]> git.ipfire.org Git - thirdparty/kernel/stable.git/commitdiff
KVM: s390: Add KVM capability for ESA mode guests
authorHendrik Brueckner <brueckner@linux.ibm.com>
Wed, 1 Apr 2026 15:12:21 +0000 (17:12 +0200)
committerJanosch Frank <frankja@linux.ibm.com>
Thu, 2 Apr 2026 13:37:02 +0000 (15:37 +0200)
Now that all the bits are properly addressed, provide a mechanism
for testing ESA mode guests in nested configurations.

Signed-off-by: Hendrik Brueckner <brueckner@linux.ibm.com>
[farman@us.ibm.com: Updated commit message]
Reviewed-by: Janosch Frank <frankja@linux.ibm.com>
Signed-off-by: Eric Farman <farman@linux.ibm.com>
Signed-off-by: Janosch Frank <frankja@linux.ibm.com>
Documentation/virt/kvm/api.rst
arch/s390/kvm/kvm-s390.c
include/uapi/linux/kvm.h

index 6f85e1b321dd3704dd2916d5ca6ad70315d3f516..682ae9278943d17b442b9cc92ffb7d8a00a1f2e1 100644 (file)
@@ -9428,6 +9428,14 @@ KVM exits with the register state of either the L1 or L2 guest
 depending on which executed at the time of an exit. Userspace must
 take care to differentiate between these cases.
 
+8.47 KVM_CAP_S390_VSIE_ESAMODE
+------------------------------
+
+:Architectures: s390
+
+The presence of this capability indicates that the nested KVM guest can
+start in ESA mode.
+
 9. Known KVM API problems
 =========================
 
index bc7d6fa66eafd83f98957fec07f1b7914b64d365..a583c0a00efd088d26e01501f139a5a1393c28aa 100644 (file)
@@ -629,6 +629,7 @@ int kvm_vm_ioctl_check_extension(struct kvm *kvm, long ext)
        case KVM_CAP_IRQFD_RESAMPLE:
        case KVM_CAP_S390_USER_OPEREXEC:
        case KVM_CAP_S390_KEYOP:
+       case KVM_CAP_S390_VSIE_ESAMODE:
                r = 1;
                break;
        case KVM_CAP_SET_GUEST_DEBUG2:
@@ -926,6 +927,11 @@ int kvm_vm_ioctl_enable_cap(struct kvm *kvm, struct kvm_enable_cap *cap)
                icpt_operexc_on_all_vcpus(kvm);
                r = 0;
                break;
+       case KVM_CAP_S390_VSIE_ESAMODE:
+               VM_EVENT(kvm, 3, "%s", "ENABLE: CAP_S390_VSIE_ESAMODE");
+               kvm->arch.allow_vsie_esamode = 1;
+               r = 0;
+               break;
        default:
                r = -EINVAL;
                break;
index 65500f5db37992f9b3b4c3af26bc4b66f591f904..e658f89d5d3e9b461cf43b95e8c1650284dff293 100644 (file)
@@ -985,6 +985,7 @@ struct kvm_enable_cap {
 #define KVM_CAP_ARM_SEA_TO_USER 245
 #define KVM_CAP_S390_USER_OPEREXEC 246
 #define KVM_CAP_S390_KEYOP 247
+#define KVM_CAP_S390_VSIE_ESAMODE 248
 
 struct kvm_irq_routing_irqchip {
        __u32 irqchip;