1/* 2 * This program is free software; you can redistribute it and/or modify 3 * it under the terms of the GNU General Public License, version 2, as 4 * published by the Free Software Foundation. 5 * 6 * This program is distributed in the hope that it will be useful, 7 * but WITHOUT ANY WARRANTY; without even the implied warranty of 8 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the 9 * GNU General Public License for more details. 10 * 11 * Copyright 2011 Paul Mackerras, IBM Corp. <paulus@au1.ibm.com> 12 * 13 * Derived from book3s_rmhandlers.S and other files, which are: 14 * 15 * Copyright SUSE Linux Products GmbH 2009 16 * 17 * Authors: Alexander Graf <agraf@suse.de> 18 */ 19 20#include <asm/ppc_asm.h> 21#include <asm/kvm_asm.h> 22#include <asm/reg.h> 23#include <asm/mmu.h> 24#include <asm/page.h> 25#include <asm/ptrace.h> 26#include <asm/hvcall.h> 27#include <asm/asm-offsets.h> 28#include <asm/exception-64s.h> 29#include <asm/kvm_book3s_asm.h> 30#include <asm/book3s/64/mmu-hash.h> 31#include <asm/tm.h> 32#include <asm/opal.h> 33 34#define VCPU_GPRS_TM(reg) (((reg) * ULONG_SIZE) + VCPU_GPR_TM) 35 36/* Values in HSTATE_NAPPING(r13) */ 37#define NAPPING_CEDE 1 38#define NAPPING_NOVCPU 2 39 40/* 41 * Call kvmppc_hv_entry in real mode. 42 * Must be called with interrupts hard-disabled. 43 * 44 * Input Registers: 45 * 46 * LR = return address to continue at after eventually re-enabling MMU 47 */ 48_GLOBAL_TOC(kvmppc_hv_entry_trampoline) 49 mflr r0 50 std r0, PPC_LR_STKOFF(r1) 51 stdu r1, -112(r1) 52 mfmsr r10 53 LOAD_REG_ADDR(r5, kvmppc_call_hv_entry) 54 li r0,MSR_RI 55 andc r0,r10,r0 56 li r6,MSR_IR | MSR_DR 57 andc r6,r10,r6 58 mtmsrd r0,1 /* clear RI in MSR */ 59 mtsrr0 r5 60 mtsrr1 r6 61 RFI 62 63kvmppc_call_hv_entry: 64 ld r4, HSTATE_KVM_VCPU(r13) 65 bl kvmppc_hv_entry 66 67 /* Back from guest - restore host state and return to caller */ 68 69BEGIN_FTR_SECTION 70 /* Restore host DABR and DABRX */ 71 ld r5,HSTATE_DABR(r13) 72 li r6,7 73 mtspr SPRN_DABR,r5 74 mtspr SPRN_DABRX,r6 75END_FTR_SECTION_IFCLR(CPU_FTR_ARCH_207S) 76 77 /* Restore SPRG3 */ 78 ld r3,PACA_SPRG_VDSO(r13) 79 mtspr SPRN_SPRG_VDSO_WRITE,r3 80 81 /* Reload the host's PMU registers */ 82 ld r3, PACALPPACAPTR(r13) /* is the host using the PMU? */ 83 lbz r4, LPPACA_PMCINUSE(r3) 84 cmpwi r4, 0 85 beq 23f /* skip if not */ 86BEGIN_FTR_SECTION 87 ld r3, HSTATE_MMCR0(r13) 88 andi. r4, r3, MMCR0_PMAO_SYNC | MMCR0_PMAO 89 cmpwi r4, MMCR0_PMAO 90 beql kvmppc_fix_pmao 91END_FTR_SECTION_IFSET(CPU_FTR_PMAO_BUG) 92 lwz r3, HSTATE_PMC1(r13) 93 lwz r4, HSTATE_PMC2(r13) 94 lwz r5, HSTATE_PMC3(r13) 95 lwz r6, HSTATE_PMC4(r13) 96 lwz r8, HSTATE_PMC5(r13) 97 lwz r9, HSTATE_PMC6(r13) 98 mtspr SPRN_PMC1, r3 99 mtspr SPRN_PMC2, r4 100 mtspr SPRN_PMC3, r5 101 mtspr SPRN_PMC4, r6 102 mtspr SPRN_PMC5, r8 103 mtspr SPRN_PMC6, r9 104 ld r3, HSTATE_MMCR0(r13) 105 ld r4, HSTATE_MMCR1(r13) 106 ld r5, HSTATE_MMCRA(r13) 107 ld r6, HSTATE_SIAR(r13) 108 ld r7, HSTATE_SDAR(r13) 109 mtspr SPRN_MMCR1, r4 110 mtspr SPRN_MMCRA, r5 111 mtspr SPRN_SIAR, r6 112 mtspr SPRN_SDAR, r7 113BEGIN_FTR_SECTION 114 ld r8, HSTATE_MMCR2(r13) 115 ld r9, HSTATE_SIER(r13) 116 mtspr SPRN_MMCR2, r8 117 mtspr SPRN_SIER, r9 118END_FTR_SECTION_IFSET(CPU_FTR_ARCH_207S) 119 mtspr SPRN_MMCR0, r3 120 isync 12123: 122 123 /* 124 * Reload DEC. HDEC interrupts were disabled when 125 * we reloaded the host's LPCR value. 126 */ 127 ld r3, HSTATE_DECEXP(r13) 128 mftb r4 129 subf r4, r4, r3 130 mtspr SPRN_DEC, r4 131 132 /* hwthread_req may have got set by cede or no vcpu, so clear it */ 133 li r0, 0 134 stb r0, HSTATE_HWTHREAD_REQ(r13) 135 136 /* 137 * For external and machine check interrupts, we need 138 * to call the Linux handler to process the interrupt. 139 * We do that by jumping to absolute address 0x500 for 140 * external interrupts, or the machine_check_fwnmi label 141 * for machine checks (since firmware might have patched 142 * the vector area at 0x200). The [h]rfid at the end of the 143 * handler will return to the book3s_hv_interrupts.S code. 144 * For other interrupts we do the rfid to get back 145 * to the book3s_hv_interrupts.S code here. 146 */ 147 ld r8, 112+PPC_LR_STKOFF(r1) 148 addi r1, r1, 112 149 ld r7, HSTATE_HOST_MSR(r13) 150 151 cmpwi cr1, r12, BOOK3S_INTERRUPT_MACHINE_CHECK 152 cmpwi r12, BOOK3S_INTERRUPT_EXTERNAL 153 beq 11f 154 cmpwi r12, BOOK3S_INTERRUPT_H_DOORBELL 155 beq 15f /* Invoke the H_DOORBELL handler */ 156 cmpwi cr2, r12, BOOK3S_INTERRUPT_HMI 157 beq cr2, 14f /* HMI check */ 158 159 /* RFI into the highmem handler, or branch to interrupt handler */ 160 mfmsr r6 161 li r0, MSR_RI 162 andc r6, r6, r0 163 mtmsrd r6, 1 /* Clear RI in MSR */ 164 mtsrr0 r8 165 mtsrr1 r7 166 beq cr1, 13f /* machine check */ 167 RFI 168 169 /* On POWER7, we have external interrupts set to use HSRR0/1 */ 17011: mtspr SPRN_HSRR0, r8 171 mtspr SPRN_HSRR1, r7 172 ba 0x500 173 17413: b machine_check_fwnmi 175 17614: mtspr SPRN_HSRR0, r8 177 mtspr SPRN_HSRR1, r7 178 b hmi_exception_after_realmode 179 18015: mtspr SPRN_HSRR0, r8 181 mtspr SPRN_HSRR1, r7 182 ba 0xe80 183 184kvmppc_primary_no_guest: 185 /* We handle this much like a ceded vcpu */ 186 /* put the HDEC into the DEC, since HDEC interrupts don't wake us */ 187 mfspr r3, SPRN_HDEC 188 mtspr SPRN_DEC, r3 189 /* 190 * Make sure the primary has finished the MMU switch. 191 * We should never get here on a secondary thread, but 192 * check it for robustness' sake. 193 */ 194 ld r5, HSTATE_KVM_VCORE(r13) 19565: lbz r0, VCORE_IN_GUEST(r5) 196 cmpwi r0, 0 197 beq 65b 198 /* Set LPCR. */ 199 ld r8,VCORE_LPCR(r5) 200 mtspr SPRN_LPCR,r8 201 isync 202 /* set our bit in napping_threads */ 203 ld r5, HSTATE_KVM_VCORE(r13) 204 lbz r7, HSTATE_PTID(r13) 205 li r0, 1 206 sld r0, r0, r7 207 addi r6, r5, VCORE_NAPPING_THREADS 2081: lwarx r3, 0, r6 209 or r3, r3, r0 210 stwcx. r3, 0, r6 211 bne 1b 212 /* order napping_threads update vs testing entry_exit_map */ 213 isync 214 li r12, 0 215 lwz r7, VCORE_ENTRY_EXIT(r5) 216 cmpwi r7, 0x100 217 bge kvm_novcpu_exit /* another thread already exiting */ 218 li r3, NAPPING_NOVCPU 219 stb r3, HSTATE_NAPPING(r13) 220 221 li r3, 0 /* Don't wake on privileged (OS) doorbell */ 222 b kvm_do_nap 223 224/* 225 * kvm_novcpu_wakeup 226 * Entered from kvm_start_guest if kvm_hstate.napping is set 227 * to NAPPING_NOVCPU 228 * r2 = kernel TOC 229 * r13 = paca 230 */ 231kvm_novcpu_wakeup: 232 ld r1, HSTATE_HOST_R1(r13) 233 ld r5, HSTATE_KVM_VCORE(r13) 234 li r0, 0 235 stb r0, HSTATE_NAPPING(r13) 236 237 /* check the wake reason */ 238 bl kvmppc_check_wake_reason 239 240 /* 241 * Restore volatile registers since we could have called 242 * a C routine in kvmppc_check_wake_reason. 243 * r5 = VCORE 244 */ 245 ld r5, HSTATE_KVM_VCORE(r13) 246 247 /* see if any other thread is already exiting */ 248 lwz r0, VCORE_ENTRY_EXIT(r5) 249 cmpwi r0, 0x100 250 bge kvm_novcpu_exit 251 252 /* clear our bit in napping_threads */ 253 lbz r7, HSTATE_PTID(r13) 254 li r0, 1 255 sld r0, r0, r7 256 addi r6, r5, VCORE_NAPPING_THREADS 2574: lwarx r7, 0, r6 258 andc r7, r7, r0 259 stwcx. r7, 0, r6 260 bne 4b 261 262 /* See if the wake reason means we need to exit */ 263 cmpdi r3, 0 264 bge kvm_novcpu_exit 265 266 /* See if our timeslice has expired (HDEC is negative) */ 267 mfspr r0, SPRN_HDEC 268 li r12, BOOK3S_INTERRUPT_HV_DECREMENTER 269 cmpwi r0, 0 270 blt kvm_novcpu_exit 271 272 /* Got an IPI but other vcpus aren't yet exiting, must be a latecomer */ 273 ld r4, HSTATE_KVM_VCPU(r13) 274 cmpdi r4, 0 275 beq kvmppc_primary_no_guest 276 277#ifdef CONFIG_KVM_BOOK3S_HV_EXIT_TIMING 278 addi r3, r4, VCPU_TB_RMENTRY 279 bl kvmhv_start_timing 280#endif 281 b kvmppc_got_guest 282 283kvm_novcpu_exit: 284#ifdef CONFIG_KVM_BOOK3S_HV_EXIT_TIMING 285 ld r4, HSTATE_KVM_VCPU(r13) 286 cmpdi r4, 0 287 beq 13f 288 addi r3, r4, VCPU_TB_RMEXIT 289 bl kvmhv_accumulate_time 290#endif 29113: mr r3, r12 292 stw r12, 112-4(r1) 293 bl kvmhv_commence_exit 294 nop 295 lwz r12, 112-4(r1) 296 b kvmhv_switch_to_host 297 298/* 299 * We come in here when wakened from nap mode. 300 * Relocation is off and most register values are lost. 301 * r13 points to the PACA. 302 */ 303 .globl kvm_start_guest 304kvm_start_guest: 305 306 /* Set runlatch bit the minute you wake up from nap */ 307 mfspr r0, SPRN_CTRLF 308 ori r0, r0, 1 309 mtspr SPRN_CTRLT, r0 310 311 ld r2,PACATOC(r13) 312 313 li r0,KVM_HWTHREAD_IN_KVM 314 stb r0,HSTATE_HWTHREAD_STATE(r13) 315 316 /* NV GPR values from power7_idle() will no longer be valid */ 317 li r0,1 318 stb r0,PACA_NAPSTATELOST(r13) 319 320 /* were we napping due to cede? */ 321 lbz r0,HSTATE_NAPPING(r13) 322 cmpwi r0,NAPPING_CEDE 323 beq kvm_end_cede 324 cmpwi r0,NAPPING_NOVCPU 325 beq kvm_novcpu_wakeup 326 327 ld r1,PACAEMERGSP(r13) 328 subi r1,r1,STACK_FRAME_OVERHEAD 329 330 /* 331 * We weren't napping due to cede, so this must be a secondary 332 * thread being woken up to run a guest, or being woken up due 333 * to a stray IPI. (Or due to some machine check or hypervisor 334 * maintenance interrupt while the core is in KVM.) 335 */ 336 337 /* Check the wake reason in SRR1 to see why we got here */ 338 bl kvmppc_check_wake_reason 339 /* 340 * kvmppc_check_wake_reason could invoke a C routine, but we 341 * have no volatile registers to restore when we return. 342 */ 343 344 cmpdi r3, 0 345 bge kvm_no_guest 346 347 /* get vcore pointer, NULL if we have nothing to run */ 348 ld r5,HSTATE_KVM_VCORE(r13) 349 cmpdi r5,0 350 /* if we have no vcore to run, go back to sleep */ 351 beq kvm_no_guest 352 353kvm_secondary_got_guest: 354 355 /* Set HSTATE_DSCR(r13) to something sensible */ 356 ld r6, PACA_DSCR_DEFAULT(r13) 357 std r6, HSTATE_DSCR(r13) 358 359 /* On thread 0 of a subcore, set HDEC to max */ 360 lbz r4, HSTATE_PTID(r13) 361 cmpwi r4, 0 362 bne 63f 363 lis r6, 0x7fff 364 ori r6, r6, 0xffff 365 mtspr SPRN_HDEC, r6 366 /* and set per-LPAR registers, if doing dynamic micro-threading */ 367 ld r6, HSTATE_SPLIT_MODE(r13) 368 cmpdi r6, 0 369 beq 63f 370 ld r0, KVM_SPLIT_RPR(r6) 371 mtspr SPRN_RPR, r0 372 ld r0, KVM_SPLIT_PMMAR(r6) 373 mtspr SPRN_PMMAR, r0 374 ld r0, KVM_SPLIT_LDBAR(r6) 375 mtspr SPRN_LDBAR, r0 376 isync 37763: 378 /* Order load of vcpu after load of vcore */ 379 lwsync 380 ld r4, HSTATE_KVM_VCPU(r13) 381 bl kvmppc_hv_entry 382 383 /* Back from the guest, go back to nap */ 384 /* Clear our vcpu and vcore pointers so we don't come back in early */ 385 li r0, 0 386 std r0, HSTATE_KVM_VCPU(r13) 387 /* 388 * Once we clear HSTATE_KVM_VCORE(r13), the code in 389 * kvmppc_run_core() is going to assume that all our vcpu 390 * state is visible in memory. This lwsync makes sure 391 * that that is true. 392 */ 393 lwsync 394 std r0, HSTATE_KVM_VCORE(r13) 395 396 /* 397 * All secondaries exiting guest will fall through this path. 398 * Before proceeding, just check for HMI interrupt and 399 * invoke opal hmi handler. By now we are sure that the 400 * primary thread on this core/subcore has already made partition 401 * switch/TB resync and we are good to call opal hmi handler. 402 */ 403 cmpwi r12, BOOK3S_INTERRUPT_HMI 404 bne kvm_no_guest 405 406 li r3,0 /* NULL argument */ 407 bl hmi_exception_realmode 408/* 409 * At this point we have finished executing in the guest. 410 * We need to wait for hwthread_req to become zero, since 411 * we may not turn on the MMU while hwthread_req is non-zero. 412 * While waiting we also need to check if we get given a vcpu to run. 413 */ 414kvm_no_guest: 415 lbz r3, HSTATE_HWTHREAD_REQ(r13) 416 cmpwi r3, 0 417 bne 53f 418 HMT_MEDIUM 419 li r0, KVM_HWTHREAD_IN_KERNEL 420 stb r0, HSTATE_HWTHREAD_STATE(r13) 421 /* need to recheck hwthread_req after a barrier, to avoid race */ 422 sync 423 lbz r3, HSTATE_HWTHREAD_REQ(r13) 424 cmpwi r3, 0 425 bne 54f 426/* 427 * We jump to pnv_wakeup_loss, which will return to the caller 428 * of power7_nap in the powernv cpu offline loop. The value we 429 * put in r3 becomes the return value for power7_nap. 430 */ 431 li r3, LPCR_PECE0 432 mfspr r4, SPRN_LPCR 433 rlwimi r4, r3, 0, LPCR_PECE0 | LPCR_PECE1 434 mtspr SPRN_LPCR, r4 435 li r3, 0 436 b pnv_wakeup_loss 437 43853: HMT_LOW 439 ld r5, HSTATE_KVM_VCORE(r13) 440 cmpdi r5, 0 441 bne 60f 442 ld r3, HSTATE_SPLIT_MODE(r13) 443 cmpdi r3, 0 444 beq kvm_no_guest 445 lbz r0, KVM_SPLIT_DO_NAP(r3) 446 cmpwi r0, 0 447 beq kvm_no_guest 448 HMT_MEDIUM 449 b kvm_unsplit_nap 45060: HMT_MEDIUM 451 b kvm_secondary_got_guest 452 45354: li r0, KVM_HWTHREAD_IN_KVM 454 stb r0, HSTATE_HWTHREAD_STATE(r13) 455 b kvm_no_guest 456 457/* 458 * Here the primary thread is trying to return the core to 459 * whole-core mode, so we need to nap. 460 */ 461kvm_unsplit_nap: 462 /* 463 * When secondaries are napping in kvm_unsplit_nap() with 464 * hwthread_req = 1, HMI goes ignored even though subcores are 465 * already exited the guest. Hence HMI keeps waking up secondaries 466 * from nap in a loop and secondaries always go back to nap since 467 * no vcore is assigned to them. This makes impossible for primary 468 * thread to get hold of secondary threads resulting into a soft 469 * lockup in KVM path. 470 * 471 * Let us check if HMI is pending and handle it before we go to nap. 472 */ 473 cmpwi r12, BOOK3S_INTERRUPT_HMI 474 bne 55f 475 li r3, 0 /* NULL argument */ 476 bl hmi_exception_realmode 47755: 478 /* 479 * Ensure that secondary doesn't nap when it has 480 * its vcore pointer set. 481 */ 482 sync /* matches smp_mb() before setting split_info.do_nap */ 483 ld r0, HSTATE_KVM_VCORE(r13) 484 cmpdi r0, 0 485 bne kvm_no_guest 486 /* clear any pending message */ 487BEGIN_FTR_SECTION 488 lis r6, (PPC_DBELL_SERVER << (63-36))@h 489 PPC_MSGCLR(6) 490END_FTR_SECTION_IFSET(CPU_FTR_ARCH_207S) 491 /* Set kvm_split_mode.napped[tid] = 1 */ 492 ld r3, HSTATE_SPLIT_MODE(r13) 493 li r0, 1 494 lhz r4, PACAPACAINDEX(r13) 495 clrldi r4, r4, 61 /* micro-threading => P8 => 8 threads/core */ 496 addi r4, r4, KVM_SPLIT_NAPPED 497 stbx r0, r3, r4 498 /* Check the do_nap flag again after setting napped[] */ 499 sync 500 lbz r0, KVM_SPLIT_DO_NAP(r3) 501 cmpwi r0, 0 502 beq 57f 503 li r3, (LPCR_PECEDH | LPCR_PECE0) >> 4 504 mfspr r4, SPRN_LPCR 505 rlwimi r4, r3, 4, (LPCR_PECEDP | LPCR_PECEDH | LPCR_PECE0 | LPCR_PECE1) 506 mtspr SPRN_LPCR, r4 507 isync 508 std r0, HSTATE_SCRATCH0(r13) 509 ptesync 510 ld r0, HSTATE_SCRATCH0(r13) 5111: cmpd r0, r0 512 bne 1b 513 nap 514 b . 515 51657: li r0, 0 517 stbx r0, r3, r4 518 b kvm_no_guest 519 520/****************************************************************************** 521 * * 522 * Entry code * 523 * * 524 *****************************************************************************/ 525 526.global kvmppc_hv_entry 527kvmppc_hv_entry: 528 529 /* Required state: 530 * 531 * R4 = vcpu pointer (or NULL) 532 * MSR = ~IR|DR 533 * R13 = PACA 534 * R1 = host R1 535 * R2 = TOC 536 * all other volatile GPRS = free 537 */ 538 mflr r0 539 std r0, PPC_LR_STKOFF(r1) 540 stdu r1, -112(r1) 541 542 /* Save R1 in the PACA */ 543 std r1, HSTATE_HOST_R1(r13) 544 545 li r6, KVM_GUEST_MODE_HOST_HV 546 stb r6, HSTATE_IN_GUEST(r13) 547 548#ifdef CONFIG_KVM_BOOK3S_HV_EXIT_TIMING 549 /* Store initial timestamp */ 550 cmpdi r4, 0 551 beq 1f 552 addi r3, r4, VCPU_TB_RMENTRY 553 bl kvmhv_start_timing 5541: 555#endif 556 /* Clear out SLB */ 557 li r6,0 558 slbmte r6,r6 559 slbia 560 ptesync 561 562 /* 563 * POWER7/POWER8 host -> guest partition switch code. 564 * We don't have to lock against concurrent tlbies, 565 * but we do have to coordinate across hardware threads. 566 */ 567 /* Set bit in entry map iff exit map is zero. */ 568 ld r5, HSTATE_KVM_VCORE(r13) 569 li r7, 1 570 lbz r6, HSTATE_PTID(r13) 571 sld r7, r7, r6 572 addi r9, r5, VCORE_ENTRY_EXIT 57321: lwarx r3, 0, r9 574 cmpwi r3, 0x100 /* any threads starting to exit? */ 575 bge secondary_too_late /* if so we're too late to the party */ 576 or r3, r3, r7 577 stwcx. r3, 0, r9 578 bne 21b 579 580 /* Primary thread switches to guest partition. */ 581 ld r9,VCORE_KVM(r5) /* pointer to struct kvm */ 582 cmpwi r6,0 583 bne 10f 584 ld r6,KVM_SDR1(r9) 585 lwz r7,KVM_LPID(r9) 586 li r0,LPID_RSVD /* switch to reserved LPID */ 587 mtspr SPRN_LPID,r0 588 ptesync 589 mtspr SPRN_SDR1,r6 /* switch to partition page table */ 590 mtspr SPRN_LPID,r7 591 isync 592 593 /* See if we need to flush the TLB */ 594 lhz r6,PACAPACAINDEX(r13) /* test_bit(cpu, need_tlb_flush) */ 595 clrldi r7,r6,64-6 /* extract bit number (6 bits) */ 596 srdi r6,r6,6 /* doubleword number */ 597 sldi r6,r6,3 /* address offset */ 598 add r6,r6,r9 599 addi r6,r6,KVM_NEED_FLUSH /* dword in kvm->arch.need_tlb_flush */ 600 li r0,1 601 sld r0,r0,r7 602 ld r7,0(r6) 603 and. r7,r7,r0 604 beq 22f 60523: ldarx r7,0,r6 /* if set, clear the bit */ 606 andc r7,r7,r0 607 stdcx. r7,0,r6 608 bne 23b 609 /* Flush the TLB of any entries for this LPID */ 610 /* use arch 2.07S as a proxy for POWER8 */ 611BEGIN_FTR_SECTION 612 li r6,512 /* POWER8 has 512 sets */ 613FTR_SECTION_ELSE 614 li r6,128 /* POWER7 has 128 sets */ 615ALT_FTR_SECTION_END_IFSET(CPU_FTR_ARCH_207S) 616 mtctr r6 617 li r7,0x800 /* IS field = 0b10 */ 618 ptesync 61928: tlbiel r7 620 addi r7,r7,0x1000 621 bdnz 28b 622 ptesync 623 624 /* Add timebase offset onto timebase */ 62522: ld r8,VCORE_TB_OFFSET(r5) 626 cmpdi r8,0 627 beq 37f 628 mftb r6 /* current host timebase */ 629 add r8,r8,r6 630 mtspr SPRN_TBU40,r8 /* update upper 40 bits */ 631 mftb r7 /* check if lower 24 bits overflowed */ 632 clrldi r6,r6,40 633 clrldi r7,r7,40 634 cmpld r7,r6 635 bge 37f 636 addis r8,r8,0x100 /* if so, increment upper 40 bits */ 637 mtspr SPRN_TBU40,r8 638 639 /* Load guest PCR value to select appropriate compat mode */ 64037: ld r7, VCORE_PCR(r5) 641 cmpdi r7, 0 642 beq 38f 643 mtspr SPRN_PCR, r7 64438: 645 646BEGIN_FTR_SECTION 647 /* DPDES and VTB are shared between threads */ 648 ld r8, VCORE_DPDES(r5) 649 ld r7, VCORE_VTB(r5) 650 mtspr SPRN_DPDES, r8 651 mtspr SPRN_VTB, r7 652END_FTR_SECTION_IFSET(CPU_FTR_ARCH_207S) 653 654 /* Mark the subcore state as inside guest */ 655 bl kvmppc_subcore_enter_guest 656 nop 657 ld r5, HSTATE_KVM_VCORE(r13) 658 ld r4, HSTATE_KVM_VCPU(r13) 659 li r0,1 660 stb r0,VCORE_IN_GUEST(r5) /* signal secondaries to continue */ 661 662 /* Do we have a guest vcpu to run? */ 66310: cmpdi r4, 0 664 beq kvmppc_primary_no_guest 665kvmppc_got_guest: 666 667 /* Load up guest SLB entries */ 668 lwz r5,VCPU_SLB_MAX(r4) 669 cmpwi r5,0 670 beq 9f 671 mtctr r5 672 addi r6,r4,VCPU_SLB 6731: ld r8,VCPU_SLB_E(r6) 674 ld r9,VCPU_SLB_V(r6) 675 slbmte r9,r8 676 addi r6,r6,VCPU_SLB_SIZE 677 bdnz 1b 6789: 679 /* Increment yield count if they have a VPA */ 680 ld r3, VCPU_VPA(r4) 681 cmpdi r3, 0 682 beq 25f 683 li r6, LPPACA_YIELDCOUNT 684 LWZX_BE r5, r3, r6 685 addi r5, r5, 1 686 STWX_BE r5, r3, r6 687 li r6, 1 688 stb r6, VCPU_VPA_DIRTY(r4) 68925: 690 691 /* Save purr/spurr */ 692 mfspr r5,SPRN_PURR 693 mfspr r6,SPRN_SPURR 694 std r5,HSTATE_PURR(r13) 695 std r6,HSTATE_SPURR(r13) 696 ld r7,VCPU_PURR(r4) 697 ld r8,VCPU_SPURR(r4) 698 mtspr SPRN_PURR,r7 699 mtspr SPRN_SPURR,r8 700 701BEGIN_FTR_SECTION 702 /* Set partition DABR */ 703 /* Do this before re-enabling PMU to avoid P7 DABR corruption bug */ 704 lwz r5,VCPU_DABRX(r4) 705 ld r6,VCPU_DABR(r4) 706 mtspr SPRN_DABRX,r5 707 mtspr SPRN_DABR,r6 708 isync 709END_FTR_SECTION_IFCLR(CPU_FTR_ARCH_207S) 710 711#ifdef CONFIG_PPC_TRANSACTIONAL_MEM 712BEGIN_FTR_SECTION 713 bl kvmppc_restore_tm 714END_FTR_SECTION_IFSET(CPU_FTR_TM) 715#endif 716 717 /* Load guest PMU registers */ 718 /* R4 is live here (vcpu pointer) */ 719 li r3, 1 720 sldi r3, r3, 31 /* MMCR0_FC (freeze counters) bit */ 721 mtspr SPRN_MMCR0, r3 /* freeze all counters, disable ints */ 722 isync 723BEGIN_FTR_SECTION 724 ld r3, VCPU_MMCR(r4) 725 andi. r5, r3, MMCR0_PMAO_SYNC | MMCR0_PMAO 726 cmpwi r5, MMCR0_PMAO 727 beql kvmppc_fix_pmao 728END_FTR_SECTION_IFSET(CPU_FTR_PMAO_BUG) 729 lwz r3, VCPU_PMC(r4) /* always load up guest PMU registers */ 730 lwz r5, VCPU_PMC + 4(r4) /* to prevent information leak */ 731 lwz r6, VCPU_PMC + 8(r4) 732 lwz r7, VCPU_PMC + 12(r4) 733 lwz r8, VCPU_PMC + 16(r4) 734 lwz r9, VCPU_PMC + 20(r4) 735 mtspr SPRN_PMC1, r3 736 mtspr SPRN_PMC2, r5 737 mtspr SPRN_PMC3, r6 738 mtspr SPRN_PMC4, r7 739 mtspr SPRN_PMC5, r8 740 mtspr SPRN_PMC6, r9 741 ld r3, VCPU_MMCR(r4) 742 ld r5, VCPU_MMCR + 8(r4) 743 ld r6, VCPU_MMCR + 16(r4) 744 ld r7, VCPU_SIAR(r4) 745 ld r8, VCPU_SDAR(r4) 746 mtspr SPRN_MMCR1, r5 747 mtspr SPRN_MMCRA, r6 748 mtspr SPRN_SIAR, r7 749 mtspr SPRN_SDAR, r8 750BEGIN_FTR_SECTION 751 ld r5, VCPU_MMCR + 24(r4) 752 ld r6, VCPU_SIER(r4) 753 lwz r7, VCPU_PMC + 24(r4) 754 lwz r8, VCPU_PMC + 28(r4) 755 ld r9, VCPU_MMCR + 32(r4) 756 mtspr SPRN_MMCR2, r5 757 mtspr SPRN_SIER, r6 758 mtspr SPRN_SPMC1, r7 759 mtspr SPRN_SPMC2, r8 760 mtspr SPRN_MMCRS, r9 761END_FTR_SECTION_IFSET(CPU_FTR_ARCH_207S) 762 mtspr SPRN_MMCR0, r3 763 isync 764 765 /* Load up FP, VMX and VSX registers */ 766 bl kvmppc_load_fp 767 768 ld r14, VCPU_GPR(R14)(r4) 769 ld r15, VCPU_GPR(R15)(r4) 770 ld r16, VCPU_GPR(R16)(r4) 771 ld r17, VCPU_GPR(R17)(r4) 772 ld r18, VCPU_GPR(R18)(r4) 773 ld r19, VCPU_GPR(R19)(r4) 774 ld r20, VCPU_GPR(R20)(r4) 775 ld r21, VCPU_GPR(R21)(r4) 776 ld r22, VCPU_GPR(R22)(r4) 777 ld r23, VCPU_GPR(R23)(r4) 778 ld r24, VCPU_GPR(R24)(r4) 779 ld r25, VCPU_GPR(R25)(r4) 780 ld r26, VCPU_GPR(R26)(r4) 781 ld r27, VCPU_GPR(R27)(r4) 782 ld r28, VCPU_GPR(R28)(r4) 783 ld r29, VCPU_GPR(R29)(r4) 784 ld r30, VCPU_GPR(R30)(r4) 785 ld r31, VCPU_GPR(R31)(r4) 786 787 /* Switch DSCR to guest value */ 788 ld r5, VCPU_DSCR(r4) 789 mtspr SPRN_DSCR, r5 790 791BEGIN_FTR_SECTION 792 /* Skip next section on POWER7 */ 793 b 8f 794END_FTR_SECTION_IFCLR(CPU_FTR_ARCH_207S) 795 /* Load up POWER8-specific registers */ 796 ld r5, VCPU_IAMR(r4) 797 lwz r6, VCPU_PSPB(r4) 798 ld r7, VCPU_FSCR(r4) 799 mtspr SPRN_IAMR, r5 800 mtspr SPRN_PSPB, r6 801 mtspr SPRN_FSCR, r7 802 ld r5, VCPU_DAWR(r4) 803 ld r6, VCPU_DAWRX(r4) 804 ld r7, VCPU_CIABR(r4) 805 ld r8, VCPU_TAR(r4) 806 mtspr SPRN_DAWR, r5 807 mtspr SPRN_DAWRX, r6 808 mtspr SPRN_CIABR, r7 809 mtspr SPRN_TAR, r8 810 ld r5, VCPU_IC(r4) 811 ld r8, VCPU_EBBHR(r4) 812 mtspr SPRN_IC, r5 813 mtspr SPRN_EBBHR, r8 814 ld r5, VCPU_EBBRR(r4) 815 ld r6, VCPU_BESCR(r4) 816 ld r7, VCPU_CSIGR(r4) 817 ld r8, VCPU_TACR(r4) 818 mtspr SPRN_EBBRR, r5 819 mtspr SPRN_BESCR, r6 820 mtspr SPRN_CSIGR, r7 821 mtspr SPRN_TACR, r8 822 ld r5, VCPU_TCSCR(r4) 823 ld r6, VCPU_ACOP(r4) 824 lwz r7, VCPU_GUEST_PID(r4) 825 ld r8, VCPU_WORT(r4) 826 mtspr SPRN_TCSCR, r5 827 mtspr SPRN_ACOP, r6 828 mtspr SPRN_PID, r7 829 mtspr SPRN_WORT, r8 8308: 831 832 /* 833 * Set the decrementer to the guest decrementer. 834 */ 835 ld r8,VCPU_DEC_EXPIRES(r4) 836 /* r8 is a host timebase value here, convert to guest TB */ 837 ld r5,HSTATE_KVM_VCORE(r13) 838 ld r6,VCORE_TB_OFFSET(r5) 839 add r8,r8,r6 840 mftb r7 841 subf r3,r7,r8 842 mtspr SPRN_DEC,r3 843 stw r3,VCPU_DEC(r4) 844 845 ld r5, VCPU_SPRG0(r4) 846 ld r6, VCPU_SPRG1(r4) 847 ld r7, VCPU_SPRG2(r4) 848 ld r8, VCPU_SPRG3(r4) 849 mtspr SPRN_SPRG0, r5 850 mtspr SPRN_SPRG1, r6 851 mtspr SPRN_SPRG2, r7 852 mtspr SPRN_SPRG3, r8 853 854 /* Load up DAR and DSISR */ 855 ld r5, VCPU_DAR(r4) 856 lwz r6, VCPU_DSISR(r4) 857 mtspr SPRN_DAR, r5 858 mtspr SPRN_DSISR, r6 859 860 /* Restore AMR and UAMOR, set AMOR to all 1s */ 861 ld r5,VCPU_AMR(r4) 862 ld r6,VCPU_UAMOR(r4) 863 li r7,-1 864 mtspr SPRN_AMR,r5 865 mtspr SPRN_UAMOR,r6 866 mtspr SPRN_AMOR,r7 867 868 /* Restore state of CTRL run bit; assume 1 on entry */ 869 lwz r5,VCPU_CTRL(r4) 870 andi. r5,r5,1 871 bne 4f 872 mfspr r6,SPRN_CTRLF 873 clrrdi r6,r6,1 874 mtspr SPRN_CTRLT,r6 8754: 876 /* Secondary threads wait for primary to have done partition switch */ 877 ld r5, HSTATE_KVM_VCORE(r13) 878 lbz r6, HSTATE_PTID(r13) 879 cmpwi r6, 0 880 beq 21f 881 lbz r0, VCORE_IN_GUEST(r5) 882 cmpwi r0, 0 883 bne 21f 884 HMT_LOW 88520: lwz r3, VCORE_ENTRY_EXIT(r5) 886 cmpwi r3, 0x100 887 bge no_switch_exit 888 lbz r0, VCORE_IN_GUEST(r5) 889 cmpwi r0, 0 890 beq 20b 891 HMT_MEDIUM 89221: 893 /* Set LPCR. */ 894 ld r8,VCORE_LPCR(r5) 895 mtspr SPRN_LPCR,r8 896 isync 897 898 /* Check if HDEC expires soon */ 899 mfspr r3, SPRN_HDEC 900 cmpwi r3, 512 /* 1 microsecond */ 901 blt hdec_soon 902 903deliver_guest_interrupt: 904 ld r6, VCPU_CTR(r4) 905 ld r7, VCPU_XER(r4) 906 907 mtctr r6 908 mtxer r7 909 910kvmppc_cede_reentry: /* r4 = vcpu, r13 = paca */ 911 ld r10, VCPU_PC(r4) 912 ld r11, VCPU_MSR(r4) 913 ld r6, VCPU_SRR0(r4) 914 ld r7, VCPU_SRR1(r4) 915 mtspr SPRN_SRR0, r6 916 mtspr SPRN_SRR1, r7 917 918 /* r11 = vcpu->arch.msr & ~MSR_HV */ 919 rldicl r11, r11, 63 - MSR_HV_LG, 1 920 rotldi r11, r11, 1 + MSR_HV_LG 921 ori r11, r11, MSR_ME 922 923 /* Check if we can deliver an external or decrementer interrupt now */ 924 ld r0, VCPU_PENDING_EXC(r4) 925 rldicl r0, r0, 64 - BOOK3S_IRQPRIO_EXTERNAL_LEVEL, 63 926 cmpdi cr1, r0, 0 927 andi. r8, r11, MSR_EE 928 mfspr r8, SPRN_LPCR 929 /* Insert EXTERNAL_LEVEL bit into LPCR at the MER bit position */ 930 rldimi r8, r0, LPCR_MER_SH, 63 - LPCR_MER_SH 931 mtspr SPRN_LPCR, r8 932 isync 933 beq 5f 934 li r0, BOOK3S_INTERRUPT_EXTERNAL 935 bne cr1, 12f 936 mfspr r0, SPRN_DEC 937 cmpwi r0, 0 938 li r0, BOOK3S_INTERRUPT_DECREMENTER 939 bge 5f 940 94112: mtspr SPRN_SRR0, r10 942 mr r10,r0 943 mtspr SPRN_SRR1, r11 944 mr r9, r4 945 bl kvmppc_msr_interrupt 9465: 947 948/* 949 * Required state: 950 * R4 = vcpu 951 * R10: value for HSRR0 952 * R11: value for HSRR1 953 * R13 = PACA 954 */ 955fast_guest_return: 956 li r0,0 957 stb r0,VCPU_CEDED(r4) /* cancel cede */ 958 mtspr SPRN_HSRR0,r10 959 mtspr SPRN_HSRR1,r11 960 961 /* Activate guest mode, so faults get handled by KVM */ 962 li r9, KVM_GUEST_MODE_GUEST_HV 963 stb r9, HSTATE_IN_GUEST(r13) 964 965#ifdef CONFIG_KVM_BOOK3S_HV_EXIT_TIMING 966 /* Accumulate timing */ 967 addi r3, r4, VCPU_TB_GUEST 968 bl kvmhv_accumulate_time 969#endif 970 971 /* Enter guest */ 972 973BEGIN_FTR_SECTION 974 ld r5, VCPU_CFAR(r4) 975 mtspr SPRN_CFAR, r5 976END_FTR_SECTION_IFSET(CPU_FTR_CFAR) 977BEGIN_FTR_SECTION 978 ld r0, VCPU_PPR(r4) 979END_FTR_SECTION_IFSET(CPU_FTR_HAS_PPR) 980 981 ld r5, VCPU_LR(r4) 982 lwz r6, VCPU_CR(r4) 983 mtlr r5 984 mtcr r6 985 986 ld r1, VCPU_GPR(R1)(r4) 987 ld r2, VCPU_GPR(R2)(r4) 988 ld r3, VCPU_GPR(R3)(r4) 989 ld r5, VCPU_GPR(R5)(r4) 990 ld r6, VCPU_GPR(R6)(r4) 991 ld r7, VCPU_GPR(R7)(r4) 992 ld r8, VCPU_GPR(R8)(r4) 993 ld r9, VCPU_GPR(R9)(r4) 994 ld r10, VCPU_GPR(R10)(r4) 995 ld r11, VCPU_GPR(R11)(r4) 996 ld r12, VCPU_GPR(R12)(r4) 997 ld r13, VCPU_GPR(R13)(r4) 998 999BEGIN_FTR_SECTION 1000 mtspr SPRN_PPR, r0 1001END_FTR_SECTION_IFSET(CPU_FTR_HAS_PPR) 1002 ld r0, VCPU_GPR(R0)(r4) 1003 ld r4, VCPU_GPR(R4)(r4) 1004 1005 hrfid 1006 b . 1007 1008secondary_too_late: 1009 li r12, 0 1010 cmpdi r4, 0 1011 beq 11f 1012 stw r12, VCPU_TRAP(r4) 1013#ifdef CONFIG_KVM_BOOK3S_HV_EXIT_TIMING 1014 addi r3, r4, VCPU_TB_RMEXIT 1015 bl kvmhv_accumulate_time 1016#endif 101711: b kvmhv_switch_to_host 1018 1019no_switch_exit: 1020 HMT_MEDIUM 1021 li r12, 0 1022 b 12f 1023hdec_soon: 1024 li r12, BOOK3S_INTERRUPT_HV_DECREMENTER 102512: stw r12, VCPU_TRAP(r4) 1026 mr r9, r4 1027#ifdef CONFIG_KVM_BOOK3S_HV_EXIT_TIMING 1028 addi r3, r4, VCPU_TB_RMEXIT 1029 bl kvmhv_accumulate_time 1030#endif 1031 b guest_exit_cont 1032 1033/****************************************************************************** 1034 * * 1035 * Exit code * 1036 * * 1037 *****************************************************************************/ 1038 1039/* 1040 * We come here from the first-level interrupt handlers. 1041 */ 1042 .globl kvmppc_interrupt_hv 1043kvmppc_interrupt_hv: 1044 /* 1045 * Register contents: 1046 * R12 = interrupt vector 1047 * R13 = PACA 1048 * guest CR, R12 saved in shadow VCPU SCRATCH1/0 1049 * guest R13 saved in SPRN_SCRATCH0 1050 */ 1051 std r9, HSTATE_SCRATCH2(r13) 1052 1053 lbz r9, HSTATE_IN_GUEST(r13) 1054 cmpwi r9, KVM_GUEST_MODE_HOST_HV 1055 beq kvmppc_bad_host_intr 1056#ifdef CONFIG_KVM_BOOK3S_PR_POSSIBLE 1057 cmpwi r9, KVM_GUEST_MODE_GUEST 1058 ld r9, HSTATE_SCRATCH2(r13) 1059 beq kvmppc_interrupt_pr 1060#endif 1061 /* We're now back in the host but in guest MMU context */ 1062 li r9, KVM_GUEST_MODE_HOST_HV 1063 stb r9, HSTATE_IN_GUEST(r13) 1064 1065 ld r9, HSTATE_KVM_VCPU(r13) 1066 1067 /* Save registers */ 1068 1069 std r0, VCPU_GPR(R0)(r9) 1070 std r1, VCPU_GPR(R1)(r9) 1071 std r2, VCPU_GPR(R2)(r9) 1072 std r3, VCPU_GPR(R3)(r9) 1073 std r4, VCPU_GPR(R4)(r9) 1074 std r5, VCPU_GPR(R5)(r9) 1075 std r6, VCPU_GPR(R6)(r9) 1076 std r7, VCPU_GPR(R7)(r9) 1077 std r8, VCPU_GPR(R8)(r9) 1078 ld r0, HSTATE_SCRATCH2(r13) 1079 std r0, VCPU_GPR(R9)(r9) 1080 std r10, VCPU_GPR(R10)(r9) 1081 std r11, VCPU_GPR(R11)(r9) 1082 ld r3, HSTATE_SCRATCH0(r13) 1083 lwz r4, HSTATE_SCRATCH1(r13) 1084 std r3, VCPU_GPR(R12)(r9) 1085 stw r4, VCPU_CR(r9) 1086BEGIN_FTR_SECTION 1087 ld r3, HSTATE_CFAR(r13) 1088 std r3, VCPU_CFAR(r9) 1089END_FTR_SECTION_IFSET(CPU_FTR_CFAR) 1090BEGIN_FTR_SECTION 1091 ld r4, HSTATE_PPR(r13) 1092 std r4, VCPU_PPR(r9) 1093END_FTR_SECTION_IFSET(CPU_FTR_HAS_PPR) 1094 1095 /* Restore R1/R2 so we can handle faults */ 1096 ld r1, HSTATE_HOST_R1(r13) 1097 ld r2, PACATOC(r13) 1098 1099 mfspr r10, SPRN_SRR0 1100 mfspr r11, SPRN_SRR1 1101 std r10, VCPU_SRR0(r9) 1102 std r11, VCPU_SRR1(r9) 1103 andi. r0, r12, 2 /* need to read HSRR0/1? */ 1104 beq 1f 1105 mfspr r10, SPRN_HSRR0 1106 mfspr r11, SPRN_HSRR1 1107 clrrdi r12, r12, 2 11081: std r10, VCPU_PC(r9) 1109 std r11, VCPU_MSR(r9) 1110 1111 GET_SCRATCH0(r3) 1112 mflr r4 1113 std r3, VCPU_GPR(R13)(r9) 1114 std r4, VCPU_LR(r9) 1115 1116 stw r12,VCPU_TRAP(r9) 1117 1118#ifdef CONFIG_KVM_BOOK3S_HV_EXIT_TIMING 1119 addi r3, r9, VCPU_TB_RMINTR 1120 mr r4, r9 1121 bl kvmhv_accumulate_time 1122 ld r5, VCPU_GPR(R5)(r9) 1123 ld r6, VCPU_GPR(R6)(r9) 1124 ld r7, VCPU_GPR(R7)(r9) 1125 ld r8, VCPU_GPR(R8)(r9) 1126#endif 1127 1128 /* Save HEIR (HV emulation assist reg) in emul_inst 1129 if this is an HEI (HV emulation interrupt, e40) */ 1130 li r3,KVM_INST_FETCH_FAILED 1131 stw r3,VCPU_LAST_INST(r9) 1132 cmpwi r12,BOOK3S_INTERRUPT_H_EMUL_ASSIST 1133 bne 11f 1134 mfspr r3,SPRN_HEIR 113511: stw r3,VCPU_HEIR(r9) 1136 1137 /* these are volatile across C function calls */ 1138 mfctr r3 1139 mfxer r4 1140 std r3, VCPU_CTR(r9) 1141 std r4, VCPU_XER(r9) 1142 1143 /* If this is a page table miss then see if it's theirs or ours */ 1144 cmpwi r12, BOOK3S_INTERRUPT_H_DATA_STORAGE 1145 beq kvmppc_hdsi 1146 cmpwi r12, BOOK3S_INTERRUPT_H_INST_STORAGE 1147 beq kvmppc_hisi 1148 1149 /* See if this is a leftover HDEC interrupt */ 1150 cmpwi r12,BOOK3S_INTERRUPT_HV_DECREMENTER 1151 bne 2f 1152 mfspr r3,SPRN_HDEC 1153 cmpwi r3,0 1154 mr r4,r9 1155 bge fast_guest_return 11562: 1157 /* See if this is an hcall we can handle in real mode */ 1158 cmpwi r12,BOOK3S_INTERRUPT_SYSCALL 1159 beq hcall_try_real_mode 1160 1161 /* Hypervisor doorbell - exit only if host IPI flag set */ 1162 cmpwi r12, BOOK3S_INTERRUPT_H_DOORBELL 1163 bne 3f 1164 lbz r0, HSTATE_HOST_IPI(r13) 1165 cmpwi r0, 0 1166 beq 4f 1167 b guest_exit_cont 11683: 1169 /* External interrupt ? */ 1170 cmpwi r12, BOOK3S_INTERRUPT_EXTERNAL 1171 bne+ guest_exit_cont 1172 1173 /* External interrupt, first check for host_ipi. If this is 1174 * set, we know the host wants us out so let's do it now 1175 */ 1176 bl kvmppc_read_intr 1177 1178 /* 1179 * Restore the active volatile registers after returning from 1180 * a C function. 1181 */ 1182 ld r9, HSTATE_KVM_VCPU(r13) 1183 li r12, BOOK3S_INTERRUPT_EXTERNAL 1184 1185 /* 1186 * kvmppc_read_intr return codes: 1187 * 1188 * Exit to host (r3 > 0) 1189 * 1 An interrupt is pending that needs to be handled by the host 1190 * Exit guest and return to host by branching to guest_exit_cont 1191 * 1192 * 2 Passthrough that needs completion in the host 1193 * Exit guest and return to host by branching to guest_exit_cont 1194 * However, we also set r12 to BOOK3S_INTERRUPT_HV_RM_HARD 1195 * to indicate to the host to complete handling the interrupt 1196 * 1197 * Before returning to guest, we check if any CPU is heading out 1198 * to the host and if so, we head out also. If no CPUs are heading 1199 * check return values <= 0. 1200 * 1201 * Return to guest (r3 <= 0) 1202 * 0 No external interrupt is pending 1203 * -1 A guest wakeup IPI (which has now been cleared) 1204 * In either case, we return to guest to deliver any pending 1205 * guest interrupts. 1206 * 1207 * -2 A PCI passthrough external interrupt was handled 1208 * (interrupt was delivered directly to guest) 1209 * Return to guest to deliver any pending guest interrupts. 1210 */ 1211 1212 cmpdi r3, 1 1213 ble 1f 1214 1215 /* Return code = 2 */ 1216 li r12, BOOK3S_INTERRUPT_HV_RM_HARD 1217 stw r12, VCPU_TRAP(r9) 1218 b guest_exit_cont 1219 12201: /* Return code <= 1 */ 1221 cmpdi r3, 0 1222 bgt guest_exit_cont 1223 1224 /* Return code <= 0 */ 12254: ld r5, HSTATE_KVM_VCORE(r13) 1226 lwz r0, VCORE_ENTRY_EXIT(r5) 1227 cmpwi r0, 0x100 1228 mr r4, r9 1229 blt deliver_guest_interrupt 1230 1231guest_exit_cont: /* r9 = vcpu, r12 = trap, r13 = paca */ 1232 /* Save more register state */ 1233 mfdar r6 1234 mfdsisr r7 1235 std r6, VCPU_DAR(r9) 1236 stw r7, VCPU_DSISR(r9) 1237 /* don't overwrite fault_dar/fault_dsisr if HDSI */ 1238 cmpwi r12,BOOK3S_INTERRUPT_H_DATA_STORAGE 1239 beq mc_cont 1240 std r6, VCPU_FAULT_DAR(r9) 1241 stw r7, VCPU_FAULT_DSISR(r9) 1242 1243 /* See if it is a machine check */ 1244 cmpwi r12, BOOK3S_INTERRUPT_MACHINE_CHECK 1245 beq machine_check_realmode 1246mc_cont: 1247#ifdef CONFIG_KVM_BOOK3S_HV_EXIT_TIMING 1248 addi r3, r9, VCPU_TB_RMEXIT 1249 mr r4, r9 1250 bl kvmhv_accumulate_time 1251#endif 1252 1253 mr r3, r12 1254 /* Increment exit count, poke other threads to exit */ 1255 bl kvmhv_commence_exit 1256 nop 1257 ld r9, HSTATE_KVM_VCPU(r13) 1258 lwz r12, VCPU_TRAP(r9) 1259 1260 /* Stop others sending VCPU interrupts to this physical CPU */ 1261 li r0, -1 1262 stw r0, VCPU_CPU(r9) 1263 stw r0, VCPU_THREAD_CPU(r9) 1264 1265 /* Save guest CTRL register, set runlatch to 1 */ 1266 mfspr r6,SPRN_CTRLF 1267 stw r6,VCPU_CTRL(r9) 1268 andi. r0,r6,1 1269 bne 4f 1270 ori r6,r6,1 1271 mtspr SPRN_CTRLT,r6 12724: 1273 /* Read the guest SLB and save it away */ 1274 lwz r0,VCPU_SLB_NR(r9) /* number of entries in SLB */ 1275 mtctr r0 1276 li r6,0 1277 addi r7,r9,VCPU_SLB 1278 li r5,0 12791: slbmfee r8,r6 1280 andis. r0,r8,SLB_ESID_V@h 1281 beq 2f 1282 add r8,r8,r6 /* put index in */ 1283 slbmfev r3,r6 1284 std r8,VCPU_SLB_E(r7) 1285 std r3,VCPU_SLB_V(r7) 1286 addi r7,r7,VCPU_SLB_SIZE 1287 addi r5,r5,1 12882: addi r6,r6,1 1289 bdnz 1b 1290 stw r5,VCPU_SLB_MAX(r9) 1291 1292 /* 1293 * Save the guest PURR/SPURR 1294 */ 1295 mfspr r5,SPRN_PURR 1296 mfspr r6,SPRN_SPURR 1297 ld r7,VCPU_PURR(r9) 1298 ld r8,VCPU_SPURR(r9) 1299 std r5,VCPU_PURR(r9) 1300 std r6,VCPU_SPURR(r9) 1301 subf r5,r7,r5 1302 subf r6,r8,r6 1303 1304 /* 1305 * Restore host PURR/SPURR and add guest times 1306 * so that the time in the guest gets accounted. 1307 */ 1308 ld r3,HSTATE_PURR(r13) 1309 ld r4,HSTATE_SPURR(r13) 1310 add r3,r3,r5 1311 add r4,r4,r6 1312 mtspr SPRN_PURR,r3 1313 mtspr SPRN_SPURR,r4 1314 1315 /* Save DEC */ 1316 mfspr r5,SPRN_DEC 1317 mftb r6 1318 extsw r5,r5 1319 add r5,r5,r6 1320 /* r5 is a guest timebase value here, convert to host TB */ 1321 ld r3,HSTATE_KVM_VCORE(r13) 1322 ld r4,VCORE_TB_OFFSET(r3) 1323 subf r5,r4,r5 1324 std r5,VCPU_DEC_EXPIRES(r9) 1325 1326BEGIN_FTR_SECTION 1327 b 8f 1328END_FTR_SECTION_IFCLR(CPU_FTR_ARCH_207S) 1329 /* Save POWER8-specific registers */ 1330 mfspr r5, SPRN_IAMR 1331 mfspr r6, SPRN_PSPB 1332 mfspr r7, SPRN_FSCR 1333 std r5, VCPU_IAMR(r9) 1334 stw r6, VCPU_PSPB(r9) 1335 std r7, VCPU_FSCR(r9) 1336 mfspr r5, SPRN_IC 1337 mfspr r7, SPRN_TAR 1338 std r5, VCPU_IC(r9) 1339 std r7, VCPU_TAR(r9) 1340 mfspr r8, SPRN_EBBHR 1341 std r8, VCPU_EBBHR(r9) 1342 mfspr r5, SPRN_EBBRR 1343 mfspr r6, SPRN_BESCR 1344 mfspr r7, SPRN_CSIGR 1345 mfspr r8, SPRN_TACR 1346 std r5, VCPU_EBBRR(r9) 1347 std r6, VCPU_BESCR(r9) 1348 std r7, VCPU_CSIGR(r9) 1349 std r8, VCPU_TACR(r9) 1350 mfspr r5, SPRN_TCSCR 1351 mfspr r6, SPRN_ACOP 1352 mfspr r7, SPRN_PID 1353 mfspr r8, SPRN_WORT 1354 std r5, VCPU_TCSCR(r9) 1355 std r6, VCPU_ACOP(r9) 1356 stw r7, VCPU_GUEST_PID(r9) 1357 std r8, VCPU_WORT(r9) 1358 /* 1359 * Restore various registers to 0, where non-zero values 1360 * set by the guest could disrupt the host. 1361 */ 1362 li r0, 0 1363 mtspr SPRN_IAMR, r0 1364 mtspr SPRN_CIABR, r0 1365 mtspr SPRN_DAWRX, r0 1366 mtspr SPRN_TCSCR, r0 1367 mtspr SPRN_WORT, r0 1368 /* Set MMCRS to 1<<31 to freeze and disable the SPMC counters */ 1369 li r0, 1 1370 sldi r0, r0, 31 1371 mtspr SPRN_MMCRS, r0 13728: 1373 1374 /* Save and reset AMR and UAMOR before turning on the MMU */ 1375 mfspr r5,SPRN_AMR 1376 mfspr r6,SPRN_UAMOR 1377 std r5,VCPU_AMR(r9) 1378 std r6,VCPU_UAMOR(r9) 1379 li r6,0 1380 mtspr SPRN_AMR,r6 1381 1382 /* Switch DSCR back to host value */ 1383 mfspr r8, SPRN_DSCR 1384 ld r7, HSTATE_DSCR(r13) 1385 std r8, VCPU_DSCR(r9) 1386 mtspr SPRN_DSCR, r7 1387 1388 /* Save non-volatile GPRs */ 1389 std r14, VCPU_GPR(R14)(r9) 1390 std r15, VCPU_GPR(R15)(r9) 1391 std r16, VCPU_GPR(R16)(r9) 1392 std r17, VCPU_GPR(R17)(r9) 1393 std r18, VCPU_GPR(R18)(r9) 1394 std r19, VCPU_GPR(R19)(r9) 1395 std r20, VCPU_GPR(R20)(r9) 1396 std r21, VCPU_GPR(R21)(r9) 1397 std r22, VCPU_GPR(R22)(r9) 1398 std r23, VCPU_GPR(R23)(r9) 1399 std r24, VCPU_GPR(R24)(r9) 1400 std r25, VCPU_GPR(R25)(r9) 1401 std r26, VCPU_GPR(R26)(r9) 1402 std r27, VCPU_GPR(R27)(r9) 1403 std r28, VCPU_GPR(R28)(r9) 1404 std r29, VCPU_GPR(R29)(r9) 1405 std r30, VCPU_GPR(R30)(r9) 1406 std r31, VCPU_GPR(R31)(r9) 1407 1408 /* Save SPRGs */ 1409 mfspr r3, SPRN_SPRG0 1410 mfspr r4, SPRN_SPRG1 1411 mfspr r5, SPRN_SPRG2 1412 mfspr r6, SPRN_SPRG3 1413 std r3, VCPU_SPRG0(r9) 1414 std r4, VCPU_SPRG1(r9) 1415 std r5, VCPU_SPRG2(r9) 1416 std r6, VCPU_SPRG3(r9) 1417 1418 /* save FP state */ 1419 mr r3, r9 1420 bl kvmppc_save_fp 1421 1422#ifdef CONFIG_PPC_TRANSACTIONAL_MEM 1423BEGIN_FTR_SECTION 1424 bl kvmppc_save_tm 1425END_FTR_SECTION_IFSET(CPU_FTR_TM) 1426#endif 1427 1428 /* Increment yield count if they have a VPA */ 1429 ld r8, VCPU_VPA(r9) /* do they have a VPA? */ 1430 cmpdi r8, 0 1431 beq 25f 1432 li r4, LPPACA_YIELDCOUNT 1433 LWZX_BE r3, r8, r4 1434 addi r3, r3, 1 1435 STWX_BE r3, r8, r4 1436 li r3, 1 1437 stb r3, VCPU_VPA_DIRTY(r9) 143825: 1439 /* Save PMU registers if requested */ 1440 /* r8 and cr0.eq are live here */ 1441BEGIN_FTR_SECTION 1442 /* 1443 * POWER8 seems to have a hardware bug where setting 1444 * MMCR0[PMAE] along with MMCR0[PMC1CE] and/or MMCR0[PMCjCE] 1445 * when some counters are already negative doesn't seem 1446 * to cause a performance monitor alert (and hence interrupt). 1447 * The effect of this is that when saving the PMU state, 1448 * if there is no PMU alert pending when we read MMCR0 1449 * before freezing the counters, but one becomes pending 1450 * before we read the counters, we lose it. 1451 * To work around this, we need a way to freeze the counters 1452 * before reading MMCR0. Normally, freezing the counters 1453 * is done by writing MMCR0 (to set MMCR0[FC]) which 1454 * unavoidably writes MMCR0[PMA0] as well. On POWER8, 1455 * we can also freeze the counters using MMCR2, by writing 1456 * 1s to all the counter freeze condition bits (there are 1457 * 9 bits each for 6 counters). 1458 */ 1459 li r3, -1 /* set all freeze bits */ 1460 clrrdi r3, r3, 10 1461 mfspr r10, SPRN_MMCR2 1462 mtspr SPRN_MMCR2, r3 1463 isync 1464END_FTR_SECTION_IFSET(CPU_FTR_ARCH_207S) 1465 li r3, 1 1466 sldi r3, r3, 31 /* MMCR0_FC (freeze counters) bit */ 1467 mfspr r4, SPRN_MMCR0 /* save MMCR0 */ 1468 mtspr SPRN_MMCR0, r3 /* freeze all counters, disable ints */ 1469 mfspr r6, SPRN_MMCRA 1470 /* Clear MMCRA in order to disable SDAR updates */ 1471 li r7, 0 1472 mtspr SPRN_MMCRA, r7 1473 isync 1474 beq 21f /* if no VPA, save PMU stuff anyway */ 1475 lbz r7, LPPACA_PMCINUSE(r8) 1476 cmpwi r7, 0 /* did they ask for PMU stuff to be saved? */ 1477 bne 21f 1478 std r3, VCPU_MMCR(r9) /* if not, set saved MMCR0 to FC */ 1479 b 22f 148021: mfspr r5, SPRN_MMCR1 1481 mfspr r7, SPRN_SIAR 1482 mfspr r8, SPRN_SDAR 1483 std r4, VCPU_MMCR(r9) 1484 std r5, VCPU_MMCR + 8(r9) 1485 std r6, VCPU_MMCR + 16(r9) 1486BEGIN_FTR_SECTION 1487 std r10, VCPU_MMCR + 24(r9) 1488END_FTR_SECTION_IFSET(CPU_FTR_ARCH_207S) 1489 std r7, VCPU_SIAR(r9) 1490 std r8, VCPU_SDAR(r9) 1491 mfspr r3, SPRN_PMC1 1492 mfspr r4, SPRN_PMC2 1493 mfspr r5, SPRN_PMC3 1494 mfspr r6, SPRN_PMC4 1495 mfspr r7, SPRN_PMC5 1496 mfspr r8, SPRN_PMC6 1497 stw r3, VCPU_PMC(r9) 1498 stw r4, VCPU_PMC + 4(r9) 1499 stw r5, VCPU_PMC + 8(r9) 1500 stw r6, VCPU_PMC + 12(r9) 1501 stw r7, VCPU_PMC + 16(r9) 1502 stw r8, VCPU_PMC + 20(r9) 1503BEGIN_FTR_SECTION 1504 mfspr r5, SPRN_SIER 1505 mfspr r6, SPRN_SPMC1 1506 mfspr r7, SPRN_SPMC2 1507 mfspr r8, SPRN_MMCRS 1508 std r5, VCPU_SIER(r9) 1509 stw r6, VCPU_PMC + 24(r9) 1510 stw r7, VCPU_PMC + 28(r9) 1511 std r8, VCPU_MMCR + 32(r9) 1512 lis r4, 0x8000 1513 mtspr SPRN_MMCRS, r4 1514END_FTR_SECTION_IFSET(CPU_FTR_ARCH_207S) 151522: 1516 /* Clear out SLB */ 1517 li r5,0 1518 slbmte r5,r5 1519 slbia 1520 ptesync 1521 1522 /* 1523 * POWER7/POWER8 guest -> host partition switch code. 1524 * We don't have to lock against tlbies but we do 1525 * have to coordinate the hardware threads. 1526 */ 1527kvmhv_switch_to_host: 1528 /* Secondary threads wait for primary to do partition switch */ 1529 ld r5,HSTATE_KVM_VCORE(r13) 1530 ld r4,VCORE_KVM(r5) /* pointer to struct kvm */ 1531 lbz r3,HSTATE_PTID(r13) 1532 cmpwi r3,0 1533 beq 15f 1534 HMT_LOW 153513: lbz r3,VCORE_IN_GUEST(r5) 1536 cmpwi r3,0 1537 bne 13b 1538 HMT_MEDIUM 1539 b 16f 1540 1541 /* Primary thread waits for all the secondaries to exit guest */ 154215: lwz r3,VCORE_ENTRY_EXIT(r5) 1543 rlwinm r0,r3,32-8,0xff 1544 clrldi r3,r3,56 1545 cmpw r3,r0 1546 bne 15b 1547 isync 1548 1549 /* Did we actually switch to the guest at all? */ 1550 lbz r6, VCORE_IN_GUEST(r5) 1551 cmpwi r6, 0 1552 beq 19f 1553 1554 /* Primary thread switches back to host partition */ 1555 ld r6,KVM_HOST_SDR1(r4) 1556 lwz r7,KVM_HOST_LPID(r4) 1557 li r8,LPID_RSVD /* switch to reserved LPID */ 1558 mtspr SPRN_LPID,r8 1559 ptesync 1560 mtspr SPRN_SDR1,r6 /* switch to partition page table */ 1561 mtspr SPRN_LPID,r7 1562 isync 1563 1564BEGIN_FTR_SECTION 1565 /* DPDES and VTB are shared between threads */ 1566 mfspr r7, SPRN_DPDES 1567 mfspr r8, SPRN_VTB 1568 std r7, VCORE_DPDES(r5) 1569 std r8, VCORE_VTB(r5) 1570 /* clear DPDES so we don't get guest doorbells in the host */ 1571 li r8, 0 1572 mtspr SPRN_DPDES, r8 1573END_FTR_SECTION_IFSET(CPU_FTR_ARCH_207S) 1574 1575 /* If HMI, call kvmppc_realmode_hmi_handler() */ 1576 cmpwi r12, BOOK3S_INTERRUPT_HMI 1577 bne 27f 1578 bl kvmppc_realmode_hmi_handler 1579 nop 1580 li r12, BOOK3S_INTERRUPT_HMI 1581 /* 1582 * At this point kvmppc_realmode_hmi_handler would have resync-ed 1583 * the TB. Hence it is not required to subtract guest timebase 1584 * offset from timebase. So, skip it. 1585 * 1586 * Also, do not call kvmppc_subcore_exit_guest() because it has 1587 * been invoked as part of kvmppc_realmode_hmi_handler(). 1588 */ 1589 b 30f 1590 159127: 1592 /* Subtract timebase offset from timebase */ 1593 ld r8,VCORE_TB_OFFSET(r5) 1594 cmpdi r8,0 1595 beq 17f 1596 mftb r6 /* current guest timebase */ 1597 subf r8,r8,r6 1598 mtspr SPRN_TBU40,r8 /* update upper 40 bits */ 1599 mftb r7 /* check if lower 24 bits overflowed */ 1600 clrldi r6,r6,40 1601 clrldi r7,r7,40 1602 cmpld r7,r6 1603 bge 17f 1604 addis r8,r8,0x100 /* if so, increment upper 40 bits */ 1605 mtspr SPRN_TBU40,r8 1606 160717: bl kvmppc_subcore_exit_guest 1608 nop 160930: ld r5,HSTATE_KVM_VCORE(r13) 1610 ld r4,VCORE_KVM(r5) /* pointer to struct kvm */ 1611 1612 /* Reset PCR */ 1613 ld r0, VCORE_PCR(r5) 1614 cmpdi r0, 0 1615 beq 18f 1616 li r0, 0 1617 mtspr SPRN_PCR, r0 161818: 1619 /* Signal secondary CPUs to continue */ 1620 stb r0,VCORE_IN_GUEST(r5) 162119: lis r8,0x7fff /* MAX_INT@h */ 1622 mtspr SPRN_HDEC,r8 1623 162416: ld r8,KVM_HOST_LPCR(r4) 1625 mtspr SPRN_LPCR,r8 1626 isync 1627 1628 /* load host SLB entries */ 1629 ld r8,PACA_SLBSHADOWPTR(r13) 1630 1631 .rept SLB_NUM_BOLTED 1632 li r3, SLBSHADOW_SAVEAREA 1633 LDX_BE r5, r8, r3 1634 addi r3, r3, 8 1635 LDX_BE r6, r8, r3 1636 andis. r7,r5,SLB_ESID_V@h 1637 beq 1f 1638 slbmte r6,r5 16391: addi r8,r8,16 1640 .endr 1641 1642#ifdef CONFIG_KVM_BOOK3S_HV_EXIT_TIMING 1643 /* Finish timing, if we have a vcpu */ 1644 ld r4, HSTATE_KVM_VCPU(r13) 1645 cmpdi r4, 0 1646 li r3, 0 1647 beq 2f 1648 bl kvmhv_accumulate_time 16492: 1650#endif 1651 /* Unset guest mode */ 1652 li r0, KVM_GUEST_MODE_NONE 1653 stb r0, HSTATE_IN_GUEST(r13) 1654 1655 ld r0, 112+PPC_LR_STKOFF(r1) 1656 addi r1, r1, 112 1657 mtlr r0 1658 blr 1659 1660/* 1661 * Check whether an HDSI is an HPTE not found fault or something else. 1662 * If it is an HPTE not found fault that is due to the guest accessing 1663 * a page that they have mapped but which we have paged out, then 1664 * we continue on with the guest exit path. In all other cases, 1665 * reflect the HDSI to the guest as a DSI. 1666 */ 1667kvmppc_hdsi: 1668 mfspr r4, SPRN_HDAR 1669 mfspr r6, SPRN_HDSISR 1670 /* HPTE not found fault or protection fault? */ 1671 andis. r0, r6, (DSISR_NOHPTE | DSISR_PROTFAULT)@h 1672 beq 1f /* if not, send it to the guest */ 1673 andi. r0, r11, MSR_DR /* data relocation enabled? */ 1674 beq 3f 1675 clrrdi r0, r4, 28 1676 PPC_SLBFEE_DOT(R5, R0) /* if so, look up SLB */ 1677 li r0, BOOK3S_INTERRUPT_DATA_SEGMENT 1678 bne 7f /* if no SLB entry found */ 16794: std r4, VCPU_FAULT_DAR(r9) 1680 stw r6, VCPU_FAULT_DSISR(r9) 1681 1682 /* Search the hash table. */ 1683 mr r3, r9 /* vcpu pointer */ 1684 li r7, 1 /* data fault */ 1685 bl kvmppc_hpte_hv_fault 1686 ld r9, HSTATE_KVM_VCPU(r13) 1687 ld r10, VCPU_PC(r9) 1688 ld r11, VCPU_MSR(r9) 1689 li r12, BOOK3S_INTERRUPT_H_DATA_STORAGE 1690 cmpdi r3, 0 /* retry the instruction */ 1691 beq 6f 1692 cmpdi r3, -1 /* handle in kernel mode */ 1693 beq guest_exit_cont 1694 cmpdi r3, -2 /* MMIO emulation; need instr word */ 1695 beq 2f 1696 1697 /* Synthesize a DSI (or DSegI) for the guest */ 1698 ld r4, VCPU_FAULT_DAR(r9) 1699 mr r6, r3 17001: li r0, BOOK3S_INTERRUPT_DATA_STORAGE 1701 mtspr SPRN_DSISR, r6 17027: mtspr SPRN_DAR, r4 1703 mtspr SPRN_SRR0, r10 1704 mtspr SPRN_SRR1, r11 1705 mr r10, r0 1706 bl kvmppc_msr_interrupt 1707fast_interrupt_c_return: 17086: ld r7, VCPU_CTR(r9) 1709 ld r8, VCPU_XER(r9) 1710 mtctr r7 1711 mtxer r8 1712 mr r4, r9 1713 b fast_guest_return 1714 17153: ld r5, VCPU_KVM(r9) /* not relocated, use VRMA */ 1716 ld r5, KVM_VRMA_SLB_V(r5) 1717 b 4b 1718 1719 /* If this is for emulated MMIO, load the instruction word */ 17202: li r8, KVM_INST_FETCH_FAILED /* In case lwz faults */ 1721 1722 /* Set guest mode to 'jump over instruction' so if lwz faults 1723 * we'll just continue at the next IP. */ 1724 li r0, KVM_GUEST_MODE_SKIP 1725 stb r0, HSTATE_IN_GUEST(r13) 1726 1727 /* Do the access with MSR:DR enabled */ 1728 mfmsr r3 1729 ori r4, r3, MSR_DR /* Enable paging for data */ 1730 mtmsrd r4 1731 lwz r8, 0(r10) 1732 mtmsrd r3 1733 1734 /* Store the result */ 1735 stw r8, VCPU_LAST_INST(r9) 1736 1737 /* Unset guest mode. */ 1738 li r0, KVM_GUEST_MODE_HOST_HV 1739 stb r0, HSTATE_IN_GUEST(r13) 1740 b guest_exit_cont 1741 1742/* 1743 * Similarly for an HISI, reflect it to the guest as an ISI unless 1744 * it is an HPTE not found fault for a page that we have paged out. 1745 */ 1746kvmppc_hisi: 1747 andis. r0, r11, SRR1_ISI_NOPT@h 1748 beq 1f 1749 andi. r0, r11, MSR_IR /* instruction relocation enabled? */ 1750 beq 3f 1751 clrrdi r0, r10, 28 1752 PPC_SLBFEE_DOT(R5, R0) /* if so, look up SLB */ 1753 li r0, BOOK3S_INTERRUPT_INST_SEGMENT 1754 bne 7f /* if no SLB entry found */ 17554: 1756 /* Search the hash table. */ 1757 mr r3, r9 /* vcpu pointer */ 1758 mr r4, r10 1759 mr r6, r11 1760 li r7, 0 /* instruction fault */ 1761 bl kvmppc_hpte_hv_fault 1762 ld r9, HSTATE_KVM_VCPU(r13) 1763 ld r10, VCPU_PC(r9) 1764 ld r11, VCPU_MSR(r9) 1765 li r12, BOOK3S_INTERRUPT_H_INST_STORAGE 1766 cmpdi r3, 0 /* retry the instruction */ 1767 beq fast_interrupt_c_return 1768 cmpdi r3, -1 /* handle in kernel mode */ 1769 beq guest_exit_cont 1770 1771 /* Synthesize an ISI (or ISegI) for the guest */ 1772 mr r11, r3 17731: li r0, BOOK3S_INTERRUPT_INST_STORAGE 17747: mtspr SPRN_SRR0, r10 1775 mtspr SPRN_SRR1, r11 1776 mr r10, r0 1777 bl kvmppc_msr_interrupt 1778 b fast_interrupt_c_return 1779 17803: ld r6, VCPU_KVM(r9) /* not relocated, use VRMA */ 1781 ld r5, KVM_VRMA_SLB_V(r6) 1782 b 4b 1783 1784/* 1785 * Try to handle an hcall in real mode. 1786 * Returns to the guest if we handle it, or continues on up to 1787 * the kernel if we can't (i.e. if we don't have a handler for 1788 * it, or if the handler returns H_TOO_HARD). 1789 * 1790 * r5 - r8 contain hcall args, 1791 * r9 = vcpu, r10 = pc, r11 = msr, r12 = trap, r13 = paca 1792 */ 1793hcall_try_real_mode: 1794 ld r3,VCPU_GPR(R3)(r9) 1795 andi. r0,r11,MSR_PR 1796 /* sc 1 from userspace - reflect to guest syscall */ 1797 bne sc_1_fast_return 1798 clrrdi r3,r3,2 1799 cmpldi r3,hcall_real_table_end - hcall_real_table 1800 bge guest_exit_cont 1801 /* See if this hcall is enabled for in-kernel handling */ 1802 ld r4, VCPU_KVM(r9) 1803 srdi r0, r3, 8 /* r0 = (r3 / 4) >> 6 */ 1804 sldi r0, r0, 3 /* index into kvm->arch.enabled_hcalls[] */ 1805 add r4, r4, r0 1806 ld r0, KVM_ENABLED_HCALLS(r4) 1807 rlwinm r4, r3, 32-2, 0x3f /* r4 = (r3 / 4) & 0x3f */ 1808 srd r0, r0, r4 1809 andi. r0, r0, 1 1810 beq guest_exit_cont 1811 /* Get pointer to handler, if any, and call it */ 1812 LOAD_REG_ADDR(r4, hcall_real_table) 1813 lwax r3,r3,r4 1814 cmpwi r3,0 1815 beq guest_exit_cont 1816 add r12,r3,r4 1817 mtctr r12 1818 mr r3,r9 /* get vcpu pointer */ 1819 ld r4,VCPU_GPR(R4)(r9) 1820 bctrl 1821 cmpdi r3,H_TOO_HARD 1822 beq hcall_real_fallback 1823 ld r4,HSTATE_KVM_VCPU(r13) 1824 std r3,VCPU_GPR(R3)(r4) 1825 ld r10,VCPU_PC(r4) 1826 ld r11,VCPU_MSR(r4) 1827 b fast_guest_return 1828 1829sc_1_fast_return: 1830 mtspr SPRN_SRR0,r10 1831 mtspr SPRN_SRR1,r11 1832 li r10, BOOK3S_INTERRUPT_SYSCALL 1833 bl kvmppc_msr_interrupt 1834 mr r4,r9 1835 b fast_guest_return 1836 1837 /* We've attempted a real mode hcall, but it's punted it back 1838 * to userspace. We need to restore some clobbered volatiles 1839 * before resuming the pass-it-to-qemu path */ 1840hcall_real_fallback: 1841 li r12,BOOK3S_INTERRUPT_SYSCALL 1842 ld r9, HSTATE_KVM_VCPU(r13) 1843 1844 b guest_exit_cont 1845 1846 .globl hcall_real_table 1847hcall_real_table: 1848 .long 0 /* 0 - unused */ 1849 .long DOTSYM(kvmppc_h_remove) - hcall_real_table 1850 .long DOTSYM(kvmppc_h_enter) - hcall_real_table 1851 .long DOTSYM(kvmppc_h_read) - hcall_real_table 1852 .long DOTSYM(kvmppc_h_clear_mod) - hcall_real_table 1853 .long DOTSYM(kvmppc_h_clear_ref) - hcall_real_table 1854 .long DOTSYM(kvmppc_h_protect) - hcall_real_table 1855 .long DOTSYM(kvmppc_h_get_tce) - hcall_real_table 1856 .long DOTSYM(kvmppc_rm_h_put_tce) - hcall_real_table 1857 .long 0 /* 0x24 - H_SET_SPRG0 */ 1858 .long DOTSYM(kvmppc_h_set_dabr) - hcall_real_table 1859 .long 0 /* 0x2c */ 1860 .long 0 /* 0x30 */ 1861 .long 0 /* 0x34 */ 1862 .long 0 /* 0x38 */ 1863 .long 0 /* 0x3c */ 1864 .long 0 /* 0x40 */ 1865 .long 0 /* 0x44 */ 1866 .long 0 /* 0x48 */ 1867 .long 0 /* 0x4c */ 1868 .long 0 /* 0x50 */ 1869 .long 0 /* 0x54 */ 1870 .long 0 /* 0x58 */ 1871 .long 0 /* 0x5c */ 1872 .long 0 /* 0x60 */ 1873#ifdef CONFIG_KVM_XICS 1874 .long DOTSYM(kvmppc_rm_h_eoi) - hcall_real_table 1875 .long DOTSYM(kvmppc_rm_h_cppr) - hcall_real_table 1876 .long DOTSYM(kvmppc_rm_h_ipi) - hcall_real_table 1877 .long 0 /* 0x70 - H_IPOLL */ 1878 .long DOTSYM(kvmppc_rm_h_xirr) - hcall_real_table 1879#else 1880 .long 0 /* 0x64 - H_EOI */ 1881 .long 0 /* 0x68 - H_CPPR */ 1882 .long 0 /* 0x6c - H_IPI */ 1883 .long 0 /* 0x70 - H_IPOLL */ 1884 .long 0 /* 0x74 - H_XIRR */ 1885#endif 1886 .long 0 /* 0x78 */ 1887 .long 0 /* 0x7c */ 1888 .long 0 /* 0x80 */ 1889 .long 0 /* 0x84 */ 1890 .long 0 /* 0x88 */ 1891 .long 0 /* 0x8c */ 1892 .long 0 /* 0x90 */ 1893 .long 0 /* 0x94 */ 1894 .long 0 /* 0x98 */ 1895 .long 0 /* 0x9c */ 1896 .long 0 /* 0xa0 */ 1897 .long 0 /* 0xa4 */ 1898 .long 0 /* 0xa8 */ 1899 .long 0 /* 0xac */ 1900 .long 0 /* 0xb0 */ 1901 .long 0 /* 0xb4 */ 1902 .long 0 /* 0xb8 */ 1903 .long 0 /* 0xbc */ 1904 .long 0 /* 0xc0 */ 1905 .long 0 /* 0xc4 */ 1906 .long 0 /* 0xc8 */ 1907 .long 0 /* 0xcc */ 1908 .long 0 /* 0xd0 */ 1909 .long 0 /* 0xd4 */ 1910 .long 0 /* 0xd8 */ 1911 .long 0 /* 0xdc */ 1912 .long DOTSYM(kvmppc_h_cede) - hcall_real_table 1913 .long DOTSYM(kvmppc_rm_h_confer) - hcall_real_table 1914 .long 0 /* 0xe8 */ 1915 .long 0 /* 0xec */ 1916 .long 0 /* 0xf0 */ 1917 .long 0 /* 0xf4 */ 1918 .long 0 /* 0xf8 */ 1919 .long 0 /* 0xfc */ 1920 .long 0 /* 0x100 */ 1921 .long 0 /* 0x104 */ 1922 .long 0 /* 0x108 */ 1923 .long 0 /* 0x10c */ 1924 .long 0 /* 0x110 */ 1925 .long 0 /* 0x114 */ 1926 .long 0 /* 0x118 */ 1927 .long 0 /* 0x11c */ 1928 .long 0 /* 0x120 */ 1929 .long DOTSYM(kvmppc_h_bulk_remove) - hcall_real_table 1930 .long 0 /* 0x128 */ 1931 .long 0 /* 0x12c */ 1932 .long 0 /* 0x130 */ 1933 .long DOTSYM(kvmppc_h_set_xdabr) - hcall_real_table 1934 .long DOTSYM(kvmppc_rm_h_stuff_tce) - hcall_real_table 1935 .long DOTSYM(kvmppc_rm_h_put_tce_indirect) - hcall_real_table 1936 .long 0 /* 0x140 */ 1937 .long 0 /* 0x144 */ 1938 .long 0 /* 0x148 */ 1939 .long 0 /* 0x14c */ 1940 .long 0 /* 0x150 */ 1941 .long 0 /* 0x154 */ 1942 .long 0 /* 0x158 */ 1943 .long 0 /* 0x15c */ 1944 .long 0 /* 0x160 */ 1945 .long 0 /* 0x164 */ 1946 .long 0 /* 0x168 */ 1947 .long 0 /* 0x16c */ 1948 .long 0 /* 0x170 */ 1949 .long 0 /* 0x174 */ 1950 .long 0 /* 0x178 */ 1951 .long 0 /* 0x17c */ 1952 .long 0 /* 0x180 */ 1953 .long 0 /* 0x184 */ 1954 .long 0 /* 0x188 */ 1955 .long 0 /* 0x18c */ 1956 .long 0 /* 0x190 */ 1957 .long 0 /* 0x194 */ 1958 .long 0 /* 0x198 */ 1959 .long 0 /* 0x19c */ 1960 .long 0 /* 0x1a0 */ 1961 .long 0 /* 0x1a4 */ 1962 .long 0 /* 0x1a8 */ 1963 .long 0 /* 0x1ac */ 1964 .long 0 /* 0x1b0 */ 1965 .long 0 /* 0x1b4 */ 1966 .long 0 /* 0x1b8 */ 1967 .long 0 /* 0x1bc */ 1968 .long 0 /* 0x1c0 */ 1969 .long 0 /* 0x1c4 */ 1970 .long 0 /* 0x1c8 */ 1971 .long 0 /* 0x1cc */ 1972 .long 0 /* 0x1d0 */ 1973 .long 0 /* 0x1d4 */ 1974 .long 0 /* 0x1d8 */ 1975 .long 0 /* 0x1dc */ 1976 .long 0 /* 0x1e0 */ 1977 .long 0 /* 0x1e4 */ 1978 .long 0 /* 0x1e8 */ 1979 .long 0 /* 0x1ec */ 1980 .long 0 /* 0x1f0 */ 1981 .long 0 /* 0x1f4 */ 1982 .long 0 /* 0x1f8 */ 1983 .long 0 /* 0x1fc */ 1984 .long 0 /* 0x200 */ 1985 .long 0 /* 0x204 */ 1986 .long 0 /* 0x208 */ 1987 .long 0 /* 0x20c */ 1988 .long 0 /* 0x210 */ 1989 .long 0 /* 0x214 */ 1990 .long 0 /* 0x218 */ 1991 .long 0 /* 0x21c */ 1992 .long 0 /* 0x220 */ 1993 .long 0 /* 0x224 */ 1994 .long 0 /* 0x228 */ 1995 .long 0 /* 0x22c */ 1996 .long 0 /* 0x230 */ 1997 .long 0 /* 0x234 */ 1998 .long 0 /* 0x238 */ 1999 .long 0 /* 0x23c */ 2000 .long 0 /* 0x240 */ 2001 .long 0 /* 0x244 */ 2002 .long 0 /* 0x248 */ 2003 .long 0 /* 0x24c */ 2004 .long 0 /* 0x250 */ 2005 .long 0 /* 0x254 */ 2006 .long 0 /* 0x258 */ 2007 .long 0 /* 0x25c */ 2008 .long 0 /* 0x260 */ 2009 .long 0 /* 0x264 */ 2010 .long 0 /* 0x268 */ 2011 .long 0 /* 0x26c */ 2012 .long 0 /* 0x270 */ 2013 .long 0 /* 0x274 */ 2014 .long 0 /* 0x278 */ 2015 .long 0 /* 0x27c */ 2016 .long 0 /* 0x280 */ 2017 .long 0 /* 0x284 */ 2018 .long 0 /* 0x288 */ 2019 .long 0 /* 0x28c */ 2020 .long 0 /* 0x290 */ 2021 .long 0 /* 0x294 */ 2022 .long 0 /* 0x298 */ 2023 .long 0 /* 0x29c */ 2024 .long 0 /* 0x2a0 */ 2025 .long 0 /* 0x2a4 */ 2026 .long 0 /* 0x2a8 */ 2027 .long 0 /* 0x2ac */ 2028 .long 0 /* 0x2b0 */ 2029 .long 0 /* 0x2b4 */ 2030 .long 0 /* 0x2b8 */ 2031 .long 0 /* 0x2bc */ 2032 .long 0 /* 0x2c0 */ 2033 .long 0 /* 0x2c4 */ 2034 .long 0 /* 0x2c8 */ 2035 .long 0 /* 0x2cc */ 2036 .long 0 /* 0x2d0 */ 2037 .long 0 /* 0x2d4 */ 2038 .long 0 /* 0x2d8 */ 2039 .long 0 /* 0x2dc */ 2040 .long 0 /* 0x2e0 */ 2041 .long 0 /* 0x2e4 */ 2042 .long 0 /* 0x2e8 */ 2043 .long 0 /* 0x2ec */ 2044 .long 0 /* 0x2f0 */ 2045 .long 0 /* 0x2f4 */ 2046 .long 0 /* 0x2f8 */ 2047 .long 0 /* 0x2fc */ 2048 .long DOTSYM(kvmppc_h_random) - hcall_real_table 2049 .globl hcall_real_table_end 2050hcall_real_table_end: 2051 2052_GLOBAL(kvmppc_h_set_xdabr) 2053 andi. r0, r5, DABRX_USER | DABRX_KERNEL 2054 beq 6f 2055 li r0, DABRX_USER | DABRX_KERNEL | DABRX_BTI 2056 andc. r0, r5, r0 2057 beq 3f 20586: li r3, H_PARAMETER 2059 blr 2060 2061_GLOBAL(kvmppc_h_set_dabr) 2062 li r5, DABRX_USER | DABRX_KERNEL 20633: 2064BEGIN_FTR_SECTION 2065 b 2f 2066END_FTR_SECTION_IFSET(CPU_FTR_ARCH_207S) 2067 std r4,VCPU_DABR(r3) 2068 stw r5, VCPU_DABRX(r3) 2069 mtspr SPRN_DABRX, r5 2070 /* Work around P7 bug where DABR can get corrupted on mtspr */ 20711: mtspr SPRN_DABR,r4 2072 mfspr r5, SPRN_DABR 2073 cmpd r4, r5 2074 bne 1b 2075 isync 2076 li r3,0 2077 blr 2078 2079 /* Emulate H_SET_DABR/X on P8 for the sake of compat mode guests */ 20802: rlwimi r5, r4, 5, DAWRX_DR | DAWRX_DW 2081 rlwimi r5, r4, 2, DAWRX_WT 2082 clrrdi r4, r4, 3 2083 std r4, VCPU_DAWR(r3) 2084 std r5, VCPU_DAWRX(r3) 2085 mtspr SPRN_DAWR, r4 2086 mtspr SPRN_DAWRX, r5 2087 li r3, 0 2088 blr 2089 2090_GLOBAL(kvmppc_h_cede) /* r3 = vcpu pointer, r11 = msr, r13 = paca */ 2091 ori r11,r11,MSR_EE 2092 std r11,VCPU_MSR(r3) 2093 li r0,1 2094 stb r0,VCPU_CEDED(r3) 2095 sync /* order setting ceded vs. testing prodded */ 2096 lbz r5,VCPU_PRODDED(r3) 2097 cmpwi r5,0 2098 bne kvm_cede_prodded 2099 li r12,0 /* set trap to 0 to say hcall is handled */ 2100 stw r12,VCPU_TRAP(r3) 2101 li r0,H_SUCCESS 2102 std r0,VCPU_GPR(R3)(r3) 2103 2104 /* 2105 * Set our bit in the bitmask of napping threads unless all the 2106 * other threads are already napping, in which case we send this 2107 * up to the host. 2108 */ 2109 ld r5,HSTATE_KVM_VCORE(r13) 2110 lbz r6,HSTATE_PTID(r13) 2111 lwz r8,VCORE_ENTRY_EXIT(r5) 2112 clrldi r8,r8,56 2113 li r0,1 2114 sld r0,r0,r6 2115 addi r6,r5,VCORE_NAPPING_THREADS 211631: lwarx r4,0,r6 2117 or r4,r4,r0 2118 cmpw r4,r8 2119 beq kvm_cede_exit 2120 stwcx. r4,0,r6 2121 bne 31b 2122 /* order napping_threads update vs testing entry_exit_map */ 2123 isync 2124 li r0,NAPPING_CEDE 2125 stb r0,HSTATE_NAPPING(r13) 2126 lwz r7,VCORE_ENTRY_EXIT(r5) 2127 cmpwi r7,0x100 2128 bge 33f /* another thread already exiting */ 2129 2130/* 2131 * Although not specifically required by the architecture, POWER7 2132 * preserves the following registers in nap mode, even if an SMT mode 2133 * switch occurs: SLB entries, PURR, SPURR, AMOR, UAMOR, AMR, SPRG0-3, 2134 * DAR, DSISR, DABR, DABRX, DSCR, PMCx, MMCRx, SIAR, SDAR. 2135 */ 2136 /* Save non-volatile GPRs */ 2137 std r14, VCPU_GPR(R14)(r3) 2138 std r15, VCPU_GPR(R15)(r3) 2139 std r16, VCPU_GPR(R16)(r3) 2140 std r17, VCPU_GPR(R17)(r3) 2141 std r18, VCPU_GPR(R18)(r3) 2142 std r19, VCPU_GPR(R19)(r3) 2143 std r20, VCPU_GPR(R20)(r3) 2144 std r21, VCPU_GPR(R21)(r3) 2145 std r22, VCPU_GPR(R22)(r3) 2146 std r23, VCPU_GPR(R23)(r3) 2147 std r24, VCPU_GPR(R24)(r3) 2148 std r25, VCPU_GPR(R25)(r3) 2149 std r26, VCPU_GPR(R26)(r3) 2150 std r27, VCPU_GPR(R27)(r3) 2151 std r28, VCPU_GPR(R28)(r3) 2152 std r29, VCPU_GPR(R29)(r3) 2153 std r30, VCPU_GPR(R30)(r3) 2154 std r31, VCPU_GPR(R31)(r3) 2155 2156 /* save FP state */ 2157 bl kvmppc_save_fp 2158 2159#ifdef CONFIG_PPC_TRANSACTIONAL_MEM 2160BEGIN_FTR_SECTION 2161 ld r9, HSTATE_KVM_VCPU(r13) 2162 bl kvmppc_save_tm 2163END_FTR_SECTION_IFSET(CPU_FTR_TM) 2164#endif 2165 2166 /* 2167 * Set DEC to the smaller of DEC and HDEC, so that we wake 2168 * no later than the end of our timeslice (HDEC interrupts 2169 * don't wake us from nap). 2170 */ 2171 mfspr r3, SPRN_DEC 2172 mfspr r4, SPRN_HDEC 2173 mftb r5 2174 cmpw r3, r4 2175 ble 67f 2176 mtspr SPRN_DEC, r4 217767: 2178 /* save expiry time of guest decrementer */ 2179 extsw r3, r3 2180 add r3, r3, r5 2181 ld r4, HSTATE_KVM_VCPU(r13) 2182 ld r5, HSTATE_KVM_VCORE(r13) 2183 ld r6, VCORE_TB_OFFSET(r5) 2184 subf r3, r6, r3 /* convert to host TB value */ 2185 std r3, VCPU_DEC_EXPIRES(r4) 2186 2187#ifdef CONFIG_KVM_BOOK3S_HV_EXIT_TIMING 2188 ld r4, HSTATE_KVM_VCPU(r13) 2189 addi r3, r4, VCPU_TB_CEDE 2190 bl kvmhv_accumulate_time 2191#endif 2192 2193 lis r3, LPCR_PECEDP@h /* Do wake on privileged doorbell */ 2194 2195 /* 2196 * Take a nap until a decrementer or external or doobell interrupt 2197 * occurs, with PECE1 and PECE0 set in LPCR. 2198 * On POWER8, set PECEDH, and if we are ceding, also set PECEDP. 2199 * Also clear the runlatch bit before napping. 2200 */ 2201kvm_do_nap: 2202 mfspr r0, SPRN_CTRLF 2203 clrrdi r0, r0, 1 2204 mtspr SPRN_CTRLT, r0 2205 2206 li r0,1 2207 stb r0,HSTATE_HWTHREAD_REQ(r13) 2208 mfspr r5,SPRN_LPCR 2209 ori r5,r5,LPCR_PECE0 | LPCR_PECE1 2210BEGIN_FTR_SECTION 2211 ori r5, r5, LPCR_PECEDH 2212 rlwimi r5, r3, 0, LPCR_PECEDP 2213END_FTR_SECTION_IFSET(CPU_FTR_ARCH_207S) 2214 mtspr SPRN_LPCR,r5 2215 isync 2216 li r0, 0 2217 std r0, HSTATE_SCRATCH0(r13) 2218 ptesync 2219 ld r0, HSTATE_SCRATCH0(r13) 22201: cmpd r0, r0 2221 bne 1b 2222 nap 2223 b . 2224 222533: mr r4, r3 2226 li r3, 0 2227 li r12, 0 2228 b 34f 2229 2230kvm_end_cede: 2231 /* get vcpu pointer */ 2232 ld r4, HSTATE_KVM_VCPU(r13) 2233 2234 /* Woken by external or decrementer interrupt */ 2235 ld r1, HSTATE_HOST_R1(r13) 2236 2237#ifdef CONFIG_KVM_BOOK3S_HV_EXIT_TIMING 2238 addi r3, r4, VCPU_TB_RMINTR 2239 bl kvmhv_accumulate_time 2240#endif 2241 2242#ifdef CONFIG_PPC_TRANSACTIONAL_MEM 2243BEGIN_FTR_SECTION 2244 bl kvmppc_restore_tm 2245END_FTR_SECTION_IFSET(CPU_FTR_TM) 2246#endif 2247 2248 /* load up FP state */ 2249 bl kvmppc_load_fp 2250 2251 /* Restore guest decrementer */ 2252 ld r3, VCPU_DEC_EXPIRES(r4) 2253 ld r5, HSTATE_KVM_VCORE(r13) 2254 ld r6, VCORE_TB_OFFSET(r5) 2255 add r3, r3, r6 /* convert host TB to guest TB value */ 2256 mftb r7 2257 subf r3, r7, r3 2258 mtspr SPRN_DEC, r3 2259 2260 /* Load NV GPRS */ 2261 ld r14, VCPU_GPR(R14)(r4) 2262 ld r15, VCPU_GPR(R15)(r4) 2263 ld r16, VCPU_GPR(R16)(r4) 2264 ld r17, VCPU_GPR(R17)(r4) 2265 ld r18, VCPU_GPR(R18)(r4) 2266 ld r19, VCPU_GPR(R19)(r4) 2267 ld r20, VCPU_GPR(R20)(r4) 2268 ld r21, VCPU_GPR(R21)(r4) 2269 ld r22, VCPU_GPR(R22)(r4) 2270 ld r23, VCPU_GPR(R23)(r4) 2271 ld r24, VCPU_GPR(R24)(r4) 2272 ld r25, VCPU_GPR(R25)(r4) 2273 ld r26, VCPU_GPR(R26)(r4) 2274 ld r27, VCPU_GPR(R27)(r4) 2275 ld r28, VCPU_GPR(R28)(r4) 2276 ld r29, VCPU_GPR(R29)(r4) 2277 ld r30, VCPU_GPR(R30)(r4) 2278 ld r31, VCPU_GPR(R31)(r4) 2279 2280 /* Check the wake reason in SRR1 to see why we got here */ 2281 bl kvmppc_check_wake_reason 2282 2283 /* 2284 * Restore volatile registers since we could have called a 2285 * C routine in kvmppc_check_wake_reason 2286 * r4 = VCPU 2287 * r3 tells us whether we need to return to host or not 2288 * WARNING: it gets checked further down: 2289 * should not modify r3 until this check is done. 2290 */ 2291 ld r4, HSTATE_KVM_VCPU(r13) 2292 2293 /* clear our bit in vcore->napping_threads */ 229434: ld r5,HSTATE_KVM_VCORE(r13) 2295 lbz r7,HSTATE_PTID(r13) 2296 li r0,1 2297 sld r0,r0,r7 2298 addi r6,r5,VCORE_NAPPING_THREADS 229932: lwarx r7,0,r6 2300 andc r7,r7,r0 2301 stwcx. r7,0,r6 2302 bne 32b 2303 li r0,0 2304 stb r0,HSTATE_NAPPING(r13) 2305 2306 /* See if the wake reason saved in r3 means we need to exit */ 2307 stw r12, VCPU_TRAP(r4) 2308 mr r9, r4 2309 cmpdi r3, 0 2310 bgt guest_exit_cont 2311 2312 /* see if any other thread is already exiting */ 2313 lwz r0,VCORE_ENTRY_EXIT(r5) 2314 cmpwi r0,0x100 2315 bge guest_exit_cont 2316 2317 b kvmppc_cede_reentry /* if not go back to guest */ 2318 2319 /* cede when already previously prodded case */ 2320kvm_cede_prodded: 2321 li r0,0 2322 stb r0,VCPU_PRODDED(r3) 2323 sync /* order testing prodded vs. clearing ceded */ 2324 stb r0,VCPU_CEDED(r3) 2325 li r3,H_SUCCESS 2326 blr 2327 2328 /* we've ceded but we want to give control to the host */ 2329kvm_cede_exit: 2330 ld r9, HSTATE_KVM_VCPU(r13) 2331 b guest_exit_cont 2332 2333 /* Try to handle a machine check in real mode */ 2334machine_check_realmode: 2335 mr r3, r9 /* get vcpu pointer */ 2336 bl kvmppc_realmode_machine_check 2337 nop 2338 ld r9, HSTATE_KVM_VCPU(r13) 2339 li r12, BOOK3S_INTERRUPT_MACHINE_CHECK 2340 /* 2341 * Deliver unhandled/fatal (e.g. UE) MCE errors to guest through 2342 * machine check interrupt (set HSRR0 to 0x200). And for handled 2343 * errors (no-fatal), just go back to guest execution with current 2344 * HSRR0 instead of exiting guest. This new approach will inject 2345 * machine check to guest for fatal error causing guest to crash. 2346 * 2347 * The old code used to return to host for unhandled errors which 2348 * was causing guest to hang with soft lockups inside guest and 2349 * makes it difficult to recover guest instance. 2350 * 2351 * if we receive machine check with MSR(RI=0) then deliver it to 2352 * guest as machine check causing guest to crash. 2353 */ 2354 ld r11, VCPU_MSR(r9) 2355 rldicl. r0, r11, 64-MSR_HV_LG, 63 /* check if it happened in HV mode */ 2356 bne mc_cont /* if so, exit to host */ 2357 andi. r10, r11, MSR_RI /* check for unrecoverable exception */ 2358 beq 1f /* Deliver a machine check to guest */ 2359 ld r10, VCPU_PC(r9) 2360 cmpdi r3, 0 /* Did we handle MCE ? */ 2361 bne 2f /* Continue guest execution. */ 2362 /* If not, deliver a machine check. SRR0/1 are already set */ 23631: li r10, BOOK3S_INTERRUPT_MACHINE_CHECK 2364 bl kvmppc_msr_interrupt 23652: b fast_interrupt_c_return 2366 2367/* 2368 * Check the reason we woke from nap, and take appropriate action. 2369 * Returns (in r3): 2370 * 0 if nothing needs to be done 2371 * 1 if something happened that needs to be handled by the host 2372 * -1 if there was a guest wakeup (IPI or msgsnd) 2373 * -2 if we handled a PCI passthrough interrupt (returned by 2374 * kvmppc_read_intr only) 2375 * 2376 * Also sets r12 to the interrupt vector for any interrupt that needs 2377 * to be handled now by the host (0x500 for external interrupt), or zero. 2378 * Modifies all volatile registers (since it may call a C function). 2379 * This routine calls kvmppc_read_intr, a C function, if an external 2380 * interrupt is pending. 2381 */ 2382kvmppc_check_wake_reason: 2383 mfspr r6, SPRN_SRR1 2384BEGIN_FTR_SECTION 2385 rlwinm r6, r6, 45-31, 0xf /* extract wake reason field (P8) */ 2386FTR_SECTION_ELSE 2387 rlwinm r6, r6, 45-31, 0xe /* P7 wake reason field is 3 bits */ 2388ALT_FTR_SECTION_END_IFSET(CPU_FTR_ARCH_207S) 2389 cmpwi r6, 8 /* was it an external interrupt? */ 2390 beq 7f /* if so, see what it was */ 2391 li r3, 0 2392 li r12, 0 2393 cmpwi r6, 6 /* was it the decrementer? */ 2394 beq 0f 2395BEGIN_FTR_SECTION 2396 cmpwi r6, 5 /* privileged doorbell? */ 2397 beq 0f 2398 cmpwi r6, 3 /* hypervisor doorbell? */ 2399 beq 3f 2400END_FTR_SECTION_IFSET(CPU_FTR_ARCH_207S) 2401 cmpwi r6, 0xa /* Hypervisor maintenance ? */ 2402 beq 4f 2403 li r3, 1 /* anything else, return 1 */ 24040: blr 2405 2406 /* hypervisor doorbell */ 24073: li r12, BOOK3S_INTERRUPT_H_DOORBELL 2408 2409 /* 2410 * Clear the doorbell as we will invoke the handler 2411 * explicitly in the guest exit path. 2412 */ 2413 lis r6, (PPC_DBELL_SERVER << (63-36))@h 2414 PPC_MSGCLR(6) 2415 /* see if it's a host IPI */ 2416 li r3, 1 2417 lbz r0, HSTATE_HOST_IPI(r13) 2418 cmpwi r0, 0 2419 bnelr 2420 /* if not, return -1 */ 2421 li r3, -1 2422 blr 2423 2424 /* Woken up due to Hypervisor maintenance interrupt */ 24254: li r12, BOOK3S_INTERRUPT_HMI 2426 li r3, 1 2427 blr 2428 2429 /* external interrupt - create a stack frame so we can call C */ 24307: mflr r0 2431 std r0, PPC_LR_STKOFF(r1) 2432 stdu r1, -PPC_MIN_STKFRM(r1) 2433 bl kvmppc_read_intr 2434 nop 2435 li r12, BOOK3S_INTERRUPT_EXTERNAL 2436 cmpdi r3, 1 2437 ble 1f 2438 2439 /* 2440 * Return code of 2 means PCI passthrough interrupt, but 2441 * we need to return back to host to complete handling the 2442 * interrupt. Trap reason is expected in r12 by guest 2443 * exit code. 2444 */ 2445 li r12, BOOK3S_INTERRUPT_HV_RM_HARD 24461: 2447 ld r0, PPC_MIN_STKFRM+PPC_LR_STKOFF(r1) 2448 addi r1, r1, PPC_MIN_STKFRM 2449 mtlr r0 2450 blr 2451 2452/* 2453 * Save away FP, VMX and VSX registers. 2454 * r3 = vcpu pointer 2455 * N.B. r30 and r31 are volatile across this function, 2456 * thus it is not callable from C. 2457 */ 2458kvmppc_save_fp: 2459 mflr r30 2460 mr r31,r3 2461 mfmsr r5 2462 ori r8,r5,MSR_FP 2463#ifdef CONFIG_ALTIVEC 2464BEGIN_FTR_SECTION 2465 oris r8,r8,MSR_VEC@h 2466END_FTR_SECTION_IFSET(CPU_FTR_ALTIVEC) 2467#endif 2468#ifdef CONFIG_VSX 2469BEGIN_FTR_SECTION 2470 oris r8,r8,MSR_VSX@h 2471END_FTR_SECTION_IFSET(CPU_FTR_VSX) 2472#endif 2473 mtmsrd r8 2474 addi r3,r3,VCPU_FPRS 2475 bl store_fp_state 2476#ifdef CONFIG_ALTIVEC 2477BEGIN_FTR_SECTION 2478 addi r3,r31,VCPU_VRS 2479 bl store_vr_state 2480END_FTR_SECTION_IFSET(CPU_FTR_ALTIVEC) 2481#endif 2482 mfspr r6,SPRN_VRSAVE 2483 stw r6,VCPU_VRSAVE(r31) 2484 mtlr r30 2485 blr 2486 2487/* 2488 * Load up FP, VMX and VSX registers 2489 * r4 = vcpu pointer 2490 * N.B. r30 and r31 are volatile across this function, 2491 * thus it is not callable from C. 2492 */ 2493kvmppc_load_fp: 2494 mflr r30 2495 mr r31,r4 2496 mfmsr r9 2497 ori r8,r9,MSR_FP 2498#ifdef CONFIG_ALTIVEC 2499BEGIN_FTR_SECTION 2500 oris r8,r8,MSR_VEC@h 2501END_FTR_SECTION_IFSET(CPU_FTR_ALTIVEC) 2502#endif 2503#ifdef CONFIG_VSX 2504BEGIN_FTR_SECTION 2505 oris r8,r8,MSR_VSX@h 2506END_FTR_SECTION_IFSET(CPU_FTR_VSX) 2507#endif 2508 mtmsrd r8 2509 addi r3,r4,VCPU_FPRS 2510 bl load_fp_state 2511#ifdef CONFIG_ALTIVEC 2512BEGIN_FTR_SECTION 2513 addi r3,r31,VCPU_VRS 2514 bl load_vr_state 2515END_FTR_SECTION_IFSET(CPU_FTR_ALTIVEC) 2516#endif 2517 lwz r7,VCPU_VRSAVE(r31) 2518 mtspr SPRN_VRSAVE,r7 2519 mtlr r30 2520 mr r4,r31 2521 blr 2522 2523#ifdef CONFIG_PPC_TRANSACTIONAL_MEM 2524/* 2525 * Save transactional state and TM-related registers. 2526 * Called with r9 pointing to the vcpu struct. 2527 * This can modify all checkpointed registers, but 2528 * restores r1, r2 and r9 (vcpu pointer) before exit. 2529 */ 2530kvmppc_save_tm: 2531 mflr r0 2532 std r0, PPC_LR_STKOFF(r1) 2533 2534 /* Turn on TM. */ 2535 mfmsr r8 2536 li r0, 1 2537 rldimi r8, r0, MSR_TM_LG, 63-MSR_TM_LG 2538 mtmsrd r8 2539 2540 ld r5, VCPU_MSR(r9) 2541 rldicl. r5, r5, 64 - MSR_TS_S_LG, 62 2542 beq 1f /* TM not active in guest. */ 2543 2544 std r1, HSTATE_HOST_R1(r13) 2545 li r3, TM_CAUSE_KVM_RESCHED 2546 2547 /* Clear the MSR RI since r1, r13 are all going to be foobar. */ 2548 li r5, 0 2549 mtmsrd r5, 1 2550 2551 /* All GPRs are volatile at this point. */ 2552 TRECLAIM(R3) 2553 2554 /* Temporarily store r13 and r9 so we have some regs to play with */ 2555 SET_SCRATCH0(r13) 2556 GET_PACA(r13) 2557 std r9, PACATMSCRATCH(r13) 2558 ld r9, HSTATE_KVM_VCPU(r13) 2559 2560 /* Get a few more GPRs free. */ 2561 std r29, VCPU_GPRS_TM(29)(r9) 2562 std r30, VCPU_GPRS_TM(30)(r9) 2563 std r31, VCPU_GPRS_TM(31)(r9) 2564 2565 /* Save away PPR and DSCR soon so don't run with user values. */ 2566 mfspr r31, SPRN_PPR 2567 HMT_MEDIUM 2568 mfspr r30, SPRN_DSCR 2569 ld r29, HSTATE_DSCR(r13) 2570 mtspr SPRN_DSCR, r29 2571 2572 /* Save all but r9, r13 & r29-r31 */ 2573 reg = 0 2574 .rept 29 2575 .if (reg != 9) && (reg != 13) 2576 std reg, VCPU_GPRS_TM(reg)(r9) 2577 .endif 2578 reg = reg + 1 2579 .endr 2580 /* ... now save r13 */ 2581 GET_SCRATCH0(r4) 2582 std r4, VCPU_GPRS_TM(13)(r9) 2583 /* ... and save r9 */ 2584 ld r4, PACATMSCRATCH(r13) 2585 std r4, VCPU_GPRS_TM(9)(r9) 2586 2587 /* Reload stack pointer and TOC. */ 2588 ld r1, HSTATE_HOST_R1(r13) 2589 ld r2, PACATOC(r13) 2590 2591 /* Set MSR RI now we have r1 and r13 back. */ 2592 li r5, MSR_RI 2593 mtmsrd r5, 1 2594 2595 /* Save away checkpinted SPRs. */ 2596 std r31, VCPU_PPR_TM(r9) 2597 std r30, VCPU_DSCR_TM(r9) 2598 mflr r5 2599 mfcr r6 2600 mfctr r7 2601 mfspr r8, SPRN_AMR 2602 mfspr r10, SPRN_TAR 2603 std r5, VCPU_LR_TM(r9) 2604 stw r6, VCPU_CR_TM(r9) 2605 std r7, VCPU_CTR_TM(r9) 2606 std r8, VCPU_AMR_TM(r9) 2607 std r10, VCPU_TAR_TM(r9) 2608 2609 /* Restore r12 as trap number. */ 2610 lwz r12, VCPU_TRAP(r9) 2611 2612 /* Save FP/VSX. */ 2613 addi r3, r9, VCPU_FPRS_TM 2614 bl store_fp_state 2615 addi r3, r9, VCPU_VRS_TM 2616 bl store_vr_state 2617 mfspr r6, SPRN_VRSAVE 2618 stw r6, VCPU_VRSAVE_TM(r9) 26191: 2620 /* 2621 * We need to save these SPRs after the treclaim so that the software 2622 * error code is recorded correctly in the TEXASR. Also the user may 2623 * change these outside of a transaction, so they must always be 2624 * context switched. 2625 */ 2626 mfspr r5, SPRN_TFHAR 2627 mfspr r6, SPRN_TFIAR 2628 mfspr r7, SPRN_TEXASR 2629 std r5, VCPU_TFHAR(r9) 2630 std r6, VCPU_TFIAR(r9) 2631 std r7, VCPU_TEXASR(r9) 2632 2633 ld r0, PPC_LR_STKOFF(r1) 2634 mtlr r0 2635 blr 2636 2637/* 2638 * Restore transactional state and TM-related registers. 2639 * Called with r4 pointing to the vcpu struct. 2640 * This potentially modifies all checkpointed registers. 2641 * It restores r1, r2, r4 from the PACA. 2642 */ 2643kvmppc_restore_tm: 2644 mflr r0 2645 std r0, PPC_LR_STKOFF(r1) 2646 2647 /* Turn on TM/FP/VSX/VMX so we can restore them. */ 2648 mfmsr r5 2649 li r6, MSR_TM >> 32 2650 sldi r6, r6, 32 2651 or r5, r5, r6 2652 ori r5, r5, MSR_FP 2653 oris r5, r5, (MSR_VEC | MSR_VSX)@h 2654 mtmsrd r5 2655 2656 /* 2657 * The user may change these outside of a transaction, so they must 2658 * always be context switched. 2659 */ 2660 ld r5, VCPU_TFHAR(r4) 2661 ld r6, VCPU_TFIAR(r4) 2662 ld r7, VCPU_TEXASR(r4) 2663 mtspr SPRN_TFHAR, r5 2664 mtspr SPRN_TFIAR, r6 2665 mtspr SPRN_TEXASR, r7 2666 2667 ld r5, VCPU_MSR(r4) 2668 rldicl. r5, r5, 64 - MSR_TS_S_LG, 62 2669 beqlr /* TM not active in guest */ 2670 std r1, HSTATE_HOST_R1(r13) 2671 2672 /* Make sure the failure summary is set, otherwise we'll program check 2673 * when we trechkpt. It's possible that this might have been not set 2674 * on a kvmppc_set_one_reg() call but we shouldn't let this crash the 2675 * host. 2676 */ 2677 oris r7, r7, (TEXASR_FS)@h 2678 mtspr SPRN_TEXASR, r7 2679 2680 /* 2681 * We need to load up the checkpointed state for the guest. 2682 * We need to do this early as it will blow away any GPRs, VSRs and 2683 * some SPRs. 2684 */ 2685 2686 mr r31, r4 2687 addi r3, r31, VCPU_FPRS_TM 2688 bl load_fp_state 2689 addi r3, r31, VCPU_VRS_TM 2690 bl load_vr_state 2691 mr r4, r31 2692 lwz r7, VCPU_VRSAVE_TM(r4) 2693 mtspr SPRN_VRSAVE, r7 2694 2695 ld r5, VCPU_LR_TM(r4) 2696 lwz r6, VCPU_CR_TM(r4) 2697 ld r7, VCPU_CTR_TM(r4) 2698 ld r8, VCPU_AMR_TM(r4) 2699 ld r9, VCPU_TAR_TM(r4) 2700 mtlr r5 2701 mtcr r6 2702 mtctr r7 2703 mtspr SPRN_AMR, r8 2704 mtspr SPRN_TAR, r9 2705 2706 /* 2707 * Load up PPR and DSCR values but don't put them in the actual SPRs 2708 * till the last moment to avoid running with userspace PPR and DSCR for 2709 * too long. 2710 */ 2711 ld r29, VCPU_DSCR_TM(r4) 2712 ld r30, VCPU_PPR_TM(r4) 2713 2714 std r2, PACATMSCRATCH(r13) /* Save TOC */ 2715 2716 /* Clear the MSR RI since r1, r13 are all going to be foobar. */ 2717 li r5, 0 2718 mtmsrd r5, 1 2719 2720 /* Load GPRs r0-r28 */ 2721 reg = 0 2722 .rept 29 2723 ld reg, VCPU_GPRS_TM(reg)(r31) 2724 reg = reg + 1 2725 .endr 2726 2727 mtspr SPRN_DSCR, r29 2728 mtspr SPRN_PPR, r30 2729 2730 /* Load final GPRs */ 2731 ld 29, VCPU_GPRS_TM(29)(r31) 2732 ld 30, VCPU_GPRS_TM(30)(r31) 2733 ld 31, VCPU_GPRS_TM(31)(r31) 2734 2735 /* TM checkpointed state is now setup. All GPRs are now volatile. */ 2736 TRECHKPT 2737 2738 /* Now let's get back the state we need. */ 2739 HMT_MEDIUM 2740 GET_PACA(r13) 2741 ld r29, HSTATE_DSCR(r13) 2742 mtspr SPRN_DSCR, r29 2743 ld r4, HSTATE_KVM_VCPU(r13) 2744 ld r1, HSTATE_HOST_R1(r13) 2745 ld r2, PACATMSCRATCH(r13) 2746 2747 /* Set the MSR RI since we have our registers back. */ 2748 li r5, MSR_RI 2749 mtmsrd r5, 1 2750 2751 ld r0, PPC_LR_STKOFF(r1) 2752 mtlr r0 2753 blr 2754#endif 2755 2756/* 2757 * We come here if we get any exception or interrupt while we are 2758 * executing host real mode code while in guest MMU context. 2759 * For now just spin, but we should do something better. 2760 */ 2761kvmppc_bad_host_intr: 2762 b . 2763 2764/* 2765 * This mimics the MSR transition on IRQ delivery. The new guest MSR is taken 2766 * from VCPU_INTR_MSR and is modified based on the required TM state changes. 2767 * r11 has the guest MSR value (in/out) 2768 * r9 has a vcpu pointer (in) 2769 * r0 is used as a scratch register 2770 */ 2771kvmppc_msr_interrupt: 2772 rldicl r0, r11, 64 - MSR_TS_S_LG, 62 2773 cmpwi r0, 2 /* Check if we are in transactional state.. */ 2774 ld r11, VCPU_INTR_MSR(r9) 2775 bne 1f 2776 /* ... if transactional, change to suspended */ 2777 li r0, 1 27781: rldimi r11, r0, MSR_TS_S_LG, 63 - MSR_TS_T_LG 2779 blr 2780 2781/* 2782 * This works around a hardware bug on POWER8E processors, where 2783 * writing a 1 to the MMCR0[PMAO] bit doesn't generate a 2784 * performance monitor interrupt. Instead, when we need to have 2785 * an interrupt pending, we have to arrange for a counter to overflow. 2786 */ 2787kvmppc_fix_pmao: 2788 li r3, 0 2789 mtspr SPRN_MMCR2, r3 2790 lis r3, (MMCR0_PMXE | MMCR0_FCECE)@h 2791 ori r3, r3, MMCR0_PMCjCE | MMCR0_C56RUN 2792 mtspr SPRN_MMCR0, r3 2793 lis r3, 0x7fff 2794 ori r3, r3, 0xffff 2795 mtspr SPRN_PMC6, r3 2796 isync 2797 blr 2798 2799#ifdef CONFIG_KVM_BOOK3S_HV_EXIT_TIMING 2800/* 2801 * Start timing an activity 2802 * r3 = pointer to time accumulation struct, r4 = vcpu 2803 */ 2804kvmhv_start_timing: 2805 ld r5, HSTATE_KVM_VCORE(r13) 2806 lbz r6, VCORE_IN_GUEST(r5) 2807 cmpwi r6, 0 2808 beq 5f /* if in guest, need to */ 2809 ld r6, VCORE_TB_OFFSET(r5) /* subtract timebase offset */ 28105: mftb r5 2811 subf r5, r6, r5 2812 std r3, VCPU_CUR_ACTIVITY(r4) 2813 std r5, VCPU_ACTIVITY_START(r4) 2814 blr 2815 2816/* 2817 * Accumulate time to one activity and start another. 2818 * r3 = pointer to new time accumulation struct, r4 = vcpu 2819 */ 2820kvmhv_accumulate_time: 2821 ld r5, HSTATE_KVM_VCORE(r13) 2822 lbz r8, VCORE_IN_GUEST(r5) 2823 cmpwi r8, 0 2824 beq 4f /* if in guest, need to */ 2825 ld r8, VCORE_TB_OFFSET(r5) /* subtract timebase offset */ 28264: ld r5, VCPU_CUR_ACTIVITY(r4) 2827 ld r6, VCPU_ACTIVITY_START(r4) 2828 std r3, VCPU_CUR_ACTIVITY(r4) 2829 mftb r7 2830 subf r7, r8, r7 2831 std r7, VCPU_ACTIVITY_START(r4) 2832 cmpdi r5, 0 2833 beqlr 2834 subf r3, r6, r7 2835 ld r8, TAS_SEQCOUNT(r5) 2836 cmpdi r8, 0 2837 addi r8, r8, 1 2838 std r8, TAS_SEQCOUNT(r5) 2839 lwsync 2840 ld r7, TAS_TOTAL(r5) 2841 add r7, r7, r3 2842 std r7, TAS_TOTAL(r5) 2843 ld r6, TAS_MIN(r5) 2844 ld r7, TAS_MAX(r5) 2845 beq 3f 2846 cmpd r3, r6 2847 bge 1f 28483: std r3, TAS_MIN(r5) 28491: cmpd r3, r7 2850 ble 2f 2851 std r3, TAS_MAX(r5) 28522: lwsync 2853 addi r8, r8, 1 2854 std r8, TAS_SEQCOUNT(r5) 2855 blr 2856#endif 2857