Path: blob/master/arch/powerpc/kvm/booke_interrupts.S
10817 views
/*1* This program is free software; you can redistribute it and/or modify2* it under the terms of the GNU General Public License, version 2, as3* published by the Free Software Foundation.4*5* This program is distributed in the hope that it will be useful,6* but WITHOUT ANY WARRANTY; without even the implied warranty of7* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the8* GNU General Public License for more details.9*10* You should have received a copy of the GNU General Public License11* along with this program; if not, write to the Free Software12* Foundation, 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.13*14* Copyright IBM Corp. 200715*16* Authors: Hollis Blanchard <[email protected]>17*/1819#include <asm/ppc_asm.h>20#include <asm/kvm_asm.h>21#include <asm/reg.h>22#include <asm/mmu-44x.h>23#include <asm/page.h>24#include <asm/asm-offsets.h>2526#define KVMPPC_MSR_MASK (MSR_CE|MSR_EE|MSR_PR|MSR_DE|MSR_ME|MSR_IS|MSR_DS)2728#define VCPU_GPR(n) (VCPU_GPRS + (n * 4))2930/* The host stack layout: */31#define HOST_R1 0 /* Implied by stwu. */32#define HOST_CALLEE_LR 433#define HOST_RUN 834/* r2 is special: it holds 'current', and it made nonvolatile in the35* kernel with the -ffixed-r2 gcc option. */36#define HOST_R2 1237#define HOST_NV_GPRS 1638#define HOST_NV_GPR(n) (HOST_NV_GPRS + ((n - 14) * 4))39#define HOST_MIN_STACK_SIZE (HOST_NV_GPR(31) + 4)40#define HOST_STACK_SIZE (((HOST_MIN_STACK_SIZE + 15) / 16) * 16) /* Align. */41#define HOST_STACK_LR (HOST_STACK_SIZE + 4) /* In caller stack frame. */4243#define NEED_INST_MASK ((1<<BOOKE_INTERRUPT_PROGRAM) | \44(1<<BOOKE_INTERRUPT_DTLB_MISS) | \45(1<<BOOKE_INTERRUPT_DEBUG))4647#define NEED_DEAR_MASK ((1<<BOOKE_INTERRUPT_DATA_STORAGE) | \48(1<<BOOKE_INTERRUPT_DTLB_MISS))4950#define NEED_ESR_MASK ((1<<BOOKE_INTERRUPT_DATA_STORAGE) | \51(1<<BOOKE_INTERRUPT_INST_STORAGE) | \52(1<<BOOKE_INTERRUPT_PROGRAM) | \53(1<<BOOKE_INTERRUPT_DTLB_MISS))5455.macro KVM_HANDLER ivor_nr56_GLOBAL(kvmppc_handler_\ivor_nr)57/* Get pointer to vcpu and record exit number. */58mtspr SPRN_SPRG_WSCRATCH0, r459mfspr r4, SPRN_SPRG_RVCPU60stw r5, VCPU_GPR(r5)(r4)61stw r6, VCPU_GPR(r6)(r4)62mfctr r563lis r6, kvmppc_resume_host@h64stw r5, VCPU_CTR(r4)65li r5, \ivor_nr66ori r6, r6, kvmppc_resume_host@l67mtctr r668bctr69.endm7071_GLOBAL(kvmppc_handlers_start)72KVM_HANDLER BOOKE_INTERRUPT_CRITICAL73KVM_HANDLER BOOKE_INTERRUPT_MACHINE_CHECK74KVM_HANDLER BOOKE_INTERRUPT_DATA_STORAGE75KVM_HANDLER BOOKE_INTERRUPT_INST_STORAGE76KVM_HANDLER BOOKE_INTERRUPT_EXTERNAL77KVM_HANDLER BOOKE_INTERRUPT_ALIGNMENT78KVM_HANDLER BOOKE_INTERRUPT_PROGRAM79KVM_HANDLER BOOKE_INTERRUPT_FP_UNAVAIL80KVM_HANDLER BOOKE_INTERRUPT_SYSCALL81KVM_HANDLER BOOKE_INTERRUPT_AP_UNAVAIL82KVM_HANDLER BOOKE_INTERRUPT_DECREMENTER83KVM_HANDLER BOOKE_INTERRUPT_FIT84KVM_HANDLER BOOKE_INTERRUPT_WATCHDOG85KVM_HANDLER BOOKE_INTERRUPT_DTLB_MISS86KVM_HANDLER BOOKE_INTERRUPT_ITLB_MISS87KVM_HANDLER BOOKE_INTERRUPT_DEBUG88KVM_HANDLER BOOKE_INTERRUPT_SPE_UNAVAIL89KVM_HANDLER BOOKE_INTERRUPT_SPE_FP_DATA90KVM_HANDLER BOOKE_INTERRUPT_SPE_FP_ROUND9192_GLOBAL(kvmppc_handler_len)93.long kvmppc_handler_1 - kvmppc_handler_0949596/* Registers:97* SPRG_SCRATCH0: guest r498* r4: vcpu pointer99* r5: KVM exit number100*/101_GLOBAL(kvmppc_resume_host)102stw r3, VCPU_GPR(r3)(r4)103mfcr r3104stw r3, VCPU_CR(r4)105stw r7, VCPU_GPR(r7)(r4)106stw r8, VCPU_GPR(r8)(r4)107stw r9, VCPU_GPR(r9)(r4)108109li r6, 1110slw r6, r6, r5111112#ifdef CONFIG_KVM_EXIT_TIMING113/* save exit time */1141:115mfspr r7, SPRN_TBRU116mfspr r8, SPRN_TBRL117mfspr r9, SPRN_TBRU118cmpw r9, r7119bne 1b120stw r8, VCPU_TIMING_EXIT_TBL(r4)121stw r9, VCPU_TIMING_EXIT_TBU(r4)122#endif123124/* Save the faulting instruction and all GPRs for emulation. */125andi. r7, r6, NEED_INST_MASK126beq ..skip_inst_copy127mfspr r9, SPRN_SRR0128mfmsr r8129ori r7, r8, MSR_DS130mtmsr r7131isync132lwz r9, 0(r9)133mtmsr r8134isync135stw r9, VCPU_LAST_INST(r4)136137stw r15, VCPU_GPR(r15)(r4)138stw r16, VCPU_GPR(r16)(r4)139stw r17, VCPU_GPR(r17)(r4)140stw r18, VCPU_GPR(r18)(r4)141stw r19, VCPU_GPR(r19)(r4)142stw r20, VCPU_GPR(r20)(r4)143stw r21, VCPU_GPR(r21)(r4)144stw r22, VCPU_GPR(r22)(r4)145stw r23, VCPU_GPR(r23)(r4)146stw r24, VCPU_GPR(r24)(r4)147stw r25, VCPU_GPR(r25)(r4)148stw r26, VCPU_GPR(r26)(r4)149stw r27, VCPU_GPR(r27)(r4)150stw r28, VCPU_GPR(r28)(r4)151stw r29, VCPU_GPR(r29)(r4)152stw r30, VCPU_GPR(r30)(r4)153stw r31, VCPU_GPR(r31)(r4)154..skip_inst_copy:155156/* Also grab DEAR and ESR before the host can clobber them. */157158andi. r7, r6, NEED_DEAR_MASK159beq ..skip_dear160mfspr r9, SPRN_DEAR161stw r9, VCPU_FAULT_DEAR(r4)162..skip_dear:163164andi. r7, r6, NEED_ESR_MASK165beq ..skip_esr166mfspr r9, SPRN_ESR167stw r9, VCPU_FAULT_ESR(r4)168..skip_esr:169170/* Save remaining volatile guest register state to vcpu. */171stw r0, VCPU_GPR(r0)(r4)172stw r1, VCPU_GPR(r1)(r4)173stw r2, VCPU_GPR(r2)(r4)174stw r10, VCPU_GPR(r10)(r4)175stw r11, VCPU_GPR(r11)(r4)176stw r12, VCPU_GPR(r12)(r4)177stw r13, VCPU_GPR(r13)(r4)178stw r14, VCPU_GPR(r14)(r4) /* We need a NV GPR below. */179mflr r3180stw r3, VCPU_LR(r4)181mfxer r3182stw r3, VCPU_XER(r4)183mfspr r3, SPRN_SPRG_RSCRATCH0184stw r3, VCPU_GPR(r4)(r4)185mfspr r3, SPRN_SRR0186stw r3, VCPU_PC(r4)187188/* Restore host stack pointer and PID before IVPR, since the host189* exception handlers use them. */190lwz r1, VCPU_HOST_STACK(r4)191lwz r3, VCPU_HOST_PID(r4)192mtspr SPRN_PID, r3193194/* Restore host IVPR before re-enabling interrupts. We cheat and know195* that Linux IVPR is always 0xc0000000. */196lis r3, 0xc000197mtspr SPRN_IVPR, r3198199/* Switch to kernel stack and jump to handler. */200LOAD_REG_ADDR(r3, kvmppc_handle_exit)201mtctr r3202lwz r3, HOST_RUN(r1)203lwz r2, HOST_R2(r1)204mr r14, r4 /* Save vcpu pointer. */205206bctrl /* kvmppc_handle_exit() */207208/* Restore vcpu pointer and the nonvolatiles we used. */209mr r4, r14210lwz r14, VCPU_GPR(r14)(r4)211212/* Sometimes instruction emulation must restore complete GPR state. */213andi. r5, r3, RESUME_FLAG_NV214beq ..skip_nv_load215lwz r15, VCPU_GPR(r15)(r4)216lwz r16, VCPU_GPR(r16)(r4)217lwz r17, VCPU_GPR(r17)(r4)218lwz r18, VCPU_GPR(r18)(r4)219lwz r19, VCPU_GPR(r19)(r4)220lwz r20, VCPU_GPR(r20)(r4)221lwz r21, VCPU_GPR(r21)(r4)222lwz r22, VCPU_GPR(r22)(r4)223lwz r23, VCPU_GPR(r23)(r4)224lwz r24, VCPU_GPR(r24)(r4)225lwz r25, VCPU_GPR(r25)(r4)226lwz r26, VCPU_GPR(r26)(r4)227lwz r27, VCPU_GPR(r27)(r4)228lwz r28, VCPU_GPR(r28)(r4)229lwz r29, VCPU_GPR(r29)(r4)230lwz r30, VCPU_GPR(r30)(r4)231lwz r31, VCPU_GPR(r31)(r4)232..skip_nv_load:233234/* Should we return to the guest? */235andi. r5, r3, RESUME_FLAG_HOST236beq lightweight_exit237238srawi r3, r3, 2 /* Shift -ERR back down. */239240heavyweight_exit:241/* Not returning to guest. */242243/* We already saved guest volatile register state; now save the244* non-volatiles. */245stw r15, VCPU_GPR(r15)(r4)246stw r16, VCPU_GPR(r16)(r4)247stw r17, VCPU_GPR(r17)(r4)248stw r18, VCPU_GPR(r18)(r4)249stw r19, VCPU_GPR(r19)(r4)250stw r20, VCPU_GPR(r20)(r4)251stw r21, VCPU_GPR(r21)(r4)252stw r22, VCPU_GPR(r22)(r4)253stw r23, VCPU_GPR(r23)(r4)254stw r24, VCPU_GPR(r24)(r4)255stw r25, VCPU_GPR(r25)(r4)256stw r26, VCPU_GPR(r26)(r4)257stw r27, VCPU_GPR(r27)(r4)258stw r28, VCPU_GPR(r28)(r4)259stw r29, VCPU_GPR(r29)(r4)260stw r30, VCPU_GPR(r30)(r4)261stw r31, VCPU_GPR(r31)(r4)262263/* Load host non-volatile register state from host stack. */264lwz r14, HOST_NV_GPR(r14)(r1)265lwz r15, HOST_NV_GPR(r15)(r1)266lwz r16, HOST_NV_GPR(r16)(r1)267lwz r17, HOST_NV_GPR(r17)(r1)268lwz r18, HOST_NV_GPR(r18)(r1)269lwz r19, HOST_NV_GPR(r19)(r1)270lwz r20, HOST_NV_GPR(r20)(r1)271lwz r21, HOST_NV_GPR(r21)(r1)272lwz r22, HOST_NV_GPR(r22)(r1)273lwz r23, HOST_NV_GPR(r23)(r1)274lwz r24, HOST_NV_GPR(r24)(r1)275lwz r25, HOST_NV_GPR(r25)(r1)276lwz r26, HOST_NV_GPR(r26)(r1)277lwz r27, HOST_NV_GPR(r27)(r1)278lwz r28, HOST_NV_GPR(r28)(r1)279lwz r29, HOST_NV_GPR(r29)(r1)280lwz r30, HOST_NV_GPR(r30)(r1)281lwz r31, HOST_NV_GPR(r31)(r1)282283/* Return to kvm_vcpu_run(). */284lwz r4, HOST_STACK_LR(r1)285addi r1, r1, HOST_STACK_SIZE286mtlr r4287/* r3 still contains the return code from kvmppc_handle_exit(). */288blr289290291/* Registers:292* r3: kvm_run pointer293* r4: vcpu pointer294*/295_GLOBAL(__kvmppc_vcpu_run)296stwu r1, -HOST_STACK_SIZE(r1)297stw r1, VCPU_HOST_STACK(r4) /* Save stack pointer to vcpu. */298299/* Save host state to stack. */300stw r3, HOST_RUN(r1)301mflr r3302stw r3, HOST_STACK_LR(r1)303304/* Save host non-volatile register state to stack. */305stw r14, HOST_NV_GPR(r14)(r1)306stw r15, HOST_NV_GPR(r15)(r1)307stw r16, HOST_NV_GPR(r16)(r1)308stw r17, HOST_NV_GPR(r17)(r1)309stw r18, HOST_NV_GPR(r18)(r1)310stw r19, HOST_NV_GPR(r19)(r1)311stw r20, HOST_NV_GPR(r20)(r1)312stw r21, HOST_NV_GPR(r21)(r1)313stw r22, HOST_NV_GPR(r22)(r1)314stw r23, HOST_NV_GPR(r23)(r1)315stw r24, HOST_NV_GPR(r24)(r1)316stw r25, HOST_NV_GPR(r25)(r1)317stw r26, HOST_NV_GPR(r26)(r1)318stw r27, HOST_NV_GPR(r27)(r1)319stw r28, HOST_NV_GPR(r28)(r1)320stw r29, HOST_NV_GPR(r29)(r1)321stw r30, HOST_NV_GPR(r30)(r1)322stw r31, HOST_NV_GPR(r31)(r1)323324/* Load guest non-volatiles. */325lwz r14, VCPU_GPR(r14)(r4)326lwz r15, VCPU_GPR(r15)(r4)327lwz r16, VCPU_GPR(r16)(r4)328lwz r17, VCPU_GPR(r17)(r4)329lwz r18, VCPU_GPR(r18)(r4)330lwz r19, VCPU_GPR(r19)(r4)331lwz r20, VCPU_GPR(r20)(r4)332lwz r21, VCPU_GPR(r21)(r4)333lwz r22, VCPU_GPR(r22)(r4)334lwz r23, VCPU_GPR(r23)(r4)335lwz r24, VCPU_GPR(r24)(r4)336lwz r25, VCPU_GPR(r25)(r4)337lwz r26, VCPU_GPR(r26)(r4)338lwz r27, VCPU_GPR(r27)(r4)339lwz r28, VCPU_GPR(r28)(r4)340lwz r29, VCPU_GPR(r29)(r4)341lwz r30, VCPU_GPR(r30)(r4)342lwz r31, VCPU_GPR(r31)(r4)343344lightweight_exit:345stw r2, HOST_R2(r1)346347mfspr r3, SPRN_PID348stw r3, VCPU_HOST_PID(r4)349lwz r3, VCPU_SHADOW_PID(r4)350mtspr SPRN_PID, r3351352#ifdef CONFIG_44x353iccci 0, 0 /* XXX hack */354#endif355356/* Load some guest volatiles. */357lwz r0, VCPU_GPR(r0)(r4)358lwz r2, VCPU_GPR(r2)(r4)359lwz r9, VCPU_GPR(r9)(r4)360lwz r10, VCPU_GPR(r10)(r4)361lwz r11, VCPU_GPR(r11)(r4)362lwz r12, VCPU_GPR(r12)(r4)363lwz r13, VCPU_GPR(r13)(r4)364lwz r3, VCPU_LR(r4)365mtlr r3366lwz r3, VCPU_XER(r4)367mtxer r3368369/* Switch the IVPR. XXX If we take a TLB miss after this we're screwed,370* so how do we make sure vcpu won't fault? */371lis r8, kvmppc_booke_handlers@ha372lwz r8, kvmppc_booke_handlers@l(r8)373mtspr SPRN_IVPR, r8374375/* Save vcpu pointer for the exception handlers. */376mtspr SPRN_SPRG_WVCPU, r4377378/* Can't switch the stack pointer until after IVPR is switched,379* because host interrupt handlers would get confused. */380lwz r1, VCPU_GPR(r1)(r4)381382/* Host interrupt handlers may have clobbered these guest-readable383* SPRGs, so we need to reload them here with the guest's values. */384lwz r3, VCPU_SPRG4(r4)385mtspr SPRN_SPRG4W, r3386lwz r3, VCPU_SPRG5(r4)387mtspr SPRN_SPRG5W, r3388lwz r3, VCPU_SPRG6(r4)389mtspr SPRN_SPRG6W, r3390lwz r3, VCPU_SPRG7(r4)391mtspr SPRN_SPRG7W, r3392393#ifdef CONFIG_KVM_EXIT_TIMING394/* save enter time */3951:396mfspr r6, SPRN_TBRU397mfspr r7, SPRN_TBRL398mfspr r8, SPRN_TBRU399cmpw r8, r6400bne 1b401stw r7, VCPU_TIMING_LAST_ENTER_TBL(r4)402stw r8, VCPU_TIMING_LAST_ENTER_TBU(r4)403#endif404405/* Finish loading guest volatiles and jump to guest. */406lwz r3, VCPU_CTR(r4)407mtctr r3408lwz r3, VCPU_CR(r4)409mtcr r3410lwz r5, VCPU_GPR(r5)(r4)411lwz r6, VCPU_GPR(r6)(r4)412lwz r7, VCPU_GPR(r7)(r4)413lwz r8, VCPU_GPR(r8)(r4)414lwz r3, VCPU_PC(r4)415mtsrr0 r3416lwz r3, VCPU_SHARED(r4)417lwz r3, (VCPU_SHARED_MSR + 4)(r3)418oris r3, r3, KVMPPC_MSR_MASK@h419ori r3, r3, KVMPPC_MSR_MASK@l420mtsrr1 r3421422/* Clear any debug events which occurred since we disabled MSR[DE].423* XXX This gives us a 3-instruction window in which a breakpoint424* intended for guest context could fire in the host instead. */425lis r3, 0xffff426ori r3, r3, 0xffff427mtspr SPRN_DBSR, r3428429lwz r3, VCPU_GPR(r3)(r4)430lwz r4, VCPU_GPR(r4)(r4)431rfi432433434