blob: d62f6d840f8c5e28dfdb3400a61a304836c152ce [file] [log] [blame]
Greg Kroah-Hartmand809aa22017-11-24 15:00:33 +01001// SPDX-License-Identifier: GPL-2.0
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002/*
Christian Borntraegerbb64da92017-11-21 16:02:52 +01003 * hosting IBM Z kernel virtual machines (s390x)
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004 *
Christian Borntraegera37cb072018-01-23 13:28:40 +01005 * Copyright IBM Corp. 2008, 2018
Heiko Carstensb0c632d2008-03-25 18:47:20 +01006 *
7 * Author(s): Carsten Otte <cotte@de.ibm.com>
8 * Christian Borntraeger <borntraeger@de.ibm.com>
9 * Heiko Carstens <heiko.carstens@de.ibm.com>
Christian Ehrhardt628eb9b2009-05-25 13:40:51 +020010 * Christian Ehrhardt <ehrhardt@de.ibm.com>
Jason J. Herne15f36eb2012-08-02 10:10:17 -040011 * Jason J. Herne <jjherne@us.ibm.com>
Heiko Carstensb0c632d2008-03-25 18:47:20 +010012 */
13
14#include <linux/compiler.h>
15#include <linux/err.h>
16#include <linux/fs.h>
Christian Borntraegerca872302009-05-12 17:21:49 +020017#include <linux/hrtimer.h>
Heiko Carstensb0c632d2008-03-25 18:47:20 +010018#include <linux/init.h>
19#include <linux/kvm.h>
20#include <linux/kvm_host.h>
Martin Schwidefskyb2d73b22016-03-08 11:54:42 +010021#include <linux/mman.h>
Heiko Carstensb0c632d2008-03-25 18:47:20 +010022#include <linux/module.h>
Paul Gortmakerd3217962017-02-09 15:20:25 -050023#include <linux/moduleparam.h>
Tony Krowiaka374e892014-09-03 10:13:53 +020024#include <linux/random.h>
Heiko Carstensb0c632d2008-03-25 18:47:20 +010025#include <linux/slab.h>
Carsten Otteba5c1e92008-03-25 18:47:26 +010026#include <linux/timer.h>
Thomas Huth41408c282015-02-06 15:01:21 +010027#include <linux/vmalloc.h>
David Hildenbrand15c97052015-03-19 17:36:43 +010028#include <linux/bitmap.h>
Ingo Molnar174cd4b2017-02-02 19:15:33 +010029#include <linux/sched/signal.h>
Claudio Imbrenda190df4a2016-08-04 17:54:42 +020030#include <linux/string.h>
Ingo Molnar174cd4b2017-02-02 19:15:33 +010031
Heiko Carstenscbb870c2010-02-26 22:37:43 +010032#include <asm/asm-offsets.h>
Heiko Carstensb0c632d2008-03-25 18:47:20 +010033#include <asm/lowcore.h>
Martin Schwidefskyfd5ada02016-05-31 15:06:51 +020034#include <asm/stp.h>
Heiko Carstensb0c632d2008-03-25 18:47:20 +010035#include <asm/pgtable.h>
Martin Schwidefsky1e133ab2016-03-08 11:49:57 +010036#include <asm/gmap.h>
Heiko Carstensf5daba12009-03-26 15:24:01 +010037#include <asm/nmi.h>
David Howellsa0616cd2012-03-28 18:30:02 +010038#include <asm/switch_to.h>
Jens Freimann6d3da242013-07-03 15:18:35 +020039#include <asm/isc.h>
Christian Borntraeger1526bf92012-05-15 14:15:25 +020040#include <asm/sclp.h>
David Hildenbrand0a763c72016-05-18 16:03:47 +020041#include <asm/cpacf.h>
Linus Torvalds221bb8a2016-08-02 16:11:27 -040042#include <asm/timex.h>
Tony Krowiake585b242018-09-25 19:16:18 -040043#include <asm/ap.h>
Christian Borntraeger8f2abe62008-03-25 18:47:23 +010044#include "kvm-s390.h"
Heiko Carstensb0c632d2008-03-25 18:47:20 +010045#include "gaccess.h"
46
David Hildenbrandea2cdd22015-05-20 13:24:02 +020047#define KMSG_COMPONENT "kvm-s390"
48#undef pr_fmt
49#define pr_fmt(fmt) KMSG_COMPONENT ": " fmt
50
Cornelia Huck5786fff2012-07-23 17:20:29 +020051#define CREATE_TRACE_POINTS
52#include "trace.h"
Cornelia Huckade38c32012-07-23 17:20:30 +020053#include "trace-s390.h"
Cornelia Huck5786fff2012-07-23 17:20:29 +020054
Thomas Huth41408c282015-02-06 15:01:21 +010055#define MEM_OP_MAX_SIZE 65536 /* Maximum transfer size for KVM_S390_MEM_OP */
Jens Freimann816c7662014-11-24 17:13:46 +010056#define LOCAL_IRQS 32
57#define VCPU_IRQS_MAX_BUF (sizeof(struct kvm_s390_irq) * \
58 (KVM_MAX_VCPUS + LOCAL_IRQS))
Thomas Huth41408c282015-02-06 15:01:21 +010059
Heiko Carstensb0c632d2008-03-25 18:47:20 +010060#define VCPU_STAT(x) offsetof(struct kvm_vcpu, stat.x), KVM_STAT_VCPU
Christian Borntraegerccc40c52018-03-08 12:48:05 +000061#define VM_STAT(x) offsetof(struct kvm, stat.x), KVM_STAT_VM
Heiko Carstensb0c632d2008-03-25 18:47:20 +010062
63struct kvm_stats_debugfs_item debugfs_entries[] = {
64 { "userspace_handled", VCPU_STAT(exit_userspace) },
Christian Borntraeger0eaeafa2008-05-07 09:22:53 +020065 { "exit_null", VCPU_STAT(exit_null) },
Christian Borntraeger8f2abe62008-03-25 18:47:23 +010066 { "exit_validity", VCPU_STAT(exit_validity) },
67 { "exit_stop_request", VCPU_STAT(exit_stop_request) },
68 { "exit_external_request", VCPU_STAT(exit_external_request) },
Christian Borntraegera5e0ace2018-02-23 07:57:33 +000069 { "exit_io_request", VCPU_STAT(exit_io_request) },
Christian Borntraeger8f2abe62008-03-25 18:47:23 +010070 { "exit_external_interrupt", VCPU_STAT(exit_external_interrupt) },
Carsten Otteba5c1e92008-03-25 18:47:26 +010071 { "exit_instruction", VCPU_STAT(exit_instruction) },
Alexander Yarygin9ec6de12016-05-06 16:33:06 +030072 { "exit_pei", VCPU_STAT(exit_pei) },
Carsten Otteba5c1e92008-03-25 18:47:26 +010073 { "exit_program_interruption", VCPU_STAT(exit_program_interruption) },
74 { "exit_instr_and_program_int", VCPU_STAT(exit_instr_and_program) },
Janosch Franka011eeb2016-05-09 14:14:01 +020075 { "exit_operation_exception", VCPU_STAT(exit_operation_exception) },
Paolo Bonzinif7819512015-02-04 18:20:58 +010076 { "halt_successful_poll", VCPU_STAT(halt_successful_poll) },
Paolo Bonzini62bea5b2015-09-15 18:27:57 +020077 { "halt_attempted_poll", VCPU_STAT(halt_attempted_poll) },
Christian Borntraeger3491caf2016-05-13 12:16:35 +020078 { "halt_poll_invalid", VCPU_STAT(halt_poll_invalid) },
David Hildenbrandce2e4f02014-07-11 10:00:43 +020079 { "halt_wakeup", VCPU_STAT(halt_wakeup) },
Christian Borntraegerf5e10b02008-07-25 15:52:44 +020080 { "instruction_lctlg", VCPU_STAT(instruction_lctlg) },
Carsten Otteba5c1e92008-03-25 18:47:26 +010081 { "instruction_lctl", VCPU_STAT(instruction_lctl) },
David Hildenbrandaba07502014-01-23 10:47:13 +010082 { "instruction_stctl", VCPU_STAT(instruction_stctl) },
83 { "instruction_stctg", VCPU_STAT(instruction_stctg) },
Christian Borntraegerccc40c52018-03-08 12:48:05 +000084 { "deliver_ckc", VCPU_STAT(deliver_ckc) },
85 { "deliver_cputm", VCPU_STAT(deliver_cputm) },
Carsten Otteba5c1e92008-03-25 18:47:26 +010086 { "deliver_emergency_signal", VCPU_STAT(deliver_emergency_signal) },
Christian Ehrhardt7697e71f2011-10-18 12:27:15 +020087 { "deliver_external_call", VCPU_STAT(deliver_external_call) },
Carsten Otteba5c1e92008-03-25 18:47:26 +010088 { "deliver_service_signal", VCPU_STAT(deliver_service_signal) },
Christian Borntraegerccc40c52018-03-08 12:48:05 +000089 { "deliver_virtio", VCPU_STAT(deliver_virtio) },
Carsten Otteba5c1e92008-03-25 18:47:26 +010090 { "deliver_stop_signal", VCPU_STAT(deliver_stop_signal) },
91 { "deliver_prefix_signal", VCPU_STAT(deliver_prefix_signal) },
92 { "deliver_restart_signal", VCPU_STAT(deliver_restart_signal) },
Christian Borntraegerccc40c52018-03-08 12:48:05 +000093 { "deliver_program", VCPU_STAT(deliver_program) },
94 { "deliver_io", VCPU_STAT(deliver_io) },
QingFeng Hao32de0742018-03-02 11:56:47 +010095 { "deliver_machine_check", VCPU_STAT(deliver_machine_check) },
Carsten Otteba5c1e92008-03-25 18:47:26 +010096 { "exit_wait_state", VCPU_STAT(exit_wait_state) },
Christian Borntraegerccc40c52018-03-08 12:48:05 +000097 { "inject_ckc", VCPU_STAT(inject_ckc) },
98 { "inject_cputm", VCPU_STAT(inject_cputm) },
99 { "inject_external_call", VCPU_STAT(inject_external_call) },
100 { "inject_float_mchk", VM_STAT(inject_float_mchk) },
101 { "inject_emergency_signal", VCPU_STAT(inject_emergency_signal) },
102 { "inject_io", VM_STAT(inject_io) },
103 { "inject_mchk", VCPU_STAT(inject_mchk) },
104 { "inject_pfault_done", VM_STAT(inject_pfault_done) },
105 { "inject_program", VCPU_STAT(inject_program) },
106 { "inject_restart", VCPU_STAT(inject_restart) },
107 { "inject_service_signal", VM_STAT(inject_service_signal) },
108 { "inject_set_prefix", VCPU_STAT(inject_set_prefix) },
109 { "inject_stop_signal", VCPU_STAT(inject_stop_signal) },
110 { "inject_pfault_init", VCPU_STAT(inject_pfault_init) },
111 { "inject_virtio", VM_STAT(inject_virtio) },
Christian Borntraegera37cb072018-01-23 13:28:40 +0100112 { "instruction_epsw", VCPU_STAT(instruction_epsw) },
113 { "instruction_gs", VCPU_STAT(instruction_gs) },
114 { "instruction_io_other", VCPU_STAT(instruction_io_other) },
115 { "instruction_lpsw", VCPU_STAT(instruction_lpsw) },
116 { "instruction_lpswe", VCPU_STAT(instruction_lpswe) },
Christian Borntraeger69d0d3a2013-06-12 13:54:53 +0200117 { "instruction_pfmf", VCPU_STAT(instruction_pfmf) },
Christian Borntraegera37cb072018-01-23 13:28:40 +0100118 { "instruction_ptff", VCPU_STAT(instruction_ptff) },
Christian Borntraeger453423d2008-03-25 18:47:29 +0100119 { "instruction_stidp", VCPU_STAT(instruction_stidp) },
Christian Borntraegera37cb072018-01-23 13:28:40 +0100120 { "instruction_sck", VCPU_STAT(instruction_sck) },
121 { "instruction_sckpf", VCPU_STAT(instruction_sckpf) },
Christian Borntraeger453423d2008-03-25 18:47:29 +0100122 { "instruction_spx", VCPU_STAT(instruction_spx) },
123 { "instruction_stpx", VCPU_STAT(instruction_stpx) },
124 { "instruction_stap", VCPU_STAT(instruction_stap) },
Christian Borntraegera37cb072018-01-23 13:28:40 +0100125 { "instruction_iske", VCPU_STAT(instruction_iske) },
126 { "instruction_ri", VCPU_STAT(instruction_ri) },
127 { "instruction_rrbe", VCPU_STAT(instruction_rrbe) },
128 { "instruction_sske", VCPU_STAT(instruction_sske) },
Heiko Carstens8a2422342014-01-10 14:33:28 +0100129 { "instruction_ipte_interlock", VCPU_STAT(instruction_ipte_interlock) },
Konstantin Weitzb31288f2013-04-17 17:36:29 +0200130 { "instruction_essa", VCPU_STAT(instruction_essa) },
Christian Borntraeger453423d2008-03-25 18:47:29 +0100131 { "instruction_stsi", VCPU_STAT(instruction_stsi) },
132 { "instruction_stfl", VCPU_STAT(instruction_stfl) },
Christian Borntraegera37cb072018-01-23 13:28:40 +0100133 { "instruction_tb", VCPU_STAT(instruction_tb) },
134 { "instruction_tpi", VCPU_STAT(instruction_tpi) },
Christian Borntraegerbb25b9b2011-07-24 10:48:17 +0200135 { "instruction_tprot", VCPU_STAT(instruction_tprot) },
Christian Borntraegera37cb072018-01-23 13:28:40 +0100136 { "instruction_tsch", VCPU_STAT(instruction_tsch) },
Janosch Frank95ca2cb2016-05-23 15:11:58 +0200137 { "instruction_sthyi", VCPU_STAT(instruction_sthyi) },
David Hildenbranda3508fb2015-07-08 13:19:48 +0200138 { "instruction_sie", VCPU_STAT(instruction_sie) },
Christian Borntraeger5288fbf2008-03-25 18:47:31 +0100139 { "instruction_sigp_sense", VCPU_STAT(instruction_sigp_sense) },
Cornelia Huckbd59d3a2011-11-17 11:00:42 +0100140 { "instruction_sigp_sense_running", VCPU_STAT(instruction_sigp_sense_running) },
Christian Ehrhardt7697e71f2011-10-18 12:27:15 +0200141 { "instruction_sigp_external_call", VCPU_STAT(instruction_sigp_external_call) },
Christian Borntraeger5288fbf2008-03-25 18:47:31 +0100142 { "instruction_sigp_emergency", VCPU_STAT(instruction_sigp_emergency) },
David Hildenbrand42cb0c92014-05-23 12:25:11 +0200143 { "instruction_sigp_cond_emergency", VCPU_STAT(instruction_sigp_cond_emergency) },
144 { "instruction_sigp_start", VCPU_STAT(instruction_sigp_start) },
Christian Borntraeger5288fbf2008-03-25 18:47:31 +0100145 { "instruction_sigp_stop", VCPU_STAT(instruction_sigp_stop) },
David Hildenbrand42cb0c92014-05-23 12:25:11 +0200146 { "instruction_sigp_stop_store_status", VCPU_STAT(instruction_sigp_stop_store_status) },
147 { "instruction_sigp_store_status", VCPU_STAT(instruction_sigp_store_status) },
Eric Farmancd7b4b62015-02-12 09:06:34 -0500148 { "instruction_sigp_store_adtl_status", VCPU_STAT(instruction_sigp_store_adtl_status) },
Christian Borntraeger5288fbf2008-03-25 18:47:31 +0100149 { "instruction_sigp_set_arch", VCPU_STAT(instruction_sigp_arch) },
150 { "instruction_sigp_set_prefix", VCPU_STAT(instruction_sigp_prefix) },
151 { "instruction_sigp_restart", VCPU_STAT(instruction_sigp_restart) },
David Hildenbrand42cb0c92014-05-23 12:25:11 +0200152 { "instruction_sigp_cpu_reset", VCPU_STAT(instruction_sigp_cpu_reset) },
153 { "instruction_sigp_init_cpu_reset", VCPU_STAT(instruction_sigp_init_cpu_reset) },
154 { "instruction_sigp_unknown", VCPU_STAT(instruction_sigp_unknown) },
Christian Borntraeger866c1382018-01-24 12:27:01 +0100155 { "instruction_diag_10", VCPU_STAT(diagnose_10) },
156 { "instruction_diag_44", VCPU_STAT(diagnose_44) },
157 { "instruction_diag_9c", VCPU_STAT(diagnose_9c) },
158 { "instruction_diag_258", VCPU_STAT(diagnose_258) },
159 { "instruction_diag_308", VCPU_STAT(diagnose_308) },
160 { "instruction_diag_500", VCPU_STAT(diagnose_500) },
Christian Borntraegera37cb072018-01-23 13:28:40 +0100161 { "instruction_diag_other", VCPU_STAT(diagnose_other) },
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100162 { NULL }
163};
164
Collin L. Walling8fa16962016-07-26 15:29:44 -0400165struct kvm_s390_tod_clock_ext {
166 __u8 epoch_idx;
167 __u64 tod;
168 __u8 reserved[7];
169} __packed;
170
David Hildenbranda411edf2016-02-02 15:41:22 +0100171/* allow nested virtualization in KVM (if enabled by user space) */
172static int nested;
173module_param(nested, int, S_IRUGO);
174MODULE_PARM_DESC(nested, "Nested virtualization support");
175
Janosch Franka4499382018-07-13 11:28:31 +0100176/* allow 1m huge page guest backing, if !nested */
177static int hpage;
178module_param(hpage, int, 0444);
179MODULE_PARM_DESC(hpage, "1m huge page backing support");
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100180
Christian Borntraegerc3b9e3e2018-02-09 16:26:29 +0000181/*
182 * For now we handle at most 16 double words as this is what the s390 base
183 * kernel handles and stores in the prefix page. If we ever need to go beyond
184 * this, this requires changes to code, but the external uapi can stay.
185 */
186#define SIZE_INTERNAL 16
187
188/*
189 * Base feature mask that defines default mask for facilities. Consists of the
190 * defines in FACILITIES_KVM and the non-hypervisor managed bits.
191 */
192static unsigned long kvm_s390_fac_base[SIZE_INTERNAL] = { FACILITIES_KVM };
193/*
194 * Extended feature mask. Consists of the defines in FACILITIES_KVM_CPUMODEL
195 * and defines the facilities that can be enabled via a cpu model.
196 */
197static unsigned long kvm_s390_fac_ext[SIZE_INTERNAL] = { FACILITIES_KVM_CPUMODEL };
198
199static unsigned long kvm_s390_fac_size(void)
Michael Mueller78c4b592013-07-26 15:04:04 +0200200{
Christian Borntraegerc3b9e3e2018-02-09 16:26:29 +0000201 BUILD_BUG_ON(SIZE_INTERNAL > S390_ARCH_FAC_MASK_SIZE_U64);
202 BUILD_BUG_ON(SIZE_INTERNAL > S390_ARCH_FAC_LIST_SIZE_U64);
203 BUILD_BUG_ON(SIZE_INTERNAL * sizeof(unsigned long) >
204 sizeof(S390_lowcore.stfle_fac_list));
205
206 return SIZE_INTERNAL;
Michael Mueller78c4b592013-07-26 15:04:04 +0200207}
208
David Hildenbrand15c97052015-03-19 17:36:43 +0100209/* available cpu features supported by kvm */
210static DECLARE_BITMAP(kvm_s390_available_cpu_feat, KVM_S390_VM_CPU_FEAT_NR_BITS);
David Hildenbrand0a763c72016-05-18 16:03:47 +0200211/* available subfunctions indicated via query / "test bit" */
212static struct kvm_s390_vm_cpu_subfunc kvm_s390_available_subfunc;
David Hildenbrand15c97052015-03-19 17:36:43 +0100213
Michael Mueller9d8d5782015-02-02 15:42:51 +0100214static struct gmap_notifier gmap_notifier;
David Hildenbranda3508fb2015-07-08 13:19:48 +0200215static struct gmap_notifier vsie_gmap_notifier;
Christian Borntraeger78f26132015-07-22 15:50:58 +0200216debug_info_t *kvm_s390_dbf;
Michael Mueller9d8d5782015-02-02 15:42:51 +0100217
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100218/* Section: not file related */
Radim Krčmář13a34e02014-08-28 15:13:03 +0200219int kvm_arch_hardware_enable(void)
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100220{
221 /* every s390 is virtualization enabled ;-) */
Alexander Graf10474ae2009-09-15 11:37:46 +0200222 return 0;
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100223}
224
Martin Schwidefsky414d3b02016-03-08 11:52:54 +0100225static void kvm_gmap_notifier(struct gmap *gmap, unsigned long start,
226 unsigned long end);
Christian Borntraeger2c70fe42013-05-17 14:41:36 +0200227
David Hildenbrand15757672018-02-07 12:46:45 +0100228static void kvm_clock_sync_scb(struct kvm_s390_sie_block *scb, u64 delta)
229{
230 u8 delta_idx = 0;
231
232 /*
233 * The TOD jumps by delta, we have to compensate this by adding
234 * -delta to the epoch.
235 */
236 delta = -delta;
237
238 /* sign-extension - we're adding to signed values below */
239 if ((s64)delta < 0)
240 delta_idx = -1;
241
242 scb->epoch += delta;
243 if (scb->ecd & ECD_MEF) {
244 scb->epdx += delta_idx;
245 if (scb->epoch < delta)
246 scb->epdx += 1;
247 }
248}
249
Fan Zhangfdf03652015-05-13 10:58:41 +0200250/*
251 * This callback is executed during stop_machine(). All CPUs are therefore
252 * temporarily stopped. In order not to change guest behavior, we have to
253 * disable preemption whenever we touch the epoch of kvm and the VCPUs,
254 * so a CPU won't be stopped while calculating with the epoch.
255 */
256static int kvm_clock_sync(struct notifier_block *notifier, unsigned long val,
257 void *v)
258{
259 struct kvm *kvm;
260 struct kvm_vcpu *vcpu;
261 int i;
262 unsigned long long *delta = v;
263
264 list_for_each_entry(kvm, &vm_list, vm_list) {
Fan Zhangfdf03652015-05-13 10:58:41 +0200265 kvm_for_each_vcpu(i, vcpu, kvm) {
David Hildenbrand15757672018-02-07 12:46:45 +0100266 kvm_clock_sync_scb(vcpu->arch.sie_block, *delta);
267 if (i == 0) {
268 kvm->arch.epoch = vcpu->arch.sie_block->epoch;
269 kvm->arch.epdx = vcpu->arch.sie_block->epdx;
270 }
David Hildenbranddb0758b2016-02-15 09:42:25 +0100271 if (vcpu->arch.cputm_enabled)
272 vcpu->arch.cputm_start += *delta;
David Hildenbrand91473b42015-10-29 10:30:36 +0100273 if (vcpu->arch.vsie_block)
David Hildenbrand15757672018-02-07 12:46:45 +0100274 kvm_clock_sync_scb(vcpu->arch.vsie_block,
275 *delta);
Fan Zhangfdf03652015-05-13 10:58:41 +0200276 }
277 }
278 return NOTIFY_OK;
279}
280
281static struct notifier_block kvm_clock_notifier = {
282 .notifier_call = kvm_clock_sync,
283};
284
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100285int kvm_arch_hardware_setup(void)
286{
Christian Borntraeger2c70fe42013-05-17 14:41:36 +0200287 gmap_notifier.notifier_call = kvm_gmap_notifier;
Martin Schwidefskyb2d73b22016-03-08 11:54:42 +0100288 gmap_register_pte_notifier(&gmap_notifier);
David Hildenbranda3508fb2015-07-08 13:19:48 +0200289 vsie_gmap_notifier.notifier_call = kvm_s390_vsie_gmap_notifier;
290 gmap_register_pte_notifier(&vsie_gmap_notifier);
Fan Zhangfdf03652015-05-13 10:58:41 +0200291 atomic_notifier_chain_register(&s390_epoch_delta_notifier,
292 &kvm_clock_notifier);
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100293 return 0;
294}
295
296void kvm_arch_hardware_unsetup(void)
297{
Martin Schwidefskyb2d73b22016-03-08 11:54:42 +0100298 gmap_unregister_pte_notifier(&gmap_notifier);
David Hildenbranda3508fb2015-07-08 13:19:48 +0200299 gmap_unregister_pte_notifier(&vsie_gmap_notifier);
Fan Zhangfdf03652015-05-13 10:58:41 +0200300 atomic_notifier_chain_unregister(&s390_epoch_delta_notifier,
301 &kvm_clock_notifier);
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100302}
303
David Hildenbrand22be5a12016-01-21 13:22:54 +0100304static void allow_cpu_feat(unsigned long nr)
305{
306 set_bit_inv(nr, kvm_s390_available_cpu_feat);
307}
308
David Hildenbrand0a763c72016-05-18 16:03:47 +0200309static inline int plo_test_bit(unsigned char nr)
310{
311 register unsigned long r0 asm("0") = (unsigned long) nr | 0x100;
Heiko Carstensd051ae52016-12-13 14:25:32 +0100312 int cc;
David Hildenbrand0a763c72016-05-18 16:03:47 +0200313
314 asm volatile(
315 /* Parameter registers are ignored for "test bit" */
316 " plo 0,0,0,0(0)\n"
317 " ipm %0\n"
318 " srl %0,28\n"
319 : "=d" (cc)
320 : "d" (r0)
321 : "cc");
322 return cc == 0;
323}
324
David Hildenbrand22be5a12016-01-21 13:22:54 +0100325static void kvm_s390_cpu_feat_init(void)
326{
David Hildenbrand0a763c72016-05-18 16:03:47 +0200327 int i;
328
329 for (i = 0; i < 256; ++i) {
330 if (plo_test_bit(i))
331 kvm_s390_available_subfunc.plo[i >> 3] |= 0x80 >> (i & 7);
332 }
333
334 if (test_facility(28)) /* TOD-clock steering */
Linus Torvalds221bb8a2016-08-02 16:11:27 -0400335 ptff(kvm_s390_available_subfunc.ptff,
336 sizeof(kvm_s390_available_subfunc.ptff),
337 PTFF_QAF);
David Hildenbrand0a763c72016-05-18 16:03:47 +0200338
339 if (test_facility(17)) { /* MSA */
Martin Schwidefsky69c0e362016-08-18 12:59:46 +0200340 __cpacf_query(CPACF_KMAC, (cpacf_mask_t *)
341 kvm_s390_available_subfunc.kmac);
342 __cpacf_query(CPACF_KMC, (cpacf_mask_t *)
343 kvm_s390_available_subfunc.kmc);
344 __cpacf_query(CPACF_KM, (cpacf_mask_t *)
345 kvm_s390_available_subfunc.km);
346 __cpacf_query(CPACF_KIMD, (cpacf_mask_t *)
347 kvm_s390_available_subfunc.kimd);
348 __cpacf_query(CPACF_KLMD, (cpacf_mask_t *)
349 kvm_s390_available_subfunc.klmd);
David Hildenbrand0a763c72016-05-18 16:03:47 +0200350 }
351 if (test_facility(76)) /* MSA3 */
Martin Schwidefsky69c0e362016-08-18 12:59:46 +0200352 __cpacf_query(CPACF_PCKMO, (cpacf_mask_t *)
353 kvm_s390_available_subfunc.pckmo);
David Hildenbrand0a763c72016-05-18 16:03:47 +0200354 if (test_facility(77)) { /* MSA4 */
Martin Schwidefsky69c0e362016-08-18 12:59:46 +0200355 __cpacf_query(CPACF_KMCTR, (cpacf_mask_t *)
356 kvm_s390_available_subfunc.kmctr);
357 __cpacf_query(CPACF_KMF, (cpacf_mask_t *)
358 kvm_s390_available_subfunc.kmf);
359 __cpacf_query(CPACF_KMO, (cpacf_mask_t *)
360 kvm_s390_available_subfunc.kmo);
361 __cpacf_query(CPACF_PCC, (cpacf_mask_t *)
362 kvm_s390_available_subfunc.pcc);
David Hildenbrand0a763c72016-05-18 16:03:47 +0200363 }
364 if (test_facility(57)) /* MSA5 */
Harald Freudenberger985a9d22017-02-24 10:11:54 +0100365 __cpacf_query(CPACF_PRNO, (cpacf_mask_t *)
Martin Schwidefsky69c0e362016-08-18 12:59:46 +0200366 kvm_s390_available_subfunc.ppno);
David Hildenbrand0a763c72016-05-18 16:03:47 +0200367
Jason J. Hernee000b8e2017-03-20 09:57:42 -0400368 if (test_facility(146)) /* MSA8 */
369 __cpacf_query(CPACF_KMA, (cpacf_mask_t *)
370 kvm_s390_available_subfunc.kma);
371
David Hildenbrand22be5a12016-01-21 13:22:54 +0100372 if (MACHINE_HAS_ESOP)
373 allow_cpu_feat(KVM_S390_VM_CPU_FEAT_ESOP);
David Hildenbranda3508fb2015-07-08 13:19:48 +0200374 /*
375 * We need SIE support, ESOP (PROT_READ protection for gmap_shadow),
376 * 64bit SCAO (SCA passthrough) and IDTE (for gmap_shadow unshadowing).
377 */
378 if (!sclp.has_sief2 || !MACHINE_HAS_ESOP || !sclp.has_64bscao ||
David Hildenbranda411edf2016-02-02 15:41:22 +0100379 !test_facility(3) || !nested)
David Hildenbranda3508fb2015-07-08 13:19:48 +0200380 return;
381 allow_cpu_feat(KVM_S390_VM_CPU_FEAT_SIEF2);
David Hildenbrand19c439b2015-11-25 11:02:26 +0100382 if (sclp.has_64bscao)
383 allow_cpu_feat(KVM_S390_VM_CPU_FEAT_64BSCAO);
David Hildenbrand0615a322015-11-25 09:59:49 +0100384 if (sclp.has_siif)
385 allow_cpu_feat(KVM_S390_VM_CPU_FEAT_SIIF);
David Hildenbrand77d18f62015-11-24 16:32:35 +0100386 if (sclp.has_gpere)
387 allow_cpu_feat(KVM_S390_VM_CPU_FEAT_GPERE);
David Hildenbranda1b7b9b2015-11-24 16:41:33 +0100388 if (sclp.has_gsls)
389 allow_cpu_feat(KVM_S390_VM_CPU_FEAT_GSLS);
David Hildenbrand5630a8e2015-11-24 16:53:51 +0100390 if (sclp.has_ib)
391 allow_cpu_feat(KVM_S390_VM_CPU_FEAT_IB);
David Hildenbrand13ee3f62015-11-24 16:54:37 +0100392 if (sclp.has_cei)
393 allow_cpu_feat(KVM_S390_VM_CPU_FEAT_CEI);
David Hildenbrand7fd7f392015-11-24 16:56:23 +0100394 if (sclp.has_ibs)
395 allow_cpu_feat(KVM_S390_VM_CPU_FEAT_IBS);
Farhan Ali730cd632017-02-24 16:12:56 -0500396 if (sclp.has_kss)
397 allow_cpu_feat(KVM_S390_VM_CPU_FEAT_KSS);
David Hildenbrand5d3876a2016-04-13 17:06:50 +0200398 /*
399 * KVM_S390_VM_CPU_FEAT_SKEY: Wrong shadow of PTE.I bits will make
400 * all skey handling functions read/set the skey from the PGSTE
401 * instead of the real storage key.
402 *
403 * KVM_S390_VM_CPU_FEAT_CMMA: Wrong shadow of PTE.I bits will make
404 * pages being detected as preserved although they are resident.
405 *
406 * KVM_S390_VM_CPU_FEAT_PFMFI: Wrong shadow of PTE.I bits will
407 * have the same effect as for KVM_S390_VM_CPU_FEAT_SKEY.
408 *
409 * For KVM_S390_VM_CPU_FEAT_SKEY, KVM_S390_VM_CPU_FEAT_CMMA and
410 * KVM_S390_VM_CPU_FEAT_PFMFI, all PTE.I and PGSTE bits have to be
411 * correctly shadowed. We can do that for the PGSTE but not for PTE.I.
412 *
413 * KVM_S390_VM_CPU_FEAT_SIGPIF: Wrong SCB addresses in the SCA. We
414 * cannot easily shadow the SCA because of the ipte lock.
415 */
David Hildenbrand22be5a12016-01-21 13:22:54 +0100416}
417
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100418int kvm_arch_init(void *opaque)
419{
Christian Borntraeger78f26132015-07-22 15:50:58 +0200420 kvm_s390_dbf = debug_register("kvm-trace", 32, 1, 7 * sizeof(long));
421 if (!kvm_s390_dbf)
422 return -ENOMEM;
423
424 if (debug_register_view(kvm_s390_dbf, &debug_sprintf_view)) {
425 debug_unregister(kvm_s390_dbf);
426 return -ENOMEM;
427 }
428
David Hildenbrand22be5a12016-01-21 13:22:54 +0100429 kvm_s390_cpu_feat_init();
430
Cornelia Huck84877d92014-09-02 10:27:35 +0100431 /* Register floating interrupt controller interface. */
432 return kvm_register_device_ops(&kvm_flic_ops, KVM_DEV_TYPE_FLIC);
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100433}
434
Christian Borntraeger78f26132015-07-22 15:50:58 +0200435void kvm_arch_exit(void)
436{
437 debug_unregister(kvm_s390_dbf);
438}
439
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100440/* Section: device related */
441long kvm_arch_dev_ioctl(struct file *filp,
442 unsigned int ioctl, unsigned long arg)
443{
444 if (ioctl == KVM_S390_ENABLE_SIE)
445 return s390_enable_sie();
446 return -EINVAL;
447}
448
Alexander Graf784aa3d2014-07-14 18:27:35 +0200449int kvm_vm_ioctl_check_extension(struct kvm *kvm, long ext)
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100450{
Carsten Otted7b0b5e2009-11-19 14:21:16 +0100451 int r;
452
Carsten Otte2bd0ac42008-07-25 15:49:13 +0200453 switch (ext) {
Carsten Otted7b0b5e2009-11-19 14:21:16 +0100454 case KVM_CAP_S390_PSW:
Christian Borntraegerb6cf8782011-09-20 17:07:29 +0200455 case KVM_CAP_S390_GMAP:
Christian Borntraeger52e16b12011-11-17 11:00:44 +0100456 case KVM_CAP_SYNC_MMU:
Carsten Otte1efd0f52012-01-04 10:25:29 +0100457#ifdef CONFIG_KVM_S390_UCONTROL
458 case KVM_CAP_S390_UCONTROL:
459#endif
Dominik Dingel3c038e62013-10-07 17:11:48 +0200460 case KVM_CAP_ASYNC_PF:
Christian Borntraeger60b413c2012-01-11 11:20:31 +0100461 case KVM_CAP_SYNC_REGS:
Carsten Otte14eebd92012-05-15 14:15:26 +0200462 case KVM_CAP_ONE_REG:
Cornelia Huckd6712df2012-12-20 15:32:11 +0100463 case KVM_CAP_ENABLE_CAP:
Cornelia Huckfa6b7fe2012-12-20 15:32:12 +0100464 case KVM_CAP_S390_CSS_SUPPORT:
Cornelia Huck10ccaa12013-02-28 12:33:21 +0100465 case KVM_CAP_IOEVENTFD:
Jens Freimannc05c4182013-10-07 16:13:45 +0200466 case KVM_CAP_DEVICE_CTRL:
Cornelia Huckd938dc52013-10-23 18:26:34 +0200467 case KVM_CAP_ENABLE_CAP_VM:
Cornelia Huck78599d92014-07-15 09:54:39 +0200468 case KVM_CAP_S390_IRQCHIP:
Dominik Dingelf2061652014-04-09 13:13:00 +0200469 case KVM_CAP_VM_ATTRIBUTES:
David Hildenbrand6352e4d2014-04-10 17:35:00 +0200470 case KVM_CAP_MP_STATE:
Paolo Bonzini460df4c2017-02-08 11:50:15 +0100471 case KVM_CAP_IMMEDIATE_EXIT:
Jens Freimann47b43c52014-11-11 20:57:06 +0100472 case KVM_CAP_S390_INJECT_IRQ:
David Hildenbrand2444b352014-10-09 14:10:13 +0200473 case KVM_CAP_S390_USER_SIGP:
Ekaterina Tumanovae44fc8c2015-01-30 16:55:56 +0100474 case KVM_CAP_S390_USER_STSI:
Jason J. Herne30ee2a92014-09-23 09:23:01 -0400475 case KVM_CAP_S390_SKEYS:
Jens Freimann816c7662014-11-24 17:13:46 +0100476 case KVM_CAP_S390_IRQ_STATE:
David Hildenbrand6502a342016-06-21 14:19:51 +0200477 case KVM_CAP_S390_USER_INSTR0:
Claudio Imbrenda4036e382016-08-04 17:58:47 +0200478 case KVM_CAP_S390_CMMA_MIGRATION:
Yi Min Zhao47a46932017-03-10 09:29:38 +0100479 case KVM_CAP_S390_AIS:
Christian Borntraegerda9a1442017-11-09 10:00:45 +0100480 case KVM_CAP_S390_AIS_MIGRATION:
Carsten Otted7b0b5e2009-11-19 14:21:16 +0100481 r = 1;
482 break;
Janosch Franka4499382018-07-13 11:28:31 +0100483 case KVM_CAP_S390_HPAGE_1M:
484 r = 0;
485 if (hpage)
486 r = 1;
487 break;
Thomas Huth41408c282015-02-06 15:01:21 +0100488 case KVM_CAP_S390_MEM_OP:
489 r = MEM_OP_MAX_SIZE;
490 break;
Christian Borntraegere726b1b2012-05-02 10:50:38 +0200491 case KVM_CAP_NR_VCPUS:
492 case KVM_CAP_MAX_VCPUS:
David Hildenbrand76a6dd72015-11-24 13:33:49 +0100493 r = KVM_S390_BSCA_CPU_SLOTS;
David Hildenbranda6940672016-08-08 22:39:32 +0200494 if (!kvm_s390_use_sca_entries())
495 r = KVM_MAX_VCPUS;
496 else if (sclp.has_esca && sclp.has_64bscao)
David Hildenbrand76a6dd72015-11-24 13:33:49 +0100497 r = KVM_S390_ESCA_CPU_SLOTS;
Christian Borntraegere726b1b2012-05-02 10:50:38 +0200498 break;
Nick Wange1e2e602013-03-25 17:22:58 +0100499 case KVM_CAP_NR_MEMSLOTS:
500 r = KVM_USER_MEM_SLOTS;
501 break;
Christian Borntraeger1526bf92012-05-15 14:15:25 +0200502 case KVM_CAP_S390_COW:
Martin Schwidefskyabf09be2012-11-07 13:17:37 +0100503 r = MACHINE_HAS_ESOP;
Christian Borntraeger1526bf92012-05-15 14:15:25 +0200504 break;
Eric Farman68c55752014-06-09 10:57:26 -0400505 case KVM_CAP_S390_VECTOR_REGISTERS:
506 r = MACHINE_HAS_VX;
507 break;
Fan Zhangc6e5f162016-01-07 18:24:29 +0800508 case KVM_CAP_S390_RI:
509 r = test_facility(64);
510 break;
Fan Zhang4e0b1ab2016-11-29 07:17:55 +0100511 case KVM_CAP_S390_GS:
512 r = test_facility(133);
513 break;
Christian Borntraeger35b3fde2018-01-17 14:44:34 +0100514 case KVM_CAP_S390_BPB:
515 r = test_facility(82);
516 break;
Carsten Otte2bd0ac42008-07-25 15:49:13 +0200517 default:
Carsten Otted7b0b5e2009-11-19 14:21:16 +0100518 r = 0;
Carsten Otte2bd0ac42008-07-25 15:49:13 +0200519 }
Carsten Otted7b0b5e2009-11-19 14:21:16 +0100520 return r;
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100521}
522
Jason J. Herne15f36eb2012-08-02 10:10:17 -0400523static void kvm_s390_sync_dirty_log(struct kvm *kvm,
Janosch Frank0959e162018-07-17 13:21:22 +0100524 struct kvm_memory_slot *memslot)
Jason J. Herne15f36eb2012-08-02 10:10:17 -0400525{
Janosch Frank0959e162018-07-17 13:21:22 +0100526 int i;
Jason J. Herne15f36eb2012-08-02 10:10:17 -0400527 gfn_t cur_gfn, last_gfn;
Janosch Frank0959e162018-07-17 13:21:22 +0100528 unsigned long gaddr, vmaddr;
Jason J. Herne15f36eb2012-08-02 10:10:17 -0400529 struct gmap *gmap = kvm->arch.gmap;
Janosch Frank0959e162018-07-17 13:21:22 +0100530 DECLARE_BITMAP(bitmap, _PAGE_ENTRIES);
Jason J. Herne15f36eb2012-08-02 10:10:17 -0400531
Janosch Frank0959e162018-07-17 13:21:22 +0100532 /* Loop over all guest segments */
533 cur_gfn = memslot->base_gfn;
Jason J. Herne15f36eb2012-08-02 10:10:17 -0400534 last_gfn = memslot->base_gfn + memslot->npages;
Janosch Frank0959e162018-07-17 13:21:22 +0100535 for (; cur_gfn <= last_gfn; cur_gfn += _PAGE_ENTRIES) {
536 gaddr = gfn_to_gpa(cur_gfn);
537 vmaddr = gfn_to_hva_memslot(memslot, cur_gfn);
538 if (kvm_is_error_hva(vmaddr))
539 continue;
Jason J. Herne15f36eb2012-08-02 10:10:17 -0400540
Janosch Frank0959e162018-07-17 13:21:22 +0100541 bitmap_zero(bitmap, _PAGE_ENTRIES);
542 gmap_sync_dirty_log_pmd(gmap, bitmap, gaddr, vmaddr);
543 for (i = 0; i < _PAGE_ENTRIES; i++) {
544 if (test_bit(i, bitmap))
545 mark_page_dirty(kvm, cur_gfn + i);
546 }
547
Christian Borntraeger1763f8d2016-02-03 11:12:34 +0100548 if (fatal_signal_pending(current))
549 return;
Christian Borntraeger70c88a02016-02-02 15:15:56 +0100550 cond_resched();
Jason J. Herne15f36eb2012-08-02 10:10:17 -0400551 }
Jason J. Herne15f36eb2012-08-02 10:10:17 -0400552}
553
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100554/* Section: vm related */
Eugene (jno) Dvurechenskia6e2f682015-04-21 15:31:59 +0200555static void sca_del_vcpu(struct kvm_vcpu *vcpu);
556
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100557/*
558 * Get (and clear) the dirty memory log for a memory slot.
559 */
560int kvm_vm_ioctl_get_dirty_log(struct kvm *kvm,
561 struct kvm_dirty_log *log)
562{
Jason J. Herne15f36eb2012-08-02 10:10:17 -0400563 int r;
564 unsigned long n;
Paolo Bonzini9f6b8022015-05-17 16:20:07 +0200565 struct kvm_memslots *slots;
Jason J. Herne15f36eb2012-08-02 10:10:17 -0400566 struct kvm_memory_slot *memslot;
567 int is_dirty = 0;
568
Janosch Franke1e8a962017-02-02 16:39:31 +0100569 if (kvm_is_ucontrol(kvm))
570 return -EINVAL;
571
Jason J. Herne15f36eb2012-08-02 10:10:17 -0400572 mutex_lock(&kvm->slots_lock);
573
574 r = -EINVAL;
575 if (log->slot >= KVM_USER_MEM_SLOTS)
576 goto out;
577
Paolo Bonzini9f6b8022015-05-17 16:20:07 +0200578 slots = kvm_memslots(kvm);
579 memslot = id_to_memslot(slots, log->slot);
Jason J. Herne15f36eb2012-08-02 10:10:17 -0400580 r = -ENOENT;
581 if (!memslot->dirty_bitmap)
582 goto out;
583
584 kvm_s390_sync_dirty_log(kvm, memslot);
585 r = kvm_get_dirty_log(kvm, log, &is_dirty);
586 if (r)
587 goto out;
588
589 /* Clear the dirty log */
590 if (is_dirty) {
591 n = kvm_dirty_bitmap_bytes(memslot);
592 memset(memslot->dirty_bitmap, 0, n);
593 }
594 r = 0;
595out:
596 mutex_unlock(&kvm->slots_lock);
597 return r;
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100598}
599
David Hildenbrand6502a342016-06-21 14:19:51 +0200600static void icpt_operexc_on_all_vcpus(struct kvm *kvm)
601{
602 unsigned int i;
603 struct kvm_vcpu *vcpu;
604
605 kvm_for_each_vcpu(i, vcpu, kvm) {
606 kvm_s390_sync_request(KVM_REQ_ICPT_OPEREXC, vcpu);
607 }
608}
609
Cornelia Huckd938dc52013-10-23 18:26:34 +0200610static int kvm_vm_ioctl_enable_cap(struct kvm *kvm, struct kvm_enable_cap *cap)
611{
612 int r;
613
614 if (cap->flags)
615 return -EINVAL;
616
617 switch (cap->cap) {
Cornelia Huck84223592013-07-15 13:36:01 +0200618 case KVM_CAP_S390_IRQCHIP:
Christian Borntraegerc92ea7b2015-07-22 15:52:10 +0200619 VM_EVENT(kvm, 3, "%s", "ENABLE: CAP_S390_IRQCHIP");
Cornelia Huck84223592013-07-15 13:36:01 +0200620 kvm->arch.use_irqchip = 1;
621 r = 0;
622 break;
David Hildenbrand2444b352014-10-09 14:10:13 +0200623 case KVM_CAP_S390_USER_SIGP:
Christian Borntraegerc92ea7b2015-07-22 15:52:10 +0200624 VM_EVENT(kvm, 3, "%s", "ENABLE: CAP_S390_USER_SIGP");
David Hildenbrand2444b352014-10-09 14:10:13 +0200625 kvm->arch.user_sigp = 1;
626 r = 0;
627 break;
Eric Farman68c55752014-06-09 10:57:26 -0400628 case KVM_CAP_S390_VECTOR_REGISTERS:
David Hildenbrand5967c172015-11-06 12:08:48 +0100629 mutex_lock(&kvm->lock);
Paolo Bonzinia03825b2016-06-13 14:50:04 +0200630 if (kvm->created_vcpus) {
David Hildenbrand5967c172015-11-06 12:08:48 +0100631 r = -EBUSY;
632 } else if (MACHINE_HAS_VX) {
David Hildenbrandc54f0d62015-12-02 08:53:52 +0100633 set_kvm_facility(kvm->arch.model.fac_mask, 129);
634 set_kvm_facility(kvm->arch.model.fac_list, 129);
Guenther Hutzl2f87d942016-06-03 14:37:17 +0200635 if (test_facility(134)) {
636 set_kvm_facility(kvm->arch.model.fac_mask, 134);
637 set_kvm_facility(kvm->arch.model.fac_list, 134);
638 }
Maxim Samoylov53743aa2016-02-10 10:31:23 +0100639 if (test_facility(135)) {
640 set_kvm_facility(kvm->arch.model.fac_mask, 135);
641 set_kvm_facility(kvm->arch.model.fac_list, 135);
642 }
Michael Mueller18280d82015-03-16 16:05:41 +0100643 r = 0;
644 } else
645 r = -EINVAL;
David Hildenbrand5967c172015-11-06 12:08:48 +0100646 mutex_unlock(&kvm->lock);
Christian Borntraegerc92ea7b2015-07-22 15:52:10 +0200647 VM_EVENT(kvm, 3, "ENABLE: CAP_S390_VECTOR_REGISTERS %s",
648 r ? "(not available)" : "(success)");
Eric Farman68c55752014-06-09 10:57:26 -0400649 break;
Fan Zhangc6e5f162016-01-07 18:24:29 +0800650 case KVM_CAP_S390_RI:
651 r = -EINVAL;
652 mutex_lock(&kvm->lock);
Paolo Bonzinia03825b2016-06-13 14:50:04 +0200653 if (kvm->created_vcpus) {
Fan Zhangc6e5f162016-01-07 18:24:29 +0800654 r = -EBUSY;
655 } else if (test_facility(64)) {
David Hildenbrandc54f0d62015-12-02 08:53:52 +0100656 set_kvm_facility(kvm->arch.model.fac_mask, 64);
657 set_kvm_facility(kvm->arch.model.fac_list, 64);
Fan Zhangc6e5f162016-01-07 18:24:29 +0800658 r = 0;
659 }
660 mutex_unlock(&kvm->lock);
661 VM_EVENT(kvm, 3, "ENABLE: CAP_S390_RI %s",
662 r ? "(not available)" : "(success)");
663 break;
Yi Min Zhao47a46932017-03-10 09:29:38 +0100664 case KVM_CAP_S390_AIS:
665 mutex_lock(&kvm->lock);
666 if (kvm->created_vcpus) {
667 r = -EBUSY;
668 } else {
669 set_kvm_facility(kvm->arch.model.fac_mask, 72);
670 set_kvm_facility(kvm->arch.model.fac_list, 72);
Yi Min Zhao47a46932017-03-10 09:29:38 +0100671 r = 0;
672 }
673 mutex_unlock(&kvm->lock);
674 VM_EVENT(kvm, 3, "ENABLE: AIS %s",
675 r ? "(not available)" : "(success)");
676 break;
Fan Zhang4e0b1ab2016-11-29 07:17:55 +0100677 case KVM_CAP_S390_GS:
678 r = -EINVAL;
679 mutex_lock(&kvm->lock);
Christian Borntraeger241e3ec02017-11-16 15:12:52 +0100680 if (kvm->created_vcpus) {
Fan Zhang4e0b1ab2016-11-29 07:17:55 +0100681 r = -EBUSY;
682 } else if (test_facility(133)) {
683 set_kvm_facility(kvm->arch.model.fac_mask, 133);
684 set_kvm_facility(kvm->arch.model.fac_list, 133);
685 r = 0;
686 }
687 mutex_unlock(&kvm->lock);
688 VM_EVENT(kvm, 3, "ENABLE: CAP_S390_GS %s",
689 r ? "(not available)" : "(success)");
690 break;
Janosch Franka4499382018-07-13 11:28:31 +0100691 case KVM_CAP_S390_HPAGE_1M:
692 mutex_lock(&kvm->lock);
693 if (kvm->created_vcpus)
694 r = -EBUSY;
695 else if (!hpage || kvm->arch.use_cmma)
696 r = -EINVAL;
697 else {
698 r = 0;
Janosch Frankdf88f312018-08-30 16:14:18 +0200699 down_write(&kvm->mm->mmap_sem);
Janosch Franka4499382018-07-13 11:28:31 +0100700 kvm->mm->context.allow_gmap_hpage_1m = 1;
Janosch Frankdf88f312018-08-30 16:14:18 +0200701 up_write(&kvm->mm->mmap_sem);
Janosch Franka4499382018-07-13 11:28:31 +0100702 /*
703 * We might have to create fake 4k page
704 * tables. To avoid that the hardware works on
705 * stale PGSTEs, we emulate these instructions.
706 */
707 kvm->arch.use_skf = 0;
708 kvm->arch.use_pfmfi = 0;
709 }
710 mutex_unlock(&kvm->lock);
711 VM_EVENT(kvm, 3, "ENABLE: CAP_S390_HPAGE %s",
712 r ? "(not available)" : "(success)");
713 break;
Ekaterina Tumanovae44fc8c2015-01-30 16:55:56 +0100714 case KVM_CAP_S390_USER_STSI:
Christian Borntraegerc92ea7b2015-07-22 15:52:10 +0200715 VM_EVENT(kvm, 3, "%s", "ENABLE: CAP_S390_USER_STSI");
Ekaterina Tumanovae44fc8c2015-01-30 16:55:56 +0100716 kvm->arch.user_stsi = 1;
717 r = 0;
718 break;
David Hildenbrand6502a342016-06-21 14:19:51 +0200719 case KVM_CAP_S390_USER_INSTR0:
720 VM_EVENT(kvm, 3, "%s", "ENABLE: CAP_S390_USER_INSTR0");
721 kvm->arch.user_instr0 = 1;
722 icpt_operexc_on_all_vcpus(kvm);
723 r = 0;
724 break;
Cornelia Huckd938dc52013-10-23 18:26:34 +0200725 default:
726 r = -EINVAL;
727 break;
728 }
729 return r;
730}
731
Dominik Dingel8c0a7ce2014-10-31 14:10:41 +0100732static int kvm_s390_get_mem_control(struct kvm *kvm, struct kvm_device_attr *attr)
733{
734 int ret;
735
736 switch (attr->attr) {
737 case KVM_S390_VM_MEM_LIMIT_SIZE:
738 ret = 0;
Christian Borntraegerc92ea7b2015-07-22 15:52:10 +0200739 VM_EVENT(kvm, 3, "QUERY: max guest memory: %lu bytes",
Dominik Dingela3a92c32014-12-01 17:24:42 +0100740 kvm->arch.mem_limit);
741 if (put_user(kvm->arch.mem_limit, (u64 __user *)attr->addr))
Dominik Dingel8c0a7ce2014-10-31 14:10:41 +0100742 ret = -EFAULT;
743 break;
744 default:
745 ret = -ENXIO;
746 break;
747 }
748 return ret;
749}
750
751static int kvm_s390_set_mem_control(struct kvm *kvm, struct kvm_device_attr *attr)
Dominik Dingel4f718ea2014-04-09 13:13:00 +0200752{
753 int ret;
754 unsigned int idx;
755 switch (attr->attr) {
756 case KVM_S390_VM_MEM_ENABLE_CMMA:
David Hildenbrandf9cbd9b2016-03-03 09:48:47 +0100757 ret = -ENXIO;
David Hildenbrandc24cc9c2015-11-24 13:53:04 +0100758 if (!sclp.has_cmma)
Dominik Dingele6db1d62015-05-07 15:41:57 +0200759 break;
760
Christian Borntraegerc92ea7b2015-07-22 15:52:10 +0200761 VM_EVENT(kvm, 3, "%s", "ENABLE: CMMA support");
Dominik Dingel4f718ea2014-04-09 13:13:00 +0200762 mutex_lock(&kvm->lock);
Janosch Franka4499382018-07-13 11:28:31 +0100763 if (kvm->created_vcpus)
764 ret = -EBUSY;
765 else if (kvm->mm->context.allow_gmap_hpage_1m)
766 ret = -EINVAL;
767 else {
Dominik Dingel4f718ea2014-04-09 13:13:00 +0200768 kvm->arch.use_cmma = 1;
Janosch Frankc9f0a2b2018-02-16 12:16:14 +0100769 /* Not compatible with cmma. */
770 kvm->arch.use_pfmfi = 0;
Dominik Dingel4f718ea2014-04-09 13:13:00 +0200771 ret = 0;
772 }
773 mutex_unlock(&kvm->lock);
774 break;
775 case KVM_S390_VM_MEM_CLR_CMMA:
David Hildenbrandf9cbd9b2016-03-03 09:48:47 +0100776 ret = -ENXIO;
777 if (!sclp.has_cmma)
778 break;
Dominik Dingelc3489152015-06-18 13:17:11 +0200779 ret = -EINVAL;
780 if (!kvm->arch.use_cmma)
781 break;
782
Christian Borntraegerc92ea7b2015-07-22 15:52:10 +0200783 VM_EVENT(kvm, 3, "%s", "RESET: CMMA states");
Dominik Dingel4f718ea2014-04-09 13:13:00 +0200784 mutex_lock(&kvm->lock);
785 idx = srcu_read_lock(&kvm->srcu);
Dominik Dingela13cff32014-10-23 12:07:14 +0200786 s390_reset_cmma(kvm->arch.gmap->mm);
Dominik Dingel4f718ea2014-04-09 13:13:00 +0200787 srcu_read_unlock(&kvm->srcu, idx);
788 mutex_unlock(&kvm->lock);
789 ret = 0;
790 break;
Dominik Dingel8c0a7ce2014-10-31 14:10:41 +0100791 case KVM_S390_VM_MEM_LIMIT_SIZE: {
792 unsigned long new_limit;
793
794 if (kvm_is_ucontrol(kvm))
795 return -EINVAL;
796
797 if (get_user(new_limit, (u64 __user *)attr->addr))
798 return -EFAULT;
799
Dominik Dingela3a92c32014-12-01 17:24:42 +0100800 if (kvm->arch.mem_limit != KVM_S390_NO_MEM_LIMIT &&
801 new_limit > kvm->arch.mem_limit)
Dominik Dingel8c0a7ce2014-10-31 14:10:41 +0100802 return -E2BIG;
803
Dominik Dingela3a92c32014-12-01 17:24:42 +0100804 if (!new_limit)
805 return -EINVAL;
806
Martin Schwidefsky6ea427b2016-03-08 11:55:04 +0100807 /* gmap_create takes last usable address */
Dominik Dingela3a92c32014-12-01 17:24:42 +0100808 if (new_limit != KVM_S390_NO_MEM_LIMIT)
809 new_limit -= 1;
810
Dominik Dingel8c0a7ce2014-10-31 14:10:41 +0100811 ret = -EBUSY;
812 mutex_lock(&kvm->lock);
Paolo Bonzinia03825b2016-06-13 14:50:04 +0200813 if (!kvm->created_vcpus) {
Martin Schwidefsky6ea427b2016-03-08 11:55:04 +0100814 /* gmap_create will round the limit up */
815 struct gmap *new = gmap_create(current->mm, new_limit);
Dominik Dingel8c0a7ce2014-10-31 14:10:41 +0100816
817 if (!new) {
818 ret = -ENOMEM;
819 } else {
Martin Schwidefsky6ea427b2016-03-08 11:55:04 +0100820 gmap_remove(kvm->arch.gmap);
Dominik Dingel8c0a7ce2014-10-31 14:10:41 +0100821 new->private = kvm;
822 kvm->arch.gmap = new;
823 ret = 0;
824 }
825 }
826 mutex_unlock(&kvm->lock);
Dominik Dingela3a92c32014-12-01 17:24:42 +0100827 VM_EVENT(kvm, 3, "SET: max guest address: %lu", new_limit);
828 VM_EVENT(kvm, 3, "New guest asce: 0x%pK",
829 (void *) kvm->arch.gmap->asce);
Dominik Dingel8c0a7ce2014-10-31 14:10:41 +0100830 break;
831 }
Dominik Dingel4f718ea2014-04-09 13:13:00 +0200832 default:
833 ret = -ENXIO;
834 break;
835 }
836 return ret;
837}
838
Tony Krowiaka374e892014-09-03 10:13:53 +0200839static void kvm_s390_vcpu_crypto_setup(struct kvm_vcpu *vcpu);
840
Tony Krowiak20c922f2018-04-22 11:37:03 -0400841void kvm_s390_vcpu_crypto_reset_all(struct kvm *kvm)
Tony Krowiaka374e892014-09-03 10:13:53 +0200842{
843 struct kvm_vcpu *vcpu;
844 int i;
845
Tony Krowiak20c922f2018-04-22 11:37:03 -0400846 kvm_s390_vcpu_block_all(kvm);
847
David Hildenbrand3194cdb2018-09-25 19:16:17 -0400848 kvm_for_each_vcpu(i, vcpu, kvm) {
Tony Krowiak20c922f2018-04-22 11:37:03 -0400849 kvm_s390_vcpu_crypto_setup(vcpu);
David Hildenbrand3194cdb2018-09-25 19:16:17 -0400850 /* recreate the shadow crycb by leaving the VSIE handler */
851 kvm_s390_sync_request(KVM_REQ_VSIE_RESTART, vcpu);
852 }
Tony Krowiak20c922f2018-04-22 11:37:03 -0400853
854 kvm_s390_vcpu_unblock_all(kvm);
855}
856
857static int kvm_s390_vm_set_crypto(struct kvm *kvm, struct kvm_device_attr *attr)
858{
Michael Mueller9d8d5782015-02-02 15:42:51 +0100859 if (!test_kvm_facility(kvm, 76))
Tony Krowiaka374e892014-09-03 10:13:53 +0200860 return -EINVAL;
861
862 mutex_lock(&kvm->lock);
863 switch (attr->attr) {
864 case KVM_S390_VM_CRYPTO_ENABLE_AES_KW:
865 get_random_bytes(
866 kvm->arch.crypto.crycb->aes_wrapping_key_mask,
867 sizeof(kvm->arch.crypto.crycb->aes_wrapping_key_mask));
868 kvm->arch.crypto.aes_kw = 1;
Christian Borntraegerc92ea7b2015-07-22 15:52:10 +0200869 VM_EVENT(kvm, 3, "%s", "ENABLE: AES keywrapping support");
Tony Krowiaka374e892014-09-03 10:13:53 +0200870 break;
871 case KVM_S390_VM_CRYPTO_ENABLE_DEA_KW:
872 get_random_bytes(
873 kvm->arch.crypto.crycb->dea_wrapping_key_mask,
874 sizeof(kvm->arch.crypto.crycb->dea_wrapping_key_mask));
875 kvm->arch.crypto.dea_kw = 1;
Christian Borntraegerc92ea7b2015-07-22 15:52:10 +0200876 VM_EVENT(kvm, 3, "%s", "ENABLE: DEA keywrapping support");
Tony Krowiaka374e892014-09-03 10:13:53 +0200877 break;
878 case KVM_S390_VM_CRYPTO_DISABLE_AES_KW:
879 kvm->arch.crypto.aes_kw = 0;
880 memset(kvm->arch.crypto.crycb->aes_wrapping_key_mask, 0,
881 sizeof(kvm->arch.crypto.crycb->aes_wrapping_key_mask));
Christian Borntraegerc92ea7b2015-07-22 15:52:10 +0200882 VM_EVENT(kvm, 3, "%s", "DISABLE: AES keywrapping support");
Tony Krowiaka374e892014-09-03 10:13:53 +0200883 break;
884 case KVM_S390_VM_CRYPTO_DISABLE_DEA_KW:
885 kvm->arch.crypto.dea_kw = 0;
886 memset(kvm->arch.crypto.crycb->dea_wrapping_key_mask, 0,
887 sizeof(kvm->arch.crypto.crycb->dea_wrapping_key_mask));
Christian Borntraegerc92ea7b2015-07-22 15:52:10 +0200888 VM_EVENT(kvm, 3, "%s", "DISABLE: DEA keywrapping support");
Tony Krowiaka374e892014-09-03 10:13:53 +0200889 break;
890 default:
891 mutex_unlock(&kvm->lock);
892 return -ENXIO;
893 }
894
Tony Krowiak20c922f2018-04-22 11:37:03 -0400895 kvm_s390_vcpu_crypto_reset_all(kvm);
Tony Krowiaka374e892014-09-03 10:13:53 +0200896 mutex_unlock(&kvm->lock);
897 return 0;
898}
899
Claudio Imbrenda190df4a2016-08-04 17:54:42 +0200900static void kvm_s390_sync_request_broadcast(struct kvm *kvm, int req)
901{
902 int cx;
903 struct kvm_vcpu *vcpu;
904
905 kvm_for_each_vcpu(cx, vcpu, kvm)
906 kvm_s390_sync_request(req, vcpu);
907}
908
909/*
910 * Must be called with kvm->srcu held to avoid races on memslots, and with
Christian Borntraeger1de1ea72017-12-22 10:54:20 +0100911 * kvm->slots_lock to avoid races with ourselves and kvm_s390_vm_stop_migration.
Claudio Imbrenda190df4a2016-08-04 17:54:42 +0200912 */
913static int kvm_s390_vm_start_migration(struct kvm *kvm)
914{
Claudio Imbrenda190df4a2016-08-04 17:54:42 +0200915 struct kvm_memory_slot *ms;
Claudio Imbrenda190df4a2016-08-04 17:54:42 +0200916 struct kvm_memslots *slots;
Claudio Imbrendaafdad612018-04-30 18:33:25 +0200917 unsigned long ram_pages = 0;
Claudio Imbrenda190df4a2016-08-04 17:54:42 +0200918 int slotnr;
919
920 /* migration mode already enabled */
Claudio Imbrendaafdad612018-04-30 18:33:25 +0200921 if (kvm->arch.migration_mode)
Claudio Imbrenda190df4a2016-08-04 17:54:42 +0200922 return 0;
Claudio Imbrenda190df4a2016-08-04 17:54:42 +0200923 slots = kvm_memslots(kvm);
924 if (!slots || !slots->used_slots)
925 return -EINVAL;
926
Claudio Imbrendaafdad612018-04-30 18:33:25 +0200927 if (!kvm->arch.use_cmma) {
928 kvm->arch.migration_mode = 1;
929 return 0;
Claudio Imbrenda190df4a2016-08-04 17:54:42 +0200930 }
Claudio Imbrendaafdad612018-04-30 18:33:25 +0200931 /* mark all the pages in active slots as dirty */
932 for (slotnr = 0; slotnr < slots->used_slots; slotnr++) {
933 ms = slots->memslots + slotnr;
934 /*
935 * The second half of the bitmap is only used on x86,
936 * and would be wasted otherwise, so we put it to good
937 * use here to keep track of the state of the storage
938 * attributes.
939 */
940 memset(kvm_second_dirty_bitmap(ms), 0xff, kvm_dirty_bitmap_bytes(ms));
941 ram_pages += ms->npages;
942 }
943 atomic64_set(&kvm->arch.cmma_dirty_pages, ram_pages);
944 kvm->arch.migration_mode = 1;
945 kvm_s390_sync_request_broadcast(kvm, KVM_REQ_START_MIGRATION);
Claudio Imbrenda190df4a2016-08-04 17:54:42 +0200946 return 0;
947}
948
949/*
Christian Borntraeger1de1ea72017-12-22 10:54:20 +0100950 * Must be called with kvm->slots_lock to avoid races with ourselves and
Claudio Imbrenda190df4a2016-08-04 17:54:42 +0200951 * kvm_s390_vm_start_migration.
952 */
953static int kvm_s390_vm_stop_migration(struct kvm *kvm)
954{
Claudio Imbrenda190df4a2016-08-04 17:54:42 +0200955 /* migration mode already disabled */
Claudio Imbrendaafdad612018-04-30 18:33:25 +0200956 if (!kvm->arch.migration_mode)
Claudio Imbrenda190df4a2016-08-04 17:54:42 +0200957 return 0;
Claudio Imbrendaafdad612018-04-30 18:33:25 +0200958 kvm->arch.migration_mode = 0;
959 if (kvm->arch.use_cmma)
Claudio Imbrenda190df4a2016-08-04 17:54:42 +0200960 kvm_s390_sync_request_broadcast(kvm, KVM_REQ_STOP_MIGRATION);
Claudio Imbrenda190df4a2016-08-04 17:54:42 +0200961 return 0;
962}
963
964static int kvm_s390_vm_set_migration(struct kvm *kvm,
965 struct kvm_device_attr *attr)
966{
Christian Borntraeger1de1ea72017-12-22 10:54:20 +0100967 int res = -ENXIO;
Claudio Imbrenda190df4a2016-08-04 17:54:42 +0200968
Christian Borntraeger1de1ea72017-12-22 10:54:20 +0100969 mutex_lock(&kvm->slots_lock);
Claudio Imbrenda190df4a2016-08-04 17:54:42 +0200970 switch (attr->attr) {
971 case KVM_S390_VM_MIGRATION_START:
Claudio Imbrenda190df4a2016-08-04 17:54:42 +0200972 res = kvm_s390_vm_start_migration(kvm);
Claudio Imbrenda190df4a2016-08-04 17:54:42 +0200973 break;
974 case KVM_S390_VM_MIGRATION_STOP:
975 res = kvm_s390_vm_stop_migration(kvm);
976 break;
977 default:
978 break;
979 }
Christian Borntraeger1de1ea72017-12-22 10:54:20 +0100980 mutex_unlock(&kvm->slots_lock);
Claudio Imbrenda190df4a2016-08-04 17:54:42 +0200981
982 return res;
983}
984
985static int kvm_s390_vm_get_migration(struct kvm *kvm,
986 struct kvm_device_attr *attr)
987{
Claudio Imbrendaafdad612018-04-30 18:33:25 +0200988 u64 mig = kvm->arch.migration_mode;
Claudio Imbrenda190df4a2016-08-04 17:54:42 +0200989
990 if (attr->attr != KVM_S390_VM_MIGRATION_STATUS)
991 return -ENXIO;
992
993 if (copy_to_user((void __user *)attr->addr, &mig, sizeof(mig)))
994 return -EFAULT;
995 return 0;
996}
997
Collin L. Walling8fa16962016-07-26 15:29:44 -0400998static int kvm_s390_set_tod_ext(struct kvm *kvm, struct kvm_device_attr *attr)
999{
1000 struct kvm_s390_vm_tod_clock gtod;
1001
1002 if (copy_from_user(&gtod, (void __user *)attr->addr, sizeof(gtod)))
1003 return -EFAULT;
1004
David Hildenbrand0e7def52018-02-07 12:46:43 +01001005 if (!test_kvm_facility(kvm, 139) && gtod.epoch_idx)
Collin L. Walling8fa16962016-07-26 15:29:44 -04001006 return -EINVAL;
David Hildenbrand0e7def52018-02-07 12:46:43 +01001007 kvm_s390_set_tod_clock(kvm, &gtod);
Collin L. Walling8fa16962016-07-26 15:29:44 -04001008
1009 VM_EVENT(kvm, 3, "SET: TOD extension: 0x%x, TOD base: 0x%llx",
1010 gtod.epoch_idx, gtod.tod);
1011
1012 return 0;
1013}
1014
Jason J. Herne72f25022014-11-25 09:46:02 -05001015static int kvm_s390_set_tod_high(struct kvm *kvm, struct kvm_device_attr *attr)
1016{
1017 u8 gtod_high;
1018
1019 if (copy_from_user(&gtod_high, (void __user *)attr->addr,
1020 sizeof(gtod_high)))
1021 return -EFAULT;
1022
1023 if (gtod_high != 0)
1024 return -EINVAL;
Christian Borntraeger58c383c2015-10-12 13:27:29 +02001025 VM_EVENT(kvm, 3, "SET: TOD extension: 0x%x", gtod_high);
Jason J. Herne72f25022014-11-25 09:46:02 -05001026
1027 return 0;
1028}
1029
1030static int kvm_s390_set_tod_low(struct kvm *kvm, struct kvm_device_attr *attr)
1031{
David Hildenbrand0e7def52018-02-07 12:46:43 +01001032 struct kvm_s390_vm_tod_clock gtod = { 0 };
Jason J. Herne72f25022014-11-25 09:46:02 -05001033
David Hildenbrand0e7def52018-02-07 12:46:43 +01001034 if (copy_from_user(&gtod.tod, (void __user *)attr->addr,
1035 sizeof(gtod.tod)))
Jason J. Herne72f25022014-11-25 09:46:02 -05001036 return -EFAULT;
1037
David Hildenbrand0e7def52018-02-07 12:46:43 +01001038 kvm_s390_set_tod_clock(kvm, &gtod);
1039 VM_EVENT(kvm, 3, "SET: TOD base: 0x%llx", gtod.tod);
Jason J. Herne72f25022014-11-25 09:46:02 -05001040 return 0;
1041}
1042
1043static int kvm_s390_set_tod(struct kvm *kvm, struct kvm_device_attr *attr)
1044{
1045 int ret;
1046
1047 if (attr->flags)
1048 return -EINVAL;
1049
1050 switch (attr->attr) {
Collin L. Walling8fa16962016-07-26 15:29:44 -04001051 case KVM_S390_VM_TOD_EXT:
1052 ret = kvm_s390_set_tod_ext(kvm, attr);
1053 break;
Jason J. Herne72f25022014-11-25 09:46:02 -05001054 case KVM_S390_VM_TOD_HIGH:
1055 ret = kvm_s390_set_tod_high(kvm, attr);
1056 break;
1057 case KVM_S390_VM_TOD_LOW:
1058 ret = kvm_s390_set_tod_low(kvm, attr);
1059 break;
1060 default:
1061 ret = -ENXIO;
1062 break;
1063 }
1064 return ret;
1065}
1066
David Hildenbrand33d1b272018-04-27 14:36:13 +02001067static void kvm_s390_get_tod_clock(struct kvm *kvm,
1068 struct kvm_s390_vm_tod_clock *gtod)
Collin L. Walling8fa16962016-07-26 15:29:44 -04001069{
1070 struct kvm_s390_tod_clock_ext htod;
1071
1072 preempt_disable();
1073
1074 get_tod_clock_ext((char *)&htod);
1075
1076 gtod->tod = htod.tod + kvm->arch.epoch;
David Hildenbrand33d1b272018-04-27 14:36:13 +02001077 gtod->epoch_idx = 0;
1078 if (test_kvm_facility(kvm, 139)) {
1079 gtod->epoch_idx = htod.epoch_idx + kvm->arch.epdx;
1080 if (gtod->tod < htod.tod)
1081 gtod->epoch_idx += 1;
1082 }
Collin L. Walling8fa16962016-07-26 15:29:44 -04001083
1084 preempt_enable();
1085}
1086
1087static int kvm_s390_get_tod_ext(struct kvm *kvm, struct kvm_device_attr *attr)
1088{
1089 struct kvm_s390_vm_tod_clock gtod;
1090
1091 memset(&gtod, 0, sizeof(gtod));
David Hildenbrand33d1b272018-04-27 14:36:13 +02001092 kvm_s390_get_tod_clock(kvm, &gtod);
Collin L. Walling8fa16962016-07-26 15:29:44 -04001093 if (copy_to_user((void __user *)attr->addr, &gtod, sizeof(gtod)))
1094 return -EFAULT;
1095
1096 VM_EVENT(kvm, 3, "QUERY: TOD extension: 0x%x, TOD base: 0x%llx",
1097 gtod.epoch_idx, gtod.tod);
1098 return 0;
1099}
1100
Jason J. Herne72f25022014-11-25 09:46:02 -05001101static int kvm_s390_get_tod_high(struct kvm *kvm, struct kvm_device_attr *attr)
1102{
1103 u8 gtod_high = 0;
1104
1105 if (copy_to_user((void __user *)attr->addr, &gtod_high,
1106 sizeof(gtod_high)))
1107 return -EFAULT;
Christian Borntraeger58c383c2015-10-12 13:27:29 +02001108 VM_EVENT(kvm, 3, "QUERY: TOD extension: 0x%x", gtod_high);
Jason J. Herne72f25022014-11-25 09:46:02 -05001109
1110 return 0;
1111}
1112
1113static int kvm_s390_get_tod_low(struct kvm *kvm, struct kvm_device_attr *attr)
1114{
David Hildenbrand5a3d8832015-09-29 16:27:24 +02001115 u64 gtod;
Jason J. Herne72f25022014-11-25 09:46:02 -05001116
David Hildenbrand60417fc2015-09-29 16:20:36 +02001117 gtod = kvm_s390_get_tod_clock_fast(kvm);
Jason J. Herne72f25022014-11-25 09:46:02 -05001118 if (copy_to_user((void __user *)attr->addr, &gtod, sizeof(gtod)))
1119 return -EFAULT;
Christian Borntraeger58c383c2015-10-12 13:27:29 +02001120 VM_EVENT(kvm, 3, "QUERY: TOD base: 0x%llx", gtod);
Jason J. Herne72f25022014-11-25 09:46:02 -05001121
1122 return 0;
1123}
1124
1125static int kvm_s390_get_tod(struct kvm *kvm, struct kvm_device_attr *attr)
1126{
1127 int ret;
1128
1129 if (attr->flags)
1130 return -EINVAL;
1131
1132 switch (attr->attr) {
Collin L. Walling8fa16962016-07-26 15:29:44 -04001133 case KVM_S390_VM_TOD_EXT:
1134 ret = kvm_s390_get_tod_ext(kvm, attr);
1135 break;
Jason J. Herne72f25022014-11-25 09:46:02 -05001136 case KVM_S390_VM_TOD_HIGH:
1137 ret = kvm_s390_get_tod_high(kvm, attr);
1138 break;
1139 case KVM_S390_VM_TOD_LOW:
1140 ret = kvm_s390_get_tod_low(kvm, attr);
1141 break;
1142 default:
1143 ret = -ENXIO;
1144 break;
1145 }
1146 return ret;
1147}
1148
Michael Mueller658b6ed2015-02-02 15:49:35 +01001149static int kvm_s390_set_processor(struct kvm *kvm, struct kvm_device_attr *attr)
1150{
1151 struct kvm_s390_vm_cpu_processor *proc;
David Hildenbrand053dd232016-04-04 13:59:42 +02001152 u16 lowest_ibc, unblocked_ibc;
Michael Mueller658b6ed2015-02-02 15:49:35 +01001153 int ret = 0;
1154
1155 mutex_lock(&kvm->lock);
Paolo Bonzinia03825b2016-06-13 14:50:04 +02001156 if (kvm->created_vcpus) {
Michael Mueller658b6ed2015-02-02 15:49:35 +01001157 ret = -EBUSY;
1158 goto out;
1159 }
1160 proc = kzalloc(sizeof(*proc), GFP_KERNEL);
1161 if (!proc) {
1162 ret = -ENOMEM;
1163 goto out;
1164 }
1165 if (!copy_from_user(proc, (void __user *)attr->addr,
1166 sizeof(*proc))) {
David Hildenbrand9bb0ec02016-04-04 14:27:51 +02001167 kvm->arch.model.cpuid = proc->cpuid;
David Hildenbrand053dd232016-04-04 13:59:42 +02001168 lowest_ibc = sclp.ibc >> 16 & 0xfff;
1169 unblocked_ibc = sclp.ibc & 0xfff;
David Hildenbrand0487c442016-06-10 09:22:31 +02001170 if (lowest_ibc && proc->ibc) {
David Hildenbrand053dd232016-04-04 13:59:42 +02001171 if (proc->ibc > unblocked_ibc)
1172 kvm->arch.model.ibc = unblocked_ibc;
1173 else if (proc->ibc < lowest_ibc)
1174 kvm->arch.model.ibc = lowest_ibc;
1175 else
1176 kvm->arch.model.ibc = proc->ibc;
1177 }
David Hildenbrandc54f0d62015-12-02 08:53:52 +01001178 memcpy(kvm->arch.model.fac_list, proc->fac_list,
Michael Mueller658b6ed2015-02-02 15:49:35 +01001179 S390_ARCH_FAC_LIST_SIZE_BYTE);
Christian Borntraegera8c39dd2017-01-18 16:01:02 +01001180 VM_EVENT(kvm, 3, "SET: guest ibc: 0x%4.4x, guest cpuid: 0x%16.16llx",
1181 kvm->arch.model.ibc,
1182 kvm->arch.model.cpuid);
1183 VM_EVENT(kvm, 3, "SET: guest faclist: 0x%16.16llx.%16.16llx.%16.16llx",
1184 kvm->arch.model.fac_list[0],
1185 kvm->arch.model.fac_list[1],
1186 kvm->arch.model.fac_list[2]);
Michael Mueller658b6ed2015-02-02 15:49:35 +01001187 } else
1188 ret = -EFAULT;
1189 kfree(proc);
1190out:
1191 mutex_unlock(&kvm->lock);
1192 return ret;
1193}
1194
David Hildenbrand15c97052015-03-19 17:36:43 +01001195static int kvm_s390_set_processor_feat(struct kvm *kvm,
1196 struct kvm_device_attr *attr)
1197{
1198 struct kvm_s390_vm_cpu_feat data;
David Hildenbrand15c97052015-03-19 17:36:43 +01001199
1200 if (copy_from_user(&data, (void __user *)attr->addr, sizeof(data)))
1201 return -EFAULT;
1202 if (!bitmap_subset((unsigned long *) data.feat,
1203 kvm_s390_available_cpu_feat,
1204 KVM_S390_VM_CPU_FEAT_NR_BITS))
1205 return -EINVAL;
1206
1207 mutex_lock(&kvm->lock);
Christian Borntraeger2f8311c2017-11-16 12:30:15 +01001208 if (kvm->created_vcpus) {
1209 mutex_unlock(&kvm->lock);
1210 return -EBUSY;
David Hildenbrand15c97052015-03-19 17:36:43 +01001211 }
Christian Borntraeger2f8311c2017-11-16 12:30:15 +01001212 bitmap_copy(kvm->arch.cpu_feat, (unsigned long *) data.feat,
1213 KVM_S390_VM_CPU_FEAT_NR_BITS);
David Hildenbrand15c97052015-03-19 17:36:43 +01001214 mutex_unlock(&kvm->lock);
Christian Borntraeger2f8311c2017-11-16 12:30:15 +01001215 VM_EVENT(kvm, 3, "SET: guest feat: 0x%16.16llx.0x%16.16llx.0x%16.16llx",
1216 data.feat[0],
1217 data.feat[1],
1218 data.feat[2]);
1219 return 0;
David Hildenbrand15c97052015-03-19 17:36:43 +01001220}
1221
David Hildenbrand0a763c72016-05-18 16:03:47 +02001222static int kvm_s390_set_processor_subfunc(struct kvm *kvm,
1223 struct kvm_device_attr *attr)
1224{
1225 /*
1226 * Once supported by kernel + hw, we have to store the subfunctions
1227 * in kvm->arch and remember that user space configured them.
1228 */
1229 return -ENXIO;
1230}
1231
Michael Mueller658b6ed2015-02-02 15:49:35 +01001232static int kvm_s390_set_cpu_model(struct kvm *kvm, struct kvm_device_attr *attr)
1233{
1234 int ret = -ENXIO;
1235
1236 switch (attr->attr) {
1237 case KVM_S390_VM_CPU_PROCESSOR:
1238 ret = kvm_s390_set_processor(kvm, attr);
1239 break;
David Hildenbrand15c97052015-03-19 17:36:43 +01001240 case KVM_S390_VM_CPU_PROCESSOR_FEAT:
1241 ret = kvm_s390_set_processor_feat(kvm, attr);
1242 break;
David Hildenbrand0a763c72016-05-18 16:03:47 +02001243 case KVM_S390_VM_CPU_PROCESSOR_SUBFUNC:
1244 ret = kvm_s390_set_processor_subfunc(kvm, attr);
1245 break;
Michael Mueller658b6ed2015-02-02 15:49:35 +01001246 }
1247 return ret;
1248}
1249
1250static int kvm_s390_get_processor(struct kvm *kvm, struct kvm_device_attr *attr)
1251{
1252 struct kvm_s390_vm_cpu_processor *proc;
1253 int ret = 0;
1254
1255 proc = kzalloc(sizeof(*proc), GFP_KERNEL);
1256 if (!proc) {
1257 ret = -ENOMEM;
1258 goto out;
1259 }
David Hildenbrand9bb0ec02016-04-04 14:27:51 +02001260 proc->cpuid = kvm->arch.model.cpuid;
Michael Mueller658b6ed2015-02-02 15:49:35 +01001261 proc->ibc = kvm->arch.model.ibc;
David Hildenbrandc54f0d62015-12-02 08:53:52 +01001262 memcpy(&proc->fac_list, kvm->arch.model.fac_list,
1263 S390_ARCH_FAC_LIST_SIZE_BYTE);
Christian Borntraegera8c39dd2017-01-18 16:01:02 +01001264 VM_EVENT(kvm, 3, "GET: guest ibc: 0x%4.4x, guest cpuid: 0x%16.16llx",
1265 kvm->arch.model.ibc,
1266 kvm->arch.model.cpuid);
1267 VM_EVENT(kvm, 3, "GET: guest faclist: 0x%16.16llx.%16.16llx.%16.16llx",
1268 kvm->arch.model.fac_list[0],
1269 kvm->arch.model.fac_list[1],
1270 kvm->arch.model.fac_list[2]);
Michael Mueller658b6ed2015-02-02 15:49:35 +01001271 if (copy_to_user((void __user *)attr->addr, proc, sizeof(*proc)))
1272 ret = -EFAULT;
1273 kfree(proc);
1274out:
1275 return ret;
1276}
1277
1278static int kvm_s390_get_machine(struct kvm *kvm, struct kvm_device_attr *attr)
1279{
1280 struct kvm_s390_vm_cpu_machine *mach;
1281 int ret = 0;
1282
1283 mach = kzalloc(sizeof(*mach), GFP_KERNEL);
1284 if (!mach) {
1285 ret = -ENOMEM;
1286 goto out;
1287 }
1288 get_cpu_id((struct cpuid *) &mach->cpuid);
David Hildenbrand37c5f6c2015-05-06 13:18:59 +02001289 mach->ibc = sclp.ibc;
David Hildenbrandc54f0d62015-12-02 08:53:52 +01001290 memcpy(&mach->fac_mask, kvm->arch.model.fac_mask,
Michael Mueller981467c2015-02-24 13:51:04 +01001291 S390_ARCH_FAC_LIST_SIZE_BYTE);
Michael Mueller658b6ed2015-02-02 15:49:35 +01001292 memcpy((unsigned long *)&mach->fac_list, S390_lowcore.stfle_fac_list,
Christian Borntraeger04478192017-01-12 16:25:15 +01001293 sizeof(S390_lowcore.stfle_fac_list));
Christian Borntraegera8c39dd2017-01-18 16:01:02 +01001294 VM_EVENT(kvm, 3, "GET: host ibc: 0x%4.4x, host cpuid: 0x%16.16llx",
1295 kvm->arch.model.ibc,
1296 kvm->arch.model.cpuid);
1297 VM_EVENT(kvm, 3, "GET: host facmask: 0x%16.16llx.%16.16llx.%16.16llx",
1298 mach->fac_mask[0],
1299 mach->fac_mask[1],
1300 mach->fac_mask[2]);
1301 VM_EVENT(kvm, 3, "GET: host faclist: 0x%16.16llx.%16.16llx.%16.16llx",
1302 mach->fac_list[0],
1303 mach->fac_list[1],
1304 mach->fac_list[2]);
Michael Mueller658b6ed2015-02-02 15:49:35 +01001305 if (copy_to_user((void __user *)attr->addr, mach, sizeof(*mach)))
1306 ret = -EFAULT;
1307 kfree(mach);
1308out:
1309 return ret;
1310}
1311
David Hildenbrand15c97052015-03-19 17:36:43 +01001312static int kvm_s390_get_processor_feat(struct kvm *kvm,
1313 struct kvm_device_attr *attr)
1314{
1315 struct kvm_s390_vm_cpu_feat data;
1316
1317 bitmap_copy((unsigned long *) data.feat, kvm->arch.cpu_feat,
1318 KVM_S390_VM_CPU_FEAT_NR_BITS);
1319 if (copy_to_user((void __user *)attr->addr, &data, sizeof(data)))
1320 return -EFAULT;
Christian Borntraeger2f8311c2017-11-16 12:30:15 +01001321 VM_EVENT(kvm, 3, "GET: guest feat: 0x%16.16llx.0x%16.16llx.0x%16.16llx",
1322 data.feat[0],
1323 data.feat[1],
1324 data.feat[2]);
David Hildenbrand15c97052015-03-19 17:36:43 +01001325 return 0;
1326}
1327
1328static int kvm_s390_get_machine_feat(struct kvm *kvm,
1329 struct kvm_device_attr *attr)
1330{
1331 struct kvm_s390_vm_cpu_feat data;
1332
1333 bitmap_copy((unsigned long *) data.feat,
1334 kvm_s390_available_cpu_feat,
1335 KVM_S390_VM_CPU_FEAT_NR_BITS);
1336 if (copy_to_user((void __user *)attr->addr, &data, sizeof(data)))
1337 return -EFAULT;
Christian Borntraeger2f8311c2017-11-16 12:30:15 +01001338 VM_EVENT(kvm, 3, "GET: host feat: 0x%16.16llx.0x%16.16llx.0x%16.16llx",
1339 data.feat[0],
1340 data.feat[1],
1341 data.feat[2]);
David Hildenbrand15c97052015-03-19 17:36:43 +01001342 return 0;
1343}
1344
David Hildenbrand0a763c72016-05-18 16:03:47 +02001345static int kvm_s390_get_processor_subfunc(struct kvm *kvm,
1346 struct kvm_device_attr *attr)
1347{
1348 /*
1349 * Once we can actually configure subfunctions (kernel + hw support),
1350 * we have to check if they were already set by user space, if so copy
1351 * them from kvm->arch.
1352 */
1353 return -ENXIO;
1354}
1355
1356static int kvm_s390_get_machine_subfunc(struct kvm *kvm,
1357 struct kvm_device_attr *attr)
1358{
1359 if (copy_to_user((void __user *)attr->addr, &kvm_s390_available_subfunc,
1360 sizeof(struct kvm_s390_vm_cpu_subfunc)))
1361 return -EFAULT;
1362 return 0;
1363}
Michael Mueller658b6ed2015-02-02 15:49:35 +01001364static int kvm_s390_get_cpu_model(struct kvm *kvm, struct kvm_device_attr *attr)
1365{
1366 int ret = -ENXIO;
1367
1368 switch (attr->attr) {
1369 case KVM_S390_VM_CPU_PROCESSOR:
1370 ret = kvm_s390_get_processor(kvm, attr);
1371 break;
1372 case KVM_S390_VM_CPU_MACHINE:
1373 ret = kvm_s390_get_machine(kvm, attr);
1374 break;
David Hildenbrand15c97052015-03-19 17:36:43 +01001375 case KVM_S390_VM_CPU_PROCESSOR_FEAT:
1376 ret = kvm_s390_get_processor_feat(kvm, attr);
1377 break;
1378 case KVM_S390_VM_CPU_MACHINE_FEAT:
1379 ret = kvm_s390_get_machine_feat(kvm, attr);
1380 break;
David Hildenbrand0a763c72016-05-18 16:03:47 +02001381 case KVM_S390_VM_CPU_PROCESSOR_SUBFUNC:
1382 ret = kvm_s390_get_processor_subfunc(kvm, attr);
1383 break;
1384 case KVM_S390_VM_CPU_MACHINE_SUBFUNC:
1385 ret = kvm_s390_get_machine_subfunc(kvm, attr);
1386 break;
Michael Mueller658b6ed2015-02-02 15:49:35 +01001387 }
1388 return ret;
1389}
1390
Dominik Dingelf2061652014-04-09 13:13:00 +02001391static int kvm_s390_vm_set_attr(struct kvm *kvm, struct kvm_device_attr *attr)
1392{
1393 int ret;
1394
1395 switch (attr->group) {
Dominik Dingel4f718ea2014-04-09 13:13:00 +02001396 case KVM_S390_VM_MEM_CTRL:
Dominik Dingel8c0a7ce2014-10-31 14:10:41 +01001397 ret = kvm_s390_set_mem_control(kvm, attr);
Dominik Dingel4f718ea2014-04-09 13:13:00 +02001398 break;
Jason J. Herne72f25022014-11-25 09:46:02 -05001399 case KVM_S390_VM_TOD:
1400 ret = kvm_s390_set_tod(kvm, attr);
1401 break;
Michael Mueller658b6ed2015-02-02 15:49:35 +01001402 case KVM_S390_VM_CPU_MODEL:
1403 ret = kvm_s390_set_cpu_model(kvm, attr);
1404 break;
Tony Krowiaka374e892014-09-03 10:13:53 +02001405 case KVM_S390_VM_CRYPTO:
1406 ret = kvm_s390_vm_set_crypto(kvm, attr);
1407 break;
Claudio Imbrenda190df4a2016-08-04 17:54:42 +02001408 case KVM_S390_VM_MIGRATION:
1409 ret = kvm_s390_vm_set_migration(kvm, attr);
1410 break;
Dominik Dingelf2061652014-04-09 13:13:00 +02001411 default:
1412 ret = -ENXIO;
1413 break;
1414 }
1415
1416 return ret;
1417}
1418
1419static int kvm_s390_vm_get_attr(struct kvm *kvm, struct kvm_device_attr *attr)
1420{
Dominik Dingel8c0a7ce2014-10-31 14:10:41 +01001421 int ret;
1422
1423 switch (attr->group) {
1424 case KVM_S390_VM_MEM_CTRL:
1425 ret = kvm_s390_get_mem_control(kvm, attr);
1426 break;
Jason J. Herne72f25022014-11-25 09:46:02 -05001427 case KVM_S390_VM_TOD:
1428 ret = kvm_s390_get_tod(kvm, attr);
1429 break;
Michael Mueller658b6ed2015-02-02 15:49:35 +01001430 case KVM_S390_VM_CPU_MODEL:
1431 ret = kvm_s390_get_cpu_model(kvm, attr);
1432 break;
Claudio Imbrenda190df4a2016-08-04 17:54:42 +02001433 case KVM_S390_VM_MIGRATION:
1434 ret = kvm_s390_vm_get_migration(kvm, attr);
1435 break;
Dominik Dingel8c0a7ce2014-10-31 14:10:41 +01001436 default:
1437 ret = -ENXIO;
1438 break;
1439 }
1440
1441 return ret;
Dominik Dingelf2061652014-04-09 13:13:00 +02001442}
1443
1444static int kvm_s390_vm_has_attr(struct kvm *kvm, struct kvm_device_attr *attr)
1445{
1446 int ret;
1447
1448 switch (attr->group) {
Dominik Dingel4f718ea2014-04-09 13:13:00 +02001449 case KVM_S390_VM_MEM_CTRL:
1450 switch (attr->attr) {
1451 case KVM_S390_VM_MEM_ENABLE_CMMA:
1452 case KVM_S390_VM_MEM_CLR_CMMA:
David Hildenbrandf9cbd9b2016-03-03 09:48:47 +01001453 ret = sclp.has_cmma ? 0 : -ENXIO;
1454 break;
Dominik Dingel8c0a7ce2014-10-31 14:10:41 +01001455 case KVM_S390_VM_MEM_LIMIT_SIZE:
Dominik Dingel4f718ea2014-04-09 13:13:00 +02001456 ret = 0;
1457 break;
1458 default:
1459 ret = -ENXIO;
1460 break;
1461 }
1462 break;
Jason J. Herne72f25022014-11-25 09:46:02 -05001463 case KVM_S390_VM_TOD:
1464 switch (attr->attr) {
1465 case KVM_S390_VM_TOD_LOW:
1466 case KVM_S390_VM_TOD_HIGH:
1467 ret = 0;
1468 break;
1469 default:
1470 ret = -ENXIO;
1471 break;
1472 }
1473 break;
Michael Mueller658b6ed2015-02-02 15:49:35 +01001474 case KVM_S390_VM_CPU_MODEL:
1475 switch (attr->attr) {
1476 case KVM_S390_VM_CPU_PROCESSOR:
1477 case KVM_S390_VM_CPU_MACHINE:
David Hildenbrand15c97052015-03-19 17:36:43 +01001478 case KVM_S390_VM_CPU_PROCESSOR_FEAT:
1479 case KVM_S390_VM_CPU_MACHINE_FEAT:
David Hildenbrand0a763c72016-05-18 16:03:47 +02001480 case KVM_S390_VM_CPU_MACHINE_SUBFUNC:
Michael Mueller658b6ed2015-02-02 15:49:35 +01001481 ret = 0;
1482 break;
David Hildenbrand0a763c72016-05-18 16:03:47 +02001483 /* configuring subfunctions is not supported yet */
1484 case KVM_S390_VM_CPU_PROCESSOR_SUBFUNC:
Michael Mueller658b6ed2015-02-02 15:49:35 +01001485 default:
1486 ret = -ENXIO;
1487 break;
1488 }
1489 break;
Tony Krowiaka374e892014-09-03 10:13:53 +02001490 case KVM_S390_VM_CRYPTO:
1491 switch (attr->attr) {
1492 case KVM_S390_VM_CRYPTO_ENABLE_AES_KW:
1493 case KVM_S390_VM_CRYPTO_ENABLE_DEA_KW:
1494 case KVM_S390_VM_CRYPTO_DISABLE_AES_KW:
1495 case KVM_S390_VM_CRYPTO_DISABLE_DEA_KW:
1496 ret = 0;
1497 break;
1498 default:
1499 ret = -ENXIO;
1500 break;
1501 }
1502 break;
Claudio Imbrenda190df4a2016-08-04 17:54:42 +02001503 case KVM_S390_VM_MIGRATION:
1504 ret = 0;
1505 break;
Dominik Dingelf2061652014-04-09 13:13:00 +02001506 default:
1507 ret = -ENXIO;
1508 break;
1509 }
1510
1511 return ret;
1512}
1513
Jason J. Herne30ee2a92014-09-23 09:23:01 -04001514static long kvm_s390_get_skeys(struct kvm *kvm, struct kvm_s390_skeys *args)
1515{
1516 uint8_t *keys;
1517 uint64_t hva;
Christian Borntraeger4f899142017-07-10 13:35:48 +02001518 int srcu_idx, i, r = 0;
Jason J. Herne30ee2a92014-09-23 09:23:01 -04001519
1520 if (args->flags != 0)
1521 return -EINVAL;
1522
1523 /* Is this guest using storage keys? */
Janosch Frank55531b72018-02-15 16:33:47 +01001524 if (!mm_uses_skeys(current->mm))
Jason J. Herne30ee2a92014-09-23 09:23:01 -04001525 return KVM_S390_GET_SKEYS_NONE;
1526
1527 /* Enforce sane limit on memory allocation */
1528 if (args->count < 1 || args->count > KVM_S390_SKEYS_MAX)
1529 return -EINVAL;
1530
Michal Hocko752ade62017-05-08 15:57:27 -07001531 keys = kvmalloc_array(args->count, sizeof(uint8_t), GFP_KERNEL);
Jason J. Herne30ee2a92014-09-23 09:23:01 -04001532 if (!keys)
1533 return -ENOMEM;
1534
Martin Schwidefskyd3ed1ce2016-03-08 11:53:35 +01001535 down_read(&current->mm->mmap_sem);
Christian Borntraeger4f899142017-07-10 13:35:48 +02001536 srcu_idx = srcu_read_lock(&kvm->srcu);
Jason J. Herne30ee2a92014-09-23 09:23:01 -04001537 for (i = 0; i < args->count; i++) {
1538 hva = gfn_to_hva(kvm, args->start_gfn + i);
1539 if (kvm_is_error_hva(hva)) {
1540 r = -EFAULT;
Martin Schwidefskyd3ed1ce2016-03-08 11:53:35 +01001541 break;
Jason J. Herne30ee2a92014-09-23 09:23:01 -04001542 }
1543
David Hildenbrand154c8c12016-05-09 11:22:34 +02001544 r = get_guest_storage_key(current->mm, hva, &keys[i]);
1545 if (r)
Martin Schwidefskyd3ed1ce2016-03-08 11:53:35 +01001546 break;
Jason J. Herne30ee2a92014-09-23 09:23:01 -04001547 }
Christian Borntraeger4f899142017-07-10 13:35:48 +02001548 srcu_read_unlock(&kvm->srcu, srcu_idx);
Martin Schwidefskyd3ed1ce2016-03-08 11:53:35 +01001549 up_read(&current->mm->mmap_sem);
Jason J. Herne30ee2a92014-09-23 09:23:01 -04001550
Martin Schwidefskyd3ed1ce2016-03-08 11:53:35 +01001551 if (!r) {
1552 r = copy_to_user((uint8_t __user *)args->skeydata_addr, keys,
1553 sizeof(uint8_t) * args->count);
1554 if (r)
1555 r = -EFAULT;
Jason J. Herne30ee2a92014-09-23 09:23:01 -04001556 }
1557
Jason J. Herne30ee2a92014-09-23 09:23:01 -04001558 kvfree(keys);
1559 return r;
1560}
1561
1562static long kvm_s390_set_skeys(struct kvm *kvm, struct kvm_s390_skeys *args)
1563{
1564 uint8_t *keys;
1565 uint64_t hva;
Christian Borntraeger4f899142017-07-10 13:35:48 +02001566 int srcu_idx, i, r = 0;
Janosch Frankbd096f62018-07-18 13:40:22 +01001567 bool unlocked;
Jason J. Herne30ee2a92014-09-23 09:23:01 -04001568
1569 if (args->flags != 0)
1570 return -EINVAL;
1571
1572 /* Enforce sane limit on memory allocation */
1573 if (args->count < 1 || args->count > KVM_S390_SKEYS_MAX)
1574 return -EINVAL;
1575
Michal Hocko752ade62017-05-08 15:57:27 -07001576 keys = kvmalloc_array(args->count, sizeof(uint8_t), GFP_KERNEL);
Jason J. Herne30ee2a92014-09-23 09:23:01 -04001577 if (!keys)
1578 return -ENOMEM;
1579
1580 r = copy_from_user(keys, (uint8_t __user *)args->skeydata_addr,
1581 sizeof(uint8_t) * args->count);
1582 if (r) {
1583 r = -EFAULT;
1584 goto out;
1585 }
1586
1587 /* Enable storage key handling for the guest */
Dominik Dingel14d4a422015-05-07 15:16:13 +02001588 r = s390_enable_skey();
1589 if (r)
1590 goto out;
Jason J. Herne30ee2a92014-09-23 09:23:01 -04001591
Janosch Frankbd096f62018-07-18 13:40:22 +01001592 i = 0;
Martin Schwidefskyd3ed1ce2016-03-08 11:53:35 +01001593 down_read(&current->mm->mmap_sem);
Christian Borntraeger4f899142017-07-10 13:35:48 +02001594 srcu_idx = srcu_read_lock(&kvm->srcu);
Janosch Frankbd096f62018-07-18 13:40:22 +01001595 while (i < args->count) {
1596 unlocked = false;
Jason J. Herne30ee2a92014-09-23 09:23:01 -04001597 hva = gfn_to_hva(kvm, args->start_gfn + i);
1598 if (kvm_is_error_hva(hva)) {
1599 r = -EFAULT;
Martin Schwidefskyd3ed1ce2016-03-08 11:53:35 +01001600 break;
Jason J. Herne30ee2a92014-09-23 09:23:01 -04001601 }
1602
1603 /* Lowest order bit is reserved */
1604 if (keys[i] & 0x01) {
1605 r = -EINVAL;
Martin Schwidefskyd3ed1ce2016-03-08 11:53:35 +01001606 break;
Jason J. Herne30ee2a92014-09-23 09:23:01 -04001607 }
1608
David Hildenbrandfe69eab2016-05-09 13:08:07 +02001609 r = set_guest_storage_key(current->mm, hva, keys[i], 0);
Janosch Frankbd096f62018-07-18 13:40:22 +01001610 if (r) {
1611 r = fixup_user_fault(current, current->mm, hva,
1612 FAULT_FLAG_WRITE, &unlocked);
1613 if (r)
1614 break;
1615 }
1616 if (!r)
1617 i++;
Jason J. Herne30ee2a92014-09-23 09:23:01 -04001618 }
Christian Borntraeger4f899142017-07-10 13:35:48 +02001619 srcu_read_unlock(&kvm->srcu, srcu_idx);
Martin Schwidefskyd3ed1ce2016-03-08 11:53:35 +01001620 up_read(&current->mm->mmap_sem);
Jason J. Herne30ee2a92014-09-23 09:23:01 -04001621out:
1622 kvfree(keys);
1623 return r;
1624}
1625
Claudio Imbrenda4036e382016-08-04 17:58:47 +02001626/*
1627 * Base address and length must be sent at the start of each block, therefore
1628 * it's cheaper to send some clean data, as long as it's less than the size of
1629 * two longs.
1630 */
1631#define KVM_S390_MAX_BIT_DISTANCE (2 * sizeof(void *))
1632/* for consistency */
1633#define KVM_S390_CMMA_SIZE_MAX ((u32)KVM_S390_SKEYS_MAX)
1634
1635/*
Claudio Imbrendaafdad612018-04-30 18:33:25 +02001636 * Similar to gfn_to_memslot, but returns the index of a memslot also when the
1637 * address falls in a hole. In that case the index of one of the memslots
1638 * bordering the hole is returned.
1639 */
1640static int gfn_to_memslot_approx(struct kvm_memslots *slots, gfn_t gfn)
1641{
1642 int start = 0, end = slots->used_slots;
1643 int slot = atomic_read(&slots->lru_slot);
1644 struct kvm_memory_slot *memslots = slots->memslots;
1645
1646 if (gfn >= memslots[slot].base_gfn &&
1647 gfn < memslots[slot].base_gfn + memslots[slot].npages)
1648 return slot;
1649
1650 while (start < end) {
1651 slot = start + (end - start) / 2;
1652
1653 if (gfn >= memslots[slot].base_gfn)
1654 end = slot;
1655 else
1656 start = slot + 1;
1657 }
1658
1659 if (gfn >= memslots[start].base_gfn &&
1660 gfn < memslots[start].base_gfn + memslots[start].npages) {
1661 atomic_set(&slots->lru_slot, start);
1662 }
1663
1664 return start;
1665}
1666
1667static int kvm_s390_peek_cmma(struct kvm *kvm, struct kvm_s390_cmma_log *args,
1668 u8 *res, unsigned long bufsize)
1669{
1670 unsigned long pgstev, hva, cur_gfn = args->start_gfn;
1671
1672 args->count = 0;
1673 while (args->count < bufsize) {
1674 hva = gfn_to_hva(kvm, cur_gfn);
1675 /*
1676 * We return an error if the first value was invalid, but we
1677 * return successfully if at least one value was copied.
1678 */
1679 if (kvm_is_error_hva(hva))
1680 return args->count ? 0 : -EFAULT;
1681 if (get_pgste(kvm->mm, hva, &pgstev) < 0)
1682 pgstev = 0;
1683 res[args->count++] = (pgstev >> 24) & 0x43;
1684 cur_gfn++;
1685 }
1686
1687 return 0;
1688}
1689
1690static unsigned long kvm_s390_next_dirty_cmma(struct kvm_memslots *slots,
1691 unsigned long cur_gfn)
1692{
1693 int slotidx = gfn_to_memslot_approx(slots, cur_gfn);
1694 struct kvm_memory_slot *ms = slots->memslots + slotidx;
1695 unsigned long ofs = cur_gfn - ms->base_gfn;
1696
1697 if (ms->base_gfn + ms->npages <= cur_gfn) {
1698 slotidx--;
1699 /* If we are above the highest slot, wrap around */
1700 if (slotidx < 0)
1701 slotidx = slots->used_slots - 1;
1702
1703 ms = slots->memslots + slotidx;
1704 ofs = 0;
1705 }
1706 ofs = find_next_bit(kvm_second_dirty_bitmap(ms), ms->npages, ofs);
1707 while ((slotidx > 0) && (ofs >= ms->npages)) {
1708 slotidx--;
1709 ms = slots->memslots + slotidx;
1710 ofs = find_next_bit(kvm_second_dirty_bitmap(ms), ms->npages, 0);
1711 }
1712 return ms->base_gfn + ofs;
1713}
1714
1715static int kvm_s390_get_cmma(struct kvm *kvm, struct kvm_s390_cmma_log *args,
1716 u8 *res, unsigned long bufsize)
1717{
1718 unsigned long mem_end, cur_gfn, next_gfn, hva, pgstev;
1719 struct kvm_memslots *slots = kvm_memslots(kvm);
1720 struct kvm_memory_slot *ms;
1721
1722 cur_gfn = kvm_s390_next_dirty_cmma(slots, args->start_gfn);
1723 ms = gfn_to_memslot(kvm, cur_gfn);
1724 args->count = 0;
1725 args->start_gfn = cur_gfn;
1726 if (!ms)
1727 return 0;
1728 next_gfn = kvm_s390_next_dirty_cmma(slots, cur_gfn + 1);
1729 mem_end = slots->memslots[0].base_gfn + slots->memslots[0].npages;
1730
1731 while (args->count < bufsize) {
1732 hva = gfn_to_hva(kvm, cur_gfn);
1733 if (kvm_is_error_hva(hva))
1734 return 0;
1735 /* Decrement only if we actually flipped the bit to 0 */
1736 if (test_and_clear_bit(cur_gfn - ms->base_gfn, kvm_second_dirty_bitmap(ms)))
1737 atomic64_dec(&kvm->arch.cmma_dirty_pages);
1738 if (get_pgste(kvm->mm, hva, &pgstev) < 0)
1739 pgstev = 0;
1740 /* Save the value */
1741 res[args->count++] = (pgstev >> 24) & 0x43;
1742 /* If the next bit is too far away, stop. */
1743 if (next_gfn > cur_gfn + KVM_S390_MAX_BIT_DISTANCE)
1744 return 0;
1745 /* If we reached the previous "next", find the next one */
1746 if (cur_gfn == next_gfn)
1747 next_gfn = kvm_s390_next_dirty_cmma(slots, cur_gfn + 1);
1748 /* Reached the end of memory or of the buffer, stop */
1749 if ((next_gfn >= mem_end) ||
1750 (next_gfn - args->start_gfn >= bufsize))
1751 return 0;
1752 cur_gfn++;
1753 /* Reached the end of the current memslot, take the next one. */
1754 if (cur_gfn - ms->base_gfn >= ms->npages) {
1755 ms = gfn_to_memslot(kvm, cur_gfn);
1756 if (!ms)
1757 return 0;
1758 }
1759 }
1760 return 0;
1761}
1762
1763/*
Claudio Imbrenda4036e382016-08-04 17:58:47 +02001764 * This function searches for the next page with dirty CMMA attributes, and
1765 * saves the attributes in the buffer up to either the end of the buffer or
1766 * until a block of at least KVM_S390_MAX_BIT_DISTANCE clean bits is found;
1767 * no trailing clean bytes are saved.
1768 * In case no dirty bits were found, or if CMMA was not enabled or used, the
1769 * output buffer will indicate 0 as length.
1770 */
1771static int kvm_s390_get_cmma_bits(struct kvm *kvm,
1772 struct kvm_s390_cmma_log *args)
1773{
Claudio Imbrendaafdad612018-04-30 18:33:25 +02001774 unsigned long bufsize;
1775 int srcu_idx, peek, ret;
1776 u8 *values;
Claudio Imbrenda4036e382016-08-04 17:58:47 +02001777
Claudio Imbrendaafdad612018-04-30 18:33:25 +02001778 if (!kvm->arch.use_cmma)
Claudio Imbrenda4036e382016-08-04 17:58:47 +02001779 return -ENXIO;
1780 /* Invalid/unsupported flags were specified */
1781 if (args->flags & ~KVM_S390_CMMA_PEEK)
1782 return -EINVAL;
1783 /* Migration mode query, and we are not doing a migration */
1784 peek = !!(args->flags & KVM_S390_CMMA_PEEK);
Claudio Imbrendaafdad612018-04-30 18:33:25 +02001785 if (!peek && !kvm->arch.migration_mode)
Claudio Imbrenda4036e382016-08-04 17:58:47 +02001786 return -EINVAL;
1787 /* CMMA is disabled or was not used, or the buffer has length zero */
1788 bufsize = min(args->count, KVM_S390_CMMA_SIZE_MAX);
Janosch Frankc9f0a2b2018-02-16 12:16:14 +01001789 if (!bufsize || !kvm->mm->context.uses_cmm) {
Claudio Imbrenda4036e382016-08-04 17:58:47 +02001790 memset(args, 0, sizeof(*args));
1791 return 0;
1792 }
Claudio Imbrendaafdad612018-04-30 18:33:25 +02001793 /* We are not peeking, and there are no dirty pages */
1794 if (!peek && !atomic64_read(&kvm->arch.cmma_dirty_pages)) {
1795 memset(args, 0, sizeof(*args));
1796 return 0;
Claudio Imbrenda4036e382016-08-04 17:58:47 +02001797 }
1798
Claudio Imbrendaafdad612018-04-30 18:33:25 +02001799 values = vmalloc(bufsize);
1800 if (!values)
Claudio Imbrenda4036e382016-08-04 17:58:47 +02001801 return -ENOMEM;
1802
Claudio Imbrenda4036e382016-08-04 17:58:47 +02001803 down_read(&kvm->mm->mmap_sem);
1804 srcu_idx = srcu_read_lock(&kvm->srcu);
Claudio Imbrendaafdad612018-04-30 18:33:25 +02001805 if (peek)
1806 ret = kvm_s390_peek_cmma(kvm, args, values, bufsize);
1807 else
1808 ret = kvm_s390_get_cmma(kvm, args, values, bufsize);
Claudio Imbrenda4036e382016-08-04 17:58:47 +02001809 srcu_read_unlock(&kvm->srcu, srcu_idx);
1810 up_read(&kvm->mm->mmap_sem);
Claudio Imbrenda4036e382016-08-04 17:58:47 +02001811
Claudio Imbrendaafdad612018-04-30 18:33:25 +02001812 if (kvm->arch.migration_mode)
1813 args->remaining = atomic64_read(&kvm->arch.cmma_dirty_pages);
1814 else
1815 args->remaining = 0;
Claudio Imbrenda4036e382016-08-04 17:58:47 +02001816
Claudio Imbrendaafdad612018-04-30 18:33:25 +02001817 if (copy_to_user((void __user *)args->values, values, args->count))
1818 ret = -EFAULT;
1819
1820 vfree(values);
1821 return ret;
Claudio Imbrenda4036e382016-08-04 17:58:47 +02001822}
1823
1824/*
1825 * This function sets the CMMA attributes for the given pages. If the input
1826 * buffer has zero length, no action is taken, otherwise the attributes are
Janosch Frankc9f0a2b2018-02-16 12:16:14 +01001827 * set and the mm->context.uses_cmm flag is set.
Claudio Imbrenda4036e382016-08-04 17:58:47 +02001828 */
1829static int kvm_s390_set_cmma_bits(struct kvm *kvm,
1830 const struct kvm_s390_cmma_log *args)
1831{
1832 unsigned long hva, mask, pgstev, i;
1833 uint8_t *bits;
1834 int srcu_idx, r = 0;
1835
1836 mask = args->mask;
1837
1838 if (!kvm->arch.use_cmma)
1839 return -ENXIO;
1840 /* invalid/unsupported flags */
1841 if (args->flags != 0)
1842 return -EINVAL;
1843 /* Enforce sane limit on memory allocation */
1844 if (args->count > KVM_S390_CMMA_SIZE_MAX)
1845 return -EINVAL;
1846 /* Nothing to do */
1847 if (args->count == 0)
1848 return 0;
1849
Kees Cook42bc47b2018-06-12 14:27:11 -07001850 bits = vmalloc(array_size(sizeof(*bits), args->count));
Claudio Imbrenda4036e382016-08-04 17:58:47 +02001851 if (!bits)
1852 return -ENOMEM;
1853
1854 r = copy_from_user(bits, (void __user *)args->values, args->count);
1855 if (r) {
1856 r = -EFAULT;
1857 goto out;
1858 }
1859
1860 down_read(&kvm->mm->mmap_sem);
1861 srcu_idx = srcu_read_lock(&kvm->srcu);
1862 for (i = 0; i < args->count; i++) {
1863 hva = gfn_to_hva(kvm, args->start_gfn + i);
1864 if (kvm_is_error_hva(hva)) {
1865 r = -EFAULT;
1866 break;
1867 }
1868
1869 pgstev = bits[i];
1870 pgstev = pgstev << 24;
Claudio Imbrenda1bab1c02016-08-29 15:56:55 +02001871 mask &= _PGSTE_GPS_USAGE_MASK | _PGSTE_GPS_NODAT;
Claudio Imbrenda4036e382016-08-04 17:58:47 +02001872 set_pgste_bits(kvm->mm, hva, mask, pgstev);
1873 }
1874 srcu_read_unlock(&kvm->srcu, srcu_idx);
1875 up_read(&kvm->mm->mmap_sem);
1876
Janosch Frankc9f0a2b2018-02-16 12:16:14 +01001877 if (!kvm->mm->context.uses_cmm) {
Claudio Imbrenda4036e382016-08-04 17:58:47 +02001878 down_write(&kvm->mm->mmap_sem);
Janosch Frankc9f0a2b2018-02-16 12:16:14 +01001879 kvm->mm->context.uses_cmm = 1;
Claudio Imbrenda4036e382016-08-04 17:58:47 +02001880 up_write(&kvm->mm->mmap_sem);
1881 }
1882out:
1883 vfree(bits);
1884 return r;
1885}
1886
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001887long kvm_arch_vm_ioctl(struct file *filp,
1888 unsigned int ioctl, unsigned long arg)
1889{
1890 struct kvm *kvm = filp->private_data;
1891 void __user *argp = (void __user *)arg;
Dominik Dingelf2061652014-04-09 13:13:00 +02001892 struct kvm_device_attr attr;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001893 int r;
1894
1895 switch (ioctl) {
Carsten Otteba5c1e92008-03-25 18:47:26 +01001896 case KVM_S390_INTERRUPT: {
1897 struct kvm_s390_interrupt s390int;
1898
1899 r = -EFAULT;
1900 if (copy_from_user(&s390int, argp, sizeof(s390int)))
1901 break;
1902 r = kvm_s390_inject_vm(kvm, &s390int);
1903 break;
1904 }
Cornelia Huckd938dc52013-10-23 18:26:34 +02001905 case KVM_ENABLE_CAP: {
1906 struct kvm_enable_cap cap;
1907 r = -EFAULT;
1908 if (copy_from_user(&cap, argp, sizeof(cap)))
1909 break;
1910 r = kvm_vm_ioctl_enable_cap(kvm, &cap);
1911 break;
1912 }
Cornelia Huck84223592013-07-15 13:36:01 +02001913 case KVM_CREATE_IRQCHIP: {
1914 struct kvm_irq_routing_entry routing;
1915
1916 r = -EINVAL;
1917 if (kvm->arch.use_irqchip) {
1918 /* Set up dummy routing. */
1919 memset(&routing, 0, sizeof(routing));
Nicholas Krause152b2832015-08-06 13:05:54 -04001920 r = kvm_set_irq_routing(kvm, &routing, 0, 0);
Cornelia Huck84223592013-07-15 13:36:01 +02001921 }
1922 break;
1923 }
Dominik Dingelf2061652014-04-09 13:13:00 +02001924 case KVM_SET_DEVICE_ATTR: {
1925 r = -EFAULT;
1926 if (copy_from_user(&attr, (void __user *)arg, sizeof(attr)))
1927 break;
1928 r = kvm_s390_vm_set_attr(kvm, &attr);
1929 break;
1930 }
1931 case KVM_GET_DEVICE_ATTR: {
1932 r = -EFAULT;
1933 if (copy_from_user(&attr, (void __user *)arg, sizeof(attr)))
1934 break;
1935 r = kvm_s390_vm_get_attr(kvm, &attr);
1936 break;
1937 }
1938 case KVM_HAS_DEVICE_ATTR: {
1939 r = -EFAULT;
1940 if (copy_from_user(&attr, (void __user *)arg, sizeof(attr)))
1941 break;
1942 r = kvm_s390_vm_has_attr(kvm, &attr);
1943 break;
1944 }
Jason J. Herne30ee2a92014-09-23 09:23:01 -04001945 case KVM_S390_GET_SKEYS: {
1946 struct kvm_s390_skeys args;
1947
1948 r = -EFAULT;
1949 if (copy_from_user(&args, argp,
1950 sizeof(struct kvm_s390_skeys)))
1951 break;
1952 r = kvm_s390_get_skeys(kvm, &args);
1953 break;
1954 }
1955 case KVM_S390_SET_SKEYS: {
1956 struct kvm_s390_skeys args;
1957
1958 r = -EFAULT;
1959 if (copy_from_user(&args, argp,
1960 sizeof(struct kvm_s390_skeys)))
1961 break;
1962 r = kvm_s390_set_skeys(kvm, &args);
1963 break;
1964 }
Claudio Imbrenda4036e382016-08-04 17:58:47 +02001965 case KVM_S390_GET_CMMA_BITS: {
1966 struct kvm_s390_cmma_log args;
1967
1968 r = -EFAULT;
1969 if (copy_from_user(&args, argp, sizeof(args)))
1970 break;
Christian Borntraeger1de1ea72017-12-22 10:54:20 +01001971 mutex_lock(&kvm->slots_lock);
Claudio Imbrenda4036e382016-08-04 17:58:47 +02001972 r = kvm_s390_get_cmma_bits(kvm, &args);
Christian Borntraeger1de1ea72017-12-22 10:54:20 +01001973 mutex_unlock(&kvm->slots_lock);
Claudio Imbrenda4036e382016-08-04 17:58:47 +02001974 if (!r) {
1975 r = copy_to_user(argp, &args, sizeof(args));
1976 if (r)
1977 r = -EFAULT;
1978 }
1979 break;
1980 }
1981 case KVM_S390_SET_CMMA_BITS: {
1982 struct kvm_s390_cmma_log args;
1983
1984 r = -EFAULT;
1985 if (copy_from_user(&args, argp, sizeof(args)))
1986 break;
Christian Borntraeger1de1ea72017-12-22 10:54:20 +01001987 mutex_lock(&kvm->slots_lock);
Claudio Imbrenda4036e382016-08-04 17:58:47 +02001988 r = kvm_s390_set_cmma_bits(kvm, &args);
Christian Borntraeger1de1ea72017-12-22 10:54:20 +01001989 mutex_unlock(&kvm->slots_lock);
Claudio Imbrenda4036e382016-08-04 17:58:47 +02001990 break;
1991 }
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001992 default:
Avi Kivity367e1312009-08-26 14:57:07 +03001993 r = -ENOTTY;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001994 }
1995
1996 return r;
1997}
1998
Tony Krowiak45c9b472015-01-13 11:33:26 -05001999static int kvm_s390_apxa_installed(void)
2000{
Tony Krowiake585b242018-09-25 19:16:18 -04002001 struct ap_config_info info;
Tony Krowiak45c9b472015-01-13 11:33:26 -05002002
Tony Krowiake585b242018-09-25 19:16:18 -04002003 if (ap_instructions_available()) {
2004 if (ap_qci(&info) == 0)
2005 return info.apxa;
Tony Krowiak45c9b472015-01-13 11:33:26 -05002006 }
2007
2008 return 0;
2009}
2010
Tony Krowiake585b242018-09-25 19:16:18 -04002011/*
2012 * The format of the crypto control block (CRYCB) is specified in the 3 low
2013 * order bits of the CRYCB designation (CRYCBD) field as follows:
2014 * Format 0: Neither the message security assist extension 3 (MSAX3) nor the
2015 * AP extended addressing (APXA) facility are installed.
2016 * Format 1: The APXA facility is not installed but the MSAX3 facility is.
2017 * Format 2: Both the APXA and MSAX3 facilities are installed
2018 */
Tony Krowiak45c9b472015-01-13 11:33:26 -05002019static void kvm_s390_set_crycb_format(struct kvm *kvm)
2020{
2021 kvm->arch.crypto.crycbd = (__u32)(unsigned long) kvm->arch.crypto.crycb;
2022
Tony Krowiake585b242018-09-25 19:16:18 -04002023 /* Clear the CRYCB format bits - i.e., set format 0 by default */
2024 kvm->arch.crypto.crycbd &= ~(CRYCB_FORMAT_MASK);
2025
2026 /* Check whether MSAX3 is installed */
2027 if (!test_kvm_facility(kvm, 76))
2028 return;
2029
Tony Krowiak45c9b472015-01-13 11:33:26 -05002030 if (kvm_s390_apxa_installed())
2031 kvm->arch.crypto.crycbd |= CRYCB_FORMAT2;
2032 else
2033 kvm->arch.crypto.crycbd |= CRYCB_FORMAT1;
2034}
2035
David Hildenbrand9bb0ec02016-04-04 14:27:51 +02002036static u64 kvm_s390_get_initial_cpuid(void)
Michael Mueller9d8d5782015-02-02 15:42:51 +01002037{
David Hildenbrand9bb0ec02016-04-04 14:27:51 +02002038 struct cpuid cpuid;
2039
2040 get_cpu_id(&cpuid);
2041 cpuid.version = 0xff;
2042 return *((u64 *) &cpuid);
Michael Mueller9d8d5782015-02-02 15:42:51 +01002043}
2044
David Hildenbrandc54f0d62015-12-02 08:53:52 +01002045static void kvm_s390_crypto_init(struct kvm *kvm)
Tony Krowiak5102ee82014-06-27 14:46:01 -04002046{
David Hildenbrandc54f0d62015-12-02 08:53:52 +01002047 kvm->arch.crypto.crycb = &kvm->arch.sie_page2->crycb;
Tony Krowiak45c9b472015-01-13 11:33:26 -05002048 kvm_s390_set_crycb_format(kvm);
Tony Krowiak5102ee82014-06-27 14:46:01 -04002049
Tony Krowiake585b242018-09-25 19:16:18 -04002050 if (!test_kvm_facility(kvm, 76))
2051 return;
2052
Tony Krowiaked6f76b2015-02-24 14:06:57 -05002053 /* Enable AES/DEA protected key functions by default */
2054 kvm->arch.crypto.aes_kw = 1;
2055 kvm->arch.crypto.dea_kw = 1;
2056 get_random_bytes(kvm->arch.crypto.crycb->aes_wrapping_key_mask,
2057 sizeof(kvm->arch.crypto.crycb->aes_wrapping_key_mask));
2058 get_random_bytes(kvm->arch.crypto.crycb->dea_wrapping_key_mask,
2059 sizeof(kvm->arch.crypto.crycb->dea_wrapping_key_mask));
Tony Krowiak5102ee82014-06-27 14:46:01 -04002060}
2061
Eugene (jno) Dvurechenski7d43bafcf2015-04-22 17:09:44 +02002062static void sca_dispose(struct kvm *kvm)
2063{
2064 if (kvm->arch.use_esca)
Eugene (jno) Dvurechenski5e044312015-04-22 18:08:39 +02002065 free_pages_exact(kvm->arch.sca, sizeof(struct esca_block));
Eugene (jno) Dvurechenski7d43bafcf2015-04-22 17:09:44 +02002066 else
2067 free_page((unsigned long)(kvm->arch.sca));
2068 kvm->arch.sca = NULL;
2069}
2070
Carsten Ottee08b9632012-01-04 10:25:20 +01002071int kvm_arch_init_vm(struct kvm *kvm, unsigned long type)
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002072{
David Hildenbrand76a6dd72015-11-24 13:33:49 +01002073 gfp_t alloc_flags = GFP_KERNEL;
Michael Mueller9d8d5782015-02-02 15:42:51 +01002074 int i, rc;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002075 char debug_name[16];
Christian Borntraegerf6c137f2014-03-19 11:18:29 +01002076 static unsigned long sca_offset;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002077
Carsten Ottee08b9632012-01-04 10:25:20 +01002078 rc = -EINVAL;
2079#ifdef CONFIG_KVM_S390_UCONTROL
2080 if (type & ~KVM_VM_S390_UCONTROL)
2081 goto out_err;
2082 if ((type & KVM_VM_S390_UCONTROL) && (!capable(CAP_SYS_ADMIN)))
2083 goto out_err;
2084#else
2085 if (type)
2086 goto out_err;
2087#endif
2088
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002089 rc = s390_enable_sie();
2090 if (rc)
Jan Kiszkad89f5ef2010-11-09 17:02:49 +01002091 goto out_err;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002092
Carsten Otteb2904112011-10-18 12:27:13 +02002093 rc = -ENOMEM;
2094
David Hildenbrand76a6dd72015-11-24 13:33:49 +01002095 if (!sclp.has_64bscao)
2096 alloc_flags |= GFP_DMA;
Eugene (jno) Dvurechenski5e044312015-04-22 18:08:39 +02002097 rwlock_init(&kvm->arch.sca_lock);
David Hildenbrand9ac96d72018-04-27 14:36:12 +02002098 /* start with basic SCA */
David Hildenbrand76a6dd72015-11-24 13:33:49 +01002099 kvm->arch.sca = (struct bsca_block *) get_zeroed_page(alloc_flags);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002100 if (!kvm->arch.sca)
Jan Kiszkad89f5ef2010-11-09 17:02:49 +01002101 goto out_err;
Christian Borntraegerf6c137f2014-03-19 11:18:29 +01002102 spin_lock(&kvm_lock);
David Hildenbrandc5c2c392015-10-26 08:41:29 +01002103 sca_offset += 16;
Eugene (jno) Dvurechenskibc784cc2015-04-23 16:09:06 +02002104 if (sca_offset + sizeof(struct bsca_block) > PAGE_SIZE)
David Hildenbrandc5c2c392015-10-26 08:41:29 +01002105 sca_offset = 0;
Eugene (jno) Dvurechenskibc784cc2015-04-23 16:09:06 +02002106 kvm->arch.sca = (struct bsca_block *)
2107 ((char *) kvm->arch.sca + sca_offset);
Christian Borntraegerf6c137f2014-03-19 11:18:29 +01002108 spin_unlock(&kvm_lock);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002109
2110 sprintf(debug_name, "kvm-%u", current->pid);
2111
Christian Borntraeger1cb9cf72015-07-20 15:04:48 +02002112 kvm->arch.dbf = debug_register(debug_name, 32, 1, 7 * sizeof(long));
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002113 if (!kvm->arch.dbf)
Dominik Dingel40f5b732015-03-12 13:55:53 +01002114 goto out_err;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002115
Michael Mueller19114be2017-05-30 14:26:02 +02002116 BUILD_BUG_ON(sizeof(struct sie_page2) != 4096);
David Hildenbrandc54f0d62015-12-02 08:53:52 +01002117 kvm->arch.sie_page2 =
2118 (struct sie_page2 *) get_zeroed_page(GFP_KERNEL | GFP_DMA);
2119 if (!kvm->arch.sie_page2)
Dominik Dingel40f5b732015-03-12 13:55:53 +01002120 goto out_err;
Michael Mueller9d8d5782015-02-02 15:42:51 +01002121
David Hildenbrandc54f0d62015-12-02 08:53:52 +01002122 kvm->arch.model.fac_list = kvm->arch.sie_page2->fac_list;
Christian Borntraegerc3b9e3e2018-02-09 16:26:29 +00002123
2124 for (i = 0; i < kvm_s390_fac_size(); i++) {
2125 kvm->arch.model.fac_mask[i] = S390_lowcore.stfle_fac_list[i] &
2126 (kvm_s390_fac_base[i] |
2127 kvm_s390_fac_ext[i]);
2128 kvm->arch.model.fac_list[i] = S390_lowcore.stfle_fac_list[i] &
2129 kvm_s390_fac_base[i];
2130 }
Michael Mueller981467c2015-02-24 13:51:04 +01002131
David Hildenbrand19352222017-08-29 16:31:08 +02002132 /* we are always in czam mode - even on pre z14 machines */
2133 set_kvm_facility(kvm->arch.model.fac_mask, 138);
2134 set_kvm_facility(kvm->arch.model.fac_list, 138);
2135 /* we emulate STHYI in kvm */
Janosch Frank95ca2cb2016-05-23 15:11:58 +02002136 set_kvm_facility(kvm->arch.model.fac_mask, 74);
2137 set_kvm_facility(kvm->arch.model.fac_list, 74);
Claudio Imbrenda1bab1c02016-08-29 15:56:55 +02002138 if (MACHINE_HAS_TLB_GUEST) {
2139 set_kvm_facility(kvm->arch.model.fac_mask, 147);
2140 set_kvm_facility(kvm->arch.model.fac_list, 147);
2141 }
Janosch Frank95ca2cb2016-05-23 15:11:58 +02002142
David Hildenbrand9bb0ec02016-04-04 14:27:51 +02002143 kvm->arch.model.cpuid = kvm_s390_get_initial_cpuid();
David Hildenbrand37c5f6c2015-05-06 13:18:59 +02002144 kvm->arch.model.ibc = sclp.ibc & 0x0fff;
Michael Mueller9d8d5782015-02-02 15:42:51 +01002145
David Hildenbrandc54f0d62015-12-02 08:53:52 +01002146 kvm_s390_crypto_init(kvm);
Tony Krowiak5102ee82014-06-27 14:46:01 -04002147
Fei Li51978392017-02-17 17:06:26 +08002148 mutex_init(&kvm->arch.float_int.ais_lock);
Carsten Otteba5c1e92008-03-25 18:47:26 +01002149 spin_lock_init(&kvm->arch.float_int.lock);
Jens Freimann6d3da242013-07-03 15:18:35 +02002150 for (i = 0; i < FIRQ_LIST_COUNT; i++)
2151 INIT_LIST_HEAD(&kvm->arch.float_int.lists[i]);
Heiko Carstens8a2422342014-01-10 14:33:28 +01002152 init_waitqueue_head(&kvm->arch.ipte_wq);
Thomas Hutha6b7e452014-10-01 14:48:42 +02002153 mutex_init(&kvm->arch.ipte_mutex);
Carsten Otteba5c1e92008-03-25 18:47:26 +01002154
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002155 debug_register_view(kvm->arch.dbf, &debug_sprintf_view);
Christian Borntraeger78f26132015-07-22 15:50:58 +02002156 VM_EVENT(kvm, 3, "vm created with type %lu", type);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002157
Carsten Ottee08b9632012-01-04 10:25:20 +01002158 if (type & KVM_VM_S390_UCONTROL) {
2159 kvm->arch.gmap = NULL;
Dominik Dingela3a92c32014-12-01 17:24:42 +01002160 kvm->arch.mem_limit = KVM_S390_NO_MEM_LIMIT;
Carsten Ottee08b9632012-01-04 10:25:20 +01002161 } else {
Guenther Hutzl32e6b232014-12-01 17:24:42 +01002162 if (sclp.hamax == U64_MAX)
Martin Schwidefskyee71d162017-04-20 14:43:51 +02002163 kvm->arch.mem_limit = TASK_SIZE_MAX;
Guenther Hutzl32e6b232014-12-01 17:24:42 +01002164 else
Martin Schwidefskyee71d162017-04-20 14:43:51 +02002165 kvm->arch.mem_limit = min_t(unsigned long, TASK_SIZE_MAX,
Guenther Hutzl32e6b232014-12-01 17:24:42 +01002166 sclp.hamax + 1);
Martin Schwidefsky6ea427b2016-03-08 11:55:04 +01002167 kvm->arch.gmap = gmap_create(current->mm, kvm->arch.mem_limit - 1);
Carsten Ottee08b9632012-01-04 10:25:20 +01002168 if (!kvm->arch.gmap)
Dominik Dingel40f5b732015-03-12 13:55:53 +01002169 goto out_err;
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02002170 kvm->arch.gmap->private = kvm;
Dominik Dingel24eb3a82013-06-17 16:25:18 +02002171 kvm->arch.gmap->pfault_enabled = 0;
Carsten Ottee08b9632012-01-04 10:25:20 +01002172 }
Cornelia Huckfa6b7fe2012-12-20 15:32:12 +01002173
Janosch Frankc9f0a2b2018-02-16 12:16:14 +01002174 kvm->arch.use_pfmfi = sclp.has_pfmfi;
Janosch Frank55531b72018-02-15 16:33:47 +01002175 kvm->arch.use_skf = sclp.has_skey;
David Hildenbrand8ad35752014-03-14 11:00:21 +01002176 spin_lock_init(&kvm->arch.start_stop_lock);
David Hildenbranda3508fb2015-07-08 13:19:48 +02002177 kvm_s390_vsie_init(kvm);
Michael Muellerd7c5cb02017-06-12 14:15:19 +02002178 kvm_s390_gisa_init(kvm);
Christian Borntraeger8335713a2015-12-08 16:55:27 +01002179 KVM_EVENT(3, "vm 0x%pK created by pid %u", kvm, current->pid);
David Hildenbrand8ad35752014-03-14 11:00:21 +01002180
Jan Kiszkad89f5ef2010-11-09 17:02:49 +01002181 return 0;
Jan Kiszkad89f5ef2010-11-09 17:02:49 +01002182out_err:
David Hildenbrandc54f0d62015-12-02 08:53:52 +01002183 free_page((unsigned long)kvm->arch.sie_page2);
Dominik Dingel40f5b732015-03-12 13:55:53 +01002184 debug_unregister(kvm->arch.dbf);
Eugene (jno) Dvurechenski7d43bafcf2015-04-22 17:09:44 +02002185 sca_dispose(kvm);
Christian Borntraeger78f26132015-07-22 15:50:58 +02002186 KVM_EVENT(3, "creation of vm failed: %d", rc);
Jan Kiszkad89f5ef2010-11-09 17:02:49 +01002187 return rc;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002188}
2189
Luiz Capitulino235539b2016-09-07 14:47:23 -04002190bool kvm_arch_has_vcpu_debugfs(void)
2191{
2192 return false;
2193}
2194
2195int kvm_arch_create_vcpu_debugfs(struct kvm_vcpu *vcpu)
2196{
2197 return 0;
2198}
2199
Christian Borntraegerd329c032008-11-26 14:50:27 +01002200void kvm_arch_vcpu_destroy(struct kvm_vcpu *vcpu)
2201{
2202 VCPU_EVENT(vcpu, 3, "%s", "free cpu");
Cornelia Huckade38c32012-07-23 17:20:30 +02002203 trace_kvm_s390_destroy_vcpu(vcpu->vcpu_id);
Christian Borntraeger67335e62014-03-25 17:09:08 +01002204 kvm_s390_clear_local_irqs(vcpu);
Dominik Dingel3c038e62013-10-07 17:11:48 +02002205 kvm_clear_async_pf_completion_queue(vcpu);
Eugene (jno) Dvurechenskibc784cc2015-04-23 16:09:06 +02002206 if (!kvm_is_ucontrol(vcpu->kvm))
Eugene (jno) Dvurechenskia6e2f682015-04-21 15:31:59 +02002207 sca_del_vcpu(vcpu);
Carsten Otte27e03932012-01-04 10:25:21 +01002208
2209 if (kvm_is_ucontrol(vcpu->kvm))
Martin Schwidefsky6ea427b2016-03-08 11:55:04 +01002210 gmap_remove(vcpu->arch.gmap);
Carsten Otte27e03932012-01-04 10:25:21 +01002211
Dominik Dingele6db1d62015-05-07 15:41:57 +02002212 if (vcpu->kvm->arch.use_cmma)
Dominik Dingelb31605c2014-03-25 13:47:11 +01002213 kvm_s390_vcpu_unsetup_cmma(vcpu);
Christian Borntraegerd329c032008-11-26 14:50:27 +01002214 free_page((unsigned long)(vcpu->arch.sie_block));
Konstantin Weitzb31288f2013-04-17 17:36:29 +02002215
Christian Borntraeger6692cef2008-11-26 14:51:08 +01002216 kvm_vcpu_uninit(vcpu);
Michael Muellerb110fea2013-06-12 13:54:54 +02002217 kmem_cache_free(kvm_vcpu_cache, vcpu);
Christian Borntraegerd329c032008-11-26 14:50:27 +01002218}
2219
2220static void kvm_free_vcpus(struct kvm *kvm)
2221{
2222 unsigned int i;
Gleb Natapov988a2ca2009-06-09 15:56:29 +03002223 struct kvm_vcpu *vcpu;
Christian Borntraegerd329c032008-11-26 14:50:27 +01002224
Gleb Natapov988a2ca2009-06-09 15:56:29 +03002225 kvm_for_each_vcpu(i, vcpu, kvm)
2226 kvm_arch_vcpu_destroy(vcpu);
2227
2228 mutex_lock(&kvm->lock);
2229 for (i = 0; i < atomic_read(&kvm->online_vcpus); i++)
2230 kvm->vcpus[i] = NULL;
2231
2232 atomic_set(&kvm->online_vcpus, 0);
2233 mutex_unlock(&kvm->lock);
Christian Borntraegerd329c032008-11-26 14:50:27 +01002234}
2235
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002236void kvm_arch_destroy_vm(struct kvm *kvm)
2237{
Christian Borntraegerd329c032008-11-26 14:50:27 +01002238 kvm_free_vcpus(kvm);
Eugene (jno) Dvurechenski7d43bafcf2015-04-22 17:09:44 +02002239 sca_dispose(kvm);
Christian Borntraegerd329c032008-11-26 14:50:27 +01002240 debug_unregister(kvm->arch.dbf);
Michael Muellerd7c5cb02017-06-12 14:15:19 +02002241 kvm_s390_gisa_destroy(kvm);
David Hildenbrandc54f0d62015-12-02 08:53:52 +01002242 free_page((unsigned long)kvm->arch.sie_page2);
Carsten Otte27e03932012-01-04 10:25:21 +01002243 if (!kvm_is_ucontrol(kvm))
Martin Schwidefsky6ea427b2016-03-08 11:55:04 +01002244 gmap_remove(kvm->arch.gmap);
Cornelia Huck841b91c2013-07-15 13:36:01 +02002245 kvm_s390_destroy_adapters(kvm);
Christian Borntraeger67335e62014-03-25 17:09:08 +01002246 kvm_s390_clear_float_irqs(kvm);
David Hildenbranda3508fb2015-07-08 13:19:48 +02002247 kvm_s390_vsie_destroy(kvm);
Christian Borntraeger8335713a2015-12-08 16:55:27 +01002248 KVM_EVENT(3, "vm 0x%pK destroyed", kvm);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002249}
2250
2251/* Section: vcpu related */
Dominik Dingeldafd0322014-12-02 16:53:21 +01002252static int __kvm_ucontrol_vcpu_init(struct kvm_vcpu *vcpu)
2253{
Martin Schwidefsky6ea427b2016-03-08 11:55:04 +01002254 vcpu->arch.gmap = gmap_create(current->mm, -1UL);
Dominik Dingeldafd0322014-12-02 16:53:21 +01002255 if (!vcpu->arch.gmap)
2256 return -ENOMEM;
2257 vcpu->arch.gmap->private = vcpu->kvm;
2258
2259 return 0;
2260}
2261
Eugene (jno) Dvurechenskia6e2f682015-04-21 15:31:59 +02002262static void sca_del_vcpu(struct kvm_vcpu *vcpu)
2263{
David Hildenbranda6940672016-08-08 22:39:32 +02002264 if (!kvm_s390_use_sca_entries())
2265 return;
Eugene (jno) Dvurechenski5e044312015-04-22 18:08:39 +02002266 read_lock(&vcpu->kvm->arch.sca_lock);
Eugene (jno) Dvurechenski7d43bafcf2015-04-22 17:09:44 +02002267 if (vcpu->kvm->arch.use_esca) {
2268 struct esca_block *sca = vcpu->kvm->arch.sca;
Eugene (jno) Dvurechenskia6e2f682015-04-21 15:31:59 +02002269
Eugene (jno) Dvurechenski7d43bafcf2015-04-22 17:09:44 +02002270 clear_bit_inv(vcpu->vcpu_id, (unsigned long *) sca->mcn);
David Hildenbrand10ce32d2015-10-12 12:41:41 +02002271 sca->cpu[vcpu->vcpu_id].sda = 0;
Eugene (jno) Dvurechenski7d43bafcf2015-04-22 17:09:44 +02002272 } else {
2273 struct bsca_block *sca = vcpu->kvm->arch.sca;
2274
2275 clear_bit_inv(vcpu->vcpu_id, (unsigned long *) &sca->mcn);
David Hildenbrand10ce32d2015-10-12 12:41:41 +02002276 sca->cpu[vcpu->vcpu_id].sda = 0;
Eugene (jno) Dvurechenski7d43bafcf2015-04-22 17:09:44 +02002277 }
Eugene (jno) Dvurechenski5e044312015-04-22 18:08:39 +02002278 read_unlock(&vcpu->kvm->arch.sca_lock);
Eugene (jno) Dvurechenskia6e2f682015-04-21 15:31:59 +02002279}
2280
David Hildenbrandeaa78f32015-10-12 16:29:01 +02002281static void sca_add_vcpu(struct kvm_vcpu *vcpu)
Eugene (jno) Dvurechenskia6e2f682015-04-21 15:31:59 +02002282{
David Hildenbranda6940672016-08-08 22:39:32 +02002283 if (!kvm_s390_use_sca_entries()) {
2284 struct bsca_block *sca = vcpu->kvm->arch.sca;
2285
2286 /* we still need the basic sca for the ipte control */
2287 vcpu->arch.sie_block->scaoh = (__u32)(((__u64)sca) >> 32);
2288 vcpu->arch.sie_block->scaol = (__u32)(__u64)sca;
David Hildenbrandf07afa02018-03-06 14:27:58 +01002289 return;
David Hildenbranda6940672016-08-08 22:39:32 +02002290 }
David Hildenbrandeaa78f32015-10-12 16:29:01 +02002291 read_lock(&vcpu->kvm->arch.sca_lock);
2292 if (vcpu->kvm->arch.use_esca) {
2293 struct esca_block *sca = vcpu->kvm->arch.sca;
Eugene (jno) Dvurechenskia6e2f682015-04-21 15:31:59 +02002294
David Hildenbrandeaa78f32015-10-12 16:29:01 +02002295 sca->cpu[vcpu->vcpu_id].sda = (__u64) vcpu->arch.sie_block;
Eugene (jno) Dvurechenski7d43bafcf2015-04-22 17:09:44 +02002296 vcpu->arch.sie_block->scaoh = (__u32)(((__u64)sca) >> 32);
2297 vcpu->arch.sie_block->scaol = (__u32)(__u64)sca & ~0x3fU;
David Hildenbrand0c9d8682017-03-13 11:48:28 +01002298 vcpu->arch.sie_block->ecb2 |= ECB2_ESCA;
David Hildenbrandeaa78f32015-10-12 16:29:01 +02002299 set_bit_inv(vcpu->vcpu_id, (unsigned long *) sca->mcn);
Eugene (jno) Dvurechenski7d43bafcf2015-04-22 17:09:44 +02002300 } else {
David Hildenbrandeaa78f32015-10-12 16:29:01 +02002301 struct bsca_block *sca = vcpu->kvm->arch.sca;
Eugene (jno) Dvurechenski7d43bafcf2015-04-22 17:09:44 +02002302
David Hildenbrandeaa78f32015-10-12 16:29:01 +02002303 sca->cpu[vcpu->vcpu_id].sda = (__u64) vcpu->arch.sie_block;
Eugene (jno) Dvurechenski7d43bafcf2015-04-22 17:09:44 +02002304 vcpu->arch.sie_block->scaoh = (__u32)(((__u64)sca) >> 32);
2305 vcpu->arch.sie_block->scaol = (__u32)(__u64)sca;
David Hildenbrandeaa78f32015-10-12 16:29:01 +02002306 set_bit_inv(vcpu->vcpu_id, (unsigned long *) &sca->mcn);
Eugene (jno) Dvurechenski7d43bafcf2015-04-22 17:09:44 +02002307 }
David Hildenbrandeaa78f32015-10-12 16:29:01 +02002308 read_unlock(&vcpu->kvm->arch.sca_lock);
Eugene (jno) Dvurechenski5e044312015-04-22 18:08:39 +02002309}
2310
2311/* Basic SCA to Extended SCA data copy routines */
2312static inline void sca_copy_entry(struct esca_entry *d, struct bsca_entry *s)
2313{
2314 d->sda = s->sda;
2315 d->sigp_ctrl.c = s->sigp_ctrl.c;
2316 d->sigp_ctrl.scn = s->sigp_ctrl.scn;
2317}
2318
2319static void sca_copy_b_to_e(struct esca_block *d, struct bsca_block *s)
2320{
2321 int i;
2322
2323 d->ipte_control = s->ipte_control;
2324 d->mcn[0] = s->mcn;
2325 for (i = 0; i < KVM_S390_BSCA_CPU_SLOTS; i++)
2326 sca_copy_entry(&d->cpu[i], &s->cpu[i]);
2327}
2328
2329static int sca_switch_to_extended(struct kvm *kvm)
2330{
2331 struct bsca_block *old_sca = kvm->arch.sca;
2332 struct esca_block *new_sca;
2333 struct kvm_vcpu *vcpu;
2334 unsigned int vcpu_idx;
2335 u32 scaol, scaoh;
2336
2337 new_sca = alloc_pages_exact(sizeof(*new_sca), GFP_KERNEL|__GFP_ZERO);
2338 if (!new_sca)
2339 return -ENOMEM;
2340
2341 scaoh = (u32)((u64)(new_sca) >> 32);
2342 scaol = (u32)(u64)(new_sca) & ~0x3fU;
2343
2344 kvm_s390_vcpu_block_all(kvm);
2345 write_lock(&kvm->arch.sca_lock);
2346
2347 sca_copy_b_to_e(new_sca, old_sca);
2348
2349 kvm_for_each_vcpu(vcpu_idx, vcpu, kvm) {
2350 vcpu->arch.sie_block->scaoh = scaoh;
2351 vcpu->arch.sie_block->scaol = scaol;
David Hildenbrand0c9d8682017-03-13 11:48:28 +01002352 vcpu->arch.sie_block->ecb2 |= ECB2_ESCA;
Eugene (jno) Dvurechenski5e044312015-04-22 18:08:39 +02002353 }
2354 kvm->arch.sca = new_sca;
2355 kvm->arch.use_esca = 1;
2356
2357 write_unlock(&kvm->arch.sca_lock);
2358 kvm_s390_vcpu_unblock_all(kvm);
2359
2360 free_page((unsigned long)old_sca);
2361
Christian Borntraeger8335713a2015-12-08 16:55:27 +01002362 VM_EVENT(kvm, 2, "Switched to ESCA (0x%pK -> 0x%pK)",
2363 old_sca, kvm->arch.sca);
Eugene (jno) Dvurechenski5e044312015-04-22 18:08:39 +02002364 return 0;
Eugene (jno) Dvurechenskia6e2f682015-04-21 15:31:59 +02002365}
2366
2367static int sca_can_add_vcpu(struct kvm *kvm, unsigned int id)
2368{
Eugene (jno) Dvurechenski5e044312015-04-22 18:08:39 +02002369 int rc;
2370
David Hildenbranda6940672016-08-08 22:39:32 +02002371 if (!kvm_s390_use_sca_entries()) {
2372 if (id < KVM_MAX_VCPUS)
2373 return true;
2374 return false;
2375 }
Eugene (jno) Dvurechenski5e044312015-04-22 18:08:39 +02002376 if (id < KVM_S390_BSCA_CPU_SLOTS)
2377 return true;
David Hildenbrand76a6dd72015-11-24 13:33:49 +01002378 if (!sclp.has_esca || !sclp.has_64bscao)
Eugene (jno) Dvurechenski5e044312015-04-22 18:08:39 +02002379 return false;
2380
2381 mutex_lock(&kvm->lock);
2382 rc = kvm->arch.use_esca ? 0 : sca_switch_to_extended(kvm);
2383 mutex_unlock(&kvm->lock);
2384
2385 return rc == 0 && id < KVM_S390_ESCA_CPU_SLOTS;
Eugene (jno) Dvurechenskia6e2f682015-04-21 15:31:59 +02002386}
2387
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002388int kvm_arch_vcpu_init(struct kvm_vcpu *vcpu)
2389{
Dominik Dingel3c038e62013-10-07 17:11:48 +02002390 vcpu->arch.pfault_token = KVM_S390_PFAULT_TOKEN_INVALID;
2391 kvm_clear_async_pf_completion_queue(vcpu);
Christian Borntraeger59674c12012-01-11 11:20:33 +01002392 vcpu->run->kvm_valid_regs = KVM_SYNC_PREFIX |
2393 KVM_SYNC_GPRS |
Christian Borntraeger9eed07352012-02-06 10:59:07 +01002394 KVM_SYNC_ACRS |
David Hildenbrandb028ee32014-07-17 10:47:43 +02002395 KVM_SYNC_CRS |
2396 KVM_SYNC_ARCH0 |
2397 KVM_SYNC_PFAULT;
Julius Niedworok75a46152016-08-03 16:39:54 +02002398 kvm_s390_set_prefix(vcpu, 0);
Fan Zhangc6e5f162016-01-07 18:24:29 +08002399 if (test_kvm_facility(vcpu->kvm, 64))
2400 vcpu->run->kvm_valid_regs |= KVM_SYNC_RICCB;
Christian Borntraeger35b3fde2018-01-17 14:44:34 +01002401 if (test_kvm_facility(vcpu->kvm, 82))
2402 vcpu->run->kvm_valid_regs |= KVM_SYNC_BPBC;
Fan Zhang4e0b1ab2016-11-29 07:17:55 +01002403 if (test_kvm_facility(vcpu->kvm, 133))
2404 vcpu->run->kvm_valid_regs |= KVM_SYNC_GSCB;
Christian Borntraegera3da7b42018-03-08 16:08:49 +00002405 if (test_kvm_facility(vcpu->kvm, 156))
2406 vcpu->run->kvm_valid_regs |= KVM_SYNC_ETOKEN;
David Hildenbrandf6aa6dc2016-01-15 14:11:46 +01002407 /* fprs can be synchronized via vrs, even if the guest has no vx. With
2408 * MACHINE_HAS_VX, (load|store)_fpu_regs() will work with vrs format.
2409 */
2410 if (MACHINE_HAS_VX)
Eric Farman68c55752014-06-09 10:57:26 -04002411 vcpu->run->kvm_valid_regs |= KVM_SYNC_VRS;
David Hildenbrand6fd8e672016-01-18 14:46:34 +01002412 else
2413 vcpu->run->kvm_valid_regs |= KVM_SYNC_FPRS;
Dominik Dingeldafd0322014-12-02 16:53:21 +01002414
2415 if (kvm_is_ucontrol(vcpu->kvm))
2416 return __kvm_ucontrol_vcpu_init(vcpu);
2417
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002418 return 0;
2419}
2420
David Hildenbranddb0758b2016-02-15 09:42:25 +01002421/* needs disabled preemption to protect from TOD sync and vcpu_load/put */
2422static void __start_cpu_timer_accounting(struct kvm_vcpu *vcpu)
2423{
2424 WARN_ON_ONCE(vcpu->arch.cputm_start != 0);
David Hildenbrand9c23a132016-02-17 21:53:33 +01002425 raw_write_seqcount_begin(&vcpu->arch.cputm_seqcount);
David Hildenbranddb0758b2016-02-15 09:42:25 +01002426 vcpu->arch.cputm_start = get_tod_clock_fast();
David Hildenbrand9c23a132016-02-17 21:53:33 +01002427 raw_write_seqcount_end(&vcpu->arch.cputm_seqcount);
David Hildenbranddb0758b2016-02-15 09:42:25 +01002428}
2429
2430/* needs disabled preemption to protect from TOD sync and vcpu_load/put */
2431static void __stop_cpu_timer_accounting(struct kvm_vcpu *vcpu)
2432{
2433 WARN_ON_ONCE(vcpu->arch.cputm_start == 0);
David Hildenbrand9c23a132016-02-17 21:53:33 +01002434 raw_write_seqcount_begin(&vcpu->arch.cputm_seqcount);
David Hildenbranddb0758b2016-02-15 09:42:25 +01002435 vcpu->arch.sie_block->cputm -= get_tod_clock_fast() - vcpu->arch.cputm_start;
2436 vcpu->arch.cputm_start = 0;
David Hildenbrand9c23a132016-02-17 21:53:33 +01002437 raw_write_seqcount_end(&vcpu->arch.cputm_seqcount);
David Hildenbranddb0758b2016-02-15 09:42:25 +01002438}
2439
2440/* needs disabled preemption to protect from TOD sync and vcpu_load/put */
2441static void __enable_cpu_timer_accounting(struct kvm_vcpu *vcpu)
2442{
2443 WARN_ON_ONCE(vcpu->arch.cputm_enabled);
2444 vcpu->arch.cputm_enabled = true;
2445 __start_cpu_timer_accounting(vcpu);
2446}
2447
2448/* needs disabled preemption to protect from TOD sync and vcpu_load/put */
2449static void __disable_cpu_timer_accounting(struct kvm_vcpu *vcpu)
2450{
2451 WARN_ON_ONCE(!vcpu->arch.cputm_enabled);
2452 __stop_cpu_timer_accounting(vcpu);
2453 vcpu->arch.cputm_enabled = false;
2454}
2455
2456static void enable_cpu_timer_accounting(struct kvm_vcpu *vcpu)
2457{
2458 preempt_disable(); /* protect from TOD sync and vcpu_load/put */
2459 __enable_cpu_timer_accounting(vcpu);
2460 preempt_enable();
2461}
2462
2463static void disable_cpu_timer_accounting(struct kvm_vcpu *vcpu)
2464{
2465 preempt_disable(); /* protect from TOD sync and vcpu_load/put */
2466 __disable_cpu_timer_accounting(vcpu);
2467 preempt_enable();
2468}
2469
David Hildenbrand4287f242016-02-15 09:40:12 +01002470/* set the cpu timer - may only be called from the VCPU thread itself */
2471void kvm_s390_set_cpu_timer(struct kvm_vcpu *vcpu, __u64 cputm)
2472{
David Hildenbranddb0758b2016-02-15 09:42:25 +01002473 preempt_disable(); /* protect from TOD sync and vcpu_load/put */
David Hildenbrand9c23a132016-02-17 21:53:33 +01002474 raw_write_seqcount_begin(&vcpu->arch.cputm_seqcount);
David Hildenbranddb0758b2016-02-15 09:42:25 +01002475 if (vcpu->arch.cputm_enabled)
2476 vcpu->arch.cputm_start = get_tod_clock_fast();
David Hildenbrand4287f242016-02-15 09:40:12 +01002477 vcpu->arch.sie_block->cputm = cputm;
David Hildenbrand9c23a132016-02-17 21:53:33 +01002478 raw_write_seqcount_end(&vcpu->arch.cputm_seqcount);
David Hildenbranddb0758b2016-02-15 09:42:25 +01002479 preempt_enable();
David Hildenbrand4287f242016-02-15 09:40:12 +01002480}
2481
David Hildenbranddb0758b2016-02-15 09:42:25 +01002482/* update and get the cpu timer - can also be called from other VCPU threads */
David Hildenbrand4287f242016-02-15 09:40:12 +01002483__u64 kvm_s390_get_cpu_timer(struct kvm_vcpu *vcpu)
2484{
David Hildenbrand9c23a132016-02-17 21:53:33 +01002485 unsigned int seq;
David Hildenbranddb0758b2016-02-15 09:42:25 +01002486 __u64 value;
David Hildenbranddb0758b2016-02-15 09:42:25 +01002487
2488 if (unlikely(!vcpu->arch.cputm_enabled))
2489 return vcpu->arch.sie_block->cputm;
2490
David Hildenbrand9c23a132016-02-17 21:53:33 +01002491 preempt_disable(); /* protect from TOD sync and vcpu_load/put */
2492 do {
2493 seq = raw_read_seqcount(&vcpu->arch.cputm_seqcount);
2494 /*
2495 * If the writer would ever execute a read in the critical
2496 * section, e.g. in irq context, we have a deadlock.
2497 */
2498 WARN_ON_ONCE((seq & 1) && smp_processor_id() == vcpu->cpu);
2499 value = vcpu->arch.sie_block->cputm;
2500 /* if cputm_start is 0, accounting is being started/stopped */
2501 if (likely(vcpu->arch.cputm_start))
2502 value -= get_tod_clock_fast() - vcpu->arch.cputm_start;
2503 } while (read_seqcount_retry(&vcpu->arch.cputm_seqcount, seq & ~1));
2504 preempt_enable();
David Hildenbranddb0758b2016-02-15 09:42:25 +01002505 return value;
David Hildenbrand4287f242016-02-15 09:40:12 +01002506}
2507
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002508void kvm_arch_vcpu_load(struct kvm_vcpu *vcpu, int cpu)
2509{
Hendrik Brueckner9977e882015-06-10 12:53:42 +02002510
David Hildenbrand37d9df92015-03-11 16:47:33 +01002511 gmap_enable(vcpu->arch.enabled_gmap);
David Hildenbrandef8f4f42018-01-23 18:05:29 +01002512 kvm_s390_set_cpuflags(vcpu, CPUSTAT_RUNNING);
David Hildenbrand5ebda312016-02-22 13:52:27 +01002513 if (vcpu->arch.cputm_enabled && !is_vcpu_idle(vcpu))
David Hildenbranddb0758b2016-02-15 09:42:25 +01002514 __start_cpu_timer_accounting(vcpu);
David Hildenbrand01a745a2016-02-12 20:41:56 +01002515 vcpu->cpu = cpu;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002516}
2517
2518void kvm_arch_vcpu_put(struct kvm_vcpu *vcpu)
2519{
David Hildenbrand01a745a2016-02-12 20:41:56 +01002520 vcpu->cpu = -1;
David Hildenbrand5ebda312016-02-22 13:52:27 +01002521 if (vcpu->arch.cputm_enabled && !is_vcpu_idle(vcpu))
David Hildenbranddb0758b2016-02-15 09:42:25 +01002522 __stop_cpu_timer_accounting(vcpu);
David Hildenbrand9daecfc2018-01-23 18:05:30 +01002523 kvm_s390_clear_cpuflags(vcpu, CPUSTAT_RUNNING);
David Hildenbrand37d9df92015-03-11 16:47:33 +01002524 vcpu->arch.enabled_gmap = gmap_get_enabled();
2525 gmap_disable(vcpu->arch.enabled_gmap);
Hendrik Brueckner9977e882015-06-10 12:53:42 +02002526
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002527}
2528
2529static void kvm_s390_vcpu_initial_reset(struct kvm_vcpu *vcpu)
2530{
2531 /* this equals initial cpu reset in pop, but we don't switch to ESA */
2532 vcpu->arch.sie_block->gpsw.mask = 0UL;
2533 vcpu->arch.sie_block->gpsw.addr = 0UL;
Christian Borntraeger8d26cf72012-01-11 11:19:32 +01002534 kvm_s390_set_prefix(vcpu, 0);
David Hildenbrand4287f242016-02-15 09:40:12 +01002535 kvm_s390_set_cpu_timer(vcpu, 0);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002536 vcpu->arch.sie_block->ckc = 0UL;
2537 vcpu->arch.sie_block->todpr = 0;
2538 memset(vcpu->arch.sie_block->gcr, 0, 16 * sizeof(__u64));
David Hildenbrandb9224cd2018-04-30 17:55:24 +02002539 vcpu->arch.sie_block->gcr[0] = CR0_UNUSED_56 |
2540 CR0_INTERRUPT_KEY_SUBMASK |
2541 CR0_MEASUREMENT_ALERT_SUBMASK;
2542 vcpu->arch.sie_block->gcr[14] = CR14_UNUSED_32 |
2543 CR14_UNUSED_33 |
2544 CR14_EXTERNAL_DAMAGE_SUBMASK;
David Hildenbrand9abc2a02016-01-14 22:12:47 +01002545 /* make sure the new fpc will be lazily loaded */
2546 save_fpu_regs();
2547 current->thread.fpu.fpc = 0;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002548 vcpu->arch.sie_block->gbea = 1;
Christian Borntraeger672550f2014-02-10 15:32:19 +01002549 vcpu->arch.sie_block->pp = 0;
Christian Borntraeger35b3fde2018-01-17 14:44:34 +01002550 vcpu->arch.sie_block->fpf &= ~FPF_BPBC;
Dominik Dingel3c038e62013-10-07 17:11:48 +02002551 vcpu->arch.pfault_token = KVM_S390_PFAULT_TOKEN_INVALID;
2552 kvm_clear_async_pf_completion_queue(vcpu);
David Hildenbrand6352e4d2014-04-10 17:35:00 +02002553 if (!kvm_s390_user_cpu_state_ctrl(vcpu->kvm))
2554 kvm_s390_vcpu_stop(vcpu);
Jens Freimann2ed10cc2014-02-11 13:48:07 +01002555 kvm_s390_clear_local_irqs(vcpu);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002556}
2557
Dominik Dingel31928aa2014-12-04 15:47:07 +01002558void kvm_arch_vcpu_postcreate(struct kvm_vcpu *vcpu)
Marcelo Tosatti42897d82012-11-27 23:29:02 -02002559{
Jason J. Herne72f25022014-11-25 09:46:02 -05002560 mutex_lock(&vcpu->kvm->lock);
Fan Zhangfdf03652015-05-13 10:58:41 +02002561 preempt_disable();
Jason J. Herne72f25022014-11-25 09:46:02 -05002562 vcpu->arch.sie_block->epoch = vcpu->kvm->arch.epoch;
David Hildenbrandd16b52c2018-02-07 12:46:44 +01002563 vcpu->arch.sie_block->epdx = vcpu->kvm->arch.epdx;
Fan Zhangfdf03652015-05-13 10:58:41 +02002564 preempt_enable();
Jason J. Herne72f25022014-11-25 09:46:02 -05002565 mutex_unlock(&vcpu->kvm->lock);
David Hildenbrand25508822015-10-12 16:27:23 +02002566 if (!kvm_is_ucontrol(vcpu->kvm)) {
Dominik Dingeldafd0322014-12-02 16:53:21 +01002567 vcpu->arch.gmap = vcpu->kvm->arch.gmap;
David Hildenbrandeaa78f32015-10-12 16:29:01 +02002568 sca_add_vcpu(vcpu);
David Hildenbrand25508822015-10-12 16:27:23 +02002569 }
David Hildenbrand6502a342016-06-21 14:19:51 +02002570 if (test_kvm_facility(vcpu->kvm, 74) || vcpu->kvm->arch.user_instr0)
2571 vcpu->arch.sie_block->ictl |= ICTL_OPEREXC;
David Hildenbrand37d9df92015-03-11 16:47:33 +01002572 /* make vcpu_load load the right gmap on the first trigger */
2573 vcpu->arch.enabled_gmap = vcpu->arch.gmap;
Marcelo Tosatti42897d82012-11-27 23:29:02 -02002574}
2575
Tony Krowiak5102ee82014-06-27 14:46:01 -04002576static void kvm_s390_vcpu_crypto_setup(struct kvm_vcpu *vcpu)
2577{
Tony Krowiake585b242018-09-25 19:16:18 -04002578 /*
2579 * If the AP instructions are not being interpreted and the MSAX3
2580 * facility is not configured for the guest, there is nothing to set up.
2581 */
2582 if (!vcpu->kvm->arch.crypto.apie && !test_kvm_facility(vcpu->kvm, 76))
Tony Krowiak5102ee82014-06-27 14:46:01 -04002583 return;
2584
Tony Krowiake585b242018-09-25 19:16:18 -04002585 vcpu->arch.sie_block->crycbd = vcpu->kvm->arch.crypto.crycbd;
Tony Krowiaka374e892014-09-03 10:13:53 +02002586 vcpu->arch.sie_block->ecb3 &= ~(ECB3_AES | ECB3_DEA);
2587
Tony Krowiake585b242018-09-25 19:16:18 -04002588 if (vcpu->kvm->arch.crypto.apie)
2589 vcpu->arch.sie_block->eca |= ECA_APIE;
2590
2591 /* Set up protected key support */
Tony Krowiaka374e892014-09-03 10:13:53 +02002592 if (vcpu->kvm->arch.crypto.aes_kw)
2593 vcpu->arch.sie_block->ecb3 |= ECB3_AES;
2594 if (vcpu->kvm->arch.crypto.dea_kw)
2595 vcpu->arch.sie_block->ecb3 |= ECB3_DEA;
Tony Krowiak5102ee82014-06-27 14:46:01 -04002596}
2597
Dominik Dingelb31605c2014-03-25 13:47:11 +01002598void kvm_s390_vcpu_unsetup_cmma(struct kvm_vcpu *vcpu)
2599{
2600 free_page(vcpu->arch.sie_block->cbrlo);
2601 vcpu->arch.sie_block->cbrlo = 0;
2602}
2603
2604int kvm_s390_vcpu_setup_cmma(struct kvm_vcpu *vcpu)
2605{
2606 vcpu->arch.sie_block->cbrlo = get_zeroed_page(GFP_KERNEL);
2607 if (!vcpu->arch.sie_block->cbrlo)
2608 return -ENOMEM;
Dominik Dingelb31605c2014-03-25 13:47:11 +01002609 return 0;
2610}
2611
Michael Mueller91520f12015-02-27 14:32:11 +01002612static void kvm_s390_vcpu_setup_model(struct kvm_vcpu *vcpu)
2613{
2614 struct kvm_s390_cpu_model *model = &vcpu->kvm->arch.model;
2615
Michael Mueller91520f12015-02-27 14:32:11 +01002616 vcpu->arch.sie_block->ibc = model->ibc;
David Hildenbrand80bc79d2015-12-02 09:43:29 +01002617 if (test_kvm_facility(vcpu->kvm, 7))
David Hildenbrandc54f0d62015-12-02 08:53:52 +01002618 vcpu->arch.sie_block->fac = (u32)(u64) model->fac_list;
Michael Mueller91520f12015-02-27 14:32:11 +01002619}
2620
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002621int kvm_arch_vcpu_setup(struct kvm_vcpu *vcpu)
2622{
Dominik Dingelb31605c2014-03-25 13:47:11 +01002623 int rc = 0;
Konstantin Weitzb31288f2013-04-17 17:36:29 +02002624
Cornelia Huck9e6dabe2011-11-17 11:00:41 +01002625 atomic_set(&vcpu->arch.sie_block->cpuflags, CPUSTAT_ZARCH |
2626 CPUSTAT_SM |
Guenther Hutzla4a4f192015-03-31 14:39:49 +02002627 CPUSTAT_STOPPED);
2628
Guenther Hutzl53df84f2015-02-18 11:13:03 +01002629 if (test_kvm_facility(vcpu->kvm, 78))
David Hildenbrandef8f4f42018-01-23 18:05:29 +01002630 kvm_s390_set_cpuflags(vcpu, CPUSTAT_GED2);
Guenther Hutzl53df84f2015-02-18 11:13:03 +01002631 else if (test_kvm_facility(vcpu->kvm, 8))
David Hildenbrandef8f4f42018-01-23 18:05:29 +01002632 kvm_s390_set_cpuflags(vcpu, CPUSTAT_GED);
Guenther Hutzla4a4f192015-03-31 14:39:49 +02002633
Michael Mueller91520f12015-02-27 14:32:11 +01002634 kvm_s390_vcpu_setup_model(vcpu);
2635
David Hildenbrandbdab09f2016-04-12 11:07:49 +02002636 /* pgste_set_pte has special handling for !MACHINE_HAS_ESOP */
2637 if (MACHINE_HAS_ESOP)
David Hildenbrand0c9d8682017-03-13 11:48:28 +01002638 vcpu->arch.sie_block->ecb |= ECB_HOSTPROTINT;
David Hildenbrandbd50e8e2016-03-04 12:23:55 +01002639 if (test_kvm_facility(vcpu->kvm, 9))
David Hildenbrand0c9d8682017-03-13 11:48:28 +01002640 vcpu->arch.sie_block->ecb |= ECB_SRSI;
David Hildenbrandf597d242016-04-22 16:26:49 +02002641 if (test_kvm_facility(vcpu->kvm, 73))
David Hildenbrand0c9d8682017-03-13 11:48:28 +01002642 vcpu->arch.sie_block->ecb |= ECB_TE;
Michael Mueller7feb6bb2013-06-28 13:30:24 +02002643
Janosch Frankc9f0a2b2018-02-16 12:16:14 +01002644 if (test_kvm_facility(vcpu->kvm, 8) && vcpu->kvm->arch.use_pfmfi)
David Hildenbrand0c9d8682017-03-13 11:48:28 +01002645 vcpu->arch.sie_block->ecb2 |= ECB2_PFMFI;
Janosch Frankcd1836f2016-08-04 09:57:36 +02002646 if (test_kvm_facility(vcpu->kvm, 130))
David Hildenbrand0c9d8682017-03-13 11:48:28 +01002647 vcpu->arch.sie_block->ecb2 |= ECB2_IEP;
2648 vcpu->arch.sie_block->eca = ECA_MVPGI | ECA_PROTEXCI;
David Hildenbrand48ee7d32016-04-04 15:49:34 +02002649 if (sclp.has_cei)
David Hildenbrand0c9d8682017-03-13 11:48:28 +01002650 vcpu->arch.sie_block->eca |= ECA_CEI;
David Hildenbrand11ad65b2016-04-04 15:46:26 +02002651 if (sclp.has_ib)
David Hildenbrand0c9d8682017-03-13 11:48:28 +01002652 vcpu->arch.sie_block->eca |= ECA_IB;
David Hildenbrand37c5f6c2015-05-06 13:18:59 +02002653 if (sclp.has_siif)
David Hildenbrand0c9d8682017-03-13 11:48:28 +01002654 vcpu->arch.sie_block->eca |= ECA_SII;
David Hildenbrand37c5f6c2015-05-06 13:18:59 +02002655 if (sclp.has_sigpif)
David Hildenbrand0c9d8682017-03-13 11:48:28 +01002656 vcpu->arch.sie_block->eca |= ECA_SIGPI;
Michael Mueller18280d82015-03-16 16:05:41 +01002657 if (test_kvm_facility(vcpu->kvm, 129)) {
David Hildenbrand0c9d8682017-03-13 11:48:28 +01002658 vcpu->arch.sie_block->eca |= ECA_VX;
2659 vcpu->arch.sie_block->ecd |= ECD_HOSTREGMGMT;
Eric Farman13211ea2014-04-30 13:39:46 -04002660 }
Collin L. Walling8fa16962016-07-26 15:29:44 -04002661 if (test_kvm_facility(vcpu->kvm, 139))
2662 vcpu->arch.sie_block->ecd |= ECD_MEF;
Christian Borntraegera3da7b42018-03-08 16:08:49 +00002663 if (test_kvm_facility(vcpu->kvm, 156))
2664 vcpu->arch.sie_block->ecd |= ECD_ETOKENF;
Michael Muellerd7c5cb02017-06-12 14:15:19 +02002665 if (vcpu->arch.sie_block->gd) {
2666 vcpu->arch.sie_block->eca |= ECA_AIV;
2667 VCPU_EVENT(vcpu, 3, "AIV gisa format-%u enabled for cpu %03u",
2668 vcpu->arch.sie_block->gd & 0x3, vcpu->vcpu_id);
2669 }
Fan Zhang4e0b1ab2016-11-29 07:17:55 +01002670 vcpu->arch.sie_block->sdnxo = ((unsigned long) &vcpu->run->s.regs.sdnx)
2671 | SDNXC;
Fan Zhangc6e5f162016-01-07 18:24:29 +08002672 vcpu->arch.sie_block->riccbd = (unsigned long) &vcpu->run->s.regs.riccb;
Farhan Ali730cd632017-02-24 16:12:56 -05002673
2674 if (sclp.has_kss)
David Hildenbrandef8f4f42018-01-23 18:05:29 +01002675 kvm_s390_set_cpuflags(vcpu, CPUSTAT_KSS);
Farhan Ali730cd632017-02-24 16:12:56 -05002676 else
2677 vcpu->arch.sie_block->ictl |= ICTL_ISKE | ICTL_SSKE | ICTL_RRBE;
Matthew Rosato5a5e6532013-01-29 11:48:20 -05002678
Dominik Dingele6db1d62015-05-07 15:41:57 +02002679 if (vcpu->kvm->arch.use_cmma) {
Dominik Dingelb31605c2014-03-25 13:47:11 +01002680 rc = kvm_s390_vcpu_setup_cmma(vcpu);
2681 if (rc)
2682 return rc;
Konstantin Weitzb31288f2013-04-17 17:36:29 +02002683 }
David Hildenbrand0ac96caf2014-12-12 15:17:31 +01002684 hrtimer_init(&vcpu->arch.ckc_timer, CLOCK_MONOTONIC, HRTIMER_MODE_REL);
Christian Borntraegerca872302009-05-12 17:21:49 +02002685 vcpu->arch.ckc_timer.function = kvm_s390_idle_wakeup;
Michael Mueller9d8d5782015-02-02 15:42:51 +01002686
Tony Krowiak5102ee82014-06-27 14:46:01 -04002687 kvm_s390_vcpu_crypto_setup(vcpu);
2688
Dominik Dingelb31605c2014-03-25 13:47:11 +01002689 return rc;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002690}
2691
2692struct kvm_vcpu *kvm_arch_vcpu_create(struct kvm *kvm,
2693 unsigned int id)
2694{
Carsten Otte4d475552011-10-18 12:27:12 +02002695 struct kvm_vcpu *vcpu;
Michael Mueller7feb6bb2013-06-28 13:30:24 +02002696 struct sie_page *sie_page;
Carsten Otte4d475552011-10-18 12:27:12 +02002697 int rc = -EINVAL;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002698
David Hildenbrand42158252015-10-12 12:57:22 +02002699 if (!kvm_is_ucontrol(kvm) && !sca_can_add_vcpu(kvm, id))
Carsten Otte4d475552011-10-18 12:27:12 +02002700 goto out;
2701
2702 rc = -ENOMEM;
2703
Michael Muellerb110fea2013-06-12 13:54:54 +02002704 vcpu = kmem_cache_zalloc(kvm_vcpu_cache, GFP_KERNEL);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002705 if (!vcpu)
Carsten Otte4d475552011-10-18 12:27:12 +02002706 goto out;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002707
QingFeng Haoda72ca42017-06-07 11:41:19 +02002708 BUILD_BUG_ON(sizeof(struct sie_page) != 4096);
Michael Mueller7feb6bb2013-06-28 13:30:24 +02002709 sie_page = (struct sie_page *) get_zeroed_page(GFP_KERNEL);
2710 if (!sie_page)
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002711 goto out_free_cpu;
2712
Michael Mueller7feb6bb2013-06-28 13:30:24 +02002713 vcpu->arch.sie_block = &sie_page->sie_block;
2714 vcpu->arch.sie_block->itdba = (unsigned long) &sie_page->itdb;
2715
David Hildenbrandefed1102015-04-16 12:32:41 +02002716 /* the real guest size will always be smaller than msl */
2717 vcpu->arch.sie_block->mso = 0;
2718 vcpu->arch.sie_block->msl = sclp.hamax;
2719
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002720 vcpu->arch.sie_block->icpua = id;
Carsten Otteba5c1e92008-03-25 18:47:26 +01002721 spin_lock_init(&vcpu->arch.local_int.lock);
Michael Muellerd7c5cb02017-06-12 14:15:19 +02002722 vcpu->arch.sie_block->gd = (u32)(u64)kvm->arch.gisa;
Michael Mueller4b9f9522017-06-23 13:51:25 +02002723 if (vcpu->arch.sie_block->gd && sclp.has_gisaf)
2724 vcpu->arch.sie_block->gd |= GISA_FORMAT1;
David Hildenbrand9c23a132016-02-17 21:53:33 +01002725 seqcount_init(&vcpu->arch.cputm_seqcount);
Carsten Otteba5c1e92008-03-25 18:47:26 +01002726
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002727 rc = kvm_vcpu_init(vcpu, kvm, id);
2728 if (rc)
David Hildenbrand9abc2a02016-01-14 22:12:47 +01002729 goto out_free_sie_block;
Christian Borntraeger8335713a2015-12-08 16:55:27 +01002730 VM_EVENT(kvm, 3, "create cpu %d at 0x%pK, sie block at 0x%pK", id, vcpu,
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002731 vcpu->arch.sie_block);
Cornelia Huckade38c32012-07-23 17:20:30 +02002732 trace_kvm_s390_create_vcpu(id, vcpu, vcpu->arch.sie_block);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002733
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002734 return vcpu;
Wei Yongjun7b06bf22010-03-09 14:37:53 +08002735out_free_sie_block:
2736 free_page((unsigned long)(vcpu->arch.sie_block));
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002737out_free_cpu:
Michael Muellerb110fea2013-06-12 13:54:54 +02002738 kmem_cache_free(kvm_vcpu_cache, vcpu);
Carsten Otte4d475552011-10-18 12:27:12 +02002739out:
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002740 return ERR_PTR(rc);
2741}
2742
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002743int kvm_arch_vcpu_runnable(struct kvm_vcpu *vcpu)
2744{
David Hildenbrand9a022062014-08-05 17:40:47 +02002745 return kvm_s390_vcpu_has_irq(vcpu, 0);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002746}
2747
Longpeng(Mike)199b5762017-08-08 12:05:32 +08002748bool kvm_arch_vcpu_in_kernel(struct kvm_vcpu *vcpu)
2749{
Longpeng(Mike)0546c632017-08-08 12:05:34 +08002750 return !(vcpu->arch.sie_block->gpsw.mask & PSW_MASK_PSTATE);
Longpeng(Mike)199b5762017-08-08 12:05:32 +08002751}
2752
Christian Borntraeger27406cd2015-04-14 12:17:34 +02002753void kvm_s390_vcpu_block(struct kvm_vcpu *vcpu)
Christian Borntraeger49b99e12013-05-17 14:41:35 +02002754{
Peter Zijlstra805de8f42015-04-24 01:12:32 +02002755 atomic_or(PROG_BLOCK_SIE, &vcpu->arch.sie_block->prog20);
David Hildenbrand61a6df52015-05-12 08:41:40 +02002756 exit_sie(vcpu);
Christian Borntraeger49b99e12013-05-17 14:41:35 +02002757}
2758
Christian Borntraeger27406cd2015-04-14 12:17:34 +02002759void kvm_s390_vcpu_unblock(struct kvm_vcpu *vcpu)
Christian Borntraeger49b99e12013-05-17 14:41:35 +02002760{
Peter Zijlstra805de8f42015-04-24 01:12:32 +02002761 atomic_andnot(PROG_BLOCK_SIE, &vcpu->arch.sie_block->prog20);
Christian Borntraeger49b99e12013-05-17 14:41:35 +02002762}
2763
Christian Borntraeger8e236542015-04-09 13:49:04 +02002764static void kvm_s390_vcpu_request(struct kvm_vcpu *vcpu)
2765{
Peter Zijlstra805de8f42015-04-24 01:12:32 +02002766 atomic_or(PROG_REQUEST, &vcpu->arch.sie_block->prog20);
David Hildenbrand61a6df52015-05-12 08:41:40 +02002767 exit_sie(vcpu);
Christian Borntraeger8e236542015-04-09 13:49:04 +02002768}
2769
David Hildenbrand9ea59722018-09-25 19:16:16 -04002770bool kvm_s390_vcpu_sie_inhibited(struct kvm_vcpu *vcpu)
2771{
2772 return atomic_read(&vcpu->arch.sie_block->prog20) &
2773 (PROG_BLOCK_SIE | PROG_REQUEST);
2774}
2775
Christian Borntraeger8e236542015-04-09 13:49:04 +02002776static void kvm_s390_vcpu_request_handled(struct kvm_vcpu *vcpu)
2777{
Jason J. Herne9bf9fde2015-09-16 09:13:50 -04002778 atomic_andnot(PROG_REQUEST, &vcpu->arch.sie_block->prog20);
Christian Borntraeger8e236542015-04-09 13:49:04 +02002779}
2780
Christian Borntraeger49b99e12013-05-17 14:41:35 +02002781/*
David Hildenbrand9ea59722018-09-25 19:16:16 -04002782 * Kick a guest cpu out of (v)SIE and wait until (v)SIE is not running.
Christian Borntraeger49b99e12013-05-17 14:41:35 +02002783 * If the CPU is not running (e.g. waiting as idle) the function will
2784 * return immediately. */
2785void exit_sie(struct kvm_vcpu *vcpu)
2786{
David Hildenbrandef8f4f42018-01-23 18:05:29 +01002787 kvm_s390_set_cpuflags(vcpu, CPUSTAT_STOP_INT);
David Hildenbrand9ea59722018-09-25 19:16:16 -04002788 kvm_s390_vsie_kick(vcpu);
Christian Borntraeger49b99e12013-05-17 14:41:35 +02002789 while (vcpu->arch.sie_block->prog0c & PROG_IN_SIE)
2790 cpu_relax();
2791}
2792
Christian Borntraeger8e236542015-04-09 13:49:04 +02002793/* Kick a guest cpu out of SIE to process a request synchronously */
2794void kvm_s390_sync_request(int req, struct kvm_vcpu *vcpu)
Christian Borntraeger49b99e12013-05-17 14:41:35 +02002795{
Christian Borntraeger8e236542015-04-09 13:49:04 +02002796 kvm_make_request(req, vcpu);
2797 kvm_s390_vcpu_request(vcpu);
Christian Borntraeger49b99e12013-05-17 14:41:35 +02002798}
2799
Martin Schwidefsky414d3b02016-03-08 11:52:54 +01002800static void kvm_gmap_notifier(struct gmap *gmap, unsigned long start,
2801 unsigned long end)
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02002802{
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02002803 struct kvm *kvm = gmap->private;
2804 struct kvm_vcpu *vcpu;
Martin Schwidefsky414d3b02016-03-08 11:52:54 +01002805 unsigned long prefix;
2806 int i;
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02002807
David Hildenbrand65d0b0d2015-04-27 16:29:34 +02002808 if (gmap_is_shadow(gmap))
2809 return;
Martin Schwidefsky414d3b02016-03-08 11:52:54 +01002810 if (start >= 1UL << 31)
2811 /* We are only interested in prefix pages */
2812 return;
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02002813 kvm_for_each_vcpu(i, vcpu, kvm) {
2814 /* match against both prefix pages */
Martin Schwidefsky414d3b02016-03-08 11:52:54 +01002815 prefix = kvm_s390_get_prefix(vcpu);
2816 if (prefix <= end && start <= prefix + 2*PAGE_SIZE - 1) {
2817 VCPU_EVENT(vcpu, 2, "gmap notifier for %lx-%lx",
2818 start, end);
Christian Borntraeger8e236542015-04-09 13:49:04 +02002819 kvm_s390_sync_request(KVM_REQ_MMU_RELOAD, vcpu);
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02002820 }
2821 }
2822}
2823
Christoffer Dallb6d33832012-03-08 16:44:24 -05002824int kvm_arch_vcpu_should_kick(struct kvm_vcpu *vcpu)
2825{
2826 /* kvm common code refers to this, but never calls it */
2827 BUG();
2828 return 0;
2829}
2830
Carsten Otte14eebd92012-05-15 14:15:26 +02002831static int kvm_arch_vcpu_ioctl_get_one_reg(struct kvm_vcpu *vcpu,
2832 struct kvm_one_reg *reg)
2833{
2834 int r = -EINVAL;
2835
2836 switch (reg->id) {
Carsten Otte29b7c712012-05-15 14:15:27 +02002837 case KVM_REG_S390_TODPR:
2838 r = put_user(vcpu->arch.sie_block->todpr,
2839 (u32 __user *)reg->addr);
2840 break;
2841 case KVM_REG_S390_EPOCHDIFF:
2842 r = put_user(vcpu->arch.sie_block->epoch,
2843 (u64 __user *)reg->addr);
2844 break;
Jason J. herne46a6dd12012-05-15 14:15:28 +02002845 case KVM_REG_S390_CPU_TIMER:
David Hildenbrand4287f242016-02-15 09:40:12 +01002846 r = put_user(kvm_s390_get_cpu_timer(vcpu),
Jason J. herne46a6dd12012-05-15 14:15:28 +02002847 (u64 __user *)reg->addr);
2848 break;
2849 case KVM_REG_S390_CLOCK_COMP:
2850 r = put_user(vcpu->arch.sie_block->ckc,
2851 (u64 __user *)reg->addr);
2852 break;
Dominik Dingel536336c2013-09-30 10:55:33 +02002853 case KVM_REG_S390_PFTOKEN:
2854 r = put_user(vcpu->arch.pfault_token,
2855 (u64 __user *)reg->addr);
2856 break;
2857 case KVM_REG_S390_PFCOMPARE:
2858 r = put_user(vcpu->arch.pfault_compare,
2859 (u64 __user *)reg->addr);
2860 break;
2861 case KVM_REG_S390_PFSELECT:
2862 r = put_user(vcpu->arch.pfault_select,
2863 (u64 __user *)reg->addr);
2864 break;
Christian Borntraeger672550f2014-02-10 15:32:19 +01002865 case KVM_REG_S390_PP:
2866 r = put_user(vcpu->arch.sie_block->pp,
2867 (u64 __user *)reg->addr);
2868 break;
Christian Borntraegerafa45ff2014-02-10 15:39:23 +01002869 case KVM_REG_S390_GBEA:
2870 r = put_user(vcpu->arch.sie_block->gbea,
2871 (u64 __user *)reg->addr);
2872 break;
Carsten Otte14eebd92012-05-15 14:15:26 +02002873 default:
2874 break;
2875 }
2876
2877 return r;
2878}
2879
2880static int kvm_arch_vcpu_ioctl_set_one_reg(struct kvm_vcpu *vcpu,
2881 struct kvm_one_reg *reg)
2882{
2883 int r = -EINVAL;
David Hildenbrand4287f242016-02-15 09:40:12 +01002884 __u64 val;
Carsten Otte14eebd92012-05-15 14:15:26 +02002885
2886 switch (reg->id) {
Carsten Otte29b7c712012-05-15 14:15:27 +02002887 case KVM_REG_S390_TODPR:
2888 r = get_user(vcpu->arch.sie_block->todpr,
2889 (u32 __user *)reg->addr);
2890 break;
2891 case KVM_REG_S390_EPOCHDIFF:
2892 r = get_user(vcpu->arch.sie_block->epoch,
2893 (u64 __user *)reg->addr);
2894 break;
Jason J. herne46a6dd12012-05-15 14:15:28 +02002895 case KVM_REG_S390_CPU_TIMER:
David Hildenbrand4287f242016-02-15 09:40:12 +01002896 r = get_user(val, (u64 __user *)reg->addr);
2897 if (!r)
2898 kvm_s390_set_cpu_timer(vcpu, val);
Jason J. herne46a6dd12012-05-15 14:15:28 +02002899 break;
2900 case KVM_REG_S390_CLOCK_COMP:
2901 r = get_user(vcpu->arch.sie_block->ckc,
2902 (u64 __user *)reg->addr);
2903 break;
Dominik Dingel536336c2013-09-30 10:55:33 +02002904 case KVM_REG_S390_PFTOKEN:
2905 r = get_user(vcpu->arch.pfault_token,
2906 (u64 __user *)reg->addr);
David Hildenbrand9fbd8082014-10-09 15:01:38 +02002907 if (vcpu->arch.pfault_token == KVM_S390_PFAULT_TOKEN_INVALID)
2908 kvm_clear_async_pf_completion_queue(vcpu);
Dominik Dingel536336c2013-09-30 10:55:33 +02002909 break;
2910 case KVM_REG_S390_PFCOMPARE:
2911 r = get_user(vcpu->arch.pfault_compare,
2912 (u64 __user *)reg->addr);
2913 break;
2914 case KVM_REG_S390_PFSELECT:
2915 r = get_user(vcpu->arch.pfault_select,
2916 (u64 __user *)reg->addr);
2917 break;
Christian Borntraeger672550f2014-02-10 15:32:19 +01002918 case KVM_REG_S390_PP:
2919 r = get_user(vcpu->arch.sie_block->pp,
2920 (u64 __user *)reg->addr);
2921 break;
Christian Borntraegerafa45ff2014-02-10 15:39:23 +01002922 case KVM_REG_S390_GBEA:
2923 r = get_user(vcpu->arch.sie_block->gbea,
2924 (u64 __user *)reg->addr);
2925 break;
Carsten Otte14eebd92012-05-15 14:15:26 +02002926 default:
2927 break;
2928 }
2929
2930 return r;
2931}
Christoffer Dallb6d33832012-03-08 16:44:24 -05002932
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002933static int kvm_arch_vcpu_ioctl_initial_reset(struct kvm_vcpu *vcpu)
2934{
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002935 kvm_s390_vcpu_initial_reset(vcpu);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002936 return 0;
2937}
2938
2939int kvm_arch_vcpu_ioctl_set_regs(struct kvm_vcpu *vcpu, struct kvm_regs *regs)
2940{
Christoffer Dall875656f2017-12-04 21:35:27 +01002941 vcpu_load(vcpu);
Christian Borntraeger5a32c1a2012-01-11 11:20:32 +01002942 memcpy(&vcpu->run->s.regs.gprs, &regs->gprs, sizeof(regs->gprs));
Christoffer Dall875656f2017-12-04 21:35:27 +01002943 vcpu_put(vcpu);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002944 return 0;
2945}
2946
2947int kvm_arch_vcpu_ioctl_get_regs(struct kvm_vcpu *vcpu, struct kvm_regs *regs)
2948{
Christoffer Dall1fc9b762017-12-04 21:35:26 +01002949 vcpu_load(vcpu);
Christian Borntraeger5a32c1a2012-01-11 11:20:32 +01002950 memcpy(&regs->gprs, &vcpu->run->s.regs.gprs, sizeof(regs->gprs));
Christoffer Dall1fc9b762017-12-04 21:35:26 +01002951 vcpu_put(vcpu);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002952 return 0;
2953}
2954
2955int kvm_arch_vcpu_ioctl_set_sregs(struct kvm_vcpu *vcpu,
2956 struct kvm_sregs *sregs)
2957{
Christoffer Dallb4ef9d42017-12-04 21:35:29 +01002958 vcpu_load(vcpu);
2959
Christian Borntraeger59674c12012-01-11 11:20:33 +01002960 memcpy(&vcpu->run->s.regs.acrs, &sregs->acrs, sizeof(sregs->acrs));
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002961 memcpy(&vcpu->arch.sie_block->gcr, &sregs->crs, sizeof(sregs->crs));
Christoffer Dallb4ef9d42017-12-04 21:35:29 +01002962
2963 vcpu_put(vcpu);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002964 return 0;
2965}
2966
2967int kvm_arch_vcpu_ioctl_get_sregs(struct kvm_vcpu *vcpu,
2968 struct kvm_sregs *sregs)
2969{
Christoffer Dallbcdec412017-12-04 21:35:28 +01002970 vcpu_load(vcpu);
2971
Christian Borntraeger59674c12012-01-11 11:20:33 +01002972 memcpy(&sregs->acrs, &vcpu->run->s.regs.acrs, sizeof(sregs->acrs));
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002973 memcpy(&sregs->crs, &vcpu->arch.sie_block->gcr, sizeof(sregs->crs));
Christoffer Dallbcdec412017-12-04 21:35:28 +01002974
2975 vcpu_put(vcpu);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002976 return 0;
2977}
2978
2979int kvm_arch_vcpu_ioctl_set_fpu(struct kvm_vcpu *vcpu, struct kvm_fpu *fpu)
2980{
Christoffer Dall6a96bc72017-12-04 21:35:35 +01002981 int ret = 0;
2982
2983 vcpu_load(vcpu);
2984
2985 if (test_fp_ctl(fpu->fpc)) {
2986 ret = -EINVAL;
2987 goto out;
2988 }
Christian Borntraegere1788bb2016-11-22 09:29:38 +01002989 vcpu->run->s.regs.fpc = fpu->fpc;
David Hildenbrand9abc2a02016-01-14 22:12:47 +01002990 if (MACHINE_HAS_VX)
David Hildenbranda7d4b8f2016-08-16 14:38:24 +02002991 convert_fp_to_vx((__vector128 *) vcpu->run->s.regs.vrs,
2992 (freg_t *) fpu->fprs);
David Hildenbrand9abc2a02016-01-14 22:12:47 +01002993 else
David Hildenbranda7d4b8f2016-08-16 14:38:24 +02002994 memcpy(vcpu->run->s.regs.fprs, &fpu->fprs, sizeof(fpu->fprs));
Christoffer Dall6a96bc72017-12-04 21:35:35 +01002995
2996out:
2997 vcpu_put(vcpu);
2998 return ret;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002999}
3000
3001int kvm_arch_vcpu_ioctl_get_fpu(struct kvm_vcpu *vcpu, struct kvm_fpu *fpu)
3002{
Christoffer Dall13931232017-12-04 21:35:34 +01003003 vcpu_load(vcpu);
3004
David Hildenbrand9abc2a02016-01-14 22:12:47 +01003005 /* make sure we have the latest values */
3006 save_fpu_regs();
3007 if (MACHINE_HAS_VX)
David Hildenbranda7d4b8f2016-08-16 14:38:24 +02003008 convert_vx_to_fp((freg_t *) fpu->fprs,
3009 (__vector128 *) vcpu->run->s.regs.vrs);
David Hildenbrand9abc2a02016-01-14 22:12:47 +01003010 else
David Hildenbranda7d4b8f2016-08-16 14:38:24 +02003011 memcpy(fpu->fprs, vcpu->run->s.regs.fprs, sizeof(fpu->fprs));
Christian Borntraegere1788bb2016-11-22 09:29:38 +01003012 fpu->fpc = vcpu->run->s.regs.fpc;
Christoffer Dall13931232017-12-04 21:35:34 +01003013
3014 vcpu_put(vcpu);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003015 return 0;
3016}
3017
3018static int kvm_arch_vcpu_ioctl_set_initial_psw(struct kvm_vcpu *vcpu, psw_t psw)
3019{
3020 int rc = 0;
3021
David Hildenbrand7a42fdc2014-05-05 16:26:19 +02003022 if (!is_vcpu_stopped(vcpu))
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003023 rc = -EBUSY;
Carsten Otted7b0b5e2009-11-19 14:21:16 +01003024 else {
3025 vcpu->run->psw_mask = psw.mask;
3026 vcpu->run->psw_addr = psw.addr;
3027 }
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003028 return rc;
3029}
3030
3031int kvm_arch_vcpu_ioctl_translate(struct kvm_vcpu *vcpu,
3032 struct kvm_translation *tr)
3033{
3034 return -EINVAL; /* not implemented yet */
3035}
3036
David Hildenbrand27291e22014-01-23 12:26:52 +01003037#define VALID_GUESTDBG_FLAGS (KVM_GUESTDBG_SINGLESTEP | \
3038 KVM_GUESTDBG_USE_HW_BP | \
3039 KVM_GUESTDBG_ENABLE)
3040
Jan Kiszkad0bfb942008-12-15 13:52:10 +01003041int kvm_arch_vcpu_ioctl_set_guest_debug(struct kvm_vcpu *vcpu,
3042 struct kvm_guest_debug *dbg)
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003043{
David Hildenbrand27291e22014-01-23 12:26:52 +01003044 int rc = 0;
3045
Christoffer Dall66b56562017-12-04 21:35:33 +01003046 vcpu_load(vcpu);
3047
David Hildenbrand27291e22014-01-23 12:26:52 +01003048 vcpu->guest_debug = 0;
3049 kvm_s390_clear_bp_data(vcpu);
3050
Christoffer Dall66b56562017-12-04 21:35:33 +01003051 if (dbg->control & ~VALID_GUESTDBG_FLAGS) {
3052 rc = -EINVAL;
3053 goto out;
3054 }
3055 if (!sclp.has_gpere) {
3056 rc = -EINVAL;
3057 goto out;
3058 }
David Hildenbrand27291e22014-01-23 12:26:52 +01003059
3060 if (dbg->control & KVM_GUESTDBG_ENABLE) {
3061 vcpu->guest_debug = dbg->control;
3062 /* enforce guest PER */
David Hildenbrandef8f4f42018-01-23 18:05:29 +01003063 kvm_s390_set_cpuflags(vcpu, CPUSTAT_P);
David Hildenbrand27291e22014-01-23 12:26:52 +01003064
3065 if (dbg->control & KVM_GUESTDBG_USE_HW_BP)
3066 rc = kvm_s390_import_bp_data(vcpu, dbg);
3067 } else {
David Hildenbrand9daecfc2018-01-23 18:05:30 +01003068 kvm_s390_clear_cpuflags(vcpu, CPUSTAT_P);
David Hildenbrand27291e22014-01-23 12:26:52 +01003069 vcpu->arch.guestdbg.last_bp = 0;
3070 }
3071
3072 if (rc) {
3073 vcpu->guest_debug = 0;
3074 kvm_s390_clear_bp_data(vcpu);
David Hildenbrand9daecfc2018-01-23 18:05:30 +01003075 kvm_s390_clear_cpuflags(vcpu, CPUSTAT_P);
David Hildenbrand27291e22014-01-23 12:26:52 +01003076 }
3077
Christoffer Dall66b56562017-12-04 21:35:33 +01003078out:
3079 vcpu_put(vcpu);
David Hildenbrand27291e22014-01-23 12:26:52 +01003080 return rc;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003081}
3082
Marcelo Tosatti62d9f0d2008-04-11 13:24:45 -03003083int kvm_arch_vcpu_ioctl_get_mpstate(struct kvm_vcpu *vcpu,
3084 struct kvm_mp_state *mp_state)
3085{
Christoffer Dallfd232562017-12-04 21:35:30 +01003086 int ret;
3087
3088 vcpu_load(vcpu);
3089
David Hildenbrand6352e4d2014-04-10 17:35:00 +02003090 /* CHECK_STOP and LOAD are not supported yet */
Christoffer Dallfd232562017-12-04 21:35:30 +01003091 ret = is_vcpu_stopped(vcpu) ? KVM_MP_STATE_STOPPED :
3092 KVM_MP_STATE_OPERATING;
3093
3094 vcpu_put(vcpu);
3095 return ret;
Marcelo Tosatti62d9f0d2008-04-11 13:24:45 -03003096}
3097
3098int kvm_arch_vcpu_ioctl_set_mpstate(struct kvm_vcpu *vcpu,
3099 struct kvm_mp_state *mp_state)
3100{
David Hildenbrand6352e4d2014-04-10 17:35:00 +02003101 int rc = 0;
3102
Christoffer Dalle83dff52017-12-04 21:35:31 +01003103 vcpu_load(vcpu);
3104
David Hildenbrand6352e4d2014-04-10 17:35:00 +02003105 /* user space knows about this interface - let it control the state */
3106 vcpu->kvm->arch.user_cpu_state_ctrl = 1;
3107
3108 switch (mp_state->mp_state) {
3109 case KVM_MP_STATE_STOPPED:
3110 kvm_s390_vcpu_stop(vcpu);
3111 break;
3112 case KVM_MP_STATE_OPERATING:
3113 kvm_s390_vcpu_start(vcpu);
3114 break;
3115 case KVM_MP_STATE_LOAD:
3116 case KVM_MP_STATE_CHECK_STOP:
3117 /* fall through - CHECK_STOP and LOAD are not supported yet */
3118 default:
3119 rc = -ENXIO;
3120 }
3121
Christoffer Dalle83dff52017-12-04 21:35:31 +01003122 vcpu_put(vcpu);
David Hildenbrand6352e4d2014-04-10 17:35:00 +02003123 return rc;
Marcelo Tosatti62d9f0d2008-04-11 13:24:45 -03003124}
3125
David Hildenbrand8ad35752014-03-14 11:00:21 +01003126static bool ibs_enabled(struct kvm_vcpu *vcpu)
3127{
David Hildenbrand8d5fb0d2018-01-23 18:05:31 +01003128 return kvm_s390_test_cpuflags(vcpu, CPUSTAT_IBS);
David Hildenbrand8ad35752014-03-14 11:00:21 +01003129}
3130
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02003131static int kvm_s390_handle_requests(struct kvm_vcpu *vcpu)
3132{
David Hildenbrand8ad35752014-03-14 11:00:21 +01003133retry:
Christian Borntraeger8e236542015-04-09 13:49:04 +02003134 kvm_s390_vcpu_request_handled(vcpu);
Radim Krčmář2fa6e1e2017-06-04 14:43:52 +02003135 if (!kvm_request_pending(vcpu))
Christian Borntraeger586b7cc2015-07-28 15:03:05 +02003136 return 0;
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02003137 /*
3138 * We use MMU_RELOAD just to re-arm the ipte notifier for the
Martin Schwidefskyb2d73b22016-03-08 11:54:42 +01003139 * guest prefix page. gmap_mprotect_notify will wait on the ptl lock.
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02003140 * This ensures that the ipte instruction for this request has
3141 * already finished. We might race against a second unmapper that
3142 * wants to set the blocking bit. Lets just retry the request loop.
3143 */
David Hildenbrand8ad35752014-03-14 11:00:21 +01003144 if (kvm_check_request(KVM_REQ_MMU_RELOAD, vcpu)) {
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02003145 int rc;
Martin Schwidefskyb2d73b22016-03-08 11:54:42 +01003146 rc = gmap_mprotect_notify(vcpu->arch.gmap,
3147 kvm_s390_get_prefix(vcpu),
3148 PAGE_SIZE * 2, PROT_WRITE);
Julius Niedworokaca411a2016-08-03 16:39:55 +02003149 if (rc) {
3150 kvm_make_request(KVM_REQ_MMU_RELOAD, vcpu);
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02003151 return rc;
Julius Niedworokaca411a2016-08-03 16:39:55 +02003152 }
David Hildenbrand8ad35752014-03-14 11:00:21 +01003153 goto retry;
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02003154 }
David Hildenbrand8ad35752014-03-14 11:00:21 +01003155
David Hildenbrandd3d692c2014-07-29 08:53:36 +02003156 if (kvm_check_request(KVM_REQ_TLB_FLUSH, vcpu)) {
3157 vcpu->arch.sie_block->ihcpu = 0xffff;
3158 goto retry;
3159 }
3160
David Hildenbrand8ad35752014-03-14 11:00:21 +01003161 if (kvm_check_request(KVM_REQ_ENABLE_IBS, vcpu)) {
3162 if (!ibs_enabled(vcpu)) {
3163 trace_kvm_s390_enable_disable_ibs(vcpu->vcpu_id, 1);
David Hildenbrandef8f4f42018-01-23 18:05:29 +01003164 kvm_s390_set_cpuflags(vcpu, CPUSTAT_IBS);
David Hildenbrand8ad35752014-03-14 11:00:21 +01003165 }
3166 goto retry;
3167 }
3168
3169 if (kvm_check_request(KVM_REQ_DISABLE_IBS, vcpu)) {
3170 if (ibs_enabled(vcpu)) {
3171 trace_kvm_s390_enable_disable_ibs(vcpu->vcpu_id, 0);
David Hildenbrand9daecfc2018-01-23 18:05:30 +01003172 kvm_s390_clear_cpuflags(vcpu, CPUSTAT_IBS);
David Hildenbrand8ad35752014-03-14 11:00:21 +01003173 }
3174 goto retry;
3175 }
3176
David Hildenbrand6502a342016-06-21 14:19:51 +02003177 if (kvm_check_request(KVM_REQ_ICPT_OPEREXC, vcpu)) {
3178 vcpu->arch.sie_block->ictl |= ICTL_OPEREXC;
3179 goto retry;
3180 }
3181
Claudio Imbrenda190df4a2016-08-04 17:54:42 +02003182 if (kvm_check_request(KVM_REQ_START_MIGRATION, vcpu)) {
3183 /*
Janosch Frankc9f0a2b2018-02-16 12:16:14 +01003184 * Disable CMM virtualization; we will emulate the ESSA
Claudio Imbrenda190df4a2016-08-04 17:54:42 +02003185 * instruction manually, in order to provide additional
3186 * functionalities needed for live migration.
3187 */
3188 vcpu->arch.sie_block->ecb2 &= ~ECB2_CMMA;
3189 goto retry;
3190 }
3191
3192 if (kvm_check_request(KVM_REQ_STOP_MIGRATION, vcpu)) {
3193 /*
Janosch Frankc9f0a2b2018-02-16 12:16:14 +01003194 * Re-enable CMM virtualization if CMMA is available and
3195 * CMM has been used.
Claudio Imbrenda190df4a2016-08-04 17:54:42 +02003196 */
3197 if ((vcpu->kvm->arch.use_cmma) &&
Janosch Frankc9f0a2b2018-02-16 12:16:14 +01003198 (vcpu->kvm->mm->context.uses_cmm))
Claudio Imbrenda190df4a2016-08-04 17:54:42 +02003199 vcpu->arch.sie_block->ecb2 |= ECB2_CMMA;
3200 goto retry;
3201 }
3202
David Hildenbrand0759d062014-05-13 16:54:32 +02003203 /* nothing to do, just clear the request */
Radim Krčmář72875d82017-04-26 22:32:19 +02003204 kvm_clear_request(KVM_REQ_UNHALT, vcpu);
David Hildenbrand3194cdb2018-09-25 19:16:17 -04003205 /* we left the vsie handler, nothing to do, just clear the request */
3206 kvm_clear_request(KVM_REQ_VSIE_RESTART, vcpu);
David Hildenbrand0759d062014-05-13 16:54:32 +02003207
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02003208 return 0;
3209}
3210
David Hildenbrand0e7def52018-02-07 12:46:43 +01003211void kvm_s390_set_tod_clock(struct kvm *kvm,
3212 const struct kvm_s390_vm_tod_clock *gtod)
Collin L. Walling8fa16962016-07-26 15:29:44 -04003213{
3214 struct kvm_vcpu *vcpu;
3215 struct kvm_s390_tod_clock_ext htod;
3216 int i;
3217
3218 mutex_lock(&kvm->lock);
3219 preempt_disable();
3220
3221 get_tod_clock_ext((char *)&htod);
3222
3223 kvm->arch.epoch = gtod->tod - htod.tod;
David Hildenbrand0e7def52018-02-07 12:46:43 +01003224 kvm->arch.epdx = 0;
3225 if (test_kvm_facility(kvm, 139)) {
3226 kvm->arch.epdx = gtod->epoch_idx - htod.epoch_idx;
3227 if (kvm->arch.epoch > gtod->tod)
3228 kvm->arch.epdx -= 1;
3229 }
Collin L. Walling8fa16962016-07-26 15:29:44 -04003230
3231 kvm_s390_vcpu_block_all(kvm);
3232 kvm_for_each_vcpu(i, vcpu, kvm) {
3233 vcpu->arch.sie_block->epoch = kvm->arch.epoch;
3234 vcpu->arch.sie_block->epdx = kvm->arch.epdx;
3235 }
3236
3237 kvm_s390_vcpu_unblock_all(kvm);
3238 preempt_enable();
3239 mutex_unlock(&kvm->lock);
3240}
3241
Thomas Huthfa576c52014-05-06 17:20:16 +02003242/**
3243 * kvm_arch_fault_in_page - fault-in guest page if necessary
3244 * @vcpu: The corresponding virtual cpu
3245 * @gpa: Guest physical address
3246 * @writable: Whether the page should be writable or not
3247 *
3248 * Make sure that a guest page has been faulted-in on the host.
3249 *
3250 * Return: Zero on success, negative error code otherwise.
3251 */
3252long kvm_arch_fault_in_page(struct kvm_vcpu *vcpu, gpa_t gpa, int writable)
Dominik Dingel24eb3a82013-06-17 16:25:18 +02003253{
Martin Schwidefsky527e30b2014-04-30 16:04:25 +02003254 return gmap_fault(vcpu->arch.gmap, gpa,
3255 writable ? FAULT_FLAG_WRITE : 0);
Dominik Dingel24eb3a82013-06-17 16:25:18 +02003256}
3257
Dominik Dingel3c038e62013-10-07 17:11:48 +02003258static void __kvm_inject_pfault_token(struct kvm_vcpu *vcpu, bool start_token,
3259 unsigned long token)
3260{
3261 struct kvm_s390_interrupt inti;
Jens Freimann383d0b02014-07-29 15:11:49 +02003262 struct kvm_s390_irq irq;
Dominik Dingel3c038e62013-10-07 17:11:48 +02003263
3264 if (start_token) {
Jens Freimann383d0b02014-07-29 15:11:49 +02003265 irq.u.ext.ext_params2 = token;
3266 irq.type = KVM_S390_INT_PFAULT_INIT;
3267 WARN_ON_ONCE(kvm_s390_inject_vcpu(vcpu, &irq));
Dominik Dingel3c038e62013-10-07 17:11:48 +02003268 } else {
3269 inti.type = KVM_S390_INT_PFAULT_DONE;
Jens Freimann383d0b02014-07-29 15:11:49 +02003270 inti.parm64 = token;
Dominik Dingel3c038e62013-10-07 17:11:48 +02003271 WARN_ON_ONCE(kvm_s390_inject_vm(vcpu->kvm, &inti));
3272 }
3273}
3274
3275void kvm_arch_async_page_not_present(struct kvm_vcpu *vcpu,
3276 struct kvm_async_pf *work)
3277{
3278 trace_kvm_s390_pfault_init(vcpu, work->arch.pfault_token);
3279 __kvm_inject_pfault_token(vcpu, true, work->arch.pfault_token);
3280}
3281
3282void kvm_arch_async_page_present(struct kvm_vcpu *vcpu,
3283 struct kvm_async_pf *work)
3284{
3285 trace_kvm_s390_pfault_done(vcpu, work->arch.pfault_token);
3286 __kvm_inject_pfault_token(vcpu, false, work->arch.pfault_token);
3287}
3288
3289void kvm_arch_async_page_ready(struct kvm_vcpu *vcpu,
3290 struct kvm_async_pf *work)
3291{
3292 /* s390 will always inject the page directly */
3293}
3294
3295bool kvm_arch_can_inject_async_page_present(struct kvm_vcpu *vcpu)
3296{
3297 /*
3298 * s390 will always inject the page directly,
3299 * but we still want check_async_completion to cleanup
3300 */
3301 return true;
3302}
3303
3304static int kvm_arch_setup_async_pf(struct kvm_vcpu *vcpu)
3305{
3306 hva_t hva;
3307 struct kvm_arch_async_pf arch;
3308 int rc;
3309
3310 if (vcpu->arch.pfault_token == KVM_S390_PFAULT_TOKEN_INVALID)
3311 return 0;
3312 if ((vcpu->arch.sie_block->gpsw.mask & vcpu->arch.pfault_select) !=
3313 vcpu->arch.pfault_compare)
3314 return 0;
3315 if (psw_extint_disabled(vcpu))
3316 return 0;
David Hildenbrand9a022062014-08-05 17:40:47 +02003317 if (kvm_s390_vcpu_has_irq(vcpu, 0))
Dominik Dingel3c038e62013-10-07 17:11:48 +02003318 return 0;
David Hildenbrandb9224cd2018-04-30 17:55:24 +02003319 if (!(vcpu->arch.sie_block->gcr[0] & CR0_SERVICE_SIGNAL_SUBMASK))
Dominik Dingel3c038e62013-10-07 17:11:48 +02003320 return 0;
3321 if (!vcpu->arch.gmap->pfault_enabled)
3322 return 0;
3323
Heiko Carstens81480cc2014-01-01 16:36:07 +01003324 hva = gfn_to_hva(vcpu->kvm, gpa_to_gfn(current->thread.gmap_addr));
3325 hva += current->thread.gmap_addr & ~PAGE_MASK;
3326 if (read_guest_real(vcpu, vcpu->arch.pfault_token, &arch.pfault_token, 8))
Dominik Dingel3c038e62013-10-07 17:11:48 +02003327 return 0;
3328
3329 rc = kvm_setup_async_pf(vcpu, current->thread.gmap_addr, hva, &arch);
3330 return rc;
3331}
3332
Thomas Huth3fb4c402013-09-12 10:33:43 +02003333static int vcpu_pre_run(struct kvm_vcpu *vcpu)
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003334{
Thomas Huth3fb4c402013-09-12 10:33:43 +02003335 int rc, cpuflags;
Carsten Ottee168bf82012-01-04 10:25:22 +01003336
Dominik Dingel3c038e62013-10-07 17:11:48 +02003337 /*
3338 * On s390 notifications for arriving pages will be delivered directly
3339 * to the guest but the house keeping for completed pfaults is
3340 * handled outside the worker.
3341 */
3342 kvm_check_async_pf_completion(vcpu);
3343
Christian Borntraeger7ec7c8c2015-12-02 14:27:03 +01003344 vcpu->arch.sie_block->gg14 = vcpu->run->s.regs.gprs[14];
3345 vcpu->arch.sie_block->gg15 = vcpu->run->s.regs.gprs[15];
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003346
3347 if (need_resched())
3348 schedule();
3349
Martin Schwidefskyd3a73ac2014-04-15 12:55:07 +02003350 if (test_cpu_flag(CIF_MCCK_PENDING))
Christian Borntraeger71cde582008-05-21 13:37:34 +02003351 s390_handle_mcck();
3352
Jens Freimann79395032014-04-17 10:10:30 +02003353 if (!kvm_is_ucontrol(vcpu->kvm)) {
3354 rc = kvm_s390_deliver_pending_interrupts(vcpu);
3355 if (rc)
3356 return rc;
3357 }
Carsten Otte0ff31862008-05-21 13:37:37 +02003358
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02003359 rc = kvm_s390_handle_requests(vcpu);
3360 if (rc)
3361 return rc;
3362
David Hildenbrand27291e22014-01-23 12:26:52 +01003363 if (guestdbg_enabled(vcpu)) {
3364 kvm_s390_backup_guest_per_regs(vcpu);
3365 kvm_s390_patch_guest_per_regs(vcpu);
3366 }
3367
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003368 vcpu->arch.sie_block->icptcode = 0;
Thomas Huth3fb4c402013-09-12 10:33:43 +02003369 cpuflags = atomic_read(&vcpu->arch.sie_block->cpuflags);
3370 VCPU_EVENT(vcpu, 6, "entering sie flags %x", cpuflags);
3371 trace_kvm_s390_sie_enter(vcpu, cpuflags);
Dominik Dingel2b29a9f2013-07-26 15:04:00 +02003372
Thomas Huth3fb4c402013-09-12 10:33:43 +02003373 return 0;
3374}
3375
Thomas Huth492d8642015-02-10 16:11:01 +01003376static int vcpu_post_run_fault_in_sie(struct kvm_vcpu *vcpu)
3377{
David Hildenbrand56317922016-01-12 17:37:58 +01003378 struct kvm_s390_pgm_info pgm_info = {
3379 .code = PGM_ADDRESSING,
3380 };
3381 u8 opcode, ilen;
Thomas Huth492d8642015-02-10 16:11:01 +01003382 int rc;
3383
3384 VCPU_EVENT(vcpu, 3, "%s", "fault in sie instruction");
3385 trace_kvm_s390_sie_fault(vcpu);
3386
3387 /*
3388 * We want to inject an addressing exception, which is defined as a
3389 * suppressing or terminating exception. However, since we came here
3390 * by a DAT access exception, the PSW still points to the faulting
3391 * instruction since DAT exceptions are nullifying. So we've got
3392 * to look up the current opcode to get the length of the instruction
3393 * to be able to forward the PSW.
3394 */
David Hildenbrand3fa8cad72016-05-24 12:00:49 +02003395 rc = read_guest_instr(vcpu, vcpu->arch.sie_block->gpsw.addr, &opcode, 1);
David Hildenbrand56317922016-01-12 17:37:58 +01003396 ilen = insn_length(opcode);
David Hildenbrand9b0d7212016-01-12 17:40:54 +01003397 if (rc < 0) {
3398 return rc;
3399 } else if (rc) {
3400 /* Instruction-Fetching Exceptions - we can't detect the ilen.
3401 * Forward by arbitrary ilc, injection will take care of
3402 * nullification if necessary.
3403 */
3404 pgm_info = vcpu->arch.pgm;
3405 ilen = 4;
3406 }
David Hildenbrand56317922016-01-12 17:37:58 +01003407 pgm_info.flags = ilen | KVM_S390_PGM_FLAGS_ILC_VALID;
3408 kvm_s390_forward_psw(vcpu, ilen);
3409 return kvm_s390_inject_prog_irq(vcpu, &pgm_info);
Thomas Huth492d8642015-02-10 16:11:01 +01003410}
3411
Thomas Huth3fb4c402013-09-12 10:33:43 +02003412static int vcpu_post_run(struct kvm_vcpu *vcpu, int exit_reason)
3413{
QingFeng Hao4d62fcc2017-06-07 12:03:05 +02003414 struct mcck_volatile_info *mcck_info;
3415 struct sie_page *sie_page;
3416
Dominik Dingel2b29a9f2013-07-26 15:04:00 +02003417 VCPU_EVENT(vcpu, 6, "exit sie icptcode %d",
3418 vcpu->arch.sie_block->icptcode);
3419 trace_kvm_s390_sie_exit(vcpu, vcpu->arch.sie_block->icptcode);
3420
David Hildenbrand27291e22014-01-23 12:26:52 +01003421 if (guestdbg_enabled(vcpu))
3422 kvm_s390_restore_guest_per_regs(vcpu);
3423
Christian Borntraeger7ec7c8c2015-12-02 14:27:03 +01003424 vcpu->run->s.regs.gprs[14] = vcpu->arch.sie_block->gg14;
3425 vcpu->run->s.regs.gprs[15] = vcpu->arch.sie_block->gg15;
David Hildenbrand71f116b2015-10-19 16:24:28 +02003426
QingFeng Hao4d62fcc2017-06-07 12:03:05 +02003427 if (exit_reason == -EINTR) {
3428 VCPU_EVENT(vcpu, 3, "%s", "machine check");
3429 sie_page = container_of(vcpu->arch.sie_block,
3430 struct sie_page, sie_block);
3431 mcck_info = &sie_page->mcck_info;
3432 kvm_s390_reinject_machine_check(vcpu, mcck_info);
3433 return 0;
3434 }
3435
David Hildenbrand71f116b2015-10-19 16:24:28 +02003436 if (vcpu->arch.sie_block->icptcode > 0) {
3437 int rc = kvm_handle_sie_intercept(vcpu);
3438
3439 if (rc != -EOPNOTSUPP)
3440 return rc;
3441 vcpu->run->exit_reason = KVM_EXIT_S390_SIEIC;
3442 vcpu->run->s390_sieic.icptcode = vcpu->arch.sie_block->icptcode;
3443 vcpu->run->s390_sieic.ipa = vcpu->arch.sie_block->ipa;
3444 vcpu->run->s390_sieic.ipb = vcpu->arch.sie_block->ipb;
3445 return -EREMOTE;
3446 } else if (exit_reason != -EFAULT) {
3447 vcpu->stat.exit_null++;
3448 return 0;
Thomas Huth210b16072013-09-19 16:26:18 +02003449 } else if (kvm_is_ucontrol(vcpu->kvm)) {
3450 vcpu->run->exit_reason = KVM_EXIT_S390_UCONTROL;
3451 vcpu->run->s390_ucontrol.trans_exc_code =
3452 current->thread.gmap_addr;
3453 vcpu->run->s390_ucontrol.pgm_code = 0x10;
David Hildenbrand71f116b2015-10-19 16:24:28 +02003454 return -EREMOTE;
Dominik Dingel24eb3a82013-06-17 16:25:18 +02003455 } else if (current->thread.gmap_pfault) {
Dominik Dingel3c038e62013-10-07 17:11:48 +02003456 trace_kvm_s390_major_guest_pfault(vcpu);
Dominik Dingel24eb3a82013-06-17 16:25:18 +02003457 current->thread.gmap_pfault = 0;
David Hildenbrand71f116b2015-10-19 16:24:28 +02003458 if (kvm_arch_setup_async_pf(vcpu))
3459 return 0;
3460 return kvm_arch_fault_in_page(vcpu, current->thread.gmap_addr, 1);
Dominik Dingel24eb3a82013-06-17 16:25:18 +02003461 }
David Hildenbrand71f116b2015-10-19 16:24:28 +02003462 return vcpu_post_run_fault_in_sie(vcpu);
Thomas Huth3fb4c402013-09-12 10:33:43 +02003463}
3464
3465static int __vcpu_run(struct kvm_vcpu *vcpu)
3466{
3467 int rc, exit_reason;
3468
Thomas Huth800c1062013-09-12 10:33:45 +02003469 /*
3470 * We try to hold kvm->srcu during most of vcpu_run (except when run-
3471 * ning the guest), so that memslots (and other stuff) are protected
3472 */
3473 vcpu->srcu_idx = srcu_read_lock(&vcpu->kvm->srcu);
3474
Thomas Hutha76ccff2013-09-12 10:33:44 +02003475 do {
3476 rc = vcpu_pre_run(vcpu);
3477 if (rc)
3478 break;
Thomas Huth3fb4c402013-09-12 10:33:43 +02003479
Thomas Huth800c1062013-09-12 10:33:45 +02003480 srcu_read_unlock(&vcpu->kvm->srcu, vcpu->srcu_idx);
Thomas Hutha76ccff2013-09-12 10:33:44 +02003481 /*
3482 * As PF_VCPU will be used in fault handler, between
3483 * guest_enter and guest_exit should be no uaccess.
3484 */
Christian Borntraeger0097d122015-04-30 13:43:30 +02003485 local_irq_disable();
Paolo Bonzini6edaa532016-06-15 15:18:26 +02003486 guest_enter_irqoff();
David Hildenbranddb0758b2016-02-15 09:42:25 +01003487 __disable_cpu_timer_accounting(vcpu);
Christian Borntraeger0097d122015-04-30 13:43:30 +02003488 local_irq_enable();
Thomas Hutha76ccff2013-09-12 10:33:44 +02003489 exit_reason = sie64a(vcpu->arch.sie_block,
3490 vcpu->run->s.regs.gprs);
Christian Borntraeger0097d122015-04-30 13:43:30 +02003491 local_irq_disable();
David Hildenbranddb0758b2016-02-15 09:42:25 +01003492 __enable_cpu_timer_accounting(vcpu);
Paolo Bonzini6edaa532016-06-15 15:18:26 +02003493 guest_exit_irqoff();
Christian Borntraeger0097d122015-04-30 13:43:30 +02003494 local_irq_enable();
Thomas Huth800c1062013-09-12 10:33:45 +02003495 vcpu->srcu_idx = srcu_read_lock(&vcpu->kvm->srcu);
Thomas Huth3fb4c402013-09-12 10:33:43 +02003496
Thomas Hutha76ccff2013-09-12 10:33:44 +02003497 rc = vcpu_post_run(vcpu, exit_reason);
David Hildenbrand27291e22014-01-23 12:26:52 +01003498 } while (!signal_pending(current) && !guestdbg_exit_pending(vcpu) && !rc);
Thomas Huth3fb4c402013-09-12 10:33:43 +02003499
Thomas Huth800c1062013-09-12 10:33:45 +02003500 srcu_read_unlock(&vcpu->kvm->srcu, vcpu->srcu_idx);
Carsten Ottee168bf82012-01-04 10:25:22 +01003501 return rc;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003502}
3503
David Hildenbrandb028ee32014-07-17 10:47:43 +02003504static void sync_regs(struct kvm_vcpu *vcpu, struct kvm_run *kvm_run)
3505{
Christian Borntraeger4d5f2c02017-02-09 17:15:41 +01003506 struct runtime_instr_cb *riccb;
Fan Zhang4e0b1ab2016-11-29 07:17:55 +01003507 struct gs_cb *gscb;
Christian Borntraeger4d5f2c02017-02-09 17:15:41 +01003508
3509 riccb = (struct runtime_instr_cb *) &kvm_run->s.regs.riccb;
Fan Zhang4e0b1ab2016-11-29 07:17:55 +01003510 gscb = (struct gs_cb *) &kvm_run->s.regs.gscb;
David Hildenbrandb028ee32014-07-17 10:47:43 +02003511 vcpu->arch.sie_block->gpsw.mask = kvm_run->psw_mask;
3512 vcpu->arch.sie_block->gpsw.addr = kvm_run->psw_addr;
3513 if (kvm_run->kvm_dirty_regs & KVM_SYNC_PREFIX)
3514 kvm_s390_set_prefix(vcpu, kvm_run->s.regs.prefix);
3515 if (kvm_run->kvm_dirty_regs & KVM_SYNC_CRS) {
3516 memcpy(&vcpu->arch.sie_block->gcr, &kvm_run->s.regs.crs, 128);
David Hildenbrandd3d692c2014-07-29 08:53:36 +02003517 /* some control register changes require a tlb flush */
3518 kvm_make_request(KVM_REQ_TLB_FLUSH, vcpu);
David Hildenbrandb028ee32014-07-17 10:47:43 +02003519 }
3520 if (kvm_run->kvm_dirty_regs & KVM_SYNC_ARCH0) {
David Hildenbrand4287f242016-02-15 09:40:12 +01003521 kvm_s390_set_cpu_timer(vcpu, kvm_run->s.regs.cputm);
David Hildenbrandb028ee32014-07-17 10:47:43 +02003522 vcpu->arch.sie_block->ckc = kvm_run->s.regs.ckc;
3523 vcpu->arch.sie_block->todpr = kvm_run->s.regs.todpr;
3524 vcpu->arch.sie_block->pp = kvm_run->s.regs.pp;
3525 vcpu->arch.sie_block->gbea = kvm_run->s.regs.gbea;
3526 }
3527 if (kvm_run->kvm_dirty_regs & KVM_SYNC_PFAULT) {
3528 vcpu->arch.pfault_token = kvm_run->s.regs.pft;
3529 vcpu->arch.pfault_select = kvm_run->s.regs.pfs;
3530 vcpu->arch.pfault_compare = kvm_run->s.regs.pfc;
David Hildenbrand9fbd8082014-10-09 15:01:38 +02003531 if (vcpu->arch.pfault_token == KVM_S390_PFAULT_TOKEN_INVALID)
3532 kvm_clear_async_pf_completion_queue(vcpu);
David Hildenbrandb028ee32014-07-17 10:47:43 +02003533 }
Fan Zhang80cd8762016-08-15 04:53:22 +02003534 /*
3535 * If userspace sets the riccb (e.g. after migration) to a valid state,
3536 * we should enable RI here instead of doing the lazy enablement.
3537 */
3538 if ((kvm_run->kvm_dirty_regs & KVM_SYNC_RICCB) &&
Christian Borntraeger4d5f2c02017-02-09 17:15:41 +01003539 test_kvm_facility(vcpu->kvm, 64) &&
Alice Frosibb59c2d2017-09-14 12:35:45 +02003540 riccb->v &&
David Hildenbrand0c9d8682017-03-13 11:48:28 +01003541 !(vcpu->arch.sie_block->ecb3 & ECB3_RI)) {
Christian Borntraeger4d5f2c02017-02-09 17:15:41 +01003542 VCPU_EVENT(vcpu, 3, "%s", "ENABLE: RI (sync_regs)");
David Hildenbrand0c9d8682017-03-13 11:48:28 +01003543 vcpu->arch.sie_block->ecb3 |= ECB3_RI;
Fan Zhang80cd8762016-08-15 04:53:22 +02003544 }
Fan Zhang4e0b1ab2016-11-29 07:17:55 +01003545 /*
3546 * If userspace sets the gscb (e.g. after migration) to non-zero,
3547 * we should enable GS here instead of doing the lazy enablement.
3548 */
3549 if ((kvm_run->kvm_dirty_regs & KVM_SYNC_GSCB) &&
3550 test_kvm_facility(vcpu->kvm, 133) &&
3551 gscb->gssm &&
3552 !vcpu->arch.gs_enabled) {
3553 VCPU_EVENT(vcpu, 3, "%s", "ENABLE: GS (sync_regs)");
3554 vcpu->arch.sie_block->ecb |= ECB_GS;
3555 vcpu->arch.sie_block->ecd |= ECD_HOSTREGMGMT;
3556 vcpu->arch.gs_enabled = 1;
Fan Zhang80cd8762016-08-15 04:53:22 +02003557 }
Christian Borntraeger35b3fde2018-01-17 14:44:34 +01003558 if ((kvm_run->kvm_dirty_regs & KVM_SYNC_BPBC) &&
3559 test_kvm_facility(vcpu->kvm, 82)) {
3560 vcpu->arch.sie_block->fpf &= ~FPF_BPBC;
3561 vcpu->arch.sie_block->fpf |= kvm_run->s.regs.bpbc ? FPF_BPBC : 0;
3562 }
Christian Borntraeger31d8b8d2016-11-10 14:22:02 +01003563 save_access_regs(vcpu->arch.host_acrs);
3564 restore_access_regs(vcpu->run->s.regs.acrs);
Christian Borntraegere1788bb2016-11-22 09:29:38 +01003565 /* save host (userspace) fprs/vrs */
3566 save_fpu_regs();
3567 vcpu->arch.host_fpregs.fpc = current->thread.fpu.fpc;
3568 vcpu->arch.host_fpregs.regs = current->thread.fpu.regs;
3569 if (MACHINE_HAS_VX)
3570 current->thread.fpu.regs = vcpu->run->s.regs.vrs;
3571 else
3572 current->thread.fpu.regs = vcpu->run->s.regs.fprs;
3573 current->thread.fpu.fpc = vcpu->run->s.regs.fpc;
3574 if (test_fp_ctl(current->thread.fpu.fpc))
3575 /* User space provided an invalid FPC, let's clear it */
3576 current->thread.fpu.fpc = 0;
Fan Zhang4e0b1ab2016-11-29 07:17:55 +01003577 if (MACHINE_HAS_GS) {
3578 preempt_disable();
3579 __ctl_set_bit(2, 4);
3580 if (current->thread.gs_cb) {
3581 vcpu->arch.host_gscb = current->thread.gs_cb;
3582 save_gs_cb(vcpu->arch.host_gscb);
3583 }
3584 if (vcpu->arch.gs_enabled) {
3585 current->thread.gs_cb = (struct gs_cb *)
3586 &vcpu->run->s.regs.gscb;
3587 restore_gs_cb(current->thread.gs_cb);
3588 }
3589 preempt_enable();
3590 }
Christian Borntraegera3da7b42018-03-08 16:08:49 +00003591 /* SIE will load etoken directly from SDNX and therefore kvm_run */
Fan Zhang80cd8762016-08-15 04:53:22 +02003592
David Hildenbrandb028ee32014-07-17 10:47:43 +02003593 kvm_run->kvm_dirty_regs = 0;
3594}
3595
3596static void store_regs(struct kvm_vcpu *vcpu, struct kvm_run *kvm_run)
3597{
3598 kvm_run->psw_mask = vcpu->arch.sie_block->gpsw.mask;
3599 kvm_run->psw_addr = vcpu->arch.sie_block->gpsw.addr;
3600 kvm_run->s.regs.prefix = kvm_s390_get_prefix(vcpu);
3601 memcpy(&kvm_run->s.regs.crs, &vcpu->arch.sie_block->gcr, 128);
David Hildenbrand4287f242016-02-15 09:40:12 +01003602 kvm_run->s.regs.cputm = kvm_s390_get_cpu_timer(vcpu);
David Hildenbrandb028ee32014-07-17 10:47:43 +02003603 kvm_run->s.regs.ckc = vcpu->arch.sie_block->ckc;
3604 kvm_run->s.regs.todpr = vcpu->arch.sie_block->todpr;
3605 kvm_run->s.regs.pp = vcpu->arch.sie_block->pp;
3606 kvm_run->s.regs.gbea = vcpu->arch.sie_block->gbea;
3607 kvm_run->s.regs.pft = vcpu->arch.pfault_token;
3608 kvm_run->s.regs.pfs = vcpu->arch.pfault_select;
3609 kvm_run->s.regs.pfc = vcpu->arch.pfault_compare;
Christian Borntraeger35b3fde2018-01-17 14:44:34 +01003610 kvm_run->s.regs.bpbc = (vcpu->arch.sie_block->fpf & FPF_BPBC) == FPF_BPBC;
Christian Borntraeger31d8b8d2016-11-10 14:22:02 +01003611 save_access_regs(vcpu->run->s.regs.acrs);
3612 restore_access_regs(vcpu->arch.host_acrs);
Christian Borntraegere1788bb2016-11-22 09:29:38 +01003613 /* Save guest register state */
3614 save_fpu_regs();
3615 vcpu->run->s.regs.fpc = current->thread.fpu.fpc;
3616 /* Restore will be done lazily at return */
3617 current->thread.fpu.fpc = vcpu->arch.host_fpregs.fpc;
3618 current->thread.fpu.regs = vcpu->arch.host_fpregs.regs;
Fan Zhang4e0b1ab2016-11-29 07:17:55 +01003619 if (MACHINE_HAS_GS) {
3620 __ctl_set_bit(2, 4);
3621 if (vcpu->arch.gs_enabled)
3622 save_gs_cb(current->thread.gs_cb);
3623 preempt_disable();
3624 current->thread.gs_cb = vcpu->arch.host_gscb;
3625 restore_gs_cb(vcpu->arch.host_gscb);
3626 preempt_enable();
3627 if (!vcpu->arch.host_gscb)
3628 __ctl_clear_bit(2, 4);
3629 vcpu->arch.host_gscb = NULL;
3630 }
Christian Borntraegera3da7b42018-03-08 16:08:49 +00003631 /* SIE will save etoken directly into SDNX and therefore kvm_run */
David Hildenbrandb028ee32014-07-17 10:47:43 +02003632}
3633
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003634int kvm_arch_vcpu_ioctl_run(struct kvm_vcpu *vcpu, struct kvm_run *kvm_run)
3635{
Christian Borntraeger8f2abe62008-03-25 18:47:23 +01003636 int rc;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003637
Paolo Bonzini460df4c2017-02-08 11:50:15 +01003638 if (kvm_run->immediate_exit)
3639 return -EINTR;
3640
Christoffer Dallaccb7572017-12-04 21:35:25 +01003641 vcpu_load(vcpu);
3642
David Hildenbrand27291e22014-01-23 12:26:52 +01003643 if (guestdbg_exit_pending(vcpu)) {
3644 kvm_s390_prepare_debug_exit(vcpu);
Christoffer Dallaccb7572017-12-04 21:35:25 +01003645 rc = 0;
3646 goto out;
David Hildenbrand27291e22014-01-23 12:26:52 +01003647 }
3648
Jan H. Schönherr20b70352017-11-24 22:39:01 +01003649 kvm_sigset_activate(vcpu);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003650
David Hildenbrand6352e4d2014-04-10 17:35:00 +02003651 if (!kvm_s390_user_cpu_state_ctrl(vcpu->kvm)) {
3652 kvm_s390_vcpu_start(vcpu);
3653 } else if (is_vcpu_stopped(vcpu)) {
David Hildenbrandea2cdd22015-05-20 13:24:02 +02003654 pr_err_ratelimited("can't run stopped vcpu %d\n",
David Hildenbrand6352e4d2014-04-10 17:35:00 +02003655 vcpu->vcpu_id);
Christoffer Dallaccb7572017-12-04 21:35:25 +01003656 rc = -EINVAL;
3657 goto out;
David Hildenbrand6352e4d2014-04-10 17:35:00 +02003658 }
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003659
David Hildenbrandb028ee32014-07-17 10:47:43 +02003660 sync_regs(vcpu, kvm_run);
David Hildenbranddb0758b2016-02-15 09:42:25 +01003661 enable_cpu_timer_accounting(vcpu);
Carsten Otted7b0b5e2009-11-19 14:21:16 +01003662
Heiko Carstensdab4079d2009-06-12 10:26:32 +02003663 might_fault();
Thomas Hutha76ccff2013-09-12 10:33:44 +02003664 rc = __vcpu_run(vcpu);
Christian Ehrhardt9ace9032009-05-20 15:34:55 +02003665
Christian Ehrhardtb1d16c42009-05-20 15:34:56 +02003666 if (signal_pending(current) && !rc) {
3667 kvm_run->exit_reason = KVM_EXIT_INTR;
Christian Borntraeger8f2abe62008-03-25 18:47:23 +01003668 rc = -EINTR;
Christian Ehrhardtb1d16c42009-05-20 15:34:56 +02003669 }
Christian Borntraeger8f2abe62008-03-25 18:47:23 +01003670
David Hildenbrand27291e22014-01-23 12:26:52 +01003671 if (guestdbg_exit_pending(vcpu) && !rc) {
3672 kvm_s390_prepare_debug_exit(vcpu);
3673 rc = 0;
3674 }
3675
Christian Borntraeger8f2abe62008-03-25 18:47:23 +01003676 if (rc == -EREMOTE) {
David Hildenbrand71f116b2015-10-19 16:24:28 +02003677 /* userspace support is needed, kvm_run has been prepared */
Christian Borntraeger8f2abe62008-03-25 18:47:23 +01003678 rc = 0;
3679 }
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003680
David Hildenbranddb0758b2016-02-15 09:42:25 +01003681 disable_cpu_timer_accounting(vcpu);
David Hildenbrandb028ee32014-07-17 10:47:43 +02003682 store_regs(vcpu, kvm_run);
Carsten Otted7b0b5e2009-11-19 14:21:16 +01003683
Jan H. Schönherr20b70352017-11-24 22:39:01 +01003684 kvm_sigset_deactivate(vcpu);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003685
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003686 vcpu->stat.exit_userspace++;
Christoffer Dallaccb7572017-12-04 21:35:25 +01003687out:
3688 vcpu_put(vcpu);
Heiko Carstens7e8e6ab2008-04-04 15:12:35 +02003689 return rc;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003690}
3691
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003692/*
3693 * store status at address
3694 * we use have two special cases:
3695 * KVM_S390_STORE_STATUS_NOADDR: -> 0x1200 on 64 bit
3696 * KVM_S390_STORE_STATUS_PREFIXED: -> prefix
3697 */
Heiko Carstensd0bce602014-01-01 16:45:58 +01003698int kvm_s390_store_status_unloaded(struct kvm_vcpu *vcpu, unsigned long gpa)
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003699{
Carsten Otte092670c2011-07-24 10:48:22 +02003700 unsigned char archmode = 1;
David Hildenbrand9abc2a02016-01-14 22:12:47 +01003701 freg_t fprs[NUM_FPRS];
Michael Muellerfda902c2014-05-13 16:58:30 +02003702 unsigned int px;
David Hildenbrand4287f242016-02-15 09:40:12 +01003703 u64 clkcomp, cputm;
Heiko Carstensd0bce602014-01-01 16:45:58 +01003704 int rc;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003705
Martin Schwidefskyd9a3a092015-10-23 09:02:32 +02003706 px = kvm_s390_get_prefix(vcpu);
Heiko Carstensd0bce602014-01-01 16:45:58 +01003707 if (gpa == KVM_S390_STORE_STATUS_NOADDR) {
3708 if (write_guest_abs(vcpu, 163, &archmode, 1))
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003709 return -EFAULT;
Martin Schwidefskyd9a3a092015-10-23 09:02:32 +02003710 gpa = 0;
Heiko Carstensd0bce602014-01-01 16:45:58 +01003711 } else if (gpa == KVM_S390_STORE_STATUS_PREFIXED) {
3712 if (write_guest_real(vcpu, 163, &archmode, 1))
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003713 return -EFAULT;
Martin Schwidefskyd9a3a092015-10-23 09:02:32 +02003714 gpa = px;
3715 } else
3716 gpa -= __LC_FPREGS_SAVE_AREA;
David Hildenbrand9abc2a02016-01-14 22:12:47 +01003717
3718 /* manually convert vector registers if necessary */
3719 if (MACHINE_HAS_VX) {
David Hildenbrand9522b372016-03-08 12:24:30 +01003720 convert_vx_to_fp(fprs, (__vector128 *) vcpu->run->s.regs.vrs);
David Hildenbrand9abc2a02016-01-14 22:12:47 +01003721 rc = write_guest_abs(vcpu, gpa + __LC_FPREGS_SAVE_AREA,
3722 fprs, 128);
3723 } else {
3724 rc = write_guest_abs(vcpu, gpa + __LC_FPREGS_SAVE_AREA,
David Hildenbrand6fd8e672016-01-18 14:46:34 +01003725 vcpu->run->s.regs.fprs, 128);
David Hildenbrand9abc2a02016-01-14 22:12:47 +01003726 }
Martin Schwidefskyd9a3a092015-10-23 09:02:32 +02003727 rc |= write_guest_abs(vcpu, gpa + __LC_GPREGS_SAVE_AREA,
Heiko Carstensd0bce602014-01-01 16:45:58 +01003728 vcpu->run->s.regs.gprs, 128);
Martin Schwidefskyd9a3a092015-10-23 09:02:32 +02003729 rc |= write_guest_abs(vcpu, gpa + __LC_PSW_SAVE_AREA,
Heiko Carstensd0bce602014-01-01 16:45:58 +01003730 &vcpu->arch.sie_block->gpsw, 16);
Martin Schwidefskyd9a3a092015-10-23 09:02:32 +02003731 rc |= write_guest_abs(vcpu, gpa + __LC_PREFIX_SAVE_AREA,
Michael Muellerfda902c2014-05-13 16:58:30 +02003732 &px, 4);
Martin Schwidefskyd9a3a092015-10-23 09:02:32 +02003733 rc |= write_guest_abs(vcpu, gpa + __LC_FP_CREG_SAVE_AREA,
David Hildenbrand9abc2a02016-01-14 22:12:47 +01003734 &vcpu->run->s.regs.fpc, 4);
Martin Schwidefskyd9a3a092015-10-23 09:02:32 +02003735 rc |= write_guest_abs(vcpu, gpa + __LC_TOD_PROGREG_SAVE_AREA,
Heiko Carstensd0bce602014-01-01 16:45:58 +01003736 &vcpu->arch.sie_block->todpr, 4);
David Hildenbrand4287f242016-02-15 09:40:12 +01003737 cputm = kvm_s390_get_cpu_timer(vcpu);
Martin Schwidefskyd9a3a092015-10-23 09:02:32 +02003738 rc |= write_guest_abs(vcpu, gpa + __LC_CPU_TIMER_SAVE_AREA,
David Hildenbrand4287f242016-02-15 09:40:12 +01003739 &cputm, 8);
Thomas Huth178bd782013-11-13 20:28:18 +01003740 clkcomp = vcpu->arch.sie_block->ckc >> 8;
Martin Schwidefskyd9a3a092015-10-23 09:02:32 +02003741 rc |= write_guest_abs(vcpu, gpa + __LC_CLOCK_COMP_SAVE_AREA,
Heiko Carstensd0bce602014-01-01 16:45:58 +01003742 &clkcomp, 8);
Martin Schwidefskyd9a3a092015-10-23 09:02:32 +02003743 rc |= write_guest_abs(vcpu, gpa + __LC_AREGS_SAVE_AREA,
Heiko Carstensd0bce602014-01-01 16:45:58 +01003744 &vcpu->run->s.regs.acrs, 64);
Martin Schwidefskyd9a3a092015-10-23 09:02:32 +02003745 rc |= write_guest_abs(vcpu, gpa + __LC_CREGS_SAVE_AREA,
Heiko Carstensd0bce602014-01-01 16:45:58 +01003746 &vcpu->arch.sie_block->gcr, 128);
3747 return rc ? -EFAULT : 0;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003748}
3749
Thomas Huthe8798922013-11-06 15:46:33 +01003750int kvm_s390_vcpu_store_status(struct kvm_vcpu *vcpu, unsigned long addr)
3751{
3752 /*
3753 * The guest FPRS and ACRS are in the host FPRS/ACRS due to the lazy
Christian Borntraeger31d8b8d2016-11-10 14:22:02 +01003754 * switch in the run ioctl. Let's update our copies before we save
Thomas Huthe8798922013-11-06 15:46:33 +01003755 * it into the save area
3756 */
Hendrik Bruecknerd0164ee2015-06-29 16:43:06 +02003757 save_fpu_regs();
David Hildenbrand9abc2a02016-01-14 22:12:47 +01003758 vcpu->run->s.regs.fpc = current->thread.fpu.fpc;
Thomas Huthe8798922013-11-06 15:46:33 +01003759 save_access_regs(vcpu->run->s.regs.acrs);
3760
3761 return kvm_s390_store_status_unloaded(vcpu, addr);
3762}
3763
David Hildenbrand8ad35752014-03-14 11:00:21 +01003764static void __disable_ibs_on_vcpu(struct kvm_vcpu *vcpu)
3765{
3766 kvm_check_request(KVM_REQ_ENABLE_IBS, vcpu);
Christian Borntraeger8e236542015-04-09 13:49:04 +02003767 kvm_s390_sync_request(KVM_REQ_DISABLE_IBS, vcpu);
David Hildenbrand8ad35752014-03-14 11:00:21 +01003768}
3769
3770static void __disable_ibs_on_all_vcpus(struct kvm *kvm)
3771{
3772 unsigned int i;
3773 struct kvm_vcpu *vcpu;
3774
3775 kvm_for_each_vcpu(i, vcpu, kvm) {
3776 __disable_ibs_on_vcpu(vcpu);
3777 }
3778}
3779
3780static void __enable_ibs_on_vcpu(struct kvm_vcpu *vcpu)
3781{
David Hildenbrand09a400e2016-04-04 15:57:08 +02003782 if (!sclp.has_ibs)
3783 return;
David Hildenbrand8ad35752014-03-14 11:00:21 +01003784 kvm_check_request(KVM_REQ_DISABLE_IBS, vcpu);
Christian Borntraeger8e236542015-04-09 13:49:04 +02003785 kvm_s390_sync_request(KVM_REQ_ENABLE_IBS, vcpu);
David Hildenbrand8ad35752014-03-14 11:00:21 +01003786}
3787
David Hildenbrand6852d7b2014-03-14 10:59:29 +01003788void kvm_s390_vcpu_start(struct kvm_vcpu *vcpu)
3789{
David Hildenbrand8ad35752014-03-14 11:00:21 +01003790 int i, online_vcpus, started_vcpus = 0;
3791
3792 if (!is_vcpu_stopped(vcpu))
3793 return;
3794
David Hildenbrand6852d7b2014-03-14 10:59:29 +01003795 trace_kvm_s390_vcpu_start_stop(vcpu->vcpu_id, 1);
David Hildenbrand8ad35752014-03-14 11:00:21 +01003796 /* Only one cpu at a time may enter/leave the STOPPED state. */
David Hildenbrand433b9ee2014-05-06 16:11:14 +02003797 spin_lock(&vcpu->kvm->arch.start_stop_lock);
David Hildenbrand8ad35752014-03-14 11:00:21 +01003798 online_vcpus = atomic_read(&vcpu->kvm->online_vcpus);
3799
3800 for (i = 0; i < online_vcpus; i++) {
3801 if (!is_vcpu_stopped(vcpu->kvm->vcpus[i]))
3802 started_vcpus++;
3803 }
3804
3805 if (started_vcpus == 0) {
3806 /* we're the only active VCPU -> speed it up */
3807 __enable_ibs_on_vcpu(vcpu);
3808 } else if (started_vcpus == 1) {
3809 /*
3810 * As we are starting a second VCPU, we have to disable
3811 * the IBS facility on all VCPUs to remove potentially
3812 * oustanding ENABLE requests.
3813 */
3814 __disable_ibs_on_all_vcpus(vcpu->kvm);
3815 }
3816
David Hildenbrand9daecfc2018-01-23 18:05:30 +01003817 kvm_s390_clear_cpuflags(vcpu, CPUSTAT_STOPPED);
David Hildenbrand8ad35752014-03-14 11:00:21 +01003818 /*
3819 * Another VCPU might have used IBS while we were offline.
3820 * Let's play safe and flush the VCPU at startup.
3821 */
David Hildenbrandd3d692c2014-07-29 08:53:36 +02003822 kvm_make_request(KVM_REQ_TLB_FLUSH, vcpu);
David Hildenbrand433b9ee2014-05-06 16:11:14 +02003823 spin_unlock(&vcpu->kvm->arch.start_stop_lock);
David Hildenbrand8ad35752014-03-14 11:00:21 +01003824 return;
David Hildenbrand6852d7b2014-03-14 10:59:29 +01003825}
3826
3827void kvm_s390_vcpu_stop(struct kvm_vcpu *vcpu)
3828{
David Hildenbrand8ad35752014-03-14 11:00:21 +01003829 int i, online_vcpus, started_vcpus = 0;
3830 struct kvm_vcpu *started_vcpu = NULL;
3831
3832 if (is_vcpu_stopped(vcpu))
3833 return;
3834
David Hildenbrand6852d7b2014-03-14 10:59:29 +01003835 trace_kvm_s390_vcpu_start_stop(vcpu->vcpu_id, 0);
David Hildenbrand8ad35752014-03-14 11:00:21 +01003836 /* Only one cpu at a time may enter/leave the STOPPED state. */
David Hildenbrand433b9ee2014-05-06 16:11:14 +02003837 spin_lock(&vcpu->kvm->arch.start_stop_lock);
David Hildenbrand8ad35752014-03-14 11:00:21 +01003838 online_vcpus = atomic_read(&vcpu->kvm->online_vcpus);
3839
David Hildenbrand32f5ff632014-04-14 12:40:03 +02003840 /* SIGP STOP and SIGP STOP AND STORE STATUS has been fully processed */
David Hildenbrand6cddd432014-10-15 16:48:53 +02003841 kvm_s390_clear_stop_irq(vcpu);
David Hildenbrand32f5ff632014-04-14 12:40:03 +02003842
David Hildenbrandef8f4f42018-01-23 18:05:29 +01003843 kvm_s390_set_cpuflags(vcpu, CPUSTAT_STOPPED);
David Hildenbrand8ad35752014-03-14 11:00:21 +01003844 __disable_ibs_on_vcpu(vcpu);
3845
3846 for (i = 0; i < online_vcpus; i++) {
3847 if (!is_vcpu_stopped(vcpu->kvm->vcpus[i])) {
3848 started_vcpus++;
3849 started_vcpu = vcpu->kvm->vcpus[i];
3850 }
3851 }
3852
3853 if (started_vcpus == 1) {
3854 /*
3855 * As we only have one VCPU left, we want to enable the
3856 * IBS facility for that VCPU to speed it up.
3857 */
3858 __enable_ibs_on_vcpu(started_vcpu);
3859 }
3860
David Hildenbrand433b9ee2014-05-06 16:11:14 +02003861 spin_unlock(&vcpu->kvm->arch.start_stop_lock);
David Hildenbrand8ad35752014-03-14 11:00:21 +01003862 return;
David Hildenbrand6852d7b2014-03-14 10:59:29 +01003863}
3864
Cornelia Huckd6712df2012-12-20 15:32:11 +01003865static int kvm_vcpu_ioctl_enable_cap(struct kvm_vcpu *vcpu,
3866 struct kvm_enable_cap *cap)
3867{
3868 int r;
3869
3870 if (cap->flags)
3871 return -EINVAL;
3872
3873 switch (cap->cap) {
Cornelia Huckfa6b7fe2012-12-20 15:32:12 +01003874 case KVM_CAP_S390_CSS_SUPPORT:
3875 if (!vcpu->kvm->arch.css_support) {
3876 vcpu->kvm->arch.css_support = 1;
Christian Borntraegerc92ea7b2015-07-22 15:52:10 +02003877 VM_EVENT(vcpu->kvm, 3, "%s", "ENABLE: CSS support");
Cornelia Huckfa6b7fe2012-12-20 15:32:12 +01003878 trace_kvm_s390_enable_css(vcpu->kvm);
3879 }
3880 r = 0;
3881 break;
Cornelia Huckd6712df2012-12-20 15:32:11 +01003882 default:
3883 r = -EINVAL;
3884 break;
3885 }
3886 return r;
3887}
3888
Thomas Huth41408c282015-02-06 15:01:21 +01003889static long kvm_s390_guest_mem_op(struct kvm_vcpu *vcpu,
3890 struct kvm_s390_mem_op *mop)
3891{
3892 void __user *uaddr = (void __user *)mop->buf;
3893 void *tmpbuf = NULL;
3894 int r, srcu_idx;
3895 const u64 supported_flags = KVM_S390_MEMOP_F_INJECT_EXCEPTION
3896 | KVM_S390_MEMOP_F_CHECK_ONLY;
3897
3898 if (mop->flags & ~supported_flags)
3899 return -EINVAL;
3900
3901 if (mop->size > MEM_OP_MAX_SIZE)
3902 return -E2BIG;
3903
3904 if (!(mop->flags & KVM_S390_MEMOP_F_CHECK_ONLY)) {
3905 tmpbuf = vmalloc(mop->size);
3906 if (!tmpbuf)
3907 return -ENOMEM;
3908 }
3909
3910 srcu_idx = srcu_read_lock(&vcpu->kvm->srcu);
3911
3912 switch (mop->op) {
3913 case KVM_S390_MEMOP_LOGICAL_READ:
3914 if (mop->flags & KVM_S390_MEMOP_F_CHECK_ONLY) {
David Hildenbrand92c96322015-11-16 15:42:11 +01003915 r = check_gva_range(vcpu, mop->gaddr, mop->ar,
3916 mop->size, GACC_FETCH);
Thomas Huth41408c282015-02-06 15:01:21 +01003917 break;
3918 }
3919 r = read_guest(vcpu, mop->gaddr, mop->ar, tmpbuf, mop->size);
3920 if (r == 0) {
3921 if (copy_to_user(uaddr, tmpbuf, mop->size))
3922 r = -EFAULT;
3923 }
3924 break;
3925 case KVM_S390_MEMOP_LOGICAL_WRITE:
3926 if (mop->flags & KVM_S390_MEMOP_F_CHECK_ONLY) {
David Hildenbrand92c96322015-11-16 15:42:11 +01003927 r = check_gva_range(vcpu, mop->gaddr, mop->ar,
3928 mop->size, GACC_STORE);
Thomas Huth41408c282015-02-06 15:01:21 +01003929 break;
3930 }
3931 if (copy_from_user(tmpbuf, uaddr, mop->size)) {
3932 r = -EFAULT;
3933 break;
3934 }
3935 r = write_guest(vcpu, mop->gaddr, mop->ar, tmpbuf, mop->size);
3936 break;
3937 default:
3938 r = -EINVAL;
3939 }
3940
3941 srcu_read_unlock(&vcpu->kvm->srcu, srcu_idx);
3942
3943 if (r > 0 && (mop->flags & KVM_S390_MEMOP_F_INJECT_EXCEPTION) != 0)
3944 kvm_s390_inject_prog_irq(vcpu, &vcpu->arch.pgm);
3945
3946 vfree(tmpbuf);
3947 return r;
3948}
3949
Paolo Bonzini5cb09442017-12-12 17:41:34 +01003950long kvm_arch_vcpu_async_ioctl(struct file *filp,
3951 unsigned int ioctl, unsigned long arg)
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003952{
3953 struct kvm_vcpu *vcpu = filp->private_data;
3954 void __user *argp = (void __user *)arg;
3955
Avi Kivity93736622010-05-13 12:35:17 +03003956 switch (ioctl) {
Jens Freimann47b43c52014-11-11 20:57:06 +01003957 case KVM_S390_IRQ: {
3958 struct kvm_s390_irq s390irq;
3959
Jens Freimann47b43c52014-11-11 20:57:06 +01003960 if (copy_from_user(&s390irq, argp, sizeof(s390irq)))
Christoffer Dall9b0624712017-12-04 21:35:36 +01003961 return -EFAULT;
3962 return kvm_s390_inject_vcpu(vcpu, &s390irq);
Jens Freimann47b43c52014-11-11 20:57:06 +01003963 }
Avi Kivity93736622010-05-13 12:35:17 +03003964 case KVM_S390_INTERRUPT: {
Carsten Otteba5c1e92008-03-25 18:47:26 +01003965 struct kvm_s390_interrupt s390int;
Jens Freimann383d0b02014-07-29 15:11:49 +02003966 struct kvm_s390_irq s390irq;
Carsten Otteba5c1e92008-03-25 18:47:26 +01003967
3968 if (copy_from_user(&s390int, argp, sizeof(s390int)))
Christoffer Dall9b0624712017-12-04 21:35:36 +01003969 return -EFAULT;
Jens Freimann383d0b02014-07-29 15:11:49 +02003970 if (s390int_to_s390irq(&s390int, &s390irq))
3971 return -EINVAL;
Christoffer Dall9b0624712017-12-04 21:35:36 +01003972 return kvm_s390_inject_vcpu(vcpu, &s390irq);
Carsten Otteba5c1e92008-03-25 18:47:26 +01003973 }
Christoffer Dall9b0624712017-12-04 21:35:36 +01003974 }
Paolo Bonzini5cb09442017-12-12 17:41:34 +01003975 return -ENOIOCTLCMD;
3976}
3977
3978long kvm_arch_vcpu_ioctl(struct file *filp,
3979 unsigned int ioctl, unsigned long arg)
3980{
3981 struct kvm_vcpu *vcpu = filp->private_data;
3982 void __user *argp = (void __user *)arg;
3983 int idx;
3984 long r;
Christoffer Dall9b0624712017-12-04 21:35:36 +01003985
3986 vcpu_load(vcpu);
3987
3988 switch (ioctl) {
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003989 case KVM_S390_STORE_STATUS:
Thomas Huth800c1062013-09-12 10:33:45 +02003990 idx = srcu_read_lock(&vcpu->kvm->srcu);
Avi Kivitybc923cc2010-05-13 12:21:46 +03003991 r = kvm_s390_vcpu_store_status(vcpu, arg);
Thomas Huth800c1062013-09-12 10:33:45 +02003992 srcu_read_unlock(&vcpu->kvm->srcu, idx);
Avi Kivitybc923cc2010-05-13 12:21:46 +03003993 break;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003994 case KVM_S390_SET_INITIAL_PSW: {
3995 psw_t psw;
3996
Avi Kivitybc923cc2010-05-13 12:21:46 +03003997 r = -EFAULT;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003998 if (copy_from_user(&psw, argp, sizeof(psw)))
Avi Kivitybc923cc2010-05-13 12:21:46 +03003999 break;
4000 r = kvm_arch_vcpu_ioctl_set_initial_psw(vcpu, psw);
4001 break;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004002 }
4003 case KVM_S390_INITIAL_RESET:
Avi Kivitybc923cc2010-05-13 12:21:46 +03004004 r = kvm_arch_vcpu_ioctl_initial_reset(vcpu);
4005 break;
Carsten Otte14eebd92012-05-15 14:15:26 +02004006 case KVM_SET_ONE_REG:
4007 case KVM_GET_ONE_REG: {
4008 struct kvm_one_reg reg;
4009 r = -EFAULT;
4010 if (copy_from_user(&reg, argp, sizeof(reg)))
4011 break;
4012 if (ioctl == KVM_SET_ONE_REG)
4013 r = kvm_arch_vcpu_ioctl_set_one_reg(vcpu, &reg);
4014 else
4015 r = kvm_arch_vcpu_ioctl_get_one_reg(vcpu, &reg);
4016 break;
4017 }
Carsten Otte27e03932012-01-04 10:25:21 +01004018#ifdef CONFIG_KVM_S390_UCONTROL
4019 case KVM_S390_UCAS_MAP: {
4020 struct kvm_s390_ucas_mapping ucasmap;
4021
4022 if (copy_from_user(&ucasmap, argp, sizeof(ucasmap))) {
4023 r = -EFAULT;
4024 break;
4025 }
4026
4027 if (!kvm_is_ucontrol(vcpu->kvm)) {
4028 r = -EINVAL;
4029 break;
4030 }
4031
4032 r = gmap_map_segment(vcpu->arch.gmap, ucasmap.user_addr,
4033 ucasmap.vcpu_addr, ucasmap.length);
4034 break;
4035 }
4036 case KVM_S390_UCAS_UNMAP: {
4037 struct kvm_s390_ucas_mapping ucasmap;
4038
4039 if (copy_from_user(&ucasmap, argp, sizeof(ucasmap))) {
4040 r = -EFAULT;
4041 break;
4042 }
4043
4044 if (!kvm_is_ucontrol(vcpu->kvm)) {
4045 r = -EINVAL;
4046 break;
4047 }
4048
4049 r = gmap_unmap_segment(vcpu->arch.gmap, ucasmap.vcpu_addr,
4050 ucasmap.length);
4051 break;
4052 }
4053#endif
Carsten Otteccc79102012-01-04 10:25:26 +01004054 case KVM_S390_VCPU_FAULT: {
Martin Schwidefsky527e30b2014-04-30 16:04:25 +02004055 r = gmap_fault(vcpu->arch.gmap, arg, 0);
Carsten Otteccc79102012-01-04 10:25:26 +01004056 break;
4057 }
Cornelia Huckd6712df2012-12-20 15:32:11 +01004058 case KVM_ENABLE_CAP:
4059 {
4060 struct kvm_enable_cap cap;
4061 r = -EFAULT;
4062 if (copy_from_user(&cap, argp, sizeof(cap)))
4063 break;
4064 r = kvm_vcpu_ioctl_enable_cap(vcpu, &cap);
4065 break;
4066 }
Thomas Huth41408c282015-02-06 15:01:21 +01004067 case KVM_S390_MEM_OP: {
4068 struct kvm_s390_mem_op mem_op;
4069
4070 if (copy_from_user(&mem_op, argp, sizeof(mem_op)) == 0)
4071 r = kvm_s390_guest_mem_op(vcpu, &mem_op);
4072 else
4073 r = -EFAULT;
4074 break;
4075 }
Jens Freimann816c7662014-11-24 17:13:46 +01004076 case KVM_S390_SET_IRQ_STATE: {
4077 struct kvm_s390_irq_state irq_state;
4078
4079 r = -EFAULT;
4080 if (copy_from_user(&irq_state, argp, sizeof(irq_state)))
4081 break;
4082 if (irq_state.len > VCPU_IRQS_MAX_BUF ||
4083 irq_state.len == 0 ||
4084 irq_state.len % sizeof(struct kvm_s390_irq) > 0) {
4085 r = -EINVAL;
4086 break;
4087 }
Christian Borntraegerbb64da92017-11-21 16:02:52 +01004088 /* do not use irq_state.flags, it will break old QEMUs */
Jens Freimann816c7662014-11-24 17:13:46 +01004089 r = kvm_s390_set_irq_state(vcpu,
4090 (void __user *) irq_state.buf,
4091 irq_state.len);
4092 break;
4093 }
4094 case KVM_S390_GET_IRQ_STATE: {
4095 struct kvm_s390_irq_state irq_state;
4096
4097 r = -EFAULT;
4098 if (copy_from_user(&irq_state, argp, sizeof(irq_state)))
4099 break;
4100 if (irq_state.len == 0) {
4101 r = -EINVAL;
4102 break;
4103 }
Christian Borntraegerbb64da92017-11-21 16:02:52 +01004104 /* do not use irq_state.flags, it will break old QEMUs */
Jens Freimann816c7662014-11-24 17:13:46 +01004105 r = kvm_s390_get_irq_state(vcpu,
4106 (__u8 __user *) irq_state.buf,
4107 irq_state.len);
4108 break;
4109 }
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004110 default:
Carsten Otte3e6afcf2012-01-04 10:25:30 +01004111 r = -ENOTTY;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004112 }
Christoffer Dall9b0624712017-12-04 21:35:36 +01004113
4114 vcpu_put(vcpu);
Avi Kivitybc923cc2010-05-13 12:21:46 +03004115 return r;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004116}
4117
Souptick Joarder1499fa82018-04-19 00:49:58 +05304118vm_fault_t kvm_arch_vcpu_fault(struct kvm_vcpu *vcpu, struct vm_fault *vmf)
Carsten Otte5b1c1492012-01-04 10:25:23 +01004119{
4120#ifdef CONFIG_KVM_S390_UCONTROL
4121 if ((vmf->pgoff == KVM_S390_SIE_PAGE_OFFSET)
4122 && (kvm_is_ucontrol(vcpu->kvm))) {
4123 vmf->page = virt_to_page(vcpu->arch.sie_block);
4124 get_page(vmf->page);
4125 return 0;
4126 }
4127#endif
4128 return VM_FAULT_SIGBUS;
4129}
4130
Aneesh Kumar K.V55870272013-10-07 22:18:00 +05304131int kvm_arch_create_memslot(struct kvm *kvm, struct kvm_memory_slot *slot,
4132 unsigned long npages)
Takuya Yoshikawadb3fe4e2012-02-08 13:02:18 +09004133{
4134 return 0;
4135}
4136
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004137/* Section: memory related */
Marcelo Tosattif7784b82009-12-23 14:35:18 -02004138int kvm_arch_prepare_memory_region(struct kvm *kvm,
4139 struct kvm_memory_slot *memslot,
Paolo Bonzini09170a42015-05-18 13:59:39 +02004140 const struct kvm_userspace_memory_region *mem,
Takuya Yoshikawa7b6195a2013-02-27 19:44:34 +09004141 enum kvm_mr_change change)
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004142{
Nick Wangdd2887e2013-03-25 17:22:57 +01004143 /* A few sanity checks. We can have memory slots which have to be
4144 located/ended at a segment boundary (1MB). The memory in userland is
4145 ok to be fragmented into various different vmas. It is okay to mmap()
4146 and munmap() stuff in this slot after doing this call at any time */
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004147
Carsten Otte598841c2011-07-24 10:48:21 +02004148 if (mem->userspace_addr & 0xffffful)
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004149 return -EINVAL;
4150
Carsten Otte598841c2011-07-24 10:48:21 +02004151 if (mem->memory_size & 0xffffful)
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004152 return -EINVAL;
4153
Dominik Dingela3a92c32014-12-01 17:24:42 +01004154 if (mem->guest_phys_addr + mem->memory_size > kvm->arch.mem_limit)
4155 return -EINVAL;
4156
Marcelo Tosattif7784b82009-12-23 14:35:18 -02004157 return 0;
4158}
4159
4160void kvm_arch_commit_memory_region(struct kvm *kvm,
Paolo Bonzini09170a42015-05-18 13:59:39 +02004161 const struct kvm_userspace_memory_region *mem,
Takuya Yoshikawa84826442013-02-27 19:45:25 +09004162 const struct kvm_memory_slot *old,
Paolo Bonzinif36f3f22015-05-18 13:20:23 +02004163 const struct kvm_memory_slot *new,
Takuya Yoshikawa84826442013-02-27 19:45:25 +09004164 enum kvm_mr_change change)
Marcelo Tosattif7784b82009-12-23 14:35:18 -02004165{
Carsten Ottef7850c92011-07-24 10:48:23 +02004166 int rc;
Marcelo Tosattif7784b82009-12-23 14:35:18 -02004167
Christian Borntraeger2cef4de2013-03-25 17:22:48 +01004168 /* If the basics of the memslot do not change, we do not want
4169 * to update the gmap. Every update causes several unnecessary
4170 * segment translation exceptions. This is usually handled just
4171 * fine by the normal fault handler + gmap, but it will also
4172 * cause faults on the prefix page of running guest CPUs.
4173 */
4174 if (old->userspace_addr == mem->userspace_addr &&
4175 old->base_gfn * PAGE_SIZE == mem->guest_phys_addr &&
4176 old->npages * PAGE_SIZE == mem->memory_size)
4177 return;
Carsten Otte598841c2011-07-24 10:48:21 +02004178
4179 rc = gmap_map_segment(kvm->arch.gmap, mem->userspace_addr,
4180 mem->guest_phys_addr, mem->memory_size);
4181 if (rc)
David Hildenbrandea2cdd22015-05-20 13:24:02 +02004182 pr_warn("failed to commit memory region\n");
Carsten Otte598841c2011-07-24 10:48:21 +02004183 return;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004184}
4185
Alexander Yarygin60a37702016-04-01 15:38:57 +03004186static inline unsigned long nonhyp_mask(int i)
4187{
4188 unsigned int nonhyp_fai = (sclp.hmfai << i * 2) >> 30;
4189
4190 return 0x0000ffffffffffffUL >> (nonhyp_fai << 4);
4191}
4192
Christian Borntraeger3491caf2016-05-13 12:16:35 +02004193void kvm_arch_vcpu_block_finish(struct kvm_vcpu *vcpu)
4194{
4195 vcpu->valid_wakeup = false;
4196}
4197
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004198static int __init kvm_s390_init(void)
4199{
Alexander Yarygin60a37702016-04-01 15:38:57 +03004200 int i;
4201
David Hildenbrand07197fd2015-01-30 16:01:38 +01004202 if (!sclp.has_sief2) {
4203 pr_info("SIE not available\n");
4204 return -ENODEV;
4205 }
4206
Janosch Franka4499382018-07-13 11:28:31 +01004207 if (nested && hpage) {
4208 pr_info("nested (vSIE) and hpage (huge page backing) can currently not be activated concurrently");
4209 return -EINVAL;
4210 }
4211
Alexander Yarygin60a37702016-04-01 15:38:57 +03004212 for (i = 0; i < 16; i++)
Christian Borntraegerc3b9e3e2018-02-09 16:26:29 +00004213 kvm_s390_fac_base[i] |=
Alexander Yarygin60a37702016-04-01 15:38:57 +03004214 S390_lowcore.stfle_fac_list[i] & nonhyp_mask(i);
4215
Michael Mueller9d8d5782015-02-02 15:42:51 +01004216 return kvm_init(NULL, sizeof(struct kvm_vcpu), 0, THIS_MODULE);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004217}
4218
4219static void __exit kvm_s390_exit(void)
4220{
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004221 kvm_exit();
4222}
4223
4224module_init(kvm_s390_init);
4225module_exit(kvm_s390_exit);
Cornelia Huck566af942013-05-27 18:42:33 +02004226
4227/*
4228 * Enable autoloading of the kvm module.
4229 * Note that we add the module alias here instead of virt/kvm/kvm_main.c
4230 * since x86 takes a different approach.
4231 */
4232#include <linux/miscdevice.h>
4233MODULE_ALIAS_MISCDEV(KVM_MINOR);
4234MODULE_ALIAS("devname:kvm");