]> bbs.cooldavid.org Git - net-next-2.6.git/blame - virt/kvm/kvm_main.c
libfs: allow error return from simple attributes
[net-next-2.6.git] / virt / kvm / kvm_main.c
CommitLineData
6aa8b732
AK
1/*
2 * Kernel-based Virtual Machine driver for Linux
3 *
4 * This module enables machines with Intel VT-x extensions to run virtual
5 * machines without emulation or binary translation.
6 *
7 * Copyright (C) 2006 Qumranet, Inc.
8 *
9 * Authors:
10 * Avi Kivity <avi@qumranet.com>
11 * Yaniv Kamay <yaniv@qumranet.com>
12 *
13 * This work is licensed under the terms of the GNU GPL, version 2. See
14 * the COPYING file in the top-level directory.
15 *
16 */
17
e2174021 18#include "iodev.h"
6aa8b732 19
edf88417 20#include <linux/kvm_host.h>
6aa8b732
AK
21#include <linux/kvm.h>
22#include <linux/module.h>
23#include <linux/errno.h>
6aa8b732
AK
24#include <linux/percpu.h>
25#include <linux/gfp.h>
6aa8b732
AK
26#include <linux/mm.h>
27#include <linux/miscdevice.h>
28#include <linux/vmalloc.h>
6aa8b732 29#include <linux/reboot.h>
6aa8b732
AK
30#include <linux/debugfs.h>
31#include <linux/highmem.h>
32#include <linux/file.h>
59ae6c6b 33#include <linux/sysdev.h>
774c47f1 34#include <linux/cpu.h>
e8edc6e0 35#include <linux/sched.h>
d9e368d6
AK
36#include <linux/cpumask.h>
37#include <linux/smp.h>
d6d28168 38#include <linux/anon_inodes.h>
04d2cc77 39#include <linux/profile.h>
7aa81cc0 40#include <linux/kvm_para.h>
6fc138d2 41#include <linux/pagemap.h>
8d4e1288 42#include <linux/mman.h>
6aa8b732 43
e495606d 44#include <asm/processor.h>
e495606d
AK
45#include <asm/io.h>
46#include <asm/uaccess.h>
3e021bf5 47#include <asm/pgtable.h>
6aa8b732
AK
48
49MODULE_AUTHOR("Qumranet");
50MODULE_LICENSE("GPL");
51
e9b11c17
ZX
52DEFINE_SPINLOCK(kvm_lock);
53LIST_HEAD(vm_list);
133de902 54
1b6c0168
AK
55static cpumask_t cpus_hardware_enabled;
56
c16f862d
RR
57struct kmem_cache *kvm_vcpu_cache;
58EXPORT_SYMBOL_GPL(kvm_vcpu_cache);
1165f5fe 59
15ad7146
AK
60static __read_mostly struct preempt_ops kvm_preempt_ops;
61
6aa8b732
AK
62static struct dentry *debugfs_dir;
63
bccf2150
AK
64static long kvm_vcpu_ioctl(struct file *file, unsigned int ioctl,
65 unsigned long arg);
66
5aacf0ca
JM
67static inline int valid_vcpu(int n)
68{
69 return likely(n >= 0 && n < KVM_MAX_VCPUS);
70}
71
bccf2150
AK
72/*
73 * Switches to specified vcpu, until a matching vcpu_put()
74 */
313a3dc7 75void vcpu_load(struct kvm_vcpu *vcpu)
6aa8b732 76{
15ad7146
AK
77 int cpu;
78
bccf2150 79 mutex_lock(&vcpu->mutex);
15ad7146
AK
80 cpu = get_cpu();
81 preempt_notifier_register(&vcpu->preempt_notifier);
313a3dc7 82 kvm_arch_vcpu_load(vcpu, cpu);
15ad7146 83 put_cpu();
6aa8b732
AK
84}
85
313a3dc7 86void vcpu_put(struct kvm_vcpu *vcpu)
6aa8b732 87{
15ad7146 88 preempt_disable();
313a3dc7 89 kvm_arch_vcpu_put(vcpu);
15ad7146
AK
90 preempt_notifier_unregister(&vcpu->preempt_notifier);
91 preempt_enable();
6aa8b732
AK
92 mutex_unlock(&vcpu->mutex);
93}
94
d9e368d6
AK
95static void ack_flush(void *_completed)
96{
d9e368d6
AK
97}
98
99void kvm_flush_remote_tlbs(struct kvm *kvm)
100{
49d3bd7e 101 int i, cpu;
d9e368d6
AK
102 cpumask_t cpus;
103 struct kvm_vcpu *vcpu;
d9e368d6 104
d9e368d6 105 cpus_clear(cpus);
fb3f0f51
RR
106 for (i = 0; i < KVM_MAX_VCPUS; ++i) {
107 vcpu = kvm->vcpus[i];
108 if (!vcpu)
109 continue;
3176bc3e 110 if (test_and_set_bit(KVM_REQ_TLB_FLUSH, &vcpu->requests))
d9e368d6
AK
111 continue;
112 cpu = vcpu->cpu;
113 if (cpu != -1 && cpu != raw_smp_processor_id())
49d3bd7e 114 cpu_set(cpu, cpus);
d9e368d6 115 }
0f74a24c
AK
116 if (cpus_empty(cpus))
117 return;
118 ++kvm->stat.remote_tlb_flush;
49d3bd7e 119 smp_call_function_mask(cpus, ack_flush, NULL, 1);
d9e368d6
AK
120}
121
fb3f0f51
RR
122int kvm_vcpu_init(struct kvm_vcpu *vcpu, struct kvm *kvm, unsigned id)
123{
124 struct page *page;
125 int r;
126
127 mutex_init(&vcpu->mutex);
128 vcpu->cpu = -1;
fb3f0f51
RR
129 vcpu->kvm = kvm;
130 vcpu->vcpu_id = id;
b6958ce4 131 init_waitqueue_head(&vcpu->wq);
fb3f0f51
RR
132
133 page = alloc_page(GFP_KERNEL | __GFP_ZERO);
134 if (!page) {
135 r = -ENOMEM;
136 goto fail;
137 }
138 vcpu->run = page_address(page);
139
e9b11c17 140 r = kvm_arch_vcpu_init(vcpu);
fb3f0f51 141 if (r < 0)
e9b11c17 142 goto fail_free_run;
fb3f0f51
RR
143 return 0;
144
fb3f0f51
RR
145fail_free_run:
146 free_page((unsigned long)vcpu->run);
147fail:
76fafa5e 148 return r;
fb3f0f51
RR
149}
150EXPORT_SYMBOL_GPL(kvm_vcpu_init);
151
152void kvm_vcpu_uninit(struct kvm_vcpu *vcpu)
153{
e9b11c17 154 kvm_arch_vcpu_uninit(vcpu);
fb3f0f51
RR
155 free_page((unsigned long)vcpu->run);
156}
157EXPORT_SYMBOL_GPL(kvm_vcpu_uninit);
158
f17abe9a 159static struct kvm *kvm_create_vm(void)
6aa8b732 160{
d19a9cd2 161 struct kvm *kvm = kvm_arch_create_vm();
6aa8b732 162
d19a9cd2
ZX
163 if (IS_ERR(kvm))
164 goto out;
6aa8b732 165
6d4e4c4f
AK
166 kvm->mm = current->mm;
167 atomic_inc(&kvm->mm->mm_count);
aaee2c94 168 spin_lock_init(&kvm->mmu_lock);
74906345 169 kvm_io_bus_init(&kvm->pio_bus);
11ec2804 170 mutex_init(&kvm->lock);
2eeb2e94 171 kvm_io_bus_init(&kvm->mmio_bus);
5e58cfe4
RR
172 spin_lock(&kvm_lock);
173 list_add(&kvm->vm_list, &vm_list);
174 spin_unlock(&kvm_lock);
d19a9cd2 175out:
f17abe9a
AK
176 return kvm;
177}
178
6aa8b732
AK
179/*
180 * Free any memory in @free but not in @dont.
181 */
182static void kvm_free_physmem_slot(struct kvm_memory_slot *free,
183 struct kvm_memory_slot *dont)
184{
290fc38d
IE
185 if (!dont || free->rmap != dont->rmap)
186 vfree(free->rmap);
6aa8b732
AK
187
188 if (!dont || free->dirty_bitmap != dont->dirty_bitmap)
189 vfree(free->dirty_bitmap);
190
6aa8b732 191 free->npages = 0;
8b6d44c7 192 free->dirty_bitmap = NULL;
8d4e1288 193 free->rmap = NULL;
6aa8b732
AK
194}
195
d19a9cd2 196void kvm_free_physmem(struct kvm *kvm)
6aa8b732
AK
197{
198 int i;
199
200 for (i = 0; i < kvm->nmemslots; ++i)
8b6d44c7 201 kvm_free_physmem_slot(&kvm->memslots[i], NULL);
6aa8b732
AK
202}
203
f17abe9a
AK
204static void kvm_destroy_vm(struct kvm *kvm)
205{
6d4e4c4f
AK
206 struct mm_struct *mm = kvm->mm;
207
133de902
AK
208 spin_lock(&kvm_lock);
209 list_del(&kvm->vm_list);
210 spin_unlock(&kvm_lock);
74906345 211 kvm_io_bus_destroy(&kvm->pio_bus);
2eeb2e94 212 kvm_io_bus_destroy(&kvm->mmio_bus);
d19a9cd2 213 kvm_arch_destroy_vm(kvm);
6d4e4c4f 214 mmdrop(mm);
f17abe9a
AK
215}
216
217static int kvm_vm_release(struct inode *inode, struct file *filp)
218{
219 struct kvm *kvm = filp->private_data;
220
221 kvm_destroy_vm(kvm);
6aa8b732
AK
222 return 0;
223}
224
6aa8b732
AK
225/*
226 * Allocate some memory and give it an address in the guest physical address
227 * space.
228 *
229 * Discontiguous memory is allowed, mostly for framebuffers.
f78e0e2e 230 *
10589a46 231 * Must be called holding mmap_sem for write.
6aa8b732 232 */
f78e0e2e
SY
233int __kvm_set_memory_region(struct kvm *kvm,
234 struct kvm_userspace_memory_region *mem,
235 int user_alloc)
6aa8b732
AK
236{
237 int r;
238 gfn_t base_gfn;
239 unsigned long npages;
240 unsigned long i;
241 struct kvm_memory_slot *memslot;
242 struct kvm_memory_slot old, new;
6aa8b732
AK
243
244 r = -EINVAL;
245 /* General sanity checks */
246 if (mem->memory_size & (PAGE_SIZE - 1))
247 goto out;
248 if (mem->guest_phys_addr & (PAGE_SIZE - 1))
249 goto out;
e0d62c7f 250 if (mem->slot >= KVM_MEMORY_SLOTS + KVM_PRIVATE_MEM_SLOTS)
6aa8b732
AK
251 goto out;
252 if (mem->guest_phys_addr + mem->memory_size < mem->guest_phys_addr)
253 goto out;
254
255 memslot = &kvm->memslots[mem->slot];
256 base_gfn = mem->guest_phys_addr >> PAGE_SHIFT;
257 npages = mem->memory_size >> PAGE_SHIFT;
258
259 if (!npages)
260 mem->flags &= ~KVM_MEM_LOG_DIRTY_PAGES;
261
6aa8b732
AK
262 new = old = *memslot;
263
264 new.base_gfn = base_gfn;
265 new.npages = npages;
266 new.flags = mem->flags;
267
268 /* Disallow changing a memory slot's size. */
269 r = -EINVAL;
270 if (npages && old.npages && npages != old.npages)
f78e0e2e 271 goto out_free;
6aa8b732
AK
272
273 /* Check for overlaps */
274 r = -EEXIST;
275 for (i = 0; i < KVM_MEMORY_SLOTS; ++i) {
276 struct kvm_memory_slot *s = &kvm->memslots[i];
277
278 if (s == memslot)
279 continue;
280 if (!((base_gfn + npages <= s->base_gfn) ||
281 (base_gfn >= s->base_gfn + s->npages)))
f78e0e2e 282 goto out_free;
6aa8b732 283 }
6aa8b732 284
6aa8b732
AK
285 /* Free page dirty bitmap if unneeded */
286 if (!(new.flags & KVM_MEM_LOG_DIRTY_PAGES))
8b6d44c7 287 new.dirty_bitmap = NULL;
6aa8b732
AK
288
289 r = -ENOMEM;
290
291 /* Allocate if a slot is being created */
8d4e1288 292 if (npages && !new.rmap) {
d77c26fc 293 new.rmap = vmalloc(npages * sizeof(struct page *));
290fc38d
IE
294
295 if (!new.rmap)
f78e0e2e 296 goto out_free;
290fc38d 297
290fc38d 298 memset(new.rmap, 0, npages * sizeof(*new.rmap));
8d4e1288 299
80b14b5b 300 new.user_alloc = user_alloc;
0de10343 301 new.userspace_addr = mem->userspace_addr;
6aa8b732
AK
302 }
303
304 /* Allocate page dirty bitmap if needed */
305 if ((new.flags & KVM_MEM_LOG_DIRTY_PAGES) && !new.dirty_bitmap) {
306 unsigned dirty_bytes = ALIGN(npages, BITS_PER_LONG) / 8;
307
308 new.dirty_bitmap = vmalloc(dirty_bytes);
309 if (!new.dirty_bitmap)
f78e0e2e 310 goto out_free;
6aa8b732
AK
311 memset(new.dirty_bitmap, 0, dirty_bytes);
312 }
313
6aa8b732
AK
314 if (mem->slot >= kvm->nmemslots)
315 kvm->nmemslots = mem->slot + 1;
316
3ad82a7e
ZX
317 *memslot = new;
318
0de10343
ZX
319 r = kvm_arch_set_memory_region(kvm, mem, old, user_alloc);
320 if (r) {
321 *memslot = old;
322 goto out_free;
82ce2c96
IE
323 }
324
6aa8b732
AK
325 kvm_free_physmem_slot(&old, &new);
326 return 0;
327
f78e0e2e 328out_free:
6aa8b732
AK
329 kvm_free_physmem_slot(&new, &old);
330out:
331 return r;
210c7c4d
IE
332
333}
f78e0e2e
SY
334EXPORT_SYMBOL_GPL(__kvm_set_memory_region);
335
336int kvm_set_memory_region(struct kvm *kvm,
337 struct kvm_userspace_memory_region *mem,
338 int user_alloc)
339{
340 int r;
341
10589a46 342 down_write(&current->mm->mmap_sem);
f78e0e2e 343 r = __kvm_set_memory_region(kvm, mem, user_alloc);
10589a46 344 up_write(&current->mm->mmap_sem);
f78e0e2e
SY
345 return r;
346}
210c7c4d
IE
347EXPORT_SYMBOL_GPL(kvm_set_memory_region);
348
1fe779f8
CO
349int kvm_vm_ioctl_set_memory_region(struct kvm *kvm,
350 struct
351 kvm_userspace_memory_region *mem,
352 int user_alloc)
210c7c4d 353{
e0d62c7f
IE
354 if (mem->slot >= KVM_MEMORY_SLOTS)
355 return -EINVAL;
210c7c4d 356 return kvm_set_memory_region(kvm, mem, user_alloc);
6aa8b732
AK
357}
358
5bb064dc
ZX
359int kvm_get_dirty_log(struct kvm *kvm,
360 struct kvm_dirty_log *log, int *is_dirty)
6aa8b732
AK
361{
362 struct kvm_memory_slot *memslot;
363 int r, i;
364 int n;
365 unsigned long any = 0;
366
6aa8b732
AK
367 r = -EINVAL;
368 if (log->slot >= KVM_MEMORY_SLOTS)
369 goto out;
370
371 memslot = &kvm->memslots[log->slot];
372 r = -ENOENT;
373 if (!memslot->dirty_bitmap)
374 goto out;
375
cd1a4a98 376 n = ALIGN(memslot->npages, BITS_PER_LONG) / 8;
6aa8b732 377
cd1a4a98 378 for (i = 0; !any && i < n/sizeof(long); ++i)
6aa8b732
AK
379 any = memslot->dirty_bitmap[i];
380
381 r = -EFAULT;
382 if (copy_to_user(log->dirty_bitmap, memslot->dirty_bitmap, n))
383 goto out;
384
5bb064dc
ZX
385 if (any)
386 *is_dirty = 1;
6aa8b732
AK
387
388 r = 0;
6aa8b732 389out:
6aa8b732
AK
390 return r;
391}
392
cea7bb21
IE
393int is_error_page(struct page *page)
394{
395 return page == bad_page;
396}
397EXPORT_SYMBOL_GPL(is_error_page);
398
f9d46eb0
IE
399static inline unsigned long bad_hva(void)
400{
401 return PAGE_OFFSET;
402}
403
404int kvm_is_error_hva(unsigned long addr)
405{
406 return addr == bad_hva();
407}
408EXPORT_SYMBOL_GPL(kvm_is_error_hva);
409
e8207547 410static struct kvm_memory_slot *__gfn_to_memslot(struct kvm *kvm, gfn_t gfn)
6aa8b732
AK
411{
412 int i;
413
414 for (i = 0; i < kvm->nmemslots; ++i) {
415 struct kvm_memory_slot *memslot = &kvm->memslots[i];
416
417 if (gfn >= memslot->base_gfn
418 && gfn < memslot->base_gfn + memslot->npages)
419 return memslot;
420 }
8b6d44c7 421 return NULL;
6aa8b732 422}
e8207547
AK
423
424struct kvm_memory_slot *gfn_to_memslot(struct kvm *kvm, gfn_t gfn)
425{
426 gfn = unalias_gfn(kvm, gfn);
427 return __gfn_to_memslot(kvm, gfn);
428}
6aa8b732 429
e0d62c7f
IE
430int kvm_is_visible_gfn(struct kvm *kvm, gfn_t gfn)
431{
432 int i;
433
434 gfn = unalias_gfn(kvm, gfn);
435 for (i = 0; i < KVM_MEMORY_SLOTS; ++i) {
436 struct kvm_memory_slot *memslot = &kvm->memslots[i];
437
438 if (gfn >= memslot->base_gfn
439 && gfn < memslot->base_gfn + memslot->npages)
440 return 1;
441 }
442 return 0;
443}
444EXPORT_SYMBOL_GPL(kvm_is_visible_gfn);
445
539cb660
IE
446static unsigned long gfn_to_hva(struct kvm *kvm, gfn_t gfn)
447{
448 struct kvm_memory_slot *slot;
449
450 gfn = unalias_gfn(kvm, gfn);
451 slot = __gfn_to_memslot(kvm, gfn);
452 if (!slot)
453 return bad_hva();
454 return (slot->userspace_addr + (gfn - slot->base_gfn) * PAGE_SIZE);
455}
456
aab61cc0
AL
457/*
458 * Requires current->mm->mmap_sem to be held
459 */
10589a46 460struct page *gfn_to_page(struct kvm *kvm, gfn_t gfn)
954bbbc2 461{
8d4e1288 462 struct page *page[1];
539cb660 463 unsigned long addr;
8d4e1288 464 int npages;
954bbbc2 465
60395224
AK
466 might_sleep();
467
539cb660
IE
468 addr = gfn_to_hva(kvm, gfn);
469 if (kvm_is_error_hva(addr)) {
8a7ae055 470 get_page(bad_page);
cea7bb21 471 return bad_page;
8a7ae055 472 }
8d4e1288 473
539cb660
IE
474 npages = get_user_pages(current, current->mm, addr, 1, 1, 1, page,
475 NULL);
476
8d4e1288
AL
477 if (npages != 1) {
478 get_page(bad_page);
479 return bad_page;
8a7ae055 480 }
8d4e1288
AL
481
482 return page[0];
954bbbc2 483}
aab61cc0 484
954bbbc2
AK
485EXPORT_SYMBOL_GPL(gfn_to_page);
486
b4231d61
IE
487void kvm_release_page_clean(struct page *page)
488{
489 put_page(page);
490}
491EXPORT_SYMBOL_GPL(kvm_release_page_clean);
492
493void kvm_release_page_dirty(struct page *page)
8a7ae055
IE
494{
495 if (!PageReserved(page))
496 SetPageDirty(page);
497 put_page(page);
498}
b4231d61 499EXPORT_SYMBOL_GPL(kvm_release_page_dirty);
8a7ae055 500
195aefde
IE
501static int next_segment(unsigned long len, int offset)
502{
503 if (len > PAGE_SIZE - offset)
504 return PAGE_SIZE - offset;
505 else
506 return len;
507}
508
509int kvm_read_guest_page(struct kvm *kvm, gfn_t gfn, void *data, int offset,
510 int len)
511{
e0506bcb
IE
512 int r;
513 unsigned long addr;
195aefde 514
e0506bcb
IE
515 addr = gfn_to_hva(kvm, gfn);
516 if (kvm_is_error_hva(addr))
517 return -EFAULT;
518 r = copy_from_user(data, (void __user *)addr + offset, len);
519 if (r)
195aefde 520 return -EFAULT;
195aefde
IE
521 return 0;
522}
523EXPORT_SYMBOL_GPL(kvm_read_guest_page);
524
525int kvm_read_guest(struct kvm *kvm, gpa_t gpa, void *data, unsigned long len)
526{
527 gfn_t gfn = gpa >> PAGE_SHIFT;
528 int seg;
529 int offset = offset_in_page(gpa);
530 int ret;
531
532 while ((seg = next_segment(len, offset)) != 0) {
533 ret = kvm_read_guest_page(kvm, gfn, data, offset, seg);
534 if (ret < 0)
535 return ret;
536 offset = 0;
537 len -= seg;
538 data += seg;
539 ++gfn;
540 }
541 return 0;
542}
543EXPORT_SYMBOL_GPL(kvm_read_guest);
544
7ec54588
MT
545int kvm_read_guest_atomic(struct kvm *kvm, gpa_t gpa, void *data,
546 unsigned long len)
547{
548 int r;
549 unsigned long addr;
550 gfn_t gfn = gpa >> PAGE_SHIFT;
551 int offset = offset_in_page(gpa);
552
553 addr = gfn_to_hva(kvm, gfn);
554 if (kvm_is_error_hva(addr))
555 return -EFAULT;
7ec54588 556 r = __copy_from_user_inatomic(data, (void __user *)addr + offset, len);
7ec54588
MT
557 if (r)
558 return -EFAULT;
559 return 0;
560}
561EXPORT_SYMBOL(kvm_read_guest_atomic);
562
195aefde
IE
563int kvm_write_guest_page(struct kvm *kvm, gfn_t gfn, const void *data,
564 int offset, int len)
565{
e0506bcb
IE
566 int r;
567 unsigned long addr;
195aefde 568
e0506bcb
IE
569 addr = gfn_to_hva(kvm, gfn);
570 if (kvm_is_error_hva(addr))
571 return -EFAULT;
572 r = copy_to_user((void __user *)addr + offset, data, len);
573 if (r)
195aefde 574 return -EFAULT;
195aefde
IE
575 mark_page_dirty(kvm, gfn);
576 return 0;
577}
578EXPORT_SYMBOL_GPL(kvm_write_guest_page);
579
580int kvm_write_guest(struct kvm *kvm, gpa_t gpa, const void *data,
581 unsigned long len)
582{
583 gfn_t gfn = gpa >> PAGE_SHIFT;
584 int seg;
585 int offset = offset_in_page(gpa);
586 int ret;
587
588 while ((seg = next_segment(len, offset)) != 0) {
589 ret = kvm_write_guest_page(kvm, gfn, data, offset, seg);
590 if (ret < 0)
591 return ret;
592 offset = 0;
593 len -= seg;
594 data += seg;
595 ++gfn;
596 }
597 return 0;
598}
599
600int kvm_clear_guest_page(struct kvm *kvm, gfn_t gfn, int offset, int len)
601{
3e021bf5 602 return kvm_write_guest_page(kvm, gfn, empty_zero_page, offset, len);
195aefde
IE
603}
604EXPORT_SYMBOL_GPL(kvm_clear_guest_page);
605
606int kvm_clear_guest(struct kvm *kvm, gpa_t gpa, unsigned long len)
607{
608 gfn_t gfn = gpa >> PAGE_SHIFT;
609 int seg;
610 int offset = offset_in_page(gpa);
611 int ret;
612
613 while ((seg = next_segment(len, offset)) != 0) {
614 ret = kvm_clear_guest_page(kvm, gfn, offset, seg);
615 if (ret < 0)
616 return ret;
617 offset = 0;
618 len -= seg;
619 ++gfn;
620 }
621 return 0;
622}
623EXPORT_SYMBOL_GPL(kvm_clear_guest);
624
6aa8b732
AK
625void mark_page_dirty(struct kvm *kvm, gfn_t gfn)
626{
31389947 627 struct kvm_memory_slot *memslot;
6aa8b732 628
3b6fff19 629 gfn = unalias_gfn(kvm, gfn);
7e9d619d
RR
630 memslot = __gfn_to_memslot(kvm, gfn);
631 if (memslot && memslot->dirty_bitmap) {
632 unsigned long rel_gfn = gfn - memslot->base_gfn;
6aa8b732 633
7e9d619d
RR
634 /* avoid RMW */
635 if (!test_bit(rel_gfn, memslot->dirty_bitmap))
636 set_bit(rel_gfn, memslot->dirty_bitmap);
6aa8b732
AK
637 }
638}
639
b6958ce4
ED
640/*
641 * The vCPU has executed a HLT instruction with in-kernel mode enabled.
642 */
8776e519 643void kvm_vcpu_block(struct kvm_vcpu *vcpu)
d3bef15f 644{
b6958ce4
ED
645 DECLARE_WAITQUEUE(wait, current);
646
647 add_wait_queue(&vcpu->wq, &wait);
648
649 /*
650 * We will block until either an interrupt or a signal wakes us up
651 */
c5ec1534
HQ
652 while (!kvm_cpu_has_interrupt(vcpu)
653 && !signal_pending(current)
53e0aa7b 654 && !kvm_arch_vcpu_runnable(vcpu)) {
b6958ce4
ED
655 set_current_state(TASK_INTERRUPTIBLE);
656 vcpu_put(vcpu);
657 schedule();
658 vcpu_load(vcpu);
659 }
d3bef15f 660
c5ec1534 661 __set_current_state(TASK_RUNNING);
b6958ce4 662 remove_wait_queue(&vcpu->wq, &wait);
b6958ce4
ED
663}
664
6aa8b732
AK
665void kvm_resched(struct kvm_vcpu *vcpu)
666{
3fca0365
YD
667 if (!need_resched())
668 return;
6aa8b732 669 cond_resched();
6aa8b732
AK
670}
671EXPORT_SYMBOL_GPL(kvm_resched);
672
e4a533a4 673static int kvm_vcpu_fault(struct vm_area_struct *vma, struct vm_fault *vmf)
9a2bb7f4
AK
674{
675 struct kvm_vcpu *vcpu = vma->vm_file->private_data;
9a2bb7f4
AK
676 struct page *page;
677
e4a533a4 678 if (vmf->pgoff == 0)
039576c0 679 page = virt_to_page(vcpu->run);
e4a533a4 680 else if (vmf->pgoff == KVM_PIO_PAGE_OFFSET)
ad312c7c 681 page = virt_to_page(vcpu->arch.pio_data);
039576c0 682 else
e4a533a4 683 return VM_FAULT_SIGBUS;
9a2bb7f4 684 get_page(page);
e4a533a4 685 vmf->page = page;
686 return 0;
9a2bb7f4
AK
687}
688
689static struct vm_operations_struct kvm_vcpu_vm_ops = {
e4a533a4 690 .fault = kvm_vcpu_fault,
9a2bb7f4
AK
691};
692
693static int kvm_vcpu_mmap(struct file *file, struct vm_area_struct *vma)
694{
695 vma->vm_ops = &kvm_vcpu_vm_ops;
696 return 0;
697}
698
bccf2150
AK
699static int kvm_vcpu_release(struct inode *inode, struct file *filp)
700{
701 struct kvm_vcpu *vcpu = filp->private_data;
702
703 fput(vcpu->kvm->filp);
704 return 0;
705}
706
707static struct file_operations kvm_vcpu_fops = {
708 .release = kvm_vcpu_release,
709 .unlocked_ioctl = kvm_vcpu_ioctl,
710 .compat_ioctl = kvm_vcpu_ioctl,
9a2bb7f4 711 .mmap = kvm_vcpu_mmap,
bccf2150
AK
712};
713
714/*
715 * Allocates an inode for the vcpu.
716 */
717static int create_vcpu_fd(struct kvm_vcpu *vcpu)
718{
719 int fd, r;
720 struct inode *inode;
721 struct file *file;
722
d6d28168
AK
723 r = anon_inode_getfd(&fd, &inode, &file,
724 "kvm-vcpu", &kvm_vcpu_fops, vcpu);
725 if (r)
726 return r;
bccf2150 727 atomic_inc(&vcpu->kvm->filp->f_count);
bccf2150 728 return fd;
bccf2150
AK
729}
730
c5ea7660
AK
731/*
732 * Creates some virtual cpus. Good luck creating more than one.
733 */
734static int kvm_vm_ioctl_create_vcpu(struct kvm *kvm, int n)
735{
736 int r;
737 struct kvm_vcpu *vcpu;
738
c5ea7660 739 if (!valid_vcpu(n))
fb3f0f51 740 return -EINVAL;
c5ea7660 741
e9b11c17 742 vcpu = kvm_arch_vcpu_create(kvm, n);
fb3f0f51
RR
743 if (IS_ERR(vcpu))
744 return PTR_ERR(vcpu);
c5ea7660 745
15ad7146
AK
746 preempt_notifier_init(&vcpu->preempt_notifier, &kvm_preempt_ops);
747
26e5215f
AK
748 r = kvm_arch_vcpu_setup(vcpu);
749 if (r)
750 goto vcpu_destroy;
751
11ec2804 752 mutex_lock(&kvm->lock);
fb3f0f51
RR
753 if (kvm->vcpus[n]) {
754 r = -EEXIST;
11ec2804 755 mutex_unlock(&kvm->lock);
e9b11c17 756 goto vcpu_destroy;
fb3f0f51
RR
757 }
758 kvm->vcpus[n] = vcpu;
11ec2804 759 mutex_unlock(&kvm->lock);
c5ea7660 760
fb3f0f51 761 /* Now it's all set up, let userspace reach it */
bccf2150
AK
762 r = create_vcpu_fd(vcpu);
763 if (r < 0)
fb3f0f51
RR
764 goto unlink;
765 return r;
39c3b86e 766
fb3f0f51 767unlink:
11ec2804 768 mutex_lock(&kvm->lock);
fb3f0f51 769 kvm->vcpus[n] = NULL;
11ec2804 770 mutex_unlock(&kvm->lock);
e9b11c17 771vcpu_destroy:
d40ccc62 772 kvm_arch_vcpu_destroy(vcpu);
c5ea7660
AK
773 return r;
774}
775
1961d276
AK
776static int kvm_vcpu_ioctl_set_sigmask(struct kvm_vcpu *vcpu, sigset_t *sigset)
777{
778 if (sigset) {
779 sigdelsetmask(sigset, sigmask(SIGKILL)|sigmask(SIGSTOP));
780 vcpu->sigset_active = 1;
781 vcpu->sigset = *sigset;
782 } else
783 vcpu->sigset_active = 0;
784 return 0;
785}
786
bccf2150
AK
787static long kvm_vcpu_ioctl(struct file *filp,
788 unsigned int ioctl, unsigned long arg)
6aa8b732 789{
bccf2150 790 struct kvm_vcpu *vcpu = filp->private_data;
2f366987 791 void __user *argp = (void __user *)arg;
313a3dc7 792 int r;
6aa8b732 793
6d4e4c4f
AK
794 if (vcpu->kvm->mm != current->mm)
795 return -EIO;
6aa8b732 796 switch (ioctl) {
9a2bb7f4 797 case KVM_RUN:
f0fe5108
AK
798 r = -EINVAL;
799 if (arg)
800 goto out;
b6c7a5dc 801 r = kvm_arch_vcpu_ioctl_run(vcpu, vcpu->run);
6aa8b732 802 break;
6aa8b732
AK
803 case KVM_GET_REGS: {
804 struct kvm_regs kvm_regs;
805
bccf2150 806 memset(&kvm_regs, 0, sizeof kvm_regs);
b6c7a5dc 807 r = kvm_arch_vcpu_ioctl_get_regs(vcpu, &kvm_regs);
6aa8b732
AK
808 if (r)
809 goto out;
810 r = -EFAULT;
2f366987 811 if (copy_to_user(argp, &kvm_regs, sizeof kvm_regs))
6aa8b732
AK
812 goto out;
813 r = 0;
814 break;
815 }
816 case KVM_SET_REGS: {
817 struct kvm_regs kvm_regs;
818
819 r = -EFAULT;
2f366987 820 if (copy_from_user(&kvm_regs, argp, sizeof kvm_regs))
6aa8b732 821 goto out;
b6c7a5dc 822 r = kvm_arch_vcpu_ioctl_set_regs(vcpu, &kvm_regs);
6aa8b732
AK
823 if (r)
824 goto out;
825 r = 0;
826 break;
827 }
828 case KVM_GET_SREGS: {
829 struct kvm_sregs kvm_sregs;
830
bccf2150 831 memset(&kvm_sregs, 0, sizeof kvm_sregs);
b6c7a5dc 832 r = kvm_arch_vcpu_ioctl_get_sregs(vcpu, &kvm_sregs);
6aa8b732
AK
833 if (r)
834 goto out;
835 r = -EFAULT;
2f366987 836 if (copy_to_user(argp, &kvm_sregs, sizeof kvm_sregs))
6aa8b732
AK
837 goto out;
838 r = 0;
839 break;
840 }
841 case KVM_SET_SREGS: {
842 struct kvm_sregs kvm_sregs;
843
844 r = -EFAULT;
2f366987 845 if (copy_from_user(&kvm_sregs, argp, sizeof kvm_sregs))
6aa8b732 846 goto out;
b6c7a5dc 847 r = kvm_arch_vcpu_ioctl_set_sregs(vcpu, &kvm_sregs);
6aa8b732
AK
848 if (r)
849 goto out;
850 r = 0;
851 break;
852 }
853 case KVM_TRANSLATE: {
854 struct kvm_translation tr;
855
856 r = -EFAULT;
2f366987 857 if (copy_from_user(&tr, argp, sizeof tr))
6aa8b732 858 goto out;
8b006791 859 r = kvm_arch_vcpu_ioctl_translate(vcpu, &tr);
6aa8b732
AK
860 if (r)
861 goto out;
862 r = -EFAULT;
2f366987 863 if (copy_to_user(argp, &tr, sizeof tr))
6aa8b732
AK
864 goto out;
865 r = 0;
866 break;
867 }
6aa8b732
AK
868 case KVM_DEBUG_GUEST: {
869 struct kvm_debug_guest dbg;
870
871 r = -EFAULT;
2f366987 872 if (copy_from_user(&dbg, argp, sizeof dbg))
6aa8b732 873 goto out;
b6c7a5dc 874 r = kvm_arch_vcpu_ioctl_debug_guest(vcpu, &dbg);
6aa8b732
AK
875 if (r)
876 goto out;
877 r = 0;
878 break;
879 }
1961d276
AK
880 case KVM_SET_SIGNAL_MASK: {
881 struct kvm_signal_mask __user *sigmask_arg = argp;
882 struct kvm_signal_mask kvm_sigmask;
883 sigset_t sigset, *p;
884
885 p = NULL;
886 if (argp) {
887 r = -EFAULT;
888 if (copy_from_user(&kvm_sigmask, argp,
889 sizeof kvm_sigmask))
890 goto out;
891 r = -EINVAL;
892 if (kvm_sigmask.len != sizeof sigset)
893 goto out;
894 r = -EFAULT;
895 if (copy_from_user(&sigset, sigmask_arg->sigset,
896 sizeof sigset))
897 goto out;
898 p = &sigset;
899 }
900 r = kvm_vcpu_ioctl_set_sigmask(vcpu, &sigset);
901 break;
902 }
b8836737
AK
903 case KVM_GET_FPU: {
904 struct kvm_fpu fpu;
905
906 memset(&fpu, 0, sizeof fpu);
d0752060 907 r = kvm_arch_vcpu_ioctl_get_fpu(vcpu, &fpu);
b8836737
AK
908 if (r)
909 goto out;
910 r = -EFAULT;
911 if (copy_to_user(argp, &fpu, sizeof fpu))
912 goto out;
913 r = 0;
914 break;
915 }
916 case KVM_SET_FPU: {
917 struct kvm_fpu fpu;
918
919 r = -EFAULT;
920 if (copy_from_user(&fpu, argp, sizeof fpu))
921 goto out;
d0752060 922 r = kvm_arch_vcpu_ioctl_set_fpu(vcpu, &fpu);
b8836737
AK
923 if (r)
924 goto out;
925 r = 0;
926 break;
927 }
bccf2150 928 default:
313a3dc7 929 r = kvm_arch_vcpu_ioctl(filp, ioctl, arg);
bccf2150
AK
930 }
931out:
932 return r;
933}
934
935static long kvm_vm_ioctl(struct file *filp,
936 unsigned int ioctl, unsigned long arg)
937{
938 struct kvm *kvm = filp->private_data;
939 void __user *argp = (void __user *)arg;
1fe779f8 940 int r;
bccf2150 941
6d4e4c4f
AK
942 if (kvm->mm != current->mm)
943 return -EIO;
bccf2150
AK
944 switch (ioctl) {
945 case KVM_CREATE_VCPU:
946 r = kvm_vm_ioctl_create_vcpu(kvm, arg);
947 if (r < 0)
948 goto out;
949 break;
6fc138d2
IE
950 case KVM_SET_USER_MEMORY_REGION: {
951 struct kvm_userspace_memory_region kvm_userspace_mem;
952
953 r = -EFAULT;
954 if (copy_from_user(&kvm_userspace_mem, argp,
955 sizeof kvm_userspace_mem))
956 goto out;
957
958 r = kvm_vm_ioctl_set_memory_region(kvm, &kvm_userspace_mem, 1);
6aa8b732
AK
959 if (r)
960 goto out;
961 break;
962 }
963 case KVM_GET_DIRTY_LOG: {
964 struct kvm_dirty_log log;
965
966 r = -EFAULT;
2f366987 967 if (copy_from_user(&log, argp, sizeof log))
6aa8b732 968 goto out;
2c6f5df9 969 r = kvm_vm_ioctl_get_dirty_log(kvm, &log);
6aa8b732
AK
970 if (r)
971 goto out;
972 break;
973 }
f17abe9a 974 default:
1fe779f8 975 r = kvm_arch_vm_ioctl(filp, ioctl, arg);
f17abe9a
AK
976 }
977out:
978 return r;
979}
980
e4a533a4 981static int kvm_vm_fault(struct vm_area_struct *vma, struct vm_fault *vmf)
f17abe9a
AK
982{
983 struct kvm *kvm = vma->vm_file->private_data;
f17abe9a
AK
984 struct page *page;
985
e4a533a4 986 if (!kvm_is_visible_gfn(kvm, vmf->pgoff))
987 return VM_FAULT_SIGBUS;
10589a46 988 page = gfn_to_page(kvm, vmf->pgoff);
8a7ae055 989 if (is_error_page(page)) {
b4231d61 990 kvm_release_page_clean(page);
e4a533a4 991 return VM_FAULT_SIGBUS;
8a7ae055 992 }
e4a533a4 993 vmf->page = page;
994 return 0;
f17abe9a
AK
995}
996
997static struct vm_operations_struct kvm_vm_vm_ops = {
e4a533a4 998 .fault = kvm_vm_fault,
f17abe9a
AK
999};
1000
1001static int kvm_vm_mmap(struct file *file, struct vm_area_struct *vma)
1002{
1003 vma->vm_ops = &kvm_vm_vm_ops;
1004 return 0;
1005}
1006
1007static struct file_operations kvm_vm_fops = {
1008 .release = kvm_vm_release,
1009 .unlocked_ioctl = kvm_vm_ioctl,
1010 .compat_ioctl = kvm_vm_ioctl,
1011 .mmap = kvm_vm_mmap,
1012};
1013
1014static int kvm_dev_ioctl_create_vm(void)
1015{
1016 int fd, r;
1017 struct inode *inode;
1018 struct file *file;
1019 struct kvm *kvm;
1020
f17abe9a 1021 kvm = kvm_create_vm();
d6d28168
AK
1022 if (IS_ERR(kvm))
1023 return PTR_ERR(kvm);
1024 r = anon_inode_getfd(&fd, &inode, &file, "kvm-vm", &kvm_vm_fops, kvm);
1025 if (r) {
1026 kvm_destroy_vm(kvm);
1027 return r;
f17abe9a
AK
1028 }
1029
bccf2150 1030 kvm->filp = file;
f17abe9a 1031
f17abe9a 1032 return fd;
f17abe9a
AK
1033}
1034
1035static long kvm_dev_ioctl(struct file *filp,
1036 unsigned int ioctl, unsigned long arg)
1037{
1038 void __user *argp = (void __user *)arg;
07c45a36 1039 long r = -EINVAL;
f17abe9a
AK
1040
1041 switch (ioctl) {
1042 case KVM_GET_API_VERSION:
f0fe5108
AK
1043 r = -EINVAL;
1044 if (arg)
1045 goto out;
f17abe9a
AK
1046 r = KVM_API_VERSION;
1047 break;
1048 case KVM_CREATE_VM:
f0fe5108
AK
1049 r = -EINVAL;
1050 if (arg)
1051 goto out;
f17abe9a
AK
1052 r = kvm_dev_ioctl_create_vm();
1053 break;
018d00d2
ZX
1054 case KVM_CHECK_EXTENSION:
1055 r = kvm_dev_ioctl_check_extension((long)argp);
5d308f45 1056 break;
07c45a36
AK
1057 case KVM_GET_VCPU_MMAP_SIZE:
1058 r = -EINVAL;
1059 if (arg)
1060 goto out;
039576c0 1061 r = 2 * PAGE_SIZE;
07c45a36 1062 break;
6aa8b732 1063 default:
043405e1 1064 return kvm_arch_dev_ioctl(filp, ioctl, arg);
6aa8b732
AK
1065 }
1066out:
1067 return r;
1068}
1069
6aa8b732 1070static struct file_operations kvm_chardev_ops = {
6aa8b732
AK
1071 .unlocked_ioctl = kvm_dev_ioctl,
1072 .compat_ioctl = kvm_dev_ioctl,
6aa8b732
AK
1073};
1074
1075static struct miscdevice kvm_dev = {
bbe4432e 1076 KVM_MINOR,
6aa8b732
AK
1077 "kvm",
1078 &kvm_chardev_ops,
1079};
1080
1b6c0168
AK
1081static void hardware_enable(void *junk)
1082{
1083 int cpu = raw_smp_processor_id();
1084
1085 if (cpu_isset(cpu, cpus_hardware_enabled))
1086 return;
1087 cpu_set(cpu, cpus_hardware_enabled);
e9b11c17 1088 kvm_arch_hardware_enable(NULL);
1b6c0168
AK
1089}
1090
1091static void hardware_disable(void *junk)
1092{
1093 int cpu = raw_smp_processor_id();
1094
1095 if (!cpu_isset(cpu, cpus_hardware_enabled))
1096 return;
1097 cpu_clear(cpu, cpus_hardware_enabled);
1098 decache_vcpus_on_cpu(cpu);
e9b11c17 1099 kvm_arch_hardware_disable(NULL);
1b6c0168
AK
1100}
1101
774c47f1
AK
1102static int kvm_cpu_hotplug(struct notifier_block *notifier, unsigned long val,
1103 void *v)
1104{
1105 int cpu = (long)v;
1106
1a6f4d7f 1107 val &= ~CPU_TASKS_FROZEN;
774c47f1 1108 switch (val) {
cec9ad27 1109 case CPU_DYING:
6ec8a856
AK
1110 printk(KERN_INFO "kvm: disabling virtualization on CPU%d\n",
1111 cpu);
1112 hardware_disable(NULL);
1113 break;
774c47f1 1114 case CPU_UP_CANCELED:
43934a38
JK
1115 printk(KERN_INFO "kvm: disabling virtualization on CPU%d\n",
1116 cpu);
1b6c0168 1117 smp_call_function_single(cpu, hardware_disable, NULL, 0, 1);
774c47f1 1118 break;
43934a38
JK
1119 case CPU_ONLINE:
1120 printk(KERN_INFO "kvm: enabling virtualization on CPU%d\n",
1121 cpu);
1b6c0168 1122 smp_call_function_single(cpu, hardware_enable, NULL, 0, 1);
774c47f1
AK
1123 break;
1124 }
1125 return NOTIFY_OK;
1126}
1127
9a2b85c6 1128static int kvm_reboot(struct notifier_block *notifier, unsigned long val,
d77c26fc 1129 void *v)
9a2b85c6
RR
1130{
1131 if (val == SYS_RESTART) {
1132 /*
1133 * Some (well, at least mine) BIOSes hang on reboot if
1134 * in vmx root mode.
1135 */
1136 printk(KERN_INFO "kvm: exiting hardware virtualization\n");
1137 on_each_cpu(hardware_disable, NULL, 0, 1);
1138 }
1139 return NOTIFY_OK;
1140}
1141
1142static struct notifier_block kvm_reboot_notifier = {
1143 .notifier_call = kvm_reboot,
1144 .priority = 0,
1145};
1146
2eeb2e94
GH
1147void kvm_io_bus_init(struct kvm_io_bus *bus)
1148{
1149 memset(bus, 0, sizeof(*bus));
1150}
1151
1152void kvm_io_bus_destroy(struct kvm_io_bus *bus)
1153{
1154 int i;
1155
1156 for (i = 0; i < bus->dev_count; i++) {
1157 struct kvm_io_device *pos = bus->devs[i];
1158
1159 kvm_iodevice_destructor(pos);
1160 }
1161}
1162
1163struct kvm_io_device *kvm_io_bus_find_dev(struct kvm_io_bus *bus, gpa_t addr)
1164{
1165 int i;
1166
1167 for (i = 0; i < bus->dev_count; i++) {
1168 struct kvm_io_device *pos = bus->devs[i];
1169
1170 if (pos->in_range(pos, addr))
1171 return pos;
1172 }
1173
1174 return NULL;
1175}
1176
1177void kvm_io_bus_register_dev(struct kvm_io_bus *bus, struct kvm_io_device *dev)
1178{
1179 BUG_ON(bus->dev_count > (NR_IOBUS_DEVS-1));
1180
1181 bus->devs[bus->dev_count++] = dev;
1182}
1183
774c47f1
AK
1184static struct notifier_block kvm_cpu_notifier = {
1185 .notifier_call = kvm_cpu_hotplug,
1186 .priority = 20, /* must be > scheduler priority */
1187};
1188
8b88b099 1189static int vm_stat_get(void *_offset, u64 *val)
ba1389b7
AK
1190{
1191 unsigned offset = (long)_offset;
ba1389b7
AK
1192 struct kvm *kvm;
1193
8b88b099 1194 *val = 0;
ba1389b7
AK
1195 spin_lock(&kvm_lock);
1196 list_for_each_entry(kvm, &vm_list, vm_list)
8b88b099 1197 *val += *(u32 *)((void *)kvm + offset);
ba1389b7 1198 spin_unlock(&kvm_lock);
8b88b099 1199 return 0;
ba1389b7
AK
1200}
1201
1202DEFINE_SIMPLE_ATTRIBUTE(vm_stat_fops, vm_stat_get, NULL, "%llu\n");
1203
8b88b099 1204static int vcpu_stat_get(void *_offset, u64 *val)
1165f5fe
AK
1205{
1206 unsigned offset = (long)_offset;
1165f5fe
AK
1207 struct kvm *kvm;
1208 struct kvm_vcpu *vcpu;
1209 int i;
1210
8b88b099 1211 *val = 0;
1165f5fe
AK
1212 spin_lock(&kvm_lock);
1213 list_for_each_entry(kvm, &vm_list, vm_list)
1214 for (i = 0; i < KVM_MAX_VCPUS; ++i) {
fb3f0f51
RR
1215 vcpu = kvm->vcpus[i];
1216 if (vcpu)
8b88b099 1217 *val += *(u32 *)((void *)vcpu + offset);
1165f5fe
AK
1218 }
1219 spin_unlock(&kvm_lock);
8b88b099 1220 return 0;
1165f5fe
AK
1221}
1222
ba1389b7
AK
1223DEFINE_SIMPLE_ATTRIBUTE(vcpu_stat_fops, vcpu_stat_get, NULL, "%llu\n");
1224
1225static struct file_operations *stat_fops[] = {
1226 [KVM_STAT_VCPU] = &vcpu_stat_fops,
1227 [KVM_STAT_VM] = &vm_stat_fops,
1228};
1165f5fe 1229
a16b043c 1230static void kvm_init_debug(void)
6aa8b732
AK
1231{
1232 struct kvm_stats_debugfs_item *p;
1233
8b6d44c7 1234 debugfs_dir = debugfs_create_dir("kvm", NULL);
6aa8b732 1235 for (p = debugfs_entries; p->name; ++p)
1165f5fe
AK
1236 p->dentry = debugfs_create_file(p->name, 0444, debugfs_dir,
1237 (void *)(long)p->offset,
ba1389b7 1238 stat_fops[p->kind]);
6aa8b732
AK
1239}
1240
1241static void kvm_exit_debug(void)
1242{
1243 struct kvm_stats_debugfs_item *p;
1244
1245 for (p = debugfs_entries; p->name; ++p)
1246 debugfs_remove(p->dentry);
1247 debugfs_remove(debugfs_dir);
1248}
1249
59ae6c6b
AK
1250static int kvm_suspend(struct sys_device *dev, pm_message_t state)
1251{
4267c41a 1252 hardware_disable(NULL);
59ae6c6b
AK
1253 return 0;
1254}
1255
1256static int kvm_resume(struct sys_device *dev)
1257{
4267c41a 1258 hardware_enable(NULL);
59ae6c6b
AK
1259 return 0;
1260}
1261
1262static struct sysdev_class kvm_sysdev_class = {
af5ca3f4 1263 .name = "kvm",
59ae6c6b
AK
1264 .suspend = kvm_suspend,
1265 .resume = kvm_resume,
1266};
1267
1268static struct sys_device kvm_sysdev = {
1269 .id = 0,
1270 .cls = &kvm_sysdev_class,
1271};
1272
cea7bb21 1273struct page *bad_page;
6aa8b732 1274
15ad7146
AK
1275static inline
1276struct kvm_vcpu *preempt_notifier_to_vcpu(struct preempt_notifier *pn)
1277{
1278 return container_of(pn, struct kvm_vcpu, preempt_notifier);
1279}
1280
1281static void kvm_sched_in(struct preempt_notifier *pn, int cpu)
1282{
1283 struct kvm_vcpu *vcpu = preempt_notifier_to_vcpu(pn);
1284
e9b11c17 1285 kvm_arch_vcpu_load(vcpu, cpu);
15ad7146
AK
1286}
1287
1288static void kvm_sched_out(struct preempt_notifier *pn,
1289 struct task_struct *next)
1290{
1291 struct kvm_vcpu *vcpu = preempt_notifier_to_vcpu(pn);
1292
e9b11c17 1293 kvm_arch_vcpu_put(vcpu);
15ad7146
AK
1294}
1295
f8c16bba 1296int kvm_init(void *opaque, unsigned int vcpu_size,
c16f862d 1297 struct module *module)
6aa8b732
AK
1298{
1299 int r;
002c7f7c 1300 int cpu;
6aa8b732 1301
cb498ea2
ZX
1302 kvm_init_debug();
1303
f8c16bba
ZX
1304 r = kvm_arch_init(opaque);
1305 if (r)
d2308784 1306 goto out_fail;
cb498ea2
ZX
1307
1308 bad_page = alloc_page(GFP_KERNEL | __GFP_ZERO);
1309
1310 if (bad_page == NULL) {
1311 r = -ENOMEM;
1312 goto out;
1313 }
1314
e9b11c17 1315 r = kvm_arch_hardware_setup();
6aa8b732 1316 if (r < 0)
d2308784 1317 goto out_free_0;
6aa8b732 1318
002c7f7c
YS
1319 for_each_online_cpu(cpu) {
1320 smp_call_function_single(cpu,
e9b11c17 1321 kvm_arch_check_processor_compat,
002c7f7c
YS
1322 &r, 0, 1);
1323 if (r < 0)
d2308784 1324 goto out_free_1;
002c7f7c
YS
1325 }
1326
1b6c0168 1327 on_each_cpu(hardware_enable, NULL, 0, 1);
774c47f1
AK
1328 r = register_cpu_notifier(&kvm_cpu_notifier);
1329 if (r)
d2308784 1330 goto out_free_2;
6aa8b732
AK
1331 register_reboot_notifier(&kvm_reboot_notifier);
1332
59ae6c6b
AK
1333 r = sysdev_class_register(&kvm_sysdev_class);
1334 if (r)
d2308784 1335 goto out_free_3;
59ae6c6b
AK
1336
1337 r = sysdev_register(&kvm_sysdev);
1338 if (r)
d2308784 1339 goto out_free_4;
59ae6c6b 1340
c16f862d
RR
1341 /* A kmem cache lets us meet the alignment requirements of fx_save. */
1342 kvm_vcpu_cache = kmem_cache_create("kvm_vcpu", vcpu_size,
56919c5c
JP
1343 __alignof__(struct kvm_vcpu),
1344 0, NULL);
c16f862d
RR
1345 if (!kvm_vcpu_cache) {
1346 r = -ENOMEM;
d2308784 1347 goto out_free_5;
c16f862d
RR
1348 }
1349
6aa8b732
AK
1350 kvm_chardev_ops.owner = module;
1351
1352 r = misc_register(&kvm_dev);
1353 if (r) {
d77c26fc 1354 printk(KERN_ERR "kvm: misc device register failed\n");
6aa8b732
AK
1355 goto out_free;
1356 }
1357
15ad7146
AK
1358 kvm_preempt_ops.sched_in = kvm_sched_in;
1359 kvm_preempt_ops.sched_out = kvm_sched_out;
1360
c7addb90 1361 return 0;
6aa8b732
AK
1362
1363out_free:
c16f862d 1364 kmem_cache_destroy(kvm_vcpu_cache);
d2308784 1365out_free_5:
59ae6c6b 1366 sysdev_unregister(&kvm_sysdev);
d2308784 1367out_free_4:
59ae6c6b 1368 sysdev_class_unregister(&kvm_sysdev_class);
d2308784 1369out_free_3:
6aa8b732 1370 unregister_reboot_notifier(&kvm_reboot_notifier);
774c47f1 1371 unregister_cpu_notifier(&kvm_cpu_notifier);
d2308784 1372out_free_2:
1b6c0168 1373 on_each_cpu(hardware_disable, NULL, 0, 1);
d2308784 1374out_free_1:
e9b11c17 1375 kvm_arch_hardware_unsetup();
d2308784
ZX
1376out_free_0:
1377 __free_page(bad_page);
ca45aaae 1378out:
f8c16bba 1379 kvm_arch_exit();
cb498ea2 1380 kvm_exit_debug();
d2308784 1381out_fail:
6aa8b732
AK
1382 return r;
1383}
cb498ea2 1384EXPORT_SYMBOL_GPL(kvm_init);
6aa8b732 1385
cb498ea2 1386void kvm_exit(void)
6aa8b732
AK
1387{
1388 misc_deregister(&kvm_dev);
c16f862d 1389 kmem_cache_destroy(kvm_vcpu_cache);
59ae6c6b
AK
1390 sysdev_unregister(&kvm_sysdev);
1391 sysdev_class_unregister(&kvm_sysdev_class);
6aa8b732 1392 unregister_reboot_notifier(&kvm_reboot_notifier);
59ae6c6b 1393 unregister_cpu_notifier(&kvm_cpu_notifier);
1b6c0168 1394 on_each_cpu(hardware_disable, NULL, 0, 1);
e9b11c17 1395 kvm_arch_hardware_unsetup();
f8c16bba 1396 kvm_arch_exit();
6aa8b732 1397 kvm_exit_debug();
cea7bb21 1398 __free_page(bad_page);
6aa8b732 1399}
cb498ea2 1400EXPORT_SYMBOL_GPL(kvm_exit);