2008-03-26 00:47:20 +07:00
|
|
|
/*
|
2012-07-20 16:15:04 +07:00
|
|
|
* hosting zSeries kernel virtual machines
|
2008-03-26 00:47:20 +07:00
|
|
|
*
|
2012-07-20 16:15:04 +07:00
|
|
|
* Copyright IBM Corp. 2008, 2009
|
2008-03-26 00:47:20 +07:00
|
|
|
*
|
|
|
|
* This program is free software; you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU General Public License (version 2 only)
|
|
|
|
* as published by the Free Software Foundation.
|
|
|
|
*
|
|
|
|
* Author(s): Carsten Otte <cotte@de.ibm.com>
|
|
|
|
* Christian Borntraeger <borntraeger@de.ibm.com>
|
|
|
|
* Heiko Carstens <heiko.carstens@de.ibm.com>
|
2009-05-25 18:40:51 +07:00
|
|
|
* Christian Ehrhardt <ehrhardt@de.ibm.com>
|
2012-08-02 21:10:17 +07:00
|
|
|
* Jason J. Herne <jjherne@us.ibm.com>
|
2008-03-26 00:47:20 +07:00
|
|
|
*/
|
|
|
|
|
|
|
|
#include <linux/compiler.h>
|
|
|
|
#include <linux/err.h>
|
|
|
|
#include <linux/fs.h>
|
2009-05-12 22:21:49 +07:00
|
|
|
#include <linux/hrtimer.h>
|
2008-03-26 00:47:20 +07:00
|
|
|
#include <linux/init.h>
|
|
|
|
#include <linux/kvm.h>
|
|
|
|
#include <linux/kvm_host.h>
|
|
|
|
#include <linux/module.h>
|
2014-09-03 15:13:53 +07:00
|
|
|
#include <linux/random.h>
|
2008-03-26 00:47:20 +07:00
|
|
|
#include <linux/slab.h>
|
KVM: s390: interrupt subsystem, cpu timer, waitpsw
This patch contains the s390 interrupt subsystem (similar to in kernel apic)
including timer interrupts (similar to in-kernel-pit) and enabled wait
(similar to in kernel hlt).
In order to achieve that, this patch also introduces intercept handling
for instruction intercepts, and it implements load control instructions.
This patch introduces an ioctl KVM_S390_INTERRUPT which is valid for both
the vm file descriptors and the vcpu file descriptors. In case this ioctl is
issued against a vm file descriptor, the interrupt is considered floating.
Floating interrupts may be delivered to any virtual cpu in the configuration.
The following interrupts are supported:
SIGP STOP - interprocessor signal that stops a remote cpu
SIGP SET PREFIX - interprocessor signal that sets the prefix register of a
(stopped) remote cpu
INT EMERGENCY - interprocessor interrupt, usually used to signal need_reshed
and for smp_call_function() in the guest.
PROGRAM INT - exception during program execution such as page fault, illegal
instruction and friends
RESTART - interprocessor signal that starts a stopped cpu
INT VIRTIO - floating interrupt for virtio signalisation
INT SERVICE - floating interrupt for signalisations from the system
service processor
struct kvm_s390_interrupt, which is submitted as ioctl parameter when injecting
an interrupt, also carrys parameter data for interrupts along with the interrupt
type. Interrupts on s390 usually have a state that represents the current
operation, or identifies which device has caused the interruption on s390.
kvm_s390_handle_wait() does handle waitpsw in two flavors: in case of a
disabled wait (that is, disabled for interrupts), we exit to userspace. In case
of an enabled wait we set up a timer that equals the cpu clock comparator value
and sleep on a wait queue.
[christian: change virtio interrupt to 0x2603]
Acked-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
Signed-off-by: Heiko Carstens <heiko.carstens@de.ibm.com>
Signed-off-by: Carsten Otte <cotte@de.ibm.com>
Signed-off-by: Christian Borntraeger <borntraeger@de.ibm.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
2008-03-26 00:47:26 +07:00
|
|
|
#include <linux/timer.h>
|
2015-02-06 21:01:21 +07:00
|
|
|
#include <linux/vmalloc.h>
|
2010-02-27 04:37:43 +07:00
|
|
|
#include <asm/asm-offsets.h>
|
2008-03-26 00:47:20 +07:00
|
|
|
#include <asm/lowcore.h>
|
2015-05-13 15:58:41 +07:00
|
|
|
#include <asm/etr.h>
|
2008-03-26 00:47:20 +07:00
|
|
|
#include <asm/pgtable.h>
|
2009-03-26 21:24:01 +07:00
|
|
|
#include <asm/nmi.h>
|
2012-03-29 00:30:02 +07:00
|
|
|
#include <asm/switch_to.h>
|
2013-07-03 20:18:35 +07:00
|
|
|
#include <asm/isc.h>
|
2012-05-15 19:15:25 +07:00
|
|
|
#include <asm/sclp.h>
|
2008-03-26 00:47:23 +07:00
|
|
|
#include "kvm-s390.h"
|
2008-03-26 00:47:20 +07:00
|
|
|
#include "gaccess.h"
|
|
|
|
|
2015-05-20 18:24:02 +07:00
|
|
|
#define KMSG_COMPONENT "kvm-s390"
|
|
|
|
#undef pr_fmt
|
|
|
|
#define pr_fmt(fmt) KMSG_COMPONENT ": " fmt
|
|
|
|
|
2012-07-23 22:20:29 +07:00
|
|
|
#define CREATE_TRACE_POINTS
|
|
|
|
#include "trace.h"
|
2012-07-23 22:20:30 +07:00
|
|
|
#include "trace-s390.h"
|
2012-07-23 22:20:29 +07:00
|
|
|
|
2015-02-06 21:01:21 +07:00
|
|
|
#define MEM_OP_MAX_SIZE 65536 /* Maximum transfer size for KVM_S390_MEM_OP */
|
2014-11-24 23:13:46 +07:00
|
|
|
#define LOCAL_IRQS 32
|
|
|
|
#define VCPU_IRQS_MAX_BUF (sizeof(struct kvm_s390_irq) * \
|
|
|
|
(KVM_MAX_VCPUS + LOCAL_IRQS))
|
2015-02-06 21:01:21 +07:00
|
|
|
|
2008-03-26 00:47:20 +07:00
|
|
|
#define VCPU_STAT(x) offsetof(struct kvm_vcpu, stat.x), KVM_STAT_VCPU
|
|
|
|
|
|
|
|
struct kvm_stats_debugfs_item debugfs_entries[] = {
|
|
|
|
{ "userspace_handled", VCPU_STAT(exit_userspace) },
|
2008-05-07 14:22:53 +07:00
|
|
|
{ "exit_null", VCPU_STAT(exit_null) },
|
2008-03-26 00:47:23 +07:00
|
|
|
{ "exit_validity", VCPU_STAT(exit_validity) },
|
|
|
|
{ "exit_stop_request", VCPU_STAT(exit_stop_request) },
|
|
|
|
{ "exit_external_request", VCPU_STAT(exit_external_request) },
|
|
|
|
{ "exit_external_interrupt", VCPU_STAT(exit_external_interrupt) },
|
KVM: s390: interrupt subsystem, cpu timer, waitpsw
This patch contains the s390 interrupt subsystem (similar to in kernel apic)
including timer interrupts (similar to in-kernel-pit) and enabled wait
(similar to in kernel hlt).
In order to achieve that, this patch also introduces intercept handling
for instruction intercepts, and it implements load control instructions.
This patch introduces an ioctl KVM_S390_INTERRUPT which is valid for both
the vm file descriptors and the vcpu file descriptors. In case this ioctl is
issued against a vm file descriptor, the interrupt is considered floating.
Floating interrupts may be delivered to any virtual cpu in the configuration.
The following interrupts are supported:
SIGP STOP - interprocessor signal that stops a remote cpu
SIGP SET PREFIX - interprocessor signal that sets the prefix register of a
(stopped) remote cpu
INT EMERGENCY - interprocessor interrupt, usually used to signal need_reshed
and for smp_call_function() in the guest.
PROGRAM INT - exception during program execution such as page fault, illegal
instruction and friends
RESTART - interprocessor signal that starts a stopped cpu
INT VIRTIO - floating interrupt for virtio signalisation
INT SERVICE - floating interrupt for signalisations from the system
service processor
struct kvm_s390_interrupt, which is submitted as ioctl parameter when injecting
an interrupt, also carrys parameter data for interrupts along with the interrupt
type. Interrupts on s390 usually have a state that represents the current
operation, or identifies which device has caused the interruption on s390.
kvm_s390_handle_wait() does handle waitpsw in two flavors: in case of a
disabled wait (that is, disabled for interrupts), we exit to userspace. In case
of an enabled wait we set up a timer that equals the cpu clock comparator value
and sleep on a wait queue.
[christian: change virtio interrupt to 0x2603]
Acked-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
Signed-off-by: Heiko Carstens <heiko.carstens@de.ibm.com>
Signed-off-by: Carsten Otte <cotte@de.ibm.com>
Signed-off-by: Christian Borntraeger <borntraeger@de.ibm.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
2008-03-26 00:47:26 +07:00
|
|
|
{ "exit_instruction", VCPU_STAT(exit_instruction) },
|
|
|
|
{ "exit_program_interruption", VCPU_STAT(exit_program_interruption) },
|
|
|
|
{ "exit_instr_and_program_int", VCPU_STAT(exit_instr_and_program) },
|
kvm: add halt_poll_ns module parameter
This patch introduces a new module parameter for the KVM module; when it
is present, KVM attempts a bit of polling on every HLT before scheduling
itself out via kvm_vcpu_block.
This parameter helps a lot for latency-bound workloads---in particular
I tested it with O_DSYNC writes with a battery-backed disk in the host.
In this case, writes are fast (because the data doesn't have to go all
the way to the platters) but they cannot be merged by either the host or
the guest. KVM's performance here is usually around 30% of bare metal,
or 50% if you use cache=directsync or cache=writethrough (these
parameters avoid that the guest sends pointless flush requests, and
at the same time they are not slow because of the battery-backed cache).
The bad performance happens because on every halt the host CPU decides
to halt itself too. When the interrupt comes, the vCPU thread is then
migrated to a new physical CPU, and in general the latency is horrible
because the vCPU thread has to be scheduled back in.
With this patch performance reaches 60-65% of bare metal and, more
important, 99% of what you get if you use idle=poll in the guest. This
means that the tunable gets rid of this particular bottleneck, and more
work can be done to improve performance in the kernel or QEMU.
Of course there is some price to pay; every time an otherwise idle vCPUs
is interrupted by an interrupt, it will poll unnecessarily and thus
impose a little load on the host. The above results were obtained with
a mostly random value of the parameter (500000), and the load was around
1.5-2.5% CPU usage on one of the host's core for each idle guest vCPU.
The patch also adds a new stat, /sys/kernel/debug/kvm/halt_successful_poll,
that can be used to tune the parameter. It counts how many HLT
instructions received an interrupt during the polling period; each
successful poll avoids that Linux schedules the VCPU thread out and back
in, and may also avoid a likely trip to C1 and back for the physical CPU.
While the VM is idle, a Linux 4 VCPU VM halts around 10 times per second.
Of these halts, almost all are failed polls. During the benchmark,
instead, basically all halts end within the polling period, except a more
or less constant stream of 50 per second coming from vCPUs that are not
running the benchmark. The wasted time is thus very low. Things may
be slightly different for Windows VMs, which have a ~10 ms timer tick.
The effect is also visible on Marcelo's recently-introduced latency
test for the TSC deadline timer. Though of course a non-RT kernel has
awful latency bounds, the latency of the timer is around 8000-10000 clock
cycles compared to 20000-120000 without setting halt_poll_ns. For the TSC
deadline timer, thus, the effect is both a smaller average latency and
a smaller variance.
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
2015-02-05 00:20:58 +07:00
|
|
|
{ "halt_successful_poll", VCPU_STAT(halt_successful_poll) },
|
2015-09-15 23:27:57 +07:00
|
|
|
{ "halt_attempted_poll", VCPU_STAT(halt_attempted_poll) },
|
2014-07-11 15:00:43 +07:00
|
|
|
{ "halt_wakeup", VCPU_STAT(halt_wakeup) },
|
2008-07-25 20:52:44 +07:00
|
|
|
{ "instruction_lctlg", VCPU_STAT(instruction_lctlg) },
|
KVM: s390: interrupt subsystem, cpu timer, waitpsw
This patch contains the s390 interrupt subsystem (similar to in kernel apic)
including timer interrupts (similar to in-kernel-pit) and enabled wait
(similar to in kernel hlt).
In order to achieve that, this patch also introduces intercept handling
for instruction intercepts, and it implements load control instructions.
This patch introduces an ioctl KVM_S390_INTERRUPT which is valid for both
the vm file descriptors and the vcpu file descriptors. In case this ioctl is
issued against a vm file descriptor, the interrupt is considered floating.
Floating interrupts may be delivered to any virtual cpu in the configuration.
The following interrupts are supported:
SIGP STOP - interprocessor signal that stops a remote cpu
SIGP SET PREFIX - interprocessor signal that sets the prefix register of a
(stopped) remote cpu
INT EMERGENCY - interprocessor interrupt, usually used to signal need_reshed
and for smp_call_function() in the guest.
PROGRAM INT - exception during program execution such as page fault, illegal
instruction and friends
RESTART - interprocessor signal that starts a stopped cpu
INT VIRTIO - floating interrupt for virtio signalisation
INT SERVICE - floating interrupt for signalisations from the system
service processor
struct kvm_s390_interrupt, which is submitted as ioctl parameter when injecting
an interrupt, also carrys parameter data for interrupts along with the interrupt
type. Interrupts on s390 usually have a state that represents the current
operation, or identifies which device has caused the interruption on s390.
kvm_s390_handle_wait() does handle waitpsw in two flavors: in case of a
disabled wait (that is, disabled for interrupts), we exit to userspace. In case
of an enabled wait we set up a timer that equals the cpu clock comparator value
and sleep on a wait queue.
[christian: change virtio interrupt to 0x2603]
Acked-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
Signed-off-by: Heiko Carstens <heiko.carstens@de.ibm.com>
Signed-off-by: Carsten Otte <cotte@de.ibm.com>
Signed-off-by: Christian Borntraeger <borntraeger@de.ibm.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
2008-03-26 00:47:26 +07:00
|
|
|
{ "instruction_lctl", VCPU_STAT(instruction_lctl) },
|
2014-01-23 16:47:13 +07:00
|
|
|
{ "instruction_stctl", VCPU_STAT(instruction_stctl) },
|
|
|
|
{ "instruction_stctg", VCPU_STAT(instruction_stctg) },
|
KVM: s390: interrupt subsystem, cpu timer, waitpsw
This patch contains the s390 interrupt subsystem (similar to in kernel apic)
including timer interrupts (similar to in-kernel-pit) and enabled wait
(similar to in kernel hlt).
In order to achieve that, this patch also introduces intercept handling
for instruction intercepts, and it implements load control instructions.
This patch introduces an ioctl KVM_S390_INTERRUPT which is valid for both
the vm file descriptors and the vcpu file descriptors. In case this ioctl is
issued against a vm file descriptor, the interrupt is considered floating.
Floating interrupts may be delivered to any virtual cpu in the configuration.
The following interrupts are supported:
SIGP STOP - interprocessor signal that stops a remote cpu
SIGP SET PREFIX - interprocessor signal that sets the prefix register of a
(stopped) remote cpu
INT EMERGENCY - interprocessor interrupt, usually used to signal need_reshed
and for smp_call_function() in the guest.
PROGRAM INT - exception during program execution such as page fault, illegal
instruction and friends
RESTART - interprocessor signal that starts a stopped cpu
INT VIRTIO - floating interrupt for virtio signalisation
INT SERVICE - floating interrupt for signalisations from the system
service processor
struct kvm_s390_interrupt, which is submitted as ioctl parameter when injecting
an interrupt, also carrys parameter data for interrupts along with the interrupt
type. Interrupts on s390 usually have a state that represents the current
operation, or identifies which device has caused the interruption on s390.
kvm_s390_handle_wait() does handle waitpsw in two flavors: in case of a
disabled wait (that is, disabled for interrupts), we exit to userspace. In case
of an enabled wait we set up a timer that equals the cpu clock comparator value
and sleep on a wait queue.
[christian: change virtio interrupt to 0x2603]
Acked-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
Signed-off-by: Heiko Carstens <heiko.carstens@de.ibm.com>
Signed-off-by: Carsten Otte <cotte@de.ibm.com>
Signed-off-by: Christian Borntraeger <borntraeger@de.ibm.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
2008-03-26 00:47:26 +07:00
|
|
|
{ "deliver_emergency_signal", VCPU_STAT(deliver_emergency_signal) },
|
2011-10-18 17:27:15 +07:00
|
|
|
{ "deliver_external_call", VCPU_STAT(deliver_external_call) },
|
KVM: s390: interrupt subsystem, cpu timer, waitpsw
This patch contains the s390 interrupt subsystem (similar to in kernel apic)
including timer interrupts (similar to in-kernel-pit) and enabled wait
(similar to in kernel hlt).
In order to achieve that, this patch also introduces intercept handling
for instruction intercepts, and it implements load control instructions.
This patch introduces an ioctl KVM_S390_INTERRUPT which is valid for both
the vm file descriptors and the vcpu file descriptors. In case this ioctl is
issued against a vm file descriptor, the interrupt is considered floating.
Floating interrupts may be delivered to any virtual cpu in the configuration.
The following interrupts are supported:
SIGP STOP - interprocessor signal that stops a remote cpu
SIGP SET PREFIX - interprocessor signal that sets the prefix register of a
(stopped) remote cpu
INT EMERGENCY - interprocessor interrupt, usually used to signal need_reshed
and for smp_call_function() in the guest.
PROGRAM INT - exception during program execution such as page fault, illegal
instruction and friends
RESTART - interprocessor signal that starts a stopped cpu
INT VIRTIO - floating interrupt for virtio signalisation
INT SERVICE - floating interrupt for signalisations from the system
service processor
struct kvm_s390_interrupt, which is submitted as ioctl parameter when injecting
an interrupt, also carrys parameter data for interrupts along with the interrupt
type. Interrupts on s390 usually have a state that represents the current
operation, or identifies which device has caused the interruption on s390.
kvm_s390_handle_wait() does handle waitpsw in two flavors: in case of a
disabled wait (that is, disabled for interrupts), we exit to userspace. In case
of an enabled wait we set up a timer that equals the cpu clock comparator value
and sleep on a wait queue.
[christian: change virtio interrupt to 0x2603]
Acked-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
Signed-off-by: Heiko Carstens <heiko.carstens@de.ibm.com>
Signed-off-by: Carsten Otte <cotte@de.ibm.com>
Signed-off-by: Christian Borntraeger <borntraeger@de.ibm.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
2008-03-26 00:47:26 +07:00
|
|
|
{ "deliver_service_signal", VCPU_STAT(deliver_service_signal) },
|
|
|
|
{ "deliver_virtio_interrupt", VCPU_STAT(deliver_virtio_interrupt) },
|
|
|
|
{ "deliver_stop_signal", VCPU_STAT(deliver_stop_signal) },
|
|
|
|
{ "deliver_prefix_signal", VCPU_STAT(deliver_prefix_signal) },
|
|
|
|
{ "deliver_restart_signal", VCPU_STAT(deliver_restart_signal) },
|
|
|
|
{ "deliver_program_interruption", VCPU_STAT(deliver_program_int) },
|
|
|
|
{ "exit_wait_state", VCPU_STAT(exit_wait_state) },
|
2013-06-12 18:54:53 +07:00
|
|
|
{ "instruction_pfmf", VCPU_STAT(instruction_pfmf) },
|
2008-03-26 00:47:29 +07:00
|
|
|
{ "instruction_stidp", VCPU_STAT(instruction_stidp) },
|
|
|
|
{ "instruction_spx", VCPU_STAT(instruction_spx) },
|
|
|
|
{ "instruction_stpx", VCPU_STAT(instruction_stpx) },
|
|
|
|
{ "instruction_stap", VCPU_STAT(instruction_stap) },
|
|
|
|
{ "instruction_storage_key", VCPU_STAT(instruction_storage_key) },
|
2014-01-10 20:33:28 +07:00
|
|
|
{ "instruction_ipte_interlock", VCPU_STAT(instruction_ipte_interlock) },
|
2008-03-26 00:47:29 +07:00
|
|
|
{ "instruction_stsch", VCPU_STAT(instruction_stsch) },
|
|
|
|
{ "instruction_chsc", VCPU_STAT(instruction_chsc) },
|
2013-04-17 22:36:29 +07:00
|
|
|
{ "instruction_essa", VCPU_STAT(instruction_essa) },
|
2008-03-26 00:47:29 +07:00
|
|
|
{ "instruction_stsi", VCPU_STAT(instruction_stsi) },
|
|
|
|
{ "instruction_stfl", VCPU_STAT(instruction_stfl) },
|
2011-07-24 15:48:17 +07:00
|
|
|
{ "instruction_tprot", VCPU_STAT(instruction_tprot) },
|
2008-03-26 00:47:31 +07:00
|
|
|
{ "instruction_sigp_sense", VCPU_STAT(instruction_sigp_sense) },
|
2011-11-17 17:00:42 +07:00
|
|
|
{ "instruction_sigp_sense_running", VCPU_STAT(instruction_sigp_sense_running) },
|
2011-10-18 17:27:15 +07:00
|
|
|
{ "instruction_sigp_external_call", VCPU_STAT(instruction_sigp_external_call) },
|
2008-03-26 00:47:31 +07:00
|
|
|
{ "instruction_sigp_emergency", VCPU_STAT(instruction_sigp_emergency) },
|
2014-05-23 17:25:11 +07:00
|
|
|
{ "instruction_sigp_cond_emergency", VCPU_STAT(instruction_sigp_cond_emergency) },
|
|
|
|
{ "instruction_sigp_start", VCPU_STAT(instruction_sigp_start) },
|
2008-03-26 00:47:31 +07:00
|
|
|
{ "instruction_sigp_stop", VCPU_STAT(instruction_sigp_stop) },
|
2014-05-23 17:25:11 +07:00
|
|
|
{ "instruction_sigp_stop_store_status", VCPU_STAT(instruction_sigp_stop_store_status) },
|
|
|
|
{ "instruction_sigp_store_status", VCPU_STAT(instruction_sigp_store_status) },
|
2015-02-12 21:06:34 +07:00
|
|
|
{ "instruction_sigp_store_adtl_status", VCPU_STAT(instruction_sigp_store_adtl_status) },
|
2008-03-26 00:47:31 +07:00
|
|
|
{ "instruction_sigp_set_arch", VCPU_STAT(instruction_sigp_arch) },
|
|
|
|
{ "instruction_sigp_set_prefix", VCPU_STAT(instruction_sigp_prefix) },
|
|
|
|
{ "instruction_sigp_restart", VCPU_STAT(instruction_sigp_restart) },
|
2014-05-23 17:25:11 +07:00
|
|
|
{ "instruction_sigp_cpu_reset", VCPU_STAT(instruction_sigp_cpu_reset) },
|
|
|
|
{ "instruction_sigp_init_cpu_reset", VCPU_STAT(instruction_sigp_init_cpu_reset) },
|
|
|
|
{ "instruction_sigp_unknown", VCPU_STAT(instruction_sigp_unknown) },
|
2011-10-30 21:17:03 +07:00
|
|
|
{ "diagnose_10", VCPU_STAT(diagnose_10) },
|
2008-03-26 00:47:34 +07:00
|
|
|
{ "diagnose_44", VCPU_STAT(diagnose_44) },
|
2012-04-25 20:30:38 +07:00
|
|
|
{ "diagnose_9c", VCPU_STAT(diagnose_9c) },
|
2015-07-07 20:19:32 +07:00
|
|
|
{ "diagnose_258", VCPU_STAT(diagnose_258) },
|
|
|
|
{ "diagnose_308", VCPU_STAT(diagnose_308) },
|
|
|
|
{ "diagnose_500", VCPU_STAT(diagnose_500) },
|
2008-03-26 00:47:20 +07:00
|
|
|
{ NULL }
|
|
|
|
};
|
|
|
|
|
2015-02-02 21:42:51 +07:00
|
|
|
/* upper facilities limit for kvm */
|
|
|
|
unsigned long kvm_s390_fac_list_mask[] = {
|
2015-03-18 19:54:31 +07:00
|
|
|
0xffe6fffbfcfdfc40UL,
|
2015-02-18 17:13:03 +07:00
|
|
|
0x005e800000000000UL,
|
2015-02-02 21:42:51 +07:00
|
|
|
};
|
2008-03-26 00:47:20 +07:00
|
|
|
|
2015-02-02 21:42:51 +07:00
|
|
|
unsigned long kvm_s390_fac_list_mask_size(void)
|
2013-07-26 20:04:04 +07:00
|
|
|
{
|
2015-02-02 21:42:51 +07:00
|
|
|
BUILD_BUG_ON(ARRAY_SIZE(kvm_s390_fac_list_mask) > S390_ARCH_FAC_MASK_SIZE_U64);
|
|
|
|
return ARRAY_SIZE(kvm_s390_fac_list_mask);
|
2013-07-26 20:04:04 +07:00
|
|
|
}
|
|
|
|
|
2015-02-02 21:42:51 +07:00
|
|
|
static struct gmap_notifier gmap_notifier;
|
2015-07-22 20:50:58 +07:00
|
|
|
debug_info_t *kvm_s390_dbf;
|
2015-02-02 21:42:51 +07:00
|
|
|
|
2008-03-26 00:47:20 +07:00
|
|
|
/* Section: not file related */
|
2014-08-28 20:13:03 +07:00
|
|
|
int kvm_arch_hardware_enable(void)
|
2008-03-26 00:47:20 +07:00
|
|
|
{
|
|
|
|
/* every s390 is virtualization enabled ;-) */
|
2009-09-15 16:37:46 +07:00
|
|
|
return 0;
|
2008-03-26 00:47:20 +07:00
|
|
|
}
|
|
|
|
|
2013-05-17 19:41:36 +07:00
|
|
|
static void kvm_gmap_notifier(struct gmap *gmap, unsigned long address);
|
|
|
|
|
2015-05-13 15:58:41 +07:00
|
|
|
/*
|
|
|
|
* This callback is executed during stop_machine(). All CPUs are therefore
|
|
|
|
* temporarily stopped. In order not to change guest behavior, we have to
|
|
|
|
* disable preemption whenever we touch the epoch of kvm and the VCPUs,
|
|
|
|
* so a CPU won't be stopped while calculating with the epoch.
|
|
|
|
*/
|
|
|
|
static int kvm_clock_sync(struct notifier_block *notifier, unsigned long val,
|
|
|
|
void *v)
|
|
|
|
{
|
|
|
|
struct kvm *kvm;
|
|
|
|
struct kvm_vcpu *vcpu;
|
|
|
|
int i;
|
|
|
|
unsigned long long *delta = v;
|
|
|
|
|
|
|
|
list_for_each_entry(kvm, &vm_list, vm_list) {
|
|
|
|
kvm->arch.epoch -= *delta;
|
|
|
|
kvm_for_each_vcpu(i, vcpu, kvm) {
|
|
|
|
vcpu->arch.sie_block->epoch -= *delta;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return NOTIFY_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
static struct notifier_block kvm_clock_notifier = {
|
|
|
|
.notifier_call = kvm_clock_sync,
|
|
|
|
};
|
|
|
|
|
2008-03-26 00:47:20 +07:00
|
|
|
int kvm_arch_hardware_setup(void)
|
|
|
|
{
|
2013-05-17 19:41:36 +07:00
|
|
|
gmap_notifier.notifier_call = kvm_gmap_notifier;
|
|
|
|
gmap_register_ipte_notifier(&gmap_notifier);
|
2015-05-13 15:58:41 +07:00
|
|
|
atomic_notifier_chain_register(&s390_epoch_delta_notifier,
|
|
|
|
&kvm_clock_notifier);
|
2008-03-26 00:47:20 +07:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
void kvm_arch_hardware_unsetup(void)
|
|
|
|
{
|
2013-05-17 19:41:36 +07:00
|
|
|
gmap_unregister_ipte_notifier(&gmap_notifier);
|
2015-05-13 15:58:41 +07:00
|
|
|
atomic_notifier_chain_unregister(&s390_epoch_delta_notifier,
|
|
|
|
&kvm_clock_notifier);
|
2008-03-26 00:47:20 +07:00
|
|
|
}
|
|
|
|
|
|
|
|
int kvm_arch_init(void *opaque)
|
|
|
|
{
|
2015-07-22 20:50:58 +07:00
|
|
|
kvm_s390_dbf = debug_register("kvm-trace", 32, 1, 7 * sizeof(long));
|
|
|
|
if (!kvm_s390_dbf)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
if (debug_register_view(kvm_s390_dbf, &debug_sprintf_view)) {
|
|
|
|
debug_unregister(kvm_s390_dbf);
|
|
|
|
return -ENOMEM;
|
|
|
|
}
|
|
|
|
|
2014-09-02 16:27:35 +07:00
|
|
|
/* Register floating interrupt controller interface. */
|
|
|
|
return kvm_register_device_ops(&kvm_flic_ops, KVM_DEV_TYPE_FLIC);
|
2008-03-26 00:47:20 +07:00
|
|
|
}
|
|
|
|
|
2015-07-22 20:50:58 +07:00
|
|
|
void kvm_arch_exit(void)
|
|
|
|
{
|
|
|
|
debug_unregister(kvm_s390_dbf);
|
|
|
|
}
|
|
|
|
|
2008-03-26 00:47:20 +07:00
|
|
|
/* Section: device related */
|
|
|
|
long kvm_arch_dev_ioctl(struct file *filp,
|
|
|
|
unsigned int ioctl, unsigned long arg)
|
|
|
|
{
|
|
|
|
if (ioctl == KVM_S390_ENABLE_SIE)
|
|
|
|
return s390_enable_sie();
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
2014-07-14 23:27:35 +07:00
|
|
|
int kvm_vm_ioctl_check_extension(struct kvm *kvm, long ext)
|
2008-03-26 00:47:20 +07:00
|
|
|
{
|
2009-11-19 20:21:16 +07:00
|
|
|
int r;
|
|
|
|
|
2008-07-25 20:49:13 +07:00
|
|
|
switch (ext) {
|
2009-11-19 20:21:16 +07:00
|
|
|
case KVM_CAP_S390_PSW:
|
2011-09-20 22:07:29 +07:00
|
|
|
case KVM_CAP_S390_GMAP:
|
2011-11-17 17:00:44 +07:00
|
|
|
case KVM_CAP_SYNC_MMU:
|
2012-01-04 16:25:29 +07:00
|
|
|
#ifdef CONFIG_KVM_S390_UCONTROL
|
|
|
|
case KVM_CAP_S390_UCONTROL:
|
|
|
|
#endif
|
2013-10-07 22:11:48 +07:00
|
|
|
case KVM_CAP_ASYNC_PF:
|
2012-01-11 17:20:31 +07:00
|
|
|
case KVM_CAP_SYNC_REGS:
|
2012-05-15 19:15:26 +07:00
|
|
|
case KVM_CAP_ONE_REG:
|
2012-12-20 21:32:11 +07:00
|
|
|
case KVM_CAP_ENABLE_CAP:
|
2012-12-20 21:32:12 +07:00
|
|
|
case KVM_CAP_S390_CSS_SUPPORT:
|
2013-02-28 18:33:21 +07:00
|
|
|
case KVM_CAP_IOEVENTFD:
|
2013-10-07 21:13:45 +07:00
|
|
|
case KVM_CAP_DEVICE_CTRL:
|
2013-10-23 23:26:34 +07:00
|
|
|
case KVM_CAP_ENABLE_CAP_VM:
|
2014-07-15 14:54:39 +07:00
|
|
|
case KVM_CAP_S390_IRQCHIP:
|
2014-04-09 18:13:00 +07:00
|
|
|
case KVM_CAP_VM_ATTRIBUTES:
|
2014-04-10 22:35:00 +07:00
|
|
|
case KVM_CAP_MP_STATE:
|
2014-11-12 02:57:06 +07:00
|
|
|
case KVM_CAP_S390_INJECT_IRQ:
|
2014-10-09 19:10:13 +07:00
|
|
|
case KVM_CAP_S390_USER_SIGP:
|
2015-01-30 22:55:56 +07:00
|
|
|
case KVM_CAP_S390_USER_STSI:
|
2014-09-23 20:23:01 +07:00
|
|
|
case KVM_CAP_S390_SKEYS:
|
2014-11-24 23:13:46 +07:00
|
|
|
case KVM_CAP_S390_IRQ_STATE:
|
2009-11-19 20:21:16 +07:00
|
|
|
r = 1;
|
|
|
|
break;
|
2015-02-06 21:01:21 +07:00
|
|
|
case KVM_CAP_S390_MEM_OP:
|
|
|
|
r = MEM_OP_MAX_SIZE;
|
|
|
|
break;
|
2012-05-02 15:50:38 +07:00
|
|
|
case KVM_CAP_NR_VCPUS:
|
|
|
|
case KVM_CAP_MAX_VCPUS:
|
2015-04-22 23:37:40 +07:00
|
|
|
r = sclp.has_esca ? KVM_S390_ESCA_CPU_SLOTS
|
|
|
|
: KVM_S390_BSCA_CPU_SLOTS;
|
2012-05-02 15:50:38 +07:00
|
|
|
break;
|
2013-03-25 23:22:58 +07:00
|
|
|
case KVM_CAP_NR_MEMSLOTS:
|
|
|
|
r = KVM_USER_MEM_SLOTS;
|
|
|
|
break;
|
2012-05-15 19:15:25 +07:00
|
|
|
case KVM_CAP_S390_COW:
|
2012-11-07 19:17:37 +07:00
|
|
|
r = MACHINE_HAS_ESOP;
|
2012-05-15 19:15:25 +07:00
|
|
|
break;
|
2014-06-09 21:57:26 +07:00
|
|
|
case KVM_CAP_S390_VECTOR_REGISTERS:
|
|
|
|
r = MACHINE_HAS_VX;
|
|
|
|
break;
|
2008-07-25 20:49:13 +07:00
|
|
|
default:
|
2009-11-19 20:21:16 +07:00
|
|
|
r = 0;
|
2008-07-25 20:49:13 +07:00
|
|
|
}
|
2009-11-19 20:21:16 +07:00
|
|
|
return r;
|
2008-03-26 00:47:20 +07:00
|
|
|
}
|
|
|
|
|
2012-08-02 21:10:17 +07:00
|
|
|
static void kvm_s390_sync_dirty_log(struct kvm *kvm,
|
|
|
|
struct kvm_memory_slot *memslot)
|
|
|
|
{
|
|
|
|
gfn_t cur_gfn, last_gfn;
|
|
|
|
unsigned long address;
|
|
|
|
struct gmap *gmap = kvm->arch.gmap;
|
|
|
|
|
|
|
|
down_read(&gmap->mm->mmap_sem);
|
|
|
|
/* Loop over all guest pages */
|
|
|
|
last_gfn = memslot->base_gfn + memslot->npages;
|
|
|
|
for (cur_gfn = memslot->base_gfn; cur_gfn <= last_gfn; cur_gfn++) {
|
|
|
|
address = gfn_to_hva_memslot(memslot, cur_gfn);
|
|
|
|
|
|
|
|
if (gmap_test_and_clear_dirty(address, gmap))
|
|
|
|
mark_page_dirty(kvm, cur_gfn);
|
|
|
|
}
|
|
|
|
up_read(&gmap->mm->mmap_sem);
|
|
|
|
}
|
|
|
|
|
2008-03-26 00:47:20 +07:00
|
|
|
/* Section: vm related */
|
2015-04-21 20:31:59 +07:00
|
|
|
static void sca_del_vcpu(struct kvm_vcpu *vcpu);
|
|
|
|
|
2008-03-26 00:47:20 +07:00
|
|
|
/*
|
|
|
|
* Get (and clear) the dirty memory log for a memory slot.
|
|
|
|
*/
|
|
|
|
int kvm_vm_ioctl_get_dirty_log(struct kvm *kvm,
|
|
|
|
struct kvm_dirty_log *log)
|
|
|
|
{
|
2012-08-02 21:10:17 +07:00
|
|
|
int r;
|
|
|
|
unsigned long n;
|
2015-05-17 21:20:07 +07:00
|
|
|
struct kvm_memslots *slots;
|
2012-08-02 21:10:17 +07:00
|
|
|
struct kvm_memory_slot *memslot;
|
|
|
|
int is_dirty = 0;
|
|
|
|
|
|
|
|
mutex_lock(&kvm->slots_lock);
|
|
|
|
|
|
|
|
r = -EINVAL;
|
|
|
|
if (log->slot >= KVM_USER_MEM_SLOTS)
|
|
|
|
goto out;
|
|
|
|
|
2015-05-17 21:20:07 +07:00
|
|
|
slots = kvm_memslots(kvm);
|
|
|
|
memslot = id_to_memslot(slots, log->slot);
|
2012-08-02 21:10:17 +07:00
|
|
|
r = -ENOENT;
|
|
|
|
if (!memslot->dirty_bitmap)
|
|
|
|
goto out;
|
|
|
|
|
|
|
|
kvm_s390_sync_dirty_log(kvm, memslot);
|
|
|
|
r = kvm_get_dirty_log(kvm, log, &is_dirty);
|
|
|
|
if (r)
|
|
|
|
goto out;
|
|
|
|
|
|
|
|
/* Clear the dirty log */
|
|
|
|
if (is_dirty) {
|
|
|
|
n = kvm_dirty_bitmap_bytes(memslot);
|
|
|
|
memset(memslot->dirty_bitmap, 0, n);
|
|
|
|
}
|
|
|
|
r = 0;
|
|
|
|
out:
|
|
|
|
mutex_unlock(&kvm->slots_lock);
|
|
|
|
return r;
|
2008-03-26 00:47:20 +07:00
|
|
|
}
|
|
|
|
|
2013-10-23 23:26:34 +07:00
|
|
|
static int kvm_vm_ioctl_enable_cap(struct kvm *kvm, struct kvm_enable_cap *cap)
|
|
|
|
{
|
|
|
|
int r;
|
|
|
|
|
|
|
|
if (cap->flags)
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
switch (cap->cap) {
|
2013-07-15 18:36:01 +07:00
|
|
|
case KVM_CAP_S390_IRQCHIP:
|
2015-07-22 20:52:10 +07:00
|
|
|
VM_EVENT(kvm, 3, "%s", "ENABLE: CAP_S390_IRQCHIP");
|
2013-07-15 18:36:01 +07:00
|
|
|
kvm->arch.use_irqchip = 1;
|
|
|
|
r = 0;
|
|
|
|
break;
|
2014-10-09 19:10:13 +07:00
|
|
|
case KVM_CAP_S390_USER_SIGP:
|
2015-07-22 20:52:10 +07:00
|
|
|
VM_EVENT(kvm, 3, "%s", "ENABLE: CAP_S390_USER_SIGP");
|
2014-10-09 19:10:13 +07:00
|
|
|
kvm->arch.user_sigp = 1;
|
|
|
|
r = 0;
|
|
|
|
break;
|
2014-06-09 21:57:26 +07:00
|
|
|
case KVM_CAP_S390_VECTOR_REGISTERS:
|
2015-11-06 18:08:48 +07:00
|
|
|
mutex_lock(&kvm->lock);
|
|
|
|
if (atomic_read(&kvm->online_vcpus)) {
|
|
|
|
r = -EBUSY;
|
|
|
|
} else if (MACHINE_HAS_VX) {
|
2015-03-16 22:05:41 +07:00
|
|
|
set_kvm_facility(kvm->arch.model.fac->mask, 129);
|
|
|
|
set_kvm_facility(kvm->arch.model.fac->list, 129);
|
|
|
|
r = 0;
|
|
|
|
} else
|
|
|
|
r = -EINVAL;
|
2015-11-06 18:08:48 +07:00
|
|
|
mutex_unlock(&kvm->lock);
|
2015-07-22 20:52:10 +07:00
|
|
|
VM_EVENT(kvm, 3, "ENABLE: CAP_S390_VECTOR_REGISTERS %s",
|
|
|
|
r ? "(not available)" : "(success)");
|
2014-06-09 21:57:26 +07:00
|
|
|
break;
|
2015-01-30 22:55:56 +07:00
|
|
|
case KVM_CAP_S390_USER_STSI:
|
2015-07-22 20:52:10 +07:00
|
|
|
VM_EVENT(kvm, 3, "%s", "ENABLE: CAP_S390_USER_STSI");
|
2015-01-30 22:55:56 +07:00
|
|
|
kvm->arch.user_stsi = 1;
|
|
|
|
r = 0;
|
|
|
|
break;
|
2013-10-23 23:26:34 +07:00
|
|
|
default:
|
|
|
|
r = -EINVAL;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
return r;
|
|
|
|
}
|
|
|
|
|
2014-10-31 20:10:41 +07:00
|
|
|
static int kvm_s390_get_mem_control(struct kvm *kvm, struct kvm_device_attr *attr)
|
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
switch (attr->attr) {
|
|
|
|
case KVM_S390_VM_MEM_LIMIT_SIZE:
|
|
|
|
ret = 0;
|
2015-07-22 20:52:10 +07:00
|
|
|
VM_EVENT(kvm, 3, "QUERY: max guest memory: %lu bytes",
|
2014-12-01 23:24:42 +07:00
|
|
|
kvm->arch.mem_limit);
|
|
|
|
if (put_user(kvm->arch.mem_limit, (u64 __user *)attr->addr))
|
2014-10-31 20:10:41 +07:00
|
|
|
ret = -EFAULT;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
ret = -ENXIO;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int kvm_s390_set_mem_control(struct kvm *kvm, struct kvm_device_attr *attr)
|
2014-04-09 18:13:00 +07:00
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
unsigned int idx;
|
|
|
|
switch (attr->attr) {
|
|
|
|
case KVM_S390_VM_MEM_ENABLE_CMMA:
|
2015-05-07 20:41:57 +07:00
|
|
|
/* enable CMMA only for z10 and later (EDAT_1) */
|
|
|
|
ret = -EINVAL;
|
|
|
|
if (!MACHINE_IS_LPAR || !MACHINE_HAS_EDAT1)
|
|
|
|
break;
|
|
|
|
|
2014-04-09 18:13:00 +07:00
|
|
|
ret = -EBUSY;
|
2015-07-22 20:52:10 +07:00
|
|
|
VM_EVENT(kvm, 3, "%s", "ENABLE: CMMA support");
|
2014-04-09 18:13:00 +07:00
|
|
|
mutex_lock(&kvm->lock);
|
|
|
|
if (atomic_read(&kvm->online_vcpus) == 0) {
|
|
|
|
kvm->arch.use_cmma = 1;
|
|
|
|
ret = 0;
|
|
|
|
}
|
|
|
|
mutex_unlock(&kvm->lock);
|
|
|
|
break;
|
|
|
|
case KVM_S390_VM_MEM_CLR_CMMA:
|
2015-06-18 18:17:11 +07:00
|
|
|
ret = -EINVAL;
|
|
|
|
if (!kvm->arch.use_cmma)
|
|
|
|
break;
|
|
|
|
|
2015-07-22 20:52:10 +07:00
|
|
|
VM_EVENT(kvm, 3, "%s", "RESET: CMMA states");
|
2014-04-09 18:13:00 +07:00
|
|
|
mutex_lock(&kvm->lock);
|
|
|
|
idx = srcu_read_lock(&kvm->srcu);
|
2014-10-23 17:07:14 +07:00
|
|
|
s390_reset_cmma(kvm->arch.gmap->mm);
|
2014-04-09 18:13:00 +07:00
|
|
|
srcu_read_unlock(&kvm->srcu, idx);
|
|
|
|
mutex_unlock(&kvm->lock);
|
|
|
|
ret = 0;
|
|
|
|
break;
|
2014-10-31 20:10:41 +07:00
|
|
|
case KVM_S390_VM_MEM_LIMIT_SIZE: {
|
|
|
|
unsigned long new_limit;
|
|
|
|
|
|
|
|
if (kvm_is_ucontrol(kvm))
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
if (get_user(new_limit, (u64 __user *)attr->addr))
|
|
|
|
return -EFAULT;
|
|
|
|
|
2014-12-01 23:24:42 +07:00
|
|
|
if (kvm->arch.mem_limit != KVM_S390_NO_MEM_LIMIT &&
|
|
|
|
new_limit > kvm->arch.mem_limit)
|
2014-10-31 20:10:41 +07:00
|
|
|
return -E2BIG;
|
|
|
|
|
2014-12-01 23:24:42 +07:00
|
|
|
if (!new_limit)
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
/* gmap_alloc takes last usable address */
|
|
|
|
if (new_limit != KVM_S390_NO_MEM_LIMIT)
|
|
|
|
new_limit -= 1;
|
|
|
|
|
2014-10-31 20:10:41 +07:00
|
|
|
ret = -EBUSY;
|
|
|
|
mutex_lock(&kvm->lock);
|
|
|
|
if (atomic_read(&kvm->online_vcpus) == 0) {
|
|
|
|
/* gmap_alloc will round the limit up */
|
|
|
|
struct gmap *new = gmap_alloc(current->mm, new_limit);
|
|
|
|
|
|
|
|
if (!new) {
|
|
|
|
ret = -ENOMEM;
|
|
|
|
} else {
|
|
|
|
gmap_free(kvm->arch.gmap);
|
|
|
|
new->private = kvm;
|
|
|
|
kvm->arch.gmap = new;
|
|
|
|
ret = 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
mutex_unlock(&kvm->lock);
|
2014-12-01 23:24:42 +07:00
|
|
|
VM_EVENT(kvm, 3, "SET: max guest address: %lu", new_limit);
|
|
|
|
VM_EVENT(kvm, 3, "New guest asce: 0x%pK",
|
|
|
|
(void *) kvm->arch.gmap->asce);
|
2014-10-31 20:10:41 +07:00
|
|
|
break;
|
|
|
|
}
|
2014-04-09 18:13:00 +07:00
|
|
|
default:
|
|
|
|
ret = -ENXIO;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2014-09-03 15:13:53 +07:00
|
|
|
static void kvm_s390_vcpu_crypto_setup(struct kvm_vcpu *vcpu);
|
|
|
|
|
|
|
|
static int kvm_s390_vm_set_crypto(struct kvm *kvm, struct kvm_device_attr *attr)
|
|
|
|
{
|
|
|
|
struct kvm_vcpu *vcpu;
|
|
|
|
int i;
|
|
|
|
|
2015-02-02 21:42:51 +07:00
|
|
|
if (!test_kvm_facility(kvm, 76))
|
2014-09-03 15:13:53 +07:00
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
mutex_lock(&kvm->lock);
|
|
|
|
switch (attr->attr) {
|
|
|
|
case KVM_S390_VM_CRYPTO_ENABLE_AES_KW:
|
|
|
|
get_random_bytes(
|
|
|
|
kvm->arch.crypto.crycb->aes_wrapping_key_mask,
|
|
|
|
sizeof(kvm->arch.crypto.crycb->aes_wrapping_key_mask));
|
|
|
|
kvm->arch.crypto.aes_kw = 1;
|
2015-07-22 20:52:10 +07:00
|
|
|
VM_EVENT(kvm, 3, "%s", "ENABLE: AES keywrapping support");
|
2014-09-03 15:13:53 +07:00
|
|
|
break;
|
|
|
|
case KVM_S390_VM_CRYPTO_ENABLE_DEA_KW:
|
|
|
|
get_random_bytes(
|
|
|
|
kvm->arch.crypto.crycb->dea_wrapping_key_mask,
|
|
|
|
sizeof(kvm->arch.crypto.crycb->dea_wrapping_key_mask));
|
|
|
|
kvm->arch.crypto.dea_kw = 1;
|
2015-07-22 20:52:10 +07:00
|
|
|
VM_EVENT(kvm, 3, "%s", "ENABLE: DEA keywrapping support");
|
2014-09-03 15:13:53 +07:00
|
|
|
break;
|
|
|
|
case KVM_S390_VM_CRYPTO_DISABLE_AES_KW:
|
|
|
|
kvm->arch.crypto.aes_kw = 0;
|
|
|
|
memset(kvm->arch.crypto.crycb->aes_wrapping_key_mask, 0,
|
|
|
|
sizeof(kvm->arch.crypto.crycb->aes_wrapping_key_mask));
|
2015-07-22 20:52:10 +07:00
|
|
|
VM_EVENT(kvm, 3, "%s", "DISABLE: AES keywrapping support");
|
2014-09-03 15:13:53 +07:00
|
|
|
break;
|
|
|
|
case KVM_S390_VM_CRYPTO_DISABLE_DEA_KW:
|
|
|
|
kvm->arch.crypto.dea_kw = 0;
|
|
|
|
memset(kvm->arch.crypto.crycb->dea_wrapping_key_mask, 0,
|
|
|
|
sizeof(kvm->arch.crypto.crycb->dea_wrapping_key_mask));
|
2015-07-22 20:52:10 +07:00
|
|
|
VM_EVENT(kvm, 3, "%s", "DISABLE: DEA keywrapping support");
|
2014-09-03 15:13:53 +07:00
|
|
|
break;
|
|
|
|
default:
|
|
|
|
mutex_unlock(&kvm->lock);
|
|
|
|
return -ENXIO;
|
|
|
|
}
|
|
|
|
|
|
|
|
kvm_for_each_vcpu(i, vcpu, kvm) {
|
|
|
|
kvm_s390_vcpu_crypto_setup(vcpu);
|
|
|
|
exit_sie(vcpu);
|
|
|
|
}
|
|
|
|
mutex_unlock(&kvm->lock);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2014-11-25 21:46:02 +07:00
|
|
|
static int kvm_s390_set_tod_high(struct kvm *kvm, struct kvm_device_attr *attr)
|
|
|
|
{
|
|
|
|
u8 gtod_high;
|
|
|
|
|
|
|
|
if (copy_from_user(>od_high, (void __user *)attr->addr,
|
|
|
|
sizeof(gtod_high)))
|
|
|
|
return -EFAULT;
|
|
|
|
|
|
|
|
if (gtod_high != 0)
|
|
|
|
return -EINVAL;
|
2015-10-12 18:27:29 +07:00
|
|
|
VM_EVENT(kvm, 3, "SET: TOD extension: 0x%x", gtod_high);
|
2014-11-25 21:46:02 +07:00
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int kvm_s390_set_tod_low(struct kvm *kvm, struct kvm_device_attr *attr)
|
|
|
|
{
|
2015-09-29 21:27:24 +07:00
|
|
|
u64 gtod;
|
2014-11-25 21:46:02 +07:00
|
|
|
|
|
|
|
if (copy_from_user(>od, (void __user *)attr->addr, sizeof(gtod)))
|
|
|
|
return -EFAULT;
|
|
|
|
|
2015-05-12 14:49:14 +07:00
|
|
|
kvm_s390_set_tod_clock(kvm, gtod);
|
2015-10-12 18:27:29 +07:00
|
|
|
VM_EVENT(kvm, 3, "SET: TOD base: 0x%llx", gtod);
|
2014-11-25 21:46:02 +07:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int kvm_s390_set_tod(struct kvm *kvm, struct kvm_device_attr *attr)
|
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
if (attr->flags)
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
switch (attr->attr) {
|
|
|
|
case KVM_S390_VM_TOD_HIGH:
|
|
|
|
ret = kvm_s390_set_tod_high(kvm, attr);
|
|
|
|
break;
|
|
|
|
case KVM_S390_VM_TOD_LOW:
|
|
|
|
ret = kvm_s390_set_tod_low(kvm, attr);
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
ret = -ENXIO;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int kvm_s390_get_tod_high(struct kvm *kvm, struct kvm_device_attr *attr)
|
|
|
|
{
|
|
|
|
u8 gtod_high = 0;
|
|
|
|
|
|
|
|
if (copy_to_user((void __user *)attr->addr, >od_high,
|
|
|
|
sizeof(gtod_high)))
|
|
|
|
return -EFAULT;
|
2015-10-12 18:27:29 +07:00
|
|
|
VM_EVENT(kvm, 3, "QUERY: TOD extension: 0x%x", gtod_high);
|
2014-11-25 21:46:02 +07:00
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int kvm_s390_get_tod_low(struct kvm *kvm, struct kvm_device_attr *attr)
|
|
|
|
{
|
2015-09-29 21:27:24 +07:00
|
|
|
u64 gtod;
|
2014-11-25 21:46:02 +07:00
|
|
|
|
2015-09-29 21:20:36 +07:00
|
|
|
gtod = kvm_s390_get_tod_clock_fast(kvm);
|
2014-11-25 21:46:02 +07:00
|
|
|
if (copy_to_user((void __user *)attr->addr, >od, sizeof(gtod)))
|
|
|
|
return -EFAULT;
|
2015-10-12 18:27:29 +07:00
|
|
|
VM_EVENT(kvm, 3, "QUERY: TOD base: 0x%llx", gtod);
|
2014-11-25 21:46:02 +07:00
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int kvm_s390_get_tod(struct kvm *kvm, struct kvm_device_attr *attr)
|
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
if (attr->flags)
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
switch (attr->attr) {
|
|
|
|
case KVM_S390_VM_TOD_HIGH:
|
|
|
|
ret = kvm_s390_get_tod_high(kvm, attr);
|
|
|
|
break;
|
|
|
|
case KVM_S390_VM_TOD_LOW:
|
|
|
|
ret = kvm_s390_get_tod_low(kvm, attr);
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
ret = -ENXIO;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2015-02-02 21:49:35 +07:00
|
|
|
static int kvm_s390_set_processor(struct kvm *kvm, struct kvm_device_attr *attr)
|
|
|
|
{
|
|
|
|
struct kvm_s390_vm_cpu_processor *proc;
|
|
|
|
int ret = 0;
|
|
|
|
|
|
|
|
mutex_lock(&kvm->lock);
|
|
|
|
if (atomic_read(&kvm->online_vcpus)) {
|
|
|
|
ret = -EBUSY;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
proc = kzalloc(sizeof(*proc), GFP_KERNEL);
|
|
|
|
if (!proc) {
|
|
|
|
ret = -ENOMEM;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
if (!copy_from_user(proc, (void __user *)attr->addr,
|
|
|
|
sizeof(*proc))) {
|
|
|
|
memcpy(&kvm->arch.model.cpu_id, &proc->cpuid,
|
|
|
|
sizeof(struct cpuid));
|
|
|
|
kvm->arch.model.ibc = proc->ibc;
|
2015-02-24 19:51:04 +07:00
|
|
|
memcpy(kvm->arch.model.fac->list, proc->fac_list,
|
2015-02-02 21:49:35 +07:00
|
|
|
S390_ARCH_FAC_LIST_SIZE_BYTE);
|
|
|
|
} else
|
|
|
|
ret = -EFAULT;
|
|
|
|
kfree(proc);
|
|
|
|
out:
|
|
|
|
mutex_unlock(&kvm->lock);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int kvm_s390_set_cpu_model(struct kvm *kvm, struct kvm_device_attr *attr)
|
|
|
|
{
|
|
|
|
int ret = -ENXIO;
|
|
|
|
|
|
|
|
switch (attr->attr) {
|
|
|
|
case KVM_S390_VM_CPU_PROCESSOR:
|
|
|
|
ret = kvm_s390_set_processor(kvm, attr);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int kvm_s390_get_processor(struct kvm *kvm, struct kvm_device_attr *attr)
|
|
|
|
{
|
|
|
|
struct kvm_s390_vm_cpu_processor *proc;
|
|
|
|
int ret = 0;
|
|
|
|
|
|
|
|
proc = kzalloc(sizeof(*proc), GFP_KERNEL);
|
|
|
|
if (!proc) {
|
|
|
|
ret = -ENOMEM;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
memcpy(&proc->cpuid, &kvm->arch.model.cpu_id, sizeof(struct cpuid));
|
|
|
|
proc->ibc = kvm->arch.model.ibc;
|
2015-02-24 19:51:04 +07:00
|
|
|
memcpy(&proc->fac_list, kvm->arch.model.fac->list, S390_ARCH_FAC_LIST_SIZE_BYTE);
|
2015-02-02 21:49:35 +07:00
|
|
|
if (copy_to_user((void __user *)attr->addr, proc, sizeof(*proc)))
|
|
|
|
ret = -EFAULT;
|
|
|
|
kfree(proc);
|
|
|
|
out:
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int kvm_s390_get_machine(struct kvm *kvm, struct kvm_device_attr *attr)
|
|
|
|
{
|
|
|
|
struct kvm_s390_vm_cpu_machine *mach;
|
|
|
|
int ret = 0;
|
|
|
|
|
|
|
|
mach = kzalloc(sizeof(*mach), GFP_KERNEL);
|
|
|
|
if (!mach) {
|
|
|
|
ret = -ENOMEM;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
get_cpu_id((struct cpuid *) &mach->cpuid);
|
2015-05-06 18:18:59 +07:00
|
|
|
mach->ibc = sclp.ibc;
|
2015-02-24 19:51:04 +07:00
|
|
|
memcpy(&mach->fac_mask, kvm->arch.model.fac->mask,
|
|
|
|
S390_ARCH_FAC_LIST_SIZE_BYTE);
|
2015-02-02 21:49:35 +07:00
|
|
|
memcpy((unsigned long *)&mach->fac_list, S390_lowcore.stfle_fac_list,
|
2015-02-26 18:12:40 +07:00
|
|
|
S390_ARCH_FAC_LIST_SIZE_BYTE);
|
2015-02-02 21:49:35 +07:00
|
|
|
if (copy_to_user((void __user *)attr->addr, mach, sizeof(*mach)))
|
|
|
|
ret = -EFAULT;
|
|
|
|
kfree(mach);
|
|
|
|
out:
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int kvm_s390_get_cpu_model(struct kvm *kvm, struct kvm_device_attr *attr)
|
|
|
|
{
|
|
|
|
int ret = -ENXIO;
|
|
|
|
|
|
|
|
switch (attr->attr) {
|
|
|
|
case KVM_S390_VM_CPU_PROCESSOR:
|
|
|
|
ret = kvm_s390_get_processor(kvm, attr);
|
|
|
|
break;
|
|
|
|
case KVM_S390_VM_CPU_MACHINE:
|
|
|
|
ret = kvm_s390_get_machine(kvm, attr);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2014-04-09 18:13:00 +07:00
|
|
|
static int kvm_s390_vm_set_attr(struct kvm *kvm, struct kvm_device_attr *attr)
|
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
switch (attr->group) {
|
2014-04-09 18:13:00 +07:00
|
|
|
case KVM_S390_VM_MEM_CTRL:
|
2014-10-31 20:10:41 +07:00
|
|
|
ret = kvm_s390_set_mem_control(kvm, attr);
|
2014-04-09 18:13:00 +07:00
|
|
|
break;
|
2014-11-25 21:46:02 +07:00
|
|
|
case KVM_S390_VM_TOD:
|
|
|
|
ret = kvm_s390_set_tod(kvm, attr);
|
|
|
|
break;
|
2015-02-02 21:49:35 +07:00
|
|
|
case KVM_S390_VM_CPU_MODEL:
|
|
|
|
ret = kvm_s390_set_cpu_model(kvm, attr);
|
|
|
|
break;
|
2014-09-03 15:13:53 +07:00
|
|
|
case KVM_S390_VM_CRYPTO:
|
|
|
|
ret = kvm_s390_vm_set_crypto(kvm, attr);
|
|
|
|
break;
|
2014-04-09 18:13:00 +07:00
|
|
|
default:
|
|
|
|
ret = -ENXIO;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int kvm_s390_vm_get_attr(struct kvm *kvm, struct kvm_device_attr *attr)
|
|
|
|
{
|
2014-10-31 20:10:41 +07:00
|
|
|
int ret;
|
|
|
|
|
|
|
|
switch (attr->group) {
|
|
|
|
case KVM_S390_VM_MEM_CTRL:
|
|
|
|
ret = kvm_s390_get_mem_control(kvm, attr);
|
|
|
|
break;
|
2014-11-25 21:46:02 +07:00
|
|
|
case KVM_S390_VM_TOD:
|
|
|
|
ret = kvm_s390_get_tod(kvm, attr);
|
|
|
|
break;
|
2015-02-02 21:49:35 +07:00
|
|
|
case KVM_S390_VM_CPU_MODEL:
|
|
|
|
ret = kvm_s390_get_cpu_model(kvm, attr);
|
|
|
|
break;
|
2014-10-31 20:10:41 +07:00
|
|
|
default:
|
|
|
|
ret = -ENXIO;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
return ret;
|
2014-04-09 18:13:00 +07:00
|
|
|
}
|
|
|
|
|
|
|
|
static int kvm_s390_vm_has_attr(struct kvm *kvm, struct kvm_device_attr *attr)
|
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
switch (attr->group) {
|
2014-04-09 18:13:00 +07:00
|
|
|
case KVM_S390_VM_MEM_CTRL:
|
|
|
|
switch (attr->attr) {
|
|
|
|
case KVM_S390_VM_MEM_ENABLE_CMMA:
|
|
|
|
case KVM_S390_VM_MEM_CLR_CMMA:
|
2014-10-31 20:10:41 +07:00
|
|
|
case KVM_S390_VM_MEM_LIMIT_SIZE:
|
2014-04-09 18:13:00 +07:00
|
|
|
ret = 0;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
ret = -ENXIO;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
break;
|
2014-11-25 21:46:02 +07:00
|
|
|
case KVM_S390_VM_TOD:
|
|
|
|
switch (attr->attr) {
|
|
|
|
case KVM_S390_VM_TOD_LOW:
|
|
|
|
case KVM_S390_VM_TOD_HIGH:
|
|
|
|
ret = 0;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
ret = -ENXIO;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
break;
|
2015-02-02 21:49:35 +07:00
|
|
|
case KVM_S390_VM_CPU_MODEL:
|
|
|
|
switch (attr->attr) {
|
|
|
|
case KVM_S390_VM_CPU_PROCESSOR:
|
|
|
|
case KVM_S390_VM_CPU_MACHINE:
|
|
|
|
ret = 0;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
ret = -ENXIO;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
break;
|
2014-09-03 15:13:53 +07:00
|
|
|
case KVM_S390_VM_CRYPTO:
|
|
|
|
switch (attr->attr) {
|
|
|
|
case KVM_S390_VM_CRYPTO_ENABLE_AES_KW:
|
|
|
|
case KVM_S390_VM_CRYPTO_ENABLE_DEA_KW:
|
|
|
|
case KVM_S390_VM_CRYPTO_DISABLE_AES_KW:
|
|
|
|
case KVM_S390_VM_CRYPTO_DISABLE_DEA_KW:
|
|
|
|
ret = 0;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
ret = -ENXIO;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
break;
|
2014-04-09 18:13:00 +07:00
|
|
|
default:
|
|
|
|
ret = -ENXIO;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2014-09-23 20:23:01 +07:00
|
|
|
static long kvm_s390_get_skeys(struct kvm *kvm, struct kvm_s390_skeys *args)
|
|
|
|
{
|
|
|
|
uint8_t *keys;
|
|
|
|
uint64_t hva;
|
|
|
|
unsigned long curkey;
|
|
|
|
int i, r = 0;
|
|
|
|
|
|
|
|
if (args->flags != 0)
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
/* Is this guest using storage keys? */
|
|
|
|
if (!mm_use_skey(current->mm))
|
|
|
|
return KVM_S390_GET_SKEYS_NONE;
|
|
|
|
|
|
|
|
/* Enforce sane limit on memory allocation */
|
|
|
|
if (args->count < 1 || args->count > KVM_S390_SKEYS_MAX)
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
keys = kmalloc_array(args->count, sizeof(uint8_t),
|
|
|
|
GFP_KERNEL | __GFP_NOWARN);
|
|
|
|
if (!keys)
|
|
|
|
keys = vmalloc(sizeof(uint8_t) * args->count);
|
|
|
|
if (!keys)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
for (i = 0; i < args->count; i++) {
|
|
|
|
hva = gfn_to_hva(kvm, args->start_gfn + i);
|
|
|
|
if (kvm_is_error_hva(hva)) {
|
|
|
|
r = -EFAULT;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
curkey = get_guest_storage_key(current->mm, hva);
|
|
|
|
if (IS_ERR_VALUE(curkey)) {
|
|
|
|
r = curkey;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
keys[i] = curkey;
|
|
|
|
}
|
|
|
|
|
|
|
|
r = copy_to_user((uint8_t __user *)args->skeydata_addr, keys,
|
|
|
|
sizeof(uint8_t) * args->count);
|
|
|
|
if (r)
|
|
|
|
r = -EFAULT;
|
|
|
|
out:
|
|
|
|
kvfree(keys);
|
|
|
|
return r;
|
|
|
|
}
|
|
|
|
|
|
|
|
static long kvm_s390_set_skeys(struct kvm *kvm, struct kvm_s390_skeys *args)
|
|
|
|
{
|
|
|
|
uint8_t *keys;
|
|
|
|
uint64_t hva;
|
|
|
|
int i, r = 0;
|
|
|
|
|
|
|
|
if (args->flags != 0)
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
/* Enforce sane limit on memory allocation */
|
|
|
|
if (args->count < 1 || args->count > KVM_S390_SKEYS_MAX)
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
keys = kmalloc_array(args->count, sizeof(uint8_t),
|
|
|
|
GFP_KERNEL | __GFP_NOWARN);
|
|
|
|
if (!keys)
|
|
|
|
keys = vmalloc(sizeof(uint8_t) * args->count);
|
|
|
|
if (!keys)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
r = copy_from_user(keys, (uint8_t __user *)args->skeydata_addr,
|
|
|
|
sizeof(uint8_t) * args->count);
|
|
|
|
if (r) {
|
|
|
|
r = -EFAULT;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Enable storage key handling for the guest */
|
2015-05-07 20:16:13 +07:00
|
|
|
r = s390_enable_skey();
|
|
|
|
if (r)
|
|
|
|
goto out;
|
2014-09-23 20:23:01 +07:00
|
|
|
|
|
|
|
for (i = 0; i < args->count; i++) {
|
|
|
|
hva = gfn_to_hva(kvm, args->start_gfn + i);
|
|
|
|
if (kvm_is_error_hva(hva)) {
|
|
|
|
r = -EFAULT;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Lowest order bit is reserved */
|
|
|
|
if (keys[i] & 0x01) {
|
|
|
|
r = -EINVAL;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
r = set_guest_storage_key(current->mm, hva,
|
|
|
|
(unsigned long)keys[i], 0);
|
|
|
|
if (r)
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
out:
|
|
|
|
kvfree(keys);
|
|
|
|
return r;
|
|
|
|
}
|
|
|
|
|
2008-03-26 00:47:20 +07:00
|
|
|
long kvm_arch_vm_ioctl(struct file *filp,
|
|
|
|
unsigned int ioctl, unsigned long arg)
|
|
|
|
{
|
|
|
|
struct kvm *kvm = filp->private_data;
|
|
|
|
void __user *argp = (void __user *)arg;
|
2014-04-09 18:13:00 +07:00
|
|
|
struct kvm_device_attr attr;
|
2008-03-26 00:47:20 +07:00
|
|
|
int r;
|
|
|
|
|
|
|
|
switch (ioctl) {
|
KVM: s390: interrupt subsystem, cpu timer, waitpsw
This patch contains the s390 interrupt subsystem (similar to in kernel apic)
including timer interrupts (similar to in-kernel-pit) and enabled wait
(similar to in kernel hlt).
In order to achieve that, this patch also introduces intercept handling
for instruction intercepts, and it implements load control instructions.
This patch introduces an ioctl KVM_S390_INTERRUPT which is valid for both
the vm file descriptors and the vcpu file descriptors. In case this ioctl is
issued against a vm file descriptor, the interrupt is considered floating.
Floating interrupts may be delivered to any virtual cpu in the configuration.
The following interrupts are supported:
SIGP STOP - interprocessor signal that stops a remote cpu
SIGP SET PREFIX - interprocessor signal that sets the prefix register of a
(stopped) remote cpu
INT EMERGENCY - interprocessor interrupt, usually used to signal need_reshed
and for smp_call_function() in the guest.
PROGRAM INT - exception during program execution such as page fault, illegal
instruction and friends
RESTART - interprocessor signal that starts a stopped cpu
INT VIRTIO - floating interrupt for virtio signalisation
INT SERVICE - floating interrupt for signalisations from the system
service processor
struct kvm_s390_interrupt, which is submitted as ioctl parameter when injecting
an interrupt, also carrys parameter data for interrupts along with the interrupt
type. Interrupts on s390 usually have a state that represents the current
operation, or identifies which device has caused the interruption on s390.
kvm_s390_handle_wait() does handle waitpsw in two flavors: in case of a
disabled wait (that is, disabled for interrupts), we exit to userspace. In case
of an enabled wait we set up a timer that equals the cpu clock comparator value
and sleep on a wait queue.
[christian: change virtio interrupt to 0x2603]
Acked-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
Signed-off-by: Heiko Carstens <heiko.carstens@de.ibm.com>
Signed-off-by: Carsten Otte <cotte@de.ibm.com>
Signed-off-by: Christian Borntraeger <borntraeger@de.ibm.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
2008-03-26 00:47:26 +07:00
|
|
|
case KVM_S390_INTERRUPT: {
|
|
|
|
struct kvm_s390_interrupt s390int;
|
|
|
|
|
|
|
|
r = -EFAULT;
|
|
|
|
if (copy_from_user(&s390int, argp, sizeof(s390int)))
|
|
|
|
break;
|
|
|
|
r = kvm_s390_inject_vm(kvm, &s390int);
|
|
|
|
break;
|
|
|
|
}
|
2013-10-23 23:26:34 +07:00
|
|
|
case KVM_ENABLE_CAP: {
|
|
|
|
struct kvm_enable_cap cap;
|
|
|
|
r = -EFAULT;
|
|
|
|
if (copy_from_user(&cap, argp, sizeof(cap)))
|
|
|
|
break;
|
|
|
|
r = kvm_vm_ioctl_enable_cap(kvm, &cap);
|
|
|
|
break;
|
|
|
|
}
|
2013-07-15 18:36:01 +07:00
|
|
|
case KVM_CREATE_IRQCHIP: {
|
|
|
|
struct kvm_irq_routing_entry routing;
|
|
|
|
|
|
|
|
r = -EINVAL;
|
|
|
|
if (kvm->arch.use_irqchip) {
|
|
|
|
/* Set up dummy routing. */
|
|
|
|
memset(&routing, 0, sizeof(routing));
|
2015-08-07 00:05:54 +07:00
|
|
|
r = kvm_set_irq_routing(kvm, &routing, 0, 0);
|
2013-07-15 18:36:01 +07:00
|
|
|
}
|
|
|
|
break;
|
|
|
|
}
|
2014-04-09 18:13:00 +07:00
|
|
|
case KVM_SET_DEVICE_ATTR: {
|
|
|
|
r = -EFAULT;
|
|
|
|
if (copy_from_user(&attr, (void __user *)arg, sizeof(attr)))
|
|
|
|
break;
|
|
|
|
r = kvm_s390_vm_set_attr(kvm, &attr);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
case KVM_GET_DEVICE_ATTR: {
|
|
|
|
r = -EFAULT;
|
|
|
|
if (copy_from_user(&attr, (void __user *)arg, sizeof(attr)))
|
|
|
|
break;
|
|
|
|
r = kvm_s390_vm_get_attr(kvm, &attr);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
case KVM_HAS_DEVICE_ATTR: {
|
|
|
|
r = -EFAULT;
|
|
|
|
if (copy_from_user(&attr, (void __user *)arg, sizeof(attr)))
|
|
|
|
break;
|
|
|
|
r = kvm_s390_vm_has_attr(kvm, &attr);
|
|
|
|
break;
|
|
|
|
}
|
2014-09-23 20:23:01 +07:00
|
|
|
case KVM_S390_GET_SKEYS: {
|
|
|
|
struct kvm_s390_skeys args;
|
|
|
|
|
|
|
|
r = -EFAULT;
|
|
|
|
if (copy_from_user(&args, argp,
|
|
|
|
sizeof(struct kvm_s390_skeys)))
|
|
|
|
break;
|
|
|
|
r = kvm_s390_get_skeys(kvm, &args);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
case KVM_S390_SET_SKEYS: {
|
|
|
|
struct kvm_s390_skeys args;
|
|
|
|
|
|
|
|
r = -EFAULT;
|
|
|
|
if (copy_from_user(&args, argp,
|
|
|
|
sizeof(struct kvm_s390_skeys)))
|
|
|
|
break;
|
|
|
|
r = kvm_s390_set_skeys(kvm, &args);
|
|
|
|
break;
|
|
|
|
}
|
2008-03-26 00:47:20 +07:00
|
|
|
default:
|
2009-08-26 18:57:07 +07:00
|
|
|
r = -ENOTTY;
|
2008-03-26 00:47:20 +07:00
|
|
|
}
|
|
|
|
|
|
|
|
return r;
|
|
|
|
}
|
|
|
|
|
2015-01-13 23:33:26 +07:00
|
|
|
static int kvm_s390_query_ap_config(u8 *config)
|
|
|
|
{
|
|
|
|
u32 fcn_code = 0x04000000UL;
|
2015-02-26 19:53:47 +07:00
|
|
|
u32 cc = 0;
|
2015-01-13 23:33:26 +07:00
|
|
|
|
2015-02-26 19:53:47 +07:00
|
|
|
memset(config, 0, 128);
|
2015-01-13 23:33:26 +07:00
|
|
|
asm volatile(
|
|
|
|
"lgr 0,%1\n"
|
|
|
|
"lgr 2,%2\n"
|
|
|
|
".long 0xb2af0000\n" /* PQAP(QCI) */
|
2015-02-26 19:53:47 +07:00
|
|
|
"0: ipm %0\n"
|
2015-01-13 23:33:26 +07:00
|
|
|
"srl %0,28\n"
|
2015-02-26 19:53:47 +07:00
|
|
|
"1:\n"
|
|
|
|
EX_TABLE(0b, 1b)
|
|
|
|
: "+r" (cc)
|
2015-01-13 23:33:26 +07:00
|
|
|
: "r" (fcn_code), "r" (config)
|
|
|
|
: "cc", "0", "2", "memory"
|
|
|
|
);
|
|
|
|
|
|
|
|
return cc;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int kvm_s390_apxa_installed(void)
|
|
|
|
{
|
|
|
|
u8 config[128];
|
|
|
|
int cc;
|
|
|
|
|
2015-11-24 20:28:12 +07:00
|
|
|
if (test_facility(12)) {
|
2015-01-13 23:33:26 +07:00
|
|
|
cc = kvm_s390_query_ap_config(config);
|
|
|
|
|
|
|
|
if (cc)
|
|
|
|
pr_err("PQAP(QCI) failed with cc=%d", cc);
|
|
|
|
else
|
|
|
|
return config[0] & 0x40;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void kvm_s390_set_crycb_format(struct kvm *kvm)
|
|
|
|
{
|
|
|
|
kvm->arch.crypto.crycbd = (__u32)(unsigned long) kvm->arch.crypto.crycb;
|
|
|
|
|
|
|
|
if (kvm_s390_apxa_installed())
|
|
|
|
kvm->arch.crypto.crycbd |= CRYCB_FORMAT2;
|
|
|
|
else
|
|
|
|
kvm->arch.crypto.crycbd |= CRYCB_FORMAT1;
|
|
|
|
}
|
|
|
|
|
2015-02-02 21:42:51 +07:00
|
|
|
static void kvm_s390_get_cpu_id(struct cpuid *cpu_id)
|
|
|
|
{
|
|
|
|
get_cpu_id(cpu_id);
|
|
|
|
cpu_id->version = 0xff;
|
|
|
|
}
|
|
|
|
|
2014-06-28 01:46:01 +07:00
|
|
|
static int kvm_s390_crypto_init(struct kvm *kvm)
|
|
|
|
{
|
2015-02-02 21:42:51 +07:00
|
|
|
if (!test_kvm_facility(kvm, 76))
|
2014-06-28 01:46:01 +07:00
|
|
|
return 0;
|
|
|
|
|
|
|
|
kvm->arch.crypto.crycb = kzalloc(sizeof(*kvm->arch.crypto.crycb),
|
|
|
|
GFP_KERNEL | GFP_DMA);
|
|
|
|
if (!kvm->arch.crypto.crycb)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
2015-01-13 23:33:26 +07:00
|
|
|
kvm_s390_set_crycb_format(kvm);
|
2014-06-28 01:46:01 +07:00
|
|
|
|
2015-02-25 02:06:57 +07:00
|
|
|
/* Enable AES/DEA protected key functions by default */
|
|
|
|
kvm->arch.crypto.aes_kw = 1;
|
|
|
|
kvm->arch.crypto.dea_kw = 1;
|
|
|
|
get_random_bytes(kvm->arch.crypto.crycb->aes_wrapping_key_mask,
|
|
|
|
sizeof(kvm->arch.crypto.crycb->aes_wrapping_key_mask));
|
|
|
|
get_random_bytes(kvm->arch.crypto.crycb->dea_wrapping_key_mask,
|
|
|
|
sizeof(kvm->arch.crypto.crycb->dea_wrapping_key_mask));
|
2014-09-03 15:13:53 +07:00
|
|
|
|
2014-06-28 01:46:01 +07:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2015-04-22 22:09:44 +07:00
|
|
|
static void sca_dispose(struct kvm *kvm)
|
|
|
|
{
|
|
|
|
if (kvm->arch.use_esca)
|
2015-04-22 23:08:39 +07:00
|
|
|
free_pages_exact(kvm->arch.sca, sizeof(struct esca_block));
|
2015-04-22 22:09:44 +07:00
|
|
|
else
|
|
|
|
free_page((unsigned long)(kvm->arch.sca));
|
|
|
|
kvm->arch.sca = NULL;
|
|
|
|
}
|
|
|
|
|
2012-01-04 16:25:20 +07:00
|
|
|
int kvm_arch_init_vm(struct kvm *kvm, unsigned long type)
|
2008-03-26 00:47:20 +07:00
|
|
|
{
|
2015-02-02 21:42:51 +07:00
|
|
|
int i, rc;
|
2008-03-26 00:47:20 +07:00
|
|
|
char debug_name[16];
|
2014-03-19 17:18:29 +07:00
|
|
|
static unsigned long sca_offset;
|
2008-03-26 00:47:20 +07:00
|
|
|
|
2012-01-04 16:25:20 +07:00
|
|
|
rc = -EINVAL;
|
|
|
|
#ifdef CONFIG_KVM_S390_UCONTROL
|
|
|
|
if (type & ~KVM_VM_S390_UCONTROL)
|
|
|
|
goto out_err;
|
|
|
|
if ((type & KVM_VM_S390_UCONTROL) && (!capable(CAP_SYS_ADMIN)))
|
|
|
|
goto out_err;
|
|
|
|
#else
|
|
|
|
if (type)
|
|
|
|
goto out_err;
|
|
|
|
#endif
|
|
|
|
|
2008-03-26 00:47:20 +07:00
|
|
|
rc = s390_enable_sie();
|
|
|
|
if (rc)
|
2010-11-09 23:02:49 +07:00
|
|
|
goto out_err;
|
2008-03-26 00:47:20 +07:00
|
|
|
|
2011-10-18 17:27:13 +07:00
|
|
|
rc = -ENOMEM;
|
|
|
|
|
2015-04-22 22:09:44 +07:00
|
|
|
kvm->arch.use_esca = 0; /* start with basic SCA */
|
2015-04-22 23:08:39 +07:00
|
|
|
rwlock_init(&kvm->arch.sca_lock);
|
2015-04-23 21:09:06 +07:00
|
|
|
kvm->arch.sca = (struct bsca_block *) get_zeroed_page(GFP_KERNEL);
|
2008-03-26 00:47:20 +07:00
|
|
|
if (!kvm->arch.sca)
|
2010-11-09 23:02:49 +07:00
|
|
|
goto out_err;
|
2014-03-19 17:18:29 +07:00
|
|
|
spin_lock(&kvm_lock);
|
2015-10-26 14:41:29 +07:00
|
|
|
sca_offset += 16;
|
2015-04-23 21:09:06 +07:00
|
|
|
if (sca_offset + sizeof(struct bsca_block) > PAGE_SIZE)
|
2015-10-26 14:41:29 +07:00
|
|
|
sca_offset = 0;
|
2015-04-23 21:09:06 +07:00
|
|
|
kvm->arch.sca = (struct bsca_block *)
|
|
|
|
((char *) kvm->arch.sca + sca_offset);
|
2014-03-19 17:18:29 +07:00
|
|
|
spin_unlock(&kvm_lock);
|
2008-03-26 00:47:20 +07:00
|
|
|
|
|
|
|
sprintf(debug_name, "kvm-%u", current->pid);
|
|
|
|
|
2015-07-20 20:04:48 +07:00
|
|
|
kvm->arch.dbf = debug_register(debug_name, 32, 1, 7 * sizeof(long));
|
2008-03-26 00:47:20 +07:00
|
|
|
if (!kvm->arch.dbf)
|
2015-03-12 19:55:53 +07:00
|
|
|
goto out_err;
|
2008-03-26 00:47:20 +07:00
|
|
|
|
2015-02-02 21:42:51 +07:00
|
|
|
/*
|
|
|
|
* The architectural maximum amount of facilities is 16 kbit. To store
|
|
|
|
* this amount, 2 kbyte of memory is required. Thus we need a full
|
2015-02-24 19:51:04 +07:00
|
|
|
* page to hold the guest facility list (arch.model.fac->list) and the
|
|
|
|
* facility mask (arch.model.fac->mask). Its address size has to be
|
2015-02-02 21:42:51 +07:00
|
|
|
* 31 bits and word aligned.
|
|
|
|
*/
|
|
|
|
kvm->arch.model.fac =
|
2015-02-24 19:51:04 +07:00
|
|
|
(struct kvm_s390_fac *) get_zeroed_page(GFP_KERNEL | GFP_DMA);
|
2015-02-02 21:42:51 +07:00
|
|
|
if (!kvm->arch.model.fac)
|
2015-03-12 19:55:53 +07:00
|
|
|
goto out_err;
|
2015-02-02 21:42:51 +07:00
|
|
|
|
2015-02-27 20:25:10 +07:00
|
|
|
/* Populate the facility mask initially. */
|
2015-02-24 19:51:04 +07:00
|
|
|
memcpy(kvm->arch.model.fac->mask, S390_lowcore.stfle_fac_list,
|
2015-02-26 18:12:40 +07:00
|
|
|
S390_ARCH_FAC_LIST_SIZE_BYTE);
|
2015-02-02 21:42:51 +07:00
|
|
|
for (i = 0; i < S390_ARCH_FAC_LIST_SIZE_U64; i++) {
|
|
|
|
if (i < kvm_s390_fac_list_mask_size())
|
2015-02-24 19:51:04 +07:00
|
|
|
kvm->arch.model.fac->mask[i] &= kvm_s390_fac_list_mask[i];
|
2015-02-02 21:42:51 +07:00
|
|
|
else
|
2015-02-24 19:51:04 +07:00
|
|
|
kvm->arch.model.fac->mask[i] = 0UL;
|
2015-02-02 21:42:51 +07:00
|
|
|
}
|
|
|
|
|
2015-02-24 19:51:04 +07:00
|
|
|
/* Populate the facility list initially. */
|
|
|
|
memcpy(kvm->arch.model.fac->list, kvm->arch.model.fac->mask,
|
|
|
|
S390_ARCH_FAC_LIST_SIZE_BYTE);
|
|
|
|
|
2015-02-02 21:42:51 +07:00
|
|
|
kvm_s390_get_cpu_id(&kvm->arch.model.cpu_id);
|
2015-05-06 18:18:59 +07:00
|
|
|
kvm->arch.model.ibc = sclp.ibc & 0x0fff;
|
2015-02-02 21:42:51 +07:00
|
|
|
|
2014-06-28 01:46:01 +07:00
|
|
|
if (kvm_s390_crypto_init(kvm) < 0)
|
2015-03-12 19:55:53 +07:00
|
|
|
goto out_err;
|
2014-06-28 01:46:01 +07:00
|
|
|
|
KVM: s390: interrupt subsystem, cpu timer, waitpsw
This patch contains the s390 interrupt subsystem (similar to in kernel apic)
including timer interrupts (similar to in-kernel-pit) and enabled wait
(similar to in kernel hlt).
In order to achieve that, this patch also introduces intercept handling
for instruction intercepts, and it implements load control instructions.
This patch introduces an ioctl KVM_S390_INTERRUPT which is valid for both
the vm file descriptors and the vcpu file descriptors. In case this ioctl is
issued against a vm file descriptor, the interrupt is considered floating.
Floating interrupts may be delivered to any virtual cpu in the configuration.
The following interrupts are supported:
SIGP STOP - interprocessor signal that stops a remote cpu
SIGP SET PREFIX - interprocessor signal that sets the prefix register of a
(stopped) remote cpu
INT EMERGENCY - interprocessor interrupt, usually used to signal need_reshed
and for smp_call_function() in the guest.
PROGRAM INT - exception during program execution such as page fault, illegal
instruction and friends
RESTART - interprocessor signal that starts a stopped cpu
INT VIRTIO - floating interrupt for virtio signalisation
INT SERVICE - floating interrupt for signalisations from the system
service processor
struct kvm_s390_interrupt, which is submitted as ioctl parameter when injecting
an interrupt, also carrys parameter data for interrupts along with the interrupt
type. Interrupts on s390 usually have a state that represents the current
operation, or identifies which device has caused the interruption on s390.
kvm_s390_handle_wait() does handle waitpsw in two flavors: in case of a
disabled wait (that is, disabled for interrupts), we exit to userspace. In case
of an enabled wait we set up a timer that equals the cpu clock comparator value
and sleep on a wait queue.
[christian: change virtio interrupt to 0x2603]
Acked-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
Signed-off-by: Heiko Carstens <heiko.carstens@de.ibm.com>
Signed-off-by: Carsten Otte <cotte@de.ibm.com>
Signed-off-by: Christian Borntraeger <borntraeger@de.ibm.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
2008-03-26 00:47:26 +07:00
|
|
|
spin_lock_init(&kvm->arch.float_int.lock);
|
2013-07-03 20:18:35 +07:00
|
|
|
for (i = 0; i < FIRQ_LIST_COUNT; i++)
|
|
|
|
INIT_LIST_HEAD(&kvm->arch.float_int.lists[i]);
|
2014-01-10 20:33:28 +07:00
|
|
|
init_waitqueue_head(&kvm->arch.ipte_wq);
|
2014-10-01 19:48:42 +07:00
|
|
|
mutex_init(&kvm->arch.ipte_mutex);
|
KVM: s390: interrupt subsystem, cpu timer, waitpsw
This patch contains the s390 interrupt subsystem (similar to in kernel apic)
including timer interrupts (similar to in-kernel-pit) and enabled wait
(similar to in kernel hlt).
In order to achieve that, this patch also introduces intercept handling
for instruction intercepts, and it implements load control instructions.
This patch introduces an ioctl KVM_S390_INTERRUPT which is valid for both
the vm file descriptors and the vcpu file descriptors. In case this ioctl is
issued against a vm file descriptor, the interrupt is considered floating.
Floating interrupts may be delivered to any virtual cpu in the configuration.
The following interrupts are supported:
SIGP STOP - interprocessor signal that stops a remote cpu
SIGP SET PREFIX - interprocessor signal that sets the prefix register of a
(stopped) remote cpu
INT EMERGENCY - interprocessor interrupt, usually used to signal need_reshed
and for smp_call_function() in the guest.
PROGRAM INT - exception during program execution such as page fault, illegal
instruction and friends
RESTART - interprocessor signal that starts a stopped cpu
INT VIRTIO - floating interrupt for virtio signalisation
INT SERVICE - floating interrupt for signalisations from the system
service processor
struct kvm_s390_interrupt, which is submitted as ioctl parameter when injecting
an interrupt, also carrys parameter data for interrupts along with the interrupt
type. Interrupts on s390 usually have a state that represents the current
operation, or identifies which device has caused the interruption on s390.
kvm_s390_handle_wait() does handle waitpsw in two flavors: in case of a
disabled wait (that is, disabled for interrupts), we exit to userspace. In case
of an enabled wait we set up a timer that equals the cpu clock comparator value
and sleep on a wait queue.
[christian: change virtio interrupt to 0x2603]
Acked-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
Signed-off-by: Heiko Carstens <heiko.carstens@de.ibm.com>
Signed-off-by: Carsten Otte <cotte@de.ibm.com>
Signed-off-by: Christian Borntraeger <borntraeger@de.ibm.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
2008-03-26 00:47:26 +07:00
|
|
|
|
2008-03-26 00:47:20 +07:00
|
|
|
debug_register_view(kvm->arch.dbf, &debug_sprintf_view);
|
2015-07-22 20:50:58 +07:00
|
|
|
VM_EVENT(kvm, 3, "vm created with type %lu", type);
|
2008-03-26 00:47:20 +07:00
|
|
|
|
2012-01-04 16:25:20 +07:00
|
|
|
if (type & KVM_VM_S390_UCONTROL) {
|
|
|
|
kvm->arch.gmap = NULL;
|
2014-12-01 23:24:42 +07:00
|
|
|
kvm->arch.mem_limit = KVM_S390_NO_MEM_LIMIT;
|
2012-01-04 16:25:20 +07:00
|
|
|
} else {
|
2014-12-01 23:24:42 +07:00
|
|
|
if (sclp.hamax == U64_MAX)
|
|
|
|
kvm->arch.mem_limit = TASK_MAX_SIZE;
|
|
|
|
else
|
|
|
|
kvm->arch.mem_limit = min_t(unsigned long, TASK_MAX_SIZE,
|
|
|
|
sclp.hamax + 1);
|
2014-12-01 23:24:42 +07:00
|
|
|
kvm->arch.gmap = gmap_alloc(current->mm, kvm->arch.mem_limit - 1);
|
2012-01-04 16:25:20 +07:00
|
|
|
if (!kvm->arch.gmap)
|
2015-03-12 19:55:53 +07:00
|
|
|
goto out_err;
|
2013-05-17 19:41:36 +07:00
|
|
|
kvm->arch.gmap->private = kvm;
|
2013-06-17 21:25:18 +07:00
|
|
|
kvm->arch.gmap->pfault_enabled = 0;
|
2012-01-04 16:25:20 +07:00
|
|
|
}
|
2012-12-20 21:32:12 +07:00
|
|
|
|
|
|
|
kvm->arch.css_support = 0;
|
2013-07-15 18:36:01 +07:00
|
|
|
kvm->arch.use_irqchip = 0;
|
2014-11-25 21:46:02 +07:00
|
|
|
kvm->arch.epoch = 0;
|
2012-12-20 21:32:12 +07:00
|
|
|
|
2014-03-14 17:00:21 +07:00
|
|
|
spin_lock_init(&kvm->arch.start_stop_lock);
|
2015-12-08 22:55:27 +07:00
|
|
|
KVM_EVENT(3, "vm 0x%pK created by pid %u", kvm, current->pid);
|
2014-03-14 17:00:21 +07:00
|
|
|
|
2010-11-09 23:02:49 +07:00
|
|
|
return 0;
|
2015-03-12 19:55:53 +07:00
|
|
|
out_err:
|
2014-06-28 01:46:01 +07:00
|
|
|
kfree(kvm->arch.crypto.crycb);
|
2015-02-02 21:42:51 +07:00
|
|
|
free_page((unsigned long)kvm->arch.model.fac);
|
2011-07-24 15:48:21 +07:00
|
|
|
debug_unregister(kvm->arch.dbf);
|
2015-04-22 22:09:44 +07:00
|
|
|
sca_dispose(kvm);
|
2015-07-22 20:50:58 +07:00
|
|
|
KVM_EVENT(3, "creation of vm failed: %d", rc);
|
2010-11-09 23:02:49 +07:00
|
|
|
return rc;
|
2008-03-26 00:47:20 +07:00
|
|
|
}
|
|
|
|
|
2008-11-26 20:50:27 +07:00
|
|
|
void kvm_arch_vcpu_destroy(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
|
|
|
VCPU_EVENT(vcpu, 3, "%s", "free cpu");
|
2012-07-23 22:20:30 +07:00
|
|
|
trace_kvm_s390_destroy_vcpu(vcpu->vcpu_id);
|
2014-03-25 23:09:08 +07:00
|
|
|
kvm_s390_clear_local_irqs(vcpu);
|
2013-10-07 22:11:48 +07:00
|
|
|
kvm_clear_async_pf_completion_queue(vcpu);
|
2015-04-23 21:09:06 +07:00
|
|
|
if (!kvm_is_ucontrol(vcpu->kvm))
|
2015-04-21 20:31:59 +07:00
|
|
|
sca_del_vcpu(vcpu);
|
2012-01-04 16:25:21 +07:00
|
|
|
|
|
|
|
if (kvm_is_ucontrol(vcpu->kvm))
|
|
|
|
gmap_free(vcpu->arch.gmap);
|
|
|
|
|
2015-05-07 20:41:57 +07:00
|
|
|
if (vcpu->kvm->arch.use_cmma)
|
2014-03-25 19:47:11 +07:00
|
|
|
kvm_s390_vcpu_unsetup_cmma(vcpu);
|
2008-11-26 20:50:27 +07:00
|
|
|
free_page((unsigned long)(vcpu->arch.sie_block));
|
2013-04-17 22:36:29 +07:00
|
|
|
|
2008-11-26 20:51:08 +07:00
|
|
|
kvm_vcpu_uninit(vcpu);
|
2013-06-12 18:54:54 +07:00
|
|
|
kmem_cache_free(kvm_vcpu_cache, vcpu);
|
2008-11-26 20:50:27 +07:00
|
|
|
}
|
|
|
|
|
|
|
|
static void kvm_free_vcpus(struct kvm *kvm)
|
|
|
|
{
|
|
|
|
unsigned int i;
|
2009-06-09 19:56:29 +07:00
|
|
|
struct kvm_vcpu *vcpu;
|
2008-11-26 20:50:27 +07:00
|
|
|
|
2009-06-09 19:56:29 +07:00
|
|
|
kvm_for_each_vcpu(i, vcpu, kvm)
|
|
|
|
kvm_arch_vcpu_destroy(vcpu);
|
|
|
|
|
|
|
|
mutex_lock(&kvm->lock);
|
|
|
|
for (i = 0; i < atomic_read(&kvm->online_vcpus); i++)
|
|
|
|
kvm->vcpus[i] = NULL;
|
|
|
|
|
|
|
|
atomic_set(&kvm->online_vcpus, 0);
|
|
|
|
mutex_unlock(&kvm->lock);
|
2008-11-26 20:50:27 +07:00
|
|
|
}
|
|
|
|
|
2008-03-26 00:47:20 +07:00
|
|
|
void kvm_arch_destroy_vm(struct kvm *kvm)
|
|
|
|
{
|
2008-11-26 20:50:27 +07:00
|
|
|
kvm_free_vcpus(kvm);
|
2015-02-02 21:42:51 +07:00
|
|
|
free_page((unsigned long)kvm->arch.model.fac);
|
2015-04-22 22:09:44 +07:00
|
|
|
sca_dispose(kvm);
|
2008-11-26 20:50:27 +07:00
|
|
|
debug_unregister(kvm->arch.dbf);
|
2014-06-28 01:46:01 +07:00
|
|
|
kfree(kvm->arch.crypto.crycb);
|
2012-01-04 16:25:21 +07:00
|
|
|
if (!kvm_is_ucontrol(kvm))
|
|
|
|
gmap_free(kvm->arch.gmap);
|
2013-07-15 18:36:01 +07:00
|
|
|
kvm_s390_destroy_adapters(kvm);
|
2014-03-25 23:09:08 +07:00
|
|
|
kvm_s390_clear_float_irqs(kvm);
|
2015-12-08 22:55:27 +07:00
|
|
|
KVM_EVENT(3, "vm 0x%pK destroyed", kvm);
|
2008-03-26 00:47:20 +07:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Section: vcpu related */
|
2014-12-02 22:53:21 +07:00
|
|
|
static int __kvm_ucontrol_vcpu_init(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
|
|
|
vcpu->arch.gmap = gmap_alloc(current->mm, -1UL);
|
|
|
|
if (!vcpu->arch.gmap)
|
|
|
|
return -ENOMEM;
|
|
|
|
vcpu->arch.gmap->private = vcpu->kvm;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2015-04-21 20:31:59 +07:00
|
|
|
static void sca_del_vcpu(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
2015-04-22 23:08:39 +07:00
|
|
|
read_lock(&vcpu->kvm->arch.sca_lock);
|
2015-04-22 22:09:44 +07:00
|
|
|
if (vcpu->kvm->arch.use_esca) {
|
|
|
|
struct esca_block *sca = vcpu->kvm->arch.sca;
|
2015-04-21 20:31:59 +07:00
|
|
|
|
2015-04-22 22:09:44 +07:00
|
|
|
clear_bit_inv(vcpu->vcpu_id, (unsigned long *) sca->mcn);
|
2015-10-12 17:41:41 +07:00
|
|
|
sca->cpu[vcpu->vcpu_id].sda = 0;
|
2015-04-22 22:09:44 +07:00
|
|
|
} else {
|
|
|
|
struct bsca_block *sca = vcpu->kvm->arch.sca;
|
|
|
|
|
|
|
|
clear_bit_inv(vcpu->vcpu_id, (unsigned long *) &sca->mcn);
|
2015-10-12 17:41:41 +07:00
|
|
|
sca->cpu[vcpu->vcpu_id].sda = 0;
|
2015-04-22 22:09:44 +07:00
|
|
|
}
|
2015-04-22 23:08:39 +07:00
|
|
|
read_unlock(&vcpu->kvm->arch.sca_lock);
|
2015-04-21 20:31:59 +07:00
|
|
|
}
|
|
|
|
|
2015-10-12 21:29:01 +07:00
|
|
|
static void sca_add_vcpu(struct kvm_vcpu *vcpu)
|
2015-04-21 20:31:59 +07:00
|
|
|
{
|
2015-10-12 21:29:01 +07:00
|
|
|
read_lock(&vcpu->kvm->arch.sca_lock);
|
|
|
|
if (vcpu->kvm->arch.use_esca) {
|
|
|
|
struct esca_block *sca = vcpu->kvm->arch.sca;
|
2015-04-22 22:09:44 +07:00
|
|
|
|
2015-10-12 21:29:01 +07:00
|
|
|
sca->cpu[vcpu->vcpu_id].sda = (__u64) vcpu->arch.sie_block;
|
2015-04-22 22:09:44 +07:00
|
|
|
vcpu->arch.sie_block->scaoh = (__u32)(((__u64)sca) >> 32);
|
|
|
|
vcpu->arch.sie_block->scaol = (__u32)(__u64)sca & ~0x3fU;
|
2015-10-12 21:27:23 +07:00
|
|
|
vcpu->arch.sie_block->ecb2 |= 0x04U;
|
2015-10-12 21:29:01 +07:00
|
|
|
set_bit_inv(vcpu->vcpu_id, (unsigned long *) sca->mcn);
|
2015-04-22 22:09:44 +07:00
|
|
|
} else {
|
2015-10-12 21:29:01 +07:00
|
|
|
struct bsca_block *sca = vcpu->kvm->arch.sca;
|
2015-04-21 20:31:59 +07:00
|
|
|
|
2015-10-12 21:29:01 +07:00
|
|
|
sca->cpu[vcpu->vcpu_id].sda = (__u64) vcpu->arch.sie_block;
|
2015-04-22 22:09:44 +07:00
|
|
|
vcpu->arch.sie_block->scaoh = (__u32)(((__u64)sca) >> 32);
|
|
|
|
vcpu->arch.sie_block->scaol = (__u32)(__u64)sca;
|
2015-10-12 21:29:01 +07:00
|
|
|
set_bit_inv(vcpu->vcpu_id, (unsigned long *) &sca->mcn);
|
2015-04-22 22:09:44 +07:00
|
|
|
}
|
2015-10-12 21:29:01 +07:00
|
|
|
read_unlock(&vcpu->kvm->arch.sca_lock);
|
2015-04-22 23:08:39 +07:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Basic SCA to Extended SCA data copy routines */
|
|
|
|
static inline void sca_copy_entry(struct esca_entry *d, struct bsca_entry *s)
|
|
|
|
{
|
|
|
|
d->sda = s->sda;
|
|
|
|
d->sigp_ctrl.c = s->sigp_ctrl.c;
|
|
|
|
d->sigp_ctrl.scn = s->sigp_ctrl.scn;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void sca_copy_b_to_e(struct esca_block *d, struct bsca_block *s)
|
|
|
|
{
|
|
|
|
int i;
|
|
|
|
|
|
|
|
d->ipte_control = s->ipte_control;
|
|
|
|
d->mcn[0] = s->mcn;
|
|
|
|
for (i = 0; i < KVM_S390_BSCA_CPU_SLOTS; i++)
|
|
|
|
sca_copy_entry(&d->cpu[i], &s->cpu[i]);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int sca_switch_to_extended(struct kvm *kvm)
|
|
|
|
{
|
|
|
|
struct bsca_block *old_sca = kvm->arch.sca;
|
|
|
|
struct esca_block *new_sca;
|
|
|
|
struct kvm_vcpu *vcpu;
|
|
|
|
unsigned int vcpu_idx;
|
|
|
|
u32 scaol, scaoh;
|
|
|
|
|
|
|
|
new_sca = alloc_pages_exact(sizeof(*new_sca), GFP_KERNEL|__GFP_ZERO);
|
|
|
|
if (!new_sca)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
scaoh = (u32)((u64)(new_sca) >> 32);
|
|
|
|
scaol = (u32)(u64)(new_sca) & ~0x3fU;
|
|
|
|
|
|
|
|
kvm_s390_vcpu_block_all(kvm);
|
|
|
|
write_lock(&kvm->arch.sca_lock);
|
|
|
|
|
|
|
|
sca_copy_b_to_e(new_sca, old_sca);
|
|
|
|
|
|
|
|
kvm_for_each_vcpu(vcpu_idx, vcpu, kvm) {
|
|
|
|
vcpu->arch.sie_block->scaoh = scaoh;
|
|
|
|
vcpu->arch.sie_block->scaol = scaol;
|
|
|
|
vcpu->arch.sie_block->ecb2 |= 0x04U;
|
|
|
|
}
|
|
|
|
kvm->arch.sca = new_sca;
|
|
|
|
kvm->arch.use_esca = 1;
|
|
|
|
|
|
|
|
write_unlock(&kvm->arch.sca_lock);
|
|
|
|
kvm_s390_vcpu_unblock_all(kvm);
|
|
|
|
|
|
|
|
free_page((unsigned long)old_sca);
|
|
|
|
|
2015-12-08 22:55:27 +07:00
|
|
|
VM_EVENT(kvm, 2, "Switched to ESCA (0x%pK -> 0x%pK)",
|
|
|
|
old_sca, kvm->arch.sca);
|
2015-04-22 23:08:39 +07:00
|
|
|
return 0;
|
2015-04-21 20:31:59 +07:00
|
|
|
}
|
|
|
|
|
|
|
|
static int sca_can_add_vcpu(struct kvm *kvm, unsigned int id)
|
|
|
|
{
|
2015-04-22 23:08:39 +07:00
|
|
|
int rc;
|
|
|
|
|
|
|
|
if (id < KVM_S390_BSCA_CPU_SLOTS)
|
|
|
|
return true;
|
|
|
|
if (!sclp.has_esca)
|
|
|
|
return false;
|
|
|
|
|
|
|
|
mutex_lock(&kvm->lock);
|
|
|
|
rc = kvm->arch.use_esca ? 0 : sca_switch_to_extended(kvm);
|
|
|
|
mutex_unlock(&kvm->lock);
|
|
|
|
|
|
|
|
return rc == 0 && id < KVM_S390_ESCA_CPU_SLOTS;
|
2015-04-21 20:31:59 +07:00
|
|
|
}
|
|
|
|
|
2008-03-26 00:47:20 +07:00
|
|
|
int kvm_arch_vcpu_init(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
2013-10-07 22:11:48 +07:00
|
|
|
vcpu->arch.pfault_token = KVM_S390_PFAULT_TOKEN_INVALID;
|
|
|
|
kvm_clear_async_pf_completion_queue(vcpu);
|
2012-01-11 17:20:33 +07:00
|
|
|
vcpu->run->kvm_valid_regs = KVM_SYNC_PREFIX |
|
|
|
|
KVM_SYNC_GPRS |
|
2012-02-06 16:59:07 +07:00
|
|
|
KVM_SYNC_ACRS |
|
2014-07-17 15:47:43 +07:00
|
|
|
KVM_SYNC_CRS |
|
|
|
|
KVM_SYNC_ARCH0 |
|
|
|
|
KVM_SYNC_PFAULT;
|
2014-06-09 21:57:26 +07:00
|
|
|
if (test_kvm_facility(vcpu->kvm, 129))
|
|
|
|
vcpu->run->kvm_valid_regs |= KVM_SYNC_VRS;
|
2014-12-02 22:53:21 +07:00
|
|
|
|
|
|
|
if (kvm_is_ucontrol(vcpu->kvm))
|
|
|
|
return __kvm_ucontrol_vcpu_init(vcpu);
|
|
|
|
|
2008-03-26 00:47:20 +07:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
s390/kernel: lazy restore fpu registers
Improve the save and restore behavior of FPU register contents to use the
vector extension within the kernel.
The kernel does not use floating-point or vector registers and, therefore,
saving and restoring the FPU register contents are performed for handling
signals or switching processes only. To prepare for using vector
instructions and vector registers within the kernel, enhance the save
behavior and implement a lazy restore at return to user space from a
system call or interrupt.
To implement the lazy restore, the save_fpu_regs() sets a CPU information
flag, CIF_FPU, to indicate that the FPU registers must be restored.
Saving and setting CIF_FPU is performed in an atomic fashion to be
interrupt-safe. When the kernel wants to use the vector extension or
wants to change the FPU register state for a task during signal handling,
the save_fpu_regs() must be called first. The CIF_FPU flag is also set at
process switch. At return to user space, the FPU state is restored. In
particular, the FPU state includes the floating-point or vector register
contents, as well as, vector-enablement and floating-point control. The
FPU state restore and clearing CIF_FPU is also performed in an atomic
fashion.
For KVM, the restore of the FPU register state is performed when restoring
the general-purpose guest registers before the SIE instructions is started.
Because the path towards the SIE instruction is interruptible, the CIF_FPU
flag must be checked again right before going into SIE. If set, the guest
registers must be reloaded again by re-entering the outer SIE loop. This
is the same behavior as if the SIE critical section is interrupted.
Signed-off-by: Hendrik Brueckner <brueckner@linux.vnet.ibm.com>
Signed-off-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
2015-06-10 17:53:42 +07:00
|
|
|
/*
|
|
|
|
* Backs up the current FP/VX register save area on a particular
|
|
|
|
* destination. Used to switch between different register save
|
|
|
|
* areas.
|
|
|
|
*/
|
|
|
|
static inline void save_fpu_to(struct fpu *dst)
|
|
|
|
{
|
|
|
|
dst->fpc = current->thread.fpu.fpc;
|
|
|
|
dst->regs = current->thread.fpu.regs;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Switches the FP/VX register save area from which to lazy
|
|
|
|
* restore register contents.
|
|
|
|
*/
|
|
|
|
static inline void load_fpu_from(struct fpu *from)
|
|
|
|
{
|
|
|
|
current->thread.fpu.fpc = from->fpc;
|
|
|
|
current->thread.fpu.regs = from->regs;
|
|
|
|
}
|
|
|
|
|
2008-03-26 00:47:20 +07:00
|
|
|
void kvm_arch_vcpu_load(struct kvm_vcpu *vcpu, int cpu)
|
|
|
|
{
|
s390/kernel: lazy restore fpu registers
Improve the save and restore behavior of FPU register contents to use the
vector extension within the kernel.
The kernel does not use floating-point or vector registers and, therefore,
saving and restoring the FPU register contents are performed for handling
signals or switching processes only. To prepare for using vector
instructions and vector registers within the kernel, enhance the save
behavior and implement a lazy restore at return to user space from a
system call or interrupt.
To implement the lazy restore, the save_fpu_regs() sets a CPU information
flag, CIF_FPU, to indicate that the FPU registers must be restored.
Saving and setting CIF_FPU is performed in an atomic fashion to be
interrupt-safe. When the kernel wants to use the vector extension or
wants to change the FPU register state for a task during signal handling,
the save_fpu_regs() must be called first. The CIF_FPU flag is also set at
process switch. At return to user space, the FPU state is restored. In
particular, the FPU state includes the floating-point or vector register
contents, as well as, vector-enablement and floating-point control. The
FPU state restore and clearing CIF_FPU is also performed in an atomic
fashion.
For KVM, the restore of the FPU register state is performed when restoring
the general-purpose guest registers before the SIE instructions is started.
Because the path towards the SIE instruction is interruptible, the CIF_FPU
flag must be checked again right before going into SIE. If set, the guest
registers must be reloaded again by re-entering the outer SIE loop. This
is the same behavior as if the SIE critical section is interrupted.
Signed-off-by: Hendrik Brueckner <brueckner@linux.vnet.ibm.com>
Signed-off-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
2015-06-10 17:53:42 +07:00
|
|
|
/* Save host register state */
|
2015-06-29 21:43:06 +07:00
|
|
|
save_fpu_regs();
|
s390/kernel: lazy restore fpu registers
Improve the save and restore behavior of FPU register contents to use the
vector extension within the kernel.
The kernel does not use floating-point or vector registers and, therefore,
saving and restoring the FPU register contents are performed for handling
signals or switching processes only. To prepare for using vector
instructions and vector registers within the kernel, enhance the save
behavior and implement a lazy restore at return to user space from a
system call or interrupt.
To implement the lazy restore, the save_fpu_regs() sets a CPU information
flag, CIF_FPU, to indicate that the FPU registers must be restored.
Saving and setting CIF_FPU is performed in an atomic fashion to be
interrupt-safe. When the kernel wants to use the vector extension or
wants to change the FPU register state for a task during signal handling,
the save_fpu_regs() must be called first. The CIF_FPU flag is also set at
process switch. At return to user space, the FPU state is restored. In
particular, the FPU state includes the floating-point or vector register
contents, as well as, vector-enablement and floating-point control. The
FPU state restore and clearing CIF_FPU is also performed in an atomic
fashion.
For KVM, the restore of the FPU register state is performed when restoring
the general-purpose guest registers before the SIE instructions is started.
Because the path towards the SIE instruction is interruptible, the CIF_FPU
flag must be checked again right before going into SIE. If set, the guest
registers must be reloaded again by re-entering the outer SIE loop. This
is the same behavior as if the SIE critical section is interrupted.
Signed-off-by: Hendrik Brueckner <brueckner@linux.vnet.ibm.com>
Signed-off-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
2015-06-10 17:53:42 +07:00
|
|
|
save_fpu_to(&vcpu->arch.host_fpregs);
|
2015-06-12 18:53:51 +07:00
|
|
|
|
2015-03-16 22:05:41 +07:00
|
|
|
if (test_kvm_facility(vcpu->kvm, 129)) {
|
s390/kernel: lazy restore fpu registers
Improve the save and restore behavior of FPU register contents to use the
vector extension within the kernel.
The kernel does not use floating-point or vector registers and, therefore,
saving and restoring the FPU register contents are performed for handling
signals or switching processes only. To prepare for using vector
instructions and vector registers within the kernel, enhance the save
behavior and implement a lazy restore at return to user space from a
system call or interrupt.
To implement the lazy restore, the save_fpu_regs() sets a CPU information
flag, CIF_FPU, to indicate that the FPU registers must be restored.
Saving and setting CIF_FPU is performed in an atomic fashion to be
interrupt-safe. When the kernel wants to use the vector extension or
wants to change the FPU register state for a task during signal handling,
the save_fpu_regs() must be called first. The CIF_FPU flag is also set at
process switch. At return to user space, the FPU state is restored. In
particular, the FPU state includes the floating-point or vector register
contents, as well as, vector-enablement and floating-point control. The
FPU state restore and clearing CIF_FPU is also performed in an atomic
fashion.
For KVM, the restore of the FPU register state is performed when restoring
the general-purpose guest registers before the SIE instructions is started.
Because the path towards the SIE instruction is interruptible, the CIF_FPU
flag must be checked again right before going into SIE. If set, the guest
registers must be reloaded again by re-entering the outer SIE loop. This
is the same behavior as if the SIE critical section is interrupted.
Signed-off-by: Hendrik Brueckner <brueckner@linux.vnet.ibm.com>
Signed-off-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
2015-06-10 17:53:42 +07:00
|
|
|
current->thread.fpu.fpc = vcpu->run->s.regs.fpc;
|
|
|
|
/*
|
|
|
|
* Use the register save area in the SIE-control block
|
|
|
|
* for register restore and save in kvm_arch_vcpu_put()
|
|
|
|
*/
|
|
|
|
current->thread.fpu.vxrs =
|
|
|
|
(__vector128 *)&vcpu->run->s.regs.vrs;
|
|
|
|
} else
|
|
|
|
load_fpu_from(&vcpu->arch.guest_fpregs);
|
|
|
|
|
|
|
|
if (test_fp_ctl(current->thread.fpu.fpc))
|
2015-06-12 18:53:51 +07:00
|
|
|
/* User space provided an invalid FPC, let's clear it */
|
s390/kernel: lazy restore fpu registers
Improve the save and restore behavior of FPU register contents to use the
vector extension within the kernel.
The kernel does not use floating-point or vector registers and, therefore,
saving and restoring the FPU register contents are performed for handling
signals or switching processes only. To prepare for using vector
instructions and vector registers within the kernel, enhance the save
behavior and implement a lazy restore at return to user space from a
system call or interrupt.
To implement the lazy restore, the save_fpu_regs() sets a CPU information
flag, CIF_FPU, to indicate that the FPU registers must be restored.
Saving and setting CIF_FPU is performed in an atomic fashion to be
interrupt-safe. When the kernel wants to use the vector extension or
wants to change the FPU register state for a task during signal handling,
the save_fpu_regs() must be called first. The CIF_FPU flag is also set at
process switch. At return to user space, the FPU state is restored. In
particular, the FPU state includes the floating-point or vector register
contents, as well as, vector-enablement and floating-point control. The
FPU state restore and clearing CIF_FPU is also performed in an atomic
fashion.
For KVM, the restore of the FPU register state is performed when restoring
the general-purpose guest registers before the SIE instructions is started.
Because the path towards the SIE instruction is interruptible, the CIF_FPU
flag must be checked again right before going into SIE. If set, the guest
registers must be reloaded again by re-entering the outer SIE loop. This
is the same behavior as if the SIE critical section is interrupted.
Signed-off-by: Hendrik Brueckner <brueckner@linux.vnet.ibm.com>
Signed-off-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
2015-06-10 17:53:42 +07:00
|
|
|
current->thread.fpu.fpc = 0;
|
|
|
|
|
|
|
|
save_access_regs(vcpu->arch.host_acrs);
|
2012-01-11 17:20:33 +07:00
|
|
|
restore_access_regs(vcpu->run->s.regs.acrs);
|
2011-09-20 22:07:28 +07:00
|
|
|
gmap_enable(vcpu->arch.gmap);
|
2015-04-24 06:12:32 +07:00
|
|
|
atomic_or(CPUSTAT_RUNNING, &vcpu->arch.sie_block->cpuflags);
|
2008-03-26 00:47:20 +07:00
|
|
|
}
|
|
|
|
|
|
|
|
void kvm_arch_vcpu_put(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
2015-04-24 06:12:32 +07:00
|
|
|
atomic_andnot(CPUSTAT_RUNNING, &vcpu->arch.sie_block->cpuflags);
|
2011-09-20 22:07:28 +07:00
|
|
|
gmap_disable(vcpu->arch.gmap);
|
s390/kernel: lazy restore fpu registers
Improve the save and restore behavior of FPU register contents to use the
vector extension within the kernel.
The kernel does not use floating-point or vector registers and, therefore,
saving and restoring the FPU register contents are performed for handling
signals or switching processes only. To prepare for using vector
instructions and vector registers within the kernel, enhance the save
behavior and implement a lazy restore at return to user space from a
system call or interrupt.
To implement the lazy restore, the save_fpu_regs() sets a CPU information
flag, CIF_FPU, to indicate that the FPU registers must be restored.
Saving and setting CIF_FPU is performed in an atomic fashion to be
interrupt-safe. When the kernel wants to use the vector extension or
wants to change the FPU register state for a task during signal handling,
the save_fpu_regs() must be called first. The CIF_FPU flag is also set at
process switch. At return to user space, the FPU state is restored. In
particular, the FPU state includes the floating-point or vector register
contents, as well as, vector-enablement and floating-point control. The
FPU state restore and clearing CIF_FPU is also performed in an atomic
fashion.
For KVM, the restore of the FPU register state is performed when restoring
the general-purpose guest registers before the SIE instructions is started.
Because the path towards the SIE instruction is interruptible, the CIF_FPU
flag must be checked again right before going into SIE. If set, the guest
registers must be reloaded again by re-entering the outer SIE loop. This
is the same behavior as if the SIE critical section is interrupted.
Signed-off-by: Hendrik Brueckner <brueckner@linux.vnet.ibm.com>
Signed-off-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
2015-06-10 17:53:42 +07:00
|
|
|
|
2015-06-29 21:43:06 +07:00
|
|
|
save_fpu_regs();
|
s390/kernel: lazy restore fpu registers
Improve the save and restore behavior of FPU register contents to use the
vector extension within the kernel.
The kernel does not use floating-point or vector registers and, therefore,
saving and restoring the FPU register contents are performed for handling
signals or switching processes only. To prepare for using vector
instructions and vector registers within the kernel, enhance the save
behavior and implement a lazy restore at return to user space from a
system call or interrupt.
To implement the lazy restore, the save_fpu_regs() sets a CPU information
flag, CIF_FPU, to indicate that the FPU registers must be restored.
Saving and setting CIF_FPU is performed in an atomic fashion to be
interrupt-safe. When the kernel wants to use the vector extension or
wants to change the FPU register state for a task during signal handling,
the save_fpu_regs() must be called first. The CIF_FPU flag is also set at
process switch. At return to user space, the FPU state is restored. In
particular, the FPU state includes the floating-point or vector register
contents, as well as, vector-enablement and floating-point control. The
FPU state restore and clearing CIF_FPU is also performed in an atomic
fashion.
For KVM, the restore of the FPU register state is performed when restoring
the general-purpose guest registers before the SIE instructions is started.
Because the path towards the SIE instruction is interruptible, the CIF_FPU
flag must be checked again right before going into SIE. If set, the guest
registers must be reloaded again by re-entering the outer SIE loop. This
is the same behavior as if the SIE critical section is interrupted.
Signed-off-by: Hendrik Brueckner <brueckner@linux.vnet.ibm.com>
Signed-off-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
2015-06-10 17:53:42 +07:00
|
|
|
|
2015-03-16 22:05:41 +07:00
|
|
|
if (test_kvm_facility(vcpu->kvm, 129))
|
s390/kernel: lazy restore fpu registers
Improve the save and restore behavior of FPU register contents to use the
vector extension within the kernel.
The kernel does not use floating-point or vector registers and, therefore,
saving and restoring the FPU register contents are performed for handling
signals or switching processes only. To prepare for using vector
instructions and vector registers within the kernel, enhance the save
behavior and implement a lazy restore at return to user space from a
system call or interrupt.
To implement the lazy restore, the save_fpu_regs() sets a CPU information
flag, CIF_FPU, to indicate that the FPU registers must be restored.
Saving and setting CIF_FPU is performed in an atomic fashion to be
interrupt-safe. When the kernel wants to use the vector extension or
wants to change the FPU register state for a task during signal handling,
the save_fpu_regs() must be called first. The CIF_FPU flag is also set at
process switch. At return to user space, the FPU state is restored. In
particular, the FPU state includes the floating-point or vector register
contents, as well as, vector-enablement and floating-point control. The
FPU state restore and clearing CIF_FPU is also performed in an atomic
fashion.
For KVM, the restore of the FPU register state is performed when restoring
the general-purpose guest registers before the SIE instructions is started.
Because the path towards the SIE instruction is interruptible, the CIF_FPU
flag must be checked again right before going into SIE. If set, the guest
registers must be reloaded again by re-entering the outer SIE loop. This
is the same behavior as if the SIE critical section is interrupted.
Signed-off-by: Hendrik Brueckner <brueckner@linux.vnet.ibm.com>
Signed-off-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
2015-06-10 17:53:42 +07:00
|
|
|
/*
|
|
|
|
* kvm_arch_vcpu_load() set up the register save area to
|
|
|
|
* the &vcpu->run->s.regs.vrs and, thus, the vector registers
|
|
|
|
* are already saved. Only the floating-point control must be
|
|
|
|
* copied.
|
|
|
|
*/
|
|
|
|
vcpu->run->s.regs.fpc = current->thread.fpu.fpc;
|
2014-06-09 21:57:26 +07:00
|
|
|
else
|
s390/kernel: lazy restore fpu registers
Improve the save and restore behavior of FPU register contents to use the
vector extension within the kernel.
The kernel does not use floating-point or vector registers and, therefore,
saving and restoring the FPU register contents are performed for handling
signals or switching processes only. To prepare for using vector
instructions and vector registers within the kernel, enhance the save
behavior and implement a lazy restore at return to user space from a
system call or interrupt.
To implement the lazy restore, the save_fpu_regs() sets a CPU information
flag, CIF_FPU, to indicate that the FPU registers must be restored.
Saving and setting CIF_FPU is performed in an atomic fashion to be
interrupt-safe. When the kernel wants to use the vector extension or
wants to change the FPU register state for a task during signal handling,
the save_fpu_regs() must be called first. The CIF_FPU flag is also set at
process switch. At return to user space, the FPU state is restored. In
particular, the FPU state includes the floating-point or vector register
contents, as well as, vector-enablement and floating-point control. The
FPU state restore and clearing CIF_FPU is also performed in an atomic
fashion.
For KVM, the restore of the FPU register state is performed when restoring
the general-purpose guest registers before the SIE instructions is started.
Because the path towards the SIE instruction is interruptible, the CIF_FPU
flag must be checked again right before going into SIE. If set, the guest
registers must be reloaded again by re-entering the outer SIE loop. This
is the same behavior as if the SIE critical section is interrupted.
Signed-off-by: Hendrik Brueckner <brueckner@linux.vnet.ibm.com>
Signed-off-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
2015-06-10 17:53:42 +07:00
|
|
|
save_fpu_to(&vcpu->arch.guest_fpregs);
|
|
|
|
load_fpu_from(&vcpu->arch.host_fpregs);
|
|
|
|
|
|
|
|
save_access_regs(vcpu->run->s.regs.acrs);
|
2008-03-26 00:47:20 +07:00
|
|
|
restore_access_regs(vcpu->arch.host_acrs);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void kvm_s390_vcpu_initial_reset(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
|
|
|
/* this equals initial cpu reset in pop, but we don't switch to ESA */
|
|
|
|
vcpu->arch.sie_block->gpsw.mask = 0UL;
|
|
|
|
vcpu->arch.sie_block->gpsw.addr = 0UL;
|
2012-01-11 17:19:32 +07:00
|
|
|
kvm_s390_set_prefix(vcpu, 0);
|
2008-03-26 00:47:20 +07:00
|
|
|
vcpu->arch.sie_block->cputm = 0UL;
|
|
|
|
vcpu->arch.sie_block->ckc = 0UL;
|
|
|
|
vcpu->arch.sie_block->todpr = 0;
|
|
|
|
memset(vcpu->arch.sie_block->gcr, 0, 16 * sizeof(__u64));
|
|
|
|
vcpu->arch.sie_block->gcr[0] = 0xE0UL;
|
|
|
|
vcpu->arch.sie_block->gcr[14] = 0xC2000000UL;
|
|
|
|
vcpu->arch.guest_fpregs.fpc = 0;
|
|
|
|
asm volatile("lfpc %0" : : "Q" (vcpu->arch.guest_fpregs.fpc));
|
|
|
|
vcpu->arch.sie_block->gbea = 1;
|
2014-02-10 21:32:19 +07:00
|
|
|
vcpu->arch.sie_block->pp = 0;
|
2013-10-07 22:11:48 +07:00
|
|
|
vcpu->arch.pfault_token = KVM_S390_PFAULT_TOKEN_INVALID;
|
|
|
|
kvm_clear_async_pf_completion_queue(vcpu);
|
2014-04-10 22:35:00 +07:00
|
|
|
if (!kvm_s390_user_cpu_state_ctrl(vcpu->kvm))
|
|
|
|
kvm_s390_vcpu_stop(vcpu);
|
2014-02-11 19:48:07 +07:00
|
|
|
kvm_s390_clear_local_irqs(vcpu);
|
2008-03-26 00:47:20 +07:00
|
|
|
}
|
|
|
|
|
2014-12-04 21:47:07 +07:00
|
|
|
void kvm_arch_vcpu_postcreate(struct kvm_vcpu *vcpu)
|
2012-11-28 08:29:02 +07:00
|
|
|
{
|
2014-11-25 21:46:02 +07:00
|
|
|
mutex_lock(&vcpu->kvm->lock);
|
2015-05-13 15:58:41 +07:00
|
|
|
preempt_disable();
|
2014-11-25 21:46:02 +07:00
|
|
|
vcpu->arch.sie_block->epoch = vcpu->kvm->arch.epoch;
|
2015-05-13 15:58:41 +07:00
|
|
|
preempt_enable();
|
2014-11-25 21:46:02 +07:00
|
|
|
mutex_unlock(&vcpu->kvm->lock);
|
2015-10-12 21:27:23 +07:00
|
|
|
if (!kvm_is_ucontrol(vcpu->kvm)) {
|
2014-12-02 22:53:21 +07:00
|
|
|
vcpu->arch.gmap = vcpu->kvm->arch.gmap;
|
2015-10-12 21:29:01 +07:00
|
|
|
sca_add_vcpu(vcpu);
|
2015-10-12 21:27:23 +07:00
|
|
|
}
|
|
|
|
|
2012-11-28 08:29:02 +07:00
|
|
|
}
|
|
|
|
|
2014-06-28 01:46:01 +07:00
|
|
|
static void kvm_s390_vcpu_crypto_setup(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
2015-02-02 21:42:51 +07:00
|
|
|
if (!test_kvm_facility(vcpu->kvm, 76))
|
2014-06-28 01:46:01 +07:00
|
|
|
return;
|
|
|
|
|
2014-09-03 15:13:53 +07:00
|
|
|
vcpu->arch.sie_block->ecb3 &= ~(ECB3_AES | ECB3_DEA);
|
|
|
|
|
|
|
|
if (vcpu->kvm->arch.crypto.aes_kw)
|
|
|
|
vcpu->arch.sie_block->ecb3 |= ECB3_AES;
|
|
|
|
if (vcpu->kvm->arch.crypto.dea_kw)
|
|
|
|
vcpu->arch.sie_block->ecb3 |= ECB3_DEA;
|
|
|
|
|
2014-06-28 01:46:01 +07:00
|
|
|
vcpu->arch.sie_block->crycbd = vcpu->kvm->arch.crypto.crycbd;
|
|
|
|
}
|
|
|
|
|
2014-03-25 19:47:11 +07:00
|
|
|
void kvm_s390_vcpu_unsetup_cmma(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
|
|
|
free_page(vcpu->arch.sie_block->cbrlo);
|
|
|
|
vcpu->arch.sie_block->cbrlo = 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
int kvm_s390_vcpu_setup_cmma(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
|
|
|
vcpu->arch.sie_block->cbrlo = get_zeroed_page(GFP_KERNEL);
|
|
|
|
if (!vcpu->arch.sie_block->cbrlo)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
vcpu->arch.sie_block->ecb2 |= 0x80;
|
|
|
|
vcpu->arch.sie_block->ecb2 &= ~0x08;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2015-02-27 20:32:11 +07:00
|
|
|
static void kvm_s390_vcpu_setup_model(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
|
|
|
struct kvm_s390_cpu_model *model = &vcpu->kvm->arch.model;
|
|
|
|
|
|
|
|
vcpu->arch.cpu_id = model->cpu_id;
|
|
|
|
vcpu->arch.sie_block->ibc = model->ibc;
|
|
|
|
vcpu->arch.sie_block->fac = (int) (long) model->fac->list;
|
|
|
|
}
|
|
|
|
|
2008-03-26 00:47:20 +07:00
|
|
|
int kvm_arch_vcpu_setup(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
2014-03-25 19:47:11 +07:00
|
|
|
int rc = 0;
|
2013-04-17 22:36:29 +07:00
|
|
|
|
2011-11-17 17:00:41 +07:00
|
|
|
atomic_set(&vcpu->arch.sie_block->cpuflags, CPUSTAT_ZARCH |
|
|
|
|
CPUSTAT_SM |
|
2015-03-31 19:39:49 +07:00
|
|
|
CPUSTAT_STOPPED);
|
|
|
|
|
2015-02-18 17:13:03 +07:00
|
|
|
if (test_kvm_facility(vcpu->kvm, 78))
|
2015-04-24 06:12:32 +07:00
|
|
|
atomic_or(CPUSTAT_GED2, &vcpu->arch.sie_block->cpuflags);
|
2015-02-18 17:13:03 +07:00
|
|
|
else if (test_kvm_facility(vcpu->kvm, 8))
|
2015-04-24 06:12:32 +07:00
|
|
|
atomic_or(CPUSTAT_GED, &vcpu->arch.sie_block->cpuflags);
|
2015-03-31 19:39:49 +07:00
|
|
|
|
2015-02-27 20:32:11 +07:00
|
|
|
kvm_s390_vcpu_setup_model(vcpu);
|
|
|
|
|
2010-06-18 04:16:20 +07:00
|
|
|
vcpu->arch.sie_block->ecb = 6;
|
2015-02-02 21:42:51 +07:00
|
|
|
if (test_kvm_facility(vcpu->kvm, 50) && test_kvm_facility(vcpu->kvm, 73))
|
2013-06-28 18:30:24 +07:00
|
|
|
vcpu->arch.sie_block->ecb |= 0x10;
|
|
|
|
|
2013-06-12 18:54:53 +07:00
|
|
|
vcpu->arch.sie_block->ecb2 = 8;
|
2014-10-14 20:29:30 +07:00
|
|
|
vcpu->arch.sie_block->eca = 0xC1002000U;
|
2015-05-06 18:18:59 +07:00
|
|
|
if (sclp.has_siif)
|
2013-12-30 18:54:14 +07:00
|
|
|
vcpu->arch.sie_block->eca |= 1;
|
2015-05-06 18:18:59 +07:00
|
|
|
if (sclp.has_sigpif)
|
2014-10-14 20:29:30 +07:00
|
|
|
vcpu->arch.sie_block->eca |= 0x10000000U;
|
2015-03-16 22:05:41 +07:00
|
|
|
if (test_kvm_facility(vcpu->kvm, 129)) {
|
2014-05-01 00:39:46 +07:00
|
|
|
vcpu->arch.sie_block->eca |= 0x00020000;
|
|
|
|
vcpu->arch.sie_block->ecd |= 0x20000000;
|
|
|
|
}
|
2015-02-10 22:11:01 +07:00
|
|
|
vcpu->arch.sie_block->ictl |= ICTL_ISKE | ICTL_SSKE | ICTL_RRBE;
|
2013-01-29 23:48:20 +07:00
|
|
|
|
2015-05-07 20:41:57 +07:00
|
|
|
if (vcpu->kvm->arch.use_cmma) {
|
2014-03-25 19:47:11 +07:00
|
|
|
rc = kvm_s390_vcpu_setup_cmma(vcpu);
|
|
|
|
if (rc)
|
|
|
|
return rc;
|
2013-04-17 22:36:29 +07:00
|
|
|
}
|
2014-12-12 21:17:31 +07:00
|
|
|
hrtimer_init(&vcpu->arch.ckc_timer, CLOCK_MONOTONIC, HRTIMER_MODE_REL);
|
2009-05-12 22:21:49 +07:00
|
|
|
vcpu->arch.ckc_timer.function = kvm_s390_idle_wakeup;
|
2015-02-02 21:42:51 +07:00
|
|
|
|
2014-06-28 01:46:01 +07:00
|
|
|
kvm_s390_vcpu_crypto_setup(vcpu);
|
|
|
|
|
2014-03-25 19:47:11 +07:00
|
|
|
return rc;
|
2008-03-26 00:47:20 +07:00
|
|
|
}
|
|
|
|
|
|
|
|
struct kvm_vcpu *kvm_arch_vcpu_create(struct kvm *kvm,
|
|
|
|
unsigned int id)
|
|
|
|
{
|
2011-10-18 17:27:12 +07:00
|
|
|
struct kvm_vcpu *vcpu;
|
2013-06-28 18:30:24 +07:00
|
|
|
struct sie_page *sie_page;
|
2011-10-18 17:27:12 +07:00
|
|
|
int rc = -EINVAL;
|
|
|
|
|
2015-10-12 17:57:22 +07:00
|
|
|
if (!kvm_is_ucontrol(kvm) && !sca_can_add_vcpu(kvm, id))
|
2011-10-18 17:27:12 +07:00
|
|
|
goto out;
|
|
|
|
|
|
|
|
rc = -ENOMEM;
|
2008-03-26 00:47:20 +07:00
|
|
|
|
2013-06-12 18:54:54 +07:00
|
|
|
vcpu = kmem_cache_zalloc(kvm_vcpu_cache, GFP_KERNEL);
|
2008-03-26 00:47:20 +07:00
|
|
|
if (!vcpu)
|
2011-10-18 17:27:12 +07:00
|
|
|
goto out;
|
2008-03-26 00:47:20 +07:00
|
|
|
|
2013-06-28 18:30:24 +07:00
|
|
|
sie_page = (struct sie_page *) get_zeroed_page(GFP_KERNEL);
|
|
|
|
if (!sie_page)
|
2008-03-26 00:47:20 +07:00
|
|
|
goto out_free_cpu;
|
|
|
|
|
2013-06-28 18:30:24 +07:00
|
|
|
vcpu->arch.sie_block = &sie_page->sie_block;
|
|
|
|
vcpu->arch.sie_block->itdba = (unsigned long) &sie_page->itdb;
|
|
|
|
|
2008-03-26 00:47:20 +07:00
|
|
|
vcpu->arch.sie_block->icpua = id;
|
KVM: s390: interrupt subsystem, cpu timer, waitpsw
This patch contains the s390 interrupt subsystem (similar to in kernel apic)
including timer interrupts (similar to in-kernel-pit) and enabled wait
(similar to in kernel hlt).
In order to achieve that, this patch also introduces intercept handling
for instruction intercepts, and it implements load control instructions.
This patch introduces an ioctl KVM_S390_INTERRUPT which is valid for both
the vm file descriptors and the vcpu file descriptors. In case this ioctl is
issued against a vm file descriptor, the interrupt is considered floating.
Floating interrupts may be delivered to any virtual cpu in the configuration.
The following interrupts are supported:
SIGP STOP - interprocessor signal that stops a remote cpu
SIGP SET PREFIX - interprocessor signal that sets the prefix register of a
(stopped) remote cpu
INT EMERGENCY - interprocessor interrupt, usually used to signal need_reshed
and for smp_call_function() in the guest.
PROGRAM INT - exception during program execution such as page fault, illegal
instruction and friends
RESTART - interprocessor signal that starts a stopped cpu
INT VIRTIO - floating interrupt for virtio signalisation
INT SERVICE - floating interrupt for signalisations from the system
service processor
struct kvm_s390_interrupt, which is submitted as ioctl parameter when injecting
an interrupt, also carrys parameter data for interrupts along with the interrupt
type. Interrupts on s390 usually have a state that represents the current
operation, or identifies which device has caused the interruption on s390.
kvm_s390_handle_wait() does handle waitpsw in two flavors: in case of a
disabled wait (that is, disabled for interrupts), we exit to userspace. In case
of an enabled wait we set up a timer that equals the cpu clock comparator value
and sleep on a wait queue.
[christian: change virtio interrupt to 0x2603]
Acked-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
Signed-off-by: Heiko Carstens <heiko.carstens@de.ibm.com>
Signed-off-by: Carsten Otte <cotte@de.ibm.com>
Signed-off-by: Christian Borntraeger <borntraeger@de.ibm.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
2008-03-26 00:47:26 +07:00
|
|
|
spin_lock_init(&vcpu->arch.local_int.lock);
|
|
|
|
vcpu->arch.local_int.float_int = &kvm->arch.float_int;
|
2013-06-12 18:54:55 +07:00
|
|
|
vcpu->arch.local_int.wq = &vcpu->wq;
|
2008-03-26 00:47:31 +07:00
|
|
|
vcpu->arch.local_int.cpuflags = &vcpu->arch.sie_block->cpuflags;
|
KVM: s390: interrupt subsystem, cpu timer, waitpsw
This patch contains the s390 interrupt subsystem (similar to in kernel apic)
including timer interrupts (similar to in-kernel-pit) and enabled wait
(similar to in kernel hlt).
In order to achieve that, this patch also introduces intercept handling
for instruction intercepts, and it implements load control instructions.
This patch introduces an ioctl KVM_S390_INTERRUPT which is valid for both
the vm file descriptors and the vcpu file descriptors. In case this ioctl is
issued against a vm file descriptor, the interrupt is considered floating.
Floating interrupts may be delivered to any virtual cpu in the configuration.
The following interrupts are supported:
SIGP STOP - interprocessor signal that stops a remote cpu
SIGP SET PREFIX - interprocessor signal that sets the prefix register of a
(stopped) remote cpu
INT EMERGENCY - interprocessor interrupt, usually used to signal need_reshed
and for smp_call_function() in the guest.
PROGRAM INT - exception during program execution such as page fault, illegal
instruction and friends
RESTART - interprocessor signal that starts a stopped cpu
INT VIRTIO - floating interrupt for virtio signalisation
INT SERVICE - floating interrupt for signalisations from the system
service processor
struct kvm_s390_interrupt, which is submitted as ioctl parameter when injecting
an interrupt, also carrys parameter data for interrupts along with the interrupt
type. Interrupts on s390 usually have a state that represents the current
operation, or identifies which device has caused the interruption on s390.
kvm_s390_handle_wait() does handle waitpsw in two flavors: in case of a
disabled wait (that is, disabled for interrupts), we exit to userspace. In case
of an enabled wait we set up a timer that equals the cpu clock comparator value
and sleep on a wait queue.
[christian: change virtio interrupt to 0x2603]
Acked-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
Signed-off-by: Heiko Carstens <heiko.carstens@de.ibm.com>
Signed-off-by: Carsten Otte <cotte@de.ibm.com>
Signed-off-by: Christian Borntraeger <borntraeger@de.ibm.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
2008-03-26 00:47:26 +07:00
|
|
|
|
s390/kernel: lazy restore fpu registers
Improve the save and restore behavior of FPU register contents to use the
vector extension within the kernel.
The kernel does not use floating-point or vector registers and, therefore,
saving and restoring the FPU register contents are performed for handling
signals or switching processes only. To prepare for using vector
instructions and vector registers within the kernel, enhance the save
behavior and implement a lazy restore at return to user space from a
system call or interrupt.
To implement the lazy restore, the save_fpu_regs() sets a CPU information
flag, CIF_FPU, to indicate that the FPU registers must be restored.
Saving and setting CIF_FPU is performed in an atomic fashion to be
interrupt-safe. When the kernel wants to use the vector extension or
wants to change the FPU register state for a task during signal handling,
the save_fpu_regs() must be called first. The CIF_FPU flag is also set at
process switch. At return to user space, the FPU state is restored. In
particular, the FPU state includes the floating-point or vector register
contents, as well as, vector-enablement and floating-point control. The
FPU state restore and clearing CIF_FPU is also performed in an atomic
fashion.
For KVM, the restore of the FPU register state is performed when restoring
the general-purpose guest registers before the SIE instructions is started.
Because the path towards the SIE instruction is interruptible, the CIF_FPU
flag must be checked again right before going into SIE. If set, the guest
registers must be reloaded again by re-entering the outer SIE loop. This
is the same behavior as if the SIE critical section is interrupted.
Signed-off-by: Hendrik Brueckner <brueckner@linux.vnet.ibm.com>
Signed-off-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
2015-06-10 17:53:42 +07:00
|
|
|
/*
|
|
|
|
* Allocate a save area for floating-point registers. If the vector
|
|
|
|
* extension is available, register contents are saved in the SIE
|
|
|
|
* control block. The allocated save area is still required in
|
|
|
|
* particular places, for example, in kvm_s390_vcpu_store_status().
|
|
|
|
*/
|
|
|
|
vcpu->arch.guest_fpregs.fprs = kzalloc(sizeof(freg_t) * __NUM_FPRS,
|
|
|
|
GFP_KERNEL);
|
2015-11-27 17:00:54 +07:00
|
|
|
if (!vcpu->arch.guest_fpregs.fprs)
|
s390/kernel: lazy restore fpu registers
Improve the save and restore behavior of FPU register contents to use the
vector extension within the kernel.
The kernel does not use floating-point or vector registers and, therefore,
saving and restoring the FPU register contents are performed for handling
signals or switching processes only. To prepare for using vector
instructions and vector registers within the kernel, enhance the save
behavior and implement a lazy restore at return to user space from a
system call or interrupt.
To implement the lazy restore, the save_fpu_regs() sets a CPU information
flag, CIF_FPU, to indicate that the FPU registers must be restored.
Saving and setting CIF_FPU is performed in an atomic fashion to be
interrupt-safe. When the kernel wants to use the vector extension or
wants to change the FPU register state for a task during signal handling,
the save_fpu_regs() must be called first. The CIF_FPU flag is also set at
process switch. At return to user space, the FPU state is restored. In
particular, the FPU state includes the floating-point or vector register
contents, as well as, vector-enablement and floating-point control. The
FPU state restore and clearing CIF_FPU is also performed in an atomic
fashion.
For KVM, the restore of the FPU register state is performed when restoring
the general-purpose guest registers before the SIE instructions is started.
Because the path towards the SIE instruction is interruptible, the CIF_FPU
flag must be checked again right before going into SIE. If set, the guest
registers must be reloaded again by re-entering the outer SIE loop. This
is the same behavior as if the SIE critical section is interrupted.
Signed-off-by: Hendrik Brueckner <brueckner@linux.vnet.ibm.com>
Signed-off-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
2015-06-10 17:53:42 +07:00
|
|
|
goto out_free_sie_block;
|
|
|
|
|
2008-03-26 00:47:20 +07:00
|
|
|
rc = kvm_vcpu_init(vcpu, kvm, id);
|
|
|
|
if (rc)
|
2010-03-09 13:37:53 +07:00
|
|
|
goto out_free_sie_block;
|
2015-12-08 22:55:27 +07:00
|
|
|
VM_EVENT(kvm, 3, "create cpu %d at 0x%pK, sie block at 0x%pK", id, vcpu,
|
2008-03-26 00:47:20 +07:00
|
|
|
vcpu->arch.sie_block);
|
2012-07-23 22:20:30 +07:00
|
|
|
trace_kvm_s390_create_vcpu(id, vcpu, vcpu->arch.sie_block);
|
2008-03-26 00:47:20 +07:00
|
|
|
|
|
|
|
return vcpu;
|
2010-03-09 13:37:53 +07:00
|
|
|
out_free_sie_block:
|
|
|
|
free_page((unsigned long)(vcpu->arch.sie_block));
|
2008-03-26 00:47:20 +07:00
|
|
|
out_free_cpu:
|
2013-06-12 18:54:54 +07:00
|
|
|
kmem_cache_free(kvm_vcpu_cache, vcpu);
|
2011-10-18 17:27:12 +07:00
|
|
|
out:
|
2008-03-26 00:47:20 +07:00
|
|
|
return ERR_PTR(rc);
|
|
|
|
}
|
|
|
|
|
|
|
|
int kvm_arch_vcpu_runnable(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
2014-08-05 22:40:47 +07:00
|
|
|
return kvm_s390_vcpu_has_irq(vcpu, 0);
|
2008-03-26 00:47:20 +07:00
|
|
|
}
|
|
|
|
|
2015-04-14 17:17:34 +07:00
|
|
|
void kvm_s390_vcpu_block(struct kvm_vcpu *vcpu)
|
2013-05-17 19:41:35 +07:00
|
|
|
{
|
2015-04-24 06:12:32 +07:00
|
|
|
atomic_or(PROG_BLOCK_SIE, &vcpu->arch.sie_block->prog20);
|
2015-05-12 13:41:40 +07:00
|
|
|
exit_sie(vcpu);
|
2013-05-17 19:41:35 +07:00
|
|
|
}
|
|
|
|
|
2015-04-14 17:17:34 +07:00
|
|
|
void kvm_s390_vcpu_unblock(struct kvm_vcpu *vcpu)
|
2013-05-17 19:41:35 +07:00
|
|
|
{
|
2015-04-24 06:12:32 +07:00
|
|
|
atomic_andnot(PROG_BLOCK_SIE, &vcpu->arch.sie_block->prog20);
|
2013-05-17 19:41:35 +07:00
|
|
|
}
|
|
|
|
|
2015-04-09 18:49:04 +07:00
|
|
|
static void kvm_s390_vcpu_request(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
2015-04-24 06:12:32 +07:00
|
|
|
atomic_or(PROG_REQUEST, &vcpu->arch.sie_block->prog20);
|
2015-05-12 13:41:40 +07:00
|
|
|
exit_sie(vcpu);
|
2015-04-09 18:49:04 +07:00
|
|
|
}
|
|
|
|
|
|
|
|
static void kvm_s390_vcpu_request_handled(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
2015-09-16 20:13:50 +07:00
|
|
|
atomic_andnot(PROG_REQUEST, &vcpu->arch.sie_block->prog20);
|
2015-04-09 18:49:04 +07:00
|
|
|
}
|
|
|
|
|
2013-05-17 19:41:35 +07:00
|
|
|
/*
|
|
|
|
* Kick a guest cpu out of SIE and wait until SIE is not running.
|
|
|
|
* If the CPU is not running (e.g. waiting as idle) the function will
|
|
|
|
* return immediately. */
|
|
|
|
void exit_sie(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
2015-04-24 06:12:32 +07:00
|
|
|
atomic_or(CPUSTAT_STOP_INT, &vcpu->arch.sie_block->cpuflags);
|
2013-05-17 19:41:35 +07:00
|
|
|
while (vcpu->arch.sie_block->prog0c & PROG_IN_SIE)
|
|
|
|
cpu_relax();
|
|
|
|
}
|
|
|
|
|
2015-04-09 18:49:04 +07:00
|
|
|
/* Kick a guest cpu out of SIE to process a request synchronously */
|
|
|
|
void kvm_s390_sync_request(int req, struct kvm_vcpu *vcpu)
|
2013-05-17 19:41:35 +07:00
|
|
|
{
|
2015-04-09 18:49:04 +07:00
|
|
|
kvm_make_request(req, vcpu);
|
|
|
|
kvm_s390_vcpu_request(vcpu);
|
2013-05-17 19:41:35 +07:00
|
|
|
}
|
|
|
|
|
2013-05-17 19:41:36 +07:00
|
|
|
static void kvm_gmap_notifier(struct gmap *gmap, unsigned long address)
|
|
|
|
{
|
|
|
|
int i;
|
|
|
|
struct kvm *kvm = gmap->private;
|
|
|
|
struct kvm_vcpu *vcpu;
|
|
|
|
|
|
|
|
kvm_for_each_vcpu(i, vcpu, kvm) {
|
|
|
|
/* match against both prefix pages */
|
2014-05-13 21:58:30 +07:00
|
|
|
if (kvm_s390_get_prefix(vcpu) == (address & ~0x1000UL)) {
|
2013-05-17 19:41:36 +07:00
|
|
|
VCPU_EVENT(vcpu, 2, "gmap notifier for %lx", address);
|
2015-04-09 18:49:04 +07:00
|
|
|
kvm_s390_sync_request(KVM_REQ_MMU_RELOAD, vcpu);
|
2013-05-17 19:41:36 +07:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-03-09 04:44:24 +07:00
|
|
|
int kvm_arch_vcpu_should_kick(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
|
|
|
/* kvm common code refers to this, but never calls it */
|
|
|
|
BUG();
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2012-05-15 19:15:26 +07:00
|
|
|
static int kvm_arch_vcpu_ioctl_get_one_reg(struct kvm_vcpu *vcpu,
|
|
|
|
struct kvm_one_reg *reg)
|
|
|
|
{
|
|
|
|
int r = -EINVAL;
|
|
|
|
|
|
|
|
switch (reg->id) {
|
2012-05-15 19:15:27 +07:00
|
|
|
case KVM_REG_S390_TODPR:
|
|
|
|
r = put_user(vcpu->arch.sie_block->todpr,
|
|
|
|
(u32 __user *)reg->addr);
|
|
|
|
break;
|
|
|
|
case KVM_REG_S390_EPOCHDIFF:
|
|
|
|
r = put_user(vcpu->arch.sie_block->epoch,
|
|
|
|
(u64 __user *)reg->addr);
|
|
|
|
break;
|
2012-05-15 19:15:28 +07:00
|
|
|
case KVM_REG_S390_CPU_TIMER:
|
|
|
|
r = put_user(vcpu->arch.sie_block->cputm,
|
|
|
|
(u64 __user *)reg->addr);
|
|
|
|
break;
|
|
|
|
case KVM_REG_S390_CLOCK_COMP:
|
|
|
|
r = put_user(vcpu->arch.sie_block->ckc,
|
|
|
|
(u64 __user *)reg->addr);
|
|
|
|
break;
|
2013-09-30 15:55:33 +07:00
|
|
|
case KVM_REG_S390_PFTOKEN:
|
|
|
|
r = put_user(vcpu->arch.pfault_token,
|
|
|
|
(u64 __user *)reg->addr);
|
|
|
|
break;
|
|
|
|
case KVM_REG_S390_PFCOMPARE:
|
|
|
|
r = put_user(vcpu->arch.pfault_compare,
|
|
|
|
(u64 __user *)reg->addr);
|
|
|
|
break;
|
|
|
|
case KVM_REG_S390_PFSELECT:
|
|
|
|
r = put_user(vcpu->arch.pfault_select,
|
|
|
|
(u64 __user *)reg->addr);
|
|
|
|
break;
|
2014-02-10 21:32:19 +07:00
|
|
|
case KVM_REG_S390_PP:
|
|
|
|
r = put_user(vcpu->arch.sie_block->pp,
|
|
|
|
(u64 __user *)reg->addr);
|
|
|
|
break;
|
2014-02-10 21:39:23 +07:00
|
|
|
case KVM_REG_S390_GBEA:
|
|
|
|
r = put_user(vcpu->arch.sie_block->gbea,
|
|
|
|
(u64 __user *)reg->addr);
|
|
|
|
break;
|
2012-05-15 19:15:26 +07:00
|
|
|
default:
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
return r;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int kvm_arch_vcpu_ioctl_set_one_reg(struct kvm_vcpu *vcpu,
|
|
|
|
struct kvm_one_reg *reg)
|
|
|
|
{
|
|
|
|
int r = -EINVAL;
|
|
|
|
|
|
|
|
switch (reg->id) {
|
2012-05-15 19:15:27 +07:00
|
|
|
case KVM_REG_S390_TODPR:
|
|
|
|
r = get_user(vcpu->arch.sie_block->todpr,
|
|
|
|
(u32 __user *)reg->addr);
|
|
|
|
break;
|
|
|
|
case KVM_REG_S390_EPOCHDIFF:
|
|
|
|
r = get_user(vcpu->arch.sie_block->epoch,
|
|
|
|
(u64 __user *)reg->addr);
|
|
|
|
break;
|
2012-05-15 19:15:28 +07:00
|
|
|
case KVM_REG_S390_CPU_TIMER:
|
|
|
|
r = get_user(vcpu->arch.sie_block->cputm,
|
|
|
|
(u64 __user *)reg->addr);
|
|
|
|
break;
|
|
|
|
case KVM_REG_S390_CLOCK_COMP:
|
|
|
|
r = get_user(vcpu->arch.sie_block->ckc,
|
|
|
|
(u64 __user *)reg->addr);
|
|
|
|
break;
|
2013-09-30 15:55:33 +07:00
|
|
|
case KVM_REG_S390_PFTOKEN:
|
|
|
|
r = get_user(vcpu->arch.pfault_token,
|
|
|
|
(u64 __user *)reg->addr);
|
2014-10-09 20:01:38 +07:00
|
|
|
if (vcpu->arch.pfault_token == KVM_S390_PFAULT_TOKEN_INVALID)
|
|
|
|
kvm_clear_async_pf_completion_queue(vcpu);
|
2013-09-30 15:55:33 +07:00
|
|
|
break;
|
|
|
|
case KVM_REG_S390_PFCOMPARE:
|
|
|
|
r = get_user(vcpu->arch.pfault_compare,
|
|
|
|
(u64 __user *)reg->addr);
|
|
|
|
break;
|
|
|
|
case KVM_REG_S390_PFSELECT:
|
|
|
|
r = get_user(vcpu->arch.pfault_select,
|
|
|
|
(u64 __user *)reg->addr);
|
|
|
|
break;
|
2014-02-10 21:32:19 +07:00
|
|
|
case KVM_REG_S390_PP:
|
|
|
|
r = get_user(vcpu->arch.sie_block->pp,
|
|
|
|
(u64 __user *)reg->addr);
|
|
|
|
break;
|
2014-02-10 21:39:23 +07:00
|
|
|
case KVM_REG_S390_GBEA:
|
|
|
|
r = get_user(vcpu->arch.sie_block->gbea,
|
|
|
|
(u64 __user *)reg->addr);
|
|
|
|
break;
|
2012-05-15 19:15:26 +07:00
|
|
|
default:
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
return r;
|
|
|
|
}
|
2012-03-09 04:44:24 +07:00
|
|
|
|
2008-03-26 00:47:20 +07:00
|
|
|
static int kvm_arch_vcpu_ioctl_initial_reset(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
|
|
|
kvm_s390_vcpu_initial_reset(vcpu);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
int kvm_arch_vcpu_ioctl_set_regs(struct kvm_vcpu *vcpu, struct kvm_regs *regs)
|
|
|
|
{
|
2012-01-11 17:20:32 +07:00
|
|
|
memcpy(&vcpu->run->s.regs.gprs, ®s->gprs, sizeof(regs->gprs));
|
2008-03-26 00:47:20 +07:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
int kvm_arch_vcpu_ioctl_get_regs(struct kvm_vcpu *vcpu, struct kvm_regs *regs)
|
|
|
|
{
|
2012-01-11 17:20:32 +07:00
|
|
|
memcpy(®s->gprs, &vcpu->run->s.regs.gprs, sizeof(regs->gprs));
|
2008-03-26 00:47:20 +07:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
int kvm_arch_vcpu_ioctl_set_sregs(struct kvm_vcpu *vcpu,
|
|
|
|
struct kvm_sregs *sregs)
|
|
|
|
{
|
2012-01-11 17:20:33 +07:00
|
|
|
memcpy(&vcpu->run->s.regs.acrs, &sregs->acrs, sizeof(sregs->acrs));
|
2008-03-26 00:47:20 +07:00
|
|
|
memcpy(&vcpu->arch.sie_block->gcr, &sregs->crs, sizeof(sregs->crs));
|
2012-01-11 17:20:33 +07:00
|
|
|
restore_access_regs(vcpu->run->s.regs.acrs);
|
2008-03-26 00:47:20 +07:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
int kvm_arch_vcpu_ioctl_get_sregs(struct kvm_vcpu *vcpu,
|
|
|
|
struct kvm_sregs *sregs)
|
|
|
|
{
|
2012-01-11 17:20:33 +07:00
|
|
|
memcpy(&sregs->acrs, &vcpu->run->s.regs.acrs, sizeof(sregs->acrs));
|
2008-03-26 00:47:20 +07:00
|
|
|
memcpy(&sregs->crs, &vcpu->arch.sie_block->gcr, sizeof(sregs->crs));
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
int kvm_arch_vcpu_ioctl_set_fpu(struct kvm_vcpu *vcpu, struct kvm_fpu *fpu)
|
|
|
|
{
|
2013-10-15 21:08:34 +07:00
|
|
|
if (test_fp_ctl(fpu->fpc))
|
|
|
|
return -EINVAL;
|
s390/kernel: lazy restore fpu registers
Improve the save and restore behavior of FPU register contents to use the
vector extension within the kernel.
The kernel does not use floating-point or vector registers and, therefore,
saving and restoring the FPU register contents are performed for handling
signals or switching processes only. To prepare for using vector
instructions and vector registers within the kernel, enhance the save
behavior and implement a lazy restore at return to user space from a
system call or interrupt.
To implement the lazy restore, the save_fpu_regs() sets a CPU information
flag, CIF_FPU, to indicate that the FPU registers must be restored.
Saving and setting CIF_FPU is performed in an atomic fashion to be
interrupt-safe. When the kernel wants to use the vector extension or
wants to change the FPU register state for a task during signal handling,
the save_fpu_regs() must be called first. The CIF_FPU flag is also set at
process switch. At return to user space, the FPU state is restored. In
particular, the FPU state includes the floating-point or vector register
contents, as well as, vector-enablement and floating-point control. The
FPU state restore and clearing CIF_FPU is also performed in an atomic
fashion.
For KVM, the restore of the FPU register state is performed when restoring
the general-purpose guest registers before the SIE instructions is started.
Because the path towards the SIE instruction is interruptible, the CIF_FPU
flag must be checked again right before going into SIE. If set, the guest
registers must be reloaded again by re-entering the outer SIE loop. This
is the same behavior as if the SIE critical section is interrupted.
Signed-off-by: Hendrik Brueckner <brueckner@linux.vnet.ibm.com>
Signed-off-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
2015-06-10 17:53:42 +07:00
|
|
|
memcpy(vcpu->arch.guest_fpregs.fprs, &fpu->fprs, sizeof(fpu->fprs));
|
2013-10-15 21:08:34 +07:00
|
|
|
vcpu->arch.guest_fpregs.fpc = fpu->fpc;
|
2015-06-29 21:43:06 +07:00
|
|
|
save_fpu_regs();
|
s390/kernel: lazy restore fpu registers
Improve the save and restore behavior of FPU register contents to use the
vector extension within the kernel.
The kernel does not use floating-point or vector registers and, therefore,
saving and restoring the FPU register contents are performed for handling
signals or switching processes only. To prepare for using vector
instructions and vector registers within the kernel, enhance the save
behavior and implement a lazy restore at return to user space from a
system call or interrupt.
To implement the lazy restore, the save_fpu_regs() sets a CPU information
flag, CIF_FPU, to indicate that the FPU registers must be restored.
Saving and setting CIF_FPU is performed in an atomic fashion to be
interrupt-safe. When the kernel wants to use the vector extension or
wants to change the FPU register state for a task during signal handling,
the save_fpu_regs() must be called first. The CIF_FPU flag is also set at
process switch. At return to user space, the FPU state is restored. In
particular, the FPU state includes the floating-point or vector register
contents, as well as, vector-enablement and floating-point control. The
FPU state restore and clearing CIF_FPU is also performed in an atomic
fashion.
For KVM, the restore of the FPU register state is performed when restoring
the general-purpose guest registers before the SIE instructions is started.
Because the path towards the SIE instruction is interruptible, the CIF_FPU
flag must be checked again right before going into SIE. If set, the guest
registers must be reloaded again by re-entering the outer SIE loop. This
is the same behavior as if the SIE critical section is interrupted.
Signed-off-by: Hendrik Brueckner <brueckner@linux.vnet.ibm.com>
Signed-off-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
2015-06-10 17:53:42 +07:00
|
|
|
load_fpu_from(&vcpu->arch.guest_fpregs);
|
2008-03-26 00:47:20 +07:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
int kvm_arch_vcpu_ioctl_get_fpu(struct kvm_vcpu *vcpu, struct kvm_fpu *fpu)
|
|
|
|
{
|
s390/kernel: lazy restore fpu registers
Improve the save and restore behavior of FPU register contents to use the
vector extension within the kernel.
The kernel does not use floating-point or vector registers and, therefore,
saving and restoring the FPU register contents are performed for handling
signals or switching processes only. To prepare for using vector
instructions and vector registers within the kernel, enhance the save
behavior and implement a lazy restore at return to user space from a
system call or interrupt.
To implement the lazy restore, the save_fpu_regs() sets a CPU information
flag, CIF_FPU, to indicate that the FPU registers must be restored.
Saving and setting CIF_FPU is performed in an atomic fashion to be
interrupt-safe. When the kernel wants to use the vector extension or
wants to change the FPU register state for a task during signal handling,
the save_fpu_regs() must be called first. The CIF_FPU flag is also set at
process switch. At return to user space, the FPU state is restored. In
particular, the FPU state includes the floating-point or vector register
contents, as well as, vector-enablement and floating-point control. The
FPU state restore and clearing CIF_FPU is also performed in an atomic
fashion.
For KVM, the restore of the FPU register state is performed when restoring
the general-purpose guest registers before the SIE instructions is started.
Because the path towards the SIE instruction is interruptible, the CIF_FPU
flag must be checked again right before going into SIE. If set, the guest
registers must be reloaded again by re-entering the outer SIE loop. This
is the same behavior as if the SIE critical section is interrupted.
Signed-off-by: Hendrik Brueckner <brueckner@linux.vnet.ibm.com>
Signed-off-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
2015-06-10 17:53:42 +07:00
|
|
|
memcpy(&fpu->fprs, vcpu->arch.guest_fpregs.fprs, sizeof(fpu->fprs));
|
2008-03-26 00:47:20 +07:00
|
|
|
fpu->fpc = vcpu->arch.guest_fpregs.fpc;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int kvm_arch_vcpu_ioctl_set_initial_psw(struct kvm_vcpu *vcpu, psw_t psw)
|
|
|
|
{
|
|
|
|
int rc = 0;
|
|
|
|
|
2014-05-05 21:26:19 +07:00
|
|
|
if (!is_vcpu_stopped(vcpu))
|
2008-03-26 00:47:20 +07:00
|
|
|
rc = -EBUSY;
|
2009-11-19 20:21:16 +07:00
|
|
|
else {
|
|
|
|
vcpu->run->psw_mask = psw.mask;
|
|
|
|
vcpu->run->psw_addr = psw.addr;
|
|
|
|
}
|
2008-03-26 00:47:20 +07:00
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
int kvm_arch_vcpu_ioctl_translate(struct kvm_vcpu *vcpu,
|
|
|
|
struct kvm_translation *tr)
|
|
|
|
{
|
|
|
|
return -EINVAL; /* not implemented yet */
|
|
|
|
}
|
|
|
|
|
2014-01-23 18:26:52 +07:00
|
|
|
#define VALID_GUESTDBG_FLAGS (KVM_GUESTDBG_SINGLESTEP | \
|
|
|
|
KVM_GUESTDBG_USE_HW_BP | \
|
|
|
|
KVM_GUESTDBG_ENABLE)
|
|
|
|
|
2008-12-15 19:52:10 +07:00
|
|
|
int kvm_arch_vcpu_ioctl_set_guest_debug(struct kvm_vcpu *vcpu,
|
|
|
|
struct kvm_guest_debug *dbg)
|
2008-03-26 00:47:20 +07:00
|
|
|
{
|
2014-01-23 18:26:52 +07:00
|
|
|
int rc = 0;
|
|
|
|
|
|
|
|
vcpu->guest_debug = 0;
|
|
|
|
kvm_s390_clear_bp_data(vcpu);
|
|
|
|
|
2014-05-20 22:25:20 +07:00
|
|
|
if (dbg->control & ~VALID_GUESTDBG_FLAGS)
|
2014-01-23 18:26:52 +07:00
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
if (dbg->control & KVM_GUESTDBG_ENABLE) {
|
|
|
|
vcpu->guest_debug = dbg->control;
|
|
|
|
/* enforce guest PER */
|
2015-04-24 06:12:32 +07:00
|
|
|
atomic_or(CPUSTAT_P, &vcpu->arch.sie_block->cpuflags);
|
2014-01-23 18:26:52 +07:00
|
|
|
|
|
|
|
if (dbg->control & KVM_GUESTDBG_USE_HW_BP)
|
|
|
|
rc = kvm_s390_import_bp_data(vcpu, dbg);
|
|
|
|
} else {
|
2015-04-24 06:12:32 +07:00
|
|
|
atomic_andnot(CPUSTAT_P, &vcpu->arch.sie_block->cpuflags);
|
2014-01-23 18:26:52 +07:00
|
|
|
vcpu->arch.guestdbg.last_bp = 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (rc) {
|
|
|
|
vcpu->guest_debug = 0;
|
|
|
|
kvm_s390_clear_bp_data(vcpu);
|
2015-04-24 06:12:32 +07:00
|
|
|
atomic_andnot(CPUSTAT_P, &vcpu->arch.sie_block->cpuflags);
|
2014-01-23 18:26:52 +07:00
|
|
|
}
|
|
|
|
|
|
|
|
return rc;
|
2008-03-26 00:47:20 +07:00
|
|
|
}
|
|
|
|
|
2008-04-11 23:24:45 +07:00
|
|
|
int kvm_arch_vcpu_ioctl_get_mpstate(struct kvm_vcpu *vcpu,
|
|
|
|
struct kvm_mp_state *mp_state)
|
|
|
|
{
|
2014-04-10 22:35:00 +07:00
|
|
|
/* CHECK_STOP and LOAD are not supported yet */
|
|
|
|
return is_vcpu_stopped(vcpu) ? KVM_MP_STATE_STOPPED :
|
|
|
|
KVM_MP_STATE_OPERATING;
|
2008-04-11 23:24:45 +07:00
|
|
|
}
|
|
|
|
|
|
|
|
int kvm_arch_vcpu_ioctl_set_mpstate(struct kvm_vcpu *vcpu,
|
|
|
|
struct kvm_mp_state *mp_state)
|
|
|
|
{
|
2014-04-10 22:35:00 +07:00
|
|
|
int rc = 0;
|
|
|
|
|
|
|
|
/* user space knows about this interface - let it control the state */
|
|
|
|
vcpu->kvm->arch.user_cpu_state_ctrl = 1;
|
|
|
|
|
|
|
|
switch (mp_state->mp_state) {
|
|
|
|
case KVM_MP_STATE_STOPPED:
|
|
|
|
kvm_s390_vcpu_stop(vcpu);
|
|
|
|
break;
|
|
|
|
case KVM_MP_STATE_OPERATING:
|
|
|
|
kvm_s390_vcpu_start(vcpu);
|
|
|
|
break;
|
|
|
|
case KVM_MP_STATE_LOAD:
|
|
|
|
case KVM_MP_STATE_CHECK_STOP:
|
|
|
|
/* fall through - CHECK_STOP and LOAD are not supported yet */
|
|
|
|
default:
|
|
|
|
rc = -ENXIO;
|
|
|
|
}
|
|
|
|
|
|
|
|
return rc;
|
2008-04-11 23:24:45 +07:00
|
|
|
}
|
|
|
|
|
2014-03-14 17:00:21 +07:00
|
|
|
static bool ibs_enabled(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
|
|
|
return atomic_read(&vcpu->arch.sie_block->cpuflags) & CPUSTAT_IBS;
|
|
|
|
}
|
|
|
|
|
2013-05-17 19:41:36 +07:00
|
|
|
static int kvm_s390_handle_requests(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
2014-03-14 17:00:21 +07:00
|
|
|
retry:
|
2015-04-09 18:49:04 +07:00
|
|
|
kvm_s390_vcpu_request_handled(vcpu);
|
2015-07-28 20:03:05 +07:00
|
|
|
if (!vcpu->requests)
|
|
|
|
return 0;
|
2013-05-17 19:41:36 +07:00
|
|
|
/*
|
|
|
|
* We use MMU_RELOAD just to re-arm the ipte notifier for the
|
|
|
|
* guest prefix page. gmap_ipte_notify will wait on the ptl lock.
|
|
|
|
* This ensures that the ipte instruction for this request has
|
|
|
|
* already finished. We might race against a second unmapper that
|
|
|
|
* wants to set the blocking bit. Lets just retry the request loop.
|
|
|
|
*/
|
2014-03-14 17:00:21 +07:00
|
|
|
if (kvm_check_request(KVM_REQ_MMU_RELOAD, vcpu)) {
|
2013-05-17 19:41:36 +07:00
|
|
|
int rc;
|
|
|
|
rc = gmap_ipte_notify(vcpu->arch.gmap,
|
2014-05-13 21:58:30 +07:00
|
|
|
kvm_s390_get_prefix(vcpu),
|
2013-05-17 19:41:36 +07:00
|
|
|
PAGE_SIZE * 2);
|
|
|
|
if (rc)
|
|
|
|
return rc;
|
2014-03-14 17:00:21 +07:00
|
|
|
goto retry;
|
2013-05-17 19:41:36 +07:00
|
|
|
}
|
2014-03-14 17:00:21 +07:00
|
|
|
|
2014-07-29 13:53:36 +07:00
|
|
|
if (kvm_check_request(KVM_REQ_TLB_FLUSH, vcpu)) {
|
|
|
|
vcpu->arch.sie_block->ihcpu = 0xffff;
|
|
|
|
goto retry;
|
|
|
|
}
|
|
|
|
|
2014-03-14 17:00:21 +07:00
|
|
|
if (kvm_check_request(KVM_REQ_ENABLE_IBS, vcpu)) {
|
|
|
|
if (!ibs_enabled(vcpu)) {
|
|
|
|
trace_kvm_s390_enable_disable_ibs(vcpu->vcpu_id, 1);
|
2015-04-24 06:12:32 +07:00
|
|
|
atomic_or(CPUSTAT_IBS,
|
2014-03-14 17:00:21 +07:00
|
|
|
&vcpu->arch.sie_block->cpuflags);
|
|
|
|
}
|
|
|
|
goto retry;
|
2013-05-17 19:41:36 +07:00
|
|
|
}
|
2014-03-14 17:00:21 +07:00
|
|
|
|
|
|
|
if (kvm_check_request(KVM_REQ_DISABLE_IBS, vcpu)) {
|
|
|
|
if (ibs_enabled(vcpu)) {
|
|
|
|
trace_kvm_s390_enable_disable_ibs(vcpu->vcpu_id, 0);
|
2015-04-24 06:12:32 +07:00
|
|
|
atomic_andnot(CPUSTAT_IBS,
|
2014-03-14 17:00:21 +07:00
|
|
|
&vcpu->arch.sie_block->cpuflags);
|
|
|
|
}
|
|
|
|
goto retry;
|
|
|
|
}
|
|
|
|
|
2014-05-13 21:54:32 +07:00
|
|
|
/* nothing to do, just clear the request */
|
|
|
|
clear_bit(KVM_REQ_UNHALT, &vcpu->requests);
|
|
|
|
|
2013-05-17 19:41:36 +07:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2015-05-12 14:49:14 +07:00
|
|
|
void kvm_s390_set_tod_clock(struct kvm *kvm, u64 tod)
|
|
|
|
{
|
|
|
|
struct kvm_vcpu *vcpu;
|
|
|
|
int i;
|
|
|
|
|
|
|
|
mutex_lock(&kvm->lock);
|
|
|
|
preempt_disable();
|
|
|
|
kvm->arch.epoch = tod - get_tod_clock();
|
|
|
|
kvm_s390_vcpu_block_all(kvm);
|
|
|
|
kvm_for_each_vcpu(i, vcpu, kvm)
|
|
|
|
vcpu->arch.sie_block->epoch = kvm->arch.epoch;
|
|
|
|
kvm_s390_vcpu_unblock_all(kvm);
|
|
|
|
preempt_enable();
|
|
|
|
mutex_unlock(&kvm->lock);
|
|
|
|
}
|
|
|
|
|
2014-05-06 22:20:16 +07:00
|
|
|
/**
|
|
|
|
* kvm_arch_fault_in_page - fault-in guest page if necessary
|
|
|
|
* @vcpu: The corresponding virtual cpu
|
|
|
|
* @gpa: Guest physical address
|
|
|
|
* @writable: Whether the page should be writable or not
|
|
|
|
*
|
|
|
|
* Make sure that a guest page has been faulted-in on the host.
|
|
|
|
*
|
|
|
|
* Return: Zero on success, negative error code otherwise.
|
|
|
|
*/
|
|
|
|
long kvm_arch_fault_in_page(struct kvm_vcpu *vcpu, gpa_t gpa, int writable)
|
2013-06-17 21:25:18 +07:00
|
|
|
{
|
2014-04-30 21:04:25 +07:00
|
|
|
return gmap_fault(vcpu->arch.gmap, gpa,
|
|
|
|
writable ? FAULT_FLAG_WRITE : 0);
|
2013-06-17 21:25:18 +07:00
|
|
|
}
|
|
|
|
|
2013-10-07 22:11:48 +07:00
|
|
|
static void __kvm_inject_pfault_token(struct kvm_vcpu *vcpu, bool start_token,
|
|
|
|
unsigned long token)
|
|
|
|
{
|
|
|
|
struct kvm_s390_interrupt inti;
|
2014-07-29 20:11:49 +07:00
|
|
|
struct kvm_s390_irq irq;
|
2013-10-07 22:11:48 +07:00
|
|
|
|
|
|
|
if (start_token) {
|
2014-07-29 20:11:49 +07:00
|
|
|
irq.u.ext.ext_params2 = token;
|
|
|
|
irq.type = KVM_S390_INT_PFAULT_INIT;
|
|
|
|
WARN_ON_ONCE(kvm_s390_inject_vcpu(vcpu, &irq));
|
2013-10-07 22:11:48 +07:00
|
|
|
} else {
|
|
|
|
inti.type = KVM_S390_INT_PFAULT_DONE;
|
2014-07-29 20:11:49 +07:00
|
|
|
inti.parm64 = token;
|
2013-10-07 22:11:48 +07:00
|
|
|
WARN_ON_ONCE(kvm_s390_inject_vm(vcpu->kvm, &inti));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void kvm_arch_async_page_not_present(struct kvm_vcpu *vcpu,
|
|
|
|
struct kvm_async_pf *work)
|
|
|
|
{
|
|
|
|
trace_kvm_s390_pfault_init(vcpu, work->arch.pfault_token);
|
|
|
|
__kvm_inject_pfault_token(vcpu, true, work->arch.pfault_token);
|
|
|
|
}
|
|
|
|
|
|
|
|
void kvm_arch_async_page_present(struct kvm_vcpu *vcpu,
|
|
|
|
struct kvm_async_pf *work)
|
|
|
|
{
|
|
|
|
trace_kvm_s390_pfault_done(vcpu, work->arch.pfault_token);
|
|
|
|
__kvm_inject_pfault_token(vcpu, false, work->arch.pfault_token);
|
|
|
|
}
|
|
|
|
|
|
|
|
void kvm_arch_async_page_ready(struct kvm_vcpu *vcpu,
|
|
|
|
struct kvm_async_pf *work)
|
|
|
|
{
|
|
|
|
/* s390 will always inject the page directly */
|
|
|
|
}
|
|
|
|
|
|
|
|
bool kvm_arch_can_inject_async_page_present(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
|
|
|
/*
|
|
|
|
* s390 will always inject the page directly,
|
|
|
|
* but we still want check_async_completion to cleanup
|
|
|
|
*/
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int kvm_arch_setup_async_pf(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
|
|
|
hva_t hva;
|
|
|
|
struct kvm_arch_async_pf arch;
|
|
|
|
int rc;
|
|
|
|
|
|
|
|
if (vcpu->arch.pfault_token == KVM_S390_PFAULT_TOKEN_INVALID)
|
|
|
|
return 0;
|
|
|
|
if ((vcpu->arch.sie_block->gpsw.mask & vcpu->arch.pfault_select) !=
|
|
|
|
vcpu->arch.pfault_compare)
|
|
|
|
return 0;
|
|
|
|
if (psw_extint_disabled(vcpu))
|
|
|
|
return 0;
|
2014-08-05 22:40:47 +07:00
|
|
|
if (kvm_s390_vcpu_has_irq(vcpu, 0))
|
2013-10-07 22:11:48 +07:00
|
|
|
return 0;
|
|
|
|
if (!(vcpu->arch.sie_block->gcr[0] & 0x200ul))
|
|
|
|
return 0;
|
|
|
|
if (!vcpu->arch.gmap->pfault_enabled)
|
|
|
|
return 0;
|
|
|
|
|
2014-01-01 22:36:07 +07:00
|
|
|
hva = gfn_to_hva(vcpu->kvm, gpa_to_gfn(current->thread.gmap_addr));
|
|
|
|
hva += current->thread.gmap_addr & ~PAGE_MASK;
|
|
|
|
if (read_guest_real(vcpu, vcpu->arch.pfault_token, &arch.pfault_token, 8))
|
2013-10-07 22:11:48 +07:00
|
|
|
return 0;
|
|
|
|
|
|
|
|
rc = kvm_setup_async_pf(vcpu, current->thread.gmap_addr, hva, &arch);
|
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
2013-09-12 15:33:43 +07:00
|
|
|
static int vcpu_pre_run(struct kvm_vcpu *vcpu)
|
2008-03-26 00:47:20 +07:00
|
|
|
{
|
2013-09-12 15:33:43 +07:00
|
|
|
int rc, cpuflags;
|
2012-01-04 16:25:22 +07:00
|
|
|
|
2013-10-07 22:11:48 +07:00
|
|
|
/*
|
|
|
|
* On s390 notifications for arriving pages will be delivered directly
|
|
|
|
* to the guest but the house keeping for completed pfaults is
|
|
|
|
* handled outside the worker.
|
|
|
|
*/
|
|
|
|
kvm_check_async_pf_completion(vcpu);
|
|
|
|
|
2015-12-02 20:27:03 +07:00
|
|
|
vcpu->arch.sie_block->gg14 = vcpu->run->s.regs.gprs[14];
|
|
|
|
vcpu->arch.sie_block->gg15 = vcpu->run->s.regs.gprs[15];
|
2008-03-26 00:47:20 +07:00
|
|
|
|
|
|
|
if (need_resched())
|
|
|
|
schedule();
|
|
|
|
|
2014-04-15 17:55:07 +07:00
|
|
|
if (test_cpu_flag(CIF_MCCK_PENDING))
|
2008-05-21 18:37:34 +07:00
|
|
|
s390_handle_mcck();
|
|
|
|
|
2014-04-17 15:10:30 +07:00
|
|
|
if (!kvm_is_ucontrol(vcpu->kvm)) {
|
|
|
|
rc = kvm_s390_deliver_pending_interrupts(vcpu);
|
|
|
|
if (rc)
|
|
|
|
return rc;
|
|
|
|
}
|
2008-05-21 18:37:37 +07:00
|
|
|
|
2013-05-17 19:41:36 +07:00
|
|
|
rc = kvm_s390_handle_requests(vcpu);
|
|
|
|
if (rc)
|
|
|
|
return rc;
|
|
|
|
|
2014-01-23 18:26:52 +07:00
|
|
|
if (guestdbg_enabled(vcpu)) {
|
|
|
|
kvm_s390_backup_guest_per_regs(vcpu);
|
|
|
|
kvm_s390_patch_guest_per_regs(vcpu);
|
|
|
|
}
|
|
|
|
|
2008-03-26 00:47:20 +07:00
|
|
|
vcpu->arch.sie_block->icptcode = 0;
|
2013-09-12 15:33:43 +07:00
|
|
|
cpuflags = atomic_read(&vcpu->arch.sie_block->cpuflags);
|
|
|
|
VCPU_EVENT(vcpu, 6, "entering sie flags %x", cpuflags);
|
|
|
|
trace_kvm_s390_sie_enter(vcpu, cpuflags);
|
2013-07-26 20:04:00 +07:00
|
|
|
|
2013-09-12 15:33:43 +07:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2015-02-10 22:11:01 +07:00
|
|
|
static int vcpu_post_run_fault_in_sie(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
|
|
|
psw_t *psw = &vcpu->arch.sie_block->gpsw;
|
|
|
|
u8 opcode;
|
|
|
|
int rc;
|
|
|
|
|
|
|
|
VCPU_EVENT(vcpu, 3, "%s", "fault in sie instruction");
|
|
|
|
trace_kvm_s390_sie_fault(vcpu);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* We want to inject an addressing exception, which is defined as a
|
|
|
|
* suppressing or terminating exception. However, since we came here
|
|
|
|
* by a DAT access exception, the PSW still points to the faulting
|
|
|
|
* instruction since DAT exceptions are nullifying. So we've got
|
|
|
|
* to look up the current opcode to get the length of the instruction
|
|
|
|
* to be able to forward the PSW.
|
|
|
|
*/
|
2015-01-19 17:24:51 +07:00
|
|
|
rc = read_guest(vcpu, psw->addr, 0, &opcode, 1);
|
2015-02-10 22:11:01 +07:00
|
|
|
if (rc)
|
|
|
|
return kvm_s390_inject_prog_cond(vcpu, rc);
|
|
|
|
psw->addr = __rewind_psw(*psw, -insn_length(opcode));
|
|
|
|
|
|
|
|
return kvm_s390_inject_program_int(vcpu, PGM_ADDRESSING);
|
|
|
|
}
|
|
|
|
|
2013-09-12 15:33:43 +07:00
|
|
|
static int vcpu_post_run(struct kvm_vcpu *vcpu, int exit_reason)
|
|
|
|
{
|
2013-07-26 20:04:00 +07:00
|
|
|
VCPU_EVENT(vcpu, 6, "exit sie icptcode %d",
|
|
|
|
vcpu->arch.sie_block->icptcode);
|
|
|
|
trace_kvm_s390_sie_exit(vcpu, vcpu->arch.sie_block->icptcode);
|
|
|
|
|
2014-01-23 18:26:52 +07:00
|
|
|
if (guestdbg_enabled(vcpu))
|
|
|
|
kvm_s390_restore_guest_per_regs(vcpu);
|
|
|
|
|
2015-12-02 20:27:03 +07:00
|
|
|
vcpu->run->s.regs.gprs[14] = vcpu->arch.sie_block->gg14;
|
|
|
|
vcpu->run->s.regs.gprs[15] = vcpu->arch.sie_block->gg15;
|
2015-10-19 21:24:28 +07:00
|
|
|
|
|
|
|
if (vcpu->arch.sie_block->icptcode > 0) {
|
|
|
|
int rc = kvm_handle_sie_intercept(vcpu);
|
|
|
|
|
|
|
|
if (rc != -EOPNOTSUPP)
|
|
|
|
return rc;
|
|
|
|
vcpu->run->exit_reason = KVM_EXIT_S390_SIEIC;
|
|
|
|
vcpu->run->s390_sieic.icptcode = vcpu->arch.sie_block->icptcode;
|
|
|
|
vcpu->run->s390_sieic.ipa = vcpu->arch.sie_block->ipa;
|
|
|
|
vcpu->run->s390_sieic.ipb = vcpu->arch.sie_block->ipb;
|
|
|
|
return -EREMOTE;
|
|
|
|
} else if (exit_reason != -EFAULT) {
|
|
|
|
vcpu->stat.exit_null++;
|
|
|
|
return 0;
|
2013-09-19 21:26:18 +07:00
|
|
|
} else if (kvm_is_ucontrol(vcpu->kvm)) {
|
|
|
|
vcpu->run->exit_reason = KVM_EXIT_S390_UCONTROL;
|
|
|
|
vcpu->run->s390_ucontrol.trans_exc_code =
|
|
|
|
current->thread.gmap_addr;
|
|
|
|
vcpu->run->s390_ucontrol.pgm_code = 0x10;
|
2015-10-19 21:24:28 +07:00
|
|
|
return -EREMOTE;
|
2013-06-17 21:25:18 +07:00
|
|
|
} else if (current->thread.gmap_pfault) {
|
2013-10-07 22:11:48 +07:00
|
|
|
trace_kvm_s390_major_guest_pfault(vcpu);
|
2013-06-17 21:25:18 +07:00
|
|
|
current->thread.gmap_pfault = 0;
|
2015-10-19 21:24:28 +07:00
|
|
|
if (kvm_arch_setup_async_pf(vcpu))
|
|
|
|
return 0;
|
|
|
|
return kvm_arch_fault_in_page(vcpu, current->thread.gmap_addr, 1);
|
2013-09-12 15:33:44 +07:00
|
|
|
}
|
2015-10-19 21:24:28 +07:00
|
|
|
return vcpu_post_run_fault_in_sie(vcpu);
|
2013-09-12 15:33:43 +07:00
|
|
|
}
|
|
|
|
|
|
|
|
static int __vcpu_run(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
|
|
|
int rc, exit_reason;
|
|
|
|
|
2013-09-12 15:33:45 +07:00
|
|
|
/*
|
|
|
|
* We try to hold kvm->srcu during most of vcpu_run (except when run-
|
|
|
|
* ning the guest), so that memslots (and other stuff) are protected
|
|
|
|
*/
|
|
|
|
vcpu->srcu_idx = srcu_read_lock(&vcpu->kvm->srcu);
|
|
|
|
|
2013-09-12 15:33:44 +07:00
|
|
|
do {
|
|
|
|
rc = vcpu_pre_run(vcpu);
|
|
|
|
if (rc)
|
|
|
|
break;
|
2013-09-12 15:33:43 +07:00
|
|
|
|
2013-09-12 15:33:45 +07:00
|
|
|
srcu_read_unlock(&vcpu->kvm->srcu, vcpu->srcu_idx);
|
2013-09-12 15:33:44 +07:00
|
|
|
/*
|
|
|
|
* As PF_VCPU will be used in fault handler, between
|
|
|
|
* guest_enter and guest_exit should be no uaccess.
|
|
|
|
*/
|
2015-04-30 18:43:30 +07:00
|
|
|
local_irq_disable();
|
|
|
|
__kvm_guest_enter();
|
|
|
|
local_irq_enable();
|
2013-09-12 15:33:44 +07:00
|
|
|
exit_reason = sie64a(vcpu->arch.sie_block,
|
|
|
|
vcpu->run->s.regs.gprs);
|
2015-04-30 18:43:30 +07:00
|
|
|
local_irq_disable();
|
|
|
|
__kvm_guest_exit();
|
|
|
|
local_irq_enable();
|
2013-09-12 15:33:45 +07:00
|
|
|
vcpu->srcu_idx = srcu_read_lock(&vcpu->kvm->srcu);
|
2013-09-12 15:33:44 +07:00
|
|
|
|
|
|
|
rc = vcpu_post_run(vcpu, exit_reason);
|
2014-01-23 18:26:52 +07:00
|
|
|
} while (!signal_pending(current) && !guestdbg_exit_pending(vcpu) && !rc);
|
2013-09-12 15:33:43 +07:00
|
|
|
|
2013-09-12 15:33:45 +07:00
|
|
|
srcu_read_unlock(&vcpu->kvm->srcu, vcpu->srcu_idx);
|
2012-01-04 16:25:22 +07:00
|
|
|
return rc;
|
2008-03-26 00:47:20 +07:00
|
|
|
}
|
|
|
|
|
2014-07-17 15:47:43 +07:00
|
|
|
static void sync_regs(struct kvm_vcpu *vcpu, struct kvm_run *kvm_run)
|
|
|
|
{
|
|
|
|
vcpu->arch.sie_block->gpsw.mask = kvm_run->psw_mask;
|
|
|
|
vcpu->arch.sie_block->gpsw.addr = kvm_run->psw_addr;
|
|
|
|
if (kvm_run->kvm_dirty_regs & KVM_SYNC_PREFIX)
|
|
|
|
kvm_s390_set_prefix(vcpu, kvm_run->s.regs.prefix);
|
|
|
|
if (kvm_run->kvm_dirty_regs & KVM_SYNC_CRS) {
|
|
|
|
memcpy(&vcpu->arch.sie_block->gcr, &kvm_run->s.regs.crs, 128);
|
2014-07-29 13:53:36 +07:00
|
|
|
/* some control register changes require a tlb flush */
|
|
|
|
kvm_make_request(KVM_REQ_TLB_FLUSH, vcpu);
|
2014-07-17 15:47:43 +07:00
|
|
|
}
|
|
|
|
if (kvm_run->kvm_dirty_regs & KVM_SYNC_ARCH0) {
|
|
|
|
vcpu->arch.sie_block->cputm = kvm_run->s.regs.cputm;
|
|
|
|
vcpu->arch.sie_block->ckc = kvm_run->s.regs.ckc;
|
|
|
|
vcpu->arch.sie_block->todpr = kvm_run->s.regs.todpr;
|
|
|
|
vcpu->arch.sie_block->pp = kvm_run->s.regs.pp;
|
|
|
|
vcpu->arch.sie_block->gbea = kvm_run->s.regs.gbea;
|
|
|
|
}
|
|
|
|
if (kvm_run->kvm_dirty_regs & KVM_SYNC_PFAULT) {
|
|
|
|
vcpu->arch.pfault_token = kvm_run->s.regs.pft;
|
|
|
|
vcpu->arch.pfault_select = kvm_run->s.regs.pfs;
|
|
|
|
vcpu->arch.pfault_compare = kvm_run->s.regs.pfc;
|
2014-10-09 20:01:38 +07:00
|
|
|
if (vcpu->arch.pfault_token == KVM_S390_PFAULT_TOKEN_INVALID)
|
|
|
|
kvm_clear_async_pf_completion_queue(vcpu);
|
2014-07-17 15:47:43 +07:00
|
|
|
}
|
|
|
|
kvm_run->kvm_dirty_regs = 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void store_regs(struct kvm_vcpu *vcpu, struct kvm_run *kvm_run)
|
|
|
|
{
|
|
|
|
kvm_run->psw_mask = vcpu->arch.sie_block->gpsw.mask;
|
|
|
|
kvm_run->psw_addr = vcpu->arch.sie_block->gpsw.addr;
|
|
|
|
kvm_run->s.regs.prefix = kvm_s390_get_prefix(vcpu);
|
|
|
|
memcpy(&kvm_run->s.regs.crs, &vcpu->arch.sie_block->gcr, 128);
|
|
|
|
kvm_run->s.regs.cputm = vcpu->arch.sie_block->cputm;
|
|
|
|
kvm_run->s.regs.ckc = vcpu->arch.sie_block->ckc;
|
|
|
|
kvm_run->s.regs.todpr = vcpu->arch.sie_block->todpr;
|
|
|
|
kvm_run->s.regs.pp = vcpu->arch.sie_block->pp;
|
|
|
|
kvm_run->s.regs.gbea = vcpu->arch.sie_block->gbea;
|
|
|
|
kvm_run->s.regs.pft = vcpu->arch.pfault_token;
|
|
|
|
kvm_run->s.regs.pfs = vcpu->arch.pfault_select;
|
|
|
|
kvm_run->s.regs.pfc = vcpu->arch.pfault_compare;
|
|
|
|
}
|
|
|
|
|
2008-03-26 00:47:20 +07:00
|
|
|
int kvm_arch_vcpu_ioctl_run(struct kvm_vcpu *vcpu, struct kvm_run *kvm_run)
|
|
|
|
{
|
2008-03-26 00:47:23 +07:00
|
|
|
int rc;
|
2008-03-26 00:47:20 +07:00
|
|
|
sigset_t sigsaved;
|
|
|
|
|
2014-01-23 18:26:52 +07:00
|
|
|
if (guestdbg_exit_pending(vcpu)) {
|
|
|
|
kvm_s390_prepare_debug_exit(vcpu);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2008-03-26 00:47:20 +07:00
|
|
|
if (vcpu->sigset_active)
|
|
|
|
sigprocmask(SIG_SETMASK, &vcpu->sigset, &sigsaved);
|
|
|
|
|
2014-04-10 22:35:00 +07:00
|
|
|
if (!kvm_s390_user_cpu_state_ctrl(vcpu->kvm)) {
|
|
|
|
kvm_s390_vcpu_start(vcpu);
|
|
|
|
} else if (is_vcpu_stopped(vcpu)) {
|
2015-05-20 18:24:02 +07:00
|
|
|
pr_err_ratelimited("can't run stopped vcpu %d\n",
|
2014-04-10 22:35:00 +07:00
|
|
|
vcpu->vcpu_id);
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
2008-03-26 00:47:20 +07:00
|
|
|
|
2014-07-17 15:47:43 +07:00
|
|
|
sync_regs(vcpu, kvm_run);
|
2009-11-19 20:21:16 +07:00
|
|
|
|
2009-06-12 15:26:32 +07:00
|
|
|
might_fault();
|
2013-09-12 15:33:44 +07:00
|
|
|
rc = __vcpu_run(vcpu);
|
2009-05-20 20:34:55 +07:00
|
|
|
|
2009-05-20 20:34:56 +07:00
|
|
|
if (signal_pending(current) && !rc) {
|
|
|
|
kvm_run->exit_reason = KVM_EXIT_INTR;
|
2008-03-26 00:47:23 +07:00
|
|
|
rc = -EINTR;
|
2009-05-20 20:34:56 +07:00
|
|
|
}
|
2008-03-26 00:47:23 +07:00
|
|
|
|
2014-01-23 18:26:52 +07:00
|
|
|
if (guestdbg_exit_pending(vcpu) && !rc) {
|
|
|
|
kvm_s390_prepare_debug_exit(vcpu);
|
|
|
|
rc = 0;
|
|
|
|
}
|
|
|
|
|
2008-03-26 00:47:23 +07:00
|
|
|
if (rc == -EREMOTE) {
|
2015-10-19 21:24:28 +07:00
|
|
|
/* userspace support is needed, kvm_run has been prepared */
|
2008-03-26 00:47:23 +07:00
|
|
|
rc = 0;
|
|
|
|
}
|
2008-03-26 00:47:20 +07:00
|
|
|
|
2014-07-17 15:47:43 +07:00
|
|
|
store_regs(vcpu, kvm_run);
|
2009-11-19 20:21:16 +07:00
|
|
|
|
2008-03-26 00:47:20 +07:00
|
|
|
if (vcpu->sigset_active)
|
|
|
|
sigprocmask(SIG_SETMASK, &sigsaved, NULL);
|
|
|
|
|
|
|
|
vcpu->stat.exit_userspace++;
|
2008-04-04 20:12:35 +07:00
|
|
|
return rc;
|
2008-03-26 00:47:20 +07:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* store status at address
|
|
|
|
* we use have two special cases:
|
|
|
|
* KVM_S390_STORE_STATUS_NOADDR: -> 0x1200 on 64 bit
|
|
|
|
* KVM_S390_STORE_STATUS_PREFIXED: -> prefix
|
|
|
|
*/
|
2014-01-01 22:45:58 +07:00
|
|
|
int kvm_s390_store_status_unloaded(struct kvm_vcpu *vcpu, unsigned long gpa)
|
2008-03-26 00:47:20 +07:00
|
|
|
{
|
2011-07-24 15:48:22 +07:00
|
|
|
unsigned char archmode = 1;
|
2014-05-13 21:58:30 +07:00
|
|
|
unsigned int px;
|
2013-11-14 02:28:18 +07:00
|
|
|
u64 clkcomp;
|
2014-01-01 22:45:58 +07:00
|
|
|
int rc;
|
2008-03-26 00:47:20 +07:00
|
|
|
|
2014-01-01 22:45:58 +07:00
|
|
|
if (gpa == KVM_S390_STORE_STATUS_NOADDR) {
|
|
|
|
if (write_guest_abs(vcpu, 163, &archmode, 1))
|
2008-03-26 00:47:20 +07:00
|
|
|
return -EFAULT;
|
2014-01-01 22:45:58 +07:00
|
|
|
gpa = SAVE_AREA_BASE;
|
|
|
|
} else if (gpa == KVM_S390_STORE_STATUS_PREFIXED) {
|
|
|
|
if (write_guest_real(vcpu, 163, &archmode, 1))
|
2008-03-26 00:47:20 +07:00
|
|
|
return -EFAULT;
|
2014-01-01 22:45:58 +07:00
|
|
|
gpa = kvm_s390_real_to_abs(vcpu, SAVE_AREA_BASE);
|
|
|
|
}
|
|
|
|
rc = write_guest_abs(vcpu, gpa + offsetof(struct save_area, fp_regs),
|
|
|
|
vcpu->arch.guest_fpregs.fprs, 128);
|
|
|
|
rc |= write_guest_abs(vcpu, gpa + offsetof(struct save_area, gp_regs),
|
|
|
|
vcpu->run->s.regs.gprs, 128);
|
|
|
|
rc |= write_guest_abs(vcpu, gpa + offsetof(struct save_area, psw),
|
|
|
|
&vcpu->arch.sie_block->gpsw, 16);
|
2014-05-13 21:58:30 +07:00
|
|
|
px = kvm_s390_get_prefix(vcpu);
|
2014-01-01 22:45:58 +07:00
|
|
|
rc |= write_guest_abs(vcpu, gpa + offsetof(struct save_area, pref_reg),
|
2014-05-13 21:58:30 +07:00
|
|
|
&px, 4);
|
2014-01-01 22:45:58 +07:00
|
|
|
rc |= write_guest_abs(vcpu,
|
|
|
|
gpa + offsetof(struct save_area, fp_ctrl_reg),
|
|
|
|
&vcpu->arch.guest_fpregs.fpc, 4);
|
|
|
|
rc |= write_guest_abs(vcpu, gpa + offsetof(struct save_area, tod_reg),
|
|
|
|
&vcpu->arch.sie_block->todpr, 4);
|
|
|
|
rc |= write_guest_abs(vcpu, gpa + offsetof(struct save_area, timer),
|
|
|
|
&vcpu->arch.sie_block->cputm, 8);
|
2013-11-14 02:28:18 +07:00
|
|
|
clkcomp = vcpu->arch.sie_block->ckc >> 8;
|
2014-01-01 22:45:58 +07:00
|
|
|
rc |= write_guest_abs(vcpu, gpa + offsetof(struct save_area, clk_cmp),
|
|
|
|
&clkcomp, 8);
|
|
|
|
rc |= write_guest_abs(vcpu, gpa + offsetof(struct save_area, acc_regs),
|
|
|
|
&vcpu->run->s.regs.acrs, 64);
|
|
|
|
rc |= write_guest_abs(vcpu, gpa + offsetof(struct save_area, ctrl_regs),
|
|
|
|
&vcpu->arch.sie_block->gcr, 128);
|
|
|
|
return rc ? -EFAULT : 0;
|
2008-03-26 00:47:20 +07:00
|
|
|
}
|
|
|
|
|
2013-11-06 21:46:33 +07:00
|
|
|
int kvm_s390_vcpu_store_status(struct kvm_vcpu *vcpu, unsigned long addr)
|
|
|
|
{
|
|
|
|
/*
|
|
|
|
* The guest FPRS and ACRS are in the host FPRS/ACRS due to the lazy
|
|
|
|
* copying in vcpu load/put. Lets update our copies before we save
|
|
|
|
* it into the save area
|
|
|
|
*/
|
2015-06-29 21:43:06 +07:00
|
|
|
save_fpu_regs();
|
s390/kernel: lazy restore fpu registers
Improve the save and restore behavior of FPU register contents to use the
vector extension within the kernel.
The kernel does not use floating-point or vector registers and, therefore,
saving and restoring the FPU register contents are performed for handling
signals or switching processes only. To prepare for using vector
instructions and vector registers within the kernel, enhance the save
behavior and implement a lazy restore at return to user space from a
system call or interrupt.
To implement the lazy restore, the save_fpu_regs() sets a CPU information
flag, CIF_FPU, to indicate that the FPU registers must be restored.
Saving and setting CIF_FPU is performed in an atomic fashion to be
interrupt-safe. When the kernel wants to use the vector extension or
wants to change the FPU register state for a task during signal handling,
the save_fpu_regs() must be called first. The CIF_FPU flag is also set at
process switch. At return to user space, the FPU state is restored. In
particular, the FPU state includes the floating-point or vector register
contents, as well as, vector-enablement and floating-point control. The
FPU state restore and clearing CIF_FPU is also performed in an atomic
fashion.
For KVM, the restore of the FPU register state is performed when restoring
the general-purpose guest registers before the SIE instructions is started.
Because the path towards the SIE instruction is interruptible, the CIF_FPU
flag must be checked again right before going into SIE. If set, the guest
registers must be reloaded again by re-entering the outer SIE loop. This
is the same behavior as if the SIE critical section is interrupted.
Signed-off-by: Hendrik Brueckner <brueckner@linux.vnet.ibm.com>
Signed-off-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
2015-06-10 17:53:42 +07:00
|
|
|
if (test_kvm_facility(vcpu->kvm, 129)) {
|
|
|
|
/*
|
|
|
|
* If the vector extension is available, the vector registers
|
|
|
|
* which overlaps with floating-point registers are saved in
|
|
|
|
* the SIE-control block. Hence, extract the floating-point
|
|
|
|
* registers and the FPC value and store them in the
|
|
|
|
* guest_fpregs structure.
|
|
|
|
*/
|
|
|
|
vcpu->arch.guest_fpregs.fpc = current->thread.fpu.fpc;
|
|
|
|
convert_vx_to_fp(vcpu->arch.guest_fpregs.fprs,
|
|
|
|
current->thread.fpu.vxrs);
|
|
|
|
} else
|
|
|
|
save_fpu_to(&vcpu->arch.guest_fpregs);
|
2013-11-06 21:46:33 +07:00
|
|
|
save_access_regs(vcpu->run->s.regs.acrs);
|
|
|
|
|
|
|
|
return kvm_s390_store_status_unloaded(vcpu, addr);
|
|
|
|
}
|
|
|
|
|
2014-04-15 03:01:09 +07:00
|
|
|
/*
|
|
|
|
* store additional status at address
|
|
|
|
*/
|
|
|
|
int kvm_s390_store_adtl_status_unloaded(struct kvm_vcpu *vcpu,
|
|
|
|
unsigned long gpa)
|
|
|
|
{
|
|
|
|
/* Only bits 0-53 are used for address formation */
|
|
|
|
if (!(gpa & ~0x3ff))
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
return write_guest_abs(vcpu, gpa & ~0x3ff,
|
|
|
|
(void *)&vcpu->run->s.regs.vrs, 512);
|
|
|
|
}
|
|
|
|
|
|
|
|
int kvm_s390_vcpu_store_adtl_status(struct kvm_vcpu *vcpu, unsigned long addr)
|
|
|
|
{
|
|
|
|
if (!test_kvm_facility(vcpu->kvm, 129))
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* The guest VXRS are in the host VXRs due to the lazy
|
s390/kernel: lazy restore fpu registers
Improve the save and restore behavior of FPU register contents to use the
vector extension within the kernel.
The kernel does not use floating-point or vector registers and, therefore,
saving and restoring the FPU register contents are performed for handling
signals or switching processes only. To prepare for using vector
instructions and vector registers within the kernel, enhance the save
behavior and implement a lazy restore at return to user space from a
system call or interrupt.
To implement the lazy restore, the save_fpu_regs() sets a CPU information
flag, CIF_FPU, to indicate that the FPU registers must be restored.
Saving and setting CIF_FPU is performed in an atomic fashion to be
interrupt-safe. When the kernel wants to use the vector extension or
wants to change the FPU register state for a task during signal handling,
the save_fpu_regs() must be called first. The CIF_FPU flag is also set at
process switch. At return to user space, the FPU state is restored. In
particular, the FPU state includes the floating-point or vector register
contents, as well as, vector-enablement and floating-point control. The
FPU state restore and clearing CIF_FPU is also performed in an atomic
fashion.
For KVM, the restore of the FPU register state is performed when restoring
the general-purpose guest registers before the SIE instructions is started.
Because the path towards the SIE instruction is interruptible, the CIF_FPU
flag must be checked again right before going into SIE. If set, the guest
registers must be reloaded again by re-entering the outer SIE loop. This
is the same behavior as if the SIE critical section is interrupted.
Signed-off-by: Hendrik Brueckner <brueckner@linux.vnet.ibm.com>
Signed-off-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
2015-06-10 17:53:42 +07:00
|
|
|
* copying in vcpu load/put. We can simply call save_fpu_regs()
|
|
|
|
* to save the current register state because we are in the
|
|
|
|
* middle of a load/put cycle.
|
|
|
|
*
|
|
|
|
* Let's update our copies before we save it into the save area.
|
2014-04-15 03:01:09 +07:00
|
|
|
*/
|
2015-06-29 21:43:06 +07:00
|
|
|
save_fpu_regs();
|
2014-04-15 03:01:09 +07:00
|
|
|
|
|
|
|
return kvm_s390_store_adtl_status_unloaded(vcpu, addr);
|
|
|
|
}
|
|
|
|
|
2014-03-14 17:00:21 +07:00
|
|
|
static void __disable_ibs_on_vcpu(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
|
|
|
kvm_check_request(KVM_REQ_ENABLE_IBS, vcpu);
|
2015-04-09 18:49:04 +07:00
|
|
|
kvm_s390_sync_request(KVM_REQ_DISABLE_IBS, vcpu);
|
2014-03-14 17:00:21 +07:00
|
|
|
}
|
|
|
|
|
|
|
|
static void __disable_ibs_on_all_vcpus(struct kvm *kvm)
|
|
|
|
{
|
|
|
|
unsigned int i;
|
|
|
|
struct kvm_vcpu *vcpu;
|
|
|
|
|
|
|
|
kvm_for_each_vcpu(i, vcpu, kvm) {
|
|
|
|
__disable_ibs_on_vcpu(vcpu);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static void __enable_ibs_on_vcpu(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
|
|
|
kvm_check_request(KVM_REQ_DISABLE_IBS, vcpu);
|
2015-04-09 18:49:04 +07:00
|
|
|
kvm_s390_sync_request(KVM_REQ_ENABLE_IBS, vcpu);
|
2014-03-14 17:00:21 +07:00
|
|
|
}
|
|
|
|
|
2014-03-14 16:59:29 +07:00
|
|
|
void kvm_s390_vcpu_start(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
2014-03-14 17:00:21 +07:00
|
|
|
int i, online_vcpus, started_vcpus = 0;
|
|
|
|
|
|
|
|
if (!is_vcpu_stopped(vcpu))
|
|
|
|
return;
|
|
|
|
|
2014-03-14 16:59:29 +07:00
|
|
|
trace_kvm_s390_vcpu_start_stop(vcpu->vcpu_id, 1);
|
2014-03-14 17:00:21 +07:00
|
|
|
/* Only one cpu at a time may enter/leave the STOPPED state. */
|
2014-05-06 21:11:14 +07:00
|
|
|
spin_lock(&vcpu->kvm->arch.start_stop_lock);
|
2014-03-14 17:00:21 +07:00
|
|
|
online_vcpus = atomic_read(&vcpu->kvm->online_vcpus);
|
|
|
|
|
|
|
|
for (i = 0; i < online_vcpus; i++) {
|
|
|
|
if (!is_vcpu_stopped(vcpu->kvm->vcpus[i]))
|
|
|
|
started_vcpus++;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (started_vcpus == 0) {
|
|
|
|
/* we're the only active VCPU -> speed it up */
|
|
|
|
__enable_ibs_on_vcpu(vcpu);
|
|
|
|
} else if (started_vcpus == 1) {
|
|
|
|
/*
|
|
|
|
* As we are starting a second VCPU, we have to disable
|
|
|
|
* the IBS facility on all VCPUs to remove potentially
|
|
|
|
* oustanding ENABLE requests.
|
|
|
|
*/
|
|
|
|
__disable_ibs_on_all_vcpus(vcpu->kvm);
|
|
|
|
}
|
|
|
|
|
2015-04-24 06:12:32 +07:00
|
|
|
atomic_andnot(CPUSTAT_STOPPED, &vcpu->arch.sie_block->cpuflags);
|
2014-03-14 17:00:21 +07:00
|
|
|
/*
|
|
|
|
* Another VCPU might have used IBS while we were offline.
|
|
|
|
* Let's play safe and flush the VCPU at startup.
|
|
|
|
*/
|
2014-07-29 13:53:36 +07:00
|
|
|
kvm_make_request(KVM_REQ_TLB_FLUSH, vcpu);
|
2014-05-06 21:11:14 +07:00
|
|
|
spin_unlock(&vcpu->kvm->arch.start_stop_lock);
|
2014-03-14 17:00:21 +07:00
|
|
|
return;
|
2014-03-14 16:59:29 +07:00
|
|
|
}
|
|
|
|
|
|
|
|
void kvm_s390_vcpu_stop(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
2014-03-14 17:00:21 +07:00
|
|
|
int i, online_vcpus, started_vcpus = 0;
|
|
|
|
struct kvm_vcpu *started_vcpu = NULL;
|
|
|
|
|
|
|
|
if (is_vcpu_stopped(vcpu))
|
|
|
|
return;
|
|
|
|
|
2014-03-14 16:59:29 +07:00
|
|
|
trace_kvm_s390_vcpu_start_stop(vcpu->vcpu_id, 0);
|
2014-03-14 17:00:21 +07:00
|
|
|
/* Only one cpu at a time may enter/leave the STOPPED state. */
|
2014-05-06 21:11:14 +07:00
|
|
|
spin_lock(&vcpu->kvm->arch.start_stop_lock);
|
2014-03-14 17:00:21 +07:00
|
|
|
online_vcpus = atomic_read(&vcpu->kvm->online_vcpus);
|
|
|
|
|
2014-04-14 17:40:03 +07:00
|
|
|
/* SIGP STOP and SIGP STOP AND STORE STATUS has been fully processed */
|
2014-10-15 21:48:53 +07:00
|
|
|
kvm_s390_clear_stop_irq(vcpu);
|
2014-04-14 17:40:03 +07:00
|
|
|
|
2015-04-24 06:12:32 +07:00
|
|
|
atomic_or(CPUSTAT_STOPPED, &vcpu->arch.sie_block->cpuflags);
|
2014-03-14 17:00:21 +07:00
|
|
|
__disable_ibs_on_vcpu(vcpu);
|
|
|
|
|
|
|
|
for (i = 0; i < online_vcpus; i++) {
|
|
|
|
if (!is_vcpu_stopped(vcpu->kvm->vcpus[i])) {
|
|
|
|
started_vcpus++;
|
|
|
|
started_vcpu = vcpu->kvm->vcpus[i];
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (started_vcpus == 1) {
|
|
|
|
/*
|
|
|
|
* As we only have one VCPU left, we want to enable the
|
|
|
|
* IBS facility for that VCPU to speed it up.
|
|
|
|
*/
|
|
|
|
__enable_ibs_on_vcpu(started_vcpu);
|
|
|
|
}
|
|
|
|
|
2014-05-06 21:11:14 +07:00
|
|
|
spin_unlock(&vcpu->kvm->arch.start_stop_lock);
|
2014-03-14 17:00:21 +07:00
|
|
|
return;
|
2014-03-14 16:59:29 +07:00
|
|
|
}
|
|
|
|
|
2012-12-20 21:32:11 +07:00
|
|
|
static int kvm_vcpu_ioctl_enable_cap(struct kvm_vcpu *vcpu,
|
|
|
|
struct kvm_enable_cap *cap)
|
|
|
|
{
|
|
|
|
int r;
|
|
|
|
|
|
|
|
if (cap->flags)
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
switch (cap->cap) {
|
2012-12-20 21:32:12 +07:00
|
|
|
case KVM_CAP_S390_CSS_SUPPORT:
|
|
|
|
if (!vcpu->kvm->arch.css_support) {
|
|
|
|
vcpu->kvm->arch.css_support = 1;
|
2015-07-22 20:52:10 +07:00
|
|
|
VM_EVENT(vcpu->kvm, 3, "%s", "ENABLE: CSS support");
|
2012-12-20 21:32:12 +07:00
|
|
|
trace_kvm_s390_enable_css(vcpu->kvm);
|
|
|
|
}
|
|
|
|
r = 0;
|
|
|
|
break;
|
2012-12-20 21:32:11 +07:00
|
|
|
default:
|
|
|
|
r = -EINVAL;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
return r;
|
|
|
|
}
|
|
|
|
|
2015-02-06 21:01:21 +07:00
|
|
|
static long kvm_s390_guest_mem_op(struct kvm_vcpu *vcpu,
|
|
|
|
struct kvm_s390_mem_op *mop)
|
|
|
|
{
|
|
|
|
void __user *uaddr = (void __user *)mop->buf;
|
|
|
|
void *tmpbuf = NULL;
|
|
|
|
int r, srcu_idx;
|
|
|
|
const u64 supported_flags = KVM_S390_MEMOP_F_INJECT_EXCEPTION
|
|
|
|
| KVM_S390_MEMOP_F_CHECK_ONLY;
|
|
|
|
|
|
|
|
if (mop->flags & ~supported_flags)
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
if (mop->size > MEM_OP_MAX_SIZE)
|
|
|
|
return -E2BIG;
|
|
|
|
|
|
|
|
if (!(mop->flags & KVM_S390_MEMOP_F_CHECK_ONLY)) {
|
|
|
|
tmpbuf = vmalloc(mop->size);
|
|
|
|
if (!tmpbuf)
|
|
|
|
return -ENOMEM;
|
|
|
|
}
|
|
|
|
|
|
|
|
srcu_idx = srcu_read_lock(&vcpu->kvm->srcu);
|
|
|
|
|
|
|
|
switch (mop->op) {
|
|
|
|
case KVM_S390_MEMOP_LOGICAL_READ:
|
|
|
|
if (mop->flags & KVM_S390_MEMOP_F_CHECK_ONLY) {
|
|
|
|
r = check_gva_range(vcpu, mop->gaddr, mop->ar, mop->size, false);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
r = read_guest(vcpu, mop->gaddr, mop->ar, tmpbuf, mop->size);
|
|
|
|
if (r == 0) {
|
|
|
|
if (copy_to_user(uaddr, tmpbuf, mop->size))
|
|
|
|
r = -EFAULT;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
case KVM_S390_MEMOP_LOGICAL_WRITE:
|
|
|
|
if (mop->flags & KVM_S390_MEMOP_F_CHECK_ONLY) {
|
|
|
|
r = check_gva_range(vcpu, mop->gaddr, mop->ar, mop->size, true);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
if (copy_from_user(tmpbuf, uaddr, mop->size)) {
|
|
|
|
r = -EFAULT;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
r = write_guest(vcpu, mop->gaddr, mop->ar, tmpbuf, mop->size);
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
r = -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
srcu_read_unlock(&vcpu->kvm->srcu, srcu_idx);
|
|
|
|
|
|
|
|
if (r > 0 && (mop->flags & KVM_S390_MEMOP_F_INJECT_EXCEPTION) != 0)
|
|
|
|
kvm_s390_inject_prog_irq(vcpu, &vcpu->arch.pgm);
|
|
|
|
|
|
|
|
vfree(tmpbuf);
|
|
|
|
return r;
|
|
|
|
}
|
|
|
|
|
2008-03-26 00:47:20 +07:00
|
|
|
long kvm_arch_vcpu_ioctl(struct file *filp,
|
|
|
|
unsigned int ioctl, unsigned long arg)
|
|
|
|
{
|
|
|
|
struct kvm_vcpu *vcpu = filp->private_data;
|
|
|
|
void __user *argp = (void __user *)arg;
|
2013-09-12 15:33:45 +07:00
|
|
|
int idx;
|
2010-05-13 16:21:46 +07:00
|
|
|
long r;
|
2008-03-26 00:47:20 +07:00
|
|
|
|
2010-05-13 16:35:17 +07:00
|
|
|
switch (ioctl) {
|
2014-11-12 02:57:06 +07:00
|
|
|
case KVM_S390_IRQ: {
|
|
|
|
struct kvm_s390_irq s390irq;
|
|
|
|
|
|
|
|
r = -EFAULT;
|
|
|
|
if (copy_from_user(&s390irq, argp, sizeof(s390irq)))
|
|
|
|
break;
|
|
|
|
r = kvm_s390_inject_vcpu(vcpu, &s390irq);
|
|
|
|
break;
|
|
|
|
}
|
2010-05-13 16:35:17 +07:00
|
|
|
case KVM_S390_INTERRUPT: {
|
KVM: s390: interrupt subsystem, cpu timer, waitpsw
This patch contains the s390 interrupt subsystem (similar to in kernel apic)
including timer interrupts (similar to in-kernel-pit) and enabled wait
(similar to in kernel hlt).
In order to achieve that, this patch also introduces intercept handling
for instruction intercepts, and it implements load control instructions.
This patch introduces an ioctl KVM_S390_INTERRUPT which is valid for both
the vm file descriptors and the vcpu file descriptors. In case this ioctl is
issued against a vm file descriptor, the interrupt is considered floating.
Floating interrupts may be delivered to any virtual cpu in the configuration.
The following interrupts are supported:
SIGP STOP - interprocessor signal that stops a remote cpu
SIGP SET PREFIX - interprocessor signal that sets the prefix register of a
(stopped) remote cpu
INT EMERGENCY - interprocessor interrupt, usually used to signal need_reshed
and for smp_call_function() in the guest.
PROGRAM INT - exception during program execution such as page fault, illegal
instruction and friends
RESTART - interprocessor signal that starts a stopped cpu
INT VIRTIO - floating interrupt for virtio signalisation
INT SERVICE - floating interrupt for signalisations from the system
service processor
struct kvm_s390_interrupt, which is submitted as ioctl parameter when injecting
an interrupt, also carrys parameter data for interrupts along with the interrupt
type. Interrupts on s390 usually have a state that represents the current
operation, or identifies which device has caused the interruption on s390.
kvm_s390_handle_wait() does handle waitpsw in two flavors: in case of a
disabled wait (that is, disabled for interrupts), we exit to userspace. In case
of an enabled wait we set up a timer that equals the cpu clock comparator value
and sleep on a wait queue.
[christian: change virtio interrupt to 0x2603]
Acked-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
Signed-off-by: Heiko Carstens <heiko.carstens@de.ibm.com>
Signed-off-by: Carsten Otte <cotte@de.ibm.com>
Signed-off-by: Christian Borntraeger <borntraeger@de.ibm.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
2008-03-26 00:47:26 +07:00
|
|
|
struct kvm_s390_interrupt s390int;
|
2014-07-29 20:11:49 +07:00
|
|
|
struct kvm_s390_irq s390irq;
|
KVM: s390: interrupt subsystem, cpu timer, waitpsw
This patch contains the s390 interrupt subsystem (similar to in kernel apic)
including timer interrupts (similar to in-kernel-pit) and enabled wait
(similar to in kernel hlt).
In order to achieve that, this patch also introduces intercept handling
for instruction intercepts, and it implements load control instructions.
This patch introduces an ioctl KVM_S390_INTERRUPT which is valid for both
the vm file descriptors and the vcpu file descriptors. In case this ioctl is
issued against a vm file descriptor, the interrupt is considered floating.
Floating interrupts may be delivered to any virtual cpu in the configuration.
The following interrupts are supported:
SIGP STOP - interprocessor signal that stops a remote cpu
SIGP SET PREFIX - interprocessor signal that sets the prefix register of a
(stopped) remote cpu
INT EMERGENCY - interprocessor interrupt, usually used to signal need_reshed
and for smp_call_function() in the guest.
PROGRAM INT - exception during program execution such as page fault, illegal
instruction and friends
RESTART - interprocessor signal that starts a stopped cpu
INT VIRTIO - floating interrupt for virtio signalisation
INT SERVICE - floating interrupt for signalisations from the system
service processor
struct kvm_s390_interrupt, which is submitted as ioctl parameter when injecting
an interrupt, also carrys parameter data for interrupts along with the interrupt
type. Interrupts on s390 usually have a state that represents the current
operation, or identifies which device has caused the interruption on s390.
kvm_s390_handle_wait() does handle waitpsw in two flavors: in case of a
disabled wait (that is, disabled for interrupts), we exit to userspace. In case
of an enabled wait we set up a timer that equals the cpu clock comparator value
and sleep on a wait queue.
[christian: change virtio interrupt to 0x2603]
Acked-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
Signed-off-by: Heiko Carstens <heiko.carstens@de.ibm.com>
Signed-off-by: Carsten Otte <cotte@de.ibm.com>
Signed-off-by: Christian Borntraeger <borntraeger@de.ibm.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
2008-03-26 00:47:26 +07:00
|
|
|
|
2010-05-13 16:35:17 +07:00
|
|
|
r = -EFAULT;
|
KVM: s390: interrupt subsystem, cpu timer, waitpsw
This patch contains the s390 interrupt subsystem (similar to in kernel apic)
including timer interrupts (similar to in-kernel-pit) and enabled wait
(similar to in kernel hlt).
In order to achieve that, this patch also introduces intercept handling
for instruction intercepts, and it implements load control instructions.
This patch introduces an ioctl KVM_S390_INTERRUPT which is valid for both
the vm file descriptors and the vcpu file descriptors. In case this ioctl is
issued against a vm file descriptor, the interrupt is considered floating.
Floating interrupts may be delivered to any virtual cpu in the configuration.
The following interrupts are supported:
SIGP STOP - interprocessor signal that stops a remote cpu
SIGP SET PREFIX - interprocessor signal that sets the prefix register of a
(stopped) remote cpu
INT EMERGENCY - interprocessor interrupt, usually used to signal need_reshed
and for smp_call_function() in the guest.
PROGRAM INT - exception during program execution such as page fault, illegal
instruction and friends
RESTART - interprocessor signal that starts a stopped cpu
INT VIRTIO - floating interrupt for virtio signalisation
INT SERVICE - floating interrupt for signalisations from the system
service processor
struct kvm_s390_interrupt, which is submitted as ioctl parameter when injecting
an interrupt, also carrys parameter data for interrupts along with the interrupt
type. Interrupts on s390 usually have a state that represents the current
operation, or identifies which device has caused the interruption on s390.
kvm_s390_handle_wait() does handle waitpsw in two flavors: in case of a
disabled wait (that is, disabled for interrupts), we exit to userspace. In case
of an enabled wait we set up a timer that equals the cpu clock comparator value
and sleep on a wait queue.
[christian: change virtio interrupt to 0x2603]
Acked-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
Signed-off-by: Heiko Carstens <heiko.carstens@de.ibm.com>
Signed-off-by: Carsten Otte <cotte@de.ibm.com>
Signed-off-by: Christian Borntraeger <borntraeger@de.ibm.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
2008-03-26 00:47:26 +07:00
|
|
|
if (copy_from_user(&s390int, argp, sizeof(s390int)))
|
2010-05-13 16:35:17 +07:00
|
|
|
break;
|
2014-07-29 20:11:49 +07:00
|
|
|
if (s390int_to_s390irq(&s390int, &s390irq))
|
|
|
|
return -EINVAL;
|
|
|
|
r = kvm_s390_inject_vcpu(vcpu, &s390irq);
|
2010-05-13 16:35:17 +07:00
|
|
|
break;
|
KVM: s390: interrupt subsystem, cpu timer, waitpsw
This patch contains the s390 interrupt subsystem (similar to in kernel apic)
including timer interrupts (similar to in-kernel-pit) and enabled wait
(similar to in kernel hlt).
In order to achieve that, this patch also introduces intercept handling
for instruction intercepts, and it implements load control instructions.
This patch introduces an ioctl KVM_S390_INTERRUPT which is valid for both
the vm file descriptors and the vcpu file descriptors. In case this ioctl is
issued against a vm file descriptor, the interrupt is considered floating.
Floating interrupts may be delivered to any virtual cpu in the configuration.
The following interrupts are supported:
SIGP STOP - interprocessor signal that stops a remote cpu
SIGP SET PREFIX - interprocessor signal that sets the prefix register of a
(stopped) remote cpu
INT EMERGENCY - interprocessor interrupt, usually used to signal need_reshed
and for smp_call_function() in the guest.
PROGRAM INT - exception during program execution such as page fault, illegal
instruction and friends
RESTART - interprocessor signal that starts a stopped cpu
INT VIRTIO - floating interrupt for virtio signalisation
INT SERVICE - floating interrupt for signalisations from the system
service processor
struct kvm_s390_interrupt, which is submitted as ioctl parameter when injecting
an interrupt, also carrys parameter data for interrupts along with the interrupt
type. Interrupts on s390 usually have a state that represents the current
operation, or identifies which device has caused the interruption on s390.
kvm_s390_handle_wait() does handle waitpsw in two flavors: in case of a
disabled wait (that is, disabled for interrupts), we exit to userspace. In case
of an enabled wait we set up a timer that equals the cpu clock comparator value
and sleep on a wait queue.
[christian: change virtio interrupt to 0x2603]
Acked-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
Signed-off-by: Heiko Carstens <heiko.carstens@de.ibm.com>
Signed-off-by: Carsten Otte <cotte@de.ibm.com>
Signed-off-by: Christian Borntraeger <borntraeger@de.ibm.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
2008-03-26 00:47:26 +07:00
|
|
|
}
|
2008-03-26 00:47:20 +07:00
|
|
|
case KVM_S390_STORE_STATUS:
|
2013-09-12 15:33:45 +07:00
|
|
|
idx = srcu_read_lock(&vcpu->kvm->srcu);
|
2010-05-13 16:21:46 +07:00
|
|
|
r = kvm_s390_vcpu_store_status(vcpu, arg);
|
2013-09-12 15:33:45 +07:00
|
|
|
srcu_read_unlock(&vcpu->kvm->srcu, idx);
|
2010-05-13 16:21:46 +07:00
|
|
|
break;
|
2008-03-26 00:47:20 +07:00
|
|
|
case KVM_S390_SET_INITIAL_PSW: {
|
|
|
|
psw_t psw;
|
|
|
|
|
2010-05-13 16:21:46 +07:00
|
|
|
r = -EFAULT;
|
2008-03-26 00:47:20 +07:00
|
|
|
if (copy_from_user(&psw, argp, sizeof(psw)))
|
2010-05-13 16:21:46 +07:00
|
|
|
break;
|
|
|
|
r = kvm_arch_vcpu_ioctl_set_initial_psw(vcpu, psw);
|
|
|
|
break;
|
2008-03-26 00:47:20 +07:00
|
|
|
}
|
|
|
|
case KVM_S390_INITIAL_RESET:
|
2010-05-13 16:21:46 +07:00
|
|
|
r = kvm_arch_vcpu_ioctl_initial_reset(vcpu);
|
|
|
|
break;
|
2012-05-15 19:15:26 +07:00
|
|
|
case KVM_SET_ONE_REG:
|
|
|
|
case KVM_GET_ONE_REG: {
|
|
|
|
struct kvm_one_reg reg;
|
|
|
|
r = -EFAULT;
|
|
|
|
if (copy_from_user(®, argp, sizeof(reg)))
|
|
|
|
break;
|
|
|
|
if (ioctl == KVM_SET_ONE_REG)
|
|
|
|
r = kvm_arch_vcpu_ioctl_set_one_reg(vcpu, ®);
|
|
|
|
else
|
|
|
|
r = kvm_arch_vcpu_ioctl_get_one_reg(vcpu, ®);
|
|
|
|
break;
|
|
|
|
}
|
2012-01-04 16:25:21 +07:00
|
|
|
#ifdef CONFIG_KVM_S390_UCONTROL
|
|
|
|
case KVM_S390_UCAS_MAP: {
|
|
|
|
struct kvm_s390_ucas_mapping ucasmap;
|
|
|
|
|
|
|
|
if (copy_from_user(&ucasmap, argp, sizeof(ucasmap))) {
|
|
|
|
r = -EFAULT;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!kvm_is_ucontrol(vcpu->kvm)) {
|
|
|
|
r = -EINVAL;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
r = gmap_map_segment(vcpu->arch.gmap, ucasmap.user_addr,
|
|
|
|
ucasmap.vcpu_addr, ucasmap.length);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
case KVM_S390_UCAS_UNMAP: {
|
|
|
|
struct kvm_s390_ucas_mapping ucasmap;
|
|
|
|
|
|
|
|
if (copy_from_user(&ucasmap, argp, sizeof(ucasmap))) {
|
|
|
|
r = -EFAULT;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!kvm_is_ucontrol(vcpu->kvm)) {
|
|
|
|
r = -EINVAL;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
r = gmap_unmap_segment(vcpu->arch.gmap, ucasmap.vcpu_addr,
|
|
|
|
ucasmap.length);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
#endif
|
2012-01-04 16:25:26 +07:00
|
|
|
case KVM_S390_VCPU_FAULT: {
|
2014-04-30 21:04:25 +07:00
|
|
|
r = gmap_fault(vcpu->arch.gmap, arg, 0);
|
2012-01-04 16:25:26 +07:00
|
|
|
break;
|
|
|
|
}
|
2012-12-20 21:32:11 +07:00
|
|
|
case KVM_ENABLE_CAP:
|
|
|
|
{
|
|
|
|
struct kvm_enable_cap cap;
|
|
|
|
r = -EFAULT;
|
|
|
|
if (copy_from_user(&cap, argp, sizeof(cap)))
|
|
|
|
break;
|
|
|
|
r = kvm_vcpu_ioctl_enable_cap(vcpu, &cap);
|
|
|
|
break;
|
|
|
|
}
|
2015-02-06 21:01:21 +07:00
|
|
|
case KVM_S390_MEM_OP: {
|
|
|
|
struct kvm_s390_mem_op mem_op;
|
|
|
|
|
|
|
|
if (copy_from_user(&mem_op, argp, sizeof(mem_op)) == 0)
|
|
|
|
r = kvm_s390_guest_mem_op(vcpu, &mem_op);
|
|
|
|
else
|
|
|
|
r = -EFAULT;
|
|
|
|
break;
|
|
|
|
}
|
2014-11-24 23:13:46 +07:00
|
|
|
case KVM_S390_SET_IRQ_STATE: {
|
|
|
|
struct kvm_s390_irq_state irq_state;
|
|
|
|
|
|
|
|
r = -EFAULT;
|
|
|
|
if (copy_from_user(&irq_state, argp, sizeof(irq_state)))
|
|
|
|
break;
|
|
|
|
if (irq_state.len > VCPU_IRQS_MAX_BUF ||
|
|
|
|
irq_state.len == 0 ||
|
|
|
|
irq_state.len % sizeof(struct kvm_s390_irq) > 0) {
|
|
|
|
r = -EINVAL;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
r = kvm_s390_set_irq_state(vcpu,
|
|
|
|
(void __user *) irq_state.buf,
|
|
|
|
irq_state.len);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
case KVM_S390_GET_IRQ_STATE: {
|
|
|
|
struct kvm_s390_irq_state irq_state;
|
|
|
|
|
|
|
|
r = -EFAULT;
|
|
|
|
if (copy_from_user(&irq_state, argp, sizeof(irq_state)))
|
|
|
|
break;
|
|
|
|
if (irq_state.len == 0) {
|
|
|
|
r = -EINVAL;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
r = kvm_s390_get_irq_state(vcpu,
|
|
|
|
(__u8 __user *) irq_state.buf,
|
|
|
|
irq_state.len);
|
|
|
|
break;
|
|
|
|
}
|
2008-03-26 00:47:20 +07:00
|
|
|
default:
|
2012-01-04 16:25:30 +07:00
|
|
|
r = -ENOTTY;
|
2008-03-26 00:47:20 +07:00
|
|
|
}
|
2010-05-13 16:21:46 +07:00
|
|
|
return r;
|
2008-03-26 00:47:20 +07:00
|
|
|
}
|
|
|
|
|
2012-01-04 16:25:23 +07:00
|
|
|
int kvm_arch_vcpu_fault(struct kvm_vcpu *vcpu, struct vm_fault *vmf)
|
|
|
|
{
|
|
|
|
#ifdef CONFIG_KVM_S390_UCONTROL
|
|
|
|
if ((vmf->pgoff == KVM_S390_SIE_PAGE_OFFSET)
|
|
|
|
&& (kvm_is_ucontrol(vcpu->kvm))) {
|
|
|
|
vmf->page = virt_to_page(vcpu->arch.sie_block);
|
|
|
|
get_page(vmf->page);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
return VM_FAULT_SIGBUS;
|
|
|
|
}
|
|
|
|
|
2013-10-07 23:48:00 +07:00
|
|
|
int kvm_arch_create_memslot(struct kvm *kvm, struct kvm_memory_slot *slot,
|
|
|
|
unsigned long npages)
|
2012-02-08 11:02:18 +07:00
|
|
|
{
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2008-03-26 00:47:20 +07:00
|
|
|
/* Section: memory related */
|
2009-12-23 23:35:18 +07:00
|
|
|
int kvm_arch_prepare_memory_region(struct kvm *kvm,
|
|
|
|
struct kvm_memory_slot *memslot,
|
2015-05-18 18:59:39 +07:00
|
|
|
const struct kvm_userspace_memory_region *mem,
|
2013-02-27 17:44:34 +07:00
|
|
|
enum kvm_mr_change change)
|
2008-03-26 00:47:20 +07:00
|
|
|
{
|
2013-03-25 23:22:57 +07:00
|
|
|
/* A few sanity checks. We can have memory slots which have to be
|
|
|
|
located/ended at a segment boundary (1MB). The memory in userland is
|
|
|
|
ok to be fragmented into various different vmas. It is okay to mmap()
|
|
|
|
and munmap() stuff in this slot after doing this call at any time */
|
2008-03-26 00:47:20 +07:00
|
|
|
|
2011-07-24 15:48:21 +07:00
|
|
|
if (mem->userspace_addr & 0xffffful)
|
2008-03-26 00:47:20 +07:00
|
|
|
return -EINVAL;
|
|
|
|
|
2011-07-24 15:48:21 +07:00
|
|
|
if (mem->memory_size & 0xffffful)
|
2008-03-26 00:47:20 +07:00
|
|
|
return -EINVAL;
|
|
|
|
|
2014-12-01 23:24:42 +07:00
|
|
|
if (mem->guest_phys_addr + mem->memory_size > kvm->arch.mem_limit)
|
|
|
|
return -EINVAL;
|
|
|
|
|
2009-12-23 23:35:18 +07:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
void kvm_arch_commit_memory_region(struct kvm *kvm,
|
2015-05-18 18:59:39 +07:00
|
|
|
const struct kvm_userspace_memory_region *mem,
|
2013-02-27 17:45:25 +07:00
|
|
|
const struct kvm_memory_slot *old,
|
2015-05-18 18:20:23 +07:00
|
|
|
const struct kvm_memory_slot *new,
|
2013-02-27 17:45:25 +07:00
|
|
|
enum kvm_mr_change change)
|
2009-12-23 23:35:18 +07:00
|
|
|
{
|
2011-07-24 15:48:23 +07:00
|
|
|
int rc;
|
2009-12-23 23:35:18 +07:00
|
|
|
|
2013-03-25 23:22:48 +07:00
|
|
|
/* If the basics of the memslot do not change, we do not want
|
|
|
|
* to update the gmap. Every update causes several unnecessary
|
|
|
|
* segment translation exceptions. This is usually handled just
|
|
|
|
* fine by the normal fault handler + gmap, but it will also
|
|
|
|
* cause faults on the prefix page of running guest CPUs.
|
|
|
|
*/
|
|
|
|
if (old->userspace_addr == mem->userspace_addr &&
|
|
|
|
old->base_gfn * PAGE_SIZE == mem->guest_phys_addr &&
|
|
|
|
old->npages * PAGE_SIZE == mem->memory_size)
|
|
|
|
return;
|
2011-07-24 15:48:21 +07:00
|
|
|
|
|
|
|
rc = gmap_map_segment(kvm->arch.gmap, mem->userspace_addr,
|
|
|
|
mem->guest_phys_addr, mem->memory_size);
|
|
|
|
if (rc)
|
2015-05-20 18:24:02 +07:00
|
|
|
pr_warn("failed to commit memory region\n");
|
2011-07-24 15:48:21 +07:00
|
|
|
return;
|
2008-03-26 00:47:20 +07:00
|
|
|
}
|
|
|
|
|
|
|
|
static int __init kvm_s390_init(void)
|
|
|
|
{
|
2015-01-30 22:01:38 +07:00
|
|
|
if (!sclp.has_sief2) {
|
|
|
|
pr_info("SIE not available\n");
|
|
|
|
return -ENODEV;
|
|
|
|
}
|
|
|
|
|
2015-02-02 21:42:51 +07:00
|
|
|
return kvm_init(NULL, sizeof(struct kvm_vcpu), 0, THIS_MODULE);
|
2008-03-26 00:47:20 +07:00
|
|
|
}
|
|
|
|
|
|
|
|
static void __exit kvm_s390_exit(void)
|
|
|
|
{
|
|
|
|
kvm_exit();
|
|
|
|
}
|
|
|
|
|
|
|
|
module_init(kvm_s390_init);
|
|
|
|
module_exit(kvm_s390_exit);
|
2013-05-27 23:42:33 +07:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Enable autoloading of the kvm module.
|
|
|
|
* Note that we add the module alias here instead of virt/kvm/kvm_main.c
|
|
|
|
* since x86 takes a different approach.
|
|
|
|
*/
|
|
|
|
#include <linux/miscdevice.h>
|
|
|
|
MODULE_ALIAS_MISCDEV(KVM_MINOR);
|
|
|
|
MODULE_ALIAS("devname:kvm");
|