blob: f37557bc2512fed1c2714eeeb44845cc22773bf7 [file] [log] [blame]
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001/*
Heiko Carstensa53c8fa2012-07-20 11:15:04 +02002 * hosting zSeries kernel virtual machines
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003 *
Heiko Carstensa53c8fa2012-07-20 11:15:04 +02004 * Copyright IBM Corp. 2008, 2009
Heiko Carstensb0c632d2008-03-25 18:47:20 +01005 *
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License (version 2 only)
8 * as published by the Free Software Foundation.
9 *
10 * Author(s): Carsten Otte <cotte@de.ibm.com>
11 * Christian Borntraeger <borntraeger@de.ibm.com>
12 * Heiko Carstens <heiko.carstens@de.ibm.com>
Christian Ehrhardt628eb9b2009-05-25 13:40:51 +020013 * Christian Ehrhardt <ehrhardt@de.ibm.com>
Jason J. Herne15f36eb2012-08-02 10:10:17 -040014 * Jason J. Herne <jjherne@us.ibm.com>
Heiko Carstensb0c632d2008-03-25 18:47:20 +010015 */
16
17#include <linux/compiler.h>
18#include <linux/err.h>
19#include <linux/fs.h>
Christian Borntraegerca872302009-05-12 17:21:49 +020020#include <linux/hrtimer.h>
Heiko Carstensb0c632d2008-03-25 18:47:20 +010021#include <linux/init.h>
22#include <linux/kvm.h>
23#include <linux/kvm_host.h>
24#include <linux/module.h>
Tony Krowiaka374e892014-09-03 10:13:53 +020025#include <linux/random.h>
Heiko Carstensb0c632d2008-03-25 18:47:20 +010026#include <linux/slab.h>
Carsten Otteba5c1e92008-03-25 18:47:26 +010027#include <linux/timer.h>
Thomas Huth41408c22015-02-06 15:01:21 +010028#include <linux/vmalloc.h>
Heiko Carstenscbb870c2010-02-26 22:37:43 +010029#include <asm/asm-offsets.h>
Heiko Carstensb0c632d2008-03-25 18:47:20 +010030#include <asm/lowcore.h>
31#include <asm/pgtable.h>
Heiko Carstensf5daba12009-03-26 15:24:01 +010032#include <asm/nmi.h>
David Howellsa0616cd2012-03-28 18:30:02 +010033#include <asm/switch_to.h>
Jens Freimann6d3da242013-07-03 15:18:35 +020034#include <asm/isc.h>
Christian Borntraeger1526bf92012-05-15 14:15:25 +020035#include <asm/sclp.h>
Christian Borntraeger8f2abe62008-03-25 18:47:23 +010036#include "kvm-s390.h"
Heiko Carstensb0c632d2008-03-25 18:47:20 +010037#include "gaccess.h"
38
Cornelia Huck5786fff2012-07-23 17:20:29 +020039#define CREATE_TRACE_POINTS
40#include "trace.h"
Cornelia Huckade38c32012-07-23 17:20:30 +020041#include "trace-s390.h"
Cornelia Huck5786fff2012-07-23 17:20:29 +020042
Thomas Huth41408c22015-02-06 15:01:21 +010043#define MEM_OP_MAX_SIZE 65536 /* Maximum transfer size for KVM_S390_MEM_OP */
Jens Freimann816c7662014-11-24 17:13:46 +010044#define LOCAL_IRQS 32
45#define VCPU_IRQS_MAX_BUF (sizeof(struct kvm_s390_irq) * \
46 (KVM_MAX_VCPUS + LOCAL_IRQS))
Thomas Huth41408c22015-02-06 15:01:21 +010047
Heiko Carstensb0c632d2008-03-25 18:47:20 +010048#define VCPU_STAT(x) offsetof(struct kvm_vcpu, stat.x), KVM_STAT_VCPU
49
50struct kvm_stats_debugfs_item debugfs_entries[] = {
51 { "userspace_handled", VCPU_STAT(exit_userspace) },
Christian Borntraeger0eaeafa2008-05-07 09:22:53 +020052 { "exit_null", VCPU_STAT(exit_null) },
Christian Borntraeger8f2abe62008-03-25 18:47:23 +010053 { "exit_validity", VCPU_STAT(exit_validity) },
54 { "exit_stop_request", VCPU_STAT(exit_stop_request) },
55 { "exit_external_request", VCPU_STAT(exit_external_request) },
56 { "exit_external_interrupt", VCPU_STAT(exit_external_interrupt) },
Carsten Otteba5c1e92008-03-25 18:47:26 +010057 { "exit_instruction", VCPU_STAT(exit_instruction) },
58 { "exit_program_interruption", VCPU_STAT(exit_program_interruption) },
59 { "exit_instr_and_program_int", VCPU_STAT(exit_instr_and_program) },
Paolo Bonzinif7819512015-02-04 18:20:58 +010060 { "halt_successful_poll", VCPU_STAT(halt_successful_poll) },
David Hildenbrandce2e4f02014-07-11 10:00:43 +020061 { "halt_wakeup", VCPU_STAT(halt_wakeup) },
Christian Borntraegerf5e10b02008-07-25 15:52:44 +020062 { "instruction_lctlg", VCPU_STAT(instruction_lctlg) },
Carsten Otteba5c1e92008-03-25 18:47:26 +010063 { "instruction_lctl", VCPU_STAT(instruction_lctl) },
David Hildenbrandaba07502014-01-23 10:47:13 +010064 { "instruction_stctl", VCPU_STAT(instruction_stctl) },
65 { "instruction_stctg", VCPU_STAT(instruction_stctg) },
Carsten Otteba5c1e92008-03-25 18:47:26 +010066 { "deliver_emergency_signal", VCPU_STAT(deliver_emergency_signal) },
Christian Ehrhardt7697e71f2011-10-18 12:27:15 +020067 { "deliver_external_call", VCPU_STAT(deliver_external_call) },
Carsten Otteba5c1e92008-03-25 18:47:26 +010068 { "deliver_service_signal", VCPU_STAT(deliver_service_signal) },
69 { "deliver_virtio_interrupt", VCPU_STAT(deliver_virtio_interrupt) },
70 { "deliver_stop_signal", VCPU_STAT(deliver_stop_signal) },
71 { "deliver_prefix_signal", VCPU_STAT(deliver_prefix_signal) },
72 { "deliver_restart_signal", VCPU_STAT(deliver_restart_signal) },
73 { "deliver_program_interruption", VCPU_STAT(deliver_program_int) },
74 { "exit_wait_state", VCPU_STAT(exit_wait_state) },
Christian Borntraeger69d0d3a2013-06-12 13:54:53 +020075 { "instruction_pfmf", VCPU_STAT(instruction_pfmf) },
Christian Borntraeger453423d2008-03-25 18:47:29 +010076 { "instruction_stidp", VCPU_STAT(instruction_stidp) },
77 { "instruction_spx", VCPU_STAT(instruction_spx) },
78 { "instruction_stpx", VCPU_STAT(instruction_stpx) },
79 { "instruction_stap", VCPU_STAT(instruction_stap) },
80 { "instruction_storage_key", VCPU_STAT(instruction_storage_key) },
Heiko Carstens8a2422342014-01-10 14:33:28 +010081 { "instruction_ipte_interlock", VCPU_STAT(instruction_ipte_interlock) },
Christian Borntraeger453423d2008-03-25 18:47:29 +010082 { "instruction_stsch", VCPU_STAT(instruction_stsch) },
83 { "instruction_chsc", VCPU_STAT(instruction_chsc) },
Konstantin Weitzb31288f2013-04-17 17:36:29 +020084 { "instruction_essa", VCPU_STAT(instruction_essa) },
Christian Borntraeger453423d2008-03-25 18:47:29 +010085 { "instruction_stsi", VCPU_STAT(instruction_stsi) },
86 { "instruction_stfl", VCPU_STAT(instruction_stfl) },
Christian Borntraegerbb25b9b2011-07-24 10:48:17 +020087 { "instruction_tprot", VCPU_STAT(instruction_tprot) },
Christian Borntraeger5288fbf2008-03-25 18:47:31 +010088 { "instruction_sigp_sense", VCPU_STAT(instruction_sigp_sense) },
Cornelia Huckbd59d3a2011-11-17 11:00:42 +010089 { "instruction_sigp_sense_running", VCPU_STAT(instruction_sigp_sense_running) },
Christian Ehrhardt7697e71f2011-10-18 12:27:15 +020090 { "instruction_sigp_external_call", VCPU_STAT(instruction_sigp_external_call) },
Christian Borntraeger5288fbf2008-03-25 18:47:31 +010091 { "instruction_sigp_emergency", VCPU_STAT(instruction_sigp_emergency) },
David Hildenbrand42cb0c92014-05-23 12:25:11 +020092 { "instruction_sigp_cond_emergency", VCPU_STAT(instruction_sigp_cond_emergency) },
93 { "instruction_sigp_start", VCPU_STAT(instruction_sigp_start) },
Christian Borntraeger5288fbf2008-03-25 18:47:31 +010094 { "instruction_sigp_stop", VCPU_STAT(instruction_sigp_stop) },
David Hildenbrand42cb0c92014-05-23 12:25:11 +020095 { "instruction_sigp_stop_store_status", VCPU_STAT(instruction_sigp_stop_store_status) },
96 { "instruction_sigp_store_status", VCPU_STAT(instruction_sigp_store_status) },
Eric Farmancd7b4b62015-02-12 09:06:34 -050097 { "instruction_sigp_store_adtl_status", VCPU_STAT(instruction_sigp_store_adtl_status) },
Christian Borntraeger5288fbf2008-03-25 18:47:31 +010098 { "instruction_sigp_set_arch", VCPU_STAT(instruction_sigp_arch) },
99 { "instruction_sigp_set_prefix", VCPU_STAT(instruction_sigp_prefix) },
100 { "instruction_sigp_restart", VCPU_STAT(instruction_sigp_restart) },
David Hildenbrand42cb0c92014-05-23 12:25:11 +0200101 { "instruction_sigp_cpu_reset", VCPU_STAT(instruction_sigp_cpu_reset) },
102 { "instruction_sigp_init_cpu_reset", VCPU_STAT(instruction_sigp_init_cpu_reset) },
103 { "instruction_sigp_unknown", VCPU_STAT(instruction_sigp_unknown) },
Christian Borntraeger388186b2011-10-30 15:17:03 +0100104 { "diagnose_10", VCPU_STAT(diagnose_10) },
Christian Borntraegere28acfe2008-03-25 18:47:34 +0100105 { "diagnose_44", VCPU_STAT(diagnose_44) },
Konstantin Weitz41628d32012-04-25 15:30:38 +0200106 { "diagnose_9c", VCPU_STAT(diagnose_9c) },
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100107 { NULL }
108};
109
Michael Mueller9d8d5782015-02-02 15:42:51 +0100110/* upper facilities limit for kvm */
111unsigned long kvm_s390_fac_list_mask[] = {
Christian Borntraegera3ed8da2015-03-18 13:54:31 +0100112 0xffe6fffbfcfdfc40UL,
Guenther Hutzl53df84f2015-02-18 11:13:03 +0100113 0x005e800000000000UL,
Michael Mueller9d8d5782015-02-02 15:42:51 +0100114};
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100115
Michael Mueller9d8d5782015-02-02 15:42:51 +0100116unsigned long kvm_s390_fac_list_mask_size(void)
Michael Mueller78c4b592013-07-26 15:04:04 +0200117{
Michael Mueller9d8d5782015-02-02 15:42:51 +0100118 BUILD_BUG_ON(ARRAY_SIZE(kvm_s390_fac_list_mask) > S390_ARCH_FAC_MASK_SIZE_U64);
119 return ARRAY_SIZE(kvm_s390_fac_list_mask);
Michael Mueller78c4b592013-07-26 15:04:04 +0200120}
121
Michael Mueller9d8d5782015-02-02 15:42:51 +0100122static struct gmap_notifier gmap_notifier;
123
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100124/* Section: not file related */
Radim Krčmář13a34e02014-08-28 15:13:03 +0200125int kvm_arch_hardware_enable(void)
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100126{
127 /* every s390 is virtualization enabled ;-) */
Alexander Graf10474ae2009-09-15 11:37:46 +0200128 return 0;
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100129}
130
Christian Borntraeger2c70fe42013-05-17 14:41:36 +0200131static void kvm_gmap_notifier(struct gmap *gmap, unsigned long address);
132
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100133int kvm_arch_hardware_setup(void)
134{
Christian Borntraeger2c70fe42013-05-17 14:41:36 +0200135 gmap_notifier.notifier_call = kvm_gmap_notifier;
136 gmap_register_ipte_notifier(&gmap_notifier);
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100137 return 0;
138}
139
140void kvm_arch_hardware_unsetup(void)
141{
Christian Borntraeger2c70fe42013-05-17 14:41:36 +0200142 gmap_unregister_ipte_notifier(&gmap_notifier);
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100143}
144
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100145int kvm_arch_init(void *opaque)
146{
Cornelia Huck84877d92014-09-02 10:27:35 +0100147 /* Register floating interrupt controller interface. */
148 return kvm_register_device_ops(&kvm_flic_ops, KVM_DEV_TYPE_FLIC);
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100149}
150
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100151/* Section: device related */
152long kvm_arch_dev_ioctl(struct file *filp,
153 unsigned int ioctl, unsigned long arg)
154{
155 if (ioctl == KVM_S390_ENABLE_SIE)
156 return s390_enable_sie();
157 return -EINVAL;
158}
159
Alexander Graf784aa3d2014-07-14 18:27:35 +0200160int kvm_vm_ioctl_check_extension(struct kvm *kvm, long ext)
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100161{
Carsten Otted7b0b5e2009-11-19 14:21:16 +0100162 int r;
163
Carsten Otte2bd0ac42008-07-25 15:49:13 +0200164 switch (ext) {
Carsten Otted7b0b5e2009-11-19 14:21:16 +0100165 case KVM_CAP_S390_PSW:
Christian Borntraegerb6cf8782011-09-20 17:07:29 +0200166 case KVM_CAP_S390_GMAP:
Christian Borntraeger52e16b12011-11-17 11:00:44 +0100167 case KVM_CAP_SYNC_MMU:
Carsten Otte1efd0f52012-01-04 10:25:29 +0100168#ifdef CONFIG_KVM_S390_UCONTROL
169 case KVM_CAP_S390_UCONTROL:
170#endif
Dominik Dingel3c038e62013-10-07 17:11:48 +0200171 case KVM_CAP_ASYNC_PF:
Christian Borntraeger60b413c2012-01-11 11:20:31 +0100172 case KVM_CAP_SYNC_REGS:
Carsten Otte14eebd92012-05-15 14:15:26 +0200173 case KVM_CAP_ONE_REG:
Cornelia Huckd6712df2012-12-20 15:32:11 +0100174 case KVM_CAP_ENABLE_CAP:
Cornelia Huckfa6b7fe2012-12-20 15:32:12 +0100175 case KVM_CAP_S390_CSS_SUPPORT:
Cornelia Huck10ccaa12013-02-28 12:33:21 +0100176 case KVM_CAP_IOEVENTFD:
Jens Freimannc05c4182013-10-07 16:13:45 +0200177 case KVM_CAP_DEVICE_CTRL:
Cornelia Huckd938dc52013-10-23 18:26:34 +0200178 case KVM_CAP_ENABLE_CAP_VM:
Cornelia Huck78599d92014-07-15 09:54:39 +0200179 case KVM_CAP_S390_IRQCHIP:
Dominik Dingelf2061652014-04-09 13:13:00 +0200180 case KVM_CAP_VM_ATTRIBUTES:
David Hildenbrand6352e4d2014-04-10 17:35:00 +0200181 case KVM_CAP_MP_STATE:
Jens Freimann47b43c52014-11-11 20:57:06 +0100182 case KVM_CAP_S390_INJECT_IRQ:
David Hildenbrand2444b352014-10-09 14:10:13 +0200183 case KVM_CAP_S390_USER_SIGP:
Ekaterina Tumanovae44fc8c2015-01-30 16:55:56 +0100184 case KVM_CAP_S390_USER_STSI:
Jason J. Herne30ee2a92014-09-23 09:23:01 -0400185 case KVM_CAP_S390_SKEYS:
Jens Freimann816c7662014-11-24 17:13:46 +0100186 case KVM_CAP_S390_IRQ_STATE:
Carsten Otted7b0b5e2009-11-19 14:21:16 +0100187 r = 1;
188 break;
Thomas Huth41408c22015-02-06 15:01:21 +0100189 case KVM_CAP_S390_MEM_OP:
190 r = MEM_OP_MAX_SIZE;
191 break;
Christian Borntraegere726b1b2012-05-02 10:50:38 +0200192 case KVM_CAP_NR_VCPUS:
193 case KVM_CAP_MAX_VCPUS:
194 r = KVM_MAX_VCPUS;
195 break;
Nick Wange1e2e602013-03-25 17:22:58 +0100196 case KVM_CAP_NR_MEMSLOTS:
197 r = KVM_USER_MEM_SLOTS;
198 break;
Christian Borntraeger1526bf92012-05-15 14:15:25 +0200199 case KVM_CAP_S390_COW:
Martin Schwidefskyabf09be2012-11-07 13:17:37 +0100200 r = MACHINE_HAS_ESOP;
Christian Borntraeger1526bf92012-05-15 14:15:25 +0200201 break;
Eric Farman68c55752014-06-09 10:57:26 -0400202 case KVM_CAP_S390_VECTOR_REGISTERS:
203 r = MACHINE_HAS_VX;
204 break;
Carsten Otte2bd0ac42008-07-25 15:49:13 +0200205 default:
Carsten Otted7b0b5e2009-11-19 14:21:16 +0100206 r = 0;
Carsten Otte2bd0ac42008-07-25 15:49:13 +0200207 }
Carsten Otted7b0b5e2009-11-19 14:21:16 +0100208 return r;
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100209}
210
Jason J. Herne15f36eb2012-08-02 10:10:17 -0400211static void kvm_s390_sync_dirty_log(struct kvm *kvm,
212 struct kvm_memory_slot *memslot)
213{
214 gfn_t cur_gfn, last_gfn;
215 unsigned long address;
216 struct gmap *gmap = kvm->arch.gmap;
217
218 down_read(&gmap->mm->mmap_sem);
219 /* Loop over all guest pages */
220 last_gfn = memslot->base_gfn + memslot->npages;
221 for (cur_gfn = memslot->base_gfn; cur_gfn <= last_gfn; cur_gfn++) {
222 address = gfn_to_hva_memslot(memslot, cur_gfn);
223
224 if (gmap_test_and_clear_dirty(address, gmap))
225 mark_page_dirty(kvm, cur_gfn);
226 }
227 up_read(&gmap->mm->mmap_sem);
228}
229
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100230/* Section: vm related */
231/*
232 * Get (and clear) the dirty memory log for a memory slot.
233 */
234int kvm_vm_ioctl_get_dirty_log(struct kvm *kvm,
235 struct kvm_dirty_log *log)
236{
Jason J. Herne15f36eb2012-08-02 10:10:17 -0400237 int r;
238 unsigned long n;
239 struct kvm_memory_slot *memslot;
240 int is_dirty = 0;
241
242 mutex_lock(&kvm->slots_lock);
243
244 r = -EINVAL;
245 if (log->slot >= KVM_USER_MEM_SLOTS)
246 goto out;
247
248 memslot = id_to_memslot(kvm->memslots, log->slot);
249 r = -ENOENT;
250 if (!memslot->dirty_bitmap)
251 goto out;
252
253 kvm_s390_sync_dirty_log(kvm, memslot);
254 r = kvm_get_dirty_log(kvm, log, &is_dirty);
255 if (r)
256 goto out;
257
258 /* Clear the dirty log */
259 if (is_dirty) {
260 n = kvm_dirty_bitmap_bytes(memslot);
261 memset(memslot->dirty_bitmap, 0, n);
262 }
263 r = 0;
264out:
265 mutex_unlock(&kvm->slots_lock);
266 return r;
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100267}
268
Cornelia Huckd938dc52013-10-23 18:26:34 +0200269static int kvm_vm_ioctl_enable_cap(struct kvm *kvm, struct kvm_enable_cap *cap)
270{
271 int r;
272
273 if (cap->flags)
274 return -EINVAL;
275
276 switch (cap->cap) {
Cornelia Huck84223592013-07-15 13:36:01 +0200277 case KVM_CAP_S390_IRQCHIP:
278 kvm->arch.use_irqchip = 1;
279 r = 0;
280 break;
David Hildenbrand2444b352014-10-09 14:10:13 +0200281 case KVM_CAP_S390_USER_SIGP:
282 kvm->arch.user_sigp = 1;
283 r = 0;
284 break;
Eric Farman68c55752014-06-09 10:57:26 -0400285 case KVM_CAP_S390_VECTOR_REGISTERS:
Michael Mueller18280d82015-03-16 16:05:41 +0100286 if (MACHINE_HAS_VX) {
287 set_kvm_facility(kvm->arch.model.fac->mask, 129);
288 set_kvm_facility(kvm->arch.model.fac->list, 129);
289 r = 0;
290 } else
291 r = -EINVAL;
Eric Farman68c55752014-06-09 10:57:26 -0400292 break;
Ekaterina Tumanovae44fc8c2015-01-30 16:55:56 +0100293 case KVM_CAP_S390_USER_STSI:
294 kvm->arch.user_stsi = 1;
295 r = 0;
296 break;
Cornelia Huckd938dc52013-10-23 18:26:34 +0200297 default:
298 r = -EINVAL;
299 break;
300 }
301 return r;
302}
303
Dominik Dingel8c0a7ce2014-10-31 14:10:41 +0100304static int kvm_s390_get_mem_control(struct kvm *kvm, struct kvm_device_attr *attr)
305{
306 int ret;
307
308 switch (attr->attr) {
309 case KVM_S390_VM_MEM_LIMIT_SIZE:
310 ret = 0;
311 if (put_user(kvm->arch.gmap->asce_end, (u64 __user *)attr->addr))
312 ret = -EFAULT;
313 break;
314 default:
315 ret = -ENXIO;
316 break;
317 }
318 return ret;
319}
320
321static int kvm_s390_set_mem_control(struct kvm *kvm, struct kvm_device_attr *attr)
Dominik Dingel4f718ea2014-04-09 13:13:00 +0200322{
323 int ret;
324 unsigned int idx;
325 switch (attr->attr) {
326 case KVM_S390_VM_MEM_ENABLE_CMMA:
327 ret = -EBUSY;
328 mutex_lock(&kvm->lock);
329 if (atomic_read(&kvm->online_vcpus) == 0) {
330 kvm->arch.use_cmma = 1;
331 ret = 0;
332 }
333 mutex_unlock(&kvm->lock);
334 break;
335 case KVM_S390_VM_MEM_CLR_CMMA:
336 mutex_lock(&kvm->lock);
337 idx = srcu_read_lock(&kvm->srcu);
Dominik Dingela13cff32014-10-23 12:07:14 +0200338 s390_reset_cmma(kvm->arch.gmap->mm);
Dominik Dingel4f718ea2014-04-09 13:13:00 +0200339 srcu_read_unlock(&kvm->srcu, idx);
340 mutex_unlock(&kvm->lock);
341 ret = 0;
342 break;
Dominik Dingel8c0a7ce2014-10-31 14:10:41 +0100343 case KVM_S390_VM_MEM_LIMIT_SIZE: {
344 unsigned long new_limit;
345
346 if (kvm_is_ucontrol(kvm))
347 return -EINVAL;
348
349 if (get_user(new_limit, (u64 __user *)attr->addr))
350 return -EFAULT;
351
352 if (new_limit > kvm->arch.gmap->asce_end)
353 return -E2BIG;
354
355 ret = -EBUSY;
356 mutex_lock(&kvm->lock);
357 if (atomic_read(&kvm->online_vcpus) == 0) {
358 /* gmap_alloc will round the limit up */
359 struct gmap *new = gmap_alloc(current->mm, new_limit);
360
361 if (!new) {
362 ret = -ENOMEM;
363 } else {
364 gmap_free(kvm->arch.gmap);
365 new->private = kvm;
366 kvm->arch.gmap = new;
367 ret = 0;
368 }
369 }
370 mutex_unlock(&kvm->lock);
371 break;
372 }
Dominik Dingel4f718ea2014-04-09 13:13:00 +0200373 default:
374 ret = -ENXIO;
375 break;
376 }
377 return ret;
378}
379
Tony Krowiaka374e892014-09-03 10:13:53 +0200380static void kvm_s390_vcpu_crypto_setup(struct kvm_vcpu *vcpu);
381
382static int kvm_s390_vm_set_crypto(struct kvm *kvm, struct kvm_device_attr *attr)
383{
384 struct kvm_vcpu *vcpu;
385 int i;
386
Michael Mueller9d8d5782015-02-02 15:42:51 +0100387 if (!test_kvm_facility(kvm, 76))
Tony Krowiaka374e892014-09-03 10:13:53 +0200388 return -EINVAL;
389
390 mutex_lock(&kvm->lock);
391 switch (attr->attr) {
392 case KVM_S390_VM_CRYPTO_ENABLE_AES_KW:
393 get_random_bytes(
394 kvm->arch.crypto.crycb->aes_wrapping_key_mask,
395 sizeof(kvm->arch.crypto.crycb->aes_wrapping_key_mask));
396 kvm->arch.crypto.aes_kw = 1;
397 break;
398 case KVM_S390_VM_CRYPTO_ENABLE_DEA_KW:
399 get_random_bytes(
400 kvm->arch.crypto.crycb->dea_wrapping_key_mask,
401 sizeof(kvm->arch.crypto.crycb->dea_wrapping_key_mask));
402 kvm->arch.crypto.dea_kw = 1;
403 break;
404 case KVM_S390_VM_CRYPTO_DISABLE_AES_KW:
405 kvm->arch.crypto.aes_kw = 0;
406 memset(kvm->arch.crypto.crycb->aes_wrapping_key_mask, 0,
407 sizeof(kvm->arch.crypto.crycb->aes_wrapping_key_mask));
408 break;
409 case KVM_S390_VM_CRYPTO_DISABLE_DEA_KW:
410 kvm->arch.crypto.dea_kw = 0;
411 memset(kvm->arch.crypto.crycb->dea_wrapping_key_mask, 0,
412 sizeof(kvm->arch.crypto.crycb->dea_wrapping_key_mask));
413 break;
414 default:
415 mutex_unlock(&kvm->lock);
416 return -ENXIO;
417 }
418
419 kvm_for_each_vcpu(i, vcpu, kvm) {
420 kvm_s390_vcpu_crypto_setup(vcpu);
421 exit_sie(vcpu);
422 }
423 mutex_unlock(&kvm->lock);
424 return 0;
425}
426
Jason J. Herne72f25022014-11-25 09:46:02 -0500427static int kvm_s390_set_tod_high(struct kvm *kvm, struct kvm_device_attr *attr)
428{
429 u8 gtod_high;
430
431 if (copy_from_user(&gtod_high, (void __user *)attr->addr,
432 sizeof(gtod_high)))
433 return -EFAULT;
434
435 if (gtod_high != 0)
436 return -EINVAL;
437
438 return 0;
439}
440
441static int kvm_s390_set_tod_low(struct kvm *kvm, struct kvm_device_attr *attr)
442{
443 struct kvm_vcpu *cur_vcpu;
444 unsigned int vcpu_idx;
445 u64 host_tod, gtod;
446 int r;
447
448 if (copy_from_user(&gtod, (void __user *)attr->addr, sizeof(gtod)))
449 return -EFAULT;
450
451 r = store_tod_clock(&host_tod);
452 if (r)
453 return r;
454
455 mutex_lock(&kvm->lock);
456 kvm->arch.epoch = gtod - host_tod;
Christian Borntraeger27406cd2015-04-14 12:17:34 +0200457 kvm_s390_vcpu_block_all(kvm);
458 kvm_for_each_vcpu(vcpu_idx, cur_vcpu, kvm)
Jason J. Herne72f25022014-11-25 09:46:02 -0500459 cur_vcpu->arch.sie_block->epoch = kvm->arch.epoch;
Christian Borntraeger27406cd2015-04-14 12:17:34 +0200460 kvm_s390_vcpu_unblock_all(kvm);
Jason J. Herne72f25022014-11-25 09:46:02 -0500461 mutex_unlock(&kvm->lock);
462 return 0;
463}
464
465static int kvm_s390_set_tod(struct kvm *kvm, struct kvm_device_attr *attr)
466{
467 int ret;
468
469 if (attr->flags)
470 return -EINVAL;
471
472 switch (attr->attr) {
473 case KVM_S390_VM_TOD_HIGH:
474 ret = kvm_s390_set_tod_high(kvm, attr);
475 break;
476 case KVM_S390_VM_TOD_LOW:
477 ret = kvm_s390_set_tod_low(kvm, attr);
478 break;
479 default:
480 ret = -ENXIO;
481 break;
482 }
483 return ret;
484}
485
486static int kvm_s390_get_tod_high(struct kvm *kvm, struct kvm_device_attr *attr)
487{
488 u8 gtod_high = 0;
489
490 if (copy_to_user((void __user *)attr->addr, &gtod_high,
491 sizeof(gtod_high)))
492 return -EFAULT;
493
494 return 0;
495}
496
497static int kvm_s390_get_tod_low(struct kvm *kvm, struct kvm_device_attr *attr)
498{
499 u64 host_tod, gtod;
500 int r;
501
502 r = store_tod_clock(&host_tod);
503 if (r)
504 return r;
505
506 gtod = host_tod + kvm->arch.epoch;
507 if (copy_to_user((void __user *)attr->addr, &gtod, sizeof(gtod)))
508 return -EFAULT;
509
510 return 0;
511}
512
513static int kvm_s390_get_tod(struct kvm *kvm, struct kvm_device_attr *attr)
514{
515 int ret;
516
517 if (attr->flags)
518 return -EINVAL;
519
520 switch (attr->attr) {
521 case KVM_S390_VM_TOD_HIGH:
522 ret = kvm_s390_get_tod_high(kvm, attr);
523 break;
524 case KVM_S390_VM_TOD_LOW:
525 ret = kvm_s390_get_tod_low(kvm, attr);
526 break;
527 default:
528 ret = -ENXIO;
529 break;
530 }
531 return ret;
532}
533
Michael Mueller658b6ed2015-02-02 15:49:35 +0100534static int kvm_s390_set_processor(struct kvm *kvm, struct kvm_device_attr *attr)
535{
536 struct kvm_s390_vm_cpu_processor *proc;
537 int ret = 0;
538
539 mutex_lock(&kvm->lock);
540 if (atomic_read(&kvm->online_vcpus)) {
541 ret = -EBUSY;
542 goto out;
543 }
544 proc = kzalloc(sizeof(*proc), GFP_KERNEL);
545 if (!proc) {
546 ret = -ENOMEM;
547 goto out;
548 }
549 if (!copy_from_user(proc, (void __user *)attr->addr,
550 sizeof(*proc))) {
551 memcpy(&kvm->arch.model.cpu_id, &proc->cpuid,
552 sizeof(struct cpuid));
553 kvm->arch.model.ibc = proc->ibc;
Michael Mueller981467c2015-02-24 13:51:04 +0100554 memcpy(kvm->arch.model.fac->list, proc->fac_list,
Michael Mueller658b6ed2015-02-02 15:49:35 +0100555 S390_ARCH_FAC_LIST_SIZE_BYTE);
556 } else
557 ret = -EFAULT;
558 kfree(proc);
559out:
560 mutex_unlock(&kvm->lock);
561 return ret;
562}
563
564static int kvm_s390_set_cpu_model(struct kvm *kvm, struct kvm_device_attr *attr)
565{
566 int ret = -ENXIO;
567
568 switch (attr->attr) {
569 case KVM_S390_VM_CPU_PROCESSOR:
570 ret = kvm_s390_set_processor(kvm, attr);
571 break;
572 }
573 return ret;
574}
575
576static int kvm_s390_get_processor(struct kvm *kvm, struct kvm_device_attr *attr)
577{
578 struct kvm_s390_vm_cpu_processor *proc;
579 int ret = 0;
580
581 proc = kzalloc(sizeof(*proc), GFP_KERNEL);
582 if (!proc) {
583 ret = -ENOMEM;
584 goto out;
585 }
586 memcpy(&proc->cpuid, &kvm->arch.model.cpu_id, sizeof(struct cpuid));
587 proc->ibc = kvm->arch.model.ibc;
Michael Mueller981467c2015-02-24 13:51:04 +0100588 memcpy(&proc->fac_list, kvm->arch.model.fac->list, S390_ARCH_FAC_LIST_SIZE_BYTE);
Michael Mueller658b6ed2015-02-02 15:49:35 +0100589 if (copy_to_user((void __user *)attr->addr, proc, sizeof(*proc)))
590 ret = -EFAULT;
591 kfree(proc);
592out:
593 return ret;
594}
595
596static int kvm_s390_get_machine(struct kvm *kvm, struct kvm_device_attr *attr)
597{
598 struct kvm_s390_vm_cpu_machine *mach;
599 int ret = 0;
600
601 mach = kzalloc(sizeof(*mach), GFP_KERNEL);
602 if (!mach) {
603 ret = -ENOMEM;
604 goto out;
605 }
606 get_cpu_id((struct cpuid *) &mach->cpuid);
607 mach->ibc = sclp_get_ibc();
Michael Mueller981467c2015-02-24 13:51:04 +0100608 memcpy(&mach->fac_mask, kvm->arch.model.fac->mask,
609 S390_ARCH_FAC_LIST_SIZE_BYTE);
Michael Mueller658b6ed2015-02-02 15:49:35 +0100610 memcpy((unsigned long *)&mach->fac_list, S390_lowcore.stfle_fac_list,
Michael Mueller94422ee2015-02-26 12:12:40 +0100611 S390_ARCH_FAC_LIST_SIZE_BYTE);
Michael Mueller658b6ed2015-02-02 15:49:35 +0100612 if (copy_to_user((void __user *)attr->addr, mach, sizeof(*mach)))
613 ret = -EFAULT;
614 kfree(mach);
615out:
616 return ret;
617}
618
619static int kvm_s390_get_cpu_model(struct kvm *kvm, struct kvm_device_attr *attr)
620{
621 int ret = -ENXIO;
622
623 switch (attr->attr) {
624 case KVM_S390_VM_CPU_PROCESSOR:
625 ret = kvm_s390_get_processor(kvm, attr);
626 break;
627 case KVM_S390_VM_CPU_MACHINE:
628 ret = kvm_s390_get_machine(kvm, attr);
629 break;
630 }
631 return ret;
632}
633
Dominik Dingelf2061652014-04-09 13:13:00 +0200634static int kvm_s390_vm_set_attr(struct kvm *kvm, struct kvm_device_attr *attr)
635{
636 int ret;
637
638 switch (attr->group) {
Dominik Dingel4f718ea2014-04-09 13:13:00 +0200639 case KVM_S390_VM_MEM_CTRL:
Dominik Dingel8c0a7ce2014-10-31 14:10:41 +0100640 ret = kvm_s390_set_mem_control(kvm, attr);
Dominik Dingel4f718ea2014-04-09 13:13:00 +0200641 break;
Jason J. Herne72f25022014-11-25 09:46:02 -0500642 case KVM_S390_VM_TOD:
643 ret = kvm_s390_set_tod(kvm, attr);
644 break;
Michael Mueller658b6ed2015-02-02 15:49:35 +0100645 case KVM_S390_VM_CPU_MODEL:
646 ret = kvm_s390_set_cpu_model(kvm, attr);
647 break;
Tony Krowiaka374e892014-09-03 10:13:53 +0200648 case KVM_S390_VM_CRYPTO:
649 ret = kvm_s390_vm_set_crypto(kvm, attr);
650 break;
Dominik Dingelf2061652014-04-09 13:13:00 +0200651 default:
652 ret = -ENXIO;
653 break;
654 }
655
656 return ret;
657}
658
659static int kvm_s390_vm_get_attr(struct kvm *kvm, struct kvm_device_attr *attr)
660{
Dominik Dingel8c0a7ce2014-10-31 14:10:41 +0100661 int ret;
662
663 switch (attr->group) {
664 case KVM_S390_VM_MEM_CTRL:
665 ret = kvm_s390_get_mem_control(kvm, attr);
666 break;
Jason J. Herne72f25022014-11-25 09:46:02 -0500667 case KVM_S390_VM_TOD:
668 ret = kvm_s390_get_tod(kvm, attr);
669 break;
Michael Mueller658b6ed2015-02-02 15:49:35 +0100670 case KVM_S390_VM_CPU_MODEL:
671 ret = kvm_s390_get_cpu_model(kvm, attr);
672 break;
Dominik Dingel8c0a7ce2014-10-31 14:10:41 +0100673 default:
674 ret = -ENXIO;
675 break;
676 }
677
678 return ret;
Dominik Dingelf2061652014-04-09 13:13:00 +0200679}
680
681static int kvm_s390_vm_has_attr(struct kvm *kvm, struct kvm_device_attr *attr)
682{
683 int ret;
684
685 switch (attr->group) {
Dominik Dingel4f718ea2014-04-09 13:13:00 +0200686 case KVM_S390_VM_MEM_CTRL:
687 switch (attr->attr) {
688 case KVM_S390_VM_MEM_ENABLE_CMMA:
689 case KVM_S390_VM_MEM_CLR_CMMA:
Dominik Dingel8c0a7ce2014-10-31 14:10:41 +0100690 case KVM_S390_VM_MEM_LIMIT_SIZE:
Dominik Dingel4f718ea2014-04-09 13:13:00 +0200691 ret = 0;
692 break;
693 default:
694 ret = -ENXIO;
695 break;
696 }
697 break;
Jason J. Herne72f25022014-11-25 09:46:02 -0500698 case KVM_S390_VM_TOD:
699 switch (attr->attr) {
700 case KVM_S390_VM_TOD_LOW:
701 case KVM_S390_VM_TOD_HIGH:
702 ret = 0;
703 break;
704 default:
705 ret = -ENXIO;
706 break;
707 }
708 break;
Michael Mueller658b6ed2015-02-02 15:49:35 +0100709 case KVM_S390_VM_CPU_MODEL:
710 switch (attr->attr) {
711 case KVM_S390_VM_CPU_PROCESSOR:
712 case KVM_S390_VM_CPU_MACHINE:
713 ret = 0;
714 break;
715 default:
716 ret = -ENXIO;
717 break;
718 }
719 break;
Tony Krowiaka374e892014-09-03 10:13:53 +0200720 case KVM_S390_VM_CRYPTO:
721 switch (attr->attr) {
722 case KVM_S390_VM_CRYPTO_ENABLE_AES_KW:
723 case KVM_S390_VM_CRYPTO_ENABLE_DEA_KW:
724 case KVM_S390_VM_CRYPTO_DISABLE_AES_KW:
725 case KVM_S390_VM_CRYPTO_DISABLE_DEA_KW:
726 ret = 0;
727 break;
728 default:
729 ret = -ENXIO;
730 break;
731 }
732 break;
Dominik Dingelf2061652014-04-09 13:13:00 +0200733 default:
734 ret = -ENXIO;
735 break;
736 }
737
738 return ret;
739}
740
Jason J. Herne30ee2a92014-09-23 09:23:01 -0400741static long kvm_s390_get_skeys(struct kvm *kvm, struct kvm_s390_skeys *args)
742{
743 uint8_t *keys;
744 uint64_t hva;
745 unsigned long curkey;
746 int i, r = 0;
747
748 if (args->flags != 0)
749 return -EINVAL;
750
751 /* Is this guest using storage keys? */
752 if (!mm_use_skey(current->mm))
753 return KVM_S390_GET_SKEYS_NONE;
754
755 /* Enforce sane limit on memory allocation */
756 if (args->count < 1 || args->count > KVM_S390_SKEYS_MAX)
757 return -EINVAL;
758
759 keys = kmalloc_array(args->count, sizeof(uint8_t),
760 GFP_KERNEL | __GFP_NOWARN);
761 if (!keys)
762 keys = vmalloc(sizeof(uint8_t) * args->count);
763 if (!keys)
764 return -ENOMEM;
765
766 for (i = 0; i < args->count; i++) {
767 hva = gfn_to_hva(kvm, args->start_gfn + i);
768 if (kvm_is_error_hva(hva)) {
769 r = -EFAULT;
770 goto out;
771 }
772
773 curkey = get_guest_storage_key(current->mm, hva);
774 if (IS_ERR_VALUE(curkey)) {
775 r = curkey;
776 goto out;
777 }
778 keys[i] = curkey;
779 }
780
781 r = copy_to_user((uint8_t __user *)args->skeydata_addr, keys,
782 sizeof(uint8_t) * args->count);
783 if (r)
784 r = -EFAULT;
785out:
786 kvfree(keys);
787 return r;
788}
789
790static long kvm_s390_set_skeys(struct kvm *kvm, struct kvm_s390_skeys *args)
791{
792 uint8_t *keys;
793 uint64_t hva;
794 int i, r = 0;
795
796 if (args->flags != 0)
797 return -EINVAL;
798
799 /* Enforce sane limit on memory allocation */
800 if (args->count < 1 || args->count > KVM_S390_SKEYS_MAX)
801 return -EINVAL;
802
803 keys = kmalloc_array(args->count, sizeof(uint8_t),
804 GFP_KERNEL | __GFP_NOWARN);
805 if (!keys)
806 keys = vmalloc(sizeof(uint8_t) * args->count);
807 if (!keys)
808 return -ENOMEM;
809
810 r = copy_from_user(keys, (uint8_t __user *)args->skeydata_addr,
811 sizeof(uint8_t) * args->count);
812 if (r) {
813 r = -EFAULT;
814 goto out;
815 }
816
817 /* Enable storage key handling for the guest */
818 s390_enable_skey();
819
820 for (i = 0; i < args->count; i++) {
821 hva = gfn_to_hva(kvm, args->start_gfn + i);
822 if (kvm_is_error_hva(hva)) {
823 r = -EFAULT;
824 goto out;
825 }
826
827 /* Lowest order bit is reserved */
828 if (keys[i] & 0x01) {
829 r = -EINVAL;
830 goto out;
831 }
832
833 r = set_guest_storage_key(current->mm, hva,
834 (unsigned long)keys[i], 0);
835 if (r)
836 goto out;
837 }
838out:
839 kvfree(keys);
840 return r;
841}
842
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100843long kvm_arch_vm_ioctl(struct file *filp,
844 unsigned int ioctl, unsigned long arg)
845{
846 struct kvm *kvm = filp->private_data;
847 void __user *argp = (void __user *)arg;
Dominik Dingelf2061652014-04-09 13:13:00 +0200848 struct kvm_device_attr attr;
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100849 int r;
850
851 switch (ioctl) {
Carsten Otteba5c1e92008-03-25 18:47:26 +0100852 case KVM_S390_INTERRUPT: {
853 struct kvm_s390_interrupt s390int;
854
855 r = -EFAULT;
856 if (copy_from_user(&s390int, argp, sizeof(s390int)))
857 break;
858 r = kvm_s390_inject_vm(kvm, &s390int);
859 break;
860 }
Cornelia Huckd938dc52013-10-23 18:26:34 +0200861 case KVM_ENABLE_CAP: {
862 struct kvm_enable_cap cap;
863 r = -EFAULT;
864 if (copy_from_user(&cap, argp, sizeof(cap)))
865 break;
866 r = kvm_vm_ioctl_enable_cap(kvm, &cap);
867 break;
868 }
Cornelia Huck84223592013-07-15 13:36:01 +0200869 case KVM_CREATE_IRQCHIP: {
870 struct kvm_irq_routing_entry routing;
871
872 r = -EINVAL;
873 if (kvm->arch.use_irqchip) {
874 /* Set up dummy routing. */
875 memset(&routing, 0, sizeof(routing));
876 kvm_set_irq_routing(kvm, &routing, 0, 0);
877 r = 0;
878 }
879 break;
880 }
Dominik Dingelf2061652014-04-09 13:13:00 +0200881 case KVM_SET_DEVICE_ATTR: {
882 r = -EFAULT;
883 if (copy_from_user(&attr, (void __user *)arg, sizeof(attr)))
884 break;
885 r = kvm_s390_vm_set_attr(kvm, &attr);
886 break;
887 }
888 case KVM_GET_DEVICE_ATTR: {
889 r = -EFAULT;
890 if (copy_from_user(&attr, (void __user *)arg, sizeof(attr)))
891 break;
892 r = kvm_s390_vm_get_attr(kvm, &attr);
893 break;
894 }
895 case KVM_HAS_DEVICE_ATTR: {
896 r = -EFAULT;
897 if (copy_from_user(&attr, (void __user *)arg, sizeof(attr)))
898 break;
899 r = kvm_s390_vm_has_attr(kvm, &attr);
900 break;
901 }
Jason J. Herne30ee2a92014-09-23 09:23:01 -0400902 case KVM_S390_GET_SKEYS: {
903 struct kvm_s390_skeys args;
904
905 r = -EFAULT;
906 if (copy_from_user(&args, argp,
907 sizeof(struct kvm_s390_skeys)))
908 break;
909 r = kvm_s390_get_skeys(kvm, &args);
910 break;
911 }
912 case KVM_S390_SET_SKEYS: {
913 struct kvm_s390_skeys args;
914
915 r = -EFAULT;
916 if (copy_from_user(&args, argp,
917 sizeof(struct kvm_s390_skeys)))
918 break;
919 r = kvm_s390_set_skeys(kvm, &args);
920 break;
921 }
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100922 default:
Avi Kivity367e1312009-08-26 14:57:07 +0300923 r = -ENOTTY;
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100924 }
925
926 return r;
927}
928
Tony Krowiak45c9b472015-01-13 11:33:26 -0500929static int kvm_s390_query_ap_config(u8 *config)
930{
931 u32 fcn_code = 0x04000000UL;
Christian Borntraeger86044c82015-02-26 13:53:47 +0100932 u32 cc = 0;
Tony Krowiak45c9b472015-01-13 11:33:26 -0500933
Christian Borntraeger86044c82015-02-26 13:53:47 +0100934 memset(config, 0, 128);
Tony Krowiak45c9b472015-01-13 11:33:26 -0500935 asm volatile(
936 "lgr 0,%1\n"
937 "lgr 2,%2\n"
938 ".long 0xb2af0000\n" /* PQAP(QCI) */
Christian Borntraeger86044c82015-02-26 13:53:47 +0100939 "0: ipm %0\n"
Tony Krowiak45c9b472015-01-13 11:33:26 -0500940 "srl %0,28\n"
Christian Borntraeger86044c82015-02-26 13:53:47 +0100941 "1:\n"
942 EX_TABLE(0b, 1b)
943 : "+r" (cc)
Tony Krowiak45c9b472015-01-13 11:33:26 -0500944 : "r" (fcn_code), "r" (config)
945 : "cc", "0", "2", "memory"
946 );
947
948 return cc;
949}
950
951static int kvm_s390_apxa_installed(void)
952{
953 u8 config[128];
954 int cc;
955
956 if (test_facility(2) && test_facility(12)) {
957 cc = kvm_s390_query_ap_config(config);
958
959 if (cc)
960 pr_err("PQAP(QCI) failed with cc=%d", cc);
961 else
962 return config[0] & 0x40;
963 }
964
965 return 0;
966}
967
968static void kvm_s390_set_crycb_format(struct kvm *kvm)
969{
970 kvm->arch.crypto.crycbd = (__u32)(unsigned long) kvm->arch.crypto.crycb;
971
972 if (kvm_s390_apxa_installed())
973 kvm->arch.crypto.crycbd |= CRYCB_FORMAT2;
974 else
975 kvm->arch.crypto.crycbd |= CRYCB_FORMAT1;
976}
977
Michael Mueller9d8d5782015-02-02 15:42:51 +0100978static void kvm_s390_get_cpu_id(struct cpuid *cpu_id)
979{
980 get_cpu_id(cpu_id);
981 cpu_id->version = 0xff;
982}
983
Tony Krowiak5102ee82014-06-27 14:46:01 -0400984static int kvm_s390_crypto_init(struct kvm *kvm)
985{
Michael Mueller9d8d5782015-02-02 15:42:51 +0100986 if (!test_kvm_facility(kvm, 76))
Tony Krowiak5102ee82014-06-27 14:46:01 -0400987 return 0;
988
989 kvm->arch.crypto.crycb = kzalloc(sizeof(*kvm->arch.crypto.crycb),
990 GFP_KERNEL | GFP_DMA);
991 if (!kvm->arch.crypto.crycb)
992 return -ENOMEM;
993
Tony Krowiak45c9b472015-01-13 11:33:26 -0500994 kvm_s390_set_crycb_format(kvm);
Tony Krowiak5102ee82014-06-27 14:46:01 -0400995
Tony Krowiaked6f76b2015-02-24 14:06:57 -0500996 /* Enable AES/DEA protected key functions by default */
997 kvm->arch.crypto.aes_kw = 1;
998 kvm->arch.crypto.dea_kw = 1;
999 get_random_bytes(kvm->arch.crypto.crycb->aes_wrapping_key_mask,
1000 sizeof(kvm->arch.crypto.crycb->aes_wrapping_key_mask));
1001 get_random_bytes(kvm->arch.crypto.crycb->dea_wrapping_key_mask,
1002 sizeof(kvm->arch.crypto.crycb->dea_wrapping_key_mask));
Tony Krowiaka374e892014-09-03 10:13:53 +02001003
Tony Krowiak5102ee82014-06-27 14:46:01 -04001004 return 0;
1005}
1006
Carsten Ottee08b9632012-01-04 10:25:20 +01001007int kvm_arch_init_vm(struct kvm *kvm, unsigned long type)
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001008{
Michael Mueller9d8d5782015-02-02 15:42:51 +01001009 int i, rc;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001010 char debug_name[16];
Christian Borntraegerf6c137f2014-03-19 11:18:29 +01001011 static unsigned long sca_offset;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001012
Carsten Ottee08b9632012-01-04 10:25:20 +01001013 rc = -EINVAL;
1014#ifdef CONFIG_KVM_S390_UCONTROL
1015 if (type & ~KVM_VM_S390_UCONTROL)
1016 goto out_err;
1017 if ((type & KVM_VM_S390_UCONTROL) && (!capable(CAP_SYS_ADMIN)))
1018 goto out_err;
1019#else
1020 if (type)
1021 goto out_err;
1022#endif
1023
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001024 rc = s390_enable_sie();
1025 if (rc)
Jan Kiszkad89f5ef2010-11-09 17:02:49 +01001026 goto out_err;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001027
Carsten Otteb2904112011-10-18 12:27:13 +02001028 rc = -ENOMEM;
1029
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001030 kvm->arch.sca = (struct sca_block *) get_zeroed_page(GFP_KERNEL);
1031 if (!kvm->arch.sca)
Jan Kiszkad89f5ef2010-11-09 17:02:49 +01001032 goto out_err;
Christian Borntraegerf6c137f2014-03-19 11:18:29 +01001033 spin_lock(&kvm_lock);
1034 sca_offset = (sca_offset + 16) & 0x7f0;
1035 kvm->arch.sca = (struct sca_block *) ((char *) kvm->arch.sca + sca_offset);
1036 spin_unlock(&kvm_lock);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001037
1038 sprintf(debug_name, "kvm-%u", current->pid);
1039
1040 kvm->arch.dbf = debug_register(debug_name, 8, 2, 8 * sizeof(long));
1041 if (!kvm->arch.dbf)
Dominik Dingel40f5b732015-03-12 13:55:53 +01001042 goto out_err;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001043
Michael Mueller9d8d5782015-02-02 15:42:51 +01001044 /*
1045 * The architectural maximum amount of facilities is 16 kbit. To store
1046 * this amount, 2 kbyte of memory is required. Thus we need a full
Michael Mueller981467c2015-02-24 13:51:04 +01001047 * page to hold the guest facility list (arch.model.fac->list) and the
1048 * facility mask (arch.model.fac->mask). Its address size has to be
Michael Mueller9d8d5782015-02-02 15:42:51 +01001049 * 31 bits and word aligned.
1050 */
1051 kvm->arch.model.fac =
Michael Mueller981467c2015-02-24 13:51:04 +01001052 (struct kvm_s390_fac *) get_zeroed_page(GFP_KERNEL | GFP_DMA);
Michael Mueller9d8d5782015-02-02 15:42:51 +01001053 if (!kvm->arch.model.fac)
Dominik Dingel40f5b732015-03-12 13:55:53 +01001054 goto out_err;
Michael Mueller9d8d5782015-02-02 15:42:51 +01001055
Michael Muellerfb5bf932015-02-27 14:25:10 +01001056 /* Populate the facility mask initially. */
Michael Mueller981467c2015-02-24 13:51:04 +01001057 memcpy(kvm->arch.model.fac->mask, S390_lowcore.stfle_fac_list,
Michael Mueller94422ee2015-02-26 12:12:40 +01001058 S390_ARCH_FAC_LIST_SIZE_BYTE);
Michael Mueller9d8d5782015-02-02 15:42:51 +01001059 for (i = 0; i < S390_ARCH_FAC_LIST_SIZE_U64; i++) {
1060 if (i < kvm_s390_fac_list_mask_size())
Michael Mueller981467c2015-02-24 13:51:04 +01001061 kvm->arch.model.fac->mask[i] &= kvm_s390_fac_list_mask[i];
Michael Mueller9d8d5782015-02-02 15:42:51 +01001062 else
Michael Mueller981467c2015-02-24 13:51:04 +01001063 kvm->arch.model.fac->mask[i] = 0UL;
Michael Mueller9d8d5782015-02-02 15:42:51 +01001064 }
1065
Michael Mueller981467c2015-02-24 13:51:04 +01001066 /* Populate the facility list initially. */
1067 memcpy(kvm->arch.model.fac->list, kvm->arch.model.fac->mask,
1068 S390_ARCH_FAC_LIST_SIZE_BYTE);
1069
Michael Mueller9d8d5782015-02-02 15:42:51 +01001070 kvm_s390_get_cpu_id(&kvm->arch.model.cpu_id);
Michael Mueller658b6ed2015-02-02 15:49:35 +01001071 kvm->arch.model.ibc = sclp_get_ibc() & 0x0fff;
Michael Mueller9d8d5782015-02-02 15:42:51 +01001072
Tony Krowiak5102ee82014-06-27 14:46:01 -04001073 if (kvm_s390_crypto_init(kvm) < 0)
Dominik Dingel40f5b732015-03-12 13:55:53 +01001074 goto out_err;
Tony Krowiak5102ee82014-06-27 14:46:01 -04001075
Carsten Otteba5c1e92008-03-25 18:47:26 +01001076 spin_lock_init(&kvm->arch.float_int.lock);
Jens Freimann6d3da242013-07-03 15:18:35 +02001077 for (i = 0; i < FIRQ_LIST_COUNT; i++)
1078 INIT_LIST_HEAD(&kvm->arch.float_int.lists[i]);
Heiko Carstens8a2422342014-01-10 14:33:28 +01001079 init_waitqueue_head(&kvm->arch.ipte_wq);
Thomas Hutha6b7e452014-10-01 14:48:42 +02001080 mutex_init(&kvm->arch.ipte_mutex);
Carsten Otteba5c1e92008-03-25 18:47:26 +01001081
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001082 debug_register_view(kvm->arch.dbf, &debug_sprintf_view);
1083 VM_EVENT(kvm, 3, "%s", "vm created");
1084
Carsten Ottee08b9632012-01-04 10:25:20 +01001085 if (type & KVM_VM_S390_UCONTROL) {
1086 kvm->arch.gmap = NULL;
1087 } else {
Christian Borntraeger03499852014-08-25 12:38:57 +02001088 kvm->arch.gmap = gmap_alloc(current->mm, (1UL << 44) - 1);
Carsten Ottee08b9632012-01-04 10:25:20 +01001089 if (!kvm->arch.gmap)
Dominik Dingel40f5b732015-03-12 13:55:53 +01001090 goto out_err;
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02001091 kvm->arch.gmap->private = kvm;
Dominik Dingel24eb3a82013-06-17 16:25:18 +02001092 kvm->arch.gmap->pfault_enabled = 0;
Carsten Ottee08b9632012-01-04 10:25:20 +01001093 }
Cornelia Huckfa6b7fe2012-12-20 15:32:12 +01001094
1095 kvm->arch.css_support = 0;
Cornelia Huck84223592013-07-15 13:36:01 +02001096 kvm->arch.use_irqchip = 0;
Jason J. Herne72f25022014-11-25 09:46:02 -05001097 kvm->arch.epoch = 0;
Cornelia Huckfa6b7fe2012-12-20 15:32:12 +01001098
David Hildenbrand8ad35752014-03-14 11:00:21 +01001099 spin_lock_init(&kvm->arch.start_stop_lock);
1100
Jan Kiszkad89f5ef2010-11-09 17:02:49 +01001101 return 0;
Jan Kiszkad89f5ef2010-11-09 17:02:49 +01001102out_err:
Dominik Dingel40f5b732015-03-12 13:55:53 +01001103 kfree(kvm->arch.crypto.crycb);
1104 free_page((unsigned long)kvm->arch.model.fac);
1105 debug_unregister(kvm->arch.dbf);
1106 free_page((unsigned long)(kvm->arch.sca));
Jan Kiszkad89f5ef2010-11-09 17:02:49 +01001107 return rc;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001108}
1109
Christian Borntraegerd329c032008-11-26 14:50:27 +01001110void kvm_arch_vcpu_destroy(struct kvm_vcpu *vcpu)
1111{
1112 VCPU_EVENT(vcpu, 3, "%s", "free cpu");
Cornelia Huckade38c32012-07-23 17:20:30 +02001113 trace_kvm_s390_destroy_vcpu(vcpu->vcpu_id);
Christian Borntraeger67335e62014-03-25 17:09:08 +01001114 kvm_s390_clear_local_irqs(vcpu);
Dominik Dingel3c038e62013-10-07 17:11:48 +02001115 kvm_clear_async_pf_completion_queue(vcpu);
Carsten Otte58f94602012-01-04 10:25:27 +01001116 if (!kvm_is_ucontrol(vcpu->kvm)) {
1117 clear_bit(63 - vcpu->vcpu_id,
1118 (unsigned long *) &vcpu->kvm->arch.sca->mcn);
1119 if (vcpu->kvm->arch.sca->cpu[vcpu->vcpu_id].sda ==
1120 (__u64) vcpu->arch.sie_block)
1121 vcpu->kvm->arch.sca->cpu[vcpu->vcpu_id].sda = 0;
1122 }
Carsten Otteabf4a712009-05-12 17:21:51 +02001123 smp_mb();
Carsten Otte27e03932012-01-04 10:25:21 +01001124
1125 if (kvm_is_ucontrol(vcpu->kvm))
1126 gmap_free(vcpu->arch.gmap);
1127
Dominik Dingelb31605c2014-03-25 13:47:11 +01001128 if (kvm_s390_cmma_enabled(vcpu->kvm))
1129 kvm_s390_vcpu_unsetup_cmma(vcpu);
Christian Borntraegerd329c032008-11-26 14:50:27 +01001130 free_page((unsigned long)(vcpu->arch.sie_block));
Konstantin Weitzb31288f2013-04-17 17:36:29 +02001131
Christian Borntraeger6692cef2008-11-26 14:51:08 +01001132 kvm_vcpu_uninit(vcpu);
Michael Muellerb110fea2013-06-12 13:54:54 +02001133 kmem_cache_free(kvm_vcpu_cache, vcpu);
Christian Borntraegerd329c032008-11-26 14:50:27 +01001134}
1135
1136static void kvm_free_vcpus(struct kvm *kvm)
1137{
1138 unsigned int i;
Gleb Natapov988a2ca2009-06-09 15:56:29 +03001139 struct kvm_vcpu *vcpu;
Christian Borntraegerd329c032008-11-26 14:50:27 +01001140
Gleb Natapov988a2ca2009-06-09 15:56:29 +03001141 kvm_for_each_vcpu(i, vcpu, kvm)
1142 kvm_arch_vcpu_destroy(vcpu);
1143
1144 mutex_lock(&kvm->lock);
1145 for (i = 0; i < atomic_read(&kvm->online_vcpus); i++)
1146 kvm->vcpus[i] = NULL;
1147
1148 atomic_set(&kvm->online_vcpus, 0);
1149 mutex_unlock(&kvm->lock);
Christian Borntraegerd329c032008-11-26 14:50:27 +01001150}
1151
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001152void kvm_arch_destroy_vm(struct kvm *kvm)
1153{
Christian Borntraegerd329c032008-11-26 14:50:27 +01001154 kvm_free_vcpus(kvm);
Michael Mueller9d8d5782015-02-02 15:42:51 +01001155 free_page((unsigned long)kvm->arch.model.fac);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001156 free_page((unsigned long)(kvm->arch.sca));
Christian Borntraegerd329c032008-11-26 14:50:27 +01001157 debug_unregister(kvm->arch.dbf);
Tony Krowiak5102ee82014-06-27 14:46:01 -04001158 kfree(kvm->arch.crypto.crycb);
Carsten Otte27e03932012-01-04 10:25:21 +01001159 if (!kvm_is_ucontrol(kvm))
1160 gmap_free(kvm->arch.gmap);
Cornelia Huck841b91c2013-07-15 13:36:01 +02001161 kvm_s390_destroy_adapters(kvm);
Christian Borntraeger67335e62014-03-25 17:09:08 +01001162 kvm_s390_clear_float_irqs(kvm);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001163}
1164
1165/* Section: vcpu related */
Dominik Dingeldafd0322014-12-02 16:53:21 +01001166static int __kvm_ucontrol_vcpu_init(struct kvm_vcpu *vcpu)
1167{
1168 vcpu->arch.gmap = gmap_alloc(current->mm, -1UL);
1169 if (!vcpu->arch.gmap)
1170 return -ENOMEM;
1171 vcpu->arch.gmap->private = vcpu->kvm;
1172
1173 return 0;
1174}
1175
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001176int kvm_arch_vcpu_init(struct kvm_vcpu *vcpu)
1177{
Dominik Dingel3c038e62013-10-07 17:11:48 +02001178 vcpu->arch.pfault_token = KVM_S390_PFAULT_TOKEN_INVALID;
1179 kvm_clear_async_pf_completion_queue(vcpu);
Christian Borntraeger59674c12012-01-11 11:20:33 +01001180 vcpu->run->kvm_valid_regs = KVM_SYNC_PREFIX |
1181 KVM_SYNC_GPRS |
Christian Borntraeger9eed07352012-02-06 10:59:07 +01001182 KVM_SYNC_ACRS |
David Hildenbrandb028ee32014-07-17 10:47:43 +02001183 KVM_SYNC_CRS |
1184 KVM_SYNC_ARCH0 |
1185 KVM_SYNC_PFAULT;
Eric Farman68c55752014-06-09 10:57:26 -04001186 if (test_kvm_facility(vcpu->kvm, 129))
1187 vcpu->run->kvm_valid_regs |= KVM_SYNC_VRS;
Dominik Dingeldafd0322014-12-02 16:53:21 +01001188
1189 if (kvm_is_ucontrol(vcpu->kvm))
1190 return __kvm_ucontrol_vcpu_init(vcpu);
1191
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001192 return 0;
1193}
1194
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001195void kvm_arch_vcpu_load(struct kvm_vcpu *vcpu, int cpu)
1196{
Martin Schwidefsky4725c862013-10-15 16:08:34 +02001197 save_fp_ctl(&vcpu->arch.host_fpregs.fpc);
Michael Mueller18280d82015-03-16 16:05:41 +01001198 if (test_kvm_facility(vcpu->kvm, 129))
Eric Farman68c55752014-06-09 10:57:26 -04001199 save_vx_regs((__vector128 *)&vcpu->arch.host_vregs->vrs);
1200 else
1201 save_fp_regs(vcpu->arch.host_fpregs.fprs);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001202 save_access_regs(vcpu->arch.host_acrs);
Michael Mueller18280d82015-03-16 16:05:41 +01001203 if (test_kvm_facility(vcpu->kvm, 129)) {
Eric Farman68c55752014-06-09 10:57:26 -04001204 restore_fp_ctl(&vcpu->run->s.regs.fpc);
1205 restore_vx_regs((__vector128 *)&vcpu->run->s.regs.vrs);
1206 } else {
1207 restore_fp_ctl(&vcpu->arch.guest_fpregs.fpc);
1208 restore_fp_regs(vcpu->arch.guest_fpregs.fprs);
1209 }
Christian Borntraeger59674c12012-01-11 11:20:33 +01001210 restore_access_regs(vcpu->run->s.regs.acrs);
Christian Borntraeger480e5922011-09-20 17:07:28 +02001211 gmap_enable(vcpu->arch.gmap);
Cornelia Huck9e6dabe2011-11-17 11:00:41 +01001212 atomic_set_mask(CPUSTAT_RUNNING, &vcpu->arch.sie_block->cpuflags);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001213}
1214
1215void kvm_arch_vcpu_put(struct kvm_vcpu *vcpu)
1216{
Cornelia Huck9e6dabe2011-11-17 11:00:41 +01001217 atomic_clear_mask(CPUSTAT_RUNNING, &vcpu->arch.sie_block->cpuflags);
Christian Borntraeger480e5922011-09-20 17:07:28 +02001218 gmap_disable(vcpu->arch.gmap);
Michael Mueller18280d82015-03-16 16:05:41 +01001219 if (test_kvm_facility(vcpu->kvm, 129)) {
Eric Farman68c55752014-06-09 10:57:26 -04001220 save_fp_ctl(&vcpu->run->s.regs.fpc);
1221 save_vx_regs((__vector128 *)&vcpu->run->s.regs.vrs);
1222 } else {
1223 save_fp_ctl(&vcpu->arch.guest_fpregs.fpc);
1224 save_fp_regs(vcpu->arch.guest_fpregs.fprs);
1225 }
Christian Borntraeger59674c12012-01-11 11:20:33 +01001226 save_access_regs(vcpu->run->s.regs.acrs);
Martin Schwidefsky4725c862013-10-15 16:08:34 +02001227 restore_fp_ctl(&vcpu->arch.host_fpregs.fpc);
Michael Mueller18280d82015-03-16 16:05:41 +01001228 if (test_kvm_facility(vcpu->kvm, 129))
Eric Farman68c55752014-06-09 10:57:26 -04001229 restore_vx_regs((__vector128 *)&vcpu->arch.host_vregs->vrs);
1230 else
1231 restore_fp_regs(vcpu->arch.host_fpregs.fprs);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001232 restore_access_regs(vcpu->arch.host_acrs);
1233}
1234
1235static void kvm_s390_vcpu_initial_reset(struct kvm_vcpu *vcpu)
1236{
1237 /* this equals initial cpu reset in pop, but we don't switch to ESA */
1238 vcpu->arch.sie_block->gpsw.mask = 0UL;
1239 vcpu->arch.sie_block->gpsw.addr = 0UL;
Christian Borntraeger8d26cf72012-01-11 11:19:32 +01001240 kvm_s390_set_prefix(vcpu, 0);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001241 vcpu->arch.sie_block->cputm = 0UL;
1242 vcpu->arch.sie_block->ckc = 0UL;
1243 vcpu->arch.sie_block->todpr = 0;
1244 memset(vcpu->arch.sie_block->gcr, 0, 16 * sizeof(__u64));
1245 vcpu->arch.sie_block->gcr[0] = 0xE0UL;
1246 vcpu->arch.sie_block->gcr[14] = 0xC2000000UL;
1247 vcpu->arch.guest_fpregs.fpc = 0;
1248 asm volatile("lfpc %0" : : "Q" (vcpu->arch.guest_fpregs.fpc));
1249 vcpu->arch.sie_block->gbea = 1;
Christian Borntraeger672550f2014-02-10 15:32:19 +01001250 vcpu->arch.sie_block->pp = 0;
Dominik Dingel3c038e62013-10-07 17:11:48 +02001251 vcpu->arch.pfault_token = KVM_S390_PFAULT_TOKEN_INVALID;
1252 kvm_clear_async_pf_completion_queue(vcpu);
David Hildenbrand6352e4d2014-04-10 17:35:00 +02001253 if (!kvm_s390_user_cpu_state_ctrl(vcpu->kvm))
1254 kvm_s390_vcpu_stop(vcpu);
Jens Freimann2ed10cc2014-02-11 13:48:07 +01001255 kvm_s390_clear_local_irqs(vcpu);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001256}
1257
Dominik Dingel31928aa2014-12-04 15:47:07 +01001258void kvm_arch_vcpu_postcreate(struct kvm_vcpu *vcpu)
Marcelo Tosatti42897d82012-11-27 23:29:02 -02001259{
Jason J. Herne72f25022014-11-25 09:46:02 -05001260 mutex_lock(&vcpu->kvm->lock);
1261 vcpu->arch.sie_block->epoch = vcpu->kvm->arch.epoch;
1262 mutex_unlock(&vcpu->kvm->lock);
Dominik Dingeldafd0322014-12-02 16:53:21 +01001263 if (!kvm_is_ucontrol(vcpu->kvm))
1264 vcpu->arch.gmap = vcpu->kvm->arch.gmap;
Marcelo Tosatti42897d82012-11-27 23:29:02 -02001265}
1266
Tony Krowiak5102ee82014-06-27 14:46:01 -04001267static void kvm_s390_vcpu_crypto_setup(struct kvm_vcpu *vcpu)
1268{
Michael Mueller9d8d5782015-02-02 15:42:51 +01001269 if (!test_kvm_facility(vcpu->kvm, 76))
Tony Krowiak5102ee82014-06-27 14:46:01 -04001270 return;
1271
Tony Krowiaka374e892014-09-03 10:13:53 +02001272 vcpu->arch.sie_block->ecb3 &= ~(ECB3_AES | ECB3_DEA);
1273
1274 if (vcpu->kvm->arch.crypto.aes_kw)
1275 vcpu->arch.sie_block->ecb3 |= ECB3_AES;
1276 if (vcpu->kvm->arch.crypto.dea_kw)
1277 vcpu->arch.sie_block->ecb3 |= ECB3_DEA;
1278
Tony Krowiak5102ee82014-06-27 14:46:01 -04001279 vcpu->arch.sie_block->crycbd = vcpu->kvm->arch.crypto.crycbd;
1280}
1281
Dominik Dingelb31605c2014-03-25 13:47:11 +01001282void kvm_s390_vcpu_unsetup_cmma(struct kvm_vcpu *vcpu)
1283{
1284 free_page(vcpu->arch.sie_block->cbrlo);
1285 vcpu->arch.sie_block->cbrlo = 0;
1286}
1287
1288int kvm_s390_vcpu_setup_cmma(struct kvm_vcpu *vcpu)
1289{
1290 vcpu->arch.sie_block->cbrlo = get_zeroed_page(GFP_KERNEL);
1291 if (!vcpu->arch.sie_block->cbrlo)
1292 return -ENOMEM;
1293
1294 vcpu->arch.sie_block->ecb2 |= 0x80;
1295 vcpu->arch.sie_block->ecb2 &= ~0x08;
1296 return 0;
1297}
1298
Michael Mueller91520f12015-02-27 14:32:11 +01001299static void kvm_s390_vcpu_setup_model(struct kvm_vcpu *vcpu)
1300{
1301 struct kvm_s390_cpu_model *model = &vcpu->kvm->arch.model;
1302
1303 vcpu->arch.cpu_id = model->cpu_id;
1304 vcpu->arch.sie_block->ibc = model->ibc;
1305 vcpu->arch.sie_block->fac = (int) (long) model->fac->list;
1306}
1307
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001308int kvm_arch_vcpu_setup(struct kvm_vcpu *vcpu)
1309{
Dominik Dingelb31605c2014-03-25 13:47:11 +01001310 int rc = 0;
Konstantin Weitzb31288f2013-04-17 17:36:29 +02001311
Cornelia Huck9e6dabe2011-11-17 11:00:41 +01001312 atomic_set(&vcpu->arch.sie_block->cpuflags, CPUSTAT_ZARCH |
1313 CPUSTAT_SM |
Guenther Hutzla4a4f192015-03-31 14:39:49 +02001314 CPUSTAT_STOPPED);
1315
Guenther Hutzl53df84f2015-02-18 11:13:03 +01001316 if (test_kvm_facility(vcpu->kvm, 78))
1317 atomic_set_mask(CPUSTAT_GED2, &vcpu->arch.sie_block->cpuflags);
1318 else if (test_kvm_facility(vcpu->kvm, 8))
Guenther Hutzla4a4f192015-03-31 14:39:49 +02001319 atomic_set_mask(CPUSTAT_GED, &vcpu->arch.sie_block->cpuflags);
1320
Michael Mueller91520f12015-02-27 14:32:11 +01001321 kvm_s390_vcpu_setup_model(vcpu);
1322
Christian Borntraegerfc345312010-06-17 23:16:20 +02001323 vcpu->arch.sie_block->ecb = 6;
Michael Mueller9d8d5782015-02-02 15:42:51 +01001324 if (test_kvm_facility(vcpu->kvm, 50) && test_kvm_facility(vcpu->kvm, 73))
Michael Mueller7feb6bb2013-06-28 13:30:24 +02001325 vcpu->arch.sie_block->ecb |= 0x10;
1326
Christian Borntraeger69d0d3a2013-06-12 13:54:53 +02001327 vcpu->arch.sie_block->ecb2 = 8;
David Hildenbrandea5f4962014-10-14 15:29:30 +02001328 vcpu->arch.sie_block->eca = 0xC1002000U;
Heiko Carstens217a4402013-12-30 12:54:14 +01001329 if (sclp_has_siif())
1330 vcpu->arch.sie_block->eca |= 1;
David Hildenbrandea5f4962014-10-14 15:29:30 +02001331 if (sclp_has_sigpif())
1332 vcpu->arch.sie_block->eca |= 0x10000000U;
Michael Mueller18280d82015-03-16 16:05:41 +01001333 if (test_kvm_facility(vcpu->kvm, 129)) {
Eric Farman13211ea2014-04-30 13:39:46 -04001334 vcpu->arch.sie_block->eca |= 0x00020000;
1335 vcpu->arch.sie_block->ecd |= 0x20000000;
1336 }
Thomas Huth492d8642015-02-10 16:11:01 +01001337 vcpu->arch.sie_block->ictl |= ICTL_ISKE | ICTL_SSKE | ICTL_RRBE;
Matthew Rosato5a5e6532013-01-29 11:48:20 -05001338
Dominik Dingelb31605c2014-03-25 13:47:11 +01001339 if (kvm_s390_cmma_enabled(vcpu->kvm)) {
1340 rc = kvm_s390_vcpu_setup_cmma(vcpu);
1341 if (rc)
1342 return rc;
Konstantin Weitzb31288f2013-04-17 17:36:29 +02001343 }
David Hildenbrand0ac96ca2014-12-12 15:17:31 +01001344 hrtimer_init(&vcpu->arch.ckc_timer, CLOCK_MONOTONIC, HRTIMER_MODE_REL);
Christian Borntraegerca872302009-05-12 17:21:49 +02001345 vcpu->arch.ckc_timer.function = kvm_s390_idle_wakeup;
Michael Mueller9d8d5782015-02-02 15:42:51 +01001346
Tony Krowiak5102ee82014-06-27 14:46:01 -04001347 kvm_s390_vcpu_crypto_setup(vcpu);
1348
Dominik Dingelb31605c2014-03-25 13:47:11 +01001349 return rc;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001350}
1351
1352struct kvm_vcpu *kvm_arch_vcpu_create(struct kvm *kvm,
1353 unsigned int id)
1354{
Carsten Otte4d475552011-10-18 12:27:12 +02001355 struct kvm_vcpu *vcpu;
Michael Mueller7feb6bb2013-06-28 13:30:24 +02001356 struct sie_page *sie_page;
Carsten Otte4d475552011-10-18 12:27:12 +02001357 int rc = -EINVAL;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001358
Carsten Otte4d475552011-10-18 12:27:12 +02001359 if (id >= KVM_MAX_VCPUS)
1360 goto out;
1361
1362 rc = -ENOMEM;
1363
Michael Muellerb110fea2013-06-12 13:54:54 +02001364 vcpu = kmem_cache_zalloc(kvm_vcpu_cache, GFP_KERNEL);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001365 if (!vcpu)
Carsten Otte4d475552011-10-18 12:27:12 +02001366 goto out;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001367
Michael Mueller7feb6bb2013-06-28 13:30:24 +02001368 sie_page = (struct sie_page *) get_zeroed_page(GFP_KERNEL);
1369 if (!sie_page)
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001370 goto out_free_cpu;
1371
Michael Mueller7feb6bb2013-06-28 13:30:24 +02001372 vcpu->arch.sie_block = &sie_page->sie_block;
1373 vcpu->arch.sie_block->itdba = (unsigned long) &sie_page->itdb;
Eric Farman68c55752014-06-09 10:57:26 -04001374 vcpu->arch.host_vregs = &sie_page->vregs;
Michael Mueller7feb6bb2013-06-28 13:30:24 +02001375
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001376 vcpu->arch.sie_block->icpua = id;
Carsten Otte58f94602012-01-04 10:25:27 +01001377 if (!kvm_is_ucontrol(kvm)) {
1378 if (!kvm->arch.sca) {
1379 WARN_ON_ONCE(1);
1380 goto out_free_cpu;
1381 }
1382 if (!kvm->arch.sca->cpu[id].sda)
1383 kvm->arch.sca->cpu[id].sda =
1384 (__u64) vcpu->arch.sie_block;
1385 vcpu->arch.sie_block->scaoh =
1386 (__u32)(((__u64)kvm->arch.sca) >> 32);
1387 vcpu->arch.sie_block->scaol = (__u32)(__u64)kvm->arch.sca;
1388 set_bit(63 - id, (unsigned long *) &kvm->arch.sca->mcn);
1389 }
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001390
Carsten Otteba5c1e92008-03-25 18:47:26 +01001391 spin_lock_init(&vcpu->arch.local_int.lock);
Carsten Otteba5c1e92008-03-25 18:47:26 +01001392 vcpu->arch.local_int.float_int = &kvm->arch.float_int;
Christian Borntraegerd0321a22013-06-12 13:54:55 +02001393 vcpu->arch.local_int.wq = &vcpu->wq;
Christian Borntraeger5288fbf2008-03-25 18:47:31 +01001394 vcpu->arch.local_int.cpuflags = &vcpu->arch.sie_block->cpuflags;
Carsten Otteba5c1e92008-03-25 18:47:26 +01001395
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001396 rc = kvm_vcpu_init(vcpu, kvm, id);
1397 if (rc)
Wei Yongjun7b06bf22010-03-09 14:37:53 +08001398 goto out_free_sie_block;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001399 VM_EVENT(kvm, 3, "create cpu %d at %p, sie block at %p", id, vcpu,
1400 vcpu->arch.sie_block);
Cornelia Huckade38c32012-07-23 17:20:30 +02001401 trace_kvm_s390_create_vcpu(id, vcpu, vcpu->arch.sie_block);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001402
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001403 return vcpu;
Wei Yongjun7b06bf22010-03-09 14:37:53 +08001404out_free_sie_block:
1405 free_page((unsigned long)(vcpu->arch.sie_block));
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001406out_free_cpu:
Michael Muellerb110fea2013-06-12 13:54:54 +02001407 kmem_cache_free(kvm_vcpu_cache, vcpu);
Carsten Otte4d475552011-10-18 12:27:12 +02001408out:
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001409 return ERR_PTR(rc);
1410}
1411
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001412int kvm_arch_vcpu_runnable(struct kvm_vcpu *vcpu)
1413{
David Hildenbrand9a022062014-08-05 17:40:47 +02001414 return kvm_s390_vcpu_has_irq(vcpu, 0);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001415}
1416
Christian Borntraeger27406cd2015-04-14 12:17:34 +02001417void kvm_s390_vcpu_block(struct kvm_vcpu *vcpu)
Christian Borntraeger49b99e12013-05-17 14:41:35 +02001418{
1419 atomic_set_mask(PROG_BLOCK_SIE, &vcpu->arch.sie_block->prog20);
David Hildenbrand61a6df52015-05-12 08:41:40 +02001420 exit_sie(vcpu);
Christian Borntraeger49b99e12013-05-17 14:41:35 +02001421}
1422
Christian Borntraeger27406cd2015-04-14 12:17:34 +02001423void kvm_s390_vcpu_unblock(struct kvm_vcpu *vcpu)
Christian Borntraeger49b99e12013-05-17 14:41:35 +02001424{
1425 atomic_clear_mask(PROG_BLOCK_SIE, &vcpu->arch.sie_block->prog20);
1426}
1427
Christian Borntraeger8e236542015-04-09 13:49:04 +02001428static void kvm_s390_vcpu_request(struct kvm_vcpu *vcpu)
1429{
1430 atomic_set_mask(PROG_REQUEST, &vcpu->arch.sie_block->prog20);
David Hildenbrand61a6df52015-05-12 08:41:40 +02001431 exit_sie(vcpu);
Christian Borntraeger8e236542015-04-09 13:49:04 +02001432}
1433
1434static void kvm_s390_vcpu_request_handled(struct kvm_vcpu *vcpu)
1435{
1436 atomic_clear_mask(PROG_REQUEST, &vcpu->arch.sie_block->prog20);
1437}
1438
Christian Borntraeger49b99e12013-05-17 14:41:35 +02001439/*
1440 * Kick a guest cpu out of SIE and wait until SIE is not running.
1441 * If the CPU is not running (e.g. waiting as idle) the function will
1442 * return immediately. */
1443void exit_sie(struct kvm_vcpu *vcpu)
1444{
1445 atomic_set_mask(CPUSTAT_STOP_INT, &vcpu->arch.sie_block->cpuflags);
1446 while (vcpu->arch.sie_block->prog0c & PROG_IN_SIE)
1447 cpu_relax();
1448}
1449
Christian Borntraeger8e236542015-04-09 13:49:04 +02001450/* Kick a guest cpu out of SIE to process a request synchronously */
1451void kvm_s390_sync_request(int req, struct kvm_vcpu *vcpu)
Christian Borntraeger49b99e12013-05-17 14:41:35 +02001452{
Christian Borntraeger8e236542015-04-09 13:49:04 +02001453 kvm_make_request(req, vcpu);
1454 kvm_s390_vcpu_request(vcpu);
Christian Borntraeger49b99e12013-05-17 14:41:35 +02001455}
1456
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02001457static void kvm_gmap_notifier(struct gmap *gmap, unsigned long address)
1458{
1459 int i;
1460 struct kvm *kvm = gmap->private;
1461 struct kvm_vcpu *vcpu;
1462
1463 kvm_for_each_vcpu(i, vcpu, kvm) {
1464 /* match against both prefix pages */
Michael Muellerfda902c2014-05-13 16:58:30 +02001465 if (kvm_s390_get_prefix(vcpu) == (address & ~0x1000UL)) {
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02001466 VCPU_EVENT(vcpu, 2, "gmap notifier for %lx", address);
Christian Borntraeger8e236542015-04-09 13:49:04 +02001467 kvm_s390_sync_request(KVM_REQ_MMU_RELOAD, vcpu);
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02001468 }
1469 }
1470}
1471
Christoffer Dallb6d33832012-03-08 16:44:24 -05001472int kvm_arch_vcpu_should_kick(struct kvm_vcpu *vcpu)
1473{
1474 /* kvm common code refers to this, but never calls it */
1475 BUG();
1476 return 0;
1477}
1478
Carsten Otte14eebd92012-05-15 14:15:26 +02001479static int kvm_arch_vcpu_ioctl_get_one_reg(struct kvm_vcpu *vcpu,
1480 struct kvm_one_reg *reg)
1481{
1482 int r = -EINVAL;
1483
1484 switch (reg->id) {
Carsten Otte29b7c712012-05-15 14:15:27 +02001485 case KVM_REG_S390_TODPR:
1486 r = put_user(vcpu->arch.sie_block->todpr,
1487 (u32 __user *)reg->addr);
1488 break;
1489 case KVM_REG_S390_EPOCHDIFF:
1490 r = put_user(vcpu->arch.sie_block->epoch,
1491 (u64 __user *)reg->addr);
1492 break;
Jason J. herne46a6dd12012-05-15 14:15:28 +02001493 case KVM_REG_S390_CPU_TIMER:
1494 r = put_user(vcpu->arch.sie_block->cputm,
1495 (u64 __user *)reg->addr);
1496 break;
1497 case KVM_REG_S390_CLOCK_COMP:
1498 r = put_user(vcpu->arch.sie_block->ckc,
1499 (u64 __user *)reg->addr);
1500 break;
Dominik Dingel536336c2013-09-30 10:55:33 +02001501 case KVM_REG_S390_PFTOKEN:
1502 r = put_user(vcpu->arch.pfault_token,
1503 (u64 __user *)reg->addr);
1504 break;
1505 case KVM_REG_S390_PFCOMPARE:
1506 r = put_user(vcpu->arch.pfault_compare,
1507 (u64 __user *)reg->addr);
1508 break;
1509 case KVM_REG_S390_PFSELECT:
1510 r = put_user(vcpu->arch.pfault_select,
1511 (u64 __user *)reg->addr);
1512 break;
Christian Borntraeger672550f2014-02-10 15:32:19 +01001513 case KVM_REG_S390_PP:
1514 r = put_user(vcpu->arch.sie_block->pp,
1515 (u64 __user *)reg->addr);
1516 break;
Christian Borntraegerafa45ff2014-02-10 15:39:23 +01001517 case KVM_REG_S390_GBEA:
1518 r = put_user(vcpu->arch.sie_block->gbea,
1519 (u64 __user *)reg->addr);
1520 break;
Carsten Otte14eebd92012-05-15 14:15:26 +02001521 default:
1522 break;
1523 }
1524
1525 return r;
1526}
1527
1528static int kvm_arch_vcpu_ioctl_set_one_reg(struct kvm_vcpu *vcpu,
1529 struct kvm_one_reg *reg)
1530{
1531 int r = -EINVAL;
1532
1533 switch (reg->id) {
Carsten Otte29b7c712012-05-15 14:15:27 +02001534 case KVM_REG_S390_TODPR:
1535 r = get_user(vcpu->arch.sie_block->todpr,
1536 (u32 __user *)reg->addr);
1537 break;
1538 case KVM_REG_S390_EPOCHDIFF:
1539 r = get_user(vcpu->arch.sie_block->epoch,
1540 (u64 __user *)reg->addr);
1541 break;
Jason J. herne46a6dd12012-05-15 14:15:28 +02001542 case KVM_REG_S390_CPU_TIMER:
1543 r = get_user(vcpu->arch.sie_block->cputm,
1544 (u64 __user *)reg->addr);
1545 break;
1546 case KVM_REG_S390_CLOCK_COMP:
1547 r = get_user(vcpu->arch.sie_block->ckc,
1548 (u64 __user *)reg->addr);
1549 break;
Dominik Dingel536336c2013-09-30 10:55:33 +02001550 case KVM_REG_S390_PFTOKEN:
1551 r = get_user(vcpu->arch.pfault_token,
1552 (u64 __user *)reg->addr);
David Hildenbrand9fbd8082014-10-09 15:01:38 +02001553 if (vcpu->arch.pfault_token == KVM_S390_PFAULT_TOKEN_INVALID)
1554 kvm_clear_async_pf_completion_queue(vcpu);
Dominik Dingel536336c2013-09-30 10:55:33 +02001555 break;
1556 case KVM_REG_S390_PFCOMPARE:
1557 r = get_user(vcpu->arch.pfault_compare,
1558 (u64 __user *)reg->addr);
1559 break;
1560 case KVM_REG_S390_PFSELECT:
1561 r = get_user(vcpu->arch.pfault_select,
1562 (u64 __user *)reg->addr);
1563 break;
Christian Borntraeger672550f2014-02-10 15:32:19 +01001564 case KVM_REG_S390_PP:
1565 r = get_user(vcpu->arch.sie_block->pp,
1566 (u64 __user *)reg->addr);
1567 break;
Christian Borntraegerafa45ff2014-02-10 15:39:23 +01001568 case KVM_REG_S390_GBEA:
1569 r = get_user(vcpu->arch.sie_block->gbea,
1570 (u64 __user *)reg->addr);
1571 break;
Carsten Otte14eebd92012-05-15 14:15:26 +02001572 default:
1573 break;
1574 }
1575
1576 return r;
1577}
Christoffer Dallb6d33832012-03-08 16:44:24 -05001578
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001579static int kvm_arch_vcpu_ioctl_initial_reset(struct kvm_vcpu *vcpu)
1580{
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001581 kvm_s390_vcpu_initial_reset(vcpu);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001582 return 0;
1583}
1584
1585int kvm_arch_vcpu_ioctl_set_regs(struct kvm_vcpu *vcpu, struct kvm_regs *regs)
1586{
Christian Borntraeger5a32c1a2012-01-11 11:20:32 +01001587 memcpy(&vcpu->run->s.regs.gprs, &regs->gprs, sizeof(regs->gprs));
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001588 return 0;
1589}
1590
1591int kvm_arch_vcpu_ioctl_get_regs(struct kvm_vcpu *vcpu, struct kvm_regs *regs)
1592{
Christian Borntraeger5a32c1a2012-01-11 11:20:32 +01001593 memcpy(&regs->gprs, &vcpu->run->s.regs.gprs, sizeof(regs->gprs));
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001594 return 0;
1595}
1596
1597int kvm_arch_vcpu_ioctl_set_sregs(struct kvm_vcpu *vcpu,
1598 struct kvm_sregs *sregs)
1599{
Christian Borntraeger59674c12012-01-11 11:20:33 +01001600 memcpy(&vcpu->run->s.regs.acrs, &sregs->acrs, sizeof(sregs->acrs));
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001601 memcpy(&vcpu->arch.sie_block->gcr, &sregs->crs, sizeof(sregs->crs));
Christian Borntraeger59674c12012-01-11 11:20:33 +01001602 restore_access_regs(vcpu->run->s.regs.acrs);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001603 return 0;
1604}
1605
1606int kvm_arch_vcpu_ioctl_get_sregs(struct kvm_vcpu *vcpu,
1607 struct kvm_sregs *sregs)
1608{
Christian Borntraeger59674c12012-01-11 11:20:33 +01001609 memcpy(&sregs->acrs, &vcpu->run->s.regs.acrs, sizeof(sregs->acrs));
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001610 memcpy(&sregs->crs, &vcpu->arch.sie_block->gcr, sizeof(sregs->crs));
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001611 return 0;
1612}
1613
1614int kvm_arch_vcpu_ioctl_set_fpu(struct kvm_vcpu *vcpu, struct kvm_fpu *fpu)
1615{
Martin Schwidefsky4725c862013-10-15 16:08:34 +02001616 if (test_fp_ctl(fpu->fpc))
1617 return -EINVAL;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001618 memcpy(&vcpu->arch.guest_fpregs.fprs, &fpu->fprs, sizeof(fpu->fprs));
Martin Schwidefsky4725c862013-10-15 16:08:34 +02001619 vcpu->arch.guest_fpregs.fpc = fpu->fpc;
1620 restore_fp_ctl(&vcpu->arch.guest_fpregs.fpc);
1621 restore_fp_regs(vcpu->arch.guest_fpregs.fprs);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001622 return 0;
1623}
1624
1625int kvm_arch_vcpu_ioctl_get_fpu(struct kvm_vcpu *vcpu, struct kvm_fpu *fpu)
1626{
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001627 memcpy(&fpu->fprs, &vcpu->arch.guest_fpregs.fprs, sizeof(fpu->fprs));
1628 fpu->fpc = vcpu->arch.guest_fpregs.fpc;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001629 return 0;
1630}
1631
1632static int kvm_arch_vcpu_ioctl_set_initial_psw(struct kvm_vcpu *vcpu, psw_t psw)
1633{
1634 int rc = 0;
1635
David Hildenbrand7a42fdc2014-05-05 16:26:19 +02001636 if (!is_vcpu_stopped(vcpu))
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001637 rc = -EBUSY;
Carsten Otted7b0b5e2009-11-19 14:21:16 +01001638 else {
1639 vcpu->run->psw_mask = psw.mask;
1640 vcpu->run->psw_addr = psw.addr;
1641 }
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001642 return rc;
1643}
1644
1645int kvm_arch_vcpu_ioctl_translate(struct kvm_vcpu *vcpu,
1646 struct kvm_translation *tr)
1647{
1648 return -EINVAL; /* not implemented yet */
1649}
1650
David Hildenbrand27291e22014-01-23 12:26:52 +01001651#define VALID_GUESTDBG_FLAGS (KVM_GUESTDBG_SINGLESTEP | \
1652 KVM_GUESTDBG_USE_HW_BP | \
1653 KVM_GUESTDBG_ENABLE)
1654
Jan Kiszkad0bfb942008-12-15 13:52:10 +01001655int kvm_arch_vcpu_ioctl_set_guest_debug(struct kvm_vcpu *vcpu,
1656 struct kvm_guest_debug *dbg)
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001657{
David Hildenbrand27291e22014-01-23 12:26:52 +01001658 int rc = 0;
1659
1660 vcpu->guest_debug = 0;
1661 kvm_s390_clear_bp_data(vcpu);
1662
David Hildenbrand2de3bfc2014-05-20 17:25:20 +02001663 if (dbg->control & ~VALID_GUESTDBG_FLAGS)
David Hildenbrand27291e22014-01-23 12:26:52 +01001664 return -EINVAL;
1665
1666 if (dbg->control & KVM_GUESTDBG_ENABLE) {
1667 vcpu->guest_debug = dbg->control;
1668 /* enforce guest PER */
1669 atomic_set_mask(CPUSTAT_P, &vcpu->arch.sie_block->cpuflags);
1670
1671 if (dbg->control & KVM_GUESTDBG_USE_HW_BP)
1672 rc = kvm_s390_import_bp_data(vcpu, dbg);
1673 } else {
1674 atomic_clear_mask(CPUSTAT_P, &vcpu->arch.sie_block->cpuflags);
1675 vcpu->arch.guestdbg.last_bp = 0;
1676 }
1677
1678 if (rc) {
1679 vcpu->guest_debug = 0;
1680 kvm_s390_clear_bp_data(vcpu);
1681 atomic_clear_mask(CPUSTAT_P, &vcpu->arch.sie_block->cpuflags);
1682 }
1683
1684 return rc;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001685}
1686
Marcelo Tosatti62d9f0d2008-04-11 13:24:45 -03001687int kvm_arch_vcpu_ioctl_get_mpstate(struct kvm_vcpu *vcpu,
1688 struct kvm_mp_state *mp_state)
1689{
David Hildenbrand6352e4d2014-04-10 17:35:00 +02001690 /* CHECK_STOP and LOAD are not supported yet */
1691 return is_vcpu_stopped(vcpu) ? KVM_MP_STATE_STOPPED :
1692 KVM_MP_STATE_OPERATING;
Marcelo Tosatti62d9f0d2008-04-11 13:24:45 -03001693}
1694
1695int kvm_arch_vcpu_ioctl_set_mpstate(struct kvm_vcpu *vcpu,
1696 struct kvm_mp_state *mp_state)
1697{
David Hildenbrand6352e4d2014-04-10 17:35:00 +02001698 int rc = 0;
1699
1700 /* user space knows about this interface - let it control the state */
1701 vcpu->kvm->arch.user_cpu_state_ctrl = 1;
1702
1703 switch (mp_state->mp_state) {
1704 case KVM_MP_STATE_STOPPED:
1705 kvm_s390_vcpu_stop(vcpu);
1706 break;
1707 case KVM_MP_STATE_OPERATING:
1708 kvm_s390_vcpu_start(vcpu);
1709 break;
1710 case KVM_MP_STATE_LOAD:
1711 case KVM_MP_STATE_CHECK_STOP:
1712 /* fall through - CHECK_STOP and LOAD are not supported yet */
1713 default:
1714 rc = -ENXIO;
1715 }
1716
1717 return rc;
Marcelo Tosatti62d9f0d2008-04-11 13:24:45 -03001718}
1719
Dominik Dingelb31605c2014-03-25 13:47:11 +01001720bool kvm_s390_cmma_enabled(struct kvm *kvm)
1721{
1722 if (!MACHINE_IS_LPAR)
1723 return false;
1724 /* only enable for z10 and later */
1725 if (!MACHINE_HAS_EDAT1)
1726 return false;
1727 if (!kvm->arch.use_cmma)
1728 return false;
1729 return true;
1730}
1731
David Hildenbrand8ad35752014-03-14 11:00:21 +01001732static bool ibs_enabled(struct kvm_vcpu *vcpu)
1733{
1734 return atomic_read(&vcpu->arch.sie_block->cpuflags) & CPUSTAT_IBS;
1735}
1736
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02001737static int kvm_s390_handle_requests(struct kvm_vcpu *vcpu)
1738{
Christian Borntraeger785dbef2015-04-16 16:58:22 +02001739 if (!vcpu->requests)
1740 return 0;
David Hildenbrand8ad35752014-03-14 11:00:21 +01001741retry:
Christian Borntraeger8e236542015-04-09 13:49:04 +02001742 kvm_s390_vcpu_request_handled(vcpu);
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02001743 /*
1744 * We use MMU_RELOAD just to re-arm the ipte notifier for the
1745 * guest prefix page. gmap_ipte_notify will wait on the ptl lock.
1746 * This ensures that the ipte instruction for this request has
1747 * already finished. We might race against a second unmapper that
1748 * wants to set the blocking bit. Lets just retry the request loop.
1749 */
David Hildenbrand8ad35752014-03-14 11:00:21 +01001750 if (kvm_check_request(KVM_REQ_MMU_RELOAD, vcpu)) {
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02001751 int rc;
1752 rc = gmap_ipte_notify(vcpu->arch.gmap,
Michael Muellerfda902c2014-05-13 16:58:30 +02001753 kvm_s390_get_prefix(vcpu),
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02001754 PAGE_SIZE * 2);
1755 if (rc)
1756 return rc;
David Hildenbrand8ad35752014-03-14 11:00:21 +01001757 goto retry;
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02001758 }
David Hildenbrand8ad35752014-03-14 11:00:21 +01001759
David Hildenbrandd3d692c2014-07-29 08:53:36 +02001760 if (kvm_check_request(KVM_REQ_TLB_FLUSH, vcpu)) {
1761 vcpu->arch.sie_block->ihcpu = 0xffff;
1762 goto retry;
1763 }
1764
David Hildenbrand8ad35752014-03-14 11:00:21 +01001765 if (kvm_check_request(KVM_REQ_ENABLE_IBS, vcpu)) {
1766 if (!ibs_enabled(vcpu)) {
1767 trace_kvm_s390_enable_disable_ibs(vcpu->vcpu_id, 1);
1768 atomic_set_mask(CPUSTAT_IBS,
1769 &vcpu->arch.sie_block->cpuflags);
1770 }
1771 goto retry;
1772 }
1773
1774 if (kvm_check_request(KVM_REQ_DISABLE_IBS, vcpu)) {
1775 if (ibs_enabled(vcpu)) {
1776 trace_kvm_s390_enable_disable_ibs(vcpu->vcpu_id, 0);
1777 atomic_clear_mask(CPUSTAT_IBS,
1778 &vcpu->arch.sie_block->cpuflags);
1779 }
1780 goto retry;
1781 }
1782
David Hildenbrand0759d062014-05-13 16:54:32 +02001783 /* nothing to do, just clear the request */
1784 clear_bit(KVM_REQ_UNHALT, &vcpu->requests);
1785
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02001786 return 0;
1787}
1788
Thomas Huthfa576c52014-05-06 17:20:16 +02001789/**
1790 * kvm_arch_fault_in_page - fault-in guest page if necessary
1791 * @vcpu: The corresponding virtual cpu
1792 * @gpa: Guest physical address
1793 * @writable: Whether the page should be writable or not
1794 *
1795 * Make sure that a guest page has been faulted-in on the host.
1796 *
1797 * Return: Zero on success, negative error code otherwise.
1798 */
1799long kvm_arch_fault_in_page(struct kvm_vcpu *vcpu, gpa_t gpa, int writable)
Dominik Dingel24eb3a82013-06-17 16:25:18 +02001800{
Martin Schwidefsky527e30b2014-04-30 16:04:25 +02001801 return gmap_fault(vcpu->arch.gmap, gpa,
1802 writable ? FAULT_FLAG_WRITE : 0);
Dominik Dingel24eb3a82013-06-17 16:25:18 +02001803}
1804
Dominik Dingel3c038e62013-10-07 17:11:48 +02001805static void __kvm_inject_pfault_token(struct kvm_vcpu *vcpu, bool start_token,
1806 unsigned long token)
1807{
1808 struct kvm_s390_interrupt inti;
Jens Freimann383d0b02014-07-29 15:11:49 +02001809 struct kvm_s390_irq irq;
Dominik Dingel3c038e62013-10-07 17:11:48 +02001810
1811 if (start_token) {
Jens Freimann383d0b02014-07-29 15:11:49 +02001812 irq.u.ext.ext_params2 = token;
1813 irq.type = KVM_S390_INT_PFAULT_INIT;
1814 WARN_ON_ONCE(kvm_s390_inject_vcpu(vcpu, &irq));
Dominik Dingel3c038e62013-10-07 17:11:48 +02001815 } else {
1816 inti.type = KVM_S390_INT_PFAULT_DONE;
Jens Freimann383d0b02014-07-29 15:11:49 +02001817 inti.parm64 = token;
Dominik Dingel3c038e62013-10-07 17:11:48 +02001818 WARN_ON_ONCE(kvm_s390_inject_vm(vcpu->kvm, &inti));
1819 }
1820}
1821
1822void kvm_arch_async_page_not_present(struct kvm_vcpu *vcpu,
1823 struct kvm_async_pf *work)
1824{
1825 trace_kvm_s390_pfault_init(vcpu, work->arch.pfault_token);
1826 __kvm_inject_pfault_token(vcpu, true, work->arch.pfault_token);
1827}
1828
1829void kvm_arch_async_page_present(struct kvm_vcpu *vcpu,
1830 struct kvm_async_pf *work)
1831{
1832 trace_kvm_s390_pfault_done(vcpu, work->arch.pfault_token);
1833 __kvm_inject_pfault_token(vcpu, false, work->arch.pfault_token);
1834}
1835
1836void kvm_arch_async_page_ready(struct kvm_vcpu *vcpu,
1837 struct kvm_async_pf *work)
1838{
1839 /* s390 will always inject the page directly */
1840}
1841
1842bool kvm_arch_can_inject_async_page_present(struct kvm_vcpu *vcpu)
1843{
1844 /*
1845 * s390 will always inject the page directly,
1846 * but we still want check_async_completion to cleanup
1847 */
1848 return true;
1849}
1850
1851static int kvm_arch_setup_async_pf(struct kvm_vcpu *vcpu)
1852{
1853 hva_t hva;
1854 struct kvm_arch_async_pf arch;
1855 int rc;
1856
1857 if (vcpu->arch.pfault_token == KVM_S390_PFAULT_TOKEN_INVALID)
1858 return 0;
1859 if ((vcpu->arch.sie_block->gpsw.mask & vcpu->arch.pfault_select) !=
1860 vcpu->arch.pfault_compare)
1861 return 0;
1862 if (psw_extint_disabled(vcpu))
1863 return 0;
David Hildenbrand9a022062014-08-05 17:40:47 +02001864 if (kvm_s390_vcpu_has_irq(vcpu, 0))
Dominik Dingel3c038e62013-10-07 17:11:48 +02001865 return 0;
1866 if (!(vcpu->arch.sie_block->gcr[0] & 0x200ul))
1867 return 0;
1868 if (!vcpu->arch.gmap->pfault_enabled)
1869 return 0;
1870
Heiko Carstens81480cc2014-01-01 16:36:07 +01001871 hva = gfn_to_hva(vcpu->kvm, gpa_to_gfn(current->thread.gmap_addr));
1872 hva += current->thread.gmap_addr & ~PAGE_MASK;
1873 if (read_guest_real(vcpu, vcpu->arch.pfault_token, &arch.pfault_token, 8))
Dominik Dingel3c038e62013-10-07 17:11:48 +02001874 return 0;
1875
1876 rc = kvm_setup_async_pf(vcpu, current->thread.gmap_addr, hva, &arch);
1877 return rc;
1878}
1879
Thomas Huth3fb4c402013-09-12 10:33:43 +02001880static int vcpu_pre_run(struct kvm_vcpu *vcpu)
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001881{
Thomas Huth3fb4c402013-09-12 10:33:43 +02001882 int rc, cpuflags;
Carsten Ottee168bf82012-01-04 10:25:22 +01001883
Dominik Dingel3c038e62013-10-07 17:11:48 +02001884 /*
1885 * On s390 notifications for arriving pages will be delivered directly
1886 * to the guest but the house keeping for completed pfaults is
1887 * handled outside the worker.
1888 */
1889 kvm_check_async_pf_completion(vcpu);
1890
Christian Borntraeger5a32c1a2012-01-11 11:20:32 +01001891 memcpy(&vcpu->arch.sie_block->gg14, &vcpu->run->s.regs.gprs[14], 16);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001892
1893 if (need_resched())
1894 schedule();
1895
Martin Schwidefskyd3a73ac2014-04-15 12:55:07 +02001896 if (test_cpu_flag(CIF_MCCK_PENDING))
Christian Borntraeger71cde582008-05-21 13:37:34 +02001897 s390_handle_mcck();
1898
Jens Freimann79395032014-04-17 10:10:30 +02001899 if (!kvm_is_ucontrol(vcpu->kvm)) {
1900 rc = kvm_s390_deliver_pending_interrupts(vcpu);
1901 if (rc)
1902 return rc;
1903 }
Carsten Otte0ff31862008-05-21 13:37:37 +02001904
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02001905 rc = kvm_s390_handle_requests(vcpu);
1906 if (rc)
1907 return rc;
1908
David Hildenbrand27291e22014-01-23 12:26:52 +01001909 if (guestdbg_enabled(vcpu)) {
1910 kvm_s390_backup_guest_per_regs(vcpu);
1911 kvm_s390_patch_guest_per_regs(vcpu);
1912 }
1913
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001914 vcpu->arch.sie_block->icptcode = 0;
Thomas Huth3fb4c402013-09-12 10:33:43 +02001915 cpuflags = atomic_read(&vcpu->arch.sie_block->cpuflags);
1916 VCPU_EVENT(vcpu, 6, "entering sie flags %x", cpuflags);
1917 trace_kvm_s390_sie_enter(vcpu, cpuflags);
Dominik Dingel2b29a9f2013-07-26 15:04:00 +02001918
Thomas Huth3fb4c402013-09-12 10:33:43 +02001919 return 0;
1920}
1921
Thomas Huth492d8642015-02-10 16:11:01 +01001922static int vcpu_post_run_fault_in_sie(struct kvm_vcpu *vcpu)
1923{
1924 psw_t *psw = &vcpu->arch.sie_block->gpsw;
1925 u8 opcode;
1926 int rc;
1927
1928 VCPU_EVENT(vcpu, 3, "%s", "fault in sie instruction");
1929 trace_kvm_s390_sie_fault(vcpu);
1930
1931 /*
1932 * We want to inject an addressing exception, which is defined as a
1933 * suppressing or terminating exception. However, since we came here
1934 * by a DAT access exception, the PSW still points to the faulting
1935 * instruction since DAT exceptions are nullifying. So we've got
1936 * to look up the current opcode to get the length of the instruction
1937 * to be able to forward the PSW.
1938 */
Alexander Yarygin8ae04b82015-01-19 13:24:51 +03001939 rc = read_guest(vcpu, psw->addr, 0, &opcode, 1);
Thomas Huth492d8642015-02-10 16:11:01 +01001940 if (rc)
1941 return kvm_s390_inject_prog_cond(vcpu, rc);
1942 psw->addr = __rewind_psw(*psw, -insn_length(opcode));
1943
1944 return kvm_s390_inject_program_int(vcpu, PGM_ADDRESSING);
1945}
1946
Thomas Huth3fb4c402013-09-12 10:33:43 +02001947static int vcpu_post_run(struct kvm_vcpu *vcpu, int exit_reason)
1948{
Dominik Dingel24eb3a82013-06-17 16:25:18 +02001949 int rc = -1;
Dominik Dingel2b29a9f2013-07-26 15:04:00 +02001950
1951 VCPU_EVENT(vcpu, 6, "exit sie icptcode %d",
1952 vcpu->arch.sie_block->icptcode);
1953 trace_kvm_s390_sie_exit(vcpu, vcpu->arch.sie_block->icptcode);
1954
David Hildenbrand27291e22014-01-23 12:26:52 +01001955 if (guestdbg_enabled(vcpu))
1956 kvm_s390_restore_guest_per_regs(vcpu);
1957
Thomas Huth3fb4c402013-09-12 10:33:43 +02001958 if (exit_reason >= 0) {
Martin Schwidefsky7c470532013-05-17 14:41:37 +02001959 rc = 0;
Thomas Huth210b16072013-09-19 16:26:18 +02001960 } else if (kvm_is_ucontrol(vcpu->kvm)) {
1961 vcpu->run->exit_reason = KVM_EXIT_S390_UCONTROL;
1962 vcpu->run->s390_ucontrol.trans_exc_code =
1963 current->thread.gmap_addr;
1964 vcpu->run->s390_ucontrol.pgm_code = 0x10;
1965 rc = -EREMOTE;
Dominik Dingel24eb3a82013-06-17 16:25:18 +02001966
1967 } else if (current->thread.gmap_pfault) {
Dominik Dingel3c038e62013-10-07 17:11:48 +02001968 trace_kvm_s390_major_guest_pfault(vcpu);
Dominik Dingel24eb3a82013-06-17 16:25:18 +02001969 current->thread.gmap_pfault = 0;
Thomas Huthfa576c52014-05-06 17:20:16 +02001970 if (kvm_arch_setup_async_pf(vcpu)) {
Dominik Dingel24eb3a82013-06-17 16:25:18 +02001971 rc = 0;
Thomas Huthfa576c52014-05-06 17:20:16 +02001972 } else {
1973 gpa_t gpa = current->thread.gmap_addr;
1974 rc = kvm_arch_fault_in_page(vcpu, gpa, 1);
1975 }
Dominik Dingel24eb3a82013-06-17 16:25:18 +02001976 }
1977
Thomas Huth492d8642015-02-10 16:11:01 +01001978 if (rc == -1)
1979 rc = vcpu_post_run_fault_in_sie(vcpu);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001980
Christian Borntraeger5a32c1a2012-01-11 11:20:32 +01001981 memcpy(&vcpu->run->s.regs.gprs[14], &vcpu->arch.sie_block->gg14, 16);
Thomas Huth3fb4c402013-09-12 10:33:43 +02001982
Thomas Hutha76ccff2013-09-12 10:33:44 +02001983 if (rc == 0) {
1984 if (kvm_is_ucontrol(vcpu->kvm))
Christian Borntraeger2955c832014-03-06 16:01:38 +01001985 /* Don't exit for host interrupts. */
1986 rc = vcpu->arch.sie_block->icptcode ? -EOPNOTSUPP : 0;
Thomas Hutha76ccff2013-09-12 10:33:44 +02001987 else
1988 rc = kvm_handle_sie_intercept(vcpu);
1989 }
1990
Thomas Huth3fb4c402013-09-12 10:33:43 +02001991 return rc;
1992}
1993
1994static int __vcpu_run(struct kvm_vcpu *vcpu)
1995{
1996 int rc, exit_reason;
1997
Thomas Huth800c1062013-09-12 10:33:45 +02001998 /*
1999 * We try to hold kvm->srcu during most of vcpu_run (except when run-
2000 * ning the guest), so that memslots (and other stuff) are protected
2001 */
2002 vcpu->srcu_idx = srcu_read_lock(&vcpu->kvm->srcu);
2003
Thomas Hutha76ccff2013-09-12 10:33:44 +02002004 do {
2005 rc = vcpu_pre_run(vcpu);
2006 if (rc)
2007 break;
Thomas Huth3fb4c402013-09-12 10:33:43 +02002008
Thomas Huth800c1062013-09-12 10:33:45 +02002009 srcu_read_unlock(&vcpu->kvm->srcu, vcpu->srcu_idx);
Thomas Hutha76ccff2013-09-12 10:33:44 +02002010 /*
2011 * As PF_VCPU will be used in fault handler, between
2012 * guest_enter and guest_exit should be no uaccess.
2013 */
2014 preempt_disable();
2015 kvm_guest_enter();
2016 preempt_enable();
2017 exit_reason = sie64a(vcpu->arch.sie_block,
2018 vcpu->run->s.regs.gprs);
2019 kvm_guest_exit();
Thomas Huth800c1062013-09-12 10:33:45 +02002020 vcpu->srcu_idx = srcu_read_lock(&vcpu->kvm->srcu);
Thomas Huth3fb4c402013-09-12 10:33:43 +02002021
Thomas Hutha76ccff2013-09-12 10:33:44 +02002022 rc = vcpu_post_run(vcpu, exit_reason);
David Hildenbrand27291e22014-01-23 12:26:52 +01002023 } while (!signal_pending(current) && !guestdbg_exit_pending(vcpu) && !rc);
Thomas Huth3fb4c402013-09-12 10:33:43 +02002024
Thomas Huth800c1062013-09-12 10:33:45 +02002025 srcu_read_unlock(&vcpu->kvm->srcu, vcpu->srcu_idx);
Carsten Ottee168bf82012-01-04 10:25:22 +01002026 return rc;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002027}
2028
David Hildenbrandb028ee32014-07-17 10:47:43 +02002029static void sync_regs(struct kvm_vcpu *vcpu, struct kvm_run *kvm_run)
2030{
2031 vcpu->arch.sie_block->gpsw.mask = kvm_run->psw_mask;
2032 vcpu->arch.sie_block->gpsw.addr = kvm_run->psw_addr;
2033 if (kvm_run->kvm_dirty_regs & KVM_SYNC_PREFIX)
2034 kvm_s390_set_prefix(vcpu, kvm_run->s.regs.prefix);
2035 if (kvm_run->kvm_dirty_regs & KVM_SYNC_CRS) {
2036 memcpy(&vcpu->arch.sie_block->gcr, &kvm_run->s.regs.crs, 128);
David Hildenbrandd3d692c2014-07-29 08:53:36 +02002037 /* some control register changes require a tlb flush */
2038 kvm_make_request(KVM_REQ_TLB_FLUSH, vcpu);
David Hildenbrandb028ee32014-07-17 10:47:43 +02002039 }
2040 if (kvm_run->kvm_dirty_regs & KVM_SYNC_ARCH0) {
2041 vcpu->arch.sie_block->cputm = kvm_run->s.regs.cputm;
2042 vcpu->arch.sie_block->ckc = kvm_run->s.regs.ckc;
2043 vcpu->arch.sie_block->todpr = kvm_run->s.regs.todpr;
2044 vcpu->arch.sie_block->pp = kvm_run->s.regs.pp;
2045 vcpu->arch.sie_block->gbea = kvm_run->s.regs.gbea;
2046 }
2047 if (kvm_run->kvm_dirty_regs & KVM_SYNC_PFAULT) {
2048 vcpu->arch.pfault_token = kvm_run->s.regs.pft;
2049 vcpu->arch.pfault_select = kvm_run->s.regs.pfs;
2050 vcpu->arch.pfault_compare = kvm_run->s.regs.pfc;
David Hildenbrand9fbd8082014-10-09 15:01:38 +02002051 if (vcpu->arch.pfault_token == KVM_S390_PFAULT_TOKEN_INVALID)
2052 kvm_clear_async_pf_completion_queue(vcpu);
David Hildenbrandb028ee32014-07-17 10:47:43 +02002053 }
2054 kvm_run->kvm_dirty_regs = 0;
2055}
2056
2057static void store_regs(struct kvm_vcpu *vcpu, struct kvm_run *kvm_run)
2058{
2059 kvm_run->psw_mask = vcpu->arch.sie_block->gpsw.mask;
2060 kvm_run->psw_addr = vcpu->arch.sie_block->gpsw.addr;
2061 kvm_run->s.regs.prefix = kvm_s390_get_prefix(vcpu);
2062 memcpy(&kvm_run->s.regs.crs, &vcpu->arch.sie_block->gcr, 128);
2063 kvm_run->s.regs.cputm = vcpu->arch.sie_block->cputm;
2064 kvm_run->s.regs.ckc = vcpu->arch.sie_block->ckc;
2065 kvm_run->s.regs.todpr = vcpu->arch.sie_block->todpr;
2066 kvm_run->s.regs.pp = vcpu->arch.sie_block->pp;
2067 kvm_run->s.regs.gbea = vcpu->arch.sie_block->gbea;
2068 kvm_run->s.regs.pft = vcpu->arch.pfault_token;
2069 kvm_run->s.regs.pfs = vcpu->arch.pfault_select;
2070 kvm_run->s.regs.pfc = vcpu->arch.pfault_compare;
2071}
2072
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002073int kvm_arch_vcpu_ioctl_run(struct kvm_vcpu *vcpu, struct kvm_run *kvm_run)
2074{
Christian Borntraeger8f2abe62008-03-25 18:47:23 +01002075 int rc;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002076 sigset_t sigsaved;
2077
David Hildenbrand27291e22014-01-23 12:26:52 +01002078 if (guestdbg_exit_pending(vcpu)) {
2079 kvm_s390_prepare_debug_exit(vcpu);
2080 return 0;
2081 }
2082
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002083 if (vcpu->sigset_active)
2084 sigprocmask(SIG_SETMASK, &vcpu->sigset, &sigsaved);
2085
David Hildenbrand6352e4d2014-04-10 17:35:00 +02002086 if (!kvm_s390_user_cpu_state_ctrl(vcpu->kvm)) {
2087 kvm_s390_vcpu_start(vcpu);
2088 } else if (is_vcpu_stopped(vcpu)) {
2089 pr_err_ratelimited("kvm-s390: can't run stopped vcpu %d\n",
2090 vcpu->vcpu_id);
2091 return -EINVAL;
2092 }
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002093
David Hildenbrandb028ee32014-07-17 10:47:43 +02002094 sync_regs(vcpu, kvm_run);
Carsten Otted7b0b5e2009-11-19 14:21:16 +01002095
Heiko Carstensdab4079d2009-06-12 10:26:32 +02002096 might_fault();
Thomas Hutha76ccff2013-09-12 10:33:44 +02002097 rc = __vcpu_run(vcpu);
Christian Ehrhardt9ace9032009-05-20 15:34:55 +02002098
Christian Ehrhardtb1d16c42009-05-20 15:34:56 +02002099 if (signal_pending(current) && !rc) {
2100 kvm_run->exit_reason = KVM_EXIT_INTR;
Christian Borntraeger8f2abe62008-03-25 18:47:23 +01002101 rc = -EINTR;
Christian Ehrhardtb1d16c42009-05-20 15:34:56 +02002102 }
Christian Borntraeger8f2abe62008-03-25 18:47:23 +01002103
David Hildenbrand27291e22014-01-23 12:26:52 +01002104 if (guestdbg_exit_pending(vcpu) && !rc) {
2105 kvm_s390_prepare_debug_exit(vcpu);
2106 rc = 0;
2107 }
2108
Heiko Carstensb8e660b2010-02-26 22:37:41 +01002109 if (rc == -EOPNOTSUPP) {
Christian Borntraeger8f2abe62008-03-25 18:47:23 +01002110 /* intercept cannot be handled in-kernel, prepare kvm-run */
2111 kvm_run->exit_reason = KVM_EXIT_S390_SIEIC;
2112 kvm_run->s390_sieic.icptcode = vcpu->arch.sie_block->icptcode;
Christian Borntraeger8f2abe62008-03-25 18:47:23 +01002113 kvm_run->s390_sieic.ipa = vcpu->arch.sie_block->ipa;
2114 kvm_run->s390_sieic.ipb = vcpu->arch.sie_block->ipb;
2115 rc = 0;
2116 }
2117
2118 if (rc == -EREMOTE) {
2119 /* intercept was handled, but userspace support is needed
2120 * kvm_run has been prepared by the handler */
2121 rc = 0;
2122 }
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002123
David Hildenbrandb028ee32014-07-17 10:47:43 +02002124 store_regs(vcpu, kvm_run);
Carsten Otted7b0b5e2009-11-19 14:21:16 +01002125
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002126 if (vcpu->sigset_active)
2127 sigprocmask(SIG_SETMASK, &sigsaved, NULL);
2128
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002129 vcpu->stat.exit_userspace++;
Heiko Carstens7e8e6ab2008-04-04 15:12:35 +02002130 return rc;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002131}
2132
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002133/*
2134 * store status at address
2135 * we use have two special cases:
2136 * KVM_S390_STORE_STATUS_NOADDR: -> 0x1200 on 64 bit
2137 * KVM_S390_STORE_STATUS_PREFIXED: -> prefix
2138 */
Heiko Carstensd0bce602014-01-01 16:45:58 +01002139int kvm_s390_store_status_unloaded(struct kvm_vcpu *vcpu, unsigned long gpa)
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002140{
Carsten Otte092670c2011-07-24 10:48:22 +02002141 unsigned char archmode = 1;
Michael Muellerfda902c2014-05-13 16:58:30 +02002142 unsigned int px;
Thomas Huth178bd782013-11-13 20:28:18 +01002143 u64 clkcomp;
Heiko Carstensd0bce602014-01-01 16:45:58 +01002144 int rc;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002145
Heiko Carstensd0bce602014-01-01 16:45:58 +01002146 if (gpa == KVM_S390_STORE_STATUS_NOADDR) {
2147 if (write_guest_abs(vcpu, 163, &archmode, 1))
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002148 return -EFAULT;
Heiko Carstensd0bce602014-01-01 16:45:58 +01002149 gpa = SAVE_AREA_BASE;
2150 } else if (gpa == KVM_S390_STORE_STATUS_PREFIXED) {
2151 if (write_guest_real(vcpu, 163, &archmode, 1))
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002152 return -EFAULT;
Heiko Carstensd0bce602014-01-01 16:45:58 +01002153 gpa = kvm_s390_real_to_abs(vcpu, SAVE_AREA_BASE);
2154 }
2155 rc = write_guest_abs(vcpu, gpa + offsetof(struct save_area, fp_regs),
2156 vcpu->arch.guest_fpregs.fprs, 128);
2157 rc |= write_guest_abs(vcpu, gpa + offsetof(struct save_area, gp_regs),
2158 vcpu->run->s.regs.gprs, 128);
2159 rc |= write_guest_abs(vcpu, gpa + offsetof(struct save_area, psw),
2160 &vcpu->arch.sie_block->gpsw, 16);
Michael Muellerfda902c2014-05-13 16:58:30 +02002161 px = kvm_s390_get_prefix(vcpu);
Heiko Carstensd0bce602014-01-01 16:45:58 +01002162 rc |= write_guest_abs(vcpu, gpa + offsetof(struct save_area, pref_reg),
Michael Muellerfda902c2014-05-13 16:58:30 +02002163 &px, 4);
Heiko Carstensd0bce602014-01-01 16:45:58 +01002164 rc |= write_guest_abs(vcpu,
2165 gpa + offsetof(struct save_area, fp_ctrl_reg),
2166 &vcpu->arch.guest_fpregs.fpc, 4);
2167 rc |= write_guest_abs(vcpu, gpa + offsetof(struct save_area, tod_reg),
2168 &vcpu->arch.sie_block->todpr, 4);
2169 rc |= write_guest_abs(vcpu, gpa + offsetof(struct save_area, timer),
2170 &vcpu->arch.sie_block->cputm, 8);
Thomas Huth178bd782013-11-13 20:28:18 +01002171 clkcomp = vcpu->arch.sie_block->ckc >> 8;
Heiko Carstensd0bce602014-01-01 16:45:58 +01002172 rc |= write_guest_abs(vcpu, gpa + offsetof(struct save_area, clk_cmp),
2173 &clkcomp, 8);
2174 rc |= write_guest_abs(vcpu, gpa + offsetof(struct save_area, acc_regs),
2175 &vcpu->run->s.regs.acrs, 64);
2176 rc |= write_guest_abs(vcpu, gpa + offsetof(struct save_area, ctrl_regs),
2177 &vcpu->arch.sie_block->gcr, 128);
2178 return rc ? -EFAULT : 0;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002179}
2180
Thomas Huthe8798922013-11-06 15:46:33 +01002181int kvm_s390_vcpu_store_status(struct kvm_vcpu *vcpu, unsigned long addr)
2182{
2183 /*
2184 * The guest FPRS and ACRS are in the host FPRS/ACRS due to the lazy
2185 * copying in vcpu load/put. Lets update our copies before we save
2186 * it into the save area
2187 */
2188 save_fp_ctl(&vcpu->arch.guest_fpregs.fpc);
2189 save_fp_regs(vcpu->arch.guest_fpregs.fprs);
2190 save_access_regs(vcpu->run->s.regs.acrs);
2191
2192 return kvm_s390_store_status_unloaded(vcpu, addr);
2193}
2194
Eric Farmanbc17de72014-04-14 16:01:09 -04002195/*
2196 * store additional status at address
2197 */
2198int kvm_s390_store_adtl_status_unloaded(struct kvm_vcpu *vcpu,
2199 unsigned long gpa)
2200{
2201 /* Only bits 0-53 are used for address formation */
2202 if (!(gpa & ~0x3ff))
2203 return 0;
2204
2205 return write_guest_abs(vcpu, gpa & ~0x3ff,
2206 (void *)&vcpu->run->s.regs.vrs, 512);
2207}
2208
2209int kvm_s390_vcpu_store_adtl_status(struct kvm_vcpu *vcpu, unsigned long addr)
2210{
2211 if (!test_kvm_facility(vcpu->kvm, 129))
2212 return 0;
2213
2214 /*
2215 * The guest VXRS are in the host VXRs due to the lazy
2216 * copying in vcpu load/put. Let's update our copies before we save
2217 * it into the save area.
2218 */
2219 save_vx_regs((__vector128 *)&vcpu->run->s.regs.vrs);
2220
2221 return kvm_s390_store_adtl_status_unloaded(vcpu, addr);
2222}
2223
David Hildenbrand8ad35752014-03-14 11:00:21 +01002224static void __disable_ibs_on_vcpu(struct kvm_vcpu *vcpu)
2225{
2226 kvm_check_request(KVM_REQ_ENABLE_IBS, vcpu);
Christian Borntraeger8e236542015-04-09 13:49:04 +02002227 kvm_s390_sync_request(KVM_REQ_DISABLE_IBS, vcpu);
David Hildenbrand8ad35752014-03-14 11:00:21 +01002228}
2229
2230static void __disable_ibs_on_all_vcpus(struct kvm *kvm)
2231{
2232 unsigned int i;
2233 struct kvm_vcpu *vcpu;
2234
2235 kvm_for_each_vcpu(i, vcpu, kvm) {
2236 __disable_ibs_on_vcpu(vcpu);
2237 }
2238}
2239
2240static void __enable_ibs_on_vcpu(struct kvm_vcpu *vcpu)
2241{
2242 kvm_check_request(KVM_REQ_DISABLE_IBS, vcpu);
Christian Borntraeger8e236542015-04-09 13:49:04 +02002243 kvm_s390_sync_request(KVM_REQ_ENABLE_IBS, vcpu);
David Hildenbrand8ad35752014-03-14 11:00:21 +01002244}
2245
David Hildenbrand6852d7b2014-03-14 10:59:29 +01002246void kvm_s390_vcpu_start(struct kvm_vcpu *vcpu)
2247{
David Hildenbrand8ad35752014-03-14 11:00:21 +01002248 int i, online_vcpus, started_vcpus = 0;
2249
2250 if (!is_vcpu_stopped(vcpu))
2251 return;
2252
David Hildenbrand6852d7b2014-03-14 10:59:29 +01002253 trace_kvm_s390_vcpu_start_stop(vcpu->vcpu_id, 1);
David Hildenbrand8ad35752014-03-14 11:00:21 +01002254 /* Only one cpu at a time may enter/leave the STOPPED state. */
David Hildenbrand433b9ee2014-05-06 16:11:14 +02002255 spin_lock(&vcpu->kvm->arch.start_stop_lock);
David Hildenbrand8ad35752014-03-14 11:00:21 +01002256 online_vcpus = atomic_read(&vcpu->kvm->online_vcpus);
2257
2258 for (i = 0; i < online_vcpus; i++) {
2259 if (!is_vcpu_stopped(vcpu->kvm->vcpus[i]))
2260 started_vcpus++;
2261 }
2262
2263 if (started_vcpus == 0) {
2264 /* we're the only active VCPU -> speed it up */
2265 __enable_ibs_on_vcpu(vcpu);
2266 } else if (started_vcpus == 1) {
2267 /*
2268 * As we are starting a second VCPU, we have to disable
2269 * the IBS facility on all VCPUs to remove potentially
2270 * oustanding ENABLE requests.
2271 */
2272 __disable_ibs_on_all_vcpus(vcpu->kvm);
2273 }
2274
David Hildenbrand6852d7b2014-03-14 10:59:29 +01002275 atomic_clear_mask(CPUSTAT_STOPPED, &vcpu->arch.sie_block->cpuflags);
David Hildenbrand8ad35752014-03-14 11:00:21 +01002276 /*
2277 * Another VCPU might have used IBS while we were offline.
2278 * Let's play safe and flush the VCPU at startup.
2279 */
David Hildenbrandd3d692c2014-07-29 08:53:36 +02002280 kvm_make_request(KVM_REQ_TLB_FLUSH, vcpu);
David Hildenbrand433b9ee2014-05-06 16:11:14 +02002281 spin_unlock(&vcpu->kvm->arch.start_stop_lock);
David Hildenbrand8ad35752014-03-14 11:00:21 +01002282 return;
David Hildenbrand6852d7b2014-03-14 10:59:29 +01002283}
2284
2285void kvm_s390_vcpu_stop(struct kvm_vcpu *vcpu)
2286{
David Hildenbrand8ad35752014-03-14 11:00:21 +01002287 int i, online_vcpus, started_vcpus = 0;
2288 struct kvm_vcpu *started_vcpu = NULL;
2289
2290 if (is_vcpu_stopped(vcpu))
2291 return;
2292
David Hildenbrand6852d7b2014-03-14 10:59:29 +01002293 trace_kvm_s390_vcpu_start_stop(vcpu->vcpu_id, 0);
David Hildenbrand8ad35752014-03-14 11:00:21 +01002294 /* Only one cpu at a time may enter/leave the STOPPED state. */
David Hildenbrand433b9ee2014-05-06 16:11:14 +02002295 spin_lock(&vcpu->kvm->arch.start_stop_lock);
David Hildenbrand8ad35752014-03-14 11:00:21 +01002296 online_vcpus = atomic_read(&vcpu->kvm->online_vcpus);
2297
David Hildenbrand32f5ff632014-04-14 12:40:03 +02002298 /* SIGP STOP and SIGP STOP AND STORE STATUS has been fully processed */
David Hildenbrand6cddd432014-10-15 16:48:53 +02002299 kvm_s390_clear_stop_irq(vcpu);
David Hildenbrand32f5ff632014-04-14 12:40:03 +02002300
David Hildenbrand6cddd432014-10-15 16:48:53 +02002301 atomic_set_mask(CPUSTAT_STOPPED, &vcpu->arch.sie_block->cpuflags);
David Hildenbrand8ad35752014-03-14 11:00:21 +01002302 __disable_ibs_on_vcpu(vcpu);
2303
2304 for (i = 0; i < online_vcpus; i++) {
2305 if (!is_vcpu_stopped(vcpu->kvm->vcpus[i])) {
2306 started_vcpus++;
2307 started_vcpu = vcpu->kvm->vcpus[i];
2308 }
2309 }
2310
2311 if (started_vcpus == 1) {
2312 /*
2313 * As we only have one VCPU left, we want to enable the
2314 * IBS facility for that VCPU to speed it up.
2315 */
2316 __enable_ibs_on_vcpu(started_vcpu);
2317 }
2318
David Hildenbrand433b9ee2014-05-06 16:11:14 +02002319 spin_unlock(&vcpu->kvm->arch.start_stop_lock);
David Hildenbrand8ad35752014-03-14 11:00:21 +01002320 return;
David Hildenbrand6852d7b2014-03-14 10:59:29 +01002321}
2322
Cornelia Huckd6712df2012-12-20 15:32:11 +01002323static int kvm_vcpu_ioctl_enable_cap(struct kvm_vcpu *vcpu,
2324 struct kvm_enable_cap *cap)
2325{
2326 int r;
2327
2328 if (cap->flags)
2329 return -EINVAL;
2330
2331 switch (cap->cap) {
Cornelia Huckfa6b7fe2012-12-20 15:32:12 +01002332 case KVM_CAP_S390_CSS_SUPPORT:
2333 if (!vcpu->kvm->arch.css_support) {
2334 vcpu->kvm->arch.css_support = 1;
2335 trace_kvm_s390_enable_css(vcpu->kvm);
2336 }
2337 r = 0;
2338 break;
Cornelia Huckd6712df2012-12-20 15:32:11 +01002339 default:
2340 r = -EINVAL;
2341 break;
2342 }
2343 return r;
2344}
2345
Thomas Huth41408c22015-02-06 15:01:21 +01002346static long kvm_s390_guest_mem_op(struct kvm_vcpu *vcpu,
2347 struct kvm_s390_mem_op *mop)
2348{
2349 void __user *uaddr = (void __user *)mop->buf;
2350 void *tmpbuf = NULL;
2351 int r, srcu_idx;
2352 const u64 supported_flags = KVM_S390_MEMOP_F_INJECT_EXCEPTION
2353 | KVM_S390_MEMOP_F_CHECK_ONLY;
2354
2355 if (mop->flags & ~supported_flags)
2356 return -EINVAL;
2357
2358 if (mop->size > MEM_OP_MAX_SIZE)
2359 return -E2BIG;
2360
2361 if (!(mop->flags & KVM_S390_MEMOP_F_CHECK_ONLY)) {
2362 tmpbuf = vmalloc(mop->size);
2363 if (!tmpbuf)
2364 return -ENOMEM;
2365 }
2366
2367 srcu_idx = srcu_read_lock(&vcpu->kvm->srcu);
2368
2369 switch (mop->op) {
2370 case KVM_S390_MEMOP_LOGICAL_READ:
2371 if (mop->flags & KVM_S390_MEMOP_F_CHECK_ONLY) {
2372 r = check_gva_range(vcpu, mop->gaddr, mop->ar, mop->size, false);
2373 break;
2374 }
2375 r = read_guest(vcpu, mop->gaddr, mop->ar, tmpbuf, mop->size);
2376 if (r == 0) {
2377 if (copy_to_user(uaddr, tmpbuf, mop->size))
2378 r = -EFAULT;
2379 }
2380 break;
2381 case KVM_S390_MEMOP_LOGICAL_WRITE:
2382 if (mop->flags & KVM_S390_MEMOP_F_CHECK_ONLY) {
2383 r = check_gva_range(vcpu, mop->gaddr, mop->ar, mop->size, true);
2384 break;
2385 }
2386 if (copy_from_user(tmpbuf, uaddr, mop->size)) {
2387 r = -EFAULT;
2388 break;
2389 }
2390 r = write_guest(vcpu, mop->gaddr, mop->ar, tmpbuf, mop->size);
2391 break;
2392 default:
2393 r = -EINVAL;
2394 }
2395
2396 srcu_read_unlock(&vcpu->kvm->srcu, srcu_idx);
2397
2398 if (r > 0 && (mop->flags & KVM_S390_MEMOP_F_INJECT_EXCEPTION) != 0)
2399 kvm_s390_inject_prog_irq(vcpu, &vcpu->arch.pgm);
2400
2401 vfree(tmpbuf);
2402 return r;
2403}
2404
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002405long kvm_arch_vcpu_ioctl(struct file *filp,
2406 unsigned int ioctl, unsigned long arg)
2407{
2408 struct kvm_vcpu *vcpu = filp->private_data;
2409 void __user *argp = (void __user *)arg;
Thomas Huth800c1062013-09-12 10:33:45 +02002410 int idx;
Avi Kivitybc923cc2010-05-13 12:21:46 +03002411 long r;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002412
Avi Kivity93736622010-05-13 12:35:17 +03002413 switch (ioctl) {
Jens Freimann47b43c52014-11-11 20:57:06 +01002414 case KVM_S390_IRQ: {
2415 struct kvm_s390_irq s390irq;
2416
2417 r = -EFAULT;
2418 if (copy_from_user(&s390irq, argp, sizeof(s390irq)))
2419 break;
2420 r = kvm_s390_inject_vcpu(vcpu, &s390irq);
2421 break;
2422 }
Avi Kivity93736622010-05-13 12:35:17 +03002423 case KVM_S390_INTERRUPT: {
Carsten Otteba5c1e92008-03-25 18:47:26 +01002424 struct kvm_s390_interrupt s390int;
Jens Freimann383d0b02014-07-29 15:11:49 +02002425 struct kvm_s390_irq s390irq;
Carsten Otteba5c1e92008-03-25 18:47:26 +01002426
Avi Kivity93736622010-05-13 12:35:17 +03002427 r = -EFAULT;
Carsten Otteba5c1e92008-03-25 18:47:26 +01002428 if (copy_from_user(&s390int, argp, sizeof(s390int)))
Avi Kivity93736622010-05-13 12:35:17 +03002429 break;
Jens Freimann383d0b02014-07-29 15:11:49 +02002430 if (s390int_to_s390irq(&s390int, &s390irq))
2431 return -EINVAL;
2432 r = kvm_s390_inject_vcpu(vcpu, &s390irq);
Avi Kivity93736622010-05-13 12:35:17 +03002433 break;
Carsten Otteba5c1e92008-03-25 18:47:26 +01002434 }
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002435 case KVM_S390_STORE_STATUS:
Thomas Huth800c1062013-09-12 10:33:45 +02002436 idx = srcu_read_lock(&vcpu->kvm->srcu);
Avi Kivitybc923cc2010-05-13 12:21:46 +03002437 r = kvm_s390_vcpu_store_status(vcpu, arg);
Thomas Huth800c1062013-09-12 10:33:45 +02002438 srcu_read_unlock(&vcpu->kvm->srcu, idx);
Avi Kivitybc923cc2010-05-13 12:21:46 +03002439 break;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002440 case KVM_S390_SET_INITIAL_PSW: {
2441 psw_t psw;
2442
Avi Kivitybc923cc2010-05-13 12:21:46 +03002443 r = -EFAULT;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002444 if (copy_from_user(&psw, argp, sizeof(psw)))
Avi Kivitybc923cc2010-05-13 12:21:46 +03002445 break;
2446 r = kvm_arch_vcpu_ioctl_set_initial_psw(vcpu, psw);
2447 break;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002448 }
2449 case KVM_S390_INITIAL_RESET:
Avi Kivitybc923cc2010-05-13 12:21:46 +03002450 r = kvm_arch_vcpu_ioctl_initial_reset(vcpu);
2451 break;
Carsten Otte14eebd92012-05-15 14:15:26 +02002452 case KVM_SET_ONE_REG:
2453 case KVM_GET_ONE_REG: {
2454 struct kvm_one_reg reg;
2455 r = -EFAULT;
2456 if (copy_from_user(&reg, argp, sizeof(reg)))
2457 break;
2458 if (ioctl == KVM_SET_ONE_REG)
2459 r = kvm_arch_vcpu_ioctl_set_one_reg(vcpu, &reg);
2460 else
2461 r = kvm_arch_vcpu_ioctl_get_one_reg(vcpu, &reg);
2462 break;
2463 }
Carsten Otte27e03932012-01-04 10:25:21 +01002464#ifdef CONFIG_KVM_S390_UCONTROL
2465 case KVM_S390_UCAS_MAP: {
2466 struct kvm_s390_ucas_mapping ucasmap;
2467
2468 if (copy_from_user(&ucasmap, argp, sizeof(ucasmap))) {
2469 r = -EFAULT;
2470 break;
2471 }
2472
2473 if (!kvm_is_ucontrol(vcpu->kvm)) {
2474 r = -EINVAL;
2475 break;
2476 }
2477
2478 r = gmap_map_segment(vcpu->arch.gmap, ucasmap.user_addr,
2479 ucasmap.vcpu_addr, ucasmap.length);
2480 break;
2481 }
2482 case KVM_S390_UCAS_UNMAP: {
2483 struct kvm_s390_ucas_mapping ucasmap;
2484
2485 if (copy_from_user(&ucasmap, argp, sizeof(ucasmap))) {
2486 r = -EFAULT;
2487 break;
2488 }
2489
2490 if (!kvm_is_ucontrol(vcpu->kvm)) {
2491 r = -EINVAL;
2492 break;
2493 }
2494
2495 r = gmap_unmap_segment(vcpu->arch.gmap, ucasmap.vcpu_addr,
2496 ucasmap.length);
2497 break;
2498 }
2499#endif
Carsten Otteccc79102012-01-04 10:25:26 +01002500 case KVM_S390_VCPU_FAULT: {
Martin Schwidefsky527e30b2014-04-30 16:04:25 +02002501 r = gmap_fault(vcpu->arch.gmap, arg, 0);
Carsten Otteccc79102012-01-04 10:25:26 +01002502 break;
2503 }
Cornelia Huckd6712df2012-12-20 15:32:11 +01002504 case KVM_ENABLE_CAP:
2505 {
2506 struct kvm_enable_cap cap;
2507 r = -EFAULT;
2508 if (copy_from_user(&cap, argp, sizeof(cap)))
2509 break;
2510 r = kvm_vcpu_ioctl_enable_cap(vcpu, &cap);
2511 break;
2512 }
Thomas Huth41408c22015-02-06 15:01:21 +01002513 case KVM_S390_MEM_OP: {
2514 struct kvm_s390_mem_op mem_op;
2515
2516 if (copy_from_user(&mem_op, argp, sizeof(mem_op)) == 0)
2517 r = kvm_s390_guest_mem_op(vcpu, &mem_op);
2518 else
2519 r = -EFAULT;
2520 break;
2521 }
Jens Freimann816c7662014-11-24 17:13:46 +01002522 case KVM_S390_SET_IRQ_STATE: {
2523 struct kvm_s390_irq_state irq_state;
2524
2525 r = -EFAULT;
2526 if (copy_from_user(&irq_state, argp, sizeof(irq_state)))
2527 break;
2528 if (irq_state.len > VCPU_IRQS_MAX_BUF ||
2529 irq_state.len == 0 ||
2530 irq_state.len % sizeof(struct kvm_s390_irq) > 0) {
2531 r = -EINVAL;
2532 break;
2533 }
2534 r = kvm_s390_set_irq_state(vcpu,
2535 (void __user *) irq_state.buf,
2536 irq_state.len);
2537 break;
2538 }
2539 case KVM_S390_GET_IRQ_STATE: {
2540 struct kvm_s390_irq_state irq_state;
2541
2542 r = -EFAULT;
2543 if (copy_from_user(&irq_state, argp, sizeof(irq_state)))
2544 break;
2545 if (irq_state.len == 0) {
2546 r = -EINVAL;
2547 break;
2548 }
2549 r = kvm_s390_get_irq_state(vcpu,
2550 (__u8 __user *) irq_state.buf,
2551 irq_state.len);
2552 break;
2553 }
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002554 default:
Carsten Otte3e6afcf2012-01-04 10:25:30 +01002555 r = -ENOTTY;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002556 }
Avi Kivitybc923cc2010-05-13 12:21:46 +03002557 return r;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002558}
2559
Carsten Otte5b1c1492012-01-04 10:25:23 +01002560int kvm_arch_vcpu_fault(struct kvm_vcpu *vcpu, struct vm_fault *vmf)
2561{
2562#ifdef CONFIG_KVM_S390_UCONTROL
2563 if ((vmf->pgoff == KVM_S390_SIE_PAGE_OFFSET)
2564 && (kvm_is_ucontrol(vcpu->kvm))) {
2565 vmf->page = virt_to_page(vcpu->arch.sie_block);
2566 get_page(vmf->page);
2567 return 0;
2568 }
2569#endif
2570 return VM_FAULT_SIGBUS;
2571}
2572
Aneesh Kumar K.V55870272013-10-07 22:18:00 +05302573int kvm_arch_create_memslot(struct kvm *kvm, struct kvm_memory_slot *slot,
2574 unsigned long npages)
Takuya Yoshikawadb3fe4e2012-02-08 13:02:18 +09002575{
2576 return 0;
2577}
2578
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002579/* Section: memory related */
Marcelo Tosattif7784b82009-12-23 14:35:18 -02002580int kvm_arch_prepare_memory_region(struct kvm *kvm,
2581 struct kvm_memory_slot *memslot,
Takuya Yoshikawa7b6195a2013-02-27 19:44:34 +09002582 struct kvm_userspace_memory_region *mem,
2583 enum kvm_mr_change change)
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002584{
Nick Wangdd2887e2013-03-25 17:22:57 +01002585 /* A few sanity checks. We can have memory slots which have to be
2586 located/ended at a segment boundary (1MB). The memory in userland is
2587 ok to be fragmented into various different vmas. It is okay to mmap()
2588 and munmap() stuff in this slot after doing this call at any time */
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002589
Carsten Otte598841c2011-07-24 10:48:21 +02002590 if (mem->userspace_addr & 0xffffful)
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002591 return -EINVAL;
2592
Carsten Otte598841c2011-07-24 10:48:21 +02002593 if (mem->memory_size & 0xffffful)
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002594 return -EINVAL;
2595
Marcelo Tosattif7784b82009-12-23 14:35:18 -02002596 return 0;
2597}
2598
2599void kvm_arch_commit_memory_region(struct kvm *kvm,
2600 struct kvm_userspace_memory_region *mem,
Takuya Yoshikawa84826442013-02-27 19:45:25 +09002601 const struct kvm_memory_slot *old,
2602 enum kvm_mr_change change)
Marcelo Tosattif7784b82009-12-23 14:35:18 -02002603{
Carsten Ottef7850c92011-07-24 10:48:23 +02002604 int rc;
Marcelo Tosattif7784b82009-12-23 14:35:18 -02002605
Christian Borntraeger2cef4de2013-03-25 17:22:48 +01002606 /* If the basics of the memslot do not change, we do not want
2607 * to update the gmap. Every update causes several unnecessary
2608 * segment translation exceptions. This is usually handled just
2609 * fine by the normal fault handler + gmap, but it will also
2610 * cause faults on the prefix page of running guest CPUs.
2611 */
2612 if (old->userspace_addr == mem->userspace_addr &&
2613 old->base_gfn * PAGE_SIZE == mem->guest_phys_addr &&
2614 old->npages * PAGE_SIZE == mem->memory_size)
2615 return;
Carsten Otte598841c2011-07-24 10:48:21 +02002616
2617 rc = gmap_map_segment(kvm->arch.gmap, mem->userspace_addr,
2618 mem->guest_phys_addr, mem->memory_size);
2619 if (rc)
Carsten Ottef7850c92011-07-24 10:48:23 +02002620 printk(KERN_WARNING "kvm-s390: failed to commit memory region\n");
Carsten Otte598841c2011-07-24 10:48:21 +02002621 return;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002622}
2623
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002624static int __init kvm_s390_init(void)
2625{
Michael Mueller9d8d5782015-02-02 15:42:51 +01002626 return kvm_init(NULL, sizeof(struct kvm_vcpu), 0, THIS_MODULE);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002627}
2628
2629static void __exit kvm_s390_exit(void)
2630{
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002631 kvm_exit();
2632}
2633
2634module_init(kvm_s390_init);
2635module_exit(kvm_s390_exit);
Cornelia Huck566af942013-05-27 18:42:33 +02002636
2637/*
2638 * Enable autoloading of the kvm module.
2639 * Note that we add the module alias here instead of virt/kvm/kvm_main.c
2640 * since x86 takes a different approach.
2641 */
2642#include <linux/miscdevice.h>
2643MODULE_ALIAS_MISCDEV(KVM_MINOR);
2644MODULE_ALIAS("devname:kvm");