blob: 4c1b5cbea1a6a40707bff4bfbae7b3c36d529b4a [file] [log] [blame]
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001/*
Heiko Carstensa53c8fa2012-07-20 11:15:04 +02002 * hosting zSeries kernel virtual machines
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003 *
Heiko Carstensa53c8fa2012-07-20 11:15:04 +02004 * Copyright IBM Corp. 2008, 2009
Heiko Carstensb0c632d2008-03-25 18:47:20 +01005 *
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License (version 2 only)
8 * as published by the Free Software Foundation.
9 *
10 * Author(s): Carsten Otte <cotte@de.ibm.com>
11 * Christian Borntraeger <borntraeger@de.ibm.com>
12 * Heiko Carstens <heiko.carstens@de.ibm.com>
Christian Ehrhardt628eb9b2009-05-25 13:40:51 +020013 * Christian Ehrhardt <ehrhardt@de.ibm.com>
Jason J. Herne15f36eb2012-08-02 10:10:17 -040014 * Jason J. Herne <jjherne@us.ibm.com>
Heiko Carstensb0c632d2008-03-25 18:47:20 +010015 */
16
17#include <linux/compiler.h>
18#include <linux/err.h>
19#include <linux/fs.h>
Christian Borntraegerca872302009-05-12 17:21:49 +020020#include <linux/hrtimer.h>
Heiko Carstensb0c632d2008-03-25 18:47:20 +010021#include <linux/init.h>
22#include <linux/kvm.h>
23#include <linux/kvm_host.h>
24#include <linux/module.h>
Tony Krowiaka374e892014-09-03 10:13:53 +020025#include <linux/random.h>
Heiko Carstensb0c632d2008-03-25 18:47:20 +010026#include <linux/slab.h>
Carsten Otteba5c1e92008-03-25 18:47:26 +010027#include <linux/timer.h>
Thomas Huth41408c282015-02-06 15:01:21 +010028#include <linux/vmalloc.h>
Heiko Carstenscbb870c2010-02-26 22:37:43 +010029#include <asm/asm-offsets.h>
Heiko Carstensb0c632d2008-03-25 18:47:20 +010030#include <asm/lowcore.h>
31#include <asm/pgtable.h>
Heiko Carstensf5daba12009-03-26 15:24:01 +010032#include <asm/nmi.h>
David Howellsa0616cd2012-03-28 18:30:02 +010033#include <asm/switch_to.h>
Jens Freimann6d3da242013-07-03 15:18:35 +020034#include <asm/isc.h>
Christian Borntraeger1526bf92012-05-15 14:15:25 +020035#include <asm/sclp.h>
Christian Borntraeger8f2abe62008-03-25 18:47:23 +010036#include "kvm-s390.h"
Heiko Carstensb0c632d2008-03-25 18:47:20 +010037#include "gaccess.h"
38
David Hildenbrandea2cdd22015-05-20 13:24:02 +020039#define KMSG_COMPONENT "kvm-s390"
40#undef pr_fmt
41#define pr_fmt(fmt) KMSG_COMPONENT ": " fmt
42
Cornelia Huck5786fff2012-07-23 17:20:29 +020043#define CREATE_TRACE_POINTS
44#include "trace.h"
Cornelia Huckade38c32012-07-23 17:20:30 +020045#include "trace-s390.h"
Cornelia Huck5786fff2012-07-23 17:20:29 +020046
Thomas Huth41408c282015-02-06 15:01:21 +010047#define MEM_OP_MAX_SIZE 65536 /* Maximum transfer size for KVM_S390_MEM_OP */
Jens Freimann816c7662014-11-24 17:13:46 +010048#define LOCAL_IRQS 32
49#define VCPU_IRQS_MAX_BUF (sizeof(struct kvm_s390_irq) * \
50 (KVM_MAX_VCPUS + LOCAL_IRQS))
Thomas Huth41408c282015-02-06 15:01:21 +010051
Heiko Carstensb0c632d2008-03-25 18:47:20 +010052#define VCPU_STAT(x) offsetof(struct kvm_vcpu, stat.x), KVM_STAT_VCPU
53
54struct kvm_stats_debugfs_item debugfs_entries[] = {
55 { "userspace_handled", VCPU_STAT(exit_userspace) },
Christian Borntraeger0eaeafa2008-05-07 09:22:53 +020056 { "exit_null", VCPU_STAT(exit_null) },
Christian Borntraeger8f2abe62008-03-25 18:47:23 +010057 { "exit_validity", VCPU_STAT(exit_validity) },
58 { "exit_stop_request", VCPU_STAT(exit_stop_request) },
59 { "exit_external_request", VCPU_STAT(exit_external_request) },
60 { "exit_external_interrupt", VCPU_STAT(exit_external_interrupt) },
Carsten Otteba5c1e92008-03-25 18:47:26 +010061 { "exit_instruction", VCPU_STAT(exit_instruction) },
62 { "exit_program_interruption", VCPU_STAT(exit_program_interruption) },
63 { "exit_instr_and_program_int", VCPU_STAT(exit_instr_and_program) },
Paolo Bonzinif7819512015-02-04 18:20:58 +010064 { "halt_successful_poll", VCPU_STAT(halt_successful_poll) },
David Hildenbrandce2e4f02014-07-11 10:00:43 +020065 { "halt_wakeup", VCPU_STAT(halt_wakeup) },
Christian Borntraegerf5e10b02008-07-25 15:52:44 +020066 { "instruction_lctlg", VCPU_STAT(instruction_lctlg) },
Carsten Otteba5c1e92008-03-25 18:47:26 +010067 { "instruction_lctl", VCPU_STAT(instruction_lctl) },
David Hildenbrandaba07502014-01-23 10:47:13 +010068 { "instruction_stctl", VCPU_STAT(instruction_stctl) },
69 { "instruction_stctg", VCPU_STAT(instruction_stctg) },
Carsten Otteba5c1e92008-03-25 18:47:26 +010070 { "deliver_emergency_signal", VCPU_STAT(deliver_emergency_signal) },
Christian Ehrhardt7697e71f2011-10-18 12:27:15 +020071 { "deliver_external_call", VCPU_STAT(deliver_external_call) },
Carsten Otteba5c1e92008-03-25 18:47:26 +010072 { "deliver_service_signal", VCPU_STAT(deliver_service_signal) },
73 { "deliver_virtio_interrupt", VCPU_STAT(deliver_virtio_interrupt) },
74 { "deliver_stop_signal", VCPU_STAT(deliver_stop_signal) },
75 { "deliver_prefix_signal", VCPU_STAT(deliver_prefix_signal) },
76 { "deliver_restart_signal", VCPU_STAT(deliver_restart_signal) },
77 { "deliver_program_interruption", VCPU_STAT(deliver_program_int) },
78 { "exit_wait_state", VCPU_STAT(exit_wait_state) },
Christian Borntraeger69d0d3a2013-06-12 13:54:53 +020079 { "instruction_pfmf", VCPU_STAT(instruction_pfmf) },
Christian Borntraeger453423d2008-03-25 18:47:29 +010080 { "instruction_stidp", VCPU_STAT(instruction_stidp) },
81 { "instruction_spx", VCPU_STAT(instruction_spx) },
82 { "instruction_stpx", VCPU_STAT(instruction_stpx) },
83 { "instruction_stap", VCPU_STAT(instruction_stap) },
84 { "instruction_storage_key", VCPU_STAT(instruction_storage_key) },
Heiko Carstens8a2422342014-01-10 14:33:28 +010085 { "instruction_ipte_interlock", VCPU_STAT(instruction_ipte_interlock) },
Christian Borntraeger453423d2008-03-25 18:47:29 +010086 { "instruction_stsch", VCPU_STAT(instruction_stsch) },
87 { "instruction_chsc", VCPU_STAT(instruction_chsc) },
Konstantin Weitzb31288f2013-04-17 17:36:29 +020088 { "instruction_essa", VCPU_STAT(instruction_essa) },
Christian Borntraeger453423d2008-03-25 18:47:29 +010089 { "instruction_stsi", VCPU_STAT(instruction_stsi) },
90 { "instruction_stfl", VCPU_STAT(instruction_stfl) },
Christian Borntraegerbb25b9b2011-07-24 10:48:17 +020091 { "instruction_tprot", VCPU_STAT(instruction_tprot) },
Christian Borntraeger5288fbf2008-03-25 18:47:31 +010092 { "instruction_sigp_sense", VCPU_STAT(instruction_sigp_sense) },
Cornelia Huckbd59d3a2011-11-17 11:00:42 +010093 { "instruction_sigp_sense_running", VCPU_STAT(instruction_sigp_sense_running) },
Christian Ehrhardt7697e71f2011-10-18 12:27:15 +020094 { "instruction_sigp_external_call", VCPU_STAT(instruction_sigp_external_call) },
Christian Borntraeger5288fbf2008-03-25 18:47:31 +010095 { "instruction_sigp_emergency", VCPU_STAT(instruction_sigp_emergency) },
David Hildenbrand42cb0c92014-05-23 12:25:11 +020096 { "instruction_sigp_cond_emergency", VCPU_STAT(instruction_sigp_cond_emergency) },
97 { "instruction_sigp_start", VCPU_STAT(instruction_sigp_start) },
Christian Borntraeger5288fbf2008-03-25 18:47:31 +010098 { "instruction_sigp_stop", VCPU_STAT(instruction_sigp_stop) },
David Hildenbrand42cb0c92014-05-23 12:25:11 +020099 { "instruction_sigp_stop_store_status", VCPU_STAT(instruction_sigp_stop_store_status) },
100 { "instruction_sigp_store_status", VCPU_STAT(instruction_sigp_store_status) },
Eric Farmancd7b4b62015-02-12 09:06:34 -0500101 { "instruction_sigp_store_adtl_status", VCPU_STAT(instruction_sigp_store_adtl_status) },
Christian Borntraeger5288fbf2008-03-25 18:47:31 +0100102 { "instruction_sigp_set_arch", VCPU_STAT(instruction_sigp_arch) },
103 { "instruction_sigp_set_prefix", VCPU_STAT(instruction_sigp_prefix) },
104 { "instruction_sigp_restart", VCPU_STAT(instruction_sigp_restart) },
David Hildenbrand42cb0c92014-05-23 12:25:11 +0200105 { "instruction_sigp_cpu_reset", VCPU_STAT(instruction_sigp_cpu_reset) },
106 { "instruction_sigp_init_cpu_reset", VCPU_STAT(instruction_sigp_init_cpu_reset) },
107 { "instruction_sigp_unknown", VCPU_STAT(instruction_sigp_unknown) },
Christian Borntraeger388186b2011-10-30 15:17:03 +0100108 { "diagnose_10", VCPU_STAT(diagnose_10) },
Christian Borntraegere28acfe2008-03-25 18:47:34 +0100109 { "diagnose_44", VCPU_STAT(diagnose_44) },
Konstantin Weitz41628d32012-04-25 15:30:38 +0200110 { "diagnose_9c", VCPU_STAT(diagnose_9c) },
Christian Borntraeger175a5c92015-07-07 15:19:32 +0200111 { "diagnose_258", VCPU_STAT(diagnose_258) },
112 { "diagnose_308", VCPU_STAT(diagnose_308) },
113 { "diagnose_500", VCPU_STAT(diagnose_500) },
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100114 { NULL }
115};
116
Michael Mueller9d8d5782015-02-02 15:42:51 +0100117/* upper facilities limit for kvm */
118unsigned long kvm_s390_fac_list_mask[] = {
Christian Borntraegera3ed8da2015-03-18 13:54:31 +0100119 0xffe6fffbfcfdfc40UL,
Guenther Hutzl53df84f2015-02-18 11:13:03 +0100120 0x005e800000000000UL,
Michael Mueller9d8d5782015-02-02 15:42:51 +0100121};
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100122
Michael Mueller9d8d5782015-02-02 15:42:51 +0100123unsigned long kvm_s390_fac_list_mask_size(void)
Michael Mueller78c4b592013-07-26 15:04:04 +0200124{
Michael Mueller9d8d5782015-02-02 15:42:51 +0100125 BUILD_BUG_ON(ARRAY_SIZE(kvm_s390_fac_list_mask) > S390_ARCH_FAC_MASK_SIZE_U64);
126 return ARRAY_SIZE(kvm_s390_fac_list_mask);
Michael Mueller78c4b592013-07-26 15:04:04 +0200127}
128
Michael Mueller9d8d5782015-02-02 15:42:51 +0100129static struct gmap_notifier gmap_notifier;
130
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100131/* Section: not file related */
Radim Krčmář13a34e02014-08-28 15:13:03 +0200132int kvm_arch_hardware_enable(void)
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100133{
134 /* every s390 is virtualization enabled ;-) */
Alexander Graf10474ae2009-09-15 11:37:46 +0200135 return 0;
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100136}
137
Christian Borntraeger2c70fe42013-05-17 14:41:36 +0200138static void kvm_gmap_notifier(struct gmap *gmap, unsigned long address);
139
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100140int kvm_arch_hardware_setup(void)
141{
Christian Borntraeger2c70fe42013-05-17 14:41:36 +0200142 gmap_notifier.notifier_call = kvm_gmap_notifier;
143 gmap_register_ipte_notifier(&gmap_notifier);
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100144 return 0;
145}
146
147void kvm_arch_hardware_unsetup(void)
148{
Christian Borntraeger2c70fe42013-05-17 14:41:36 +0200149 gmap_unregister_ipte_notifier(&gmap_notifier);
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100150}
151
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100152int kvm_arch_init(void *opaque)
153{
Cornelia Huck84877d92014-09-02 10:27:35 +0100154 /* Register floating interrupt controller interface. */
155 return kvm_register_device_ops(&kvm_flic_ops, KVM_DEV_TYPE_FLIC);
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100156}
157
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100158/* Section: device related */
159long kvm_arch_dev_ioctl(struct file *filp,
160 unsigned int ioctl, unsigned long arg)
161{
162 if (ioctl == KVM_S390_ENABLE_SIE)
163 return s390_enable_sie();
164 return -EINVAL;
165}
166
Alexander Graf784aa3d2014-07-14 18:27:35 +0200167int kvm_vm_ioctl_check_extension(struct kvm *kvm, long ext)
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100168{
Carsten Otted7b0b5e2009-11-19 14:21:16 +0100169 int r;
170
Carsten Otte2bd0ac42008-07-25 15:49:13 +0200171 switch (ext) {
Carsten Otted7b0b5e2009-11-19 14:21:16 +0100172 case KVM_CAP_S390_PSW:
Christian Borntraegerb6cf8782011-09-20 17:07:29 +0200173 case KVM_CAP_S390_GMAP:
Christian Borntraeger52e16b12011-11-17 11:00:44 +0100174 case KVM_CAP_SYNC_MMU:
Carsten Otte1efd0f52012-01-04 10:25:29 +0100175#ifdef CONFIG_KVM_S390_UCONTROL
176 case KVM_CAP_S390_UCONTROL:
177#endif
Dominik Dingel3c038e62013-10-07 17:11:48 +0200178 case KVM_CAP_ASYNC_PF:
Christian Borntraeger60b413c2012-01-11 11:20:31 +0100179 case KVM_CAP_SYNC_REGS:
Carsten Otte14eebd92012-05-15 14:15:26 +0200180 case KVM_CAP_ONE_REG:
Cornelia Huckd6712df2012-12-20 15:32:11 +0100181 case KVM_CAP_ENABLE_CAP:
Cornelia Huckfa6b7fe2012-12-20 15:32:12 +0100182 case KVM_CAP_S390_CSS_SUPPORT:
Cornelia Huck10ccaa12013-02-28 12:33:21 +0100183 case KVM_CAP_IOEVENTFD:
Jens Freimannc05c4182013-10-07 16:13:45 +0200184 case KVM_CAP_DEVICE_CTRL:
Cornelia Huckd938dc52013-10-23 18:26:34 +0200185 case KVM_CAP_ENABLE_CAP_VM:
Cornelia Huck78599d92014-07-15 09:54:39 +0200186 case KVM_CAP_S390_IRQCHIP:
Dominik Dingelf2061652014-04-09 13:13:00 +0200187 case KVM_CAP_VM_ATTRIBUTES:
David Hildenbrand6352e4d2014-04-10 17:35:00 +0200188 case KVM_CAP_MP_STATE:
Jens Freimann47b43c52014-11-11 20:57:06 +0100189 case KVM_CAP_S390_INJECT_IRQ:
David Hildenbrand2444b352014-10-09 14:10:13 +0200190 case KVM_CAP_S390_USER_SIGP:
Ekaterina Tumanovae44fc8c2015-01-30 16:55:56 +0100191 case KVM_CAP_S390_USER_STSI:
Jason J. Herne30ee2a92014-09-23 09:23:01 -0400192 case KVM_CAP_S390_SKEYS:
Jens Freimann816c7662014-11-24 17:13:46 +0100193 case KVM_CAP_S390_IRQ_STATE:
Carsten Otted7b0b5e2009-11-19 14:21:16 +0100194 r = 1;
195 break;
Thomas Huth41408c282015-02-06 15:01:21 +0100196 case KVM_CAP_S390_MEM_OP:
197 r = MEM_OP_MAX_SIZE;
198 break;
Christian Borntraegere726b1b2012-05-02 10:50:38 +0200199 case KVM_CAP_NR_VCPUS:
200 case KVM_CAP_MAX_VCPUS:
201 r = KVM_MAX_VCPUS;
202 break;
Nick Wange1e2e602013-03-25 17:22:58 +0100203 case KVM_CAP_NR_MEMSLOTS:
204 r = KVM_USER_MEM_SLOTS;
205 break;
Christian Borntraeger1526bf92012-05-15 14:15:25 +0200206 case KVM_CAP_S390_COW:
Martin Schwidefskyabf09be2012-11-07 13:17:37 +0100207 r = MACHINE_HAS_ESOP;
Christian Borntraeger1526bf92012-05-15 14:15:25 +0200208 break;
Eric Farman68c55752014-06-09 10:57:26 -0400209 case KVM_CAP_S390_VECTOR_REGISTERS:
210 r = MACHINE_HAS_VX;
211 break;
Carsten Otte2bd0ac42008-07-25 15:49:13 +0200212 default:
Carsten Otted7b0b5e2009-11-19 14:21:16 +0100213 r = 0;
Carsten Otte2bd0ac42008-07-25 15:49:13 +0200214 }
Carsten Otted7b0b5e2009-11-19 14:21:16 +0100215 return r;
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100216}
217
Jason J. Herne15f36eb2012-08-02 10:10:17 -0400218static void kvm_s390_sync_dirty_log(struct kvm *kvm,
219 struct kvm_memory_slot *memslot)
220{
221 gfn_t cur_gfn, last_gfn;
222 unsigned long address;
223 struct gmap *gmap = kvm->arch.gmap;
224
225 down_read(&gmap->mm->mmap_sem);
226 /* Loop over all guest pages */
227 last_gfn = memslot->base_gfn + memslot->npages;
228 for (cur_gfn = memslot->base_gfn; cur_gfn <= last_gfn; cur_gfn++) {
229 address = gfn_to_hva_memslot(memslot, cur_gfn);
230
231 if (gmap_test_and_clear_dirty(address, gmap))
232 mark_page_dirty(kvm, cur_gfn);
233 }
234 up_read(&gmap->mm->mmap_sem);
235}
236
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100237/* Section: vm related */
238/*
239 * Get (and clear) the dirty memory log for a memory slot.
240 */
241int kvm_vm_ioctl_get_dirty_log(struct kvm *kvm,
242 struct kvm_dirty_log *log)
243{
Jason J. Herne15f36eb2012-08-02 10:10:17 -0400244 int r;
245 unsigned long n;
Paolo Bonzini9f6b8022015-05-17 16:20:07 +0200246 struct kvm_memslots *slots;
Jason J. Herne15f36eb2012-08-02 10:10:17 -0400247 struct kvm_memory_slot *memslot;
248 int is_dirty = 0;
249
250 mutex_lock(&kvm->slots_lock);
251
252 r = -EINVAL;
253 if (log->slot >= KVM_USER_MEM_SLOTS)
254 goto out;
255
Paolo Bonzini9f6b8022015-05-17 16:20:07 +0200256 slots = kvm_memslots(kvm);
257 memslot = id_to_memslot(slots, log->slot);
Jason J. Herne15f36eb2012-08-02 10:10:17 -0400258 r = -ENOENT;
259 if (!memslot->dirty_bitmap)
260 goto out;
261
262 kvm_s390_sync_dirty_log(kvm, memslot);
263 r = kvm_get_dirty_log(kvm, log, &is_dirty);
264 if (r)
265 goto out;
266
267 /* Clear the dirty log */
268 if (is_dirty) {
269 n = kvm_dirty_bitmap_bytes(memslot);
270 memset(memslot->dirty_bitmap, 0, n);
271 }
272 r = 0;
273out:
274 mutex_unlock(&kvm->slots_lock);
275 return r;
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100276}
277
Cornelia Huckd938dc52013-10-23 18:26:34 +0200278static int kvm_vm_ioctl_enable_cap(struct kvm *kvm, struct kvm_enable_cap *cap)
279{
280 int r;
281
282 if (cap->flags)
283 return -EINVAL;
284
285 switch (cap->cap) {
Cornelia Huck84223592013-07-15 13:36:01 +0200286 case KVM_CAP_S390_IRQCHIP:
287 kvm->arch.use_irqchip = 1;
288 r = 0;
289 break;
David Hildenbrand2444b352014-10-09 14:10:13 +0200290 case KVM_CAP_S390_USER_SIGP:
291 kvm->arch.user_sigp = 1;
292 r = 0;
293 break;
Eric Farman68c55752014-06-09 10:57:26 -0400294 case KVM_CAP_S390_VECTOR_REGISTERS:
Michael Mueller18280d82015-03-16 16:05:41 +0100295 if (MACHINE_HAS_VX) {
296 set_kvm_facility(kvm->arch.model.fac->mask, 129);
297 set_kvm_facility(kvm->arch.model.fac->list, 129);
298 r = 0;
299 } else
300 r = -EINVAL;
Eric Farman68c55752014-06-09 10:57:26 -0400301 break;
Ekaterina Tumanovae44fc8c2015-01-30 16:55:56 +0100302 case KVM_CAP_S390_USER_STSI:
303 kvm->arch.user_stsi = 1;
304 r = 0;
305 break;
Cornelia Huckd938dc52013-10-23 18:26:34 +0200306 default:
307 r = -EINVAL;
308 break;
309 }
310 return r;
311}
312
Dominik Dingel8c0a7ce2014-10-31 14:10:41 +0100313static int kvm_s390_get_mem_control(struct kvm *kvm, struct kvm_device_attr *attr)
314{
315 int ret;
316
317 switch (attr->attr) {
318 case KVM_S390_VM_MEM_LIMIT_SIZE:
319 ret = 0;
320 if (put_user(kvm->arch.gmap->asce_end, (u64 __user *)attr->addr))
321 ret = -EFAULT;
322 break;
323 default:
324 ret = -ENXIO;
325 break;
326 }
327 return ret;
328}
329
330static int kvm_s390_set_mem_control(struct kvm *kvm, struct kvm_device_attr *attr)
Dominik Dingel4f718ea2014-04-09 13:13:00 +0200331{
332 int ret;
333 unsigned int idx;
334 switch (attr->attr) {
335 case KVM_S390_VM_MEM_ENABLE_CMMA:
Dominik Dingele6db1d62015-05-07 15:41:57 +0200336 /* enable CMMA only for z10 and later (EDAT_1) */
337 ret = -EINVAL;
338 if (!MACHINE_IS_LPAR || !MACHINE_HAS_EDAT1)
339 break;
340
Dominik Dingel4f718ea2014-04-09 13:13:00 +0200341 ret = -EBUSY;
342 mutex_lock(&kvm->lock);
343 if (atomic_read(&kvm->online_vcpus) == 0) {
344 kvm->arch.use_cmma = 1;
345 ret = 0;
346 }
347 mutex_unlock(&kvm->lock);
348 break;
349 case KVM_S390_VM_MEM_CLR_CMMA:
Dominik Dingelc3489152015-06-18 13:17:11 +0200350 ret = -EINVAL;
351 if (!kvm->arch.use_cmma)
352 break;
353
Dominik Dingel4f718ea2014-04-09 13:13:00 +0200354 mutex_lock(&kvm->lock);
355 idx = srcu_read_lock(&kvm->srcu);
Dominik Dingela13cff32014-10-23 12:07:14 +0200356 s390_reset_cmma(kvm->arch.gmap->mm);
Dominik Dingel4f718ea2014-04-09 13:13:00 +0200357 srcu_read_unlock(&kvm->srcu, idx);
358 mutex_unlock(&kvm->lock);
359 ret = 0;
360 break;
Dominik Dingel8c0a7ce2014-10-31 14:10:41 +0100361 case KVM_S390_VM_MEM_LIMIT_SIZE: {
362 unsigned long new_limit;
363
364 if (kvm_is_ucontrol(kvm))
365 return -EINVAL;
366
367 if (get_user(new_limit, (u64 __user *)attr->addr))
368 return -EFAULT;
369
370 if (new_limit > kvm->arch.gmap->asce_end)
371 return -E2BIG;
372
373 ret = -EBUSY;
374 mutex_lock(&kvm->lock);
375 if (atomic_read(&kvm->online_vcpus) == 0) {
376 /* gmap_alloc will round the limit up */
377 struct gmap *new = gmap_alloc(current->mm, new_limit);
378
379 if (!new) {
380 ret = -ENOMEM;
381 } else {
382 gmap_free(kvm->arch.gmap);
383 new->private = kvm;
384 kvm->arch.gmap = new;
385 ret = 0;
386 }
387 }
388 mutex_unlock(&kvm->lock);
389 break;
390 }
Dominik Dingel4f718ea2014-04-09 13:13:00 +0200391 default:
392 ret = -ENXIO;
393 break;
394 }
395 return ret;
396}
397
Tony Krowiaka374e892014-09-03 10:13:53 +0200398static void kvm_s390_vcpu_crypto_setup(struct kvm_vcpu *vcpu);
399
400static int kvm_s390_vm_set_crypto(struct kvm *kvm, struct kvm_device_attr *attr)
401{
402 struct kvm_vcpu *vcpu;
403 int i;
404
Michael Mueller9d8d5782015-02-02 15:42:51 +0100405 if (!test_kvm_facility(kvm, 76))
Tony Krowiaka374e892014-09-03 10:13:53 +0200406 return -EINVAL;
407
408 mutex_lock(&kvm->lock);
409 switch (attr->attr) {
410 case KVM_S390_VM_CRYPTO_ENABLE_AES_KW:
411 get_random_bytes(
412 kvm->arch.crypto.crycb->aes_wrapping_key_mask,
413 sizeof(kvm->arch.crypto.crycb->aes_wrapping_key_mask));
414 kvm->arch.crypto.aes_kw = 1;
415 break;
416 case KVM_S390_VM_CRYPTO_ENABLE_DEA_KW:
417 get_random_bytes(
418 kvm->arch.crypto.crycb->dea_wrapping_key_mask,
419 sizeof(kvm->arch.crypto.crycb->dea_wrapping_key_mask));
420 kvm->arch.crypto.dea_kw = 1;
421 break;
422 case KVM_S390_VM_CRYPTO_DISABLE_AES_KW:
423 kvm->arch.crypto.aes_kw = 0;
424 memset(kvm->arch.crypto.crycb->aes_wrapping_key_mask, 0,
425 sizeof(kvm->arch.crypto.crycb->aes_wrapping_key_mask));
426 break;
427 case KVM_S390_VM_CRYPTO_DISABLE_DEA_KW:
428 kvm->arch.crypto.dea_kw = 0;
429 memset(kvm->arch.crypto.crycb->dea_wrapping_key_mask, 0,
430 sizeof(kvm->arch.crypto.crycb->dea_wrapping_key_mask));
431 break;
432 default:
433 mutex_unlock(&kvm->lock);
434 return -ENXIO;
435 }
436
437 kvm_for_each_vcpu(i, vcpu, kvm) {
438 kvm_s390_vcpu_crypto_setup(vcpu);
439 exit_sie(vcpu);
440 }
441 mutex_unlock(&kvm->lock);
442 return 0;
443}
444
Jason J. Herne72f25022014-11-25 09:46:02 -0500445static int kvm_s390_set_tod_high(struct kvm *kvm, struct kvm_device_attr *attr)
446{
447 u8 gtod_high;
448
449 if (copy_from_user(&gtod_high, (void __user *)attr->addr,
450 sizeof(gtod_high)))
451 return -EFAULT;
452
453 if (gtod_high != 0)
454 return -EINVAL;
455
456 return 0;
457}
458
459static int kvm_s390_set_tod_low(struct kvm *kvm, struct kvm_device_attr *attr)
460{
461 struct kvm_vcpu *cur_vcpu;
462 unsigned int vcpu_idx;
463 u64 host_tod, gtod;
464 int r;
465
466 if (copy_from_user(&gtod, (void __user *)attr->addr, sizeof(gtod)))
467 return -EFAULT;
468
469 r = store_tod_clock(&host_tod);
470 if (r)
471 return r;
472
473 mutex_lock(&kvm->lock);
474 kvm->arch.epoch = gtod - host_tod;
Christian Borntraeger27406cd2015-04-14 12:17:34 +0200475 kvm_s390_vcpu_block_all(kvm);
476 kvm_for_each_vcpu(vcpu_idx, cur_vcpu, kvm)
Jason J. Herne72f25022014-11-25 09:46:02 -0500477 cur_vcpu->arch.sie_block->epoch = kvm->arch.epoch;
Christian Borntraeger27406cd2015-04-14 12:17:34 +0200478 kvm_s390_vcpu_unblock_all(kvm);
Jason J. Herne72f25022014-11-25 09:46:02 -0500479 mutex_unlock(&kvm->lock);
480 return 0;
481}
482
483static int kvm_s390_set_tod(struct kvm *kvm, struct kvm_device_attr *attr)
484{
485 int ret;
486
487 if (attr->flags)
488 return -EINVAL;
489
490 switch (attr->attr) {
491 case KVM_S390_VM_TOD_HIGH:
492 ret = kvm_s390_set_tod_high(kvm, attr);
493 break;
494 case KVM_S390_VM_TOD_LOW:
495 ret = kvm_s390_set_tod_low(kvm, attr);
496 break;
497 default:
498 ret = -ENXIO;
499 break;
500 }
501 return ret;
502}
503
504static int kvm_s390_get_tod_high(struct kvm *kvm, struct kvm_device_attr *attr)
505{
506 u8 gtod_high = 0;
507
508 if (copy_to_user((void __user *)attr->addr, &gtod_high,
509 sizeof(gtod_high)))
510 return -EFAULT;
511
512 return 0;
513}
514
515static int kvm_s390_get_tod_low(struct kvm *kvm, struct kvm_device_attr *attr)
516{
517 u64 host_tod, gtod;
518 int r;
519
520 r = store_tod_clock(&host_tod);
521 if (r)
522 return r;
523
524 gtod = host_tod + kvm->arch.epoch;
525 if (copy_to_user((void __user *)attr->addr, &gtod, sizeof(gtod)))
526 return -EFAULT;
527
528 return 0;
529}
530
531static int kvm_s390_get_tod(struct kvm *kvm, struct kvm_device_attr *attr)
532{
533 int ret;
534
535 if (attr->flags)
536 return -EINVAL;
537
538 switch (attr->attr) {
539 case KVM_S390_VM_TOD_HIGH:
540 ret = kvm_s390_get_tod_high(kvm, attr);
541 break;
542 case KVM_S390_VM_TOD_LOW:
543 ret = kvm_s390_get_tod_low(kvm, attr);
544 break;
545 default:
546 ret = -ENXIO;
547 break;
548 }
549 return ret;
550}
551
Michael Mueller658b6ed2015-02-02 15:49:35 +0100552static int kvm_s390_set_processor(struct kvm *kvm, struct kvm_device_attr *attr)
553{
554 struct kvm_s390_vm_cpu_processor *proc;
555 int ret = 0;
556
557 mutex_lock(&kvm->lock);
558 if (atomic_read(&kvm->online_vcpus)) {
559 ret = -EBUSY;
560 goto out;
561 }
562 proc = kzalloc(sizeof(*proc), GFP_KERNEL);
563 if (!proc) {
564 ret = -ENOMEM;
565 goto out;
566 }
567 if (!copy_from_user(proc, (void __user *)attr->addr,
568 sizeof(*proc))) {
569 memcpy(&kvm->arch.model.cpu_id, &proc->cpuid,
570 sizeof(struct cpuid));
571 kvm->arch.model.ibc = proc->ibc;
Michael Mueller981467c2015-02-24 13:51:04 +0100572 memcpy(kvm->arch.model.fac->list, proc->fac_list,
Michael Mueller658b6ed2015-02-02 15:49:35 +0100573 S390_ARCH_FAC_LIST_SIZE_BYTE);
574 } else
575 ret = -EFAULT;
576 kfree(proc);
577out:
578 mutex_unlock(&kvm->lock);
579 return ret;
580}
581
582static int kvm_s390_set_cpu_model(struct kvm *kvm, struct kvm_device_attr *attr)
583{
584 int ret = -ENXIO;
585
586 switch (attr->attr) {
587 case KVM_S390_VM_CPU_PROCESSOR:
588 ret = kvm_s390_set_processor(kvm, attr);
589 break;
590 }
591 return ret;
592}
593
594static int kvm_s390_get_processor(struct kvm *kvm, struct kvm_device_attr *attr)
595{
596 struct kvm_s390_vm_cpu_processor *proc;
597 int ret = 0;
598
599 proc = kzalloc(sizeof(*proc), GFP_KERNEL);
600 if (!proc) {
601 ret = -ENOMEM;
602 goto out;
603 }
604 memcpy(&proc->cpuid, &kvm->arch.model.cpu_id, sizeof(struct cpuid));
605 proc->ibc = kvm->arch.model.ibc;
Michael Mueller981467c2015-02-24 13:51:04 +0100606 memcpy(&proc->fac_list, kvm->arch.model.fac->list, S390_ARCH_FAC_LIST_SIZE_BYTE);
Michael Mueller658b6ed2015-02-02 15:49:35 +0100607 if (copy_to_user((void __user *)attr->addr, proc, sizeof(*proc)))
608 ret = -EFAULT;
609 kfree(proc);
610out:
611 return ret;
612}
613
614static int kvm_s390_get_machine(struct kvm *kvm, struct kvm_device_attr *attr)
615{
616 struct kvm_s390_vm_cpu_machine *mach;
617 int ret = 0;
618
619 mach = kzalloc(sizeof(*mach), GFP_KERNEL);
620 if (!mach) {
621 ret = -ENOMEM;
622 goto out;
623 }
624 get_cpu_id((struct cpuid *) &mach->cpuid);
David Hildenbrand37c5f6c2015-05-06 13:18:59 +0200625 mach->ibc = sclp.ibc;
Michael Mueller981467c2015-02-24 13:51:04 +0100626 memcpy(&mach->fac_mask, kvm->arch.model.fac->mask,
627 S390_ARCH_FAC_LIST_SIZE_BYTE);
Michael Mueller658b6ed2015-02-02 15:49:35 +0100628 memcpy((unsigned long *)&mach->fac_list, S390_lowcore.stfle_fac_list,
Michael Mueller94422ee2015-02-26 12:12:40 +0100629 S390_ARCH_FAC_LIST_SIZE_BYTE);
Michael Mueller658b6ed2015-02-02 15:49:35 +0100630 if (copy_to_user((void __user *)attr->addr, mach, sizeof(*mach)))
631 ret = -EFAULT;
632 kfree(mach);
633out:
634 return ret;
635}
636
637static int kvm_s390_get_cpu_model(struct kvm *kvm, struct kvm_device_attr *attr)
638{
639 int ret = -ENXIO;
640
641 switch (attr->attr) {
642 case KVM_S390_VM_CPU_PROCESSOR:
643 ret = kvm_s390_get_processor(kvm, attr);
644 break;
645 case KVM_S390_VM_CPU_MACHINE:
646 ret = kvm_s390_get_machine(kvm, attr);
647 break;
648 }
649 return ret;
650}
651
Dominik Dingelf2061652014-04-09 13:13:00 +0200652static int kvm_s390_vm_set_attr(struct kvm *kvm, struct kvm_device_attr *attr)
653{
654 int ret;
655
656 switch (attr->group) {
Dominik Dingel4f718ea2014-04-09 13:13:00 +0200657 case KVM_S390_VM_MEM_CTRL:
Dominik Dingel8c0a7ce2014-10-31 14:10:41 +0100658 ret = kvm_s390_set_mem_control(kvm, attr);
Dominik Dingel4f718ea2014-04-09 13:13:00 +0200659 break;
Jason J. Herne72f25022014-11-25 09:46:02 -0500660 case KVM_S390_VM_TOD:
661 ret = kvm_s390_set_tod(kvm, attr);
662 break;
Michael Mueller658b6ed2015-02-02 15:49:35 +0100663 case KVM_S390_VM_CPU_MODEL:
664 ret = kvm_s390_set_cpu_model(kvm, attr);
665 break;
Tony Krowiaka374e892014-09-03 10:13:53 +0200666 case KVM_S390_VM_CRYPTO:
667 ret = kvm_s390_vm_set_crypto(kvm, attr);
668 break;
Dominik Dingelf2061652014-04-09 13:13:00 +0200669 default:
670 ret = -ENXIO;
671 break;
672 }
673
674 return ret;
675}
676
677static int kvm_s390_vm_get_attr(struct kvm *kvm, struct kvm_device_attr *attr)
678{
Dominik Dingel8c0a7ce2014-10-31 14:10:41 +0100679 int ret;
680
681 switch (attr->group) {
682 case KVM_S390_VM_MEM_CTRL:
683 ret = kvm_s390_get_mem_control(kvm, attr);
684 break;
Jason J. Herne72f25022014-11-25 09:46:02 -0500685 case KVM_S390_VM_TOD:
686 ret = kvm_s390_get_tod(kvm, attr);
687 break;
Michael Mueller658b6ed2015-02-02 15:49:35 +0100688 case KVM_S390_VM_CPU_MODEL:
689 ret = kvm_s390_get_cpu_model(kvm, attr);
690 break;
Dominik Dingel8c0a7ce2014-10-31 14:10:41 +0100691 default:
692 ret = -ENXIO;
693 break;
694 }
695
696 return ret;
Dominik Dingelf2061652014-04-09 13:13:00 +0200697}
698
699static int kvm_s390_vm_has_attr(struct kvm *kvm, struct kvm_device_attr *attr)
700{
701 int ret;
702
703 switch (attr->group) {
Dominik Dingel4f718ea2014-04-09 13:13:00 +0200704 case KVM_S390_VM_MEM_CTRL:
705 switch (attr->attr) {
706 case KVM_S390_VM_MEM_ENABLE_CMMA:
707 case KVM_S390_VM_MEM_CLR_CMMA:
Dominik Dingel8c0a7ce2014-10-31 14:10:41 +0100708 case KVM_S390_VM_MEM_LIMIT_SIZE:
Dominik Dingel4f718ea2014-04-09 13:13:00 +0200709 ret = 0;
710 break;
711 default:
712 ret = -ENXIO;
713 break;
714 }
715 break;
Jason J. Herne72f25022014-11-25 09:46:02 -0500716 case KVM_S390_VM_TOD:
717 switch (attr->attr) {
718 case KVM_S390_VM_TOD_LOW:
719 case KVM_S390_VM_TOD_HIGH:
720 ret = 0;
721 break;
722 default:
723 ret = -ENXIO;
724 break;
725 }
726 break;
Michael Mueller658b6ed2015-02-02 15:49:35 +0100727 case KVM_S390_VM_CPU_MODEL:
728 switch (attr->attr) {
729 case KVM_S390_VM_CPU_PROCESSOR:
730 case KVM_S390_VM_CPU_MACHINE:
731 ret = 0;
732 break;
733 default:
734 ret = -ENXIO;
735 break;
736 }
737 break;
Tony Krowiaka374e892014-09-03 10:13:53 +0200738 case KVM_S390_VM_CRYPTO:
739 switch (attr->attr) {
740 case KVM_S390_VM_CRYPTO_ENABLE_AES_KW:
741 case KVM_S390_VM_CRYPTO_ENABLE_DEA_KW:
742 case KVM_S390_VM_CRYPTO_DISABLE_AES_KW:
743 case KVM_S390_VM_CRYPTO_DISABLE_DEA_KW:
744 ret = 0;
745 break;
746 default:
747 ret = -ENXIO;
748 break;
749 }
750 break;
Dominik Dingelf2061652014-04-09 13:13:00 +0200751 default:
752 ret = -ENXIO;
753 break;
754 }
755
756 return ret;
757}
758
Jason J. Herne30ee2a92014-09-23 09:23:01 -0400759static long kvm_s390_get_skeys(struct kvm *kvm, struct kvm_s390_skeys *args)
760{
761 uint8_t *keys;
762 uint64_t hva;
763 unsigned long curkey;
764 int i, r = 0;
765
766 if (args->flags != 0)
767 return -EINVAL;
768
769 /* Is this guest using storage keys? */
770 if (!mm_use_skey(current->mm))
771 return KVM_S390_GET_SKEYS_NONE;
772
773 /* Enforce sane limit on memory allocation */
774 if (args->count < 1 || args->count > KVM_S390_SKEYS_MAX)
775 return -EINVAL;
776
777 keys = kmalloc_array(args->count, sizeof(uint8_t),
778 GFP_KERNEL | __GFP_NOWARN);
779 if (!keys)
780 keys = vmalloc(sizeof(uint8_t) * args->count);
781 if (!keys)
782 return -ENOMEM;
783
784 for (i = 0; i < args->count; i++) {
785 hva = gfn_to_hva(kvm, args->start_gfn + i);
786 if (kvm_is_error_hva(hva)) {
787 r = -EFAULT;
788 goto out;
789 }
790
791 curkey = get_guest_storage_key(current->mm, hva);
792 if (IS_ERR_VALUE(curkey)) {
793 r = curkey;
794 goto out;
795 }
796 keys[i] = curkey;
797 }
798
799 r = copy_to_user((uint8_t __user *)args->skeydata_addr, keys,
800 sizeof(uint8_t) * args->count);
801 if (r)
802 r = -EFAULT;
803out:
804 kvfree(keys);
805 return r;
806}
807
808static long kvm_s390_set_skeys(struct kvm *kvm, struct kvm_s390_skeys *args)
809{
810 uint8_t *keys;
811 uint64_t hva;
812 int i, r = 0;
813
814 if (args->flags != 0)
815 return -EINVAL;
816
817 /* Enforce sane limit on memory allocation */
818 if (args->count < 1 || args->count > KVM_S390_SKEYS_MAX)
819 return -EINVAL;
820
821 keys = kmalloc_array(args->count, sizeof(uint8_t),
822 GFP_KERNEL | __GFP_NOWARN);
823 if (!keys)
824 keys = vmalloc(sizeof(uint8_t) * args->count);
825 if (!keys)
826 return -ENOMEM;
827
828 r = copy_from_user(keys, (uint8_t __user *)args->skeydata_addr,
829 sizeof(uint8_t) * args->count);
830 if (r) {
831 r = -EFAULT;
832 goto out;
833 }
834
835 /* Enable storage key handling for the guest */
Dominik Dingel14d4a422015-05-07 15:16:13 +0200836 r = s390_enable_skey();
837 if (r)
838 goto out;
Jason J. Herne30ee2a92014-09-23 09:23:01 -0400839
840 for (i = 0; i < args->count; i++) {
841 hva = gfn_to_hva(kvm, args->start_gfn + i);
842 if (kvm_is_error_hva(hva)) {
843 r = -EFAULT;
844 goto out;
845 }
846
847 /* Lowest order bit is reserved */
848 if (keys[i] & 0x01) {
849 r = -EINVAL;
850 goto out;
851 }
852
853 r = set_guest_storage_key(current->mm, hva,
854 (unsigned long)keys[i], 0);
855 if (r)
856 goto out;
857 }
858out:
859 kvfree(keys);
860 return r;
861}
862
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100863long kvm_arch_vm_ioctl(struct file *filp,
864 unsigned int ioctl, unsigned long arg)
865{
866 struct kvm *kvm = filp->private_data;
867 void __user *argp = (void __user *)arg;
Dominik Dingelf2061652014-04-09 13:13:00 +0200868 struct kvm_device_attr attr;
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100869 int r;
870
871 switch (ioctl) {
Carsten Otteba5c1e92008-03-25 18:47:26 +0100872 case KVM_S390_INTERRUPT: {
873 struct kvm_s390_interrupt s390int;
874
875 r = -EFAULT;
876 if (copy_from_user(&s390int, argp, sizeof(s390int)))
877 break;
878 r = kvm_s390_inject_vm(kvm, &s390int);
879 break;
880 }
Cornelia Huckd938dc52013-10-23 18:26:34 +0200881 case KVM_ENABLE_CAP: {
882 struct kvm_enable_cap cap;
883 r = -EFAULT;
884 if (copy_from_user(&cap, argp, sizeof(cap)))
885 break;
886 r = kvm_vm_ioctl_enable_cap(kvm, &cap);
887 break;
888 }
Cornelia Huck84223592013-07-15 13:36:01 +0200889 case KVM_CREATE_IRQCHIP: {
890 struct kvm_irq_routing_entry routing;
891
892 r = -EINVAL;
893 if (kvm->arch.use_irqchip) {
894 /* Set up dummy routing. */
895 memset(&routing, 0, sizeof(routing));
896 kvm_set_irq_routing(kvm, &routing, 0, 0);
897 r = 0;
898 }
899 break;
900 }
Dominik Dingelf2061652014-04-09 13:13:00 +0200901 case KVM_SET_DEVICE_ATTR: {
902 r = -EFAULT;
903 if (copy_from_user(&attr, (void __user *)arg, sizeof(attr)))
904 break;
905 r = kvm_s390_vm_set_attr(kvm, &attr);
906 break;
907 }
908 case KVM_GET_DEVICE_ATTR: {
909 r = -EFAULT;
910 if (copy_from_user(&attr, (void __user *)arg, sizeof(attr)))
911 break;
912 r = kvm_s390_vm_get_attr(kvm, &attr);
913 break;
914 }
915 case KVM_HAS_DEVICE_ATTR: {
916 r = -EFAULT;
917 if (copy_from_user(&attr, (void __user *)arg, sizeof(attr)))
918 break;
919 r = kvm_s390_vm_has_attr(kvm, &attr);
920 break;
921 }
Jason J. Herne30ee2a92014-09-23 09:23:01 -0400922 case KVM_S390_GET_SKEYS: {
923 struct kvm_s390_skeys args;
924
925 r = -EFAULT;
926 if (copy_from_user(&args, argp,
927 sizeof(struct kvm_s390_skeys)))
928 break;
929 r = kvm_s390_get_skeys(kvm, &args);
930 break;
931 }
932 case KVM_S390_SET_SKEYS: {
933 struct kvm_s390_skeys args;
934
935 r = -EFAULT;
936 if (copy_from_user(&args, argp,
937 sizeof(struct kvm_s390_skeys)))
938 break;
939 r = kvm_s390_set_skeys(kvm, &args);
940 break;
941 }
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100942 default:
Avi Kivity367e1312009-08-26 14:57:07 +0300943 r = -ENOTTY;
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100944 }
945
946 return r;
947}
948
Tony Krowiak45c9b472015-01-13 11:33:26 -0500949static int kvm_s390_query_ap_config(u8 *config)
950{
951 u32 fcn_code = 0x04000000UL;
Christian Borntraeger86044c82015-02-26 13:53:47 +0100952 u32 cc = 0;
Tony Krowiak45c9b472015-01-13 11:33:26 -0500953
Christian Borntraeger86044c82015-02-26 13:53:47 +0100954 memset(config, 0, 128);
Tony Krowiak45c9b472015-01-13 11:33:26 -0500955 asm volatile(
956 "lgr 0,%1\n"
957 "lgr 2,%2\n"
958 ".long 0xb2af0000\n" /* PQAP(QCI) */
Christian Borntraeger86044c82015-02-26 13:53:47 +0100959 "0: ipm %0\n"
Tony Krowiak45c9b472015-01-13 11:33:26 -0500960 "srl %0,28\n"
Christian Borntraeger86044c82015-02-26 13:53:47 +0100961 "1:\n"
962 EX_TABLE(0b, 1b)
963 : "+r" (cc)
Tony Krowiak45c9b472015-01-13 11:33:26 -0500964 : "r" (fcn_code), "r" (config)
965 : "cc", "0", "2", "memory"
966 );
967
968 return cc;
969}
970
971static int kvm_s390_apxa_installed(void)
972{
973 u8 config[128];
974 int cc;
975
976 if (test_facility(2) && test_facility(12)) {
977 cc = kvm_s390_query_ap_config(config);
978
979 if (cc)
980 pr_err("PQAP(QCI) failed with cc=%d", cc);
981 else
982 return config[0] & 0x40;
983 }
984
985 return 0;
986}
987
988static void kvm_s390_set_crycb_format(struct kvm *kvm)
989{
990 kvm->arch.crypto.crycbd = (__u32)(unsigned long) kvm->arch.crypto.crycb;
991
992 if (kvm_s390_apxa_installed())
993 kvm->arch.crypto.crycbd |= CRYCB_FORMAT2;
994 else
995 kvm->arch.crypto.crycbd |= CRYCB_FORMAT1;
996}
997
Michael Mueller9d8d5782015-02-02 15:42:51 +0100998static void kvm_s390_get_cpu_id(struct cpuid *cpu_id)
999{
1000 get_cpu_id(cpu_id);
1001 cpu_id->version = 0xff;
1002}
1003
Tony Krowiak5102ee82014-06-27 14:46:01 -04001004static int kvm_s390_crypto_init(struct kvm *kvm)
1005{
Michael Mueller9d8d5782015-02-02 15:42:51 +01001006 if (!test_kvm_facility(kvm, 76))
Tony Krowiak5102ee82014-06-27 14:46:01 -04001007 return 0;
1008
1009 kvm->arch.crypto.crycb = kzalloc(sizeof(*kvm->arch.crypto.crycb),
1010 GFP_KERNEL | GFP_DMA);
1011 if (!kvm->arch.crypto.crycb)
1012 return -ENOMEM;
1013
Tony Krowiak45c9b472015-01-13 11:33:26 -05001014 kvm_s390_set_crycb_format(kvm);
Tony Krowiak5102ee82014-06-27 14:46:01 -04001015
Tony Krowiaked6f76b2015-02-24 14:06:57 -05001016 /* Enable AES/DEA protected key functions by default */
1017 kvm->arch.crypto.aes_kw = 1;
1018 kvm->arch.crypto.dea_kw = 1;
1019 get_random_bytes(kvm->arch.crypto.crycb->aes_wrapping_key_mask,
1020 sizeof(kvm->arch.crypto.crycb->aes_wrapping_key_mask));
1021 get_random_bytes(kvm->arch.crypto.crycb->dea_wrapping_key_mask,
1022 sizeof(kvm->arch.crypto.crycb->dea_wrapping_key_mask));
Tony Krowiaka374e892014-09-03 10:13:53 +02001023
Tony Krowiak5102ee82014-06-27 14:46:01 -04001024 return 0;
1025}
1026
Carsten Ottee08b9632012-01-04 10:25:20 +01001027int kvm_arch_init_vm(struct kvm *kvm, unsigned long type)
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001028{
Michael Mueller9d8d5782015-02-02 15:42:51 +01001029 int i, rc;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001030 char debug_name[16];
Christian Borntraegerf6c137f2014-03-19 11:18:29 +01001031 static unsigned long sca_offset;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001032
Carsten Ottee08b9632012-01-04 10:25:20 +01001033 rc = -EINVAL;
1034#ifdef CONFIG_KVM_S390_UCONTROL
1035 if (type & ~KVM_VM_S390_UCONTROL)
1036 goto out_err;
1037 if ((type & KVM_VM_S390_UCONTROL) && (!capable(CAP_SYS_ADMIN)))
1038 goto out_err;
1039#else
1040 if (type)
1041 goto out_err;
1042#endif
1043
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001044 rc = s390_enable_sie();
1045 if (rc)
Jan Kiszkad89f5ef2010-11-09 17:02:49 +01001046 goto out_err;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001047
Carsten Otteb2904112011-10-18 12:27:13 +02001048 rc = -ENOMEM;
1049
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001050 kvm->arch.sca = (struct sca_block *) get_zeroed_page(GFP_KERNEL);
1051 if (!kvm->arch.sca)
Jan Kiszkad89f5ef2010-11-09 17:02:49 +01001052 goto out_err;
Christian Borntraegerf6c137f2014-03-19 11:18:29 +01001053 spin_lock(&kvm_lock);
1054 sca_offset = (sca_offset + 16) & 0x7f0;
1055 kvm->arch.sca = (struct sca_block *) ((char *) kvm->arch.sca + sca_offset);
1056 spin_unlock(&kvm_lock);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001057
1058 sprintf(debug_name, "kvm-%u", current->pid);
1059
Christian Borntraeger1cb9cf72015-07-20 15:04:48 +02001060 kvm->arch.dbf = debug_register(debug_name, 32, 1, 7 * sizeof(long));
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001061 if (!kvm->arch.dbf)
Dominik Dingel40f5b732015-03-12 13:55:53 +01001062 goto out_err;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001063
Michael Mueller9d8d5782015-02-02 15:42:51 +01001064 /*
1065 * The architectural maximum amount of facilities is 16 kbit. To store
1066 * this amount, 2 kbyte of memory is required. Thus we need a full
Michael Mueller981467c2015-02-24 13:51:04 +01001067 * page to hold the guest facility list (arch.model.fac->list) and the
1068 * facility mask (arch.model.fac->mask). Its address size has to be
Michael Mueller9d8d5782015-02-02 15:42:51 +01001069 * 31 bits and word aligned.
1070 */
1071 kvm->arch.model.fac =
Michael Mueller981467c2015-02-24 13:51:04 +01001072 (struct kvm_s390_fac *) get_zeroed_page(GFP_KERNEL | GFP_DMA);
Michael Mueller9d8d5782015-02-02 15:42:51 +01001073 if (!kvm->arch.model.fac)
Dominik Dingel40f5b732015-03-12 13:55:53 +01001074 goto out_err;
Michael Mueller9d8d5782015-02-02 15:42:51 +01001075
Michael Muellerfb5bf932015-02-27 14:25:10 +01001076 /* Populate the facility mask initially. */
Michael Mueller981467c2015-02-24 13:51:04 +01001077 memcpy(kvm->arch.model.fac->mask, S390_lowcore.stfle_fac_list,
Michael Mueller94422ee2015-02-26 12:12:40 +01001078 S390_ARCH_FAC_LIST_SIZE_BYTE);
Michael Mueller9d8d5782015-02-02 15:42:51 +01001079 for (i = 0; i < S390_ARCH_FAC_LIST_SIZE_U64; i++) {
1080 if (i < kvm_s390_fac_list_mask_size())
Michael Mueller981467c2015-02-24 13:51:04 +01001081 kvm->arch.model.fac->mask[i] &= kvm_s390_fac_list_mask[i];
Michael Mueller9d8d5782015-02-02 15:42:51 +01001082 else
Michael Mueller981467c2015-02-24 13:51:04 +01001083 kvm->arch.model.fac->mask[i] = 0UL;
Michael Mueller9d8d5782015-02-02 15:42:51 +01001084 }
1085
Michael Mueller981467c2015-02-24 13:51:04 +01001086 /* Populate the facility list initially. */
1087 memcpy(kvm->arch.model.fac->list, kvm->arch.model.fac->mask,
1088 S390_ARCH_FAC_LIST_SIZE_BYTE);
1089
Michael Mueller9d8d5782015-02-02 15:42:51 +01001090 kvm_s390_get_cpu_id(&kvm->arch.model.cpu_id);
David Hildenbrand37c5f6c2015-05-06 13:18:59 +02001091 kvm->arch.model.ibc = sclp.ibc & 0x0fff;
Michael Mueller9d8d5782015-02-02 15:42:51 +01001092
Tony Krowiak5102ee82014-06-27 14:46:01 -04001093 if (kvm_s390_crypto_init(kvm) < 0)
Dominik Dingel40f5b732015-03-12 13:55:53 +01001094 goto out_err;
Tony Krowiak5102ee82014-06-27 14:46:01 -04001095
Carsten Otteba5c1e92008-03-25 18:47:26 +01001096 spin_lock_init(&kvm->arch.float_int.lock);
Jens Freimann6d3da242013-07-03 15:18:35 +02001097 for (i = 0; i < FIRQ_LIST_COUNT; i++)
1098 INIT_LIST_HEAD(&kvm->arch.float_int.lists[i]);
Heiko Carstens8a2422342014-01-10 14:33:28 +01001099 init_waitqueue_head(&kvm->arch.ipte_wq);
Thomas Hutha6b7e452014-10-01 14:48:42 +02001100 mutex_init(&kvm->arch.ipte_mutex);
Carsten Otteba5c1e92008-03-25 18:47:26 +01001101
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001102 debug_register_view(kvm->arch.dbf, &debug_sprintf_view);
1103 VM_EVENT(kvm, 3, "%s", "vm created");
1104
Carsten Ottee08b9632012-01-04 10:25:20 +01001105 if (type & KVM_VM_S390_UCONTROL) {
1106 kvm->arch.gmap = NULL;
1107 } else {
Christian Borntraeger03499852014-08-25 12:38:57 +02001108 kvm->arch.gmap = gmap_alloc(current->mm, (1UL << 44) - 1);
Carsten Ottee08b9632012-01-04 10:25:20 +01001109 if (!kvm->arch.gmap)
Dominik Dingel40f5b732015-03-12 13:55:53 +01001110 goto out_err;
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02001111 kvm->arch.gmap->private = kvm;
Dominik Dingel24eb3a82013-06-17 16:25:18 +02001112 kvm->arch.gmap->pfault_enabled = 0;
Carsten Ottee08b9632012-01-04 10:25:20 +01001113 }
Cornelia Huckfa6b7fe2012-12-20 15:32:12 +01001114
1115 kvm->arch.css_support = 0;
Cornelia Huck84223592013-07-15 13:36:01 +02001116 kvm->arch.use_irqchip = 0;
Jason J. Herne72f25022014-11-25 09:46:02 -05001117 kvm->arch.epoch = 0;
Cornelia Huckfa6b7fe2012-12-20 15:32:12 +01001118
David Hildenbrand8ad35752014-03-14 11:00:21 +01001119 spin_lock_init(&kvm->arch.start_stop_lock);
1120
Jan Kiszkad89f5ef2010-11-09 17:02:49 +01001121 return 0;
Jan Kiszkad89f5ef2010-11-09 17:02:49 +01001122out_err:
Dominik Dingel40f5b732015-03-12 13:55:53 +01001123 kfree(kvm->arch.crypto.crycb);
1124 free_page((unsigned long)kvm->arch.model.fac);
1125 debug_unregister(kvm->arch.dbf);
1126 free_page((unsigned long)(kvm->arch.sca));
Jan Kiszkad89f5ef2010-11-09 17:02:49 +01001127 return rc;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001128}
1129
Christian Borntraegerd329c032008-11-26 14:50:27 +01001130void kvm_arch_vcpu_destroy(struct kvm_vcpu *vcpu)
1131{
1132 VCPU_EVENT(vcpu, 3, "%s", "free cpu");
Cornelia Huckade38c32012-07-23 17:20:30 +02001133 trace_kvm_s390_destroy_vcpu(vcpu->vcpu_id);
Christian Borntraeger67335e62014-03-25 17:09:08 +01001134 kvm_s390_clear_local_irqs(vcpu);
Dominik Dingel3c038e62013-10-07 17:11:48 +02001135 kvm_clear_async_pf_completion_queue(vcpu);
Carsten Otte58f94602012-01-04 10:25:27 +01001136 if (!kvm_is_ucontrol(vcpu->kvm)) {
1137 clear_bit(63 - vcpu->vcpu_id,
1138 (unsigned long *) &vcpu->kvm->arch.sca->mcn);
1139 if (vcpu->kvm->arch.sca->cpu[vcpu->vcpu_id].sda ==
1140 (__u64) vcpu->arch.sie_block)
1141 vcpu->kvm->arch.sca->cpu[vcpu->vcpu_id].sda = 0;
1142 }
Carsten Otteabf4a712009-05-12 17:21:51 +02001143 smp_mb();
Carsten Otte27e03932012-01-04 10:25:21 +01001144
1145 if (kvm_is_ucontrol(vcpu->kvm))
1146 gmap_free(vcpu->arch.gmap);
1147
Dominik Dingele6db1d62015-05-07 15:41:57 +02001148 if (vcpu->kvm->arch.use_cmma)
Dominik Dingelb31605c2014-03-25 13:47:11 +01001149 kvm_s390_vcpu_unsetup_cmma(vcpu);
Christian Borntraegerd329c032008-11-26 14:50:27 +01001150 free_page((unsigned long)(vcpu->arch.sie_block));
Konstantin Weitzb31288f2013-04-17 17:36:29 +02001151
Christian Borntraeger6692cef2008-11-26 14:51:08 +01001152 kvm_vcpu_uninit(vcpu);
Michael Muellerb110fea2013-06-12 13:54:54 +02001153 kmem_cache_free(kvm_vcpu_cache, vcpu);
Christian Borntraegerd329c032008-11-26 14:50:27 +01001154}
1155
1156static void kvm_free_vcpus(struct kvm *kvm)
1157{
1158 unsigned int i;
Gleb Natapov988a2ca2009-06-09 15:56:29 +03001159 struct kvm_vcpu *vcpu;
Christian Borntraegerd329c032008-11-26 14:50:27 +01001160
Gleb Natapov988a2ca2009-06-09 15:56:29 +03001161 kvm_for_each_vcpu(i, vcpu, kvm)
1162 kvm_arch_vcpu_destroy(vcpu);
1163
1164 mutex_lock(&kvm->lock);
1165 for (i = 0; i < atomic_read(&kvm->online_vcpus); i++)
1166 kvm->vcpus[i] = NULL;
1167
1168 atomic_set(&kvm->online_vcpus, 0);
1169 mutex_unlock(&kvm->lock);
Christian Borntraegerd329c032008-11-26 14:50:27 +01001170}
1171
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001172void kvm_arch_destroy_vm(struct kvm *kvm)
1173{
Christian Borntraegerd329c032008-11-26 14:50:27 +01001174 kvm_free_vcpus(kvm);
Michael Mueller9d8d5782015-02-02 15:42:51 +01001175 free_page((unsigned long)kvm->arch.model.fac);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001176 free_page((unsigned long)(kvm->arch.sca));
Christian Borntraegerd329c032008-11-26 14:50:27 +01001177 debug_unregister(kvm->arch.dbf);
Tony Krowiak5102ee82014-06-27 14:46:01 -04001178 kfree(kvm->arch.crypto.crycb);
Carsten Otte27e03932012-01-04 10:25:21 +01001179 if (!kvm_is_ucontrol(kvm))
1180 gmap_free(kvm->arch.gmap);
Cornelia Huck841b91c2013-07-15 13:36:01 +02001181 kvm_s390_destroy_adapters(kvm);
Christian Borntraeger67335e62014-03-25 17:09:08 +01001182 kvm_s390_clear_float_irqs(kvm);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001183}
1184
1185/* Section: vcpu related */
Dominik Dingeldafd0322014-12-02 16:53:21 +01001186static int __kvm_ucontrol_vcpu_init(struct kvm_vcpu *vcpu)
1187{
1188 vcpu->arch.gmap = gmap_alloc(current->mm, -1UL);
1189 if (!vcpu->arch.gmap)
1190 return -ENOMEM;
1191 vcpu->arch.gmap->private = vcpu->kvm;
1192
1193 return 0;
1194}
1195
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001196int kvm_arch_vcpu_init(struct kvm_vcpu *vcpu)
1197{
Dominik Dingel3c038e62013-10-07 17:11:48 +02001198 vcpu->arch.pfault_token = KVM_S390_PFAULT_TOKEN_INVALID;
1199 kvm_clear_async_pf_completion_queue(vcpu);
Christian Borntraeger59674c12012-01-11 11:20:33 +01001200 vcpu->run->kvm_valid_regs = KVM_SYNC_PREFIX |
1201 KVM_SYNC_GPRS |
Christian Borntraeger9eed07352012-02-06 10:59:07 +01001202 KVM_SYNC_ACRS |
David Hildenbrandb028ee32014-07-17 10:47:43 +02001203 KVM_SYNC_CRS |
1204 KVM_SYNC_ARCH0 |
1205 KVM_SYNC_PFAULT;
Eric Farman68c55752014-06-09 10:57:26 -04001206 if (test_kvm_facility(vcpu->kvm, 129))
1207 vcpu->run->kvm_valid_regs |= KVM_SYNC_VRS;
Dominik Dingeldafd0322014-12-02 16:53:21 +01001208
1209 if (kvm_is_ucontrol(vcpu->kvm))
1210 return __kvm_ucontrol_vcpu_init(vcpu);
1211
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001212 return 0;
1213}
1214
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001215void kvm_arch_vcpu_load(struct kvm_vcpu *vcpu, int cpu)
1216{
Martin Schwidefsky4725c862013-10-15 16:08:34 +02001217 save_fp_ctl(&vcpu->arch.host_fpregs.fpc);
Michael Mueller18280d82015-03-16 16:05:41 +01001218 if (test_kvm_facility(vcpu->kvm, 129))
Eric Farman68c55752014-06-09 10:57:26 -04001219 save_vx_regs((__vector128 *)&vcpu->arch.host_vregs->vrs);
1220 else
1221 save_fp_regs(vcpu->arch.host_fpregs.fprs);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001222 save_access_regs(vcpu->arch.host_acrs);
Michael Mueller18280d82015-03-16 16:05:41 +01001223 if (test_kvm_facility(vcpu->kvm, 129)) {
Eric Farman68c55752014-06-09 10:57:26 -04001224 restore_fp_ctl(&vcpu->run->s.regs.fpc);
1225 restore_vx_regs((__vector128 *)&vcpu->run->s.regs.vrs);
1226 } else {
1227 restore_fp_ctl(&vcpu->arch.guest_fpregs.fpc);
1228 restore_fp_regs(vcpu->arch.guest_fpregs.fprs);
1229 }
Christian Borntraeger59674c12012-01-11 11:20:33 +01001230 restore_access_regs(vcpu->run->s.regs.acrs);
Christian Borntraeger480e5922011-09-20 17:07:28 +02001231 gmap_enable(vcpu->arch.gmap);
Cornelia Huck9e6dabe2011-11-17 11:00:41 +01001232 atomic_set_mask(CPUSTAT_RUNNING, &vcpu->arch.sie_block->cpuflags);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001233}
1234
1235void kvm_arch_vcpu_put(struct kvm_vcpu *vcpu)
1236{
Cornelia Huck9e6dabe2011-11-17 11:00:41 +01001237 atomic_clear_mask(CPUSTAT_RUNNING, &vcpu->arch.sie_block->cpuflags);
Christian Borntraeger480e5922011-09-20 17:07:28 +02001238 gmap_disable(vcpu->arch.gmap);
Michael Mueller18280d82015-03-16 16:05:41 +01001239 if (test_kvm_facility(vcpu->kvm, 129)) {
Eric Farman68c55752014-06-09 10:57:26 -04001240 save_fp_ctl(&vcpu->run->s.regs.fpc);
1241 save_vx_regs((__vector128 *)&vcpu->run->s.regs.vrs);
1242 } else {
1243 save_fp_ctl(&vcpu->arch.guest_fpregs.fpc);
1244 save_fp_regs(vcpu->arch.guest_fpregs.fprs);
1245 }
Christian Borntraeger59674c12012-01-11 11:20:33 +01001246 save_access_regs(vcpu->run->s.regs.acrs);
Martin Schwidefsky4725c862013-10-15 16:08:34 +02001247 restore_fp_ctl(&vcpu->arch.host_fpregs.fpc);
Michael Mueller18280d82015-03-16 16:05:41 +01001248 if (test_kvm_facility(vcpu->kvm, 129))
Eric Farman68c55752014-06-09 10:57:26 -04001249 restore_vx_regs((__vector128 *)&vcpu->arch.host_vregs->vrs);
1250 else
1251 restore_fp_regs(vcpu->arch.host_fpregs.fprs);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001252 restore_access_regs(vcpu->arch.host_acrs);
1253}
1254
1255static void kvm_s390_vcpu_initial_reset(struct kvm_vcpu *vcpu)
1256{
1257 /* this equals initial cpu reset in pop, but we don't switch to ESA */
1258 vcpu->arch.sie_block->gpsw.mask = 0UL;
1259 vcpu->arch.sie_block->gpsw.addr = 0UL;
Christian Borntraeger8d26cf72012-01-11 11:19:32 +01001260 kvm_s390_set_prefix(vcpu, 0);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001261 vcpu->arch.sie_block->cputm = 0UL;
1262 vcpu->arch.sie_block->ckc = 0UL;
1263 vcpu->arch.sie_block->todpr = 0;
1264 memset(vcpu->arch.sie_block->gcr, 0, 16 * sizeof(__u64));
1265 vcpu->arch.sie_block->gcr[0] = 0xE0UL;
1266 vcpu->arch.sie_block->gcr[14] = 0xC2000000UL;
1267 vcpu->arch.guest_fpregs.fpc = 0;
1268 asm volatile("lfpc %0" : : "Q" (vcpu->arch.guest_fpregs.fpc));
1269 vcpu->arch.sie_block->gbea = 1;
Christian Borntraeger672550f2014-02-10 15:32:19 +01001270 vcpu->arch.sie_block->pp = 0;
Dominik Dingel3c038e62013-10-07 17:11:48 +02001271 vcpu->arch.pfault_token = KVM_S390_PFAULT_TOKEN_INVALID;
1272 kvm_clear_async_pf_completion_queue(vcpu);
David Hildenbrand6352e4d2014-04-10 17:35:00 +02001273 if (!kvm_s390_user_cpu_state_ctrl(vcpu->kvm))
1274 kvm_s390_vcpu_stop(vcpu);
Jens Freimann2ed10cc2014-02-11 13:48:07 +01001275 kvm_s390_clear_local_irqs(vcpu);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001276}
1277
Dominik Dingel31928aa2014-12-04 15:47:07 +01001278void kvm_arch_vcpu_postcreate(struct kvm_vcpu *vcpu)
Marcelo Tosatti42897d82012-11-27 23:29:02 -02001279{
Jason J. Herne72f25022014-11-25 09:46:02 -05001280 mutex_lock(&vcpu->kvm->lock);
1281 vcpu->arch.sie_block->epoch = vcpu->kvm->arch.epoch;
1282 mutex_unlock(&vcpu->kvm->lock);
Dominik Dingeldafd0322014-12-02 16:53:21 +01001283 if (!kvm_is_ucontrol(vcpu->kvm))
1284 vcpu->arch.gmap = vcpu->kvm->arch.gmap;
Marcelo Tosatti42897d82012-11-27 23:29:02 -02001285}
1286
Tony Krowiak5102ee82014-06-27 14:46:01 -04001287static void kvm_s390_vcpu_crypto_setup(struct kvm_vcpu *vcpu)
1288{
Michael Mueller9d8d5782015-02-02 15:42:51 +01001289 if (!test_kvm_facility(vcpu->kvm, 76))
Tony Krowiak5102ee82014-06-27 14:46:01 -04001290 return;
1291
Tony Krowiaka374e892014-09-03 10:13:53 +02001292 vcpu->arch.sie_block->ecb3 &= ~(ECB3_AES | ECB3_DEA);
1293
1294 if (vcpu->kvm->arch.crypto.aes_kw)
1295 vcpu->arch.sie_block->ecb3 |= ECB3_AES;
1296 if (vcpu->kvm->arch.crypto.dea_kw)
1297 vcpu->arch.sie_block->ecb3 |= ECB3_DEA;
1298
Tony Krowiak5102ee82014-06-27 14:46:01 -04001299 vcpu->arch.sie_block->crycbd = vcpu->kvm->arch.crypto.crycbd;
1300}
1301
Dominik Dingelb31605c2014-03-25 13:47:11 +01001302void kvm_s390_vcpu_unsetup_cmma(struct kvm_vcpu *vcpu)
1303{
1304 free_page(vcpu->arch.sie_block->cbrlo);
1305 vcpu->arch.sie_block->cbrlo = 0;
1306}
1307
1308int kvm_s390_vcpu_setup_cmma(struct kvm_vcpu *vcpu)
1309{
1310 vcpu->arch.sie_block->cbrlo = get_zeroed_page(GFP_KERNEL);
1311 if (!vcpu->arch.sie_block->cbrlo)
1312 return -ENOMEM;
1313
1314 vcpu->arch.sie_block->ecb2 |= 0x80;
1315 vcpu->arch.sie_block->ecb2 &= ~0x08;
1316 return 0;
1317}
1318
Michael Mueller91520f12015-02-27 14:32:11 +01001319static void kvm_s390_vcpu_setup_model(struct kvm_vcpu *vcpu)
1320{
1321 struct kvm_s390_cpu_model *model = &vcpu->kvm->arch.model;
1322
1323 vcpu->arch.cpu_id = model->cpu_id;
1324 vcpu->arch.sie_block->ibc = model->ibc;
1325 vcpu->arch.sie_block->fac = (int) (long) model->fac->list;
1326}
1327
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001328int kvm_arch_vcpu_setup(struct kvm_vcpu *vcpu)
1329{
Dominik Dingelb31605c2014-03-25 13:47:11 +01001330 int rc = 0;
Konstantin Weitzb31288f2013-04-17 17:36:29 +02001331
Cornelia Huck9e6dabe2011-11-17 11:00:41 +01001332 atomic_set(&vcpu->arch.sie_block->cpuflags, CPUSTAT_ZARCH |
1333 CPUSTAT_SM |
Guenther Hutzla4a4f192015-03-31 14:39:49 +02001334 CPUSTAT_STOPPED);
1335
Guenther Hutzl53df84f2015-02-18 11:13:03 +01001336 if (test_kvm_facility(vcpu->kvm, 78))
1337 atomic_set_mask(CPUSTAT_GED2, &vcpu->arch.sie_block->cpuflags);
1338 else if (test_kvm_facility(vcpu->kvm, 8))
Guenther Hutzla4a4f192015-03-31 14:39:49 +02001339 atomic_set_mask(CPUSTAT_GED, &vcpu->arch.sie_block->cpuflags);
1340
Michael Mueller91520f12015-02-27 14:32:11 +01001341 kvm_s390_vcpu_setup_model(vcpu);
1342
Christian Borntraegerfc345312010-06-17 23:16:20 +02001343 vcpu->arch.sie_block->ecb = 6;
Michael Mueller9d8d5782015-02-02 15:42:51 +01001344 if (test_kvm_facility(vcpu->kvm, 50) && test_kvm_facility(vcpu->kvm, 73))
Michael Mueller7feb6bb2013-06-28 13:30:24 +02001345 vcpu->arch.sie_block->ecb |= 0x10;
1346
Christian Borntraeger69d0d3a2013-06-12 13:54:53 +02001347 vcpu->arch.sie_block->ecb2 = 8;
David Hildenbrandea5f4962014-10-14 15:29:30 +02001348 vcpu->arch.sie_block->eca = 0xC1002000U;
David Hildenbrand37c5f6c2015-05-06 13:18:59 +02001349 if (sclp.has_siif)
Heiko Carstens217a4402013-12-30 12:54:14 +01001350 vcpu->arch.sie_block->eca |= 1;
David Hildenbrand37c5f6c2015-05-06 13:18:59 +02001351 if (sclp.has_sigpif)
David Hildenbrandea5f4962014-10-14 15:29:30 +02001352 vcpu->arch.sie_block->eca |= 0x10000000U;
Michael Mueller18280d82015-03-16 16:05:41 +01001353 if (test_kvm_facility(vcpu->kvm, 129)) {
Eric Farman13211ea2014-04-30 13:39:46 -04001354 vcpu->arch.sie_block->eca |= 0x00020000;
1355 vcpu->arch.sie_block->ecd |= 0x20000000;
1356 }
Thomas Huth492d8642015-02-10 16:11:01 +01001357 vcpu->arch.sie_block->ictl |= ICTL_ISKE | ICTL_SSKE | ICTL_RRBE;
Matthew Rosato5a5e6532013-01-29 11:48:20 -05001358
Dominik Dingele6db1d62015-05-07 15:41:57 +02001359 if (vcpu->kvm->arch.use_cmma) {
Dominik Dingelb31605c2014-03-25 13:47:11 +01001360 rc = kvm_s390_vcpu_setup_cmma(vcpu);
1361 if (rc)
1362 return rc;
Konstantin Weitzb31288f2013-04-17 17:36:29 +02001363 }
David Hildenbrand0ac96caf2014-12-12 15:17:31 +01001364 hrtimer_init(&vcpu->arch.ckc_timer, CLOCK_MONOTONIC, HRTIMER_MODE_REL);
Christian Borntraegerca872302009-05-12 17:21:49 +02001365 vcpu->arch.ckc_timer.function = kvm_s390_idle_wakeup;
Michael Mueller9d8d5782015-02-02 15:42:51 +01001366
Tony Krowiak5102ee82014-06-27 14:46:01 -04001367 kvm_s390_vcpu_crypto_setup(vcpu);
1368
Dominik Dingelb31605c2014-03-25 13:47:11 +01001369 return rc;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001370}
1371
1372struct kvm_vcpu *kvm_arch_vcpu_create(struct kvm *kvm,
1373 unsigned int id)
1374{
Carsten Otte4d475552011-10-18 12:27:12 +02001375 struct kvm_vcpu *vcpu;
Michael Mueller7feb6bb2013-06-28 13:30:24 +02001376 struct sie_page *sie_page;
Carsten Otte4d475552011-10-18 12:27:12 +02001377 int rc = -EINVAL;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001378
Carsten Otte4d475552011-10-18 12:27:12 +02001379 if (id >= KVM_MAX_VCPUS)
1380 goto out;
1381
1382 rc = -ENOMEM;
1383
Michael Muellerb110fea2013-06-12 13:54:54 +02001384 vcpu = kmem_cache_zalloc(kvm_vcpu_cache, GFP_KERNEL);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001385 if (!vcpu)
Carsten Otte4d475552011-10-18 12:27:12 +02001386 goto out;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001387
Michael Mueller7feb6bb2013-06-28 13:30:24 +02001388 sie_page = (struct sie_page *) get_zeroed_page(GFP_KERNEL);
1389 if (!sie_page)
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001390 goto out_free_cpu;
1391
Michael Mueller7feb6bb2013-06-28 13:30:24 +02001392 vcpu->arch.sie_block = &sie_page->sie_block;
1393 vcpu->arch.sie_block->itdba = (unsigned long) &sie_page->itdb;
Eric Farman68c55752014-06-09 10:57:26 -04001394 vcpu->arch.host_vregs = &sie_page->vregs;
Michael Mueller7feb6bb2013-06-28 13:30:24 +02001395
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001396 vcpu->arch.sie_block->icpua = id;
Carsten Otte58f94602012-01-04 10:25:27 +01001397 if (!kvm_is_ucontrol(kvm)) {
1398 if (!kvm->arch.sca) {
1399 WARN_ON_ONCE(1);
1400 goto out_free_cpu;
1401 }
1402 if (!kvm->arch.sca->cpu[id].sda)
1403 kvm->arch.sca->cpu[id].sda =
1404 (__u64) vcpu->arch.sie_block;
1405 vcpu->arch.sie_block->scaoh =
1406 (__u32)(((__u64)kvm->arch.sca) >> 32);
1407 vcpu->arch.sie_block->scaol = (__u32)(__u64)kvm->arch.sca;
1408 set_bit(63 - id, (unsigned long *) &kvm->arch.sca->mcn);
1409 }
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001410
Carsten Otteba5c1e92008-03-25 18:47:26 +01001411 spin_lock_init(&vcpu->arch.local_int.lock);
Carsten Otteba5c1e92008-03-25 18:47:26 +01001412 vcpu->arch.local_int.float_int = &kvm->arch.float_int;
Christian Borntraegerd0321a22013-06-12 13:54:55 +02001413 vcpu->arch.local_int.wq = &vcpu->wq;
Christian Borntraeger5288fbf2008-03-25 18:47:31 +01001414 vcpu->arch.local_int.cpuflags = &vcpu->arch.sie_block->cpuflags;
Carsten Otteba5c1e92008-03-25 18:47:26 +01001415
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001416 rc = kvm_vcpu_init(vcpu, kvm, id);
1417 if (rc)
Wei Yongjun7b06bf22010-03-09 14:37:53 +08001418 goto out_free_sie_block;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001419 VM_EVENT(kvm, 3, "create cpu %d at %p, sie block at %p", id, vcpu,
1420 vcpu->arch.sie_block);
Cornelia Huckade38c32012-07-23 17:20:30 +02001421 trace_kvm_s390_create_vcpu(id, vcpu, vcpu->arch.sie_block);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001422
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001423 return vcpu;
Wei Yongjun7b06bf22010-03-09 14:37:53 +08001424out_free_sie_block:
1425 free_page((unsigned long)(vcpu->arch.sie_block));
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001426out_free_cpu:
Michael Muellerb110fea2013-06-12 13:54:54 +02001427 kmem_cache_free(kvm_vcpu_cache, vcpu);
Carsten Otte4d475552011-10-18 12:27:12 +02001428out:
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001429 return ERR_PTR(rc);
1430}
1431
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001432int kvm_arch_vcpu_runnable(struct kvm_vcpu *vcpu)
1433{
David Hildenbrand9a022062014-08-05 17:40:47 +02001434 return kvm_s390_vcpu_has_irq(vcpu, 0);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001435}
1436
Christian Borntraeger27406cd2015-04-14 12:17:34 +02001437void kvm_s390_vcpu_block(struct kvm_vcpu *vcpu)
Christian Borntraeger49b99e12013-05-17 14:41:35 +02001438{
1439 atomic_set_mask(PROG_BLOCK_SIE, &vcpu->arch.sie_block->prog20);
David Hildenbrand61a6df52015-05-12 08:41:40 +02001440 exit_sie(vcpu);
Christian Borntraeger49b99e12013-05-17 14:41:35 +02001441}
1442
Christian Borntraeger27406cd2015-04-14 12:17:34 +02001443void kvm_s390_vcpu_unblock(struct kvm_vcpu *vcpu)
Christian Borntraeger49b99e12013-05-17 14:41:35 +02001444{
1445 atomic_clear_mask(PROG_BLOCK_SIE, &vcpu->arch.sie_block->prog20);
1446}
1447
Christian Borntraeger8e236542015-04-09 13:49:04 +02001448static void kvm_s390_vcpu_request(struct kvm_vcpu *vcpu)
1449{
1450 atomic_set_mask(PROG_REQUEST, &vcpu->arch.sie_block->prog20);
David Hildenbrand61a6df52015-05-12 08:41:40 +02001451 exit_sie(vcpu);
Christian Borntraeger8e236542015-04-09 13:49:04 +02001452}
1453
1454static void kvm_s390_vcpu_request_handled(struct kvm_vcpu *vcpu)
1455{
1456 atomic_clear_mask(PROG_REQUEST, &vcpu->arch.sie_block->prog20);
1457}
1458
Christian Borntraeger49b99e12013-05-17 14:41:35 +02001459/*
1460 * Kick a guest cpu out of SIE and wait until SIE is not running.
1461 * If the CPU is not running (e.g. waiting as idle) the function will
1462 * return immediately. */
1463void exit_sie(struct kvm_vcpu *vcpu)
1464{
1465 atomic_set_mask(CPUSTAT_STOP_INT, &vcpu->arch.sie_block->cpuflags);
1466 while (vcpu->arch.sie_block->prog0c & PROG_IN_SIE)
1467 cpu_relax();
1468}
1469
Christian Borntraeger8e236542015-04-09 13:49:04 +02001470/* Kick a guest cpu out of SIE to process a request synchronously */
1471void kvm_s390_sync_request(int req, struct kvm_vcpu *vcpu)
Christian Borntraeger49b99e12013-05-17 14:41:35 +02001472{
Christian Borntraeger8e236542015-04-09 13:49:04 +02001473 kvm_make_request(req, vcpu);
1474 kvm_s390_vcpu_request(vcpu);
Christian Borntraeger49b99e12013-05-17 14:41:35 +02001475}
1476
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02001477static void kvm_gmap_notifier(struct gmap *gmap, unsigned long address)
1478{
1479 int i;
1480 struct kvm *kvm = gmap->private;
1481 struct kvm_vcpu *vcpu;
1482
1483 kvm_for_each_vcpu(i, vcpu, kvm) {
1484 /* match against both prefix pages */
Michael Muellerfda902c2014-05-13 16:58:30 +02001485 if (kvm_s390_get_prefix(vcpu) == (address & ~0x1000UL)) {
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02001486 VCPU_EVENT(vcpu, 2, "gmap notifier for %lx", address);
Christian Borntraeger8e236542015-04-09 13:49:04 +02001487 kvm_s390_sync_request(KVM_REQ_MMU_RELOAD, vcpu);
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02001488 }
1489 }
1490}
1491
Christoffer Dallb6d33832012-03-08 16:44:24 -05001492int kvm_arch_vcpu_should_kick(struct kvm_vcpu *vcpu)
1493{
1494 /* kvm common code refers to this, but never calls it */
1495 BUG();
1496 return 0;
1497}
1498
Carsten Otte14eebd92012-05-15 14:15:26 +02001499static int kvm_arch_vcpu_ioctl_get_one_reg(struct kvm_vcpu *vcpu,
1500 struct kvm_one_reg *reg)
1501{
1502 int r = -EINVAL;
1503
1504 switch (reg->id) {
Carsten Otte29b7c712012-05-15 14:15:27 +02001505 case KVM_REG_S390_TODPR:
1506 r = put_user(vcpu->arch.sie_block->todpr,
1507 (u32 __user *)reg->addr);
1508 break;
1509 case KVM_REG_S390_EPOCHDIFF:
1510 r = put_user(vcpu->arch.sie_block->epoch,
1511 (u64 __user *)reg->addr);
1512 break;
Jason J. herne46a6dd12012-05-15 14:15:28 +02001513 case KVM_REG_S390_CPU_TIMER:
1514 r = put_user(vcpu->arch.sie_block->cputm,
1515 (u64 __user *)reg->addr);
1516 break;
1517 case KVM_REG_S390_CLOCK_COMP:
1518 r = put_user(vcpu->arch.sie_block->ckc,
1519 (u64 __user *)reg->addr);
1520 break;
Dominik Dingel536336c2013-09-30 10:55:33 +02001521 case KVM_REG_S390_PFTOKEN:
1522 r = put_user(vcpu->arch.pfault_token,
1523 (u64 __user *)reg->addr);
1524 break;
1525 case KVM_REG_S390_PFCOMPARE:
1526 r = put_user(vcpu->arch.pfault_compare,
1527 (u64 __user *)reg->addr);
1528 break;
1529 case KVM_REG_S390_PFSELECT:
1530 r = put_user(vcpu->arch.pfault_select,
1531 (u64 __user *)reg->addr);
1532 break;
Christian Borntraeger672550f2014-02-10 15:32:19 +01001533 case KVM_REG_S390_PP:
1534 r = put_user(vcpu->arch.sie_block->pp,
1535 (u64 __user *)reg->addr);
1536 break;
Christian Borntraegerafa45ff2014-02-10 15:39:23 +01001537 case KVM_REG_S390_GBEA:
1538 r = put_user(vcpu->arch.sie_block->gbea,
1539 (u64 __user *)reg->addr);
1540 break;
Carsten Otte14eebd92012-05-15 14:15:26 +02001541 default:
1542 break;
1543 }
1544
1545 return r;
1546}
1547
1548static int kvm_arch_vcpu_ioctl_set_one_reg(struct kvm_vcpu *vcpu,
1549 struct kvm_one_reg *reg)
1550{
1551 int r = -EINVAL;
1552
1553 switch (reg->id) {
Carsten Otte29b7c712012-05-15 14:15:27 +02001554 case KVM_REG_S390_TODPR:
1555 r = get_user(vcpu->arch.sie_block->todpr,
1556 (u32 __user *)reg->addr);
1557 break;
1558 case KVM_REG_S390_EPOCHDIFF:
1559 r = get_user(vcpu->arch.sie_block->epoch,
1560 (u64 __user *)reg->addr);
1561 break;
Jason J. herne46a6dd12012-05-15 14:15:28 +02001562 case KVM_REG_S390_CPU_TIMER:
1563 r = get_user(vcpu->arch.sie_block->cputm,
1564 (u64 __user *)reg->addr);
1565 break;
1566 case KVM_REG_S390_CLOCK_COMP:
1567 r = get_user(vcpu->arch.sie_block->ckc,
1568 (u64 __user *)reg->addr);
1569 break;
Dominik Dingel536336c2013-09-30 10:55:33 +02001570 case KVM_REG_S390_PFTOKEN:
1571 r = get_user(vcpu->arch.pfault_token,
1572 (u64 __user *)reg->addr);
David Hildenbrand9fbd8082014-10-09 15:01:38 +02001573 if (vcpu->arch.pfault_token == KVM_S390_PFAULT_TOKEN_INVALID)
1574 kvm_clear_async_pf_completion_queue(vcpu);
Dominik Dingel536336c2013-09-30 10:55:33 +02001575 break;
1576 case KVM_REG_S390_PFCOMPARE:
1577 r = get_user(vcpu->arch.pfault_compare,
1578 (u64 __user *)reg->addr);
1579 break;
1580 case KVM_REG_S390_PFSELECT:
1581 r = get_user(vcpu->arch.pfault_select,
1582 (u64 __user *)reg->addr);
1583 break;
Christian Borntraeger672550f2014-02-10 15:32:19 +01001584 case KVM_REG_S390_PP:
1585 r = get_user(vcpu->arch.sie_block->pp,
1586 (u64 __user *)reg->addr);
1587 break;
Christian Borntraegerafa45ff2014-02-10 15:39:23 +01001588 case KVM_REG_S390_GBEA:
1589 r = get_user(vcpu->arch.sie_block->gbea,
1590 (u64 __user *)reg->addr);
1591 break;
Carsten Otte14eebd92012-05-15 14:15:26 +02001592 default:
1593 break;
1594 }
1595
1596 return r;
1597}
Christoffer Dallb6d33832012-03-08 16:44:24 -05001598
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001599static int kvm_arch_vcpu_ioctl_initial_reset(struct kvm_vcpu *vcpu)
1600{
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001601 kvm_s390_vcpu_initial_reset(vcpu);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001602 return 0;
1603}
1604
1605int kvm_arch_vcpu_ioctl_set_regs(struct kvm_vcpu *vcpu, struct kvm_regs *regs)
1606{
Christian Borntraeger5a32c1a2012-01-11 11:20:32 +01001607 memcpy(&vcpu->run->s.regs.gprs, &regs->gprs, sizeof(regs->gprs));
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001608 return 0;
1609}
1610
1611int kvm_arch_vcpu_ioctl_get_regs(struct kvm_vcpu *vcpu, struct kvm_regs *regs)
1612{
Christian Borntraeger5a32c1a2012-01-11 11:20:32 +01001613 memcpy(&regs->gprs, &vcpu->run->s.regs.gprs, sizeof(regs->gprs));
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001614 return 0;
1615}
1616
1617int kvm_arch_vcpu_ioctl_set_sregs(struct kvm_vcpu *vcpu,
1618 struct kvm_sregs *sregs)
1619{
Christian Borntraeger59674c12012-01-11 11:20:33 +01001620 memcpy(&vcpu->run->s.regs.acrs, &sregs->acrs, sizeof(sregs->acrs));
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001621 memcpy(&vcpu->arch.sie_block->gcr, &sregs->crs, sizeof(sregs->crs));
Christian Borntraeger59674c12012-01-11 11:20:33 +01001622 restore_access_regs(vcpu->run->s.regs.acrs);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001623 return 0;
1624}
1625
1626int kvm_arch_vcpu_ioctl_get_sregs(struct kvm_vcpu *vcpu,
1627 struct kvm_sregs *sregs)
1628{
Christian Borntraeger59674c12012-01-11 11:20:33 +01001629 memcpy(&sregs->acrs, &vcpu->run->s.regs.acrs, sizeof(sregs->acrs));
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001630 memcpy(&sregs->crs, &vcpu->arch.sie_block->gcr, sizeof(sregs->crs));
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001631 return 0;
1632}
1633
1634int kvm_arch_vcpu_ioctl_set_fpu(struct kvm_vcpu *vcpu, struct kvm_fpu *fpu)
1635{
Martin Schwidefsky4725c862013-10-15 16:08:34 +02001636 if (test_fp_ctl(fpu->fpc))
1637 return -EINVAL;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001638 memcpy(&vcpu->arch.guest_fpregs.fprs, &fpu->fprs, sizeof(fpu->fprs));
Martin Schwidefsky4725c862013-10-15 16:08:34 +02001639 vcpu->arch.guest_fpregs.fpc = fpu->fpc;
1640 restore_fp_ctl(&vcpu->arch.guest_fpregs.fpc);
1641 restore_fp_regs(vcpu->arch.guest_fpregs.fprs);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001642 return 0;
1643}
1644
1645int kvm_arch_vcpu_ioctl_get_fpu(struct kvm_vcpu *vcpu, struct kvm_fpu *fpu)
1646{
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001647 memcpy(&fpu->fprs, &vcpu->arch.guest_fpregs.fprs, sizeof(fpu->fprs));
1648 fpu->fpc = vcpu->arch.guest_fpregs.fpc;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001649 return 0;
1650}
1651
1652static int kvm_arch_vcpu_ioctl_set_initial_psw(struct kvm_vcpu *vcpu, psw_t psw)
1653{
1654 int rc = 0;
1655
David Hildenbrand7a42fdc2014-05-05 16:26:19 +02001656 if (!is_vcpu_stopped(vcpu))
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001657 rc = -EBUSY;
Carsten Otted7b0b5e2009-11-19 14:21:16 +01001658 else {
1659 vcpu->run->psw_mask = psw.mask;
1660 vcpu->run->psw_addr = psw.addr;
1661 }
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001662 return rc;
1663}
1664
1665int kvm_arch_vcpu_ioctl_translate(struct kvm_vcpu *vcpu,
1666 struct kvm_translation *tr)
1667{
1668 return -EINVAL; /* not implemented yet */
1669}
1670
David Hildenbrand27291e22014-01-23 12:26:52 +01001671#define VALID_GUESTDBG_FLAGS (KVM_GUESTDBG_SINGLESTEP | \
1672 KVM_GUESTDBG_USE_HW_BP | \
1673 KVM_GUESTDBG_ENABLE)
1674
Jan Kiszkad0bfb942008-12-15 13:52:10 +01001675int kvm_arch_vcpu_ioctl_set_guest_debug(struct kvm_vcpu *vcpu,
1676 struct kvm_guest_debug *dbg)
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001677{
David Hildenbrand27291e22014-01-23 12:26:52 +01001678 int rc = 0;
1679
1680 vcpu->guest_debug = 0;
1681 kvm_s390_clear_bp_data(vcpu);
1682
David Hildenbrand2de3bfc2014-05-20 17:25:20 +02001683 if (dbg->control & ~VALID_GUESTDBG_FLAGS)
David Hildenbrand27291e22014-01-23 12:26:52 +01001684 return -EINVAL;
1685
1686 if (dbg->control & KVM_GUESTDBG_ENABLE) {
1687 vcpu->guest_debug = dbg->control;
1688 /* enforce guest PER */
1689 atomic_set_mask(CPUSTAT_P, &vcpu->arch.sie_block->cpuflags);
1690
1691 if (dbg->control & KVM_GUESTDBG_USE_HW_BP)
1692 rc = kvm_s390_import_bp_data(vcpu, dbg);
1693 } else {
1694 atomic_clear_mask(CPUSTAT_P, &vcpu->arch.sie_block->cpuflags);
1695 vcpu->arch.guestdbg.last_bp = 0;
1696 }
1697
1698 if (rc) {
1699 vcpu->guest_debug = 0;
1700 kvm_s390_clear_bp_data(vcpu);
1701 atomic_clear_mask(CPUSTAT_P, &vcpu->arch.sie_block->cpuflags);
1702 }
1703
1704 return rc;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001705}
1706
Marcelo Tosatti62d9f0d2008-04-11 13:24:45 -03001707int kvm_arch_vcpu_ioctl_get_mpstate(struct kvm_vcpu *vcpu,
1708 struct kvm_mp_state *mp_state)
1709{
David Hildenbrand6352e4d2014-04-10 17:35:00 +02001710 /* CHECK_STOP and LOAD are not supported yet */
1711 return is_vcpu_stopped(vcpu) ? KVM_MP_STATE_STOPPED :
1712 KVM_MP_STATE_OPERATING;
Marcelo Tosatti62d9f0d2008-04-11 13:24:45 -03001713}
1714
1715int kvm_arch_vcpu_ioctl_set_mpstate(struct kvm_vcpu *vcpu,
1716 struct kvm_mp_state *mp_state)
1717{
David Hildenbrand6352e4d2014-04-10 17:35:00 +02001718 int rc = 0;
1719
1720 /* user space knows about this interface - let it control the state */
1721 vcpu->kvm->arch.user_cpu_state_ctrl = 1;
1722
1723 switch (mp_state->mp_state) {
1724 case KVM_MP_STATE_STOPPED:
1725 kvm_s390_vcpu_stop(vcpu);
1726 break;
1727 case KVM_MP_STATE_OPERATING:
1728 kvm_s390_vcpu_start(vcpu);
1729 break;
1730 case KVM_MP_STATE_LOAD:
1731 case KVM_MP_STATE_CHECK_STOP:
1732 /* fall through - CHECK_STOP and LOAD are not supported yet */
1733 default:
1734 rc = -ENXIO;
1735 }
1736
1737 return rc;
Marcelo Tosatti62d9f0d2008-04-11 13:24:45 -03001738}
1739
David Hildenbrand8ad35752014-03-14 11:00:21 +01001740static bool ibs_enabled(struct kvm_vcpu *vcpu)
1741{
1742 return atomic_read(&vcpu->arch.sie_block->cpuflags) & CPUSTAT_IBS;
1743}
1744
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02001745static int kvm_s390_handle_requests(struct kvm_vcpu *vcpu)
1746{
Christian Borntraeger785dbef2015-04-16 16:58:22 +02001747 if (!vcpu->requests)
1748 return 0;
David Hildenbrand8ad35752014-03-14 11:00:21 +01001749retry:
Christian Borntraeger8e236542015-04-09 13:49:04 +02001750 kvm_s390_vcpu_request_handled(vcpu);
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02001751 /*
1752 * We use MMU_RELOAD just to re-arm the ipte notifier for the
1753 * guest prefix page. gmap_ipte_notify will wait on the ptl lock.
1754 * This ensures that the ipte instruction for this request has
1755 * already finished. We might race against a second unmapper that
1756 * wants to set the blocking bit. Lets just retry the request loop.
1757 */
David Hildenbrand8ad35752014-03-14 11:00:21 +01001758 if (kvm_check_request(KVM_REQ_MMU_RELOAD, vcpu)) {
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02001759 int rc;
1760 rc = gmap_ipte_notify(vcpu->arch.gmap,
Michael Muellerfda902c2014-05-13 16:58:30 +02001761 kvm_s390_get_prefix(vcpu),
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02001762 PAGE_SIZE * 2);
1763 if (rc)
1764 return rc;
David Hildenbrand8ad35752014-03-14 11:00:21 +01001765 goto retry;
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02001766 }
David Hildenbrand8ad35752014-03-14 11:00:21 +01001767
David Hildenbrandd3d692c2014-07-29 08:53:36 +02001768 if (kvm_check_request(KVM_REQ_TLB_FLUSH, vcpu)) {
1769 vcpu->arch.sie_block->ihcpu = 0xffff;
1770 goto retry;
1771 }
1772
David Hildenbrand8ad35752014-03-14 11:00:21 +01001773 if (kvm_check_request(KVM_REQ_ENABLE_IBS, vcpu)) {
1774 if (!ibs_enabled(vcpu)) {
1775 trace_kvm_s390_enable_disable_ibs(vcpu->vcpu_id, 1);
1776 atomic_set_mask(CPUSTAT_IBS,
1777 &vcpu->arch.sie_block->cpuflags);
1778 }
1779 goto retry;
1780 }
1781
1782 if (kvm_check_request(KVM_REQ_DISABLE_IBS, vcpu)) {
1783 if (ibs_enabled(vcpu)) {
1784 trace_kvm_s390_enable_disable_ibs(vcpu->vcpu_id, 0);
1785 atomic_clear_mask(CPUSTAT_IBS,
1786 &vcpu->arch.sie_block->cpuflags);
1787 }
1788 goto retry;
1789 }
1790
David Hildenbrand0759d062014-05-13 16:54:32 +02001791 /* nothing to do, just clear the request */
1792 clear_bit(KVM_REQ_UNHALT, &vcpu->requests);
1793
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02001794 return 0;
1795}
1796
Thomas Huthfa576c52014-05-06 17:20:16 +02001797/**
1798 * kvm_arch_fault_in_page - fault-in guest page if necessary
1799 * @vcpu: The corresponding virtual cpu
1800 * @gpa: Guest physical address
1801 * @writable: Whether the page should be writable or not
1802 *
1803 * Make sure that a guest page has been faulted-in on the host.
1804 *
1805 * Return: Zero on success, negative error code otherwise.
1806 */
1807long kvm_arch_fault_in_page(struct kvm_vcpu *vcpu, gpa_t gpa, int writable)
Dominik Dingel24eb3a82013-06-17 16:25:18 +02001808{
Martin Schwidefsky527e30b2014-04-30 16:04:25 +02001809 return gmap_fault(vcpu->arch.gmap, gpa,
1810 writable ? FAULT_FLAG_WRITE : 0);
Dominik Dingel24eb3a82013-06-17 16:25:18 +02001811}
1812
Dominik Dingel3c038e62013-10-07 17:11:48 +02001813static void __kvm_inject_pfault_token(struct kvm_vcpu *vcpu, bool start_token,
1814 unsigned long token)
1815{
1816 struct kvm_s390_interrupt inti;
Jens Freimann383d0b02014-07-29 15:11:49 +02001817 struct kvm_s390_irq irq;
Dominik Dingel3c038e62013-10-07 17:11:48 +02001818
1819 if (start_token) {
Jens Freimann383d0b02014-07-29 15:11:49 +02001820 irq.u.ext.ext_params2 = token;
1821 irq.type = KVM_S390_INT_PFAULT_INIT;
1822 WARN_ON_ONCE(kvm_s390_inject_vcpu(vcpu, &irq));
Dominik Dingel3c038e62013-10-07 17:11:48 +02001823 } else {
1824 inti.type = KVM_S390_INT_PFAULT_DONE;
Jens Freimann383d0b02014-07-29 15:11:49 +02001825 inti.parm64 = token;
Dominik Dingel3c038e62013-10-07 17:11:48 +02001826 WARN_ON_ONCE(kvm_s390_inject_vm(vcpu->kvm, &inti));
1827 }
1828}
1829
1830void kvm_arch_async_page_not_present(struct kvm_vcpu *vcpu,
1831 struct kvm_async_pf *work)
1832{
1833 trace_kvm_s390_pfault_init(vcpu, work->arch.pfault_token);
1834 __kvm_inject_pfault_token(vcpu, true, work->arch.pfault_token);
1835}
1836
1837void kvm_arch_async_page_present(struct kvm_vcpu *vcpu,
1838 struct kvm_async_pf *work)
1839{
1840 trace_kvm_s390_pfault_done(vcpu, work->arch.pfault_token);
1841 __kvm_inject_pfault_token(vcpu, false, work->arch.pfault_token);
1842}
1843
1844void kvm_arch_async_page_ready(struct kvm_vcpu *vcpu,
1845 struct kvm_async_pf *work)
1846{
1847 /* s390 will always inject the page directly */
1848}
1849
1850bool kvm_arch_can_inject_async_page_present(struct kvm_vcpu *vcpu)
1851{
1852 /*
1853 * s390 will always inject the page directly,
1854 * but we still want check_async_completion to cleanup
1855 */
1856 return true;
1857}
1858
1859static int kvm_arch_setup_async_pf(struct kvm_vcpu *vcpu)
1860{
1861 hva_t hva;
1862 struct kvm_arch_async_pf arch;
1863 int rc;
1864
1865 if (vcpu->arch.pfault_token == KVM_S390_PFAULT_TOKEN_INVALID)
1866 return 0;
1867 if ((vcpu->arch.sie_block->gpsw.mask & vcpu->arch.pfault_select) !=
1868 vcpu->arch.pfault_compare)
1869 return 0;
1870 if (psw_extint_disabled(vcpu))
1871 return 0;
David Hildenbrand9a022062014-08-05 17:40:47 +02001872 if (kvm_s390_vcpu_has_irq(vcpu, 0))
Dominik Dingel3c038e62013-10-07 17:11:48 +02001873 return 0;
1874 if (!(vcpu->arch.sie_block->gcr[0] & 0x200ul))
1875 return 0;
1876 if (!vcpu->arch.gmap->pfault_enabled)
1877 return 0;
1878
Heiko Carstens81480cc2014-01-01 16:36:07 +01001879 hva = gfn_to_hva(vcpu->kvm, gpa_to_gfn(current->thread.gmap_addr));
1880 hva += current->thread.gmap_addr & ~PAGE_MASK;
1881 if (read_guest_real(vcpu, vcpu->arch.pfault_token, &arch.pfault_token, 8))
Dominik Dingel3c038e62013-10-07 17:11:48 +02001882 return 0;
1883
1884 rc = kvm_setup_async_pf(vcpu, current->thread.gmap_addr, hva, &arch);
1885 return rc;
1886}
1887
Thomas Huth3fb4c402013-09-12 10:33:43 +02001888static int vcpu_pre_run(struct kvm_vcpu *vcpu)
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001889{
Thomas Huth3fb4c402013-09-12 10:33:43 +02001890 int rc, cpuflags;
Carsten Ottee168bf82012-01-04 10:25:22 +01001891
Dominik Dingel3c038e62013-10-07 17:11:48 +02001892 /*
1893 * On s390 notifications for arriving pages will be delivered directly
1894 * to the guest but the house keeping for completed pfaults is
1895 * handled outside the worker.
1896 */
1897 kvm_check_async_pf_completion(vcpu);
1898
Christian Borntraeger5a32c1a2012-01-11 11:20:32 +01001899 memcpy(&vcpu->arch.sie_block->gg14, &vcpu->run->s.regs.gprs[14], 16);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001900
1901 if (need_resched())
1902 schedule();
1903
Martin Schwidefskyd3a73ac2014-04-15 12:55:07 +02001904 if (test_cpu_flag(CIF_MCCK_PENDING))
Christian Borntraeger71cde582008-05-21 13:37:34 +02001905 s390_handle_mcck();
1906
Jens Freimann79395032014-04-17 10:10:30 +02001907 if (!kvm_is_ucontrol(vcpu->kvm)) {
1908 rc = kvm_s390_deliver_pending_interrupts(vcpu);
1909 if (rc)
1910 return rc;
1911 }
Carsten Otte0ff31862008-05-21 13:37:37 +02001912
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02001913 rc = kvm_s390_handle_requests(vcpu);
1914 if (rc)
1915 return rc;
1916
David Hildenbrand27291e22014-01-23 12:26:52 +01001917 if (guestdbg_enabled(vcpu)) {
1918 kvm_s390_backup_guest_per_regs(vcpu);
1919 kvm_s390_patch_guest_per_regs(vcpu);
1920 }
1921
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001922 vcpu->arch.sie_block->icptcode = 0;
Thomas Huth3fb4c402013-09-12 10:33:43 +02001923 cpuflags = atomic_read(&vcpu->arch.sie_block->cpuflags);
1924 VCPU_EVENT(vcpu, 6, "entering sie flags %x", cpuflags);
1925 trace_kvm_s390_sie_enter(vcpu, cpuflags);
Dominik Dingel2b29a9f2013-07-26 15:04:00 +02001926
Thomas Huth3fb4c402013-09-12 10:33:43 +02001927 return 0;
1928}
1929
Thomas Huth492d8642015-02-10 16:11:01 +01001930static int vcpu_post_run_fault_in_sie(struct kvm_vcpu *vcpu)
1931{
1932 psw_t *psw = &vcpu->arch.sie_block->gpsw;
1933 u8 opcode;
1934 int rc;
1935
1936 VCPU_EVENT(vcpu, 3, "%s", "fault in sie instruction");
1937 trace_kvm_s390_sie_fault(vcpu);
1938
1939 /*
1940 * We want to inject an addressing exception, which is defined as a
1941 * suppressing or terminating exception. However, since we came here
1942 * by a DAT access exception, the PSW still points to the faulting
1943 * instruction since DAT exceptions are nullifying. So we've got
1944 * to look up the current opcode to get the length of the instruction
1945 * to be able to forward the PSW.
1946 */
Alexander Yarygin8ae04b82015-01-19 13:24:51 +03001947 rc = read_guest(vcpu, psw->addr, 0, &opcode, 1);
Thomas Huth492d8642015-02-10 16:11:01 +01001948 if (rc)
1949 return kvm_s390_inject_prog_cond(vcpu, rc);
1950 psw->addr = __rewind_psw(*psw, -insn_length(opcode));
1951
1952 return kvm_s390_inject_program_int(vcpu, PGM_ADDRESSING);
1953}
1954
Thomas Huth3fb4c402013-09-12 10:33:43 +02001955static int vcpu_post_run(struct kvm_vcpu *vcpu, int exit_reason)
1956{
Dominik Dingel24eb3a82013-06-17 16:25:18 +02001957 int rc = -1;
Dominik Dingel2b29a9f2013-07-26 15:04:00 +02001958
1959 VCPU_EVENT(vcpu, 6, "exit sie icptcode %d",
1960 vcpu->arch.sie_block->icptcode);
1961 trace_kvm_s390_sie_exit(vcpu, vcpu->arch.sie_block->icptcode);
1962
David Hildenbrand27291e22014-01-23 12:26:52 +01001963 if (guestdbg_enabled(vcpu))
1964 kvm_s390_restore_guest_per_regs(vcpu);
1965
Thomas Huth3fb4c402013-09-12 10:33:43 +02001966 if (exit_reason >= 0) {
Martin Schwidefsky7c470532013-05-17 14:41:37 +02001967 rc = 0;
Thomas Huth210b16072013-09-19 16:26:18 +02001968 } else if (kvm_is_ucontrol(vcpu->kvm)) {
1969 vcpu->run->exit_reason = KVM_EXIT_S390_UCONTROL;
1970 vcpu->run->s390_ucontrol.trans_exc_code =
1971 current->thread.gmap_addr;
1972 vcpu->run->s390_ucontrol.pgm_code = 0x10;
1973 rc = -EREMOTE;
Dominik Dingel24eb3a82013-06-17 16:25:18 +02001974
1975 } else if (current->thread.gmap_pfault) {
Dominik Dingel3c038e62013-10-07 17:11:48 +02001976 trace_kvm_s390_major_guest_pfault(vcpu);
Dominik Dingel24eb3a82013-06-17 16:25:18 +02001977 current->thread.gmap_pfault = 0;
Thomas Huthfa576c52014-05-06 17:20:16 +02001978 if (kvm_arch_setup_async_pf(vcpu)) {
Dominik Dingel24eb3a82013-06-17 16:25:18 +02001979 rc = 0;
Thomas Huthfa576c52014-05-06 17:20:16 +02001980 } else {
1981 gpa_t gpa = current->thread.gmap_addr;
1982 rc = kvm_arch_fault_in_page(vcpu, gpa, 1);
1983 }
Dominik Dingel24eb3a82013-06-17 16:25:18 +02001984 }
1985
Thomas Huth492d8642015-02-10 16:11:01 +01001986 if (rc == -1)
1987 rc = vcpu_post_run_fault_in_sie(vcpu);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001988
Christian Borntraeger5a32c1a2012-01-11 11:20:32 +01001989 memcpy(&vcpu->run->s.regs.gprs[14], &vcpu->arch.sie_block->gg14, 16);
Thomas Huth3fb4c402013-09-12 10:33:43 +02001990
Thomas Hutha76ccff2013-09-12 10:33:44 +02001991 if (rc == 0) {
1992 if (kvm_is_ucontrol(vcpu->kvm))
Christian Borntraeger2955c832014-03-06 16:01:38 +01001993 /* Don't exit for host interrupts. */
1994 rc = vcpu->arch.sie_block->icptcode ? -EOPNOTSUPP : 0;
Thomas Hutha76ccff2013-09-12 10:33:44 +02001995 else
1996 rc = kvm_handle_sie_intercept(vcpu);
1997 }
1998
Thomas Huth3fb4c402013-09-12 10:33:43 +02001999 return rc;
2000}
2001
2002static int __vcpu_run(struct kvm_vcpu *vcpu)
2003{
2004 int rc, exit_reason;
2005
Thomas Huth800c1062013-09-12 10:33:45 +02002006 /*
2007 * We try to hold kvm->srcu during most of vcpu_run (except when run-
2008 * ning the guest), so that memslots (and other stuff) are protected
2009 */
2010 vcpu->srcu_idx = srcu_read_lock(&vcpu->kvm->srcu);
2011
Thomas Hutha76ccff2013-09-12 10:33:44 +02002012 do {
2013 rc = vcpu_pre_run(vcpu);
2014 if (rc)
2015 break;
Thomas Huth3fb4c402013-09-12 10:33:43 +02002016
Thomas Huth800c1062013-09-12 10:33:45 +02002017 srcu_read_unlock(&vcpu->kvm->srcu, vcpu->srcu_idx);
Thomas Hutha76ccff2013-09-12 10:33:44 +02002018 /*
2019 * As PF_VCPU will be used in fault handler, between
2020 * guest_enter and guest_exit should be no uaccess.
2021 */
Christian Borntraeger0097d122015-04-30 13:43:30 +02002022 local_irq_disable();
2023 __kvm_guest_enter();
2024 local_irq_enable();
Thomas Hutha76ccff2013-09-12 10:33:44 +02002025 exit_reason = sie64a(vcpu->arch.sie_block,
2026 vcpu->run->s.regs.gprs);
Christian Borntraeger0097d122015-04-30 13:43:30 +02002027 local_irq_disable();
2028 __kvm_guest_exit();
2029 local_irq_enable();
Thomas Huth800c1062013-09-12 10:33:45 +02002030 vcpu->srcu_idx = srcu_read_lock(&vcpu->kvm->srcu);
Thomas Huth3fb4c402013-09-12 10:33:43 +02002031
Thomas Hutha76ccff2013-09-12 10:33:44 +02002032 rc = vcpu_post_run(vcpu, exit_reason);
David Hildenbrand27291e22014-01-23 12:26:52 +01002033 } while (!signal_pending(current) && !guestdbg_exit_pending(vcpu) && !rc);
Thomas Huth3fb4c402013-09-12 10:33:43 +02002034
Thomas Huth800c1062013-09-12 10:33:45 +02002035 srcu_read_unlock(&vcpu->kvm->srcu, vcpu->srcu_idx);
Carsten Ottee168bf82012-01-04 10:25:22 +01002036 return rc;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002037}
2038
David Hildenbrandb028ee32014-07-17 10:47:43 +02002039static void sync_regs(struct kvm_vcpu *vcpu, struct kvm_run *kvm_run)
2040{
2041 vcpu->arch.sie_block->gpsw.mask = kvm_run->psw_mask;
2042 vcpu->arch.sie_block->gpsw.addr = kvm_run->psw_addr;
2043 if (kvm_run->kvm_dirty_regs & KVM_SYNC_PREFIX)
2044 kvm_s390_set_prefix(vcpu, kvm_run->s.regs.prefix);
2045 if (kvm_run->kvm_dirty_regs & KVM_SYNC_CRS) {
2046 memcpy(&vcpu->arch.sie_block->gcr, &kvm_run->s.regs.crs, 128);
David Hildenbrandd3d692c2014-07-29 08:53:36 +02002047 /* some control register changes require a tlb flush */
2048 kvm_make_request(KVM_REQ_TLB_FLUSH, vcpu);
David Hildenbrandb028ee32014-07-17 10:47:43 +02002049 }
2050 if (kvm_run->kvm_dirty_regs & KVM_SYNC_ARCH0) {
2051 vcpu->arch.sie_block->cputm = kvm_run->s.regs.cputm;
2052 vcpu->arch.sie_block->ckc = kvm_run->s.regs.ckc;
2053 vcpu->arch.sie_block->todpr = kvm_run->s.regs.todpr;
2054 vcpu->arch.sie_block->pp = kvm_run->s.regs.pp;
2055 vcpu->arch.sie_block->gbea = kvm_run->s.regs.gbea;
2056 }
2057 if (kvm_run->kvm_dirty_regs & KVM_SYNC_PFAULT) {
2058 vcpu->arch.pfault_token = kvm_run->s.regs.pft;
2059 vcpu->arch.pfault_select = kvm_run->s.regs.pfs;
2060 vcpu->arch.pfault_compare = kvm_run->s.regs.pfc;
David Hildenbrand9fbd8082014-10-09 15:01:38 +02002061 if (vcpu->arch.pfault_token == KVM_S390_PFAULT_TOKEN_INVALID)
2062 kvm_clear_async_pf_completion_queue(vcpu);
David Hildenbrandb028ee32014-07-17 10:47:43 +02002063 }
2064 kvm_run->kvm_dirty_regs = 0;
2065}
2066
2067static void store_regs(struct kvm_vcpu *vcpu, struct kvm_run *kvm_run)
2068{
2069 kvm_run->psw_mask = vcpu->arch.sie_block->gpsw.mask;
2070 kvm_run->psw_addr = vcpu->arch.sie_block->gpsw.addr;
2071 kvm_run->s.regs.prefix = kvm_s390_get_prefix(vcpu);
2072 memcpy(&kvm_run->s.regs.crs, &vcpu->arch.sie_block->gcr, 128);
2073 kvm_run->s.regs.cputm = vcpu->arch.sie_block->cputm;
2074 kvm_run->s.regs.ckc = vcpu->arch.sie_block->ckc;
2075 kvm_run->s.regs.todpr = vcpu->arch.sie_block->todpr;
2076 kvm_run->s.regs.pp = vcpu->arch.sie_block->pp;
2077 kvm_run->s.regs.gbea = vcpu->arch.sie_block->gbea;
2078 kvm_run->s.regs.pft = vcpu->arch.pfault_token;
2079 kvm_run->s.regs.pfs = vcpu->arch.pfault_select;
2080 kvm_run->s.regs.pfc = vcpu->arch.pfault_compare;
2081}
2082
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002083int kvm_arch_vcpu_ioctl_run(struct kvm_vcpu *vcpu, struct kvm_run *kvm_run)
2084{
Christian Borntraeger8f2abe62008-03-25 18:47:23 +01002085 int rc;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002086 sigset_t sigsaved;
2087
David Hildenbrand27291e22014-01-23 12:26:52 +01002088 if (guestdbg_exit_pending(vcpu)) {
2089 kvm_s390_prepare_debug_exit(vcpu);
2090 return 0;
2091 }
2092
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002093 if (vcpu->sigset_active)
2094 sigprocmask(SIG_SETMASK, &vcpu->sigset, &sigsaved);
2095
David Hildenbrand6352e4d2014-04-10 17:35:00 +02002096 if (!kvm_s390_user_cpu_state_ctrl(vcpu->kvm)) {
2097 kvm_s390_vcpu_start(vcpu);
2098 } else if (is_vcpu_stopped(vcpu)) {
David Hildenbrandea2cdd22015-05-20 13:24:02 +02002099 pr_err_ratelimited("can't run stopped vcpu %d\n",
David Hildenbrand6352e4d2014-04-10 17:35:00 +02002100 vcpu->vcpu_id);
2101 return -EINVAL;
2102 }
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002103
David Hildenbrandb028ee32014-07-17 10:47:43 +02002104 sync_regs(vcpu, kvm_run);
Carsten Otted7b0b5e2009-11-19 14:21:16 +01002105
Heiko Carstensdab4079d2009-06-12 10:26:32 +02002106 might_fault();
Thomas Hutha76ccff2013-09-12 10:33:44 +02002107 rc = __vcpu_run(vcpu);
Christian Ehrhardt9ace9032009-05-20 15:34:55 +02002108
Christian Ehrhardtb1d16c42009-05-20 15:34:56 +02002109 if (signal_pending(current) && !rc) {
2110 kvm_run->exit_reason = KVM_EXIT_INTR;
Christian Borntraeger8f2abe62008-03-25 18:47:23 +01002111 rc = -EINTR;
Christian Ehrhardtb1d16c42009-05-20 15:34:56 +02002112 }
Christian Borntraeger8f2abe62008-03-25 18:47:23 +01002113
David Hildenbrand27291e22014-01-23 12:26:52 +01002114 if (guestdbg_exit_pending(vcpu) && !rc) {
2115 kvm_s390_prepare_debug_exit(vcpu);
2116 rc = 0;
2117 }
2118
Heiko Carstensb8e660b2010-02-26 22:37:41 +01002119 if (rc == -EOPNOTSUPP) {
Christian Borntraeger8f2abe62008-03-25 18:47:23 +01002120 /* intercept cannot be handled in-kernel, prepare kvm-run */
2121 kvm_run->exit_reason = KVM_EXIT_S390_SIEIC;
2122 kvm_run->s390_sieic.icptcode = vcpu->arch.sie_block->icptcode;
Christian Borntraeger8f2abe62008-03-25 18:47:23 +01002123 kvm_run->s390_sieic.ipa = vcpu->arch.sie_block->ipa;
2124 kvm_run->s390_sieic.ipb = vcpu->arch.sie_block->ipb;
2125 rc = 0;
2126 }
2127
2128 if (rc == -EREMOTE) {
2129 /* intercept was handled, but userspace support is needed
2130 * kvm_run has been prepared by the handler */
2131 rc = 0;
2132 }
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002133
David Hildenbrandb028ee32014-07-17 10:47:43 +02002134 store_regs(vcpu, kvm_run);
Carsten Otted7b0b5e2009-11-19 14:21:16 +01002135
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002136 if (vcpu->sigset_active)
2137 sigprocmask(SIG_SETMASK, &sigsaved, NULL);
2138
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002139 vcpu->stat.exit_userspace++;
Heiko Carstens7e8e6ab2008-04-04 15:12:35 +02002140 return rc;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002141}
2142
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002143/*
2144 * store status at address
2145 * we use have two special cases:
2146 * KVM_S390_STORE_STATUS_NOADDR: -> 0x1200 on 64 bit
2147 * KVM_S390_STORE_STATUS_PREFIXED: -> prefix
2148 */
Heiko Carstensd0bce602014-01-01 16:45:58 +01002149int kvm_s390_store_status_unloaded(struct kvm_vcpu *vcpu, unsigned long gpa)
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002150{
Carsten Otte092670c2011-07-24 10:48:22 +02002151 unsigned char archmode = 1;
Michael Muellerfda902c2014-05-13 16:58:30 +02002152 unsigned int px;
Thomas Huth178bd782013-11-13 20:28:18 +01002153 u64 clkcomp;
Heiko Carstensd0bce602014-01-01 16:45:58 +01002154 int rc;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002155
Heiko Carstensd0bce602014-01-01 16:45:58 +01002156 if (gpa == KVM_S390_STORE_STATUS_NOADDR) {
2157 if (write_guest_abs(vcpu, 163, &archmode, 1))
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002158 return -EFAULT;
Heiko Carstensd0bce602014-01-01 16:45:58 +01002159 gpa = SAVE_AREA_BASE;
2160 } else if (gpa == KVM_S390_STORE_STATUS_PREFIXED) {
2161 if (write_guest_real(vcpu, 163, &archmode, 1))
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002162 return -EFAULT;
Heiko Carstensd0bce602014-01-01 16:45:58 +01002163 gpa = kvm_s390_real_to_abs(vcpu, SAVE_AREA_BASE);
2164 }
2165 rc = write_guest_abs(vcpu, gpa + offsetof(struct save_area, fp_regs),
2166 vcpu->arch.guest_fpregs.fprs, 128);
2167 rc |= write_guest_abs(vcpu, gpa + offsetof(struct save_area, gp_regs),
2168 vcpu->run->s.regs.gprs, 128);
2169 rc |= write_guest_abs(vcpu, gpa + offsetof(struct save_area, psw),
2170 &vcpu->arch.sie_block->gpsw, 16);
Michael Muellerfda902c2014-05-13 16:58:30 +02002171 px = kvm_s390_get_prefix(vcpu);
Heiko Carstensd0bce602014-01-01 16:45:58 +01002172 rc |= write_guest_abs(vcpu, gpa + offsetof(struct save_area, pref_reg),
Michael Muellerfda902c2014-05-13 16:58:30 +02002173 &px, 4);
Heiko Carstensd0bce602014-01-01 16:45:58 +01002174 rc |= write_guest_abs(vcpu,
2175 gpa + offsetof(struct save_area, fp_ctrl_reg),
2176 &vcpu->arch.guest_fpregs.fpc, 4);
2177 rc |= write_guest_abs(vcpu, gpa + offsetof(struct save_area, tod_reg),
2178 &vcpu->arch.sie_block->todpr, 4);
2179 rc |= write_guest_abs(vcpu, gpa + offsetof(struct save_area, timer),
2180 &vcpu->arch.sie_block->cputm, 8);
Thomas Huth178bd782013-11-13 20:28:18 +01002181 clkcomp = vcpu->arch.sie_block->ckc >> 8;
Heiko Carstensd0bce602014-01-01 16:45:58 +01002182 rc |= write_guest_abs(vcpu, gpa + offsetof(struct save_area, clk_cmp),
2183 &clkcomp, 8);
2184 rc |= write_guest_abs(vcpu, gpa + offsetof(struct save_area, acc_regs),
2185 &vcpu->run->s.regs.acrs, 64);
2186 rc |= write_guest_abs(vcpu, gpa + offsetof(struct save_area, ctrl_regs),
2187 &vcpu->arch.sie_block->gcr, 128);
2188 return rc ? -EFAULT : 0;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002189}
2190
Thomas Huthe8798922013-11-06 15:46:33 +01002191int kvm_s390_vcpu_store_status(struct kvm_vcpu *vcpu, unsigned long addr)
2192{
2193 /*
2194 * The guest FPRS and ACRS are in the host FPRS/ACRS due to the lazy
2195 * copying in vcpu load/put. Lets update our copies before we save
2196 * it into the save area
2197 */
2198 save_fp_ctl(&vcpu->arch.guest_fpregs.fpc);
2199 save_fp_regs(vcpu->arch.guest_fpregs.fprs);
2200 save_access_regs(vcpu->run->s.regs.acrs);
2201
2202 return kvm_s390_store_status_unloaded(vcpu, addr);
2203}
2204
Eric Farmanbc17de72014-04-14 16:01:09 -04002205/*
2206 * store additional status at address
2207 */
2208int kvm_s390_store_adtl_status_unloaded(struct kvm_vcpu *vcpu,
2209 unsigned long gpa)
2210{
2211 /* Only bits 0-53 are used for address formation */
2212 if (!(gpa & ~0x3ff))
2213 return 0;
2214
2215 return write_guest_abs(vcpu, gpa & ~0x3ff,
2216 (void *)&vcpu->run->s.regs.vrs, 512);
2217}
2218
2219int kvm_s390_vcpu_store_adtl_status(struct kvm_vcpu *vcpu, unsigned long addr)
2220{
2221 if (!test_kvm_facility(vcpu->kvm, 129))
2222 return 0;
2223
2224 /*
2225 * The guest VXRS are in the host VXRs due to the lazy
2226 * copying in vcpu load/put. Let's update our copies before we save
2227 * it into the save area.
2228 */
2229 save_vx_regs((__vector128 *)&vcpu->run->s.regs.vrs);
2230
2231 return kvm_s390_store_adtl_status_unloaded(vcpu, addr);
2232}
2233
David Hildenbrand8ad35752014-03-14 11:00:21 +01002234static void __disable_ibs_on_vcpu(struct kvm_vcpu *vcpu)
2235{
2236 kvm_check_request(KVM_REQ_ENABLE_IBS, vcpu);
Christian Borntraeger8e236542015-04-09 13:49:04 +02002237 kvm_s390_sync_request(KVM_REQ_DISABLE_IBS, vcpu);
David Hildenbrand8ad35752014-03-14 11:00:21 +01002238}
2239
2240static void __disable_ibs_on_all_vcpus(struct kvm *kvm)
2241{
2242 unsigned int i;
2243 struct kvm_vcpu *vcpu;
2244
2245 kvm_for_each_vcpu(i, vcpu, kvm) {
2246 __disable_ibs_on_vcpu(vcpu);
2247 }
2248}
2249
2250static void __enable_ibs_on_vcpu(struct kvm_vcpu *vcpu)
2251{
2252 kvm_check_request(KVM_REQ_DISABLE_IBS, vcpu);
Christian Borntraeger8e236542015-04-09 13:49:04 +02002253 kvm_s390_sync_request(KVM_REQ_ENABLE_IBS, vcpu);
David Hildenbrand8ad35752014-03-14 11:00:21 +01002254}
2255
David Hildenbrand6852d7b2014-03-14 10:59:29 +01002256void kvm_s390_vcpu_start(struct kvm_vcpu *vcpu)
2257{
David Hildenbrand8ad35752014-03-14 11:00:21 +01002258 int i, online_vcpus, started_vcpus = 0;
2259
2260 if (!is_vcpu_stopped(vcpu))
2261 return;
2262
David Hildenbrand6852d7b2014-03-14 10:59:29 +01002263 trace_kvm_s390_vcpu_start_stop(vcpu->vcpu_id, 1);
David Hildenbrand8ad35752014-03-14 11:00:21 +01002264 /* Only one cpu at a time may enter/leave the STOPPED state. */
David Hildenbrand433b9ee2014-05-06 16:11:14 +02002265 spin_lock(&vcpu->kvm->arch.start_stop_lock);
David Hildenbrand8ad35752014-03-14 11:00:21 +01002266 online_vcpus = atomic_read(&vcpu->kvm->online_vcpus);
2267
2268 for (i = 0; i < online_vcpus; i++) {
2269 if (!is_vcpu_stopped(vcpu->kvm->vcpus[i]))
2270 started_vcpus++;
2271 }
2272
2273 if (started_vcpus == 0) {
2274 /* we're the only active VCPU -> speed it up */
2275 __enable_ibs_on_vcpu(vcpu);
2276 } else if (started_vcpus == 1) {
2277 /*
2278 * As we are starting a second VCPU, we have to disable
2279 * the IBS facility on all VCPUs to remove potentially
2280 * oustanding ENABLE requests.
2281 */
2282 __disable_ibs_on_all_vcpus(vcpu->kvm);
2283 }
2284
David Hildenbrand6852d7b2014-03-14 10:59:29 +01002285 atomic_clear_mask(CPUSTAT_STOPPED, &vcpu->arch.sie_block->cpuflags);
David Hildenbrand8ad35752014-03-14 11:00:21 +01002286 /*
2287 * Another VCPU might have used IBS while we were offline.
2288 * Let's play safe and flush the VCPU at startup.
2289 */
David Hildenbrandd3d692c2014-07-29 08:53:36 +02002290 kvm_make_request(KVM_REQ_TLB_FLUSH, vcpu);
David Hildenbrand433b9ee2014-05-06 16:11:14 +02002291 spin_unlock(&vcpu->kvm->arch.start_stop_lock);
David Hildenbrand8ad35752014-03-14 11:00:21 +01002292 return;
David Hildenbrand6852d7b2014-03-14 10:59:29 +01002293}
2294
2295void kvm_s390_vcpu_stop(struct kvm_vcpu *vcpu)
2296{
David Hildenbrand8ad35752014-03-14 11:00:21 +01002297 int i, online_vcpus, started_vcpus = 0;
2298 struct kvm_vcpu *started_vcpu = NULL;
2299
2300 if (is_vcpu_stopped(vcpu))
2301 return;
2302
David Hildenbrand6852d7b2014-03-14 10:59:29 +01002303 trace_kvm_s390_vcpu_start_stop(vcpu->vcpu_id, 0);
David Hildenbrand8ad35752014-03-14 11:00:21 +01002304 /* Only one cpu at a time may enter/leave the STOPPED state. */
David Hildenbrand433b9ee2014-05-06 16:11:14 +02002305 spin_lock(&vcpu->kvm->arch.start_stop_lock);
David Hildenbrand8ad35752014-03-14 11:00:21 +01002306 online_vcpus = atomic_read(&vcpu->kvm->online_vcpus);
2307
David Hildenbrand32f5ff632014-04-14 12:40:03 +02002308 /* SIGP STOP and SIGP STOP AND STORE STATUS has been fully processed */
David Hildenbrand6cddd432014-10-15 16:48:53 +02002309 kvm_s390_clear_stop_irq(vcpu);
David Hildenbrand32f5ff632014-04-14 12:40:03 +02002310
David Hildenbrand6cddd432014-10-15 16:48:53 +02002311 atomic_set_mask(CPUSTAT_STOPPED, &vcpu->arch.sie_block->cpuflags);
David Hildenbrand8ad35752014-03-14 11:00:21 +01002312 __disable_ibs_on_vcpu(vcpu);
2313
2314 for (i = 0; i < online_vcpus; i++) {
2315 if (!is_vcpu_stopped(vcpu->kvm->vcpus[i])) {
2316 started_vcpus++;
2317 started_vcpu = vcpu->kvm->vcpus[i];
2318 }
2319 }
2320
2321 if (started_vcpus == 1) {
2322 /*
2323 * As we only have one VCPU left, we want to enable the
2324 * IBS facility for that VCPU to speed it up.
2325 */
2326 __enable_ibs_on_vcpu(started_vcpu);
2327 }
2328
David Hildenbrand433b9ee2014-05-06 16:11:14 +02002329 spin_unlock(&vcpu->kvm->arch.start_stop_lock);
David Hildenbrand8ad35752014-03-14 11:00:21 +01002330 return;
David Hildenbrand6852d7b2014-03-14 10:59:29 +01002331}
2332
Cornelia Huckd6712df2012-12-20 15:32:11 +01002333static int kvm_vcpu_ioctl_enable_cap(struct kvm_vcpu *vcpu,
2334 struct kvm_enable_cap *cap)
2335{
2336 int r;
2337
2338 if (cap->flags)
2339 return -EINVAL;
2340
2341 switch (cap->cap) {
Cornelia Huckfa6b7fe2012-12-20 15:32:12 +01002342 case KVM_CAP_S390_CSS_SUPPORT:
2343 if (!vcpu->kvm->arch.css_support) {
2344 vcpu->kvm->arch.css_support = 1;
2345 trace_kvm_s390_enable_css(vcpu->kvm);
2346 }
2347 r = 0;
2348 break;
Cornelia Huckd6712df2012-12-20 15:32:11 +01002349 default:
2350 r = -EINVAL;
2351 break;
2352 }
2353 return r;
2354}
2355
Thomas Huth41408c282015-02-06 15:01:21 +01002356static long kvm_s390_guest_mem_op(struct kvm_vcpu *vcpu,
2357 struct kvm_s390_mem_op *mop)
2358{
2359 void __user *uaddr = (void __user *)mop->buf;
2360 void *tmpbuf = NULL;
2361 int r, srcu_idx;
2362 const u64 supported_flags = KVM_S390_MEMOP_F_INJECT_EXCEPTION
2363 | KVM_S390_MEMOP_F_CHECK_ONLY;
2364
2365 if (mop->flags & ~supported_flags)
2366 return -EINVAL;
2367
2368 if (mop->size > MEM_OP_MAX_SIZE)
2369 return -E2BIG;
2370
2371 if (!(mop->flags & KVM_S390_MEMOP_F_CHECK_ONLY)) {
2372 tmpbuf = vmalloc(mop->size);
2373 if (!tmpbuf)
2374 return -ENOMEM;
2375 }
2376
2377 srcu_idx = srcu_read_lock(&vcpu->kvm->srcu);
2378
2379 switch (mop->op) {
2380 case KVM_S390_MEMOP_LOGICAL_READ:
2381 if (mop->flags & KVM_S390_MEMOP_F_CHECK_ONLY) {
2382 r = check_gva_range(vcpu, mop->gaddr, mop->ar, mop->size, false);
2383 break;
2384 }
2385 r = read_guest(vcpu, mop->gaddr, mop->ar, tmpbuf, mop->size);
2386 if (r == 0) {
2387 if (copy_to_user(uaddr, tmpbuf, mop->size))
2388 r = -EFAULT;
2389 }
2390 break;
2391 case KVM_S390_MEMOP_LOGICAL_WRITE:
2392 if (mop->flags & KVM_S390_MEMOP_F_CHECK_ONLY) {
2393 r = check_gva_range(vcpu, mop->gaddr, mop->ar, mop->size, true);
2394 break;
2395 }
2396 if (copy_from_user(tmpbuf, uaddr, mop->size)) {
2397 r = -EFAULT;
2398 break;
2399 }
2400 r = write_guest(vcpu, mop->gaddr, mop->ar, tmpbuf, mop->size);
2401 break;
2402 default:
2403 r = -EINVAL;
2404 }
2405
2406 srcu_read_unlock(&vcpu->kvm->srcu, srcu_idx);
2407
2408 if (r > 0 && (mop->flags & KVM_S390_MEMOP_F_INJECT_EXCEPTION) != 0)
2409 kvm_s390_inject_prog_irq(vcpu, &vcpu->arch.pgm);
2410
2411 vfree(tmpbuf);
2412 return r;
2413}
2414
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002415long kvm_arch_vcpu_ioctl(struct file *filp,
2416 unsigned int ioctl, unsigned long arg)
2417{
2418 struct kvm_vcpu *vcpu = filp->private_data;
2419 void __user *argp = (void __user *)arg;
Thomas Huth800c1062013-09-12 10:33:45 +02002420 int idx;
Avi Kivitybc923cc2010-05-13 12:21:46 +03002421 long r;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002422
Avi Kivity93736622010-05-13 12:35:17 +03002423 switch (ioctl) {
Jens Freimann47b43c52014-11-11 20:57:06 +01002424 case KVM_S390_IRQ: {
2425 struct kvm_s390_irq s390irq;
2426
2427 r = -EFAULT;
2428 if (copy_from_user(&s390irq, argp, sizeof(s390irq)))
2429 break;
2430 r = kvm_s390_inject_vcpu(vcpu, &s390irq);
2431 break;
2432 }
Avi Kivity93736622010-05-13 12:35:17 +03002433 case KVM_S390_INTERRUPT: {
Carsten Otteba5c1e92008-03-25 18:47:26 +01002434 struct kvm_s390_interrupt s390int;
Jens Freimann383d0b02014-07-29 15:11:49 +02002435 struct kvm_s390_irq s390irq;
Carsten Otteba5c1e92008-03-25 18:47:26 +01002436
Avi Kivity93736622010-05-13 12:35:17 +03002437 r = -EFAULT;
Carsten Otteba5c1e92008-03-25 18:47:26 +01002438 if (copy_from_user(&s390int, argp, sizeof(s390int)))
Avi Kivity93736622010-05-13 12:35:17 +03002439 break;
Jens Freimann383d0b02014-07-29 15:11:49 +02002440 if (s390int_to_s390irq(&s390int, &s390irq))
2441 return -EINVAL;
2442 r = kvm_s390_inject_vcpu(vcpu, &s390irq);
Avi Kivity93736622010-05-13 12:35:17 +03002443 break;
Carsten Otteba5c1e92008-03-25 18:47:26 +01002444 }
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002445 case KVM_S390_STORE_STATUS:
Thomas Huth800c1062013-09-12 10:33:45 +02002446 idx = srcu_read_lock(&vcpu->kvm->srcu);
Avi Kivitybc923cc2010-05-13 12:21:46 +03002447 r = kvm_s390_vcpu_store_status(vcpu, arg);
Thomas Huth800c1062013-09-12 10:33:45 +02002448 srcu_read_unlock(&vcpu->kvm->srcu, idx);
Avi Kivitybc923cc2010-05-13 12:21:46 +03002449 break;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002450 case KVM_S390_SET_INITIAL_PSW: {
2451 psw_t psw;
2452
Avi Kivitybc923cc2010-05-13 12:21:46 +03002453 r = -EFAULT;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002454 if (copy_from_user(&psw, argp, sizeof(psw)))
Avi Kivitybc923cc2010-05-13 12:21:46 +03002455 break;
2456 r = kvm_arch_vcpu_ioctl_set_initial_psw(vcpu, psw);
2457 break;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002458 }
2459 case KVM_S390_INITIAL_RESET:
Avi Kivitybc923cc2010-05-13 12:21:46 +03002460 r = kvm_arch_vcpu_ioctl_initial_reset(vcpu);
2461 break;
Carsten Otte14eebd92012-05-15 14:15:26 +02002462 case KVM_SET_ONE_REG:
2463 case KVM_GET_ONE_REG: {
2464 struct kvm_one_reg reg;
2465 r = -EFAULT;
2466 if (copy_from_user(&reg, argp, sizeof(reg)))
2467 break;
2468 if (ioctl == KVM_SET_ONE_REG)
2469 r = kvm_arch_vcpu_ioctl_set_one_reg(vcpu, &reg);
2470 else
2471 r = kvm_arch_vcpu_ioctl_get_one_reg(vcpu, &reg);
2472 break;
2473 }
Carsten Otte27e03932012-01-04 10:25:21 +01002474#ifdef CONFIG_KVM_S390_UCONTROL
2475 case KVM_S390_UCAS_MAP: {
2476 struct kvm_s390_ucas_mapping ucasmap;
2477
2478 if (copy_from_user(&ucasmap, argp, sizeof(ucasmap))) {
2479 r = -EFAULT;
2480 break;
2481 }
2482
2483 if (!kvm_is_ucontrol(vcpu->kvm)) {
2484 r = -EINVAL;
2485 break;
2486 }
2487
2488 r = gmap_map_segment(vcpu->arch.gmap, ucasmap.user_addr,
2489 ucasmap.vcpu_addr, ucasmap.length);
2490 break;
2491 }
2492 case KVM_S390_UCAS_UNMAP: {
2493 struct kvm_s390_ucas_mapping ucasmap;
2494
2495 if (copy_from_user(&ucasmap, argp, sizeof(ucasmap))) {
2496 r = -EFAULT;
2497 break;
2498 }
2499
2500 if (!kvm_is_ucontrol(vcpu->kvm)) {
2501 r = -EINVAL;
2502 break;
2503 }
2504
2505 r = gmap_unmap_segment(vcpu->arch.gmap, ucasmap.vcpu_addr,
2506 ucasmap.length);
2507 break;
2508 }
2509#endif
Carsten Otteccc79102012-01-04 10:25:26 +01002510 case KVM_S390_VCPU_FAULT: {
Martin Schwidefsky527e30b2014-04-30 16:04:25 +02002511 r = gmap_fault(vcpu->arch.gmap, arg, 0);
Carsten Otteccc79102012-01-04 10:25:26 +01002512 break;
2513 }
Cornelia Huckd6712df2012-12-20 15:32:11 +01002514 case KVM_ENABLE_CAP:
2515 {
2516 struct kvm_enable_cap cap;
2517 r = -EFAULT;
2518 if (copy_from_user(&cap, argp, sizeof(cap)))
2519 break;
2520 r = kvm_vcpu_ioctl_enable_cap(vcpu, &cap);
2521 break;
2522 }
Thomas Huth41408c282015-02-06 15:01:21 +01002523 case KVM_S390_MEM_OP: {
2524 struct kvm_s390_mem_op mem_op;
2525
2526 if (copy_from_user(&mem_op, argp, sizeof(mem_op)) == 0)
2527 r = kvm_s390_guest_mem_op(vcpu, &mem_op);
2528 else
2529 r = -EFAULT;
2530 break;
2531 }
Jens Freimann816c7662014-11-24 17:13:46 +01002532 case KVM_S390_SET_IRQ_STATE: {
2533 struct kvm_s390_irq_state irq_state;
2534
2535 r = -EFAULT;
2536 if (copy_from_user(&irq_state, argp, sizeof(irq_state)))
2537 break;
2538 if (irq_state.len > VCPU_IRQS_MAX_BUF ||
2539 irq_state.len == 0 ||
2540 irq_state.len % sizeof(struct kvm_s390_irq) > 0) {
2541 r = -EINVAL;
2542 break;
2543 }
2544 r = kvm_s390_set_irq_state(vcpu,
2545 (void __user *) irq_state.buf,
2546 irq_state.len);
2547 break;
2548 }
2549 case KVM_S390_GET_IRQ_STATE: {
2550 struct kvm_s390_irq_state irq_state;
2551
2552 r = -EFAULT;
2553 if (copy_from_user(&irq_state, argp, sizeof(irq_state)))
2554 break;
2555 if (irq_state.len == 0) {
2556 r = -EINVAL;
2557 break;
2558 }
2559 r = kvm_s390_get_irq_state(vcpu,
2560 (__u8 __user *) irq_state.buf,
2561 irq_state.len);
2562 break;
2563 }
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002564 default:
Carsten Otte3e6afcf2012-01-04 10:25:30 +01002565 r = -ENOTTY;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002566 }
Avi Kivitybc923cc2010-05-13 12:21:46 +03002567 return r;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002568}
2569
Carsten Otte5b1c1492012-01-04 10:25:23 +01002570int kvm_arch_vcpu_fault(struct kvm_vcpu *vcpu, struct vm_fault *vmf)
2571{
2572#ifdef CONFIG_KVM_S390_UCONTROL
2573 if ((vmf->pgoff == KVM_S390_SIE_PAGE_OFFSET)
2574 && (kvm_is_ucontrol(vcpu->kvm))) {
2575 vmf->page = virt_to_page(vcpu->arch.sie_block);
2576 get_page(vmf->page);
2577 return 0;
2578 }
2579#endif
2580 return VM_FAULT_SIGBUS;
2581}
2582
Aneesh Kumar K.V55870272013-10-07 22:18:00 +05302583int kvm_arch_create_memslot(struct kvm *kvm, struct kvm_memory_slot *slot,
2584 unsigned long npages)
Takuya Yoshikawadb3fe4e2012-02-08 13:02:18 +09002585{
2586 return 0;
2587}
2588
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002589/* Section: memory related */
Marcelo Tosattif7784b82009-12-23 14:35:18 -02002590int kvm_arch_prepare_memory_region(struct kvm *kvm,
2591 struct kvm_memory_slot *memslot,
Paolo Bonzini09170a42015-05-18 13:59:39 +02002592 const struct kvm_userspace_memory_region *mem,
Takuya Yoshikawa7b6195a2013-02-27 19:44:34 +09002593 enum kvm_mr_change change)
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002594{
Nick Wangdd2887e2013-03-25 17:22:57 +01002595 /* A few sanity checks. We can have memory slots which have to be
2596 located/ended at a segment boundary (1MB). The memory in userland is
2597 ok to be fragmented into various different vmas. It is okay to mmap()
2598 and munmap() stuff in this slot after doing this call at any time */
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002599
Carsten Otte598841c2011-07-24 10:48:21 +02002600 if (mem->userspace_addr & 0xffffful)
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002601 return -EINVAL;
2602
Carsten Otte598841c2011-07-24 10:48:21 +02002603 if (mem->memory_size & 0xffffful)
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002604 return -EINVAL;
2605
Marcelo Tosattif7784b82009-12-23 14:35:18 -02002606 return 0;
2607}
2608
2609void kvm_arch_commit_memory_region(struct kvm *kvm,
Paolo Bonzini09170a42015-05-18 13:59:39 +02002610 const struct kvm_userspace_memory_region *mem,
Takuya Yoshikawa84826442013-02-27 19:45:25 +09002611 const struct kvm_memory_slot *old,
Paolo Bonzinif36f3f22015-05-18 13:20:23 +02002612 const struct kvm_memory_slot *new,
Takuya Yoshikawa84826442013-02-27 19:45:25 +09002613 enum kvm_mr_change change)
Marcelo Tosattif7784b82009-12-23 14:35:18 -02002614{
Carsten Ottef7850c92011-07-24 10:48:23 +02002615 int rc;
Marcelo Tosattif7784b82009-12-23 14:35:18 -02002616
Christian Borntraeger2cef4de2013-03-25 17:22:48 +01002617 /* If the basics of the memslot do not change, we do not want
2618 * to update the gmap. Every update causes several unnecessary
2619 * segment translation exceptions. This is usually handled just
2620 * fine by the normal fault handler + gmap, but it will also
2621 * cause faults on the prefix page of running guest CPUs.
2622 */
2623 if (old->userspace_addr == mem->userspace_addr &&
2624 old->base_gfn * PAGE_SIZE == mem->guest_phys_addr &&
2625 old->npages * PAGE_SIZE == mem->memory_size)
2626 return;
Carsten Otte598841c2011-07-24 10:48:21 +02002627
2628 rc = gmap_map_segment(kvm->arch.gmap, mem->userspace_addr,
2629 mem->guest_phys_addr, mem->memory_size);
2630 if (rc)
David Hildenbrandea2cdd22015-05-20 13:24:02 +02002631 pr_warn("failed to commit memory region\n");
Carsten Otte598841c2011-07-24 10:48:21 +02002632 return;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002633}
2634
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002635static int __init kvm_s390_init(void)
2636{
Michael Mueller9d8d5782015-02-02 15:42:51 +01002637 return kvm_init(NULL, sizeof(struct kvm_vcpu), 0, THIS_MODULE);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002638}
2639
2640static void __exit kvm_s390_exit(void)
2641{
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002642 kvm_exit();
2643}
2644
2645module_init(kvm_s390_init);
2646module_exit(kvm_s390_exit);
Cornelia Huck566af942013-05-27 18:42:33 +02002647
2648/*
2649 * Enable autoloading of the kvm module.
2650 * Note that we add the module alias here instead of virt/kvm/kvm_main.c
2651 * since x86 takes a different approach.
2652 */
2653#include <linux/miscdevice.h>
2654MODULE_ALIAS_MISCDEV(KVM_MINOR);
2655MODULE_ALIAS("devname:kvm");