booke_interrupts.S 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451
  1. /*
  2. * This program is free software; you can redistribute it and/or modify
  3. * it under the terms of the GNU General Public License, version 2, as
  4. * published by the Free Software Foundation.
  5. *
  6. * This program is distributed in the hope that it will be useful,
  7. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  8. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  9. * GNU General Public License for more details.
  10. *
  11. * You should have received a copy of the GNU General Public License
  12. * along with this program; if not, write to the Free Software
  13. * Foundation, 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
  14. *
  15. * Copyright IBM Corp. 2007
  16. *
  17. * Authors: Hollis Blanchard <hollisb@us.ibm.com>
  18. */
  19. #include <asm/ppc_asm.h>
  20. #include <asm/kvm_asm.h>
  21. #include <asm/reg.h>
  22. #include <asm/mmu-44x.h>
  23. #include <asm/page.h>
  24. #include <asm/asm-offsets.h>
  25. #define KVMPPC_MSR_MASK (MSR_CE|MSR_EE|MSR_PR|MSR_DE|MSR_ME|MSR_IS|MSR_DS)
  26. #define VCPU_GPR(n) (VCPU_GPRS + (n * 4))
  27. /* The host stack layout: */
  28. #define HOST_R1 0 /* Implied by stwu. */
  29. #define HOST_CALLEE_LR 4
  30. #define HOST_RUN 8
  31. /* r2 is special: it holds 'current', and it made nonvolatile in the
  32. * kernel with the -ffixed-r2 gcc option. */
  33. #define HOST_R2 12
  34. #define HOST_NV_GPRS 16
  35. #define HOST_NV_GPR(n) (HOST_NV_GPRS + ((n - 14) * 4))
  36. #define HOST_MIN_STACK_SIZE (HOST_NV_GPR(31) + 4)
  37. #define HOST_STACK_SIZE (((HOST_MIN_STACK_SIZE + 15) / 16) * 16) /* Align. */
  38. #define HOST_STACK_LR (HOST_STACK_SIZE + 4) /* In caller stack frame. */
  39. #define NEED_INST_MASK ((1<<BOOKE_INTERRUPT_PROGRAM) | \
  40. (1<<BOOKE_INTERRUPT_DTLB_MISS) | \
  41. (1<<BOOKE_INTERRUPT_DEBUG))
  42. #define NEED_DEAR_MASK ((1<<BOOKE_INTERRUPT_DATA_STORAGE) | \
  43. (1<<BOOKE_INTERRUPT_DTLB_MISS))
  44. #define NEED_ESR_MASK ((1<<BOOKE_INTERRUPT_DATA_STORAGE) | \
  45. (1<<BOOKE_INTERRUPT_INST_STORAGE) | \
  46. (1<<BOOKE_INTERRUPT_PROGRAM) | \
  47. (1<<BOOKE_INTERRUPT_DTLB_MISS))
  48. .macro KVM_HANDLER ivor_nr
  49. _GLOBAL(kvmppc_handler_\ivor_nr)
  50. /* Get pointer to vcpu and record exit number. */
  51. mtspr SPRN_SPRG0, r4
  52. mfspr r4, SPRN_SPRG1
  53. stw r5, VCPU_GPR(r5)(r4)
  54. stw r6, VCPU_GPR(r6)(r4)
  55. mfctr r5
  56. lis r6, kvmppc_resume_host@h
  57. stw r5, VCPU_CTR(r4)
  58. li r5, \ivor_nr
  59. ori r6, r6, kvmppc_resume_host@l
  60. mtctr r6
  61. bctr
  62. .endm
  63. _GLOBAL(kvmppc_handlers_start)
  64. KVM_HANDLER BOOKE_INTERRUPT_CRITICAL
  65. KVM_HANDLER BOOKE_INTERRUPT_MACHINE_CHECK
  66. KVM_HANDLER BOOKE_INTERRUPT_DATA_STORAGE
  67. KVM_HANDLER BOOKE_INTERRUPT_INST_STORAGE
  68. KVM_HANDLER BOOKE_INTERRUPT_EXTERNAL
  69. KVM_HANDLER BOOKE_INTERRUPT_ALIGNMENT
  70. KVM_HANDLER BOOKE_INTERRUPT_PROGRAM
  71. KVM_HANDLER BOOKE_INTERRUPT_FP_UNAVAIL
  72. KVM_HANDLER BOOKE_INTERRUPT_SYSCALL
  73. KVM_HANDLER BOOKE_INTERRUPT_AP_UNAVAIL
  74. KVM_HANDLER BOOKE_INTERRUPT_DECREMENTER
  75. KVM_HANDLER BOOKE_INTERRUPT_FIT
  76. KVM_HANDLER BOOKE_INTERRUPT_WATCHDOG
  77. KVM_HANDLER BOOKE_INTERRUPT_DTLB_MISS
  78. KVM_HANDLER BOOKE_INTERRUPT_ITLB_MISS
  79. KVM_HANDLER BOOKE_INTERRUPT_DEBUG
  80. _GLOBAL(kvmppc_handler_len)
  81. .long kvmppc_handler_1 - kvmppc_handler_0
  82. /* Registers:
  83. * SPRG0: guest r4
  84. * r4: vcpu pointer
  85. * r5: KVM exit number
  86. */
  87. _GLOBAL(kvmppc_resume_host)
  88. stw r3, VCPU_GPR(r3)(r4)
  89. mfcr r3
  90. stw r3, VCPU_CR(r4)
  91. stw r7, VCPU_GPR(r7)(r4)
  92. stw r8, VCPU_GPR(r8)(r4)
  93. stw r9, VCPU_GPR(r9)(r4)
  94. li r6, 1
  95. slw r6, r6, r5
  96. /* Save the faulting instruction and all GPRs for emulation. */
  97. andi. r7, r6, NEED_INST_MASK
  98. beq ..skip_inst_copy
  99. mfspr r9, SPRN_SRR0
  100. mfmsr r8
  101. ori r7, r8, MSR_DS
  102. mtmsr r7
  103. isync
  104. lwz r9, 0(r9)
  105. mtmsr r8
  106. isync
  107. stw r9, VCPU_LAST_INST(r4)
  108. stw r15, VCPU_GPR(r15)(r4)
  109. stw r16, VCPU_GPR(r16)(r4)
  110. stw r17, VCPU_GPR(r17)(r4)
  111. stw r18, VCPU_GPR(r18)(r4)
  112. stw r19, VCPU_GPR(r19)(r4)
  113. stw r20, VCPU_GPR(r20)(r4)
  114. stw r21, VCPU_GPR(r21)(r4)
  115. stw r22, VCPU_GPR(r22)(r4)
  116. stw r23, VCPU_GPR(r23)(r4)
  117. stw r24, VCPU_GPR(r24)(r4)
  118. stw r25, VCPU_GPR(r25)(r4)
  119. stw r26, VCPU_GPR(r26)(r4)
  120. stw r27, VCPU_GPR(r27)(r4)
  121. stw r28, VCPU_GPR(r28)(r4)
  122. stw r29, VCPU_GPR(r29)(r4)
  123. stw r30, VCPU_GPR(r30)(r4)
  124. stw r31, VCPU_GPR(r31)(r4)
  125. ..skip_inst_copy:
  126. /* Also grab DEAR and ESR before the host can clobber them. */
  127. andi. r7, r6, NEED_DEAR_MASK
  128. beq ..skip_dear
  129. mfspr r9, SPRN_DEAR
  130. stw r9, VCPU_FAULT_DEAR(r4)
  131. ..skip_dear:
  132. andi. r7, r6, NEED_ESR_MASK
  133. beq ..skip_esr
  134. mfspr r9, SPRN_ESR
  135. stw r9, VCPU_FAULT_ESR(r4)
  136. ..skip_esr:
  137. /* Save remaining volatile guest register state to vcpu. */
  138. stw r0, VCPU_GPR(r0)(r4)
  139. stw r1, VCPU_GPR(r1)(r4)
  140. stw r2, VCPU_GPR(r2)(r4)
  141. stw r10, VCPU_GPR(r10)(r4)
  142. stw r11, VCPU_GPR(r11)(r4)
  143. stw r12, VCPU_GPR(r12)(r4)
  144. stw r13, VCPU_GPR(r13)(r4)
  145. stw r14, VCPU_GPR(r14)(r4) /* We need a NV GPR below. */
  146. mflr r3
  147. stw r3, VCPU_LR(r4)
  148. mfxer r3
  149. stw r3, VCPU_XER(r4)
  150. mfspr r3, SPRN_SPRG0
  151. stw r3, VCPU_GPR(r4)(r4)
  152. mfspr r3, SPRN_SRR0
  153. stw r3, VCPU_PC(r4)
  154. /* Restore host stack pointer and PID before IVPR, since the host
  155. * exception handlers use them. */
  156. lwz r1, VCPU_HOST_STACK(r4)
  157. lwz r3, VCPU_HOST_PID(r4)
  158. mtspr SPRN_PID, r3
  159. /* Restore host IVPR before re-enabling interrupts. We cheat and know
  160. * that Linux IVPR is always 0xc0000000. */
  161. lis r3, 0xc000
  162. mtspr SPRN_IVPR, r3
  163. /* Switch to kernel stack and jump to handler. */
  164. LOAD_REG_ADDR(r3, kvmppc_handle_exit)
  165. mtctr r3
  166. lwz r3, HOST_RUN(r1)
  167. lwz r2, HOST_R2(r1)
  168. mr r14, r4 /* Save vcpu pointer. */
  169. bctrl /* kvmppc_handle_exit() */
  170. /* Restore vcpu pointer and the nonvolatiles we used. */
  171. mr r4, r14
  172. lwz r14, VCPU_GPR(r14)(r4)
  173. /* Sometimes instruction emulation must restore complete GPR state. */
  174. andi. r5, r3, RESUME_FLAG_NV
  175. beq ..skip_nv_load
  176. lwz r15, VCPU_GPR(r15)(r4)
  177. lwz r16, VCPU_GPR(r16)(r4)
  178. lwz r17, VCPU_GPR(r17)(r4)
  179. lwz r18, VCPU_GPR(r18)(r4)
  180. lwz r19, VCPU_GPR(r19)(r4)
  181. lwz r20, VCPU_GPR(r20)(r4)
  182. lwz r21, VCPU_GPR(r21)(r4)
  183. lwz r22, VCPU_GPR(r22)(r4)
  184. lwz r23, VCPU_GPR(r23)(r4)
  185. lwz r24, VCPU_GPR(r24)(r4)
  186. lwz r25, VCPU_GPR(r25)(r4)
  187. lwz r26, VCPU_GPR(r26)(r4)
  188. lwz r27, VCPU_GPR(r27)(r4)
  189. lwz r28, VCPU_GPR(r28)(r4)
  190. lwz r29, VCPU_GPR(r29)(r4)
  191. lwz r30, VCPU_GPR(r30)(r4)
  192. lwz r31, VCPU_GPR(r31)(r4)
  193. ..skip_nv_load:
  194. /* Should we return to the guest? */
  195. andi. r5, r3, RESUME_FLAG_HOST
  196. beq lightweight_exit
  197. srawi r3, r3, 2 /* Shift -ERR back down. */
  198. heavyweight_exit:
  199. /* Not returning to guest. */
  200. /* We already saved guest volatile register state; now save the
  201. * non-volatiles. */
  202. stw r15, VCPU_GPR(r15)(r4)
  203. stw r16, VCPU_GPR(r16)(r4)
  204. stw r17, VCPU_GPR(r17)(r4)
  205. stw r18, VCPU_GPR(r18)(r4)
  206. stw r19, VCPU_GPR(r19)(r4)
  207. stw r20, VCPU_GPR(r20)(r4)
  208. stw r21, VCPU_GPR(r21)(r4)
  209. stw r22, VCPU_GPR(r22)(r4)
  210. stw r23, VCPU_GPR(r23)(r4)
  211. stw r24, VCPU_GPR(r24)(r4)
  212. stw r25, VCPU_GPR(r25)(r4)
  213. stw r26, VCPU_GPR(r26)(r4)
  214. stw r27, VCPU_GPR(r27)(r4)
  215. stw r28, VCPU_GPR(r28)(r4)
  216. stw r29, VCPU_GPR(r29)(r4)
  217. stw r30, VCPU_GPR(r30)(r4)
  218. stw r31, VCPU_GPR(r31)(r4)
  219. /* Load host non-volatile register state from host stack. */
  220. lwz r14, HOST_NV_GPR(r14)(r1)
  221. lwz r15, HOST_NV_GPR(r15)(r1)
  222. lwz r16, HOST_NV_GPR(r16)(r1)
  223. lwz r17, HOST_NV_GPR(r17)(r1)
  224. lwz r18, HOST_NV_GPR(r18)(r1)
  225. lwz r19, HOST_NV_GPR(r19)(r1)
  226. lwz r20, HOST_NV_GPR(r20)(r1)
  227. lwz r21, HOST_NV_GPR(r21)(r1)
  228. lwz r22, HOST_NV_GPR(r22)(r1)
  229. lwz r23, HOST_NV_GPR(r23)(r1)
  230. lwz r24, HOST_NV_GPR(r24)(r1)
  231. lwz r25, HOST_NV_GPR(r25)(r1)
  232. lwz r26, HOST_NV_GPR(r26)(r1)
  233. lwz r27, HOST_NV_GPR(r27)(r1)
  234. lwz r28, HOST_NV_GPR(r28)(r1)
  235. lwz r29, HOST_NV_GPR(r29)(r1)
  236. lwz r30, HOST_NV_GPR(r30)(r1)
  237. lwz r31, HOST_NV_GPR(r31)(r1)
  238. /* Return to kvm_vcpu_run(). */
  239. lwz r4, HOST_STACK_LR(r1)
  240. addi r1, r1, HOST_STACK_SIZE
  241. mtlr r4
  242. /* r3 still contains the return code from kvmppc_handle_exit(). */
  243. blr
  244. /* Registers:
  245. * r3: kvm_run pointer
  246. * r4: vcpu pointer
  247. */
  248. _GLOBAL(__kvmppc_vcpu_run)
  249. stwu r1, -HOST_STACK_SIZE(r1)
  250. stw r1, VCPU_HOST_STACK(r4) /* Save stack pointer to vcpu. */
  251. /* Save host state to stack. */
  252. stw r3, HOST_RUN(r1)
  253. mflr r3
  254. stw r3, HOST_STACK_LR(r1)
  255. /* Save host non-volatile register state to stack. */
  256. stw r14, HOST_NV_GPR(r14)(r1)
  257. stw r15, HOST_NV_GPR(r15)(r1)
  258. stw r16, HOST_NV_GPR(r16)(r1)
  259. stw r17, HOST_NV_GPR(r17)(r1)
  260. stw r18, HOST_NV_GPR(r18)(r1)
  261. stw r19, HOST_NV_GPR(r19)(r1)
  262. stw r20, HOST_NV_GPR(r20)(r1)
  263. stw r21, HOST_NV_GPR(r21)(r1)
  264. stw r22, HOST_NV_GPR(r22)(r1)
  265. stw r23, HOST_NV_GPR(r23)(r1)
  266. stw r24, HOST_NV_GPR(r24)(r1)
  267. stw r25, HOST_NV_GPR(r25)(r1)
  268. stw r26, HOST_NV_GPR(r26)(r1)
  269. stw r27, HOST_NV_GPR(r27)(r1)
  270. stw r28, HOST_NV_GPR(r28)(r1)
  271. stw r29, HOST_NV_GPR(r29)(r1)
  272. stw r30, HOST_NV_GPR(r30)(r1)
  273. stw r31, HOST_NV_GPR(r31)(r1)
  274. /* Load guest non-volatiles. */
  275. lwz r14, VCPU_GPR(r14)(r4)
  276. lwz r15, VCPU_GPR(r15)(r4)
  277. lwz r16, VCPU_GPR(r16)(r4)
  278. lwz r17, VCPU_GPR(r17)(r4)
  279. lwz r18, VCPU_GPR(r18)(r4)
  280. lwz r19, VCPU_GPR(r19)(r4)
  281. lwz r20, VCPU_GPR(r20)(r4)
  282. lwz r21, VCPU_GPR(r21)(r4)
  283. lwz r22, VCPU_GPR(r22)(r4)
  284. lwz r23, VCPU_GPR(r23)(r4)
  285. lwz r24, VCPU_GPR(r24)(r4)
  286. lwz r25, VCPU_GPR(r25)(r4)
  287. lwz r26, VCPU_GPR(r26)(r4)
  288. lwz r27, VCPU_GPR(r27)(r4)
  289. lwz r28, VCPU_GPR(r28)(r4)
  290. lwz r29, VCPU_GPR(r29)(r4)
  291. lwz r30, VCPU_GPR(r30)(r4)
  292. lwz r31, VCPU_GPR(r31)(r4)
  293. lightweight_exit:
  294. stw r2, HOST_R2(r1)
  295. mfspr r3, SPRN_PID
  296. stw r3, VCPU_HOST_PID(r4)
  297. lwz r3, VCPU_SHADOW_PID(r4)
  298. mtspr SPRN_PID, r3
  299. /* Prevent all asynchronous TLB updates. */
  300. mfmsr r5
  301. lis r6, (MSR_EE|MSR_CE|MSR_ME|MSR_DE)@h
  302. ori r6, r6, (MSR_EE|MSR_CE|MSR_ME|MSR_DE)@l
  303. andc r6, r5, r6
  304. mtmsr r6
  305. /* Load the guest mappings, leaving the host's "pinned" kernel mappings
  306. * in place. */
  307. mfspr r10, SPRN_MMUCR /* Save host MMUCR. */
  308. li r5, PPC44x_TLB_SIZE
  309. lis r5, tlb_44x_hwater@ha
  310. lwz r5, tlb_44x_hwater@l(r5)
  311. mtctr r5
  312. addi r9, r4, VCPU_SHADOW_TLB
  313. addi r5, r4, VCPU_SHADOW_MOD
  314. li r3, 0
  315. 1:
  316. lbzx r7, r3, r5
  317. cmpwi r7, 0
  318. beq 3f
  319. /* Load guest entry. */
  320. mulli r11, r3, TLBE_BYTES
  321. add r11, r11, r9
  322. lwz r7, 0(r11)
  323. mtspr SPRN_MMUCR, r7
  324. lwz r7, 4(r11)
  325. tlbwe r7, r3, PPC44x_TLB_PAGEID
  326. lwz r7, 8(r11)
  327. tlbwe r7, r3, PPC44x_TLB_XLAT
  328. lwz r7, 12(r11)
  329. tlbwe r7, r3, PPC44x_TLB_ATTRIB
  330. 3:
  331. addi r3, r3, 1 /* Increment index. */
  332. bdnz 1b
  333. mtspr SPRN_MMUCR, r10 /* Restore host MMUCR. */
  334. /* Clear bitmap of modified TLB entries */
  335. li r5, PPC44x_TLB_SIZE>>2
  336. mtctr r5
  337. addi r5, r4, VCPU_SHADOW_MOD - 4
  338. li r6, 0
  339. 1:
  340. stwu r6, 4(r5)
  341. bdnz 1b
  342. iccci 0, 0 /* XXX hack */
  343. /* Load some guest volatiles. */
  344. lwz r0, VCPU_GPR(r0)(r4)
  345. lwz r2, VCPU_GPR(r2)(r4)
  346. lwz r9, VCPU_GPR(r9)(r4)
  347. lwz r10, VCPU_GPR(r10)(r4)
  348. lwz r11, VCPU_GPR(r11)(r4)
  349. lwz r12, VCPU_GPR(r12)(r4)
  350. lwz r13, VCPU_GPR(r13)(r4)
  351. lwz r3, VCPU_LR(r4)
  352. mtlr r3
  353. lwz r3, VCPU_XER(r4)
  354. mtxer r3
  355. /* Switch the IVPR. XXX If we take a TLB miss after this we're screwed,
  356. * so how do we make sure vcpu won't fault? */
  357. lis r8, kvmppc_booke_handlers@ha
  358. lwz r8, kvmppc_booke_handlers@l(r8)
  359. mtspr SPRN_IVPR, r8
  360. /* Save vcpu pointer for the exception handlers. */
  361. mtspr SPRN_SPRG1, r4
  362. /* Can't switch the stack pointer until after IVPR is switched,
  363. * because host interrupt handlers would get confused. */
  364. lwz r1, VCPU_GPR(r1)(r4)
  365. /* XXX handle USPRG0 */
  366. /* Host interrupt handlers may have clobbered these guest-readable
  367. * SPRGs, so we need to reload them here with the guest's values. */
  368. lwz r3, VCPU_SPRG4(r4)
  369. mtspr SPRN_SPRG4, r3
  370. lwz r3, VCPU_SPRG5(r4)
  371. mtspr SPRN_SPRG5, r3
  372. lwz r3, VCPU_SPRG6(r4)
  373. mtspr SPRN_SPRG6, r3
  374. lwz r3, VCPU_SPRG7(r4)
  375. mtspr SPRN_SPRG7, r3
  376. /* Finish loading guest volatiles and jump to guest. */
  377. lwz r3, VCPU_CTR(r4)
  378. mtctr r3
  379. lwz r3, VCPU_CR(r4)
  380. mtcr r3
  381. lwz r5, VCPU_GPR(r5)(r4)
  382. lwz r6, VCPU_GPR(r6)(r4)
  383. lwz r7, VCPU_GPR(r7)(r4)
  384. lwz r8, VCPU_GPR(r8)(r4)
  385. lwz r3, VCPU_PC(r4)
  386. mtsrr0 r3
  387. lwz r3, VCPU_MSR(r4)
  388. oris r3, r3, KVMPPC_MSR_MASK@h
  389. ori r3, r3, KVMPPC_MSR_MASK@l
  390. mtsrr1 r3
  391. /* Clear any debug events which occurred since we disabled MSR[DE].
  392. * XXX This gives us a 3-instruction window in which a breakpoint
  393. * intended for guest context could fire in the host instead. */
  394. lis r3, 0xffff
  395. ori r3, r3, 0xffff
  396. mtspr SPRN_DBSR, r3
  397. lwz r3, VCPU_GPR(r3)(r4)
  398. lwz r4, VCPU_GPR(r4)(r4)
  399. rfi