2 * process.c: handle interruption inject for guests.
3 * Copyright (c) 2005, Intel Corporation.
5 * This program is free software; you can redistribute it and/or modify it
6 * under the terms and conditions of the GNU General Public License,
7 * version 2, as published by the Free Software Foundation.
9 * This program is distributed in the hope it will be useful, but WITHOUT
10 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
11 * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
14 * You should have received a copy of the GNU General Public License along with
15 * this program; if not, write to the Free Software Foundation, Inc., 59 Temple
16 * Place - Suite 330, Boston, MA 02111-1307 USA.
18 * Shaofan Li (Susue Li) <susie.li@intel.com>
19 * Xiaoyan Feng (Fleming Feng) <fleming.feng@intel.com>
20 * Xuefei Xu (Anthony Xu) (Anthony.xu@intel.com)
21 * Xiantao Zhang (xiantao.zhang@intel.com)
27 #include <asm/fpswa.h>
28 #include <asm/kregs.h>
31 fpswa_interface_t
*vmm_fpswa_interface
;
33 #define IA64_VHPT_TRANS_VECTOR 0x0000
34 #define IA64_INST_TLB_VECTOR 0x0400
35 #define IA64_DATA_TLB_VECTOR 0x0800
36 #define IA64_ALT_INST_TLB_VECTOR 0x0c00
37 #define IA64_ALT_DATA_TLB_VECTOR 0x1000
38 #define IA64_DATA_NESTED_TLB_VECTOR 0x1400
39 #define IA64_INST_KEY_MISS_VECTOR 0x1800
40 #define IA64_DATA_KEY_MISS_VECTOR 0x1c00
41 #define IA64_DIRTY_BIT_VECTOR 0x2000
42 #define IA64_INST_ACCESS_BIT_VECTOR 0x2400
43 #define IA64_DATA_ACCESS_BIT_VECTOR 0x2800
44 #define IA64_BREAK_VECTOR 0x2c00
45 #define IA64_EXTINT_VECTOR 0x3000
46 #define IA64_PAGE_NOT_PRESENT_VECTOR 0x5000
47 #define IA64_KEY_PERMISSION_VECTOR 0x5100
48 #define IA64_INST_ACCESS_RIGHTS_VECTOR 0x5200
49 #define IA64_DATA_ACCESS_RIGHTS_VECTOR 0x5300
50 #define IA64_GENEX_VECTOR 0x5400
51 #define IA64_DISABLED_FPREG_VECTOR 0x5500
52 #define IA64_NAT_CONSUMPTION_VECTOR 0x5600
53 #define IA64_SPECULATION_VECTOR 0x5700 /* UNUSED */
54 #define IA64_DEBUG_VECTOR 0x5900
55 #define IA64_UNALIGNED_REF_VECTOR 0x5a00
56 #define IA64_UNSUPPORTED_DATA_REF_VECTOR 0x5b00
57 #define IA64_FP_FAULT_VECTOR 0x5c00
58 #define IA64_FP_TRAP_VECTOR 0x5d00
59 #define IA64_LOWERPRIV_TRANSFER_TRAP_VECTOR 0x5e00
60 #define IA64_TAKEN_BRANCH_TRAP_VECTOR 0x5f00
61 #define IA64_SINGLE_STEP_TRAP_VECTOR 0x6000
63 /* SDM vol2 5.5 - IVA based interruption handling */
64 #define INITIAL_PSR_VALUE_AT_INTERRUPTION (IA64_PSR_UP | IA64_PSR_MFL |\
65 IA64_PSR_MFH | IA64_PSR_PK | IA64_PSR_DT | \
66 IA64_PSR_RT | IA64_PSR_MC|IA64_PSR_IT)
68 #define DOMN_PAL_REQUEST 0x110000
69 #define DOMN_SAL_REQUEST 0x110001
71 static u64 vec2off
[68] = {0x0, 0x400, 0x800, 0xc00, 0x1000, 0x1400, 0x1800,
72 0x1c00, 0x2000, 0x2400, 0x2800, 0x2c00, 0x3000, 0x3400, 0x3800, 0x3c00,
73 0x4000, 0x4400, 0x4800, 0x4c00, 0x5000, 0x5100, 0x5200, 0x5300, 0x5400,
74 0x5500, 0x5600, 0x5700, 0x5800, 0x5900, 0x5a00, 0x5b00, 0x5c00, 0x5d00,
75 0x5e00, 0x5f00, 0x6000, 0x6100, 0x6200, 0x6300, 0x6400, 0x6500, 0x6600,
76 0x6700, 0x6800, 0x6900, 0x6a00, 0x6b00, 0x6c00, 0x6d00, 0x6e00, 0x6f00,
77 0x7000, 0x7100, 0x7200, 0x7300, 0x7400, 0x7500, 0x7600, 0x7700, 0x7800,
78 0x7900, 0x7a00, 0x7b00, 0x7c00, 0x7d00, 0x7e00, 0x7f00
81 static void collect_interruption(struct kvm_vcpu
*vcpu
)
87 struct kvm_pt_regs
*regs
= vcpu_regs(vcpu
);
89 vpsr
= vcpu_get_psr(vcpu
);
91 if (vpsr
& IA64_PSR_IC
) {
93 /* Sync mpsr id/da/dd/ss/ed bits to vipsr
94 * since after guest do rfi, we still want these bits on in
99 vpsr
= vpsr
| (ipsr
& (IA64_PSR_ID
| IA64_PSR_DA
100 | IA64_PSR_DD
| IA64_PSR_SS
102 vcpu_set_ipsr(vcpu
, vpsr
);
104 /* Currently, for trap, we do not advance IIP to next
105 * instruction. That's because we assume caller already
106 * set up IIP correctly
109 vcpu_set_iip(vcpu
, regs
->cr_iip
);
111 /* set vifs.v to zero */
112 vifs
= VCPU(vcpu
, ifs
);
114 vcpu_set_ifs(vcpu
, vifs
);
116 vcpu_set_iipa(vcpu
, VMX(vcpu
, cr_iipa
));
119 vdcr
= VCPU(vcpu
, dcr
);
122 * up/mfl/mfh/pk/dt/rt/mc/it keeps unchanged
123 * be: set to the value of dcr.be
124 * pp: set to the value of dcr.pp
126 vpsr
&= INITIAL_PSR_VALUE_AT_INTERRUPTION
;
127 vpsr
|= (vdcr
& IA64_DCR_BE
);
129 /* VDCR pp bit position is different from VPSR pp bit */
130 if (vdcr
& IA64_DCR_PP
) {
133 vpsr
&= ~IA64_PSR_PP
;
136 vcpu_set_psr(vcpu
, vpsr
);
140 void inject_guest_interruption(struct kvm_vcpu
*vcpu
, u64 vec
)
143 struct kvm_pt_regs
*regs
;
144 union ia64_isr pt_isr
;
146 regs
= vcpu_regs(vcpu
);
148 /* clear cr.isr.ir (incomplete register frame)*/
149 pt_isr
.val
= VMX(vcpu
, cr_isr
);
151 VMX(vcpu
, cr_isr
) = pt_isr
.val
;
153 collect_interruption(vcpu
);
155 viva
= vcpu_get_iva(vcpu
);
156 regs
->cr_iip
= viva
+ vec
;
159 static u64
vcpu_get_itir_on_fault(struct kvm_vcpu
*vcpu
, u64 ifa
)
161 union ia64_rr rr
, rr1
;
163 rr
.val
= vcpu_get_rr(vcpu
, ifa
);
171 * Set vIFA & vITIR & vIHA, when vPSR.ic =1
173 * set_ifa: if true, set vIFA
174 * set_itir: if true, set vITIR
175 * set_iha: if true, set vIHA
177 void set_ifa_itir_iha(struct kvm_vcpu
*vcpu
, u64 vadr
,
178 int set_ifa
, int set_itir
, int set_iha
)
183 vpsr
= VCPU(vcpu
, vpsr
);
184 /* Vol2, Table 8-1 */
185 if (vpsr
& IA64_PSR_IC
) {
187 vcpu_set_ifa(vcpu
, vadr
);
189 value
= vcpu_get_itir_on_fault(vcpu
, vadr
);
190 vcpu_set_itir(vcpu
, value
);
194 value
= vcpu_thash(vcpu
, vadr
);
195 vcpu_set_iha(vcpu
, value
);
203 * Refer to SDM Vol2 Table 5-6 & 8-1
205 void dtlb_fault(struct kvm_vcpu
*vcpu
, u64 vadr
)
207 /* If vPSR.ic, IFA, ITIR, IHA */
208 set_ifa_itir_iha(vcpu
, vadr
, 1, 1, 1);
209 inject_guest_interruption(vcpu
, IA64_DATA_TLB_VECTOR
);
213 * Instruction TLB Fault
214 * @ Instruction TLB vector
215 * Refer to SDM Vol2 Table 5-6 & 8-1
217 void itlb_fault(struct kvm_vcpu
*vcpu
, u64 vadr
)
219 /* If vPSR.ic, IFA, ITIR, IHA */
220 set_ifa_itir_iha(vcpu
, vadr
, 1, 1, 1);
221 inject_guest_interruption(vcpu
, IA64_INST_TLB_VECTOR
);
225 * Data Nested TLB Fault
226 * @ Data Nested TLB Vector
227 * Refer to SDM Vol2 Table 5-6 & 8-1
229 void nested_dtlb(struct kvm_vcpu
*vcpu
)
231 inject_guest_interruption(vcpu
, IA64_DATA_NESTED_TLB_VECTOR
);
235 * Alternate Data TLB Fault
236 * @ Alternate Data TLB vector
237 * Refer to SDM Vol2 Table 5-6 & 8-1
239 void alt_dtlb(struct kvm_vcpu
*vcpu
, u64 vadr
)
241 set_ifa_itir_iha(vcpu
, vadr
, 1, 1, 0);
242 inject_guest_interruption(vcpu
, IA64_ALT_DATA_TLB_VECTOR
);
248 * Refer to SDM Vol2 Table 5-6 & 8-1
250 void alt_itlb(struct kvm_vcpu
*vcpu
, u64 vadr
)
252 set_ifa_itir_iha(vcpu
, vadr
, 1, 1, 0);
253 inject_guest_interruption(vcpu
, IA64_ALT_INST_TLB_VECTOR
);
257 * VHPT Translation Vector
259 static void _vhpt_fault(struct kvm_vcpu
*vcpu
, u64 vadr
)
261 /* If vPSR.ic, IFA, ITIR, IHA*/
262 set_ifa_itir_iha(vcpu
, vadr
, 1, 1, 1);
263 inject_guest_interruption(vcpu
, IA64_VHPT_TRANS_VECTOR
);
267 * VHPT Instruction Fault
268 * @ VHPT Translation vector
269 * Refer to SDM Vol2 Table 5-6 & 8-1
271 void ivhpt_fault(struct kvm_vcpu
*vcpu
, u64 vadr
)
273 _vhpt_fault(vcpu
, vadr
);
278 * @ VHPT Translation vector
279 * Refer to SDM Vol2 Table 5-6 & 8-1
281 void dvhpt_fault(struct kvm_vcpu
*vcpu
, u64 vadr
)
283 _vhpt_fault(vcpu
, vadr
);
288 * General Exception vector
290 void _general_exception(struct kvm_vcpu
*vcpu
)
292 inject_guest_interruption(vcpu
, IA64_GENEX_VECTOR
);
296 * Illegal Operation Fault
297 * @ General Exception Vector
298 * Refer to SDM Vol2 Table 5-6 & 8-1
300 void illegal_op(struct kvm_vcpu
*vcpu
)
302 _general_exception(vcpu
);
306 * Illegal Dependency Fault
307 * @ General Exception Vector
308 * Refer to SDM Vol2 Table 5-6 & 8-1
310 void illegal_dep(struct kvm_vcpu
*vcpu
)
312 _general_exception(vcpu
);
316 * Reserved Register/Field Fault
317 * @ General Exception Vector
318 * Refer to SDM Vol2 Table 5-6 & 8-1
320 void rsv_reg_field(struct kvm_vcpu
*vcpu
)
322 _general_exception(vcpu
);
325 * Privileged Operation Fault
326 * @ General Exception Vector
327 * Refer to SDM Vol2 Table 5-6 & 8-1
330 void privilege_op(struct kvm_vcpu
*vcpu
)
332 _general_exception(vcpu
);
336 * Unimplement Data Address Fault
337 * @ General Exception Vector
338 * Refer to SDM Vol2 Table 5-6 & 8-1
340 void unimpl_daddr(struct kvm_vcpu
*vcpu
)
342 _general_exception(vcpu
);
346 * Privileged Register Fault
347 * @ General Exception Vector
348 * Refer to SDM Vol2 Table 5-6 & 8-1
350 void privilege_reg(struct kvm_vcpu
*vcpu
)
352 _general_exception(vcpu
);
356 * Nat consumption vector
358 * vaddr: Optional, if t == REGISTER
360 static void _nat_consumption_fault(struct kvm_vcpu
*vcpu
, u64 vadr
,
361 enum tlb_miss_type t
)
363 /* If vPSR.ic && t == DATA/INST, IFA */
364 if (t
== DATA
|| t
== INSTRUCTION
) {
366 set_ifa_itir_iha(vcpu
, vadr
, 1, 0, 0);
369 inject_guest_interruption(vcpu
, IA64_NAT_CONSUMPTION_VECTOR
);
373 * Instruction Nat Page Consumption Fault
374 * @ Nat Consumption Vector
375 * Refer to SDM Vol2 Table 5-6 & 8-1
377 void inat_page_consumption(struct kvm_vcpu
*vcpu
, u64 vadr
)
379 _nat_consumption_fault(vcpu
, vadr
, INSTRUCTION
);
383 * Register Nat Consumption Fault
384 * @ Nat Consumption Vector
385 * Refer to SDM Vol2 Table 5-6 & 8-1
387 void rnat_consumption(struct kvm_vcpu
*vcpu
)
389 _nat_consumption_fault(vcpu
, 0, REGISTER
);
393 * Data Nat Page Consumption Fault
394 * @ Nat Consumption Vector
395 * Refer to SDM Vol2 Table 5-6 & 8-1
397 void dnat_page_consumption(struct kvm_vcpu
*vcpu
, u64 vadr
)
399 _nat_consumption_fault(vcpu
, vadr
, DATA
);
403 * Page not present vector
405 static void __page_not_present(struct kvm_vcpu
*vcpu
, u64 vadr
)
407 /* If vPSR.ic, IFA, ITIR */
408 set_ifa_itir_iha(vcpu
, vadr
, 1, 1, 0);
409 inject_guest_interruption(vcpu
, IA64_PAGE_NOT_PRESENT_VECTOR
);
412 void data_page_not_present(struct kvm_vcpu
*vcpu
, u64 vadr
)
414 __page_not_present(vcpu
, vadr
);
417 void inst_page_not_present(struct kvm_vcpu
*vcpu
, u64 vadr
)
419 __page_not_present(vcpu
, vadr
);
423 * Data access rights vector
425 void data_access_rights(struct kvm_vcpu
*vcpu
, u64 vadr
)
427 /* If vPSR.ic, IFA, ITIR */
428 set_ifa_itir_iha(vcpu
, vadr
, 1, 1, 0);
429 inject_guest_interruption(vcpu
, IA64_DATA_ACCESS_RIGHTS_VECTOR
);
432 fpswa_ret_t
vmm_fp_emulate(int fp_fault
, void *bundle
, unsigned long *ipsr
,
433 unsigned long *fpsr
, unsigned long *isr
, unsigned long *pr
,
434 unsigned long *ifs
, struct kvm_pt_regs
*regs
)
438 struct kvm_vcpu
*vcpu
= current_vcpu
;
440 uint64_t old_rr7
= ia64_get_rr(7UL<<61);
442 if (!vmm_fpswa_interface
)
443 return (fpswa_ret_t
) {-1, 0, 0, 0};
445 memset(&fp_state
, 0, sizeof(fp_state_t
));
448 * compute fp_state. only FP registers f6 - f11 are used by the
449 * vmm, so set those bits in the mask and set the low volatile
450 * pointer to point to these registers.
452 fp_state
.bitmask_low64
= 0xfc0; /* bit6..bit11 */
454 fp_state
.fp_state_low_volatile
= (fp_state_low_volatile_t
*) ®s
->f6
;
457 * unsigned long (*EFI_FPSWA) (
458 * unsigned long trap_type,
460 * unsigned long *pipsr,
461 * unsigned long *pfsr,
462 * unsigned long *pisr,
463 * unsigned long *ppreds,
464 * unsigned long *pifs,
467 /*Call host fpswa interface directly to virtualize
468 *guest fpswa request!
470 ia64_set_rr(7UL << 61, vcpu
->arch
.host
.rr
[7]);
473 ret
= (*vmm_fpswa_interface
->fpswa
) (fp_fault
, bundle
,
474 ipsr
, fpsr
, isr
, pr
, ifs
, &fp_state
);
475 ia64_set_rr(7UL << 61, old_rr7
);
481 * Handle floating-point assist faults and traps for domain.
483 unsigned long vmm_handle_fpu_swa(int fp_fault
, struct kvm_pt_regs
*regs
,
486 struct kvm_vcpu
*v
= current_vcpu
;
488 unsigned long fault_ip
;
491 fault_ip
= regs
->cr_iip
;
493 * When the FP trap occurs, the trapping instruction is completed.
494 * If ipsr.ri == 0, there is the trapping instruction in previous
497 if (!fp_fault
&& (ia64_psr(regs
)->ri
== 0))
500 if (fetch_code(v
, fault_ip
, &bundle
))
503 if (!bundle
.i64
[0] && !bundle
.i64
[1])
506 ret
= vmm_fp_emulate(fp_fault
, &bundle
, ®s
->cr_ipsr
, ®s
->ar_fpsr
,
507 &isr
, ®s
->pr
, ®s
->cr_ifs
, regs
);
511 void reflect_interruption(u64 ifa
, u64 isr
, u64 iim
,
512 u64 vec
, struct kvm_pt_regs
*regs
)
516 struct kvm_vcpu
*vcpu
= current_vcpu
;
517 u64 vpsr
= VCPU(vcpu
, vpsr
);
519 vector
= vec2off
[vec
];
521 if (!(vpsr
& IA64_PSR_IC
) && (vector
!= IA64_DATA_NESTED_TLB_VECTOR
)) {
522 panic_vm(vcpu
, "Interruption with vector :0x%lx occurs "
523 "with psr.ic = 0\n", vector
);
528 case 32: /*IA64_FP_FAULT_VECTOR*/
529 status
= vmm_handle_fpu_swa(1, regs
, isr
);
531 vcpu_increment_iip(vcpu
);
533 } else if (-EAGAIN
== status
)
536 case 33: /*IA64_FP_TRAP_VECTOR*/
537 status
= vmm_handle_fpu_swa(0, regs
, isr
);
543 VCPU(vcpu
, isr
) = isr
;
544 VCPU(vcpu
, iipa
) = regs
->cr_iip
;
545 if (vector
== IA64_BREAK_VECTOR
|| vector
== IA64_SPECULATION_VECTOR
)
546 VCPU(vcpu
, iim
) = iim
;
548 set_ifa_itir_iha(vcpu
, ifa
, 1, 1, 1);
550 inject_guest_interruption(vcpu
, vector
);
553 static unsigned long kvm_trans_pal_call_args(struct kvm_vcpu
*vcpu
,
556 struct thash_data
*data
;
557 unsigned long gpa
, poff
;
559 if (!is_physical_mode(vcpu
)) {
560 /* Depends on caller to provide the DTR or DTC mapping.*/
561 data
= vtlb_lookup(vcpu
, arg
, D_TLB
);
563 gpa
= data
->page_flags
& _PAGE_PPN_MASK
;
565 data
= vhpt_lookup(arg
);
568 gpa
= data
->gpaddr
& _PAGE_PPN_MASK
;
571 poff
= arg
& (PSIZE(data
->ps
) - 1);
572 arg
= PAGEALIGN(gpa
, data
->ps
) | poff
;
574 arg
= kvm_gpa_to_mpa(arg
<< 1 >> 1);
576 return (unsigned long)__va(arg
);
579 static void set_pal_call_data(struct kvm_vcpu
*vcpu
)
581 struct exit_ctl_data
*p
= &vcpu
->arch
.exit_data
;
582 unsigned long gr28
= vcpu_get_gr(vcpu
, 28);
583 unsigned long gr29
= vcpu_get_gr(vcpu
, 29);
584 unsigned long gr30
= vcpu_get_gr(vcpu
, 30);
586 /*FIXME:For static and stacked convention, firmware
587 * has put the parameters in gr28-gr31 before
591 case PAL_PERF_MON_INFO
:
593 p
->u
.pal_data
.gr29
= kvm_trans_pal_call_args(vcpu
, gr29
);
594 p
->u
.pal_data
.gr30
= vcpu_get_gr(vcpu
, 30);
597 p
->u
.pal_data
.gr29
= gr29
;
598 p
->u
.pal_data
.gr30
= kvm_trans_pal_call_args(vcpu
, gr30
);
601 p
->u
.pal_data
.gr29
= gr29
;
602 p
->u
.pal_data
.gr30
= vcpu_get_gr(vcpu
, 30);
604 p
->u
.pal_data
.gr28
= gr28
;
605 p
->u
.pal_data
.gr31
= vcpu_get_gr(vcpu
, 31);
607 p
->exit_reason
= EXIT_REASON_PAL_CALL
;
610 static void get_pal_call_result(struct kvm_vcpu
*vcpu
)
612 struct exit_ctl_data
*p
= &vcpu
->arch
.exit_data
;
614 if (p
->exit_reason
== EXIT_REASON_PAL_CALL
) {
615 vcpu_set_gr(vcpu
, 8, p
->u
.pal_data
.ret
.status
, 0);
616 vcpu_set_gr(vcpu
, 9, p
->u
.pal_data
.ret
.v0
, 0);
617 vcpu_set_gr(vcpu
, 10, p
->u
.pal_data
.ret
.v1
, 0);
618 vcpu_set_gr(vcpu
, 11, p
->u
.pal_data
.ret
.v2
, 0);
620 panic_vm(vcpu
, "Mis-set for exit reason!\n");
623 static void set_sal_call_data(struct kvm_vcpu
*vcpu
)
625 struct exit_ctl_data
*p
= &vcpu
->arch
.exit_data
;
627 p
->u
.sal_data
.in0
= vcpu_get_gr(vcpu
, 32);
628 p
->u
.sal_data
.in1
= vcpu_get_gr(vcpu
, 33);
629 p
->u
.sal_data
.in2
= vcpu_get_gr(vcpu
, 34);
630 p
->u
.sal_data
.in3
= vcpu_get_gr(vcpu
, 35);
631 p
->u
.sal_data
.in4
= vcpu_get_gr(vcpu
, 36);
632 p
->u
.sal_data
.in5
= vcpu_get_gr(vcpu
, 37);
633 p
->u
.sal_data
.in6
= vcpu_get_gr(vcpu
, 38);
634 p
->u
.sal_data
.in7
= vcpu_get_gr(vcpu
, 39);
635 p
->exit_reason
= EXIT_REASON_SAL_CALL
;
638 static void get_sal_call_result(struct kvm_vcpu
*vcpu
)
640 struct exit_ctl_data
*p
= &vcpu
->arch
.exit_data
;
642 if (p
->exit_reason
== EXIT_REASON_SAL_CALL
) {
643 vcpu_set_gr(vcpu
, 8, p
->u
.sal_data
.ret
.r8
, 0);
644 vcpu_set_gr(vcpu
, 9, p
->u
.sal_data
.ret
.r9
, 0);
645 vcpu_set_gr(vcpu
, 10, p
->u
.sal_data
.ret
.r10
, 0);
646 vcpu_set_gr(vcpu
, 11, p
->u
.sal_data
.ret
.r11
, 0);
648 panic_vm(vcpu
, "Mis-set for exit reason!\n");
651 void kvm_ia64_handle_break(unsigned long ifa
, struct kvm_pt_regs
*regs
,
652 unsigned long isr
, unsigned long iim
)
654 struct kvm_vcpu
*v
= current_vcpu
;
657 if (ia64_psr(regs
)->cpl
== 0) {
658 /* Allow hypercalls only when cpl = 0. */
659 if (iim
== DOMN_PAL_REQUEST
) {
661 set_pal_call_data(v
);
663 get_pal_call_result(v
);
664 vcpu_increment_iip(v
);
665 local_irq_restore(psr
);
667 } else if (iim
== DOMN_SAL_REQUEST
) {
669 set_sal_call_data(v
);
671 get_sal_call_result(v
);
672 vcpu_increment_iip(v
);
673 local_irq_restore(psr
);
677 reflect_interruption(ifa
, isr
, iim
, 11, regs
);
680 void check_pending_irq(struct kvm_vcpu
*vcpu
)
682 int mask
, h_pending
, h_inservice
;
685 struct kvm_pt_regs
*regs
= vcpu_regs(vcpu
);
687 h_pending
= highest_pending_irq(vcpu
);
688 if (h_pending
== NULL_VECTOR
) {
689 update_vhpi(vcpu
, NULL_VECTOR
);
692 h_inservice
= highest_inservice_irq(vcpu
);
694 vpsr
= VCPU(vcpu
, vpsr
);
695 mask
= irq_masked(vcpu
, h_pending
, h_inservice
);
696 if ((vpsr
& IA64_PSR_I
) && IRQ_NO_MASKED
== mask
) {
697 isr
= vpsr
& IA64_PSR_RI
;
698 update_vhpi(vcpu
, h_pending
);
699 reflect_interruption(0, isr
, 0, 12, regs
); /* EXT IRQ */
700 } else if (mask
== IRQ_MASKED_BY_INSVC
) {
701 if (VCPU(vcpu
, vhpi
))
702 update_vhpi(vcpu
, NULL_VECTOR
);
704 /* masked by vpsr.i or vtpr.*/
705 update_vhpi(vcpu
, h_pending
);
709 static void generate_exirq(struct kvm_vcpu
*vcpu
)
714 struct kvm_pt_regs
*regs
= vcpu_regs(vcpu
);
716 vpsr
= VCPU(vcpu
, vpsr
);
717 isr
= vpsr
& IA64_PSR_RI
;
718 if (!(vpsr
& IA64_PSR_IC
))
719 panic_vm(vcpu
, "Trying to inject one IRQ with psr.ic=0\n");
720 reflect_interruption(0, isr
, 0, 12, regs
); /* EXT IRQ */
723 void vhpi_detection(struct kvm_vcpu
*vcpu
)
725 uint64_t threshold
, vhpi
;
727 struct ia64_psr vpsr
;
729 vpsr
= *(struct ia64_psr
*)&VCPU(vcpu
, vpsr
);
730 vtpr
.val
= VCPU(vcpu
, tpr
);
732 threshold
= ((!vpsr
.i
) << 5) | (vtpr
.mmi
<< 4) | vtpr
.mic
;
733 vhpi
= VCPU(vcpu
, vhpi
);
734 if (vhpi
> threshold
) {
735 /* interrupt actived*/
736 generate_exirq(vcpu
);
740 void leave_hypervisor_tail(void)
742 struct kvm_vcpu
*v
= current_vcpu
;
744 if (VMX(v
, timer_check
)) {
745 VMX(v
, timer_check
) = 0;
746 if (VMX(v
, itc_check
)) {
747 if (vcpu_get_itc(v
) > VCPU(v
, itm
)) {
748 if (!(VCPU(v
, itv
) & (1 << 16))) {
749 vcpu_pend_interrupt(v
, VCPU(v
, itv
)
751 VMX(v
, itc_check
) = 0;
753 v
->arch
.timer_pending
= 1;
755 VMX(v
, last_itc
) = VCPU(v
, itm
) + 1;
761 if (v
->arch
.irq_new_pending
) {
762 v
->arch
.irq_new_pending
= 0;
763 VMX(v
, irq_check
) = 0;
764 check_pending_irq(v
);
767 if (VMX(v
, irq_check
)) {
768 VMX(v
, irq_check
) = 0;
773 static inline void handle_lds(struct kvm_pt_regs
*regs
)
775 regs
->cr_ipsr
|= IA64_PSR_ED
;
778 void physical_tlb_miss(struct kvm_vcpu
*vcpu
, unsigned long vadr
, int type
)
783 rr
.val
= ia64_get_rr(vadr
);
784 pte
= vadr
& _PAGE_PPN_MASK
;
785 pte
= pte
| PHY_PAGE_WB
;
786 thash_vhpt_insert(vcpu
, pte
, (u64
)(rr
.ps
<< 2), vadr
, type
);
790 void kvm_page_fault(u64 vadr
, u64 vec
, struct kvm_pt_regs
*regs
)
795 u64 vhpt_adr
, gppa
, pteval
, rr
, itir
;
798 struct thash_data
*data
;
799 struct kvm_vcpu
*v
= current_vcpu
;
801 vpsr
= VCPU(v
, vpsr
);
802 misr
.val
= VMX(v
, cr_isr
);
806 if (is_physical_mode(v
) && (!(vadr
<< 1 >> 62))) {
808 if (__gpfn_is_io((vadr
<< 1) >> (PAGE_SHIFT
+ 1))) {
809 emulate_io_inst(v
, ((vadr
<< 1) >> 1), 4);
813 physical_tlb_miss(v
, vadr
, type
);
816 data
= vtlb_lookup(v
, vadr
, type
);
819 gppa
= (vadr
& ((1UL << data
->ps
) - 1))
820 + (data
->ppn
>> (data
->ps
- 12) << data
->ps
);
821 if (__gpfn_is_io(gppa
>> PAGE_SHIFT
)) {
822 if (data
->pl
>= ((regs
->cr_ipsr
>>
823 IA64_PSR_CPL0_BIT
) & 3))
824 emulate_io_inst(v
, gppa
, data
->ma
);
826 vcpu_set_isr(v
, misr
.val
);
827 data_access_rights(v
, vadr
);
832 thash_vhpt_insert(v
, data
->page_flags
, data
->itir
, vadr
, type
);
834 } else if (type
== D_TLB
) {
840 rr
= vcpu_get_rr(v
, vadr
);
841 itir
= rr
& (RR_RID_MASK
| RR_PS_MASK
);
843 if (!vhpt_enabled(v
, vadr
, misr
.rs
? RSE_REF
: DATA_REF
)) {
844 if (vpsr
& IA64_PSR_IC
) {
845 vcpu_set_isr(v
, misr
.val
);
853 vpta
.val
= vcpu_get_pta(v
);
854 /* avoid recursively walking (short format) VHPT */
856 vhpt_adr
= vcpu_thash(v
, vadr
);
857 if (!guest_vhpt_lookup(vhpt_adr
, &pteval
)) {
858 /* VHPT successfully read. */
859 if (!(pteval
& _PAGE_P
)) {
860 if (vpsr
& IA64_PSR_IC
) {
861 vcpu_set_isr(v
, misr
.val
);
866 } else if ((pteval
& _PAGE_MA_MASK
) != _PAGE_MA_ST
) {
867 thash_purge_and_insert(v
, pteval
, itir
,
869 } else if (vpsr
& IA64_PSR_IC
) {
870 vcpu_set_isr(v
, misr
.val
);
876 /* Can't read VHPT. */
877 if (vpsr
& IA64_PSR_IC
) {
878 vcpu_set_isr(v
, misr
.val
);
879 dvhpt_fault(v
, vadr
);
884 } else if (type
== I_TLB
) {
885 if (!(vpsr
& IA64_PSR_IC
))
887 if (!vhpt_enabled(v
, vadr
, INST_REF
)) {
888 vcpu_set_isr(v
, misr
.val
);
893 vpta
.val
= vcpu_get_pta(v
);
895 vhpt_adr
= vcpu_thash(v
, vadr
);
896 if (!guest_vhpt_lookup(vhpt_adr
, &pteval
)) {
897 /* VHPT successfully read. */
898 if (pteval
& _PAGE_P
) {
899 if ((pteval
& _PAGE_MA_MASK
) == _PAGE_MA_ST
) {
900 vcpu_set_isr(v
, misr
.val
);
904 rr
= vcpu_get_rr(v
, vadr
);
905 itir
= rr
& (RR_RID_MASK
| RR_PS_MASK
);
906 thash_purge_and_insert(v
, pteval
, itir
,
909 vcpu_set_isr(v
, misr
.val
);
910 inst_page_not_present(v
, vadr
);
913 vcpu_set_isr(v
, misr
.val
);
914 ivhpt_fault(v
, vadr
);
919 void kvm_vexirq(struct kvm_vcpu
*vcpu
)
922 struct kvm_pt_regs
*regs
;
924 regs
= vcpu_regs(vcpu
);
925 vpsr
= VCPU(vcpu
, vpsr
);
926 isr
= vpsr
& IA64_PSR_RI
;
927 reflect_interruption(0, isr
, 0, 12, regs
); /*EXT IRQ*/
930 void kvm_ia64_handle_irq(struct kvm_vcpu
*v
)
932 struct exit_ctl_data
*p
= &v
->arch
.exit_data
;
936 p
->exit_reason
= EXIT_REASON_EXTERNAL_INTERRUPT
;
938 local_irq_restore(psr
);
940 VMX(v
, timer_check
) = 1;
944 static void ptc_ga_remote_func(struct kvm_vcpu
*v
, int pos
)
946 u64 oldrid
, moldrid
, oldpsbits
, vaddr
;
947 struct kvm_ptc_g
*p
= &v
->arch
.ptc_g_data
[pos
];
950 oldrid
= VMX(v
, vrr
[0]);
951 VMX(v
, vrr
[0]) = p
->rr
;
952 oldpsbits
= VMX(v
, psbits
[0]);
953 VMX(v
, psbits
[0]) = VMX(v
, psbits
[REGION_NUMBER(vaddr
)]);
954 moldrid
= ia64_get_rr(0x0);
955 ia64_set_rr(0x0, vrrtomrr(p
->rr
));
958 vaddr
= PAGEALIGN(vaddr
, p
->ps
);
959 thash_purge_entries_remote(v
, vaddr
, p
->ps
);
961 VMX(v
, vrr
[0]) = oldrid
;
962 VMX(v
, psbits
[0]) = oldpsbits
;
963 ia64_set_rr(0x0, moldrid
);
964 ia64_dv_serialize_data();
967 static void vcpu_do_resume(struct kvm_vcpu
*vcpu
)
969 /*Re-init VHPT and VTLB once from resume*/
970 vcpu
->arch
.vhpt
.num
= VHPT_NUM_ENTRIES
;
971 thash_init(&vcpu
->arch
.vhpt
, VHPT_SHIFT
);
972 vcpu
->arch
.vtlb
.num
= VTLB_NUM_ENTRIES
;
973 thash_init(&vcpu
->arch
.vtlb
, VTLB_SHIFT
);
975 ia64_set_pta(vcpu
->arch
.vhpt
.pta
.val
);
978 static void vmm_sanity_check(struct kvm_vcpu
*vcpu
)
980 struct exit_ctl_data
*p
= &vcpu
->arch
.exit_data
;
982 if (!vmm_sanity
&& p
->exit_reason
!= EXIT_REASON_DEBUG
) {
983 panic_vm(vcpu
, "Failed to do vmm sanity check,"
984 "it maybe caused by crashed vmm!!\n\n");
988 static void kvm_do_resume_op(struct kvm_vcpu
*vcpu
)
990 vmm_sanity_check(vcpu
); /*Guarantee vcpu runing on healthy vmm!*/
992 if (test_and_clear_bit(KVM_REQ_RESUME
, &vcpu
->requests
)) {
993 vcpu_do_resume(vcpu
);
997 if (unlikely(test_and_clear_bit(KVM_REQ_TLB_FLUSH
, &vcpu
->requests
))) {
998 thash_purge_all(vcpu
);
1002 if (test_and_clear_bit(KVM_REQ_PTC_G
, &vcpu
->requests
)) {
1003 while (vcpu
->arch
.ptc_g_count
> 0)
1004 ptc_ga_remote_func(vcpu
, --vcpu
->arch
.ptc_g_count
);
1008 void vmm_transition(struct kvm_vcpu
*vcpu
)
1010 ia64_call_vsa(PAL_VPS_SAVE
, (unsigned long)vcpu
->arch
.vpd
,
1012 vmm_trampoline(&vcpu
->arch
.guest
, &vcpu
->arch
.host
);
1013 ia64_call_vsa(PAL_VPS_RESTORE
, (unsigned long)vcpu
->arch
.vpd
,
1015 kvm_do_resume_op(vcpu
);
1018 void vmm_panic_handler(u64 vec
)
1020 struct kvm_vcpu
*vcpu
= current_vcpu
;
1022 panic_vm(vcpu
, "Unexpected interruption occurs in VMM, vector:0x%lx\n",