void)
262{
263}
264
265void kvm_arch_check_processor_compat(void *rtn)
266{
9dd921cf 267 *(int *)rtn = kvmppc_core_check_processor_compat();
bbf45ba5
HB
268}
269
e08b9637 270int kvm_arch_init_vm(struct kvm *kvm, unsigned long type)
bbf45ba5 271{
e08b9637
CO
272 if (type)
273 return -EINVAL;
274
f9e0554d 275 return kvmppc_core_init_vm(kvm);
bbf45ba5
HB
276}
277
d89f5eff 278void kvm_arch_destroy_vm(struct kvm *kvm)
bbf45ba5
HB
279{
280 unsigned int i;
988a2cae 281 struct kvm_vcpu *vcpu;
bbf45ba5 282
988a2cae
GN
283 kvm_for_each_vcpu(i, vcpu, kvm)
284 kvm_arch_vcpu_free(vcpu);
285
286 mutex_lock(&kvm->lock);
287 for (i = 0; i < atomic_read(&kvm->online_vcpus); i++)
288 kvm->vcpus[i] = NULL;
289
290 atomic_set(&kvm->online_vcpus, 0);
f9e0554d
PM
291
292 kvmppc_core_destroy_vm(kvm);
293
988a2cae 294 mutex_unlock(&kvm->lock);
bbf45ba5
HB
295}
296
ad8ba2cd
SY
297void kvm_arch_sync_events(struct kvm *kvm)
298{
299}
300
bbf45ba5
HB
301int kvm_dev_ioctl_check_extension(long ext)
302{
303 int r;
304
305 switch (ext) {
5ce941ee
SW
306#ifdef CONFIG_BOOKE
307 case KVM_CAP_PPC_BOOKE_SREGS:
f61c94bb 308 case KVM_CAP_PPC_BOOKE_WATCHDOG:
1c810636 309 case KVM_CAP_PPC_EPR:
5ce941ee 310#else
e15a1137 311 case KVM_CAP_PPC_SEGSTATE:
1022fc3d 312 case KVM_CAP_PPC_HIOR:
930b412a 313 case KVM_CAP_PPC_PAPR:
5ce941ee 314#endif
18978768 315 case KVM_CAP_PPC_UNSET_IRQ:
7b4203e8 316 case KVM_CAP_PPC_IRQ_LEVEL:
71fbfd5f 317 case KVM_CAP_ENABLE_CAP:
e24ed81f 318 case KVM_CAP_ONE_REG:
0e673fb6 319 case KVM_CAP_IOEVENTFD:
de56a948
PM
320 r = 1;
321 break;
322#ifndef CONFIG_KVM_BOOK3S_64_HV
323 case KVM_CAP_PPC_PAIRED_SINGLES:
ad0a048b 324 case KVM_CAP_PPC_OSI:
15711e9c 325 case KVM_CAP_PPC_GET_PVINFO:
bf7ca4bd 326#if defined(CONFIG_KVM_E500V2) || defined(CONFIG_KVM_E500MC)
dc83b8bc
SW
327 case KVM_CAP_SW_TLB:
328#endif
e15a1137
AG
329 r = 1;
330 break;
588968b6
LV
331 case KVM_CAP_COALESCED_MMIO:
332 r = KVM_COALESCED_MMIO_PAGE_OFFSET;
333 break;
54738c09 334#endif
f31e65e1 335#ifdef CONFIG_PPC_BOOK3S_64
54738c09 336 case KVM_CAP_SPAPR_TCE:
32fad281 337 case KVM_CAP_PPC_ALLOC_HTAB:
54738c09
DG
338 r = 1;
339 break;
f31e65e1
BH
340#endif /* CONFIG_PPC_BOOK3S_64 */
341#ifdef CONFIG_KVM_BOOK3S_64_HV
371fefd6
PM
342 case KVM_CAP_PPC_SMT:
343 r = threads_per_core;
344 break;
aa04b4cc
PM
345 case KVM_CAP_PPC_RMA:
346 r = 1;
9e368f29
PM
347 /* PPC970 requires an RMA */
348 if (cpu_has_feature(CPU_FTR_ARCH_201))
349 r = 2;
aa04b4cc 350 break;
f4800b1f 351#endif
342d3db7 352 case KVM_CAP_SYNC_MMU:
f4800b1f 353#ifdef CONFIG_KVM_BOOK3S_64_HV
342d3db7 354 r = cpu_has_feature(CPU_FTR_ARCH_206) ? 1 : 0;
f4800b1f
AG
355#elif defined(KVM_ARCH_WANT_MMU_NOTIFIER)
356 r = 1;
357#else
358 r = 0;
a2932923
PM
359 break;
360#endif
361#ifdef CONFIG_KVM_BOOK3S_64_HV
362 case KVM_CAP_PPC_HTAB_FD:
363 r = 1;
364 break;
de56a948 365#endif
f4800b1f 366 break;
b5434032
ME
367 case KVM_CAP_NR_VCPUS:
368 /*
369 * Recommending a number of CPUs is somewhat arbitrary; we
370 * return the number of present CPUs for -HV (since a host
371 * will have secondary threads "offline"), and for other KVM
372 * implementations just count online CPUs.
373 */
374#ifdef CONFIG_KVM_BOOK3S_64_HV
375 r = num_present_cpus();
376#else
377 r = num_online_cpus();
378#endif
379 break;
380 case KVM_CAP_MAX_VCPUS:
381 r = KVM_MAX_VCPUS;
382 break;
5b74716e
BH
383#ifdef CONFIG_PPC_BOOK3S_64
384 case KVM_CAP_PPC_GET_SMMU_INFO:
385 r = 1;
386 break;
387#endif
bbf45ba5
HB
388 default:
389 r = 0;
390 break;
391 }
392 return r;
393
394}
395
396long kvm_arch_dev_ioctl(struct file *filp,
397 unsigned int ioctl, unsigned long arg)
398{
399 return -EINVAL;
400}
401
db3fe4eb
TY
402void kvm_arch_free_memslot(struct kvm_memory_slot *free,
403 struct kvm_memory_slot *dont)
404{
a66b48c3 405 kvmppc_core_free_memslot(free, dont);
db3fe4eb
TY
406}
407
408int kvm_arch_create_memslot(struct kvm_memory_slot *slot, unsigned long npages)
409{
a66b48c3 410 return kvmppc_core_create_memslot(slot, npages);
db3fe4eb
TY
411}
412
f7784b8e 413int kvm_arch_prepare_memory_region(struct kvm *kvm,
462fce46 414 struct kvm_memory_slot *memslot,
7b6195a9
TY
415 struct kvm_userspace_memory_region *mem,
416 enum kvm_mr_change change)
bbf45ba5 417{
a66b48c3 418 return kvmppc_core_prepare_memory_region(kvm, memslot, mem);
bbf45ba5
HB
419}
420
f7784b8e 421void kvm_arch_commit_memory_region(struct kvm *kvm,
462fce46
TY
422 struct kvm_userspace_memory_region *mem,
423 struct kvm_memory_slot old)
f7784b8e 424{
dfe49dbd 425 kvmppc_core_commit_memory_region(kvm, mem, old);
f7784b8e
MT
426}
427
2df72e9b
MT
428void kvm_arch_flush_shadow_all(struct kvm *kvm)
429{
430}
f7784b8e 431
2df72e9b
MT
432void kvm_arch_flush_shadow_memslot(struct kvm *kvm,
433 struct kvm_memory_slot *slot)
34d4cb8f 434{
dfe49dbd 435 kvmppc_core_flush_memslot(kvm, slot);
34d4cb8f
MT
436}
437
bbf45ba5
HB
438struct kvm_vcpu *kvm_arch_vcpu_create(struct kvm *kvm, unsigned int id)
439{
73e75b41
HB
440 struct kvm_vcpu *vcpu;
441 vcpu = kvmppc_core_vcpu_create(kvm, id);
03cdab53
ME
442 if (!IS_ERR(vcpu)) {
443 vcpu->arch.wqp = &vcpu->wq;
06056bfb 444 kvmppc_create_vcpu_debugfs(vcpu, id);
03cdab53 445 }
73e75b41 446 return vcpu;
bbf45ba5
HB
447}
448
42897d86
MT
449int kvm_arch_vcpu_postcreate(struct kvm_vcpu *vcpu)
450{
451 return 0;
452}
453
bbf45ba5
HB
454void kvm_arch_vcpu_free(struct kvm_vcpu *vcpu)
455{
a595405d
AG
456 /* Make sure we're not using the vcpu anymore */
457 hrtimer_cancel(&vcpu->arch.dec_timer);
458 tasklet_kill(&vcpu->arch.tasklet);
459
73e75b41 460 kvmppc_remove_vcpu_debugfs(vcpu);
db93f574 461 kvmppc_core_vcpu_free(vcpu);
bbf45ba5
HB
462}
463
464void kvm_arch_vcpu_destroy(struct kvm_vcpu *vcpu)
465{
466 kvm_arch_vcpu_free(vcpu);
467}
468
469int kvm_cpu_has_pending_timer(struct kvm_vcpu *vcpu)
470{
9dd921cf 471 return kvmppc_core_pending_dec(vcpu);
bbf45ba5
HB
472}
473
544c6761
AG
474/*
475 * low level hrtimer wake routine. Because this runs in hardirq context
476 * we schedule a tasklet to do the real work.
477 */
478enum hrtimer_restart kvmppc_decrementer_wakeup(struct hrtimer *timer)
479{
480 struct kvm_vcpu *vcpu;
481
482 vcpu = container_of(timer, struct kvm_vcpu, arch.dec_timer);
483 tasklet_schedule(&vcpu->arch.tasklet);
484
485 return HRTIMER_NORESTART;
486}
487
bbf45ba5
HB
488int kvm_arch_vcpu_init(struct kvm_vcpu *vcpu)
489{
f61c94bb
BB
490 int ret;
491
544c6761
AG
492 hrtimer_init(&vcpu->arch.dec_timer, CLOCK_REALTIME, HRTIMER_MODE_ABS);
493 tasklet_init(&vcpu->arch.tasklet, kvmppc_decrementer_func, (ulong)vcpu);
494 vcpu->arch.dec_timer.function = kvmppc_decrementer_wakeup;
de56a948 495 vcpu->arch.dec_expires = ~(u64)0;
bbf45ba5 496
09000adb
BB
497#ifdef CONFIG_KVM_EXIT_TIMING
498 mutex_init(&vcpu->arch.exit_timing_lock);
499#endif
f61c94bb
BB
500 ret = kvmppc_subarch_vcpu_init(vcpu);
501 return ret;
bbf45ba5
HB
502}
503
504void kvm_arch_vcpu_uninit(struct kvm_vcpu *vcpu)
505{
ecc0981f 506 kvmppc_mmu_destroy(vcpu);
f61c94bb 507 kvmppc_subarch_vcpu_uninit(vcpu);
bbf45ba5
HB
508}
509
510void kvm_arch_vcpu_load(struct kvm_vcpu *vcpu, int cpu)
511{
eab17672
SW
512#ifdef CONFIG_BOOKE
513 /*
514 * vrsave (formerly usprg0) isn't used by Linux, but may
515 * be used by the guest.
516 *
517 * On non-booke this is associated with Altivec and
518 * is handled by code in book3s.c.
519 */
520 mtspr(SPRN_VRSAVE, vcpu->arch.vrsave);
521#endif
9dd921cf 522 kvmppc_core_vcpu_load(vcpu, cpu);
bbf45ba5
HB
523}
524
525void kvm_arch_vcpu_put(struct kvm_vcpu *vcpu)
526{
9dd921cf 527 kvmppc_core_vcpu_put(vcpu);
eab17672
SW
528#ifdef CONFIG_BOOKE
529 vcpu->arch.vrsave = mfspr(SPRN_VRSAVE);
530#endif
bbf45ba5
HB
531}
532
d0bfb940 533int kvm_arch_vcpu_ioctl_set_guest_debug(struct kvm_vcpu *vcpu,
f5d0906b 534 struct kvm_guest_debug *dbg)
bbf45ba5 535{
f5d0906b 536 return -EINVAL;
bbf45ba5
HB
537}
538
539static void kvmppc_complete_dcr_load(struct kvm_vcpu *vcpu,
540 struct kvm_run *run)
541{
8e5b26b5 542 kvmppc_set_gpr(vcpu, vcpu->arch.io_gpr, run->dcr.data);
bbf45ba5
HB
543}
544
545static void kvmppc_complete_mmio_load(struct kvm_vcpu *vcpu,
546 struct kvm_run *run)
547{
69b61833 548 u64 uninitialized_var(gpr);
bbf45ba5 549
8e5b26b5 550 if (run->mmio.len > sizeof(gpr)) {
bbf45ba5
HB
551 printk(KERN_ERR "bad MMIO length: %d\n", run->mmio.len);
552 return;
553 }
554
555 if (vcpu->arch.mmio_is_bigendian) {
556 switch (run->mmio.len) {
b104d066 557 case 8: gpr = *(u64 *)run->mmio.data; break;
8e5b26b5
AG
558 case 4: gpr = *(u32 *)run->mmio.data; break;
559 case 2: gpr = *(u16 *)run->mmio.data; break;
560 case 1: gpr = *(u8 *)run->mmio.data; break;
bbf45ba5
HB
561 }
562 } else {
563 /* Convert BE data from userland back to LE. */
564 switch (run->mmio.len) {
8e5b26b5
AG
565 case 4: gpr = ld_le32((u32 *)run->mmio.data); break;
566 case 2: gpr = ld_le16((u16 *)run->mmio.data); break;
567 case 1: gpr = *(u8 *)run->mmio.data; break;
bbf45ba5
HB
568 }
569 }
8e5b26b5 570
3587d534
AG
571 if (vcpu->arch.mmio_sign_extend) {
572 switch (run->mmio.len) {
573#ifdef CONFIG_PPC64
574 case 4:
575 gpr = (s64)(s32)gpr;
576 break;
577#endif
578 case 2:
579 gpr = (s64)(s16)gpr;
580 break;
581 case 1:
582 gpr = (s64)(s8)gpr;
583 break;
584 }
585 }
586
8e5b26b5 587 kvmppc_set_gpr(vcpu, vcpu->arch.io_gpr, gpr);
b104d066 588
b3c5d3c2
AG
589 switch (vcpu->arch.io_gpr & KVM_MMIO_REG_EXT_MASK) {
590 case KVM_MMIO_REG_GPR:
b104d066
AG
591 kvmppc_set_gpr(vcpu, vcpu->arch.io_gpr, gpr);
592 break;
b3c5d3c2
AG
593 case KVM_MMIO_REG_FPR:
594 vcpu->arch.fpr[vcpu->arch.io_gpr & KVM_MMIO_REG_MASK] = gpr;
b104d066 595 break;
287d5611 596#ifdef CONFIG_PPC_BOOK3S
b3c5d3c2
AG
597 case KVM_MMIO_REG_QPR:
598 vcpu->arch.qpr[vcpu->arch.io_gpr & KVM_MMIO_REG_MASK] = gpr;
b104d066 599 break;
b3c5d3c2
AG
600 case KVM_MMIO_REG_FQPR:
601 vcpu->arch.fpr[vcpu->arch.io_gpr & KVM_MMIO_REG_MASK] = gpr;
602 vcpu->arch.qpr[vcpu->arch.io_gpr & KVM_MMIO_REG_MASK] = gpr;
b104d066 603 break;
287d5611 604#endif
b104d066
AG
605 default:
606 BUG();
607 }
bbf45ba5
HB
608}
609
610int kvmppc_handle_load(struct kvm_run *run, struct kvm_vcpu *vcpu,
611 unsigned int rt, unsigned int bytes, int is_bigendian)
612{
613 if (bytes > sizeof(run->mmio.data)) {
614 printk(KERN_ERR "%s: bad MMIO length: %d\n", __func__,
615 run->mmio.len);
616 }
617
618 run->mmio.phys_addr = vcpu->arch.paddr_accessed;
619 run->mmio.len = bytes;
620 run->mmio.is_write = 0;
621
622 vcpu->arch.io_gpr = rt;
623 vcpu->arch.mmio_is_bigendian = is_bigendian;
624 vcpu->mmio_needed = 1;
625 vcpu->mmio_is_write = 0;
3587d534 626 vcpu->arch.mmio_sign_extend = 0;
bbf45ba5 627
0e673fb6
AG
628 if (!kvm_io_bus_read(vcpu->kvm, KVM_MMIO_BUS, run->mmio.phys_addr,
629 bytes, &run->mmio.data)) {
630 kvmppc_complete_mmio_load(vcpu, run);
631 vcpu->mmio_needed = 0;
632 return EMULATE_DONE;
633 }
634
bbf45ba5
HB
635 return EMULATE_DO_MMIO;
636}
637
3587d534
AG
638/* Same as above, but sign extends */
639int kvmppc_handle_loads(struct kvm_run *run, struct kvm_vcpu *vcpu,
640 unsigned int rt, unsigned int bytes, int is_bigendian)
641{
642 int r;
643
3587d534 644 vcpu->arch.mmio_sign_extend = 1;
0e673fb6 645 r = kvmppc_handle_load(run, vcpu, rt, bytes, is_bigendian);
3587d534
AG
646
647 return r;
648}
649
bbf45ba5 650int kvmppc_handle_store(struct kvm_run *run, struct kvm_vcpu *vcpu,
b104d066 651 u64 val, unsigned int bytes, int is_bigendian)
bbf45ba5
HB
652{
653 void *data = run->mmio.data;
654
655 if (bytes > sizeof(run->mmio.data)) {
656 printk(KERN_ERR "%s: bad MMIO length: %d\n", __func__,
657 run->mmio.len);
658 }
659
660 run->mmio.phys_addr = vcpu->arch.paddr_accessed;
661 run->mmio.len = bytes;
662 run->mmio.is_write = 1;
663 vcpu->mmio_needed = 1;
664 vcpu->mmio_is_write = 1;
665
666 /* Store the value at the lowest bytes in 'data'. */
667 if (is_bigendian) {
668 switch (bytes) {
b104d066 669 case 8: *(u64 *)data = val; break;
bbf45ba5
HB
670 case 4: *(u32 *)data = val; break;
671 case 2: *(u16 *)data = val; break;
672 case 1: *(u8 *)data = val; break;
673 }
674 } else {
675 /* Store LE value into 'data'. */
676 switch (bytes) {
677 case 4: st_le32(data, val); break;
678 case 2: st_le16(data, val); break;
679 case 1: *(u8 *)data = val; break;
680 }
681 }
682
0e673fb6
AG
683 if (!kvm_io_bus_write(vcpu->kvm, KVM_MMIO_BUS, run->mmio.phys_addr,
684 bytes, &run->mmio.data)) {
685 kvmppc_complete_mmio_load(vcpu, run);
686 vcpu->mmio_needed = 0;
687 return EMULATE_DONE;
688 }
689
bbf45ba5
HB
690 return EMULATE_DO_MMIO;
691}
692
693int kvm_arch_vcpu_ioctl_run(struct kvm_vcpu *vcpu, struct kvm_run *run)
694{
695 int r;
696 sigset_t sigsaved;
697
698 if (vcpu->sigset_active)
699 sigprocmask(SIG_SETMASK, &vcpu->sigset, &sigsaved);
700
701 if (vcpu->mmio_needed) {
702 if (!vcpu->mmio_is_write)
703 kvmppc_complete_mmio_load(vcpu, run);
704 vcpu->mmio_needed = 0;
705 } else if (vcpu->arch.dcr_needed) {
706 if (!vcpu->arch.dcr_is_write)
707 kvmppc_complete_dcr_load(vcpu, run);
708 vcpu->arch.dcr_needed = 0;
ad0a048b
AG
709 } else if (vcpu->arch.osi_needed) {
710 u64 *gprs = run->osi.gprs;
711 int i;
712
713 for (i = 0; i < 32; i++)
714 kvmppc_set_gpr(vcpu, i, gprs[i]);
715 vcpu->arch.osi_needed = 0;
de56a948
PM
716 } else if (vcpu->arch.hcall_needed) {
717 int i;
718
719 kvmppc_set_gpr(vcpu, 3, run->papr_hcall.ret);
720 for (i = 0; i < 9; ++i)
721 kvmppc_set_gpr(vcpu, 4 + i, run->papr_hcall.args[i]);
722 vcpu->arch.hcall_needed = 0;
1c810636
AG
723#ifdef CONFIG_BOOKE
724 } else if (vcpu->arch.epr_needed) {
725 kvmppc_set_epr(vcpu, run->epr.epr);
726 vcpu->arch.epr_needed = 0;
727#endif
bbf45ba5
HB
728 }
729
df6909e5 730 r = kvmppc_vcpu_run(run, vcpu);
bbf45ba5
HB
731
732 if (vcpu->sigset_active)
733 sigprocmask(SIG_SETMASK, &sigsaved, NULL);
734
735 return r;
736}
737
738int kvm_vcpu_ioctl_interrupt(struct kvm_vcpu *vcpu, struct kvm_interrupt *irq)
739{
19ccb76a 740 if (irq->irq == KVM_INTERRUPT_UNSET) {
18978768 741 kvmppc_core_dequeue_external(vcpu, irq);
19ccb76a
PM
742 return 0;
743 }
744
745 kvmppc_core_queue_external(vcpu, irq);
b6d33834 746
dfd4d47e 747 kvm_vcpu_kick(vcpu);
45c5eb67 748
bbf45ba5
HB
749 return 0;
750}
751
71fbfd5f
AG
752static int kvm_vcpu_ioctl_enable_cap(struct kvm_vcpu *vcpu,
753 struct kvm_enable_cap *cap)
754{
755 int r;
756
757 if (cap->flags)
758 return -EINVAL;
759
760 switch (cap->cap) {
ad0a048b
AG
761 case KVM_CAP_PPC_OSI:
762 r = 0;
763 vcpu->arch.osi_enabled = true;
764 break;
930b412a
AG
765 case KVM_CAP_PPC_PAPR:
766 r = 0;
767 vcpu->arch.papr_enabled = true;
768 break;
1c810636
AG
769 case KVM_CAP_PPC_EPR:
770 r = 0;
771 vcpu->arch.epr_enabled = cap->args[0];
772 break;
f61c94bb
BB
773#ifdef CONFIG_BOOKE
774 case KVM_CAP_PPC_BOOKE_WATCHDOG:
775 r = 0;
776 vcpu->arch.watchdog_enabled = true;
777 break;
778#endif
bf7ca4bd 779#if defined(CONFIG_KVM_E500V2) || defined(CONFIG_KVM_E500MC)
dc83b8bc
SW
780 case KVM_CAP_SW_TLB: {
781 struct kvm_config_tlb cfg;
782 void __user *user_ptr = (void __user *)(uintptr_t)cap->args[0];
783
784 r = -EFAULT;
785 if (copy_from_user(&cfg, user_ptr, sizeof(cfg)))
786 break;
787
788 r = kvm_vcpu_ioctl_config_tlb(vcpu, &cfg);
789 break;
790 }
791#endif
71fbfd5f
AG
792 default:
793 r = -EINVAL;
794 break;
795 }
796
af8f38b3
AG
797 if (!r)
798 r = kvmppc_sanity_check(vcpu);
799
71fbfd5f
AG
800 return r;
801}
802
bbf45ba5
HB
803int kvm_arch_vcpu_ioctl_get_mpstate(struct kvm_vcpu *vcpu,
804 struct kvm_mp_state *mp_state)
805{
806 return -EINVAL;
807}
808
809int kvm_arch_vcpu_ioctl_set_mpstate(struct kvm_vcpu *vcpu,
810 struct kvm_mp_state *mp_state)
811{
812 return -EINVAL;
813}
814
815long kvm_arch_vcpu_ioctl(struct file *filp,
816 unsigned int ioctl, unsigned long arg)
817{
818 struct kvm_vcpu *vcpu = filp->private_data;
819 void __user *argp = (void __user *)arg;
820 long r;
821
93736624
AK
822 switch (ioctl) {
823 case KVM_INTERRUPT: {
bbf45ba5
HB
824 struct kvm_interrupt irq;
825 r = -EFAULT;
826 if (copy_from_user(&irq, argp, sizeof(irq)))
93736624 827 goto out;
bbf45ba5 828 r = kvm_vcpu_ioctl_interrupt(vcpu, &irq);
93736624 829 goto out;
bbf45ba5 830 }
19483d14 831
71fbfd5f
AG
832 case KVM_ENABLE_CAP:
833 {
834 struct kvm_enable_cap cap;
835 r = -EFAULT;
836 if (copy_from_user(&cap, argp, sizeof(cap)))
837 goto out;
838 r = kvm_vcpu_ioctl_enable_cap(vcpu, &cap);
839 break;
840 }
dc83b8bc 841
e24ed81f
AG
842 case KVM_SET_ONE_REG:
843 case KVM_GET_ONE_REG:
844 {
845 struct kvm_one_reg reg;
846 r = -EFAULT;
847 if (copy_from_user(&reg, argp, sizeof(reg)))
848 goto out;
849 if (ioctl == KVM_SET_ONE_REG)
850 r = kvm_vcpu_ioctl_set_one_reg(vcpu, &reg);
851 else
852 r = kvm_vcpu_ioctl_get_one_reg(vcpu, &reg);
853 break;
854 }
855
bf7ca4bd 856#if defined(CONFIG_KVM_E500V2) || defined(CONFIG_KVM_E500MC)
dc83b8bc
SW
857 case KVM_DIRTY_TLB: {
858 struct kvm_dirty_tlb dirty;
859 r = -EFAULT;
860 if (copy_from_user(&dirty, argp, sizeof(dirty)))
861 goto out;
862 r = kvm_vcpu_ioctl_dirty_tlb(vcpu, &dirty);
863 break;
864 }
865#endif
bbf45ba5
HB
866 default:
867 r = -EINVAL;
868 }
869
870out:
871 return r;
872}
873
5b1c1493
CO
874int kvm_arch_vcpu_fault(struct kvm_vcpu *vcpu, struct vm_fault *vmf)
875{
876 return VM_FAULT_SIGBUS;
877}
878
15711e9c
AG
879static int kvm_vm_ioctl_get_pvinfo(struct kvm_ppc_pvinfo *pvinfo)
880{
784bafac
SY
881 u32 inst_nop = 0x60000000;
882#ifdef CONFIG_KVM_BOOKE_HV
883 u32 inst_sc1 = 0x44000022;
884 pvinfo->hcall[0] = inst_sc1;
885 pvinfo->hcall[1] = inst_nop;
886 pvinfo->hcall[2] = inst_nop;
887 pvinfo->hcall[3] = inst_nop;
888#else
15711e9c
AG
889 u32 inst_lis = 0x3c000000;
890 u32 inst_ori = 0x60000000;
15711e9c
AG
891 u32 inst_sc = 0x44000002;
892 u32 inst_imm_mask = 0xffff;
893
894 /*
895 * The hypercall to get into KVM from within guest context is as
896 * follows:
897 *
898 * lis r0, r0, KVM_SC_MAGIC_R0@h
899 * ori r0, KVM_SC_MAGIC_R0@l
900 * sc
901 * nop
902 */
903 pvinfo->hcall[0] = inst_lis | ((KVM_SC_MAGIC_R0 >> 16) & inst_imm_mask);
904 pvinfo->hcall[1] = inst_ori | (KVM_SC_MAGIC_R0 & inst_imm_mask);
905 pvinfo->hcall[2] = inst_sc;
906 pvinfo->hcall[3] = inst_nop;
784bafac 907#endif
15711e9c 908
9202e076
LYB
909 pvinfo->flags = KVM_PPC_PVINFO_FLAGS_EV_IDLE;
910
15711e9c
AG
911 return 0;
912}
913
bbf45ba5
HB
914long kvm_arch_vm_ioctl(struct file *filp,
915 unsigned int ioctl, unsigned long arg)
916{
15711e9c 917 void __user *argp = (void __user *)arg;
bbf45ba5
HB
918 long r;
919
920 switch (ioctl) {
15711e9c
AG
921 case KVM_PPC_GET_PVINFO: {
922 struct kvm_ppc_pvinfo pvinfo;
d8cdddcd 923 memset(&pvinfo, 0, sizeof(pvinfo));
15711e9c
AG
924 r = kvm_vm_ioctl_get_pvinfo(&pvinfo);
925 if (copy_to_user(argp, &pvinfo, sizeof(pvinfo))) {
926 r = -EFAULT;
927 goto out;
928 }
929
930 break;
931 }
f31e65e1 932#ifdef CONFIG_PPC_BOOK3S_64
54738c09
DG
933 case KVM_CREATE_SPAPR_TCE: {
934 struct kvm_create_spapr_tce create_tce;
935 struct kvm *kvm = filp->private_data;
936
937 r = -EFAULT;
938 if (copy_from_user(&create_tce, argp, sizeof(create_tce)))
939 goto out;
940 r = kvm_vm_ioctl_create_spapr_tce(kvm, &create_tce);
941 goto out;
942 }
f31e65e1 943#endif /* CONFIG_PPC_BOOK3S_64 */
aa04b4cc 944
f31e65e1 945#ifdef CONFIG_KVM_BOOK3S_64_HV
aa04b4cc
PM
946 case KVM_ALLOCATE_RMA: {
947 struct kvm *kvm = filp->private_data;
948 struct kvm_allocate_rma rma;
949
950 r = kvm_vm_ioctl_allocate_rma(kvm, &rma);
951 if (r >= 0 && copy_to_user(argp, &rma, sizeof(rma)))
952 r = -EFAULT;
953 break;
954 }
32fad281
PM
955
956 case KVM_PPC_ALLOCATE_HTAB: {
957 struct kvm *kvm = filp->private_data;
958 u32 htab_order;
959
960 r = -EFAULT;
961 if (get_user(htab_order, (u32 __user *)argp))
962 break;
963 r = kvmppc_alloc_reset_hpt(kvm, &htab_order);
964 if (r)
965 break;
966 r = -EFAULT;
967 if (put_user(htab_order, (u32 __user *)argp))
968 break;
969 r = 0;
970 break;
971 }
a2932923
PM
972
973 case KVM_PPC_GET_HTAB_FD: {
974 struct kvm *kvm = filp->private_data;
975 struct kvm_get_htab_fd ghf;
976
977 r = -EFAULT;
978 if (copy_from_user(&ghf, argp, sizeof(ghf)))
979 break;
980 r = kvm_vm_ioctl_get_htab_fd(kvm, &ghf);
981 break;
982 }
54738c09
DG
983#endif /* CONFIG_KVM_BOOK3S_64_HV */
984
5b74716e
BH
985#ifdef CONFIG_PPC_BOOK3S_64
986 case KVM_PPC_GET_SMMU_INFO: {
987 struct kvm *kvm = filp->private_data;
988 struct kvm_ppc_smmu_info info;
989
990 memset(&info, 0, sizeof(info));
991 r = kvm_vm_ioctl_get_smmu_info(kvm, &info);
992 if (r >= 0 && copy_to_user(argp, &info, sizeof(info)))
993 r = -EFAULT;
994 break;
995 }
996#endif /* CONFIG_PPC_BOOK3S_64 */
bbf45ba5 997 default:
367e1319 998 r = -ENOTTY;
bbf45ba5
HB
999 }
1000
15711e9c 1001out:
bbf45ba5
HB
1002 return r;
1003}
1004
043cc4d7
SW
1005static unsigned long lpid_inuse[BITS_TO_LONGS(KVMPPC_NR_LPIDS)];
1006static unsigned long nr_lpids;
1007
1008long kvmppc_alloc_lpid(void)
1009{
1010 long lpid;
1011
1012 do {
1013 lpid = find_first_zero_bit(lpid_inuse, KVMPPC_NR_LPIDS);
1014 if (lpid >= nr_lpids) {
1015 pr_err("%s: No LPIDs free\n", __func__);
1016 return -ENOMEM;
1017 }
1018 } while (test_and_set_bit(lpid, lpid_inuse));
1019
1020 return lpid;
1021}
1022
1023void kvmppc_claim_lpid(long lpid)
1024{
1025 set_bit(lpid, lpid_inuse);
1026}
1027
1028void kvmppc_free_lpid(long lpid)
1029{
1030 clear_bit(lpid, lpid_inuse);
1031}
1032
1033void kvmppc_init_lpid(unsigned long nr_lpids_param)
1034{
1035 nr_lpids = min_t(unsigned long, KVMPPC_NR_LPIDS, nr_lpids_param);
1036 memset(lpid_inuse, 0, sizeof(lpid_inuse));
1037}
1038
bbf45ba5
HB
1039int kvm_arch_init(void *opaque)
1040{
1041 return 0;
1042}
1043
1044void kvm_arch_exit(void)
1045{
1046}