blob: 3040b14751b8154e1bd9bc64f7fac964e5cc4d2c [file] [log] [blame]
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001/*
Heiko Carstensa53c8fa2012-07-20 11:15:04 +02002 * hosting zSeries kernel virtual machines
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003 *
Heiko Carstensa53c8fa2012-07-20 11:15:04 +02004 * Copyright IBM Corp. 2008, 2009
Heiko Carstensb0c632d2008-03-25 18:47:20 +01005 *
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License (version 2 only)
8 * as published by the Free Software Foundation.
9 *
10 * Author(s): Carsten Otte <cotte@de.ibm.com>
11 * Christian Borntraeger <borntraeger@de.ibm.com>
12 * Heiko Carstens <heiko.carstens@de.ibm.com>
Christian Ehrhardt628eb9b2009-05-25 13:40:51 +020013 * Christian Ehrhardt <ehrhardt@de.ibm.com>
Jason J. Herne15f36eb2012-08-02 10:10:17 -040014 * Jason J. Herne <jjherne@us.ibm.com>
Heiko Carstensb0c632d2008-03-25 18:47:20 +010015 */
16
17#include <linux/compiler.h>
18#include <linux/err.h>
19#include <linux/fs.h>
Christian Borntraegerca872302009-05-12 17:21:49 +020020#include <linux/hrtimer.h>
Heiko Carstensb0c632d2008-03-25 18:47:20 +010021#include <linux/init.h>
22#include <linux/kvm.h>
23#include <linux/kvm_host.h>
24#include <linux/module.h>
Tony Krowiaka374e892014-09-03 10:13:53 +020025#include <linux/random.h>
Heiko Carstensb0c632d2008-03-25 18:47:20 +010026#include <linux/slab.h>
Carsten Otteba5c1e92008-03-25 18:47:26 +010027#include <linux/timer.h>
Thomas Huth41408c282015-02-06 15:01:21 +010028#include <linux/vmalloc.h>
Heiko Carstenscbb870c2010-02-26 22:37:43 +010029#include <asm/asm-offsets.h>
Heiko Carstensb0c632d2008-03-25 18:47:20 +010030#include <asm/lowcore.h>
31#include <asm/pgtable.h>
Heiko Carstensf5daba12009-03-26 15:24:01 +010032#include <asm/nmi.h>
David Howellsa0616cd2012-03-28 18:30:02 +010033#include <asm/switch_to.h>
Jens Freimann6d3da242013-07-03 15:18:35 +020034#include <asm/isc.h>
Christian Borntraeger1526bf92012-05-15 14:15:25 +020035#include <asm/sclp.h>
Christian Borntraeger8f2abe62008-03-25 18:47:23 +010036#include "kvm-s390.h"
Heiko Carstensb0c632d2008-03-25 18:47:20 +010037#include "gaccess.h"
38
Cornelia Huck5786fff2012-07-23 17:20:29 +020039#define CREATE_TRACE_POINTS
40#include "trace.h"
Cornelia Huckade38c32012-07-23 17:20:30 +020041#include "trace-s390.h"
Cornelia Huck5786fff2012-07-23 17:20:29 +020042
Thomas Huth41408c282015-02-06 15:01:21 +010043#define MEM_OP_MAX_SIZE 65536 /* Maximum transfer size for KVM_S390_MEM_OP */
Jens Freimann816c7662014-11-24 17:13:46 +010044#define LOCAL_IRQS 32
45#define VCPU_IRQS_MAX_BUF (sizeof(struct kvm_s390_irq) * \
46 (KVM_MAX_VCPUS + LOCAL_IRQS))
Thomas Huth41408c282015-02-06 15:01:21 +010047
Heiko Carstensb0c632d2008-03-25 18:47:20 +010048#define VCPU_STAT(x) offsetof(struct kvm_vcpu, stat.x), KVM_STAT_VCPU
49
50struct kvm_stats_debugfs_item debugfs_entries[] = {
51 { "userspace_handled", VCPU_STAT(exit_userspace) },
Christian Borntraeger0eaeafa2008-05-07 09:22:53 +020052 { "exit_null", VCPU_STAT(exit_null) },
Christian Borntraeger8f2abe62008-03-25 18:47:23 +010053 { "exit_validity", VCPU_STAT(exit_validity) },
54 { "exit_stop_request", VCPU_STAT(exit_stop_request) },
55 { "exit_external_request", VCPU_STAT(exit_external_request) },
56 { "exit_external_interrupt", VCPU_STAT(exit_external_interrupt) },
Carsten Otteba5c1e92008-03-25 18:47:26 +010057 { "exit_instruction", VCPU_STAT(exit_instruction) },
58 { "exit_program_interruption", VCPU_STAT(exit_program_interruption) },
59 { "exit_instr_and_program_int", VCPU_STAT(exit_instr_and_program) },
Paolo Bonzinif7819512015-02-04 18:20:58 +010060 { "halt_successful_poll", VCPU_STAT(halt_successful_poll) },
David Hildenbrandce2e4f02014-07-11 10:00:43 +020061 { "halt_wakeup", VCPU_STAT(halt_wakeup) },
Christian Borntraegerf5e10b02008-07-25 15:52:44 +020062 { "instruction_lctlg", VCPU_STAT(instruction_lctlg) },
Carsten Otteba5c1e92008-03-25 18:47:26 +010063 { "instruction_lctl", VCPU_STAT(instruction_lctl) },
David Hildenbrandaba07502014-01-23 10:47:13 +010064 { "instruction_stctl", VCPU_STAT(instruction_stctl) },
65 { "instruction_stctg", VCPU_STAT(instruction_stctg) },
Carsten Otteba5c1e92008-03-25 18:47:26 +010066 { "deliver_emergency_signal", VCPU_STAT(deliver_emergency_signal) },
Christian Ehrhardt7697e71f2011-10-18 12:27:15 +020067 { "deliver_external_call", VCPU_STAT(deliver_external_call) },
Carsten Otteba5c1e92008-03-25 18:47:26 +010068 { "deliver_service_signal", VCPU_STAT(deliver_service_signal) },
69 { "deliver_virtio_interrupt", VCPU_STAT(deliver_virtio_interrupt) },
70 { "deliver_stop_signal", VCPU_STAT(deliver_stop_signal) },
71 { "deliver_prefix_signal", VCPU_STAT(deliver_prefix_signal) },
72 { "deliver_restart_signal", VCPU_STAT(deliver_restart_signal) },
73 { "deliver_program_interruption", VCPU_STAT(deliver_program_int) },
74 { "exit_wait_state", VCPU_STAT(exit_wait_state) },
Christian Borntraeger69d0d3a2013-06-12 13:54:53 +020075 { "instruction_pfmf", VCPU_STAT(instruction_pfmf) },
Christian Borntraeger453423d2008-03-25 18:47:29 +010076 { "instruction_stidp", VCPU_STAT(instruction_stidp) },
77 { "instruction_spx", VCPU_STAT(instruction_spx) },
78 { "instruction_stpx", VCPU_STAT(instruction_stpx) },
79 { "instruction_stap", VCPU_STAT(instruction_stap) },
80 { "instruction_storage_key", VCPU_STAT(instruction_storage_key) },
Heiko Carstens8a2422342014-01-10 14:33:28 +010081 { "instruction_ipte_interlock", VCPU_STAT(instruction_ipte_interlock) },
Christian Borntraeger453423d2008-03-25 18:47:29 +010082 { "instruction_stsch", VCPU_STAT(instruction_stsch) },
83 { "instruction_chsc", VCPU_STAT(instruction_chsc) },
Konstantin Weitzb31288f2013-04-17 17:36:29 +020084 { "instruction_essa", VCPU_STAT(instruction_essa) },
Christian Borntraeger453423d2008-03-25 18:47:29 +010085 { "instruction_stsi", VCPU_STAT(instruction_stsi) },
86 { "instruction_stfl", VCPU_STAT(instruction_stfl) },
Christian Borntraegerbb25b9b2011-07-24 10:48:17 +020087 { "instruction_tprot", VCPU_STAT(instruction_tprot) },
Christian Borntraeger5288fbf2008-03-25 18:47:31 +010088 { "instruction_sigp_sense", VCPU_STAT(instruction_sigp_sense) },
Cornelia Huckbd59d3a2011-11-17 11:00:42 +010089 { "instruction_sigp_sense_running", VCPU_STAT(instruction_sigp_sense_running) },
Christian Ehrhardt7697e71f2011-10-18 12:27:15 +020090 { "instruction_sigp_external_call", VCPU_STAT(instruction_sigp_external_call) },
Christian Borntraeger5288fbf2008-03-25 18:47:31 +010091 { "instruction_sigp_emergency", VCPU_STAT(instruction_sigp_emergency) },
David Hildenbrand42cb0c92014-05-23 12:25:11 +020092 { "instruction_sigp_cond_emergency", VCPU_STAT(instruction_sigp_cond_emergency) },
93 { "instruction_sigp_start", VCPU_STAT(instruction_sigp_start) },
Christian Borntraeger5288fbf2008-03-25 18:47:31 +010094 { "instruction_sigp_stop", VCPU_STAT(instruction_sigp_stop) },
David Hildenbrand42cb0c92014-05-23 12:25:11 +020095 { "instruction_sigp_stop_store_status", VCPU_STAT(instruction_sigp_stop_store_status) },
96 { "instruction_sigp_store_status", VCPU_STAT(instruction_sigp_store_status) },
Eric Farmancd7b4b62015-02-12 09:06:34 -050097 { "instruction_sigp_store_adtl_status", VCPU_STAT(instruction_sigp_store_adtl_status) },
Christian Borntraeger5288fbf2008-03-25 18:47:31 +010098 { "instruction_sigp_set_arch", VCPU_STAT(instruction_sigp_arch) },
99 { "instruction_sigp_set_prefix", VCPU_STAT(instruction_sigp_prefix) },
100 { "instruction_sigp_restart", VCPU_STAT(instruction_sigp_restart) },
David Hildenbrand42cb0c92014-05-23 12:25:11 +0200101 { "instruction_sigp_cpu_reset", VCPU_STAT(instruction_sigp_cpu_reset) },
102 { "instruction_sigp_init_cpu_reset", VCPU_STAT(instruction_sigp_init_cpu_reset) },
103 { "instruction_sigp_unknown", VCPU_STAT(instruction_sigp_unknown) },
Christian Borntraeger388186b2011-10-30 15:17:03 +0100104 { "diagnose_10", VCPU_STAT(diagnose_10) },
Christian Borntraegere28acfe2008-03-25 18:47:34 +0100105 { "diagnose_44", VCPU_STAT(diagnose_44) },
Konstantin Weitz41628d32012-04-25 15:30:38 +0200106 { "diagnose_9c", VCPU_STAT(diagnose_9c) },
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100107 { NULL }
108};
109
Michael Mueller9d8d5782015-02-02 15:42:51 +0100110/* upper facilities limit for kvm */
111unsigned long kvm_s390_fac_list_mask[] = {
Christian Borntraegera3ed8da2015-03-18 13:54:31 +0100112 0xffe6fffbfcfdfc40UL,
113 0x205c800000000000UL,
Michael Mueller9d8d5782015-02-02 15:42:51 +0100114};
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100115
Michael Mueller9d8d5782015-02-02 15:42:51 +0100116unsigned long kvm_s390_fac_list_mask_size(void)
Michael Mueller78c4b592013-07-26 15:04:04 +0200117{
Michael Mueller9d8d5782015-02-02 15:42:51 +0100118 BUILD_BUG_ON(ARRAY_SIZE(kvm_s390_fac_list_mask) > S390_ARCH_FAC_MASK_SIZE_U64);
119 return ARRAY_SIZE(kvm_s390_fac_list_mask);
Michael Mueller78c4b592013-07-26 15:04:04 +0200120}
121
Michael Mueller9d8d5782015-02-02 15:42:51 +0100122static struct gmap_notifier gmap_notifier;
123
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100124/* Section: not file related */
Radim Krčmář13a34e02014-08-28 15:13:03 +0200125int kvm_arch_hardware_enable(void)
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100126{
127 /* every s390 is virtualization enabled ;-) */
Alexander Graf10474ae2009-09-15 11:37:46 +0200128 return 0;
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100129}
130
Christian Borntraeger2c70fe42013-05-17 14:41:36 +0200131static void kvm_gmap_notifier(struct gmap *gmap, unsigned long address);
132
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100133int kvm_arch_hardware_setup(void)
134{
Christian Borntraeger2c70fe42013-05-17 14:41:36 +0200135 gmap_notifier.notifier_call = kvm_gmap_notifier;
136 gmap_register_ipte_notifier(&gmap_notifier);
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100137 return 0;
138}
139
140void kvm_arch_hardware_unsetup(void)
141{
Christian Borntraeger2c70fe42013-05-17 14:41:36 +0200142 gmap_unregister_ipte_notifier(&gmap_notifier);
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100143}
144
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100145int kvm_arch_init(void *opaque)
146{
Cornelia Huck84877d92014-09-02 10:27:35 +0100147 /* Register floating interrupt controller interface. */
148 return kvm_register_device_ops(&kvm_flic_ops, KVM_DEV_TYPE_FLIC);
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100149}
150
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100151/* Section: device related */
152long kvm_arch_dev_ioctl(struct file *filp,
153 unsigned int ioctl, unsigned long arg)
154{
155 if (ioctl == KVM_S390_ENABLE_SIE)
156 return s390_enable_sie();
157 return -EINVAL;
158}
159
Alexander Graf784aa3d2014-07-14 18:27:35 +0200160int kvm_vm_ioctl_check_extension(struct kvm *kvm, long ext)
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100161{
Carsten Otted7b0b5e2009-11-19 14:21:16 +0100162 int r;
163
Carsten Otte2bd0ac42008-07-25 15:49:13 +0200164 switch (ext) {
Carsten Otted7b0b5e2009-11-19 14:21:16 +0100165 case KVM_CAP_S390_PSW:
Christian Borntraegerb6cf8782011-09-20 17:07:29 +0200166 case KVM_CAP_S390_GMAP:
Christian Borntraeger52e16b12011-11-17 11:00:44 +0100167 case KVM_CAP_SYNC_MMU:
Carsten Otte1efd0f52012-01-04 10:25:29 +0100168#ifdef CONFIG_KVM_S390_UCONTROL
169 case KVM_CAP_S390_UCONTROL:
170#endif
Dominik Dingel3c038e62013-10-07 17:11:48 +0200171 case KVM_CAP_ASYNC_PF:
Christian Borntraeger60b413c2012-01-11 11:20:31 +0100172 case KVM_CAP_SYNC_REGS:
Carsten Otte14eebd92012-05-15 14:15:26 +0200173 case KVM_CAP_ONE_REG:
Cornelia Huckd6712df2012-12-20 15:32:11 +0100174 case KVM_CAP_ENABLE_CAP:
Cornelia Huckfa6b7fe2012-12-20 15:32:12 +0100175 case KVM_CAP_S390_CSS_SUPPORT:
Cornelia Huckebc32262014-05-09 15:00:46 +0200176 case KVM_CAP_IRQFD:
Cornelia Huck10ccaa12013-02-28 12:33:21 +0100177 case KVM_CAP_IOEVENTFD:
Jens Freimannc05c4182013-10-07 16:13:45 +0200178 case KVM_CAP_DEVICE_CTRL:
Cornelia Huckd938dc52013-10-23 18:26:34 +0200179 case KVM_CAP_ENABLE_CAP_VM:
Cornelia Huck78599d92014-07-15 09:54:39 +0200180 case KVM_CAP_S390_IRQCHIP:
Dominik Dingelf2061652014-04-09 13:13:00 +0200181 case KVM_CAP_VM_ATTRIBUTES:
David Hildenbrand6352e4d2014-04-10 17:35:00 +0200182 case KVM_CAP_MP_STATE:
Jens Freimann47b43c52014-11-11 20:57:06 +0100183 case KVM_CAP_S390_INJECT_IRQ:
David Hildenbrand2444b352014-10-09 14:10:13 +0200184 case KVM_CAP_S390_USER_SIGP:
Ekaterina Tumanovae44fc8c2015-01-30 16:55:56 +0100185 case KVM_CAP_S390_USER_STSI:
Jason J. Herne30ee2a92014-09-23 09:23:01 -0400186 case KVM_CAP_S390_SKEYS:
Jens Freimann816c7662014-11-24 17:13:46 +0100187 case KVM_CAP_S390_IRQ_STATE:
Carsten Otted7b0b5e2009-11-19 14:21:16 +0100188 r = 1;
189 break;
Thomas Huth41408c282015-02-06 15:01:21 +0100190 case KVM_CAP_S390_MEM_OP:
191 r = MEM_OP_MAX_SIZE;
192 break;
Christian Borntraegere726b1b2012-05-02 10:50:38 +0200193 case KVM_CAP_NR_VCPUS:
194 case KVM_CAP_MAX_VCPUS:
195 r = KVM_MAX_VCPUS;
196 break;
Nick Wange1e2e602013-03-25 17:22:58 +0100197 case KVM_CAP_NR_MEMSLOTS:
198 r = KVM_USER_MEM_SLOTS;
199 break;
Christian Borntraeger1526bf92012-05-15 14:15:25 +0200200 case KVM_CAP_S390_COW:
Martin Schwidefskyabf09be2012-11-07 13:17:37 +0100201 r = MACHINE_HAS_ESOP;
Christian Borntraeger1526bf92012-05-15 14:15:25 +0200202 break;
Eric Farman68c55752014-06-09 10:57:26 -0400203 case KVM_CAP_S390_VECTOR_REGISTERS:
204 r = MACHINE_HAS_VX;
205 break;
Carsten Otte2bd0ac42008-07-25 15:49:13 +0200206 default:
Carsten Otted7b0b5e2009-11-19 14:21:16 +0100207 r = 0;
Carsten Otte2bd0ac42008-07-25 15:49:13 +0200208 }
Carsten Otted7b0b5e2009-11-19 14:21:16 +0100209 return r;
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100210}
211
Jason J. Herne15f36eb2012-08-02 10:10:17 -0400212static void kvm_s390_sync_dirty_log(struct kvm *kvm,
213 struct kvm_memory_slot *memslot)
214{
215 gfn_t cur_gfn, last_gfn;
216 unsigned long address;
217 struct gmap *gmap = kvm->arch.gmap;
218
219 down_read(&gmap->mm->mmap_sem);
220 /* Loop over all guest pages */
221 last_gfn = memslot->base_gfn + memslot->npages;
222 for (cur_gfn = memslot->base_gfn; cur_gfn <= last_gfn; cur_gfn++) {
223 address = gfn_to_hva_memslot(memslot, cur_gfn);
224
225 if (gmap_test_and_clear_dirty(address, gmap))
226 mark_page_dirty(kvm, cur_gfn);
227 }
228 up_read(&gmap->mm->mmap_sem);
229}
230
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100231/* Section: vm related */
232/*
233 * Get (and clear) the dirty memory log for a memory slot.
234 */
235int kvm_vm_ioctl_get_dirty_log(struct kvm *kvm,
236 struct kvm_dirty_log *log)
237{
Jason J. Herne15f36eb2012-08-02 10:10:17 -0400238 int r;
239 unsigned long n;
240 struct kvm_memory_slot *memslot;
241 int is_dirty = 0;
242
243 mutex_lock(&kvm->slots_lock);
244
245 r = -EINVAL;
246 if (log->slot >= KVM_USER_MEM_SLOTS)
247 goto out;
248
249 memslot = id_to_memslot(kvm->memslots, log->slot);
250 r = -ENOENT;
251 if (!memslot->dirty_bitmap)
252 goto out;
253
254 kvm_s390_sync_dirty_log(kvm, memslot);
255 r = kvm_get_dirty_log(kvm, log, &is_dirty);
256 if (r)
257 goto out;
258
259 /* Clear the dirty log */
260 if (is_dirty) {
261 n = kvm_dirty_bitmap_bytes(memslot);
262 memset(memslot->dirty_bitmap, 0, n);
263 }
264 r = 0;
265out:
266 mutex_unlock(&kvm->slots_lock);
267 return r;
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100268}
269
Cornelia Huckd938dc52013-10-23 18:26:34 +0200270static int kvm_vm_ioctl_enable_cap(struct kvm *kvm, struct kvm_enable_cap *cap)
271{
272 int r;
273
274 if (cap->flags)
275 return -EINVAL;
276
277 switch (cap->cap) {
Cornelia Huck84223592013-07-15 13:36:01 +0200278 case KVM_CAP_S390_IRQCHIP:
279 kvm->arch.use_irqchip = 1;
280 r = 0;
281 break;
David Hildenbrand2444b352014-10-09 14:10:13 +0200282 case KVM_CAP_S390_USER_SIGP:
283 kvm->arch.user_sigp = 1;
284 r = 0;
285 break;
Eric Farman68c55752014-06-09 10:57:26 -0400286 case KVM_CAP_S390_VECTOR_REGISTERS:
Michael Mueller18280d82015-03-16 16:05:41 +0100287 if (MACHINE_HAS_VX) {
288 set_kvm_facility(kvm->arch.model.fac->mask, 129);
289 set_kvm_facility(kvm->arch.model.fac->list, 129);
290 r = 0;
291 } else
292 r = -EINVAL;
Eric Farman68c55752014-06-09 10:57:26 -0400293 break;
Ekaterina Tumanovae44fc8c2015-01-30 16:55:56 +0100294 case KVM_CAP_S390_USER_STSI:
295 kvm->arch.user_stsi = 1;
296 r = 0;
297 break;
Cornelia Huckd938dc52013-10-23 18:26:34 +0200298 default:
299 r = -EINVAL;
300 break;
301 }
302 return r;
303}
304
Dominik Dingel8c0a7ce2014-10-31 14:10:41 +0100305static int kvm_s390_get_mem_control(struct kvm *kvm, struct kvm_device_attr *attr)
306{
307 int ret;
308
309 switch (attr->attr) {
310 case KVM_S390_VM_MEM_LIMIT_SIZE:
311 ret = 0;
312 if (put_user(kvm->arch.gmap->asce_end, (u64 __user *)attr->addr))
313 ret = -EFAULT;
314 break;
315 default:
316 ret = -ENXIO;
317 break;
318 }
319 return ret;
320}
321
322static int kvm_s390_set_mem_control(struct kvm *kvm, struct kvm_device_attr *attr)
Dominik Dingel4f718ea2014-04-09 13:13:00 +0200323{
324 int ret;
325 unsigned int idx;
326 switch (attr->attr) {
327 case KVM_S390_VM_MEM_ENABLE_CMMA:
328 ret = -EBUSY;
329 mutex_lock(&kvm->lock);
330 if (atomic_read(&kvm->online_vcpus) == 0) {
331 kvm->arch.use_cmma = 1;
332 ret = 0;
333 }
334 mutex_unlock(&kvm->lock);
335 break;
336 case KVM_S390_VM_MEM_CLR_CMMA:
337 mutex_lock(&kvm->lock);
338 idx = srcu_read_lock(&kvm->srcu);
Dominik Dingela13cff32014-10-23 12:07:14 +0200339 s390_reset_cmma(kvm->arch.gmap->mm);
Dominik Dingel4f718ea2014-04-09 13:13:00 +0200340 srcu_read_unlock(&kvm->srcu, idx);
341 mutex_unlock(&kvm->lock);
342 ret = 0;
343 break;
Dominik Dingel8c0a7ce2014-10-31 14:10:41 +0100344 case KVM_S390_VM_MEM_LIMIT_SIZE: {
345 unsigned long new_limit;
346
347 if (kvm_is_ucontrol(kvm))
348 return -EINVAL;
349
350 if (get_user(new_limit, (u64 __user *)attr->addr))
351 return -EFAULT;
352
353 if (new_limit > kvm->arch.gmap->asce_end)
354 return -E2BIG;
355
356 ret = -EBUSY;
357 mutex_lock(&kvm->lock);
358 if (atomic_read(&kvm->online_vcpus) == 0) {
359 /* gmap_alloc will round the limit up */
360 struct gmap *new = gmap_alloc(current->mm, new_limit);
361
362 if (!new) {
363 ret = -ENOMEM;
364 } else {
365 gmap_free(kvm->arch.gmap);
366 new->private = kvm;
367 kvm->arch.gmap = new;
368 ret = 0;
369 }
370 }
371 mutex_unlock(&kvm->lock);
372 break;
373 }
Dominik Dingel4f718ea2014-04-09 13:13:00 +0200374 default:
375 ret = -ENXIO;
376 break;
377 }
378 return ret;
379}
380
Tony Krowiaka374e892014-09-03 10:13:53 +0200381static void kvm_s390_vcpu_crypto_setup(struct kvm_vcpu *vcpu);
382
383static int kvm_s390_vm_set_crypto(struct kvm *kvm, struct kvm_device_attr *attr)
384{
385 struct kvm_vcpu *vcpu;
386 int i;
387
Michael Mueller9d8d5782015-02-02 15:42:51 +0100388 if (!test_kvm_facility(kvm, 76))
Tony Krowiaka374e892014-09-03 10:13:53 +0200389 return -EINVAL;
390
391 mutex_lock(&kvm->lock);
392 switch (attr->attr) {
393 case KVM_S390_VM_CRYPTO_ENABLE_AES_KW:
394 get_random_bytes(
395 kvm->arch.crypto.crycb->aes_wrapping_key_mask,
396 sizeof(kvm->arch.crypto.crycb->aes_wrapping_key_mask));
397 kvm->arch.crypto.aes_kw = 1;
398 break;
399 case KVM_S390_VM_CRYPTO_ENABLE_DEA_KW:
400 get_random_bytes(
401 kvm->arch.crypto.crycb->dea_wrapping_key_mask,
402 sizeof(kvm->arch.crypto.crycb->dea_wrapping_key_mask));
403 kvm->arch.crypto.dea_kw = 1;
404 break;
405 case KVM_S390_VM_CRYPTO_DISABLE_AES_KW:
406 kvm->arch.crypto.aes_kw = 0;
407 memset(kvm->arch.crypto.crycb->aes_wrapping_key_mask, 0,
408 sizeof(kvm->arch.crypto.crycb->aes_wrapping_key_mask));
409 break;
410 case KVM_S390_VM_CRYPTO_DISABLE_DEA_KW:
411 kvm->arch.crypto.dea_kw = 0;
412 memset(kvm->arch.crypto.crycb->dea_wrapping_key_mask, 0,
413 sizeof(kvm->arch.crypto.crycb->dea_wrapping_key_mask));
414 break;
415 default:
416 mutex_unlock(&kvm->lock);
417 return -ENXIO;
418 }
419
420 kvm_for_each_vcpu(i, vcpu, kvm) {
421 kvm_s390_vcpu_crypto_setup(vcpu);
422 exit_sie(vcpu);
423 }
424 mutex_unlock(&kvm->lock);
425 return 0;
426}
427
Jason J. Herne72f25022014-11-25 09:46:02 -0500428static int kvm_s390_set_tod_high(struct kvm *kvm, struct kvm_device_attr *attr)
429{
430 u8 gtod_high;
431
432 if (copy_from_user(&gtod_high, (void __user *)attr->addr,
433 sizeof(gtod_high)))
434 return -EFAULT;
435
436 if (gtod_high != 0)
437 return -EINVAL;
438
439 return 0;
440}
441
442static int kvm_s390_set_tod_low(struct kvm *kvm, struct kvm_device_attr *attr)
443{
444 struct kvm_vcpu *cur_vcpu;
445 unsigned int vcpu_idx;
446 u64 host_tod, gtod;
447 int r;
448
449 if (copy_from_user(&gtod, (void __user *)attr->addr, sizeof(gtod)))
450 return -EFAULT;
451
452 r = store_tod_clock(&host_tod);
453 if (r)
454 return r;
455
456 mutex_lock(&kvm->lock);
457 kvm->arch.epoch = gtod - host_tod;
458 kvm_for_each_vcpu(vcpu_idx, cur_vcpu, kvm) {
459 cur_vcpu->arch.sie_block->epoch = kvm->arch.epoch;
460 exit_sie(cur_vcpu);
461 }
462 mutex_unlock(&kvm->lock);
463 return 0;
464}
465
466static int kvm_s390_set_tod(struct kvm *kvm, struct kvm_device_attr *attr)
467{
468 int ret;
469
470 if (attr->flags)
471 return -EINVAL;
472
473 switch (attr->attr) {
474 case KVM_S390_VM_TOD_HIGH:
475 ret = kvm_s390_set_tod_high(kvm, attr);
476 break;
477 case KVM_S390_VM_TOD_LOW:
478 ret = kvm_s390_set_tod_low(kvm, attr);
479 break;
480 default:
481 ret = -ENXIO;
482 break;
483 }
484 return ret;
485}
486
487static int kvm_s390_get_tod_high(struct kvm *kvm, struct kvm_device_attr *attr)
488{
489 u8 gtod_high = 0;
490
491 if (copy_to_user((void __user *)attr->addr, &gtod_high,
492 sizeof(gtod_high)))
493 return -EFAULT;
494
495 return 0;
496}
497
498static int kvm_s390_get_tod_low(struct kvm *kvm, struct kvm_device_attr *attr)
499{
500 u64 host_tod, gtod;
501 int r;
502
503 r = store_tod_clock(&host_tod);
504 if (r)
505 return r;
506
507 gtod = host_tod + kvm->arch.epoch;
508 if (copy_to_user((void __user *)attr->addr, &gtod, sizeof(gtod)))
509 return -EFAULT;
510
511 return 0;
512}
513
514static int kvm_s390_get_tod(struct kvm *kvm, struct kvm_device_attr *attr)
515{
516 int ret;
517
518 if (attr->flags)
519 return -EINVAL;
520
521 switch (attr->attr) {
522 case KVM_S390_VM_TOD_HIGH:
523 ret = kvm_s390_get_tod_high(kvm, attr);
524 break;
525 case KVM_S390_VM_TOD_LOW:
526 ret = kvm_s390_get_tod_low(kvm, attr);
527 break;
528 default:
529 ret = -ENXIO;
530 break;
531 }
532 return ret;
533}
534
Michael Mueller658b6ed2015-02-02 15:49:35 +0100535static int kvm_s390_set_processor(struct kvm *kvm, struct kvm_device_attr *attr)
536{
537 struct kvm_s390_vm_cpu_processor *proc;
538 int ret = 0;
539
540 mutex_lock(&kvm->lock);
541 if (atomic_read(&kvm->online_vcpus)) {
542 ret = -EBUSY;
543 goto out;
544 }
545 proc = kzalloc(sizeof(*proc), GFP_KERNEL);
546 if (!proc) {
547 ret = -ENOMEM;
548 goto out;
549 }
550 if (!copy_from_user(proc, (void __user *)attr->addr,
551 sizeof(*proc))) {
552 memcpy(&kvm->arch.model.cpu_id, &proc->cpuid,
553 sizeof(struct cpuid));
554 kvm->arch.model.ibc = proc->ibc;
Michael Mueller981467c2015-02-24 13:51:04 +0100555 memcpy(kvm->arch.model.fac->list, proc->fac_list,
Michael Mueller658b6ed2015-02-02 15:49:35 +0100556 S390_ARCH_FAC_LIST_SIZE_BYTE);
557 } else
558 ret = -EFAULT;
559 kfree(proc);
560out:
561 mutex_unlock(&kvm->lock);
562 return ret;
563}
564
565static int kvm_s390_set_cpu_model(struct kvm *kvm, struct kvm_device_attr *attr)
566{
567 int ret = -ENXIO;
568
569 switch (attr->attr) {
570 case KVM_S390_VM_CPU_PROCESSOR:
571 ret = kvm_s390_set_processor(kvm, attr);
572 break;
573 }
574 return ret;
575}
576
577static int kvm_s390_get_processor(struct kvm *kvm, struct kvm_device_attr *attr)
578{
579 struct kvm_s390_vm_cpu_processor *proc;
580 int ret = 0;
581
582 proc = kzalloc(sizeof(*proc), GFP_KERNEL);
583 if (!proc) {
584 ret = -ENOMEM;
585 goto out;
586 }
587 memcpy(&proc->cpuid, &kvm->arch.model.cpu_id, sizeof(struct cpuid));
588 proc->ibc = kvm->arch.model.ibc;
Michael Mueller981467c2015-02-24 13:51:04 +0100589 memcpy(&proc->fac_list, kvm->arch.model.fac->list, S390_ARCH_FAC_LIST_SIZE_BYTE);
Michael Mueller658b6ed2015-02-02 15:49:35 +0100590 if (copy_to_user((void __user *)attr->addr, proc, sizeof(*proc)))
591 ret = -EFAULT;
592 kfree(proc);
593out:
594 return ret;
595}
596
597static int kvm_s390_get_machine(struct kvm *kvm, struct kvm_device_attr *attr)
598{
599 struct kvm_s390_vm_cpu_machine *mach;
600 int ret = 0;
601
602 mach = kzalloc(sizeof(*mach), GFP_KERNEL);
603 if (!mach) {
604 ret = -ENOMEM;
605 goto out;
606 }
607 get_cpu_id((struct cpuid *) &mach->cpuid);
608 mach->ibc = sclp_get_ibc();
Michael Mueller981467c2015-02-24 13:51:04 +0100609 memcpy(&mach->fac_mask, kvm->arch.model.fac->mask,
610 S390_ARCH_FAC_LIST_SIZE_BYTE);
Michael Mueller658b6ed2015-02-02 15:49:35 +0100611 memcpy((unsigned long *)&mach->fac_list, S390_lowcore.stfle_fac_list,
Michael Mueller94422ee2015-02-26 12:12:40 +0100612 S390_ARCH_FAC_LIST_SIZE_BYTE);
Michael Mueller658b6ed2015-02-02 15:49:35 +0100613 if (copy_to_user((void __user *)attr->addr, mach, sizeof(*mach)))
614 ret = -EFAULT;
615 kfree(mach);
616out:
617 return ret;
618}
619
620static int kvm_s390_get_cpu_model(struct kvm *kvm, struct kvm_device_attr *attr)
621{
622 int ret = -ENXIO;
623
624 switch (attr->attr) {
625 case KVM_S390_VM_CPU_PROCESSOR:
626 ret = kvm_s390_get_processor(kvm, attr);
627 break;
628 case KVM_S390_VM_CPU_MACHINE:
629 ret = kvm_s390_get_machine(kvm, attr);
630 break;
631 }
632 return ret;
633}
634
Dominik Dingelf2061652014-04-09 13:13:00 +0200635static int kvm_s390_vm_set_attr(struct kvm *kvm, struct kvm_device_attr *attr)
636{
637 int ret;
638
639 switch (attr->group) {
Dominik Dingel4f718ea2014-04-09 13:13:00 +0200640 case KVM_S390_VM_MEM_CTRL:
Dominik Dingel8c0a7ce2014-10-31 14:10:41 +0100641 ret = kvm_s390_set_mem_control(kvm, attr);
Dominik Dingel4f718ea2014-04-09 13:13:00 +0200642 break;
Jason J. Herne72f25022014-11-25 09:46:02 -0500643 case KVM_S390_VM_TOD:
644 ret = kvm_s390_set_tod(kvm, attr);
645 break;
Michael Mueller658b6ed2015-02-02 15:49:35 +0100646 case KVM_S390_VM_CPU_MODEL:
647 ret = kvm_s390_set_cpu_model(kvm, attr);
648 break;
Tony Krowiaka374e892014-09-03 10:13:53 +0200649 case KVM_S390_VM_CRYPTO:
650 ret = kvm_s390_vm_set_crypto(kvm, attr);
651 break;
Dominik Dingelf2061652014-04-09 13:13:00 +0200652 default:
653 ret = -ENXIO;
654 break;
655 }
656
657 return ret;
658}
659
660static int kvm_s390_vm_get_attr(struct kvm *kvm, struct kvm_device_attr *attr)
661{
Dominik Dingel8c0a7ce2014-10-31 14:10:41 +0100662 int ret;
663
664 switch (attr->group) {
665 case KVM_S390_VM_MEM_CTRL:
666 ret = kvm_s390_get_mem_control(kvm, attr);
667 break;
Jason J. Herne72f25022014-11-25 09:46:02 -0500668 case KVM_S390_VM_TOD:
669 ret = kvm_s390_get_tod(kvm, attr);
670 break;
Michael Mueller658b6ed2015-02-02 15:49:35 +0100671 case KVM_S390_VM_CPU_MODEL:
672 ret = kvm_s390_get_cpu_model(kvm, attr);
673 break;
Dominik Dingel8c0a7ce2014-10-31 14:10:41 +0100674 default:
675 ret = -ENXIO;
676 break;
677 }
678
679 return ret;
Dominik Dingelf2061652014-04-09 13:13:00 +0200680}
681
682static int kvm_s390_vm_has_attr(struct kvm *kvm, struct kvm_device_attr *attr)
683{
684 int ret;
685
686 switch (attr->group) {
Dominik Dingel4f718ea2014-04-09 13:13:00 +0200687 case KVM_S390_VM_MEM_CTRL:
688 switch (attr->attr) {
689 case KVM_S390_VM_MEM_ENABLE_CMMA:
690 case KVM_S390_VM_MEM_CLR_CMMA:
Dominik Dingel8c0a7ce2014-10-31 14:10:41 +0100691 case KVM_S390_VM_MEM_LIMIT_SIZE:
Dominik Dingel4f718ea2014-04-09 13:13:00 +0200692 ret = 0;
693 break;
694 default:
695 ret = -ENXIO;
696 break;
697 }
698 break;
Jason J. Herne72f25022014-11-25 09:46:02 -0500699 case KVM_S390_VM_TOD:
700 switch (attr->attr) {
701 case KVM_S390_VM_TOD_LOW:
702 case KVM_S390_VM_TOD_HIGH:
703 ret = 0;
704 break;
705 default:
706 ret = -ENXIO;
707 break;
708 }
709 break;
Michael Mueller658b6ed2015-02-02 15:49:35 +0100710 case KVM_S390_VM_CPU_MODEL:
711 switch (attr->attr) {
712 case KVM_S390_VM_CPU_PROCESSOR:
713 case KVM_S390_VM_CPU_MACHINE:
714 ret = 0;
715 break;
716 default:
717 ret = -ENXIO;
718 break;
719 }
720 break;
Tony Krowiaka374e892014-09-03 10:13:53 +0200721 case KVM_S390_VM_CRYPTO:
722 switch (attr->attr) {
723 case KVM_S390_VM_CRYPTO_ENABLE_AES_KW:
724 case KVM_S390_VM_CRYPTO_ENABLE_DEA_KW:
725 case KVM_S390_VM_CRYPTO_DISABLE_AES_KW:
726 case KVM_S390_VM_CRYPTO_DISABLE_DEA_KW:
727 ret = 0;
728 break;
729 default:
730 ret = -ENXIO;
731 break;
732 }
733 break;
Dominik Dingelf2061652014-04-09 13:13:00 +0200734 default:
735 ret = -ENXIO;
736 break;
737 }
738
739 return ret;
740}
741
Jason J. Herne30ee2a92014-09-23 09:23:01 -0400742static long kvm_s390_get_skeys(struct kvm *kvm, struct kvm_s390_skeys *args)
743{
744 uint8_t *keys;
745 uint64_t hva;
746 unsigned long curkey;
747 int i, r = 0;
748
749 if (args->flags != 0)
750 return -EINVAL;
751
752 /* Is this guest using storage keys? */
753 if (!mm_use_skey(current->mm))
754 return KVM_S390_GET_SKEYS_NONE;
755
756 /* Enforce sane limit on memory allocation */
757 if (args->count < 1 || args->count > KVM_S390_SKEYS_MAX)
758 return -EINVAL;
759
760 keys = kmalloc_array(args->count, sizeof(uint8_t),
761 GFP_KERNEL | __GFP_NOWARN);
762 if (!keys)
763 keys = vmalloc(sizeof(uint8_t) * args->count);
764 if (!keys)
765 return -ENOMEM;
766
767 for (i = 0; i < args->count; i++) {
768 hva = gfn_to_hva(kvm, args->start_gfn + i);
769 if (kvm_is_error_hva(hva)) {
770 r = -EFAULT;
771 goto out;
772 }
773
774 curkey = get_guest_storage_key(current->mm, hva);
775 if (IS_ERR_VALUE(curkey)) {
776 r = curkey;
777 goto out;
778 }
779 keys[i] = curkey;
780 }
781
782 r = copy_to_user((uint8_t __user *)args->skeydata_addr, keys,
783 sizeof(uint8_t) * args->count);
784 if (r)
785 r = -EFAULT;
786out:
787 kvfree(keys);
788 return r;
789}
790
791static long kvm_s390_set_skeys(struct kvm *kvm, struct kvm_s390_skeys *args)
792{
793 uint8_t *keys;
794 uint64_t hva;
795 int i, r = 0;
796
797 if (args->flags != 0)
798 return -EINVAL;
799
800 /* Enforce sane limit on memory allocation */
801 if (args->count < 1 || args->count > KVM_S390_SKEYS_MAX)
802 return -EINVAL;
803
804 keys = kmalloc_array(args->count, sizeof(uint8_t),
805 GFP_KERNEL | __GFP_NOWARN);
806 if (!keys)
807 keys = vmalloc(sizeof(uint8_t) * args->count);
808 if (!keys)
809 return -ENOMEM;
810
811 r = copy_from_user(keys, (uint8_t __user *)args->skeydata_addr,
812 sizeof(uint8_t) * args->count);
813 if (r) {
814 r = -EFAULT;
815 goto out;
816 }
817
818 /* Enable storage key handling for the guest */
819 s390_enable_skey();
820
821 for (i = 0; i < args->count; i++) {
822 hva = gfn_to_hva(kvm, args->start_gfn + i);
823 if (kvm_is_error_hva(hva)) {
824 r = -EFAULT;
825 goto out;
826 }
827
828 /* Lowest order bit is reserved */
829 if (keys[i] & 0x01) {
830 r = -EINVAL;
831 goto out;
832 }
833
834 r = set_guest_storage_key(current->mm, hva,
835 (unsigned long)keys[i], 0);
836 if (r)
837 goto out;
838 }
839out:
840 kvfree(keys);
841 return r;
842}
843
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100844long kvm_arch_vm_ioctl(struct file *filp,
845 unsigned int ioctl, unsigned long arg)
846{
847 struct kvm *kvm = filp->private_data;
848 void __user *argp = (void __user *)arg;
Dominik Dingelf2061652014-04-09 13:13:00 +0200849 struct kvm_device_attr attr;
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100850 int r;
851
852 switch (ioctl) {
Carsten Otteba5c1e92008-03-25 18:47:26 +0100853 case KVM_S390_INTERRUPT: {
854 struct kvm_s390_interrupt s390int;
855
856 r = -EFAULT;
857 if (copy_from_user(&s390int, argp, sizeof(s390int)))
858 break;
859 r = kvm_s390_inject_vm(kvm, &s390int);
860 break;
861 }
Cornelia Huckd938dc52013-10-23 18:26:34 +0200862 case KVM_ENABLE_CAP: {
863 struct kvm_enable_cap cap;
864 r = -EFAULT;
865 if (copy_from_user(&cap, argp, sizeof(cap)))
866 break;
867 r = kvm_vm_ioctl_enable_cap(kvm, &cap);
868 break;
869 }
Cornelia Huck84223592013-07-15 13:36:01 +0200870 case KVM_CREATE_IRQCHIP: {
871 struct kvm_irq_routing_entry routing;
872
873 r = -EINVAL;
874 if (kvm->arch.use_irqchip) {
875 /* Set up dummy routing. */
876 memset(&routing, 0, sizeof(routing));
877 kvm_set_irq_routing(kvm, &routing, 0, 0);
878 r = 0;
879 }
880 break;
881 }
Dominik Dingelf2061652014-04-09 13:13:00 +0200882 case KVM_SET_DEVICE_ATTR: {
883 r = -EFAULT;
884 if (copy_from_user(&attr, (void __user *)arg, sizeof(attr)))
885 break;
886 r = kvm_s390_vm_set_attr(kvm, &attr);
887 break;
888 }
889 case KVM_GET_DEVICE_ATTR: {
890 r = -EFAULT;
891 if (copy_from_user(&attr, (void __user *)arg, sizeof(attr)))
892 break;
893 r = kvm_s390_vm_get_attr(kvm, &attr);
894 break;
895 }
896 case KVM_HAS_DEVICE_ATTR: {
897 r = -EFAULT;
898 if (copy_from_user(&attr, (void __user *)arg, sizeof(attr)))
899 break;
900 r = kvm_s390_vm_has_attr(kvm, &attr);
901 break;
902 }
Jason J. Herne30ee2a92014-09-23 09:23:01 -0400903 case KVM_S390_GET_SKEYS: {
904 struct kvm_s390_skeys args;
905
906 r = -EFAULT;
907 if (copy_from_user(&args, argp,
908 sizeof(struct kvm_s390_skeys)))
909 break;
910 r = kvm_s390_get_skeys(kvm, &args);
911 break;
912 }
913 case KVM_S390_SET_SKEYS: {
914 struct kvm_s390_skeys args;
915
916 r = -EFAULT;
917 if (copy_from_user(&args, argp,
918 sizeof(struct kvm_s390_skeys)))
919 break;
920 r = kvm_s390_set_skeys(kvm, &args);
921 break;
922 }
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100923 default:
Avi Kivity367e1312009-08-26 14:57:07 +0300924 r = -ENOTTY;
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100925 }
926
927 return r;
928}
929
Tony Krowiak45c9b472015-01-13 11:33:26 -0500930static int kvm_s390_query_ap_config(u8 *config)
931{
932 u32 fcn_code = 0x04000000UL;
Christian Borntraeger86044c82015-02-26 13:53:47 +0100933 u32 cc = 0;
Tony Krowiak45c9b472015-01-13 11:33:26 -0500934
Christian Borntraeger86044c82015-02-26 13:53:47 +0100935 memset(config, 0, 128);
Tony Krowiak45c9b472015-01-13 11:33:26 -0500936 asm volatile(
937 "lgr 0,%1\n"
938 "lgr 2,%2\n"
939 ".long 0xb2af0000\n" /* PQAP(QCI) */
Christian Borntraeger86044c82015-02-26 13:53:47 +0100940 "0: ipm %0\n"
Tony Krowiak45c9b472015-01-13 11:33:26 -0500941 "srl %0,28\n"
Christian Borntraeger86044c82015-02-26 13:53:47 +0100942 "1:\n"
943 EX_TABLE(0b, 1b)
944 : "+r" (cc)
Tony Krowiak45c9b472015-01-13 11:33:26 -0500945 : "r" (fcn_code), "r" (config)
946 : "cc", "0", "2", "memory"
947 );
948
949 return cc;
950}
951
952static int kvm_s390_apxa_installed(void)
953{
954 u8 config[128];
955 int cc;
956
957 if (test_facility(2) && test_facility(12)) {
958 cc = kvm_s390_query_ap_config(config);
959
960 if (cc)
961 pr_err("PQAP(QCI) failed with cc=%d", cc);
962 else
963 return config[0] & 0x40;
964 }
965
966 return 0;
967}
968
969static void kvm_s390_set_crycb_format(struct kvm *kvm)
970{
971 kvm->arch.crypto.crycbd = (__u32)(unsigned long) kvm->arch.crypto.crycb;
972
973 if (kvm_s390_apxa_installed())
974 kvm->arch.crypto.crycbd |= CRYCB_FORMAT2;
975 else
976 kvm->arch.crypto.crycbd |= CRYCB_FORMAT1;
977}
978
Michael Mueller9d8d5782015-02-02 15:42:51 +0100979static void kvm_s390_get_cpu_id(struct cpuid *cpu_id)
980{
981 get_cpu_id(cpu_id);
982 cpu_id->version = 0xff;
983}
984
Tony Krowiak5102ee82014-06-27 14:46:01 -0400985static int kvm_s390_crypto_init(struct kvm *kvm)
986{
Michael Mueller9d8d5782015-02-02 15:42:51 +0100987 if (!test_kvm_facility(kvm, 76))
Tony Krowiak5102ee82014-06-27 14:46:01 -0400988 return 0;
989
990 kvm->arch.crypto.crycb = kzalloc(sizeof(*kvm->arch.crypto.crycb),
991 GFP_KERNEL | GFP_DMA);
992 if (!kvm->arch.crypto.crycb)
993 return -ENOMEM;
994
Tony Krowiak45c9b472015-01-13 11:33:26 -0500995 kvm_s390_set_crycb_format(kvm);
Tony Krowiak5102ee82014-06-27 14:46:01 -0400996
Tony Krowiaked6f76b2015-02-24 14:06:57 -0500997 /* Enable AES/DEA protected key functions by default */
998 kvm->arch.crypto.aes_kw = 1;
999 kvm->arch.crypto.dea_kw = 1;
1000 get_random_bytes(kvm->arch.crypto.crycb->aes_wrapping_key_mask,
1001 sizeof(kvm->arch.crypto.crycb->aes_wrapping_key_mask));
1002 get_random_bytes(kvm->arch.crypto.crycb->dea_wrapping_key_mask,
1003 sizeof(kvm->arch.crypto.crycb->dea_wrapping_key_mask));
Tony Krowiaka374e892014-09-03 10:13:53 +02001004
Tony Krowiak5102ee82014-06-27 14:46:01 -04001005 return 0;
1006}
1007
Carsten Ottee08b9632012-01-04 10:25:20 +01001008int kvm_arch_init_vm(struct kvm *kvm, unsigned long type)
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001009{
Michael Mueller9d8d5782015-02-02 15:42:51 +01001010 int i, rc;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001011 char debug_name[16];
Christian Borntraegerf6c137f2014-03-19 11:18:29 +01001012 static unsigned long sca_offset;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001013
Carsten Ottee08b9632012-01-04 10:25:20 +01001014 rc = -EINVAL;
1015#ifdef CONFIG_KVM_S390_UCONTROL
1016 if (type & ~KVM_VM_S390_UCONTROL)
1017 goto out_err;
1018 if ((type & KVM_VM_S390_UCONTROL) && (!capable(CAP_SYS_ADMIN)))
1019 goto out_err;
1020#else
1021 if (type)
1022 goto out_err;
1023#endif
1024
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001025 rc = s390_enable_sie();
1026 if (rc)
Jan Kiszkad89f5ef2010-11-09 17:02:49 +01001027 goto out_err;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001028
Carsten Otteb2904112011-10-18 12:27:13 +02001029 rc = -ENOMEM;
1030
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001031 kvm->arch.sca = (struct sca_block *) get_zeroed_page(GFP_KERNEL);
1032 if (!kvm->arch.sca)
Jan Kiszkad89f5ef2010-11-09 17:02:49 +01001033 goto out_err;
Christian Borntraegerf6c137f2014-03-19 11:18:29 +01001034 spin_lock(&kvm_lock);
1035 sca_offset = (sca_offset + 16) & 0x7f0;
1036 kvm->arch.sca = (struct sca_block *) ((char *) kvm->arch.sca + sca_offset);
1037 spin_unlock(&kvm_lock);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001038
1039 sprintf(debug_name, "kvm-%u", current->pid);
1040
1041 kvm->arch.dbf = debug_register(debug_name, 8, 2, 8 * sizeof(long));
1042 if (!kvm->arch.dbf)
Dominik Dingel40f5b732015-03-12 13:55:53 +01001043 goto out_err;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001044
Michael Mueller9d8d5782015-02-02 15:42:51 +01001045 /*
1046 * The architectural maximum amount of facilities is 16 kbit. To store
1047 * this amount, 2 kbyte of memory is required. Thus we need a full
Michael Mueller981467c2015-02-24 13:51:04 +01001048 * page to hold the guest facility list (arch.model.fac->list) and the
1049 * facility mask (arch.model.fac->mask). Its address size has to be
Michael Mueller9d8d5782015-02-02 15:42:51 +01001050 * 31 bits and word aligned.
1051 */
1052 kvm->arch.model.fac =
Michael Mueller981467c2015-02-24 13:51:04 +01001053 (struct kvm_s390_fac *) get_zeroed_page(GFP_KERNEL | GFP_DMA);
Michael Mueller9d8d5782015-02-02 15:42:51 +01001054 if (!kvm->arch.model.fac)
Dominik Dingel40f5b732015-03-12 13:55:53 +01001055 goto out_err;
Michael Mueller9d8d5782015-02-02 15:42:51 +01001056
Michael Muellerfb5bf932015-02-27 14:25:10 +01001057 /* Populate the facility mask initially. */
Michael Mueller981467c2015-02-24 13:51:04 +01001058 memcpy(kvm->arch.model.fac->mask, S390_lowcore.stfle_fac_list,
Michael Mueller94422ee2015-02-26 12:12:40 +01001059 S390_ARCH_FAC_LIST_SIZE_BYTE);
Michael Mueller9d8d5782015-02-02 15:42:51 +01001060 for (i = 0; i < S390_ARCH_FAC_LIST_SIZE_U64; i++) {
1061 if (i < kvm_s390_fac_list_mask_size())
Michael Mueller981467c2015-02-24 13:51:04 +01001062 kvm->arch.model.fac->mask[i] &= kvm_s390_fac_list_mask[i];
Michael Mueller9d8d5782015-02-02 15:42:51 +01001063 else
Michael Mueller981467c2015-02-24 13:51:04 +01001064 kvm->arch.model.fac->mask[i] = 0UL;
Michael Mueller9d8d5782015-02-02 15:42:51 +01001065 }
1066
Michael Mueller981467c2015-02-24 13:51:04 +01001067 /* Populate the facility list initially. */
1068 memcpy(kvm->arch.model.fac->list, kvm->arch.model.fac->mask,
1069 S390_ARCH_FAC_LIST_SIZE_BYTE);
1070
Michael Mueller9d8d5782015-02-02 15:42:51 +01001071 kvm_s390_get_cpu_id(&kvm->arch.model.cpu_id);
Michael Mueller658b6ed2015-02-02 15:49:35 +01001072 kvm->arch.model.ibc = sclp_get_ibc() & 0x0fff;
Michael Mueller9d8d5782015-02-02 15:42:51 +01001073
Tony Krowiak5102ee82014-06-27 14:46:01 -04001074 if (kvm_s390_crypto_init(kvm) < 0)
Dominik Dingel40f5b732015-03-12 13:55:53 +01001075 goto out_err;
Tony Krowiak5102ee82014-06-27 14:46:01 -04001076
Carsten Otteba5c1e92008-03-25 18:47:26 +01001077 spin_lock_init(&kvm->arch.float_int.lock);
Jens Freimann6d3da242013-07-03 15:18:35 +02001078 for (i = 0; i < FIRQ_LIST_COUNT; i++)
1079 INIT_LIST_HEAD(&kvm->arch.float_int.lists[i]);
Heiko Carstens8a2422342014-01-10 14:33:28 +01001080 init_waitqueue_head(&kvm->arch.ipte_wq);
Thomas Hutha6b7e452014-10-01 14:48:42 +02001081 mutex_init(&kvm->arch.ipte_mutex);
Carsten Otteba5c1e92008-03-25 18:47:26 +01001082
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001083 debug_register_view(kvm->arch.dbf, &debug_sprintf_view);
1084 VM_EVENT(kvm, 3, "%s", "vm created");
1085
Carsten Ottee08b9632012-01-04 10:25:20 +01001086 if (type & KVM_VM_S390_UCONTROL) {
1087 kvm->arch.gmap = NULL;
1088 } else {
Christian Borntraeger03499852014-08-25 12:38:57 +02001089 kvm->arch.gmap = gmap_alloc(current->mm, (1UL << 44) - 1);
Carsten Ottee08b9632012-01-04 10:25:20 +01001090 if (!kvm->arch.gmap)
Dominik Dingel40f5b732015-03-12 13:55:53 +01001091 goto out_err;
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02001092 kvm->arch.gmap->private = kvm;
Dominik Dingel24eb3a82013-06-17 16:25:18 +02001093 kvm->arch.gmap->pfault_enabled = 0;
Carsten Ottee08b9632012-01-04 10:25:20 +01001094 }
Cornelia Huckfa6b7fe2012-12-20 15:32:12 +01001095
1096 kvm->arch.css_support = 0;
Cornelia Huck84223592013-07-15 13:36:01 +02001097 kvm->arch.use_irqchip = 0;
Jason J. Herne72f25022014-11-25 09:46:02 -05001098 kvm->arch.epoch = 0;
Cornelia Huckfa6b7fe2012-12-20 15:32:12 +01001099
David Hildenbrand8ad35752014-03-14 11:00:21 +01001100 spin_lock_init(&kvm->arch.start_stop_lock);
1101
Jan Kiszkad89f5ef2010-11-09 17:02:49 +01001102 return 0;
Jan Kiszkad89f5ef2010-11-09 17:02:49 +01001103out_err:
Dominik Dingel40f5b732015-03-12 13:55:53 +01001104 kfree(kvm->arch.crypto.crycb);
1105 free_page((unsigned long)kvm->arch.model.fac);
1106 debug_unregister(kvm->arch.dbf);
1107 free_page((unsigned long)(kvm->arch.sca));
Jan Kiszkad89f5ef2010-11-09 17:02:49 +01001108 return rc;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001109}
1110
Christian Borntraegerd329c032008-11-26 14:50:27 +01001111void kvm_arch_vcpu_destroy(struct kvm_vcpu *vcpu)
1112{
1113 VCPU_EVENT(vcpu, 3, "%s", "free cpu");
Cornelia Huckade38c32012-07-23 17:20:30 +02001114 trace_kvm_s390_destroy_vcpu(vcpu->vcpu_id);
Christian Borntraeger67335e62014-03-25 17:09:08 +01001115 kvm_s390_clear_local_irqs(vcpu);
Dominik Dingel3c038e62013-10-07 17:11:48 +02001116 kvm_clear_async_pf_completion_queue(vcpu);
Carsten Otte58f94602012-01-04 10:25:27 +01001117 if (!kvm_is_ucontrol(vcpu->kvm)) {
1118 clear_bit(63 - vcpu->vcpu_id,
1119 (unsigned long *) &vcpu->kvm->arch.sca->mcn);
1120 if (vcpu->kvm->arch.sca->cpu[vcpu->vcpu_id].sda ==
1121 (__u64) vcpu->arch.sie_block)
1122 vcpu->kvm->arch.sca->cpu[vcpu->vcpu_id].sda = 0;
1123 }
Carsten Otteabf4a712009-05-12 17:21:51 +02001124 smp_mb();
Carsten Otte27e03932012-01-04 10:25:21 +01001125
1126 if (kvm_is_ucontrol(vcpu->kvm))
1127 gmap_free(vcpu->arch.gmap);
1128
Dominik Dingelb31605c2014-03-25 13:47:11 +01001129 if (kvm_s390_cmma_enabled(vcpu->kvm))
1130 kvm_s390_vcpu_unsetup_cmma(vcpu);
Christian Borntraegerd329c032008-11-26 14:50:27 +01001131 free_page((unsigned long)(vcpu->arch.sie_block));
Konstantin Weitzb31288f2013-04-17 17:36:29 +02001132
Christian Borntraeger6692cef2008-11-26 14:51:08 +01001133 kvm_vcpu_uninit(vcpu);
Michael Muellerb110fea2013-06-12 13:54:54 +02001134 kmem_cache_free(kvm_vcpu_cache, vcpu);
Christian Borntraegerd329c032008-11-26 14:50:27 +01001135}
1136
1137static void kvm_free_vcpus(struct kvm *kvm)
1138{
1139 unsigned int i;
Gleb Natapov988a2ca2009-06-09 15:56:29 +03001140 struct kvm_vcpu *vcpu;
Christian Borntraegerd329c032008-11-26 14:50:27 +01001141
Gleb Natapov988a2ca2009-06-09 15:56:29 +03001142 kvm_for_each_vcpu(i, vcpu, kvm)
1143 kvm_arch_vcpu_destroy(vcpu);
1144
1145 mutex_lock(&kvm->lock);
1146 for (i = 0; i < atomic_read(&kvm->online_vcpus); i++)
1147 kvm->vcpus[i] = NULL;
1148
1149 atomic_set(&kvm->online_vcpus, 0);
1150 mutex_unlock(&kvm->lock);
Christian Borntraegerd329c032008-11-26 14:50:27 +01001151}
1152
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001153void kvm_arch_destroy_vm(struct kvm *kvm)
1154{
Christian Borntraegerd329c032008-11-26 14:50:27 +01001155 kvm_free_vcpus(kvm);
Michael Mueller9d8d5782015-02-02 15:42:51 +01001156 free_page((unsigned long)kvm->arch.model.fac);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001157 free_page((unsigned long)(kvm->arch.sca));
Christian Borntraegerd329c032008-11-26 14:50:27 +01001158 debug_unregister(kvm->arch.dbf);
Tony Krowiak5102ee82014-06-27 14:46:01 -04001159 kfree(kvm->arch.crypto.crycb);
Carsten Otte27e03932012-01-04 10:25:21 +01001160 if (!kvm_is_ucontrol(kvm))
1161 gmap_free(kvm->arch.gmap);
Cornelia Huck841b91c2013-07-15 13:36:01 +02001162 kvm_s390_destroy_adapters(kvm);
Christian Borntraeger67335e62014-03-25 17:09:08 +01001163 kvm_s390_clear_float_irqs(kvm);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001164}
1165
1166/* Section: vcpu related */
Dominik Dingeldafd0322014-12-02 16:53:21 +01001167static int __kvm_ucontrol_vcpu_init(struct kvm_vcpu *vcpu)
1168{
1169 vcpu->arch.gmap = gmap_alloc(current->mm, -1UL);
1170 if (!vcpu->arch.gmap)
1171 return -ENOMEM;
1172 vcpu->arch.gmap->private = vcpu->kvm;
1173
1174 return 0;
1175}
1176
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001177int kvm_arch_vcpu_init(struct kvm_vcpu *vcpu)
1178{
Dominik Dingel3c038e62013-10-07 17:11:48 +02001179 vcpu->arch.pfault_token = KVM_S390_PFAULT_TOKEN_INVALID;
1180 kvm_clear_async_pf_completion_queue(vcpu);
Christian Borntraeger59674c12012-01-11 11:20:33 +01001181 vcpu->run->kvm_valid_regs = KVM_SYNC_PREFIX |
1182 KVM_SYNC_GPRS |
Christian Borntraeger9eed07352012-02-06 10:59:07 +01001183 KVM_SYNC_ACRS |
David Hildenbrandb028ee32014-07-17 10:47:43 +02001184 KVM_SYNC_CRS |
1185 KVM_SYNC_ARCH0 |
1186 KVM_SYNC_PFAULT;
Eric Farman68c55752014-06-09 10:57:26 -04001187 if (test_kvm_facility(vcpu->kvm, 129))
1188 vcpu->run->kvm_valid_regs |= KVM_SYNC_VRS;
Dominik Dingeldafd0322014-12-02 16:53:21 +01001189
1190 if (kvm_is_ucontrol(vcpu->kvm))
1191 return __kvm_ucontrol_vcpu_init(vcpu);
1192
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001193 return 0;
1194}
1195
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001196void kvm_arch_vcpu_load(struct kvm_vcpu *vcpu, int cpu)
1197{
Martin Schwidefsky4725c862013-10-15 16:08:34 +02001198 save_fp_ctl(&vcpu->arch.host_fpregs.fpc);
Michael Mueller18280d82015-03-16 16:05:41 +01001199 if (test_kvm_facility(vcpu->kvm, 129))
Eric Farman68c55752014-06-09 10:57:26 -04001200 save_vx_regs((__vector128 *)&vcpu->arch.host_vregs->vrs);
1201 else
1202 save_fp_regs(vcpu->arch.host_fpregs.fprs);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001203 save_access_regs(vcpu->arch.host_acrs);
Michael Mueller18280d82015-03-16 16:05:41 +01001204 if (test_kvm_facility(vcpu->kvm, 129)) {
Eric Farman68c55752014-06-09 10:57:26 -04001205 restore_fp_ctl(&vcpu->run->s.regs.fpc);
1206 restore_vx_regs((__vector128 *)&vcpu->run->s.regs.vrs);
1207 } else {
1208 restore_fp_ctl(&vcpu->arch.guest_fpregs.fpc);
1209 restore_fp_regs(vcpu->arch.guest_fpregs.fprs);
1210 }
Christian Borntraeger59674c12012-01-11 11:20:33 +01001211 restore_access_regs(vcpu->run->s.regs.acrs);
Christian Borntraeger480e5922011-09-20 17:07:28 +02001212 gmap_enable(vcpu->arch.gmap);
Cornelia Huck9e6dabe2011-11-17 11:00:41 +01001213 atomic_set_mask(CPUSTAT_RUNNING, &vcpu->arch.sie_block->cpuflags);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001214}
1215
1216void kvm_arch_vcpu_put(struct kvm_vcpu *vcpu)
1217{
Cornelia Huck9e6dabe2011-11-17 11:00:41 +01001218 atomic_clear_mask(CPUSTAT_RUNNING, &vcpu->arch.sie_block->cpuflags);
Christian Borntraeger480e5922011-09-20 17:07:28 +02001219 gmap_disable(vcpu->arch.gmap);
Michael Mueller18280d82015-03-16 16:05:41 +01001220 if (test_kvm_facility(vcpu->kvm, 129)) {
Eric Farman68c55752014-06-09 10:57:26 -04001221 save_fp_ctl(&vcpu->run->s.regs.fpc);
1222 save_vx_regs((__vector128 *)&vcpu->run->s.regs.vrs);
1223 } else {
1224 save_fp_ctl(&vcpu->arch.guest_fpregs.fpc);
1225 save_fp_regs(vcpu->arch.guest_fpregs.fprs);
1226 }
Christian Borntraeger59674c12012-01-11 11:20:33 +01001227 save_access_regs(vcpu->run->s.regs.acrs);
Martin Schwidefsky4725c862013-10-15 16:08:34 +02001228 restore_fp_ctl(&vcpu->arch.host_fpregs.fpc);
Michael Mueller18280d82015-03-16 16:05:41 +01001229 if (test_kvm_facility(vcpu->kvm, 129))
Eric Farman68c55752014-06-09 10:57:26 -04001230 restore_vx_regs((__vector128 *)&vcpu->arch.host_vregs->vrs);
1231 else
1232 restore_fp_regs(vcpu->arch.host_fpregs.fprs);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001233 restore_access_regs(vcpu->arch.host_acrs);
1234}
1235
1236static void kvm_s390_vcpu_initial_reset(struct kvm_vcpu *vcpu)
1237{
1238 /* this equals initial cpu reset in pop, but we don't switch to ESA */
1239 vcpu->arch.sie_block->gpsw.mask = 0UL;
1240 vcpu->arch.sie_block->gpsw.addr = 0UL;
Christian Borntraeger8d26cf72012-01-11 11:19:32 +01001241 kvm_s390_set_prefix(vcpu, 0);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001242 vcpu->arch.sie_block->cputm = 0UL;
1243 vcpu->arch.sie_block->ckc = 0UL;
1244 vcpu->arch.sie_block->todpr = 0;
1245 memset(vcpu->arch.sie_block->gcr, 0, 16 * sizeof(__u64));
1246 vcpu->arch.sie_block->gcr[0] = 0xE0UL;
1247 vcpu->arch.sie_block->gcr[14] = 0xC2000000UL;
1248 vcpu->arch.guest_fpregs.fpc = 0;
1249 asm volatile("lfpc %0" : : "Q" (vcpu->arch.guest_fpregs.fpc));
1250 vcpu->arch.sie_block->gbea = 1;
Christian Borntraeger672550f2014-02-10 15:32:19 +01001251 vcpu->arch.sie_block->pp = 0;
Dominik Dingel3c038e62013-10-07 17:11:48 +02001252 vcpu->arch.pfault_token = KVM_S390_PFAULT_TOKEN_INVALID;
1253 kvm_clear_async_pf_completion_queue(vcpu);
David Hildenbrand6352e4d2014-04-10 17:35:00 +02001254 if (!kvm_s390_user_cpu_state_ctrl(vcpu->kvm))
1255 kvm_s390_vcpu_stop(vcpu);
Jens Freimann2ed10cc2014-02-11 13:48:07 +01001256 kvm_s390_clear_local_irqs(vcpu);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001257}
1258
Dominik Dingel31928aa2014-12-04 15:47:07 +01001259void kvm_arch_vcpu_postcreate(struct kvm_vcpu *vcpu)
Marcelo Tosatti42897d82012-11-27 23:29:02 -02001260{
Jason J. Herne72f25022014-11-25 09:46:02 -05001261 mutex_lock(&vcpu->kvm->lock);
1262 vcpu->arch.sie_block->epoch = vcpu->kvm->arch.epoch;
1263 mutex_unlock(&vcpu->kvm->lock);
Dominik Dingeldafd0322014-12-02 16:53:21 +01001264 if (!kvm_is_ucontrol(vcpu->kvm))
1265 vcpu->arch.gmap = vcpu->kvm->arch.gmap;
Marcelo Tosatti42897d82012-11-27 23:29:02 -02001266}
1267
Tony Krowiak5102ee82014-06-27 14:46:01 -04001268static void kvm_s390_vcpu_crypto_setup(struct kvm_vcpu *vcpu)
1269{
Michael Mueller9d8d5782015-02-02 15:42:51 +01001270 if (!test_kvm_facility(vcpu->kvm, 76))
Tony Krowiak5102ee82014-06-27 14:46:01 -04001271 return;
1272
Tony Krowiaka374e892014-09-03 10:13:53 +02001273 vcpu->arch.sie_block->ecb3 &= ~(ECB3_AES | ECB3_DEA);
1274
1275 if (vcpu->kvm->arch.crypto.aes_kw)
1276 vcpu->arch.sie_block->ecb3 |= ECB3_AES;
1277 if (vcpu->kvm->arch.crypto.dea_kw)
1278 vcpu->arch.sie_block->ecb3 |= ECB3_DEA;
1279
Tony Krowiak5102ee82014-06-27 14:46:01 -04001280 vcpu->arch.sie_block->crycbd = vcpu->kvm->arch.crypto.crycbd;
1281}
1282
Dominik Dingelb31605c2014-03-25 13:47:11 +01001283void kvm_s390_vcpu_unsetup_cmma(struct kvm_vcpu *vcpu)
1284{
1285 free_page(vcpu->arch.sie_block->cbrlo);
1286 vcpu->arch.sie_block->cbrlo = 0;
1287}
1288
1289int kvm_s390_vcpu_setup_cmma(struct kvm_vcpu *vcpu)
1290{
1291 vcpu->arch.sie_block->cbrlo = get_zeroed_page(GFP_KERNEL);
1292 if (!vcpu->arch.sie_block->cbrlo)
1293 return -ENOMEM;
1294
1295 vcpu->arch.sie_block->ecb2 |= 0x80;
1296 vcpu->arch.sie_block->ecb2 &= ~0x08;
1297 return 0;
1298}
1299
Michael Mueller91520f12015-02-27 14:32:11 +01001300static void kvm_s390_vcpu_setup_model(struct kvm_vcpu *vcpu)
1301{
1302 struct kvm_s390_cpu_model *model = &vcpu->kvm->arch.model;
1303
1304 vcpu->arch.cpu_id = model->cpu_id;
1305 vcpu->arch.sie_block->ibc = model->ibc;
1306 vcpu->arch.sie_block->fac = (int) (long) model->fac->list;
1307}
1308
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001309int kvm_arch_vcpu_setup(struct kvm_vcpu *vcpu)
1310{
Dominik Dingelb31605c2014-03-25 13:47:11 +01001311 int rc = 0;
Konstantin Weitzb31288f2013-04-17 17:36:29 +02001312
Cornelia Huck9e6dabe2011-11-17 11:00:41 +01001313 atomic_set(&vcpu->arch.sie_block->cpuflags, CPUSTAT_ZARCH |
1314 CPUSTAT_SM |
Christian Borntraeger69d0d3a2013-06-12 13:54:53 +02001315 CPUSTAT_STOPPED |
1316 CPUSTAT_GED);
Michael Mueller91520f12015-02-27 14:32:11 +01001317 kvm_s390_vcpu_setup_model(vcpu);
1318
Christian Borntraegerfc345312010-06-17 23:16:20 +02001319 vcpu->arch.sie_block->ecb = 6;
Michael Mueller9d8d5782015-02-02 15:42:51 +01001320 if (test_kvm_facility(vcpu->kvm, 50) && test_kvm_facility(vcpu->kvm, 73))
Michael Mueller7feb6bb2013-06-28 13:30:24 +02001321 vcpu->arch.sie_block->ecb |= 0x10;
1322
Christian Borntraeger69d0d3a2013-06-12 13:54:53 +02001323 vcpu->arch.sie_block->ecb2 = 8;
David Hildenbrandea5f4962014-10-14 15:29:30 +02001324 vcpu->arch.sie_block->eca = 0xC1002000U;
Heiko Carstens217a4402013-12-30 12:54:14 +01001325 if (sclp_has_siif())
1326 vcpu->arch.sie_block->eca |= 1;
David Hildenbrandea5f4962014-10-14 15:29:30 +02001327 if (sclp_has_sigpif())
1328 vcpu->arch.sie_block->eca |= 0x10000000U;
Michael Mueller18280d82015-03-16 16:05:41 +01001329 if (test_kvm_facility(vcpu->kvm, 129)) {
Eric Farman13211ea2014-04-30 13:39:46 -04001330 vcpu->arch.sie_block->eca |= 0x00020000;
1331 vcpu->arch.sie_block->ecd |= 0x20000000;
1332 }
Thomas Huth492d8642015-02-10 16:11:01 +01001333 vcpu->arch.sie_block->ictl |= ICTL_ISKE | ICTL_SSKE | ICTL_RRBE;
Matthew Rosato5a5e6532013-01-29 11:48:20 -05001334
Dominik Dingelb31605c2014-03-25 13:47:11 +01001335 if (kvm_s390_cmma_enabled(vcpu->kvm)) {
1336 rc = kvm_s390_vcpu_setup_cmma(vcpu);
1337 if (rc)
1338 return rc;
Konstantin Weitzb31288f2013-04-17 17:36:29 +02001339 }
David Hildenbrand0ac96caf2014-12-12 15:17:31 +01001340 hrtimer_init(&vcpu->arch.ckc_timer, CLOCK_MONOTONIC, HRTIMER_MODE_REL);
Christian Borntraegerca872302009-05-12 17:21:49 +02001341 vcpu->arch.ckc_timer.function = kvm_s390_idle_wakeup;
Michael Mueller9d8d5782015-02-02 15:42:51 +01001342
Tony Krowiak5102ee82014-06-27 14:46:01 -04001343 kvm_s390_vcpu_crypto_setup(vcpu);
1344
Dominik Dingelb31605c2014-03-25 13:47:11 +01001345 return rc;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001346}
1347
1348struct kvm_vcpu *kvm_arch_vcpu_create(struct kvm *kvm,
1349 unsigned int id)
1350{
Carsten Otte4d475552011-10-18 12:27:12 +02001351 struct kvm_vcpu *vcpu;
Michael Mueller7feb6bb2013-06-28 13:30:24 +02001352 struct sie_page *sie_page;
Carsten Otte4d475552011-10-18 12:27:12 +02001353 int rc = -EINVAL;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001354
Carsten Otte4d475552011-10-18 12:27:12 +02001355 if (id >= KVM_MAX_VCPUS)
1356 goto out;
1357
1358 rc = -ENOMEM;
1359
Michael Muellerb110fea2013-06-12 13:54:54 +02001360 vcpu = kmem_cache_zalloc(kvm_vcpu_cache, GFP_KERNEL);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001361 if (!vcpu)
Carsten Otte4d475552011-10-18 12:27:12 +02001362 goto out;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001363
Michael Mueller7feb6bb2013-06-28 13:30:24 +02001364 sie_page = (struct sie_page *) get_zeroed_page(GFP_KERNEL);
1365 if (!sie_page)
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001366 goto out_free_cpu;
1367
Michael Mueller7feb6bb2013-06-28 13:30:24 +02001368 vcpu->arch.sie_block = &sie_page->sie_block;
1369 vcpu->arch.sie_block->itdba = (unsigned long) &sie_page->itdb;
Eric Farman68c55752014-06-09 10:57:26 -04001370 vcpu->arch.host_vregs = &sie_page->vregs;
Michael Mueller7feb6bb2013-06-28 13:30:24 +02001371
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001372 vcpu->arch.sie_block->icpua = id;
Carsten Otte58f94602012-01-04 10:25:27 +01001373 if (!kvm_is_ucontrol(kvm)) {
1374 if (!kvm->arch.sca) {
1375 WARN_ON_ONCE(1);
1376 goto out_free_cpu;
1377 }
1378 if (!kvm->arch.sca->cpu[id].sda)
1379 kvm->arch.sca->cpu[id].sda =
1380 (__u64) vcpu->arch.sie_block;
1381 vcpu->arch.sie_block->scaoh =
1382 (__u32)(((__u64)kvm->arch.sca) >> 32);
1383 vcpu->arch.sie_block->scaol = (__u32)(__u64)kvm->arch.sca;
1384 set_bit(63 - id, (unsigned long *) &kvm->arch.sca->mcn);
1385 }
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001386
Carsten Otteba5c1e92008-03-25 18:47:26 +01001387 spin_lock_init(&vcpu->arch.local_int.lock);
Carsten Otteba5c1e92008-03-25 18:47:26 +01001388 vcpu->arch.local_int.float_int = &kvm->arch.float_int;
Christian Borntraegerd0321a22013-06-12 13:54:55 +02001389 vcpu->arch.local_int.wq = &vcpu->wq;
Christian Borntraeger5288fbf2008-03-25 18:47:31 +01001390 vcpu->arch.local_int.cpuflags = &vcpu->arch.sie_block->cpuflags;
Carsten Otteba5c1e92008-03-25 18:47:26 +01001391
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001392 rc = kvm_vcpu_init(vcpu, kvm, id);
1393 if (rc)
Wei Yongjun7b06bf22010-03-09 14:37:53 +08001394 goto out_free_sie_block;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001395 VM_EVENT(kvm, 3, "create cpu %d at %p, sie block at %p", id, vcpu,
1396 vcpu->arch.sie_block);
Cornelia Huckade38c32012-07-23 17:20:30 +02001397 trace_kvm_s390_create_vcpu(id, vcpu, vcpu->arch.sie_block);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001398
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001399 return vcpu;
Wei Yongjun7b06bf22010-03-09 14:37:53 +08001400out_free_sie_block:
1401 free_page((unsigned long)(vcpu->arch.sie_block));
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001402out_free_cpu:
Michael Muellerb110fea2013-06-12 13:54:54 +02001403 kmem_cache_free(kvm_vcpu_cache, vcpu);
Carsten Otte4d475552011-10-18 12:27:12 +02001404out:
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001405 return ERR_PTR(rc);
1406}
1407
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001408int kvm_arch_vcpu_runnable(struct kvm_vcpu *vcpu)
1409{
David Hildenbrand9a022062014-08-05 17:40:47 +02001410 return kvm_s390_vcpu_has_irq(vcpu, 0);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001411}
1412
Christian Borntraeger49b99e12013-05-17 14:41:35 +02001413void s390_vcpu_block(struct kvm_vcpu *vcpu)
1414{
1415 atomic_set_mask(PROG_BLOCK_SIE, &vcpu->arch.sie_block->prog20);
1416}
1417
1418void s390_vcpu_unblock(struct kvm_vcpu *vcpu)
1419{
1420 atomic_clear_mask(PROG_BLOCK_SIE, &vcpu->arch.sie_block->prog20);
1421}
1422
1423/*
1424 * Kick a guest cpu out of SIE and wait until SIE is not running.
1425 * If the CPU is not running (e.g. waiting as idle) the function will
1426 * return immediately. */
1427void exit_sie(struct kvm_vcpu *vcpu)
1428{
1429 atomic_set_mask(CPUSTAT_STOP_INT, &vcpu->arch.sie_block->cpuflags);
1430 while (vcpu->arch.sie_block->prog0c & PROG_IN_SIE)
1431 cpu_relax();
1432}
1433
1434/* Kick a guest cpu out of SIE and prevent SIE-reentry */
1435void exit_sie_sync(struct kvm_vcpu *vcpu)
1436{
1437 s390_vcpu_block(vcpu);
1438 exit_sie(vcpu);
1439}
1440
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02001441static void kvm_gmap_notifier(struct gmap *gmap, unsigned long address)
1442{
1443 int i;
1444 struct kvm *kvm = gmap->private;
1445 struct kvm_vcpu *vcpu;
1446
1447 kvm_for_each_vcpu(i, vcpu, kvm) {
1448 /* match against both prefix pages */
Michael Muellerfda902c2014-05-13 16:58:30 +02001449 if (kvm_s390_get_prefix(vcpu) == (address & ~0x1000UL)) {
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02001450 VCPU_EVENT(vcpu, 2, "gmap notifier for %lx", address);
1451 kvm_make_request(KVM_REQ_MMU_RELOAD, vcpu);
1452 exit_sie_sync(vcpu);
1453 }
1454 }
1455}
1456
Christoffer Dallb6d33832012-03-08 16:44:24 -05001457int kvm_arch_vcpu_should_kick(struct kvm_vcpu *vcpu)
1458{
1459 /* kvm common code refers to this, but never calls it */
1460 BUG();
1461 return 0;
1462}
1463
Carsten Otte14eebd92012-05-15 14:15:26 +02001464static int kvm_arch_vcpu_ioctl_get_one_reg(struct kvm_vcpu *vcpu,
1465 struct kvm_one_reg *reg)
1466{
1467 int r = -EINVAL;
1468
1469 switch (reg->id) {
Carsten Otte29b7c712012-05-15 14:15:27 +02001470 case KVM_REG_S390_TODPR:
1471 r = put_user(vcpu->arch.sie_block->todpr,
1472 (u32 __user *)reg->addr);
1473 break;
1474 case KVM_REG_S390_EPOCHDIFF:
1475 r = put_user(vcpu->arch.sie_block->epoch,
1476 (u64 __user *)reg->addr);
1477 break;
Jason J. herne46a6dd12012-05-15 14:15:28 +02001478 case KVM_REG_S390_CPU_TIMER:
1479 r = put_user(vcpu->arch.sie_block->cputm,
1480 (u64 __user *)reg->addr);
1481 break;
1482 case KVM_REG_S390_CLOCK_COMP:
1483 r = put_user(vcpu->arch.sie_block->ckc,
1484 (u64 __user *)reg->addr);
1485 break;
Dominik Dingel536336c2013-09-30 10:55:33 +02001486 case KVM_REG_S390_PFTOKEN:
1487 r = put_user(vcpu->arch.pfault_token,
1488 (u64 __user *)reg->addr);
1489 break;
1490 case KVM_REG_S390_PFCOMPARE:
1491 r = put_user(vcpu->arch.pfault_compare,
1492 (u64 __user *)reg->addr);
1493 break;
1494 case KVM_REG_S390_PFSELECT:
1495 r = put_user(vcpu->arch.pfault_select,
1496 (u64 __user *)reg->addr);
1497 break;
Christian Borntraeger672550f2014-02-10 15:32:19 +01001498 case KVM_REG_S390_PP:
1499 r = put_user(vcpu->arch.sie_block->pp,
1500 (u64 __user *)reg->addr);
1501 break;
Christian Borntraegerafa45ff2014-02-10 15:39:23 +01001502 case KVM_REG_S390_GBEA:
1503 r = put_user(vcpu->arch.sie_block->gbea,
1504 (u64 __user *)reg->addr);
1505 break;
Carsten Otte14eebd92012-05-15 14:15:26 +02001506 default:
1507 break;
1508 }
1509
1510 return r;
1511}
1512
1513static int kvm_arch_vcpu_ioctl_set_one_reg(struct kvm_vcpu *vcpu,
1514 struct kvm_one_reg *reg)
1515{
1516 int r = -EINVAL;
1517
1518 switch (reg->id) {
Carsten Otte29b7c712012-05-15 14:15:27 +02001519 case KVM_REG_S390_TODPR:
1520 r = get_user(vcpu->arch.sie_block->todpr,
1521 (u32 __user *)reg->addr);
1522 break;
1523 case KVM_REG_S390_EPOCHDIFF:
1524 r = get_user(vcpu->arch.sie_block->epoch,
1525 (u64 __user *)reg->addr);
1526 break;
Jason J. herne46a6dd12012-05-15 14:15:28 +02001527 case KVM_REG_S390_CPU_TIMER:
1528 r = get_user(vcpu->arch.sie_block->cputm,
1529 (u64 __user *)reg->addr);
1530 break;
1531 case KVM_REG_S390_CLOCK_COMP:
1532 r = get_user(vcpu->arch.sie_block->ckc,
1533 (u64 __user *)reg->addr);
1534 break;
Dominik Dingel536336c2013-09-30 10:55:33 +02001535 case KVM_REG_S390_PFTOKEN:
1536 r = get_user(vcpu->arch.pfault_token,
1537 (u64 __user *)reg->addr);
David Hildenbrand9fbd8082014-10-09 15:01:38 +02001538 if (vcpu->arch.pfault_token == KVM_S390_PFAULT_TOKEN_INVALID)
1539 kvm_clear_async_pf_completion_queue(vcpu);
Dominik Dingel536336c2013-09-30 10:55:33 +02001540 break;
1541 case KVM_REG_S390_PFCOMPARE:
1542 r = get_user(vcpu->arch.pfault_compare,
1543 (u64 __user *)reg->addr);
1544 break;
1545 case KVM_REG_S390_PFSELECT:
1546 r = get_user(vcpu->arch.pfault_select,
1547 (u64 __user *)reg->addr);
1548 break;
Christian Borntraeger672550f2014-02-10 15:32:19 +01001549 case KVM_REG_S390_PP:
1550 r = get_user(vcpu->arch.sie_block->pp,
1551 (u64 __user *)reg->addr);
1552 break;
Christian Borntraegerafa45ff2014-02-10 15:39:23 +01001553 case KVM_REG_S390_GBEA:
1554 r = get_user(vcpu->arch.sie_block->gbea,
1555 (u64 __user *)reg->addr);
1556 break;
Carsten Otte14eebd92012-05-15 14:15:26 +02001557 default:
1558 break;
1559 }
1560
1561 return r;
1562}
Christoffer Dallb6d33832012-03-08 16:44:24 -05001563
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001564static int kvm_arch_vcpu_ioctl_initial_reset(struct kvm_vcpu *vcpu)
1565{
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001566 kvm_s390_vcpu_initial_reset(vcpu);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001567 return 0;
1568}
1569
1570int kvm_arch_vcpu_ioctl_set_regs(struct kvm_vcpu *vcpu, struct kvm_regs *regs)
1571{
Christian Borntraeger5a32c1a2012-01-11 11:20:32 +01001572 memcpy(&vcpu->run->s.regs.gprs, &regs->gprs, sizeof(regs->gprs));
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001573 return 0;
1574}
1575
1576int kvm_arch_vcpu_ioctl_get_regs(struct kvm_vcpu *vcpu, struct kvm_regs *regs)
1577{
Christian Borntraeger5a32c1a2012-01-11 11:20:32 +01001578 memcpy(&regs->gprs, &vcpu->run->s.regs.gprs, sizeof(regs->gprs));
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001579 return 0;
1580}
1581
1582int kvm_arch_vcpu_ioctl_set_sregs(struct kvm_vcpu *vcpu,
1583 struct kvm_sregs *sregs)
1584{
Christian Borntraeger59674c12012-01-11 11:20:33 +01001585 memcpy(&vcpu->run->s.regs.acrs, &sregs->acrs, sizeof(sregs->acrs));
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001586 memcpy(&vcpu->arch.sie_block->gcr, &sregs->crs, sizeof(sregs->crs));
Christian Borntraeger59674c12012-01-11 11:20:33 +01001587 restore_access_regs(vcpu->run->s.regs.acrs);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001588 return 0;
1589}
1590
1591int kvm_arch_vcpu_ioctl_get_sregs(struct kvm_vcpu *vcpu,
1592 struct kvm_sregs *sregs)
1593{
Christian Borntraeger59674c12012-01-11 11:20:33 +01001594 memcpy(&sregs->acrs, &vcpu->run->s.regs.acrs, sizeof(sregs->acrs));
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001595 memcpy(&sregs->crs, &vcpu->arch.sie_block->gcr, sizeof(sregs->crs));
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001596 return 0;
1597}
1598
1599int kvm_arch_vcpu_ioctl_set_fpu(struct kvm_vcpu *vcpu, struct kvm_fpu *fpu)
1600{
Martin Schwidefsky4725c862013-10-15 16:08:34 +02001601 if (test_fp_ctl(fpu->fpc))
1602 return -EINVAL;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001603 memcpy(&vcpu->arch.guest_fpregs.fprs, &fpu->fprs, sizeof(fpu->fprs));
Martin Schwidefsky4725c862013-10-15 16:08:34 +02001604 vcpu->arch.guest_fpregs.fpc = fpu->fpc;
1605 restore_fp_ctl(&vcpu->arch.guest_fpregs.fpc);
1606 restore_fp_regs(vcpu->arch.guest_fpregs.fprs);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001607 return 0;
1608}
1609
1610int kvm_arch_vcpu_ioctl_get_fpu(struct kvm_vcpu *vcpu, struct kvm_fpu *fpu)
1611{
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001612 memcpy(&fpu->fprs, &vcpu->arch.guest_fpregs.fprs, sizeof(fpu->fprs));
1613 fpu->fpc = vcpu->arch.guest_fpregs.fpc;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001614 return 0;
1615}
1616
1617static int kvm_arch_vcpu_ioctl_set_initial_psw(struct kvm_vcpu *vcpu, psw_t psw)
1618{
1619 int rc = 0;
1620
David Hildenbrand7a42fdc2014-05-05 16:26:19 +02001621 if (!is_vcpu_stopped(vcpu))
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001622 rc = -EBUSY;
Carsten Otted7b0b5e2009-11-19 14:21:16 +01001623 else {
1624 vcpu->run->psw_mask = psw.mask;
1625 vcpu->run->psw_addr = psw.addr;
1626 }
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001627 return rc;
1628}
1629
1630int kvm_arch_vcpu_ioctl_translate(struct kvm_vcpu *vcpu,
1631 struct kvm_translation *tr)
1632{
1633 return -EINVAL; /* not implemented yet */
1634}
1635
David Hildenbrand27291e22014-01-23 12:26:52 +01001636#define VALID_GUESTDBG_FLAGS (KVM_GUESTDBG_SINGLESTEP | \
1637 KVM_GUESTDBG_USE_HW_BP | \
1638 KVM_GUESTDBG_ENABLE)
1639
Jan Kiszkad0bfb942008-12-15 13:52:10 +01001640int kvm_arch_vcpu_ioctl_set_guest_debug(struct kvm_vcpu *vcpu,
1641 struct kvm_guest_debug *dbg)
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001642{
David Hildenbrand27291e22014-01-23 12:26:52 +01001643 int rc = 0;
1644
1645 vcpu->guest_debug = 0;
1646 kvm_s390_clear_bp_data(vcpu);
1647
David Hildenbrand2de3bfc2014-05-20 17:25:20 +02001648 if (dbg->control & ~VALID_GUESTDBG_FLAGS)
David Hildenbrand27291e22014-01-23 12:26:52 +01001649 return -EINVAL;
1650
1651 if (dbg->control & KVM_GUESTDBG_ENABLE) {
1652 vcpu->guest_debug = dbg->control;
1653 /* enforce guest PER */
1654 atomic_set_mask(CPUSTAT_P, &vcpu->arch.sie_block->cpuflags);
1655
1656 if (dbg->control & KVM_GUESTDBG_USE_HW_BP)
1657 rc = kvm_s390_import_bp_data(vcpu, dbg);
1658 } else {
1659 atomic_clear_mask(CPUSTAT_P, &vcpu->arch.sie_block->cpuflags);
1660 vcpu->arch.guestdbg.last_bp = 0;
1661 }
1662
1663 if (rc) {
1664 vcpu->guest_debug = 0;
1665 kvm_s390_clear_bp_data(vcpu);
1666 atomic_clear_mask(CPUSTAT_P, &vcpu->arch.sie_block->cpuflags);
1667 }
1668
1669 return rc;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001670}
1671
Marcelo Tosatti62d9f0d2008-04-11 13:24:45 -03001672int kvm_arch_vcpu_ioctl_get_mpstate(struct kvm_vcpu *vcpu,
1673 struct kvm_mp_state *mp_state)
1674{
David Hildenbrand6352e4d2014-04-10 17:35:00 +02001675 /* CHECK_STOP and LOAD are not supported yet */
1676 return is_vcpu_stopped(vcpu) ? KVM_MP_STATE_STOPPED :
1677 KVM_MP_STATE_OPERATING;
Marcelo Tosatti62d9f0d2008-04-11 13:24:45 -03001678}
1679
1680int kvm_arch_vcpu_ioctl_set_mpstate(struct kvm_vcpu *vcpu,
1681 struct kvm_mp_state *mp_state)
1682{
David Hildenbrand6352e4d2014-04-10 17:35:00 +02001683 int rc = 0;
1684
1685 /* user space knows about this interface - let it control the state */
1686 vcpu->kvm->arch.user_cpu_state_ctrl = 1;
1687
1688 switch (mp_state->mp_state) {
1689 case KVM_MP_STATE_STOPPED:
1690 kvm_s390_vcpu_stop(vcpu);
1691 break;
1692 case KVM_MP_STATE_OPERATING:
1693 kvm_s390_vcpu_start(vcpu);
1694 break;
1695 case KVM_MP_STATE_LOAD:
1696 case KVM_MP_STATE_CHECK_STOP:
1697 /* fall through - CHECK_STOP and LOAD are not supported yet */
1698 default:
1699 rc = -ENXIO;
1700 }
1701
1702 return rc;
Marcelo Tosatti62d9f0d2008-04-11 13:24:45 -03001703}
1704
Dominik Dingelb31605c2014-03-25 13:47:11 +01001705bool kvm_s390_cmma_enabled(struct kvm *kvm)
1706{
1707 if (!MACHINE_IS_LPAR)
1708 return false;
1709 /* only enable for z10 and later */
1710 if (!MACHINE_HAS_EDAT1)
1711 return false;
1712 if (!kvm->arch.use_cmma)
1713 return false;
1714 return true;
1715}
1716
David Hildenbrand8ad35752014-03-14 11:00:21 +01001717static bool ibs_enabled(struct kvm_vcpu *vcpu)
1718{
1719 return atomic_read(&vcpu->arch.sie_block->cpuflags) & CPUSTAT_IBS;
1720}
1721
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02001722static int kvm_s390_handle_requests(struct kvm_vcpu *vcpu)
1723{
David Hildenbrand8ad35752014-03-14 11:00:21 +01001724retry:
1725 s390_vcpu_unblock(vcpu);
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02001726 /*
1727 * We use MMU_RELOAD just to re-arm the ipte notifier for the
1728 * guest prefix page. gmap_ipte_notify will wait on the ptl lock.
1729 * This ensures that the ipte instruction for this request has
1730 * already finished. We might race against a second unmapper that
1731 * wants to set the blocking bit. Lets just retry the request loop.
1732 */
David Hildenbrand8ad35752014-03-14 11:00:21 +01001733 if (kvm_check_request(KVM_REQ_MMU_RELOAD, vcpu)) {
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02001734 int rc;
1735 rc = gmap_ipte_notify(vcpu->arch.gmap,
Michael Muellerfda902c2014-05-13 16:58:30 +02001736 kvm_s390_get_prefix(vcpu),
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02001737 PAGE_SIZE * 2);
1738 if (rc)
1739 return rc;
David Hildenbrand8ad35752014-03-14 11:00:21 +01001740 goto retry;
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02001741 }
David Hildenbrand8ad35752014-03-14 11:00:21 +01001742
David Hildenbrandd3d692c2014-07-29 08:53:36 +02001743 if (kvm_check_request(KVM_REQ_TLB_FLUSH, vcpu)) {
1744 vcpu->arch.sie_block->ihcpu = 0xffff;
1745 goto retry;
1746 }
1747
David Hildenbrand8ad35752014-03-14 11:00:21 +01001748 if (kvm_check_request(KVM_REQ_ENABLE_IBS, vcpu)) {
1749 if (!ibs_enabled(vcpu)) {
1750 trace_kvm_s390_enable_disable_ibs(vcpu->vcpu_id, 1);
1751 atomic_set_mask(CPUSTAT_IBS,
1752 &vcpu->arch.sie_block->cpuflags);
1753 }
1754 goto retry;
1755 }
1756
1757 if (kvm_check_request(KVM_REQ_DISABLE_IBS, vcpu)) {
1758 if (ibs_enabled(vcpu)) {
1759 trace_kvm_s390_enable_disable_ibs(vcpu->vcpu_id, 0);
1760 atomic_clear_mask(CPUSTAT_IBS,
1761 &vcpu->arch.sie_block->cpuflags);
1762 }
1763 goto retry;
1764 }
1765
David Hildenbrand0759d062014-05-13 16:54:32 +02001766 /* nothing to do, just clear the request */
1767 clear_bit(KVM_REQ_UNHALT, &vcpu->requests);
1768
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02001769 return 0;
1770}
1771
Thomas Huthfa576c52014-05-06 17:20:16 +02001772/**
1773 * kvm_arch_fault_in_page - fault-in guest page if necessary
1774 * @vcpu: The corresponding virtual cpu
1775 * @gpa: Guest physical address
1776 * @writable: Whether the page should be writable or not
1777 *
1778 * Make sure that a guest page has been faulted-in on the host.
1779 *
1780 * Return: Zero on success, negative error code otherwise.
1781 */
1782long kvm_arch_fault_in_page(struct kvm_vcpu *vcpu, gpa_t gpa, int writable)
Dominik Dingel24eb3a82013-06-17 16:25:18 +02001783{
Martin Schwidefsky527e30b2014-04-30 16:04:25 +02001784 return gmap_fault(vcpu->arch.gmap, gpa,
1785 writable ? FAULT_FLAG_WRITE : 0);
Dominik Dingel24eb3a82013-06-17 16:25:18 +02001786}
1787
Dominik Dingel3c038e62013-10-07 17:11:48 +02001788static void __kvm_inject_pfault_token(struct kvm_vcpu *vcpu, bool start_token,
1789 unsigned long token)
1790{
1791 struct kvm_s390_interrupt inti;
Jens Freimann383d0b02014-07-29 15:11:49 +02001792 struct kvm_s390_irq irq;
Dominik Dingel3c038e62013-10-07 17:11:48 +02001793
1794 if (start_token) {
Jens Freimann383d0b02014-07-29 15:11:49 +02001795 irq.u.ext.ext_params2 = token;
1796 irq.type = KVM_S390_INT_PFAULT_INIT;
1797 WARN_ON_ONCE(kvm_s390_inject_vcpu(vcpu, &irq));
Dominik Dingel3c038e62013-10-07 17:11:48 +02001798 } else {
1799 inti.type = KVM_S390_INT_PFAULT_DONE;
Jens Freimann383d0b02014-07-29 15:11:49 +02001800 inti.parm64 = token;
Dominik Dingel3c038e62013-10-07 17:11:48 +02001801 WARN_ON_ONCE(kvm_s390_inject_vm(vcpu->kvm, &inti));
1802 }
1803}
1804
1805void kvm_arch_async_page_not_present(struct kvm_vcpu *vcpu,
1806 struct kvm_async_pf *work)
1807{
1808 trace_kvm_s390_pfault_init(vcpu, work->arch.pfault_token);
1809 __kvm_inject_pfault_token(vcpu, true, work->arch.pfault_token);
1810}
1811
1812void kvm_arch_async_page_present(struct kvm_vcpu *vcpu,
1813 struct kvm_async_pf *work)
1814{
1815 trace_kvm_s390_pfault_done(vcpu, work->arch.pfault_token);
1816 __kvm_inject_pfault_token(vcpu, false, work->arch.pfault_token);
1817}
1818
1819void kvm_arch_async_page_ready(struct kvm_vcpu *vcpu,
1820 struct kvm_async_pf *work)
1821{
1822 /* s390 will always inject the page directly */
1823}
1824
1825bool kvm_arch_can_inject_async_page_present(struct kvm_vcpu *vcpu)
1826{
1827 /*
1828 * s390 will always inject the page directly,
1829 * but we still want check_async_completion to cleanup
1830 */
1831 return true;
1832}
1833
1834static int kvm_arch_setup_async_pf(struct kvm_vcpu *vcpu)
1835{
1836 hva_t hva;
1837 struct kvm_arch_async_pf arch;
1838 int rc;
1839
1840 if (vcpu->arch.pfault_token == KVM_S390_PFAULT_TOKEN_INVALID)
1841 return 0;
1842 if ((vcpu->arch.sie_block->gpsw.mask & vcpu->arch.pfault_select) !=
1843 vcpu->arch.pfault_compare)
1844 return 0;
1845 if (psw_extint_disabled(vcpu))
1846 return 0;
David Hildenbrand9a022062014-08-05 17:40:47 +02001847 if (kvm_s390_vcpu_has_irq(vcpu, 0))
Dominik Dingel3c038e62013-10-07 17:11:48 +02001848 return 0;
1849 if (!(vcpu->arch.sie_block->gcr[0] & 0x200ul))
1850 return 0;
1851 if (!vcpu->arch.gmap->pfault_enabled)
1852 return 0;
1853
Heiko Carstens81480cc2014-01-01 16:36:07 +01001854 hva = gfn_to_hva(vcpu->kvm, gpa_to_gfn(current->thread.gmap_addr));
1855 hva += current->thread.gmap_addr & ~PAGE_MASK;
1856 if (read_guest_real(vcpu, vcpu->arch.pfault_token, &arch.pfault_token, 8))
Dominik Dingel3c038e62013-10-07 17:11:48 +02001857 return 0;
1858
1859 rc = kvm_setup_async_pf(vcpu, current->thread.gmap_addr, hva, &arch);
1860 return rc;
1861}
1862
Thomas Huth3fb4c402013-09-12 10:33:43 +02001863static int vcpu_pre_run(struct kvm_vcpu *vcpu)
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001864{
Thomas Huth3fb4c402013-09-12 10:33:43 +02001865 int rc, cpuflags;
Carsten Ottee168bf82012-01-04 10:25:22 +01001866
Dominik Dingel3c038e62013-10-07 17:11:48 +02001867 /*
1868 * On s390 notifications for arriving pages will be delivered directly
1869 * to the guest but the house keeping for completed pfaults is
1870 * handled outside the worker.
1871 */
1872 kvm_check_async_pf_completion(vcpu);
1873
Christian Borntraeger5a32c1a2012-01-11 11:20:32 +01001874 memcpy(&vcpu->arch.sie_block->gg14, &vcpu->run->s.regs.gprs[14], 16);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001875
1876 if (need_resched())
1877 schedule();
1878
Martin Schwidefskyd3a73ac2014-04-15 12:55:07 +02001879 if (test_cpu_flag(CIF_MCCK_PENDING))
Christian Borntraeger71cde582008-05-21 13:37:34 +02001880 s390_handle_mcck();
1881
Jens Freimann79395032014-04-17 10:10:30 +02001882 if (!kvm_is_ucontrol(vcpu->kvm)) {
1883 rc = kvm_s390_deliver_pending_interrupts(vcpu);
1884 if (rc)
1885 return rc;
1886 }
Carsten Otte0ff31862008-05-21 13:37:37 +02001887
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02001888 rc = kvm_s390_handle_requests(vcpu);
1889 if (rc)
1890 return rc;
1891
David Hildenbrand27291e22014-01-23 12:26:52 +01001892 if (guestdbg_enabled(vcpu)) {
1893 kvm_s390_backup_guest_per_regs(vcpu);
1894 kvm_s390_patch_guest_per_regs(vcpu);
1895 }
1896
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001897 vcpu->arch.sie_block->icptcode = 0;
Thomas Huth3fb4c402013-09-12 10:33:43 +02001898 cpuflags = atomic_read(&vcpu->arch.sie_block->cpuflags);
1899 VCPU_EVENT(vcpu, 6, "entering sie flags %x", cpuflags);
1900 trace_kvm_s390_sie_enter(vcpu, cpuflags);
Dominik Dingel2b29a9f2013-07-26 15:04:00 +02001901
Thomas Huth3fb4c402013-09-12 10:33:43 +02001902 return 0;
1903}
1904
Thomas Huth492d8642015-02-10 16:11:01 +01001905static int vcpu_post_run_fault_in_sie(struct kvm_vcpu *vcpu)
1906{
1907 psw_t *psw = &vcpu->arch.sie_block->gpsw;
1908 u8 opcode;
1909 int rc;
1910
1911 VCPU_EVENT(vcpu, 3, "%s", "fault in sie instruction");
1912 trace_kvm_s390_sie_fault(vcpu);
1913
1914 /*
1915 * We want to inject an addressing exception, which is defined as a
1916 * suppressing or terminating exception. However, since we came here
1917 * by a DAT access exception, the PSW still points to the faulting
1918 * instruction since DAT exceptions are nullifying. So we've got
1919 * to look up the current opcode to get the length of the instruction
1920 * to be able to forward the PSW.
1921 */
Alexander Yarygin8ae04b82015-01-19 13:24:51 +03001922 rc = read_guest(vcpu, psw->addr, 0, &opcode, 1);
Thomas Huth492d8642015-02-10 16:11:01 +01001923 if (rc)
1924 return kvm_s390_inject_prog_cond(vcpu, rc);
1925 psw->addr = __rewind_psw(*psw, -insn_length(opcode));
1926
1927 return kvm_s390_inject_program_int(vcpu, PGM_ADDRESSING);
1928}
1929
Thomas Huth3fb4c402013-09-12 10:33:43 +02001930static int vcpu_post_run(struct kvm_vcpu *vcpu, int exit_reason)
1931{
Dominik Dingel24eb3a82013-06-17 16:25:18 +02001932 int rc = -1;
Dominik Dingel2b29a9f2013-07-26 15:04:00 +02001933
1934 VCPU_EVENT(vcpu, 6, "exit sie icptcode %d",
1935 vcpu->arch.sie_block->icptcode);
1936 trace_kvm_s390_sie_exit(vcpu, vcpu->arch.sie_block->icptcode);
1937
David Hildenbrand27291e22014-01-23 12:26:52 +01001938 if (guestdbg_enabled(vcpu))
1939 kvm_s390_restore_guest_per_regs(vcpu);
1940
Thomas Huth3fb4c402013-09-12 10:33:43 +02001941 if (exit_reason >= 0) {
Martin Schwidefsky7c470532013-05-17 14:41:37 +02001942 rc = 0;
Thomas Huth210b16072013-09-19 16:26:18 +02001943 } else if (kvm_is_ucontrol(vcpu->kvm)) {
1944 vcpu->run->exit_reason = KVM_EXIT_S390_UCONTROL;
1945 vcpu->run->s390_ucontrol.trans_exc_code =
1946 current->thread.gmap_addr;
1947 vcpu->run->s390_ucontrol.pgm_code = 0x10;
1948 rc = -EREMOTE;
Dominik Dingel24eb3a82013-06-17 16:25:18 +02001949
1950 } else if (current->thread.gmap_pfault) {
Dominik Dingel3c038e62013-10-07 17:11:48 +02001951 trace_kvm_s390_major_guest_pfault(vcpu);
Dominik Dingel24eb3a82013-06-17 16:25:18 +02001952 current->thread.gmap_pfault = 0;
Thomas Huthfa576c52014-05-06 17:20:16 +02001953 if (kvm_arch_setup_async_pf(vcpu)) {
Dominik Dingel24eb3a82013-06-17 16:25:18 +02001954 rc = 0;
Thomas Huthfa576c52014-05-06 17:20:16 +02001955 } else {
1956 gpa_t gpa = current->thread.gmap_addr;
1957 rc = kvm_arch_fault_in_page(vcpu, gpa, 1);
1958 }
Dominik Dingel24eb3a82013-06-17 16:25:18 +02001959 }
1960
Thomas Huth492d8642015-02-10 16:11:01 +01001961 if (rc == -1)
1962 rc = vcpu_post_run_fault_in_sie(vcpu);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001963
Christian Borntraeger5a32c1a2012-01-11 11:20:32 +01001964 memcpy(&vcpu->run->s.regs.gprs[14], &vcpu->arch.sie_block->gg14, 16);
Thomas Huth3fb4c402013-09-12 10:33:43 +02001965
Thomas Hutha76ccff2013-09-12 10:33:44 +02001966 if (rc == 0) {
1967 if (kvm_is_ucontrol(vcpu->kvm))
Christian Borntraeger2955c832014-03-06 16:01:38 +01001968 /* Don't exit for host interrupts. */
1969 rc = vcpu->arch.sie_block->icptcode ? -EOPNOTSUPP : 0;
Thomas Hutha76ccff2013-09-12 10:33:44 +02001970 else
1971 rc = kvm_handle_sie_intercept(vcpu);
1972 }
1973
Thomas Huth3fb4c402013-09-12 10:33:43 +02001974 return rc;
1975}
1976
1977static int __vcpu_run(struct kvm_vcpu *vcpu)
1978{
1979 int rc, exit_reason;
1980
Thomas Huth800c1062013-09-12 10:33:45 +02001981 /*
1982 * We try to hold kvm->srcu during most of vcpu_run (except when run-
1983 * ning the guest), so that memslots (and other stuff) are protected
1984 */
1985 vcpu->srcu_idx = srcu_read_lock(&vcpu->kvm->srcu);
1986
Thomas Hutha76ccff2013-09-12 10:33:44 +02001987 do {
1988 rc = vcpu_pre_run(vcpu);
1989 if (rc)
1990 break;
Thomas Huth3fb4c402013-09-12 10:33:43 +02001991
Thomas Huth800c1062013-09-12 10:33:45 +02001992 srcu_read_unlock(&vcpu->kvm->srcu, vcpu->srcu_idx);
Thomas Hutha76ccff2013-09-12 10:33:44 +02001993 /*
1994 * As PF_VCPU will be used in fault handler, between
1995 * guest_enter and guest_exit should be no uaccess.
1996 */
1997 preempt_disable();
1998 kvm_guest_enter();
1999 preempt_enable();
2000 exit_reason = sie64a(vcpu->arch.sie_block,
2001 vcpu->run->s.regs.gprs);
2002 kvm_guest_exit();
Thomas Huth800c1062013-09-12 10:33:45 +02002003 vcpu->srcu_idx = srcu_read_lock(&vcpu->kvm->srcu);
Thomas Huth3fb4c402013-09-12 10:33:43 +02002004
Thomas Hutha76ccff2013-09-12 10:33:44 +02002005 rc = vcpu_post_run(vcpu, exit_reason);
David Hildenbrand27291e22014-01-23 12:26:52 +01002006 } while (!signal_pending(current) && !guestdbg_exit_pending(vcpu) && !rc);
Thomas Huth3fb4c402013-09-12 10:33:43 +02002007
Thomas Huth800c1062013-09-12 10:33:45 +02002008 srcu_read_unlock(&vcpu->kvm->srcu, vcpu->srcu_idx);
Carsten Ottee168bf82012-01-04 10:25:22 +01002009 return rc;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002010}
2011
David Hildenbrandb028ee32014-07-17 10:47:43 +02002012static void sync_regs(struct kvm_vcpu *vcpu, struct kvm_run *kvm_run)
2013{
2014 vcpu->arch.sie_block->gpsw.mask = kvm_run->psw_mask;
2015 vcpu->arch.sie_block->gpsw.addr = kvm_run->psw_addr;
2016 if (kvm_run->kvm_dirty_regs & KVM_SYNC_PREFIX)
2017 kvm_s390_set_prefix(vcpu, kvm_run->s.regs.prefix);
2018 if (kvm_run->kvm_dirty_regs & KVM_SYNC_CRS) {
2019 memcpy(&vcpu->arch.sie_block->gcr, &kvm_run->s.regs.crs, 128);
David Hildenbrandd3d692c2014-07-29 08:53:36 +02002020 /* some control register changes require a tlb flush */
2021 kvm_make_request(KVM_REQ_TLB_FLUSH, vcpu);
David Hildenbrandb028ee32014-07-17 10:47:43 +02002022 }
2023 if (kvm_run->kvm_dirty_regs & KVM_SYNC_ARCH0) {
2024 vcpu->arch.sie_block->cputm = kvm_run->s.regs.cputm;
2025 vcpu->arch.sie_block->ckc = kvm_run->s.regs.ckc;
2026 vcpu->arch.sie_block->todpr = kvm_run->s.regs.todpr;
2027 vcpu->arch.sie_block->pp = kvm_run->s.regs.pp;
2028 vcpu->arch.sie_block->gbea = kvm_run->s.regs.gbea;
2029 }
2030 if (kvm_run->kvm_dirty_regs & KVM_SYNC_PFAULT) {
2031 vcpu->arch.pfault_token = kvm_run->s.regs.pft;
2032 vcpu->arch.pfault_select = kvm_run->s.regs.pfs;
2033 vcpu->arch.pfault_compare = kvm_run->s.regs.pfc;
David Hildenbrand9fbd8082014-10-09 15:01:38 +02002034 if (vcpu->arch.pfault_token == KVM_S390_PFAULT_TOKEN_INVALID)
2035 kvm_clear_async_pf_completion_queue(vcpu);
David Hildenbrandb028ee32014-07-17 10:47:43 +02002036 }
2037 kvm_run->kvm_dirty_regs = 0;
2038}
2039
2040static void store_regs(struct kvm_vcpu *vcpu, struct kvm_run *kvm_run)
2041{
2042 kvm_run->psw_mask = vcpu->arch.sie_block->gpsw.mask;
2043 kvm_run->psw_addr = vcpu->arch.sie_block->gpsw.addr;
2044 kvm_run->s.regs.prefix = kvm_s390_get_prefix(vcpu);
2045 memcpy(&kvm_run->s.regs.crs, &vcpu->arch.sie_block->gcr, 128);
2046 kvm_run->s.regs.cputm = vcpu->arch.sie_block->cputm;
2047 kvm_run->s.regs.ckc = vcpu->arch.sie_block->ckc;
2048 kvm_run->s.regs.todpr = vcpu->arch.sie_block->todpr;
2049 kvm_run->s.regs.pp = vcpu->arch.sie_block->pp;
2050 kvm_run->s.regs.gbea = vcpu->arch.sie_block->gbea;
2051 kvm_run->s.regs.pft = vcpu->arch.pfault_token;
2052 kvm_run->s.regs.pfs = vcpu->arch.pfault_select;
2053 kvm_run->s.regs.pfc = vcpu->arch.pfault_compare;
2054}
2055
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002056int kvm_arch_vcpu_ioctl_run(struct kvm_vcpu *vcpu, struct kvm_run *kvm_run)
2057{
Christian Borntraeger8f2abe62008-03-25 18:47:23 +01002058 int rc;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002059 sigset_t sigsaved;
2060
David Hildenbrand27291e22014-01-23 12:26:52 +01002061 if (guestdbg_exit_pending(vcpu)) {
2062 kvm_s390_prepare_debug_exit(vcpu);
2063 return 0;
2064 }
2065
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002066 if (vcpu->sigset_active)
2067 sigprocmask(SIG_SETMASK, &vcpu->sigset, &sigsaved);
2068
David Hildenbrand6352e4d2014-04-10 17:35:00 +02002069 if (!kvm_s390_user_cpu_state_ctrl(vcpu->kvm)) {
2070 kvm_s390_vcpu_start(vcpu);
2071 } else if (is_vcpu_stopped(vcpu)) {
2072 pr_err_ratelimited("kvm-s390: can't run stopped vcpu %d\n",
2073 vcpu->vcpu_id);
2074 return -EINVAL;
2075 }
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002076
David Hildenbrandb028ee32014-07-17 10:47:43 +02002077 sync_regs(vcpu, kvm_run);
Carsten Otted7b0b5e2009-11-19 14:21:16 +01002078
Heiko Carstensdab4079d2009-06-12 10:26:32 +02002079 might_fault();
Thomas Hutha76ccff2013-09-12 10:33:44 +02002080 rc = __vcpu_run(vcpu);
Christian Ehrhardt9ace9032009-05-20 15:34:55 +02002081
Christian Ehrhardtb1d16c42009-05-20 15:34:56 +02002082 if (signal_pending(current) && !rc) {
2083 kvm_run->exit_reason = KVM_EXIT_INTR;
Christian Borntraeger8f2abe62008-03-25 18:47:23 +01002084 rc = -EINTR;
Christian Ehrhardtb1d16c42009-05-20 15:34:56 +02002085 }
Christian Borntraeger8f2abe62008-03-25 18:47:23 +01002086
David Hildenbrand27291e22014-01-23 12:26:52 +01002087 if (guestdbg_exit_pending(vcpu) && !rc) {
2088 kvm_s390_prepare_debug_exit(vcpu);
2089 rc = 0;
2090 }
2091
Heiko Carstensb8e660b2010-02-26 22:37:41 +01002092 if (rc == -EOPNOTSUPP) {
Christian Borntraeger8f2abe62008-03-25 18:47:23 +01002093 /* intercept cannot be handled in-kernel, prepare kvm-run */
2094 kvm_run->exit_reason = KVM_EXIT_S390_SIEIC;
2095 kvm_run->s390_sieic.icptcode = vcpu->arch.sie_block->icptcode;
Christian Borntraeger8f2abe62008-03-25 18:47:23 +01002096 kvm_run->s390_sieic.ipa = vcpu->arch.sie_block->ipa;
2097 kvm_run->s390_sieic.ipb = vcpu->arch.sie_block->ipb;
2098 rc = 0;
2099 }
2100
2101 if (rc == -EREMOTE) {
2102 /* intercept was handled, but userspace support is needed
2103 * kvm_run has been prepared by the handler */
2104 rc = 0;
2105 }
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002106
David Hildenbrandb028ee32014-07-17 10:47:43 +02002107 store_regs(vcpu, kvm_run);
Carsten Otted7b0b5e2009-11-19 14:21:16 +01002108
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002109 if (vcpu->sigset_active)
2110 sigprocmask(SIG_SETMASK, &sigsaved, NULL);
2111
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002112 vcpu->stat.exit_userspace++;
Heiko Carstens7e8e6ab2008-04-04 15:12:35 +02002113 return rc;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002114}
2115
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002116/*
2117 * store status at address
2118 * we use have two special cases:
2119 * KVM_S390_STORE_STATUS_NOADDR: -> 0x1200 on 64 bit
2120 * KVM_S390_STORE_STATUS_PREFIXED: -> prefix
2121 */
Heiko Carstensd0bce602014-01-01 16:45:58 +01002122int kvm_s390_store_status_unloaded(struct kvm_vcpu *vcpu, unsigned long gpa)
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002123{
Carsten Otte092670c2011-07-24 10:48:22 +02002124 unsigned char archmode = 1;
Michael Muellerfda902c2014-05-13 16:58:30 +02002125 unsigned int px;
Thomas Huth178bd782013-11-13 20:28:18 +01002126 u64 clkcomp;
Heiko Carstensd0bce602014-01-01 16:45:58 +01002127 int rc;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002128
Heiko Carstensd0bce602014-01-01 16:45:58 +01002129 if (gpa == KVM_S390_STORE_STATUS_NOADDR) {
2130 if (write_guest_abs(vcpu, 163, &archmode, 1))
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002131 return -EFAULT;
Heiko Carstensd0bce602014-01-01 16:45:58 +01002132 gpa = SAVE_AREA_BASE;
2133 } else if (gpa == KVM_S390_STORE_STATUS_PREFIXED) {
2134 if (write_guest_real(vcpu, 163, &archmode, 1))
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002135 return -EFAULT;
Heiko Carstensd0bce602014-01-01 16:45:58 +01002136 gpa = kvm_s390_real_to_abs(vcpu, SAVE_AREA_BASE);
2137 }
2138 rc = write_guest_abs(vcpu, gpa + offsetof(struct save_area, fp_regs),
2139 vcpu->arch.guest_fpregs.fprs, 128);
2140 rc |= write_guest_abs(vcpu, gpa + offsetof(struct save_area, gp_regs),
2141 vcpu->run->s.regs.gprs, 128);
2142 rc |= write_guest_abs(vcpu, gpa + offsetof(struct save_area, psw),
2143 &vcpu->arch.sie_block->gpsw, 16);
Michael Muellerfda902c2014-05-13 16:58:30 +02002144 px = kvm_s390_get_prefix(vcpu);
Heiko Carstensd0bce602014-01-01 16:45:58 +01002145 rc |= write_guest_abs(vcpu, gpa + offsetof(struct save_area, pref_reg),
Michael Muellerfda902c2014-05-13 16:58:30 +02002146 &px, 4);
Heiko Carstensd0bce602014-01-01 16:45:58 +01002147 rc |= write_guest_abs(vcpu,
2148 gpa + offsetof(struct save_area, fp_ctrl_reg),
2149 &vcpu->arch.guest_fpregs.fpc, 4);
2150 rc |= write_guest_abs(vcpu, gpa + offsetof(struct save_area, tod_reg),
2151 &vcpu->arch.sie_block->todpr, 4);
2152 rc |= write_guest_abs(vcpu, gpa + offsetof(struct save_area, timer),
2153 &vcpu->arch.sie_block->cputm, 8);
Thomas Huth178bd782013-11-13 20:28:18 +01002154 clkcomp = vcpu->arch.sie_block->ckc >> 8;
Heiko Carstensd0bce602014-01-01 16:45:58 +01002155 rc |= write_guest_abs(vcpu, gpa + offsetof(struct save_area, clk_cmp),
2156 &clkcomp, 8);
2157 rc |= write_guest_abs(vcpu, gpa + offsetof(struct save_area, acc_regs),
2158 &vcpu->run->s.regs.acrs, 64);
2159 rc |= write_guest_abs(vcpu, gpa + offsetof(struct save_area, ctrl_regs),
2160 &vcpu->arch.sie_block->gcr, 128);
2161 return rc ? -EFAULT : 0;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002162}
2163
Thomas Huthe8798922013-11-06 15:46:33 +01002164int kvm_s390_vcpu_store_status(struct kvm_vcpu *vcpu, unsigned long addr)
2165{
2166 /*
2167 * The guest FPRS and ACRS are in the host FPRS/ACRS due to the lazy
2168 * copying in vcpu load/put. Lets update our copies before we save
2169 * it into the save area
2170 */
2171 save_fp_ctl(&vcpu->arch.guest_fpregs.fpc);
2172 save_fp_regs(vcpu->arch.guest_fpregs.fprs);
2173 save_access_regs(vcpu->run->s.regs.acrs);
2174
2175 return kvm_s390_store_status_unloaded(vcpu, addr);
2176}
2177
Eric Farmanbc17de72014-04-14 16:01:09 -04002178/*
2179 * store additional status at address
2180 */
2181int kvm_s390_store_adtl_status_unloaded(struct kvm_vcpu *vcpu,
2182 unsigned long gpa)
2183{
2184 /* Only bits 0-53 are used for address formation */
2185 if (!(gpa & ~0x3ff))
2186 return 0;
2187
2188 return write_guest_abs(vcpu, gpa & ~0x3ff,
2189 (void *)&vcpu->run->s.regs.vrs, 512);
2190}
2191
2192int kvm_s390_vcpu_store_adtl_status(struct kvm_vcpu *vcpu, unsigned long addr)
2193{
2194 if (!test_kvm_facility(vcpu->kvm, 129))
2195 return 0;
2196
2197 /*
2198 * The guest VXRS are in the host VXRs due to the lazy
2199 * copying in vcpu load/put. Let's update our copies before we save
2200 * it into the save area.
2201 */
2202 save_vx_regs((__vector128 *)&vcpu->run->s.regs.vrs);
2203
2204 return kvm_s390_store_adtl_status_unloaded(vcpu, addr);
2205}
2206
David Hildenbrand8ad35752014-03-14 11:00:21 +01002207static void __disable_ibs_on_vcpu(struct kvm_vcpu *vcpu)
2208{
2209 kvm_check_request(KVM_REQ_ENABLE_IBS, vcpu);
2210 kvm_make_request(KVM_REQ_DISABLE_IBS, vcpu);
2211 exit_sie_sync(vcpu);
2212}
2213
2214static void __disable_ibs_on_all_vcpus(struct kvm *kvm)
2215{
2216 unsigned int i;
2217 struct kvm_vcpu *vcpu;
2218
2219 kvm_for_each_vcpu(i, vcpu, kvm) {
2220 __disable_ibs_on_vcpu(vcpu);
2221 }
2222}
2223
2224static void __enable_ibs_on_vcpu(struct kvm_vcpu *vcpu)
2225{
2226 kvm_check_request(KVM_REQ_DISABLE_IBS, vcpu);
2227 kvm_make_request(KVM_REQ_ENABLE_IBS, vcpu);
2228 exit_sie_sync(vcpu);
2229}
2230
David Hildenbrand6852d7b2014-03-14 10:59:29 +01002231void kvm_s390_vcpu_start(struct kvm_vcpu *vcpu)
2232{
David Hildenbrand8ad35752014-03-14 11:00:21 +01002233 int i, online_vcpus, started_vcpus = 0;
2234
2235 if (!is_vcpu_stopped(vcpu))
2236 return;
2237
David Hildenbrand6852d7b2014-03-14 10:59:29 +01002238 trace_kvm_s390_vcpu_start_stop(vcpu->vcpu_id, 1);
David Hildenbrand8ad35752014-03-14 11:00:21 +01002239 /* Only one cpu at a time may enter/leave the STOPPED state. */
David Hildenbrand433b9ee2014-05-06 16:11:14 +02002240 spin_lock(&vcpu->kvm->arch.start_stop_lock);
David Hildenbrand8ad35752014-03-14 11:00:21 +01002241 online_vcpus = atomic_read(&vcpu->kvm->online_vcpus);
2242
2243 for (i = 0; i < online_vcpus; i++) {
2244 if (!is_vcpu_stopped(vcpu->kvm->vcpus[i]))
2245 started_vcpus++;
2246 }
2247
2248 if (started_vcpus == 0) {
2249 /* we're the only active VCPU -> speed it up */
2250 __enable_ibs_on_vcpu(vcpu);
2251 } else if (started_vcpus == 1) {
2252 /*
2253 * As we are starting a second VCPU, we have to disable
2254 * the IBS facility on all VCPUs to remove potentially
2255 * oustanding ENABLE requests.
2256 */
2257 __disable_ibs_on_all_vcpus(vcpu->kvm);
2258 }
2259
David Hildenbrand6852d7b2014-03-14 10:59:29 +01002260 atomic_clear_mask(CPUSTAT_STOPPED, &vcpu->arch.sie_block->cpuflags);
David Hildenbrand8ad35752014-03-14 11:00:21 +01002261 /*
2262 * Another VCPU might have used IBS while we were offline.
2263 * Let's play safe and flush the VCPU at startup.
2264 */
David Hildenbrandd3d692c2014-07-29 08:53:36 +02002265 kvm_make_request(KVM_REQ_TLB_FLUSH, vcpu);
David Hildenbrand433b9ee2014-05-06 16:11:14 +02002266 spin_unlock(&vcpu->kvm->arch.start_stop_lock);
David Hildenbrand8ad35752014-03-14 11:00:21 +01002267 return;
David Hildenbrand6852d7b2014-03-14 10:59:29 +01002268}
2269
2270void kvm_s390_vcpu_stop(struct kvm_vcpu *vcpu)
2271{
David Hildenbrand8ad35752014-03-14 11:00:21 +01002272 int i, online_vcpus, started_vcpus = 0;
2273 struct kvm_vcpu *started_vcpu = NULL;
2274
2275 if (is_vcpu_stopped(vcpu))
2276 return;
2277
David Hildenbrand6852d7b2014-03-14 10:59:29 +01002278 trace_kvm_s390_vcpu_start_stop(vcpu->vcpu_id, 0);
David Hildenbrand8ad35752014-03-14 11:00:21 +01002279 /* Only one cpu at a time may enter/leave the STOPPED state. */
David Hildenbrand433b9ee2014-05-06 16:11:14 +02002280 spin_lock(&vcpu->kvm->arch.start_stop_lock);
David Hildenbrand8ad35752014-03-14 11:00:21 +01002281 online_vcpus = atomic_read(&vcpu->kvm->online_vcpus);
2282
David Hildenbrand32f5ff632014-04-14 12:40:03 +02002283 /* SIGP STOP and SIGP STOP AND STORE STATUS has been fully processed */
David Hildenbrand6cddd432014-10-15 16:48:53 +02002284 kvm_s390_clear_stop_irq(vcpu);
David Hildenbrand32f5ff632014-04-14 12:40:03 +02002285
David Hildenbrand6cddd432014-10-15 16:48:53 +02002286 atomic_set_mask(CPUSTAT_STOPPED, &vcpu->arch.sie_block->cpuflags);
David Hildenbrand8ad35752014-03-14 11:00:21 +01002287 __disable_ibs_on_vcpu(vcpu);
2288
2289 for (i = 0; i < online_vcpus; i++) {
2290 if (!is_vcpu_stopped(vcpu->kvm->vcpus[i])) {
2291 started_vcpus++;
2292 started_vcpu = vcpu->kvm->vcpus[i];
2293 }
2294 }
2295
2296 if (started_vcpus == 1) {
2297 /*
2298 * As we only have one VCPU left, we want to enable the
2299 * IBS facility for that VCPU to speed it up.
2300 */
2301 __enable_ibs_on_vcpu(started_vcpu);
2302 }
2303
David Hildenbrand433b9ee2014-05-06 16:11:14 +02002304 spin_unlock(&vcpu->kvm->arch.start_stop_lock);
David Hildenbrand8ad35752014-03-14 11:00:21 +01002305 return;
David Hildenbrand6852d7b2014-03-14 10:59:29 +01002306}
2307
Cornelia Huckd6712df2012-12-20 15:32:11 +01002308static int kvm_vcpu_ioctl_enable_cap(struct kvm_vcpu *vcpu,
2309 struct kvm_enable_cap *cap)
2310{
2311 int r;
2312
2313 if (cap->flags)
2314 return -EINVAL;
2315
2316 switch (cap->cap) {
Cornelia Huckfa6b7fe2012-12-20 15:32:12 +01002317 case KVM_CAP_S390_CSS_SUPPORT:
2318 if (!vcpu->kvm->arch.css_support) {
2319 vcpu->kvm->arch.css_support = 1;
2320 trace_kvm_s390_enable_css(vcpu->kvm);
2321 }
2322 r = 0;
2323 break;
Cornelia Huckd6712df2012-12-20 15:32:11 +01002324 default:
2325 r = -EINVAL;
2326 break;
2327 }
2328 return r;
2329}
2330
Thomas Huth41408c282015-02-06 15:01:21 +01002331static long kvm_s390_guest_mem_op(struct kvm_vcpu *vcpu,
2332 struct kvm_s390_mem_op *mop)
2333{
2334 void __user *uaddr = (void __user *)mop->buf;
2335 void *tmpbuf = NULL;
2336 int r, srcu_idx;
2337 const u64 supported_flags = KVM_S390_MEMOP_F_INJECT_EXCEPTION
2338 | KVM_S390_MEMOP_F_CHECK_ONLY;
2339
2340 if (mop->flags & ~supported_flags)
2341 return -EINVAL;
2342
2343 if (mop->size > MEM_OP_MAX_SIZE)
2344 return -E2BIG;
2345
2346 if (!(mop->flags & KVM_S390_MEMOP_F_CHECK_ONLY)) {
2347 tmpbuf = vmalloc(mop->size);
2348 if (!tmpbuf)
2349 return -ENOMEM;
2350 }
2351
2352 srcu_idx = srcu_read_lock(&vcpu->kvm->srcu);
2353
2354 switch (mop->op) {
2355 case KVM_S390_MEMOP_LOGICAL_READ:
2356 if (mop->flags & KVM_S390_MEMOP_F_CHECK_ONLY) {
2357 r = check_gva_range(vcpu, mop->gaddr, mop->ar, mop->size, false);
2358 break;
2359 }
2360 r = read_guest(vcpu, mop->gaddr, mop->ar, tmpbuf, mop->size);
2361 if (r == 0) {
2362 if (copy_to_user(uaddr, tmpbuf, mop->size))
2363 r = -EFAULT;
2364 }
2365 break;
2366 case KVM_S390_MEMOP_LOGICAL_WRITE:
2367 if (mop->flags & KVM_S390_MEMOP_F_CHECK_ONLY) {
2368 r = check_gva_range(vcpu, mop->gaddr, mop->ar, mop->size, true);
2369 break;
2370 }
2371 if (copy_from_user(tmpbuf, uaddr, mop->size)) {
2372 r = -EFAULT;
2373 break;
2374 }
2375 r = write_guest(vcpu, mop->gaddr, mop->ar, tmpbuf, mop->size);
2376 break;
2377 default:
2378 r = -EINVAL;
2379 }
2380
2381 srcu_read_unlock(&vcpu->kvm->srcu, srcu_idx);
2382
2383 if (r > 0 && (mop->flags & KVM_S390_MEMOP_F_INJECT_EXCEPTION) != 0)
2384 kvm_s390_inject_prog_irq(vcpu, &vcpu->arch.pgm);
2385
2386 vfree(tmpbuf);
2387 return r;
2388}
2389
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002390long kvm_arch_vcpu_ioctl(struct file *filp,
2391 unsigned int ioctl, unsigned long arg)
2392{
2393 struct kvm_vcpu *vcpu = filp->private_data;
2394 void __user *argp = (void __user *)arg;
Thomas Huth800c1062013-09-12 10:33:45 +02002395 int idx;
Avi Kivitybc923cc2010-05-13 12:21:46 +03002396 long r;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002397
Avi Kivity93736622010-05-13 12:35:17 +03002398 switch (ioctl) {
Jens Freimann47b43c52014-11-11 20:57:06 +01002399 case KVM_S390_IRQ: {
2400 struct kvm_s390_irq s390irq;
2401
2402 r = -EFAULT;
2403 if (copy_from_user(&s390irq, argp, sizeof(s390irq)))
2404 break;
2405 r = kvm_s390_inject_vcpu(vcpu, &s390irq);
2406 break;
2407 }
Avi Kivity93736622010-05-13 12:35:17 +03002408 case KVM_S390_INTERRUPT: {
Carsten Otteba5c1e92008-03-25 18:47:26 +01002409 struct kvm_s390_interrupt s390int;
Jens Freimann383d0b02014-07-29 15:11:49 +02002410 struct kvm_s390_irq s390irq;
Carsten Otteba5c1e92008-03-25 18:47:26 +01002411
Avi Kivity93736622010-05-13 12:35:17 +03002412 r = -EFAULT;
Carsten Otteba5c1e92008-03-25 18:47:26 +01002413 if (copy_from_user(&s390int, argp, sizeof(s390int)))
Avi Kivity93736622010-05-13 12:35:17 +03002414 break;
Jens Freimann383d0b02014-07-29 15:11:49 +02002415 if (s390int_to_s390irq(&s390int, &s390irq))
2416 return -EINVAL;
2417 r = kvm_s390_inject_vcpu(vcpu, &s390irq);
Avi Kivity93736622010-05-13 12:35:17 +03002418 break;
Carsten Otteba5c1e92008-03-25 18:47:26 +01002419 }
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002420 case KVM_S390_STORE_STATUS:
Thomas Huth800c1062013-09-12 10:33:45 +02002421 idx = srcu_read_lock(&vcpu->kvm->srcu);
Avi Kivitybc923cc2010-05-13 12:21:46 +03002422 r = kvm_s390_vcpu_store_status(vcpu, arg);
Thomas Huth800c1062013-09-12 10:33:45 +02002423 srcu_read_unlock(&vcpu->kvm->srcu, idx);
Avi Kivitybc923cc2010-05-13 12:21:46 +03002424 break;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002425 case KVM_S390_SET_INITIAL_PSW: {
2426 psw_t psw;
2427
Avi Kivitybc923cc2010-05-13 12:21:46 +03002428 r = -EFAULT;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002429 if (copy_from_user(&psw, argp, sizeof(psw)))
Avi Kivitybc923cc2010-05-13 12:21:46 +03002430 break;
2431 r = kvm_arch_vcpu_ioctl_set_initial_psw(vcpu, psw);
2432 break;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002433 }
2434 case KVM_S390_INITIAL_RESET:
Avi Kivitybc923cc2010-05-13 12:21:46 +03002435 r = kvm_arch_vcpu_ioctl_initial_reset(vcpu);
2436 break;
Carsten Otte14eebd92012-05-15 14:15:26 +02002437 case KVM_SET_ONE_REG:
2438 case KVM_GET_ONE_REG: {
2439 struct kvm_one_reg reg;
2440 r = -EFAULT;
2441 if (copy_from_user(&reg, argp, sizeof(reg)))
2442 break;
2443 if (ioctl == KVM_SET_ONE_REG)
2444 r = kvm_arch_vcpu_ioctl_set_one_reg(vcpu, &reg);
2445 else
2446 r = kvm_arch_vcpu_ioctl_get_one_reg(vcpu, &reg);
2447 break;
2448 }
Carsten Otte27e03932012-01-04 10:25:21 +01002449#ifdef CONFIG_KVM_S390_UCONTROL
2450 case KVM_S390_UCAS_MAP: {
2451 struct kvm_s390_ucas_mapping ucasmap;
2452
2453 if (copy_from_user(&ucasmap, argp, sizeof(ucasmap))) {
2454 r = -EFAULT;
2455 break;
2456 }
2457
2458 if (!kvm_is_ucontrol(vcpu->kvm)) {
2459 r = -EINVAL;
2460 break;
2461 }
2462
2463 r = gmap_map_segment(vcpu->arch.gmap, ucasmap.user_addr,
2464 ucasmap.vcpu_addr, ucasmap.length);
2465 break;
2466 }
2467 case KVM_S390_UCAS_UNMAP: {
2468 struct kvm_s390_ucas_mapping ucasmap;
2469
2470 if (copy_from_user(&ucasmap, argp, sizeof(ucasmap))) {
2471 r = -EFAULT;
2472 break;
2473 }
2474
2475 if (!kvm_is_ucontrol(vcpu->kvm)) {
2476 r = -EINVAL;
2477 break;
2478 }
2479
2480 r = gmap_unmap_segment(vcpu->arch.gmap, ucasmap.vcpu_addr,
2481 ucasmap.length);
2482 break;
2483 }
2484#endif
Carsten Otteccc79102012-01-04 10:25:26 +01002485 case KVM_S390_VCPU_FAULT: {
Martin Schwidefsky527e30b2014-04-30 16:04:25 +02002486 r = gmap_fault(vcpu->arch.gmap, arg, 0);
Carsten Otteccc79102012-01-04 10:25:26 +01002487 break;
2488 }
Cornelia Huckd6712df2012-12-20 15:32:11 +01002489 case KVM_ENABLE_CAP:
2490 {
2491 struct kvm_enable_cap cap;
2492 r = -EFAULT;
2493 if (copy_from_user(&cap, argp, sizeof(cap)))
2494 break;
2495 r = kvm_vcpu_ioctl_enable_cap(vcpu, &cap);
2496 break;
2497 }
Thomas Huth41408c282015-02-06 15:01:21 +01002498 case KVM_S390_MEM_OP: {
2499 struct kvm_s390_mem_op mem_op;
2500
2501 if (copy_from_user(&mem_op, argp, sizeof(mem_op)) == 0)
2502 r = kvm_s390_guest_mem_op(vcpu, &mem_op);
2503 else
2504 r = -EFAULT;
2505 break;
2506 }
Jens Freimann816c7662014-11-24 17:13:46 +01002507 case KVM_S390_SET_IRQ_STATE: {
2508 struct kvm_s390_irq_state irq_state;
2509
2510 r = -EFAULT;
2511 if (copy_from_user(&irq_state, argp, sizeof(irq_state)))
2512 break;
2513 if (irq_state.len > VCPU_IRQS_MAX_BUF ||
2514 irq_state.len == 0 ||
2515 irq_state.len % sizeof(struct kvm_s390_irq) > 0) {
2516 r = -EINVAL;
2517 break;
2518 }
2519 r = kvm_s390_set_irq_state(vcpu,
2520 (void __user *) irq_state.buf,
2521 irq_state.len);
2522 break;
2523 }
2524 case KVM_S390_GET_IRQ_STATE: {
2525 struct kvm_s390_irq_state irq_state;
2526
2527 r = -EFAULT;
2528 if (copy_from_user(&irq_state, argp, sizeof(irq_state)))
2529 break;
2530 if (irq_state.len == 0) {
2531 r = -EINVAL;
2532 break;
2533 }
2534 r = kvm_s390_get_irq_state(vcpu,
2535 (__u8 __user *) irq_state.buf,
2536 irq_state.len);
2537 break;
2538 }
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002539 default:
Carsten Otte3e6afcf2012-01-04 10:25:30 +01002540 r = -ENOTTY;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002541 }
Avi Kivitybc923cc2010-05-13 12:21:46 +03002542 return r;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002543}
2544
Carsten Otte5b1c1492012-01-04 10:25:23 +01002545int kvm_arch_vcpu_fault(struct kvm_vcpu *vcpu, struct vm_fault *vmf)
2546{
2547#ifdef CONFIG_KVM_S390_UCONTROL
2548 if ((vmf->pgoff == KVM_S390_SIE_PAGE_OFFSET)
2549 && (kvm_is_ucontrol(vcpu->kvm))) {
2550 vmf->page = virt_to_page(vcpu->arch.sie_block);
2551 get_page(vmf->page);
2552 return 0;
2553 }
2554#endif
2555 return VM_FAULT_SIGBUS;
2556}
2557
Aneesh Kumar K.V55870272013-10-07 22:18:00 +05302558int kvm_arch_create_memslot(struct kvm *kvm, struct kvm_memory_slot *slot,
2559 unsigned long npages)
Takuya Yoshikawadb3fe4e2012-02-08 13:02:18 +09002560{
2561 return 0;
2562}
2563
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002564/* Section: memory related */
Marcelo Tosattif7784b82009-12-23 14:35:18 -02002565int kvm_arch_prepare_memory_region(struct kvm *kvm,
2566 struct kvm_memory_slot *memslot,
Takuya Yoshikawa7b6195a2013-02-27 19:44:34 +09002567 struct kvm_userspace_memory_region *mem,
2568 enum kvm_mr_change change)
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002569{
Nick Wangdd2887e2013-03-25 17:22:57 +01002570 /* A few sanity checks. We can have memory slots which have to be
2571 located/ended at a segment boundary (1MB). The memory in userland is
2572 ok to be fragmented into various different vmas. It is okay to mmap()
2573 and munmap() stuff in this slot after doing this call at any time */
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002574
Carsten Otte598841c2011-07-24 10:48:21 +02002575 if (mem->userspace_addr & 0xffffful)
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002576 return -EINVAL;
2577
Carsten Otte598841c2011-07-24 10:48:21 +02002578 if (mem->memory_size & 0xffffful)
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002579 return -EINVAL;
2580
Marcelo Tosattif7784b82009-12-23 14:35:18 -02002581 return 0;
2582}
2583
2584void kvm_arch_commit_memory_region(struct kvm *kvm,
2585 struct kvm_userspace_memory_region *mem,
Takuya Yoshikawa84826442013-02-27 19:45:25 +09002586 const struct kvm_memory_slot *old,
2587 enum kvm_mr_change change)
Marcelo Tosattif7784b82009-12-23 14:35:18 -02002588{
Carsten Ottef7850c92011-07-24 10:48:23 +02002589 int rc;
Marcelo Tosattif7784b82009-12-23 14:35:18 -02002590
Christian Borntraeger2cef4de2013-03-25 17:22:48 +01002591 /* If the basics of the memslot do not change, we do not want
2592 * to update the gmap. Every update causes several unnecessary
2593 * segment translation exceptions. This is usually handled just
2594 * fine by the normal fault handler + gmap, but it will also
2595 * cause faults on the prefix page of running guest CPUs.
2596 */
2597 if (old->userspace_addr == mem->userspace_addr &&
2598 old->base_gfn * PAGE_SIZE == mem->guest_phys_addr &&
2599 old->npages * PAGE_SIZE == mem->memory_size)
2600 return;
Carsten Otte598841c2011-07-24 10:48:21 +02002601
2602 rc = gmap_map_segment(kvm->arch.gmap, mem->userspace_addr,
2603 mem->guest_phys_addr, mem->memory_size);
2604 if (rc)
Carsten Ottef7850c92011-07-24 10:48:23 +02002605 printk(KERN_WARNING "kvm-s390: failed to commit memory region\n");
Carsten Otte598841c2011-07-24 10:48:21 +02002606 return;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002607}
2608
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002609static int __init kvm_s390_init(void)
2610{
Michael Mueller9d8d5782015-02-02 15:42:51 +01002611 return kvm_init(NULL, sizeof(struct kvm_vcpu), 0, THIS_MODULE);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002612}
2613
2614static void __exit kvm_s390_exit(void)
2615{
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002616 kvm_exit();
2617}
2618
2619module_init(kvm_s390_init);
2620module_exit(kvm_s390_exit);
Cornelia Huck566af942013-05-27 18:42:33 +02002621
2622/*
2623 * Enable autoloading of the kvm module.
2624 * Note that we add the module alias here instead of virt/kvm/kvm_main.c
2625 * since x86 takes a different approach.
2626 */
2627#include <linux/miscdevice.h>
2628MODULE_ALIAS_MISCDEV(KVM_MINOR);
2629MODULE_ALIAS("devname:kvm");