blob: f32f843a3631359e49b88169ab8a1eed2b76b946 [file] [log] [blame]
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001/*
Heiko Carstensa53c8fa2012-07-20 11:15:04 +02002 * hosting zSeries kernel virtual machines
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003 *
Heiko Carstensa53c8fa2012-07-20 11:15:04 +02004 * Copyright IBM Corp. 2008, 2009
Heiko Carstensb0c632d2008-03-25 18:47:20 +01005 *
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License (version 2 only)
8 * as published by the Free Software Foundation.
9 *
10 * Author(s): Carsten Otte <cotte@de.ibm.com>
11 * Christian Borntraeger <borntraeger@de.ibm.com>
12 * Heiko Carstens <heiko.carstens@de.ibm.com>
Christian Ehrhardt628eb9b2009-05-25 13:40:51 +020013 * Christian Ehrhardt <ehrhardt@de.ibm.com>
Jason J. Herne15f36eb2012-08-02 10:10:17 -040014 * Jason J. Herne <jjherne@us.ibm.com>
Heiko Carstensb0c632d2008-03-25 18:47:20 +010015 */
16
17#include <linux/compiler.h>
18#include <linux/err.h>
19#include <linux/fs.h>
Christian Borntraegerca872302009-05-12 17:21:49 +020020#include <linux/hrtimer.h>
Heiko Carstensb0c632d2008-03-25 18:47:20 +010021#include <linux/init.h>
22#include <linux/kvm.h>
23#include <linux/kvm_host.h>
24#include <linux/module.h>
Tony Krowiaka374e892014-09-03 10:13:53 +020025#include <linux/random.h>
Heiko Carstensb0c632d2008-03-25 18:47:20 +010026#include <linux/slab.h>
Carsten Otteba5c1e92008-03-25 18:47:26 +010027#include <linux/timer.h>
Thomas Huth41408c22015-02-06 15:01:21 +010028#include <linux/vmalloc.h>
Heiko Carstenscbb870c2010-02-26 22:37:43 +010029#include <asm/asm-offsets.h>
Heiko Carstensb0c632d2008-03-25 18:47:20 +010030#include <asm/lowcore.h>
31#include <asm/pgtable.h>
Heiko Carstensf5daba12009-03-26 15:24:01 +010032#include <asm/nmi.h>
David Howellsa0616cd2012-03-28 18:30:02 +010033#include <asm/switch_to.h>
Jens Freimann6d3da242013-07-03 15:18:35 +020034#include <asm/isc.h>
Christian Borntraeger1526bf92012-05-15 14:15:25 +020035#include <asm/sclp.h>
Christian Borntraeger8f2abe62008-03-25 18:47:23 +010036#include "kvm-s390.h"
Heiko Carstensb0c632d2008-03-25 18:47:20 +010037#include "gaccess.h"
38
David Hildenbrandea2cdd22015-05-20 13:24:02 +020039#define KMSG_COMPONENT "kvm-s390"
40#undef pr_fmt
41#define pr_fmt(fmt) KMSG_COMPONENT ": " fmt
42
Cornelia Huck5786fff2012-07-23 17:20:29 +020043#define CREATE_TRACE_POINTS
44#include "trace.h"
Cornelia Huckade38c32012-07-23 17:20:30 +020045#include "trace-s390.h"
Cornelia Huck5786fff2012-07-23 17:20:29 +020046
Thomas Huth41408c22015-02-06 15:01:21 +010047#define MEM_OP_MAX_SIZE 65536 /* Maximum transfer size for KVM_S390_MEM_OP */
Jens Freimann816c7662014-11-24 17:13:46 +010048#define LOCAL_IRQS 32
49#define VCPU_IRQS_MAX_BUF (sizeof(struct kvm_s390_irq) * \
50 (KVM_MAX_VCPUS + LOCAL_IRQS))
Thomas Huth41408c22015-02-06 15:01:21 +010051
Heiko Carstensb0c632d2008-03-25 18:47:20 +010052#define VCPU_STAT(x) offsetof(struct kvm_vcpu, stat.x), KVM_STAT_VCPU
53
54struct kvm_stats_debugfs_item debugfs_entries[] = {
55 { "userspace_handled", VCPU_STAT(exit_userspace) },
Christian Borntraeger0eaeafa2008-05-07 09:22:53 +020056 { "exit_null", VCPU_STAT(exit_null) },
Christian Borntraeger8f2abe62008-03-25 18:47:23 +010057 { "exit_validity", VCPU_STAT(exit_validity) },
58 { "exit_stop_request", VCPU_STAT(exit_stop_request) },
59 { "exit_external_request", VCPU_STAT(exit_external_request) },
60 { "exit_external_interrupt", VCPU_STAT(exit_external_interrupt) },
Carsten Otteba5c1e92008-03-25 18:47:26 +010061 { "exit_instruction", VCPU_STAT(exit_instruction) },
62 { "exit_program_interruption", VCPU_STAT(exit_program_interruption) },
63 { "exit_instr_and_program_int", VCPU_STAT(exit_instr_and_program) },
Paolo Bonzinif7819512015-02-04 18:20:58 +010064 { "halt_successful_poll", VCPU_STAT(halt_successful_poll) },
David Hildenbrandce2e4f02014-07-11 10:00:43 +020065 { "halt_wakeup", VCPU_STAT(halt_wakeup) },
Christian Borntraegerf5e10b02008-07-25 15:52:44 +020066 { "instruction_lctlg", VCPU_STAT(instruction_lctlg) },
Carsten Otteba5c1e92008-03-25 18:47:26 +010067 { "instruction_lctl", VCPU_STAT(instruction_lctl) },
David Hildenbrandaba07502014-01-23 10:47:13 +010068 { "instruction_stctl", VCPU_STAT(instruction_stctl) },
69 { "instruction_stctg", VCPU_STAT(instruction_stctg) },
Carsten Otteba5c1e92008-03-25 18:47:26 +010070 { "deliver_emergency_signal", VCPU_STAT(deliver_emergency_signal) },
Christian Ehrhardt7697e71f2011-10-18 12:27:15 +020071 { "deliver_external_call", VCPU_STAT(deliver_external_call) },
Carsten Otteba5c1e92008-03-25 18:47:26 +010072 { "deliver_service_signal", VCPU_STAT(deliver_service_signal) },
73 { "deliver_virtio_interrupt", VCPU_STAT(deliver_virtio_interrupt) },
74 { "deliver_stop_signal", VCPU_STAT(deliver_stop_signal) },
75 { "deliver_prefix_signal", VCPU_STAT(deliver_prefix_signal) },
76 { "deliver_restart_signal", VCPU_STAT(deliver_restart_signal) },
77 { "deliver_program_interruption", VCPU_STAT(deliver_program_int) },
78 { "exit_wait_state", VCPU_STAT(exit_wait_state) },
Christian Borntraeger69d0d3a2013-06-12 13:54:53 +020079 { "instruction_pfmf", VCPU_STAT(instruction_pfmf) },
Christian Borntraeger453423d2008-03-25 18:47:29 +010080 { "instruction_stidp", VCPU_STAT(instruction_stidp) },
81 { "instruction_spx", VCPU_STAT(instruction_spx) },
82 { "instruction_stpx", VCPU_STAT(instruction_stpx) },
83 { "instruction_stap", VCPU_STAT(instruction_stap) },
84 { "instruction_storage_key", VCPU_STAT(instruction_storage_key) },
Heiko Carstens8a2422342014-01-10 14:33:28 +010085 { "instruction_ipte_interlock", VCPU_STAT(instruction_ipte_interlock) },
Christian Borntraeger453423d2008-03-25 18:47:29 +010086 { "instruction_stsch", VCPU_STAT(instruction_stsch) },
87 { "instruction_chsc", VCPU_STAT(instruction_chsc) },
Konstantin Weitzb31288f2013-04-17 17:36:29 +020088 { "instruction_essa", VCPU_STAT(instruction_essa) },
Christian Borntraeger453423d2008-03-25 18:47:29 +010089 { "instruction_stsi", VCPU_STAT(instruction_stsi) },
90 { "instruction_stfl", VCPU_STAT(instruction_stfl) },
Christian Borntraegerbb25b9b2011-07-24 10:48:17 +020091 { "instruction_tprot", VCPU_STAT(instruction_tprot) },
Christian Borntraeger5288fbf2008-03-25 18:47:31 +010092 { "instruction_sigp_sense", VCPU_STAT(instruction_sigp_sense) },
Cornelia Huckbd59d3a2011-11-17 11:00:42 +010093 { "instruction_sigp_sense_running", VCPU_STAT(instruction_sigp_sense_running) },
Christian Ehrhardt7697e71f2011-10-18 12:27:15 +020094 { "instruction_sigp_external_call", VCPU_STAT(instruction_sigp_external_call) },
Christian Borntraeger5288fbf2008-03-25 18:47:31 +010095 { "instruction_sigp_emergency", VCPU_STAT(instruction_sigp_emergency) },
David Hildenbrand42cb0c92014-05-23 12:25:11 +020096 { "instruction_sigp_cond_emergency", VCPU_STAT(instruction_sigp_cond_emergency) },
97 { "instruction_sigp_start", VCPU_STAT(instruction_sigp_start) },
Christian Borntraeger5288fbf2008-03-25 18:47:31 +010098 { "instruction_sigp_stop", VCPU_STAT(instruction_sigp_stop) },
David Hildenbrand42cb0c92014-05-23 12:25:11 +020099 { "instruction_sigp_stop_store_status", VCPU_STAT(instruction_sigp_stop_store_status) },
100 { "instruction_sigp_store_status", VCPU_STAT(instruction_sigp_store_status) },
Eric Farmancd7b4b62015-02-12 09:06:34 -0500101 { "instruction_sigp_store_adtl_status", VCPU_STAT(instruction_sigp_store_adtl_status) },
Christian Borntraeger5288fbf2008-03-25 18:47:31 +0100102 { "instruction_sigp_set_arch", VCPU_STAT(instruction_sigp_arch) },
103 { "instruction_sigp_set_prefix", VCPU_STAT(instruction_sigp_prefix) },
104 { "instruction_sigp_restart", VCPU_STAT(instruction_sigp_restart) },
David Hildenbrand42cb0c92014-05-23 12:25:11 +0200105 { "instruction_sigp_cpu_reset", VCPU_STAT(instruction_sigp_cpu_reset) },
106 { "instruction_sigp_init_cpu_reset", VCPU_STAT(instruction_sigp_init_cpu_reset) },
107 { "instruction_sigp_unknown", VCPU_STAT(instruction_sigp_unknown) },
Christian Borntraeger388186b2011-10-30 15:17:03 +0100108 { "diagnose_10", VCPU_STAT(diagnose_10) },
Christian Borntraegere28acfe2008-03-25 18:47:34 +0100109 { "diagnose_44", VCPU_STAT(diagnose_44) },
Konstantin Weitz41628d32012-04-25 15:30:38 +0200110 { "diagnose_9c", VCPU_STAT(diagnose_9c) },
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100111 { NULL }
112};
113
Michael Mueller9d8d5782015-02-02 15:42:51 +0100114/* upper facilities limit for kvm */
115unsigned long kvm_s390_fac_list_mask[] = {
Christian Borntraegera3ed8da2015-03-18 13:54:31 +0100116 0xffe6fffbfcfdfc40UL,
Guenther Hutzl53df84f2015-02-18 11:13:03 +0100117 0x005e800000000000UL,
Michael Mueller9d8d5782015-02-02 15:42:51 +0100118};
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100119
Michael Mueller9d8d5782015-02-02 15:42:51 +0100120unsigned long kvm_s390_fac_list_mask_size(void)
Michael Mueller78c4b592013-07-26 15:04:04 +0200121{
Michael Mueller9d8d5782015-02-02 15:42:51 +0100122 BUILD_BUG_ON(ARRAY_SIZE(kvm_s390_fac_list_mask) > S390_ARCH_FAC_MASK_SIZE_U64);
123 return ARRAY_SIZE(kvm_s390_fac_list_mask);
Michael Mueller78c4b592013-07-26 15:04:04 +0200124}
125
Michael Mueller9d8d5782015-02-02 15:42:51 +0100126static struct gmap_notifier gmap_notifier;
127
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100128/* Section: not file related */
Radim Krčmář13a34e02014-08-28 15:13:03 +0200129int kvm_arch_hardware_enable(void)
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100130{
131 /* every s390 is virtualization enabled ;-) */
Alexander Graf10474ae2009-09-15 11:37:46 +0200132 return 0;
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100133}
134
Christian Borntraeger2c70fe42013-05-17 14:41:36 +0200135static void kvm_gmap_notifier(struct gmap *gmap, unsigned long address);
136
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100137int kvm_arch_hardware_setup(void)
138{
Christian Borntraeger2c70fe42013-05-17 14:41:36 +0200139 gmap_notifier.notifier_call = kvm_gmap_notifier;
140 gmap_register_ipte_notifier(&gmap_notifier);
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100141 return 0;
142}
143
144void kvm_arch_hardware_unsetup(void)
145{
Christian Borntraeger2c70fe42013-05-17 14:41:36 +0200146 gmap_unregister_ipte_notifier(&gmap_notifier);
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100147}
148
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100149int kvm_arch_init(void *opaque)
150{
Cornelia Huck84877d92014-09-02 10:27:35 +0100151 /* Register floating interrupt controller interface. */
152 return kvm_register_device_ops(&kvm_flic_ops, KVM_DEV_TYPE_FLIC);
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100153}
154
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100155/* Section: device related */
156long kvm_arch_dev_ioctl(struct file *filp,
157 unsigned int ioctl, unsigned long arg)
158{
159 if (ioctl == KVM_S390_ENABLE_SIE)
160 return s390_enable_sie();
161 return -EINVAL;
162}
163
Alexander Graf784aa3d2014-07-14 18:27:35 +0200164int kvm_vm_ioctl_check_extension(struct kvm *kvm, long ext)
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100165{
Carsten Otted7b0b5e2009-11-19 14:21:16 +0100166 int r;
167
Carsten Otte2bd0ac42008-07-25 15:49:13 +0200168 switch (ext) {
Carsten Otted7b0b5e2009-11-19 14:21:16 +0100169 case KVM_CAP_S390_PSW:
Christian Borntraegerb6cf8782011-09-20 17:07:29 +0200170 case KVM_CAP_S390_GMAP:
Christian Borntraeger52e16b12011-11-17 11:00:44 +0100171 case KVM_CAP_SYNC_MMU:
Carsten Otte1efd0f52012-01-04 10:25:29 +0100172#ifdef CONFIG_KVM_S390_UCONTROL
173 case KVM_CAP_S390_UCONTROL:
174#endif
Dominik Dingel3c038e62013-10-07 17:11:48 +0200175 case KVM_CAP_ASYNC_PF:
Christian Borntraeger60b413c2012-01-11 11:20:31 +0100176 case KVM_CAP_SYNC_REGS:
Carsten Otte14eebd92012-05-15 14:15:26 +0200177 case KVM_CAP_ONE_REG:
Cornelia Huckd6712df2012-12-20 15:32:11 +0100178 case KVM_CAP_ENABLE_CAP:
Cornelia Huckfa6b7fe2012-12-20 15:32:12 +0100179 case KVM_CAP_S390_CSS_SUPPORT:
Cornelia Huck10ccaa12013-02-28 12:33:21 +0100180 case KVM_CAP_IOEVENTFD:
Jens Freimannc05c4182013-10-07 16:13:45 +0200181 case KVM_CAP_DEVICE_CTRL:
Cornelia Huckd938dc52013-10-23 18:26:34 +0200182 case KVM_CAP_ENABLE_CAP_VM:
Cornelia Huck78599d92014-07-15 09:54:39 +0200183 case KVM_CAP_S390_IRQCHIP:
Dominik Dingelf2061652014-04-09 13:13:00 +0200184 case KVM_CAP_VM_ATTRIBUTES:
David Hildenbrand6352e4d2014-04-10 17:35:00 +0200185 case KVM_CAP_MP_STATE:
Jens Freimann47b43c52014-11-11 20:57:06 +0100186 case KVM_CAP_S390_INJECT_IRQ:
David Hildenbrand2444b352014-10-09 14:10:13 +0200187 case KVM_CAP_S390_USER_SIGP:
Ekaterina Tumanovae44fc8c2015-01-30 16:55:56 +0100188 case KVM_CAP_S390_USER_STSI:
Jason J. Herne30ee2a92014-09-23 09:23:01 -0400189 case KVM_CAP_S390_SKEYS:
Jens Freimann816c7662014-11-24 17:13:46 +0100190 case KVM_CAP_S390_IRQ_STATE:
Carsten Otted7b0b5e2009-11-19 14:21:16 +0100191 r = 1;
192 break;
Thomas Huth41408c22015-02-06 15:01:21 +0100193 case KVM_CAP_S390_MEM_OP:
194 r = MEM_OP_MAX_SIZE;
195 break;
Christian Borntraegere726b1b2012-05-02 10:50:38 +0200196 case KVM_CAP_NR_VCPUS:
197 case KVM_CAP_MAX_VCPUS:
198 r = KVM_MAX_VCPUS;
199 break;
Nick Wange1e2e602013-03-25 17:22:58 +0100200 case KVM_CAP_NR_MEMSLOTS:
201 r = KVM_USER_MEM_SLOTS;
202 break;
Christian Borntraeger1526bf92012-05-15 14:15:25 +0200203 case KVM_CAP_S390_COW:
Martin Schwidefskyabf09be2012-11-07 13:17:37 +0100204 r = MACHINE_HAS_ESOP;
Christian Borntraeger1526bf92012-05-15 14:15:25 +0200205 break;
Eric Farman68c55752014-06-09 10:57:26 -0400206 case KVM_CAP_S390_VECTOR_REGISTERS:
207 r = MACHINE_HAS_VX;
208 break;
Carsten Otte2bd0ac42008-07-25 15:49:13 +0200209 default:
Carsten Otted7b0b5e2009-11-19 14:21:16 +0100210 r = 0;
Carsten Otte2bd0ac42008-07-25 15:49:13 +0200211 }
Carsten Otted7b0b5e2009-11-19 14:21:16 +0100212 return r;
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100213}
214
Jason J. Herne15f36eb2012-08-02 10:10:17 -0400215static void kvm_s390_sync_dirty_log(struct kvm *kvm,
216 struct kvm_memory_slot *memslot)
217{
218 gfn_t cur_gfn, last_gfn;
219 unsigned long address;
220 struct gmap *gmap = kvm->arch.gmap;
221
222 down_read(&gmap->mm->mmap_sem);
223 /* Loop over all guest pages */
224 last_gfn = memslot->base_gfn + memslot->npages;
225 for (cur_gfn = memslot->base_gfn; cur_gfn <= last_gfn; cur_gfn++) {
226 address = gfn_to_hva_memslot(memslot, cur_gfn);
227
228 if (gmap_test_and_clear_dirty(address, gmap))
229 mark_page_dirty(kvm, cur_gfn);
230 }
231 up_read(&gmap->mm->mmap_sem);
232}
233
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100234/* Section: vm related */
235/*
236 * Get (and clear) the dirty memory log for a memory slot.
237 */
238int kvm_vm_ioctl_get_dirty_log(struct kvm *kvm,
239 struct kvm_dirty_log *log)
240{
Jason J. Herne15f36eb2012-08-02 10:10:17 -0400241 int r;
242 unsigned long n;
Paolo Bonzini9f6b8022015-05-17 16:20:07 +0200243 struct kvm_memslots *slots;
Jason J. Herne15f36eb2012-08-02 10:10:17 -0400244 struct kvm_memory_slot *memslot;
245 int is_dirty = 0;
246
247 mutex_lock(&kvm->slots_lock);
248
249 r = -EINVAL;
250 if (log->slot >= KVM_USER_MEM_SLOTS)
251 goto out;
252
Paolo Bonzini9f6b8022015-05-17 16:20:07 +0200253 slots = kvm_memslots(kvm);
254 memslot = id_to_memslot(slots, log->slot);
Jason J. Herne15f36eb2012-08-02 10:10:17 -0400255 r = -ENOENT;
256 if (!memslot->dirty_bitmap)
257 goto out;
258
259 kvm_s390_sync_dirty_log(kvm, memslot);
260 r = kvm_get_dirty_log(kvm, log, &is_dirty);
261 if (r)
262 goto out;
263
264 /* Clear the dirty log */
265 if (is_dirty) {
266 n = kvm_dirty_bitmap_bytes(memslot);
267 memset(memslot->dirty_bitmap, 0, n);
268 }
269 r = 0;
270out:
271 mutex_unlock(&kvm->slots_lock);
272 return r;
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100273}
274
Cornelia Huckd938dc52013-10-23 18:26:34 +0200275static int kvm_vm_ioctl_enable_cap(struct kvm *kvm, struct kvm_enable_cap *cap)
276{
277 int r;
278
279 if (cap->flags)
280 return -EINVAL;
281
282 switch (cap->cap) {
Cornelia Huck84223592013-07-15 13:36:01 +0200283 case KVM_CAP_S390_IRQCHIP:
284 kvm->arch.use_irqchip = 1;
285 r = 0;
286 break;
David Hildenbrand2444b352014-10-09 14:10:13 +0200287 case KVM_CAP_S390_USER_SIGP:
288 kvm->arch.user_sigp = 1;
289 r = 0;
290 break;
Eric Farman68c55752014-06-09 10:57:26 -0400291 case KVM_CAP_S390_VECTOR_REGISTERS:
Michael Mueller18280d82015-03-16 16:05:41 +0100292 if (MACHINE_HAS_VX) {
293 set_kvm_facility(kvm->arch.model.fac->mask, 129);
294 set_kvm_facility(kvm->arch.model.fac->list, 129);
295 r = 0;
296 } else
297 r = -EINVAL;
Eric Farman68c55752014-06-09 10:57:26 -0400298 break;
Ekaterina Tumanovae44fc8c2015-01-30 16:55:56 +0100299 case KVM_CAP_S390_USER_STSI:
300 kvm->arch.user_stsi = 1;
301 r = 0;
302 break;
Cornelia Huckd938dc52013-10-23 18:26:34 +0200303 default:
304 r = -EINVAL;
305 break;
306 }
307 return r;
308}
309
Dominik Dingel8c0a7ce2014-10-31 14:10:41 +0100310static int kvm_s390_get_mem_control(struct kvm *kvm, struct kvm_device_attr *attr)
311{
312 int ret;
313
314 switch (attr->attr) {
315 case KVM_S390_VM_MEM_LIMIT_SIZE:
316 ret = 0;
317 if (put_user(kvm->arch.gmap->asce_end, (u64 __user *)attr->addr))
318 ret = -EFAULT;
319 break;
320 default:
321 ret = -ENXIO;
322 break;
323 }
324 return ret;
325}
326
327static int kvm_s390_set_mem_control(struct kvm *kvm, struct kvm_device_attr *attr)
Dominik Dingel4f718ea2014-04-09 13:13:00 +0200328{
329 int ret;
330 unsigned int idx;
331 switch (attr->attr) {
332 case KVM_S390_VM_MEM_ENABLE_CMMA:
333 ret = -EBUSY;
334 mutex_lock(&kvm->lock);
335 if (atomic_read(&kvm->online_vcpus) == 0) {
336 kvm->arch.use_cmma = 1;
337 ret = 0;
338 }
339 mutex_unlock(&kvm->lock);
340 break;
341 case KVM_S390_VM_MEM_CLR_CMMA:
342 mutex_lock(&kvm->lock);
343 idx = srcu_read_lock(&kvm->srcu);
Dominik Dingela13cff32014-10-23 12:07:14 +0200344 s390_reset_cmma(kvm->arch.gmap->mm);
Dominik Dingel4f718ea2014-04-09 13:13:00 +0200345 srcu_read_unlock(&kvm->srcu, idx);
346 mutex_unlock(&kvm->lock);
347 ret = 0;
348 break;
Dominik Dingel8c0a7ce2014-10-31 14:10:41 +0100349 case KVM_S390_VM_MEM_LIMIT_SIZE: {
350 unsigned long new_limit;
351
352 if (kvm_is_ucontrol(kvm))
353 return -EINVAL;
354
355 if (get_user(new_limit, (u64 __user *)attr->addr))
356 return -EFAULT;
357
358 if (new_limit > kvm->arch.gmap->asce_end)
359 return -E2BIG;
360
361 ret = -EBUSY;
362 mutex_lock(&kvm->lock);
363 if (atomic_read(&kvm->online_vcpus) == 0) {
364 /* gmap_alloc will round the limit up */
365 struct gmap *new = gmap_alloc(current->mm, new_limit);
366
367 if (!new) {
368 ret = -ENOMEM;
369 } else {
370 gmap_free(kvm->arch.gmap);
371 new->private = kvm;
372 kvm->arch.gmap = new;
373 ret = 0;
374 }
375 }
376 mutex_unlock(&kvm->lock);
377 break;
378 }
Dominik Dingel4f718ea2014-04-09 13:13:00 +0200379 default:
380 ret = -ENXIO;
381 break;
382 }
383 return ret;
384}
385
Tony Krowiaka374e892014-09-03 10:13:53 +0200386static void kvm_s390_vcpu_crypto_setup(struct kvm_vcpu *vcpu);
387
388static int kvm_s390_vm_set_crypto(struct kvm *kvm, struct kvm_device_attr *attr)
389{
390 struct kvm_vcpu *vcpu;
391 int i;
392
Michael Mueller9d8d5782015-02-02 15:42:51 +0100393 if (!test_kvm_facility(kvm, 76))
Tony Krowiaka374e892014-09-03 10:13:53 +0200394 return -EINVAL;
395
396 mutex_lock(&kvm->lock);
397 switch (attr->attr) {
398 case KVM_S390_VM_CRYPTO_ENABLE_AES_KW:
399 get_random_bytes(
400 kvm->arch.crypto.crycb->aes_wrapping_key_mask,
401 sizeof(kvm->arch.crypto.crycb->aes_wrapping_key_mask));
402 kvm->arch.crypto.aes_kw = 1;
403 break;
404 case KVM_S390_VM_CRYPTO_ENABLE_DEA_KW:
405 get_random_bytes(
406 kvm->arch.crypto.crycb->dea_wrapping_key_mask,
407 sizeof(kvm->arch.crypto.crycb->dea_wrapping_key_mask));
408 kvm->arch.crypto.dea_kw = 1;
409 break;
410 case KVM_S390_VM_CRYPTO_DISABLE_AES_KW:
411 kvm->arch.crypto.aes_kw = 0;
412 memset(kvm->arch.crypto.crycb->aes_wrapping_key_mask, 0,
413 sizeof(kvm->arch.crypto.crycb->aes_wrapping_key_mask));
414 break;
415 case KVM_S390_VM_CRYPTO_DISABLE_DEA_KW:
416 kvm->arch.crypto.dea_kw = 0;
417 memset(kvm->arch.crypto.crycb->dea_wrapping_key_mask, 0,
418 sizeof(kvm->arch.crypto.crycb->dea_wrapping_key_mask));
419 break;
420 default:
421 mutex_unlock(&kvm->lock);
422 return -ENXIO;
423 }
424
425 kvm_for_each_vcpu(i, vcpu, kvm) {
426 kvm_s390_vcpu_crypto_setup(vcpu);
427 exit_sie(vcpu);
428 }
429 mutex_unlock(&kvm->lock);
430 return 0;
431}
432
Jason J. Herne72f25022014-11-25 09:46:02 -0500433static int kvm_s390_set_tod_high(struct kvm *kvm, struct kvm_device_attr *attr)
434{
435 u8 gtod_high;
436
437 if (copy_from_user(&gtod_high, (void __user *)attr->addr,
438 sizeof(gtod_high)))
439 return -EFAULT;
440
441 if (gtod_high != 0)
442 return -EINVAL;
443
444 return 0;
445}
446
447static int kvm_s390_set_tod_low(struct kvm *kvm, struct kvm_device_attr *attr)
448{
449 struct kvm_vcpu *cur_vcpu;
450 unsigned int vcpu_idx;
451 u64 host_tod, gtod;
452 int r;
453
454 if (copy_from_user(&gtod, (void __user *)attr->addr, sizeof(gtod)))
455 return -EFAULT;
456
457 r = store_tod_clock(&host_tod);
458 if (r)
459 return r;
460
461 mutex_lock(&kvm->lock);
462 kvm->arch.epoch = gtod - host_tod;
Christian Borntraeger27406cd2015-04-14 12:17:34 +0200463 kvm_s390_vcpu_block_all(kvm);
464 kvm_for_each_vcpu(vcpu_idx, cur_vcpu, kvm)
Jason J. Herne72f25022014-11-25 09:46:02 -0500465 cur_vcpu->arch.sie_block->epoch = kvm->arch.epoch;
Christian Borntraeger27406cd2015-04-14 12:17:34 +0200466 kvm_s390_vcpu_unblock_all(kvm);
Jason J. Herne72f25022014-11-25 09:46:02 -0500467 mutex_unlock(&kvm->lock);
468 return 0;
469}
470
471static int kvm_s390_set_tod(struct kvm *kvm, struct kvm_device_attr *attr)
472{
473 int ret;
474
475 if (attr->flags)
476 return -EINVAL;
477
478 switch (attr->attr) {
479 case KVM_S390_VM_TOD_HIGH:
480 ret = kvm_s390_set_tod_high(kvm, attr);
481 break;
482 case KVM_S390_VM_TOD_LOW:
483 ret = kvm_s390_set_tod_low(kvm, attr);
484 break;
485 default:
486 ret = -ENXIO;
487 break;
488 }
489 return ret;
490}
491
492static int kvm_s390_get_tod_high(struct kvm *kvm, struct kvm_device_attr *attr)
493{
494 u8 gtod_high = 0;
495
496 if (copy_to_user((void __user *)attr->addr, &gtod_high,
497 sizeof(gtod_high)))
498 return -EFAULT;
499
500 return 0;
501}
502
503static int kvm_s390_get_tod_low(struct kvm *kvm, struct kvm_device_attr *attr)
504{
505 u64 host_tod, gtod;
506 int r;
507
508 r = store_tod_clock(&host_tod);
509 if (r)
510 return r;
511
512 gtod = host_tod + kvm->arch.epoch;
513 if (copy_to_user((void __user *)attr->addr, &gtod, sizeof(gtod)))
514 return -EFAULT;
515
516 return 0;
517}
518
519static int kvm_s390_get_tod(struct kvm *kvm, struct kvm_device_attr *attr)
520{
521 int ret;
522
523 if (attr->flags)
524 return -EINVAL;
525
526 switch (attr->attr) {
527 case KVM_S390_VM_TOD_HIGH:
528 ret = kvm_s390_get_tod_high(kvm, attr);
529 break;
530 case KVM_S390_VM_TOD_LOW:
531 ret = kvm_s390_get_tod_low(kvm, attr);
532 break;
533 default:
534 ret = -ENXIO;
535 break;
536 }
537 return ret;
538}
539
Michael Mueller658b6ed2015-02-02 15:49:35 +0100540static int kvm_s390_set_processor(struct kvm *kvm, struct kvm_device_attr *attr)
541{
542 struct kvm_s390_vm_cpu_processor *proc;
543 int ret = 0;
544
545 mutex_lock(&kvm->lock);
546 if (atomic_read(&kvm->online_vcpus)) {
547 ret = -EBUSY;
548 goto out;
549 }
550 proc = kzalloc(sizeof(*proc), GFP_KERNEL);
551 if (!proc) {
552 ret = -ENOMEM;
553 goto out;
554 }
555 if (!copy_from_user(proc, (void __user *)attr->addr,
556 sizeof(*proc))) {
557 memcpy(&kvm->arch.model.cpu_id, &proc->cpuid,
558 sizeof(struct cpuid));
559 kvm->arch.model.ibc = proc->ibc;
Michael Mueller981467c2015-02-24 13:51:04 +0100560 memcpy(kvm->arch.model.fac->list, proc->fac_list,
Michael Mueller658b6ed2015-02-02 15:49:35 +0100561 S390_ARCH_FAC_LIST_SIZE_BYTE);
562 } else
563 ret = -EFAULT;
564 kfree(proc);
565out:
566 mutex_unlock(&kvm->lock);
567 return ret;
568}
569
570static int kvm_s390_set_cpu_model(struct kvm *kvm, struct kvm_device_attr *attr)
571{
572 int ret = -ENXIO;
573
574 switch (attr->attr) {
575 case KVM_S390_VM_CPU_PROCESSOR:
576 ret = kvm_s390_set_processor(kvm, attr);
577 break;
578 }
579 return ret;
580}
581
582static int kvm_s390_get_processor(struct kvm *kvm, struct kvm_device_attr *attr)
583{
584 struct kvm_s390_vm_cpu_processor *proc;
585 int ret = 0;
586
587 proc = kzalloc(sizeof(*proc), GFP_KERNEL);
588 if (!proc) {
589 ret = -ENOMEM;
590 goto out;
591 }
592 memcpy(&proc->cpuid, &kvm->arch.model.cpu_id, sizeof(struct cpuid));
593 proc->ibc = kvm->arch.model.ibc;
Michael Mueller981467c2015-02-24 13:51:04 +0100594 memcpy(&proc->fac_list, kvm->arch.model.fac->list, S390_ARCH_FAC_LIST_SIZE_BYTE);
Michael Mueller658b6ed2015-02-02 15:49:35 +0100595 if (copy_to_user((void __user *)attr->addr, proc, sizeof(*proc)))
596 ret = -EFAULT;
597 kfree(proc);
598out:
599 return ret;
600}
601
602static int kvm_s390_get_machine(struct kvm *kvm, struct kvm_device_attr *attr)
603{
604 struct kvm_s390_vm_cpu_machine *mach;
605 int ret = 0;
606
607 mach = kzalloc(sizeof(*mach), GFP_KERNEL);
608 if (!mach) {
609 ret = -ENOMEM;
610 goto out;
611 }
612 get_cpu_id((struct cpuid *) &mach->cpuid);
David Hildenbrand37c5f6c2015-05-06 13:18:59 +0200613 mach->ibc = sclp.ibc;
Michael Mueller981467c2015-02-24 13:51:04 +0100614 memcpy(&mach->fac_mask, kvm->arch.model.fac->mask,
615 S390_ARCH_FAC_LIST_SIZE_BYTE);
Michael Mueller658b6ed2015-02-02 15:49:35 +0100616 memcpy((unsigned long *)&mach->fac_list, S390_lowcore.stfle_fac_list,
Michael Mueller94422ee2015-02-26 12:12:40 +0100617 S390_ARCH_FAC_LIST_SIZE_BYTE);
Michael Mueller658b6ed2015-02-02 15:49:35 +0100618 if (copy_to_user((void __user *)attr->addr, mach, sizeof(*mach)))
619 ret = -EFAULT;
620 kfree(mach);
621out:
622 return ret;
623}
624
625static int kvm_s390_get_cpu_model(struct kvm *kvm, struct kvm_device_attr *attr)
626{
627 int ret = -ENXIO;
628
629 switch (attr->attr) {
630 case KVM_S390_VM_CPU_PROCESSOR:
631 ret = kvm_s390_get_processor(kvm, attr);
632 break;
633 case KVM_S390_VM_CPU_MACHINE:
634 ret = kvm_s390_get_machine(kvm, attr);
635 break;
636 }
637 return ret;
638}
639
Dominik Dingelf2061652014-04-09 13:13:00 +0200640static int kvm_s390_vm_set_attr(struct kvm *kvm, struct kvm_device_attr *attr)
641{
642 int ret;
643
644 switch (attr->group) {
Dominik Dingel4f718ea2014-04-09 13:13:00 +0200645 case KVM_S390_VM_MEM_CTRL:
Dominik Dingel8c0a7ce2014-10-31 14:10:41 +0100646 ret = kvm_s390_set_mem_control(kvm, attr);
Dominik Dingel4f718ea2014-04-09 13:13:00 +0200647 break;
Jason J. Herne72f25022014-11-25 09:46:02 -0500648 case KVM_S390_VM_TOD:
649 ret = kvm_s390_set_tod(kvm, attr);
650 break;
Michael Mueller658b6ed2015-02-02 15:49:35 +0100651 case KVM_S390_VM_CPU_MODEL:
652 ret = kvm_s390_set_cpu_model(kvm, attr);
653 break;
Tony Krowiaka374e892014-09-03 10:13:53 +0200654 case KVM_S390_VM_CRYPTO:
655 ret = kvm_s390_vm_set_crypto(kvm, attr);
656 break;
Dominik Dingelf2061652014-04-09 13:13:00 +0200657 default:
658 ret = -ENXIO;
659 break;
660 }
661
662 return ret;
663}
664
665static int kvm_s390_vm_get_attr(struct kvm *kvm, struct kvm_device_attr *attr)
666{
Dominik Dingel8c0a7ce2014-10-31 14:10:41 +0100667 int ret;
668
669 switch (attr->group) {
670 case KVM_S390_VM_MEM_CTRL:
671 ret = kvm_s390_get_mem_control(kvm, attr);
672 break;
Jason J. Herne72f25022014-11-25 09:46:02 -0500673 case KVM_S390_VM_TOD:
674 ret = kvm_s390_get_tod(kvm, attr);
675 break;
Michael Mueller658b6ed2015-02-02 15:49:35 +0100676 case KVM_S390_VM_CPU_MODEL:
677 ret = kvm_s390_get_cpu_model(kvm, attr);
678 break;
Dominik Dingel8c0a7ce2014-10-31 14:10:41 +0100679 default:
680 ret = -ENXIO;
681 break;
682 }
683
684 return ret;
Dominik Dingelf2061652014-04-09 13:13:00 +0200685}
686
687static int kvm_s390_vm_has_attr(struct kvm *kvm, struct kvm_device_attr *attr)
688{
689 int ret;
690
691 switch (attr->group) {
Dominik Dingel4f718ea2014-04-09 13:13:00 +0200692 case KVM_S390_VM_MEM_CTRL:
693 switch (attr->attr) {
694 case KVM_S390_VM_MEM_ENABLE_CMMA:
695 case KVM_S390_VM_MEM_CLR_CMMA:
Dominik Dingel8c0a7ce2014-10-31 14:10:41 +0100696 case KVM_S390_VM_MEM_LIMIT_SIZE:
Dominik Dingel4f718ea2014-04-09 13:13:00 +0200697 ret = 0;
698 break;
699 default:
700 ret = -ENXIO;
701 break;
702 }
703 break;
Jason J. Herne72f25022014-11-25 09:46:02 -0500704 case KVM_S390_VM_TOD:
705 switch (attr->attr) {
706 case KVM_S390_VM_TOD_LOW:
707 case KVM_S390_VM_TOD_HIGH:
708 ret = 0;
709 break;
710 default:
711 ret = -ENXIO;
712 break;
713 }
714 break;
Michael Mueller658b6ed2015-02-02 15:49:35 +0100715 case KVM_S390_VM_CPU_MODEL:
716 switch (attr->attr) {
717 case KVM_S390_VM_CPU_PROCESSOR:
718 case KVM_S390_VM_CPU_MACHINE:
719 ret = 0;
720 break;
721 default:
722 ret = -ENXIO;
723 break;
724 }
725 break;
Tony Krowiaka374e892014-09-03 10:13:53 +0200726 case KVM_S390_VM_CRYPTO:
727 switch (attr->attr) {
728 case KVM_S390_VM_CRYPTO_ENABLE_AES_KW:
729 case KVM_S390_VM_CRYPTO_ENABLE_DEA_KW:
730 case KVM_S390_VM_CRYPTO_DISABLE_AES_KW:
731 case KVM_S390_VM_CRYPTO_DISABLE_DEA_KW:
732 ret = 0;
733 break;
734 default:
735 ret = -ENXIO;
736 break;
737 }
738 break;
Dominik Dingelf2061652014-04-09 13:13:00 +0200739 default:
740 ret = -ENXIO;
741 break;
742 }
743
744 return ret;
745}
746
Jason J. Herne30ee2a92014-09-23 09:23:01 -0400747static long kvm_s390_get_skeys(struct kvm *kvm, struct kvm_s390_skeys *args)
748{
749 uint8_t *keys;
750 uint64_t hva;
751 unsigned long curkey;
752 int i, r = 0;
753
754 if (args->flags != 0)
755 return -EINVAL;
756
757 /* Is this guest using storage keys? */
758 if (!mm_use_skey(current->mm))
759 return KVM_S390_GET_SKEYS_NONE;
760
761 /* Enforce sane limit on memory allocation */
762 if (args->count < 1 || args->count > KVM_S390_SKEYS_MAX)
763 return -EINVAL;
764
765 keys = kmalloc_array(args->count, sizeof(uint8_t),
766 GFP_KERNEL | __GFP_NOWARN);
767 if (!keys)
768 keys = vmalloc(sizeof(uint8_t) * args->count);
769 if (!keys)
770 return -ENOMEM;
771
772 for (i = 0; i < args->count; i++) {
773 hva = gfn_to_hva(kvm, args->start_gfn + i);
774 if (kvm_is_error_hva(hva)) {
775 r = -EFAULT;
776 goto out;
777 }
778
779 curkey = get_guest_storage_key(current->mm, hva);
780 if (IS_ERR_VALUE(curkey)) {
781 r = curkey;
782 goto out;
783 }
784 keys[i] = curkey;
785 }
786
787 r = copy_to_user((uint8_t __user *)args->skeydata_addr, keys,
788 sizeof(uint8_t) * args->count);
789 if (r)
790 r = -EFAULT;
791out:
792 kvfree(keys);
793 return r;
794}
795
796static long kvm_s390_set_skeys(struct kvm *kvm, struct kvm_s390_skeys *args)
797{
798 uint8_t *keys;
799 uint64_t hva;
800 int i, r = 0;
801
802 if (args->flags != 0)
803 return -EINVAL;
804
805 /* Enforce sane limit on memory allocation */
806 if (args->count < 1 || args->count > KVM_S390_SKEYS_MAX)
807 return -EINVAL;
808
809 keys = kmalloc_array(args->count, sizeof(uint8_t),
810 GFP_KERNEL | __GFP_NOWARN);
811 if (!keys)
812 keys = vmalloc(sizeof(uint8_t) * args->count);
813 if (!keys)
814 return -ENOMEM;
815
816 r = copy_from_user(keys, (uint8_t __user *)args->skeydata_addr,
817 sizeof(uint8_t) * args->count);
818 if (r) {
819 r = -EFAULT;
820 goto out;
821 }
822
823 /* Enable storage key handling for the guest */
824 s390_enable_skey();
825
826 for (i = 0; i < args->count; i++) {
827 hva = gfn_to_hva(kvm, args->start_gfn + i);
828 if (kvm_is_error_hva(hva)) {
829 r = -EFAULT;
830 goto out;
831 }
832
833 /* Lowest order bit is reserved */
834 if (keys[i] & 0x01) {
835 r = -EINVAL;
836 goto out;
837 }
838
839 r = set_guest_storage_key(current->mm, hva,
840 (unsigned long)keys[i], 0);
841 if (r)
842 goto out;
843 }
844out:
845 kvfree(keys);
846 return r;
847}
848
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100849long kvm_arch_vm_ioctl(struct file *filp,
850 unsigned int ioctl, unsigned long arg)
851{
852 struct kvm *kvm = filp->private_data;
853 void __user *argp = (void __user *)arg;
Dominik Dingelf2061652014-04-09 13:13:00 +0200854 struct kvm_device_attr attr;
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100855 int r;
856
857 switch (ioctl) {
Carsten Otteba5c1e92008-03-25 18:47:26 +0100858 case KVM_S390_INTERRUPT: {
859 struct kvm_s390_interrupt s390int;
860
861 r = -EFAULT;
862 if (copy_from_user(&s390int, argp, sizeof(s390int)))
863 break;
864 r = kvm_s390_inject_vm(kvm, &s390int);
865 break;
866 }
Cornelia Huckd938dc52013-10-23 18:26:34 +0200867 case KVM_ENABLE_CAP: {
868 struct kvm_enable_cap cap;
869 r = -EFAULT;
870 if (copy_from_user(&cap, argp, sizeof(cap)))
871 break;
872 r = kvm_vm_ioctl_enable_cap(kvm, &cap);
873 break;
874 }
Cornelia Huck84223592013-07-15 13:36:01 +0200875 case KVM_CREATE_IRQCHIP: {
876 struct kvm_irq_routing_entry routing;
877
878 r = -EINVAL;
879 if (kvm->arch.use_irqchip) {
880 /* Set up dummy routing. */
881 memset(&routing, 0, sizeof(routing));
882 kvm_set_irq_routing(kvm, &routing, 0, 0);
883 r = 0;
884 }
885 break;
886 }
Dominik Dingelf2061652014-04-09 13:13:00 +0200887 case KVM_SET_DEVICE_ATTR: {
888 r = -EFAULT;
889 if (copy_from_user(&attr, (void __user *)arg, sizeof(attr)))
890 break;
891 r = kvm_s390_vm_set_attr(kvm, &attr);
892 break;
893 }
894 case KVM_GET_DEVICE_ATTR: {
895 r = -EFAULT;
896 if (copy_from_user(&attr, (void __user *)arg, sizeof(attr)))
897 break;
898 r = kvm_s390_vm_get_attr(kvm, &attr);
899 break;
900 }
901 case KVM_HAS_DEVICE_ATTR: {
902 r = -EFAULT;
903 if (copy_from_user(&attr, (void __user *)arg, sizeof(attr)))
904 break;
905 r = kvm_s390_vm_has_attr(kvm, &attr);
906 break;
907 }
Jason J. Herne30ee2a92014-09-23 09:23:01 -0400908 case KVM_S390_GET_SKEYS: {
909 struct kvm_s390_skeys args;
910
911 r = -EFAULT;
912 if (copy_from_user(&args, argp,
913 sizeof(struct kvm_s390_skeys)))
914 break;
915 r = kvm_s390_get_skeys(kvm, &args);
916 break;
917 }
918 case KVM_S390_SET_SKEYS: {
919 struct kvm_s390_skeys args;
920
921 r = -EFAULT;
922 if (copy_from_user(&args, argp,
923 sizeof(struct kvm_s390_skeys)))
924 break;
925 r = kvm_s390_set_skeys(kvm, &args);
926 break;
927 }
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100928 default:
Avi Kivity367e1312009-08-26 14:57:07 +0300929 r = -ENOTTY;
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100930 }
931
932 return r;
933}
934
Tony Krowiak45c9b472015-01-13 11:33:26 -0500935static int kvm_s390_query_ap_config(u8 *config)
936{
937 u32 fcn_code = 0x04000000UL;
Christian Borntraeger86044c82015-02-26 13:53:47 +0100938 u32 cc = 0;
Tony Krowiak45c9b472015-01-13 11:33:26 -0500939
Christian Borntraeger86044c82015-02-26 13:53:47 +0100940 memset(config, 0, 128);
Tony Krowiak45c9b472015-01-13 11:33:26 -0500941 asm volatile(
942 "lgr 0,%1\n"
943 "lgr 2,%2\n"
944 ".long 0xb2af0000\n" /* PQAP(QCI) */
Christian Borntraeger86044c82015-02-26 13:53:47 +0100945 "0: ipm %0\n"
Tony Krowiak45c9b472015-01-13 11:33:26 -0500946 "srl %0,28\n"
Christian Borntraeger86044c82015-02-26 13:53:47 +0100947 "1:\n"
948 EX_TABLE(0b, 1b)
949 : "+r" (cc)
Tony Krowiak45c9b472015-01-13 11:33:26 -0500950 : "r" (fcn_code), "r" (config)
951 : "cc", "0", "2", "memory"
952 );
953
954 return cc;
955}
956
957static int kvm_s390_apxa_installed(void)
958{
959 u8 config[128];
960 int cc;
961
962 if (test_facility(2) && test_facility(12)) {
963 cc = kvm_s390_query_ap_config(config);
964
965 if (cc)
966 pr_err("PQAP(QCI) failed with cc=%d", cc);
967 else
968 return config[0] & 0x40;
969 }
970
971 return 0;
972}
973
974static void kvm_s390_set_crycb_format(struct kvm *kvm)
975{
976 kvm->arch.crypto.crycbd = (__u32)(unsigned long) kvm->arch.crypto.crycb;
977
978 if (kvm_s390_apxa_installed())
979 kvm->arch.crypto.crycbd |= CRYCB_FORMAT2;
980 else
981 kvm->arch.crypto.crycbd |= CRYCB_FORMAT1;
982}
983
Michael Mueller9d8d5782015-02-02 15:42:51 +0100984static void kvm_s390_get_cpu_id(struct cpuid *cpu_id)
985{
986 get_cpu_id(cpu_id);
987 cpu_id->version = 0xff;
988}
989
Tony Krowiak5102ee82014-06-27 14:46:01 -0400990static int kvm_s390_crypto_init(struct kvm *kvm)
991{
Michael Mueller9d8d5782015-02-02 15:42:51 +0100992 if (!test_kvm_facility(kvm, 76))
Tony Krowiak5102ee82014-06-27 14:46:01 -0400993 return 0;
994
995 kvm->arch.crypto.crycb = kzalloc(sizeof(*kvm->arch.crypto.crycb),
996 GFP_KERNEL | GFP_DMA);
997 if (!kvm->arch.crypto.crycb)
998 return -ENOMEM;
999
Tony Krowiak45c9b472015-01-13 11:33:26 -05001000 kvm_s390_set_crycb_format(kvm);
Tony Krowiak5102ee82014-06-27 14:46:01 -04001001
Tony Krowiaked6f76b2015-02-24 14:06:57 -05001002 /* Enable AES/DEA protected key functions by default */
1003 kvm->arch.crypto.aes_kw = 1;
1004 kvm->arch.crypto.dea_kw = 1;
1005 get_random_bytes(kvm->arch.crypto.crycb->aes_wrapping_key_mask,
1006 sizeof(kvm->arch.crypto.crycb->aes_wrapping_key_mask));
1007 get_random_bytes(kvm->arch.crypto.crycb->dea_wrapping_key_mask,
1008 sizeof(kvm->arch.crypto.crycb->dea_wrapping_key_mask));
Tony Krowiaka374e892014-09-03 10:13:53 +02001009
Tony Krowiak5102ee82014-06-27 14:46:01 -04001010 return 0;
1011}
1012
Carsten Ottee08b9632012-01-04 10:25:20 +01001013int kvm_arch_init_vm(struct kvm *kvm, unsigned long type)
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001014{
Michael Mueller9d8d5782015-02-02 15:42:51 +01001015 int i, rc;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001016 char debug_name[16];
Christian Borntraegerf6c137f2014-03-19 11:18:29 +01001017 static unsigned long sca_offset;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001018
Carsten Ottee08b9632012-01-04 10:25:20 +01001019 rc = -EINVAL;
1020#ifdef CONFIG_KVM_S390_UCONTROL
1021 if (type & ~KVM_VM_S390_UCONTROL)
1022 goto out_err;
1023 if ((type & KVM_VM_S390_UCONTROL) && (!capable(CAP_SYS_ADMIN)))
1024 goto out_err;
1025#else
1026 if (type)
1027 goto out_err;
1028#endif
1029
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001030 rc = s390_enable_sie();
1031 if (rc)
Jan Kiszkad89f5ef2010-11-09 17:02:49 +01001032 goto out_err;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001033
Carsten Otteb2904112011-10-18 12:27:13 +02001034 rc = -ENOMEM;
1035
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001036 kvm->arch.sca = (struct sca_block *) get_zeroed_page(GFP_KERNEL);
1037 if (!kvm->arch.sca)
Jan Kiszkad89f5ef2010-11-09 17:02:49 +01001038 goto out_err;
Christian Borntraegerf6c137f2014-03-19 11:18:29 +01001039 spin_lock(&kvm_lock);
1040 sca_offset = (sca_offset + 16) & 0x7f0;
1041 kvm->arch.sca = (struct sca_block *) ((char *) kvm->arch.sca + sca_offset);
1042 spin_unlock(&kvm_lock);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001043
1044 sprintf(debug_name, "kvm-%u", current->pid);
1045
1046 kvm->arch.dbf = debug_register(debug_name, 8, 2, 8 * sizeof(long));
1047 if (!kvm->arch.dbf)
Dominik Dingel40f5b732015-03-12 13:55:53 +01001048 goto out_err;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001049
Michael Mueller9d8d5782015-02-02 15:42:51 +01001050 /*
1051 * The architectural maximum amount of facilities is 16 kbit. To store
1052 * this amount, 2 kbyte of memory is required. Thus we need a full
Michael Mueller981467c2015-02-24 13:51:04 +01001053 * page to hold the guest facility list (arch.model.fac->list) and the
1054 * facility mask (arch.model.fac->mask). Its address size has to be
Michael Mueller9d8d5782015-02-02 15:42:51 +01001055 * 31 bits and word aligned.
1056 */
1057 kvm->arch.model.fac =
Michael Mueller981467c2015-02-24 13:51:04 +01001058 (struct kvm_s390_fac *) get_zeroed_page(GFP_KERNEL | GFP_DMA);
Michael Mueller9d8d5782015-02-02 15:42:51 +01001059 if (!kvm->arch.model.fac)
Dominik Dingel40f5b732015-03-12 13:55:53 +01001060 goto out_err;
Michael Mueller9d8d5782015-02-02 15:42:51 +01001061
Michael Muellerfb5bf932015-02-27 14:25:10 +01001062 /* Populate the facility mask initially. */
Michael Mueller981467c2015-02-24 13:51:04 +01001063 memcpy(kvm->arch.model.fac->mask, S390_lowcore.stfle_fac_list,
Michael Mueller94422ee2015-02-26 12:12:40 +01001064 S390_ARCH_FAC_LIST_SIZE_BYTE);
Michael Mueller9d8d5782015-02-02 15:42:51 +01001065 for (i = 0; i < S390_ARCH_FAC_LIST_SIZE_U64; i++) {
1066 if (i < kvm_s390_fac_list_mask_size())
Michael Mueller981467c2015-02-24 13:51:04 +01001067 kvm->arch.model.fac->mask[i] &= kvm_s390_fac_list_mask[i];
Michael Mueller9d8d5782015-02-02 15:42:51 +01001068 else
Michael Mueller981467c2015-02-24 13:51:04 +01001069 kvm->arch.model.fac->mask[i] = 0UL;
Michael Mueller9d8d5782015-02-02 15:42:51 +01001070 }
1071
Michael Mueller981467c2015-02-24 13:51:04 +01001072 /* Populate the facility list initially. */
1073 memcpy(kvm->arch.model.fac->list, kvm->arch.model.fac->mask,
1074 S390_ARCH_FAC_LIST_SIZE_BYTE);
1075
Michael Mueller9d8d5782015-02-02 15:42:51 +01001076 kvm_s390_get_cpu_id(&kvm->arch.model.cpu_id);
David Hildenbrand37c5f6c2015-05-06 13:18:59 +02001077 kvm->arch.model.ibc = sclp.ibc & 0x0fff;
Michael Mueller9d8d5782015-02-02 15:42:51 +01001078
Tony Krowiak5102ee82014-06-27 14:46:01 -04001079 if (kvm_s390_crypto_init(kvm) < 0)
Dominik Dingel40f5b732015-03-12 13:55:53 +01001080 goto out_err;
Tony Krowiak5102ee82014-06-27 14:46:01 -04001081
Carsten Otteba5c1e92008-03-25 18:47:26 +01001082 spin_lock_init(&kvm->arch.float_int.lock);
Jens Freimann6d3da242013-07-03 15:18:35 +02001083 for (i = 0; i < FIRQ_LIST_COUNT; i++)
1084 INIT_LIST_HEAD(&kvm->arch.float_int.lists[i]);
Heiko Carstens8a2422342014-01-10 14:33:28 +01001085 init_waitqueue_head(&kvm->arch.ipte_wq);
Thomas Hutha6b7e452014-10-01 14:48:42 +02001086 mutex_init(&kvm->arch.ipte_mutex);
Carsten Otteba5c1e92008-03-25 18:47:26 +01001087
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001088 debug_register_view(kvm->arch.dbf, &debug_sprintf_view);
1089 VM_EVENT(kvm, 3, "%s", "vm created");
1090
Carsten Ottee08b9632012-01-04 10:25:20 +01001091 if (type & KVM_VM_S390_UCONTROL) {
1092 kvm->arch.gmap = NULL;
1093 } else {
Christian Borntraeger03499852014-08-25 12:38:57 +02001094 kvm->arch.gmap = gmap_alloc(current->mm, (1UL << 44) - 1);
Carsten Ottee08b9632012-01-04 10:25:20 +01001095 if (!kvm->arch.gmap)
Dominik Dingel40f5b732015-03-12 13:55:53 +01001096 goto out_err;
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02001097 kvm->arch.gmap->private = kvm;
Dominik Dingel24eb3a82013-06-17 16:25:18 +02001098 kvm->arch.gmap->pfault_enabled = 0;
Carsten Ottee08b9632012-01-04 10:25:20 +01001099 }
Cornelia Huckfa6b7fe2012-12-20 15:32:12 +01001100
1101 kvm->arch.css_support = 0;
Cornelia Huck84223592013-07-15 13:36:01 +02001102 kvm->arch.use_irqchip = 0;
Jason J. Herne72f25022014-11-25 09:46:02 -05001103 kvm->arch.epoch = 0;
Cornelia Huckfa6b7fe2012-12-20 15:32:12 +01001104
David Hildenbrand8ad35752014-03-14 11:00:21 +01001105 spin_lock_init(&kvm->arch.start_stop_lock);
1106
Jan Kiszkad89f5ef2010-11-09 17:02:49 +01001107 return 0;
Jan Kiszkad89f5ef2010-11-09 17:02:49 +01001108out_err:
Dominik Dingel40f5b732015-03-12 13:55:53 +01001109 kfree(kvm->arch.crypto.crycb);
1110 free_page((unsigned long)kvm->arch.model.fac);
1111 debug_unregister(kvm->arch.dbf);
1112 free_page((unsigned long)(kvm->arch.sca));
Jan Kiszkad89f5ef2010-11-09 17:02:49 +01001113 return rc;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001114}
1115
Christian Borntraegerd329c032008-11-26 14:50:27 +01001116void kvm_arch_vcpu_destroy(struct kvm_vcpu *vcpu)
1117{
1118 VCPU_EVENT(vcpu, 3, "%s", "free cpu");
Cornelia Huckade38c32012-07-23 17:20:30 +02001119 trace_kvm_s390_destroy_vcpu(vcpu->vcpu_id);
Christian Borntraeger67335e62014-03-25 17:09:08 +01001120 kvm_s390_clear_local_irqs(vcpu);
Dominik Dingel3c038e62013-10-07 17:11:48 +02001121 kvm_clear_async_pf_completion_queue(vcpu);
Carsten Otte58f94602012-01-04 10:25:27 +01001122 if (!kvm_is_ucontrol(vcpu->kvm)) {
1123 clear_bit(63 - vcpu->vcpu_id,
1124 (unsigned long *) &vcpu->kvm->arch.sca->mcn);
1125 if (vcpu->kvm->arch.sca->cpu[vcpu->vcpu_id].sda ==
1126 (__u64) vcpu->arch.sie_block)
1127 vcpu->kvm->arch.sca->cpu[vcpu->vcpu_id].sda = 0;
1128 }
Carsten Otteabf4a712009-05-12 17:21:51 +02001129 smp_mb();
Carsten Otte27e03932012-01-04 10:25:21 +01001130
1131 if (kvm_is_ucontrol(vcpu->kvm))
1132 gmap_free(vcpu->arch.gmap);
1133
Dominik Dingelb31605c2014-03-25 13:47:11 +01001134 if (kvm_s390_cmma_enabled(vcpu->kvm))
1135 kvm_s390_vcpu_unsetup_cmma(vcpu);
Christian Borntraegerd329c032008-11-26 14:50:27 +01001136 free_page((unsigned long)(vcpu->arch.sie_block));
Konstantin Weitzb31288f2013-04-17 17:36:29 +02001137
Christian Borntraeger6692cef2008-11-26 14:51:08 +01001138 kvm_vcpu_uninit(vcpu);
Michael Muellerb110fea2013-06-12 13:54:54 +02001139 kmem_cache_free(kvm_vcpu_cache, vcpu);
Christian Borntraegerd329c032008-11-26 14:50:27 +01001140}
1141
1142static void kvm_free_vcpus(struct kvm *kvm)
1143{
1144 unsigned int i;
Gleb Natapov988a2ca2009-06-09 15:56:29 +03001145 struct kvm_vcpu *vcpu;
Christian Borntraegerd329c032008-11-26 14:50:27 +01001146
Gleb Natapov988a2ca2009-06-09 15:56:29 +03001147 kvm_for_each_vcpu(i, vcpu, kvm)
1148 kvm_arch_vcpu_destroy(vcpu);
1149
1150 mutex_lock(&kvm->lock);
1151 for (i = 0; i < atomic_read(&kvm->online_vcpus); i++)
1152 kvm->vcpus[i] = NULL;
1153
1154 atomic_set(&kvm->online_vcpus, 0);
1155 mutex_unlock(&kvm->lock);
Christian Borntraegerd329c032008-11-26 14:50:27 +01001156}
1157
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001158void kvm_arch_destroy_vm(struct kvm *kvm)
1159{
Christian Borntraegerd329c032008-11-26 14:50:27 +01001160 kvm_free_vcpus(kvm);
Michael Mueller9d8d5782015-02-02 15:42:51 +01001161 free_page((unsigned long)kvm->arch.model.fac);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001162 free_page((unsigned long)(kvm->arch.sca));
Christian Borntraegerd329c032008-11-26 14:50:27 +01001163 debug_unregister(kvm->arch.dbf);
Tony Krowiak5102ee82014-06-27 14:46:01 -04001164 kfree(kvm->arch.crypto.crycb);
Carsten Otte27e03932012-01-04 10:25:21 +01001165 if (!kvm_is_ucontrol(kvm))
1166 gmap_free(kvm->arch.gmap);
Cornelia Huck841b91c2013-07-15 13:36:01 +02001167 kvm_s390_destroy_adapters(kvm);
Christian Borntraeger67335e62014-03-25 17:09:08 +01001168 kvm_s390_clear_float_irqs(kvm);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001169}
1170
1171/* Section: vcpu related */
Dominik Dingeldafd0322014-12-02 16:53:21 +01001172static int __kvm_ucontrol_vcpu_init(struct kvm_vcpu *vcpu)
1173{
1174 vcpu->arch.gmap = gmap_alloc(current->mm, -1UL);
1175 if (!vcpu->arch.gmap)
1176 return -ENOMEM;
1177 vcpu->arch.gmap->private = vcpu->kvm;
1178
1179 return 0;
1180}
1181
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001182int kvm_arch_vcpu_init(struct kvm_vcpu *vcpu)
1183{
Dominik Dingel3c038e62013-10-07 17:11:48 +02001184 vcpu->arch.pfault_token = KVM_S390_PFAULT_TOKEN_INVALID;
1185 kvm_clear_async_pf_completion_queue(vcpu);
Christian Borntraeger59674c12012-01-11 11:20:33 +01001186 vcpu->run->kvm_valid_regs = KVM_SYNC_PREFIX |
1187 KVM_SYNC_GPRS |
Christian Borntraeger9eed07352012-02-06 10:59:07 +01001188 KVM_SYNC_ACRS |
David Hildenbrandb028ee32014-07-17 10:47:43 +02001189 KVM_SYNC_CRS |
1190 KVM_SYNC_ARCH0 |
1191 KVM_SYNC_PFAULT;
Eric Farman68c55752014-06-09 10:57:26 -04001192 if (test_kvm_facility(vcpu->kvm, 129))
1193 vcpu->run->kvm_valid_regs |= KVM_SYNC_VRS;
Dominik Dingeldafd0322014-12-02 16:53:21 +01001194
1195 if (kvm_is_ucontrol(vcpu->kvm))
1196 return __kvm_ucontrol_vcpu_init(vcpu);
1197
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001198 return 0;
1199}
1200
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001201void kvm_arch_vcpu_load(struct kvm_vcpu *vcpu, int cpu)
1202{
Martin Schwidefsky4725c862013-10-15 16:08:34 +02001203 save_fp_ctl(&vcpu->arch.host_fpregs.fpc);
Michael Mueller18280d82015-03-16 16:05:41 +01001204 if (test_kvm_facility(vcpu->kvm, 129))
Eric Farman68c55752014-06-09 10:57:26 -04001205 save_vx_regs((__vector128 *)&vcpu->arch.host_vregs->vrs);
1206 else
1207 save_fp_regs(vcpu->arch.host_fpregs.fprs);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001208 save_access_regs(vcpu->arch.host_acrs);
Michael Mueller18280d82015-03-16 16:05:41 +01001209 if (test_kvm_facility(vcpu->kvm, 129)) {
Eric Farman68c55752014-06-09 10:57:26 -04001210 restore_fp_ctl(&vcpu->run->s.regs.fpc);
1211 restore_vx_regs((__vector128 *)&vcpu->run->s.regs.vrs);
1212 } else {
1213 restore_fp_ctl(&vcpu->arch.guest_fpregs.fpc);
1214 restore_fp_regs(vcpu->arch.guest_fpregs.fprs);
1215 }
Christian Borntraeger59674c12012-01-11 11:20:33 +01001216 restore_access_regs(vcpu->run->s.regs.acrs);
Christian Borntraeger480e5922011-09-20 17:07:28 +02001217 gmap_enable(vcpu->arch.gmap);
Cornelia Huck9e6dabe2011-11-17 11:00:41 +01001218 atomic_set_mask(CPUSTAT_RUNNING, &vcpu->arch.sie_block->cpuflags);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001219}
1220
1221void kvm_arch_vcpu_put(struct kvm_vcpu *vcpu)
1222{
Cornelia Huck9e6dabe2011-11-17 11:00:41 +01001223 atomic_clear_mask(CPUSTAT_RUNNING, &vcpu->arch.sie_block->cpuflags);
Christian Borntraeger480e5922011-09-20 17:07:28 +02001224 gmap_disable(vcpu->arch.gmap);
Michael Mueller18280d82015-03-16 16:05:41 +01001225 if (test_kvm_facility(vcpu->kvm, 129)) {
Eric Farman68c55752014-06-09 10:57:26 -04001226 save_fp_ctl(&vcpu->run->s.regs.fpc);
1227 save_vx_regs((__vector128 *)&vcpu->run->s.regs.vrs);
1228 } else {
1229 save_fp_ctl(&vcpu->arch.guest_fpregs.fpc);
1230 save_fp_regs(vcpu->arch.guest_fpregs.fprs);
1231 }
Christian Borntraeger59674c12012-01-11 11:20:33 +01001232 save_access_regs(vcpu->run->s.regs.acrs);
Martin Schwidefsky4725c862013-10-15 16:08:34 +02001233 restore_fp_ctl(&vcpu->arch.host_fpregs.fpc);
Michael Mueller18280d82015-03-16 16:05:41 +01001234 if (test_kvm_facility(vcpu->kvm, 129))
Eric Farman68c55752014-06-09 10:57:26 -04001235 restore_vx_regs((__vector128 *)&vcpu->arch.host_vregs->vrs);
1236 else
1237 restore_fp_regs(vcpu->arch.host_fpregs.fprs);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001238 restore_access_regs(vcpu->arch.host_acrs);
1239}
1240
1241static void kvm_s390_vcpu_initial_reset(struct kvm_vcpu *vcpu)
1242{
1243 /* this equals initial cpu reset in pop, but we don't switch to ESA */
1244 vcpu->arch.sie_block->gpsw.mask = 0UL;
1245 vcpu->arch.sie_block->gpsw.addr = 0UL;
Christian Borntraeger8d26cf72012-01-11 11:19:32 +01001246 kvm_s390_set_prefix(vcpu, 0);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001247 vcpu->arch.sie_block->cputm = 0UL;
1248 vcpu->arch.sie_block->ckc = 0UL;
1249 vcpu->arch.sie_block->todpr = 0;
1250 memset(vcpu->arch.sie_block->gcr, 0, 16 * sizeof(__u64));
1251 vcpu->arch.sie_block->gcr[0] = 0xE0UL;
1252 vcpu->arch.sie_block->gcr[14] = 0xC2000000UL;
1253 vcpu->arch.guest_fpregs.fpc = 0;
1254 asm volatile("lfpc %0" : : "Q" (vcpu->arch.guest_fpregs.fpc));
1255 vcpu->arch.sie_block->gbea = 1;
Christian Borntraeger672550f2014-02-10 15:32:19 +01001256 vcpu->arch.sie_block->pp = 0;
Dominik Dingel3c038e62013-10-07 17:11:48 +02001257 vcpu->arch.pfault_token = KVM_S390_PFAULT_TOKEN_INVALID;
1258 kvm_clear_async_pf_completion_queue(vcpu);
David Hildenbrand6352e4d2014-04-10 17:35:00 +02001259 if (!kvm_s390_user_cpu_state_ctrl(vcpu->kvm))
1260 kvm_s390_vcpu_stop(vcpu);
Jens Freimann2ed10cc2014-02-11 13:48:07 +01001261 kvm_s390_clear_local_irqs(vcpu);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001262}
1263
Dominik Dingel31928aa2014-12-04 15:47:07 +01001264void kvm_arch_vcpu_postcreate(struct kvm_vcpu *vcpu)
Marcelo Tosatti42897d82012-11-27 23:29:02 -02001265{
Jason J. Herne72f25022014-11-25 09:46:02 -05001266 mutex_lock(&vcpu->kvm->lock);
1267 vcpu->arch.sie_block->epoch = vcpu->kvm->arch.epoch;
1268 mutex_unlock(&vcpu->kvm->lock);
Dominik Dingeldafd0322014-12-02 16:53:21 +01001269 if (!kvm_is_ucontrol(vcpu->kvm))
1270 vcpu->arch.gmap = vcpu->kvm->arch.gmap;
Marcelo Tosatti42897d82012-11-27 23:29:02 -02001271}
1272
Tony Krowiak5102ee82014-06-27 14:46:01 -04001273static void kvm_s390_vcpu_crypto_setup(struct kvm_vcpu *vcpu)
1274{
Michael Mueller9d8d5782015-02-02 15:42:51 +01001275 if (!test_kvm_facility(vcpu->kvm, 76))
Tony Krowiak5102ee82014-06-27 14:46:01 -04001276 return;
1277
Tony Krowiaka374e892014-09-03 10:13:53 +02001278 vcpu->arch.sie_block->ecb3 &= ~(ECB3_AES | ECB3_DEA);
1279
1280 if (vcpu->kvm->arch.crypto.aes_kw)
1281 vcpu->arch.sie_block->ecb3 |= ECB3_AES;
1282 if (vcpu->kvm->arch.crypto.dea_kw)
1283 vcpu->arch.sie_block->ecb3 |= ECB3_DEA;
1284
Tony Krowiak5102ee82014-06-27 14:46:01 -04001285 vcpu->arch.sie_block->crycbd = vcpu->kvm->arch.crypto.crycbd;
1286}
1287
Dominik Dingelb31605c2014-03-25 13:47:11 +01001288void kvm_s390_vcpu_unsetup_cmma(struct kvm_vcpu *vcpu)
1289{
1290 free_page(vcpu->arch.sie_block->cbrlo);
1291 vcpu->arch.sie_block->cbrlo = 0;
1292}
1293
1294int kvm_s390_vcpu_setup_cmma(struct kvm_vcpu *vcpu)
1295{
1296 vcpu->arch.sie_block->cbrlo = get_zeroed_page(GFP_KERNEL);
1297 if (!vcpu->arch.sie_block->cbrlo)
1298 return -ENOMEM;
1299
1300 vcpu->arch.sie_block->ecb2 |= 0x80;
1301 vcpu->arch.sie_block->ecb2 &= ~0x08;
1302 return 0;
1303}
1304
Michael Mueller91520f12015-02-27 14:32:11 +01001305static void kvm_s390_vcpu_setup_model(struct kvm_vcpu *vcpu)
1306{
1307 struct kvm_s390_cpu_model *model = &vcpu->kvm->arch.model;
1308
1309 vcpu->arch.cpu_id = model->cpu_id;
1310 vcpu->arch.sie_block->ibc = model->ibc;
1311 vcpu->arch.sie_block->fac = (int) (long) model->fac->list;
1312}
1313
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001314int kvm_arch_vcpu_setup(struct kvm_vcpu *vcpu)
1315{
Dominik Dingelb31605c2014-03-25 13:47:11 +01001316 int rc = 0;
Konstantin Weitzb31288f2013-04-17 17:36:29 +02001317
Cornelia Huck9e6dabe2011-11-17 11:00:41 +01001318 atomic_set(&vcpu->arch.sie_block->cpuflags, CPUSTAT_ZARCH |
1319 CPUSTAT_SM |
Guenther Hutzla4a4f192015-03-31 14:39:49 +02001320 CPUSTAT_STOPPED);
1321
Guenther Hutzl53df84f2015-02-18 11:13:03 +01001322 if (test_kvm_facility(vcpu->kvm, 78))
1323 atomic_set_mask(CPUSTAT_GED2, &vcpu->arch.sie_block->cpuflags);
1324 else if (test_kvm_facility(vcpu->kvm, 8))
Guenther Hutzla4a4f192015-03-31 14:39:49 +02001325 atomic_set_mask(CPUSTAT_GED, &vcpu->arch.sie_block->cpuflags);
1326
Michael Mueller91520f12015-02-27 14:32:11 +01001327 kvm_s390_vcpu_setup_model(vcpu);
1328
Christian Borntraegerfc345312010-06-17 23:16:20 +02001329 vcpu->arch.sie_block->ecb = 6;
Michael Mueller9d8d5782015-02-02 15:42:51 +01001330 if (test_kvm_facility(vcpu->kvm, 50) && test_kvm_facility(vcpu->kvm, 73))
Michael Mueller7feb6bb2013-06-28 13:30:24 +02001331 vcpu->arch.sie_block->ecb |= 0x10;
1332
Christian Borntraeger69d0d3a2013-06-12 13:54:53 +02001333 vcpu->arch.sie_block->ecb2 = 8;
David Hildenbrandea5f4962014-10-14 15:29:30 +02001334 vcpu->arch.sie_block->eca = 0xC1002000U;
David Hildenbrand37c5f6c2015-05-06 13:18:59 +02001335 if (sclp.has_siif)
Heiko Carstens217a4402013-12-30 12:54:14 +01001336 vcpu->arch.sie_block->eca |= 1;
David Hildenbrand37c5f6c2015-05-06 13:18:59 +02001337 if (sclp.has_sigpif)
David Hildenbrandea5f4962014-10-14 15:29:30 +02001338 vcpu->arch.sie_block->eca |= 0x10000000U;
Michael Mueller18280d82015-03-16 16:05:41 +01001339 if (test_kvm_facility(vcpu->kvm, 129)) {
Eric Farman13211ea2014-04-30 13:39:46 -04001340 vcpu->arch.sie_block->eca |= 0x00020000;
1341 vcpu->arch.sie_block->ecd |= 0x20000000;
1342 }
Thomas Huth492d8642015-02-10 16:11:01 +01001343 vcpu->arch.sie_block->ictl |= ICTL_ISKE | ICTL_SSKE | ICTL_RRBE;
Matthew Rosato5a5e6532013-01-29 11:48:20 -05001344
Dominik Dingelb31605c2014-03-25 13:47:11 +01001345 if (kvm_s390_cmma_enabled(vcpu->kvm)) {
1346 rc = kvm_s390_vcpu_setup_cmma(vcpu);
1347 if (rc)
1348 return rc;
Konstantin Weitzb31288f2013-04-17 17:36:29 +02001349 }
David Hildenbrand0ac96ca2014-12-12 15:17:31 +01001350 hrtimer_init(&vcpu->arch.ckc_timer, CLOCK_MONOTONIC, HRTIMER_MODE_REL);
Christian Borntraegerca872302009-05-12 17:21:49 +02001351 vcpu->arch.ckc_timer.function = kvm_s390_idle_wakeup;
Michael Mueller9d8d5782015-02-02 15:42:51 +01001352
Tony Krowiak5102ee82014-06-27 14:46:01 -04001353 kvm_s390_vcpu_crypto_setup(vcpu);
1354
Dominik Dingelb31605c2014-03-25 13:47:11 +01001355 return rc;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001356}
1357
1358struct kvm_vcpu *kvm_arch_vcpu_create(struct kvm *kvm,
1359 unsigned int id)
1360{
Carsten Otte4d475552011-10-18 12:27:12 +02001361 struct kvm_vcpu *vcpu;
Michael Mueller7feb6bb2013-06-28 13:30:24 +02001362 struct sie_page *sie_page;
Carsten Otte4d475552011-10-18 12:27:12 +02001363 int rc = -EINVAL;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001364
Carsten Otte4d475552011-10-18 12:27:12 +02001365 if (id >= KVM_MAX_VCPUS)
1366 goto out;
1367
1368 rc = -ENOMEM;
1369
Michael Muellerb110fea2013-06-12 13:54:54 +02001370 vcpu = kmem_cache_zalloc(kvm_vcpu_cache, GFP_KERNEL);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001371 if (!vcpu)
Carsten Otte4d475552011-10-18 12:27:12 +02001372 goto out;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001373
Michael Mueller7feb6bb2013-06-28 13:30:24 +02001374 sie_page = (struct sie_page *) get_zeroed_page(GFP_KERNEL);
1375 if (!sie_page)
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001376 goto out_free_cpu;
1377
Michael Mueller7feb6bb2013-06-28 13:30:24 +02001378 vcpu->arch.sie_block = &sie_page->sie_block;
1379 vcpu->arch.sie_block->itdba = (unsigned long) &sie_page->itdb;
Eric Farman68c55752014-06-09 10:57:26 -04001380 vcpu->arch.host_vregs = &sie_page->vregs;
Michael Mueller7feb6bb2013-06-28 13:30:24 +02001381
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001382 vcpu->arch.sie_block->icpua = id;
Carsten Otte58f94602012-01-04 10:25:27 +01001383 if (!kvm_is_ucontrol(kvm)) {
1384 if (!kvm->arch.sca) {
1385 WARN_ON_ONCE(1);
1386 goto out_free_cpu;
1387 }
1388 if (!kvm->arch.sca->cpu[id].sda)
1389 kvm->arch.sca->cpu[id].sda =
1390 (__u64) vcpu->arch.sie_block;
1391 vcpu->arch.sie_block->scaoh =
1392 (__u32)(((__u64)kvm->arch.sca) >> 32);
1393 vcpu->arch.sie_block->scaol = (__u32)(__u64)kvm->arch.sca;
1394 set_bit(63 - id, (unsigned long *) &kvm->arch.sca->mcn);
1395 }
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001396
Carsten Otteba5c1e92008-03-25 18:47:26 +01001397 spin_lock_init(&vcpu->arch.local_int.lock);
Carsten Otteba5c1e92008-03-25 18:47:26 +01001398 vcpu->arch.local_int.float_int = &kvm->arch.float_int;
Christian Borntraegerd0321a22013-06-12 13:54:55 +02001399 vcpu->arch.local_int.wq = &vcpu->wq;
Christian Borntraeger5288fbf2008-03-25 18:47:31 +01001400 vcpu->arch.local_int.cpuflags = &vcpu->arch.sie_block->cpuflags;
Carsten Otteba5c1e92008-03-25 18:47:26 +01001401
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001402 rc = kvm_vcpu_init(vcpu, kvm, id);
1403 if (rc)
Wei Yongjun7b06bf22010-03-09 14:37:53 +08001404 goto out_free_sie_block;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001405 VM_EVENT(kvm, 3, "create cpu %d at %p, sie block at %p", id, vcpu,
1406 vcpu->arch.sie_block);
Cornelia Huckade38c32012-07-23 17:20:30 +02001407 trace_kvm_s390_create_vcpu(id, vcpu, vcpu->arch.sie_block);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001408
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001409 return vcpu;
Wei Yongjun7b06bf22010-03-09 14:37:53 +08001410out_free_sie_block:
1411 free_page((unsigned long)(vcpu->arch.sie_block));
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001412out_free_cpu:
Michael Muellerb110fea2013-06-12 13:54:54 +02001413 kmem_cache_free(kvm_vcpu_cache, vcpu);
Carsten Otte4d475552011-10-18 12:27:12 +02001414out:
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001415 return ERR_PTR(rc);
1416}
1417
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001418int kvm_arch_vcpu_runnable(struct kvm_vcpu *vcpu)
1419{
David Hildenbrand9a022062014-08-05 17:40:47 +02001420 return kvm_s390_vcpu_has_irq(vcpu, 0);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001421}
1422
Christian Borntraeger27406cd2015-04-14 12:17:34 +02001423void kvm_s390_vcpu_block(struct kvm_vcpu *vcpu)
Christian Borntraeger49b99e12013-05-17 14:41:35 +02001424{
1425 atomic_set_mask(PROG_BLOCK_SIE, &vcpu->arch.sie_block->prog20);
David Hildenbrand61a6df52015-05-12 08:41:40 +02001426 exit_sie(vcpu);
Christian Borntraeger49b99e12013-05-17 14:41:35 +02001427}
1428
Christian Borntraeger27406cd2015-04-14 12:17:34 +02001429void kvm_s390_vcpu_unblock(struct kvm_vcpu *vcpu)
Christian Borntraeger49b99e12013-05-17 14:41:35 +02001430{
1431 atomic_clear_mask(PROG_BLOCK_SIE, &vcpu->arch.sie_block->prog20);
1432}
1433
Christian Borntraeger8e236542015-04-09 13:49:04 +02001434static void kvm_s390_vcpu_request(struct kvm_vcpu *vcpu)
1435{
1436 atomic_set_mask(PROG_REQUEST, &vcpu->arch.sie_block->prog20);
David Hildenbrand61a6df52015-05-12 08:41:40 +02001437 exit_sie(vcpu);
Christian Borntraeger8e236542015-04-09 13:49:04 +02001438}
1439
1440static void kvm_s390_vcpu_request_handled(struct kvm_vcpu *vcpu)
1441{
1442 atomic_clear_mask(PROG_REQUEST, &vcpu->arch.sie_block->prog20);
1443}
1444
Christian Borntraeger49b99e12013-05-17 14:41:35 +02001445/*
1446 * Kick a guest cpu out of SIE and wait until SIE is not running.
1447 * If the CPU is not running (e.g. waiting as idle) the function will
1448 * return immediately. */
1449void exit_sie(struct kvm_vcpu *vcpu)
1450{
1451 atomic_set_mask(CPUSTAT_STOP_INT, &vcpu->arch.sie_block->cpuflags);
1452 while (vcpu->arch.sie_block->prog0c & PROG_IN_SIE)
1453 cpu_relax();
1454}
1455
Christian Borntraeger8e236542015-04-09 13:49:04 +02001456/* Kick a guest cpu out of SIE to process a request synchronously */
1457void kvm_s390_sync_request(int req, struct kvm_vcpu *vcpu)
Christian Borntraeger49b99e12013-05-17 14:41:35 +02001458{
Christian Borntraeger8e236542015-04-09 13:49:04 +02001459 kvm_make_request(req, vcpu);
1460 kvm_s390_vcpu_request(vcpu);
Christian Borntraeger49b99e12013-05-17 14:41:35 +02001461}
1462
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02001463static void kvm_gmap_notifier(struct gmap *gmap, unsigned long address)
1464{
1465 int i;
1466 struct kvm *kvm = gmap->private;
1467 struct kvm_vcpu *vcpu;
1468
1469 kvm_for_each_vcpu(i, vcpu, kvm) {
1470 /* match against both prefix pages */
Michael Muellerfda902c2014-05-13 16:58:30 +02001471 if (kvm_s390_get_prefix(vcpu) == (address & ~0x1000UL)) {
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02001472 VCPU_EVENT(vcpu, 2, "gmap notifier for %lx", address);
Christian Borntraeger8e236542015-04-09 13:49:04 +02001473 kvm_s390_sync_request(KVM_REQ_MMU_RELOAD, vcpu);
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02001474 }
1475 }
1476}
1477
Christoffer Dallb6d33832012-03-08 16:44:24 -05001478int kvm_arch_vcpu_should_kick(struct kvm_vcpu *vcpu)
1479{
1480 /* kvm common code refers to this, but never calls it */
1481 BUG();
1482 return 0;
1483}
1484
Carsten Otte14eebd92012-05-15 14:15:26 +02001485static int kvm_arch_vcpu_ioctl_get_one_reg(struct kvm_vcpu *vcpu,
1486 struct kvm_one_reg *reg)
1487{
1488 int r = -EINVAL;
1489
1490 switch (reg->id) {
Carsten Otte29b7c712012-05-15 14:15:27 +02001491 case KVM_REG_S390_TODPR:
1492 r = put_user(vcpu->arch.sie_block->todpr,
1493 (u32 __user *)reg->addr);
1494 break;
1495 case KVM_REG_S390_EPOCHDIFF:
1496 r = put_user(vcpu->arch.sie_block->epoch,
1497 (u64 __user *)reg->addr);
1498 break;
Jason J. herne46a6dd12012-05-15 14:15:28 +02001499 case KVM_REG_S390_CPU_TIMER:
1500 r = put_user(vcpu->arch.sie_block->cputm,
1501 (u64 __user *)reg->addr);
1502 break;
1503 case KVM_REG_S390_CLOCK_COMP:
1504 r = put_user(vcpu->arch.sie_block->ckc,
1505 (u64 __user *)reg->addr);
1506 break;
Dominik Dingel536336c2013-09-30 10:55:33 +02001507 case KVM_REG_S390_PFTOKEN:
1508 r = put_user(vcpu->arch.pfault_token,
1509 (u64 __user *)reg->addr);
1510 break;
1511 case KVM_REG_S390_PFCOMPARE:
1512 r = put_user(vcpu->arch.pfault_compare,
1513 (u64 __user *)reg->addr);
1514 break;
1515 case KVM_REG_S390_PFSELECT:
1516 r = put_user(vcpu->arch.pfault_select,
1517 (u64 __user *)reg->addr);
1518 break;
Christian Borntraeger672550f2014-02-10 15:32:19 +01001519 case KVM_REG_S390_PP:
1520 r = put_user(vcpu->arch.sie_block->pp,
1521 (u64 __user *)reg->addr);
1522 break;
Christian Borntraegerafa45ff2014-02-10 15:39:23 +01001523 case KVM_REG_S390_GBEA:
1524 r = put_user(vcpu->arch.sie_block->gbea,
1525 (u64 __user *)reg->addr);
1526 break;
Carsten Otte14eebd92012-05-15 14:15:26 +02001527 default:
1528 break;
1529 }
1530
1531 return r;
1532}
1533
1534static int kvm_arch_vcpu_ioctl_set_one_reg(struct kvm_vcpu *vcpu,
1535 struct kvm_one_reg *reg)
1536{
1537 int r = -EINVAL;
1538
1539 switch (reg->id) {
Carsten Otte29b7c712012-05-15 14:15:27 +02001540 case KVM_REG_S390_TODPR:
1541 r = get_user(vcpu->arch.sie_block->todpr,
1542 (u32 __user *)reg->addr);
1543 break;
1544 case KVM_REG_S390_EPOCHDIFF:
1545 r = get_user(vcpu->arch.sie_block->epoch,
1546 (u64 __user *)reg->addr);
1547 break;
Jason J. herne46a6dd12012-05-15 14:15:28 +02001548 case KVM_REG_S390_CPU_TIMER:
1549 r = get_user(vcpu->arch.sie_block->cputm,
1550 (u64 __user *)reg->addr);
1551 break;
1552 case KVM_REG_S390_CLOCK_COMP:
1553 r = get_user(vcpu->arch.sie_block->ckc,
1554 (u64 __user *)reg->addr);
1555 break;
Dominik Dingel536336c2013-09-30 10:55:33 +02001556 case KVM_REG_S390_PFTOKEN:
1557 r = get_user(vcpu->arch.pfault_token,
1558 (u64 __user *)reg->addr);
David Hildenbrand9fbd8082014-10-09 15:01:38 +02001559 if (vcpu->arch.pfault_token == KVM_S390_PFAULT_TOKEN_INVALID)
1560 kvm_clear_async_pf_completion_queue(vcpu);
Dominik Dingel536336c2013-09-30 10:55:33 +02001561 break;
1562 case KVM_REG_S390_PFCOMPARE:
1563 r = get_user(vcpu->arch.pfault_compare,
1564 (u64 __user *)reg->addr);
1565 break;
1566 case KVM_REG_S390_PFSELECT:
1567 r = get_user(vcpu->arch.pfault_select,
1568 (u64 __user *)reg->addr);
1569 break;
Christian Borntraeger672550f2014-02-10 15:32:19 +01001570 case KVM_REG_S390_PP:
1571 r = get_user(vcpu->arch.sie_block->pp,
1572 (u64 __user *)reg->addr);
1573 break;
Christian Borntraegerafa45ff2014-02-10 15:39:23 +01001574 case KVM_REG_S390_GBEA:
1575 r = get_user(vcpu->arch.sie_block->gbea,
1576 (u64 __user *)reg->addr);
1577 break;
Carsten Otte14eebd92012-05-15 14:15:26 +02001578 default:
1579 break;
1580 }
1581
1582 return r;
1583}
Christoffer Dallb6d33832012-03-08 16:44:24 -05001584
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001585static int kvm_arch_vcpu_ioctl_initial_reset(struct kvm_vcpu *vcpu)
1586{
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001587 kvm_s390_vcpu_initial_reset(vcpu);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001588 return 0;
1589}
1590
1591int kvm_arch_vcpu_ioctl_set_regs(struct kvm_vcpu *vcpu, struct kvm_regs *regs)
1592{
Christian Borntraeger5a32c1a2012-01-11 11:20:32 +01001593 memcpy(&vcpu->run->s.regs.gprs, &regs->gprs, sizeof(regs->gprs));
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001594 return 0;
1595}
1596
1597int kvm_arch_vcpu_ioctl_get_regs(struct kvm_vcpu *vcpu, struct kvm_regs *regs)
1598{
Christian Borntraeger5a32c1a2012-01-11 11:20:32 +01001599 memcpy(&regs->gprs, &vcpu->run->s.regs.gprs, sizeof(regs->gprs));
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001600 return 0;
1601}
1602
1603int kvm_arch_vcpu_ioctl_set_sregs(struct kvm_vcpu *vcpu,
1604 struct kvm_sregs *sregs)
1605{
Christian Borntraeger59674c12012-01-11 11:20:33 +01001606 memcpy(&vcpu->run->s.regs.acrs, &sregs->acrs, sizeof(sregs->acrs));
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001607 memcpy(&vcpu->arch.sie_block->gcr, &sregs->crs, sizeof(sregs->crs));
Christian Borntraeger59674c12012-01-11 11:20:33 +01001608 restore_access_regs(vcpu->run->s.regs.acrs);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001609 return 0;
1610}
1611
1612int kvm_arch_vcpu_ioctl_get_sregs(struct kvm_vcpu *vcpu,
1613 struct kvm_sregs *sregs)
1614{
Christian Borntraeger59674c12012-01-11 11:20:33 +01001615 memcpy(&sregs->acrs, &vcpu->run->s.regs.acrs, sizeof(sregs->acrs));
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001616 memcpy(&sregs->crs, &vcpu->arch.sie_block->gcr, sizeof(sregs->crs));
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001617 return 0;
1618}
1619
1620int kvm_arch_vcpu_ioctl_set_fpu(struct kvm_vcpu *vcpu, struct kvm_fpu *fpu)
1621{
Martin Schwidefsky4725c862013-10-15 16:08:34 +02001622 if (test_fp_ctl(fpu->fpc))
1623 return -EINVAL;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001624 memcpy(&vcpu->arch.guest_fpregs.fprs, &fpu->fprs, sizeof(fpu->fprs));
Martin Schwidefsky4725c862013-10-15 16:08:34 +02001625 vcpu->arch.guest_fpregs.fpc = fpu->fpc;
1626 restore_fp_ctl(&vcpu->arch.guest_fpregs.fpc);
1627 restore_fp_regs(vcpu->arch.guest_fpregs.fprs);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001628 return 0;
1629}
1630
1631int kvm_arch_vcpu_ioctl_get_fpu(struct kvm_vcpu *vcpu, struct kvm_fpu *fpu)
1632{
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001633 memcpy(&fpu->fprs, &vcpu->arch.guest_fpregs.fprs, sizeof(fpu->fprs));
1634 fpu->fpc = vcpu->arch.guest_fpregs.fpc;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001635 return 0;
1636}
1637
1638static int kvm_arch_vcpu_ioctl_set_initial_psw(struct kvm_vcpu *vcpu, psw_t psw)
1639{
1640 int rc = 0;
1641
David Hildenbrand7a42fdc2014-05-05 16:26:19 +02001642 if (!is_vcpu_stopped(vcpu))
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001643 rc = -EBUSY;
Carsten Otted7b0b5e2009-11-19 14:21:16 +01001644 else {
1645 vcpu->run->psw_mask = psw.mask;
1646 vcpu->run->psw_addr = psw.addr;
1647 }
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001648 return rc;
1649}
1650
1651int kvm_arch_vcpu_ioctl_translate(struct kvm_vcpu *vcpu,
1652 struct kvm_translation *tr)
1653{
1654 return -EINVAL; /* not implemented yet */
1655}
1656
David Hildenbrand27291e22014-01-23 12:26:52 +01001657#define VALID_GUESTDBG_FLAGS (KVM_GUESTDBG_SINGLESTEP | \
1658 KVM_GUESTDBG_USE_HW_BP | \
1659 KVM_GUESTDBG_ENABLE)
1660
Jan Kiszkad0bfb942008-12-15 13:52:10 +01001661int kvm_arch_vcpu_ioctl_set_guest_debug(struct kvm_vcpu *vcpu,
1662 struct kvm_guest_debug *dbg)
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001663{
David Hildenbrand27291e22014-01-23 12:26:52 +01001664 int rc = 0;
1665
1666 vcpu->guest_debug = 0;
1667 kvm_s390_clear_bp_data(vcpu);
1668
David Hildenbrand2de3bfc2014-05-20 17:25:20 +02001669 if (dbg->control & ~VALID_GUESTDBG_FLAGS)
David Hildenbrand27291e22014-01-23 12:26:52 +01001670 return -EINVAL;
1671
1672 if (dbg->control & KVM_GUESTDBG_ENABLE) {
1673 vcpu->guest_debug = dbg->control;
1674 /* enforce guest PER */
1675 atomic_set_mask(CPUSTAT_P, &vcpu->arch.sie_block->cpuflags);
1676
1677 if (dbg->control & KVM_GUESTDBG_USE_HW_BP)
1678 rc = kvm_s390_import_bp_data(vcpu, dbg);
1679 } else {
1680 atomic_clear_mask(CPUSTAT_P, &vcpu->arch.sie_block->cpuflags);
1681 vcpu->arch.guestdbg.last_bp = 0;
1682 }
1683
1684 if (rc) {
1685 vcpu->guest_debug = 0;
1686 kvm_s390_clear_bp_data(vcpu);
1687 atomic_clear_mask(CPUSTAT_P, &vcpu->arch.sie_block->cpuflags);
1688 }
1689
1690 return rc;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001691}
1692
Marcelo Tosatti62d9f0d2008-04-11 13:24:45 -03001693int kvm_arch_vcpu_ioctl_get_mpstate(struct kvm_vcpu *vcpu,
1694 struct kvm_mp_state *mp_state)
1695{
David Hildenbrand6352e4d2014-04-10 17:35:00 +02001696 /* CHECK_STOP and LOAD are not supported yet */
1697 return is_vcpu_stopped(vcpu) ? KVM_MP_STATE_STOPPED :
1698 KVM_MP_STATE_OPERATING;
Marcelo Tosatti62d9f0d2008-04-11 13:24:45 -03001699}
1700
1701int kvm_arch_vcpu_ioctl_set_mpstate(struct kvm_vcpu *vcpu,
1702 struct kvm_mp_state *mp_state)
1703{
David Hildenbrand6352e4d2014-04-10 17:35:00 +02001704 int rc = 0;
1705
1706 /* user space knows about this interface - let it control the state */
1707 vcpu->kvm->arch.user_cpu_state_ctrl = 1;
1708
1709 switch (mp_state->mp_state) {
1710 case KVM_MP_STATE_STOPPED:
1711 kvm_s390_vcpu_stop(vcpu);
1712 break;
1713 case KVM_MP_STATE_OPERATING:
1714 kvm_s390_vcpu_start(vcpu);
1715 break;
1716 case KVM_MP_STATE_LOAD:
1717 case KVM_MP_STATE_CHECK_STOP:
1718 /* fall through - CHECK_STOP and LOAD are not supported yet */
1719 default:
1720 rc = -ENXIO;
1721 }
1722
1723 return rc;
Marcelo Tosatti62d9f0d2008-04-11 13:24:45 -03001724}
1725
Dominik Dingelb31605c2014-03-25 13:47:11 +01001726bool kvm_s390_cmma_enabled(struct kvm *kvm)
1727{
1728 if (!MACHINE_IS_LPAR)
1729 return false;
1730 /* only enable for z10 and later */
1731 if (!MACHINE_HAS_EDAT1)
1732 return false;
1733 if (!kvm->arch.use_cmma)
1734 return false;
1735 return true;
1736}
1737
David Hildenbrand8ad35752014-03-14 11:00:21 +01001738static bool ibs_enabled(struct kvm_vcpu *vcpu)
1739{
1740 return atomic_read(&vcpu->arch.sie_block->cpuflags) & CPUSTAT_IBS;
1741}
1742
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02001743static int kvm_s390_handle_requests(struct kvm_vcpu *vcpu)
1744{
David Hildenbrand8ad35752014-03-14 11:00:21 +01001745retry:
Christian Borntraeger8e236542015-04-09 13:49:04 +02001746 kvm_s390_vcpu_request_handled(vcpu);
Christian Borntraeger586b7cc2015-07-28 15:03:05 +02001747 if (!vcpu->requests)
1748 return 0;
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02001749 /*
1750 * We use MMU_RELOAD just to re-arm the ipte notifier for the
1751 * guest prefix page. gmap_ipte_notify will wait on the ptl lock.
1752 * This ensures that the ipte instruction for this request has
1753 * already finished. We might race against a second unmapper that
1754 * wants to set the blocking bit. Lets just retry the request loop.
1755 */
David Hildenbrand8ad35752014-03-14 11:00:21 +01001756 if (kvm_check_request(KVM_REQ_MMU_RELOAD, vcpu)) {
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02001757 int rc;
1758 rc = gmap_ipte_notify(vcpu->arch.gmap,
Michael Muellerfda902c2014-05-13 16:58:30 +02001759 kvm_s390_get_prefix(vcpu),
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02001760 PAGE_SIZE * 2);
1761 if (rc)
1762 return rc;
David Hildenbrand8ad35752014-03-14 11:00:21 +01001763 goto retry;
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02001764 }
David Hildenbrand8ad35752014-03-14 11:00:21 +01001765
David Hildenbrandd3d692c2014-07-29 08:53:36 +02001766 if (kvm_check_request(KVM_REQ_TLB_FLUSH, vcpu)) {
1767 vcpu->arch.sie_block->ihcpu = 0xffff;
1768 goto retry;
1769 }
1770
David Hildenbrand8ad35752014-03-14 11:00:21 +01001771 if (kvm_check_request(KVM_REQ_ENABLE_IBS, vcpu)) {
1772 if (!ibs_enabled(vcpu)) {
1773 trace_kvm_s390_enable_disable_ibs(vcpu->vcpu_id, 1);
1774 atomic_set_mask(CPUSTAT_IBS,
1775 &vcpu->arch.sie_block->cpuflags);
1776 }
1777 goto retry;
1778 }
1779
1780 if (kvm_check_request(KVM_REQ_DISABLE_IBS, vcpu)) {
1781 if (ibs_enabled(vcpu)) {
1782 trace_kvm_s390_enable_disable_ibs(vcpu->vcpu_id, 0);
1783 atomic_clear_mask(CPUSTAT_IBS,
1784 &vcpu->arch.sie_block->cpuflags);
1785 }
1786 goto retry;
1787 }
1788
David Hildenbrand0759d062014-05-13 16:54:32 +02001789 /* nothing to do, just clear the request */
1790 clear_bit(KVM_REQ_UNHALT, &vcpu->requests);
1791
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02001792 return 0;
1793}
1794
Thomas Huthfa576c52014-05-06 17:20:16 +02001795/**
1796 * kvm_arch_fault_in_page - fault-in guest page if necessary
1797 * @vcpu: The corresponding virtual cpu
1798 * @gpa: Guest physical address
1799 * @writable: Whether the page should be writable or not
1800 *
1801 * Make sure that a guest page has been faulted-in on the host.
1802 *
1803 * Return: Zero on success, negative error code otherwise.
1804 */
1805long kvm_arch_fault_in_page(struct kvm_vcpu *vcpu, gpa_t gpa, int writable)
Dominik Dingel24eb3a82013-06-17 16:25:18 +02001806{
Martin Schwidefsky527e30b2014-04-30 16:04:25 +02001807 return gmap_fault(vcpu->arch.gmap, gpa,
1808 writable ? FAULT_FLAG_WRITE : 0);
Dominik Dingel24eb3a82013-06-17 16:25:18 +02001809}
1810
Dominik Dingel3c038e62013-10-07 17:11:48 +02001811static void __kvm_inject_pfault_token(struct kvm_vcpu *vcpu, bool start_token,
1812 unsigned long token)
1813{
1814 struct kvm_s390_interrupt inti;
Jens Freimann383d0b02014-07-29 15:11:49 +02001815 struct kvm_s390_irq irq;
Dominik Dingel3c038e62013-10-07 17:11:48 +02001816
1817 if (start_token) {
Jens Freimann383d0b02014-07-29 15:11:49 +02001818 irq.u.ext.ext_params2 = token;
1819 irq.type = KVM_S390_INT_PFAULT_INIT;
1820 WARN_ON_ONCE(kvm_s390_inject_vcpu(vcpu, &irq));
Dominik Dingel3c038e62013-10-07 17:11:48 +02001821 } else {
1822 inti.type = KVM_S390_INT_PFAULT_DONE;
Jens Freimann383d0b02014-07-29 15:11:49 +02001823 inti.parm64 = token;
Dominik Dingel3c038e62013-10-07 17:11:48 +02001824 WARN_ON_ONCE(kvm_s390_inject_vm(vcpu->kvm, &inti));
1825 }
1826}
1827
1828void kvm_arch_async_page_not_present(struct kvm_vcpu *vcpu,
1829 struct kvm_async_pf *work)
1830{
1831 trace_kvm_s390_pfault_init(vcpu, work->arch.pfault_token);
1832 __kvm_inject_pfault_token(vcpu, true, work->arch.pfault_token);
1833}
1834
1835void kvm_arch_async_page_present(struct kvm_vcpu *vcpu,
1836 struct kvm_async_pf *work)
1837{
1838 trace_kvm_s390_pfault_done(vcpu, work->arch.pfault_token);
1839 __kvm_inject_pfault_token(vcpu, false, work->arch.pfault_token);
1840}
1841
1842void kvm_arch_async_page_ready(struct kvm_vcpu *vcpu,
1843 struct kvm_async_pf *work)
1844{
1845 /* s390 will always inject the page directly */
1846}
1847
1848bool kvm_arch_can_inject_async_page_present(struct kvm_vcpu *vcpu)
1849{
1850 /*
1851 * s390 will always inject the page directly,
1852 * but we still want check_async_completion to cleanup
1853 */
1854 return true;
1855}
1856
1857static int kvm_arch_setup_async_pf(struct kvm_vcpu *vcpu)
1858{
1859 hva_t hva;
1860 struct kvm_arch_async_pf arch;
1861 int rc;
1862
1863 if (vcpu->arch.pfault_token == KVM_S390_PFAULT_TOKEN_INVALID)
1864 return 0;
1865 if ((vcpu->arch.sie_block->gpsw.mask & vcpu->arch.pfault_select) !=
1866 vcpu->arch.pfault_compare)
1867 return 0;
1868 if (psw_extint_disabled(vcpu))
1869 return 0;
David Hildenbrand9a022062014-08-05 17:40:47 +02001870 if (kvm_s390_vcpu_has_irq(vcpu, 0))
Dominik Dingel3c038e62013-10-07 17:11:48 +02001871 return 0;
1872 if (!(vcpu->arch.sie_block->gcr[0] & 0x200ul))
1873 return 0;
1874 if (!vcpu->arch.gmap->pfault_enabled)
1875 return 0;
1876
Heiko Carstens81480cc2014-01-01 16:36:07 +01001877 hva = gfn_to_hva(vcpu->kvm, gpa_to_gfn(current->thread.gmap_addr));
1878 hva += current->thread.gmap_addr & ~PAGE_MASK;
1879 if (read_guest_real(vcpu, vcpu->arch.pfault_token, &arch.pfault_token, 8))
Dominik Dingel3c038e62013-10-07 17:11:48 +02001880 return 0;
1881
1882 rc = kvm_setup_async_pf(vcpu, current->thread.gmap_addr, hva, &arch);
1883 return rc;
1884}
1885
Thomas Huth3fb4c402013-09-12 10:33:43 +02001886static int vcpu_pre_run(struct kvm_vcpu *vcpu)
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001887{
Thomas Huth3fb4c402013-09-12 10:33:43 +02001888 int rc, cpuflags;
Carsten Ottee168bf82012-01-04 10:25:22 +01001889
Dominik Dingel3c038e62013-10-07 17:11:48 +02001890 /*
1891 * On s390 notifications for arriving pages will be delivered directly
1892 * to the guest but the house keeping for completed pfaults is
1893 * handled outside the worker.
1894 */
1895 kvm_check_async_pf_completion(vcpu);
1896
Christian Borntraeger5a32c1a2012-01-11 11:20:32 +01001897 memcpy(&vcpu->arch.sie_block->gg14, &vcpu->run->s.regs.gprs[14], 16);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001898
1899 if (need_resched())
1900 schedule();
1901
Martin Schwidefskyd3a73ac2014-04-15 12:55:07 +02001902 if (test_cpu_flag(CIF_MCCK_PENDING))
Christian Borntraeger71cde582008-05-21 13:37:34 +02001903 s390_handle_mcck();
1904
Jens Freimann79395032014-04-17 10:10:30 +02001905 if (!kvm_is_ucontrol(vcpu->kvm)) {
1906 rc = kvm_s390_deliver_pending_interrupts(vcpu);
1907 if (rc)
1908 return rc;
1909 }
Carsten Otte0ff31862008-05-21 13:37:37 +02001910
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02001911 rc = kvm_s390_handle_requests(vcpu);
1912 if (rc)
1913 return rc;
1914
David Hildenbrand27291e22014-01-23 12:26:52 +01001915 if (guestdbg_enabled(vcpu)) {
1916 kvm_s390_backup_guest_per_regs(vcpu);
1917 kvm_s390_patch_guest_per_regs(vcpu);
1918 }
1919
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001920 vcpu->arch.sie_block->icptcode = 0;
Thomas Huth3fb4c402013-09-12 10:33:43 +02001921 cpuflags = atomic_read(&vcpu->arch.sie_block->cpuflags);
1922 VCPU_EVENT(vcpu, 6, "entering sie flags %x", cpuflags);
1923 trace_kvm_s390_sie_enter(vcpu, cpuflags);
Dominik Dingel2b29a9f2013-07-26 15:04:00 +02001924
Thomas Huth3fb4c402013-09-12 10:33:43 +02001925 return 0;
1926}
1927
Thomas Huth492d8642015-02-10 16:11:01 +01001928static int vcpu_post_run_fault_in_sie(struct kvm_vcpu *vcpu)
1929{
1930 psw_t *psw = &vcpu->arch.sie_block->gpsw;
1931 u8 opcode;
1932 int rc;
1933
1934 VCPU_EVENT(vcpu, 3, "%s", "fault in sie instruction");
1935 trace_kvm_s390_sie_fault(vcpu);
1936
1937 /*
1938 * We want to inject an addressing exception, which is defined as a
1939 * suppressing or terminating exception. However, since we came here
1940 * by a DAT access exception, the PSW still points to the faulting
1941 * instruction since DAT exceptions are nullifying. So we've got
1942 * to look up the current opcode to get the length of the instruction
1943 * to be able to forward the PSW.
1944 */
Alexander Yarygin8ae04b82015-01-19 13:24:51 +03001945 rc = read_guest(vcpu, psw->addr, 0, &opcode, 1);
Thomas Huth492d8642015-02-10 16:11:01 +01001946 if (rc)
1947 return kvm_s390_inject_prog_cond(vcpu, rc);
1948 psw->addr = __rewind_psw(*psw, -insn_length(opcode));
1949
1950 return kvm_s390_inject_program_int(vcpu, PGM_ADDRESSING);
1951}
1952
Thomas Huth3fb4c402013-09-12 10:33:43 +02001953static int vcpu_post_run(struct kvm_vcpu *vcpu, int exit_reason)
1954{
Dominik Dingel24eb3a82013-06-17 16:25:18 +02001955 int rc = -1;
Dominik Dingel2b29a9f2013-07-26 15:04:00 +02001956
1957 VCPU_EVENT(vcpu, 6, "exit sie icptcode %d",
1958 vcpu->arch.sie_block->icptcode);
1959 trace_kvm_s390_sie_exit(vcpu, vcpu->arch.sie_block->icptcode);
1960
David Hildenbrand27291e22014-01-23 12:26:52 +01001961 if (guestdbg_enabled(vcpu))
1962 kvm_s390_restore_guest_per_regs(vcpu);
1963
Thomas Huth3fb4c402013-09-12 10:33:43 +02001964 if (exit_reason >= 0) {
Martin Schwidefsky7c470532013-05-17 14:41:37 +02001965 rc = 0;
Thomas Huth210b16072013-09-19 16:26:18 +02001966 } else if (kvm_is_ucontrol(vcpu->kvm)) {
1967 vcpu->run->exit_reason = KVM_EXIT_S390_UCONTROL;
1968 vcpu->run->s390_ucontrol.trans_exc_code =
1969 current->thread.gmap_addr;
1970 vcpu->run->s390_ucontrol.pgm_code = 0x10;
1971 rc = -EREMOTE;
Dominik Dingel24eb3a82013-06-17 16:25:18 +02001972
1973 } else if (current->thread.gmap_pfault) {
Dominik Dingel3c038e62013-10-07 17:11:48 +02001974 trace_kvm_s390_major_guest_pfault(vcpu);
Dominik Dingel24eb3a82013-06-17 16:25:18 +02001975 current->thread.gmap_pfault = 0;
Thomas Huthfa576c52014-05-06 17:20:16 +02001976 if (kvm_arch_setup_async_pf(vcpu)) {
Dominik Dingel24eb3a82013-06-17 16:25:18 +02001977 rc = 0;
Thomas Huthfa576c52014-05-06 17:20:16 +02001978 } else {
1979 gpa_t gpa = current->thread.gmap_addr;
1980 rc = kvm_arch_fault_in_page(vcpu, gpa, 1);
1981 }
Dominik Dingel24eb3a82013-06-17 16:25:18 +02001982 }
1983
Thomas Huth492d8642015-02-10 16:11:01 +01001984 if (rc == -1)
1985 rc = vcpu_post_run_fault_in_sie(vcpu);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001986
Christian Borntraeger5a32c1a2012-01-11 11:20:32 +01001987 memcpy(&vcpu->run->s.regs.gprs[14], &vcpu->arch.sie_block->gg14, 16);
Thomas Huth3fb4c402013-09-12 10:33:43 +02001988
Thomas Hutha76ccff2013-09-12 10:33:44 +02001989 if (rc == 0) {
1990 if (kvm_is_ucontrol(vcpu->kvm))
Christian Borntraeger2955c832014-03-06 16:01:38 +01001991 /* Don't exit for host interrupts. */
1992 rc = vcpu->arch.sie_block->icptcode ? -EOPNOTSUPP : 0;
Thomas Hutha76ccff2013-09-12 10:33:44 +02001993 else
1994 rc = kvm_handle_sie_intercept(vcpu);
1995 }
1996
Thomas Huth3fb4c402013-09-12 10:33:43 +02001997 return rc;
1998}
1999
2000static int __vcpu_run(struct kvm_vcpu *vcpu)
2001{
2002 int rc, exit_reason;
2003
Thomas Huth800c1062013-09-12 10:33:45 +02002004 /*
2005 * We try to hold kvm->srcu during most of vcpu_run (except when run-
2006 * ning the guest), so that memslots (and other stuff) are protected
2007 */
2008 vcpu->srcu_idx = srcu_read_lock(&vcpu->kvm->srcu);
2009
Thomas Hutha76ccff2013-09-12 10:33:44 +02002010 do {
2011 rc = vcpu_pre_run(vcpu);
2012 if (rc)
2013 break;
Thomas Huth3fb4c402013-09-12 10:33:43 +02002014
Thomas Huth800c1062013-09-12 10:33:45 +02002015 srcu_read_unlock(&vcpu->kvm->srcu, vcpu->srcu_idx);
Thomas Hutha76ccff2013-09-12 10:33:44 +02002016 /*
2017 * As PF_VCPU will be used in fault handler, between
2018 * guest_enter and guest_exit should be no uaccess.
2019 */
Christian Borntraeger0097d122015-04-30 13:43:30 +02002020 local_irq_disable();
2021 __kvm_guest_enter();
2022 local_irq_enable();
Thomas Hutha76ccff2013-09-12 10:33:44 +02002023 exit_reason = sie64a(vcpu->arch.sie_block,
2024 vcpu->run->s.regs.gprs);
Christian Borntraeger0097d122015-04-30 13:43:30 +02002025 local_irq_disable();
2026 __kvm_guest_exit();
2027 local_irq_enable();
Thomas Huth800c1062013-09-12 10:33:45 +02002028 vcpu->srcu_idx = srcu_read_lock(&vcpu->kvm->srcu);
Thomas Huth3fb4c402013-09-12 10:33:43 +02002029
Thomas Hutha76ccff2013-09-12 10:33:44 +02002030 rc = vcpu_post_run(vcpu, exit_reason);
David Hildenbrand27291e22014-01-23 12:26:52 +01002031 } while (!signal_pending(current) && !guestdbg_exit_pending(vcpu) && !rc);
Thomas Huth3fb4c402013-09-12 10:33:43 +02002032
Thomas Huth800c1062013-09-12 10:33:45 +02002033 srcu_read_unlock(&vcpu->kvm->srcu, vcpu->srcu_idx);
Carsten Ottee168bf82012-01-04 10:25:22 +01002034 return rc;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002035}
2036
David Hildenbrandb028ee32014-07-17 10:47:43 +02002037static void sync_regs(struct kvm_vcpu *vcpu, struct kvm_run *kvm_run)
2038{
2039 vcpu->arch.sie_block->gpsw.mask = kvm_run->psw_mask;
2040 vcpu->arch.sie_block->gpsw.addr = kvm_run->psw_addr;
2041 if (kvm_run->kvm_dirty_regs & KVM_SYNC_PREFIX)
2042 kvm_s390_set_prefix(vcpu, kvm_run->s.regs.prefix);
2043 if (kvm_run->kvm_dirty_regs & KVM_SYNC_CRS) {
2044 memcpy(&vcpu->arch.sie_block->gcr, &kvm_run->s.regs.crs, 128);
David Hildenbrandd3d692c2014-07-29 08:53:36 +02002045 /* some control register changes require a tlb flush */
2046 kvm_make_request(KVM_REQ_TLB_FLUSH, vcpu);
David Hildenbrandb028ee32014-07-17 10:47:43 +02002047 }
2048 if (kvm_run->kvm_dirty_regs & KVM_SYNC_ARCH0) {
2049 vcpu->arch.sie_block->cputm = kvm_run->s.regs.cputm;
2050 vcpu->arch.sie_block->ckc = kvm_run->s.regs.ckc;
2051 vcpu->arch.sie_block->todpr = kvm_run->s.regs.todpr;
2052 vcpu->arch.sie_block->pp = kvm_run->s.regs.pp;
2053 vcpu->arch.sie_block->gbea = kvm_run->s.regs.gbea;
2054 }
2055 if (kvm_run->kvm_dirty_regs & KVM_SYNC_PFAULT) {
2056 vcpu->arch.pfault_token = kvm_run->s.regs.pft;
2057 vcpu->arch.pfault_select = kvm_run->s.regs.pfs;
2058 vcpu->arch.pfault_compare = kvm_run->s.regs.pfc;
David Hildenbrand9fbd8082014-10-09 15:01:38 +02002059 if (vcpu->arch.pfault_token == KVM_S390_PFAULT_TOKEN_INVALID)
2060 kvm_clear_async_pf_completion_queue(vcpu);
David Hildenbrandb028ee32014-07-17 10:47:43 +02002061 }
2062 kvm_run->kvm_dirty_regs = 0;
2063}
2064
2065static void store_regs(struct kvm_vcpu *vcpu, struct kvm_run *kvm_run)
2066{
2067 kvm_run->psw_mask = vcpu->arch.sie_block->gpsw.mask;
2068 kvm_run->psw_addr = vcpu->arch.sie_block->gpsw.addr;
2069 kvm_run->s.regs.prefix = kvm_s390_get_prefix(vcpu);
2070 memcpy(&kvm_run->s.regs.crs, &vcpu->arch.sie_block->gcr, 128);
2071 kvm_run->s.regs.cputm = vcpu->arch.sie_block->cputm;
2072 kvm_run->s.regs.ckc = vcpu->arch.sie_block->ckc;
2073 kvm_run->s.regs.todpr = vcpu->arch.sie_block->todpr;
2074 kvm_run->s.regs.pp = vcpu->arch.sie_block->pp;
2075 kvm_run->s.regs.gbea = vcpu->arch.sie_block->gbea;
2076 kvm_run->s.regs.pft = vcpu->arch.pfault_token;
2077 kvm_run->s.regs.pfs = vcpu->arch.pfault_select;
2078 kvm_run->s.regs.pfc = vcpu->arch.pfault_compare;
2079}
2080
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002081int kvm_arch_vcpu_ioctl_run(struct kvm_vcpu *vcpu, struct kvm_run *kvm_run)
2082{
Christian Borntraeger8f2abe62008-03-25 18:47:23 +01002083 int rc;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002084 sigset_t sigsaved;
2085
David Hildenbrand27291e22014-01-23 12:26:52 +01002086 if (guestdbg_exit_pending(vcpu)) {
2087 kvm_s390_prepare_debug_exit(vcpu);
2088 return 0;
2089 }
2090
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002091 if (vcpu->sigset_active)
2092 sigprocmask(SIG_SETMASK, &vcpu->sigset, &sigsaved);
2093
David Hildenbrand6352e4d2014-04-10 17:35:00 +02002094 if (!kvm_s390_user_cpu_state_ctrl(vcpu->kvm)) {
2095 kvm_s390_vcpu_start(vcpu);
2096 } else if (is_vcpu_stopped(vcpu)) {
David Hildenbrandea2cdd22015-05-20 13:24:02 +02002097 pr_err_ratelimited("can't run stopped vcpu %d\n",
David Hildenbrand6352e4d2014-04-10 17:35:00 +02002098 vcpu->vcpu_id);
2099 return -EINVAL;
2100 }
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002101
David Hildenbrandb028ee32014-07-17 10:47:43 +02002102 sync_regs(vcpu, kvm_run);
Carsten Otted7b0b5e2009-11-19 14:21:16 +01002103
Heiko Carstensdab4079d2009-06-12 10:26:32 +02002104 might_fault();
Thomas Hutha76ccff2013-09-12 10:33:44 +02002105 rc = __vcpu_run(vcpu);
Christian Ehrhardt9ace9032009-05-20 15:34:55 +02002106
Christian Ehrhardtb1d16c42009-05-20 15:34:56 +02002107 if (signal_pending(current) && !rc) {
2108 kvm_run->exit_reason = KVM_EXIT_INTR;
Christian Borntraeger8f2abe62008-03-25 18:47:23 +01002109 rc = -EINTR;
Christian Ehrhardtb1d16c42009-05-20 15:34:56 +02002110 }
Christian Borntraeger8f2abe62008-03-25 18:47:23 +01002111
David Hildenbrand27291e22014-01-23 12:26:52 +01002112 if (guestdbg_exit_pending(vcpu) && !rc) {
2113 kvm_s390_prepare_debug_exit(vcpu);
2114 rc = 0;
2115 }
2116
Heiko Carstensb8e660b2010-02-26 22:37:41 +01002117 if (rc == -EOPNOTSUPP) {
Christian Borntraeger8f2abe62008-03-25 18:47:23 +01002118 /* intercept cannot be handled in-kernel, prepare kvm-run */
2119 kvm_run->exit_reason = KVM_EXIT_S390_SIEIC;
2120 kvm_run->s390_sieic.icptcode = vcpu->arch.sie_block->icptcode;
Christian Borntraeger8f2abe62008-03-25 18:47:23 +01002121 kvm_run->s390_sieic.ipa = vcpu->arch.sie_block->ipa;
2122 kvm_run->s390_sieic.ipb = vcpu->arch.sie_block->ipb;
2123 rc = 0;
2124 }
2125
2126 if (rc == -EREMOTE) {
2127 /* intercept was handled, but userspace support is needed
2128 * kvm_run has been prepared by the handler */
2129 rc = 0;
2130 }
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002131
David Hildenbrandb028ee32014-07-17 10:47:43 +02002132 store_regs(vcpu, kvm_run);
Carsten Otted7b0b5e2009-11-19 14:21:16 +01002133
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002134 if (vcpu->sigset_active)
2135 sigprocmask(SIG_SETMASK, &sigsaved, NULL);
2136
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002137 vcpu->stat.exit_userspace++;
Heiko Carstens7e8e6ab2008-04-04 15:12:35 +02002138 return rc;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002139}
2140
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002141/*
2142 * store status at address
2143 * we use have two special cases:
2144 * KVM_S390_STORE_STATUS_NOADDR: -> 0x1200 on 64 bit
2145 * KVM_S390_STORE_STATUS_PREFIXED: -> prefix
2146 */
Heiko Carstensd0bce602014-01-01 16:45:58 +01002147int kvm_s390_store_status_unloaded(struct kvm_vcpu *vcpu, unsigned long gpa)
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002148{
Carsten Otte092670c2011-07-24 10:48:22 +02002149 unsigned char archmode = 1;
Michael Muellerfda902c2014-05-13 16:58:30 +02002150 unsigned int px;
Thomas Huth178bd782013-11-13 20:28:18 +01002151 u64 clkcomp;
Heiko Carstensd0bce602014-01-01 16:45:58 +01002152 int rc;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002153
Heiko Carstensd0bce602014-01-01 16:45:58 +01002154 if (gpa == KVM_S390_STORE_STATUS_NOADDR) {
2155 if (write_guest_abs(vcpu, 163, &archmode, 1))
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002156 return -EFAULT;
Heiko Carstensd0bce602014-01-01 16:45:58 +01002157 gpa = SAVE_AREA_BASE;
2158 } else if (gpa == KVM_S390_STORE_STATUS_PREFIXED) {
2159 if (write_guest_real(vcpu, 163, &archmode, 1))
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002160 return -EFAULT;
Heiko Carstensd0bce602014-01-01 16:45:58 +01002161 gpa = kvm_s390_real_to_abs(vcpu, SAVE_AREA_BASE);
2162 }
2163 rc = write_guest_abs(vcpu, gpa + offsetof(struct save_area, fp_regs),
2164 vcpu->arch.guest_fpregs.fprs, 128);
2165 rc |= write_guest_abs(vcpu, gpa + offsetof(struct save_area, gp_regs),
2166 vcpu->run->s.regs.gprs, 128);
2167 rc |= write_guest_abs(vcpu, gpa + offsetof(struct save_area, psw),
2168 &vcpu->arch.sie_block->gpsw, 16);
Michael Muellerfda902c2014-05-13 16:58:30 +02002169 px = kvm_s390_get_prefix(vcpu);
Heiko Carstensd0bce602014-01-01 16:45:58 +01002170 rc |= write_guest_abs(vcpu, gpa + offsetof(struct save_area, pref_reg),
Michael Muellerfda902c2014-05-13 16:58:30 +02002171 &px, 4);
Heiko Carstensd0bce602014-01-01 16:45:58 +01002172 rc |= write_guest_abs(vcpu,
2173 gpa + offsetof(struct save_area, fp_ctrl_reg),
2174 &vcpu->arch.guest_fpregs.fpc, 4);
2175 rc |= write_guest_abs(vcpu, gpa + offsetof(struct save_area, tod_reg),
2176 &vcpu->arch.sie_block->todpr, 4);
2177 rc |= write_guest_abs(vcpu, gpa + offsetof(struct save_area, timer),
2178 &vcpu->arch.sie_block->cputm, 8);
Thomas Huth178bd782013-11-13 20:28:18 +01002179 clkcomp = vcpu->arch.sie_block->ckc >> 8;
Heiko Carstensd0bce602014-01-01 16:45:58 +01002180 rc |= write_guest_abs(vcpu, gpa + offsetof(struct save_area, clk_cmp),
2181 &clkcomp, 8);
2182 rc |= write_guest_abs(vcpu, gpa + offsetof(struct save_area, acc_regs),
2183 &vcpu->run->s.regs.acrs, 64);
2184 rc |= write_guest_abs(vcpu, gpa + offsetof(struct save_area, ctrl_regs),
2185 &vcpu->arch.sie_block->gcr, 128);
2186 return rc ? -EFAULT : 0;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002187}
2188
Thomas Huthe8798922013-11-06 15:46:33 +01002189int kvm_s390_vcpu_store_status(struct kvm_vcpu *vcpu, unsigned long addr)
2190{
2191 /*
2192 * The guest FPRS and ACRS are in the host FPRS/ACRS due to the lazy
2193 * copying in vcpu load/put. Lets update our copies before we save
2194 * it into the save area
2195 */
2196 save_fp_ctl(&vcpu->arch.guest_fpregs.fpc);
2197 save_fp_regs(vcpu->arch.guest_fpregs.fprs);
2198 save_access_regs(vcpu->run->s.regs.acrs);
2199
2200 return kvm_s390_store_status_unloaded(vcpu, addr);
2201}
2202
Eric Farmanbc17de72014-04-14 16:01:09 -04002203/*
2204 * store additional status at address
2205 */
2206int kvm_s390_store_adtl_status_unloaded(struct kvm_vcpu *vcpu,
2207 unsigned long gpa)
2208{
2209 /* Only bits 0-53 are used for address formation */
2210 if (!(gpa & ~0x3ff))
2211 return 0;
2212
2213 return write_guest_abs(vcpu, gpa & ~0x3ff,
2214 (void *)&vcpu->run->s.regs.vrs, 512);
2215}
2216
2217int kvm_s390_vcpu_store_adtl_status(struct kvm_vcpu *vcpu, unsigned long addr)
2218{
2219 if (!test_kvm_facility(vcpu->kvm, 129))
2220 return 0;
2221
2222 /*
2223 * The guest VXRS are in the host VXRs due to the lazy
2224 * copying in vcpu load/put. Let's update our copies before we save
2225 * it into the save area.
2226 */
2227 save_vx_regs((__vector128 *)&vcpu->run->s.regs.vrs);
2228
2229 return kvm_s390_store_adtl_status_unloaded(vcpu, addr);
2230}
2231
David Hildenbrand8ad35752014-03-14 11:00:21 +01002232static void __disable_ibs_on_vcpu(struct kvm_vcpu *vcpu)
2233{
2234 kvm_check_request(KVM_REQ_ENABLE_IBS, vcpu);
Christian Borntraeger8e236542015-04-09 13:49:04 +02002235 kvm_s390_sync_request(KVM_REQ_DISABLE_IBS, vcpu);
David Hildenbrand8ad35752014-03-14 11:00:21 +01002236}
2237
2238static void __disable_ibs_on_all_vcpus(struct kvm *kvm)
2239{
2240 unsigned int i;
2241 struct kvm_vcpu *vcpu;
2242
2243 kvm_for_each_vcpu(i, vcpu, kvm) {
2244 __disable_ibs_on_vcpu(vcpu);
2245 }
2246}
2247
2248static void __enable_ibs_on_vcpu(struct kvm_vcpu *vcpu)
2249{
2250 kvm_check_request(KVM_REQ_DISABLE_IBS, vcpu);
Christian Borntraeger8e236542015-04-09 13:49:04 +02002251 kvm_s390_sync_request(KVM_REQ_ENABLE_IBS, vcpu);
David Hildenbrand8ad35752014-03-14 11:00:21 +01002252}
2253
David Hildenbrand6852d7b2014-03-14 10:59:29 +01002254void kvm_s390_vcpu_start(struct kvm_vcpu *vcpu)
2255{
David Hildenbrand8ad35752014-03-14 11:00:21 +01002256 int i, online_vcpus, started_vcpus = 0;
2257
2258 if (!is_vcpu_stopped(vcpu))
2259 return;
2260
David Hildenbrand6852d7b2014-03-14 10:59:29 +01002261 trace_kvm_s390_vcpu_start_stop(vcpu->vcpu_id, 1);
David Hildenbrand8ad35752014-03-14 11:00:21 +01002262 /* Only one cpu at a time may enter/leave the STOPPED state. */
David Hildenbrand433b9ee2014-05-06 16:11:14 +02002263 spin_lock(&vcpu->kvm->arch.start_stop_lock);
David Hildenbrand8ad35752014-03-14 11:00:21 +01002264 online_vcpus = atomic_read(&vcpu->kvm->online_vcpus);
2265
2266 for (i = 0; i < online_vcpus; i++) {
2267 if (!is_vcpu_stopped(vcpu->kvm->vcpus[i]))
2268 started_vcpus++;
2269 }
2270
2271 if (started_vcpus == 0) {
2272 /* we're the only active VCPU -> speed it up */
2273 __enable_ibs_on_vcpu(vcpu);
2274 } else if (started_vcpus == 1) {
2275 /*
2276 * As we are starting a second VCPU, we have to disable
2277 * the IBS facility on all VCPUs to remove potentially
2278 * oustanding ENABLE requests.
2279 */
2280 __disable_ibs_on_all_vcpus(vcpu->kvm);
2281 }
2282
David Hildenbrand6852d7b2014-03-14 10:59:29 +01002283 atomic_clear_mask(CPUSTAT_STOPPED, &vcpu->arch.sie_block->cpuflags);
David Hildenbrand8ad35752014-03-14 11:00:21 +01002284 /*
2285 * Another VCPU might have used IBS while we were offline.
2286 * Let's play safe and flush the VCPU at startup.
2287 */
David Hildenbrandd3d692c2014-07-29 08:53:36 +02002288 kvm_make_request(KVM_REQ_TLB_FLUSH, vcpu);
David Hildenbrand433b9ee2014-05-06 16:11:14 +02002289 spin_unlock(&vcpu->kvm->arch.start_stop_lock);
David Hildenbrand8ad35752014-03-14 11:00:21 +01002290 return;
David Hildenbrand6852d7b2014-03-14 10:59:29 +01002291}
2292
2293void kvm_s390_vcpu_stop(struct kvm_vcpu *vcpu)
2294{
David Hildenbrand8ad35752014-03-14 11:00:21 +01002295 int i, online_vcpus, started_vcpus = 0;
2296 struct kvm_vcpu *started_vcpu = NULL;
2297
2298 if (is_vcpu_stopped(vcpu))
2299 return;
2300
David Hildenbrand6852d7b2014-03-14 10:59:29 +01002301 trace_kvm_s390_vcpu_start_stop(vcpu->vcpu_id, 0);
David Hildenbrand8ad35752014-03-14 11:00:21 +01002302 /* Only one cpu at a time may enter/leave the STOPPED state. */
David Hildenbrand433b9ee2014-05-06 16:11:14 +02002303 spin_lock(&vcpu->kvm->arch.start_stop_lock);
David Hildenbrand8ad35752014-03-14 11:00:21 +01002304 online_vcpus = atomic_read(&vcpu->kvm->online_vcpus);
2305
David Hildenbrand32f5ff632014-04-14 12:40:03 +02002306 /* SIGP STOP and SIGP STOP AND STORE STATUS has been fully processed */
David Hildenbrand6cddd432014-10-15 16:48:53 +02002307 kvm_s390_clear_stop_irq(vcpu);
David Hildenbrand32f5ff632014-04-14 12:40:03 +02002308
David Hildenbrand6cddd432014-10-15 16:48:53 +02002309 atomic_set_mask(CPUSTAT_STOPPED, &vcpu->arch.sie_block->cpuflags);
David Hildenbrand8ad35752014-03-14 11:00:21 +01002310 __disable_ibs_on_vcpu(vcpu);
2311
2312 for (i = 0; i < online_vcpus; i++) {
2313 if (!is_vcpu_stopped(vcpu->kvm->vcpus[i])) {
2314 started_vcpus++;
2315 started_vcpu = vcpu->kvm->vcpus[i];
2316 }
2317 }
2318
2319 if (started_vcpus == 1) {
2320 /*
2321 * As we only have one VCPU left, we want to enable the
2322 * IBS facility for that VCPU to speed it up.
2323 */
2324 __enable_ibs_on_vcpu(started_vcpu);
2325 }
2326
David Hildenbrand433b9ee2014-05-06 16:11:14 +02002327 spin_unlock(&vcpu->kvm->arch.start_stop_lock);
David Hildenbrand8ad35752014-03-14 11:00:21 +01002328 return;
David Hildenbrand6852d7b2014-03-14 10:59:29 +01002329}
2330
Cornelia Huckd6712df2012-12-20 15:32:11 +01002331static int kvm_vcpu_ioctl_enable_cap(struct kvm_vcpu *vcpu,
2332 struct kvm_enable_cap *cap)
2333{
2334 int r;
2335
2336 if (cap->flags)
2337 return -EINVAL;
2338
2339 switch (cap->cap) {
Cornelia Huckfa6b7fe2012-12-20 15:32:12 +01002340 case KVM_CAP_S390_CSS_SUPPORT:
2341 if (!vcpu->kvm->arch.css_support) {
2342 vcpu->kvm->arch.css_support = 1;
2343 trace_kvm_s390_enable_css(vcpu->kvm);
2344 }
2345 r = 0;
2346 break;
Cornelia Huckd6712df2012-12-20 15:32:11 +01002347 default:
2348 r = -EINVAL;
2349 break;
2350 }
2351 return r;
2352}
2353
Thomas Huth41408c22015-02-06 15:01:21 +01002354static long kvm_s390_guest_mem_op(struct kvm_vcpu *vcpu,
2355 struct kvm_s390_mem_op *mop)
2356{
2357 void __user *uaddr = (void __user *)mop->buf;
2358 void *tmpbuf = NULL;
2359 int r, srcu_idx;
2360 const u64 supported_flags = KVM_S390_MEMOP_F_INJECT_EXCEPTION
2361 | KVM_S390_MEMOP_F_CHECK_ONLY;
2362
2363 if (mop->flags & ~supported_flags)
2364 return -EINVAL;
2365
2366 if (mop->size > MEM_OP_MAX_SIZE)
2367 return -E2BIG;
2368
2369 if (!(mop->flags & KVM_S390_MEMOP_F_CHECK_ONLY)) {
2370 tmpbuf = vmalloc(mop->size);
2371 if (!tmpbuf)
2372 return -ENOMEM;
2373 }
2374
2375 srcu_idx = srcu_read_lock(&vcpu->kvm->srcu);
2376
2377 switch (mop->op) {
2378 case KVM_S390_MEMOP_LOGICAL_READ:
2379 if (mop->flags & KVM_S390_MEMOP_F_CHECK_ONLY) {
2380 r = check_gva_range(vcpu, mop->gaddr, mop->ar, mop->size, false);
2381 break;
2382 }
2383 r = read_guest(vcpu, mop->gaddr, mop->ar, tmpbuf, mop->size);
2384 if (r == 0) {
2385 if (copy_to_user(uaddr, tmpbuf, mop->size))
2386 r = -EFAULT;
2387 }
2388 break;
2389 case KVM_S390_MEMOP_LOGICAL_WRITE:
2390 if (mop->flags & KVM_S390_MEMOP_F_CHECK_ONLY) {
2391 r = check_gva_range(vcpu, mop->gaddr, mop->ar, mop->size, true);
2392 break;
2393 }
2394 if (copy_from_user(tmpbuf, uaddr, mop->size)) {
2395 r = -EFAULT;
2396 break;
2397 }
2398 r = write_guest(vcpu, mop->gaddr, mop->ar, tmpbuf, mop->size);
2399 break;
2400 default:
2401 r = -EINVAL;
2402 }
2403
2404 srcu_read_unlock(&vcpu->kvm->srcu, srcu_idx);
2405
2406 if (r > 0 && (mop->flags & KVM_S390_MEMOP_F_INJECT_EXCEPTION) != 0)
2407 kvm_s390_inject_prog_irq(vcpu, &vcpu->arch.pgm);
2408
2409 vfree(tmpbuf);
2410 return r;
2411}
2412
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002413long kvm_arch_vcpu_ioctl(struct file *filp,
2414 unsigned int ioctl, unsigned long arg)
2415{
2416 struct kvm_vcpu *vcpu = filp->private_data;
2417 void __user *argp = (void __user *)arg;
Thomas Huth800c1062013-09-12 10:33:45 +02002418 int idx;
Avi Kivitybc923cc2010-05-13 12:21:46 +03002419 long r;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002420
Avi Kivity93736622010-05-13 12:35:17 +03002421 switch (ioctl) {
Jens Freimann47b43c52014-11-11 20:57:06 +01002422 case KVM_S390_IRQ: {
2423 struct kvm_s390_irq s390irq;
2424
2425 r = -EFAULT;
2426 if (copy_from_user(&s390irq, argp, sizeof(s390irq)))
2427 break;
2428 r = kvm_s390_inject_vcpu(vcpu, &s390irq);
2429 break;
2430 }
Avi Kivity93736622010-05-13 12:35:17 +03002431 case KVM_S390_INTERRUPT: {
Carsten Otteba5c1e92008-03-25 18:47:26 +01002432 struct kvm_s390_interrupt s390int;
Jens Freimann383d0b02014-07-29 15:11:49 +02002433 struct kvm_s390_irq s390irq;
Carsten Otteba5c1e92008-03-25 18:47:26 +01002434
Avi Kivity93736622010-05-13 12:35:17 +03002435 r = -EFAULT;
Carsten Otteba5c1e92008-03-25 18:47:26 +01002436 if (copy_from_user(&s390int, argp, sizeof(s390int)))
Avi Kivity93736622010-05-13 12:35:17 +03002437 break;
Jens Freimann383d0b02014-07-29 15:11:49 +02002438 if (s390int_to_s390irq(&s390int, &s390irq))
2439 return -EINVAL;
2440 r = kvm_s390_inject_vcpu(vcpu, &s390irq);
Avi Kivity93736622010-05-13 12:35:17 +03002441 break;
Carsten Otteba5c1e92008-03-25 18:47:26 +01002442 }
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002443 case KVM_S390_STORE_STATUS:
Thomas Huth800c1062013-09-12 10:33:45 +02002444 idx = srcu_read_lock(&vcpu->kvm->srcu);
Avi Kivitybc923cc2010-05-13 12:21:46 +03002445 r = kvm_s390_vcpu_store_status(vcpu, arg);
Thomas Huth800c1062013-09-12 10:33:45 +02002446 srcu_read_unlock(&vcpu->kvm->srcu, idx);
Avi Kivitybc923cc2010-05-13 12:21:46 +03002447 break;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002448 case KVM_S390_SET_INITIAL_PSW: {
2449 psw_t psw;
2450
Avi Kivitybc923cc2010-05-13 12:21:46 +03002451 r = -EFAULT;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002452 if (copy_from_user(&psw, argp, sizeof(psw)))
Avi Kivitybc923cc2010-05-13 12:21:46 +03002453 break;
2454 r = kvm_arch_vcpu_ioctl_set_initial_psw(vcpu, psw);
2455 break;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002456 }
2457 case KVM_S390_INITIAL_RESET:
Avi Kivitybc923cc2010-05-13 12:21:46 +03002458 r = kvm_arch_vcpu_ioctl_initial_reset(vcpu);
2459 break;
Carsten Otte14eebd92012-05-15 14:15:26 +02002460 case KVM_SET_ONE_REG:
2461 case KVM_GET_ONE_REG: {
2462 struct kvm_one_reg reg;
2463 r = -EFAULT;
2464 if (copy_from_user(&reg, argp, sizeof(reg)))
2465 break;
2466 if (ioctl == KVM_SET_ONE_REG)
2467 r = kvm_arch_vcpu_ioctl_set_one_reg(vcpu, &reg);
2468 else
2469 r = kvm_arch_vcpu_ioctl_get_one_reg(vcpu, &reg);
2470 break;
2471 }
Carsten Otte27e03932012-01-04 10:25:21 +01002472#ifdef CONFIG_KVM_S390_UCONTROL
2473 case KVM_S390_UCAS_MAP: {
2474 struct kvm_s390_ucas_mapping ucasmap;
2475
2476 if (copy_from_user(&ucasmap, argp, sizeof(ucasmap))) {
2477 r = -EFAULT;
2478 break;
2479 }
2480
2481 if (!kvm_is_ucontrol(vcpu->kvm)) {
2482 r = -EINVAL;
2483 break;
2484 }
2485
2486 r = gmap_map_segment(vcpu->arch.gmap, ucasmap.user_addr,
2487 ucasmap.vcpu_addr, ucasmap.length);
2488 break;
2489 }
2490 case KVM_S390_UCAS_UNMAP: {
2491 struct kvm_s390_ucas_mapping ucasmap;
2492
2493 if (copy_from_user(&ucasmap, argp, sizeof(ucasmap))) {
2494 r = -EFAULT;
2495 break;
2496 }
2497
2498 if (!kvm_is_ucontrol(vcpu->kvm)) {
2499 r = -EINVAL;
2500 break;
2501 }
2502
2503 r = gmap_unmap_segment(vcpu->arch.gmap, ucasmap.vcpu_addr,
2504 ucasmap.length);
2505 break;
2506 }
2507#endif
Carsten Otteccc79102012-01-04 10:25:26 +01002508 case KVM_S390_VCPU_FAULT: {
Martin Schwidefsky527e30b2014-04-30 16:04:25 +02002509 r = gmap_fault(vcpu->arch.gmap, arg, 0);
Carsten Otteccc79102012-01-04 10:25:26 +01002510 break;
2511 }
Cornelia Huckd6712df2012-12-20 15:32:11 +01002512 case KVM_ENABLE_CAP:
2513 {
2514 struct kvm_enable_cap cap;
2515 r = -EFAULT;
2516 if (copy_from_user(&cap, argp, sizeof(cap)))
2517 break;
2518 r = kvm_vcpu_ioctl_enable_cap(vcpu, &cap);
2519 break;
2520 }
Thomas Huth41408c22015-02-06 15:01:21 +01002521 case KVM_S390_MEM_OP: {
2522 struct kvm_s390_mem_op mem_op;
2523
2524 if (copy_from_user(&mem_op, argp, sizeof(mem_op)) == 0)
2525 r = kvm_s390_guest_mem_op(vcpu, &mem_op);
2526 else
2527 r = -EFAULT;
2528 break;
2529 }
Jens Freimann816c7662014-11-24 17:13:46 +01002530 case KVM_S390_SET_IRQ_STATE: {
2531 struct kvm_s390_irq_state irq_state;
2532
2533 r = -EFAULT;
2534 if (copy_from_user(&irq_state, argp, sizeof(irq_state)))
2535 break;
2536 if (irq_state.len > VCPU_IRQS_MAX_BUF ||
2537 irq_state.len == 0 ||
2538 irq_state.len % sizeof(struct kvm_s390_irq) > 0) {
2539 r = -EINVAL;
2540 break;
2541 }
2542 r = kvm_s390_set_irq_state(vcpu,
2543 (void __user *) irq_state.buf,
2544 irq_state.len);
2545 break;
2546 }
2547 case KVM_S390_GET_IRQ_STATE: {
2548 struct kvm_s390_irq_state irq_state;
2549
2550 r = -EFAULT;
2551 if (copy_from_user(&irq_state, argp, sizeof(irq_state)))
2552 break;
2553 if (irq_state.len == 0) {
2554 r = -EINVAL;
2555 break;
2556 }
2557 r = kvm_s390_get_irq_state(vcpu,
2558 (__u8 __user *) irq_state.buf,
2559 irq_state.len);
2560 break;
2561 }
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002562 default:
Carsten Otte3e6afcf2012-01-04 10:25:30 +01002563 r = -ENOTTY;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002564 }
Avi Kivitybc923cc2010-05-13 12:21:46 +03002565 return r;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002566}
2567
Carsten Otte5b1c1492012-01-04 10:25:23 +01002568int kvm_arch_vcpu_fault(struct kvm_vcpu *vcpu, struct vm_fault *vmf)
2569{
2570#ifdef CONFIG_KVM_S390_UCONTROL
2571 if ((vmf->pgoff == KVM_S390_SIE_PAGE_OFFSET)
2572 && (kvm_is_ucontrol(vcpu->kvm))) {
2573 vmf->page = virt_to_page(vcpu->arch.sie_block);
2574 get_page(vmf->page);
2575 return 0;
2576 }
2577#endif
2578 return VM_FAULT_SIGBUS;
2579}
2580
Aneesh Kumar K.V55870272013-10-07 22:18:00 +05302581int kvm_arch_create_memslot(struct kvm *kvm, struct kvm_memory_slot *slot,
2582 unsigned long npages)
Takuya Yoshikawadb3fe4e2012-02-08 13:02:18 +09002583{
2584 return 0;
2585}
2586
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002587/* Section: memory related */
Marcelo Tosattif7784b82009-12-23 14:35:18 -02002588int kvm_arch_prepare_memory_region(struct kvm *kvm,
2589 struct kvm_memory_slot *memslot,
Paolo Bonzini09170a42015-05-18 13:59:39 +02002590 const struct kvm_userspace_memory_region *mem,
Takuya Yoshikawa7b6195a2013-02-27 19:44:34 +09002591 enum kvm_mr_change change)
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002592{
Nick Wangdd2887e2013-03-25 17:22:57 +01002593 /* A few sanity checks. We can have memory slots which have to be
2594 located/ended at a segment boundary (1MB). The memory in userland is
2595 ok to be fragmented into various different vmas. It is okay to mmap()
2596 and munmap() stuff in this slot after doing this call at any time */
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002597
Carsten Otte598841c2011-07-24 10:48:21 +02002598 if (mem->userspace_addr & 0xffffful)
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002599 return -EINVAL;
2600
Carsten Otte598841c2011-07-24 10:48:21 +02002601 if (mem->memory_size & 0xffffful)
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002602 return -EINVAL;
2603
Marcelo Tosattif7784b82009-12-23 14:35:18 -02002604 return 0;
2605}
2606
2607void kvm_arch_commit_memory_region(struct kvm *kvm,
Paolo Bonzini09170a42015-05-18 13:59:39 +02002608 const struct kvm_userspace_memory_region *mem,
Takuya Yoshikawa84826442013-02-27 19:45:25 +09002609 const struct kvm_memory_slot *old,
Paolo Bonzinif36f3f22015-05-18 13:20:23 +02002610 const struct kvm_memory_slot *new,
Takuya Yoshikawa84826442013-02-27 19:45:25 +09002611 enum kvm_mr_change change)
Marcelo Tosattif7784b82009-12-23 14:35:18 -02002612{
Carsten Ottef7850c92011-07-24 10:48:23 +02002613 int rc;
Marcelo Tosattif7784b82009-12-23 14:35:18 -02002614
Christian Borntraeger2cef4de2013-03-25 17:22:48 +01002615 /* If the basics of the memslot do not change, we do not want
2616 * to update the gmap. Every update causes several unnecessary
2617 * segment translation exceptions. This is usually handled just
2618 * fine by the normal fault handler + gmap, but it will also
2619 * cause faults on the prefix page of running guest CPUs.
2620 */
2621 if (old->userspace_addr == mem->userspace_addr &&
2622 old->base_gfn * PAGE_SIZE == mem->guest_phys_addr &&
2623 old->npages * PAGE_SIZE == mem->memory_size)
2624 return;
Carsten Otte598841c2011-07-24 10:48:21 +02002625
2626 rc = gmap_map_segment(kvm->arch.gmap, mem->userspace_addr,
2627 mem->guest_phys_addr, mem->memory_size);
2628 if (rc)
David Hildenbrandea2cdd22015-05-20 13:24:02 +02002629 pr_warn("failed to commit memory region\n");
Carsten Otte598841c2011-07-24 10:48:21 +02002630 return;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002631}
2632
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002633static int __init kvm_s390_init(void)
2634{
Michael Mueller9d8d5782015-02-02 15:42:51 +01002635 return kvm_init(NULL, sizeof(struct kvm_vcpu), 0, THIS_MODULE);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002636}
2637
2638static void __exit kvm_s390_exit(void)
2639{
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002640 kvm_exit();
2641}
2642
2643module_init(kvm_s390_init);
2644module_exit(kvm_s390_exit);
Cornelia Huck566af942013-05-27 18:42:33 +02002645
2646/*
2647 * Enable autoloading of the kvm module.
2648 * Note that we add the module alias here instead of virt/kvm/kvm_main.c
2649 * since x86 takes a different approach.
2650 */
2651#include <linux/miscdevice.h>
2652MODULE_ALIAS_MISCDEV(KVM_MINOR);
2653MODULE_ALIAS("devname:kvm");