/* SPDX-License-Identifier: GPL-2.0-only */1/*2*3* Copyright SUSE Linux Products GmbH 20104*5* Authors: Alexander Graf <[email protected]>6*/78/* Real mode helpers */910#include <asm/asm-compat.h>11#include <asm/feature-fixups.h>1213#if defined(CONFIG_PPC_BOOK3S_64)1415#define GET_SHADOW_VCPU(reg) \16mr reg, r131718#elif defined(CONFIG_PPC_BOOK3S_32)1920#define GET_SHADOW_VCPU(reg) \21tophys(reg, r2); \22lwz reg, (THREAD + THREAD_KVM_SVCPU)(reg); \23tophys(reg, reg)2425#endif2627/* Disable for nested KVM */28#define USE_QUICK_LAST_INST293031/* Get helper functions for subarch specific functionality */3233#if defined(CONFIG_PPC_BOOK3S_64)34#include "book3s_64_slb.S"35#elif defined(CONFIG_PPC_BOOK3S_32)36#include "book3s_32_sr.S"37#endif3839/******************************************************************************40* *41* Entry code *42* *43*****************************************************************************/4445.global kvmppc_handler_trampoline_enter46kvmppc_handler_trampoline_enter:4748/* Required state:49*50* MSR = ~IR|DR51* R1 = host R152* R2 = host R253* R4 = guest shadow MSR54* R5 = normal host MSR55* R6 = current host MSR (EE, IR, DR off)56* LR = highmem guest exit code57* all other volatile GPRS = free58* SVCPU[CR] = guest CR59* SVCPU[XER] = guest XER60* SVCPU[CTR] = guest CTR61* SVCPU[LR] = guest LR62*/6364/* r3 = shadow vcpu */65GET_SHADOW_VCPU(r3)6667/* Save guest exit handler address and MSR */68mflr r069PPC_STL r0, HSTATE_VMHANDLER(r3)70PPC_STL r5, HSTATE_HOST_MSR(r3)7172/* Save R1/R2 in the PACA (64-bit) or shadow_vcpu (32-bit) */73PPC_STL r1, HSTATE_HOST_R1(r3)74PPC_STL r2, HSTATE_HOST_R2(r3)7576/* Activate guest mode, so faults get handled by KVM */77li r11, KVM_GUEST_MODE_GUEST78stb r11, HSTATE_IN_GUEST(r3)7980/* Switch to guest segment. This is subarch specific. */81LOAD_GUEST_SEGMENTS8283#ifdef CONFIG_PPC_BOOK3S_6484BEGIN_FTR_SECTION85/* Save host FSCR */86mfspr r8, SPRN_FSCR87std r8, HSTATE_HOST_FSCR(r13)88/* Set FSCR during guest execution */89ld r9, SVCPU_SHADOW_FSCR(r13)90mtspr SPRN_FSCR, r991END_FTR_SECTION_IFSET(CPU_FTR_ARCH_207S)9293/* Some guests may need to have dcbz set to 32 byte length.94*95* Usually we ensure that by patching the guest's instructions96* to trap on dcbz and emulate it in the hypervisor.97*98* If we can, we should tell the CPU to use 32 byte dcbz though,99* because that's a lot faster.100*/101lbz r0, HSTATE_RESTORE_HID5(r3)102cmpwi r0, 0103beq no_dcbz32_on104105mfspr r0,SPRN_HID5106ori r0, r0, 0x80 /* XXX HID5_dcbz32 = 0x80 */107mtspr SPRN_HID5,r0108no_dcbz32_on:109110#endif /* CONFIG_PPC_BOOK3S_64 */111112/* Enter guest */113114PPC_LL r8, SVCPU_CTR(r3)115PPC_LL r9, SVCPU_LR(r3)116lwz r10, SVCPU_CR(r3)117PPC_LL r11, SVCPU_XER(r3)118119mtctr r8120mtlr r9121mtcr r10122mtxer r11123124/* Move SRR0 and SRR1 into the respective regs */125PPC_LL r9, SVCPU_PC(r3)126/* First clear RI in our current MSR value */127li r0, MSR_RI128andc r6, r6, r0129130PPC_LL r0, SVCPU_R0(r3)131PPC_LL r1, SVCPU_R1(r3)132PPC_LL r2, SVCPU_R2(r3)133PPC_LL r5, SVCPU_R5(r3)134PPC_LL r7, SVCPU_R7(r3)135PPC_LL r8, SVCPU_R8(r3)136PPC_LL r10, SVCPU_R10(r3)137PPC_LL r11, SVCPU_R11(r3)138PPC_LL r12, SVCPU_R12(r3)139PPC_LL r13, SVCPU_R13(r3)140141MTMSR_EERI(r6)142mtsrr0 r9143mtsrr1 r4144145PPC_LL r4, SVCPU_R4(r3)146PPC_LL r6, SVCPU_R6(r3)147PPC_LL r9, SVCPU_R9(r3)148PPC_LL r3, (SVCPU_R3)(r3)149150RFI_TO_GUEST151kvmppc_handler_trampoline_enter_end:152153154155/******************************************************************************156* *157* Exit code *158* *159*****************************************************************************/160161.global kvmppc_interrupt_pr162kvmppc_interrupt_pr:163/* 64-bit entry. Register usage at this point:164*165* SPRG_SCRATCH0 = guest R13166* R9 = HSTATE_IN_GUEST167* R12 = (guest CR << 32) | exit handler id168* R13 = PACA169* HSTATE.SCRATCH0 = guest R12170* HSTATE.SCRATCH2 = guest R9171*/172#ifdef CONFIG_PPC64173/* Match 32-bit entry */174ld r9,HSTATE_SCRATCH2(r13)175rotldi r12, r12, 32 /* Flip R12 halves for stw */176stw r12, HSTATE_SCRATCH1(r13) /* CR is now in the low half */177srdi r12, r12, 32 /* shift trap into low half */178#endif179180.global kvmppc_handler_trampoline_exit181kvmppc_handler_trampoline_exit:182/* Register usage at this point:183*184* SPRG_SCRATCH0 = guest R13185* R12 = exit handler id186* R13 = shadow vcpu (32-bit) or PACA (64-bit)187* HSTATE.SCRATCH0 = guest R12188* HSTATE.SCRATCH1 = guest CR189*/190191/* Save registers */192193PPC_STL r0, SVCPU_R0(r13)194PPC_STL r1, SVCPU_R1(r13)195PPC_STL r2, SVCPU_R2(r13)196PPC_STL r3, SVCPU_R3(r13)197PPC_STL r4, SVCPU_R4(r13)198PPC_STL r5, SVCPU_R5(r13)199PPC_STL r6, SVCPU_R6(r13)200PPC_STL r7, SVCPU_R7(r13)201PPC_STL r8, SVCPU_R8(r13)202PPC_STL r9, SVCPU_R9(r13)203PPC_STL r10, SVCPU_R10(r13)204PPC_STL r11, SVCPU_R11(r13)205206/* Restore R1/R2 so we can handle faults */207PPC_LL r1, HSTATE_HOST_R1(r13)208PPC_LL r2, HSTATE_HOST_R2(r13)209210/* Save guest PC and MSR */211#ifdef CONFIG_PPC64212BEGIN_FTR_SECTION213andi. r0, r12, 0x2214cmpwi cr1, r0, 0215beq 1f216mfspr r3,SPRN_HSRR0217mfspr r4,SPRN_HSRR1218andi. r12,r12,0x3ffd219b 2f220END_FTR_SECTION_IFSET(CPU_FTR_HVMODE)221#endif2221: mfsrr0 r3223mfsrr1 r42242:225PPC_STL r3, SVCPU_PC(r13)226PPC_STL r4, SVCPU_SHADOW_SRR1(r13)227228/* Get scratch'ed off registers */229GET_SCRATCH0(r9)230PPC_LL r8, HSTATE_SCRATCH0(r13)231lwz r7, HSTATE_SCRATCH1(r13)232233PPC_STL r9, SVCPU_R13(r13)234PPC_STL r8, SVCPU_R12(r13)235stw r7, SVCPU_CR(r13)236237/* Save more register state */238239mfxer r5240mfdar r6241mfdsisr r7242mfctr r8243mflr r9244245PPC_STL r5, SVCPU_XER(r13)246PPC_STL r6, SVCPU_FAULT_DAR(r13)247stw r7, SVCPU_FAULT_DSISR(r13)248PPC_STL r8, SVCPU_CTR(r13)249PPC_STL r9, SVCPU_LR(r13)250251/*252* In order for us to easily get the last instruction,253* we got the #vmexit at, we exploit the fact that the254* virtual layout is still the same here, so we can just255* ld from the guest's PC address256*/257258/* We only load the last instruction when it's safe */259cmpwi r12, BOOK3S_INTERRUPT_DATA_STORAGE260beq ld_last_inst261cmpwi r12, BOOK3S_INTERRUPT_PROGRAM262beq ld_last_inst263cmpwi r12, BOOK3S_INTERRUPT_SYSCALL264beq ld_last_prev_inst265cmpwi r12, BOOK3S_INTERRUPT_ALIGNMENT266beq- ld_last_inst267#ifdef CONFIG_PPC64268BEGIN_FTR_SECTION269cmpwi r12, BOOK3S_INTERRUPT_H_EMUL_ASSIST270beq- ld_last_inst271END_FTR_SECTION_IFSET(CPU_FTR_HVMODE)272BEGIN_FTR_SECTION273cmpwi r12, BOOK3S_INTERRUPT_FAC_UNAVAIL274beq- ld_last_inst275END_FTR_SECTION_IFSET(CPU_FTR_ARCH_207S)276#endif277278b no_ld_last_inst279280ld_last_prev_inst:281addi r3, r3, -4282283ld_last_inst:284/* Save off the guest instruction we're at */285286/* In case lwz faults */287li r0, KVM_INST_FETCH_FAILED288289#ifdef USE_QUICK_LAST_INST290291/* Set guest mode to 'jump over instruction' so if lwz faults292* we'll just continue at the next IP. */293li r9, KVM_GUEST_MODE_SKIP294stb r9, HSTATE_IN_GUEST(r13)295296/* 1) enable paging for data */297mfmsr r9298ori r11, r9, MSR_DR /* Enable paging for data */299mtmsr r11300sync301/* 2) fetch the instruction */302lwz r0, 0(r3)303/* 3) disable paging again */304mtmsr r9305sync306307#endif308stw r0, SVCPU_LAST_INST(r13)309310no_ld_last_inst:311312/* Unset guest mode */313li r9, KVM_GUEST_MODE_NONE314stb r9, HSTATE_IN_GUEST(r13)315316/* Switch back to host MMU */317LOAD_HOST_SEGMENTS318319#ifdef CONFIG_PPC_BOOK3S_64320321lbz r5, HSTATE_RESTORE_HID5(r13)322cmpwi r5, 0323beq no_dcbz32_off324325li r4, 0326mfspr r5,SPRN_HID5327rldimi r5,r4,6,56328mtspr SPRN_HID5,r5329330no_dcbz32_off:331332BEGIN_FTR_SECTION333/* Save guest FSCR on a FAC_UNAVAIL interrupt */334cmpwi r12, BOOK3S_INTERRUPT_FAC_UNAVAIL335bne+ no_fscr_save336mfspr r7, SPRN_FSCR337std r7, SVCPU_SHADOW_FSCR(r13)338no_fscr_save:339/* Restore host FSCR */340ld r8, HSTATE_HOST_FSCR(r13)341mtspr SPRN_FSCR, r8342END_FTR_SECTION_IFSET(CPU_FTR_ARCH_207S)343344#endif /* CONFIG_PPC_BOOK3S_64 */345346/*347* For some interrupts, we need to call the real Linux348* handler, so it can do work for us. This has to happen349* as if the interrupt arrived from the kernel though,350* so let's fake it here where most state is restored.351*352* Having set up SRR0/1 with the address where we want353* to continue with relocation on (potentially in module354* space), we either just go straight there with rfi[d],355* or we jump to an interrupt handler if there is an356* interrupt to be handled first. In the latter case,357* the rfi[d] at the end of the interrupt handler will358* get us back to where we want to continue.359*/360361/* Register usage at this point:362*363* R1 = host R1364* R2 = host R2365* R10 = raw exit handler id366* R12 = exit handler id367* R13 = shadow vcpu (32-bit) or PACA (64-bit)368* SVCPU.* = guest *369*370*/371372PPC_LL r6, HSTATE_HOST_MSR(r13)373#ifdef CONFIG_PPC_TRANSACTIONAL_MEM374/*375* We don't want to change MSR[TS] bits via rfi here.376* The actual TM handling logic will be in host with377* recovered DR/IR bits after HSTATE_VMHANDLER.378* And MSR_TM can be enabled in HOST_MSR so rfid may379* not suppress this change and can lead to exception.380* Manually set MSR to prevent TS state change here.381*/382mfmsr r7383rldicl r7, r7, 64 - MSR_TS_S_LG, 62384rldimi r6, r7, MSR_TS_S_LG, 63 - MSR_TS_T_LG385#endif386PPC_LL r8, HSTATE_VMHANDLER(r13)387388#ifdef CONFIG_PPC64389BEGIN_FTR_SECTION390beq cr1, 1f391mtspr SPRN_HSRR1, r6392mtspr SPRN_HSRR0, r8393END_FTR_SECTION_IFSET(CPU_FTR_HVMODE)394#endif3951: /* Restore host msr -> SRR1 */396mtsrr1 r6397/* Load highmem handler address */398mtsrr0 r8399400/* RFI into the highmem handler, or jump to interrupt handler */401cmpwi r12, BOOK3S_INTERRUPT_EXTERNAL402beqa BOOK3S_INTERRUPT_EXTERNAL403cmpwi r12, BOOK3S_INTERRUPT_DECREMENTER404beqa BOOK3S_INTERRUPT_DECREMENTER405cmpwi r12, BOOK3S_INTERRUPT_PERFMON406beqa BOOK3S_INTERRUPT_PERFMON407cmpwi r12, BOOK3S_INTERRUPT_DOORBELL408beqa BOOK3S_INTERRUPT_DOORBELL409410RFI_TO_KERNEL411kvmppc_handler_trampoline_exit_end:412413414