mirror of
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
synced 2024-11-01 17:08:10 +00:00
ae7a835cc5
Pull KVM updates from Gleb Natapov: "The highlights of the release are nested EPT and pv-ticketlocks support (hypervisor part, guest part, which is most of the code, goes through tip tree). Apart of that there are many fixes for all arches" Fix up semantic conflicts as discussed in the pull request thread.. * 'next' of git://git.kernel.org/pub/scm/virt/kvm/kvm: (88 commits) ARM: KVM: Add newlines to panic strings ARM: KVM: Work around older compiler bug ARM: KVM: Simplify tracepoint text ARM: KVM: Fix kvm_set_pte assignment ARM: KVM: vgic: Bump VGIC_NR_IRQS to 256 ARM: KVM: Bugfix: vgic_bytemap_get_reg per cpu regs ARM: KVM: vgic: fix GICD_ICFGRn access ARM: KVM: vgic: simplify vgic_get_target_reg KVM: MMU: remove unused parameter KVM: PPC: Book3S PR: Rework kvmppc_mmu_book3s_64_xlate() KVM: PPC: Book3S PR: Make instruction fetch fallback work for system calls KVM: PPC: Book3S PR: Don't corrupt guest state when kernel uses VMX KVM: x86: update masterclock when kvmclock_offset is calculated (v2) KVM: PPC: Book3S: Fix compile error in XICS emulation KVM: PPC: Book3S PR: return appropriate error when allocation fails arch: powerpc: kvm: add signed type cast for comparation KVM: x86: add comments where MMIO does not return to the emulator KVM: vmx: count exits to userspace during invalid guest emulation KVM: rename __kvm_io_bus_sort_cmp to kvm_io_bus_cmp kvm: optimize away THP checks in kvm_is_mmio_pfn() ...
1170 lines
30 KiB
C
1170 lines
30 KiB
C
/*
|
|
* hosting zSeries kernel virtual machines
|
|
*
|
|
* Copyright IBM Corp. 2008, 2009
|
|
*
|
|
* This program is free software; you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License (version 2 only)
|
|
* as published by the Free Software Foundation.
|
|
*
|
|
* Author(s): Carsten Otte <cotte@de.ibm.com>
|
|
* Christian Borntraeger <borntraeger@de.ibm.com>
|
|
* Heiko Carstens <heiko.carstens@de.ibm.com>
|
|
* Christian Ehrhardt <ehrhardt@de.ibm.com>
|
|
*/
|
|
|
|
#include <linux/compiler.h>
|
|
#include <linux/err.h>
|
|
#include <linux/fs.h>
|
|
#include <linux/hrtimer.h>
|
|
#include <linux/init.h>
|
|
#include <linux/kvm.h>
|
|
#include <linux/kvm_host.h>
|
|
#include <linux/module.h>
|
|
#include <linux/slab.h>
|
|
#include <linux/timer.h>
|
|
#include <asm/asm-offsets.h>
|
|
#include <asm/lowcore.h>
|
|
#include <asm/pgtable.h>
|
|
#include <asm/nmi.h>
|
|
#include <asm/switch_to.h>
|
|
#include <asm/facility.h>
|
|
#include <asm/sclp.h>
|
|
#include "kvm-s390.h"
|
|
#include "gaccess.h"
|
|
|
|
#define CREATE_TRACE_POINTS
|
|
#include "trace.h"
|
|
#include "trace-s390.h"
|
|
|
|
#define VCPU_STAT(x) offsetof(struct kvm_vcpu, stat.x), KVM_STAT_VCPU
|
|
|
|
struct kvm_stats_debugfs_item debugfs_entries[] = {
|
|
{ "userspace_handled", VCPU_STAT(exit_userspace) },
|
|
{ "exit_null", VCPU_STAT(exit_null) },
|
|
{ "exit_validity", VCPU_STAT(exit_validity) },
|
|
{ "exit_stop_request", VCPU_STAT(exit_stop_request) },
|
|
{ "exit_external_request", VCPU_STAT(exit_external_request) },
|
|
{ "exit_external_interrupt", VCPU_STAT(exit_external_interrupt) },
|
|
{ "exit_instruction", VCPU_STAT(exit_instruction) },
|
|
{ "exit_program_interruption", VCPU_STAT(exit_program_interruption) },
|
|
{ "exit_instr_and_program_int", VCPU_STAT(exit_instr_and_program) },
|
|
{ "instruction_lctlg", VCPU_STAT(instruction_lctlg) },
|
|
{ "instruction_lctl", VCPU_STAT(instruction_lctl) },
|
|
{ "deliver_emergency_signal", VCPU_STAT(deliver_emergency_signal) },
|
|
{ "deliver_external_call", VCPU_STAT(deliver_external_call) },
|
|
{ "deliver_service_signal", VCPU_STAT(deliver_service_signal) },
|
|
{ "deliver_virtio_interrupt", VCPU_STAT(deliver_virtio_interrupt) },
|
|
{ "deliver_stop_signal", VCPU_STAT(deliver_stop_signal) },
|
|
{ "deliver_prefix_signal", VCPU_STAT(deliver_prefix_signal) },
|
|
{ "deliver_restart_signal", VCPU_STAT(deliver_restart_signal) },
|
|
{ "deliver_program_interruption", VCPU_STAT(deliver_program_int) },
|
|
{ "exit_wait_state", VCPU_STAT(exit_wait_state) },
|
|
{ "instruction_pfmf", VCPU_STAT(instruction_pfmf) },
|
|
{ "instruction_stidp", VCPU_STAT(instruction_stidp) },
|
|
{ "instruction_spx", VCPU_STAT(instruction_spx) },
|
|
{ "instruction_stpx", VCPU_STAT(instruction_stpx) },
|
|
{ "instruction_stap", VCPU_STAT(instruction_stap) },
|
|
{ "instruction_storage_key", VCPU_STAT(instruction_storage_key) },
|
|
{ "instruction_stsch", VCPU_STAT(instruction_stsch) },
|
|
{ "instruction_chsc", VCPU_STAT(instruction_chsc) },
|
|
{ "instruction_stsi", VCPU_STAT(instruction_stsi) },
|
|
{ "instruction_stfl", VCPU_STAT(instruction_stfl) },
|
|
{ "instruction_tprot", VCPU_STAT(instruction_tprot) },
|
|
{ "instruction_sigp_sense", VCPU_STAT(instruction_sigp_sense) },
|
|
{ "instruction_sigp_sense_running", VCPU_STAT(instruction_sigp_sense_running) },
|
|
{ "instruction_sigp_external_call", VCPU_STAT(instruction_sigp_external_call) },
|
|
{ "instruction_sigp_emergency", VCPU_STAT(instruction_sigp_emergency) },
|
|
{ "instruction_sigp_stop", VCPU_STAT(instruction_sigp_stop) },
|
|
{ "instruction_sigp_set_arch", VCPU_STAT(instruction_sigp_arch) },
|
|
{ "instruction_sigp_set_prefix", VCPU_STAT(instruction_sigp_prefix) },
|
|
{ "instruction_sigp_restart", VCPU_STAT(instruction_sigp_restart) },
|
|
{ "diagnose_10", VCPU_STAT(diagnose_10) },
|
|
{ "diagnose_44", VCPU_STAT(diagnose_44) },
|
|
{ "diagnose_9c", VCPU_STAT(diagnose_9c) },
|
|
{ NULL }
|
|
};
|
|
|
|
unsigned long *vfacilities;
|
|
static struct gmap_notifier gmap_notifier;
|
|
|
|
/* test availability of vfacility */
|
|
static inline int test_vfacility(unsigned long nr)
|
|
{
|
|
return __test_facility(nr, (void *) vfacilities);
|
|
}
|
|
|
|
/* Section: not file related */
|
|
int kvm_arch_hardware_enable(void *garbage)
|
|
{
|
|
/* every s390 is virtualization enabled ;-) */
|
|
return 0;
|
|
}
|
|
|
|
void kvm_arch_hardware_disable(void *garbage)
|
|
{
|
|
}
|
|
|
|
static void kvm_gmap_notifier(struct gmap *gmap, unsigned long address);
|
|
|
|
int kvm_arch_hardware_setup(void)
|
|
{
|
|
gmap_notifier.notifier_call = kvm_gmap_notifier;
|
|
gmap_register_ipte_notifier(&gmap_notifier);
|
|
return 0;
|
|
}
|
|
|
|
void kvm_arch_hardware_unsetup(void)
|
|
{
|
|
gmap_unregister_ipte_notifier(&gmap_notifier);
|
|
}
|
|
|
|
void kvm_arch_check_processor_compat(void *rtn)
|
|
{
|
|
}
|
|
|
|
int kvm_arch_init(void *opaque)
|
|
{
|
|
return 0;
|
|
}
|
|
|
|
void kvm_arch_exit(void)
|
|
{
|
|
}
|
|
|
|
/* Section: device related */
|
|
long kvm_arch_dev_ioctl(struct file *filp,
|
|
unsigned int ioctl, unsigned long arg)
|
|
{
|
|
if (ioctl == KVM_S390_ENABLE_SIE)
|
|
return s390_enable_sie();
|
|
return -EINVAL;
|
|
}
|
|
|
|
int kvm_dev_ioctl_check_extension(long ext)
|
|
{
|
|
int r;
|
|
|
|
switch (ext) {
|
|
case KVM_CAP_S390_PSW:
|
|
case KVM_CAP_S390_GMAP:
|
|
case KVM_CAP_SYNC_MMU:
|
|
#ifdef CONFIG_KVM_S390_UCONTROL
|
|
case KVM_CAP_S390_UCONTROL:
|
|
#endif
|
|
case KVM_CAP_SYNC_REGS:
|
|
case KVM_CAP_ONE_REG:
|
|
case KVM_CAP_ENABLE_CAP:
|
|
case KVM_CAP_S390_CSS_SUPPORT:
|
|
case KVM_CAP_IOEVENTFD:
|
|
r = 1;
|
|
break;
|
|
case KVM_CAP_NR_VCPUS:
|
|
case KVM_CAP_MAX_VCPUS:
|
|
r = KVM_MAX_VCPUS;
|
|
break;
|
|
case KVM_CAP_NR_MEMSLOTS:
|
|
r = KVM_USER_MEM_SLOTS;
|
|
break;
|
|
case KVM_CAP_S390_COW:
|
|
r = MACHINE_HAS_ESOP;
|
|
break;
|
|
default:
|
|
r = 0;
|
|
}
|
|
return r;
|
|
}
|
|
|
|
/* Section: vm related */
|
|
/*
|
|
* Get (and clear) the dirty memory log for a memory slot.
|
|
*/
|
|
int kvm_vm_ioctl_get_dirty_log(struct kvm *kvm,
|
|
struct kvm_dirty_log *log)
|
|
{
|
|
return 0;
|
|
}
|
|
|
|
long kvm_arch_vm_ioctl(struct file *filp,
|
|
unsigned int ioctl, unsigned long arg)
|
|
{
|
|
struct kvm *kvm = filp->private_data;
|
|
void __user *argp = (void __user *)arg;
|
|
int r;
|
|
|
|
switch (ioctl) {
|
|
case KVM_S390_INTERRUPT: {
|
|
struct kvm_s390_interrupt s390int;
|
|
|
|
r = -EFAULT;
|
|
if (copy_from_user(&s390int, argp, sizeof(s390int)))
|
|
break;
|
|
r = kvm_s390_inject_vm(kvm, &s390int);
|
|
break;
|
|
}
|
|
default:
|
|
r = -ENOTTY;
|
|
}
|
|
|
|
return r;
|
|
}
|
|
|
|
int kvm_arch_init_vm(struct kvm *kvm, unsigned long type)
|
|
{
|
|
int rc;
|
|
char debug_name[16];
|
|
|
|
rc = -EINVAL;
|
|
#ifdef CONFIG_KVM_S390_UCONTROL
|
|
if (type & ~KVM_VM_S390_UCONTROL)
|
|
goto out_err;
|
|
if ((type & KVM_VM_S390_UCONTROL) && (!capable(CAP_SYS_ADMIN)))
|
|
goto out_err;
|
|
#else
|
|
if (type)
|
|
goto out_err;
|
|
#endif
|
|
|
|
rc = s390_enable_sie();
|
|
if (rc)
|
|
goto out_err;
|
|
|
|
rc = -ENOMEM;
|
|
|
|
kvm->arch.sca = (struct sca_block *) get_zeroed_page(GFP_KERNEL);
|
|
if (!kvm->arch.sca)
|
|
goto out_err;
|
|
|
|
sprintf(debug_name, "kvm-%u", current->pid);
|
|
|
|
kvm->arch.dbf = debug_register(debug_name, 8, 2, 8 * sizeof(long));
|
|
if (!kvm->arch.dbf)
|
|
goto out_nodbf;
|
|
|
|
spin_lock_init(&kvm->arch.float_int.lock);
|
|
INIT_LIST_HEAD(&kvm->arch.float_int.list);
|
|
|
|
debug_register_view(kvm->arch.dbf, &debug_sprintf_view);
|
|
VM_EVENT(kvm, 3, "%s", "vm created");
|
|
|
|
if (type & KVM_VM_S390_UCONTROL) {
|
|
kvm->arch.gmap = NULL;
|
|
} else {
|
|
kvm->arch.gmap = gmap_alloc(current->mm);
|
|
if (!kvm->arch.gmap)
|
|
goto out_nogmap;
|
|
kvm->arch.gmap->private = kvm;
|
|
}
|
|
|
|
kvm->arch.css_support = 0;
|
|
|
|
return 0;
|
|
out_nogmap:
|
|
debug_unregister(kvm->arch.dbf);
|
|
out_nodbf:
|
|
free_page((unsigned long)(kvm->arch.sca));
|
|
out_err:
|
|
return rc;
|
|
}
|
|
|
|
void kvm_arch_vcpu_destroy(struct kvm_vcpu *vcpu)
|
|
{
|
|
VCPU_EVENT(vcpu, 3, "%s", "free cpu");
|
|
trace_kvm_s390_destroy_vcpu(vcpu->vcpu_id);
|
|
if (!kvm_is_ucontrol(vcpu->kvm)) {
|
|
clear_bit(63 - vcpu->vcpu_id,
|
|
(unsigned long *) &vcpu->kvm->arch.sca->mcn);
|
|
if (vcpu->kvm->arch.sca->cpu[vcpu->vcpu_id].sda ==
|
|
(__u64) vcpu->arch.sie_block)
|
|
vcpu->kvm->arch.sca->cpu[vcpu->vcpu_id].sda = 0;
|
|
}
|
|
smp_mb();
|
|
|
|
if (kvm_is_ucontrol(vcpu->kvm))
|
|
gmap_free(vcpu->arch.gmap);
|
|
|
|
free_page((unsigned long)(vcpu->arch.sie_block));
|
|
kvm_vcpu_uninit(vcpu);
|
|
kmem_cache_free(kvm_vcpu_cache, vcpu);
|
|
}
|
|
|
|
static void kvm_free_vcpus(struct kvm *kvm)
|
|
{
|
|
unsigned int i;
|
|
struct kvm_vcpu *vcpu;
|
|
|
|
kvm_for_each_vcpu(i, vcpu, kvm)
|
|
kvm_arch_vcpu_destroy(vcpu);
|
|
|
|
mutex_lock(&kvm->lock);
|
|
for (i = 0; i < atomic_read(&kvm->online_vcpus); i++)
|
|
kvm->vcpus[i] = NULL;
|
|
|
|
atomic_set(&kvm->online_vcpus, 0);
|
|
mutex_unlock(&kvm->lock);
|
|
}
|
|
|
|
void kvm_arch_sync_events(struct kvm *kvm)
|
|
{
|
|
}
|
|
|
|
void kvm_arch_destroy_vm(struct kvm *kvm)
|
|
{
|
|
kvm_free_vcpus(kvm);
|
|
free_page((unsigned long)(kvm->arch.sca));
|
|
debug_unregister(kvm->arch.dbf);
|
|
if (!kvm_is_ucontrol(kvm))
|
|
gmap_free(kvm->arch.gmap);
|
|
}
|
|
|
|
/* Section: vcpu related */
|
|
int kvm_arch_vcpu_init(struct kvm_vcpu *vcpu)
|
|
{
|
|
if (kvm_is_ucontrol(vcpu->kvm)) {
|
|
vcpu->arch.gmap = gmap_alloc(current->mm);
|
|
if (!vcpu->arch.gmap)
|
|
return -ENOMEM;
|
|
vcpu->arch.gmap->private = vcpu->kvm;
|
|
return 0;
|
|
}
|
|
|
|
vcpu->arch.gmap = vcpu->kvm->arch.gmap;
|
|
vcpu->run->kvm_valid_regs = KVM_SYNC_PREFIX |
|
|
KVM_SYNC_GPRS |
|
|
KVM_SYNC_ACRS |
|
|
KVM_SYNC_CRS;
|
|
return 0;
|
|
}
|
|
|
|
void kvm_arch_vcpu_uninit(struct kvm_vcpu *vcpu)
|
|
{
|
|
/* Nothing todo */
|
|
}
|
|
|
|
void kvm_arch_vcpu_load(struct kvm_vcpu *vcpu, int cpu)
|
|
{
|
|
save_fp_regs(&vcpu->arch.host_fpregs);
|
|
save_access_regs(vcpu->arch.host_acrs);
|
|
vcpu->arch.guest_fpregs.fpc &= FPC_VALID_MASK;
|
|
restore_fp_regs(&vcpu->arch.guest_fpregs);
|
|
restore_access_regs(vcpu->run->s.regs.acrs);
|
|
gmap_enable(vcpu->arch.gmap);
|
|
atomic_set_mask(CPUSTAT_RUNNING, &vcpu->arch.sie_block->cpuflags);
|
|
}
|
|
|
|
void kvm_arch_vcpu_put(struct kvm_vcpu *vcpu)
|
|
{
|
|
atomic_clear_mask(CPUSTAT_RUNNING, &vcpu->arch.sie_block->cpuflags);
|
|
gmap_disable(vcpu->arch.gmap);
|
|
save_fp_regs(&vcpu->arch.guest_fpregs);
|
|
save_access_regs(vcpu->run->s.regs.acrs);
|
|
restore_fp_regs(&vcpu->arch.host_fpregs);
|
|
restore_access_regs(vcpu->arch.host_acrs);
|
|
}
|
|
|
|
static void kvm_s390_vcpu_initial_reset(struct kvm_vcpu *vcpu)
|
|
{
|
|
/* this equals initial cpu reset in pop, but we don't switch to ESA */
|
|
vcpu->arch.sie_block->gpsw.mask = 0UL;
|
|
vcpu->arch.sie_block->gpsw.addr = 0UL;
|
|
kvm_s390_set_prefix(vcpu, 0);
|
|
vcpu->arch.sie_block->cputm = 0UL;
|
|
vcpu->arch.sie_block->ckc = 0UL;
|
|
vcpu->arch.sie_block->todpr = 0;
|
|
memset(vcpu->arch.sie_block->gcr, 0, 16 * sizeof(__u64));
|
|
vcpu->arch.sie_block->gcr[0] = 0xE0UL;
|
|
vcpu->arch.sie_block->gcr[14] = 0xC2000000UL;
|
|
vcpu->arch.guest_fpregs.fpc = 0;
|
|
asm volatile("lfpc %0" : : "Q" (vcpu->arch.guest_fpregs.fpc));
|
|
vcpu->arch.sie_block->gbea = 1;
|
|
atomic_set_mask(CPUSTAT_STOPPED, &vcpu->arch.sie_block->cpuflags);
|
|
}
|
|
|
|
int kvm_arch_vcpu_postcreate(struct kvm_vcpu *vcpu)
|
|
{
|
|
return 0;
|
|
}
|
|
|
|
int kvm_arch_vcpu_setup(struct kvm_vcpu *vcpu)
|
|
{
|
|
atomic_set(&vcpu->arch.sie_block->cpuflags, CPUSTAT_ZARCH |
|
|
CPUSTAT_SM |
|
|
CPUSTAT_STOPPED |
|
|
CPUSTAT_GED);
|
|
vcpu->arch.sie_block->ecb = 6;
|
|
vcpu->arch.sie_block->ecb2 = 8;
|
|
vcpu->arch.sie_block->eca = 0xC1002001U;
|
|
vcpu->arch.sie_block->fac = (int) (long) vfacilities;
|
|
hrtimer_init(&vcpu->arch.ckc_timer, CLOCK_REALTIME, HRTIMER_MODE_ABS);
|
|
tasklet_init(&vcpu->arch.tasklet, kvm_s390_tasklet,
|
|
(unsigned long) vcpu);
|
|
vcpu->arch.ckc_timer.function = kvm_s390_idle_wakeup;
|
|
get_cpu_id(&vcpu->arch.cpu_id);
|
|
vcpu->arch.cpu_id.version = 0xff;
|
|
return 0;
|
|
}
|
|
|
|
struct kvm_vcpu *kvm_arch_vcpu_create(struct kvm *kvm,
|
|
unsigned int id)
|
|
{
|
|
struct kvm_vcpu *vcpu;
|
|
int rc = -EINVAL;
|
|
|
|
if (id >= KVM_MAX_VCPUS)
|
|
goto out;
|
|
|
|
rc = -ENOMEM;
|
|
|
|
vcpu = kmem_cache_zalloc(kvm_vcpu_cache, GFP_KERNEL);
|
|
if (!vcpu)
|
|
goto out;
|
|
|
|
vcpu->arch.sie_block = (struct kvm_s390_sie_block *)
|
|
get_zeroed_page(GFP_KERNEL);
|
|
|
|
if (!vcpu->arch.sie_block)
|
|
goto out_free_cpu;
|
|
|
|
vcpu->arch.sie_block->icpua = id;
|
|
if (!kvm_is_ucontrol(kvm)) {
|
|
if (!kvm->arch.sca) {
|
|
WARN_ON_ONCE(1);
|
|
goto out_free_cpu;
|
|
}
|
|
if (!kvm->arch.sca->cpu[id].sda)
|
|
kvm->arch.sca->cpu[id].sda =
|
|
(__u64) vcpu->arch.sie_block;
|
|
vcpu->arch.sie_block->scaoh =
|
|
(__u32)(((__u64)kvm->arch.sca) >> 32);
|
|
vcpu->arch.sie_block->scaol = (__u32)(__u64)kvm->arch.sca;
|
|
set_bit(63 - id, (unsigned long *) &kvm->arch.sca->mcn);
|
|
}
|
|
|
|
spin_lock_init(&vcpu->arch.local_int.lock);
|
|
INIT_LIST_HEAD(&vcpu->arch.local_int.list);
|
|
vcpu->arch.local_int.float_int = &kvm->arch.float_int;
|
|
spin_lock(&kvm->arch.float_int.lock);
|
|
kvm->arch.float_int.local_int[id] = &vcpu->arch.local_int;
|
|
vcpu->arch.local_int.wq = &vcpu->wq;
|
|
vcpu->arch.local_int.cpuflags = &vcpu->arch.sie_block->cpuflags;
|
|
spin_unlock(&kvm->arch.float_int.lock);
|
|
|
|
rc = kvm_vcpu_init(vcpu, kvm, id);
|
|
if (rc)
|
|
goto out_free_sie_block;
|
|
VM_EVENT(kvm, 3, "create cpu %d at %p, sie block at %p", id, vcpu,
|
|
vcpu->arch.sie_block);
|
|
trace_kvm_s390_create_vcpu(id, vcpu, vcpu->arch.sie_block);
|
|
|
|
return vcpu;
|
|
out_free_sie_block:
|
|
free_page((unsigned long)(vcpu->arch.sie_block));
|
|
out_free_cpu:
|
|
kmem_cache_free(kvm_vcpu_cache, vcpu);
|
|
out:
|
|
return ERR_PTR(rc);
|
|
}
|
|
|
|
int kvm_arch_vcpu_runnable(struct kvm_vcpu *vcpu)
|
|
{
|
|
/* kvm common code refers to this, but never calls it */
|
|
BUG();
|
|
return 0;
|
|
}
|
|
|
|
void s390_vcpu_block(struct kvm_vcpu *vcpu)
|
|
{
|
|
atomic_set_mask(PROG_BLOCK_SIE, &vcpu->arch.sie_block->prog20);
|
|
}
|
|
|
|
void s390_vcpu_unblock(struct kvm_vcpu *vcpu)
|
|
{
|
|
atomic_clear_mask(PROG_BLOCK_SIE, &vcpu->arch.sie_block->prog20);
|
|
}
|
|
|
|
/*
|
|
* Kick a guest cpu out of SIE and wait until SIE is not running.
|
|
* If the CPU is not running (e.g. waiting as idle) the function will
|
|
* return immediately. */
|
|
void exit_sie(struct kvm_vcpu *vcpu)
|
|
{
|
|
atomic_set_mask(CPUSTAT_STOP_INT, &vcpu->arch.sie_block->cpuflags);
|
|
while (vcpu->arch.sie_block->prog0c & PROG_IN_SIE)
|
|
cpu_relax();
|
|
}
|
|
|
|
/* Kick a guest cpu out of SIE and prevent SIE-reentry */
|
|
void exit_sie_sync(struct kvm_vcpu *vcpu)
|
|
{
|
|
s390_vcpu_block(vcpu);
|
|
exit_sie(vcpu);
|
|
}
|
|
|
|
static void kvm_gmap_notifier(struct gmap *gmap, unsigned long address)
|
|
{
|
|
int i;
|
|
struct kvm *kvm = gmap->private;
|
|
struct kvm_vcpu *vcpu;
|
|
|
|
kvm_for_each_vcpu(i, vcpu, kvm) {
|
|
/* match against both prefix pages */
|
|
if (vcpu->arch.sie_block->prefix == (address & ~0x1000UL)) {
|
|
VCPU_EVENT(vcpu, 2, "gmap notifier for %lx", address);
|
|
kvm_make_request(KVM_REQ_MMU_RELOAD, vcpu);
|
|
exit_sie_sync(vcpu);
|
|
}
|
|
}
|
|
}
|
|
|
|
int kvm_arch_vcpu_should_kick(struct kvm_vcpu *vcpu)
|
|
{
|
|
/* kvm common code refers to this, but never calls it */
|
|
BUG();
|
|
return 0;
|
|
}
|
|
|
|
static int kvm_arch_vcpu_ioctl_get_one_reg(struct kvm_vcpu *vcpu,
|
|
struct kvm_one_reg *reg)
|
|
{
|
|
int r = -EINVAL;
|
|
|
|
switch (reg->id) {
|
|
case KVM_REG_S390_TODPR:
|
|
r = put_user(vcpu->arch.sie_block->todpr,
|
|
(u32 __user *)reg->addr);
|
|
break;
|
|
case KVM_REG_S390_EPOCHDIFF:
|
|
r = put_user(vcpu->arch.sie_block->epoch,
|
|
(u64 __user *)reg->addr);
|
|
break;
|
|
case KVM_REG_S390_CPU_TIMER:
|
|
r = put_user(vcpu->arch.sie_block->cputm,
|
|
(u64 __user *)reg->addr);
|
|
break;
|
|
case KVM_REG_S390_CLOCK_COMP:
|
|
r = put_user(vcpu->arch.sie_block->ckc,
|
|
(u64 __user *)reg->addr);
|
|
break;
|
|
default:
|
|
break;
|
|
}
|
|
|
|
return r;
|
|
}
|
|
|
|
static int kvm_arch_vcpu_ioctl_set_one_reg(struct kvm_vcpu *vcpu,
|
|
struct kvm_one_reg *reg)
|
|
{
|
|
int r = -EINVAL;
|
|
|
|
switch (reg->id) {
|
|
case KVM_REG_S390_TODPR:
|
|
r = get_user(vcpu->arch.sie_block->todpr,
|
|
(u32 __user *)reg->addr);
|
|
break;
|
|
case KVM_REG_S390_EPOCHDIFF:
|
|
r = get_user(vcpu->arch.sie_block->epoch,
|
|
(u64 __user *)reg->addr);
|
|
break;
|
|
case KVM_REG_S390_CPU_TIMER:
|
|
r = get_user(vcpu->arch.sie_block->cputm,
|
|
(u64 __user *)reg->addr);
|
|
break;
|
|
case KVM_REG_S390_CLOCK_COMP:
|
|
r = get_user(vcpu->arch.sie_block->ckc,
|
|
(u64 __user *)reg->addr);
|
|
break;
|
|
default:
|
|
break;
|
|
}
|
|
|
|
return r;
|
|
}
|
|
|
|
static int kvm_arch_vcpu_ioctl_initial_reset(struct kvm_vcpu *vcpu)
|
|
{
|
|
kvm_s390_vcpu_initial_reset(vcpu);
|
|
return 0;
|
|
}
|
|
|
|
int kvm_arch_vcpu_ioctl_set_regs(struct kvm_vcpu *vcpu, struct kvm_regs *regs)
|
|
{
|
|
memcpy(&vcpu->run->s.regs.gprs, ®s->gprs, sizeof(regs->gprs));
|
|
return 0;
|
|
}
|
|
|
|
int kvm_arch_vcpu_ioctl_get_regs(struct kvm_vcpu *vcpu, struct kvm_regs *regs)
|
|
{
|
|
memcpy(®s->gprs, &vcpu->run->s.regs.gprs, sizeof(regs->gprs));
|
|
return 0;
|
|
}
|
|
|
|
int kvm_arch_vcpu_ioctl_set_sregs(struct kvm_vcpu *vcpu,
|
|
struct kvm_sregs *sregs)
|
|
{
|
|
memcpy(&vcpu->run->s.regs.acrs, &sregs->acrs, sizeof(sregs->acrs));
|
|
memcpy(&vcpu->arch.sie_block->gcr, &sregs->crs, sizeof(sregs->crs));
|
|
restore_access_regs(vcpu->run->s.regs.acrs);
|
|
return 0;
|
|
}
|
|
|
|
int kvm_arch_vcpu_ioctl_get_sregs(struct kvm_vcpu *vcpu,
|
|
struct kvm_sregs *sregs)
|
|
{
|
|
memcpy(&sregs->acrs, &vcpu->run->s.regs.acrs, sizeof(sregs->acrs));
|
|
memcpy(&sregs->crs, &vcpu->arch.sie_block->gcr, sizeof(sregs->crs));
|
|
return 0;
|
|
}
|
|
|
|
int kvm_arch_vcpu_ioctl_set_fpu(struct kvm_vcpu *vcpu, struct kvm_fpu *fpu)
|
|
{
|
|
memcpy(&vcpu->arch.guest_fpregs.fprs, &fpu->fprs, sizeof(fpu->fprs));
|
|
vcpu->arch.guest_fpregs.fpc = fpu->fpc & FPC_VALID_MASK;
|
|
restore_fp_regs(&vcpu->arch.guest_fpregs);
|
|
return 0;
|
|
}
|
|
|
|
int kvm_arch_vcpu_ioctl_get_fpu(struct kvm_vcpu *vcpu, struct kvm_fpu *fpu)
|
|
{
|
|
memcpy(&fpu->fprs, &vcpu->arch.guest_fpregs.fprs, sizeof(fpu->fprs));
|
|
fpu->fpc = vcpu->arch.guest_fpregs.fpc;
|
|
return 0;
|
|
}
|
|
|
|
static int kvm_arch_vcpu_ioctl_set_initial_psw(struct kvm_vcpu *vcpu, psw_t psw)
|
|
{
|
|
int rc = 0;
|
|
|
|
if (!(atomic_read(&vcpu->arch.sie_block->cpuflags) & CPUSTAT_STOPPED))
|
|
rc = -EBUSY;
|
|
else {
|
|
vcpu->run->psw_mask = psw.mask;
|
|
vcpu->run->psw_addr = psw.addr;
|
|
}
|
|
return rc;
|
|
}
|
|
|
|
int kvm_arch_vcpu_ioctl_translate(struct kvm_vcpu *vcpu,
|
|
struct kvm_translation *tr)
|
|
{
|
|
return -EINVAL; /* not implemented yet */
|
|
}
|
|
|
|
int kvm_arch_vcpu_ioctl_set_guest_debug(struct kvm_vcpu *vcpu,
|
|
struct kvm_guest_debug *dbg)
|
|
{
|
|
return -EINVAL; /* not implemented yet */
|
|
}
|
|
|
|
int kvm_arch_vcpu_ioctl_get_mpstate(struct kvm_vcpu *vcpu,
|
|
struct kvm_mp_state *mp_state)
|
|
{
|
|
return -EINVAL; /* not implemented yet */
|
|
}
|
|
|
|
int kvm_arch_vcpu_ioctl_set_mpstate(struct kvm_vcpu *vcpu,
|
|
struct kvm_mp_state *mp_state)
|
|
{
|
|
return -EINVAL; /* not implemented yet */
|
|
}
|
|
|
|
static int kvm_s390_handle_requests(struct kvm_vcpu *vcpu)
|
|
{
|
|
/*
|
|
* We use MMU_RELOAD just to re-arm the ipte notifier for the
|
|
* guest prefix page. gmap_ipte_notify will wait on the ptl lock.
|
|
* This ensures that the ipte instruction for this request has
|
|
* already finished. We might race against a second unmapper that
|
|
* wants to set the blocking bit. Lets just retry the request loop.
|
|
*/
|
|
while (kvm_check_request(KVM_REQ_MMU_RELOAD, vcpu)) {
|
|
int rc;
|
|
rc = gmap_ipte_notify(vcpu->arch.gmap,
|
|
vcpu->arch.sie_block->prefix,
|
|
PAGE_SIZE * 2);
|
|
if (rc)
|
|
return rc;
|
|
s390_vcpu_unblock(vcpu);
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
static int __vcpu_run(struct kvm_vcpu *vcpu)
|
|
{
|
|
int rc;
|
|
|
|
memcpy(&vcpu->arch.sie_block->gg14, &vcpu->run->s.regs.gprs[14], 16);
|
|
|
|
if (need_resched())
|
|
schedule();
|
|
|
|
if (test_thread_flag(TIF_MCCK_PENDING))
|
|
s390_handle_mcck();
|
|
|
|
if (!kvm_is_ucontrol(vcpu->kvm))
|
|
kvm_s390_deliver_pending_interrupts(vcpu);
|
|
|
|
rc = kvm_s390_handle_requests(vcpu);
|
|
if (rc)
|
|
return rc;
|
|
|
|
vcpu->arch.sie_block->icptcode = 0;
|
|
VCPU_EVENT(vcpu, 6, "entering sie flags %x",
|
|
atomic_read(&vcpu->arch.sie_block->cpuflags));
|
|
trace_kvm_s390_sie_enter(vcpu,
|
|
atomic_read(&vcpu->arch.sie_block->cpuflags));
|
|
|
|
/*
|
|
* As PF_VCPU will be used in fault handler, between guest_enter
|
|
* and guest_exit should be no uaccess.
|
|
*/
|
|
preempt_disable();
|
|
kvm_guest_enter();
|
|
preempt_enable();
|
|
rc = sie64a(vcpu->arch.sie_block, vcpu->run->s.regs.gprs);
|
|
kvm_guest_exit();
|
|
|
|
VCPU_EVENT(vcpu, 6, "exit sie icptcode %d",
|
|
vcpu->arch.sie_block->icptcode);
|
|
trace_kvm_s390_sie_exit(vcpu, vcpu->arch.sie_block->icptcode);
|
|
|
|
if (rc > 0)
|
|
rc = 0;
|
|
if (rc < 0) {
|
|
if (kvm_is_ucontrol(vcpu->kvm)) {
|
|
rc = SIE_INTERCEPT_UCONTROL;
|
|
} else {
|
|
VCPU_EVENT(vcpu, 3, "%s", "fault in sie instruction");
|
|
trace_kvm_s390_sie_fault(vcpu);
|
|
rc = kvm_s390_inject_program_int(vcpu, PGM_ADDRESSING);
|
|
}
|
|
}
|
|
|
|
memcpy(&vcpu->run->s.regs.gprs[14], &vcpu->arch.sie_block->gg14, 16);
|
|
return rc;
|
|
}
|
|
|
|
int kvm_arch_vcpu_ioctl_run(struct kvm_vcpu *vcpu, struct kvm_run *kvm_run)
|
|
{
|
|
int rc;
|
|
sigset_t sigsaved;
|
|
|
|
rerun_vcpu:
|
|
if (vcpu->sigset_active)
|
|
sigprocmask(SIG_SETMASK, &vcpu->sigset, &sigsaved);
|
|
|
|
atomic_clear_mask(CPUSTAT_STOPPED, &vcpu->arch.sie_block->cpuflags);
|
|
|
|
BUG_ON(vcpu->kvm->arch.float_int.local_int[vcpu->vcpu_id] == NULL);
|
|
|
|
switch (kvm_run->exit_reason) {
|
|
case KVM_EXIT_S390_SIEIC:
|
|
case KVM_EXIT_UNKNOWN:
|
|
case KVM_EXIT_INTR:
|
|
case KVM_EXIT_S390_RESET:
|
|
case KVM_EXIT_S390_UCONTROL:
|
|
case KVM_EXIT_S390_TSCH:
|
|
break;
|
|
default:
|
|
BUG();
|
|
}
|
|
|
|
vcpu->arch.sie_block->gpsw.mask = kvm_run->psw_mask;
|
|
vcpu->arch.sie_block->gpsw.addr = kvm_run->psw_addr;
|
|
if (kvm_run->kvm_dirty_regs & KVM_SYNC_PREFIX) {
|
|
kvm_run->kvm_dirty_regs &= ~KVM_SYNC_PREFIX;
|
|
kvm_s390_set_prefix(vcpu, kvm_run->s.regs.prefix);
|
|
}
|
|
if (kvm_run->kvm_dirty_regs & KVM_SYNC_CRS) {
|
|
kvm_run->kvm_dirty_regs &= ~KVM_SYNC_CRS;
|
|
memcpy(&vcpu->arch.sie_block->gcr, &kvm_run->s.regs.crs, 128);
|
|
kvm_s390_set_prefix(vcpu, kvm_run->s.regs.prefix);
|
|
}
|
|
|
|
might_fault();
|
|
|
|
do {
|
|
rc = __vcpu_run(vcpu);
|
|
if (rc)
|
|
break;
|
|
if (kvm_is_ucontrol(vcpu->kvm))
|
|
rc = -EOPNOTSUPP;
|
|
else
|
|
rc = kvm_handle_sie_intercept(vcpu);
|
|
} while (!signal_pending(current) && !rc);
|
|
|
|
if (rc == SIE_INTERCEPT_RERUNVCPU)
|
|
goto rerun_vcpu;
|
|
|
|
if (signal_pending(current) && !rc) {
|
|
kvm_run->exit_reason = KVM_EXIT_INTR;
|
|
rc = -EINTR;
|
|
}
|
|
|
|
#ifdef CONFIG_KVM_S390_UCONTROL
|
|
if (rc == SIE_INTERCEPT_UCONTROL) {
|
|
kvm_run->exit_reason = KVM_EXIT_S390_UCONTROL;
|
|
kvm_run->s390_ucontrol.trans_exc_code =
|
|
current->thread.gmap_addr;
|
|
kvm_run->s390_ucontrol.pgm_code = 0x10;
|
|
rc = 0;
|
|
}
|
|
#endif
|
|
|
|
if (rc == -EOPNOTSUPP) {
|
|
/* intercept cannot be handled in-kernel, prepare kvm-run */
|
|
kvm_run->exit_reason = KVM_EXIT_S390_SIEIC;
|
|
kvm_run->s390_sieic.icptcode = vcpu->arch.sie_block->icptcode;
|
|
kvm_run->s390_sieic.ipa = vcpu->arch.sie_block->ipa;
|
|
kvm_run->s390_sieic.ipb = vcpu->arch.sie_block->ipb;
|
|
rc = 0;
|
|
}
|
|
|
|
if (rc == -EREMOTE) {
|
|
/* intercept was handled, but userspace support is needed
|
|
* kvm_run has been prepared by the handler */
|
|
rc = 0;
|
|
}
|
|
|
|
kvm_run->psw_mask = vcpu->arch.sie_block->gpsw.mask;
|
|
kvm_run->psw_addr = vcpu->arch.sie_block->gpsw.addr;
|
|
kvm_run->s.regs.prefix = vcpu->arch.sie_block->prefix;
|
|
memcpy(&kvm_run->s.regs.crs, &vcpu->arch.sie_block->gcr, 128);
|
|
|
|
if (vcpu->sigset_active)
|
|
sigprocmask(SIG_SETMASK, &sigsaved, NULL);
|
|
|
|
vcpu->stat.exit_userspace++;
|
|
return rc;
|
|
}
|
|
|
|
static int __guestcopy(struct kvm_vcpu *vcpu, u64 guestdest, void *from,
|
|
unsigned long n, int prefix)
|
|
{
|
|
if (prefix)
|
|
return copy_to_guest(vcpu, guestdest, from, n);
|
|
else
|
|
return copy_to_guest_absolute(vcpu, guestdest, from, n);
|
|
}
|
|
|
|
/*
|
|
* store status at address
|
|
* we use have two special cases:
|
|
* KVM_S390_STORE_STATUS_NOADDR: -> 0x1200 on 64 bit
|
|
* KVM_S390_STORE_STATUS_PREFIXED: -> prefix
|
|
*/
|
|
int kvm_s390_vcpu_store_status(struct kvm_vcpu *vcpu, unsigned long addr)
|
|
{
|
|
unsigned char archmode = 1;
|
|
int prefix;
|
|
|
|
if (addr == KVM_S390_STORE_STATUS_NOADDR) {
|
|
if (copy_to_guest_absolute(vcpu, 163ul, &archmode, 1))
|
|
return -EFAULT;
|
|
addr = SAVE_AREA_BASE;
|
|
prefix = 0;
|
|
} else if (addr == KVM_S390_STORE_STATUS_PREFIXED) {
|
|
if (copy_to_guest(vcpu, 163ul, &archmode, 1))
|
|
return -EFAULT;
|
|
addr = SAVE_AREA_BASE;
|
|
prefix = 1;
|
|
} else
|
|
prefix = 0;
|
|
|
|
/*
|
|
* The guest FPRS and ACRS are in the host FPRS/ACRS due to the lazy
|
|
* copying in vcpu load/put. Lets update our copies before we save
|
|
* it into the save area
|
|
*/
|
|
save_fp_regs(&vcpu->arch.guest_fpregs);
|
|
save_access_regs(vcpu->run->s.regs.acrs);
|
|
|
|
if (__guestcopy(vcpu, addr + offsetof(struct save_area, fp_regs),
|
|
vcpu->arch.guest_fpregs.fprs, 128, prefix))
|
|
return -EFAULT;
|
|
|
|
if (__guestcopy(vcpu, addr + offsetof(struct save_area, gp_regs),
|
|
vcpu->run->s.regs.gprs, 128, prefix))
|
|
return -EFAULT;
|
|
|
|
if (__guestcopy(vcpu, addr + offsetof(struct save_area, psw),
|
|
&vcpu->arch.sie_block->gpsw, 16, prefix))
|
|
return -EFAULT;
|
|
|
|
if (__guestcopy(vcpu, addr + offsetof(struct save_area, pref_reg),
|
|
&vcpu->arch.sie_block->prefix, 4, prefix))
|
|
return -EFAULT;
|
|
|
|
if (__guestcopy(vcpu,
|
|
addr + offsetof(struct save_area, fp_ctrl_reg),
|
|
&vcpu->arch.guest_fpregs.fpc, 4, prefix))
|
|
return -EFAULT;
|
|
|
|
if (__guestcopy(vcpu, addr + offsetof(struct save_area, tod_reg),
|
|
&vcpu->arch.sie_block->todpr, 4, prefix))
|
|
return -EFAULT;
|
|
|
|
if (__guestcopy(vcpu, addr + offsetof(struct save_area, timer),
|
|
&vcpu->arch.sie_block->cputm, 8, prefix))
|
|
return -EFAULT;
|
|
|
|
if (__guestcopy(vcpu, addr + offsetof(struct save_area, clk_cmp),
|
|
&vcpu->arch.sie_block->ckc, 8, prefix))
|
|
return -EFAULT;
|
|
|
|
if (__guestcopy(vcpu, addr + offsetof(struct save_area, acc_regs),
|
|
&vcpu->run->s.regs.acrs, 64, prefix))
|
|
return -EFAULT;
|
|
|
|
if (__guestcopy(vcpu,
|
|
addr + offsetof(struct save_area, ctrl_regs),
|
|
&vcpu->arch.sie_block->gcr, 128, prefix))
|
|
return -EFAULT;
|
|
return 0;
|
|
}
|
|
|
|
static int kvm_vcpu_ioctl_enable_cap(struct kvm_vcpu *vcpu,
|
|
struct kvm_enable_cap *cap)
|
|
{
|
|
int r;
|
|
|
|
if (cap->flags)
|
|
return -EINVAL;
|
|
|
|
switch (cap->cap) {
|
|
case KVM_CAP_S390_CSS_SUPPORT:
|
|
if (!vcpu->kvm->arch.css_support) {
|
|
vcpu->kvm->arch.css_support = 1;
|
|
trace_kvm_s390_enable_css(vcpu->kvm);
|
|
}
|
|
r = 0;
|
|
break;
|
|
default:
|
|
r = -EINVAL;
|
|
break;
|
|
}
|
|
return r;
|
|
}
|
|
|
|
long kvm_arch_vcpu_ioctl(struct file *filp,
|
|
unsigned int ioctl, unsigned long arg)
|
|
{
|
|
struct kvm_vcpu *vcpu = filp->private_data;
|
|
void __user *argp = (void __user *)arg;
|
|
long r;
|
|
|
|
switch (ioctl) {
|
|
case KVM_S390_INTERRUPT: {
|
|
struct kvm_s390_interrupt s390int;
|
|
|
|
r = -EFAULT;
|
|
if (copy_from_user(&s390int, argp, sizeof(s390int)))
|
|
break;
|
|
r = kvm_s390_inject_vcpu(vcpu, &s390int);
|
|
break;
|
|
}
|
|
case KVM_S390_STORE_STATUS:
|
|
r = kvm_s390_vcpu_store_status(vcpu, arg);
|
|
break;
|
|
case KVM_S390_SET_INITIAL_PSW: {
|
|
psw_t psw;
|
|
|
|
r = -EFAULT;
|
|
if (copy_from_user(&psw, argp, sizeof(psw)))
|
|
break;
|
|
r = kvm_arch_vcpu_ioctl_set_initial_psw(vcpu, psw);
|
|
break;
|
|
}
|
|
case KVM_S390_INITIAL_RESET:
|
|
r = kvm_arch_vcpu_ioctl_initial_reset(vcpu);
|
|
break;
|
|
case KVM_SET_ONE_REG:
|
|
case KVM_GET_ONE_REG: {
|
|
struct kvm_one_reg reg;
|
|
r = -EFAULT;
|
|
if (copy_from_user(®, argp, sizeof(reg)))
|
|
break;
|
|
if (ioctl == KVM_SET_ONE_REG)
|
|
r = kvm_arch_vcpu_ioctl_set_one_reg(vcpu, ®);
|
|
else
|
|
r = kvm_arch_vcpu_ioctl_get_one_reg(vcpu, ®);
|
|
break;
|
|
}
|
|
#ifdef CONFIG_KVM_S390_UCONTROL
|
|
case KVM_S390_UCAS_MAP: {
|
|
struct kvm_s390_ucas_mapping ucasmap;
|
|
|
|
if (copy_from_user(&ucasmap, argp, sizeof(ucasmap))) {
|
|
r = -EFAULT;
|
|
break;
|
|
}
|
|
|
|
if (!kvm_is_ucontrol(vcpu->kvm)) {
|
|
r = -EINVAL;
|
|
break;
|
|
}
|
|
|
|
r = gmap_map_segment(vcpu->arch.gmap, ucasmap.user_addr,
|
|
ucasmap.vcpu_addr, ucasmap.length);
|
|
break;
|
|
}
|
|
case KVM_S390_UCAS_UNMAP: {
|
|
struct kvm_s390_ucas_mapping ucasmap;
|
|
|
|
if (copy_from_user(&ucasmap, argp, sizeof(ucasmap))) {
|
|
r = -EFAULT;
|
|
break;
|
|
}
|
|
|
|
if (!kvm_is_ucontrol(vcpu->kvm)) {
|
|
r = -EINVAL;
|
|
break;
|
|
}
|
|
|
|
r = gmap_unmap_segment(vcpu->arch.gmap, ucasmap.vcpu_addr,
|
|
ucasmap.length);
|
|
break;
|
|
}
|
|
#endif
|
|
case KVM_S390_VCPU_FAULT: {
|
|
r = gmap_fault(arg, vcpu->arch.gmap);
|
|
if (!IS_ERR_VALUE(r))
|
|
r = 0;
|
|
break;
|
|
}
|
|
case KVM_ENABLE_CAP:
|
|
{
|
|
struct kvm_enable_cap cap;
|
|
r = -EFAULT;
|
|
if (copy_from_user(&cap, argp, sizeof(cap)))
|
|
break;
|
|
r = kvm_vcpu_ioctl_enable_cap(vcpu, &cap);
|
|
break;
|
|
}
|
|
default:
|
|
r = -ENOTTY;
|
|
}
|
|
return r;
|
|
}
|
|
|
|
int kvm_arch_vcpu_fault(struct kvm_vcpu *vcpu, struct vm_fault *vmf)
|
|
{
|
|
#ifdef CONFIG_KVM_S390_UCONTROL
|
|
if ((vmf->pgoff == KVM_S390_SIE_PAGE_OFFSET)
|
|
&& (kvm_is_ucontrol(vcpu->kvm))) {
|
|
vmf->page = virt_to_page(vcpu->arch.sie_block);
|
|
get_page(vmf->page);
|
|
return 0;
|
|
}
|
|
#endif
|
|
return VM_FAULT_SIGBUS;
|
|
}
|
|
|
|
void kvm_arch_free_memslot(struct kvm_memory_slot *free,
|
|
struct kvm_memory_slot *dont)
|
|
{
|
|
}
|
|
|
|
int kvm_arch_create_memslot(struct kvm_memory_slot *slot, unsigned long npages)
|
|
{
|
|
return 0;
|
|
}
|
|
|
|
void kvm_arch_memslots_updated(struct kvm *kvm)
|
|
{
|
|
}
|
|
|
|
/* Section: memory related */
|
|
int kvm_arch_prepare_memory_region(struct kvm *kvm,
|
|
struct kvm_memory_slot *memslot,
|
|
struct kvm_userspace_memory_region *mem,
|
|
enum kvm_mr_change change)
|
|
{
|
|
/* A few sanity checks. We can have memory slots which have to be
|
|
located/ended at a segment boundary (1MB). The memory in userland is
|
|
ok to be fragmented into various different vmas. It is okay to mmap()
|
|
and munmap() stuff in this slot after doing this call at any time */
|
|
|
|
if (mem->userspace_addr & 0xffffful)
|
|
return -EINVAL;
|
|
|
|
if (mem->memory_size & 0xffffful)
|
|
return -EINVAL;
|
|
|
|
return 0;
|
|
}
|
|
|
|
void kvm_arch_commit_memory_region(struct kvm *kvm,
|
|
struct kvm_userspace_memory_region *mem,
|
|
const struct kvm_memory_slot *old,
|
|
enum kvm_mr_change change)
|
|
{
|
|
int rc;
|
|
|
|
/* If the basics of the memslot do not change, we do not want
|
|
* to update the gmap. Every update causes several unnecessary
|
|
* segment translation exceptions. This is usually handled just
|
|
* fine by the normal fault handler + gmap, but it will also
|
|
* cause faults on the prefix page of running guest CPUs.
|
|
*/
|
|
if (old->userspace_addr == mem->userspace_addr &&
|
|
old->base_gfn * PAGE_SIZE == mem->guest_phys_addr &&
|
|
old->npages * PAGE_SIZE == mem->memory_size)
|
|
return;
|
|
|
|
rc = gmap_map_segment(kvm->arch.gmap, mem->userspace_addr,
|
|
mem->guest_phys_addr, mem->memory_size);
|
|
if (rc)
|
|
printk(KERN_WARNING "kvm-s390: failed to commit memory region\n");
|
|
return;
|
|
}
|
|
|
|
void kvm_arch_flush_shadow_all(struct kvm *kvm)
|
|
{
|
|
}
|
|
|
|
void kvm_arch_flush_shadow_memslot(struct kvm *kvm,
|
|
struct kvm_memory_slot *slot)
|
|
{
|
|
}
|
|
|
|
static int __init kvm_s390_init(void)
|
|
{
|
|
int ret;
|
|
ret = kvm_init(NULL, sizeof(struct kvm_vcpu), 0, THIS_MODULE);
|
|
if (ret)
|
|
return ret;
|
|
|
|
/*
|
|
* guests can ask for up to 255+1 double words, we need a full page
|
|
* to hold the maximum amount of facilities. On the other hand, we
|
|
* only set facilities that are known to work in KVM.
|
|
*/
|
|
vfacilities = (unsigned long *) get_zeroed_page(GFP_KERNEL|GFP_DMA);
|
|
if (!vfacilities) {
|
|
kvm_exit();
|
|
return -ENOMEM;
|
|
}
|
|
memcpy(vfacilities, S390_lowcore.stfle_fac_list, 16);
|
|
vfacilities[0] &= 0xff82fff3f47c0000UL;
|
|
vfacilities[1] &= 0x001c000000000000UL;
|
|
return 0;
|
|
}
|
|
|
|
static void __exit kvm_s390_exit(void)
|
|
{
|
|
free_page((unsigned long) vfacilities);
|
|
kvm_exit();
|
|
}
|
|
|
|
module_init(kvm_s390_init);
|
|
module_exit(kvm_s390_exit);
|
|
|
|
/*
|
|
* Enable autoloading of the kvm module.
|
|
* Note that we add the module alias here instead of virt/kvm/kvm_main.c
|
|
* since x86 takes a different approach.
|
|
*/
|
|
#include <linux/miscdevice.h>
|
|
MODULE_ALIAS_MISCDEV(KVM_MINOR);
|
|
MODULE_ALIAS("devname:kvm");
|