Linux Audio

Check our new training course

Loading...
v6.8
   1// SPDX-License-Identifier: GPL-2.0-only
   2/*
   3 * Copyright (C) 2009. SUSE Linux Products GmbH. All rights reserved.
   4 *
   5 * Authors:
   6 *    Alexander Graf <agraf@suse.de>
   7 *    Kevin Wolf <mail@kevin-wolf.de>
   8 *
   9 * Description:
  10 * This file is derived from arch/powerpc/kvm/44x.c,
  11 * by Hollis Blanchard <hollisb@us.ibm.com>.
  12 */
  13
  14#include <linux/kvm_host.h>
  15#include <linux/err.h>
  16#include <linux/export.h>
  17#include <linux/slab.h>
  18#include <linux/module.h>
  19#include <linux/miscdevice.h>
  20#include <linux/gfp.h>
  21#include <linux/sched.h>
  22#include <linux/vmalloc.h>
  23#include <linux/highmem.h>
  24
  25#include <asm/reg.h>
  26#include <asm/cputable.h>
  27#include <asm/cacheflush.h>
  28#include <linux/uaccess.h>
  29#include <asm/io.h>
  30#include <asm/kvm_ppc.h>
  31#include <asm/kvm_book3s.h>
  32#include <asm/mmu_context.h>
  33#include <asm/page.h>
  34#include <asm/xive.h>
  35
  36#include "book3s.h"
  37#include "trace.h"
  38
  39/* #define EXIT_DEBUG */
 
  40
  41const struct _kvm_stats_desc kvm_vm_stats_desc[] = {
  42	KVM_GENERIC_VM_STATS(),
  43	STATS_DESC_ICOUNTER(VM, num_2M_pages),
  44	STATS_DESC_ICOUNTER(VM, num_1G_pages)
  45};
  46
  47const struct kvm_stats_header kvm_vm_stats_header = {
  48	.name_size = KVM_STATS_NAME_SIZE,
  49	.num_desc = ARRAY_SIZE(kvm_vm_stats_desc),
  50	.id_offset = sizeof(struct kvm_stats_header),
  51	.desc_offset = sizeof(struct kvm_stats_header) + KVM_STATS_NAME_SIZE,
  52	.data_offset = sizeof(struct kvm_stats_header) + KVM_STATS_NAME_SIZE +
  53		       sizeof(kvm_vm_stats_desc),
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
  54};
  55
  56const struct _kvm_stats_desc kvm_vcpu_stats_desc[] = {
  57	KVM_GENERIC_VCPU_STATS(),
  58	STATS_DESC_COUNTER(VCPU, sum_exits),
  59	STATS_DESC_COUNTER(VCPU, mmio_exits),
  60	STATS_DESC_COUNTER(VCPU, signal_exits),
  61	STATS_DESC_COUNTER(VCPU, light_exits),
  62	STATS_DESC_COUNTER(VCPU, itlb_real_miss_exits),
  63	STATS_DESC_COUNTER(VCPU, itlb_virt_miss_exits),
  64	STATS_DESC_COUNTER(VCPU, dtlb_real_miss_exits),
  65	STATS_DESC_COUNTER(VCPU, dtlb_virt_miss_exits),
  66	STATS_DESC_COUNTER(VCPU, syscall_exits),
  67	STATS_DESC_COUNTER(VCPU, isi_exits),
  68	STATS_DESC_COUNTER(VCPU, dsi_exits),
  69	STATS_DESC_COUNTER(VCPU, emulated_inst_exits),
  70	STATS_DESC_COUNTER(VCPU, dec_exits),
  71	STATS_DESC_COUNTER(VCPU, ext_intr_exits),
  72	STATS_DESC_COUNTER(VCPU, halt_successful_wait),
  73	STATS_DESC_COUNTER(VCPU, dbell_exits),
  74	STATS_DESC_COUNTER(VCPU, gdbell_exits),
  75	STATS_DESC_COUNTER(VCPU, ld),
  76	STATS_DESC_COUNTER(VCPU, st),
  77	STATS_DESC_COUNTER(VCPU, pf_storage),
  78	STATS_DESC_COUNTER(VCPU, pf_instruc),
  79	STATS_DESC_COUNTER(VCPU, sp_storage),
  80	STATS_DESC_COUNTER(VCPU, sp_instruc),
  81	STATS_DESC_COUNTER(VCPU, queue_intr),
  82	STATS_DESC_COUNTER(VCPU, ld_slow),
  83	STATS_DESC_COUNTER(VCPU, st_slow),
  84	STATS_DESC_COUNTER(VCPU, pthru_all),
  85	STATS_DESC_COUNTER(VCPU, pthru_host),
  86	STATS_DESC_COUNTER(VCPU, pthru_bad_aff)
  87};
  88
  89const struct kvm_stats_header kvm_vcpu_stats_header = {
  90	.name_size = KVM_STATS_NAME_SIZE,
  91	.num_desc = ARRAY_SIZE(kvm_vcpu_stats_desc),
  92	.id_offset = sizeof(struct kvm_stats_header),
  93	.desc_offset = sizeof(struct kvm_stats_header) + KVM_STATS_NAME_SIZE,
  94	.data_offset = sizeof(struct kvm_stats_header) + KVM_STATS_NAME_SIZE +
  95		       sizeof(kvm_vcpu_stats_desc),
  96};
  97
  98static inline void kvmppc_update_int_pending(struct kvm_vcpu *vcpu,
  99			unsigned long pending_now, unsigned long old_pending)
 100{
 101	if (is_kvmppc_hv_enabled(vcpu->kvm))
 102		return;
 103	if (pending_now)
 104		kvmppc_set_int_pending(vcpu, 1);
 105	else if (old_pending)
 106		kvmppc_set_int_pending(vcpu, 0);
 107}
 108
 109static inline bool kvmppc_critical_section(struct kvm_vcpu *vcpu)
 110{
 111	ulong crit_raw;
 112	ulong crit_r1;
 113	bool crit;
 114
 115	if (is_kvmppc_hv_enabled(vcpu->kvm))
 116		return false;
 117
 118	crit_raw = kvmppc_get_critical(vcpu);
 119	crit_r1 = kvmppc_get_gpr(vcpu, 1);
 120
 121	/* Truncate crit indicators in 32 bit mode */
 122	if (!(kvmppc_get_msr(vcpu) & MSR_SF)) {
 123		crit_raw &= 0xffffffff;
 124		crit_r1 &= 0xffffffff;
 125	}
 126
 127	/* Critical section when crit == r1 */
 128	crit = (crit_raw == crit_r1);
 129	/* ... and we're in supervisor mode */
 130	crit = crit && !(kvmppc_get_msr(vcpu) & MSR_PR);
 131
 132	return crit;
 133}
 134
 135void kvmppc_inject_interrupt(struct kvm_vcpu *vcpu, int vec, u64 flags)
 136{
 137	vcpu->kvm->arch.kvm_ops->inject_interrupt(vcpu, vec, flags);
 
 
 
 
 138}
 139
 140static int kvmppc_book3s_vec2irqprio(unsigned int vec)
 141{
 142	unsigned int prio;
 143
 144	switch (vec) {
 145	case 0x100: prio = BOOK3S_IRQPRIO_SYSTEM_RESET;		break;
 146	case 0x200: prio = BOOK3S_IRQPRIO_MACHINE_CHECK;	break;
 147	case 0x300: prio = BOOK3S_IRQPRIO_DATA_STORAGE;		break;
 148	case 0x380: prio = BOOK3S_IRQPRIO_DATA_SEGMENT;		break;
 149	case 0x400: prio = BOOK3S_IRQPRIO_INST_STORAGE;		break;
 150	case 0x480: prio = BOOK3S_IRQPRIO_INST_SEGMENT;		break;
 151	case 0x500: prio = BOOK3S_IRQPRIO_EXTERNAL;		break;
 152	case 0x600: prio = BOOK3S_IRQPRIO_ALIGNMENT;		break;
 153	case 0x700: prio = BOOK3S_IRQPRIO_PROGRAM;		break;
 154	case 0x800: prio = BOOK3S_IRQPRIO_FP_UNAVAIL;		break;
 155	case 0x900: prio = BOOK3S_IRQPRIO_DECREMENTER;		break;
 156	case 0xc00: prio = BOOK3S_IRQPRIO_SYSCALL;		break;
 157	case 0xd00: prio = BOOK3S_IRQPRIO_DEBUG;		break;
 158	case 0xf20: prio = BOOK3S_IRQPRIO_ALTIVEC;		break;
 159	case 0xf40: prio = BOOK3S_IRQPRIO_VSX;			break;
 160	case 0xf60: prio = BOOK3S_IRQPRIO_FAC_UNAVAIL;		break;
 161	default:    prio = BOOK3S_IRQPRIO_MAX;			break;
 162	}
 163
 164	return prio;
 165}
 166
 167void kvmppc_book3s_dequeue_irqprio(struct kvm_vcpu *vcpu,
 168					  unsigned int vec)
 169{
 170	unsigned long old_pending = vcpu->arch.pending_exceptions;
 171
 172	clear_bit(kvmppc_book3s_vec2irqprio(vec),
 173		  &vcpu->arch.pending_exceptions);
 174
 175	kvmppc_update_int_pending(vcpu, vcpu->arch.pending_exceptions,
 176				  old_pending);
 177}
 178
 179void kvmppc_book3s_queue_irqprio(struct kvm_vcpu *vcpu, unsigned int vec)
 180{
 181	vcpu->stat.queue_intr++;
 182
 183	set_bit(kvmppc_book3s_vec2irqprio(vec),
 184		&vcpu->arch.pending_exceptions);
 185#ifdef EXIT_DEBUG
 186	printk(KERN_INFO "Queueing interrupt %x\n", vec);
 187#endif
 188}
 189EXPORT_SYMBOL_GPL(kvmppc_book3s_queue_irqprio);
 190
 191void kvmppc_core_queue_machine_check(struct kvm_vcpu *vcpu, ulong srr1_flags)
 192{
 193	/* might as well deliver this straight away */
 194	kvmppc_inject_interrupt(vcpu, BOOK3S_INTERRUPT_MACHINE_CHECK, srr1_flags);
 195}
 196EXPORT_SYMBOL_GPL(kvmppc_core_queue_machine_check);
 197
 198void kvmppc_core_queue_syscall(struct kvm_vcpu *vcpu)
 199{
 200	kvmppc_inject_interrupt(vcpu, BOOK3S_INTERRUPT_SYSCALL, 0);
 201}
 202EXPORT_SYMBOL(kvmppc_core_queue_syscall);
 203
 204void kvmppc_core_queue_program(struct kvm_vcpu *vcpu, ulong srr1_flags)
 205{
 206	/* might as well deliver this straight away */
 207	kvmppc_inject_interrupt(vcpu, BOOK3S_INTERRUPT_PROGRAM, srr1_flags);
 208}
 209EXPORT_SYMBOL_GPL(kvmppc_core_queue_program);
 210
 211void kvmppc_core_queue_fpunavail(struct kvm_vcpu *vcpu, ulong srr1_flags)
 212{
 213	/* might as well deliver this straight away */
 214	kvmppc_inject_interrupt(vcpu, BOOK3S_INTERRUPT_FP_UNAVAIL, srr1_flags);
 215}
 216
 217void kvmppc_core_queue_vec_unavail(struct kvm_vcpu *vcpu, ulong srr1_flags)
 218{
 219	/* might as well deliver this straight away */
 220	kvmppc_inject_interrupt(vcpu, BOOK3S_INTERRUPT_ALTIVEC, srr1_flags);
 221}
 222
 223void kvmppc_core_queue_vsx_unavail(struct kvm_vcpu *vcpu, ulong srr1_flags)
 224{
 225	/* might as well deliver this straight away */
 226	kvmppc_inject_interrupt(vcpu, BOOK3S_INTERRUPT_VSX, srr1_flags);
 227}
 228
 229void kvmppc_core_queue_dec(struct kvm_vcpu *vcpu)
 230{
 231	kvmppc_book3s_queue_irqprio(vcpu, BOOK3S_INTERRUPT_DECREMENTER);
 232}
 233EXPORT_SYMBOL_GPL(kvmppc_core_queue_dec);
 234
 235int kvmppc_core_pending_dec(struct kvm_vcpu *vcpu)
 236{
 237	return test_bit(BOOK3S_IRQPRIO_DECREMENTER, &vcpu->arch.pending_exceptions);
 238}
 239EXPORT_SYMBOL_GPL(kvmppc_core_pending_dec);
 240
 241void kvmppc_core_dequeue_dec(struct kvm_vcpu *vcpu)
 242{
 243	kvmppc_book3s_dequeue_irqprio(vcpu, BOOK3S_INTERRUPT_DECREMENTER);
 244}
 245EXPORT_SYMBOL_GPL(kvmppc_core_dequeue_dec);
 246
 247void kvmppc_core_queue_external(struct kvm_vcpu *vcpu,
 248                                struct kvm_interrupt *irq)
 249{
 250	/*
 251	 * This case (KVM_INTERRUPT_SET) should never actually arise for
 252	 * a pseries guest (because pseries guests expect their interrupt
 253	 * controllers to continue asserting an external interrupt request
 254	 * until it is acknowledged at the interrupt controller), but is
 255	 * included to avoid ABI breakage and potentially for other
 256	 * sorts of guest.
 257	 *
 258	 * There is a subtlety here: HV KVM does not test the
 259	 * external_oneshot flag in the code that synthesizes
 260	 * external interrupts for the guest just before entering
 261	 * the guest.  That is OK even if userspace did do a
 262	 * KVM_INTERRUPT_SET on a pseries guest vcpu, because the
 263	 * caller (kvm_vcpu_ioctl_interrupt) does a kvm_vcpu_kick()
 264	 * which ends up doing a smp_send_reschedule(), which will
 265	 * pull the guest all the way out to the host, meaning that
 266	 * we will call kvmppc_core_prepare_to_enter() before entering
 267	 * the guest again, and that will handle the external_oneshot
 268	 * flag correctly.
 269	 */
 270	if (irq->irq == KVM_INTERRUPT_SET)
 271		vcpu->arch.external_oneshot = 1;
 272
 273	kvmppc_book3s_queue_irqprio(vcpu, BOOK3S_INTERRUPT_EXTERNAL);
 274}
 275
 276void kvmppc_core_dequeue_external(struct kvm_vcpu *vcpu)
 277{
 278	kvmppc_book3s_dequeue_irqprio(vcpu, BOOK3S_INTERRUPT_EXTERNAL);
 279}
 280
 281void kvmppc_core_queue_data_storage(struct kvm_vcpu *vcpu, ulong srr1_flags,
 282				    ulong dar, ulong dsisr)
 283{
 284	kvmppc_set_dar(vcpu, dar);
 285	kvmppc_set_dsisr(vcpu, dsisr);
 286	kvmppc_inject_interrupt(vcpu, BOOK3S_INTERRUPT_DATA_STORAGE, srr1_flags);
 287}
 288EXPORT_SYMBOL_GPL(kvmppc_core_queue_data_storage);
 289
 290void kvmppc_core_queue_inst_storage(struct kvm_vcpu *vcpu, ulong srr1_flags)
 291{
 292	kvmppc_inject_interrupt(vcpu, BOOK3S_INTERRUPT_INST_STORAGE, srr1_flags);
 293}
 294EXPORT_SYMBOL_GPL(kvmppc_core_queue_inst_storage);
 295
 296static int kvmppc_book3s_irqprio_deliver(struct kvm_vcpu *vcpu,
 297					 unsigned int priority)
 298{
 299	int deliver = 1;
 300	int vec = 0;
 301	bool crit = kvmppc_critical_section(vcpu);
 302
 303	switch (priority) {
 304	case BOOK3S_IRQPRIO_DECREMENTER:
 305		deliver = !kvmhv_is_nestedv2() && (kvmppc_get_msr(vcpu) & MSR_EE) && !crit;
 306		vec = BOOK3S_INTERRUPT_DECREMENTER;
 307		break;
 308	case BOOK3S_IRQPRIO_EXTERNAL:
 309		deliver = !kvmhv_is_nestedv2() && (kvmppc_get_msr(vcpu) & MSR_EE) && !crit;
 310		vec = BOOK3S_INTERRUPT_EXTERNAL;
 311		break;
 312	case BOOK3S_IRQPRIO_SYSTEM_RESET:
 313		vec = BOOK3S_INTERRUPT_SYSTEM_RESET;
 314		break;
 315	case BOOK3S_IRQPRIO_MACHINE_CHECK:
 316		vec = BOOK3S_INTERRUPT_MACHINE_CHECK;
 317		break;
 318	case BOOK3S_IRQPRIO_DATA_STORAGE:
 319		vec = BOOK3S_INTERRUPT_DATA_STORAGE;
 320		break;
 321	case BOOK3S_IRQPRIO_INST_STORAGE:
 322		vec = BOOK3S_INTERRUPT_INST_STORAGE;
 323		break;
 324	case BOOK3S_IRQPRIO_DATA_SEGMENT:
 325		vec = BOOK3S_INTERRUPT_DATA_SEGMENT;
 326		break;
 327	case BOOK3S_IRQPRIO_INST_SEGMENT:
 328		vec = BOOK3S_INTERRUPT_INST_SEGMENT;
 329		break;
 330	case BOOK3S_IRQPRIO_ALIGNMENT:
 331		vec = BOOK3S_INTERRUPT_ALIGNMENT;
 332		break;
 333	case BOOK3S_IRQPRIO_PROGRAM:
 334		vec = BOOK3S_INTERRUPT_PROGRAM;
 335		break;
 336	case BOOK3S_IRQPRIO_VSX:
 337		vec = BOOK3S_INTERRUPT_VSX;
 338		break;
 339	case BOOK3S_IRQPRIO_ALTIVEC:
 340		vec = BOOK3S_INTERRUPT_ALTIVEC;
 341		break;
 342	case BOOK3S_IRQPRIO_FP_UNAVAIL:
 343		vec = BOOK3S_INTERRUPT_FP_UNAVAIL;
 344		break;
 345	case BOOK3S_IRQPRIO_SYSCALL:
 346		vec = BOOK3S_INTERRUPT_SYSCALL;
 347		break;
 348	case BOOK3S_IRQPRIO_DEBUG:
 349		vec = BOOK3S_INTERRUPT_TRACE;
 350		break;
 351	case BOOK3S_IRQPRIO_PERFORMANCE_MONITOR:
 352		vec = BOOK3S_INTERRUPT_PERFMON;
 353		break;
 354	case BOOK3S_IRQPRIO_FAC_UNAVAIL:
 355		vec = BOOK3S_INTERRUPT_FAC_UNAVAIL;
 356		break;
 357	default:
 358		deliver = 0;
 359		printk(KERN_ERR "KVM: Unknown interrupt: 0x%x\n", priority);
 360		break;
 361	}
 362
 363#if 0
 364	printk(KERN_INFO "Deliver interrupt 0x%x? %x\n", vec, deliver);
 365#endif
 366
 367	if (deliver)
 368		kvmppc_inject_interrupt(vcpu, vec, 0);
 369
 370	return deliver;
 371}
 372
 373/*
 374 * This function determines if an irqprio should be cleared once issued.
 375 */
 376static bool clear_irqprio(struct kvm_vcpu *vcpu, unsigned int priority)
 377{
 378	switch (priority) {
 379		case BOOK3S_IRQPRIO_DECREMENTER:
 380			/* DEC interrupts get cleared by mtdec */
 381			return false;
 382		case BOOK3S_IRQPRIO_EXTERNAL:
 383			/*
 384			 * External interrupts get cleared by userspace
 385			 * except when set by the KVM_INTERRUPT ioctl with
 386			 * KVM_INTERRUPT_SET (not KVM_INTERRUPT_SET_LEVEL).
 387			 */
 388			if (vcpu->arch.external_oneshot) {
 389				vcpu->arch.external_oneshot = 0;
 390				return true;
 391			}
 392			return false;
 393	}
 394
 395	return true;
 396}
 397
 398int kvmppc_core_prepare_to_enter(struct kvm_vcpu *vcpu)
 399{
 400	unsigned long *pending = &vcpu->arch.pending_exceptions;
 401	unsigned long old_pending = vcpu->arch.pending_exceptions;
 402	unsigned int priority;
 403
 404#ifdef EXIT_DEBUG
 405	if (vcpu->arch.pending_exceptions)
 406		printk(KERN_EMERG "KVM: Check pending: %lx\n", vcpu->arch.pending_exceptions);
 407#endif
 408	priority = __ffs(*pending);
 409	while (priority < BOOK3S_IRQPRIO_MAX) {
 410		if (kvmppc_book3s_irqprio_deliver(vcpu, priority) &&
 411		    clear_irqprio(vcpu, priority)) {
 412			clear_bit(priority, &vcpu->arch.pending_exceptions);
 413			break;
 414		}
 415
 416		priority = find_next_bit(pending,
 417					 BITS_PER_BYTE * sizeof(*pending),
 418					 priority + 1);
 419	}
 420
 421	/* Tell the guest about our interrupt status */
 422	kvmppc_update_int_pending(vcpu, *pending, old_pending);
 423
 424	return 0;
 425}
 426EXPORT_SYMBOL_GPL(kvmppc_core_prepare_to_enter);
 427
 428kvm_pfn_t kvmppc_gpa_to_pfn(struct kvm_vcpu *vcpu, gpa_t gpa, bool writing,
 429			bool *writable)
 430{
 431	ulong mp_pa = vcpu->arch.magic_page_pa & KVM_PAM;
 432	gfn_t gfn = gpa >> PAGE_SHIFT;
 433
 434	if (!(kvmppc_get_msr(vcpu) & MSR_SF))
 435		mp_pa = (uint32_t)mp_pa;
 436
 437	/* Magic page override */
 438	gpa &= ~0xFFFULL;
 439	if (unlikely(mp_pa) && unlikely((gpa & KVM_PAM) == mp_pa)) {
 440		ulong shared_page = ((ulong)vcpu->arch.shared) & PAGE_MASK;
 441		kvm_pfn_t pfn;
 442
 443		pfn = (kvm_pfn_t)virt_to_phys((void*)shared_page) >> PAGE_SHIFT;
 444		get_page(pfn_to_page(pfn));
 445		if (writable)
 446			*writable = true;
 447		return pfn;
 448	}
 449
 450	return gfn_to_pfn_prot(vcpu->kvm, gfn, writing, writable);
 451}
 452EXPORT_SYMBOL_GPL(kvmppc_gpa_to_pfn);
 453
 454int kvmppc_xlate(struct kvm_vcpu *vcpu, ulong eaddr, enum xlate_instdata xlid,
 455		 enum xlate_readwrite xlrw, struct kvmppc_pte *pte)
 456{
 457	bool data = (xlid == XLATE_DATA);
 458	bool iswrite = (xlrw == XLATE_WRITE);
 459	int relocated = (kvmppc_get_msr(vcpu) & (data ? MSR_DR : MSR_IR));
 460	int r;
 461
 462	if (relocated) {
 463		r = vcpu->arch.mmu.xlate(vcpu, eaddr, pte, data, iswrite);
 464	} else {
 465		pte->eaddr = eaddr;
 466		pte->raddr = eaddr & KVM_PAM;
 467		pte->vpage = VSID_REAL | eaddr >> 12;
 468		pte->may_read = true;
 469		pte->may_write = true;
 470		pte->may_execute = true;
 471		r = 0;
 472
 473		if ((kvmppc_get_msr(vcpu) & (MSR_IR | MSR_DR)) == MSR_DR &&
 474		    !data) {
 475			if ((vcpu->arch.hflags & BOOK3S_HFLAG_SPLIT_HACK) &&
 476			    ((eaddr & SPLIT_HACK_MASK) == SPLIT_HACK_OFFS))
 477			pte->raddr &= ~SPLIT_HACK_MASK;
 478		}
 479	}
 480
 481	return r;
 482}
 483
 484/*
 485 * Returns prefixed instructions with the prefix in the high 32 bits
 486 * of *inst and suffix in the low 32 bits.  This is the same convention
 487 * as used in HEIR, vcpu->arch.last_inst and vcpu->arch.emul_inst.
 488 * Like vcpu->arch.last_inst but unlike vcpu->arch.emul_inst, each
 489 * half of the value needs byte-swapping if the guest endianness is
 490 * different from the host endianness.
 491 */
 492int kvmppc_load_last_inst(struct kvm_vcpu *vcpu,
 493		enum instruction_fetch_type type, unsigned long *inst)
 494{
 495	ulong pc = kvmppc_get_pc(vcpu);
 496	int r;
 497	u32 iw;
 498
 499	if (type == INST_SC)
 500		pc -= 4;
 501
 502	r = kvmppc_ld(vcpu, &pc, sizeof(u32), &iw, false);
 503	if (r != EMULATE_DONE)
 
 
 504		return EMULATE_AGAIN;
 505	/*
 506	 * If [H]SRR1 indicates that the instruction that caused the
 507	 * current interrupt is a prefixed instruction, get the suffix.
 508	 */
 509	if (kvmppc_get_msr(vcpu) & SRR1_PREFIXED) {
 510		u32 suffix;
 511		pc += 4;
 512		r = kvmppc_ld(vcpu, &pc, sizeof(u32), &suffix, false);
 513		if (r != EMULATE_DONE)
 514			return EMULATE_AGAIN;
 515		*inst = ((u64)iw << 32) | suffix;
 516	} else {
 517		*inst = iw;
 518	}
 519	return r;
 520}
 521EXPORT_SYMBOL_GPL(kvmppc_load_last_inst);
 522
 
 
 
 
 
 523int kvmppc_subarch_vcpu_init(struct kvm_vcpu *vcpu)
 524{
 525	return 0;
 526}
 527
 528void kvmppc_subarch_vcpu_uninit(struct kvm_vcpu *vcpu)
 529{
 530}
 531
 532int kvm_arch_vcpu_ioctl_get_sregs(struct kvm_vcpu *vcpu,
 533				  struct kvm_sregs *sregs)
 534{
 535	int ret;
 536
 537	vcpu_load(vcpu);
 538	ret = vcpu->kvm->arch.kvm_ops->get_sregs(vcpu, sregs);
 539	vcpu_put(vcpu);
 540
 541	return ret;
 542}
 543
 544int kvm_arch_vcpu_ioctl_set_sregs(struct kvm_vcpu *vcpu,
 545				  struct kvm_sregs *sregs)
 546{
 547	int ret;
 548
 549	vcpu_load(vcpu);
 550	ret = vcpu->kvm->arch.kvm_ops->set_sregs(vcpu, sregs);
 551	vcpu_put(vcpu);
 552
 553	return ret;
 554}
 555
 556int kvm_arch_vcpu_ioctl_get_regs(struct kvm_vcpu *vcpu, struct kvm_regs *regs)
 557{
 558	int i;
 559
 560	regs->pc = kvmppc_get_pc(vcpu);
 561	regs->cr = kvmppc_get_cr(vcpu);
 562	regs->ctr = kvmppc_get_ctr(vcpu);
 563	regs->lr = kvmppc_get_lr(vcpu);
 564	regs->xer = kvmppc_get_xer(vcpu);
 565	regs->msr = kvmppc_get_msr(vcpu);
 566	regs->srr0 = kvmppc_get_srr0(vcpu);
 567	regs->srr1 = kvmppc_get_srr1(vcpu);
 568	regs->pid = kvmppc_get_pid(vcpu);
 569	regs->sprg0 = kvmppc_get_sprg0(vcpu);
 570	regs->sprg1 = kvmppc_get_sprg1(vcpu);
 571	regs->sprg2 = kvmppc_get_sprg2(vcpu);
 572	regs->sprg3 = kvmppc_get_sprg3(vcpu);
 573	regs->sprg4 = kvmppc_get_sprg4(vcpu);
 574	regs->sprg5 = kvmppc_get_sprg5(vcpu);
 575	regs->sprg6 = kvmppc_get_sprg6(vcpu);
 576	regs->sprg7 = kvmppc_get_sprg7(vcpu);
 577
 578	for (i = 0; i < ARRAY_SIZE(regs->gpr); i++)
 579		regs->gpr[i] = kvmppc_get_gpr(vcpu, i);
 580
 581	return 0;
 582}
 583
 584int kvm_arch_vcpu_ioctl_set_regs(struct kvm_vcpu *vcpu, struct kvm_regs *regs)
 585{
 586	int i;
 587
 588	kvmppc_set_pc(vcpu, regs->pc);
 589	kvmppc_set_cr(vcpu, regs->cr);
 590	kvmppc_set_ctr(vcpu, regs->ctr);
 591	kvmppc_set_lr(vcpu, regs->lr);
 592	kvmppc_set_xer(vcpu, regs->xer);
 593	kvmppc_set_msr(vcpu, regs->msr);
 594	kvmppc_set_srr0(vcpu, regs->srr0);
 595	kvmppc_set_srr1(vcpu, regs->srr1);
 596	kvmppc_set_sprg0(vcpu, regs->sprg0);
 597	kvmppc_set_sprg1(vcpu, regs->sprg1);
 598	kvmppc_set_sprg2(vcpu, regs->sprg2);
 599	kvmppc_set_sprg3(vcpu, regs->sprg3);
 600	kvmppc_set_sprg4(vcpu, regs->sprg4);
 601	kvmppc_set_sprg5(vcpu, regs->sprg5);
 602	kvmppc_set_sprg6(vcpu, regs->sprg6);
 603	kvmppc_set_sprg7(vcpu, regs->sprg7);
 604
 605	for (i = 0; i < ARRAY_SIZE(regs->gpr); i++)
 606		kvmppc_set_gpr(vcpu, i, regs->gpr[i]);
 607
 608	return 0;
 609}
 610
 611int kvm_arch_vcpu_ioctl_get_fpu(struct kvm_vcpu *vcpu, struct kvm_fpu *fpu)
 612{
 613	return -EOPNOTSUPP;
 614}
 615
 616int kvm_arch_vcpu_ioctl_set_fpu(struct kvm_vcpu *vcpu, struct kvm_fpu *fpu)
 617{
 618	return -EOPNOTSUPP;
 619}
 620
 621int kvmppc_get_one_reg(struct kvm_vcpu *vcpu, u64 id,
 622			union kvmppc_one_reg *val)
 623{
 624	int r = 0;
 625	long int i;
 626
 627	r = vcpu->kvm->arch.kvm_ops->get_one_reg(vcpu, id, val);
 628	if (r == -EINVAL) {
 629		r = 0;
 630		switch (id) {
 631		case KVM_REG_PPC_DAR:
 632			*val = get_reg_val(id, kvmppc_get_dar(vcpu));
 633			break;
 634		case KVM_REG_PPC_DSISR:
 635			*val = get_reg_val(id, kvmppc_get_dsisr(vcpu));
 636			break;
 637		case KVM_REG_PPC_FPR0 ... KVM_REG_PPC_FPR31:
 638			i = id - KVM_REG_PPC_FPR0;
 639			*val = get_reg_val(id, kvmppc_get_fpr(vcpu, i));
 640			break;
 641		case KVM_REG_PPC_FPSCR:
 642			*val = get_reg_val(id, kvmppc_get_fpscr(vcpu));
 643			break;
 644#ifdef CONFIG_VSX
 645		case KVM_REG_PPC_VSR0 ... KVM_REG_PPC_VSR31:
 646			if (cpu_has_feature(CPU_FTR_VSX)) {
 647				i = id - KVM_REG_PPC_VSR0;
 648				val->vsxval[0] = kvmppc_get_vsx_fpr(vcpu, i, 0);
 649				val->vsxval[1] = kvmppc_get_vsx_fpr(vcpu, i, 1);
 650			} else {
 651				r = -ENXIO;
 652			}
 653			break;
 654#endif /* CONFIG_VSX */
 655		case KVM_REG_PPC_DEBUG_INST:
 656			*val = get_reg_val(id, INS_TW);
 657			break;
 658#ifdef CONFIG_KVM_XICS
 659		case KVM_REG_PPC_ICP_STATE:
 660			if (!vcpu->arch.icp && !vcpu->arch.xive_vcpu) {
 661				r = -ENXIO;
 662				break;
 663			}
 664			if (xics_on_xive())
 665				*val = get_reg_val(id, kvmppc_xive_get_icp(vcpu));
 666			else
 667				*val = get_reg_val(id, kvmppc_xics_get_icp(vcpu));
 668			break;
 669#endif /* CONFIG_KVM_XICS */
 670#ifdef CONFIG_KVM_XIVE
 671		case KVM_REG_PPC_VP_STATE:
 672			if (!vcpu->arch.xive_vcpu) {
 673				r = -ENXIO;
 674				break;
 675			}
 676			if (xive_enabled())
 677				r = kvmppc_xive_native_get_vp(vcpu, val);
 678			else
 679				r = -ENXIO;
 680			break;
 681#endif /* CONFIG_KVM_XIVE */
 682		case KVM_REG_PPC_FSCR:
 683			*val = get_reg_val(id, vcpu->arch.fscr);
 684			break;
 685		case KVM_REG_PPC_TAR:
 686			*val = get_reg_val(id, kvmppc_get_tar(vcpu));
 687			break;
 688		case KVM_REG_PPC_EBBHR:
 689			*val = get_reg_val(id, kvmppc_get_ebbhr(vcpu));
 690			break;
 691		case KVM_REG_PPC_EBBRR:
 692			*val = get_reg_val(id, kvmppc_get_ebbrr(vcpu));
 693			break;
 694		case KVM_REG_PPC_BESCR:
 695			*val = get_reg_val(id, kvmppc_get_bescr(vcpu));
 696			break;
 697		case KVM_REG_PPC_IC:
 698			*val = get_reg_val(id, kvmppc_get_ic(vcpu));
 699			break;
 700		default:
 701			r = -EINVAL;
 702			break;
 703		}
 704	}
 705
 706	return r;
 707}
 708
 709int kvmppc_set_one_reg(struct kvm_vcpu *vcpu, u64 id,
 710			union kvmppc_one_reg *val)
 711{
 712	int r = 0;
 713	long int i;
 714
 715	r = vcpu->kvm->arch.kvm_ops->set_one_reg(vcpu, id, val);
 716	if (r == -EINVAL) {
 717		r = 0;
 718		switch (id) {
 719		case KVM_REG_PPC_DAR:
 720			kvmppc_set_dar(vcpu, set_reg_val(id, *val));
 721			break;
 722		case KVM_REG_PPC_DSISR:
 723			kvmppc_set_dsisr(vcpu, set_reg_val(id, *val));
 724			break;
 725		case KVM_REG_PPC_FPR0 ... KVM_REG_PPC_FPR31:
 726			i = id - KVM_REG_PPC_FPR0;
 727			kvmppc_set_fpr(vcpu, i, set_reg_val(id, *val));
 728			break;
 729		case KVM_REG_PPC_FPSCR:
 730			vcpu->arch.fp.fpscr = set_reg_val(id, *val);
 731			break;
 732#ifdef CONFIG_VSX
 733		case KVM_REG_PPC_VSR0 ... KVM_REG_PPC_VSR31:
 734			if (cpu_has_feature(CPU_FTR_VSX)) {
 735				i = id - KVM_REG_PPC_VSR0;
 736				kvmppc_set_vsx_fpr(vcpu, i, 0, val->vsxval[0]);
 737				kvmppc_set_vsx_fpr(vcpu, i, 1, val->vsxval[1]);
 738			} else {
 739				r = -ENXIO;
 740			}
 741			break;
 742#endif /* CONFIG_VSX */
 743#ifdef CONFIG_KVM_XICS
 744		case KVM_REG_PPC_ICP_STATE:
 745			if (!vcpu->arch.icp && !vcpu->arch.xive_vcpu) {
 746				r = -ENXIO;
 747				break;
 748			}
 749			if (xics_on_xive())
 750				r = kvmppc_xive_set_icp(vcpu, set_reg_val(id, *val));
 751			else
 752				r = kvmppc_xics_set_icp(vcpu, set_reg_val(id, *val));
 753			break;
 754#endif /* CONFIG_KVM_XICS */
 755#ifdef CONFIG_KVM_XIVE
 756		case KVM_REG_PPC_VP_STATE:
 757			if (!vcpu->arch.xive_vcpu) {
 758				r = -ENXIO;
 759				break;
 760			}
 761			if (xive_enabled())
 762				r = kvmppc_xive_native_set_vp(vcpu, val);
 763			else
 764				r = -ENXIO;
 765			break;
 766#endif /* CONFIG_KVM_XIVE */
 767		case KVM_REG_PPC_FSCR:
 768			kvmppc_set_fpscr(vcpu, set_reg_val(id, *val));
 769			break;
 770		case KVM_REG_PPC_TAR:
 771			kvmppc_set_tar(vcpu, set_reg_val(id, *val));
 772			break;
 773		case KVM_REG_PPC_EBBHR:
 774			kvmppc_set_ebbhr(vcpu, set_reg_val(id, *val));
 775			break;
 776		case KVM_REG_PPC_EBBRR:
 777			kvmppc_set_ebbrr(vcpu, set_reg_val(id, *val));
 778			break;
 779		case KVM_REG_PPC_BESCR:
 780			kvmppc_set_bescr(vcpu, set_reg_val(id, *val));
 781			break;
 782		case KVM_REG_PPC_IC:
 783			kvmppc_set_ic(vcpu, set_reg_val(id, *val));
 784			break;
 785		default:
 786			r = -EINVAL;
 787			break;
 788		}
 789	}
 790
 791	return r;
 792}
 793
 794void kvmppc_core_vcpu_load(struct kvm_vcpu *vcpu, int cpu)
 795{
 796	vcpu->kvm->arch.kvm_ops->vcpu_load(vcpu, cpu);
 797}
 798
 799void kvmppc_core_vcpu_put(struct kvm_vcpu *vcpu)
 800{
 801	vcpu->kvm->arch.kvm_ops->vcpu_put(vcpu);
 802}
 803
 804void kvmppc_set_msr(struct kvm_vcpu *vcpu, u64 msr)
 805{
 806	vcpu->kvm->arch.kvm_ops->set_msr(vcpu, msr);
 807}
 808EXPORT_SYMBOL_GPL(kvmppc_set_msr);
 809
 810int kvmppc_vcpu_run(struct kvm_vcpu *vcpu)
 811{
 812	return vcpu->kvm->arch.kvm_ops->vcpu_run(vcpu);
 813}
 814
 815int kvm_arch_vcpu_ioctl_translate(struct kvm_vcpu *vcpu,
 816                                  struct kvm_translation *tr)
 817{
 818	return 0;
 819}
 820
 821int kvm_arch_vcpu_ioctl_set_guest_debug(struct kvm_vcpu *vcpu,
 822					struct kvm_guest_debug *dbg)
 823{
 824	vcpu_load(vcpu);
 825	vcpu->guest_debug = dbg->control;
 826	vcpu_put(vcpu);
 827	return 0;
 828}
 829
 830void kvmppc_decrementer_func(struct kvm_vcpu *vcpu)
 831{
 832	kvmppc_core_queue_dec(vcpu);
 833	kvm_vcpu_kick(vcpu);
 834}
 835
 836int kvmppc_core_vcpu_create(struct kvm_vcpu *vcpu)
 837{
 838	return vcpu->kvm->arch.kvm_ops->vcpu_create(vcpu);
 839}
 840
 841void kvmppc_core_vcpu_free(struct kvm_vcpu *vcpu)
 842{
 843	vcpu->kvm->arch.kvm_ops->vcpu_free(vcpu);
 844}
 845
 846int kvmppc_core_check_requests(struct kvm_vcpu *vcpu)
 847{
 848	return vcpu->kvm->arch.kvm_ops->check_requests(vcpu);
 849}
 850
 851void kvm_arch_sync_dirty_log(struct kvm *kvm, struct kvm_memory_slot *memslot)
 852{
 853
 854}
 855
 856int kvm_vm_ioctl_get_dirty_log(struct kvm *kvm, struct kvm_dirty_log *log)
 
 857{
 858	return kvm->arch.kvm_ops->get_dirty_log(kvm, log);
 859}
 860
 861void kvmppc_core_free_memslot(struct kvm *kvm, struct kvm_memory_slot *slot)
 
 862{
 863	kvm->arch.kvm_ops->free_memslot(slot);
 864}
 865
 866void kvmppc_core_flush_memslot(struct kvm *kvm, struct kvm_memory_slot *memslot)
 867{
 868	kvm->arch.kvm_ops->flush_memslot(kvm, memslot);
 869}
 870
 871int kvmppc_core_prepare_memory_region(struct kvm *kvm,
 872				      const struct kvm_memory_slot *old,
 873				      struct kvm_memory_slot *new,
 874				      enum kvm_mr_change change)
 875{
 876	return kvm->arch.kvm_ops->prepare_memory_region(kvm, old, new, change);
 877}
 878
 879void kvmppc_core_commit_memory_region(struct kvm *kvm,
 880				struct kvm_memory_slot *old,
 
 881				const struct kvm_memory_slot *new,
 882				enum kvm_mr_change change)
 883{
 884	kvm->arch.kvm_ops->commit_memory_region(kvm, old, new, change);
 
 
 
 
 
 885}
 886
 887bool kvm_unmap_gfn_range(struct kvm *kvm, struct kvm_gfn_range *range)
 888{
 889	return kvm->arch.kvm_ops->unmap_gfn_range(kvm, range);
 890}
 891
 892bool kvm_age_gfn(struct kvm *kvm, struct kvm_gfn_range *range)
 893{
 894	return kvm->arch.kvm_ops->age_gfn(kvm, range);
 895}
 896
 897bool kvm_test_age_gfn(struct kvm *kvm, struct kvm_gfn_range *range)
 898{
 899	return kvm->arch.kvm_ops->test_age_gfn(kvm, range);
 
 900}
 901
 902bool kvm_set_spte_gfn(struct kvm *kvm, struct kvm_gfn_range *range)
 903{
 904	return kvm->arch.kvm_ops->set_spte_gfn(kvm, range);
 905}
 906
 907int kvmppc_core_init_vm(struct kvm *kvm)
 908{
 909
 910#ifdef CONFIG_PPC64
 911	INIT_LIST_HEAD_RCU(&kvm->arch.spapr_tce_tables);
 912	INIT_LIST_HEAD(&kvm->arch.rtas_tokens);
 913	mutex_init(&kvm->arch.rtas_token_lock);
 914#endif
 915
 916	return kvm->arch.kvm_ops->init_vm(kvm);
 917}
 918
 919void kvmppc_core_destroy_vm(struct kvm *kvm)
 920{
 921	kvm->arch.kvm_ops->destroy_vm(kvm);
 922
 923#ifdef CONFIG_PPC64
 924	kvmppc_rtas_tokens_free(kvm);
 925	WARN_ON(!list_empty(&kvm->arch.spapr_tce_tables));
 926#endif
 927
 928#ifdef CONFIG_KVM_XICS
 929	/*
 930	 * Free the XIVE and XICS devices which are not directly freed by the
 931	 * device 'release' method
 932	 */
 933	kfree(kvm->arch.xive_devices.native);
 934	kvm->arch.xive_devices.native = NULL;
 935	kfree(kvm->arch.xive_devices.xics_on_xive);
 936	kvm->arch.xive_devices.xics_on_xive = NULL;
 937	kfree(kvm->arch.xics_device);
 938	kvm->arch.xics_device = NULL;
 939#endif /* CONFIG_KVM_XICS */
 940}
 941
 942int kvmppc_h_logical_ci_load(struct kvm_vcpu *vcpu)
 943{
 944	unsigned long size = kvmppc_get_gpr(vcpu, 4);
 945	unsigned long addr = kvmppc_get_gpr(vcpu, 5);
 946	u64 buf;
 947	int srcu_idx;
 948	int ret;
 949
 950	if (!is_power_of_2(size) || (size > sizeof(buf)))
 951		return H_TOO_HARD;
 952
 953	srcu_idx = srcu_read_lock(&vcpu->kvm->srcu);
 954	ret = kvm_io_bus_read(vcpu, KVM_MMIO_BUS, addr, size, &buf);
 955	srcu_read_unlock(&vcpu->kvm->srcu, srcu_idx);
 956	if (ret != 0)
 957		return H_TOO_HARD;
 958
 959	switch (size) {
 960	case 1:
 961		kvmppc_set_gpr(vcpu, 4, *(u8 *)&buf);
 962		break;
 963
 964	case 2:
 965		kvmppc_set_gpr(vcpu, 4, be16_to_cpu(*(__be16 *)&buf));
 966		break;
 967
 968	case 4:
 969		kvmppc_set_gpr(vcpu, 4, be32_to_cpu(*(__be32 *)&buf));
 970		break;
 971
 972	case 8:
 973		kvmppc_set_gpr(vcpu, 4, be64_to_cpu(*(__be64 *)&buf));
 974		break;
 975
 976	default:
 977		BUG();
 978	}
 979
 980	return H_SUCCESS;
 981}
 982EXPORT_SYMBOL_GPL(kvmppc_h_logical_ci_load);
 983
 984int kvmppc_h_logical_ci_store(struct kvm_vcpu *vcpu)
 985{
 986	unsigned long size = kvmppc_get_gpr(vcpu, 4);
 987	unsigned long addr = kvmppc_get_gpr(vcpu, 5);
 988	unsigned long val = kvmppc_get_gpr(vcpu, 6);
 989	u64 buf;
 990	int srcu_idx;
 991	int ret;
 992
 993	switch (size) {
 994	case 1:
 995		*(u8 *)&buf = val;
 996		break;
 997
 998	case 2:
 999		*(__be16 *)&buf = cpu_to_be16(val);
1000		break;
1001
1002	case 4:
1003		*(__be32 *)&buf = cpu_to_be32(val);
1004		break;
1005
1006	case 8:
1007		*(__be64 *)&buf = cpu_to_be64(val);
1008		break;
1009
1010	default:
1011		return H_TOO_HARD;
1012	}
1013
1014	srcu_idx = srcu_read_lock(&vcpu->kvm->srcu);
1015	ret = kvm_io_bus_write(vcpu, KVM_MMIO_BUS, addr, size, &buf);
1016	srcu_read_unlock(&vcpu->kvm->srcu, srcu_idx);
1017	if (ret != 0)
1018		return H_TOO_HARD;
1019
1020	return H_SUCCESS;
1021}
1022EXPORT_SYMBOL_GPL(kvmppc_h_logical_ci_store);
1023
 
 
 
 
 
 
 
 
 
 
1024int kvmppc_book3s_hcall_implemented(struct kvm *kvm, unsigned long hcall)
1025{
1026	return kvm->arch.kvm_ops->hcall_implemented(hcall);
1027}
1028
1029#ifdef CONFIG_KVM_XICS
1030int kvm_set_irq(struct kvm *kvm, int irq_source_id, u32 irq, int level,
1031		bool line_status)
1032{
1033	if (xics_on_xive())
1034		return kvmppc_xive_set_irq(kvm, irq_source_id, irq, level,
1035					   line_status);
1036	else
1037		return kvmppc_xics_set_irq(kvm, irq_source_id, irq, level,
1038					   line_status);
1039}
1040
1041int kvm_arch_set_irq_inatomic(struct kvm_kernel_irq_routing_entry *irq_entry,
1042			      struct kvm *kvm, int irq_source_id,
1043			      int level, bool line_status)
1044{
1045	return kvm_set_irq(kvm, irq_source_id, irq_entry->gsi,
1046			   level, line_status);
1047}
1048static int kvmppc_book3s_set_irq(struct kvm_kernel_irq_routing_entry *e,
1049				 struct kvm *kvm, int irq_source_id, int level,
1050				 bool line_status)
1051{
1052	return kvm_set_irq(kvm, irq_source_id, e->gsi, level, line_status);
1053}
1054
1055int kvm_irq_map_gsi(struct kvm *kvm,
1056		    struct kvm_kernel_irq_routing_entry *entries, int gsi)
1057{
1058	entries->gsi = gsi;
1059	entries->type = KVM_IRQ_ROUTING_IRQCHIP;
1060	entries->set = kvmppc_book3s_set_irq;
1061	entries->irqchip.irqchip = 0;
1062	entries->irqchip.pin = gsi;
1063	return 1;
1064}
1065
1066int kvm_irq_map_chip_pin(struct kvm *kvm, unsigned irqchip, unsigned pin)
1067{
1068	return pin;
1069}
1070
1071#endif /* CONFIG_KVM_XICS */
1072
1073static int kvmppc_book3s_init(void)
1074{
1075	int r;
1076
1077	r = kvm_init(sizeof(struct kvm_vcpu), 0, THIS_MODULE);
1078	if (r)
1079		return r;
1080#ifdef CONFIG_KVM_BOOK3S_32_HANDLER
1081	r = kvmppc_book3s_init_pr();
1082#endif
1083
1084#ifdef CONFIG_KVM_XICS
1085#ifdef CONFIG_KVM_XIVE
1086	if (xics_on_xive()) {
 
1087		kvm_register_device_ops(&kvm_xive_ops, KVM_DEV_TYPE_XICS);
1088		if (kvmppc_xive_native_supported())
 
1089			kvm_register_device_ops(&kvm_xive_native_ops,
1090						KVM_DEV_TYPE_XIVE);
 
1091	} else
1092#endif
1093		kvm_register_device_ops(&kvm_xics_ops, KVM_DEV_TYPE_XICS);
1094#endif
1095	return r;
1096}
1097
1098static void kvmppc_book3s_exit(void)
1099{
 
 
 
 
 
 
1100#ifdef CONFIG_KVM_BOOK3S_32_HANDLER
1101	kvmppc_book3s_exit_pr();
1102#endif
1103	kvm_exit();
1104}
1105
1106module_init(kvmppc_book3s_init);
1107module_exit(kvmppc_book3s_exit);
1108
1109/* On 32bit this is our one and only kernel module */
1110#ifdef CONFIG_KVM_BOOK3S_32_HANDLER
1111MODULE_ALIAS_MISCDEV(KVM_MINOR);
1112MODULE_ALIAS("devname:kvm");
1113#endif
v5.4
   1// SPDX-License-Identifier: GPL-2.0-only
   2/*
   3 * Copyright (C) 2009. SUSE Linux Products GmbH. All rights reserved.
   4 *
   5 * Authors:
   6 *    Alexander Graf <agraf@suse.de>
   7 *    Kevin Wolf <mail@kevin-wolf.de>
   8 *
   9 * Description:
  10 * This file is derived from arch/powerpc/kvm/44x.c,
  11 * by Hollis Blanchard <hollisb@us.ibm.com>.
  12 */
  13
  14#include <linux/kvm_host.h>
  15#include <linux/err.h>
  16#include <linux/export.h>
  17#include <linux/slab.h>
  18#include <linux/module.h>
  19#include <linux/miscdevice.h>
  20#include <linux/gfp.h>
  21#include <linux/sched.h>
  22#include <linux/vmalloc.h>
  23#include <linux/highmem.h>
  24
  25#include <asm/reg.h>
  26#include <asm/cputable.h>
  27#include <asm/cacheflush.h>
  28#include <linux/uaccess.h>
  29#include <asm/io.h>
  30#include <asm/kvm_ppc.h>
  31#include <asm/kvm_book3s.h>
  32#include <asm/mmu_context.h>
  33#include <asm/page.h>
  34#include <asm/xive.h>
  35
  36#include "book3s.h"
  37#include "trace.h"
  38
  39#define VM_STAT(x, ...) offsetof(struct kvm, stat.x), KVM_STAT_VM, ## __VA_ARGS__
  40#define VCPU_STAT(x, ...) offsetof(struct kvm_vcpu, stat.x), KVM_STAT_VCPU, ## __VA_ARGS__
  41
  42/* #define EXIT_DEBUG */
 
 
 
 
  43
  44struct kvm_stats_debugfs_item debugfs_entries[] = {
  45	{ "exits",       VCPU_STAT(sum_exits) },
  46	{ "mmio",        VCPU_STAT(mmio_exits) },
  47	{ "sig",         VCPU_STAT(signal_exits) },
  48	{ "sysc",        VCPU_STAT(syscall_exits) },
  49	{ "inst_emu",    VCPU_STAT(emulated_inst_exits) },
  50	{ "dec",         VCPU_STAT(dec_exits) },
  51	{ "ext_intr",    VCPU_STAT(ext_intr_exits) },
  52	{ "queue_intr",  VCPU_STAT(queue_intr) },
  53	{ "halt_poll_success_ns",	VCPU_STAT(halt_poll_success_ns) },
  54	{ "halt_poll_fail_ns",		VCPU_STAT(halt_poll_fail_ns) },
  55	{ "halt_wait_ns",		VCPU_STAT(halt_wait_ns) },
  56	{ "halt_successful_poll", VCPU_STAT(halt_successful_poll), },
  57	{ "halt_attempted_poll", VCPU_STAT(halt_attempted_poll), },
  58	{ "halt_successful_wait",	VCPU_STAT(halt_successful_wait) },
  59	{ "halt_poll_invalid", VCPU_STAT(halt_poll_invalid) },
  60	{ "halt_wakeup", VCPU_STAT(halt_wakeup) },
  61	{ "pf_storage",  VCPU_STAT(pf_storage) },
  62	{ "sp_storage",  VCPU_STAT(sp_storage) },
  63	{ "pf_instruc",  VCPU_STAT(pf_instruc) },
  64	{ "sp_instruc",  VCPU_STAT(sp_instruc) },
  65	{ "ld",          VCPU_STAT(ld) },
  66	{ "ld_slow",     VCPU_STAT(ld_slow) },
  67	{ "st",          VCPU_STAT(st) },
  68	{ "st_slow",     VCPU_STAT(st_slow) },
  69	{ "pthru_all",       VCPU_STAT(pthru_all) },
  70	{ "pthru_host",      VCPU_STAT(pthru_host) },
  71	{ "pthru_bad_aff",   VCPU_STAT(pthru_bad_aff) },
  72	{ "largepages_2M",    VM_STAT(num_2M_pages, .mode = 0444) },
  73	{ "largepages_1G",    VM_STAT(num_1G_pages, .mode = 0444) },
  74	{ NULL }
  75};
  76
  77void kvmppc_unfixup_split_real(struct kvm_vcpu *vcpu)
  78{
  79	if (vcpu->arch.hflags & BOOK3S_HFLAG_SPLIT_HACK) {
  80		ulong pc = kvmppc_get_pc(vcpu);
  81		ulong lr = kvmppc_get_lr(vcpu);
  82		if ((pc & SPLIT_HACK_MASK) == SPLIT_HACK_OFFS)
  83			kvmppc_set_pc(vcpu, pc & ~SPLIT_HACK_MASK);
  84		if ((lr & SPLIT_HACK_MASK) == SPLIT_HACK_OFFS)
  85			kvmppc_set_lr(vcpu, lr & ~SPLIT_HACK_MASK);
  86		vcpu->arch.hflags &= ~BOOK3S_HFLAG_SPLIT_HACK;
  87	}
  88}
  89EXPORT_SYMBOL_GPL(kvmppc_unfixup_split_real);
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
  90
  91static inline unsigned long kvmppc_interrupt_offset(struct kvm_vcpu *vcpu)
  92{
  93	if (!is_kvmppc_hv_enabled(vcpu->kvm))
  94		return to_book3s(vcpu)->hior;
  95	return 0;
  96}
 
 
  97
  98static inline void kvmppc_update_int_pending(struct kvm_vcpu *vcpu,
  99			unsigned long pending_now, unsigned long old_pending)
 100{
 101	if (is_kvmppc_hv_enabled(vcpu->kvm))
 102		return;
 103	if (pending_now)
 104		kvmppc_set_int_pending(vcpu, 1);
 105	else if (old_pending)
 106		kvmppc_set_int_pending(vcpu, 0);
 107}
 108
 109static inline bool kvmppc_critical_section(struct kvm_vcpu *vcpu)
 110{
 111	ulong crit_raw;
 112	ulong crit_r1;
 113	bool crit;
 114
 115	if (is_kvmppc_hv_enabled(vcpu->kvm))
 116		return false;
 117
 118	crit_raw = kvmppc_get_critical(vcpu);
 119	crit_r1 = kvmppc_get_gpr(vcpu, 1);
 120
 121	/* Truncate crit indicators in 32 bit mode */
 122	if (!(kvmppc_get_msr(vcpu) & MSR_SF)) {
 123		crit_raw &= 0xffffffff;
 124		crit_r1 &= 0xffffffff;
 125	}
 126
 127	/* Critical section when crit == r1 */
 128	crit = (crit_raw == crit_r1);
 129	/* ... and we're in supervisor mode */
 130	crit = crit && !(kvmppc_get_msr(vcpu) & MSR_PR);
 131
 132	return crit;
 133}
 134
 135void kvmppc_inject_interrupt(struct kvm_vcpu *vcpu, int vec, u64 flags)
 136{
 137	kvmppc_unfixup_split_real(vcpu);
 138	kvmppc_set_srr0(vcpu, kvmppc_get_pc(vcpu));
 139	kvmppc_set_srr1(vcpu, (kvmppc_get_msr(vcpu) & ~0x783f0000ul) | flags);
 140	kvmppc_set_pc(vcpu, kvmppc_interrupt_offset(vcpu) + vec);
 141	vcpu->arch.mmu.reset_msr(vcpu);
 142}
 143
 144static int kvmppc_book3s_vec2irqprio(unsigned int vec)
 145{
 146	unsigned int prio;
 147
 148	switch (vec) {
 149	case 0x100: prio = BOOK3S_IRQPRIO_SYSTEM_RESET;		break;
 150	case 0x200: prio = BOOK3S_IRQPRIO_MACHINE_CHECK;	break;
 151	case 0x300: prio = BOOK3S_IRQPRIO_DATA_STORAGE;		break;
 152	case 0x380: prio = BOOK3S_IRQPRIO_DATA_SEGMENT;		break;
 153	case 0x400: prio = BOOK3S_IRQPRIO_INST_STORAGE;		break;
 154	case 0x480: prio = BOOK3S_IRQPRIO_INST_SEGMENT;		break;
 155	case 0x500: prio = BOOK3S_IRQPRIO_EXTERNAL;		break;
 156	case 0x600: prio = BOOK3S_IRQPRIO_ALIGNMENT;		break;
 157	case 0x700: prio = BOOK3S_IRQPRIO_PROGRAM;		break;
 158	case 0x800: prio = BOOK3S_IRQPRIO_FP_UNAVAIL;		break;
 159	case 0x900: prio = BOOK3S_IRQPRIO_DECREMENTER;		break;
 160	case 0xc00: prio = BOOK3S_IRQPRIO_SYSCALL;		break;
 161	case 0xd00: prio = BOOK3S_IRQPRIO_DEBUG;		break;
 162	case 0xf20: prio = BOOK3S_IRQPRIO_ALTIVEC;		break;
 163	case 0xf40: prio = BOOK3S_IRQPRIO_VSX;			break;
 164	case 0xf60: prio = BOOK3S_IRQPRIO_FAC_UNAVAIL;		break;
 165	default:    prio = BOOK3S_IRQPRIO_MAX;			break;
 166	}
 167
 168	return prio;
 169}
 170
 171void kvmppc_book3s_dequeue_irqprio(struct kvm_vcpu *vcpu,
 172					  unsigned int vec)
 173{
 174	unsigned long old_pending = vcpu->arch.pending_exceptions;
 175
 176	clear_bit(kvmppc_book3s_vec2irqprio(vec),
 177		  &vcpu->arch.pending_exceptions);
 178
 179	kvmppc_update_int_pending(vcpu, vcpu->arch.pending_exceptions,
 180				  old_pending);
 181}
 182
 183void kvmppc_book3s_queue_irqprio(struct kvm_vcpu *vcpu, unsigned int vec)
 184{
 185	vcpu->stat.queue_intr++;
 186
 187	set_bit(kvmppc_book3s_vec2irqprio(vec),
 188		&vcpu->arch.pending_exceptions);
 189#ifdef EXIT_DEBUG
 190	printk(KERN_INFO "Queueing interrupt %x\n", vec);
 191#endif
 192}
 193EXPORT_SYMBOL_GPL(kvmppc_book3s_queue_irqprio);
 194
 195void kvmppc_core_queue_machine_check(struct kvm_vcpu *vcpu, ulong flags)
 196{
 197	/* might as well deliver this straight away */
 198	kvmppc_inject_interrupt(vcpu, BOOK3S_INTERRUPT_MACHINE_CHECK, flags);
 199}
 200EXPORT_SYMBOL_GPL(kvmppc_core_queue_machine_check);
 201
 202void kvmppc_core_queue_program(struct kvm_vcpu *vcpu, ulong flags)
 
 
 
 
 
 
 203{
 204	/* might as well deliver this straight away */
 205	kvmppc_inject_interrupt(vcpu, BOOK3S_INTERRUPT_PROGRAM, flags);
 206}
 207EXPORT_SYMBOL_GPL(kvmppc_core_queue_program);
 208
 209void kvmppc_core_queue_fpunavail(struct kvm_vcpu *vcpu)
 210{
 211	/* might as well deliver this straight away */
 212	kvmppc_inject_interrupt(vcpu, BOOK3S_INTERRUPT_FP_UNAVAIL, 0);
 213}
 214
 215void kvmppc_core_queue_vec_unavail(struct kvm_vcpu *vcpu)
 216{
 217	/* might as well deliver this straight away */
 218	kvmppc_inject_interrupt(vcpu, BOOK3S_INTERRUPT_ALTIVEC, 0);
 219}
 220
 221void kvmppc_core_queue_vsx_unavail(struct kvm_vcpu *vcpu)
 222{
 223	/* might as well deliver this straight away */
 224	kvmppc_inject_interrupt(vcpu, BOOK3S_INTERRUPT_VSX, 0);
 225}
 226
 227void kvmppc_core_queue_dec(struct kvm_vcpu *vcpu)
 228{
 229	kvmppc_book3s_queue_irqprio(vcpu, BOOK3S_INTERRUPT_DECREMENTER);
 230}
 231EXPORT_SYMBOL_GPL(kvmppc_core_queue_dec);
 232
 233int kvmppc_core_pending_dec(struct kvm_vcpu *vcpu)
 234{
 235	return test_bit(BOOK3S_IRQPRIO_DECREMENTER, &vcpu->arch.pending_exceptions);
 236}
 237EXPORT_SYMBOL_GPL(kvmppc_core_pending_dec);
 238
 239void kvmppc_core_dequeue_dec(struct kvm_vcpu *vcpu)
 240{
 241	kvmppc_book3s_dequeue_irqprio(vcpu, BOOK3S_INTERRUPT_DECREMENTER);
 242}
 243EXPORT_SYMBOL_GPL(kvmppc_core_dequeue_dec);
 244
 245void kvmppc_core_queue_external(struct kvm_vcpu *vcpu,
 246                                struct kvm_interrupt *irq)
 247{
 248	/*
 249	 * This case (KVM_INTERRUPT_SET) should never actually arise for
 250	 * a pseries guest (because pseries guests expect their interrupt
 251	 * controllers to continue asserting an external interrupt request
 252	 * until it is acknowledged at the interrupt controller), but is
 253	 * included to avoid ABI breakage and potentially for other
 254	 * sorts of guest.
 255	 *
 256	 * There is a subtlety here: HV KVM does not test the
 257	 * external_oneshot flag in the code that synthesizes
 258	 * external interrupts for the guest just before entering
 259	 * the guest.  That is OK even if userspace did do a
 260	 * KVM_INTERRUPT_SET on a pseries guest vcpu, because the
 261	 * caller (kvm_vcpu_ioctl_interrupt) does a kvm_vcpu_kick()
 262	 * which ends up doing a smp_send_reschedule(), which will
 263	 * pull the guest all the way out to the host, meaning that
 264	 * we will call kvmppc_core_prepare_to_enter() before entering
 265	 * the guest again, and that will handle the external_oneshot
 266	 * flag correctly.
 267	 */
 268	if (irq->irq == KVM_INTERRUPT_SET)
 269		vcpu->arch.external_oneshot = 1;
 270
 271	kvmppc_book3s_queue_irqprio(vcpu, BOOK3S_INTERRUPT_EXTERNAL);
 272}
 273
 274void kvmppc_core_dequeue_external(struct kvm_vcpu *vcpu)
 275{
 276	kvmppc_book3s_dequeue_irqprio(vcpu, BOOK3S_INTERRUPT_EXTERNAL);
 277}
 278
 279void kvmppc_core_queue_data_storage(struct kvm_vcpu *vcpu, ulong dar,
 280				    ulong flags)
 281{
 282	kvmppc_set_dar(vcpu, dar);
 283	kvmppc_set_dsisr(vcpu, flags);
 284	kvmppc_inject_interrupt(vcpu, BOOK3S_INTERRUPT_DATA_STORAGE, 0);
 285}
 286EXPORT_SYMBOL_GPL(kvmppc_core_queue_data_storage);
 287
 288void kvmppc_core_queue_inst_storage(struct kvm_vcpu *vcpu, ulong flags)
 289{
 290	kvmppc_inject_interrupt(vcpu, BOOK3S_INTERRUPT_INST_STORAGE, flags);
 291}
 292EXPORT_SYMBOL_GPL(kvmppc_core_queue_inst_storage);
 293
 294static int kvmppc_book3s_irqprio_deliver(struct kvm_vcpu *vcpu,
 295					 unsigned int priority)
 296{
 297	int deliver = 1;
 298	int vec = 0;
 299	bool crit = kvmppc_critical_section(vcpu);
 300
 301	switch (priority) {
 302	case BOOK3S_IRQPRIO_DECREMENTER:
 303		deliver = (kvmppc_get_msr(vcpu) & MSR_EE) && !crit;
 304		vec = BOOK3S_INTERRUPT_DECREMENTER;
 305		break;
 306	case BOOK3S_IRQPRIO_EXTERNAL:
 307		deliver = (kvmppc_get_msr(vcpu) & MSR_EE) && !crit;
 308		vec = BOOK3S_INTERRUPT_EXTERNAL;
 309		break;
 310	case BOOK3S_IRQPRIO_SYSTEM_RESET:
 311		vec = BOOK3S_INTERRUPT_SYSTEM_RESET;
 312		break;
 313	case BOOK3S_IRQPRIO_MACHINE_CHECK:
 314		vec = BOOK3S_INTERRUPT_MACHINE_CHECK;
 315		break;
 316	case BOOK3S_IRQPRIO_DATA_STORAGE:
 317		vec = BOOK3S_INTERRUPT_DATA_STORAGE;
 318		break;
 319	case BOOK3S_IRQPRIO_INST_STORAGE:
 320		vec = BOOK3S_INTERRUPT_INST_STORAGE;
 321		break;
 322	case BOOK3S_IRQPRIO_DATA_SEGMENT:
 323		vec = BOOK3S_INTERRUPT_DATA_SEGMENT;
 324		break;
 325	case BOOK3S_IRQPRIO_INST_SEGMENT:
 326		vec = BOOK3S_INTERRUPT_INST_SEGMENT;
 327		break;
 328	case BOOK3S_IRQPRIO_ALIGNMENT:
 329		vec = BOOK3S_INTERRUPT_ALIGNMENT;
 330		break;
 331	case BOOK3S_IRQPRIO_PROGRAM:
 332		vec = BOOK3S_INTERRUPT_PROGRAM;
 333		break;
 334	case BOOK3S_IRQPRIO_VSX:
 335		vec = BOOK3S_INTERRUPT_VSX;
 336		break;
 337	case BOOK3S_IRQPRIO_ALTIVEC:
 338		vec = BOOK3S_INTERRUPT_ALTIVEC;
 339		break;
 340	case BOOK3S_IRQPRIO_FP_UNAVAIL:
 341		vec = BOOK3S_INTERRUPT_FP_UNAVAIL;
 342		break;
 343	case BOOK3S_IRQPRIO_SYSCALL:
 344		vec = BOOK3S_INTERRUPT_SYSCALL;
 345		break;
 346	case BOOK3S_IRQPRIO_DEBUG:
 347		vec = BOOK3S_INTERRUPT_TRACE;
 348		break;
 349	case BOOK3S_IRQPRIO_PERFORMANCE_MONITOR:
 350		vec = BOOK3S_INTERRUPT_PERFMON;
 351		break;
 352	case BOOK3S_IRQPRIO_FAC_UNAVAIL:
 353		vec = BOOK3S_INTERRUPT_FAC_UNAVAIL;
 354		break;
 355	default:
 356		deliver = 0;
 357		printk(KERN_ERR "KVM: Unknown interrupt: 0x%x\n", priority);
 358		break;
 359	}
 360
 361#if 0
 362	printk(KERN_INFO "Deliver interrupt 0x%x? %x\n", vec, deliver);
 363#endif
 364
 365	if (deliver)
 366		kvmppc_inject_interrupt(vcpu, vec, 0);
 367
 368	return deliver;
 369}
 370
 371/*
 372 * This function determines if an irqprio should be cleared once issued.
 373 */
 374static bool clear_irqprio(struct kvm_vcpu *vcpu, unsigned int priority)
 375{
 376	switch (priority) {
 377		case BOOK3S_IRQPRIO_DECREMENTER:
 378			/* DEC interrupts get cleared by mtdec */
 379			return false;
 380		case BOOK3S_IRQPRIO_EXTERNAL:
 381			/*
 382			 * External interrupts get cleared by userspace
 383			 * except when set by the KVM_INTERRUPT ioctl with
 384			 * KVM_INTERRUPT_SET (not KVM_INTERRUPT_SET_LEVEL).
 385			 */
 386			if (vcpu->arch.external_oneshot) {
 387				vcpu->arch.external_oneshot = 0;
 388				return true;
 389			}
 390			return false;
 391	}
 392
 393	return true;
 394}
 395
 396int kvmppc_core_prepare_to_enter(struct kvm_vcpu *vcpu)
 397{
 398	unsigned long *pending = &vcpu->arch.pending_exceptions;
 399	unsigned long old_pending = vcpu->arch.pending_exceptions;
 400	unsigned int priority;
 401
 402#ifdef EXIT_DEBUG
 403	if (vcpu->arch.pending_exceptions)
 404		printk(KERN_EMERG "KVM: Check pending: %lx\n", vcpu->arch.pending_exceptions);
 405#endif
 406	priority = __ffs(*pending);
 407	while (priority < BOOK3S_IRQPRIO_MAX) {
 408		if (kvmppc_book3s_irqprio_deliver(vcpu, priority) &&
 409		    clear_irqprio(vcpu, priority)) {
 410			clear_bit(priority, &vcpu->arch.pending_exceptions);
 411			break;
 412		}
 413
 414		priority = find_next_bit(pending,
 415					 BITS_PER_BYTE * sizeof(*pending),
 416					 priority + 1);
 417	}
 418
 419	/* Tell the guest about our interrupt status */
 420	kvmppc_update_int_pending(vcpu, *pending, old_pending);
 421
 422	return 0;
 423}
 424EXPORT_SYMBOL_GPL(kvmppc_core_prepare_to_enter);
 425
 426kvm_pfn_t kvmppc_gpa_to_pfn(struct kvm_vcpu *vcpu, gpa_t gpa, bool writing,
 427			bool *writable)
 428{
 429	ulong mp_pa = vcpu->arch.magic_page_pa & KVM_PAM;
 430	gfn_t gfn = gpa >> PAGE_SHIFT;
 431
 432	if (!(kvmppc_get_msr(vcpu) & MSR_SF))
 433		mp_pa = (uint32_t)mp_pa;
 434
 435	/* Magic page override */
 436	gpa &= ~0xFFFULL;
 437	if (unlikely(mp_pa) && unlikely((gpa & KVM_PAM) == mp_pa)) {
 438		ulong shared_page = ((ulong)vcpu->arch.shared) & PAGE_MASK;
 439		kvm_pfn_t pfn;
 440
 441		pfn = (kvm_pfn_t)virt_to_phys((void*)shared_page) >> PAGE_SHIFT;
 442		get_page(pfn_to_page(pfn));
 443		if (writable)
 444			*writable = true;
 445		return pfn;
 446	}
 447
 448	return gfn_to_pfn_prot(vcpu->kvm, gfn, writing, writable);
 449}
 450EXPORT_SYMBOL_GPL(kvmppc_gpa_to_pfn);
 451
 452int kvmppc_xlate(struct kvm_vcpu *vcpu, ulong eaddr, enum xlate_instdata xlid,
 453		 enum xlate_readwrite xlrw, struct kvmppc_pte *pte)
 454{
 455	bool data = (xlid == XLATE_DATA);
 456	bool iswrite = (xlrw == XLATE_WRITE);
 457	int relocated = (kvmppc_get_msr(vcpu) & (data ? MSR_DR : MSR_IR));
 458	int r;
 459
 460	if (relocated) {
 461		r = vcpu->arch.mmu.xlate(vcpu, eaddr, pte, data, iswrite);
 462	} else {
 463		pte->eaddr = eaddr;
 464		pte->raddr = eaddr & KVM_PAM;
 465		pte->vpage = VSID_REAL | eaddr >> 12;
 466		pte->may_read = true;
 467		pte->may_write = true;
 468		pte->may_execute = true;
 469		r = 0;
 470
 471		if ((kvmppc_get_msr(vcpu) & (MSR_IR | MSR_DR)) == MSR_DR &&
 472		    !data) {
 473			if ((vcpu->arch.hflags & BOOK3S_HFLAG_SPLIT_HACK) &&
 474			    ((eaddr & SPLIT_HACK_MASK) == SPLIT_HACK_OFFS))
 475			pte->raddr &= ~SPLIT_HACK_MASK;
 476		}
 477	}
 478
 479	return r;
 480}
 481
 
 
 
 
 
 
 
 
 482int kvmppc_load_last_inst(struct kvm_vcpu *vcpu,
 483		enum instruction_fetch_type type, u32 *inst)
 484{
 485	ulong pc = kvmppc_get_pc(vcpu);
 486	int r;
 
 487
 488	if (type == INST_SC)
 489		pc -= 4;
 490
 491	r = kvmppc_ld(vcpu, &pc, sizeof(u32), inst, false);
 492	if (r == EMULATE_DONE)
 493		return r;
 494	else
 495		return EMULATE_AGAIN;
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 496}
 497EXPORT_SYMBOL_GPL(kvmppc_load_last_inst);
 498
 499int kvm_arch_vcpu_setup(struct kvm_vcpu *vcpu)
 500{
 501	return 0;
 502}
 503
 504int kvmppc_subarch_vcpu_init(struct kvm_vcpu *vcpu)
 505{
 506	return 0;
 507}
 508
 509void kvmppc_subarch_vcpu_uninit(struct kvm_vcpu *vcpu)
 510{
 511}
 512
 513int kvm_arch_vcpu_ioctl_get_sregs(struct kvm_vcpu *vcpu,
 514				  struct kvm_sregs *sregs)
 515{
 516	int ret;
 517
 518	vcpu_load(vcpu);
 519	ret = vcpu->kvm->arch.kvm_ops->get_sregs(vcpu, sregs);
 520	vcpu_put(vcpu);
 521
 522	return ret;
 523}
 524
 525int kvm_arch_vcpu_ioctl_set_sregs(struct kvm_vcpu *vcpu,
 526				  struct kvm_sregs *sregs)
 527{
 528	int ret;
 529
 530	vcpu_load(vcpu);
 531	ret = vcpu->kvm->arch.kvm_ops->set_sregs(vcpu, sregs);
 532	vcpu_put(vcpu);
 533
 534	return ret;
 535}
 536
 537int kvm_arch_vcpu_ioctl_get_regs(struct kvm_vcpu *vcpu, struct kvm_regs *regs)
 538{
 539	int i;
 540
 541	regs->pc = kvmppc_get_pc(vcpu);
 542	regs->cr = kvmppc_get_cr(vcpu);
 543	regs->ctr = kvmppc_get_ctr(vcpu);
 544	regs->lr = kvmppc_get_lr(vcpu);
 545	regs->xer = kvmppc_get_xer(vcpu);
 546	regs->msr = kvmppc_get_msr(vcpu);
 547	regs->srr0 = kvmppc_get_srr0(vcpu);
 548	regs->srr1 = kvmppc_get_srr1(vcpu);
 549	regs->pid = vcpu->arch.pid;
 550	regs->sprg0 = kvmppc_get_sprg0(vcpu);
 551	regs->sprg1 = kvmppc_get_sprg1(vcpu);
 552	regs->sprg2 = kvmppc_get_sprg2(vcpu);
 553	regs->sprg3 = kvmppc_get_sprg3(vcpu);
 554	regs->sprg4 = kvmppc_get_sprg4(vcpu);
 555	regs->sprg5 = kvmppc_get_sprg5(vcpu);
 556	regs->sprg6 = kvmppc_get_sprg6(vcpu);
 557	regs->sprg7 = kvmppc_get_sprg7(vcpu);
 558
 559	for (i = 0; i < ARRAY_SIZE(regs->gpr); i++)
 560		regs->gpr[i] = kvmppc_get_gpr(vcpu, i);
 561
 562	return 0;
 563}
 564
 565int kvm_arch_vcpu_ioctl_set_regs(struct kvm_vcpu *vcpu, struct kvm_regs *regs)
 566{
 567	int i;
 568
 569	kvmppc_set_pc(vcpu, regs->pc);
 570	kvmppc_set_cr(vcpu, regs->cr);
 571	kvmppc_set_ctr(vcpu, regs->ctr);
 572	kvmppc_set_lr(vcpu, regs->lr);
 573	kvmppc_set_xer(vcpu, regs->xer);
 574	kvmppc_set_msr(vcpu, regs->msr);
 575	kvmppc_set_srr0(vcpu, regs->srr0);
 576	kvmppc_set_srr1(vcpu, regs->srr1);
 577	kvmppc_set_sprg0(vcpu, regs->sprg0);
 578	kvmppc_set_sprg1(vcpu, regs->sprg1);
 579	kvmppc_set_sprg2(vcpu, regs->sprg2);
 580	kvmppc_set_sprg3(vcpu, regs->sprg3);
 581	kvmppc_set_sprg4(vcpu, regs->sprg4);
 582	kvmppc_set_sprg5(vcpu, regs->sprg5);
 583	kvmppc_set_sprg6(vcpu, regs->sprg6);
 584	kvmppc_set_sprg7(vcpu, regs->sprg7);
 585
 586	for (i = 0; i < ARRAY_SIZE(regs->gpr); i++)
 587		kvmppc_set_gpr(vcpu, i, regs->gpr[i]);
 588
 589	return 0;
 590}
 591
 592int kvm_arch_vcpu_ioctl_get_fpu(struct kvm_vcpu *vcpu, struct kvm_fpu *fpu)
 593{
 594	return -ENOTSUPP;
 595}
 596
 597int kvm_arch_vcpu_ioctl_set_fpu(struct kvm_vcpu *vcpu, struct kvm_fpu *fpu)
 598{
 599	return -ENOTSUPP;
 600}
 601
 602int kvmppc_get_one_reg(struct kvm_vcpu *vcpu, u64 id,
 603			union kvmppc_one_reg *val)
 604{
 605	int r = 0;
 606	long int i;
 607
 608	r = vcpu->kvm->arch.kvm_ops->get_one_reg(vcpu, id, val);
 609	if (r == -EINVAL) {
 610		r = 0;
 611		switch (id) {
 612		case KVM_REG_PPC_DAR:
 613			*val = get_reg_val(id, kvmppc_get_dar(vcpu));
 614			break;
 615		case KVM_REG_PPC_DSISR:
 616			*val = get_reg_val(id, kvmppc_get_dsisr(vcpu));
 617			break;
 618		case KVM_REG_PPC_FPR0 ... KVM_REG_PPC_FPR31:
 619			i = id - KVM_REG_PPC_FPR0;
 620			*val = get_reg_val(id, VCPU_FPR(vcpu, i));
 621			break;
 622		case KVM_REG_PPC_FPSCR:
 623			*val = get_reg_val(id, vcpu->arch.fp.fpscr);
 624			break;
 625#ifdef CONFIG_VSX
 626		case KVM_REG_PPC_VSR0 ... KVM_REG_PPC_VSR31:
 627			if (cpu_has_feature(CPU_FTR_VSX)) {
 628				i = id - KVM_REG_PPC_VSR0;
 629				val->vsxval[0] = vcpu->arch.fp.fpr[i][0];
 630				val->vsxval[1] = vcpu->arch.fp.fpr[i][1];
 631			} else {
 632				r = -ENXIO;
 633			}
 634			break;
 635#endif /* CONFIG_VSX */
 636		case KVM_REG_PPC_DEBUG_INST:
 637			*val = get_reg_val(id, INS_TW);
 638			break;
 639#ifdef CONFIG_KVM_XICS
 640		case KVM_REG_PPC_ICP_STATE:
 641			if (!vcpu->arch.icp && !vcpu->arch.xive_vcpu) {
 642				r = -ENXIO;
 643				break;
 644			}
 645			if (xics_on_xive())
 646				*val = get_reg_val(id, kvmppc_xive_get_icp(vcpu));
 647			else
 648				*val = get_reg_val(id, kvmppc_xics_get_icp(vcpu));
 649			break;
 650#endif /* CONFIG_KVM_XICS */
 651#ifdef CONFIG_KVM_XIVE
 652		case KVM_REG_PPC_VP_STATE:
 653			if (!vcpu->arch.xive_vcpu) {
 654				r = -ENXIO;
 655				break;
 656			}
 657			if (xive_enabled())
 658				r = kvmppc_xive_native_get_vp(vcpu, val);
 659			else
 660				r = -ENXIO;
 661			break;
 662#endif /* CONFIG_KVM_XIVE */
 663		case KVM_REG_PPC_FSCR:
 664			*val = get_reg_val(id, vcpu->arch.fscr);
 665			break;
 666		case KVM_REG_PPC_TAR:
 667			*val = get_reg_val(id, vcpu->arch.tar);
 668			break;
 669		case KVM_REG_PPC_EBBHR:
 670			*val = get_reg_val(id, vcpu->arch.ebbhr);
 671			break;
 672		case KVM_REG_PPC_EBBRR:
 673			*val = get_reg_val(id, vcpu->arch.ebbrr);
 674			break;
 675		case KVM_REG_PPC_BESCR:
 676			*val = get_reg_val(id, vcpu->arch.bescr);
 677			break;
 678		case KVM_REG_PPC_IC:
 679			*val = get_reg_val(id, vcpu->arch.ic);
 680			break;
 681		default:
 682			r = -EINVAL;
 683			break;
 684		}
 685	}
 686
 687	return r;
 688}
 689
 690int kvmppc_set_one_reg(struct kvm_vcpu *vcpu, u64 id,
 691			union kvmppc_one_reg *val)
 692{
 693	int r = 0;
 694	long int i;
 695
 696	r = vcpu->kvm->arch.kvm_ops->set_one_reg(vcpu, id, val);
 697	if (r == -EINVAL) {
 698		r = 0;
 699		switch (id) {
 700		case KVM_REG_PPC_DAR:
 701			kvmppc_set_dar(vcpu, set_reg_val(id, *val));
 702			break;
 703		case KVM_REG_PPC_DSISR:
 704			kvmppc_set_dsisr(vcpu, set_reg_val(id, *val));
 705			break;
 706		case KVM_REG_PPC_FPR0 ... KVM_REG_PPC_FPR31:
 707			i = id - KVM_REG_PPC_FPR0;
 708			VCPU_FPR(vcpu, i) = set_reg_val(id, *val);
 709			break;
 710		case KVM_REG_PPC_FPSCR:
 711			vcpu->arch.fp.fpscr = set_reg_val(id, *val);
 712			break;
 713#ifdef CONFIG_VSX
 714		case KVM_REG_PPC_VSR0 ... KVM_REG_PPC_VSR31:
 715			if (cpu_has_feature(CPU_FTR_VSX)) {
 716				i = id - KVM_REG_PPC_VSR0;
 717				vcpu->arch.fp.fpr[i][0] = val->vsxval[0];
 718				vcpu->arch.fp.fpr[i][1] = val->vsxval[1];
 719			} else {
 720				r = -ENXIO;
 721			}
 722			break;
 723#endif /* CONFIG_VSX */
 724#ifdef CONFIG_KVM_XICS
 725		case KVM_REG_PPC_ICP_STATE:
 726			if (!vcpu->arch.icp && !vcpu->arch.xive_vcpu) {
 727				r = -ENXIO;
 728				break;
 729			}
 730			if (xics_on_xive())
 731				r = kvmppc_xive_set_icp(vcpu, set_reg_val(id, *val));
 732			else
 733				r = kvmppc_xics_set_icp(vcpu, set_reg_val(id, *val));
 734			break;
 735#endif /* CONFIG_KVM_XICS */
 736#ifdef CONFIG_KVM_XIVE
 737		case KVM_REG_PPC_VP_STATE:
 738			if (!vcpu->arch.xive_vcpu) {
 739				r = -ENXIO;
 740				break;
 741			}
 742			if (xive_enabled())
 743				r = kvmppc_xive_native_set_vp(vcpu, val);
 744			else
 745				r = -ENXIO;
 746			break;
 747#endif /* CONFIG_KVM_XIVE */
 748		case KVM_REG_PPC_FSCR:
 749			vcpu->arch.fscr = set_reg_val(id, *val);
 750			break;
 751		case KVM_REG_PPC_TAR:
 752			vcpu->arch.tar = set_reg_val(id, *val);
 753			break;
 754		case KVM_REG_PPC_EBBHR:
 755			vcpu->arch.ebbhr = set_reg_val(id, *val);
 756			break;
 757		case KVM_REG_PPC_EBBRR:
 758			vcpu->arch.ebbrr = set_reg_val(id, *val);
 759			break;
 760		case KVM_REG_PPC_BESCR:
 761			vcpu->arch.bescr = set_reg_val(id, *val);
 762			break;
 763		case KVM_REG_PPC_IC:
 764			vcpu->arch.ic = set_reg_val(id, *val);
 765			break;
 766		default:
 767			r = -EINVAL;
 768			break;
 769		}
 770	}
 771
 772	return r;
 773}
 774
 775void kvmppc_core_vcpu_load(struct kvm_vcpu *vcpu, int cpu)
 776{
 777	vcpu->kvm->arch.kvm_ops->vcpu_load(vcpu, cpu);
 778}
 779
 780void kvmppc_core_vcpu_put(struct kvm_vcpu *vcpu)
 781{
 782	vcpu->kvm->arch.kvm_ops->vcpu_put(vcpu);
 783}
 784
 785void kvmppc_set_msr(struct kvm_vcpu *vcpu, u64 msr)
 786{
 787	vcpu->kvm->arch.kvm_ops->set_msr(vcpu, msr);
 788}
 789EXPORT_SYMBOL_GPL(kvmppc_set_msr);
 790
 791int kvmppc_vcpu_run(struct kvm_run *kvm_run, struct kvm_vcpu *vcpu)
 792{
 793	return vcpu->kvm->arch.kvm_ops->vcpu_run(kvm_run, vcpu);
 794}
 795
 796int kvm_arch_vcpu_ioctl_translate(struct kvm_vcpu *vcpu,
 797                                  struct kvm_translation *tr)
 798{
 799	return 0;
 800}
 801
 802int kvm_arch_vcpu_ioctl_set_guest_debug(struct kvm_vcpu *vcpu,
 803					struct kvm_guest_debug *dbg)
 804{
 805	vcpu_load(vcpu);
 806	vcpu->guest_debug = dbg->control;
 807	vcpu_put(vcpu);
 808	return 0;
 809}
 810
 811void kvmppc_decrementer_func(struct kvm_vcpu *vcpu)
 812{
 813	kvmppc_core_queue_dec(vcpu);
 814	kvm_vcpu_kick(vcpu);
 815}
 816
 817struct kvm_vcpu *kvmppc_core_vcpu_create(struct kvm *kvm, unsigned int id)
 818{
 819	return kvm->arch.kvm_ops->vcpu_create(kvm, id);
 820}
 821
 822void kvmppc_core_vcpu_free(struct kvm_vcpu *vcpu)
 823{
 824	vcpu->kvm->arch.kvm_ops->vcpu_free(vcpu);
 825}
 826
 827int kvmppc_core_check_requests(struct kvm_vcpu *vcpu)
 828{
 829	return vcpu->kvm->arch.kvm_ops->check_requests(vcpu);
 830}
 831
 832int kvm_vm_ioctl_get_dirty_log(struct kvm *kvm, struct kvm_dirty_log *log)
 833{
 834	return kvm->arch.kvm_ops->get_dirty_log(kvm, log);
 835}
 836
 837void kvmppc_core_free_memslot(struct kvm *kvm, struct kvm_memory_slot *free,
 838			      struct kvm_memory_slot *dont)
 839{
 840	kvm->arch.kvm_ops->free_memslot(free, dont);
 841}
 842
 843int kvmppc_core_create_memslot(struct kvm *kvm, struct kvm_memory_slot *slot,
 844			       unsigned long npages)
 845{
 846	return kvm->arch.kvm_ops->create_memslot(slot, npages);
 847}
 848
 849void kvmppc_core_flush_memslot(struct kvm *kvm, struct kvm_memory_slot *memslot)
 850{
 851	kvm->arch.kvm_ops->flush_memslot(kvm, memslot);
 852}
 853
 854int kvmppc_core_prepare_memory_region(struct kvm *kvm,
 855				struct kvm_memory_slot *memslot,
 856				const struct kvm_userspace_memory_region *mem)
 
 857{
 858	return kvm->arch.kvm_ops->prepare_memory_region(kvm, memslot, mem);
 859}
 860
 861void kvmppc_core_commit_memory_region(struct kvm *kvm,
 862				const struct kvm_userspace_memory_region *mem,
 863				const struct kvm_memory_slot *old,
 864				const struct kvm_memory_slot *new,
 865				enum kvm_mr_change change)
 866{
 867	kvm->arch.kvm_ops->commit_memory_region(kvm, mem, old, new, change);
 868}
 869
 870int kvm_unmap_hva_range(struct kvm *kvm, unsigned long start, unsigned long end)
 871{
 872	return kvm->arch.kvm_ops->unmap_hva_range(kvm, start, end);
 873}
 874
 875int kvm_age_hva(struct kvm *kvm, unsigned long start, unsigned long end)
 876{
 877	return kvm->arch.kvm_ops->age_hva(kvm, start, end);
 878}
 879
 880int kvm_test_age_hva(struct kvm *kvm, unsigned long hva)
 881{
 882	return kvm->arch.kvm_ops->test_age_hva(kvm, hva);
 883}
 884
 885int kvm_set_spte_hva(struct kvm *kvm, unsigned long hva, pte_t pte)
 886{
 887	kvm->arch.kvm_ops->set_spte_hva(kvm, hva, pte);
 888	return 0;
 889}
 890
 891void kvmppc_mmu_destroy(struct kvm_vcpu *vcpu)
 892{
 893	vcpu->kvm->arch.kvm_ops->mmu_destroy(vcpu);
 894}
 895
 896int kvmppc_core_init_vm(struct kvm *kvm)
 897{
 898
 899#ifdef CONFIG_PPC64
 900	INIT_LIST_HEAD_RCU(&kvm->arch.spapr_tce_tables);
 901	INIT_LIST_HEAD(&kvm->arch.rtas_tokens);
 902	mutex_init(&kvm->arch.rtas_token_lock);
 903#endif
 904
 905	return kvm->arch.kvm_ops->init_vm(kvm);
 906}
 907
 908void kvmppc_core_destroy_vm(struct kvm *kvm)
 909{
 910	kvm->arch.kvm_ops->destroy_vm(kvm);
 911
 912#ifdef CONFIG_PPC64
 913	kvmppc_rtas_tokens_free(kvm);
 914	WARN_ON(!list_empty(&kvm->arch.spapr_tce_tables));
 915#endif
 916
 917#ifdef CONFIG_KVM_XICS
 918	/*
 919	 * Free the XIVE devices which are not directly freed by the
 920	 * device 'release' method
 921	 */
 922	kfree(kvm->arch.xive_devices.native);
 923	kvm->arch.xive_devices.native = NULL;
 924	kfree(kvm->arch.xive_devices.xics_on_xive);
 925	kvm->arch.xive_devices.xics_on_xive = NULL;
 
 
 926#endif /* CONFIG_KVM_XICS */
 927}
 928
 929int kvmppc_h_logical_ci_load(struct kvm_vcpu *vcpu)
 930{
 931	unsigned long size = kvmppc_get_gpr(vcpu, 4);
 932	unsigned long addr = kvmppc_get_gpr(vcpu, 5);
 933	u64 buf;
 934	int srcu_idx;
 935	int ret;
 936
 937	if (!is_power_of_2(size) || (size > sizeof(buf)))
 938		return H_TOO_HARD;
 939
 940	srcu_idx = srcu_read_lock(&vcpu->kvm->srcu);
 941	ret = kvm_io_bus_read(vcpu, KVM_MMIO_BUS, addr, size, &buf);
 942	srcu_read_unlock(&vcpu->kvm->srcu, srcu_idx);
 943	if (ret != 0)
 944		return H_TOO_HARD;
 945
 946	switch (size) {
 947	case 1:
 948		kvmppc_set_gpr(vcpu, 4, *(u8 *)&buf);
 949		break;
 950
 951	case 2:
 952		kvmppc_set_gpr(vcpu, 4, be16_to_cpu(*(__be16 *)&buf));
 953		break;
 954
 955	case 4:
 956		kvmppc_set_gpr(vcpu, 4, be32_to_cpu(*(__be32 *)&buf));
 957		break;
 958
 959	case 8:
 960		kvmppc_set_gpr(vcpu, 4, be64_to_cpu(*(__be64 *)&buf));
 961		break;
 962
 963	default:
 964		BUG();
 965	}
 966
 967	return H_SUCCESS;
 968}
 969EXPORT_SYMBOL_GPL(kvmppc_h_logical_ci_load);
 970
 971int kvmppc_h_logical_ci_store(struct kvm_vcpu *vcpu)
 972{
 973	unsigned long size = kvmppc_get_gpr(vcpu, 4);
 974	unsigned long addr = kvmppc_get_gpr(vcpu, 5);
 975	unsigned long val = kvmppc_get_gpr(vcpu, 6);
 976	u64 buf;
 977	int srcu_idx;
 978	int ret;
 979
 980	switch (size) {
 981	case 1:
 982		*(u8 *)&buf = val;
 983		break;
 984
 985	case 2:
 986		*(__be16 *)&buf = cpu_to_be16(val);
 987		break;
 988
 989	case 4:
 990		*(__be32 *)&buf = cpu_to_be32(val);
 991		break;
 992
 993	case 8:
 994		*(__be64 *)&buf = cpu_to_be64(val);
 995		break;
 996
 997	default:
 998		return H_TOO_HARD;
 999	}
1000
1001	srcu_idx = srcu_read_lock(&vcpu->kvm->srcu);
1002	ret = kvm_io_bus_write(vcpu, KVM_MMIO_BUS, addr, size, &buf);
1003	srcu_read_unlock(&vcpu->kvm->srcu, srcu_idx);
1004	if (ret != 0)
1005		return H_TOO_HARD;
1006
1007	return H_SUCCESS;
1008}
1009EXPORT_SYMBOL_GPL(kvmppc_h_logical_ci_store);
1010
1011int kvmppc_core_check_processor_compat(void)
1012{
1013	/*
1014	 * We always return 0 for book3s. We check
1015	 * for compatibility while loading the HV
1016	 * or PR module
1017	 */
1018	return 0;
1019}
1020
1021int kvmppc_book3s_hcall_implemented(struct kvm *kvm, unsigned long hcall)
1022{
1023	return kvm->arch.kvm_ops->hcall_implemented(hcall);
1024}
1025
1026#ifdef CONFIG_KVM_XICS
1027int kvm_set_irq(struct kvm *kvm, int irq_source_id, u32 irq, int level,
1028		bool line_status)
1029{
1030	if (xics_on_xive())
1031		return kvmppc_xive_set_irq(kvm, irq_source_id, irq, level,
1032					   line_status);
1033	else
1034		return kvmppc_xics_set_irq(kvm, irq_source_id, irq, level,
1035					   line_status);
1036}
1037
1038int kvm_arch_set_irq_inatomic(struct kvm_kernel_irq_routing_entry *irq_entry,
1039			      struct kvm *kvm, int irq_source_id,
1040			      int level, bool line_status)
1041{
1042	return kvm_set_irq(kvm, irq_source_id, irq_entry->gsi,
1043			   level, line_status);
1044}
1045static int kvmppc_book3s_set_irq(struct kvm_kernel_irq_routing_entry *e,
1046				 struct kvm *kvm, int irq_source_id, int level,
1047				 bool line_status)
1048{
1049	return kvm_set_irq(kvm, irq_source_id, e->gsi, level, line_status);
1050}
1051
1052int kvm_irq_map_gsi(struct kvm *kvm,
1053		    struct kvm_kernel_irq_routing_entry *entries, int gsi)
1054{
1055	entries->gsi = gsi;
1056	entries->type = KVM_IRQ_ROUTING_IRQCHIP;
1057	entries->set = kvmppc_book3s_set_irq;
1058	entries->irqchip.irqchip = 0;
1059	entries->irqchip.pin = gsi;
1060	return 1;
1061}
1062
1063int kvm_irq_map_chip_pin(struct kvm *kvm, unsigned irqchip, unsigned pin)
1064{
1065	return pin;
1066}
1067
1068#endif /* CONFIG_KVM_XICS */
1069
1070static int kvmppc_book3s_init(void)
1071{
1072	int r;
1073
1074	r = kvm_init(NULL, sizeof(struct kvm_vcpu), 0, THIS_MODULE);
1075	if (r)
1076		return r;
1077#ifdef CONFIG_KVM_BOOK3S_32_HANDLER
1078	r = kvmppc_book3s_init_pr();
1079#endif
1080
1081#ifdef CONFIG_KVM_XICS
1082#ifdef CONFIG_KVM_XIVE
1083	if (xics_on_xive()) {
1084		kvmppc_xive_init_module();
1085		kvm_register_device_ops(&kvm_xive_ops, KVM_DEV_TYPE_XICS);
1086		if (kvmppc_xive_native_supported()) {
1087			kvmppc_xive_native_init_module();
1088			kvm_register_device_ops(&kvm_xive_native_ops,
1089						KVM_DEV_TYPE_XIVE);
1090		}
1091	} else
1092#endif
1093		kvm_register_device_ops(&kvm_xics_ops, KVM_DEV_TYPE_XICS);
1094#endif
1095	return r;
1096}
1097
1098static void kvmppc_book3s_exit(void)
1099{
1100#ifdef CONFIG_KVM_XICS
1101	if (xics_on_xive()) {
1102		kvmppc_xive_exit_module();
1103		kvmppc_xive_native_exit_module();
1104	}
1105#endif
1106#ifdef CONFIG_KVM_BOOK3S_32_HANDLER
1107	kvmppc_book3s_exit_pr();
1108#endif
1109	kvm_exit();
1110}
1111
1112module_init(kvmppc_book3s_init);
1113module_exit(kvmppc_book3s_exit);
1114
1115/* On 32bit this is our one and only kernel module */
1116#ifdef CONFIG_KVM_BOOK3S_32_HANDLER
1117MODULE_ALIAS_MISCDEV(KVM_MINOR);
1118MODULE_ALIAS("devname:kvm");
1119#endif