2 * This program is free software; you can redistribute it and/or modify
3 * it under the terms of the GNU General Public License, version 2, as
4 * published by the Free Software Foundation.
6 * This program is distributed in the hope that it will be useful,
7 * but WITHOUT ANY WARRANTY; without even the implied warranty of
8 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
9 * GNU General Public License for more details.
11 * You should have received a copy of the GNU General Public License
12 * along with this program; if not, write to the Free Software
13 * Foundation, 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
15 * Copyright SUSE Linux Products GmbH 2009
20 #include <asm/kvm_ppc.h>
21 #include <asm/disassemble.h>
22 #include <asm/kvm_book3s.h>
24 #include <asm/switch_to.h>
28 #include <asm/asm-prototypes.h>
30 #define OP_19_XOP_RFID 18
31 #define OP_19_XOP_RFI 50
33 #define OP_31_XOP_MFMSR 83
34 #define OP_31_XOP_MTMSR 146
35 #define OP_31_XOP_MTMSRD 178
36 #define OP_31_XOP_MTSR 210
37 #define OP_31_XOP_MTSRIN 242
38 #define OP_31_XOP_TLBIEL 274
39 /* Opcode is officially reserved, reuse it as sc 1 when sc 1 doesn't trap */
40 #define OP_31_XOP_FAKE_SC1 308
41 #define OP_31_XOP_SLBMTE 402
42 #define OP_31_XOP_SLBIE 434
43 #define OP_31_XOP_SLBIA 498
44 #define OP_31_XOP_MFSR 595
45 #define OP_31_XOP_MFSRIN 659
46 #define OP_31_XOP_DCBA 758
47 #define OP_31_XOP_SLBMFEV 851
48 #define OP_31_XOP_EIOIO 854
49 #define OP_31_XOP_SLBMFEE 915
51 #define OP_31_XOP_TBEGIN 654
52 #define OP_31_XOP_TABORT 910
54 #define OP_31_XOP_TRECLAIM 942
55 #define OP_31_XOP_TRCHKPT 1006
57 /* DCBZ is actually 1014, but we patch it to 1010 so we get a trap */
58 #define OP_31_XOP_DCBZ 1010
74 /* Book3S_32 defines mfsrin(v) - but that messes up our abstract
75 * function pointers, so let's just disable the define. */
84 static bool spr_allowed(struct kvm_vcpu *vcpu, enum priv_level level)
86 /* PAPR VMs only access supervisor SPRs */
87 if (vcpu->arch.papr_enabled && (level > PRIV_SUPER))
90 /* Limit user space to its own small SPR set */
91 if ((kvmppc_get_msr(vcpu) & MSR_PR) && level > PRIV_PROBLEM)
97 #ifdef CONFIG_PPC_TRANSACTIONAL_MEM
98 static inline void kvmppc_copyto_vcpu_tm(struct kvm_vcpu *vcpu)
100 memcpy(&vcpu->arch.gpr_tm[0], &vcpu->arch.regs.gpr[0],
101 sizeof(vcpu->arch.gpr_tm));
102 memcpy(&vcpu->arch.fp_tm, &vcpu->arch.fp,
103 sizeof(struct thread_fp_state));
104 memcpy(&vcpu->arch.vr_tm, &vcpu->arch.vr,
105 sizeof(struct thread_vr_state));
106 vcpu->arch.ppr_tm = vcpu->arch.ppr;
107 vcpu->arch.dscr_tm = vcpu->arch.dscr;
108 vcpu->arch.amr_tm = vcpu->arch.amr;
109 vcpu->arch.ctr_tm = vcpu->arch.regs.ctr;
110 vcpu->arch.tar_tm = vcpu->arch.tar;
111 vcpu->arch.lr_tm = vcpu->arch.regs.link;
112 vcpu->arch.cr_tm = vcpu->arch.regs.ccr;
113 vcpu->arch.xer_tm = vcpu->arch.regs.xer;
114 vcpu->arch.vrsave_tm = vcpu->arch.vrsave;
117 static inline void kvmppc_copyfrom_vcpu_tm(struct kvm_vcpu *vcpu)
119 memcpy(&vcpu->arch.regs.gpr[0], &vcpu->arch.gpr_tm[0],
120 sizeof(vcpu->arch.regs.gpr));
121 memcpy(&vcpu->arch.fp, &vcpu->arch.fp_tm,
122 sizeof(struct thread_fp_state));
123 memcpy(&vcpu->arch.vr, &vcpu->arch.vr_tm,
124 sizeof(struct thread_vr_state));
125 vcpu->arch.ppr = vcpu->arch.ppr_tm;
126 vcpu->arch.dscr = vcpu->arch.dscr_tm;
127 vcpu->arch.amr = vcpu->arch.amr_tm;
128 vcpu->arch.regs.ctr = vcpu->arch.ctr_tm;
129 vcpu->arch.tar = vcpu->arch.tar_tm;
130 vcpu->arch.regs.link = vcpu->arch.lr_tm;
131 vcpu->arch.regs.ccr = vcpu->arch.cr_tm;
132 vcpu->arch.regs.xer = vcpu->arch.xer_tm;
133 vcpu->arch.vrsave = vcpu->arch.vrsave_tm;
136 static void kvmppc_emulate_treclaim(struct kvm_vcpu *vcpu, int ra_val)
138 unsigned long guest_msr = kvmppc_get_msr(vcpu);
139 int fc_val = ra_val ? ra_val : 1;
142 /* CR0 = 0 | MSR[TS] | 0 */
143 vcpu->arch.regs.ccr = (vcpu->arch.regs.ccr & ~(CR0_MASK << CR0_SHIFT)) |
144 (((guest_msr & MSR_TS_MASK) >> (MSR_TS_S_LG - 1))
149 texasr = mfspr(SPRN_TEXASR);
150 kvmppc_save_tm_pr(vcpu);
151 kvmppc_copyfrom_vcpu_tm(vcpu);
153 /* failure recording depends on Failure Summary bit */
154 if (!(texasr & TEXASR_FS)) {
155 texasr &= ~TEXASR_FC;
156 texasr |= ((u64)fc_val << TEXASR_FC_LG) | TEXASR_FS;
158 texasr &= ~(TEXASR_PR | TEXASR_HV);
159 if (kvmppc_get_msr(vcpu) & MSR_PR)
162 if (kvmppc_get_msr(vcpu) & MSR_HV)
165 vcpu->arch.texasr = texasr;
166 vcpu->arch.tfiar = kvmppc_get_pc(vcpu);
167 mtspr(SPRN_TEXASR, texasr);
168 mtspr(SPRN_TFIAR, vcpu->arch.tfiar);
172 * treclaim need quit to non-transactional state.
174 guest_msr &= ~(MSR_TS_MASK);
175 kvmppc_set_msr(vcpu, guest_msr);
178 if (vcpu->arch.shadow_fscr & FSCR_TAR)
179 mtspr(SPRN_TAR, vcpu->arch.tar);
182 static void kvmppc_emulate_trchkpt(struct kvm_vcpu *vcpu)
184 unsigned long guest_msr = kvmppc_get_msr(vcpu);
188 * need flush FP/VEC/VSX to vcpu save area before
191 kvmppc_giveup_ext(vcpu, MSR_VSX);
192 kvmppc_giveup_fac(vcpu, FSCR_TAR_LG);
193 kvmppc_copyto_vcpu_tm(vcpu);
194 kvmppc_save_tm_sprs(vcpu);
197 * as a result of trecheckpoint. set TS to suspended.
199 guest_msr &= ~(MSR_TS_MASK);
200 guest_msr |= MSR_TS_S;
201 kvmppc_set_msr(vcpu, guest_msr);
202 kvmppc_restore_tm_pr(vcpu);
206 /* emulate tabort. at guest privilege state */
207 void kvmppc_emulate_tabort(struct kvm_vcpu *vcpu, int ra_val)
209 /* currently we only emulate tabort. but no emulation of other
210 * tabort variants since there is no kernel usage of them at
213 unsigned long guest_msr = kvmppc_get_msr(vcpu);
218 org_texasr = mfspr(SPRN_TEXASR);
221 /* CR0 = 0 | MSR[TS] | 0 */
222 vcpu->arch.regs.ccr = (vcpu->arch.regs.ccr & ~(CR0_MASK << CR0_SHIFT)) |
223 (((guest_msr & MSR_TS_MASK) >> (MSR_TS_S_LG - 1))
226 vcpu->arch.texasr = mfspr(SPRN_TEXASR);
227 /* failure recording depends on Failure Summary bit,
228 * and tabort will be treated as nops in non-transactional
231 if (!(org_texasr & TEXASR_FS) &&
232 MSR_TM_ACTIVE(guest_msr)) {
233 vcpu->arch.texasr &= ~(TEXASR_PR | TEXASR_HV);
234 if (guest_msr & MSR_PR)
235 vcpu->arch.texasr |= TEXASR_PR;
237 if (guest_msr & MSR_HV)
238 vcpu->arch.texasr |= TEXASR_HV;
240 vcpu->arch.tfiar = kvmppc_get_pc(vcpu);
248 int kvmppc_core_emulate_op_pr(struct kvm_run *run, struct kvm_vcpu *vcpu,
249 unsigned int inst, int *advance)
251 int emulated = EMULATE_DONE;
252 int rt = get_rt(inst);
253 int rs = get_rs(inst);
254 int ra = get_ra(inst);
255 int rb = get_rb(inst);
256 u32 inst_sc = 0x44000002;
258 switch (get_op(inst)) {
260 emulated = EMULATE_FAIL;
261 if ((kvmppc_get_msr(vcpu) & MSR_LE) &&
262 (inst == swab32(inst_sc))) {
264 * This is the byte reversed syscall instruction of our
265 * hypercall handler. Early versions of LE Linux didn't
266 * swap the instructions correctly and ended up in
267 * illegal instructions.
268 * Just always fail hypercalls on these broken systems.
270 kvmppc_set_gpr(vcpu, 3, EV_UNIMPLEMENTED);
271 kvmppc_set_pc(vcpu, kvmppc_get_pc(vcpu) + 4);
272 emulated = EMULATE_DONE;
276 switch (get_xop(inst)) {
278 case OP_19_XOP_RFI: {
279 unsigned long srr1 = kvmppc_get_srr1(vcpu);
280 #ifdef CONFIG_PPC_TRANSACTIONAL_MEM
281 unsigned long cur_msr = kvmppc_get_msr(vcpu);
284 * add rules to fit in ISA specification regarding TM
285 * state transistion in TM disable/Suspended state,
286 * and target TM state is TM inactive(00) state. (the
287 * change should be suppressed).
289 if (((cur_msr & MSR_TM) == 0) &&
290 ((srr1 & MSR_TM) == 0) &&
291 MSR_TM_SUSPENDED(cur_msr) &&
292 !MSR_TM_ACTIVE(srr1))
295 kvmppc_set_pc(vcpu, kvmppc_get_srr0(vcpu));
296 kvmppc_set_msr(vcpu, srr1);
302 emulated = EMULATE_FAIL;
307 switch (get_xop(inst)) {
308 case OP_31_XOP_MFMSR:
309 kvmppc_set_gpr(vcpu, rt, kvmppc_get_msr(vcpu));
311 case OP_31_XOP_MTMSRD:
313 ulong rs_val = kvmppc_get_gpr(vcpu, rs);
314 if (inst & 0x10000) {
315 ulong new_msr = kvmppc_get_msr(vcpu);
316 new_msr &= ~(MSR_RI | MSR_EE);
317 new_msr |= rs_val & (MSR_RI | MSR_EE);
318 kvmppc_set_msr_fast(vcpu, new_msr);
320 kvmppc_set_msr(vcpu, rs_val);
323 case OP_31_XOP_MTMSR:
324 kvmppc_set_msr(vcpu, kvmppc_get_gpr(vcpu, rs));
330 srnum = kvmppc_get_field(inst, 12 + 32, 15 + 32);
331 if (vcpu->arch.mmu.mfsrin) {
333 sr = vcpu->arch.mmu.mfsrin(vcpu, srnum);
334 kvmppc_set_gpr(vcpu, rt, sr);
338 case OP_31_XOP_MFSRIN:
342 srnum = (kvmppc_get_gpr(vcpu, rb) >> 28) & 0xf;
343 if (vcpu->arch.mmu.mfsrin) {
345 sr = vcpu->arch.mmu.mfsrin(vcpu, srnum);
346 kvmppc_set_gpr(vcpu, rt, sr);
351 vcpu->arch.mmu.mtsrin(vcpu,
353 kvmppc_get_gpr(vcpu, rs));
355 case OP_31_XOP_MTSRIN:
356 vcpu->arch.mmu.mtsrin(vcpu,
357 (kvmppc_get_gpr(vcpu, rb) >> 28) & 0xf,
358 kvmppc_get_gpr(vcpu, rs));
360 case OP_31_XOP_TLBIE:
361 case OP_31_XOP_TLBIEL:
363 bool large = (inst & 0x00200000) ? true : false;
364 ulong addr = kvmppc_get_gpr(vcpu, rb);
365 vcpu->arch.mmu.tlbie(vcpu, addr, large);
368 #ifdef CONFIG_PPC_BOOK3S_64
369 case OP_31_XOP_FAKE_SC1:
371 /* SC 1 papr hypercalls */
372 ulong cmd = kvmppc_get_gpr(vcpu, 3);
375 if ((kvmppc_get_msr(vcpu) & MSR_PR) ||
376 !vcpu->arch.papr_enabled) {
377 emulated = EMULATE_FAIL;
381 if (kvmppc_h_pr(vcpu, cmd) == EMULATE_DONE)
384 run->papr_hcall.nr = cmd;
385 for (i = 0; i < 9; ++i) {
386 ulong gpr = kvmppc_get_gpr(vcpu, 4 + i);
387 run->papr_hcall.args[i] = gpr;
390 run->exit_reason = KVM_EXIT_PAPR_HCALL;
391 vcpu->arch.hcall_needed = 1;
392 emulated = EMULATE_EXIT_USER;
396 case OP_31_XOP_EIOIO:
398 case OP_31_XOP_SLBMTE:
399 if (!vcpu->arch.mmu.slbmte)
402 vcpu->arch.mmu.slbmte(vcpu,
403 kvmppc_get_gpr(vcpu, rs),
404 kvmppc_get_gpr(vcpu, rb));
406 case OP_31_XOP_SLBIE:
407 if (!vcpu->arch.mmu.slbie)
410 vcpu->arch.mmu.slbie(vcpu,
411 kvmppc_get_gpr(vcpu, rb));
413 case OP_31_XOP_SLBIA:
414 if (!vcpu->arch.mmu.slbia)
417 vcpu->arch.mmu.slbia(vcpu);
419 case OP_31_XOP_SLBMFEE:
420 if (!vcpu->arch.mmu.slbmfee) {
421 emulated = EMULATE_FAIL;
425 rb_val = kvmppc_get_gpr(vcpu, rb);
426 t = vcpu->arch.mmu.slbmfee(vcpu, rb_val);
427 kvmppc_set_gpr(vcpu, rt, t);
430 case OP_31_XOP_SLBMFEV:
431 if (!vcpu->arch.mmu.slbmfev) {
432 emulated = EMULATE_FAIL;
436 rb_val = kvmppc_get_gpr(vcpu, rb);
437 t = vcpu->arch.mmu.slbmfev(vcpu, rb_val);
438 kvmppc_set_gpr(vcpu, rt, t);
442 /* Gets treated as NOP */
446 ulong rb_val = kvmppc_get_gpr(vcpu, rb);
449 u32 zeros[8] = { 0, 0, 0, 0, 0, 0, 0, 0 };
454 ra_val = kvmppc_get_gpr(vcpu, ra);
456 addr = (ra_val + rb_val) & ~31ULL;
457 if (!(kvmppc_get_msr(vcpu) & MSR_SF))
461 r = kvmppc_st(vcpu, &addr, 32, zeros, true);
462 if ((r == -ENOENT) || (r == -EPERM)) {
464 kvmppc_set_dar(vcpu, vaddr);
465 vcpu->arch.fault_dar = vaddr;
467 dsisr = DSISR_ISSTORE;
469 dsisr |= DSISR_NOHPTE;
470 else if (r == -EPERM)
471 dsisr |= DSISR_PROTFAULT;
473 kvmppc_set_dsisr(vcpu, dsisr);
474 vcpu->arch.fault_dsisr = dsisr;
476 kvmppc_book3s_queue_irqprio(vcpu,
477 BOOK3S_INTERRUPT_DATA_STORAGE);
482 #ifdef CONFIG_PPC_TRANSACTIONAL_MEM
483 case OP_31_XOP_TBEGIN:
485 if (!cpu_has_feature(CPU_FTR_TM))
488 if (!(kvmppc_get_msr(vcpu) & MSR_TM)) {
489 kvmppc_trigger_fac_interrupt(vcpu, FSCR_TM_LG);
490 emulated = EMULATE_AGAIN;
494 if (!(kvmppc_get_msr(vcpu) & MSR_PR)) {
496 vcpu->arch.regs.ccr = (CR0_TBEGIN_FAILURE |
497 (vcpu->arch.regs.ccr & ~(CR0_MASK << CR0_SHIFT)));
499 vcpu->arch.texasr = (TEXASR_FS | TEXASR_EXACT |
500 (((u64)(TM_CAUSE_EMULATE | TM_CAUSE_PERSISTENT))
503 if ((inst >> 21) & 0x1)
504 vcpu->arch.texasr |= TEXASR_ROT;
506 if (kvmppc_get_msr(vcpu) & MSR_HV)
507 vcpu->arch.texasr |= TEXASR_HV;
509 vcpu->arch.tfhar = kvmppc_get_pc(vcpu) + 4;
510 vcpu->arch.tfiar = kvmppc_get_pc(vcpu);
512 kvmppc_restore_tm_sprs(vcpu);
515 emulated = EMULATE_FAIL;
518 case OP_31_XOP_TABORT:
520 ulong guest_msr = kvmppc_get_msr(vcpu);
521 unsigned long ra_val = 0;
523 if (!cpu_has_feature(CPU_FTR_TM))
526 if (!(kvmppc_get_msr(vcpu) & MSR_TM)) {
527 kvmppc_trigger_fac_interrupt(vcpu, FSCR_TM_LG);
528 emulated = EMULATE_AGAIN;
532 /* only emulate for privilege guest, since problem state
533 * guest can run with TM enabled and we don't expect to
534 * trap at here for that case.
536 WARN_ON(guest_msr & MSR_PR);
539 ra_val = kvmppc_get_gpr(vcpu, ra);
541 kvmppc_emulate_tabort(vcpu, ra_val);
544 case OP_31_XOP_TRECLAIM:
546 ulong guest_msr = kvmppc_get_msr(vcpu);
547 unsigned long ra_val = 0;
549 if (!cpu_has_feature(CPU_FTR_TM))
552 if (!(kvmppc_get_msr(vcpu) & MSR_TM)) {
553 kvmppc_trigger_fac_interrupt(vcpu, FSCR_TM_LG);
554 emulated = EMULATE_AGAIN;
558 /* generate interrupts based on priorities */
559 if (guest_msr & MSR_PR) {
560 /* Privileged Instruction type Program Interrupt */
561 kvmppc_core_queue_program(vcpu, SRR1_PROGPRIV);
562 emulated = EMULATE_AGAIN;
566 if (!MSR_TM_ACTIVE(guest_msr)) {
567 /* TM bad thing interrupt */
568 kvmppc_core_queue_program(vcpu, SRR1_PROGTM);
569 emulated = EMULATE_AGAIN;
574 ra_val = kvmppc_get_gpr(vcpu, ra);
575 kvmppc_emulate_treclaim(vcpu, ra_val);
578 case OP_31_XOP_TRCHKPT:
580 ulong guest_msr = kvmppc_get_msr(vcpu);
581 unsigned long texasr;
583 if (!cpu_has_feature(CPU_FTR_TM))
586 if (!(kvmppc_get_msr(vcpu) & MSR_TM)) {
587 kvmppc_trigger_fac_interrupt(vcpu, FSCR_TM_LG);
588 emulated = EMULATE_AGAIN;
592 /* generate interrupt based on priorities */
593 if (guest_msr & MSR_PR) {
594 /* Privileged Instruction type Program Intr */
595 kvmppc_core_queue_program(vcpu, SRR1_PROGPRIV);
596 emulated = EMULATE_AGAIN;
601 texasr = mfspr(SPRN_TEXASR);
604 if (MSR_TM_ACTIVE(guest_msr) ||
605 !(texasr & (TEXASR_FS))) {
606 /* TM bad thing interrupt */
607 kvmppc_core_queue_program(vcpu, SRR1_PROGTM);
608 emulated = EMULATE_AGAIN;
612 kvmppc_emulate_trchkpt(vcpu);
617 emulated = EMULATE_FAIL;
621 emulated = EMULATE_FAIL;
624 if (emulated == EMULATE_FAIL)
625 emulated = kvmppc_emulate_paired_single(run, vcpu);
630 void kvmppc_set_bat(struct kvm_vcpu *vcpu, struct kvmppc_bat *bat, bool upper,
635 u32 bl = (val >> 2) & 0x7ff;
636 bat->bepi_mask = (~bl << 17);
637 bat->bepi = val & 0xfffe0000;
638 bat->vs = (val & 2) ? 1 : 0;
639 bat->vp = (val & 1) ? 1 : 0;
640 bat->raw = (bat->raw & 0xffffffff00000000ULL) | val;
643 bat->brpn = val & 0xfffe0000;
644 bat->wimg = (val >> 3) & 0xf;
646 bat->raw = (bat->raw & 0x00000000ffffffffULL) | ((u64)val << 32);
650 static struct kvmppc_bat *kvmppc_find_bat(struct kvm_vcpu *vcpu, int sprn)
652 struct kvmppc_vcpu_book3s *vcpu_book3s = to_book3s(vcpu);
653 struct kvmppc_bat *bat;
656 case SPRN_IBAT0U ... SPRN_IBAT3L:
657 bat = &vcpu_book3s->ibat[(sprn - SPRN_IBAT0U) / 2];
659 case SPRN_IBAT4U ... SPRN_IBAT7L:
660 bat = &vcpu_book3s->ibat[4 + ((sprn - SPRN_IBAT4U) / 2)];
662 case SPRN_DBAT0U ... SPRN_DBAT3L:
663 bat = &vcpu_book3s->dbat[(sprn - SPRN_DBAT0U) / 2];
665 case SPRN_DBAT4U ... SPRN_DBAT7L:
666 bat = &vcpu_book3s->dbat[4 + ((sprn - SPRN_DBAT4U) / 2)];
675 int kvmppc_core_emulate_mtspr_pr(struct kvm_vcpu *vcpu, int sprn, ulong spr_val)
677 int emulated = EMULATE_DONE;
681 if (!spr_allowed(vcpu, PRIV_HYPER))
683 to_book3s(vcpu)->sdr1 = spr_val;
686 kvmppc_set_dsisr(vcpu, spr_val);
689 kvmppc_set_dar(vcpu, spr_val);
692 to_book3s(vcpu)->hior = spr_val;
694 case SPRN_IBAT0U ... SPRN_IBAT3L:
695 case SPRN_IBAT4U ... SPRN_IBAT7L:
696 case SPRN_DBAT0U ... SPRN_DBAT3L:
697 case SPRN_DBAT4U ... SPRN_DBAT7L:
699 struct kvmppc_bat *bat = kvmppc_find_bat(vcpu, sprn);
701 kvmppc_set_bat(vcpu, bat, !(sprn % 2), (u32)spr_val);
702 /* BAT writes happen so rarely that we're ok to flush
704 kvmppc_mmu_pte_flush(vcpu, 0, 0);
705 kvmppc_mmu_flush_segments(vcpu);
709 to_book3s(vcpu)->hid[0] = spr_val;
712 to_book3s(vcpu)->hid[1] = spr_val;
715 to_book3s(vcpu)->hid[2] = spr_val;
717 case SPRN_HID2_GEKKO:
718 to_book3s(vcpu)->hid[2] = spr_val;
719 /* HID2.PSE controls paired single on gekko */
720 switch (vcpu->arch.pvr) {
721 case 0x00080200: /* lonestar 2.0 */
722 case 0x00088202: /* lonestar 2.2 */
723 case 0x70000100: /* gekko 1.0 */
724 case 0x00080100: /* gekko 2.0 */
725 case 0x00083203: /* gekko 2.3a */
726 case 0x00083213: /* gekko 2.3b */
727 case 0x00083204: /* gekko 2.4 */
728 case 0x00083214: /* gekko 2.4e (8SE) - retail HW2 */
729 case 0x00087200: /* broadway */
730 if (vcpu->arch.hflags & BOOK3S_HFLAG_NATIVE_PS) {
731 /* Native paired singles */
732 } else if (spr_val & (1 << 29)) { /* HID2.PSE */
733 vcpu->arch.hflags |= BOOK3S_HFLAG_PAIRED_SINGLE;
734 kvmppc_giveup_ext(vcpu, MSR_FP);
736 vcpu->arch.hflags &= ~BOOK3S_HFLAG_PAIRED_SINGLE;
742 case SPRN_HID4_GEKKO:
743 to_book3s(vcpu)->hid[4] = spr_val;
746 to_book3s(vcpu)->hid[5] = spr_val;
747 /* guest HID5 set can change is_dcbz32 */
748 if (vcpu->arch.mmu.is_dcbz32(vcpu) &&
750 vcpu->arch.hflags |= BOOK3S_HFLAG_DCBZ32;
760 to_book3s(vcpu)->gqr[sprn - SPRN_GQR0] = spr_val;
762 #ifdef CONFIG_PPC_BOOK3S_64
764 kvmppc_set_fscr(vcpu, spr_val);
767 vcpu->arch.bescr = spr_val;
770 vcpu->arch.ebbhr = spr_val;
773 vcpu->arch.ebbrr = spr_val;
775 #ifdef CONFIG_PPC_TRANSACTIONAL_MEM
779 if (!cpu_has_feature(CPU_FTR_TM))
782 if (!(kvmppc_get_msr(vcpu) & MSR_TM)) {
783 kvmppc_trigger_fac_interrupt(vcpu, FSCR_TM_LG);
784 emulated = EMULATE_AGAIN;
788 if (MSR_TM_ACTIVE(kvmppc_get_msr(vcpu)) &&
789 !((MSR_TM_SUSPENDED(kvmppc_get_msr(vcpu))) &&
790 (sprn == SPRN_TFHAR))) {
791 /* it is illegal to mtspr() TM regs in
792 * other than non-transactional state, with
793 * the exception of TFHAR in suspend state.
795 kvmppc_core_queue_program(vcpu, SRR1_PROGTM);
796 emulated = EMULATE_AGAIN;
801 if (sprn == SPRN_TFHAR)
802 mtspr(SPRN_TFHAR, spr_val);
803 else if (sprn == SPRN_TEXASR)
804 mtspr(SPRN_TEXASR, spr_val);
806 mtspr(SPRN_TFIAR, spr_val);
820 case SPRN_MMCR0_GEKKO:
821 case SPRN_MMCR1_GEKKO:
822 case SPRN_PMC1_GEKKO:
823 case SPRN_PMC2_GEKKO:
824 case SPRN_PMC3_GEKKO:
825 case SPRN_PMC4_GEKKO:
826 case SPRN_WPAR_GEKKO:
829 #ifdef CONFIG_PPC_BOOK3S_64
840 pr_info_ratelimited("KVM: invalid SPR write: %d\n", sprn);
842 if (kvmppc_get_msr(vcpu) & MSR_PR) {
843 kvmppc_core_queue_program(vcpu, SRR1_PROGPRIV);
844 emulated = EMULATE_AGAIN;
847 if ((kvmppc_get_msr(vcpu) & MSR_PR) || sprn == 0) {
848 kvmppc_core_queue_program(vcpu, SRR1_PROGILL);
849 emulated = EMULATE_AGAIN;
858 int kvmppc_core_emulate_mfspr_pr(struct kvm_vcpu *vcpu, int sprn, ulong *spr_val)
860 int emulated = EMULATE_DONE;
863 case SPRN_IBAT0U ... SPRN_IBAT3L:
864 case SPRN_IBAT4U ... SPRN_IBAT7L:
865 case SPRN_DBAT0U ... SPRN_DBAT3L:
866 case SPRN_DBAT4U ... SPRN_DBAT7L:
868 struct kvmppc_bat *bat = kvmppc_find_bat(vcpu, sprn);
871 *spr_val = bat->raw >> 32;
878 if (!spr_allowed(vcpu, PRIV_HYPER))
880 *spr_val = to_book3s(vcpu)->sdr1;
883 *spr_val = kvmppc_get_dsisr(vcpu);
886 *spr_val = kvmppc_get_dar(vcpu);
889 *spr_val = to_book3s(vcpu)->hior;
892 *spr_val = to_book3s(vcpu)->hid[0];
895 *spr_val = to_book3s(vcpu)->hid[1];
898 case SPRN_HID2_GEKKO:
899 *spr_val = to_book3s(vcpu)->hid[2];
902 case SPRN_HID4_GEKKO:
903 *spr_val = to_book3s(vcpu)->hid[4];
906 *spr_val = to_book3s(vcpu)->hid[5];
914 * On exit we would have updated purr
916 *spr_val = vcpu->arch.purr;
920 * On exit we would have updated spurr
922 *spr_val = vcpu->arch.spurr;
925 *spr_val = to_book3s(vcpu)->vtb;
928 *spr_val = vcpu->arch.ic;
938 *spr_val = to_book3s(vcpu)->gqr[sprn - SPRN_GQR0];
940 #ifdef CONFIG_PPC_BOOK3S_64
942 *spr_val = vcpu->arch.fscr;
945 *spr_val = vcpu->arch.bescr;
948 *spr_val = vcpu->arch.ebbhr;
951 *spr_val = vcpu->arch.ebbrr;
953 #ifdef CONFIG_PPC_TRANSACTIONAL_MEM
957 if (!cpu_has_feature(CPU_FTR_TM))
960 if (!(kvmppc_get_msr(vcpu) & MSR_TM)) {
961 kvmppc_trigger_fac_interrupt(vcpu, FSCR_TM_LG);
962 emulated = EMULATE_AGAIN;
967 if (sprn == SPRN_TFHAR)
968 *spr_val = mfspr(SPRN_TFHAR);
969 else if (sprn == SPRN_TEXASR)
970 *spr_val = mfspr(SPRN_TEXASR);
971 else if (sprn == SPRN_TFIAR)
972 *spr_val = mfspr(SPRN_TFIAR);
983 case SPRN_MMCR0_GEKKO:
984 case SPRN_MMCR1_GEKKO:
985 case SPRN_PMC1_GEKKO:
986 case SPRN_PMC2_GEKKO:
987 case SPRN_PMC3_GEKKO:
988 case SPRN_PMC4_GEKKO:
989 case SPRN_WPAR_GEKKO:
992 #ifdef CONFIG_PPC_BOOK3S_64
1005 pr_info_ratelimited("KVM: invalid SPR read: %d\n", sprn);
1007 if (kvmppc_get_msr(vcpu) & MSR_PR) {
1008 kvmppc_core_queue_program(vcpu, SRR1_PROGPRIV);
1009 emulated = EMULATE_AGAIN;
1012 if ((kvmppc_get_msr(vcpu) & MSR_PR) || sprn == 0 ||
1013 sprn == 4 || sprn == 5 || sprn == 6) {
1014 kvmppc_core_queue_program(vcpu, SRR1_PROGILL);
1015 emulated = EMULATE_AGAIN;
1025 u32 kvmppc_alignment_dsisr(struct kvm_vcpu *vcpu, unsigned int inst)
1027 return make_dsisr(inst);
1030 ulong kvmppc_alignment_dar(struct kvm_vcpu *vcpu, unsigned int inst)
1032 #ifdef CONFIG_PPC_BOOK3S_64
1034 * Linux's fix_alignment() assumes that DAR is valid, so can we
1036 return vcpu->arch.fault_dar;
1039 ulong ra = get_ra(inst);
1040 ulong rb = get_rb(inst);
1042 switch (get_op(inst)) {
1048 dar = kvmppc_get_gpr(vcpu, ra);
1049 dar += (s32)((s16)inst);
1053 dar = kvmppc_get_gpr(vcpu, ra);
1054 dar += kvmppc_get_gpr(vcpu, rb);
1057 printk(KERN_INFO "KVM: Unaligned instruction 0x%x\n", inst);