mirror of
https://github.com/AuxXxilium/linux_dsm_epyc7002.git
synced 2024-12-15 08:46:45 +07:00
f7f1427dc0
Allocate GVA -> HPA page tables for guest kernel and guest user mode on each VCPU, to allow for fast path TLB refill handling to be added later. In the process kvm_arch_vcpu_init() needs updating to pass on any error from the vcpu_init() callback. Signed-off-by: James Hogan <james.hogan@imgtec.com> Cc: Paolo Bonzini <pbonzini@redhat.com> Cc: "Radim Krčmář" <rkrcmar@redhat.com> Cc: Ralf Baechle <ralf@linux-mips.org> Cc: linux-mips@linux-mips.org Cc: kvm@vger.kernel.org
873 lines
24 KiB
C
873 lines
24 KiB
C
/*
|
|
* This file is subject to the terms and conditions of the GNU General Public
|
|
* License. See the file "COPYING" in the main directory of this archive
|
|
* for more details.
|
|
*
|
|
* KVM/MIPS: Deliver/Emulate exceptions to the guest kernel
|
|
*
|
|
* Copyright (C) 2012 MIPS Technologies, Inc. All rights reserved.
|
|
* Authors: Sanjay Lal <sanjayl@kymasys.com>
|
|
*/
|
|
|
|
#include <linux/errno.h>
|
|
#include <linux/err.h>
|
|
#include <linux/kvm_host.h>
|
|
#include <linux/vmalloc.h>
|
|
#include <asm/mmu_context.h>
|
|
#include <asm/pgalloc.h>
|
|
|
|
#include "interrupt.h"
|
|
|
|
static gpa_t kvm_trap_emul_gva_to_gpa_cb(gva_t gva)
|
|
{
|
|
gpa_t gpa;
|
|
gva_t kseg = KSEGX(gva);
|
|
|
|
if ((kseg == CKSEG0) || (kseg == CKSEG1))
|
|
gpa = CPHYSADDR(gva);
|
|
else {
|
|
kvm_err("%s: cannot find GPA for GVA: %#lx\n", __func__, gva);
|
|
kvm_mips_dump_host_tlbs();
|
|
gpa = KVM_INVALID_ADDR;
|
|
}
|
|
|
|
kvm_debug("%s: gva %#lx, gpa: %#llx\n", __func__, gva, gpa);
|
|
|
|
return gpa;
|
|
}
|
|
|
|
static int kvm_trap_emul_handle_cop_unusable(struct kvm_vcpu *vcpu)
|
|
{
|
|
struct mips_coproc *cop0 = vcpu->arch.cop0;
|
|
struct kvm_run *run = vcpu->run;
|
|
u32 __user *opc = (u32 __user *) vcpu->arch.pc;
|
|
u32 cause = vcpu->arch.host_cp0_cause;
|
|
enum emulation_result er = EMULATE_DONE;
|
|
int ret = RESUME_GUEST;
|
|
|
|
if (((cause & CAUSEF_CE) >> CAUSEB_CE) == 1) {
|
|
/* FPU Unusable */
|
|
if (!kvm_mips_guest_has_fpu(&vcpu->arch) ||
|
|
(kvm_read_c0_guest_status(cop0) & ST0_CU1) == 0) {
|
|
/*
|
|
* Unusable/no FPU in guest:
|
|
* deliver guest COP1 Unusable Exception
|
|
*/
|
|
er = kvm_mips_emulate_fpu_exc(cause, opc, run, vcpu);
|
|
} else {
|
|
/* Restore FPU state */
|
|
kvm_own_fpu(vcpu);
|
|
er = EMULATE_DONE;
|
|
}
|
|
} else {
|
|
er = kvm_mips_emulate_inst(cause, opc, run, vcpu);
|
|
}
|
|
|
|
switch (er) {
|
|
case EMULATE_DONE:
|
|
ret = RESUME_GUEST;
|
|
break;
|
|
|
|
case EMULATE_FAIL:
|
|
run->exit_reason = KVM_EXIT_INTERNAL_ERROR;
|
|
ret = RESUME_HOST;
|
|
break;
|
|
|
|
case EMULATE_WAIT:
|
|
run->exit_reason = KVM_EXIT_INTR;
|
|
ret = RESUME_HOST;
|
|
break;
|
|
|
|
default:
|
|
BUG();
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
static int kvm_trap_emul_handle_tlb_mod(struct kvm_vcpu *vcpu)
|
|
{
|
|
struct kvm_run *run = vcpu->run;
|
|
u32 __user *opc = (u32 __user *) vcpu->arch.pc;
|
|
unsigned long badvaddr = vcpu->arch.host_cp0_badvaddr;
|
|
u32 cause = vcpu->arch.host_cp0_cause;
|
|
enum emulation_result er = EMULATE_DONE;
|
|
int ret = RESUME_GUEST;
|
|
|
|
if (KVM_GUEST_KSEGX(badvaddr) < KVM_GUEST_KSEG0
|
|
|| KVM_GUEST_KSEGX(badvaddr) == KVM_GUEST_KSEG23) {
|
|
kvm_debug("USER/KSEG23 ADDR TLB MOD fault: cause %#x, PC: %p, BadVaddr: %#lx\n",
|
|
cause, opc, badvaddr);
|
|
er = kvm_mips_handle_tlbmod(cause, opc, run, vcpu);
|
|
|
|
if (er == EMULATE_DONE)
|
|
ret = RESUME_GUEST;
|
|
else {
|
|
run->exit_reason = KVM_EXIT_INTERNAL_ERROR;
|
|
ret = RESUME_HOST;
|
|
}
|
|
} else if (KVM_GUEST_KSEGX(badvaddr) == KVM_GUEST_KSEG0) {
|
|
/*
|
|
* XXXKYMA: The guest kernel does not expect to get this fault
|
|
* when we are not using HIGHMEM. Need to address this in a
|
|
* HIGHMEM kernel
|
|
*/
|
|
kvm_err("TLB MOD fault not handled, cause %#x, PC: %p, BadVaddr: %#lx\n",
|
|
cause, opc, badvaddr);
|
|
kvm_mips_dump_host_tlbs();
|
|
kvm_arch_vcpu_dump_regs(vcpu);
|
|
run->exit_reason = KVM_EXIT_INTERNAL_ERROR;
|
|
ret = RESUME_HOST;
|
|
} else {
|
|
kvm_err("Illegal TLB Mod fault address , cause %#x, PC: %p, BadVaddr: %#lx\n",
|
|
cause, opc, badvaddr);
|
|
kvm_mips_dump_host_tlbs();
|
|
kvm_arch_vcpu_dump_regs(vcpu);
|
|
run->exit_reason = KVM_EXIT_INTERNAL_ERROR;
|
|
ret = RESUME_HOST;
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
static int kvm_trap_emul_handle_tlb_miss(struct kvm_vcpu *vcpu, bool store)
|
|
{
|
|
struct kvm_run *run = vcpu->run;
|
|
u32 __user *opc = (u32 __user *) vcpu->arch.pc;
|
|
unsigned long badvaddr = vcpu->arch.host_cp0_badvaddr;
|
|
u32 cause = vcpu->arch.host_cp0_cause;
|
|
enum emulation_result er = EMULATE_DONE;
|
|
int ret = RESUME_GUEST;
|
|
|
|
if (((badvaddr & PAGE_MASK) == KVM_GUEST_COMMPAGE_ADDR)
|
|
&& KVM_GUEST_KERNEL_MODE(vcpu)) {
|
|
if (kvm_mips_handle_commpage_tlb_fault(badvaddr, vcpu) < 0) {
|
|
run->exit_reason = KVM_EXIT_INTERNAL_ERROR;
|
|
ret = RESUME_HOST;
|
|
}
|
|
} else if (KVM_GUEST_KSEGX(badvaddr) < KVM_GUEST_KSEG0
|
|
|| KVM_GUEST_KSEGX(badvaddr) == KVM_GUEST_KSEG23) {
|
|
kvm_debug("USER ADDR TLB %s fault: cause %#x, PC: %p, BadVaddr: %#lx\n",
|
|
store ? "ST" : "LD", cause, opc, badvaddr);
|
|
|
|
/*
|
|
* User Address (UA) fault, this could happen if
|
|
* (1) TLB entry not present/valid in both Guest and shadow host
|
|
* TLBs, in this case we pass on the fault to the guest
|
|
* kernel and let it handle it.
|
|
* (2) TLB entry is present in the Guest TLB but not in the
|
|
* shadow, in this case we inject the TLB from the Guest TLB
|
|
* into the shadow host TLB
|
|
*/
|
|
|
|
er = kvm_mips_handle_tlbmiss(cause, opc, run, vcpu);
|
|
if (er == EMULATE_DONE)
|
|
ret = RESUME_GUEST;
|
|
else {
|
|
run->exit_reason = KVM_EXIT_INTERNAL_ERROR;
|
|
ret = RESUME_HOST;
|
|
}
|
|
} else if (KVM_GUEST_KSEGX(badvaddr) == KVM_GUEST_KSEG0) {
|
|
/*
|
|
* All KSEG0 faults are handled by KVM, as the guest kernel does
|
|
* not expect to ever get them
|
|
*/
|
|
if (kvm_mips_handle_kseg0_tlb_fault
|
|
(vcpu->arch.host_cp0_badvaddr, vcpu) < 0) {
|
|
run->exit_reason = KVM_EXIT_INTERNAL_ERROR;
|
|
ret = RESUME_HOST;
|
|
}
|
|
} else if (KVM_GUEST_KERNEL_MODE(vcpu)
|
|
&& (KSEGX(badvaddr) == CKSEG0 || KSEGX(badvaddr) == CKSEG1)) {
|
|
/*
|
|
* With EVA we may get a TLB exception instead of an address
|
|
* error when the guest performs MMIO to KSeg1 addresses.
|
|
*/
|
|
kvm_debug("Emulate %s MMIO space\n",
|
|
store ? "Store to" : "Load from");
|
|
er = kvm_mips_emulate_inst(cause, opc, run, vcpu);
|
|
if (er == EMULATE_FAIL) {
|
|
kvm_err("Emulate %s MMIO space failed\n",
|
|
store ? "Store to" : "Load from");
|
|
run->exit_reason = KVM_EXIT_INTERNAL_ERROR;
|
|
ret = RESUME_HOST;
|
|
} else {
|
|
run->exit_reason = KVM_EXIT_MMIO;
|
|
ret = RESUME_HOST;
|
|
}
|
|
} else {
|
|
kvm_err("Illegal TLB %s fault address , cause %#x, PC: %p, BadVaddr: %#lx\n",
|
|
store ? "ST" : "LD", cause, opc, badvaddr);
|
|
kvm_mips_dump_host_tlbs();
|
|
kvm_arch_vcpu_dump_regs(vcpu);
|
|
run->exit_reason = KVM_EXIT_INTERNAL_ERROR;
|
|
ret = RESUME_HOST;
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
static int kvm_trap_emul_handle_tlb_st_miss(struct kvm_vcpu *vcpu)
|
|
{
|
|
return kvm_trap_emul_handle_tlb_miss(vcpu, true);
|
|
}
|
|
|
|
static int kvm_trap_emul_handle_tlb_ld_miss(struct kvm_vcpu *vcpu)
|
|
{
|
|
return kvm_trap_emul_handle_tlb_miss(vcpu, false);
|
|
}
|
|
|
|
static int kvm_trap_emul_handle_addr_err_st(struct kvm_vcpu *vcpu)
|
|
{
|
|
struct kvm_run *run = vcpu->run;
|
|
u32 __user *opc = (u32 __user *) vcpu->arch.pc;
|
|
unsigned long badvaddr = vcpu->arch.host_cp0_badvaddr;
|
|
u32 cause = vcpu->arch.host_cp0_cause;
|
|
enum emulation_result er = EMULATE_DONE;
|
|
int ret = RESUME_GUEST;
|
|
|
|
if (KVM_GUEST_KERNEL_MODE(vcpu)
|
|
&& (KSEGX(badvaddr) == CKSEG0 || KSEGX(badvaddr) == CKSEG1)) {
|
|
kvm_debug("Emulate Store to MMIO space\n");
|
|
er = kvm_mips_emulate_inst(cause, opc, run, vcpu);
|
|
if (er == EMULATE_FAIL) {
|
|
kvm_err("Emulate Store to MMIO space failed\n");
|
|
run->exit_reason = KVM_EXIT_INTERNAL_ERROR;
|
|
ret = RESUME_HOST;
|
|
} else {
|
|
run->exit_reason = KVM_EXIT_MMIO;
|
|
ret = RESUME_HOST;
|
|
}
|
|
} else {
|
|
kvm_err("Address Error (STORE): cause %#x, PC: %p, BadVaddr: %#lx\n",
|
|
cause, opc, badvaddr);
|
|
run->exit_reason = KVM_EXIT_INTERNAL_ERROR;
|
|
ret = RESUME_HOST;
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
static int kvm_trap_emul_handle_addr_err_ld(struct kvm_vcpu *vcpu)
|
|
{
|
|
struct kvm_run *run = vcpu->run;
|
|
u32 __user *opc = (u32 __user *) vcpu->arch.pc;
|
|
unsigned long badvaddr = vcpu->arch.host_cp0_badvaddr;
|
|
u32 cause = vcpu->arch.host_cp0_cause;
|
|
enum emulation_result er = EMULATE_DONE;
|
|
int ret = RESUME_GUEST;
|
|
|
|
if (KSEGX(badvaddr) == CKSEG0 || KSEGX(badvaddr) == CKSEG1) {
|
|
kvm_debug("Emulate Load from MMIO space @ %#lx\n", badvaddr);
|
|
er = kvm_mips_emulate_inst(cause, opc, run, vcpu);
|
|
if (er == EMULATE_FAIL) {
|
|
kvm_err("Emulate Load from MMIO space failed\n");
|
|
run->exit_reason = KVM_EXIT_INTERNAL_ERROR;
|
|
ret = RESUME_HOST;
|
|
} else {
|
|
run->exit_reason = KVM_EXIT_MMIO;
|
|
ret = RESUME_HOST;
|
|
}
|
|
} else {
|
|
kvm_err("Address Error (LOAD): cause %#x, PC: %p, BadVaddr: %#lx\n",
|
|
cause, opc, badvaddr);
|
|
run->exit_reason = KVM_EXIT_INTERNAL_ERROR;
|
|
ret = RESUME_HOST;
|
|
er = EMULATE_FAIL;
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
static int kvm_trap_emul_handle_syscall(struct kvm_vcpu *vcpu)
|
|
{
|
|
struct kvm_run *run = vcpu->run;
|
|
u32 __user *opc = (u32 __user *) vcpu->arch.pc;
|
|
u32 cause = vcpu->arch.host_cp0_cause;
|
|
enum emulation_result er = EMULATE_DONE;
|
|
int ret = RESUME_GUEST;
|
|
|
|
er = kvm_mips_emulate_syscall(cause, opc, run, vcpu);
|
|
if (er == EMULATE_DONE)
|
|
ret = RESUME_GUEST;
|
|
else {
|
|
run->exit_reason = KVM_EXIT_INTERNAL_ERROR;
|
|
ret = RESUME_HOST;
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
static int kvm_trap_emul_handle_res_inst(struct kvm_vcpu *vcpu)
|
|
{
|
|
struct kvm_run *run = vcpu->run;
|
|
u32 __user *opc = (u32 __user *) vcpu->arch.pc;
|
|
u32 cause = vcpu->arch.host_cp0_cause;
|
|
enum emulation_result er = EMULATE_DONE;
|
|
int ret = RESUME_GUEST;
|
|
|
|
er = kvm_mips_handle_ri(cause, opc, run, vcpu);
|
|
if (er == EMULATE_DONE)
|
|
ret = RESUME_GUEST;
|
|
else {
|
|
run->exit_reason = KVM_EXIT_INTERNAL_ERROR;
|
|
ret = RESUME_HOST;
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
static int kvm_trap_emul_handle_break(struct kvm_vcpu *vcpu)
|
|
{
|
|
struct kvm_run *run = vcpu->run;
|
|
u32 __user *opc = (u32 __user *) vcpu->arch.pc;
|
|
u32 cause = vcpu->arch.host_cp0_cause;
|
|
enum emulation_result er = EMULATE_DONE;
|
|
int ret = RESUME_GUEST;
|
|
|
|
er = kvm_mips_emulate_bp_exc(cause, opc, run, vcpu);
|
|
if (er == EMULATE_DONE)
|
|
ret = RESUME_GUEST;
|
|
else {
|
|
run->exit_reason = KVM_EXIT_INTERNAL_ERROR;
|
|
ret = RESUME_HOST;
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
static int kvm_trap_emul_handle_trap(struct kvm_vcpu *vcpu)
|
|
{
|
|
struct kvm_run *run = vcpu->run;
|
|
u32 __user *opc = (u32 __user *)vcpu->arch.pc;
|
|
u32 cause = vcpu->arch.host_cp0_cause;
|
|
enum emulation_result er = EMULATE_DONE;
|
|
int ret = RESUME_GUEST;
|
|
|
|
er = kvm_mips_emulate_trap_exc(cause, opc, run, vcpu);
|
|
if (er == EMULATE_DONE) {
|
|
ret = RESUME_GUEST;
|
|
} else {
|
|
run->exit_reason = KVM_EXIT_INTERNAL_ERROR;
|
|
ret = RESUME_HOST;
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
static int kvm_trap_emul_handle_msa_fpe(struct kvm_vcpu *vcpu)
|
|
{
|
|
struct kvm_run *run = vcpu->run;
|
|
u32 __user *opc = (u32 __user *)vcpu->arch.pc;
|
|
u32 cause = vcpu->arch.host_cp0_cause;
|
|
enum emulation_result er = EMULATE_DONE;
|
|
int ret = RESUME_GUEST;
|
|
|
|
er = kvm_mips_emulate_msafpe_exc(cause, opc, run, vcpu);
|
|
if (er == EMULATE_DONE) {
|
|
ret = RESUME_GUEST;
|
|
} else {
|
|
run->exit_reason = KVM_EXIT_INTERNAL_ERROR;
|
|
ret = RESUME_HOST;
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
static int kvm_trap_emul_handle_fpe(struct kvm_vcpu *vcpu)
|
|
{
|
|
struct kvm_run *run = vcpu->run;
|
|
u32 __user *opc = (u32 __user *)vcpu->arch.pc;
|
|
u32 cause = vcpu->arch.host_cp0_cause;
|
|
enum emulation_result er = EMULATE_DONE;
|
|
int ret = RESUME_GUEST;
|
|
|
|
er = kvm_mips_emulate_fpe_exc(cause, opc, run, vcpu);
|
|
if (er == EMULATE_DONE) {
|
|
ret = RESUME_GUEST;
|
|
} else {
|
|
run->exit_reason = KVM_EXIT_INTERNAL_ERROR;
|
|
ret = RESUME_HOST;
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
/**
|
|
* kvm_trap_emul_handle_msa_disabled() - Guest used MSA while disabled in root.
|
|
* @vcpu: Virtual CPU context.
|
|
*
|
|
* Handle when the guest attempts to use MSA when it is disabled.
|
|
*/
|
|
static int kvm_trap_emul_handle_msa_disabled(struct kvm_vcpu *vcpu)
|
|
{
|
|
struct mips_coproc *cop0 = vcpu->arch.cop0;
|
|
struct kvm_run *run = vcpu->run;
|
|
u32 __user *opc = (u32 __user *) vcpu->arch.pc;
|
|
u32 cause = vcpu->arch.host_cp0_cause;
|
|
enum emulation_result er = EMULATE_DONE;
|
|
int ret = RESUME_GUEST;
|
|
|
|
if (!kvm_mips_guest_has_msa(&vcpu->arch) ||
|
|
(kvm_read_c0_guest_status(cop0) & (ST0_CU1 | ST0_FR)) == ST0_CU1) {
|
|
/*
|
|
* No MSA in guest, or FPU enabled and not in FR=1 mode,
|
|
* guest reserved instruction exception
|
|
*/
|
|
er = kvm_mips_emulate_ri_exc(cause, opc, run, vcpu);
|
|
} else if (!(kvm_read_c0_guest_config5(cop0) & MIPS_CONF5_MSAEN)) {
|
|
/* MSA disabled by guest, guest MSA disabled exception */
|
|
er = kvm_mips_emulate_msadis_exc(cause, opc, run, vcpu);
|
|
} else {
|
|
/* Restore MSA/FPU state */
|
|
kvm_own_msa(vcpu);
|
|
er = EMULATE_DONE;
|
|
}
|
|
|
|
switch (er) {
|
|
case EMULATE_DONE:
|
|
ret = RESUME_GUEST;
|
|
break;
|
|
|
|
case EMULATE_FAIL:
|
|
run->exit_reason = KVM_EXIT_INTERNAL_ERROR;
|
|
ret = RESUME_HOST;
|
|
break;
|
|
|
|
default:
|
|
BUG();
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
static int kvm_trap_emul_vm_init(struct kvm *kvm)
|
|
{
|
|
return 0;
|
|
}
|
|
|
|
static int kvm_trap_emul_vcpu_init(struct kvm_vcpu *vcpu)
|
|
{
|
|
struct mm_struct *kern_mm = &vcpu->arch.guest_kernel_mm;
|
|
struct mm_struct *user_mm = &vcpu->arch.guest_user_mm;
|
|
|
|
vcpu->arch.kscratch_enabled = 0xfc;
|
|
|
|
/*
|
|
* Allocate GVA -> HPA page tables.
|
|
* MIPS doesn't use the mm_struct pointer argument.
|
|
*/
|
|
kern_mm->pgd = pgd_alloc(kern_mm);
|
|
if (!kern_mm->pgd)
|
|
return -ENOMEM;
|
|
|
|
user_mm->pgd = pgd_alloc(user_mm);
|
|
if (!user_mm->pgd) {
|
|
pgd_free(kern_mm, kern_mm->pgd);
|
|
return -ENOMEM;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static void kvm_mips_emul_free_gva_pt(pgd_t *pgd)
|
|
{
|
|
/* Don't free host kernel page tables copied from init_mm.pgd */
|
|
const unsigned long end = 0x80000000;
|
|
unsigned long pgd_va, pud_va, pmd_va;
|
|
pud_t *pud;
|
|
pmd_t *pmd;
|
|
pte_t *pte;
|
|
int i, j, k;
|
|
|
|
for (i = 0; i < USER_PTRS_PER_PGD; i++) {
|
|
if (pgd_none(pgd[i]))
|
|
continue;
|
|
|
|
pgd_va = (unsigned long)i << PGDIR_SHIFT;
|
|
if (pgd_va >= end)
|
|
break;
|
|
pud = pud_offset(pgd + i, 0);
|
|
for (j = 0; j < PTRS_PER_PUD; j++) {
|
|
if (pud_none(pud[j]))
|
|
continue;
|
|
|
|
pud_va = pgd_va | ((unsigned long)j << PUD_SHIFT);
|
|
if (pud_va >= end)
|
|
break;
|
|
pmd = pmd_offset(pud + j, 0);
|
|
for (k = 0; k < PTRS_PER_PMD; k++) {
|
|
if (pmd_none(pmd[k]))
|
|
continue;
|
|
|
|
pmd_va = pud_va | (k << PMD_SHIFT);
|
|
if (pmd_va >= end)
|
|
break;
|
|
pte = pte_offset(pmd + k, 0);
|
|
pte_free_kernel(NULL, pte);
|
|
}
|
|
pmd_free(NULL, pmd);
|
|
}
|
|
pud_free(NULL, pud);
|
|
}
|
|
pgd_free(NULL, pgd);
|
|
}
|
|
|
|
static void kvm_trap_emul_vcpu_uninit(struct kvm_vcpu *vcpu)
|
|
{
|
|
kvm_mips_emul_free_gva_pt(vcpu->arch.guest_kernel_mm.pgd);
|
|
kvm_mips_emul_free_gva_pt(vcpu->arch.guest_user_mm.pgd);
|
|
}
|
|
|
|
static int kvm_trap_emul_vcpu_setup(struct kvm_vcpu *vcpu)
|
|
{
|
|
struct mips_coproc *cop0 = vcpu->arch.cop0;
|
|
u32 config, config1;
|
|
int vcpu_id = vcpu->vcpu_id;
|
|
|
|
/*
|
|
* Arch specific stuff, set up config registers properly so that the
|
|
* guest will come up as expected
|
|
*/
|
|
#ifndef CONFIG_CPU_MIPSR6
|
|
/* r2-r5, simulate a MIPS 24kc */
|
|
kvm_write_c0_guest_prid(cop0, 0x00019300);
|
|
#else
|
|
/* r6+, simulate a generic QEMU machine */
|
|
kvm_write_c0_guest_prid(cop0, 0x00010000);
|
|
#endif
|
|
/*
|
|
* Have config1, Cacheable, noncoherent, write-back, write allocate.
|
|
* Endianness, arch revision & virtually tagged icache should match
|
|
* host.
|
|
*/
|
|
config = read_c0_config() & MIPS_CONF_AR;
|
|
config |= MIPS_CONF_M | CONF_CM_CACHABLE_NONCOHERENT | MIPS_CONF_MT_TLB;
|
|
#ifdef CONFIG_CPU_BIG_ENDIAN
|
|
config |= CONF_BE;
|
|
#endif
|
|
if (cpu_has_vtag_icache)
|
|
config |= MIPS_CONF_VI;
|
|
kvm_write_c0_guest_config(cop0, config);
|
|
|
|
/* Read the cache characteristics from the host Config1 Register */
|
|
config1 = (read_c0_config1() & ~0x7f);
|
|
|
|
/* Set up MMU size */
|
|
config1 &= ~(0x3f << 25);
|
|
config1 |= ((KVM_MIPS_GUEST_TLB_SIZE - 1) << 25);
|
|
|
|
/* We unset some bits that we aren't emulating */
|
|
config1 &= ~(MIPS_CONF1_C2 | MIPS_CONF1_MD | MIPS_CONF1_PC |
|
|
MIPS_CONF1_WR | MIPS_CONF1_CA);
|
|
kvm_write_c0_guest_config1(cop0, config1);
|
|
|
|
/* Have config3, no tertiary/secondary caches implemented */
|
|
kvm_write_c0_guest_config2(cop0, MIPS_CONF_M);
|
|
/* MIPS_CONF_M | (read_c0_config2() & 0xfff) */
|
|
|
|
/* Have config4, UserLocal */
|
|
kvm_write_c0_guest_config3(cop0, MIPS_CONF_M | MIPS_CONF3_ULRI);
|
|
|
|
/* Have config5 */
|
|
kvm_write_c0_guest_config4(cop0, MIPS_CONF_M);
|
|
|
|
/* No config6 */
|
|
kvm_write_c0_guest_config5(cop0, 0);
|
|
|
|
/* Set Wait IE/IXMT Ignore in Config7, IAR, AR */
|
|
kvm_write_c0_guest_config7(cop0, (MIPS_CONF7_WII) | (1 << 10));
|
|
|
|
/*
|
|
* Setup IntCtl defaults, compatibility mode for timer interrupts (HW5)
|
|
*/
|
|
kvm_write_c0_guest_intctl(cop0, 0xFC000000);
|
|
|
|
/* Put in vcpu id as CPUNum into Ebase Reg to handle SMP Guests */
|
|
kvm_write_c0_guest_ebase(cop0, KVM_GUEST_KSEG0 |
|
|
(vcpu_id & MIPS_EBASE_CPUNUM));
|
|
|
|
return 0;
|
|
}
|
|
|
|
static unsigned long kvm_trap_emul_num_regs(struct kvm_vcpu *vcpu)
|
|
{
|
|
return 0;
|
|
}
|
|
|
|
static int kvm_trap_emul_copy_reg_indices(struct kvm_vcpu *vcpu,
|
|
u64 __user *indices)
|
|
{
|
|
return 0;
|
|
}
|
|
|
|
static int kvm_trap_emul_get_one_reg(struct kvm_vcpu *vcpu,
|
|
const struct kvm_one_reg *reg,
|
|
s64 *v)
|
|
{
|
|
switch (reg->id) {
|
|
case KVM_REG_MIPS_CP0_COUNT:
|
|
*v = kvm_mips_read_count(vcpu);
|
|
break;
|
|
case KVM_REG_MIPS_COUNT_CTL:
|
|
*v = vcpu->arch.count_ctl;
|
|
break;
|
|
case KVM_REG_MIPS_COUNT_RESUME:
|
|
*v = ktime_to_ns(vcpu->arch.count_resume);
|
|
break;
|
|
case KVM_REG_MIPS_COUNT_HZ:
|
|
*v = vcpu->arch.count_hz;
|
|
break;
|
|
default:
|
|
return -EINVAL;
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
static int kvm_trap_emul_set_one_reg(struct kvm_vcpu *vcpu,
|
|
const struct kvm_one_reg *reg,
|
|
s64 v)
|
|
{
|
|
struct mips_coproc *cop0 = vcpu->arch.cop0;
|
|
int ret = 0;
|
|
unsigned int cur, change;
|
|
|
|
switch (reg->id) {
|
|
case KVM_REG_MIPS_CP0_COUNT:
|
|
kvm_mips_write_count(vcpu, v);
|
|
break;
|
|
case KVM_REG_MIPS_CP0_COMPARE:
|
|
kvm_mips_write_compare(vcpu, v, false);
|
|
break;
|
|
case KVM_REG_MIPS_CP0_CAUSE:
|
|
/*
|
|
* If the timer is stopped or started (DC bit) it must look
|
|
* atomic with changes to the interrupt pending bits (TI, IRQ5).
|
|
* A timer interrupt should not happen in between.
|
|
*/
|
|
if ((kvm_read_c0_guest_cause(cop0) ^ v) & CAUSEF_DC) {
|
|
if (v & CAUSEF_DC) {
|
|
/* disable timer first */
|
|
kvm_mips_count_disable_cause(vcpu);
|
|
kvm_change_c0_guest_cause(cop0, ~CAUSEF_DC, v);
|
|
} else {
|
|
/* enable timer last */
|
|
kvm_change_c0_guest_cause(cop0, ~CAUSEF_DC, v);
|
|
kvm_mips_count_enable_cause(vcpu);
|
|
}
|
|
} else {
|
|
kvm_write_c0_guest_cause(cop0, v);
|
|
}
|
|
break;
|
|
case KVM_REG_MIPS_CP0_CONFIG:
|
|
/* read-only for now */
|
|
break;
|
|
case KVM_REG_MIPS_CP0_CONFIG1:
|
|
cur = kvm_read_c0_guest_config1(cop0);
|
|
change = (cur ^ v) & kvm_mips_config1_wrmask(vcpu);
|
|
if (change) {
|
|
v = cur ^ change;
|
|
kvm_write_c0_guest_config1(cop0, v);
|
|
}
|
|
break;
|
|
case KVM_REG_MIPS_CP0_CONFIG2:
|
|
/* read-only for now */
|
|
break;
|
|
case KVM_REG_MIPS_CP0_CONFIG3:
|
|
cur = kvm_read_c0_guest_config3(cop0);
|
|
change = (cur ^ v) & kvm_mips_config3_wrmask(vcpu);
|
|
if (change) {
|
|
v = cur ^ change;
|
|
kvm_write_c0_guest_config3(cop0, v);
|
|
}
|
|
break;
|
|
case KVM_REG_MIPS_CP0_CONFIG4:
|
|
cur = kvm_read_c0_guest_config4(cop0);
|
|
change = (cur ^ v) & kvm_mips_config4_wrmask(vcpu);
|
|
if (change) {
|
|
v = cur ^ change;
|
|
kvm_write_c0_guest_config4(cop0, v);
|
|
}
|
|
break;
|
|
case KVM_REG_MIPS_CP0_CONFIG5:
|
|
cur = kvm_read_c0_guest_config5(cop0);
|
|
change = (cur ^ v) & kvm_mips_config5_wrmask(vcpu);
|
|
if (change) {
|
|
v = cur ^ change;
|
|
kvm_write_c0_guest_config5(cop0, v);
|
|
}
|
|
break;
|
|
case KVM_REG_MIPS_COUNT_CTL:
|
|
ret = kvm_mips_set_count_ctl(vcpu, v);
|
|
break;
|
|
case KVM_REG_MIPS_COUNT_RESUME:
|
|
ret = kvm_mips_set_count_resume(vcpu, v);
|
|
break;
|
|
case KVM_REG_MIPS_COUNT_HZ:
|
|
ret = kvm_mips_set_count_hz(vcpu, v);
|
|
break;
|
|
default:
|
|
return -EINVAL;
|
|
}
|
|
return ret;
|
|
}
|
|
|
|
static int kvm_trap_emul_vcpu_load(struct kvm_vcpu *vcpu, int cpu)
|
|
{
|
|
struct mm_struct *kern_mm = &vcpu->arch.guest_kernel_mm;
|
|
struct mm_struct *user_mm = &vcpu->arch.guest_user_mm;
|
|
|
|
/* Allocate new kernel and user ASIDs if needed */
|
|
|
|
if ((cpu_context(cpu, kern_mm) ^ asid_cache(cpu)) &
|
|
asid_version_mask(cpu)) {
|
|
kvm_get_new_mmu_context(kern_mm, cpu, vcpu);
|
|
|
|
kvm_debug("[%d]: cpu_context: %#lx\n", cpu,
|
|
cpu_context(cpu, current->mm));
|
|
kvm_debug("[%d]: Allocated new ASID for Guest Kernel: %#lx\n",
|
|
cpu, cpu_context(cpu, kern_mm));
|
|
}
|
|
|
|
if ((cpu_context(cpu, user_mm) ^ asid_cache(cpu)) &
|
|
asid_version_mask(cpu)) {
|
|
kvm_get_new_mmu_context(user_mm, cpu, vcpu);
|
|
|
|
kvm_debug("[%d]: cpu_context: %#lx\n", cpu,
|
|
cpu_context(cpu, current->mm));
|
|
kvm_debug("[%d]: Allocated new ASID for Guest User: %#lx\n",
|
|
cpu, cpu_context(cpu, user_mm));
|
|
}
|
|
|
|
/*
|
|
* Were we in guest context? If so then the pre-empted ASID is
|
|
* no longer valid, we need to set it to what it should be based
|
|
* on the mode of the Guest (Kernel/User)
|
|
*/
|
|
if (current->flags & PF_VCPU) {
|
|
if (KVM_GUEST_KERNEL_MODE(vcpu))
|
|
write_c0_entryhi(cpu_asid(cpu, kern_mm));
|
|
else
|
|
write_c0_entryhi(cpu_asid(cpu, user_mm));
|
|
kvm_mips_suspend_mm(cpu);
|
|
ehb();
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int kvm_trap_emul_vcpu_put(struct kvm_vcpu *vcpu, int cpu)
|
|
{
|
|
kvm_lose_fpu(vcpu);
|
|
|
|
if (current->flags & PF_VCPU) {
|
|
/* Restore normal Linux process memory map */
|
|
if (((cpu_context(cpu, current->mm) ^ asid_cache(cpu)) &
|
|
asid_version_mask(cpu))) {
|
|
kvm_debug("%s: Dropping MMU Context: %#lx\n", __func__,
|
|
cpu_context(cpu, current->mm));
|
|
get_new_mmu_context(current->mm, cpu);
|
|
}
|
|
write_c0_entryhi(cpu_asid(cpu, current->mm));
|
|
kvm_mips_resume_mm(cpu);
|
|
ehb();
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static void kvm_trap_emul_vcpu_reenter(struct kvm_run *run,
|
|
struct kvm_vcpu *vcpu)
|
|
{
|
|
struct mm_struct *user_mm = &vcpu->arch.guest_user_mm;
|
|
struct mips_coproc *cop0 = vcpu->arch.cop0;
|
|
int i, cpu = smp_processor_id();
|
|
unsigned int gasid;
|
|
|
|
/*
|
|
* Lazy host ASID regeneration for guest user mode.
|
|
* If the guest ASID has changed since the last guest usermode
|
|
* execution, regenerate the host ASID so as to invalidate stale TLB
|
|
* entries.
|
|
*/
|
|
if (!KVM_GUEST_KERNEL_MODE(vcpu)) {
|
|
gasid = kvm_read_c0_guest_entryhi(cop0) & KVM_ENTRYHI_ASID;
|
|
if (gasid != vcpu->arch.last_user_gasid) {
|
|
kvm_get_new_mmu_context(user_mm, cpu, vcpu);
|
|
for_each_possible_cpu(i)
|
|
if (i != cpu)
|
|
cpu_context(i, user_mm) = 0;
|
|
vcpu->arch.last_user_gasid = gasid;
|
|
}
|
|
}
|
|
}
|
|
|
|
static int kvm_trap_emul_vcpu_run(struct kvm_run *run, struct kvm_vcpu *vcpu)
|
|
{
|
|
int cpu = smp_processor_id();
|
|
int r;
|
|
|
|
/* Check if we have any exceptions/interrupts pending */
|
|
kvm_mips_deliver_interrupts(vcpu,
|
|
kvm_read_c0_guest_cause(vcpu->arch.cop0));
|
|
|
|
kvm_trap_emul_vcpu_reenter(run, vcpu);
|
|
|
|
/* Disable hardware page table walking while in guest */
|
|
htw_stop();
|
|
|
|
/*
|
|
* While in guest context we're in the guest's address space, not the
|
|
* host process address space, so we need to be careful not to confuse
|
|
* e.g. cache management IPIs.
|
|
*/
|
|
kvm_mips_suspend_mm(cpu);
|
|
|
|
r = vcpu->arch.vcpu_run(run, vcpu);
|
|
|
|
/* We may have migrated while handling guest exits */
|
|
cpu = smp_processor_id();
|
|
|
|
/* Restore normal Linux process memory map */
|
|
if (((cpu_context(cpu, current->mm) ^ asid_cache(cpu)) &
|
|
asid_version_mask(cpu)))
|
|
get_new_mmu_context(current->mm, cpu);
|
|
write_c0_entryhi(cpu_asid(cpu, current->mm));
|
|
kvm_mips_resume_mm(cpu);
|
|
|
|
htw_start();
|
|
|
|
return r;
|
|
}
|
|
|
|
static struct kvm_mips_callbacks kvm_trap_emul_callbacks = {
|
|
/* exit handlers */
|
|
.handle_cop_unusable = kvm_trap_emul_handle_cop_unusable,
|
|
.handle_tlb_mod = kvm_trap_emul_handle_tlb_mod,
|
|
.handle_tlb_st_miss = kvm_trap_emul_handle_tlb_st_miss,
|
|
.handle_tlb_ld_miss = kvm_trap_emul_handle_tlb_ld_miss,
|
|
.handle_addr_err_st = kvm_trap_emul_handle_addr_err_st,
|
|
.handle_addr_err_ld = kvm_trap_emul_handle_addr_err_ld,
|
|
.handle_syscall = kvm_trap_emul_handle_syscall,
|
|
.handle_res_inst = kvm_trap_emul_handle_res_inst,
|
|
.handle_break = kvm_trap_emul_handle_break,
|
|
.handle_trap = kvm_trap_emul_handle_trap,
|
|
.handle_msa_fpe = kvm_trap_emul_handle_msa_fpe,
|
|
.handle_fpe = kvm_trap_emul_handle_fpe,
|
|
.handle_msa_disabled = kvm_trap_emul_handle_msa_disabled,
|
|
|
|
.vm_init = kvm_trap_emul_vm_init,
|
|
.vcpu_init = kvm_trap_emul_vcpu_init,
|
|
.vcpu_uninit = kvm_trap_emul_vcpu_uninit,
|
|
.vcpu_setup = kvm_trap_emul_vcpu_setup,
|
|
.gva_to_gpa = kvm_trap_emul_gva_to_gpa_cb,
|
|
.queue_timer_int = kvm_mips_queue_timer_int_cb,
|
|
.dequeue_timer_int = kvm_mips_dequeue_timer_int_cb,
|
|
.queue_io_int = kvm_mips_queue_io_int_cb,
|
|
.dequeue_io_int = kvm_mips_dequeue_io_int_cb,
|
|
.irq_deliver = kvm_mips_irq_deliver_cb,
|
|
.irq_clear = kvm_mips_irq_clear_cb,
|
|
.num_regs = kvm_trap_emul_num_regs,
|
|
.copy_reg_indices = kvm_trap_emul_copy_reg_indices,
|
|
.get_one_reg = kvm_trap_emul_get_one_reg,
|
|
.set_one_reg = kvm_trap_emul_set_one_reg,
|
|
.vcpu_load = kvm_trap_emul_vcpu_load,
|
|
.vcpu_put = kvm_trap_emul_vcpu_put,
|
|
.vcpu_run = kvm_trap_emul_vcpu_run,
|
|
.vcpu_reenter = kvm_trap_emul_vcpu_reenter,
|
|
};
|
|
|
|
int kvm_mips_emulation_init(struct kvm_mips_callbacks **install_callbacks)
|
|
{
|
|
*install_callbacks = &kvm_trap_emul_callbacks;
|
|
return 0;
|
|
}
|