]> bbs.cooldavid.org Git - net-next-2.6.git/blame - virt/kvm/kvm_main.c
KVM: MMU: Fix false flooding when a pte points to page table
[net-next-2.6.git] / virt / kvm / kvm_main.c
CommitLineData
6aa8b732
AK
1/*
2 * Kernel-based Virtual Machine driver for Linux
3 *
4 * This module enables machines with Intel VT-x extensions to run virtual
5 * machines without emulation or binary translation.
6 *
7 * Copyright (C) 2006 Qumranet, Inc.
8 *
9 * Authors:
10 * Avi Kivity <avi@qumranet.com>
11 * Yaniv Kamay <yaniv@qumranet.com>
12 *
13 * This work is licensed under the terms of the GNU GPL, version 2. See
14 * the COPYING file in the top-level directory.
15 *
16 */
17
e2174021 18#include "iodev.h"
6aa8b732 19
edf88417 20#include <linux/kvm_host.h>
6aa8b732
AK
21#include <linux/kvm.h>
22#include <linux/module.h>
23#include <linux/errno.h>
6aa8b732
AK
24#include <linux/percpu.h>
25#include <linux/gfp.h>
6aa8b732
AK
26#include <linux/mm.h>
27#include <linux/miscdevice.h>
28#include <linux/vmalloc.h>
6aa8b732 29#include <linux/reboot.h>
6aa8b732
AK
30#include <linux/debugfs.h>
31#include <linux/highmem.h>
32#include <linux/file.h>
59ae6c6b 33#include <linux/sysdev.h>
774c47f1 34#include <linux/cpu.h>
e8edc6e0 35#include <linux/sched.h>
d9e368d6
AK
36#include <linux/cpumask.h>
37#include <linux/smp.h>
d6d28168 38#include <linux/anon_inodes.h>
04d2cc77 39#include <linux/profile.h>
7aa81cc0 40#include <linux/kvm_para.h>
6fc138d2 41#include <linux/pagemap.h>
8d4e1288 42#include <linux/mman.h>
35149e21 43#include <linux/swap.h>
6aa8b732 44
e495606d 45#include <asm/processor.h>
e495606d
AK
46#include <asm/io.h>
47#include <asm/uaccess.h>
3e021bf5 48#include <asm/pgtable.h>
6aa8b732
AK
49
50MODULE_AUTHOR("Qumranet");
51MODULE_LICENSE("GPL");
52
e9b11c17
ZX
53DEFINE_SPINLOCK(kvm_lock);
54LIST_HEAD(vm_list);
133de902 55
1b6c0168
AK
56static cpumask_t cpus_hardware_enabled;
57
c16f862d
RR
58struct kmem_cache *kvm_vcpu_cache;
59EXPORT_SYMBOL_GPL(kvm_vcpu_cache);
1165f5fe 60
15ad7146
AK
61static __read_mostly struct preempt_ops kvm_preempt_ops;
62
76f7c879 63struct dentry *kvm_debugfs_dir;
6aa8b732 64
bccf2150
AK
65static long kvm_vcpu_ioctl(struct file *file, unsigned int ioctl,
66 unsigned long arg);
67
5aacf0ca
JM
68static inline int valid_vcpu(int n)
69{
70 return likely(n >= 0 && n < KVM_MAX_VCPUS);
71}
72
bccf2150
AK
73/*
74 * Switches to specified vcpu, until a matching vcpu_put()
75 */
313a3dc7 76void vcpu_load(struct kvm_vcpu *vcpu)
6aa8b732 77{
15ad7146
AK
78 int cpu;
79
bccf2150 80 mutex_lock(&vcpu->mutex);
15ad7146
AK
81 cpu = get_cpu();
82 preempt_notifier_register(&vcpu->preempt_notifier);
313a3dc7 83 kvm_arch_vcpu_load(vcpu, cpu);
15ad7146 84 put_cpu();
6aa8b732
AK
85}
86
313a3dc7 87void vcpu_put(struct kvm_vcpu *vcpu)
6aa8b732 88{
15ad7146 89 preempt_disable();
313a3dc7 90 kvm_arch_vcpu_put(vcpu);
15ad7146
AK
91 preempt_notifier_unregister(&vcpu->preempt_notifier);
92 preempt_enable();
6aa8b732
AK
93 mutex_unlock(&vcpu->mutex);
94}
95
d9e368d6
AK
96static void ack_flush(void *_completed)
97{
d9e368d6
AK
98}
99
100void kvm_flush_remote_tlbs(struct kvm *kvm)
101{
49d3bd7e 102 int i, cpu;
d9e368d6
AK
103 cpumask_t cpus;
104 struct kvm_vcpu *vcpu;
d9e368d6 105
d9e368d6 106 cpus_clear(cpus);
fb3f0f51
RR
107 for (i = 0; i < KVM_MAX_VCPUS; ++i) {
108 vcpu = kvm->vcpus[i];
109 if (!vcpu)
110 continue;
3176bc3e 111 if (test_and_set_bit(KVM_REQ_TLB_FLUSH, &vcpu->requests))
d9e368d6
AK
112 continue;
113 cpu = vcpu->cpu;
114 if (cpu != -1 && cpu != raw_smp_processor_id())
49d3bd7e 115 cpu_set(cpu, cpus);
d9e368d6 116 }
0f74a24c
AK
117 if (cpus_empty(cpus))
118 return;
119 ++kvm->stat.remote_tlb_flush;
49d3bd7e 120 smp_call_function_mask(cpus, ack_flush, NULL, 1);
d9e368d6
AK
121}
122
2e53d63a
MT
123void kvm_reload_remote_mmus(struct kvm *kvm)
124{
125 int i, cpu;
126 cpumask_t cpus;
127 struct kvm_vcpu *vcpu;
128
129 cpus_clear(cpus);
130 for (i = 0; i < KVM_MAX_VCPUS; ++i) {
131 vcpu = kvm->vcpus[i];
132 if (!vcpu)
133 continue;
134 if (test_and_set_bit(KVM_REQ_MMU_RELOAD, &vcpu->requests))
135 continue;
136 cpu = vcpu->cpu;
137 if (cpu != -1 && cpu != raw_smp_processor_id())
138 cpu_set(cpu, cpus);
139 }
140 if (cpus_empty(cpus))
141 return;
142 smp_call_function_mask(cpus, ack_flush, NULL, 1);
143}
144
145
fb3f0f51
RR
146int kvm_vcpu_init(struct kvm_vcpu *vcpu, struct kvm *kvm, unsigned id)
147{
148 struct page *page;
149 int r;
150
151 mutex_init(&vcpu->mutex);
152 vcpu->cpu = -1;
fb3f0f51
RR
153 vcpu->kvm = kvm;
154 vcpu->vcpu_id = id;
b6958ce4 155 init_waitqueue_head(&vcpu->wq);
fb3f0f51
RR
156
157 page = alloc_page(GFP_KERNEL | __GFP_ZERO);
158 if (!page) {
159 r = -ENOMEM;
160 goto fail;
161 }
162 vcpu->run = page_address(page);
163
e9b11c17 164 r = kvm_arch_vcpu_init(vcpu);
fb3f0f51 165 if (r < 0)
e9b11c17 166 goto fail_free_run;
fb3f0f51
RR
167 return 0;
168
fb3f0f51
RR
169fail_free_run:
170 free_page((unsigned long)vcpu->run);
171fail:
76fafa5e 172 return r;
fb3f0f51
RR
173}
174EXPORT_SYMBOL_GPL(kvm_vcpu_init);
175
176void kvm_vcpu_uninit(struct kvm_vcpu *vcpu)
177{
e9b11c17 178 kvm_arch_vcpu_uninit(vcpu);
fb3f0f51
RR
179 free_page((unsigned long)vcpu->run);
180}
181EXPORT_SYMBOL_GPL(kvm_vcpu_uninit);
182
f17abe9a 183static struct kvm *kvm_create_vm(void)
6aa8b732 184{
d19a9cd2 185 struct kvm *kvm = kvm_arch_create_vm();
6aa8b732 186
d19a9cd2
ZX
187 if (IS_ERR(kvm))
188 goto out;
6aa8b732 189
6d4e4c4f
AK
190 kvm->mm = current->mm;
191 atomic_inc(&kvm->mm->mm_count);
aaee2c94 192 spin_lock_init(&kvm->mmu_lock);
74906345 193 kvm_io_bus_init(&kvm->pio_bus);
11ec2804 194 mutex_init(&kvm->lock);
2eeb2e94 195 kvm_io_bus_init(&kvm->mmio_bus);
72dc67a6 196 init_rwsem(&kvm->slots_lock);
d39f13b0 197 atomic_set(&kvm->users_count, 1);
5e58cfe4
RR
198 spin_lock(&kvm_lock);
199 list_add(&kvm->vm_list, &vm_list);
200 spin_unlock(&kvm_lock);
d19a9cd2 201out:
f17abe9a
AK
202 return kvm;
203}
204
6aa8b732
AK
205/*
206 * Free any memory in @free but not in @dont.
207 */
208static void kvm_free_physmem_slot(struct kvm_memory_slot *free,
209 struct kvm_memory_slot *dont)
210{
290fc38d
IE
211 if (!dont || free->rmap != dont->rmap)
212 vfree(free->rmap);
6aa8b732
AK
213
214 if (!dont || free->dirty_bitmap != dont->dirty_bitmap)
215 vfree(free->dirty_bitmap);
216
05da4558
MT
217 if (!dont || free->lpage_info != dont->lpage_info)
218 vfree(free->lpage_info);
219
6aa8b732 220 free->npages = 0;
8b6d44c7 221 free->dirty_bitmap = NULL;
8d4e1288 222 free->rmap = NULL;
05da4558 223 free->lpage_info = NULL;
6aa8b732
AK
224}
225
d19a9cd2 226void kvm_free_physmem(struct kvm *kvm)
6aa8b732
AK
227{
228 int i;
229
230 for (i = 0; i < kvm->nmemslots; ++i)
8b6d44c7 231 kvm_free_physmem_slot(&kvm->memslots[i], NULL);
6aa8b732
AK
232}
233
f17abe9a
AK
234static void kvm_destroy_vm(struct kvm *kvm)
235{
6d4e4c4f
AK
236 struct mm_struct *mm = kvm->mm;
237
133de902
AK
238 spin_lock(&kvm_lock);
239 list_del(&kvm->vm_list);
240 spin_unlock(&kvm_lock);
74906345 241 kvm_io_bus_destroy(&kvm->pio_bus);
2eeb2e94 242 kvm_io_bus_destroy(&kvm->mmio_bus);
d19a9cd2 243 kvm_arch_destroy_vm(kvm);
6d4e4c4f 244 mmdrop(mm);
f17abe9a
AK
245}
246
d39f13b0
IE
247void kvm_get_kvm(struct kvm *kvm)
248{
249 atomic_inc(&kvm->users_count);
250}
251EXPORT_SYMBOL_GPL(kvm_get_kvm);
252
253void kvm_put_kvm(struct kvm *kvm)
254{
255 if (atomic_dec_and_test(&kvm->users_count))
256 kvm_destroy_vm(kvm);
257}
258EXPORT_SYMBOL_GPL(kvm_put_kvm);
259
260
f17abe9a
AK
261static int kvm_vm_release(struct inode *inode, struct file *filp)
262{
263 struct kvm *kvm = filp->private_data;
264
d39f13b0 265 kvm_put_kvm(kvm);
6aa8b732
AK
266 return 0;
267}
268
6aa8b732
AK
269/*
270 * Allocate some memory and give it an address in the guest physical address
271 * space.
272 *
273 * Discontiguous memory is allowed, mostly for framebuffers.
f78e0e2e 274 *
10589a46 275 * Must be called holding mmap_sem for write.
6aa8b732 276 */
f78e0e2e
SY
277int __kvm_set_memory_region(struct kvm *kvm,
278 struct kvm_userspace_memory_region *mem,
279 int user_alloc)
6aa8b732
AK
280{
281 int r;
282 gfn_t base_gfn;
283 unsigned long npages;
284 unsigned long i;
285 struct kvm_memory_slot *memslot;
286 struct kvm_memory_slot old, new;
6aa8b732
AK
287
288 r = -EINVAL;
289 /* General sanity checks */
290 if (mem->memory_size & (PAGE_SIZE - 1))
291 goto out;
292 if (mem->guest_phys_addr & (PAGE_SIZE - 1))
293 goto out;
e0d62c7f 294 if (mem->slot >= KVM_MEMORY_SLOTS + KVM_PRIVATE_MEM_SLOTS)
6aa8b732
AK
295 goto out;
296 if (mem->guest_phys_addr + mem->memory_size < mem->guest_phys_addr)
297 goto out;
298
299 memslot = &kvm->memslots[mem->slot];
300 base_gfn = mem->guest_phys_addr >> PAGE_SHIFT;
301 npages = mem->memory_size >> PAGE_SHIFT;
302
303 if (!npages)
304 mem->flags &= ~KVM_MEM_LOG_DIRTY_PAGES;
305
6aa8b732
AK
306 new = old = *memslot;
307
308 new.base_gfn = base_gfn;
309 new.npages = npages;
310 new.flags = mem->flags;
311
312 /* Disallow changing a memory slot's size. */
313 r = -EINVAL;
314 if (npages && old.npages && npages != old.npages)
f78e0e2e 315 goto out_free;
6aa8b732
AK
316
317 /* Check for overlaps */
318 r = -EEXIST;
319 for (i = 0; i < KVM_MEMORY_SLOTS; ++i) {
320 struct kvm_memory_slot *s = &kvm->memslots[i];
321
322 if (s == memslot)
323 continue;
324 if (!((base_gfn + npages <= s->base_gfn) ||
325 (base_gfn >= s->base_gfn + s->npages)))
f78e0e2e 326 goto out_free;
6aa8b732 327 }
6aa8b732 328
6aa8b732
AK
329 /* Free page dirty bitmap if unneeded */
330 if (!(new.flags & KVM_MEM_LOG_DIRTY_PAGES))
8b6d44c7 331 new.dirty_bitmap = NULL;
6aa8b732
AK
332
333 r = -ENOMEM;
334
335 /* Allocate if a slot is being created */
8d4e1288 336 if (npages && !new.rmap) {
d77c26fc 337 new.rmap = vmalloc(npages * sizeof(struct page *));
290fc38d
IE
338
339 if (!new.rmap)
f78e0e2e 340 goto out_free;
290fc38d 341
290fc38d 342 memset(new.rmap, 0, npages * sizeof(*new.rmap));
8d4e1288 343
80b14b5b 344 new.user_alloc = user_alloc;
0de10343 345 new.userspace_addr = mem->userspace_addr;
6aa8b732 346 }
05da4558
MT
347 if (npages && !new.lpage_info) {
348 int largepages = npages / KVM_PAGES_PER_HPAGE;
349 if (npages % KVM_PAGES_PER_HPAGE)
350 largepages++;
351 if (base_gfn % KVM_PAGES_PER_HPAGE)
352 largepages++;
353
354 new.lpage_info = vmalloc(largepages * sizeof(*new.lpage_info));
355
356 if (!new.lpage_info)
357 goto out_free;
358
359 memset(new.lpage_info, 0, largepages * sizeof(*new.lpage_info));
360
361 if (base_gfn % KVM_PAGES_PER_HPAGE)
362 new.lpage_info[0].write_count = 1;
363 if ((base_gfn+npages) % KVM_PAGES_PER_HPAGE)
364 new.lpage_info[largepages-1].write_count = 1;
365 }
6aa8b732
AK
366
367 /* Allocate page dirty bitmap if needed */
368 if ((new.flags & KVM_MEM_LOG_DIRTY_PAGES) && !new.dirty_bitmap) {
369 unsigned dirty_bytes = ALIGN(npages, BITS_PER_LONG) / 8;
370
371 new.dirty_bitmap = vmalloc(dirty_bytes);
372 if (!new.dirty_bitmap)
f78e0e2e 373 goto out_free;
6aa8b732
AK
374 memset(new.dirty_bitmap, 0, dirty_bytes);
375 }
376
6aa8b732
AK
377 if (mem->slot >= kvm->nmemslots)
378 kvm->nmemslots = mem->slot + 1;
379
3ad82a7e
ZX
380 *memslot = new;
381
0de10343
ZX
382 r = kvm_arch_set_memory_region(kvm, mem, old, user_alloc);
383 if (r) {
384 *memslot = old;
385 goto out_free;
82ce2c96
IE
386 }
387
6aa8b732
AK
388 kvm_free_physmem_slot(&old, &new);
389 return 0;
390
f78e0e2e 391out_free:
6aa8b732
AK
392 kvm_free_physmem_slot(&new, &old);
393out:
394 return r;
210c7c4d
IE
395
396}
f78e0e2e
SY
397EXPORT_SYMBOL_GPL(__kvm_set_memory_region);
398
399int kvm_set_memory_region(struct kvm *kvm,
400 struct kvm_userspace_memory_region *mem,
401 int user_alloc)
402{
403 int r;
404
72dc67a6 405 down_write(&kvm->slots_lock);
f78e0e2e 406 r = __kvm_set_memory_region(kvm, mem, user_alloc);
72dc67a6 407 up_write(&kvm->slots_lock);
f78e0e2e
SY
408 return r;
409}
210c7c4d
IE
410EXPORT_SYMBOL_GPL(kvm_set_memory_region);
411
1fe779f8
CO
412int kvm_vm_ioctl_set_memory_region(struct kvm *kvm,
413 struct
414 kvm_userspace_memory_region *mem,
415 int user_alloc)
210c7c4d 416{
e0d62c7f
IE
417 if (mem->slot >= KVM_MEMORY_SLOTS)
418 return -EINVAL;
210c7c4d 419 return kvm_set_memory_region(kvm, mem, user_alloc);
6aa8b732
AK
420}
421
5bb064dc
ZX
422int kvm_get_dirty_log(struct kvm *kvm,
423 struct kvm_dirty_log *log, int *is_dirty)
6aa8b732
AK
424{
425 struct kvm_memory_slot *memslot;
426 int r, i;
427 int n;
428 unsigned long any = 0;
429
6aa8b732
AK
430 r = -EINVAL;
431 if (log->slot >= KVM_MEMORY_SLOTS)
432 goto out;
433
434 memslot = &kvm->memslots[log->slot];
435 r = -ENOENT;
436 if (!memslot->dirty_bitmap)
437 goto out;
438
cd1a4a98 439 n = ALIGN(memslot->npages, BITS_PER_LONG) / 8;
6aa8b732 440
cd1a4a98 441 for (i = 0; !any && i < n/sizeof(long); ++i)
6aa8b732
AK
442 any = memslot->dirty_bitmap[i];
443
444 r = -EFAULT;
445 if (copy_to_user(log->dirty_bitmap, memslot->dirty_bitmap, n))
446 goto out;
447
5bb064dc
ZX
448 if (any)
449 *is_dirty = 1;
6aa8b732
AK
450
451 r = 0;
6aa8b732 452out:
6aa8b732
AK
453 return r;
454}
455
cea7bb21
IE
456int is_error_page(struct page *page)
457{
458 return page == bad_page;
459}
460EXPORT_SYMBOL_GPL(is_error_page);
461
35149e21
AL
462int is_error_pfn(pfn_t pfn)
463{
464 return pfn == bad_pfn;
465}
466EXPORT_SYMBOL_GPL(is_error_pfn);
467
f9d46eb0
IE
468static inline unsigned long bad_hva(void)
469{
470 return PAGE_OFFSET;
471}
472
473int kvm_is_error_hva(unsigned long addr)
474{
475 return addr == bad_hva();
476}
477EXPORT_SYMBOL_GPL(kvm_is_error_hva);
478
e8207547 479static struct kvm_memory_slot *__gfn_to_memslot(struct kvm *kvm, gfn_t gfn)
6aa8b732
AK
480{
481 int i;
482
483 for (i = 0; i < kvm->nmemslots; ++i) {
484 struct kvm_memory_slot *memslot = &kvm->memslots[i];
485
486 if (gfn >= memslot->base_gfn
487 && gfn < memslot->base_gfn + memslot->npages)
488 return memslot;
489 }
8b6d44c7 490 return NULL;
6aa8b732 491}
e8207547
AK
492
493struct kvm_memory_slot *gfn_to_memslot(struct kvm *kvm, gfn_t gfn)
494{
495 gfn = unalias_gfn(kvm, gfn);
496 return __gfn_to_memslot(kvm, gfn);
497}
6aa8b732 498
e0d62c7f
IE
499int kvm_is_visible_gfn(struct kvm *kvm, gfn_t gfn)
500{
501 int i;
502
503 gfn = unalias_gfn(kvm, gfn);
504 for (i = 0; i < KVM_MEMORY_SLOTS; ++i) {
505 struct kvm_memory_slot *memslot = &kvm->memslots[i];
506
507 if (gfn >= memslot->base_gfn
508 && gfn < memslot->base_gfn + memslot->npages)
509 return 1;
510 }
511 return 0;
512}
513EXPORT_SYMBOL_GPL(kvm_is_visible_gfn);
514
05da4558 515unsigned long gfn_to_hva(struct kvm *kvm, gfn_t gfn)
539cb660
IE
516{
517 struct kvm_memory_slot *slot;
518
519 gfn = unalias_gfn(kvm, gfn);
520 slot = __gfn_to_memslot(kvm, gfn);
521 if (!slot)
522 return bad_hva();
523 return (slot->userspace_addr + (gfn - slot->base_gfn) * PAGE_SIZE);
524}
0d150298 525EXPORT_SYMBOL_GPL(gfn_to_hva);
539cb660 526
aab61cc0
AL
527/*
528 * Requires current->mm->mmap_sem to be held
529 */
35149e21 530pfn_t gfn_to_pfn(struct kvm *kvm, gfn_t gfn)
954bbbc2 531{
8d4e1288 532 struct page *page[1];
539cb660 533 unsigned long addr;
8d4e1288 534 int npages;
2e2e3738 535 pfn_t pfn;
954bbbc2 536
60395224
AK
537 might_sleep();
538
539cb660
IE
539 addr = gfn_to_hva(kvm, gfn);
540 if (kvm_is_error_hva(addr)) {
8a7ae055 541 get_page(bad_page);
35149e21 542 return page_to_pfn(bad_page);
8a7ae055 543 }
8d4e1288 544
539cb660
IE
545 npages = get_user_pages(current, current->mm, addr, 1, 1, 1, page,
546 NULL);
547
2e2e3738
AL
548 if (unlikely(npages != 1)) {
549 struct vm_area_struct *vma;
550
551 vma = find_vma(current->mm, addr);
552 if (vma == NULL || addr < vma->vm_start ||
553 !(vma->vm_flags & VM_PFNMAP)) {
554 get_page(bad_page);
555 return page_to_pfn(bad_page);
556 }
557
558 pfn = ((addr - vma->vm_start) >> PAGE_SHIFT) + vma->vm_pgoff;
559 BUG_ON(pfn_valid(pfn));
560 } else
561 pfn = page_to_pfn(page[0]);
8d4e1288 562
2e2e3738 563 return pfn;
35149e21
AL
564}
565
566EXPORT_SYMBOL_GPL(gfn_to_pfn);
567
568struct page *gfn_to_page(struct kvm *kvm, gfn_t gfn)
569{
2e2e3738
AL
570 pfn_t pfn;
571
572 pfn = gfn_to_pfn(kvm, gfn);
573 if (pfn_valid(pfn))
574 return pfn_to_page(pfn);
575
576 WARN_ON(!pfn_valid(pfn));
577
578 get_page(bad_page);
579 return bad_page;
954bbbc2 580}
aab61cc0 581
954bbbc2
AK
582EXPORT_SYMBOL_GPL(gfn_to_page);
583
b4231d61
IE
584void kvm_release_page_clean(struct page *page)
585{
35149e21 586 kvm_release_pfn_clean(page_to_pfn(page));
b4231d61
IE
587}
588EXPORT_SYMBOL_GPL(kvm_release_page_clean);
589
35149e21
AL
590void kvm_release_pfn_clean(pfn_t pfn)
591{
2e2e3738
AL
592 if (pfn_valid(pfn))
593 put_page(pfn_to_page(pfn));
35149e21
AL
594}
595EXPORT_SYMBOL_GPL(kvm_release_pfn_clean);
596
b4231d61 597void kvm_release_page_dirty(struct page *page)
8a7ae055 598{
35149e21
AL
599 kvm_release_pfn_dirty(page_to_pfn(page));
600}
601EXPORT_SYMBOL_GPL(kvm_release_page_dirty);
602
603void kvm_release_pfn_dirty(pfn_t pfn)
604{
605 kvm_set_pfn_dirty(pfn);
606 kvm_release_pfn_clean(pfn);
607}
608EXPORT_SYMBOL_GPL(kvm_release_pfn_dirty);
609
610void kvm_set_page_dirty(struct page *page)
611{
612 kvm_set_pfn_dirty(page_to_pfn(page));
613}
614EXPORT_SYMBOL_GPL(kvm_set_page_dirty);
615
616void kvm_set_pfn_dirty(pfn_t pfn)
617{
2e2e3738
AL
618 if (pfn_valid(pfn)) {
619 struct page *page = pfn_to_page(pfn);
620 if (!PageReserved(page))
621 SetPageDirty(page);
622 }
8a7ae055 623}
35149e21
AL
624EXPORT_SYMBOL_GPL(kvm_set_pfn_dirty);
625
626void kvm_set_pfn_accessed(pfn_t pfn)
627{
2e2e3738
AL
628 if (pfn_valid(pfn))
629 mark_page_accessed(pfn_to_page(pfn));
35149e21
AL
630}
631EXPORT_SYMBOL_GPL(kvm_set_pfn_accessed);
632
633void kvm_get_pfn(pfn_t pfn)
634{
2e2e3738
AL
635 if (pfn_valid(pfn))
636 get_page(pfn_to_page(pfn));
35149e21
AL
637}
638EXPORT_SYMBOL_GPL(kvm_get_pfn);
8a7ae055 639
195aefde
IE
640static int next_segment(unsigned long len, int offset)
641{
642 if (len > PAGE_SIZE - offset)
643 return PAGE_SIZE - offset;
644 else
645 return len;
646}
647
648int kvm_read_guest_page(struct kvm *kvm, gfn_t gfn, void *data, int offset,
649 int len)
650{
e0506bcb
IE
651 int r;
652 unsigned long addr;
195aefde 653
e0506bcb
IE
654 addr = gfn_to_hva(kvm, gfn);
655 if (kvm_is_error_hva(addr))
656 return -EFAULT;
657 r = copy_from_user(data, (void __user *)addr + offset, len);
658 if (r)
195aefde 659 return -EFAULT;
195aefde
IE
660 return 0;
661}
662EXPORT_SYMBOL_GPL(kvm_read_guest_page);
663
664int kvm_read_guest(struct kvm *kvm, gpa_t gpa, void *data, unsigned long len)
665{
666 gfn_t gfn = gpa >> PAGE_SHIFT;
667 int seg;
668 int offset = offset_in_page(gpa);
669 int ret;
670
671 while ((seg = next_segment(len, offset)) != 0) {
672 ret = kvm_read_guest_page(kvm, gfn, data, offset, seg);
673 if (ret < 0)
674 return ret;
675 offset = 0;
676 len -= seg;
677 data += seg;
678 ++gfn;
679 }
680 return 0;
681}
682EXPORT_SYMBOL_GPL(kvm_read_guest);
683
7ec54588
MT
684int kvm_read_guest_atomic(struct kvm *kvm, gpa_t gpa, void *data,
685 unsigned long len)
686{
687 int r;
688 unsigned long addr;
689 gfn_t gfn = gpa >> PAGE_SHIFT;
690 int offset = offset_in_page(gpa);
691
692 addr = gfn_to_hva(kvm, gfn);
693 if (kvm_is_error_hva(addr))
694 return -EFAULT;
0aac03f0 695 pagefault_disable();
7ec54588 696 r = __copy_from_user_inatomic(data, (void __user *)addr + offset, len);
0aac03f0 697 pagefault_enable();
7ec54588
MT
698 if (r)
699 return -EFAULT;
700 return 0;
701}
702EXPORT_SYMBOL(kvm_read_guest_atomic);
703
195aefde
IE
704int kvm_write_guest_page(struct kvm *kvm, gfn_t gfn, const void *data,
705 int offset, int len)
706{
e0506bcb
IE
707 int r;
708 unsigned long addr;
195aefde 709
e0506bcb
IE
710 addr = gfn_to_hva(kvm, gfn);
711 if (kvm_is_error_hva(addr))
712 return -EFAULT;
713 r = copy_to_user((void __user *)addr + offset, data, len);
714 if (r)
195aefde 715 return -EFAULT;
195aefde
IE
716 mark_page_dirty(kvm, gfn);
717 return 0;
718}
719EXPORT_SYMBOL_GPL(kvm_write_guest_page);
720
721int kvm_write_guest(struct kvm *kvm, gpa_t gpa, const void *data,
722 unsigned long len)
723{
724 gfn_t gfn = gpa >> PAGE_SHIFT;
725 int seg;
726 int offset = offset_in_page(gpa);
727 int ret;
728
729 while ((seg = next_segment(len, offset)) != 0) {
730 ret = kvm_write_guest_page(kvm, gfn, data, offset, seg);
731 if (ret < 0)
732 return ret;
733 offset = 0;
734 len -= seg;
735 data += seg;
736 ++gfn;
737 }
738 return 0;
739}
740
741int kvm_clear_guest_page(struct kvm *kvm, gfn_t gfn, int offset, int len)
742{
3e021bf5 743 return kvm_write_guest_page(kvm, gfn, empty_zero_page, offset, len);
195aefde
IE
744}
745EXPORT_SYMBOL_GPL(kvm_clear_guest_page);
746
747int kvm_clear_guest(struct kvm *kvm, gpa_t gpa, unsigned long len)
748{
749 gfn_t gfn = gpa >> PAGE_SHIFT;
750 int seg;
751 int offset = offset_in_page(gpa);
752 int ret;
753
754 while ((seg = next_segment(len, offset)) != 0) {
755 ret = kvm_clear_guest_page(kvm, gfn, offset, seg);
756 if (ret < 0)
757 return ret;
758 offset = 0;
759 len -= seg;
760 ++gfn;
761 }
762 return 0;
763}
764EXPORT_SYMBOL_GPL(kvm_clear_guest);
765
6aa8b732
AK
766void mark_page_dirty(struct kvm *kvm, gfn_t gfn)
767{
31389947 768 struct kvm_memory_slot *memslot;
6aa8b732 769
3b6fff19 770 gfn = unalias_gfn(kvm, gfn);
7e9d619d
RR
771 memslot = __gfn_to_memslot(kvm, gfn);
772 if (memslot && memslot->dirty_bitmap) {
773 unsigned long rel_gfn = gfn - memslot->base_gfn;
6aa8b732 774
7e9d619d
RR
775 /* avoid RMW */
776 if (!test_bit(rel_gfn, memslot->dirty_bitmap))
777 set_bit(rel_gfn, memslot->dirty_bitmap);
6aa8b732
AK
778 }
779}
780
b6958ce4
ED
781/*
782 * The vCPU has executed a HLT instruction with in-kernel mode enabled.
783 */
8776e519 784void kvm_vcpu_block(struct kvm_vcpu *vcpu)
d3bef15f 785{
e5c239cf
MT
786 DEFINE_WAIT(wait);
787
788 for (;;) {
789 prepare_to_wait(&vcpu->wq, &wait, TASK_INTERRUPTIBLE);
790
791 if (kvm_cpu_has_interrupt(vcpu))
792 break;
793 if (kvm_cpu_has_pending_timer(vcpu))
794 break;
795 if (kvm_arch_vcpu_runnable(vcpu))
796 break;
797 if (signal_pending(current))
798 break;
799
b6958ce4
ED
800 vcpu_put(vcpu);
801 schedule();
802 vcpu_load(vcpu);
803 }
d3bef15f 804
e5c239cf 805 finish_wait(&vcpu->wq, &wait);
b6958ce4
ED
806}
807
6aa8b732
AK
808void kvm_resched(struct kvm_vcpu *vcpu)
809{
3fca0365
YD
810 if (!need_resched())
811 return;
6aa8b732 812 cond_resched();
6aa8b732
AK
813}
814EXPORT_SYMBOL_GPL(kvm_resched);
815
e4a533a4 816static int kvm_vcpu_fault(struct vm_area_struct *vma, struct vm_fault *vmf)
9a2bb7f4
AK
817{
818 struct kvm_vcpu *vcpu = vma->vm_file->private_data;
9a2bb7f4
AK
819 struct page *page;
820
e4a533a4 821 if (vmf->pgoff == 0)
039576c0 822 page = virt_to_page(vcpu->run);
09566765 823#ifdef CONFIG_X86
e4a533a4 824 else if (vmf->pgoff == KVM_PIO_PAGE_OFFSET)
ad312c7c 825 page = virt_to_page(vcpu->arch.pio_data);
09566765 826#endif
039576c0 827 else
e4a533a4 828 return VM_FAULT_SIGBUS;
9a2bb7f4 829 get_page(page);
e4a533a4 830 vmf->page = page;
831 return 0;
9a2bb7f4
AK
832}
833
834static struct vm_operations_struct kvm_vcpu_vm_ops = {
e4a533a4 835 .fault = kvm_vcpu_fault,
9a2bb7f4
AK
836};
837
838static int kvm_vcpu_mmap(struct file *file, struct vm_area_struct *vma)
839{
840 vma->vm_ops = &kvm_vcpu_vm_ops;
841 return 0;
842}
843
bccf2150
AK
844static int kvm_vcpu_release(struct inode *inode, struct file *filp)
845{
846 struct kvm_vcpu *vcpu = filp->private_data;
847
66c0b394 848 kvm_put_kvm(vcpu->kvm);
bccf2150
AK
849 return 0;
850}
851
5c502742 852static const struct file_operations kvm_vcpu_fops = {
bccf2150
AK
853 .release = kvm_vcpu_release,
854 .unlocked_ioctl = kvm_vcpu_ioctl,
855 .compat_ioctl = kvm_vcpu_ioctl,
9a2bb7f4 856 .mmap = kvm_vcpu_mmap,
bccf2150
AK
857};
858
859/*
860 * Allocates an inode for the vcpu.
861 */
862static int create_vcpu_fd(struct kvm_vcpu *vcpu)
863{
2030a42c
AV
864 int fd = anon_inode_getfd("kvm-vcpu", &kvm_vcpu_fops, vcpu);
865 if (fd < 0)
66c0b394 866 kvm_put_kvm(vcpu->kvm);
bccf2150 867 return fd;
bccf2150
AK
868}
869
c5ea7660
AK
870/*
871 * Creates some virtual cpus. Good luck creating more than one.
872 */
873static int kvm_vm_ioctl_create_vcpu(struct kvm *kvm, int n)
874{
875 int r;
876 struct kvm_vcpu *vcpu;
877
c5ea7660 878 if (!valid_vcpu(n))
fb3f0f51 879 return -EINVAL;
c5ea7660 880
e9b11c17 881 vcpu = kvm_arch_vcpu_create(kvm, n);
fb3f0f51
RR
882 if (IS_ERR(vcpu))
883 return PTR_ERR(vcpu);
c5ea7660 884
15ad7146
AK
885 preempt_notifier_init(&vcpu->preempt_notifier, &kvm_preempt_ops);
886
26e5215f
AK
887 r = kvm_arch_vcpu_setup(vcpu);
888 if (r)
889 goto vcpu_destroy;
890
11ec2804 891 mutex_lock(&kvm->lock);
fb3f0f51
RR
892 if (kvm->vcpus[n]) {
893 r = -EEXIST;
11ec2804 894 mutex_unlock(&kvm->lock);
e9b11c17 895 goto vcpu_destroy;
fb3f0f51
RR
896 }
897 kvm->vcpus[n] = vcpu;
11ec2804 898 mutex_unlock(&kvm->lock);
c5ea7660 899
fb3f0f51 900 /* Now it's all set up, let userspace reach it */
66c0b394 901 kvm_get_kvm(kvm);
bccf2150
AK
902 r = create_vcpu_fd(vcpu);
903 if (r < 0)
fb3f0f51
RR
904 goto unlink;
905 return r;
39c3b86e 906
fb3f0f51 907unlink:
11ec2804 908 mutex_lock(&kvm->lock);
fb3f0f51 909 kvm->vcpus[n] = NULL;
11ec2804 910 mutex_unlock(&kvm->lock);
e9b11c17 911vcpu_destroy:
d40ccc62 912 kvm_arch_vcpu_destroy(vcpu);
c5ea7660
AK
913 return r;
914}
915
1961d276
AK
916static int kvm_vcpu_ioctl_set_sigmask(struct kvm_vcpu *vcpu, sigset_t *sigset)
917{
918 if (sigset) {
919 sigdelsetmask(sigset, sigmask(SIGKILL)|sigmask(SIGSTOP));
920 vcpu->sigset_active = 1;
921 vcpu->sigset = *sigset;
922 } else
923 vcpu->sigset_active = 0;
924 return 0;
925}
926
bccf2150
AK
927static long kvm_vcpu_ioctl(struct file *filp,
928 unsigned int ioctl, unsigned long arg)
6aa8b732 929{
bccf2150 930 struct kvm_vcpu *vcpu = filp->private_data;
2f366987 931 void __user *argp = (void __user *)arg;
313a3dc7 932 int r;
6aa8b732 933
6d4e4c4f
AK
934 if (vcpu->kvm->mm != current->mm)
935 return -EIO;
6aa8b732 936 switch (ioctl) {
9a2bb7f4 937 case KVM_RUN:
f0fe5108
AK
938 r = -EINVAL;
939 if (arg)
940 goto out;
b6c7a5dc 941 r = kvm_arch_vcpu_ioctl_run(vcpu, vcpu->run);
6aa8b732 942 break;
6aa8b732 943 case KVM_GET_REGS: {
3e4bb3ac 944 struct kvm_regs *kvm_regs;
6aa8b732 945
3e4bb3ac
XZ
946 r = -ENOMEM;
947 kvm_regs = kzalloc(sizeof(struct kvm_regs), GFP_KERNEL);
948 if (!kvm_regs)
6aa8b732 949 goto out;
3e4bb3ac
XZ
950 r = kvm_arch_vcpu_ioctl_get_regs(vcpu, kvm_regs);
951 if (r)
952 goto out_free1;
6aa8b732 953 r = -EFAULT;
3e4bb3ac
XZ
954 if (copy_to_user(argp, kvm_regs, sizeof(struct kvm_regs)))
955 goto out_free1;
6aa8b732 956 r = 0;
3e4bb3ac
XZ
957out_free1:
958 kfree(kvm_regs);
6aa8b732
AK
959 break;
960 }
961 case KVM_SET_REGS: {
3e4bb3ac 962 struct kvm_regs *kvm_regs;
6aa8b732 963
3e4bb3ac
XZ
964 r = -ENOMEM;
965 kvm_regs = kzalloc(sizeof(struct kvm_regs), GFP_KERNEL);
966 if (!kvm_regs)
6aa8b732 967 goto out;
3e4bb3ac
XZ
968 r = -EFAULT;
969 if (copy_from_user(kvm_regs, argp, sizeof(struct kvm_regs)))
970 goto out_free2;
971 r = kvm_arch_vcpu_ioctl_set_regs(vcpu, kvm_regs);
6aa8b732 972 if (r)
3e4bb3ac 973 goto out_free2;
6aa8b732 974 r = 0;
3e4bb3ac
XZ
975out_free2:
976 kfree(kvm_regs);
6aa8b732
AK
977 break;
978 }
979 case KVM_GET_SREGS: {
980 struct kvm_sregs kvm_sregs;
981
bccf2150 982 memset(&kvm_sregs, 0, sizeof kvm_sregs);
b6c7a5dc 983 r = kvm_arch_vcpu_ioctl_get_sregs(vcpu, &kvm_sregs);
6aa8b732
AK
984 if (r)
985 goto out;
986 r = -EFAULT;
2f366987 987 if (copy_to_user(argp, &kvm_sregs, sizeof kvm_sregs))
6aa8b732
AK
988 goto out;
989 r = 0;
990 break;
991 }
992 case KVM_SET_SREGS: {
993 struct kvm_sregs kvm_sregs;
994
995 r = -EFAULT;
2f366987 996 if (copy_from_user(&kvm_sregs, argp, sizeof kvm_sregs))
6aa8b732 997 goto out;
b6c7a5dc 998 r = kvm_arch_vcpu_ioctl_set_sregs(vcpu, &kvm_sregs);
6aa8b732
AK
999 if (r)
1000 goto out;
1001 r = 0;
1002 break;
1003 }
62d9f0db
MT
1004 case KVM_GET_MP_STATE: {
1005 struct kvm_mp_state mp_state;
1006
1007 r = kvm_arch_vcpu_ioctl_get_mpstate(vcpu, &mp_state);
1008 if (r)
1009 goto out;
1010 r = -EFAULT;
1011 if (copy_to_user(argp, &mp_state, sizeof mp_state))
1012 goto out;
1013 r = 0;
1014 break;
1015 }
1016 case KVM_SET_MP_STATE: {
1017 struct kvm_mp_state mp_state;
1018
1019 r = -EFAULT;
1020 if (copy_from_user(&mp_state, argp, sizeof mp_state))
1021 goto out;
1022 r = kvm_arch_vcpu_ioctl_set_mpstate(vcpu, &mp_state);
1023 if (r)
1024 goto out;
1025 r = 0;
1026 break;
1027 }
6aa8b732
AK
1028 case KVM_TRANSLATE: {
1029 struct kvm_translation tr;
1030
1031 r = -EFAULT;
2f366987 1032 if (copy_from_user(&tr, argp, sizeof tr))
6aa8b732 1033 goto out;
8b006791 1034 r = kvm_arch_vcpu_ioctl_translate(vcpu, &tr);
6aa8b732
AK
1035 if (r)
1036 goto out;
1037 r = -EFAULT;
2f366987 1038 if (copy_to_user(argp, &tr, sizeof tr))
6aa8b732
AK
1039 goto out;
1040 r = 0;
1041 break;
1042 }
6aa8b732
AK
1043 case KVM_DEBUG_GUEST: {
1044 struct kvm_debug_guest dbg;
1045
1046 r = -EFAULT;
2f366987 1047 if (copy_from_user(&dbg, argp, sizeof dbg))
6aa8b732 1048 goto out;
b6c7a5dc 1049 r = kvm_arch_vcpu_ioctl_debug_guest(vcpu, &dbg);
6aa8b732
AK
1050 if (r)
1051 goto out;
1052 r = 0;
1053 break;
1054 }
1961d276
AK
1055 case KVM_SET_SIGNAL_MASK: {
1056 struct kvm_signal_mask __user *sigmask_arg = argp;
1057 struct kvm_signal_mask kvm_sigmask;
1058 sigset_t sigset, *p;
1059
1060 p = NULL;
1061 if (argp) {
1062 r = -EFAULT;
1063 if (copy_from_user(&kvm_sigmask, argp,
1064 sizeof kvm_sigmask))
1065 goto out;
1066 r = -EINVAL;
1067 if (kvm_sigmask.len != sizeof sigset)
1068 goto out;
1069 r = -EFAULT;
1070 if (copy_from_user(&sigset, sigmask_arg->sigset,
1071 sizeof sigset))
1072 goto out;
1073 p = &sigset;
1074 }
1075 r = kvm_vcpu_ioctl_set_sigmask(vcpu, &sigset);
1076 break;
1077 }
b8836737
AK
1078 case KVM_GET_FPU: {
1079 struct kvm_fpu fpu;
1080
1081 memset(&fpu, 0, sizeof fpu);
d0752060 1082 r = kvm_arch_vcpu_ioctl_get_fpu(vcpu, &fpu);
b8836737
AK
1083 if (r)
1084 goto out;
1085 r = -EFAULT;
1086 if (copy_to_user(argp, &fpu, sizeof fpu))
1087 goto out;
1088 r = 0;
1089 break;
1090 }
1091 case KVM_SET_FPU: {
1092 struct kvm_fpu fpu;
1093
1094 r = -EFAULT;
1095 if (copy_from_user(&fpu, argp, sizeof fpu))
1096 goto out;
d0752060 1097 r = kvm_arch_vcpu_ioctl_set_fpu(vcpu, &fpu);
b8836737
AK
1098 if (r)
1099 goto out;
1100 r = 0;
1101 break;
1102 }
bccf2150 1103 default:
313a3dc7 1104 r = kvm_arch_vcpu_ioctl(filp, ioctl, arg);
bccf2150
AK
1105 }
1106out:
1107 return r;
1108}
1109
1110static long kvm_vm_ioctl(struct file *filp,
1111 unsigned int ioctl, unsigned long arg)
1112{
1113 struct kvm *kvm = filp->private_data;
1114 void __user *argp = (void __user *)arg;
1fe779f8 1115 int r;
bccf2150 1116
6d4e4c4f
AK
1117 if (kvm->mm != current->mm)
1118 return -EIO;
bccf2150
AK
1119 switch (ioctl) {
1120 case KVM_CREATE_VCPU:
1121 r = kvm_vm_ioctl_create_vcpu(kvm, arg);
1122 if (r < 0)
1123 goto out;
1124 break;
6fc138d2
IE
1125 case KVM_SET_USER_MEMORY_REGION: {
1126 struct kvm_userspace_memory_region kvm_userspace_mem;
1127
1128 r = -EFAULT;
1129 if (copy_from_user(&kvm_userspace_mem, argp,
1130 sizeof kvm_userspace_mem))
1131 goto out;
1132
1133 r = kvm_vm_ioctl_set_memory_region(kvm, &kvm_userspace_mem, 1);
6aa8b732
AK
1134 if (r)
1135 goto out;
1136 break;
1137 }
1138 case KVM_GET_DIRTY_LOG: {
1139 struct kvm_dirty_log log;
1140
1141 r = -EFAULT;
2f366987 1142 if (copy_from_user(&log, argp, sizeof log))
6aa8b732 1143 goto out;
2c6f5df9 1144 r = kvm_vm_ioctl_get_dirty_log(kvm, &log);
6aa8b732
AK
1145 if (r)
1146 goto out;
1147 break;
1148 }
f17abe9a 1149 default:
1fe779f8 1150 r = kvm_arch_vm_ioctl(filp, ioctl, arg);
f17abe9a
AK
1151 }
1152out:
1153 return r;
1154}
1155
e4a533a4 1156static int kvm_vm_fault(struct vm_area_struct *vma, struct vm_fault *vmf)
f17abe9a
AK
1157{
1158 struct kvm *kvm = vma->vm_file->private_data;
f17abe9a
AK
1159 struct page *page;
1160
e4a533a4 1161 if (!kvm_is_visible_gfn(kvm, vmf->pgoff))
1162 return VM_FAULT_SIGBUS;
10589a46 1163 page = gfn_to_page(kvm, vmf->pgoff);
8a7ae055 1164 if (is_error_page(page)) {
b4231d61 1165 kvm_release_page_clean(page);
e4a533a4 1166 return VM_FAULT_SIGBUS;
8a7ae055 1167 }
e4a533a4 1168 vmf->page = page;
1169 return 0;
f17abe9a
AK
1170}
1171
1172static struct vm_operations_struct kvm_vm_vm_ops = {
e4a533a4 1173 .fault = kvm_vm_fault,
f17abe9a
AK
1174};
1175
1176static int kvm_vm_mmap(struct file *file, struct vm_area_struct *vma)
1177{
1178 vma->vm_ops = &kvm_vm_vm_ops;
1179 return 0;
1180}
1181
5c502742 1182static const struct file_operations kvm_vm_fops = {
f17abe9a
AK
1183 .release = kvm_vm_release,
1184 .unlocked_ioctl = kvm_vm_ioctl,
1185 .compat_ioctl = kvm_vm_ioctl,
1186 .mmap = kvm_vm_mmap,
1187};
1188
1189static int kvm_dev_ioctl_create_vm(void)
1190{
2030a42c 1191 int fd;
f17abe9a
AK
1192 struct kvm *kvm;
1193
f17abe9a 1194 kvm = kvm_create_vm();
d6d28168
AK
1195 if (IS_ERR(kvm))
1196 return PTR_ERR(kvm);
2030a42c
AV
1197 fd = anon_inode_getfd("kvm-vm", &kvm_vm_fops, kvm);
1198 if (fd < 0)
66c0b394 1199 kvm_put_kvm(kvm);
f17abe9a 1200
f17abe9a 1201 return fd;
f17abe9a
AK
1202}
1203
1204static long kvm_dev_ioctl(struct file *filp,
1205 unsigned int ioctl, unsigned long arg)
1206{
07c45a36 1207 long r = -EINVAL;
f17abe9a
AK
1208
1209 switch (ioctl) {
1210 case KVM_GET_API_VERSION:
f0fe5108
AK
1211 r = -EINVAL;
1212 if (arg)
1213 goto out;
f17abe9a
AK
1214 r = KVM_API_VERSION;
1215 break;
1216 case KVM_CREATE_VM:
f0fe5108
AK
1217 r = -EINVAL;
1218 if (arg)
1219 goto out;
f17abe9a
AK
1220 r = kvm_dev_ioctl_create_vm();
1221 break;
018d00d2 1222 case KVM_CHECK_EXTENSION:
1e1c65e0 1223 r = kvm_dev_ioctl_check_extension(arg);
5d308f45 1224 break;
07c45a36
AK
1225 case KVM_GET_VCPU_MMAP_SIZE:
1226 r = -EINVAL;
1227 if (arg)
1228 goto out;
adb1ff46
AK
1229 r = PAGE_SIZE; /* struct kvm_run */
1230#ifdef CONFIG_X86
1231 r += PAGE_SIZE; /* pio data page */
1232#endif
07c45a36 1233 break;
d4c9ff2d
FEL
1234 case KVM_TRACE_ENABLE:
1235 case KVM_TRACE_PAUSE:
1236 case KVM_TRACE_DISABLE:
1237 r = kvm_trace_ioctl(ioctl, arg);
1238 break;
6aa8b732 1239 default:
043405e1 1240 return kvm_arch_dev_ioctl(filp, ioctl, arg);
6aa8b732
AK
1241 }
1242out:
1243 return r;
1244}
1245
6aa8b732 1246static struct file_operations kvm_chardev_ops = {
6aa8b732
AK
1247 .unlocked_ioctl = kvm_dev_ioctl,
1248 .compat_ioctl = kvm_dev_ioctl,
6aa8b732
AK
1249};
1250
1251static struct miscdevice kvm_dev = {
bbe4432e 1252 KVM_MINOR,
6aa8b732
AK
1253 "kvm",
1254 &kvm_chardev_ops,
1255};
1256
1b6c0168
AK
1257static void hardware_enable(void *junk)
1258{
1259 int cpu = raw_smp_processor_id();
1260
1261 if (cpu_isset(cpu, cpus_hardware_enabled))
1262 return;
1263 cpu_set(cpu, cpus_hardware_enabled);
e9b11c17 1264 kvm_arch_hardware_enable(NULL);
1b6c0168
AK
1265}
1266
1267static void hardware_disable(void *junk)
1268{
1269 int cpu = raw_smp_processor_id();
1270
1271 if (!cpu_isset(cpu, cpus_hardware_enabled))
1272 return;
1273 cpu_clear(cpu, cpus_hardware_enabled);
1274 decache_vcpus_on_cpu(cpu);
e9b11c17 1275 kvm_arch_hardware_disable(NULL);
1b6c0168
AK
1276}
1277
774c47f1
AK
1278static int kvm_cpu_hotplug(struct notifier_block *notifier, unsigned long val,
1279 void *v)
1280{
1281 int cpu = (long)v;
1282
1a6f4d7f 1283 val &= ~CPU_TASKS_FROZEN;
774c47f1 1284 switch (val) {
cec9ad27 1285 case CPU_DYING:
6ec8a856
AK
1286 printk(KERN_INFO "kvm: disabling virtualization on CPU%d\n",
1287 cpu);
1288 hardware_disable(NULL);
1289 break;
774c47f1 1290 case CPU_UP_CANCELED:
43934a38
JK
1291 printk(KERN_INFO "kvm: disabling virtualization on CPU%d\n",
1292 cpu);
8691e5a8 1293 smp_call_function_single(cpu, hardware_disable, NULL, 1);
774c47f1 1294 break;
43934a38
JK
1295 case CPU_ONLINE:
1296 printk(KERN_INFO "kvm: enabling virtualization on CPU%d\n",
1297 cpu);
8691e5a8 1298 smp_call_function_single(cpu, hardware_enable, NULL, 1);
774c47f1
AK
1299 break;
1300 }
1301 return NOTIFY_OK;
1302}
1303
9a2b85c6 1304static int kvm_reboot(struct notifier_block *notifier, unsigned long val,
d77c26fc 1305 void *v)
9a2b85c6
RR
1306{
1307 if (val == SYS_RESTART) {
1308 /*
1309 * Some (well, at least mine) BIOSes hang on reboot if
1310 * in vmx root mode.
1311 */
1312 printk(KERN_INFO "kvm: exiting hardware virtualization\n");
15c8b6c1 1313 on_each_cpu(hardware_disable, NULL, 1);
9a2b85c6
RR
1314 }
1315 return NOTIFY_OK;
1316}
1317
1318static struct notifier_block kvm_reboot_notifier = {
1319 .notifier_call = kvm_reboot,
1320 .priority = 0,
1321};
1322
2eeb2e94
GH
1323void kvm_io_bus_init(struct kvm_io_bus *bus)
1324{
1325 memset(bus, 0, sizeof(*bus));
1326}
1327
1328void kvm_io_bus_destroy(struct kvm_io_bus *bus)
1329{
1330 int i;
1331
1332 for (i = 0; i < bus->dev_count; i++) {
1333 struct kvm_io_device *pos = bus->devs[i];
1334
1335 kvm_iodevice_destructor(pos);
1336 }
1337}
1338
1339struct kvm_io_device *kvm_io_bus_find_dev(struct kvm_io_bus *bus, gpa_t addr)
1340{
1341 int i;
1342
1343 for (i = 0; i < bus->dev_count; i++) {
1344 struct kvm_io_device *pos = bus->devs[i];
1345
1346 if (pos->in_range(pos, addr))
1347 return pos;
1348 }
1349
1350 return NULL;
1351}
1352
1353void kvm_io_bus_register_dev(struct kvm_io_bus *bus, struct kvm_io_device *dev)
1354{
1355 BUG_ON(bus->dev_count > (NR_IOBUS_DEVS-1));
1356
1357 bus->devs[bus->dev_count++] = dev;
1358}
1359
774c47f1
AK
1360static struct notifier_block kvm_cpu_notifier = {
1361 .notifier_call = kvm_cpu_hotplug,
1362 .priority = 20, /* must be > scheduler priority */
1363};
1364
8b88b099 1365static int vm_stat_get(void *_offset, u64 *val)
ba1389b7
AK
1366{
1367 unsigned offset = (long)_offset;
ba1389b7
AK
1368 struct kvm *kvm;
1369
8b88b099 1370 *val = 0;
ba1389b7
AK
1371 spin_lock(&kvm_lock);
1372 list_for_each_entry(kvm, &vm_list, vm_list)
8b88b099 1373 *val += *(u32 *)((void *)kvm + offset);
ba1389b7 1374 spin_unlock(&kvm_lock);
8b88b099 1375 return 0;
ba1389b7
AK
1376}
1377
1378DEFINE_SIMPLE_ATTRIBUTE(vm_stat_fops, vm_stat_get, NULL, "%llu\n");
1379
8b88b099 1380static int vcpu_stat_get(void *_offset, u64 *val)
1165f5fe
AK
1381{
1382 unsigned offset = (long)_offset;
1165f5fe
AK
1383 struct kvm *kvm;
1384 struct kvm_vcpu *vcpu;
1385 int i;
1386
8b88b099 1387 *val = 0;
1165f5fe
AK
1388 spin_lock(&kvm_lock);
1389 list_for_each_entry(kvm, &vm_list, vm_list)
1390 for (i = 0; i < KVM_MAX_VCPUS; ++i) {
fb3f0f51
RR
1391 vcpu = kvm->vcpus[i];
1392 if (vcpu)
8b88b099 1393 *val += *(u32 *)((void *)vcpu + offset);
1165f5fe
AK
1394 }
1395 spin_unlock(&kvm_lock);
8b88b099 1396 return 0;
1165f5fe
AK
1397}
1398
ba1389b7
AK
1399DEFINE_SIMPLE_ATTRIBUTE(vcpu_stat_fops, vcpu_stat_get, NULL, "%llu\n");
1400
1401static struct file_operations *stat_fops[] = {
1402 [KVM_STAT_VCPU] = &vcpu_stat_fops,
1403 [KVM_STAT_VM] = &vm_stat_fops,
1404};
1165f5fe 1405
a16b043c 1406static void kvm_init_debug(void)
6aa8b732
AK
1407{
1408 struct kvm_stats_debugfs_item *p;
1409
76f7c879 1410 kvm_debugfs_dir = debugfs_create_dir("kvm", NULL);
6aa8b732 1411 for (p = debugfs_entries; p->name; ++p)
76f7c879 1412 p->dentry = debugfs_create_file(p->name, 0444, kvm_debugfs_dir,
1165f5fe 1413 (void *)(long)p->offset,
ba1389b7 1414 stat_fops[p->kind]);
6aa8b732
AK
1415}
1416
1417static void kvm_exit_debug(void)
1418{
1419 struct kvm_stats_debugfs_item *p;
1420
1421 for (p = debugfs_entries; p->name; ++p)
1422 debugfs_remove(p->dentry);
76f7c879 1423 debugfs_remove(kvm_debugfs_dir);
6aa8b732
AK
1424}
1425
59ae6c6b
AK
1426static int kvm_suspend(struct sys_device *dev, pm_message_t state)
1427{
4267c41a 1428 hardware_disable(NULL);
59ae6c6b
AK
1429 return 0;
1430}
1431
1432static int kvm_resume(struct sys_device *dev)
1433{
4267c41a 1434 hardware_enable(NULL);
59ae6c6b
AK
1435 return 0;
1436}
1437
1438static struct sysdev_class kvm_sysdev_class = {
af5ca3f4 1439 .name = "kvm",
59ae6c6b
AK
1440 .suspend = kvm_suspend,
1441 .resume = kvm_resume,
1442};
1443
1444static struct sys_device kvm_sysdev = {
1445 .id = 0,
1446 .cls = &kvm_sysdev_class,
1447};
1448
cea7bb21 1449struct page *bad_page;
35149e21 1450pfn_t bad_pfn;
6aa8b732 1451
15ad7146
AK
1452static inline
1453struct kvm_vcpu *preempt_notifier_to_vcpu(struct preempt_notifier *pn)
1454{
1455 return container_of(pn, struct kvm_vcpu, preempt_notifier);
1456}
1457
1458static void kvm_sched_in(struct preempt_notifier *pn, int cpu)
1459{
1460 struct kvm_vcpu *vcpu = preempt_notifier_to_vcpu(pn);
1461
e9b11c17 1462 kvm_arch_vcpu_load(vcpu, cpu);
15ad7146
AK
1463}
1464
1465static void kvm_sched_out(struct preempt_notifier *pn,
1466 struct task_struct *next)
1467{
1468 struct kvm_vcpu *vcpu = preempt_notifier_to_vcpu(pn);
1469
e9b11c17 1470 kvm_arch_vcpu_put(vcpu);
15ad7146
AK
1471}
1472
f8c16bba 1473int kvm_init(void *opaque, unsigned int vcpu_size,
c16f862d 1474 struct module *module)
6aa8b732
AK
1475{
1476 int r;
002c7f7c 1477 int cpu;
6aa8b732 1478
cb498ea2
ZX
1479 kvm_init_debug();
1480
f8c16bba
ZX
1481 r = kvm_arch_init(opaque);
1482 if (r)
d2308784 1483 goto out_fail;
cb498ea2
ZX
1484
1485 bad_page = alloc_page(GFP_KERNEL | __GFP_ZERO);
1486
1487 if (bad_page == NULL) {
1488 r = -ENOMEM;
1489 goto out;
1490 }
1491
35149e21
AL
1492 bad_pfn = page_to_pfn(bad_page);
1493
e9b11c17 1494 r = kvm_arch_hardware_setup();
6aa8b732 1495 if (r < 0)
d2308784 1496 goto out_free_0;
6aa8b732 1497
002c7f7c
YS
1498 for_each_online_cpu(cpu) {
1499 smp_call_function_single(cpu,
e9b11c17 1500 kvm_arch_check_processor_compat,
8691e5a8 1501 &r, 1);
002c7f7c 1502 if (r < 0)
d2308784 1503 goto out_free_1;
002c7f7c
YS
1504 }
1505
15c8b6c1 1506 on_each_cpu(hardware_enable, NULL, 1);
774c47f1
AK
1507 r = register_cpu_notifier(&kvm_cpu_notifier);
1508 if (r)
d2308784 1509 goto out_free_2;
6aa8b732
AK
1510 register_reboot_notifier(&kvm_reboot_notifier);
1511
59ae6c6b
AK
1512 r = sysdev_class_register(&kvm_sysdev_class);
1513 if (r)
d2308784 1514 goto out_free_3;
59ae6c6b
AK
1515
1516 r = sysdev_register(&kvm_sysdev);
1517 if (r)
d2308784 1518 goto out_free_4;
59ae6c6b 1519
c16f862d
RR
1520 /* A kmem cache lets us meet the alignment requirements of fx_save. */
1521 kvm_vcpu_cache = kmem_cache_create("kvm_vcpu", vcpu_size,
56919c5c
JP
1522 __alignof__(struct kvm_vcpu),
1523 0, NULL);
c16f862d
RR
1524 if (!kvm_vcpu_cache) {
1525 r = -ENOMEM;
d2308784 1526 goto out_free_5;
c16f862d
RR
1527 }
1528
6aa8b732
AK
1529 kvm_chardev_ops.owner = module;
1530
1531 r = misc_register(&kvm_dev);
1532 if (r) {
d77c26fc 1533 printk(KERN_ERR "kvm: misc device register failed\n");
6aa8b732
AK
1534 goto out_free;
1535 }
1536
15ad7146
AK
1537 kvm_preempt_ops.sched_in = kvm_sched_in;
1538 kvm_preempt_ops.sched_out = kvm_sched_out;
1539
c7addb90 1540 return 0;
6aa8b732
AK
1541
1542out_free:
c16f862d 1543 kmem_cache_destroy(kvm_vcpu_cache);
d2308784 1544out_free_5:
59ae6c6b 1545 sysdev_unregister(&kvm_sysdev);
d2308784 1546out_free_4:
59ae6c6b 1547 sysdev_class_unregister(&kvm_sysdev_class);
d2308784 1548out_free_3:
6aa8b732 1549 unregister_reboot_notifier(&kvm_reboot_notifier);
774c47f1 1550 unregister_cpu_notifier(&kvm_cpu_notifier);
d2308784 1551out_free_2:
15c8b6c1 1552 on_each_cpu(hardware_disable, NULL, 1);
d2308784 1553out_free_1:
e9b11c17 1554 kvm_arch_hardware_unsetup();
d2308784
ZX
1555out_free_0:
1556 __free_page(bad_page);
ca45aaae 1557out:
f8c16bba 1558 kvm_arch_exit();
cb498ea2 1559 kvm_exit_debug();
d2308784 1560out_fail:
6aa8b732
AK
1561 return r;
1562}
cb498ea2 1563EXPORT_SYMBOL_GPL(kvm_init);
6aa8b732 1564
cb498ea2 1565void kvm_exit(void)
6aa8b732 1566{
d4c9ff2d 1567 kvm_trace_cleanup();
6aa8b732 1568 misc_deregister(&kvm_dev);
c16f862d 1569 kmem_cache_destroy(kvm_vcpu_cache);
59ae6c6b
AK
1570 sysdev_unregister(&kvm_sysdev);
1571 sysdev_class_unregister(&kvm_sysdev_class);
6aa8b732 1572 unregister_reboot_notifier(&kvm_reboot_notifier);
59ae6c6b 1573 unregister_cpu_notifier(&kvm_cpu_notifier);
15c8b6c1 1574 on_each_cpu(hardware_disable, NULL, 1);
e9b11c17 1575 kvm_arch_hardware_unsetup();
f8c16bba 1576 kvm_arch_exit();
6aa8b732 1577 kvm_exit_debug();
cea7bb21 1578 __free_page(bad_page);
6aa8b732 1579}
cb498ea2 1580EXPORT_SYMBOL_GPL(kvm_exit);