blob: 75aa5aa4a926b2cd681d89296a86242abf8fceca [file] [log] [blame]
Greg Kroah-Hartmand809aa22017-11-24 15:00:33 +01001// SPDX-License-Identifier: GPL-2.0
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002/*
Christian Borntraegerbb64da92017-11-21 16:02:52 +01003 * hosting IBM Z kernel virtual machines (s390x)
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004 *
Christian Borntraegera37cb072018-01-23 13:28:40 +01005 * Copyright IBM Corp. 2008, 2018
Heiko Carstensb0c632d2008-03-25 18:47:20 +01006 *
7 * Author(s): Carsten Otte <cotte@de.ibm.com>
8 * Christian Borntraeger <borntraeger@de.ibm.com>
9 * Heiko Carstens <heiko.carstens@de.ibm.com>
Christian Ehrhardt628eb9b2009-05-25 13:40:51 +020010 * Christian Ehrhardt <ehrhardt@de.ibm.com>
Jason J. Herne15f36eb2012-08-02 10:10:17 -040011 * Jason J. Herne <jjherne@us.ibm.com>
Heiko Carstensb0c632d2008-03-25 18:47:20 +010012 */
13
14#include <linux/compiler.h>
15#include <linux/err.h>
16#include <linux/fs.h>
Christian Borntraegerca872302009-05-12 17:21:49 +020017#include <linux/hrtimer.h>
Heiko Carstensb0c632d2008-03-25 18:47:20 +010018#include <linux/init.h>
19#include <linux/kvm.h>
20#include <linux/kvm_host.h>
Martin Schwidefskyb2d73b22016-03-08 11:54:42 +010021#include <linux/mman.h>
Heiko Carstensb0c632d2008-03-25 18:47:20 +010022#include <linux/module.h>
Paul Gortmakerd3217962017-02-09 15:20:25 -050023#include <linux/moduleparam.h>
Tony Krowiaka374e892014-09-03 10:13:53 +020024#include <linux/random.h>
Heiko Carstensb0c632d2008-03-25 18:47:20 +010025#include <linux/slab.h>
Carsten Otteba5c1e92008-03-25 18:47:26 +010026#include <linux/timer.h>
Thomas Huth41408c282015-02-06 15:01:21 +010027#include <linux/vmalloc.h>
David Hildenbrand15c97052015-03-19 17:36:43 +010028#include <linux/bitmap.h>
Ingo Molnar174cd4b2017-02-02 19:15:33 +010029#include <linux/sched/signal.h>
Claudio Imbrenda190df4a2016-08-04 17:54:42 +020030#include <linux/string.h>
Ingo Molnar174cd4b2017-02-02 19:15:33 +010031
Heiko Carstenscbb870c2010-02-26 22:37:43 +010032#include <asm/asm-offsets.h>
Heiko Carstensb0c632d2008-03-25 18:47:20 +010033#include <asm/lowcore.h>
Martin Schwidefskyfd5ada02016-05-31 15:06:51 +020034#include <asm/stp.h>
Heiko Carstensb0c632d2008-03-25 18:47:20 +010035#include <asm/pgtable.h>
Martin Schwidefsky1e133ab2016-03-08 11:49:57 +010036#include <asm/gmap.h>
Heiko Carstensf5daba12009-03-26 15:24:01 +010037#include <asm/nmi.h>
David Howellsa0616cd2012-03-28 18:30:02 +010038#include <asm/switch_to.h>
Jens Freimann6d3da242013-07-03 15:18:35 +020039#include <asm/isc.h>
Christian Borntraeger1526bf92012-05-15 14:15:25 +020040#include <asm/sclp.h>
David Hildenbrand0a763c72016-05-18 16:03:47 +020041#include <asm/cpacf.h>
Linus Torvalds221bb8a2016-08-02 16:11:27 -040042#include <asm/timex.h>
Tony Krowiake585b242018-09-25 19:16:18 -040043#include <asm/ap.h>
Christian Borntraeger8f2abe62008-03-25 18:47:23 +010044#include "kvm-s390.h"
Heiko Carstensb0c632d2008-03-25 18:47:20 +010045#include "gaccess.h"
46
David Hildenbrandea2cdd22015-05-20 13:24:02 +020047#define KMSG_COMPONENT "kvm-s390"
48#undef pr_fmt
49#define pr_fmt(fmt) KMSG_COMPONENT ": " fmt
50
Cornelia Huck5786fff2012-07-23 17:20:29 +020051#define CREATE_TRACE_POINTS
52#include "trace.h"
Cornelia Huckade38c32012-07-23 17:20:30 +020053#include "trace-s390.h"
Cornelia Huck5786fff2012-07-23 17:20:29 +020054
Thomas Huth41408c282015-02-06 15:01:21 +010055#define MEM_OP_MAX_SIZE 65536 /* Maximum transfer size for KVM_S390_MEM_OP */
Jens Freimann816c7662014-11-24 17:13:46 +010056#define LOCAL_IRQS 32
57#define VCPU_IRQS_MAX_BUF (sizeof(struct kvm_s390_irq) * \
58 (KVM_MAX_VCPUS + LOCAL_IRQS))
Thomas Huth41408c282015-02-06 15:01:21 +010059
Heiko Carstensb0c632d2008-03-25 18:47:20 +010060#define VCPU_STAT(x) offsetof(struct kvm_vcpu, stat.x), KVM_STAT_VCPU
Christian Borntraegerccc40c52018-03-08 12:48:05 +000061#define VM_STAT(x) offsetof(struct kvm, stat.x), KVM_STAT_VM
Heiko Carstensb0c632d2008-03-25 18:47:20 +010062
63struct kvm_stats_debugfs_item debugfs_entries[] = {
64 { "userspace_handled", VCPU_STAT(exit_userspace) },
Christian Borntraeger0eaeafa2008-05-07 09:22:53 +020065 { "exit_null", VCPU_STAT(exit_null) },
Christian Borntraeger8f2abe62008-03-25 18:47:23 +010066 { "exit_validity", VCPU_STAT(exit_validity) },
67 { "exit_stop_request", VCPU_STAT(exit_stop_request) },
68 { "exit_external_request", VCPU_STAT(exit_external_request) },
Christian Borntraegera5e0acea92018-02-23 07:57:33 +000069 { "exit_io_request", VCPU_STAT(exit_io_request) },
Christian Borntraeger8f2abe62008-03-25 18:47:23 +010070 { "exit_external_interrupt", VCPU_STAT(exit_external_interrupt) },
Carsten Otteba5c1e92008-03-25 18:47:26 +010071 { "exit_instruction", VCPU_STAT(exit_instruction) },
Alexander Yarygin9ec6de12016-05-06 16:33:06 +030072 { "exit_pei", VCPU_STAT(exit_pei) },
Carsten Otteba5c1e92008-03-25 18:47:26 +010073 { "exit_program_interruption", VCPU_STAT(exit_program_interruption) },
74 { "exit_instr_and_program_int", VCPU_STAT(exit_instr_and_program) },
Janosch Franka011eeb2016-05-09 14:14:01 +020075 { "exit_operation_exception", VCPU_STAT(exit_operation_exception) },
Paolo Bonzinif7819512015-02-04 18:20:58 +010076 { "halt_successful_poll", VCPU_STAT(halt_successful_poll) },
Paolo Bonzini62bea5b2015-09-15 18:27:57 +020077 { "halt_attempted_poll", VCPU_STAT(halt_attempted_poll) },
Christian Borntraeger3491caf2016-05-13 12:16:35 +020078 { "halt_poll_invalid", VCPU_STAT(halt_poll_invalid) },
David Hildenbrandce2e4f02014-07-11 10:00:43 +020079 { "halt_wakeup", VCPU_STAT(halt_wakeup) },
Christian Borntraegerf5e10b02008-07-25 15:52:44 +020080 { "instruction_lctlg", VCPU_STAT(instruction_lctlg) },
Carsten Otteba5c1e92008-03-25 18:47:26 +010081 { "instruction_lctl", VCPU_STAT(instruction_lctl) },
David Hildenbrandaba07502014-01-23 10:47:13 +010082 { "instruction_stctl", VCPU_STAT(instruction_stctl) },
83 { "instruction_stctg", VCPU_STAT(instruction_stctg) },
Christian Borntraegerccc40c52018-03-08 12:48:05 +000084 { "deliver_ckc", VCPU_STAT(deliver_ckc) },
85 { "deliver_cputm", VCPU_STAT(deliver_cputm) },
Carsten Otteba5c1e92008-03-25 18:47:26 +010086 { "deliver_emergency_signal", VCPU_STAT(deliver_emergency_signal) },
Christian Ehrhardt7697e71f2011-10-18 12:27:15 +020087 { "deliver_external_call", VCPU_STAT(deliver_external_call) },
Carsten Otteba5c1e92008-03-25 18:47:26 +010088 { "deliver_service_signal", VCPU_STAT(deliver_service_signal) },
Christian Borntraegerccc40c52018-03-08 12:48:05 +000089 { "deliver_virtio", VCPU_STAT(deliver_virtio) },
Carsten Otteba5c1e92008-03-25 18:47:26 +010090 { "deliver_stop_signal", VCPU_STAT(deliver_stop_signal) },
91 { "deliver_prefix_signal", VCPU_STAT(deliver_prefix_signal) },
92 { "deliver_restart_signal", VCPU_STAT(deliver_restart_signal) },
Christian Borntraegerccc40c52018-03-08 12:48:05 +000093 { "deliver_program", VCPU_STAT(deliver_program) },
94 { "deliver_io", VCPU_STAT(deliver_io) },
QingFeng Hao32de0742018-03-02 11:56:47 +010095 { "deliver_machine_check", VCPU_STAT(deliver_machine_check) },
Carsten Otteba5c1e92008-03-25 18:47:26 +010096 { "exit_wait_state", VCPU_STAT(exit_wait_state) },
Christian Borntraegerccc40c52018-03-08 12:48:05 +000097 { "inject_ckc", VCPU_STAT(inject_ckc) },
98 { "inject_cputm", VCPU_STAT(inject_cputm) },
99 { "inject_external_call", VCPU_STAT(inject_external_call) },
100 { "inject_float_mchk", VM_STAT(inject_float_mchk) },
101 { "inject_emergency_signal", VCPU_STAT(inject_emergency_signal) },
102 { "inject_io", VM_STAT(inject_io) },
103 { "inject_mchk", VCPU_STAT(inject_mchk) },
104 { "inject_pfault_done", VM_STAT(inject_pfault_done) },
105 { "inject_program", VCPU_STAT(inject_program) },
106 { "inject_restart", VCPU_STAT(inject_restart) },
107 { "inject_service_signal", VM_STAT(inject_service_signal) },
108 { "inject_set_prefix", VCPU_STAT(inject_set_prefix) },
109 { "inject_stop_signal", VCPU_STAT(inject_stop_signal) },
110 { "inject_pfault_init", VCPU_STAT(inject_pfault_init) },
111 { "inject_virtio", VM_STAT(inject_virtio) },
Christian Borntraegera37cb072018-01-23 13:28:40 +0100112 { "instruction_epsw", VCPU_STAT(instruction_epsw) },
113 { "instruction_gs", VCPU_STAT(instruction_gs) },
114 { "instruction_io_other", VCPU_STAT(instruction_io_other) },
115 { "instruction_lpsw", VCPU_STAT(instruction_lpsw) },
116 { "instruction_lpswe", VCPU_STAT(instruction_lpswe) },
Christian Borntraeger69d0d3a2013-06-12 13:54:53 +0200117 { "instruction_pfmf", VCPU_STAT(instruction_pfmf) },
Christian Borntraegera37cb072018-01-23 13:28:40 +0100118 { "instruction_ptff", VCPU_STAT(instruction_ptff) },
Christian Borntraeger453423d2008-03-25 18:47:29 +0100119 { "instruction_stidp", VCPU_STAT(instruction_stidp) },
Christian Borntraegera37cb072018-01-23 13:28:40 +0100120 { "instruction_sck", VCPU_STAT(instruction_sck) },
121 { "instruction_sckpf", VCPU_STAT(instruction_sckpf) },
Christian Borntraeger453423d2008-03-25 18:47:29 +0100122 { "instruction_spx", VCPU_STAT(instruction_spx) },
123 { "instruction_stpx", VCPU_STAT(instruction_stpx) },
124 { "instruction_stap", VCPU_STAT(instruction_stap) },
Christian Borntraegera37cb072018-01-23 13:28:40 +0100125 { "instruction_iske", VCPU_STAT(instruction_iske) },
126 { "instruction_ri", VCPU_STAT(instruction_ri) },
127 { "instruction_rrbe", VCPU_STAT(instruction_rrbe) },
128 { "instruction_sske", VCPU_STAT(instruction_sske) },
Heiko Carstens8a2422342014-01-10 14:33:28 +0100129 { "instruction_ipte_interlock", VCPU_STAT(instruction_ipte_interlock) },
Konstantin Weitzb31288f2013-04-17 17:36:29 +0200130 { "instruction_essa", VCPU_STAT(instruction_essa) },
Christian Borntraeger453423d2008-03-25 18:47:29 +0100131 { "instruction_stsi", VCPU_STAT(instruction_stsi) },
132 { "instruction_stfl", VCPU_STAT(instruction_stfl) },
Christian Borntraegera37cb072018-01-23 13:28:40 +0100133 { "instruction_tb", VCPU_STAT(instruction_tb) },
134 { "instruction_tpi", VCPU_STAT(instruction_tpi) },
Christian Borntraegerbb25b9b2011-07-24 10:48:17 +0200135 { "instruction_tprot", VCPU_STAT(instruction_tprot) },
Christian Borntraegera37cb072018-01-23 13:28:40 +0100136 { "instruction_tsch", VCPU_STAT(instruction_tsch) },
Janosch Frank95ca2cb2016-05-23 15:11:58 +0200137 { "instruction_sthyi", VCPU_STAT(instruction_sthyi) },
David Hildenbranda3508fb2015-07-08 13:19:48 +0200138 { "instruction_sie", VCPU_STAT(instruction_sie) },
Christian Borntraeger5288fbf2008-03-25 18:47:31 +0100139 { "instruction_sigp_sense", VCPU_STAT(instruction_sigp_sense) },
Cornelia Huckbd59d3a2011-11-17 11:00:42 +0100140 { "instruction_sigp_sense_running", VCPU_STAT(instruction_sigp_sense_running) },
Christian Ehrhardt7697e71f2011-10-18 12:27:15 +0200141 { "instruction_sigp_external_call", VCPU_STAT(instruction_sigp_external_call) },
Christian Borntraeger5288fbf2008-03-25 18:47:31 +0100142 { "instruction_sigp_emergency", VCPU_STAT(instruction_sigp_emergency) },
David Hildenbrand42cb0c92014-05-23 12:25:11 +0200143 { "instruction_sigp_cond_emergency", VCPU_STAT(instruction_sigp_cond_emergency) },
144 { "instruction_sigp_start", VCPU_STAT(instruction_sigp_start) },
Christian Borntraeger5288fbf2008-03-25 18:47:31 +0100145 { "instruction_sigp_stop", VCPU_STAT(instruction_sigp_stop) },
David Hildenbrand42cb0c92014-05-23 12:25:11 +0200146 { "instruction_sigp_stop_store_status", VCPU_STAT(instruction_sigp_stop_store_status) },
147 { "instruction_sigp_store_status", VCPU_STAT(instruction_sigp_store_status) },
Eric Farmancd7b4b62015-02-12 09:06:34 -0500148 { "instruction_sigp_store_adtl_status", VCPU_STAT(instruction_sigp_store_adtl_status) },
Christian Borntraeger5288fbf2008-03-25 18:47:31 +0100149 { "instruction_sigp_set_arch", VCPU_STAT(instruction_sigp_arch) },
150 { "instruction_sigp_set_prefix", VCPU_STAT(instruction_sigp_prefix) },
151 { "instruction_sigp_restart", VCPU_STAT(instruction_sigp_restart) },
David Hildenbrand42cb0c92014-05-23 12:25:11 +0200152 { "instruction_sigp_cpu_reset", VCPU_STAT(instruction_sigp_cpu_reset) },
153 { "instruction_sigp_init_cpu_reset", VCPU_STAT(instruction_sigp_init_cpu_reset) },
154 { "instruction_sigp_unknown", VCPU_STAT(instruction_sigp_unknown) },
Christian Borntraeger866c1382018-01-24 12:27:01 +0100155 { "instruction_diag_10", VCPU_STAT(diagnose_10) },
156 { "instruction_diag_44", VCPU_STAT(diagnose_44) },
157 { "instruction_diag_9c", VCPU_STAT(diagnose_9c) },
158 { "instruction_diag_258", VCPU_STAT(diagnose_258) },
159 { "instruction_diag_308", VCPU_STAT(diagnose_308) },
160 { "instruction_diag_500", VCPU_STAT(diagnose_500) },
Christian Borntraegera37cb072018-01-23 13:28:40 +0100161 { "instruction_diag_other", VCPU_STAT(diagnose_other) },
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100162 { NULL }
163};
164
Collin L. Walling8fa16962016-07-26 15:29:44 -0400165struct kvm_s390_tod_clock_ext {
166 __u8 epoch_idx;
167 __u64 tod;
168 __u8 reserved[7];
169} __packed;
170
David Hildenbranda411edf2016-02-02 15:41:22 +0100171/* allow nested virtualization in KVM (if enabled by user space) */
172static int nested;
173module_param(nested, int, S_IRUGO);
174MODULE_PARM_DESC(nested, "Nested virtualization support");
175
Janosch Franka4499382018-07-13 11:28:31 +0100176/* allow 1m huge page guest backing, if !nested */
177static int hpage;
178module_param(hpage, int, 0444);
179MODULE_PARM_DESC(hpage, "1m huge page backing support");
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100180
Christian Borntraegerc3b9e3e2018-02-09 16:26:29 +0000181/*
182 * For now we handle at most 16 double words as this is what the s390 base
183 * kernel handles and stores in the prefix page. If we ever need to go beyond
184 * this, this requires changes to code, but the external uapi can stay.
185 */
186#define SIZE_INTERNAL 16
187
188/*
189 * Base feature mask that defines default mask for facilities. Consists of the
190 * defines in FACILITIES_KVM and the non-hypervisor managed bits.
191 */
192static unsigned long kvm_s390_fac_base[SIZE_INTERNAL] = { FACILITIES_KVM };
193/*
194 * Extended feature mask. Consists of the defines in FACILITIES_KVM_CPUMODEL
195 * and defines the facilities that can be enabled via a cpu model.
196 */
197static unsigned long kvm_s390_fac_ext[SIZE_INTERNAL] = { FACILITIES_KVM_CPUMODEL };
198
199static unsigned long kvm_s390_fac_size(void)
Michael Mueller78c4b592013-07-26 15:04:04 +0200200{
Christian Borntraegerc3b9e3e2018-02-09 16:26:29 +0000201 BUILD_BUG_ON(SIZE_INTERNAL > S390_ARCH_FAC_MASK_SIZE_U64);
202 BUILD_BUG_ON(SIZE_INTERNAL > S390_ARCH_FAC_LIST_SIZE_U64);
203 BUILD_BUG_ON(SIZE_INTERNAL * sizeof(unsigned long) >
204 sizeof(S390_lowcore.stfle_fac_list));
205
206 return SIZE_INTERNAL;
Michael Mueller78c4b592013-07-26 15:04:04 +0200207}
208
David Hildenbrand15c97052015-03-19 17:36:43 +0100209/* available cpu features supported by kvm */
210static DECLARE_BITMAP(kvm_s390_available_cpu_feat, KVM_S390_VM_CPU_FEAT_NR_BITS);
David Hildenbrand0a763c72016-05-18 16:03:47 +0200211/* available subfunctions indicated via query / "test bit" */
212static struct kvm_s390_vm_cpu_subfunc kvm_s390_available_subfunc;
David Hildenbrand15c97052015-03-19 17:36:43 +0100213
Michael Mueller9d8d5782015-02-02 15:42:51 +0100214static struct gmap_notifier gmap_notifier;
David Hildenbranda3508fb2015-07-08 13:19:48 +0200215static struct gmap_notifier vsie_gmap_notifier;
Christian Borntraeger78f26132015-07-22 15:50:58 +0200216debug_info_t *kvm_s390_dbf;
Michael Mueller9d8d5782015-02-02 15:42:51 +0100217
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100218/* Section: not file related */
Radim Krčmář13a34e02014-08-28 15:13:03 +0200219int kvm_arch_hardware_enable(void)
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100220{
221 /* every s390 is virtualization enabled ;-) */
Alexander Graf10474ae2009-09-15 11:37:46 +0200222 return 0;
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100223}
224
Martin Schwidefsky414d3b02016-03-08 11:52:54 +0100225static void kvm_gmap_notifier(struct gmap *gmap, unsigned long start,
226 unsigned long end);
Christian Borntraeger2c70fe42013-05-17 14:41:36 +0200227
David Hildenbrand15757672018-02-07 12:46:45 +0100228static void kvm_clock_sync_scb(struct kvm_s390_sie_block *scb, u64 delta)
229{
230 u8 delta_idx = 0;
231
232 /*
233 * The TOD jumps by delta, we have to compensate this by adding
234 * -delta to the epoch.
235 */
236 delta = -delta;
237
238 /* sign-extension - we're adding to signed values below */
239 if ((s64)delta < 0)
240 delta_idx = -1;
241
242 scb->epoch += delta;
243 if (scb->ecd & ECD_MEF) {
244 scb->epdx += delta_idx;
245 if (scb->epoch < delta)
246 scb->epdx += 1;
247 }
248}
249
Fan Zhangfdf03652015-05-13 10:58:41 +0200250/*
251 * This callback is executed during stop_machine(). All CPUs are therefore
252 * temporarily stopped. In order not to change guest behavior, we have to
253 * disable preemption whenever we touch the epoch of kvm and the VCPUs,
254 * so a CPU won't be stopped while calculating with the epoch.
255 */
256static int kvm_clock_sync(struct notifier_block *notifier, unsigned long val,
257 void *v)
258{
259 struct kvm *kvm;
260 struct kvm_vcpu *vcpu;
261 int i;
262 unsigned long long *delta = v;
263
264 list_for_each_entry(kvm, &vm_list, vm_list) {
Fan Zhangfdf03652015-05-13 10:58:41 +0200265 kvm_for_each_vcpu(i, vcpu, kvm) {
David Hildenbrand15757672018-02-07 12:46:45 +0100266 kvm_clock_sync_scb(vcpu->arch.sie_block, *delta);
267 if (i == 0) {
268 kvm->arch.epoch = vcpu->arch.sie_block->epoch;
269 kvm->arch.epdx = vcpu->arch.sie_block->epdx;
270 }
David Hildenbranddb0758b2016-02-15 09:42:25 +0100271 if (vcpu->arch.cputm_enabled)
272 vcpu->arch.cputm_start += *delta;
David Hildenbrand91473b42015-10-29 10:30:36 +0100273 if (vcpu->arch.vsie_block)
David Hildenbrand15757672018-02-07 12:46:45 +0100274 kvm_clock_sync_scb(vcpu->arch.vsie_block,
275 *delta);
Fan Zhangfdf03652015-05-13 10:58:41 +0200276 }
277 }
278 return NOTIFY_OK;
279}
280
281static struct notifier_block kvm_clock_notifier = {
282 .notifier_call = kvm_clock_sync,
283};
284
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100285int kvm_arch_hardware_setup(void)
286{
Christian Borntraeger2c70fe42013-05-17 14:41:36 +0200287 gmap_notifier.notifier_call = kvm_gmap_notifier;
Martin Schwidefskyb2d73b22016-03-08 11:54:42 +0100288 gmap_register_pte_notifier(&gmap_notifier);
David Hildenbranda3508fb2015-07-08 13:19:48 +0200289 vsie_gmap_notifier.notifier_call = kvm_s390_vsie_gmap_notifier;
290 gmap_register_pte_notifier(&vsie_gmap_notifier);
Fan Zhangfdf03652015-05-13 10:58:41 +0200291 atomic_notifier_chain_register(&s390_epoch_delta_notifier,
292 &kvm_clock_notifier);
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100293 return 0;
294}
295
296void kvm_arch_hardware_unsetup(void)
297{
Martin Schwidefskyb2d73b22016-03-08 11:54:42 +0100298 gmap_unregister_pte_notifier(&gmap_notifier);
David Hildenbranda3508fb2015-07-08 13:19:48 +0200299 gmap_unregister_pte_notifier(&vsie_gmap_notifier);
Fan Zhangfdf03652015-05-13 10:58:41 +0200300 atomic_notifier_chain_unregister(&s390_epoch_delta_notifier,
301 &kvm_clock_notifier);
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100302}
303
David Hildenbrand22be5a132016-01-21 13:22:54 +0100304static void allow_cpu_feat(unsigned long nr)
305{
306 set_bit_inv(nr, kvm_s390_available_cpu_feat);
307}
308
David Hildenbrand0a763c72016-05-18 16:03:47 +0200309static inline int plo_test_bit(unsigned char nr)
310{
311 register unsigned long r0 asm("0") = (unsigned long) nr | 0x100;
Heiko Carstensd051ae52016-12-13 14:25:32 +0100312 int cc;
David Hildenbrand0a763c72016-05-18 16:03:47 +0200313
314 asm volatile(
315 /* Parameter registers are ignored for "test bit" */
316 " plo 0,0,0,0(0)\n"
317 " ipm %0\n"
318 " srl %0,28\n"
319 : "=d" (cc)
320 : "d" (r0)
321 : "cc");
322 return cc == 0;
323}
324
David Hildenbrand22be5a132016-01-21 13:22:54 +0100325static void kvm_s390_cpu_feat_init(void)
326{
David Hildenbrand0a763c72016-05-18 16:03:47 +0200327 int i;
328
329 for (i = 0; i < 256; ++i) {
330 if (plo_test_bit(i))
331 kvm_s390_available_subfunc.plo[i >> 3] |= 0x80 >> (i & 7);
332 }
333
334 if (test_facility(28)) /* TOD-clock steering */
Linus Torvalds221bb8a2016-08-02 16:11:27 -0400335 ptff(kvm_s390_available_subfunc.ptff,
336 sizeof(kvm_s390_available_subfunc.ptff),
337 PTFF_QAF);
David Hildenbrand0a763c72016-05-18 16:03:47 +0200338
339 if (test_facility(17)) { /* MSA */
Martin Schwidefsky69c0e362016-08-18 12:59:46 +0200340 __cpacf_query(CPACF_KMAC, (cpacf_mask_t *)
341 kvm_s390_available_subfunc.kmac);
342 __cpacf_query(CPACF_KMC, (cpacf_mask_t *)
343 kvm_s390_available_subfunc.kmc);
344 __cpacf_query(CPACF_KM, (cpacf_mask_t *)
345 kvm_s390_available_subfunc.km);
346 __cpacf_query(CPACF_KIMD, (cpacf_mask_t *)
347 kvm_s390_available_subfunc.kimd);
348 __cpacf_query(CPACF_KLMD, (cpacf_mask_t *)
349 kvm_s390_available_subfunc.klmd);
David Hildenbrand0a763c72016-05-18 16:03:47 +0200350 }
351 if (test_facility(76)) /* MSA3 */
Martin Schwidefsky69c0e362016-08-18 12:59:46 +0200352 __cpacf_query(CPACF_PCKMO, (cpacf_mask_t *)
353 kvm_s390_available_subfunc.pckmo);
David Hildenbrand0a763c72016-05-18 16:03:47 +0200354 if (test_facility(77)) { /* MSA4 */
Martin Schwidefsky69c0e362016-08-18 12:59:46 +0200355 __cpacf_query(CPACF_KMCTR, (cpacf_mask_t *)
356 kvm_s390_available_subfunc.kmctr);
357 __cpacf_query(CPACF_KMF, (cpacf_mask_t *)
358 kvm_s390_available_subfunc.kmf);
359 __cpacf_query(CPACF_KMO, (cpacf_mask_t *)
360 kvm_s390_available_subfunc.kmo);
361 __cpacf_query(CPACF_PCC, (cpacf_mask_t *)
362 kvm_s390_available_subfunc.pcc);
David Hildenbrand0a763c72016-05-18 16:03:47 +0200363 }
364 if (test_facility(57)) /* MSA5 */
Harald Freudenberger985a9d22017-02-24 10:11:54 +0100365 __cpacf_query(CPACF_PRNO, (cpacf_mask_t *)
Martin Schwidefsky69c0e362016-08-18 12:59:46 +0200366 kvm_s390_available_subfunc.ppno);
David Hildenbrand0a763c72016-05-18 16:03:47 +0200367
Jason J. Hernee000b8e2017-03-20 09:57:42 -0400368 if (test_facility(146)) /* MSA8 */
369 __cpacf_query(CPACF_KMA, (cpacf_mask_t *)
370 kvm_s390_available_subfunc.kma);
371
David Hildenbrand22be5a132016-01-21 13:22:54 +0100372 if (MACHINE_HAS_ESOP)
373 allow_cpu_feat(KVM_S390_VM_CPU_FEAT_ESOP);
David Hildenbranda3508fb2015-07-08 13:19:48 +0200374 /*
375 * We need SIE support, ESOP (PROT_READ protection for gmap_shadow),
376 * 64bit SCAO (SCA passthrough) and IDTE (for gmap_shadow unshadowing).
377 */
378 if (!sclp.has_sief2 || !MACHINE_HAS_ESOP || !sclp.has_64bscao ||
David Hildenbranda411edf2016-02-02 15:41:22 +0100379 !test_facility(3) || !nested)
David Hildenbranda3508fb2015-07-08 13:19:48 +0200380 return;
381 allow_cpu_feat(KVM_S390_VM_CPU_FEAT_SIEF2);
David Hildenbrand19c439b2015-11-25 11:02:26 +0100382 if (sclp.has_64bscao)
383 allow_cpu_feat(KVM_S390_VM_CPU_FEAT_64BSCAO);
David Hildenbrand0615a322015-11-25 09:59:49 +0100384 if (sclp.has_siif)
385 allow_cpu_feat(KVM_S390_VM_CPU_FEAT_SIIF);
David Hildenbrand77d18f62015-11-24 16:32:35 +0100386 if (sclp.has_gpere)
387 allow_cpu_feat(KVM_S390_VM_CPU_FEAT_GPERE);
David Hildenbranda1b7b9b2015-11-24 16:41:33 +0100388 if (sclp.has_gsls)
389 allow_cpu_feat(KVM_S390_VM_CPU_FEAT_GSLS);
David Hildenbrand5630a8e2015-11-24 16:53:51 +0100390 if (sclp.has_ib)
391 allow_cpu_feat(KVM_S390_VM_CPU_FEAT_IB);
David Hildenbrand13ee3f62015-11-24 16:54:37 +0100392 if (sclp.has_cei)
393 allow_cpu_feat(KVM_S390_VM_CPU_FEAT_CEI);
David Hildenbrand7fd7f392015-11-24 16:56:23 +0100394 if (sclp.has_ibs)
395 allow_cpu_feat(KVM_S390_VM_CPU_FEAT_IBS);
Farhan Ali730cd632017-02-24 16:12:56 -0500396 if (sclp.has_kss)
397 allow_cpu_feat(KVM_S390_VM_CPU_FEAT_KSS);
David Hildenbrand5d3876a2016-04-13 17:06:50 +0200398 /*
399 * KVM_S390_VM_CPU_FEAT_SKEY: Wrong shadow of PTE.I bits will make
400 * all skey handling functions read/set the skey from the PGSTE
401 * instead of the real storage key.
402 *
403 * KVM_S390_VM_CPU_FEAT_CMMA: Wrong shadow of PTE.I bits will make
404 * pages being detected as preserved although they are resident.
405 *
406 * KVM_S390_VM_CPU_FEAT_PFMFI: Wrong shadow of PTE.I bits will
407 * have the same effect as for KVM_S390_VM_CPU_FEAT_SKEY.
408 *
409 * For KVM_S390_VM_CPU_FEAT_SKEY, KVM_S390_VM_CPU_FEAT_CMMA and
410 * KVM_S390_VM_CPU_FEAT_PFMFI, all PTE.I and PGSTE bits have to be
411 * correctly shadowed. We can do that for the PGSTE but not for PTE.I.
412 *
413 * KVM_S390_VM_CPU_FEAT_SIGPIF: Wrong SCB addresses in the SCA. We
414 * cannot easily shadow the SCA because of the ipte lock.
415 */
David Hildenbrand22be5a132016-01-21 13:22:54 +0100416}
417
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100418int kvm_arch_init(void *opaque)
419{
Christian Borntraeger78f26132015-07-22 15:50:58 +0200420 kvm_s390_dbf = debug_register("kvm-trace", 32, 1, 7 * sizeof(long));
421 if (!kvm_s390_dbf)
422 return -ENOMEM;
423
424 if (debug_register_view(kvm_s390_dbf, &debug_sprintf_view)) {
425 debug_unregister(kvm_s390_dbf);
426 return -ENOMEM;
427 }
428
David Hildenbrand22be5a132016-01-21 13:22:54 +0100429 kvm_s390_cpu_feat_init();
430
Cornelia Huck84877d92014-09-02 10:27:35 +0100431 /* Register floating interrupt controller interface. */
432 return kvm_register_device_ops(&kvm_flic_ops, KVM_DEV_TYPE_FLIC);
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100433}
434
Christian Borntraeger78f26132015-07-22 15:50:58 +0200435void kvm_arch_exit(void)
436{
437 debug_unregister(kvm_s390_dbf);
438}
439
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100440/* Section: device related */
441long kvm_arch_dev_ioctl(struct file *filp,
442 unsigned int ioctl, unsigned long arg)
443{
444 if (ioctl == KVM_S390_ENABLE_SIE)
445 return s390_enable_sie();
446 return -EINVAL;
447}
448
Alexander Graf784aa3d2014-07-14 18:27:35 +0200449int kvm_vm_ioctl_check_extension(struct kvm *kvm, long ext)
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100450{
Carsten Otted7b0b5e2009-11-19 14:21:16 +0100451 int r;
452
Carsten Otte2bd0ac42008-07-25 15:49:13 +0200453 switch (ext) {
Carsten Otted7b0b5e2009-11-19 14:21:16 +0100454 case KVM_CAP_S390_PSW:
Christian Borntraegerb6cf8782011-09-20 17:07:29 +0200455 case KVM_CAP_S390_GMAP:
Christian Borntraeger52e16b12011-11-17 11:00:44 +0100456 case KVM_CAP_SYNC_MMU:
Carsten Otte1efd0f52012-01-04 10:25:29 +0100457#ifdef CONFIG_KVM_S390_UCONTROL
458 case KVM_CAP_S390_UCONTROL:
459#endif
Dominik Dingel3c038e62013-10-07 17:11:48 +0200460 case KVM_CAP_ASYNC_PF:
Christian Borntraeger60b413c2012-01-11 11:20:31 +0100461 case KVM_CAP_SYNC_REGS:
Carsten Otte14eebd92012-05-15 14:15:26 +0200462 case KVM_CAP_ONE_REG:
Cornelia Huckd6712df2012-12-20 15:32:11 +0100463 case KVM_CAP_ENABLE_CAP:
Cornelia Huckfa6b7fe2012-12-20 15:32:12 +0100464 case KVM_CAP_S390_CSS_SUPPORT:
Cornelia Huck10ccaa12013-02-28 12:33:21 +0100465 case KVM_CAP_IOEVENTFD:
Jens Freimannc05c4182013-10-07 16:13:45 +0200466 case KVM_CAP_DEVICE_CTRL:
Cornelia Huckd938dc52013-10-23 18:26:34 +0200467 case KVM_CAP_ENABLE_CAP_VM:
Cornelia Huck78599d92014-07-15 09:54:39 +0200468 case KVM_CAP_S390_IRQCHIP:
Dominik Dingelf2061652014-04-09 13:13:00 +0200469 case KVM_CAP_VM_ATTRIBUTES:
David Hildenbrand6352e4d2014-04-10 17:35:00 +0200470 case KVM_CAP_MP_STATE:
Paolo Bonzini460df4c2017-02-08 11:50:15 +0100471 case KVM_CAP_IMMEDIATE_EXIT:
Jens Freimann47b43c52014-11-11 20:57:06 +0100472 case KVM_CAP_S390_INJECT_IRQ:
David Hildenbrand2444b352014-10-09 14:10:13 +0200473 case KVM_CAP_S390_USER_SIGP:
Ekaterina Tumanovae44fc8c2015-01-30 16:55:56 +0100474 case KVM_CAP_S390_USER_STSI:
Jason J. Herne30ee2a92014-09-23 09:23:01 -0400475 case KVM_CAP_S390_SKEYS:
Jens Freimann816c7662014-11-24 17:13:46 +0100476 case KVM_CAP_S390_IRQ_STATE:
David Hildenbrand6502a342016-06-21 14:19:51 +0200477 case KVM_CAP_S390_USER_INSTR0:
Claudio Imbrenda4036e382016-08-04 17:58:47 +0200478 case KVM_CAP_S390_CMMA_MIGRATION:
Yi Min Zhao47a46932017-03-10 09:29:38 +0100479 case KVM_CAP_S390_AIS:
Christian Borntraegerda9a1442017-11-09 10:00:45 +0100480 case KVM_CAP_S390_AIS_MIGRATION:
Carsten Otted7b0b5e2009-11-19 14:21:16 +0100481 r = 1;
482 break;
Janosch Franka4499382018-07-13 11:28:31 +0100483 case KVM_CAP_S390_HPAGE_1M:
484 r = 0;
485 if (hpage)
486 r = 1;
487 break;
Thomas Huth41408c282015-02-06 15:01:21 +0100488 case KVM_CAP_S390_MEM_OP:
489 r = MEM_OP_MAX_SIZE;
490 break;
Christian Borntraegere726b1b2012-05-02 10:50:38 +0200491 case KVM_CAP_NR_VCPUS:
492 case KVM_CAP_MAX_VCPUS:
David Hildenbrand76a6dd72015-11-24 13:33:49 +0100493 r = KVM_S390_BSCA_CPU_SLOTS;
David Hildenbranda6940672016-08-08 22:39:32 +0200494 if (!kvm_s390_use_sca_entries())
495 r = KVM_MAX_VCPUS;
496 else if (sclp.has_esca && sclp.has_64bscao)
David Hildenbrand76a6dd72015-11-24 13:33:49 +0100497 r = KVM_S390_ESCA_CPU_SLOTS;
Christian Borntraegere726b1b2012-05-02 10:50:38 +0200498 break;
Nick Wange1e2e602013-03-25 17:22:58 +0100499 case KVM_CAP_NR_MEMSLOTS:
500 r = KVM_USER_MEM_SLOTS;
501 break;
Christian Borntraeger1526bf92012-05-15 14:15:25 +0200502 case KVM_CAP_S390_COW:
Martin Schwidefskyabf09be2012-11-07 13:17:37 +0100503 r = MACHINE_HAS_ESOP;
Christian Borntraeger1526bf92012-05-15 14:15:25 +0200504 break;
Eric Farman68c55752014-06-09 10:57:26 -0400505 case KVM_CAP_S390_VECTOR_REGISTERS:
506 r = MACHINE_HAS_VX;
507 break;
Fan Zhangc6e5f162016-01-07 18:24:29 +0800508 case KVM_CAP_S390_RI:
509 r = test_facility(64);
510 break;
Fan Zhang4e0b1ab2016-11-29 07:17:55 +0100511 case KVM_CAP_S390_GS:
512 r = test_facility(133);
513 break;
Christian Borntraeger35b3fde2018-01-17 14:44:34 +0100514 case KVM_CAP_S390_BPB:
515 r = test_facility(82);
516 break;
Carsten Otte2bd0ac42008-07-25 15:49:13 +0200517 default:
Carsten Otted7b0b5e2009-11-19 14:21:16 +0100518 r = 0;
Carsten Otte2bd0ac42008-07-25 15:49:13 +0200519 }
Carsten Otted7b0b5e2009-11-19 14:21:16 +0100520 return r;
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100521}
522
Jason J. Herne15f36eb2012-08-02 10:10:17 -0400523static void kvm_s390_sync_dirty_log(struct kvm *kvm,
Janosch Frank0959e162018-07-17 13:21:22 +0100524 struct kvm_memory_slot *memslot)
Jason J. Herne15f36eb2012-08-02 10:10:17 -0400525{
Janosch Frank0959e162018-07-17 13:21:22 +0100526 int i;
Jason J. Herne15f36eb2012-08-02 10:10:17 -0400527 gfn_t cur_gfn, last_gfn;
Janosch Frank0959e162018-07-17 13:21:22 +0100528 unsigned long gaddr, vmaddr;
Jason J. Herne15f36eb2012-08-02 10:10:17 -0400529 struct gmap *gmap = kvm->arch.gmap;
Janosch Frank0959e162018-07-17 13:21:22 +0100530 DECLARE_BITMAP(bitmap, _PAGE_ENTRIES);
Jason J. Herne15f36eb2012-08-02 10:10:17 -0400531
Janosch Frank0959e162018-07-17 13:21:22 +0100532 /* Loop over all guest segments */
533 cur_gfn = memslot->base_gfn;
Jason J. Herne15f36eb2012-08-02 10:10:17 -0400534 last_gfn = memslot->base_gfn + memslot->npages;
Janosch Frank0959e162018-07-17 13:21:22 +0100535 for (; cur_gfn <= last_gfn; cur_gfn += _PAGE_ENTRIES) {
536 gaddr = gfn_to_gpa(cur_gfn);
537 vmaddr = gfn_to_hva_memslot(memslot, cur_gfn);
538 if (kvm_is_error_hva(vmaddr))
539 continue;
Jason J. Herne15f36eb2012-08-02 10:10:17 -0400540
Janosch Frank0959e162018-07-17 13:21:22 +0100541 bitmap_zero(bitmap, _PAGE_ENTRIES);
542 gmap_sync_dirty_log_pmd(gmap, bitmap, gaddr, vmaddr);
543 for (i = 0; i < _PAGE_ENTRIES; i++) {
544 if (test_bit(i, bitmap))
545 mark_page_dirty(kvm, cur_gfn + i);
546 }
547
Christian Borntraeger1763f8d2016-02-03 11:12:34 +0100548 if (fatal_signal_pending(current))
549 return;
Christian Borntraeger70c88a02016-02-02 15:15:56 +0100550 cond_resched();
Jason J. Herne15f36eb2012-08-02 10:10:17 -0400551 }
Jason J. Herne15f36eb2012-08-02 10:10:17 -0400552}
553
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100554/* Section: vm related */
Eugene (jno) Dvurechenskia6e2f682015-04-21 15:31:59 +0200555static void sca_del_vcpu(struct kvm_vcpu *vcpu);
556
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100557/*
558 * Get (and clear) the dirty memory log for a memory slot.
559 */
560int kvm_vm_ioctl_get_dirty_log(struct kvm *kvm,
561 struct kvm_dirty_log *log)
562{
Jason J. Herne15f36eb2012-08-02 10:10:17 -0400563 int r;
564 unsigned long n;
Paolo Bonzini9f6b8022015-05-17 16:20:07 +0200565 struct kvm_memslots *slots;
Jason J. Herne15f36eb2012-08-02 10:10:17 -0400566 struct kvm_memory_slot *memslot;
567 int is_dirty = 0;
568
Janosch Franke1e8a962017-02-02 16:39:31 +0100569 if (kvm_is_ucontrol(kvm))
570 return -EINVAL;
571
Jason J. Herne15f36eb2012-08-02 10:10:17 -0400572 mutex_lock(&kvm->slots_lock);
573
574 r = -EINVAL;
575 if (log->slot >= KVM_USER_MEM_SLOTS)
576 goto out;
577
Paolo Bonzini9f6b8022015-05-17 16:20:07 +0200578 slots = kvm_memslots(kvm);
579 memslot = id_to_memslot(slots, log->slot);
Jason J. Herne15f36eb2012-08-02 10:10:17 -0400580 r = -ENOENT;
581 if (!memslot->dirty_bitmap)
582 goto out;
583
584 kvm_s390_sync_dirty_log(kvm, memslot);
585 r = kvm_get_dirty_log(kvm, log, &is_dirty);
586 if (r)
587 goto out;
588
589 /* Clear the dirty log */
590 if (is_dirty) {
591 n = kvm_dirty_bitmap_bytes(memslot);
592 memset(memslot->dirty_bitmap, 0, n);
593 }
594 r = 0;
595out:
596 mutex_unlock(&kvm->slots_lock);
597 return r;
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100598}
599
David Hildenbrand6502a342016-06-21 14:19:51 +0200600static void icpt_operexc_on_all_vcpus(struct kvm *kvm)
601{
602 unsigned int i;
603 struct kvm_vcpu *vcpu;
604
605 kvm_for_each_vcpu(i, vcpu, kvm) {
606 kvm_s390_sync_request(KVM_REQ_ICPT_OPEREXC, vcpu);
607 }
608}
609
Cornelia Huckd938dc52013-10-23 18:26:34 +0200610static int kvm_vm_ioctl_enable_cap(struct kvm *kvm, struct kvm_enable_cap *cap)
611{
612 int r;
613
614 if (cap->flags)
615 return -EINVAL;
616
617 switch (cap->cap) {
Cornelia Huck84223592013-07-15 13:36:01 +0200618 case KVM_CAP_S390_IRQCHIP:
Christian Borntraegerc92ea7b2015-07-22 15:52:10 +0200619 VM_EVENT(kvm, 3, "%s", "ENABLE: CAP_S390_IRQCHIP");
Cornelia Huck84223592013-07-15 13:36:01 +0200620 kvm->arch.use_irqchip = 1;
621 r = 0;
622 break;
David Hildenbrand2444b352014-10-09 14:10:13 +0200623 case KVM_CAP_S390_USER_SIGP:
Christian Borntraegerc92ea7b2015-07-22 15:52:10 +0200624 VM_EVENT(kvm, 3, "%s", "ENABLE: CAP_S390_USER_SIGP");
David Hildenbrand2444b352014-10-09 14:10:13 +0200625 kvm->arch.user_sigp = 1;
626 r = 0;
627 break;
Eric Farman68c55752014-06-09 10:57:26 -0400628 case KVM_CAP_S390_VECTOR_REGISTERS:
David Hildenbrand5967c172015-11-06 12:08:48 +0100629 mutex_lock(&kvm->lock);
Paolo Bonzinia03825b2016-06-13 14:50:04 +0200630 if (kvm->created_vcpus) {
David Hildenbrand5967c172015-11-06 12:08:48 +0100631 r = -EBUSY;
632 } else if (MACHINE_HAS_VX) {
David Hildenbrandc54f0d62015-12-02 08:53:52 +0100633 set_kvm_facility(kvm->arch.model.fac_mask, 129);
634 set_kvm_facility(kvm->arch.model.fac_list, 129);
Guenther Hutzl2f87d942016-06-03 14:37:17 +0200635 if (test_facility(134)) {
636 set_kvm_facility(kvm->arch.model.fac_mask, 134);
637 set_kvm_facility(kvm->arch.model.fac_list, 134);
638 }
Maxim Samoylov53743aa2016-02-10 10:31:23 +0100639 if (test_facility(135)) {
640 set_kvm_facility(kvm->arch.model.fac_mask, 135);
641 set_kvm_facility(kvm->arch.model.fac_list, 135);
642 }
Michael Mueller18280d82015-03-16 16:05:41 +0100643 r = 0;
644 } else
645 r = -EINVAL;
David Hildenbrand5967c172015-11-06 12:08:48 +0100646 mutex_unlock(&kvm->lock);
Christian Borntraegerc92ea7b2015-07-22 15:52:10 +0200647 VM_EVENT(kvm, 3, "ENABLE: CAP_S390_VECTOR_REGISTERS %s",
648 r ? "(not available)" : "(success)");
Eric Farman68c55752014-06-09 10:57:26 -0400649 break;
Fan Zhangc6e5f162016-01-07 18:24:29 +0800650 case KVM_CAP_S390_RI:
651 r = -EINVAL;
652 mutex_lock(&kvm->lock);
Paolo Bonzinia03825b2016-06-13 14:50:04 +0200653 if (kvm->created_vcpus) {
Fan Zhangc6e5f162016-01-07 18:24:29 +0800654 r = -EBUSY;
655 } else if (test_facility(64)) {
David Hildenbrandc54f0d62015-12-02 08:53:52 +0100656 set_kvm_facility(kvm->arch.model.fac_mask, 64);
657 set_kvm_facility(kvm->arch.model.fac_list, 64);
Fan Zhangc6e5f162016-01-07 18:24:29 +0800658 r = 0;
659 }
660 mutex_unlock(&kvm->lock);
661 VM_EVENT(kvm, 3, "ENABLE: CAP_S390_RI %s",
662 r ? "(not available)" : "(success)");
663 break;
Yi Min Zhao47a46932017-03-10 09:29:38 +0100664 case KVM_CAP_S390_AIS:
665 mutex_lock(&kvm->lock);
666 if (kvm->created_vcpus) {
667 r = -EBUSY;
668 } else {
669 set_kvm_facility(kvm->arch.model.fac_mask, 72);
670 set_kvm_facility(kvm->arch.model.fac_list, 72);
Yi Min Zhao47a46932017-03-10 09:29:38 +0100671 r = 0;
672 }
673 mutex_unlock(&kvm->lock);
674 VM_EVENT(kvm, 3, "ENABLE: AIS %s",
675 r ? "(not available)" : "(success)");
676 break;
Fan Zhang4e0b1ab2016-11-29 07:17:55 +0100677 case KVM_CAP_S390_GS:
678 r = -EINVAL;
679 mutex_lock(&kvm->lock);
Christian Borntraeger241e3ec02017-11-16 15:12:52 +0100680 if (kvm->created_vcpus) {
Fan Zhang4e0b1ab2016-11-29 07:17:55 +0100681 r = -EBUSY;
682 } else if (test_facility(133)) {
683 set_kvm_facility(kvm->arch.model.fac_mask, 133);
684 set_kvm_facility(kvm->arch.model.fac_list, 133);
685 r = 0;
686 }
687 mutex_unlock(&kvm->lock);
688 VM_EVENT(kvm, 3, "ENABLE: CAP_S390_GS %s",
689 r ? "(not available)" : "(success)");
690 break;
Janosch Franka4499382018-07-13 11:28:31 +0100691 case KVM_CAP_S390_HPAGE_1M:
692 mutex_lock(&kvm->lock);
693 if (kvm->created_vcpus)
694 r = -EBUSY;
695 else if (!hpage || kvm->arch.use_cmma)
696 r = -EINVAL;
697 else {
698 r = 0;
Janosch Frankdf88f312018-08-30 16:14:18 +0200699 down_write(&kvm->mm->mmap_sem);
Janosch Franka4499382018-07-13 11:28:31 +0100700 kvm->mm->context.allow_gmap_hpage_1m = 1;
Janosch Frankdf88f312018-08-30 16:14:18 +0200701 up_write(&kvm->mm->mmap_sem);
Janosch Franka4499382018-07-13 11:28:31 +0100702 /*
703 * We might have to create fake 4k page
704 * tables. To avoid that the hardware works on
705 * stale PGSTEs, we emulate these instructions.
706 */
707 kvm->arch.use_skf = 0;
708 kvm->arch.use_pfmfi = 0;
709 }
710 mutex_unlock(&kvm->lock);
711 VM_EVENT(kvm, 3, "ENABLE: CAP_S390_HPAGE %s",
712 r ? "(not available)" : "(success)");
713 break;
Ekaterina Tumanovae44fc8c2015-01-30 16:55:56 +0100714 case KVM_CAP_S390_USER_STSI:
Christian Borntraegerc92ea7b2015-07-22 15:52:10 +0200715 VM_EVENT(kvm, 3, "%s", "ENABLE: CAP_S390_USER_STSI");
Ekaterina Tumanovae44fc8c2015-01-30 16:55:56 +0100716 kvm->arch.user_stsi = 1;
717 r = 0;
718 break;
David Hildenbrand6502a342016-06-21 14:19:51 +0200719 case KVM_CAP_S390_USER_INSTR0:
720 VM_EVENT(kvm, 3, "%s", "ENABLE: CAP_S390_USER_INSTR0");
721 kvm->arch.user_instr0 = 1;
722 icpt_operexc_on_all_vcpus(kvm);
723 r = 0;
724 break;
Cornelia Huckd938dc52013-10-23 18:26:34 +0200725 default:
726 r = -EINVAL;
727 break;
728 }
729 return r;
730}
731
Dominik Dingel8c0a7ce2014-10-31 14:10:41 +0100732static int kvm_s390_get_mem_control(struct kvm *kvm, struct kvm_device_attr *attr)
733{
734 int ret;
735
736 switch (attr->attr) {
737 case KVM_S390_VM_MEM_LIMIT_SIZE:
738 ret = 0;
Christian Borntraegerc92ea7b2015-07-22 15:52:10 +0200739 VM_EVENT(kvm, 3, "QUERY: max guest memory: %lu bytes",
Dominik Dingela3a92c32014-12-01 17:24:42 +0100740 kvm->arch.mem_limit);
741 if (put_user(kvm->arch.mem_limit, (u64 __user *)attr->addr))
Dominik Dingel8c0a7ce2014-10-31 14:10:41 +0100742 ret = -EFAULT;
743 break;
744 default:
745 ret = -ENXIO;
746 break;
747 }
748 return ret;
749}
750
751static int kvm_s390_set_mem_control(struct kvm *kvm, struct kvm_device_attr *attr)
Dominik Dingel4f718ea2014-04-09 13:13:00 +0200752{
753 int ret;
754 unsigned int idx;
755 switch (attr->attr) {
756 case KVM_S390_VM_MEM_ENABLE_CMMA:
David Hildenbrandf9cbd9b2016-03-03 09:48:47 +0100757 ret = -ENXIO;
David Hildenbrandc24cc9c2015-11-24 13:53:04 +0100758 if (!sclp.has_cmma)
Dominik Dingele6db1d62015-05-07 15:41:57 +0200759 break;
760
Christian Borntraegerc92ea7b2015-07-22 15:52:10 +0200761 VM_EVENT(kvm, 3, "%s", "ENABLE: CMMA support");
Dominik Dingel4f718ea2014-04-09 13:13:00 +0200762 mutex_lock(&kvm->lock);
Janosch Franka4499382018-07-13 11:28:31 +0100763 if (kvm->created_vcpus)
764 ret = -EBUSY;
765 else if (kvm->mm->context.allow_gmap_hpage_1m)
766 ret = -EINVAL;
767 else {
Dominik Dingel4f718ea2014-04-09 13:13:00 +0200768 kvm->arch.use_cmma = 1;
Janosch Frankc9f0a2b2018-02-16 12:16:14 +0100769 /* Not compatible with cmma. */
770 kvm->arch.use_pfmfi = 0;
Dominik Dingel4f718ea2014-04-09 13:13:00 +0200771 ret = 0;
772 }
773 mutex_unlock(&kvm->lock);
774 break;
775 case KVM_S390_VM_MEM_CLR_CMMA:
David Hildenbrandf9cbd9b2016-03-03 09:48:47 +0100776 ret = -ENXIO;
777 if (!sclp.has_cmma)
778 break;
Dominik Dingelc3489152015-06-18 13:17:11 +0200779 ret = -EINVAL;
780 if (!kvm->arch.use_cmma)
781 break;
782
Christian Borntraegerc92ea7b2015-07-22 15:52:10 +0200783 VM_EVENT(kvm, 3, "%s", "RESET: CMMA states");
Dominik Dingel4f718ea2014-04-09 13:13:00 +0200784 mutex_lock(&kvm->lock);
785 idx = srcu_read_lock(&kvm->srcu);
Dominik Dingela13cff32014-10-23 12:07:14 +0200786 s390_reset_cmma(kvm->arch.gmap->mm);
Dominik Dingel4f718ea2014-04-09 13:13:00 +0200787 srcu_read_unlock(&kvm->srcu, idx);
788 mutex_unlock(&kvm->lock);
789 ret = 0;
790 break;
Dominik Dingel8c0a7ce2014-10-31 14:10:41 +0100791 case KVM_S390_VM_MEM_LIMIT_SIZE: {
792 unsigned long new_limit;
793
794 if (kvm_is_ucontrol(kvm))
795 return -EINVAL;
796
797 if (get_user(new_limit, (u64 __user *)attr->addr))
798 return -EFAULT;
799
Dominik Dingela3a92c32014-12-01 17:24:42 +0100800 if (kvm->arch.mem_limit != KVM_S390_NO_MEM_LIMIT &&
801 new_limit > kvm->arch.mem_limit)
Dominik Dingel8c0a7ce2014-10-31 14:10:41 +0100802 return -E2BIG;
803
Dominik Dingela3a92c32014-12-01 17:24:42 +0100804 if (!new_limit)
805 return -EINVAL;
806
Martin Schwidefsky6ea427b2016-03-08 11:55:04 +0100807 /* gmap_create takes last usable address */
Dominik Dingela3a92c32014-12-01 17:24:42 +0100808 if (new_limit != KVM_S390_NO_MEM_LIMIT)
809 new_limit -= 1;
810
Dominik Dingel8c0a7ce2014-10-31 14:10:41 +0100811 ret = -EBUSY;
812 mutex_lock(&kvm->lock);
Paolo Bonzinia03825b2016-06-13 14:50:04 +0200813 if (!kvm->created_vcpus) {
Martin Schwidefsky6ea427b2016-03-08 11:55:04 +0100814 /* gmap_create will round the limit up */
815 struct gmap *new = gmap_create(current->mm, new_limit);
Dominik Dingel8c0a7ce2014-10-31 14:10:41 +0100816
817 if (!new) {
818 ret = -ENOMEM;
819 } else {
Martin Schwidefsky6ea427b2016-03-08 11:55:04 +0100820 gmap_remove(kvm->arch.gmap);
Dominik Dingel8c0a7ce2014-10-31 14:10:41 +0100821 new->private = kvm;
822 kvm->arch.gmap = new;
823 ret = 0;
824 }
825 }
826 mutex_unlock(&kvm->lock);
Dominik Dingela3a92c32014-12-01 17:24:42 +0100827 VM_EVENT(kvm, 3, "SET: max guest address: %lu", new_limit);
828 VM_EVENT(kvm, 3, "New guest asce: 0x%pK",
829 (void *) kvm->arch.gmap->asce);
Dominik Dingel8c0a7ce2014-10-31 14:10:41 +0100830 break;
831 }
Dominik Dingel4f718ea2014-04-09 13:13:00 +0200832 default:
833 ret = -ENXIO;
834 break;
835 }
836 return ret;
837}
838
Tony Krowiaka374e892014-09-03 10:13:53 +0200839static void kvm_s390_vcpu_crypto_setup(struct kvm_vcpu *vcpu);
840
Tony Krowiak20c922f2018-04-22 11:37:03 -0400841void kvm_s390_vcpu_crypto_reset_all(struct kvm *kvm)
Tony Krowiaka374e892014-09-03 10:13:53 +0200842{
843 struct kvm_vcpu *vcpu;
844 int i;
845
Tony Krowiak20c922f2018-04-22 11:37:03 -0400846 kvm_s390_vcpu_block_all(kvm);
847
David Hildenbrand3194cdb2018-09-25 19:16:17 -0400848 kvm_for_each_vcpu(i, vcpu, kvm) {
Tony Krowiak20c922f2018-04-22 11:37:03 -0400849 kvm_s390_vcpu_crypto_setup(vcpu);
David Hildenbrand3194cdb2018-09-25 19:16:17 -0400850 /* recreate the shadow crycb by leaving the VSIE handler */
851 kvm_s390_sync_request(KVM_REQ_VSIE_RESTART, vcpu);
852 }
Tony Krowiak20c922f2018-04-22 11:37:03 -0400853
854 kvm_s390_vcpu_unblock_all(kvm);
855}
856
857static int kvm_s390_vm_set_crypto(struct kvm *kvm, struct kvm_device_attr *attr)
858{
Michael Mueller9d8d5782015-02-02 15:42:51 +0100859 if (!test_kvm_facility(kvm, 76))
Tony Krowiaka374e892014-09-03 10:13:53 +0200860 return -EINVAL;
861
862 mutex_lock(&kvm->lock);
863 switch (attr->attr) {
864 case KVM_S390_VM_CRYPTO_ENABLE_AES_KW:
865 get_random_bytes(
866 kvm->arch.crypto.crycb->aes_wrapping_key_mask,
867 sizeof(kvm->arch.crypto.crycb->aes_wrapping_key_mask));
868 kvm->arch.crypto.aes_kw = 1;
Christian Borntraegerc92ea7b2015-07-22 15:52:10 +0200869 VM_EVENT(kvm, 3, "%s", "ENABLE: AES keywrapping support");
Tony Krowiaka374e892014-09-03 10:13:53 +0200870 break;
871 case KVM_S390_VM_CRYPTO_ENABLE_DEA_KW:
872 get_random_bytes(
873 kvm->arch.crypto.crycb->dea_wrapping_key_mask,
874 sizeof(kvm->arch.crypto.crycb->dea_wrapping_key_mask));
875 kvm->arch.crypto.dea_kw = 1;
Christian Borntraegerc92ea7b2015-07-22 15:52:10 +0200876 VM_EVENT(kvm, 3, "%s", "ENABLE: DEA keywrapping support");
Tony Krowiaka374e892014-09-03 10:13:53 +0200877 break;
878 case KVM_S390_VM_CRYPTO_DISABLE_AES_KW:
879 kvm->arch.crypto.aes_kw = 0;
880 memset(kvm->arch.crypto.crycb->aes_wrapping_key_mask, 0,
881 sizeof(kvm->arch.crypto.crycb->aes_wrapping_key_mask));
Christian Borntraegerc92ea7b2015-07-22 15:52:10 +0200882 VM_EVENT(kvm, 3, "%s", "DISABLE: AES keywrapping support");
Tony Krowiaka374e892014-09-03 10:13:53 +0200883 break;
884 case KVM_S390_VM_CRYPTO_DISABLE_DEA_KW:
885 kvm->arch.crypto.dea_kw = 0;
886 memset(kvm->arch.crypto.crycb->dea_wrapping_key_mask, 0,
887 sizeof(kvm->arch.crypto.crycb->dea_wrapping_key_mask));
Christian Borntraegerc92ea7b2015-07-22 15:52:10 +0200888 VM_EVENT(kvm, 3, "%s", "DISABLE: DEA keywrapping support");
Tony Krowiaka374e892014-09-03 10:13:53 +0200889 break;
890 default:
891 mutex_unlock(&kvm->lock);
892 return -ENXIO;
893 }
894
Tony Krowiak20c922f2018-04-22 11:37:03 -0400895 kvm_s390_vcpu_crypto_reset_all(kvm);
Tony Krowiaka374e892014-09-03 10:13:53 +0200896 mutex_unlock(&kvm->lock);
897 return 0;
898}
899
Claudio Imbrenda190df4a2016-08-04 17:54:42 +0200900static void kvm_s390_sync_request_broadcast(struct kvm *kvm, int req)
901{
902 int cx;
903 struct kvm_vcpu *vcpu;
904
905 kvm_for_each_vcpu(cx, vcpu, kvm)
906 kvm_s390_sync_request(req, vcpu);
907}
908
909/*
910 * Must be called with kvm->srcu held to avoid races on memslots, and with
Christian Borntraeger1de1ea72017-12-22 10:54:20 +0100911 * kvm->slots_lock to avoid races with ourselves and kvm_s390_vm_stop_migration.
Claudio Imbrenda190df4a2016-08-04 17:54:42 +0200912 */
913static int kvm_s390_vm_start_migration(struct kvm *kvm)
914{
Claudio Imbrenda190df4a2016-08-04 17:54:42 +0200915 struct kvm_memory_slot *ms;
Claudio Imbrenda190df4a2016-08-04 17:54:42 +0200916 struct kvm_memslots *slots;
Claudio Imbrendaafdad612018-04-30 18:33:25 +0200917 unsigned long ram_pages = 0;
Claudio Imbrenda190df4a2016-08-04 17:54:42 +0200918 int slotnr;
919
920 /* migration mode already enabled */
Claudio Imbrendaafdad612018-04-30 18:33:25 +0200921 if (kvm->arch.migration_mode)
Claudio Imbrenda190df4a2016-08-04 17:54:42 +0200922 return 0;
Claudio Imbrenda190df4a2016-08-04 17:54:42 +0200923 slots = kvm_memslots(kvm);
924 if (!slots || !slots->used_slots)
925 return -EINVAL;
926
Claudio Imbrendaafdad612018-04-30 18:33:25 +0200927 if (!kvm->arch.use_cmma) {
928 kvm->arch.migration_mode = 1;
929 return 0;
Claudio Imbrenda190df4a2016-08-04 17:54:42 +0200930 }
Claudio Imbrendaafdad612018-04-30 18:33:25 +0200931 /* mark all the pages in active slots as dirty */
932 for (slotnr = 0; slotnr < slots->used_slots; slotnr++) {
933 ms = slots->memslots + slotnr;
934 /*
935 * The second half of the bitmap is only used on x86,
936 * and would be wasted otherwise, so we put it to good
937 * use here to keep track of the state of the storage
938 * attributes.
939 */
940 memset(kvm_second_dirty_bitmap(ms), 0xff, kvm_dirty_bitmap_bytes(ms));
941 ram_pages += ms->npages;
942 }
943 atomic64_set(&kvm->arch.cmma_dirty_pages, ram_pages);
944 kvm->arch.migration_mode = 1;
945 kvm_s390_sync_request_broadcast(kvm, KVM_REQ_START_MIGRATION);
Claudio Imbrenda190df4a2016-08-04 17:54:42 +0200946 return 0;
947}
948
949/*
Christian Borntraeger1de1ea72017-12-22 10:54:20 +0100950 * Must be called with kvm->slots_lock to avoid races with ourselves and
Claudio Imbrenda190df4a2016-08-04 17:54:42 +0200951 * kvm_s390_vm_start_migration.
952 */
953static int kvm_s390_vm_stop_migration(struct kvm *kvm)
954{
Claudio Imbrenda190df4a2016-08-04 17:54:42 +0200955 /* migration mode already disabled */
Claudio Imbrendaafdad612018-04-30 18:33:25 +0200956 if (!kvm->arch.migration_mode)
Claudio Imbrenda190df4a2016-08-04 17:54:42 +0200957 return 0;
Claudio Imbrendaafdad612018-04-30 18:33:25 +0200958 kvm->arch.migration_mode = 0;
959 if (kvm->arch.use_cmma)
Claudio Imbrenda190df4a2016-08-04 17:54:42 +0200960 kvm_s390_sync_request_broadcast(kvm, KVM_REQ_STOP_MIGRATION);
Claudio Imbrenda190df4a2016-08-04 17:54:42 +0200961 return 0;
962}
963
964static int kvm_s390_vm_set_migration(struct kvm *kvm,
965 struct kvm_device_attr *attr)
966{
Christian Borntraeger1de1ea72017-12-22 10:54:20 +0100967 int res = -ENXIO;
Claudio Imbrenda190df4a2016-08-04 17:54:42 +0200968
Christian Borntraeger1de1ea72017-12-22 10:54:20 +0100969 mutex_lock(&kvm->slots_lock);
Claudio Imbrenda190df4a2016-08-04 17:54:42 +0200970 switch (attr->attr) {
971 case KVM_S390_VM_MIGRATION_START:
Claudio Imbrenda190df4a2016-08-04 17:54:42 +0200972 res = kvm_s390_vm_start_migration(kvm);
Claudio Imbrenda190df4a2016-08-04 17:54:42 +0200973 break;
974 case KVM_S390_VM_MIGRATION_STOP:
975 res = kvm_s390_vm_stop_migration(kvm);
976 break;
977 default:
978 break;
979 }
Christian Borntraeger1de1ea72017-12-22 10:54:20 +0100980 mutex_unlock(&kvm->slots_lock);
Claudio Imbrenda190df4a2016-08-04 17:54:42 +0200981
982 return res;
983}
984
985static int kvm_s390_vm_get_migration(struct kvm *kvm,
986 struct kvm_device_attr *attr)
987{
Claudio Imbrendaafdad612018-04-30 18:33:25 +0200988 u64 mig = kvm->arch.migration_mode;
Claudio Imbrenda190df4a2016-08-04 17:54:42 +0200989
990 if (attr->attr != KVM_S390_VM_MIGRATION_STATUS)
991 return -ENXIO;
992
993 if (copy_to_user((void __user *)attr->addr, &mig, sizeof(mig)))
994 return -EFAULT;
995 return 0;
996}
997
Collin L. Walling8fa16962016-07-26 15:29:44 -0400998static int kvm_s390_set_tod_ext(struct kvm *kvm, struct kvm_device_attr *attr)
999{
1000 struct kvm_s390_vm_tod_clock gtod;
1001
1002 if (copy_from_user(&gtod, (void __user *)attr->addr, sizeof(gtod)))
1003 return -EFAULT;
1004
David Hildenbrand0e7def52018-02-07 12:46:43 +01001005 if (!test_kvm_facility(kvm, 139) && gtod.epoch_idx)
Collin L. Walling8fa16962016-07-26 15:29:44 -04001006 return -EINVAL;
David Hildenbrand0e7def52018-02-07 12:46:43 +01001007 kvm_s390_set_tod_clock(kvm, &gtod);
Collin L. Walling8fa16962016-07-26 15:29:44 -04001008
1009 VM_EVENT(kvm, 3, "SET: TOD extension: 0x%x, TOD base: 0x%llx",
1010 gtod.epoch_idx, gtod.tod);
1011
1012 return 0;
1013}
1014
Jason J. Herne72f25022014-11-25 09:46:02 -05001015static int kvm_s390_set_tod_high(struct kvm *kvm, struct kvm_device_attr *attr)
1016{
1017 u8 gtod_high;
1018
1019 if (copy_from_user(&gtod_high, (void __user *)attr->addr,
1020 sizeof(gtod_high)))
1021 return -EFAULT;
1022
1023 if (gtod_high != 0)
1024 return -EINVAL;
Christian Borntraeger58c383c2015-10-12 13:27:29 +02001025 VM_EVENT(kvm, 3, "SET: TOD extension: 0x%x", gtod_high);
Jason J. Herne72f25022014-11-25 09:46:02 -05001026
1027 return 0;
1028}
1029
1030static int kvm_s390_set_tod_low(struct kvm *kvm, struct kvm_device_attr *attr)
1031{
David Hildenbrand0e7def52018-02-07 12:46:43 +01001032 struct kvm_s390_vm_tod_clock gtod = { 0 };
Jason J. Herne72f25022014-11-25 09:46:02 -05001033
David Hildenbrand0e7def52018-02-07 12:46:43 +01001034 if (copy_from_user(&gtod.tod, (void __user *)attr->addr,
1035 sizeof(gtod.tod)))
Jason J. Herne72f25022014-11-25 09:46:02 -05001036 return -EFAULT;
1037
David Hildenbrand0e7def52018-02-07 12:46:43 +01001038 kvm_s390_set_tod_clock(kvm, &gtod);
1039 VM_EVENT(kvm, 3, "SET: TOD base: 0x%llx", gtod.tod);
Jason J. Herne72f25022014-11-25 09:46:02 -05001040 return 0;
1041}
1042
1043static int kvm_s390_set_tod(struct kvm *kvm, struct kvm_device_attr *attr)
1044{
1045 int ret;
1046
1047 if (attr->flags)
1048 return -EINVAL;
1049
1050 switch (attr->attr) {
Collin L. Walling8fa16962016-07-26 15:29:44 -04001051 case KVM_S390_VM_TOD_EXT:
1052 ret = kvm_s390_set_tod_ext(kvm, attr);
1053 break;
Jason J. Herne72f25022014-11-25 09:46:02 -05001054 case KVM_S390_VM_TOD_HIGH:
1055 ret = kvm_s390_set_tod_high(kvm, attr);
1056 break;
1057 case KVM_S390_VM_TOD_LOW:
1058 ret = kvm_s390_set_tod_low(kvm, attr);
1059 break;
1060 default:
1061 ret = -ENXIO;
1062 break;
1063 }
1064 return ret;
1065}
1066
David Hildenbrand33d1b272018-04-27 14:36:13 +02001067static void kvm_s390_get_tod_clock(struct kvm *kvm,
1068 struct kvm_s390_vm_tod_clock *gtod)
Collin L. Walling8fa16962016-07-26 15:29:44 -04001069{
1070 struct kvm_s390_tod_clock_ext htod;
1071
1072 preempt_disable();
1073
1074 get_tod_clock_ext((char *)&htod);
1075
1076 gtod->tod = htod.tod + kvm->arch.epoch;
David Hildenbrand33d1b272018-04-27 14:36:13 +02001077 gtod->epoch_idx = 0;
1078 if (test_kvm_facility(kvm, 139)) {
1079 gtod->epoch_idx = htod.epoch_idx + kvm->arch.epdx;
1080 if (gtod->tod < htod.tod)
1081 gtod->epoch_idx += 1;
1082 }
Collin L. Walling8fa16962016-07-26 15:29:44 -04001083
1084 preempt_enable();
1085}
1086
1087static int kvm_s390_get_tod_ext(struct kvm *kvm, struct kvm_device_attr *attr)
1088{
1089 struct kvm_s390_vm_tod_clock gtod;
1090
1091 memset(&gtod, 0, sizeof(gtod));
David Hildenbrand33d1b272018-04-27 14:36:13 +02001092 kvm_s390_get_tod_clock(kvm, &gtod);
Collin L. Walling8fa16962016-07-26 15:29:44 -04001093 if (copy_to_user((void __user *)attr->addr, &gtod, sizeof(gtod)))
1094 return -EFAULT;
1095
1096 VM_EVENT(kvm, 3, "QUERY: TOD extension: 0x%x, TOD base: 0x%llx",
1097 gtod.epoch_idx, gtod.tod);
1098 return 0;
1099}
1100
Jason J. Herne72f25022014-11-25 09:46:02 -05001101static int kvm_s390_get_tod_high(struct kvm *kvm, struct kvm_device_attr *attr)
1102{
1103 u8 gtod_high = 0;
1104
1105 if (copy_to_user((void __user *)attr->addr, &gtod_high,
1106 sizeof(gtod_high)))
1107 return -EFAULT;
Christian Borntraeger58c383c2015-10-12 13:27:29 +02001108 VM_EVENT(kvm, 3, "QUERY: TOD extension: 0x%x", gtod_high);
Jason J. Herne72f25022014-11-25 09:46:02 -05001109
1110 return 0;
1111}
1112
1113static int kvm_s390_get_tod_low(struct kvm *kvm, struct kvm_device_attr *attr)
1114{
David Hildenbrand5a3d8832015-09-29 16:27:24 +02001115 u64 gtod;
Jason J. Herne72f25022014-11-25 09:46:02 -05001116
David Hildenbrand60417fc2015-09-29 16:20:36 +02001117 gtod = kvm_s390_get_tod_clock_fast(kvm);
Jason J. Herne72f25022014-11-25 09:46:02 -05001118 if (copy_to_user((void __user *)attr->addr, &gtod, sizeof(gtod)))
1119 return -EFAULT;
Christian Borntraeger58c383c2015-10-12 13:27:29 +02001120 VM_EVENT(kvm, 3, "QUERY: TOD base: 0x%llx", gtod);
Jason J. Herne72f25022014-11-25 09:46:02 -05001121
1122 return 0;
1123}
1124
1125static int kvm_s390_get_tod(struct kvm *kvm, struct kvm_device_attr *attr)
1126{
1127 int ret;
1128
1129 if (attr->flags)
1130 return -EINVAL;
1131
1132 switch (attr->attr) {
Collin L. Walling8fa16962016-07-26 15:29:44 -04001133 case KVM_S390_VM_TOD_EXT:
1134 ret = kvm_s390_get_tod_ext(kvm, attr);
1135 break;
Jason J. Herne72f25022014-11-25 09:46:02 -05001136 case KVM_S390_VM_TOD_HIGH:
1137 ret = kvm_s390_get_tod_high(kvm, attr);
1138 break;
1139 case KVM_S390_VM_TOD_LOW:
1140 ret = kvm_s390_get_tod_low(kvm, attr);
1141 break;
1142 default:
1143 ret = -ENXIO;
1144 break;
1145 }
1146 return ret;
1147}
1148
Michael Mueller658b6ed2015-02-02 15:49:35 +01001149static int kvm_s390_set_processor(struct kvm *kvm, struct kvm_device_attr *attr)
1150{
1151 struct kvm_s390_vm_cpu_processor *proc;
David Hildenbrand053dd232016-04-04 13:59:42 +02001152 u16 lowest_ibc, unblocked_ibc;
Michael Mueller658b6ed2015-02-02 15:49:35 +01001153 int ret = 0;
1154
1155 mutex_lock(&kvm->lock);
Paolo Bonzinia03825b2016-06-13 14:50:04 +02001156 if (kvm->created_vcpus) {
Michael Mueller658b6ed2015-02-02 15:49:35 +01001157 ret = -EBUSY;
1158 goto out;
1159 }
1160 proc = kzalloc(sizeof(*proc), GFP_KERNEL);
1161 if (!proc) {
1162 ret = -ENOMEM;
1163 goto out;
1164 }
1165 if (!copy_from_user(proc, (void __user *)attr->addr,
1166 sizeof(*proc))) {
David Hildenbrand9bb0ec02016-04-04 14:27:51 +02001167 kvm->arch.model.cpuid = proc->cpuid;
David Hildenbrand053dd232016-04-04 13:59:42 +02001168 lowest_ibc = sclp.ibc >> 16 & 0xfff;
1169 unblocked_ibc = sclp.ibc & 0xfff;
David Hildenbrand0487c442016-06-10 09:22:31 +02001170 if (lowest_ibc && proc->ibc) {
David Hildenbrand053dd232016-04-04 13:59:42 +02001171 if (proc->ibc > unblocked_ibc)
1172 kvm->arch.model.ibc = unblocked_ibc;
1173 else if (proc->ibc < lowest_ibc)
1174 kvm->arch.model.ibc = lowest_ibc;
1175 else
1176 kvm->arch.model.ibc = proc->ibc;
1177 }
David Hildenbrandc54f0d62015-12-02 08:53:52 +01001178 memcpy(kvm->arch.model.fac_list, proc->fac_list,
Michael Mueller658b6ed2015-02-02 15:49:35 +01001179 S390_ARCH_FAC_LIST_SIZE_BYTE);
Christian Borntraegera8c39dd2017-01-18 16:01:02 +01001180 VM_EVENT(kvm, 3, "SET: guest ibc: 0x%4.4x, guest cpuid: 0x%16.16llx",
1181 kvm->arch.model.ibc,
1182 kvm->arch.model.cpuid);
1183 VM_EVENT(kvm, 3, "SET: guest faclist: 0x%16.16llx.%16.16llx.%16.16llx",
1184 kvm->arch.model.fac_list[0],
1185 kvm->arch.model.fac_list[1],
1186 kvm->arch.model.fac_list[2]);
Michael Mueller658b6ed2015-02-02 15:49:35 +01001187 } else
1188 ret = -EFAULT;
1189 kfree(proc);
1190out:
1191 mutex_unlock(&kvm->lock);
1192 return ret;
1193}
1194
David Hildenbrand15c97052015-03-19 17:36:43 +01001195static int kvm_s390_set_processor_feat(struct kvm *kvm,
1196 struct kvm_device_attr *attr)
1197{
1198 struct kvm_s390_vm_cpu_feat data;
David Hildenbrand15c97052015-03-19 17:36:43 +01001199
1200 if (copy_from_user(&data, (void __user *)attr->addr, sizeof(data)))
1201 return -EFAULT;
1202 if (!bitmap_subset((unsigned long *) data.feat,
1203 kvm_s390_available_cpu_feat,
1204 KVM_S390_VM_CPU_FEAT_NR_BITS))
1205 return -EINVAL;
1206
1207 mutex_lock(&kvm->lock);
Christian Borntraeger2f8311c2017-11-16 12:30:15 +01001208 if (kvm->created_vcpus) {
1209 mutex_unlock(&kvm->lock);
1210 return -EBUSY;
David Hildenbrand15c97052015-03-19 17:36:43 +01001211 }
Christian Borntraeger2f8311c2017-11-16 12:30:15 +01001212 bitmap_copy(kvm->arch.cpu_feat, (unsigned long *) data.feat,
1213 KVM_S390_VM_CPU_FEAT_NR_BITS);
David Hildenbrand15c97052015-03-19 17:36:43 +01001214 mutex_unlock(&kvm->lock);
Christian Borntraeger2f8311c2017-11-16 12:30:15 +01001215 VM_EVENT(kvm, 3, "SET: guest feat: 0x%16.16llx.0x%16.16llx.0x%16.16llx",
1216 data.feat[0],
1217 data.feat[1],
1218 data.feat[2]);
1219 return 0;
David Hildenbrand15c97052015-03-19 17:36:43 +01001220}
1221
David Hildenbrand0a763c72016-05-18 16:03:47 +02001222static int kvm_s390_set_processor_subfunc(struct kvm *kvm,
1223 struct kvm_device_attr *attr)
1224{
1225 /*
1226 * Once supported by kernel + hw, we have to store the subfunctions
1227 * in kvm->arch and remember that user space configured them.
1228 */
1229 return -ENXIO;
1230}
1231
Michael Mueller658b6ed2015-02-02 15:49:35 +01001232static int kvm_s390_set_cpu_model(struct kvm *kvm, struct kvm_device_attr *attr)
1233{
1234 int ret = -ENXIO;
1235
1236 switch (attr->attr) {
1237 case KVM_S390_VM_CPU_PROCESSOR:
1238 ret = kvm_s390_set_processor(kvm, attr);
1239 break;
David Hildenbrand15c97052015-03-19 17:36:43 +01001240 case KVM_S390_VM_CPU_PROCESSOR_FEAT:
1241 ret = kvm_s390_set_processor_feat(kvm, attr);
1242 break;
David Hildenbrand0a763c72016-05-18 16:03:47 +02001243 case KVM_S390_VM_CPU_PROCESSOR_SUBFUNC:
1244 ret = kvm_s390_set_processor_subfunc(kvm, attr);
1245 break;
Michael Mueller658b6ed2015-02-02 15:49:35 +01001246 }
1247 return ret;
1248}
1249
1250static int kvm_s390_get_processor(struct kvm *kvm, struct kvm_device_attr *attr)
1251{
1252 struct kvm_s390_vm_cpu_processor *proc;
1253 int ret = 0;
1254
1255 proc = kzalloc(sizeof(*proc), GFP_KERNEL);
1256 if (!proc) {
1257 ret = -ENOMEM;
1258 goto out;
1259 }
David Hildenbrand9bb0ec02016-04-04 14:27:51 +02001260 proc->cpuid = kvm->arch.model.cpuid;
Michael Mueller658b6ed2015-02-02 15:49:35 +01001261 proc->ibc = kvm->arch.model.ibc;
David Hildenbrandc54f0d62015-12-02 08:53:52 +01001262 memcpy(&proc->fac_list, kvm->arch.model.fac_list,
1263 S390_ARCH_FAC_LIST_SIZE_BYTE);
Christian Borntraegera8c39dd2017-01-18 16:01:02 +01001264 VM_EVENT(kvm, 3, "GET: guest ibc: 0x%4.4x, guest cpuid: 0x%16.16llx",
1265 kvm->arch.model.ibc,
1266 kvm->arch.model.cpuid);
1267 VM_EVENT(kvm, 3, "GET: guest faclist: 0x%16.16llx.%16.16llx.%16.16llx",
1268 kvm->arch.model.fac_list[0],
1269 kvm->arch.model.fac_list[1],
1270 kvm->arch.model.fac_list[2]);
Michael Mueller658b6ed2015-02-02 15:49:35 +01001271 if (copy_to_user((void __user *)attr->addr, proc, sizeof(*proc)))
1272 ret = -EFAULT;
1273 kfree(proc);
1274out:
1275 return ret;
1276}
1277
1278static int kvm_s390_get_machine(struct kvm *kvm, struct kvm_device_attr *attr)
1279{
1280 struct kvm_s390_vm_cpu_machine *mach;
1281 int ret = 0;
1282
1283 mach = kzalloc(sizeof(*mach), GFP_KERNEL);
1284 if (!mach) {
1285 ret = -ENOMEM;
1286 goto out;
1287 }
1288 get_cpu_id((struct cpuid *) &mach->cpuid);
David Hildenbrand37c5f6c2015-05-06 13:18:59 +02001289 mach->ibc = sclp.ibc;
David Hildenbrandc54f0d62015-12-02 08:53:52 +01001290 memcpy(&mach->fac_mask, kvm->arch.model.fac_mask,
Michael Mueller981467c2015-02-24 13:51:04 +01001291 S390_ARCH_FAC_LIST_SIZE_BYTE);
Michael Mueller658b6ed2015-02-02 15:49:35 +01001292 memcpy((unsigned long *)&mach->fac_list, S390_lowcore.stfle_fac_list,
Christian Borntraeger04478192017-01-12 16:25:15 +01001293 sizeof(S390_lowcore.stfle_fac_list));
Christian Borntraegera8c39dd2017-01-18 16:01:02 +01001294 VM_EVENT(kvm, 3, "GET: host ibc: 0x%4.4x, host cpuid: 0x%16.16llx",
1295 kvm->arch.model.ibc,
1296 kvm->arch.model.cpuid);
1297 VM_EVENT(kvm, 3, "GET: host facmask: 0x%16.16llx.%16.16llx.%16.16llx",
1298 mach->fac_mask[0],
1299 mach->fac_mask[1],
1300 mach->fac_mask[2]);
1301 VM_EVENT(kvm, 3, "GET: host faclist: 0x%16.16llx.%16.16llx.%16.16llx",
1302 mach->fac_list[0],
1303 mach->fac_list[1],
1304 mach->fac_list[2]);
Michael Mueller658b6ed2015-02-02 15:49:35 +01001305 if (copy_to_user((void __user *)attr->addr, mach, sizeof(*mach)))
1306 ret = -EFAULT;
1307 kfree(mach);
1308out:
1309 return ret;
1310}
1311
David Hildenbrand15c97052015-03-19 17:36:43 +01001312static int kvm_s390_get_processor_feat(struct kvm *kvm,
1313 struct kvm_device_attr *attr)
1314{
1315 struct kvm_s390_vm_cpu_feat data;
1316
1317 bitmap_copy((unsigned long *) data.feat, kvm->arch.cpu_feat,
1318 KVM_S390_VM_CPU_FEAT_NR_BITS);
1319 if (copy_to_user((void __user *)attr->addr, &data, sizeof(data)))
1320 return -EFAULT;
Christian Borntraeger2f8311c2017-11-16 12:30:15 +01001321 VM_EVENT(kvm, 3, "GET: guest feat: 0x%16.16llx.0x%16.16llx.0x%16.16llx",
1322 data.feat[0],
1323 data.feat[1],
1324 data.feat[2]);
David Hildenbrand15c97052015-03-19 17:36:43 +01001325 return 0;
1326}
1327
1328static int kvm_s390_get_machine_feat(struct kvm *kvm,
1329 struct kvm_device_attr *attr)
1330{
1331 struct kvm_s390_vm_cpu_feat data;
1332
1333 bitmap_copy((unsigned long *) data.feat,
1334 kvm_s390_available_cpu_feat,
1335 KVM_S390_VM_CPU_FEAT_NR_BITS);
1336 if (copy_to_user((void __user *)attr->addr, &data, sizeof(data)))
1337 return -EFAULT;
Christian Borntraeger2f8311c2017-11-16 12:30:15 +01001338 VM_EVENT(kvm, 3, "GET: host feat: 0x%16.16llx.0x%16.16llx.0x%16.16llx",
1339 data.feat[0],
1340 data.feat[1],
1341 data.feat[2]);
David Hildenbrand15c97052015-03-19 17:36:43 +01001342 return 0;
1343}
1344
David Hildenbrand0a763c72016-05-18 16:03:47 +02001345static int kvm_s390_get_processor_subfunc(struct kvm *kvm,
1346 struct kvm_device_attr *attr)
1347{
1348 /*
1349 * Once we can actually configure subfunctions (kernel + hw support),
1350 * we have to check if they were already set by user space, if so copy
1351 * them from kvm->arch.
1352 */
1353 return -ENXIO;
1354}
1355
1356static int kvm_s390_get_machine_subfunc(struct kvm *kvm,
1357 struct kvm_device_attr *attr)
1358{
1359 if (copy_to_user((void __user *)attr->addr, &kvm_s390_available_subfunc,
1360 sizeof(struct kvm_s390_vm_cpu_subfunc)))
1361 return -EFAULT;
1362 return 0;
1363}
Michael Mueller658b6ed2015-02-02 15:49:35 +01001364static int kvm_s390_get_cpu_model(struct kvm *kvm, struct kvm_device_attr *attr)
1365{
1366 int ret = -ENXIO;
1367
1368 switch (attr->attr) {
1369 case KVM_S390_VM_CPU_PROCESSOR:
1370 ret = kvm_s390_get_processor(kvm, attr);
1371 break;
1372 case KVM_S390_VM_CPU_MACHINE:
1373 ret = kvm_s390_get_machine(kvm, attr);
1374 break;
David Hildenbrand15c97052015-03-19 17:36:43 +01001375 case KVM_S390_VM_CPU_PROCESSOR_FEAT:
1376 ret = kvm_s390_get_processor_feat(kvm, attr);
1377 break;
1378 case KVM_S390_VM_CPU_MACHINE_FEAT:
1379 ret = kvm_s390_get_machine_feat(kvm, attr);
1380 break;
David Hildenbrand0a763c72016-05-18 16:03:47 +02001381 case KVM_S390_VM_CPU_PROCESSOR_SUBFUNC:
1382 ret = kvm_s390_get_processor_subfunc(kvm, attr);
1383 break;
1384 case KVM_S390_VM_CPU_MACHINE_SUBFUNC:
1385 ret = kvm_s390_get_machine_subfunc(kvm, attr);
1386 break;
Michael Mueller658b6ed2015-02-02 15:49:35 +01001387 }
1388 return ret;
1389}
1390
Dominik Dingelf2061652014-04-09 13:13:00 +02001391static int kvm_s390_vm_set_attr(struct kvm *kvm, struct kvm_device_attr *attr)
1392{
1393 int ret;
1394
1395 switch (attr->group) {
Dominik Dingel4f718ea2014-04-09 13:13:00 +02001396 case KVM_S390_VM_MEM_CTRL:
Dominik Dingel8c0a7ce2014-10-31 14:10:41 +01001397 ret = kvm_s390_set_mem_control(kvm, attr);
Dominik Dingel4f718ea2014-04-09 13:13:00 +02001398 break;
Jason J. Herne72f25022014-11-25 09:46:02 -05001399 case KVM_S390_VM_TOD:
1400 ret = kvm_s390_set_tod(kvm, attr);
1401 break;
Michael Mueller658b6ed2015-02-02 15:49:35 +01001402 case KVM_S390_VM_CPU_MODEL:
1403 ret = kvm_s390_set_cpu_model(kvm, attr);
1404 break;
Tony Krowiaka374e892014-09-03 10:13:53 +02001405 case KVM_S390_VM_CRYPTO:
1406 ret = kvm_s390_vm_set_crypto(kvm, attr);
1407 break;
Claudio Imbrenda190df4a2016-08-04 17:54:42 +02001408 case KVM_S390_VM_MIGRATION:
1409 ret = kvm_s390_vm_set_migration(kvm, attr);
1410 break;
Dominik Dingelf2061652014-04-09 13:13:00 +02001411 default:
1412 ret = -ENXIO;
1413 break;
1414 }
1415
1416 return ret;
1417}
1418
1419static int kvm_s390_vm_get_attr(struct kvm *kvm, struct kvm_device_attr *attr)
1420{
Dominik Dingel8c0a7ce2014-10-31 14:10:41 +01001421 int ret;
1422
1423 switch (attr->group) {
1424 case KVM_S390_VM_MEM_CTRL:
1425 ret = kvm_s390_get_mem_control(kvm, attr);
1426 break;
Jason J. Herne72f25022014-11-25 09:46:02 -05001427 case KVM_S390_VM_TOD:
1428 ret = kvm_s390_get_tod(kvm, attr);
1429 break;
Michael Mueller658b6ed2015-02-02 15:49:35 +01001430 case KVM_S390_VM_CPU_MODEL:
1431 ret = kvm_s390_get_cpu_model(kvm, attr);
1432 break;
Claudio Imbrenda190df4a2016-08-04 17:54:42 +02001433 case KVM_S390_VM_MIGRATION:
1434 ret = kvm_s390_vm_get_migration(kvm, attr);
1435 break;
Dominik Dingel8c0a7ce2014-10-31 14:10:41 +01001436 default:
1437 ret = -ENXIO;
1438 break;
1439 }
1440
1441 return ret;
Dominik Dingelf2061652014-04-09 13:13:00 +02001442}
1443
1444static int kvm_s390_vm_has_attr(struct kvm *kvm, struct kvm_device_attr *attr)
1445{
1446 int ret;
1447
1448 switch (attr->group) {
Dominik Dingel4f718ea2014-04-09 13:13:00 +02001449 case KVM_S390_VM_MEM_CTRL:
1450 switch (attr->attr) {
1451 case KVM_S390_VM_MEM_ENABLE_CMMA:
1452 case KVM_S390_VM_MEM_CLR_CMMA:
David Hildenbrandf9cbd9b2016-03-03 09:48:47 +01001453 ret = sclp.has_cmma ? 0 : -ENXIO;
1454 break;
Dominik Dingel8c0a7ce2014-10-31 14:10:41 +01001455 case KVM_S390_VM_MEM_LIMIT_SIZE:
Dominik Dingel4f718ea2014-04-09 13:13:00 +02001456 ret = 0;
1457 break;
1458 default:
1459 ret = -ENXIO;
1460 break;
1461 }
1462 break;
Jason J. Herne72f25022014-11-25 09:46:02 -05001463 case KVM_S390_VM_TOD:
1464 switch (attr->attr) {
1465 case KVM_S390_VM_TOD_LOW:
1466 case KVM_S390_VM_TOD_HIGH:
1467 ret = 0;
1468 break;
1469 default:
1470 ret = -ENXIO;
1471 break;
1472 }
1473 break;
Michael Mueller658b6ed2015-02-02 15:49:35 +01001474 case KVM_S390_VM_CPU_MODEL:
1475 switch (attr->attr) {
1476 case KVM_S390_VM_CPU_PROCESSOR:
1477 case KVM_S390_VM_CPU_MACHINE:
David Hildenbrand15c97052015-03-19 17:36:43 +01001478 case KVM_S390_VM_CPU_PROCESSOR_FEAT:
1479 case KVM_S390_VM_CPU_MACHINE_FEAT:
David Hildenbrand0a763c72016-05-18 16:03:47 +02001480 case KVM_S390_VM_CPU_MACHINE_SUBFUNC:
Michael Mueller658b6ed2015-02-02 15:49:35 +01001481 ret = 0;
1482 break;
David Hildenbrand0a763c72016-05-18 16:03:47 +02001483 /* configuring subfunctions is not supported yet */
1484 case KVM_S390_VM_CPU_PROCESSOR_SUBFUNC:
Michael Mueller658b6ed2015-02-02 15:49:35 +01001485 default:
1486 ret = -ENXIO;
1487 break;
1488 }
1489 break;
Tony Krowiaka374e892014-09-03 10:13:53 +02001490 case KVM_S390_VM_CRYPTO:
1491 switch (attr->attr) {
1492 case KVM_S390_VM_CRYPTO_ENABLE_AES_KW:
1493 case KVM_S390_VM_CRYPTO_ENABLE_DEA_KW:
1494 case KVM_S390_VM_CRYPTO_DISABLE_AES_KW:
1495 case KVM_S390_VM_CRYPTO_DISABLE_DEA_KW:
1496 ret = 0;
1497 break;
1498 default:
1499 ret = -ENXIO;
1500 break;
1501 }
1502 break;
Claudio Imbrenda190df4a2016-08-04 17:54:42 +02001503 case KVM_S390_VM_MIGRATION:
1504 ret = 0;
1505 break;
Dominik Dingelf2061652014-04-09 13:13:00 +02001506 default:
1507 ret = -ENXIO;
1508 break;
1509 }
1510
1511 return ret;
1512}
1513
Jason J. Herne30ee2a92014-09-23 09:23:01 -04001514static long kvm_s390_get_skeys(struct kvm *kvm, struct kvm_s390_skeys *args)
1515{
1516 uint8_t *keys;
1517 uint64_t hva;
Christian Borntraeger4f899142017-07-10 13:35:48 +02001518 int srcu_idx, i, r = 0;
Jason J. Herne30ee2a92014-09-23 09:23:01 -04001519
1520 if (args->flags != 0)
1521 return -EINVAL;
1522
1523 /* Is this guest using storage keys? */
Janosch Frank55531b72018-02-15 16:33:47 +01001524 if (!mm_uses_skeys(current->mm))
Jason J. Herne30ee2a92014-09-23 09:23:01 -04001525 return KVM_S390_GET_SKEYS_NONE;
1526
1527 /* Enforce sane limit on memory allocation */
1528 if (args->count < 1 || args->count > KVM_S390_SKEYS_MAX)
1529 return -EINVAL;
1530
Michal Hocko752ade62017-05-08 15:57:27 -07001531 keys = kvmalloc_array(args->count, sizeof(uint8_t), GFP_KERNEL);
Jason J. Herne30ee2a92014-09-23 09:23:01 -04001532 if (!keys)
1533 return -ENOMEM;
1534
Martin Schwidefskyd3ed1ce2016-03-08 11:53:35 +01001535 down_read(&current->mm->mmap_sem);
Christian Borntraeger4f899142017-07-10 13:35:48 +02001536 srcu_idx = srcu_read_lock(&kvm->srcu);
Jason J. Herne30ee2a92014-09-23 09:23:01 -04001537 for (i = 0; i < args->count; i++) {
1538 hva = gfn_to_hva(kvm, args->start_gfn + i);
1539 if (kvm_is_error_hva(hva)) {
1540 r = -EFAULT;
Martin Schwidefskyd3ed1ce2016-03-08 11:53:35 +01001541 break;
Jason J. Herne30ee2a92014-09-23 09:23:01 -04001542 }
1543
David Hildenbrand154c8c12016-05-09 11:22:34 +02001544 r = get_guest_storage_key(current->mm, hva, &keys[i]);
1545 if (r)
Martin Schwidefskyd3ed1ce2016-03-08 11:53:35 +01001546 break;
Jason J. Herne30ee2a92014-09-23 09:23:01 -04001547 }
Christian Borntraeger4f899142017-07-10 13:35:48 +02001548 srcu_read_unlock(&kvm->srcu, srcu_idx);
Martin Schwidefskyd3ed1ce2016-03-08 11:53:35 +01001549 up_read(&current->mm->mmap_sem);
Jason J. Herne30ee2a92014-09-23 09:23:01 -04001550
Martin Schwidefskyd3ed1ce2016-03-08 11:53:35 +01001551 if (!r) {
1552 r = copy_to_user((uint8_t __user *)args->skeydata_addr, keys,
1553 sizeof(uint8_t) * args->count);
1554 if (r)
1555 r = -EFAULT;
Jason J. Herne30ee2a92014-09-23 09:23:01 -04001556 }
1557
Jason J. Herne30ee2a92014-09-23 09:23:01 -04001558 kvfree(keys);
1559 return r;
1560}
1561
1562static long kvm_s390_set_skeys(struct kvm *kvm, struct kvm_s390_skeys *args)
1563{
1564 uint8_t *keys;
1565 uint64_t hva;
Christian Borntraeger4f899142017-07-10 13:35:48 +02001566 int srcu_idx, i, r = 0;
Janosch Frankbd096f62018-07-18 13:40:22 +01001567 bool unlocked;
Jason J. Herne30ee2a92014-09-23 09:23:01 -04001568
1569 if (args->flags != 0)
1570 return -EINVAL;
1571
1572 /* Enforce sane limit on memory allocation */
1573 if (args->count < 1 || args->count > KVM_S390_SKEYS_MAX)
1574 return -EINVAL;
1575
Michal Hocko752ade62017-05-08 15:57:27 -07001576 keys = kvmalloc_array(args->count, sizeof(uint8_t), GFP_KERNEL);
Jason J. Herne30ee2a92014-09-23 09:23:01 -04001577 if (!keys)
1578 return -ENOMEM;
1579
1580 r = copy_from_user(keys, (uint8_t __user *)args->skeydata_addr,
1581 sizeof(uint8_t) * args->count);
1582 if (r) {
1583 r = -EFAULT;
1584 goto out;
1585 }
1586
1587 /* Enable storage key handling for the guest */
Dominik Dingel14d4a422015-05-07 15:16:13 +02001588 r = s390_enable_skey();
1589 if (r)
1590 goto out;
Jason J. Herne30ee2a92014-09-23 09:23:01 -04001591
Janosch Frankbd096f62018-07-18 13:40:22 +01001592 i = 0;
Martin Schwidefskyd3ed1ce2016-03-08 11:53:35 +01001593 down_read(&current->mm->mmap_sem);
Christian Borntraeger4f899142017-07-10 13:35:48 +02001594 srcu_idx = srcu_read_lock(&kvm->srcu);
Janosch Frankbd096f62018-07-18 13:40:22 +01001595 while (i < args->count) {
1596 unlocked = false;
Jason J. Herne30ee2a92014-09-23 09:23:01 -04001597 hva = gfn_to_hva(kvm, args->start_gfn + i);
1598 if (kvm_is_error_hva(hva)) {
1599 r = -EFAULT;
Martin Schwidefskyd3ed1ce2016-03-08 11:53:35 +01001600 break;
Jason J. Herne30ee2a92014-09-23 09:23:01 -04001601 }
1602
1603 /* Lowest order bit is reserved */
1604 if (keys[i] & 0x01) {
1605 r = -EINVAL;
Martin Schwidefskyd3ed1ce2016-03-08 11:53:35 +01001606 break;
Jason J. Herne30ee2a92014-09-23 09:23:01 -04001607 }
1608
David Hildenbrandfe69eab2016-05-09 13:08:07 +02001609 r = set_guest_storage_key(current->mm, hva, keys[i], 0);
Janosch Frankbd096f62018-07-18 13:40:22 +01001610 if (r) {
1611 r = fixup_user_fault(current, current->mm, hva,
1612 FAULT_FLAG_WRITE, &unlocked);
1613 if (r)
1614 break;
1615 }
1616 if (!r)
1617 i++;
Jason J. Herne30ee2a92014-09-23 09:23:01 -04001618 }
Christian Borntraeger4f899142017-07-10 13:35:48 +02001619 srcu_read_unlock(&kvm->srcu, srcu_idx);
Martin Schwidefskyd3ed1ce2016-03-08 11:53:35 +01001620 up_read(&current->mm->mmap_sem);
Jason J. Herne30ee2a92014-09-23 09:23:01 -04001621out:
1622 kvfree(keys);
1623 return r;
1624}
1625
Claudio Imbrenda4036e382016-08-04 17:58:47 +02001626/*
1627 * Base address and length must be sent at the start of each block, therefore
1628 * it's cheaper to send some clean data, as long as it's less than the size of
1629 * two longs.
1630 */
1631#define KVM_S390_MAX_BIT_DISTANCE (2 * sizeof(void *))
1632/* for consistency */
1633#define KVM_S390_CMMA_SIZE_MAX ((u32)KVM_S390_SKEYS_MAX)
1634
1635/*
Claudio Imbrendaafdad612018-04-30 18:33:25 +02001636 * Similar to gfn_to_memslot, but returns the index of a memslot also when the
1637 * address falls in a hole. In that case the index of one of the memslots
1638 * bordering the hole is returned.
1639 */
1640static int gfn_to_memslot_approx(struct kvm_memslots *slots, gfn_t gfn)
1641{
1642 int start = 0, end = slots->used_slots;
1643 int slot = atomic_read(&slots->lru_slot);
1644 struct kvm_memory_slot *memslots = slots->memslots;
1645
1646 if (gfn >= memslots[slot].base_gfn &&
1647 gfn < memslots[slot].base_gfn + memslots[slot].npages)
1648 return slot;
1649
1650 while (start < end) {
1651 slot = start + (end - start) / 2;
1652
1653 if (gfn >= memslots[slot].base_gfn)
1654 end = slot;
1655 else
1656 start = slot + 1;
1657 }
1658
1659 if (gfn >= memslots[start].base_gfn &&
1660 gfn < memslots[start].base_gfn + memslots[start].npages) {
1661 atomic_set(&slots->lru_slot, start);
1662 }
1663
1664 return start;
1665}
1666
1667static int kvm_s390_peek_cmma(struct kvm *kvm, struct kvm_s390_cmma_log *args,
1668 u8 *res, unsigned long bufsize)
1669{
1670 unsigned long pgstev, hva, cur_gfn = args->start_gfn;
1671
1672 args->count = 0;
1673 while (args->count < bufsize) {
1674 hva = gfn_to_hva(kvm, cur_gfn);
1675 /*
1676 * We return an error if the first value was invalid, but we
1677 * return successfully if at least one value was copied.
1678 */
1679 if (kvm_is_error_hva(hva))
1680 return args->count ? 0 : -EFAULT;
1681 if (get_pgste(kvm->mm, hva, &pgstev) < 0)
1682 pgstev = 0;
1683 res[args->count++] = (pgstev >> 24) & 0x43;
1684 cur_gfn++;
1685 }
1686
1687 return 0;
1688}
1689
1690static unsigned long kvm_s390_next_dirty_cmma(struct kvm_memslots *slots,
1691 unsigned long cur_gfn)
1692{
1693 int slotidx = gfn_to_memslot_approx(slots, cur_gfn);
1694 struct kvm_memory_slot *ms = slots->memslots + slotidx;
1695 unsigned long ofs = cur_gfn - ms->base_gfn;
1696
1697 if (ms->base_gfn + ms->npages <= cur_gfn) {
1698 slotidx--;
1699 /* If we are above the highest slot, wrap around */
1700 if (slotidx < 0)
1701 slotidx = slots->used_slots - 1;
1702
1703 ms = slots->memslots + slotidx;
1704 ofs = 0;
1705 }
1706 ofs = find_next_bit(kvm_second_dirty_bitmap(ms), ms->npages, ofs);
1707 while ((slotidx > 0) && (ofs >= ms->npages)) {
1708 slotidx--;
1709 ms = slots->memslots + slotidx;
1710 ofs = find_next_bit(kvm_second_dirty_bitmap(ms), ms->npages, 0);
1711 }
1712 return ms->base_gfn + ofs;
1713}
1714
1715static int kvm_s390_get_cmma(struct kvm *kvm, struct kvm_s390_cmma_log *args,
1716 u8 *res, unsigned long bufsize)
1717{
1718 unsigned long mem_end, cur_gfn, next_gfn, hva, pgstev;
1719 struct kvm_memslots *slots = kvm_memslots(kvm);
1720 struct kvm_memory_slot *ms;
1721
1722 cur_gfn = kvm_s390_next_dirty_cmma(slots, args->start_gfn);
1723 ms = gfn_to_memslot(kvm, cur_gfn);
1724 args->count = 0;
1725 args->start_gfn = cur_gfn;
1726 if (!ms)
1727 return 0;
1728 next_gfn = kvm_s390_next_dirty_cmma(slots, cur_gfn + 1);
1729 mem_end = slots->memslots[0].base_gfn + slots->memslots[0].npages;
1730
1731 while (args->count < bufsize) {
1732 hva = gfn_to_hva(kvm, cur_gfn);
1733 if (kvm_is_error_hva(hva))
1734 return 0;
1735 /* Decrement only if we actually flipped the bit to 0 */
1736 if (test_and_clear_bit(cur_gfn - ms->base_gfn, kvm_second_dirty_bitmap(ms)))
1737 atomic64_dec(&kvm->arch.cmma_dirty_pages);
1738 if (get_pgste(kvm->mm, hva, &pgstev) < 0)
1739 pgstev = 0;
1740 /* Save the value */
1741 res[args->count++] = (pgstev >> 24) & 0x43;
1742 /* If the next bit is too far away, stop. */
1743 if (next_gfn > cur_gfn + KVM_S390_MAX_BIT_DISTANCE)
1744 return 0;
1745 /* If we reached the previous "next", find the next one */
1746 if (cur_gfn == next_gfn)
1747 next_gfn = kvm_s390_next_dirty_cmma(slots, cur_gfn + 1);
1748 /* Reached the end of memory or of the buffer, stop */
1749 if ((next_gfn >= mem_end) ||
1750 (next_gfn - args->start_gfn >= bufsize))
1751 return 0;
1752 cur_gfn++;
1753 /* Reached the end of the current memslot, take the next one. */
1754 if (cur_gfn - ms->base_gfn >= ms->npages) {
1755 ms = gfn_to_memslot(kvm, cur_gfn);
1756 if (!ms)
1757 return 0;
1758 }
1759 }
1760 return 0;
1761}
1762
1763/*
Claudio Imbrenda4036e382016-08-04 17:58:47 +02001764 * This function searches for the next page with dirty CMMA attributes, and
1765 * saves the attributes in the buffer up to either the end of the buffer or
1766 * until a block of at least KVM_S390_MAX_BIT_DISTANCE clean bits is found;
1767 * no trailing clean bytes are saved.
1768 * In case no dirty bits were found, or if CMMA was not enabled or used, the
1769 * output buffer will indicate 0 as length.
1770 */
1771static int kvm_s390_get_cmma_bits(struct kvm *kvm,
1772 struct kvm_s390_cmma_log *args)
1773{
Claudio Imbrendaafdad612018-04-30 18:33:25 +02001774 unsigned long bufsize;
1775 int srcu_idx, peek, ret;
1776 u8 *values;
Claudio Imbrenda4036e382016-08-04 17:58:47 +02001777
Claudio Imbrendaafdad612018-04-30 18:33:25 +02001778 if (!kvm->arch.use_cmma)
Claudio Imbrenda4036e382016-08-04 17:58:47 +02001779 return -ENXIO;
1780 /* Invalid/unsupported flags were specified */
1781 if (args->flags & ~KVM_S390_CMMA_PEEK)
1782 return -EINVAL;
1783 /* Migration mode query, and we are not doing a migration */
1784 peek = !!(args->flags & KVM_S390_CMMA_PEEK);
Claudio Imbrendaafdad612018-04-30 18:33:25 +02001785 if (!peek && !kvm->arch.migration_mode)
Claudio Imbrenda4036e382016-08-04 17:58:47 +02001786 return -EINVAL;
1787 /* CMMA is disabled or was not used, or the buffer has length zero */
1788 bufsize = min(args->count, KVM_S390_CMMA_SIZE_MAX);
Janosch Frankc9f0a2b2018-02-16 12:16:14 +01001789 if (!bufsize || !kvm->mm->context.uses_cmm) {
Claudio Imbrenda4036e382016-08-04 17:58:47 +02001790 memset(args, 0, sizeof(*args));
1791 return 0;
1792 }
Claudio Imbrendaafdad612018-04-30 18:33:25 +02001793 /* We are not peeking, and there are no dirty pages */
1794 if (!peek && !atomic64_read(&kvm->arch.cmma_dirty_pages)) {
1795 memset(args, 0, sizeof(*args));
1796 return 0;
Claudio Imbrenda4036e382016-08-04 17:58:47 +02001797 }
1798
Claudio Imbrendaafdad612018-04-30 18:33:25 +02001799 values = vmalloc(bufsize);
1800 if (!values)
Claudio Imbrenda4036e382016-08-04 17:58:47 +02001801 return -ENOMEM;
1802
Claudio Imbrenda4036e382016-08-04 17:58:47 +02001803 down_read(&kvm->mm->mmap_sem);
1804 srcu_idx = srcu_read_lock(&kvm->srcu);
Claudio Imbrendaafdad612018-04-30 18:33:25 +02001805 if (peek)
1806 ret = kvm_s390_peek_cmma(kvm, args, values, bufsize);
1807 else
1808 ret = kvm_s390_get_cmma(kvm, args, values, bufsize);
Claudio Imbrenda4036e382016-08-04 17:58:47 +02001809 srcu_read_unlock(&kvm->srcu, srcu_idx);
1810 up_read(&kvm->mm->mmap_sem);
Claudio Imbrenda4036e382016-08-04 17:58:47 +02001811
Claudio Imbrendaafdad612018-04-30 18:33:25 +02001812 if (kvm->arch.migration_mode)
1813 args->remaining = atomic64_read(&kvm->arch.cmma_dirty_pages);
1814 else
1815 args->remaining = 0;
Claudio Imbrenda4036e382016-08-04 17:58:47 +02001816
Claudio Imbrendaafdad612018-04-30 18:33:25 +02001817 if (copy_to_user((void __user *)args->values, values, args->count))
1818 ret = -EFAULT;
1819
1820 vfree(values);
1821 return ret;
Claudio Imbrenda4036e382016-08-04 17:58:47 +02001822}
1823
1824/*
1825 * This function sets the CMMA attributes for the given pages. If the input
1826 * buffer has zero length, no action is taken, otherwise the attributes are
Janosch Frankc9f0a2b2018-02-16 12:16:14 +01001827 * set and the mm->context.uses_cmm flag is set.
Claudio Imbrenda4036e382016-08-04 17:58:47 +02001828 */
1829static int kvm_s390_set_cmma_bits(struct kvm *kvm,
1830 const struct kvm_s390_cmma_log *args)
1831{
1832 unsigned long hva, mask, pgstev, i;
1833 uint8_t *bits;
1834 int srcu_idx, r = 0;
1835
1836 mask = args->mask;
1837
1838 if (!kvm->arch.use_cmma)
1839 return -ENXIO;
1840 /* invalid/unsupported flags */
1841 if (args->flags != 0)
1842 return -EINVAL;
1843 /* Enforce sane limit on memory allocation */
1844 if (args->count > KVM_S390_CMMA_SIZE_MAX)
1845 return -EINVAL;
1846 /* Nothing to do */
1847 if (args->count == 0)
1848 return 0;
1849
Kees Cook42bc47b2018-06-12 14:27:11 -07001850 bits = vmalloc(array_size(sizeof(*bits), args->count));
Claudio Imbrenda4036e382016-08-04 17:58:47 +02001851 if (!bits)
1852 return -ENOMEM;
1853
1854 r = copy_from_user(bits, (void __user *)args->values, args->count);
1855 if (r) {
1856 r = -EFAULT;
1857 goto out;
1858 }
1859
1860 down_read(&kvm->mm->mmap_sem);
1861 srcu_idx = srcu_read_lock(&kvm->srcu);
1862 for (i = 0; i < args->count; i++) {
1863 hva = gfn_to_hva(kvm, args->start_gfn + i);
1864 if (kvm_is_error_hva(hva)) {
1865 r = -EFAULT;
1866 break;
1867 }
1868
1869 pgstev = bits[i];
1870 pgstev = pgstev << 24;
Claudio Imbrenda1bab1c02016-08-29 15:56:55 +02001871 mask &= _PGSTE_GPS_USAGE_MASK | _PGSTE_GPS_NODAT;
Claudio Imbrenda4036e382016-08-04 17:58:47 +02001872 set_pgste_bits(kvm->mm, hva, mask, pgstev);
1873 }
1874 srcu_read_unlock(&kvm->srcu, srcu_idx);
1875 up_read(&kvm->mm->mmap_sem);
1876
Janosch Frankc9f0a2b2018-02-16 12:16:14 +01001877 if (!kvm->mm->context.uses_cmm) {
Claudio Imbrenda4036e382016-08-04 17:58:47 +02001878 down_write(&kvm->mm->mmap_sem);
Janosch Frankc9f0a2b2018-02-16 12:16:14 +01001879 kvm->mm->context.uses_cmm = 1;
Claudio Imbrenda4036e382016-08-04 17:58:47 +02001880 up_write(&kvm->mm->mmap_sem);
1881 }
1882out:
1883 vfree(bits);
1884 return r;
1885}
1886
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001887long kvm_arch_vm_ioctl(struct file *filp,
1888 unsigned int ioctl, unsigned long arg)
1889{
1890 struct kvm *kvm = filp->private_data;
1891 void __user *argp = (void __user *)arg;
Dominik Dingelf2061652014-04-09 13:13:00 +02001892 struct kvm_device_attr attr;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001893 int r;
1894
1895 switch (ioctl) {
Carsten Otteba5c1e92008-03-25 18:47:26 +01001896 case KVM_S390_INTERRUPT: {
1897 struct kvm_s390_interrupt s390int;
1898
1899 r = -EFAULT;
1900 if (copy_from_user(&s390int, argp, sizeof(s390int)))
1901 break;
1902 r = kvm_s390_inject_vm(kvm, &s390int);
1903 break;
1904 }
Cornelia Huckd938dc52013-10-23 18:26:34 +02001905 case KVM_ENABLE_CAP: {
1906 struct kvm_enable_cap cap;
1907 r = -EFAULT;
1908 if (copy_from_user(&cap, argp, sizeof(cap)))
1909 break;
1910 r = kvm_vm_ioctl_enable_cap(kvm, &cap);
1911 break;
1912 }
Cornelia Huck84223592013-07-15 13:36:01 +02001913 case KVM_CREATE_IRQCHIP: {
1914 struct kvm_irq_routing_entry routing;
1915
1916 r = -EINVAL;
1917 if (kvm->arch.use_irqchip) {
1918 /* Set up dummy routing. */
1919 memset(&routing, 0, sizeof(routing));
Nicholas Krause152b2832015-08-06 13:05:54 -04001920 r = kvm_set_irq_routing(kvm, &routing, 0, 0);
Cornelia Huck84223592013-07-15 13:36:01 +02001921 }
1922 break;
1923 }
Dominik Dingelf2061652014-04-09 13:13:00 +02001924 case KVM_SET_DEVICE_ATTR: {
1925 r = -EFAULT;
1926 if (copy_from_user(&attr, (void __user *)arg, sizeof(attr)))
1927 break;
1928 r = kvm_s390_vm_set_attr(kvm, &attr);
1929 break;
1930 }
1931 case KVM_GET_DEVICE_ATTR: {
1932 r = -EFAULT;
1933 if (copy_from_user(&attr, (void __user *)arg, sizeof(attr)))
1934 break;
1935 r = kvm_s390_vm_get_attr(kvm, &attr);
1936 break;
1937 }
1938 case KVM_HAS_DEVICE_ATTR: {
1939 r = -EFAULT;
1940 if (copy_from_user(&attr, (void __user *)arg, sizeof(attr)))
1941 break;
1942 r = kvm_s390_vm_has_attr(kvm, &attr);
1943 break;
1944 }
Jason J. Herne30ee2a92014-09-23 09:23:01 -04001945 case KVM_S390_GET_SKEYS: {
1946 struct kvm_s390_skeys args;
1947
1948 r = -EFAULT;
1949 if (copy_from_user(&args, argp,
1950 sizeof(struct kvm_s390_skeys)))
1951 break;
1952 r = kvm_s390_get_skeys(kvm, &args);
1953 break;
1954 }
1955 case KVM_S390_SET_SKEYS: {
1956 struct kvm_s390_skeys args;
1957
1958 r = -EFAULT;
1959 if (copy_from_user(&args, argp,
1960 sizeof(struct kvm_s390_skeys)))
1961 break;
1962 r = kvm_s390_set_skeys(kvm, &args);
1963 break;
1964 }
Claudio Imbrenda4036e382016-08-04 17:58:47 +02001965 case KVM_S390_GET_CMMA_BITS: {
1966 struct kvm_s390_cmma_log args;
1967
1968 r = -EFAULT;
1969 if (copy_from_user(&args, argp, sizeof(args)))
1970 break;
Christian Borntraeger1de1ea72017-12-22 10:54:20 +01001971 mutex_lock(&kvm->slots_lock);
Claudio Imbrenda4036e382016-08-04 17:58:47 +02001972 r = kvm_s390_get_cmma_bits(kvm, &args);
Christian Borntraeger1de1ea72017-12-22 10:54:20 +01001973 mutex_unlock(&kvm->slots_lock);
Claudio Imbrenda4036e382016-08-04 17:58:47 +02001974 if (!r) {
1975 r = copy_to_user(argp, &args, sizeof(args));
1976 if (r)
1977 r = -EFAULT;
1978 }
1979 break;
1980 }
1981 case KVM_S390_SET_CMMA_BITS: {
1982 struct kvm_s390_cmma_log args;
1983
1984 r = -EFAULT;
1985 if (copy_from_user(&args, argp, sizeof(args)))
1986 break;
Christian Borntraeger1de1ea72017-12-22 10:54:20 +01001987 mutex_lock(&kvm->slots_lock);
Claudio Imbrenda4036e382016-08-04 17:58:47 +02001988 r = kvm_s390_set_cmma_bits(kvm, &args);
Christian Borntraeger1de1ea72017-12-22 10:54:20 +01001989 mutex_unlock(&kvm->slots_lock);
Claudio Imbrenda4036e382016-08-04 17:58:47 +02001990 break;
1991 }
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001992 default:
Avi Kivity367e1312009-08-26 14:57:07 +03001993 r = -ENOTTY;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001994 }
1995
1996 return r;
1997}
1998
Tony Krowiak45c9b472015-01-13 11:33:26 -05001999static int kvm_s390_apxa_installed(void)
2000{
Tony Krowiake585b242018-09-25 19:16:18 -04002001 struct ap_config_info info;
Tony Krowiak45c9b472015-01-13 11:33:26 -05002002
Tony Krowiake585b242018-09-25 19:16:18 -04002003 if (ap_instructions_available()) {
2004 if (ap_qci(&info) == 0)
2005 return info.apxa;
Tony Krowiak45c9b472015-01-13 11:33:26 -05002006 }
2007
2008 return 0;
2009}
2010
Tony Krowiake585b242018-09-25 19:16:18 -04002011/*
2012 * The format of the crypto control block (CRYCB) is specified in the 3 low
2013 * order bits of the CRYCB designation (CRYCBD) field as follows:
2014 * Format 0: Neither the message security assist extension 3 (MSAX3) nor the
2015 * AP extended addressing (APXA) facility are installed.
2016 * Format 1: The APXA facility is not installed but the MSAX3 facility is.
2017 * Format 2: Both the APXA and MSAX3 facilities are installed
2018 */
Tony Krowiak45c9b472015-01-13 11:33:26 -05002019static void kvm_s390_set_crycb_format(struct kvm *kvm)
2020{
2021 kvm->arch.crypto.crycbd = (__u32)(unsigned long) kvm->arch.crypto.crycb;
2022
Tony Krowiake585b242018-09-25 19:16:18 -04002023 /* Clear the CRYCB format bits - i.e., set format 0 by default */
2024 kvm->arch.crypto.crycbd &= ~(CRYCB_FORMAT_MASK);
2025
2026 /* Check whether MSAX3 is installed */
2027 if (!test_kvm_facility(kvm, 76))
2028 return;
2029
Tony Krowiak45c9b472015-01-13 11:33:26 -05002030 if (kvm_s390_apxa_installed())
2031 kvm->arch.crypto.crycbd |= CRYCB_FORMAT2;
2032 else
2033 kvm->arch.crypto.crycbd |= CRYCB_FORMAT1;
2034}
2035
Tony Krowiak421045982018-09-25 19:16:25 -04002036void kvm_arch_crypto_clear_masks(struct kvm *kvm)
2037{
2038 mutex_lock(&kvm->lock);
2039 kvm_s390_vcpu_block_all(kvm);
2040
2041 memset(&kvm->arch.crypto.crycb->apcb0, 0,
2042 sizeof(kvm->arch.crypto.crycb->apcb0));
2043 memset(&kvm->arch.crypto.crycb->apcb1, 0,
2044 sizeof(kvm->arch.crypto.crycb->apcb1));
2045
2046 kvm_s390_vcpu_unblock_all(kvm);
2047 mutex_unlock(&kvm->lock);
2048}
2049EXPORT_SYMBOL_GPL(kvm_arch_crypto_clear_masks);
2050
David Hildenbrand9bb0ec02016-04-04 14:27:51 +02002051static u64 kvm_s390_get_initial_cpuid(void)
Michael Mueller9d8d5782015-02-02 15:42:51 +01002052{
David Hildenbrand9bb0ec02016-04-04 14:27:51 +02002053 struct cpuid cpuid;
2054
2055 get_cpu_id(&cpuid);
2056 cpuid.version = 0xff;
2057 return *((u64 *) &cpuid);
Michael Mueller9d8d5782015-02-02 15:42:51 +01002058}
2059
David Hildenbrandc54f0d62015-12-02 08:53:52 +01002060static void kvm_s390_crypto_init(struct kvm *kvm)
Tony Krowiak5102ee82014-06-27 14:46:01 -04002061{
David Hildenbrandc54f0d62015-12-02 08:53:52 +01002062 kvm->arch.crypto.crycb = &kvm->arch.sie_page2->crycb;
Tony Krowiak45c9b472015-01-13 11:33:26 -05002063 kvm_s390_set_crycb_format(kvm);
Tony Krowiak5102ee82014-06-27 14:46:01 -04002064
Tony Krowiake585b242018-09-25 19:16:18 -04002065 if (!test_kvm_facility(kvm, 76))
2066 return;
2067
Tony Krowiaked6f76b2015-02-24 14:06:57 -05002068 /* Enable AES/DEA protected key functions by default */
2069 kvm->arch.crypto.aes_kw = 1;
2070 kvm->arch.crypto.dea_kw = 1;
2071 get_random_bytes(kvm->arch.crypto.crycb->aes_wrapping_key_mask,
2072 sizeof(kvm->arch.crypto.crycb->aes_wrapping_key_mask));
2073 get_random_bytes(kvm->arch.crypto.crycb->dea_wrapping_key_mask,
2074 sizeof(kvm->arch.crypto.crycb->dea_wrapping_key_mask));
Tony Krowiak5102ee82014-06-27 14:46:01 -04002075}
2076
Eugene (jno) Dvurechenski7d43bafcf2015-04-22 17:09:44 +02002077static void sca_dispose(struct kvm *kvm)
2078{
2079 if (kvm->arch.use_esca)
Eugene (jno) Dvurechenski5e044312015-04-22 18:08:39 +02002080 free_pages_exact(kvm->arch.sca, sizeof(struct esca_block));
Eugene (jno) Dvurechenski7d43bafcf2015-04-22 17:09:44 +02002081 else
2082 free_page((unsigned long)(kvm->arch.sca));
2083 kvm->arch.sca = NULL;
2084}
2085
Carsten Ottee08b9632012-01-04 10:25:20 +01002086int kvm_arch_init_vm(struct kvm *kvm, unsigned long type)
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002087{
David Hildenbrand76a6dd72015-11-24 13:33:49 +01002088 gfp_t alloc_flags = GFP_KERNEL;
Michael Mueller9d8d5782015-02-02 15:42:51 +01002089 int i, rc;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002090 char debug_name[16];
Christian Borntraegerf6c137f2014-03-19 11:18:29 +01002091 static unsigned long sca_offset;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002092
Carsten Ottee08b9632012-01-04 10:25:20 +01002093 rc = -EINVAL;
2094#ifdef CONFIG_KVM_S390_UCONTROL
2095 if (type & ~KVM_VM_S390_UCONTROL)
2096 goto out_err;
2097 if ((type & KVM_VM_S390_UCONTROL) && (!capable(CAP_SYS_ADMIN)))
2098 goto out_err;
2099#else
2100 if (type)
2101 goto out_err;
2102#endif
2103
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002104 rc = s390_enable_sie();
2105 if (rc)
Jan Kiszkad89f5ef2010-11-09 17:02:49 +01002106 goto out_err;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002107
Carsten Otteb2904112011-10-18 12:27:13 +02002108 rc = -ENOMEM;
2109
David Hildenbrand76a6dd72015-11-24 13:33:49 +01002110 if (!sclp.has_64bscao)
2111 alloc_flags |= GFP_DMA;
Eugene (jno) Dvurechenski5e044312015-04-22 18:08:39 +02002112 rwlock_init(&kvm->arch.sca_lock);
David Hildenbrand9ac96d72018-04-27 14:36:12 +02002113 /* start with basic SCA */
David Hildenbrand76a6dd72015-11-24 13:33:49 +01002114 kvm->arch.sca = (struct bsca_block *) get_zeroed_page(alloc_flags);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002115 if (!kvm->arch.sca)
Jan Kiszkad89f5ef2010-11-09 17:02:49 +01002116 goto out_err;
Christian Borntraegerf6c137f2014-03-19 11:18:29 +01002117 spin_lock(&kvm_lock);
David Hildenbrandc5c2c392015-10-26 08:41:29 +01002118 sca_offset += 16;
Eugene (jno) Dvurechenskibc784cc2015-04-23 16:09:06 +02002119 if (sca_offset + sizeof(struct bsca_block) > PAGE_SIZE)
David Hildenbrandc5c2c392015-10-26 08:41:29 +01002120 sca_offset = 0;
Eugene (jno) Dvurechenskibc784cc2015-04-23 16:09:06 +02002121 kvm->arch.sca = (struct bsca_block *)
2122 ((char *) kvm->arch.sca + sca_offset);
Christian Borntraegerf6c137f2014-03-19 11:18:29 +01002123 spin_unlock(&kvm_lock);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002124
2125 sprintf(debug_name, "kvm-%u", current->pid);
2126
Christian Borntraeger1cb9cf72015-07-20 15:04:48 +02002127 kvm->arch.dbf = debug_register(debug_name, 32, 1, 7 * sizeof(long));
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002128 if (!kvm->arch.dbf)
Dominik Dingel40f5b732015-03-12 13:55:53 +01002129 goto out_err;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002130
Michael Mueller19114be2017-05-30 14:26:02 +02002131 BUILD_BUG_ON(sizeof(struct sie_page2) != 4096);
David Hildenbrandc54f0d62015-12-02 08:53:52 +01002132 kvm->arch.sie_page2 =
2133 (struct sie_page2 *) get_zeroed_page(GFP_KERNEL | GFP_DMA);
2134 if (!kvm->arch.sie_page2)
Dominik Dingel40f5b732015-03-12 13:55:53 +01002135 goto out_err;
Michael Mueller9d8d5782015-02-02 15:42:51 +01002136
David Hildenbrandc54f0d62015-12-02 08:53:52 +01002137 kvm->arch.model.fac_list = kvm->arch.sie_page2->fac_list;
Christian Borntraegerc3b9e3e2018-02-09 16:26:29 +00002138
2139 for (i = 0; i < kvm_s390_fac_size(); i++) {
2140 kvm->arch.model.fac_mask[i] = S390_lowcore.stfle_fac_list[i] &
2141 (kvm_s390_fac_base[i] |
2142 kvm_s390_fac_ext[i]);
2143 kvm->arch.model.fac_list[i] = S390_lowcore.stfle_fac_list[i] &
2144 kvm_s390_fac_base[i];
2145 }
Michael Mueller981467c2015-02-24 13:51:04 +01002146
David Hildenbrand19352222017-08-29 16:31:08 +02002147 /* we are always in czam mode - even on pre z14 machines */
2148 set_kvm_facility(kvm->arch.model.fac_mask, 138);
2149 set_kvm_facility(kvm->arch.model.fac_list, 138);
2150 /* we emulate STHYI in kvm */
Janosch Frank95ca2cb2016-05-23 15:11:58 +02002151 set_kvm_facility(kvm->arch.model.fac_mask, 74);
2152 set_kvm_facility(kvm->arch.model.fac_list, 74);
Claudio Imbrenda1bab1c02016-08-29 15:56:55 +02002153 if (MACHINE_HAS_TLB_GUEST) {
2154 set_kvm_facility(kvm->arch.model.fac_mask, 147);
2155 set_kvm_facility(kvm->arch.model.fac_list, 147);
2156 }
Janosch Frank95ca2cb2016-05-23 15:11:58 +02002157
David Hildenbrand9bb0ec02016-04-04 14:27:51 +02002158 kvm->arch.model.cpuid = kvm_s390_get_initial_cpuid();
David Hildenbrand37c5f6c2015-05-06 13:18:59 +02002159 kvm->arch.model.ibc = sclp.ibc & 0x0fff;
Michael Mueller9d8d5782015-02-02 15:42:51 +01002160
David Hildenbrandc54f0d62015-12-02 08:53:52 +01002161 kvm_s390_crypto_init(kvm);
Tony Krowiak5102ee82014-06-27 14:46:01 -04002162
Fei Li51978392017-02-17 17:06:26 +08002163 mutex_init(&kvm->arch.float_int.ais_lock);
Carsten Otteba5c1e92008-03-25 18:47:26 +01002164 spin_lock_init(&kvm->arch.float_int.lock);
Jens Freimann6d3da242013-07-03 15:18:35 +02002165 for (i = 0; i < FIRQ_LIST_COUNT; i++)
2166 INIT_LIST_HEAD(&kvm->arch.float_int.lists[i]);
Heiko Carstens8a2422342014-01-10 14:33:28 +01002167 init_waitqueue_head(&kvm->arch.ipte_wq);
Thomas Hutha6b7e452014-10-01 14:48:42 +02002168 mutex_init(&kvm->arch.ipte_mutex);
Carsten Otteba5c1e92008-03-25 18:47:26 +01002169
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002170 debug_register_view(kvm->arch.dbf, &debug_sprintf_view);
Christian Borntraeger78f26132015-07-22 15:50:58 +02002171 VM_EVENT(kvm, 3, "vm created with type %lu", type);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002172
Carsten Ottee08b9632012-01-04 10:25:20 +01002173 if (type & KVM_VM_S390_UCONTROL) {
2174 kvm->arch.gmap = NULL;
Dominik Dingela3a92c32014-12-01 17:24:42 +01002175 kvm->arch.mem_limit = KVM_S390_NO_MEM_LIMIT;
Carsten Ottee08b9632012-01-04 10:25:20 +01002176 } else {
Guenther Hutzl32e6b232014-12-01 17:24:42 +01002177 if (sclp.hamax == U64_MAX)
Martin Schwidefskyee71d162017-04-20 14:43:51 +02002178 kvm->arch.mem_limit = TASK_SIZE_MAX;
Guenther Hutzl32e6b232014-12-01 17:24:42 +01002179 else
Martin Schwidefskyee71d162017-04-20 14:43:51 +02002180 kvm->arch.mem_limit = min_t(unsigned long, TASK_SIZE_MAX,
Guenther Hutzl32e6b232014-12-01 17:24:42 +01002181 sclp.hamax + 1);
Martin Schwidefsky6ea427b2016-03-08 11:55:04 +01002182 kvm->arch.gmap = gmap_create(current->mm, kvm->arch.mem_limit - 1);
Carsten Ottee08b9632012-01-04 10:25:20 +01002183 if (!kvm->arch.gmap)
Dominik Dingel40f5b732015-03-12 13:55:53 +01002184 goto out_err;
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02002185 kvm->arch.gmap->private = kvm;
Dominik Dingel24eb3a82013-06-17 16:25:18 +02002186 kvm->arch.gmap->pfault_enabled = 0;
Carsten Ottee08b9632012-01-04 10:25:20 +01002187 }
Cornelia Huckfa6b7fe2012-12-20 15:32:12 +01002188
Janosch Frankc9f0a2b2018-02-16 12:16:14 +01002189 kvm->arch.use_pfmfi = sclp.has_pfmfi;
Janosch Frank55531b72018-02-15 16:33:47 +01002190 kvm->arch.use_skf = sclp.has_skey;
David Hildenbrand8ad35752014-03-14 11:00:21 +01002191 spin_lock_init(&kvm->arch.start_stop_lock);
David Hildenbranda3508fb2015-07-08 13:19:48 +02002192 kvm_s390_vsie_init(kvm);
Michael Muellerd7c5cb02017-06-12 14:15:19 +02002193 kvm_s390_gisa_init(kvm);
Christian Borntraeger8335713a2015-12-08 16:55:27 +01002194 KVM_EVENT(3, "vm 0x%pK created by pid %u", kvm, current->pid);
David Hildenbrand8ad35752014-03-14 11:00:21 +01002195
Jan Kiszkad89f5ef2010-11-09 17:02:49 +01002196 return 0;
Jan Kiszkad89f5ef2010-11-09 17:02:49 +01002197out_err:
David Hildenbrandc54f0d62015-12-02 08:53:52 +01002198 free_page((unsigned long)kvm->arch.sie_page2);
Dominik Dingel40f5b732015-03-12 13:55:53 +01002199 debug_unregister(kvm->arch.dbf);
Eugene (jno) Dvurechenski7d43bafcf2015-04-22 17:09:44 +02002200 sca_dispose(kvm);
Christian Borntraeger78f26132015-07-22 15:50:58 +02002201 KVM_EVENT(3, "creation of vm failed: %d", rc);
Jan Kiszkad89f5ef2010-11-09 17:02:49 +01002202 return rc;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002203}
2204
Luiz Capitulino235539b2016-09-07 14:47:23 -04002205bool kvm_arch_has_vcpu_debugfs(void)
2206{
2207 return false;
2208}
2209
2210int kvm_arch_create_vcpu_debugfs(struct kvm_vcpu *vcpu)
2211{
2212 return 0;
2213}
2214
Christian Borntraegerd329c032008-11-26 14:50:27 +01002215void kvm_arch_vcpu_destroy(struct kvm_vcpu *vcpu)
2216{
2217 VCPU_EVENT(vcpu, 3, "%s", "free cpu");
Cornelia Huckade38c32012-07-23 17:20:30 +02002218 trace_kvm_s390_destroy_vcpu(vcpu->vcpu_id);
Christian Borntraeger67335e62014-03-25 17:09:08 +01002219 kvm_s390_clear_local_irqs(vcpu);
Dominik Dingel3c038e62013-10-07 17:11:48 +02002220 kvm_clear_async_pf_completion_queue(vcpu);
Eugene (jno) Dvurechenskibc784cc2015-04-23 16:09:06 +02002221 if (!kvm_is_ucontrol(vcpu->kvm))
Eugene (jno) Dvurechenskia6e2f682015-04-21 15:31:59 +02002222 sca_del_vcpu(vcpu);
Carsten Otte27e03932012-01-04 10:25:21 +01002223
2224 if (kvm_is_ucontrol(vcpu->kvm))
Martin Schwidefsky6ea427b2016-03-08 11:55:04 +01002225 gmap_remove(vcpu->arch.gmap);
Carsten Otte27e03932012-01-04 10:25:21 +01002226
Dominik Dingele6db1d62015-05-07 15:41:57 +02002227 if (vcpu->kvm->arch.use_cmma)
Dominik Dingelb31605c2014-03-25 13:47:11 +01002228 kvm_s390_vcpu_unsetup_cmma(vcpu);
Christian Borntraegerd329c032008-11-26 14:50:27 +01002229 free_page((unsigned long)(vcpu->arch.sie_block));
Konstantin Weitzb31288f2013-04-17 17:36:29 +02002230
Christian Borntraeger6692cef2008-11-26 14:51:08 +01002231 kvm_vcpu_uninit(vcpu);
Michael Muellerb110fea2013-06-12 13:54:54 +02002232 kmem_cache_free(kvm_vcpu_cache, vcpu);
Christian Borntraegerd329c032008-11-26 14:50:27 +01002233}
2234
2235static void kvm_free_vcpus(struct kvm *kvm)
2236{
2237 unsigned int i;
Gleb Natapov988a2ca2009-06-09 15:56:29 +03002238 struct kvm_vcpu *vcpu;
Christian Borntraegerd329c032008-11-26 14:50:27 +01002239
Gleb Natapov988a2ca2009-06-09 15:56:29 +03002240 kvm_for_each_vcpu(i, vcpu, kvm)
2241 kvm_arch_vcpu_destroy(vcpu);
2242
2243 mutex_lock(&kvm->lock);
2244 for (i = 0; i < atomic_read(&kvm->online_vcpus); i++)
2245 kvm->vcpus[i] = NULL;
2246
2247 atomic_set(&kvm->online_vcpus, 0);
2248 mutex_unlock(&kvm->lock);
Christian Borntraegerd329c032008-11-26 14:50:27 +01002249}
2250
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002251void kvm_arch_destroy_vm(struct kvm *kvm)
2252{
Christian Borntraegerd329c032008-11-26 14:50:27 +01002253 kvm_free_vcpus(kvm);
Eugene (jno) Dvurechenski7d43bafcf2015-04-22 17:09:44 +02002254 sca_dispose(kvm);
Christian Borntraegerd329c032008-11-26 14:50:27 +01002255 debug_unregister(kvm->arch.dbf);
Michael Muellerd7c5cb02017-06-12 14:15:19 +02002256 kvm_s390_gisa_destroy(kvm);
David Hildenbrandc54f0d62015-12-02 08:53:52 +01002257 free_page((unsigned long)kvm->arch.sie_page2);
Carsten Otte27e03932012-01-04 10:25:21 +01002258 if (!kvm_is_ucontrol(kvm))
Martin Schwidefsky6ea427b2016-03-08 11:55:04 +01002259 gmap_remove(kvm->arch.gmap);
Cornelia Huck841b91c2013-07-15 13:36:01 +02002260 kvm_s390_destroy_adapters(kvm);
Christian Borntraeger67335e62014-03-25 17:09:08 +01002261 kvm_s390_clear_float_irqs(kvm);
David Hildenbranda3508fb2015-07-08 13:19:48 +02002262 kvm_s390_vsie_destroy(kvm);
Christian Borntraeger8335713a2015-12-08 16:55:27 +01002263 KVM_EVENT(3, "vm 0x%pK destroyed", kvm);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002264}
2265
2266/* Section: vcpu related */
Dominik Dingeldafd0322014-12-02 16:53:21 +01002267static int __kvm_ucontrol_vcpu_init(struct kvm_vcpu *vcpu)
2268{
Martin Schwidefsky6ea427b2016-03-08 11:55:04 +01002269 vcpu->arch.gmap = gmap_create(current->mm, -1UL);
Dominik Dingeldafd0322014-12-02 16:53:21 +01002270 if (!vcpu->arch.gmap)
2271 return -ENOMEM;
2272 vcpu->arch.gmap->private = vcpu->kvm;
2273
2274 return 0;
2275}
2276
Eugene (jno) Dvurechenskia6e2f682015-04-21 15:31:59 +02002277static void sca_del_vcpu(struct kvm_vcpu *vcpu)
2278{
David Hildenbranda6940672016-08-08 22:39:32 +02002279 if (!kvm_s390_use_sca_entries())
2280 return;
Eugene (jno) Dvurechenski5e044312015-04-22 18:08:39 +02002281 read_lock(&vcpu->kvm->arch.sca_lock);
Eugene (jno) Dvurechenski7d43bafcf2015-04-22 17:09:44 +02002282 if (vcpu->kvm->arch.use_esca) {
2283 struct esca_block *sca = vcpu->kvm->arch.sca;
Eugene (jno) Dvurechenskia6e2f682015-04-21 15:31:59 +02002284
Eugene (jno) Dvurechenski7d43bafcf2015-04-22 17:09:44 +02002285 clear_bit_inv(vcpu->vcpu_id, (unsigned long *) sca->mcn);
David Hildenbrand10ce32d2015-10-12 12:41:41 +02002286 sca->cpu[vcpu->vcpu_id].sda = 0;
Eugene (jno) Dvurechenski7d43bafcf2015-04-22 17:09:44 +02002287 } else {
2288 struct bsca_block *sca = vcpu->kvm->arch.sca;
2289
2290 clear_bit_inv(vcpu->vcpu_id, (unsigned long *) &sca->mcn);
David Hildenbrand10ce32d2015-10-12 12:41:41 +02002291 sca->cpu[vcpu->vcpu_id].sda = 0;
Eugene (jno) Dvurechenski7d43bafcf2015-04-22 17:09:44 +02002292 }
Eugene (jno) Dvurechenski5e044312015-04-22 18:08:39 +02002293 read_unlock(&vcpu->kvm->arch.sca_lock);
Eugene (jno) Dvurechenskia6e2f682015-04-21 15:31:59 +02002294}
2295
David Hildenbrandeaa78f32015-10-12 16:29:01 +02002296static void sca_add_vcpu(struct kvm_vcpu *vcpu)
Eugene (jno) Dvurechenskia6e2f682015-04-21 15:31:59 +02002297{
David Hildenbranda6940672016-08-08 22:39:32 +02002298 if (!kvm_s390_use_sca_entries()) {
2299 struct bsca_block *sca = vcpu->kvm->arch.sca;
2300
2301 /* we still need the basic sca for the ipte control */
2302 vcpu->arch.sie_block->scaoh = (__u32)(((__u64)sca) >> 32);
2303 vcpu->arch.sie_block->scaol = (__u32)(__u64)sca;
David Hildenbrandf07afa02018-03-06 14:27:58 +01002304 return;
David Hildenbranda6940672016-08-08 22:39:32 +02002305 }
David Hildenbrandeaa78f32015-10-12 16:29:01 +02002306 read_lock(&vcpu->kvm->arch.sca_lock);
2307 if (vcpu->kvm->arch.use_esca) {
2308 struct esca_block *sca = vcpu->kvm->arch.sca;
Eugene (jno) Dvurechenskia6e2f682015-04-21 15:31:59 +02002309
David Hildenbrandeaa78f32015-10-12 16:29:01 +02002310 sca->cpu[vcpu->vcpu_id].sda = (__u64) vcpu->arch.sie_block;
Eugene (jno) Dvurechenski7d43bafcf2015-04-22 17:09:44 +02002311 vcpu->arch.sie_block->scaoh = (__u32)(((__u64)sca) >> 32);
2312 vcpu->arch.sie_block->scaol = (__u32)(__u64)sca & ~0x3fU;
David Hildenbrand0c9d8682017-03-13 11:48:28 +01002313 vcpu->arch.sie_block->ecb2 |= ECB2_ESCA;
David Hildenbrandeaa78f32015-10-12 16:29:01 +02002314 set_bit_inv(vcpu->vcpu_id, (unsigned long *) sca->mcn);
Eugene (jno) Dvurechenski7d43bafcf2015-04-22 17:09:44 +02002315 } else {
David Hildenbrandeaa78f32015-10-12 16:29:01 +02002316 struct bsca_block *sca = vcpu->kvm->arch.sca;
Eugene (jno) Dvurechenski7d43bafcf2015-04-22 17:09:44 +02002317
David Hildenbrandeaa78f32015-10-12 16:29:01 +02002318 sca->cpu[vcpu->vcpu_id].sda = (__u64) vcpu->arch.sie_block;
Eugene (jno) Dvurechenski7d43bafcf2015-04-22 17:09:44 +02002319 vcpu->arch.sie_block->scaoh = (__u32)(((__u64)sca) >> 32);
2320 vcpu->arch.sie_block->scaol = (__u32)(__u64)sca;
David Hildenbrandeaa78f32015-10-12 16:29:01 +02002321 set_bit_inv(vcpu->vcpu_id, (unsigned long *) &sca->mcn);
Eugene (jno) Dvurechenski7d43bafcf2015-04-22 17:09:44 +02002322 }
David Hildenbrandeaa78f32015-10-12 16:29:01 +02002323 read_unlock(&vcpu->kvm->arch.sca_lock);
Eugene (jno) Dvurechenski5e044312015-04-22 18:08:39 +02002324}
2325
2326/* Basic SCA to Extended SCA data copy routines */
2327static inline void sca_copy_entry(struct esca_entry *d, struct bsca_entry *s)
2328{
2329 d->sda = s->sda;
2330 d->sigp_ctrl.c = s->sigp_ctrl.c;
2331 d->sigp_ctrl.scn = s->sigp_ctrl.scn;
2332}
2333
2334static void sca_copy_b_to_e(struct esca_block *d, struct bsca_block *s)
2335{
2336 int i;
2337
2338 d->ipte_control = s->ipte_control;
2339 d->mcn[0] = s->mcn;
2340 for (i = 0; i < KVM_S390_BSCA_CPU_SLOTS; i++)
2341 sca_copy_entry(&d->cpu[i], &s->cpu[i]);
2342}
2343
2344static int sca_switch_to_extended(struct kvm *kvm)
2345{
2346 struct bsca_block *old_sca = kvm->arch.sca;
2347 struct esca_block *new_sca;
2348 struct kvm_vcpu *vcpu;
2349 unsigned int vcpu_idx;
2350 u32 scaol, scaoh;
2351
2352 new_sca = alloc_pages_exact(sizeof(*new_sca), GFP_KERNEL|__GFP_ZERO);
2353 if (!new_sca)
2354 return -ENOMEM;
2355
2356 scaoh = (u32)((u64)(new_sca) >> 32);
2357 scaol = (u32)(u64)(new_sca) & ~0x3fU;
2358
2359 kvm_s390_vcpu_block_all(kvm);
2360 write_lock(&kvm->arch.sca_lock);
2361
2362 sca_copy_b_to_e(new_sca, old_sca);
2363
2364 kvm_for_each_vcpu(vcpu_idx, vcpu, kvm) {
2365 vcpu->arch.sie_block->scaoh = scaoh;
2366 vcpu->arch.sie_block->scaol = scaol;
David Hildenbrand0c9d8682017-03-13 11:48:28 +01002367 vcpu->arch.sie_block->ecb2 |= ECB2_ESCA;
Eugene (jno) Dvurechenski5e044312015-04-22 18:08:39 +02002368 }
2369 kvm->arch.sca = new_sca;
2370 kvm->arch.use_esca = 1;
2371
2372 write_unlock(&kvm->arch.sca_lock);
2373 kvm_s390_vcpu_unblock_all(kvm);
2374
2375 free_page((unsigned long)old_sca);
2376
Christian Borntraeger8335713a2015-12-08 16:55:27 +01002377 VM_EVENT(kvm, 2, "Switched to ESCA (0x%pK -> 0x%pK)",
2378 old_sca, kvm->arch.sca);
Eugene (jno) Dvurechenski5e044312015-04-22 18:08:39 +02002379 return 0;
Eugene (jno) Dvurechenskia6e2f682015-04-21 15:31:59 +02002380}
2381
2382static int sca_can_add_vcpu(struct kvm *kvm, unsigned int id)
2383{
Eugene (jno) Dvurechenski5e044312015-04-22 18:08:39 +02002384 int rc;
2385
David Hildenbranda6940672016-08-08 22:39:32 +02002386 if (!kvm_s390_use_sca_entries()) {
2387 if (id < KVM_MAX_VCPUS)
2388 return true;
2389 return false;
2390 }
Eugene (jno) Dvurechenski5e044312015-04-22 18:08:39 +02002391 if (id < KVM_S390_BSCA_CPU_SLOTS)
2392 return true;
David Hildenbrand76a6dd72015-11-24 13:33:49 +01002393 if (!sclp.has_esca || !sclp.has_64bscao)
Eugene (jno) Dvurechenski5e044312015-04-22 18:08:39 +02002394 return false;
2395
2396 mutex_lock(&kvm->lock);
2397 rc = kvm->arch.use_esca ? 0 : sca_switch_to_extended(kvm);
2398 mutex_unlock(&kvm->lock);
2399
2400 return rc == 0 && id < KVM_S390_ESCA_CPU_SLOTS;
Eugene (jno) Dvurechenskia6e2f682015-04-21 15:31:59 +02002401}
2402
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002403int kvm_arch_vcpu_init(struct kvm_vcpu *vcpu)
2404{
Dominik Dingel3c038e62013-10-07 17:11:48 +02002405 vcpu->arch.pfault_token = KVM_S390_PFAULT_TOKEN_INVALID;
2406 kvm_clear_async_pf_completion_queue(vcpu);
Christian Borntraeger59674c12012-01-11 11:20:33 +01002407 vcpu->run->kvm_valid_regs = KVM_SYNC_PREFIX |
2408 KVM_SYNC_GPRS |
Christian Borntraeger9eed07352012-02-06 10:59:07 +01002409 KVM_SYNC_ACRS |
David Hildenbrandb028ee32014-07-17 10:47:43 +02002410 KVM_SYNC_CRS |
2411 KVM_SYNC_ARCH0 |
2412 KVM_SYNC_PFAULT;
Julius Niedworok75a46152016-08-03 16:39:54 +02002413 kvm_s390_set_prefix(vcpu, 0);
Fan Zhangc6e5f162016-01-07 18:24:29 +08002414 if (test_kvm_facility(vcpu->kvm, 64))
2415 vcpu->run->kvm_valid_regs |= KVM_SYNC_RICCB;
Christian Borntraeger35b3fde2018-01-17 14:44:34 +01002416 if (test_kvm_facility(vcpu->kvm, 82))
2417 vcpu->run->kvm_valid_regs |= KVM_SYNC_BPBC;
Fan Zhang4e0b1ab2016-11-29 07:17:55 +01002418 if (test_kvm_facility(vcpu->kvm, 133))
2419 vcpu->run->kvm_valid_regs |= KVM_SYNC_GSCB;
Christian Borntraegera3da7b42018-03-08 16:08:49 +00002420 if (test_kvm_facility(vcpu->kvm, 156))
2421 vcpu->run->kvm_valid_regs |= KVM_SYNC_ETOKEN;
David Hildenbrandf6aa6dc2016-01-15 14:11:46 +01002422 /* fprs can be synchronized via vrs, even if the guest has no vx. With
2423 * MACHINE_HAS_VX, (load|store)_fpu_regs() will work with vrs format.
2424 */
2425 if (MACHINE_HAS_VX)
Eric Farman68c55752014-06-09 10:57:26 -04002426 vcpu->run->kvm_valid_regs |= KVM_SYNC_VRS;
David Hildenbrand6fd8e672016-01-18 14:46:34 +01002427 else
2428 vcpu->run->kvm_valid_regs |= KVM_SYNC_FPRS;
Dominik Dingeldafd0322014-12-02 16:53:21 +01002429
2430 if (kvm_is_ucontrol(vcpu->kvm))
2431 return __kvm_ucontrol_vcpu_init(vcpu);
2432
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002433 return 0;
2434}
2435
David Hildenbranddb0758b2016-02-15 09:42:25 +01002436/* needs disabled preemption to protect from TOD sync and vcpu_load/put */
2437static void __start_cpu_timer_accounting(struct kvm_vcpu *vcpu)
2438{
2439 WARN_ON_ONCE(vcpu->arch.cputm_start != 0);
David Hildenbrand9c23a132016-02-17 21:53:33 +01002440 raw_write_seqcount_begin(&vcpu->arch.cputm_seqcount);
David Hildenbranddb0758b2016-02-15 09:42:25 +01002441 vcpu->arch.cputm_start = get_tod_clock_fast();
David Hildenbrand9c23a132016-02-17 21:53:33 +01002442 raw_write_seqcount_end(&vcpu->arch.cputm_seqcount);
David Hildenbranddb0758b2016-02-15 09:42:25 +01002443}
2444
2445/* needs disabled preemption to protect from TOD sync and vcpu_load/put */
2446static void __stop_cpu_timer_accounting(struct kvm_vcpu *vcpu)
2447{
2448 WARN_ON_ONCE(vcpu->arch.cputm_start == 0);
David Hildenbrand9c23a132016-02-17 21:53:33 +01002449 raw_write_seqcount_begin(&vcpu->arch.cputm_seqcount);
David Hildenbranddb0758b2016-02-15 09:42:25 +01002450 vcpu->arch.sie_block->cputm -= get_tod_clock_fast() - vcpu->arch.cputm_start;
2451 vcpu->arch.cputm_start = 0;
David Hildenbrand9c23a132016-02-17 21:53:33 +01002452 raw_write_seqcount_end(&vcpu->arch.cputm_seqcount);
David Hildenbranddb0758b2016-02-15 09:42:25 +01002453}
2454
2455/* needs disabled preemption to protect from TOD sync and vcpu_load/put */
2456static void __enable_cpu_timer_accounting(struct kvm_vcpu *vcpu)
2457{
2458 WARN_ON_ONCE(vcpu->arch.cputm_enabled);
2459 vcpu->arch.cputm_enabled = true;
2460 __start_cpu_timer_accounting(vcpu);
2461}
2462
2463/* needs disabled preemption to protect from TOD sync and vcpu_load/put */
2464static void __disable_cpu_timer_accounting(struct kvm_vcpu *vcpu)
2465{
2466 WARN_ON_ONCE(!vcpu->arch.cputm_enabled);
2467 __stop_cpu_timer_accounting(vcpu);
2468 vcpu->arch.cputm_enabled = false;
2469}
2470
2471static void enable_cpu_timer_accounting(struct kvm_vcpu *vcpu)
2472{
2473 preempt_disable(); /* protect from TOD sync and vcpu_load/put */
2474 __enable_cpu_timer_accounting(vcpu);
2475 preempt_enable();
2476}
2477
2478static void disable_cpu_timer_accounting(struct kvm_vcpu *vcpu)
2479{
2480 preempt_disable(); /* protect from TOD sync and vcpu_load/put */
2481 __disable_cpu_timer_accounting(vcpu);
2482 preempt_enable();
2483}
2484
David Hildenbrand4287f242016-02-15 09:40:12 +01002485/* set the cpu timer - may only be called from the VCPU thread itself */
2486void kvm_s390_set_cpu_timer(struct kvm_vcpu *vcpu, __u64 cputm)
2487{
David Hildenbranddb0758b2016-02-15 09:42:25 +01002488 preempt_disable(); /* protect from TOD sync and vcpu_load/put */
David Hildenbrand9c23a132016-02-17 21:53:33 +01002489 raw_write_seqcount_begin(&vcpu->arch.cputm_seqcount);
David Hildenbranddb0758b2016-02-15 09:42:25 +01002490 if (vcpu->arch.cputm_enabled)
2491 vcpu->arch.cputm_start = get_tod_clock_fast();
David Hildenbrand4287f242016-02-15 09:40:12 +01002492 vcpu->arch.sie_block->cputm = cputm;
David Hildenbrand9c23a132016-02-17 21:53:33 +01002493 raw_write_seqcount_end(&vcpu->arch.cputm_seqcount);
David Hildenbranddb0758b2016-02-15 09:42:25 +01002494 preempt_enable();
David Hildenbrand4287f242016-02-15 09:40:12 +01002495}
2496
David Hildenbranddb0758b2016-02-15 09:42:25 +01002497/* update and get the cpu timer - can also be called from other VCPU threads */
David Hildenbrand4287f242016-02-15 09:40:12 +01002498__u64 kvm_s390_get_cpu_timer(struct kvm_vcpu *vcpu)
2499{
David Hildenbrand9c23a132016-02-17 21:53:33 +01002500 unsigned int seq;
David Hildenbranddb0758b2016-02-15 09:42:25 +01002501 __u64 value;
David Hildenbranddb0758b2016-02-15 09:42:25 +01002502
2503 if (unlikely(!vcpu->arch.cputm_enabled))
2504 return vcpu->arch.sie_block->cputm;
2505
David Hildenbrand9c23a132016-02-17 21:53:33 +01002506 preempt_disable(); /* protect from TOD sync and vcpu_load/put */
2507 do {
2508 seq = raw_read_seqcount(&vcpu->arch.cputm_seqcount);
2509 /*
2510 * If the writer would ever execute a read in the critical
2511 * section, e.g. in irq context, we have a deadlock.
2512 */
2513 WARN_ON_ONCE((seq & 1) && smp_processor_id() == vcpu->cpu);
2514 value = vcpu->arch.sie_block->cputm;
2515 /* if cputm_start is 0, accounting is being started/stopped */
2516 if (likely(vcpu->arch.cputm_start))
2517 value -= get_tod_clock_fast() - vcpu->arch.cputm_start;
2518 } while (read_seqcount_retry(&vcpu->arch.cputm_seqcount, seq & ~1));
2519 preempt_enable();
David Hildenbranddb0758b2016-02-15 09:42:25 +01002520 return value;
David Hildenbrand4287f242016-02-15 09:40:12 +01002521}
2522
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002523void kvm_arch_vcpu_load(struct kvm_vcpu *vcpu, int cpu)
2524{
Hendrik Brueckner9977e882015-06-10 12:53:42 +02002525
David Hildenbrand37d9df92015-03-11 16:47:33 +01002526 gmap_enable(vcpu->arch.enabled_gmap);
David Hildenbrandef8f4f42018-01-23 18:05:29 +01002527 kvm_s390_set_cpuflags(vcpu, CPUSTAT_RUNNING);
David Hildenbrand5ebda312016-02-22 13:52:27 +01002528 if (vcpu->arch.cputm_enabled && !is_vcpu_idle(vcpu))
David Hildenbranddb0758b2016-02-15 09:42:25 +01002529 __start_cpu_timer_accounting(vcpu);
David Hildenbrand01a745a2016-02-12 20:41:56 +01002530 vcpu->cpu = cpu;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002531}
2532
2533void kvm_arch_vcpu_put(struct kvm_vcpu *vcpu)
2534{
David Hildenbrand01a745a2016-02-12 20:41:56 +01002535 vcpu->cpu = -1;
David Hildenbrand5ebda312016-02-22 13:52:27 +01002536 if (vcpu->arch.cputm_enabled && !is_vcpu_idle(vcpu))
David Hildenbranddb0758b2016-02-15 09:42:25 +01002537 __stop_cpu_timer_accounting(vcpu);
David Hildenbrand9daecfc2018-01-23 18:05:30 +01002538 kvm_s390_clear_cpuflags(vcpu, CPUSTAT_RUNNING);
David Hildenbrand37d9df92015-03-11 16:47:33 +01002539 vcpu->arch.enabled_gmap = gmap_get_enabled();
2540 gmap_disable(vcpu->arch.enabled_gmap);
Hendrik Brueckner9977e882015-06-10 12:53:42 +02002541
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002542}
2543
2544static void kvm_s390_vcpu_initial_reset(struct kvm_vcpu *vcpu)
2545{
2546 /* this equals initial cpu reset in pop, but we don't switch to ESA */
2547 vcpu->arch.sie_block->gpsw.mask = 0UL;
2548 vcpu->arch.sie_block->gpsw.addr = 0UL;
Christian Borntraeger8d26cf72012-01-11 11:19:32 +01002549 kvm_s390_set_prefix(vcpu, 0);
David Hildenbrand4287f242016-02-15 09:40:12 +01002550 kvm_s390_set_cpu_timer(vcpu, 0);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002551 vcpu->arch.sie_block->ckc = 0UL;
2552 vcpu->arch.sie_block->todpr = 0;
2553 memset(vcpu->arch.sie_block->gcr, 0, 16 * sizeof(__u64));
David Hildenbrandb9224cd2018-04-30 17:55:24 +02002554 vcpu->arch.sie_block->gcr[0] = CR0_UNUSED_56 |
2555 CR0_INTERRUPT_KEY_SUBMASK |
2556 CR0_MEASUREMENT_ALERT_SUBMASK;
2557 vcpu->arch.sie_block->gcr[14] = CR14_UNUSED_32 |
2558 CR14_UNUSED_33 |
2559 CR14_EXTERNAL_DAMAGE_SUBMASK;
David Hildenbrand9abc2a02016-01-14 22:12:47 +01002560 /* make sure the new fpc will be lazily loaded */
2561 save_fpu_regs();
2562 current->thread.fpu.fpc = 0;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002563 vcpu->arch.sie_block->gbea = 1;
Christian Borntraeger672550f2014-02-10 15:32:19 +01002564 vcpu->arch.sie_block->pp = 0;
Christian Borntraeger35b3fde2018-01-17 14:44:34 +01002565 vcpu->arch.sie_block->fpf &= ~FPF_BPBC;
Dominik Dingel3c038e62013-10-07 17:11:48 +02002566 vcpu->arch.pfault_token = KVM_S390_PFAULT_TOKEN_INVALID;
2567 kvm_clear_async_pf_completion_queue(vcpu);
David Hildenbrand6352e4d2014-04-10 17:35:00 +02002568 if (!kvm_s390_user_cpu_state_ctrl(vcpu->kvm))
2569 kvm_s390_vcpu_stop(vcpu);
Jens Freimann2ed10cc2014-02-11 13:48:07 +01002570 kvm_s390_clear_local_irqs(vcpu);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002571}
2572
Dominik Dingel31928aa2014-12-04 15:47:07 +01002573void kvm_arch_vcpu_postcreate(struct kvm_vcpu *vcpu)
Marcelo Tosatti42897d82012-11-27 23:29:02 -02002574{
Jason J. Herne72f25022014-11-25 09:46:02 -05002575 mutex_lock(&vcpu->kvm->lock);
Fan Zhangfdf03652015-05-13 10:58:41 +02002576 preempt_disable();
Jason J. Herne72f25022014-11-25 09:46:02 -05002577 vcpu->arch.sie_block->epoch = vcpu->kvm->arch.epoch;
David Hildenbrandd16b52c2018-02-07 12:46:44 +01002578 vcpu->arch.sie_block->epdx = vcpu->kvm->arch.epdx;
Fan Zhangfdf03652015-05-13 10:58:41 +02002579 preempt_enable();
Jason J. Herne72f25022014-11-25 09:46:02 -05002580 mutex_unlock(&vcpu->kvm->lock);
David Hildenbrand25508822015-10-12 16:27:23 +02002581 if (!kvm_is_ucontrol(vcpu->kvm)) {
Dominik Dingeldafd0322014-12-02 16:53:21 +01002582 vcpu->arch.gmap = vcpu->kvm->arch.gmap;
David Hildenbrandeaa78f32015-10-12 16:29:01 +02002583 sca_add_vcpu(vcpu);
David Hildenbrand25508822015-10-12 16:27:23 +02002584 }
David Hildenbrand6502a342016-06-21 14:19:51 +02002585 if (test_kvm_facility(vcpu->kvm, 74) || vcpu->kvm->arch.user_instr0)
2586 vcpu->arch.sie_block->ictl |= ICTL_OPEREXC;
David Hildenbrand37d9df92015-03-11 16:47:33 +01002587 /* make vcpu_load load the right gmap on the first trigger */
2588 vcpu->arch.enabled_gmap = vcpu->arch.gmap;
Marcelo Tosatti42897d82012-11-27 23:29:02 -02002589}
2590
Tony Krowiak5102ee82014-06-27 14:46:01 -04002591static void kvm_s390_vcpu_crypto_setup(struct kvm_vcpu *vcpu)
2592{
Tony Krowiake585b242018-09-25 19:16:18 -04002593 /*
2594 * If the AP instructions are not being interpreted and the MSAX3
2595 * facility is not configured for the guest, there is nothing to set up.
2596 */
2597 if (!vcpu->kvm->arch.crypto.apie && !test_kvm_facility(vcpu->kvm, 76))
Tony Krowiak5102ee82014-06-27 14:46:01 -04002598 return;
2599
Tony Krowiake585b242018-09-25 19:16:18 -04002600 vcpu->arch.sie_block->crycbd = vcpu->kvm->arch.crypto.crycbd;
Tony Krowiaka374e892014-09-03 10:13:53 +02002601 vcpu->arch.sie_block->ecb3 &= ~(ECB3_AES | ECB3_DEA);
2602
Tony Krowiake585b242018-09-25 19:16:18 -04002603 if (vcpu->kvm->arch.crypto.apie)
2604 vcpu->arch.sie_block->eca |= ECA_APIE;
2605
2606 /* Set up protected key support */
Tony Krowiaka374e892014-09-03 10:13:53 +02002607 if (vcpu->kvm->arch.crypto.aes_kw)
2608 vcpu->arch.sie_block->ecb3 |= ECB3_AES;
2609 if (vcpu->kvm->arch.crypto.dea_kw)
2610 vcpu->arch.sie_block->ecb3 |= ECB3_DEA;
Tony Krowiak5102ee82014-06-27 14:46:01 -04002611}
2612
Dominik Dingelb31605c2014-03-25 13:47:11 +01002613void kvm_s390_vcpu_unsetup_cmma(struct kvm_vcpu *vcpu)
2614{
2615 free_page(vcpu->arch.sie_block->cbrlo);
2616 vcpu->arch.sie_block->cbrlo = 0;
2617}
2618
2619int kvm_s390_vcpu_setup_cmma(struct kvm_vcpu *vcpu)
2620{
2621 vcpu->arch.sie_block->cbrlo = get_zeroed_page(GFP_KERNEL);
2622 if (!vcpu->arch.sie_block->cbrlo)
2623 return -ENOMEM;
Dominik Dingelb31605c2014-03-25 13:47:11 +01002624 return 0;
2625}
2626
Michael Mueller91520f12015-02-27 14:32:11 +01002627static void kvm_s390_vcpu_setup_model(struct kvm_vcpu *vcpu)
2628{
2629 struct kvm_s390_cpu_model *model = &vcpu->kvm->arch.model;
2630
Michael Mueller91520f12015-02-27 14:32:11 +01002631 vcpu->arch.sie_block->ibc = model->ibc;
David Hildenbrand80bc79d2015-12-02 09:43:29 +01002632 if (test_kvm_facility(vcpu->kvm, 7))
David Hildenbrandc54f0d62015-12-02 08:53:52 +01002633 vcpu->arch.sie_block->fac = (u32)(u64) model->fac_list;
Michael Mueller91520f12015-02-27 14:32:11 +01002634}
2635
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002636int kvm_arch_vcpu_setup(struct kvm_vcpu *vcpu)
2637{
Dominik Dingelb31605c2014-03-25 13:47:11 +01002638 int rc = 0;
Konstantin Weitzb31288f2013-04-17 17:36:29 +02002639
Cornelia Huck9e6dabe2011-11-17 11:00:41 +01002640 atomic_set(&vcpu->arch.sie_block->cpuflags, CPUSTAT_ZARCH |
2641 CPUSTAT_SM |
Guenther Hutzla4a4f192015-03-31 14:39:49 +02002642 CPUSTAT_STOPPED);
2643
Guenther Hutzl53df84f2015-02-18 11:13:03 +01002644 if (test_kvm_facility(vcpu->kvm, 78))
David Hildenbrandef8f4f42018-01-23 18:05:29 +01002645 kvm_s390_set_cpuflags(vcpu, CPUSTAT_GED2);
Guenther Hutzl53df84f2015-02-18 11:13:03 +01002646 else if (test_kvm_facility(vcpu->kvm, 8))
David Hildenbrandef8f4f42018-01-23 18:05:29 +01002647 kvm_s390_set_cpuflags(vcpu, CPUSTAT_GED);
Guenther Hutzla4a4f192015-03-31 14:39:49 +02002648
Michael Mueller91520f12015-02-27 14:32:11 +01002649 kvm_s390_vcpu_setup_model(vcpu);
2650
David Hildenbrandbdab09f2016-04-12 11:07:49 +02002651 /* pgste_set_pte has special handling for !MACHINE_HAS_ESOP */
2652 if (MACHINE_HAS_ESOP)
David Hildenbrand0c9d8682017-03-13 11:48:28 +01002653 vcpu->arch.sie_block->ecb |= ECB_HOSTPROTINT;
David Hildenbrandbd50e8e2016-03-04 12:23:55 +01002654 if (test_kvm_facility(vcpu->kvm, 9))
David Hildenbrand0c9d8682017-03-13 11:48:28 +01002655 vcpu->arch.sie_block->ecb |= ECB_SRSI;
David Hildenbrandf597d242016-04-22 16:26:49 +02002656 if (test_kvm_facility(vcpu->kvm, 73))
David Hildenbrand0c9d8682017-03-13 11:48:28 +01002657 vcpu->arch.sie_block->ecb |= ECB_TE;
Michael Mueller7feb6bb2013-06-28 13:30:24 +02002658
Janosch Frankc9f0a2b2018-02-16 12:16:14 +01002659 if (test_kvm_facility(vcpu->kvm, 8) && vcpu->kvm->arch.use_pfmfi)
David Hildenbrand0c9d8682017-03-13 11:48:28 +01002660 vcpu->arch.sie_block->ecb2 |= ECB2_PFMFI;
Janosch Frankcd1836f2016-08-04 09:57:36 +02002661 if (test_kvm_facility(vcpu->kvm, 130))
David Hildenbrand0c9d8682017-03-13 11:48:28 +01002662 vcpu->arch.sie_block->ecb2 |= ECB2_IEP;
2663 vcpu->arch.sie_block->eca = ECA_MVPGI | ECA_PROTEXCI;
David Hildenbrand48ee7d32016-04-04 15:49:34 +02002664 if (sclp.has_cei)
David Hildenbrand0c9d8682017-03-13 11:48:28 +01002665 vcpu->arch.sie_block->eca |= ECA_CEI;
David Hildenbrand11ad65b2016-04-04 15:46:26 +02002666 if (sclp.has_ib)
David Hildenbrand0c9d8682017-03-13 11:48:28 +01002667 vcpu->arch.sie_block->eca |= ECA_IB;
David Hildenbrand37c5f6c2015-05-06 13:18:59 +02002668 if (sclp.has_siif)
David Hildenbrand0c9d8682017-03-13 11:48:28 +01002669 vcpu->arch.sie_block->eca |= ECA_SII;
David Hildenbrand37c5f6c2015-05-06 13:18:59 +02002670 if (sclp.has_sigpif)
David Hildenbrand0c9d8682017-03-13 11:48:28 +01002671 vcpu->arch.sie_block->eca |= ECA_SIGPI;
Michael Mueller18280d82015-03-16 16:05:41 +01002672 if (test_kvm_facility(vcpu->kvm, 129)) {
David Hildenbrand0c9d8682017-03-13 11:48:28 +01002673 vcpu->arch.sie_block->eca |= ECA_VX;
2674 vcpu->arch.sie_block->ecd |= ECD_HOSTREGMGMT;
Eric Farman13211ea2014-04-30 13:39:46 -04002675 }
Collin L. Walling8fa16962016-07-26 15:29:44 -04002676 if (test_kvm_facility(vcpu->kvm, 139))
2677 vcpu->arch.sie_block->ecd |= ECD_MEF;
Christian Borntraegera3da7b42018-03-08 16:08:49 +00002678 if (test_kvm_facility(vcpu->kvm, 156))
2679 vcpu->arch.sie_block->ecd |= ECD_ETOKENF;
Michael Muellerd7c5cb02017-06-12 14:15:19 +02002680 if (vcpu->arch.sie_block->gd) {
2681 vcpu->arch.sie_block->eca |= ECA_AIV;
2682 VCPU_EVENT(vcpu, 3, "AIV gisa format-%u enabled for cpu %03u",
2683 vcpu->arch.sie_block->gd & 0x3, vcpu->vcpu_id);
2684 }
Fan Zhang4e0b1ab2016-11-29 07:17:55 +01002685 vcpu->arch.sie_block->sdnxo = ((unsigned long) &vcpu->run->s.regs.sdnx)
2686 | SDNXC;
Fan Zhangc6e5f162016-01-07 18:24:29 +08002687 vcpu->arch.sie_block->riccbd = (unsigned long) &vcpu->run->s.regs.riccb;
Farhan Ali730cd632017-02-24 16:12:56 -05002688
2689 if (sclp.has_kss)
David Hildenbrandef8f4f42018-01-23 18:05:29 +01002690 kvm_s390_set_cpuflags(vcpu, CPUSTAT_KSS);
Farhan Ali730cd632017-02-24 16:12:56 -05002691 else
2692 vcpu->arch.sie_block->ictl |= ICTL_ISKE | ICTL_SSKE | ICTL_RRBE;
Matthew Rosato5a5e6532013-01-29 11:48:20 -05002693
Dominik Dingele6db1d62015-05-07 15:41:57 +02002694 if (vcpu->kvm->arch.use_cmma) {
Dominik Dingelb31605c2014-03-25 13:47:11 +01002695 rc = kvm_s390_vcpu_setup_cmma(vcpu);
2696 if (rc)
2697 return rc;
Konstantin Weitzb31288f2013-04-17 17:36:29 +02002698 }
David Hildenbrand0ac96caf2014-12-12 15:17:31 +01002699 hrtimer_init(&vcpu->arch.ckc_timer, CLOCK_MONOTONIC, HRTIMER_MODE_REL);
Christian Borntraegerca872302009-05-12 17:21:49 +02002700 vcpu->arch.ckc_timer.function = kvm_s390_idle_wakeup;
Michael Mueller9d8d5782015-02-02 15:42:51 +01002701
Tony Krowiak5102ee82014-06-27 14:46:01 -04002702 kvm_s390_vcpu_crypto_setup(vcpu);
2703
Dominik Dingelb31605c2014-03-25 13:47:11 +01002704 return rc;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002705}
2706
2707struct kvm_vcpu *kvm_arch_vcpu_create(struct kvm *kvm,
2708 unsigned int id)
2709{
Carsten Otte4d475552011-10-18 12:27:12 +02002710 struct kvm_vcpu *vcpu;
Michael Mueller7feb6bb2013-06-28 13:30:24 +02002711 struct sie_page *sie_page;
Carsten Otte4d475552011-10-18 12:27:12 +02002712 int rc = -EINVAL;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002713
David Hildenbrand42158252015-10-12 12:57:22 +02002714 if (!kvm_is_ucontrol(kvm) && !sca_can_add_vcpu(kvm, id))
Carsten Otte4d475552011-10-18 12:27:12 +02002715 goto out;
2716
2717 rc = -ENOMEM;
2718
Michael Muellerb110fea2013-06-12 13:54:54 +02002719 vcpu = kmem_cache_zalloc(kvm_vcpu_cache, GFP_KERNEL);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002720 if (!vcpu)
Carsten Otte4d475552011-10-18 12:27:12 +02002721 goto out;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002722
QingFeng Haoda72ca42017-06-07 11:41:19 +02002723 BUILD_BUG_ON(sizeof(struct sie_page) != 4096);
Michael Mueller7feb6bb2013-06-28 13:30:24 +02002724 sie_page = (struct sie_page *) get_zeroed_page(GFP_KERNEL);
2725 if (!sie_page)
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002726 goto out_free_cpu;
2727
Michael Mueller7feb6bb2013-06-28 13:30:24 +02002728 vcpu->arch.sie_block = &sie_page->sie_block;
2729 vcpu->arch.sie_block->itdba = (unsigned long) &sie_page->itdb;
2730
David Hildenbrandefed1102015-04-16 12:32:41 +02002731 /* the real guest size will always be smaller than msl */
2732 vcpu->arch.sie_block->mso = 0;
2733 vcpu->arch.sie_block->msl = sclp.hamax;
2734
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002735 vcpu->arch.sie_block->icpua = id;
Carsten Otteba5c1e92008-03-25 18:47:26 +01002736 spin_lock_init(&vcpu->arch.local_int.lock);
Michael Muellerd7c5cb02017-06-12 14:15:19 +02002737 vcpu->arch.sie_block->gd = (u32)(u64)kvm->arch.gisa;
Michael Mueller4b9f9522017-06-23 13:51:25 +02002738 if (vcpu->arch.sie_block->gd && sclp.has_gisaf)
2739 vcpu->arch.sie_block->gd |= GISA_FORMAT1;
David Hildenbrand9c23a132016-02-17 21:53:33 +01002740 seqcount_init(&vcpu->arch.cputm_seqcount);
Carsten Otteba5c1e92008-03-25 18:47:26 +01002741
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002742 rc = kvm_vcpu_init(vcpu, kvm, id);
2743 if (rc)
David Hildenbrand9abc2a02016-01-14 22:12:47 +01002744 goto out_free_sie_block;
Christian Borntraeger8335713a2015-12-08 16:55:27 +01002745 VM_EVENT(kvm, 3, "create cpu %d at 0x%pK, sie block at 0x%pK", id, vcpu,
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002746 vcpu->arch.sie_block);
Cornelia Huckade38c32012-07-23 17:20:30 +02002747 trace_kvm_s390_create_vcpu(id, vcpu, vcpu->arch.sie_block);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002748
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002749 return vcpu;
Wei Yongjun7b06bf22010-03-09 14:37:53 +08002750out_free_sie_block:
2751 free_page((unsigned long)(vcpu->arch.sie_block));
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002752out_free_cpu:
Michael Muellerb110fea2013-06-12 13:54:54 +02002753 kmem_cache_free(kvm_vcpu_cache, vcpu);
Carsten Otte4d475552011-10-18 12:27:12 +02002754out:
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002755 return ERR_PTR(rc);
2756}
2757
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002758int kvm_arch_vcpu_runnable(struct kvm_vcpu *vcpu)
2759{
David Hildenbrand9a022062014-08-05 17:40:47 +02002760 return kvm_s390_vcpu_has_irq(vcpu, 0);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002761}
2762
Longpeng(Mike)199b5762017-08-08 12:05:32 +08002763bool kvm_arch_vcpu_in_kernel(struct kvm_vcpu *vcpu)
2764{
Longpeng(Mike)0546c632017-08-08 12:05:34 +08002765 return !(vcpu->arch.sie_block->gpsw.mask & PSW_MASK_PSTATE);
Longpeng(Mike)199b5762017-08-08 12:05:32 +08002766}
2767
Christian Borntraeger27406cd2015-04-14 12:17:34 +02002768void kvm_s390_vcpu_block(struct kvm_vcpu *vcpu)
Christian Borntraeger49b99e12013-05-17 14:41:35 +02002769{
Peter Zijlstra805de8f42015-04-24 01:12:32 +02002770 atomic_or(PROG_BLOCK_SIE, &vcpu->arch.sie_block->prog20);
David Hildenbrand61a6df52015-05-12 08:41:40 +02002771 exit_sie(vcpu);
Christian Borntraeger49b99e12013-05-17 14:41:35 +02002772}
2773
Christian Borntraeger27406cd2015-04-14 12:17:34 +02002774void kvm_s390_vcpu_unblock(struct kvm_vcpu *vcpu)
Christian Borntraeger49b99e12013-05-17 14:41:35 +02002775{
Peter Zijlstra805de8f42015-04-24 01:12:32 +02002776 atomic_andnot(PROG_BLOCK_SIE, &vcpu->arch.sie_block->prog20);
Christian Borntraeger49b99e12013-05-17 14:41:35 +02002777}
2778
Christian Borntraeger8e236542015-04-09 13:49:04 +02002779static void kvm_s390_vcpu_request(struct kvm_vcpu *vcpu)
2780{
Peter Zijlstra805de8f42015-04-24 01:12:32 +02002781 atomic_or(PROG_REQUEST, &vcpu->arch.sie_block->prog20);
David Hildenbrand61a6df52015-05-12 08:41:40 +02002782 exit_sie(vcpu);
Christian Borntraeger8e236542015-04-09 13:49:04 +02002783}
2784
David Hildenbrand9ea59722018-09-25 19:16:16 -04002785bool kvm_s390_vcpu_sie_inhibited(struct kvm_vcpu *vcpu)
2786{
2787 return atomic_read(&vcpu->arch.sie_block->prog20) &
2788 (PROG_BLOCK_SIE | PROG_REQUEST);
2789}
2790
Christian Borntraeger8e236542015-04-09 13:49:04 +02002791static void kvm_s390_vcpu_request_handled(struct kvm_vcpu *vcpu)
2792{
Jason J. Herne9bf9fde2015-09-16 09:13:50 -04002793 atomic_andnot(PROG_REQUEST, &vcpu->arch.sie_block->prog20);
Christian Borntraeger8e236542015-04-09 13:49:04 +02002794}
2795
Christian Borntraeger49b99e12013-05-17 14:41:35 +02002796/*
David Hildenbrand9ea59722018-09-25 19:16:16 -04002797 * Kick a guest cpu out of (v)SIE and wait until (v)SIE is not running.
Christian Borntraeger49b99e12013-05-17 14:41:35 +02002798 * If the CPU is not running (e.g. waiting as idle) the function will
2799 * return immediately. */
2800void exit_sie(struct kvm_vcpu *vcpu)
2801{
David Hildenbrandef8f4f42018-01-23 18:05:29 +01002802 kvm_s390_set_cpuflags(vcpu, CPUSTAT_STOP_INT);
David Hildenbrand9ea59722018-09-25 19:16:16 -04002803 kvm_s390_vsie_kick(vcpu);
Christian Borntraeger49b99e12013-05-17 14:41:35 +02002804 while (vcpu->arch.sie_block->prog0c & PROG_IN_SIE)
2805 cpu_relax();
2806}
2807
Christian Borntraeger8e236542015-04-09 13:49:04 +02002808/* Kick a guest cpu out of SIE to process a request synchronously */
2809void kvm_s390_sync_request(int req, struct kvm_vcpu *vcpu)
Christian Borntraeger49b99e12013-05-17 14:41:35 +02002810{
Christian Borntraeger8e236542015-04-09 13:49:04 +02002811 kvm_make_request(req, vcpu);
2812 kvm_s390_vcpu_request(vcpu);
Christian Borntraeger49b99e12013-05-17 14:41:35 +02002813}
2814
Martin Schwidefsky414d3b02016-03-08 11:52:54 +01002815static void kvm_gmap_notifier(struct gmap *gmap, unsigned long start,
2816 unsigned long end)
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02002817{
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02002818 struct kvm *kvm = gmap->private;
2819 struct kvm_vcpu *vcpu;
Martin Schwidefsky414d3b02016-03-08 11:52:54 +01002820 unsigned long prefix;
2821 int i;
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02002822
David Hildenbrand65d0b0d2015-04-27 16:29:34 +02002823 if (gmap_is_shadow(gmap))
2824 return;
Martin Schwidefsky414d3b02016-03-08 11:52:54 +01002825 if (start >= 1UL << 31)
2826 /* We are only interested in prefix pages */
2827 return;
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02002828 kvm_for_each_vcpu(i, vcpu, kvm) {
2829 /* match against both prefix pages */
Martin Schwidefsky414d3b02016-03-08 11:52:54 +01002830 prefix = kvm_s390_get_prefix(vcpu);
2831 if (prefix <= end && start <= prefix + 2*PAGE_SIZE - 1) {
2832 VCPU_EVENT(vcpu, 2, "gmap notifier for %lx-%lx",
2833 start, end);
Christian Borntraeger8e236542015-04-09 13:49:04 +02002834 kvm_s390_sync_request(KVM_REQ_MMU_RELOAD, vcpu);
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02002835 }
2836 }
2837}
2838
Christoffer Dallb6d33832012-03-08 16:44:24 -05002839int kvm_arch_vcpu_should_kick(struct kvm_vcpu *vcpu)
2840{
2841 /* kvm common code refers to this, but never calls it */
2842 BUG();
2843 return 0;
2844}
2845
Carsten Otte14eebd92012-05-15 14:15:26 +02002846static int kvm_arch_vcpu_ioctl_get_one_reg(struct kvm_vcpu *vcpu,
2847 struct kvm_one_reg *reg)
2848{
2849 int r = -EINVAL;
2850
2851 switch (reg->id) {
Carsten Otte29b7c712012-05-15 14:15:27 +02002852 case KVM_REG_S390_TODPR:
2853 r = put_user(vcpu->arch.sie_block->todpr,
2854 (u32 __user *)reg->addr);
2855 break;
2856 case KVM_REG_S390_EPOCHDIFF:
2857 r = put_user(vcpu->arch.sie_block->epoch,
2858 (u64 __user *)reg->addr);
2859 break;
Jason J. herne46a6dd12012-05-15 14:15:28 +02002860 case KVM_REG_S390_CPU_TIMER:
David Hildenbrand4287f242016-02-15 09:40:12 +01002861 r = put_user(kvm_s390_get_cpu_timer(vcpu),
Jason J. herne46a6dd12012-05-15 14:15:28 +02002862 (u64 __user *)reg->addr);
2863 break;
2864 case KVM_REG_S390_CLOCK_COMP:
2865 r = put_user(vcpu->arch.sie_block->ckc,
2866 (u64 __user *)reg->addr);
2867 break;
Dominik Dingel536336c2013-09-30 10:55:33 +02002868 case KVM_REG_S390_PFTOKEN:
2869 r = put_user(vcpu->arch.pfault_token,
2870 (u64 __user *)reg->addr);
2871 break;
2872 case KVM_REG_S390_PFCOMPARE:
2873 r = put_user(vcpu->arch.pfault_compare,
2874 (u64 __user *)reg->addr);
2875 break;
2876 case KVM_REG_S390_PFSELECT:
2877 r = put_user(vcpu->arch.pfault_select,
2878 (u64 __user *)reg->addr);
2879 break;
Christian Borntraeger672550f2014-02-10 15:32:19 +01002880 case KVM_REG_S390_PP:
2881 r = put_user(vcpu->arch.sie_block->pp,
2882 (u64 __user *)reg->addr);
2883 break;
Christian Borntraegerafa45ff2014-02-10 15:39:23 +01002884 case KVM_REG_S390_GBEA:
2885 r = put_user(vcpu->arch.sie_block->gbea,
2886 (u64 __user *)reg->addr);
2887 break;
Carsten Otte14eebd92012-05-15 14:15:26 +02002888 default:
2889 break;
2890 }
2891
2892 return r;
2893}
2894
2895static int kvm_arch_vcpu_ioctl_set_one_reg(struct kvm_vcpu *vcpu,
2896 struct kvm_one_reg *reg)
2897{
2898 int r = -EINVAL;
David Hildenbrand4287f242016-02-15 09:40:12 +01002899 __u64 val;
Carsten Otte14eebd92012-05-15 14:15:26 +02002900
2901 switch (reg->id) {
Carsten Otte29b7c712012-05-15 14:15:27 +02002902 case KVM_REG_S390_TODPR:
2903 r = get_user(vcpu->arch.sie_block->todpr,
2904 (u32 __user *)reg->addr);
2905 break;
2906 case KVM_REG_S390_EPOCHDIFF:
2907 r = get_user(vcpu->arch.sie_block->epoch,
2908 (u64 __user *)reg->addr);
2909 break;
Jason J. herne46a6dd12012-05-15 14:15:28 +02002910 case KVM_REG_S390_CPU_TIMER:
David Hildenbrand4287f242016-02-15 09:40:12 +01002911 r = get_user(val, (u64 __user *)reg->addr);
2912 if (!r)
2913 kvm_s390_set_cpu_timer(vcpu, val);
Jason J. herne46a6dd12012-05-15 14:15:28 +02002914 break;
2915 case KVM_REG_S390_CLOCK_COMP:
2916 r = get_user(vcpu->arch.sie_block->ckc,
2917 (u64 __user *)reg->addr);
2918 break;
Dominik Dingel536336c2013-09-30 10:55:33 +02002919 case KVM_REG_S390_PFTOKEN:
2920 r = get_user(vcpu->arch.pfault_token,
2921 (u64 __user *)reg->addr);
David Hildenbrand9fbd8082014-10-09 15:01:38 +02002922 if (vcpu->arch.pfault_token == KVM_S390_PFAULT_TOKEN_INVALID)
2923 kvm_clear_async_pf_completion_queue(vcpu);
Dominik Dingel536336c2013-09-30 10:55:33 +02002924 break;
2925 case KVM_REG_S390_PFCOMPARE:
2926 r = get_user(vcpu->arch.pfault_compare,
2927 (u64 __user *)reg->addr);
2928 break;
2929 case KVM_REG_S390_PFSELECT:
2930 r = get_user(vcpu->arch.pfault_select,
2931 (u64 __user *)reg->addr);
2932 break;
Christian Borntraeger672550f2014-02-10 15:32:19 +01002933 case KVM_REG_S390_PP:
2934 r = get_user(vcpu->arch.sie_block->pp,
2935 (u64 __user *)reg->addr);
2936 break;
Christian Borntraegerafa45ff2014-02-10 15:39:23 +01002937 case KVM_REG_S390_GBEA:
2938 r = get_user(vcpu->arch.sie_block->gbea,
2939 (u64 __user *)reg->addr);
2940 break;
Carsten Otte14eebd92012-05-15 14:15:26 +02002941 default:
2942 break;
2943 }
2944
2945 return r;
2946}
Christoffer Dallb6d33832012-03-08 16:44:24 -05002947
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002948static int kvm_arch_vcpu_ioctl_initial_reset(struct kvm_vcpu *vcpu)
2949{
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002950 kvm_s390_vcpu_initial_reset(vcpu);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002951 return 0;
2952}
2953
2954int kvm_arch_vcpu_ioctl_set_regs(struct kvm_vcpu *vcpu, struct kvm_regs *regs)
2955{
Christoffer Dall875656f2017-12-04 21:35:27 +01002956 vcpu_load(vcpu);
Christian Borntraeger5a32c1a2012-01-11 11:20:32 +01002957 memcpy(&vcpu->run->s.regs.gprs, &regs->gprs, sizeof(regs->gprs));
Christoffer Dall875656f2017-12-04 21:35:27 +01002958 vcpu_put(vcpu);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002959 return 0;
2960}
2961
2962int kvm_arch_vcpu_ioctl_get_regs(struct kvm_vcpu *vcpu, struct kvm_regs *regs)
2963{
Christoffer Dall1fc9b762017-12-04 21:35:26 +01002964 vcpu_load(vcpu);
Christian Borntraeger5a32c1a2012-01-11 11:20:32 +01002965 memcpy(&regs->gprs, &vcpu->run->s.regs.gprs, sizeof(regs->gprs));
Christoffer Dall1fc9b762017-12-04 21:35:26 +01002966 vcpu_put(vcpu);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002967 return 0;
2968}
2969
2970int kvm_arch_vcpu_ioctl_set_sregs(struct kvm_vcpu *vcpu,
2971 struct kvm_sregs *sregs)
2972{
Christoffer Dallb4ef9d42017-12-04 21:35:29 +01002973 vcpu_load(vcpu);
2974
Christian Borntraeger59674c12012-01-11 11:20:33 +01002975 memcpy(&vcpu->run->s.regs.acrs, &sregs->acrs, sizeof(sregs->acrs));
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002976 memcpy(&vcpu->arch.sie_block->gcr, &sregs->crs, sizeof(sregs->crs));
Christoffer Dallb4ef9d42017-12-04 21:35:29 +01002977
2978 vcpu_put(vcpu);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002979 return 0;
2980}
2981
2982int kvm_arch_vcpu_ioctl_get_sregs(struct kvm_vcpu *vcpu,
2983 struct kvm_sregs *sregs)
2984{
Christoffer Dallbcdec412017-12-04 21:35:28 +01002985 vcpu_load(vcpu);
2986
Christian Borntraeger59674c12012-01-11 11:20:33 +01002987 memcpy(&sregs->acrs, &vcpu->run->s.regs.acrs, sizeof(sregs->acrs));
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002988 memcpy(&sregs->crs, &vcpu->arch.sie_block->gcr, sizeof(sregs->crs));
Christoffer Dallbcdec412017-12-04 21:35:28 +01002989
2990 vcpu_put(vcpu);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002991 return 0;
2992}
2993
2994int kvm_arch_vcpu_ioctl_set_fpu(struct kvm_vcpu *vcpu, struct kvm_fpu *fpu)
2995{
Christoffer Dall6a96bc72017-12-04 21:35:35 +01002996 int ret = 0;
2997
2998 vcpu_load(vcpu);
2999
3000 if (test_fp_ctl(fpu->fpc)) {
3001 ret = -EINVAL;
3002 goto out;
3003 }
Christian Borntraegere1788bb2016-11-22 09:29:38 +01003004 vcpu->run->s.regs.fpc = fpu->fpc;
David Hildenbrand9abc2a02016-01-14 22:12:47 +01003005 if (MACHINE_HAS_VX)
David Hildenbranda7d4b8f2016-08-16 14:38:24 +02003006 convert_fp_to_vx((__vector128 *) vcpu->run->s.regs.vrs,
3007 (freg_t *) fpu->fprs);
David Hildenbrand9abc2a02016-01-14 22:12:47 +01003008 else
David Hildenbranda7d4b8f2016-08-16 14:38:24 +02003009 memcpy(vcpu->run->s.regs.fprs, &fpu->fprs, sizeof(fpu->fprs));
Christoffer Dall6a96bc72017-12-04 21:35:35 +01003010
3011out:
3012 vcpu_put(vcpu);
3013 return ret;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003014}
3015
3016int kvm_arch_vcpu_ioctl_get_fpu(struct kvm_vcpu *vcpu, struct kvm_fpu *fpu)
3017{
Christoffer Dall13931232017-12-04 21:35:34 +01003018 vcpu_load(vcpu);
3019
David Hildenbrand9abc2a02016-01-14 22:12:47 +01003020 /* make sure we have the latest values */
3021 save_fpu_regs();
3022 if (MACHINE_HAS_VX)
David Hildenbranda7d4b8f2016-08-16 14:38:24 +02003023 convert_vx_to_fp((freg_t *) fpu->fprs,
3024 (__vector128 *) vcpu->run->s.regs.vrs);
David Hildenbrand9abc2a02016-01-14 22:12:47 +01003025 else
David Hildenbranda7d4b8f2016-08-16 14:38:24 +02003026 memcpy(fpu->fprs, vcpu->run->s.regs.fprs, sizeof(fpu->fprs));
Christian Borntraegere1788bb2016-11-22 09:29:38 +01003027 fpu->fpc = vcpu->run->s.regs.fpc;
Christoffer Dall13931232017-12-04 21:35:34 +01003028
3029 vcpu_put(vcpu);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003030 return 0;
3031}
3032
3033static int kvm_arch_vcpu_ioctl_set_initial_psw(struct kvm_vcpu *vcpu, psw_t psw)
3034{
3035 int rc = 0;
3036
David Hildenbrand7a42fdc2014-05-05 16:26:19 +02003037 if (!is_vcpu_stopped(vcpu))
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003038 rc = -EBUSY;
Carsten Otted7b0b5e2009-11-19 14:21:16 +01003039 else {
3040 vcpu->run->psw_mask = psw.mask;
3041 vcpu->run->psw_addr = psw.addr;
3042 }
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003043 return rc;
3044}
3045
3046int kvm_arch_vcpu_ioctl_translate(struct kvm_vcpu *vcpu,
3047 struct kvm_translation *tr)
3048{
3049 return -EINVAL; /* not implemented yet */
3050}
3051
David Hildenbrand27291e22014-01-23 12:26:52 +01003052#define VALID_GUESTDBG_FLAGS (KVM_GUESTDBG_SINGLESTEP | \
3053 KVM_GUESTDBG_USE_HW_BP | \
3054 KVM_GUESTDBG_ENABLE)
3055
Jan Kiszkad0bfb942008-12-15 13:52:10 +01003056int kvm_arch_vcpu_ioctl_set_guest_debug(struct kvm_vcpu *vcpu,
3057 struct kvm_guest_debug *dbg)
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003058{
David Hildenbrand27291e22014-01-23 12:26:52 +01003059 int rc = 0;
3060
Christoffer Dall66b56562017-12-04 21:35:33 +01003061 vcpu_load(vcpu);
3062
David Hildenbrand27291e22014-01-23 12:26:52 +01003063 vcpu->guest_debug = 0;
3064 kvm_s390_clear_bp_data(vcpu);
3065
Christoffer Dall66b56562017-12-04 21:35:33 +01003066 if (dbg->control & ~VALID_GUESTDBG_FLAGS) {
3067 rc = -EINVAL;
3068 goto out;
3069 }
3070 if (!sclp.has_gpere) {
3071 rc = -EINVAL;
3072 goto out;
3073 }
David Hildenbrand27291e22014-01-23 12:26:52 +01003074
3075 if (dbg->control & KVM_GUESTDBG_ENABLE) {
3076 vcpu->guest_debug = dbg->control;
3077 /* enforce guest PER */
David Hildenbrandef8f4f42018-01-23 18:05:29 +01003078 kvm_s390_set_cpuflags(vcpu, CPUSTAT_P);
David Hildenbrand27291e22014-01-23 12:26:52 +01003079
3080 if (dbg->control & KVM_GUESTDBG_USE_HW_BP)
3081 rc = kvm_s390_import_bp_data(vcpu, dbg);
3082 } else {
David Hildenbrand9daecfc2018-01-23 18:05:30 +01003083 kvm_s390_clear_cpuflags(vcpu, CPUSTAT_P);
David Hildenbrand27291e22014-01-23 12:26:52 +01003084 vcpu->arch.guestdbg.last_bp = 0;
3085 }
3086
3087 if (rc) {
3088 vcpu->guest_debug = 0;
3089 kvm_s390_clear_bp_data(vcpu);
David Hildenbrand9daecfc2018-01-23 18:05:30 +01003090 kvm_s390_clear_cpuflags(vcpu, CPUSTAT_P);
David Hildenbrand27291e22014-01-23 12:26:52 +01003091 }
3092
Christoffer Dall66b56562017-12-04 21:35:33 +01003093out:
3094 vcpu_put(vcpu);
David Hildenbrand27291e22014-01-23 12:26:52 +01003095 return rc;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003096}
3097
Marcelo Tosatti62d9f0d2008-04-11 13:24:45 -03003098int kvm_arch_vcpu_ioctl_get_mpstate(struct kvm_vcpu *vcpu,
3099 struct kvm_mp_state *mp_state)
3100{
Christoffer Dallfd232562017-12-04 21:35:30 +01003101 int ret;
3102
3103 vcpu_load(vcpu);
3104
David Hildenbrand6352e4d2014-04-10 17:35:00 +02003105 /* CHECK_STOP and LOAD are not supported yet */
Christoffer Dallfd232562017-12-04 21:35:30 +01003106 ret = is_vcpu_stopped(vcpu) ? KVM_MP_STATE_STOPPED :
3107 KVM_MP_STATE_OPERATING;
3108
3109 vcpu_put(vcpu);
3110 return ret;
Marcelo Tosatti62d9f0d2008-04-11 13:24:45 -03003111}
3112
3113int kvm_arch_vcpu_ioctl_set_mpstate(struct kvm_vcpu *vcpu,
3114 struct kvm_mp_state *mp_state)
3115{
David Hildenbrand6352e4d2014-04-10 17:35:00 +02003116 int rc = 0;
3117
Christoffer Dalle83dff52017-12-04 21:35:31 +01003118 vcpu_load(vcpu);
3119
David Hildenbrand6352e4d2014-04-10 17:35:00 +02003120 /* user space knows about this interface - let it control the state */
3121 vcpu->kvm->arch.user_cpu_state_ctrl = 1;
3122
3123 switch (mp_state->mp_state) {
3124 case KVM_MP_STATE_STOPPED:
3125 kvm_s390_vcpu_stop(vcpu);
3126 break;
3127 case KVM_MP_STATE_OPERATING:
3128 kvm_s390_vcpu_start(vcpu);
3129 break;
3130 case KVM_MP_STATE_LOAD:
3131 case KVM_MP_STATE_CHECK_STOP:
3132 /* fall through - CHECK_STOP and LOAD are not supported yet */
3133 default:
3134 rc = -ENXIO;
3135 }
3136
Christoffer Dalle83dff52017-12-04 21:35:31 +01003137 vcpu_put(vcpu);
David Hildenbrand6352e4d2014-04-10 17:35:00 +02003138 return rc;
Marcelo Tosatti62d9f0d2008-04-11 13:24:45 -03003139}
3140
David Hildenbrand8ad35752014-03-14 11:00:21 +01003141static bool ibs_enabled(struct kvm_vcpu *vcpu)
3142{
David Hildenbrand8d5fb0d2018-01-23 18:05:31 +01003143 return kvm_s390_test_cpuflags(vcpu, CPUSTAT_IBS);
David Hildenbrand8ad35752014-03-14 11:00:21 +01003144}
3145
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02003146static int kvm_s390_handle_requests(struct kvm_vcpu *vcpu)
3147{
David Hildenbrand8ad35752014-03-14 11:00:21 +01003148retry:
Christian Borntraeger8e236542015-04-09 13:49:04 +02003149 kvm_s390_vcpu_request_handled(vcpu);
Radim Krčmář2fa6e1e2017-06-04 14:43:52 +02003150 if (!kvm_request_pending(vcpu))
Christian Borntraeger586b7cc2015-07-28 15:03:05 +02003151 return 0;
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02003152 /*
3153 * We use MMU_RELOAD just to re-arm the ipte notifier for the
Martin Schwidefskyb2d73b22016-03-08 11:54:42 +01003154 * guest prefix page. gmap_mprotect_notify will wait on the ptl lock.
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02003155 * This ensures that the ipte instruction for this request has
3156 * already finished. We might race against a second unmapper that
3157 * wants to set the blocking bit. Lets just retry the request loop.
3158 */
David Hildenbrand8ad35752014-03-14 11:00:21 +01003159 if (kvm_check_request(KVM_REQ_MMU_RELOAD, vcpu)) {
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02003160 int rc;
Martin Schwidefskyb2d73b22016-03-08 11:54:42 +01003161 rc = gmap_mprotect_notify(vcpu->arch.gmap,
3162 kvm_s390_get_prefix(vcpu),
3163 PAGE_SIZE * 2, PROT_WRITE);
Julius Niedworokaca411a2016-08-03 16:39:55 +02003164 if (rc) {
3165 kvm_make_request(KVM_REQ_MMU_RELOAD, vcpu);
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02003166 return rc;
Julius Niedworokaca411a2016-08-03 16:39:55 +02003167 }
David Hildenbrand8ad35752014-03-14 11:00:21 +01003168 goto retry;
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02003169 }
David Hildenbrand8ad35752014-03-14 11:00:21 +01003170
David Hildenbrandd3d692c2014-07-29 08:53:36 +02003171 if (kvm_check_request(KVM_REQ_TLB_FLUSH, vcpu)) {
3172 vcpu->arch.sie_block->ihcpu = 0xffff;
3173 goto retry;
3174 }
3175
David Hildenbrand8ad35752014-03-14 11:00:21 +01003176 if (kvm_check_request(KVM_REQ_ENABLE_IBS, vcpu)) {
3177 if (!ibs_enabled(vcpu)) {
3178 trace_kvm_s390_enable_disable_ibs(vcpu->vcpu_id, 1);
David Hildenbrandef8f4f42018-01-23 18:05:29 +01003179 kvm_s390_set_cpuflags(vcpu, CPUSTAT_IBS);
David Hildenbrand8ad35752014-03-14 11:00:21 +01003180 }
3181 goto retry;
3182 }
3183
3184 if (kvm_check_request(KVM_REQ_DISABLE_IBS, vcpu)) {
3185 if (ibs_enabled(vcpu)) {
3186 trace_kvm_s390_enable_disable_ibs(vcpu->vcpu_id, 0);
David Hildenbrand9daecfc2018-01-23 18:05:30 +01003187 kvm_s390_clear_cpuflags(vcpu, CPUSTAT_IBS);
David Hildenbrand8ad35752014-03-14 11:00:21 +01003188 }
3189 goto retry;
3190 }
3191
David Hildenbrand6502a342016-06-21 14:19:51 +02003192 if (kvm_check_request(KVM_REQ_ICPT_OPEREXC, vcpu)) {
3193 vcpu->arch.sie_block->ictl |= ICTL_OPEREXC;
3194 goto retry;
3195 }
3196
Claudio Imbrenda190df4a2016-08-04 17:54:42 +02003197 if (kvm_check_request(KVM_REQ_START_MIGRATION, vcpu)) {
3198 /*
Janosch Frankc9f0a2b2018-02-16 12:16:14 +01003199 * Disable CMM virtualization; we will emulate the ESSA
Claudio Imbrenda190df4a2016-08-04 17:54:42 +02003200 * instruction manually, in order to provide additional
3201 * functionalities needed for live migration.
3202 */
3203 vcpu->arch.sie_block->ecb2 &= ~ECB2_CMMA;
3204 goto retry;
3205 }
3206
3207 if (kvm_check_request(KVM_REQ_STOP_MIGRATION, vcpu)) {
3208 /*
Janosch Frankc9f0a2b2018-02-16 12:16:14 +01003209 * Re-enable CMM virtualization if CMMA is available and
3210 * CMM has been used.
Claudio Imbrenda190df4a2016-08-04 17:54:42 +02003211 */
3212 if ((vcpu->kvm->arch.use_cmma) &&
Janosch Frankc9f0a2b2018-02-16 12:16:14 +01003213 (vcpu->kvm->mm->context.uses_cmm))
Claudio Imbrenda190df4a2016-08-04 17:54:42 +02003214 vcpu->arch.sie_block->ecb2 |= ECB2_CMMA;
3215 goto retry;
3216 }
3217
David Hildenbrand0759d062014-05-13 16:54:32 +02003218 /* nothing to do, just clear the request */
Radim Krčmář72875d82017-04-26 22:32:19 +02003219 kvm_clear_request(KVM_REQ_UNHALT, vcpu);
David Hildenbrand3194cdb2018-09-25 19:16:17 -04003220 /* we left the vsie handler, nothing to do, just clear the request */
3221 kvm_clear_request(KVM_REQ_VSIE_RESTART, vcpu);
David Hildenbrand0759d062014-05-13 16:54:32 +02003222
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02003223 return 0;
3224}
3225
David Hildenbrand0e7def52018-02-07 12:46:43 +01003226void kvm_s390_set_tod_clock(struct kvm *kvm,
3227 const struct kvm_s390_vm_tod_clock *gtod)
Collin L. Walling8fa16962016-07-26 15:29:44 -04003228{
3229 struct kvm_vcpu *vcpu;
3230 struct kvm_s390_tod_clock_ext htod;
3231 int i;
3232
3233 mutex_lock(&kvm->lock);
3234 preempt_disable();
3235
3236 get_tod_clock_ext((char *)&htod);
3237
3238 kvm->arch.epoch = gtod->tod - htod.tod;
David Hildenbrand0e7def52018-02-07 12:46:43 +01003239 kvm->arch.epdx = 0;
3240 if (test_kvm_facility(kvm, 139)) {
3241 kvm->arch.epdx = gtod->epoch_idx - htod.epoch_idx;
3242 if (kvm->arch.epoch > gtod->tod)
3243 kvm->arch.epdx -= 1;
3244 }
Collin L. Walling8fa16962016-07-26 15:29:44 -04003245
3246 kvm_s390_vcpu_block_all(kvm);
3247 kvm_for_each_vcpu(i, vcpu, kvm) {
3248 vcpu->arch.sie_block->epoch = kvm->arch.epoch;
3249 vcpu->arch.sie_block->epdx = kvm->arch.epdx;
3250 }
3251
3252 kvm_s390_vcpu_unblock_all(kvm);
3253 preempt_enable();
3254 mutex_unlock(&kvm->lock);
3255}
3256
Thomas Huthfa576c52014-05-06 17:20:16 +02003257/**
3258 * kvm_arch_fault_in_page - fault-in guest page if necessary
3259 * @vcpu: The corresponding virtual cpu
3260 * @gpa: Guest physical address
3261 * @writable: Whether the page should be writable or not
3262 *
3263 * Make sure that a guest page has been faulted-in on the host.
3264 *
3265 * Return: Zero on success, negative error code otherwise.
3266 */
3267long kvm_arch_fault_in_page(struct kvm_vcpu *vcpu, gpa_t gpa, int writable)
Dominik Dingel24eb3a82013-06-17 16:25:18 +02003268{
Martin Schwidefsky527e30b2014-04-30 16:04:25 +02003269 return gmap_fault(vcpu->arch.gmap, gpa,
3270 writable ? FAULT_FLAG_WRITE : 0);
Dominik Dingel24eb3a82013-06-17 16:25:18 +02003271}
3272
Dominik Dingel3c038e62013-10-07 17:11:48 +02003273static void __kvm_inject_pfault_token(struct kvm_vcpu *vcpu, bool start_token,
3274 unsigned long token)
3275{
3276 struct kvm_s390_interrupt inti;
Jens Freimann383d0b02014-07-29 15:11:49 +02003277 struct kvm_s390_irq irq;
Dominik Dingel3c038e62013-10-07 17:11:48 +02003278
3279 if (start_token) {
Jens Freimann383d0b02014-07-29 15:11:49 +02003280 irq.u.ext.ext_params2 = token;
3281 irq.type = KVM_S390_INT_PFAULT_INIT;
3282 WARN_ON_ONCE(kvm_s390_inject_vcpu(vcpu, &irq));
Dominik Dingel3c038e62013-10-07 17:11:48 +02003283 } else {
3284 inti.type = KVM_S390_INT_PFAULT_DONE;
Jens Freimann383d0b02014-07-29 15:11:49 +02003285 inti.parm64 = token;
Dominik Dingel3c038e62013-10-07 17:11:48 +02003286 WARN_ON_ONCE(kvm_s390_inject_vm(vcpu->kvm, &inti));
3287 }
3288}
3289
3290void kvm_arch_async_page_not_present(struct kvm_vcpu *vcpu,
3291 struct kvm_async_pf *work)
3292{
3293 trace_kvm_s390_pfault_init(vcpu, work->arch.pfault_token);
3294 __kvm_inject_pfault_token(vcpu, true, work->arch.pfault_token);
3295}
3296
3297void kvm_arch_async_page_present(struct kvm_vcpu *vcpu,
3298 struct kvm_async_pf *work)
3299{
3300 trace_kvm_s390_pfault_done(vcpu, work->arch.pfault_token);
3301 __kvm_inject_pfault_token(vcpu, false, work->arch.pfault_token);
3302}
3303
3304void kvm_arch_async_page_ready(struct kvm_vcpu *vcpu,
3305 struct kvm_async_pf *work)
3306{
3307 /* s390 will always inject the page directly */
3308}
3309
3310bool kvm_arch_can_inject_async_page_present(struct kvm_vcpu *vcpu)
3311{
3312 /*
3313 * s390 will always inject the page directly,
3314 * but we still want check_async_completion to cleanup
3315 */
3316 return true;
3317}
3318
3319static int kvm_arch_setup_async_pf(struct kvm_vcpu *vcpu)
3320{
3321 hva_t hva;
3322 struct kvm_arch_async_pf arch;
3323 int rc;
3324
3325 if (vcpu->arch.pfault_token == KVM_S390_PFAULT_TOKEN_INVALID)
3326 return 0;
3327 if ((vcpu->arch.sie_block->gpsw.mask & vcpu->arch.pfault_select) !=
3328 vcpu->arch.pfault_compare)
3329 return 0;
3330 if (psw_extint_disabled(vcpu))
3331 return 0;
David Hildenbrand9a022062014-08-05 17:40:47 +02003332 if (kvm_s390_vcpu_has_irq(vcpu, 0))
Dominik Dingel3c038e62013-10-07 17:11:48 +02003333 return 0;
David Hildenbrandb9224cd2018-04-30 17:55:24 +02003334 if (!(vcpu->arch.sie_block->gcr[0] & CR0_SERVICE_SIGNAL_SUBMASK))
Dominik Dingel3c038e62013-10-07 17:11:48 +02003335 return 0;
3336 if (!vcpu->arch.gmap->pfault_enabled)
3337 return 0;
3338
Heiko Carstens81480cc2014-01-01 16:36:07 +01003339 hva = gfn_to_hva(vcpu->kvm, gpa_to_gfn(current->thread.gmap_addr));
3340 hva += current->thread.gmap_addr & ~PAGE_MASK;
3341 if (read_guest_real(vcpu, vcpu->arch.pfault_token, &arch.pfault_token, 8))
Dominik Dingel3c038e62013-10-07 17:11:48 +02003342 return 0;
3343
3344 rc = kvm_setup_async_pf(vcpu, current->thread.gmap_addr, hva, &arch);
3345 return rc;
3346}
3347
Thomas Huth3fb4c402013-09-12 10:33:43 +02003348static int vcpu_pre_run(struct kvm_vcpu *vcpu)
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003349{
Thomas Huth3fb4c402013-09-12 10:33:43 +02003350 int rc, cpuflags;
Carsten Ottee168bf82012-01-04 10:25:22 +01003351
Dominik Dingel3c038e62013-10-07 17:11:48 +02003352 /*
3353 * On s390 notifications for arriving pages will be delivered directly
3354 * to the guest but the house keeping for completed pfaults is
3355 * handled outside the worker.
3356 */
3357 kvm_check_async_pf_completion(vcpu);
3358
Christian Borntraeger7ec7c8c2015-12-02 14:27:03 +01003359 vcpu->arch.sie_block->gg14 = vcpu->run->s.regs.gprs[14];
3360 vcpu->arch.sie_block->gg15 = vcpu->run->s.regs.gprs[15];
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003361
3362 if (need_resched())
3363 schedule();
3364
Martin Schwidefskyd3a73ac2014-04-15 12:55:07 +02003365 if (test_cpu_flag(CIF_MCCK_PENDING))
Christian Borntraeger71cde582008-05-21 13:37:34 +02003366 s390_handle_mcck();
3367
Jens Freimann79395032014-04-17 10:10:30 +02003368 if (!kvm_is_ucontrol(vcpu->kvm)) {
3369 rc = kvm_s390_deliver_pending_interrupts(vcpu);
3370 if (rc)
3371 return rc;
3372 }
Carsten Otte0ff31862008-05-21 13:37:37 +02003373
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02003374 rc = kvm_s390_handle_requests(vcpu);
3375 if (rc)
3376 return rc;
3377
David Hildenbrand27291e22014-01-23 12:26:52 +01003378 if (guestdbg_enabled(vcpu)) {
3379 kvm_s390_backup_guest_per_regs(vcpu);
3380 kvm_s390_patch_guest_per_regs(vcpu);
3381 }
3382
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003383 vcpu->arch.sie_block->icptcode = 0;
Thomas Huth3fb4c402013-09-12 10:33:43 +02003384 cpuflags = atomic_read(&vcpu->arch.sie_block->cpuflags);
3385 VCPU_EVENT(vcpu, 6, "entering sie flags %x", cpuflags);
3386 trace_kvm_s390_sie_enter(vcpu, cpuflags);
Dominik Dingel2b29a9f2013-07-26 15:04:00 +02003387
Thomas Huth3fb4c402013-09-12 10:33:43 +02003388 return 0;
3389}
3390
Thomas Huth492d8642015-02-10 16:11:01 +01003391static int vcpu_post_run_fault_in_sie(struct kvm_vcpu *vcpu)
3392{
David Hildenbrand56317922016-01-12 17:37:58 +01003393 struct kvm_s390_pgm_info pgm_info = {
3394 .code = PGM_ADDRESSING,
3395 };
3396 u8 opcode, ilen;
Thomas Huth492d8642015-02-10 16:11:01 +01003397 int rc;
3398
3399 VCPU_EVENT(vcpu, 3, "%s", "fault in sie instruction");
3400 trace_kvm_s390_sie_fault(vcpu);
3401
3402 /*
3403 * We want to inject an addressing exception, which is defined as a
3404 * suppressing or terminating exception. However, since we came here
3405 * by a DAT access exception, the PSW still points to the faulting
3406 * instruction since DAT exceptions are nullifying. So we've got
3407 * to look up the current opcode to get the length of the instruction
3408 * to be able to forward the PSW.
3409 */
David Hildenbrand3fa8cad72016-05-24 12:00:49 +02003410 rc = read_guest_instr(vcpu, vcpu->arch.sie_block->gpsw.addr, &opcode, 1);
David Hildenbrand56317922016-01-12 17:37:58 +01003411 ilen = insn_length(opcode);
David Hildenbrand9b0d7212016-01-12 17:40:54 +01003412 if (rc < 0) {
3413 return rc;
3414 } else if (rc) {
3415 /* Instruction-Fetching Exceptions - we can't detect the ilen.
3416 * Forward by arbitrary ilc, injection will take care of
3417 * nullification if necessary.
3418 */
3419 pgm_info = vcpu->arch.pgm;
3420 ilen = 4;
3421 }
David Hildenbrand56317922016-01-12 17:37:58 +01003422 pgm_info.flags = ilen | KVM_S390_PGM_FLAGS_ILC_VALID;
3423 kvm_s390_forward_psw(vcpu, ilen);
3424 return kvm_s390_inject_prog_irq(vcpu, &pgm_info);
Thomas Huth492d8642015-02-10 16:11:01 +01003425}
3426
Thomas Huth3fb4c402013-09-12 10:33:43 +02003427static int vcpu_post_run(struct kvm_vcpu *vcpu, int exit_reason)
3428{
QingFeng Hao4d62fcc2017-06-07 12:03:05 +02003429 struct mcck_volatile_info *mcck_info;
3430 struct sie_page *sie_page;
3431
Dominik Dingel2b29a9f2013-07-26 15:04:00 +02003432 VCPU_EVENT(vcpu, 6, "exit sie icptcode %d",
3433 vcpu->arch.sie_block->icptcode);
3434 trace_kvm_s390_sie_exit(vcpu, vcpu->arch.sie_block->icptcode);
3435
David Hildenbrand27291e22014-01-23 12:26:52 +01003436 if (guestdbg_enabled(vcpu))
3437 kvm_s390_restore_guest_per_regs(vcpu);
3438
Christian Borntraeger7ec7c8c2015-12-02 14:27:03 +01003439 vcpu->run->s.regs.gprs[14] = vcpu->arch.sie_block->gg14;
3440 vcpu->run->s.regs.gprs[15] = vcpu->arch.sie_block->gg15;
David Hildenbrand71f116b2015-10-19 16:24:28 +02003441
QingFeng Hao4d62fcc2017-06-07 12:03:05 +02003442 if (exit_reason == -EINTR) {
3443 VCPU_EVENT(vcpu, 3, "%s", "machine check");
3444 sie_page = container_of(vcpu->arch.sie_block,
3445 struct sie_page, sie_block);
3446 mcck_info = &sie_page->mcck_info;
3447 kvm_s390_reinject_machine_check(vcpu, mcck_info);
3448 return 0;
3449 }
3450
David Hildenbrand71f116b2015-10-19 16:24:28 +02003451 if (vcpu->arch.sie_block->icptcode > 0) {
3452 int rc = kvm_handle_sie_intercept(vcpu);
3453
3454 if (rc != -EOPNOTSUPP)
3455 return rc;
3456 vcpu->run->exit_reason = KVM_EXIT_S390_SIEIC;
3457 vcpu->run->s390_sieic.icptcode = vcpu->arch.sie_block->icptcode;
3458 vcpu->run->s390_sieic.ipa = vcpu->arch.sie_block->ipa;
3459 vcpu->run->s390_sieic.ipb = vcpu->arch.sie_block->ipb;
3460 return -EREMOTE;
3461 } else if (exit_reason != -EFAULT) {
3462 vcpu->stat.exit_null++;
3463 return 0;
Thomas Huth210b16072013-09-19 16:26:18 +02003464 } else if (kvm_is_ucontrol(vcpu->kvm)) {
3465 vcpu->run->exit_reason = KVM_EXIT_S390_UCONTROL;
3466 vcpu->run->s390_ucontrol.trans_exc_code =
3467 current->thread.gmap_addr;
3468 vcpu->run->s390_ucontrol.pgm_code = 0x10;
David Hildenbrand71f116b2015-10-19 16:24:28 +02003469 return -EREMOTE;
Dominik Dingel24eb3a82013-06-17 16:25:18 +02003470 } else if (current->thread.gmap_pfault) {
Dominik Dingel3c038e62013-10-07 17:11:48 +02003471 trace_kvm_s390_major_guest_pfault(vcpu);
Dominik Dingel24eb3a82013-06-17 16:25:18 +02003472 current->thread.gmap_pfault = 0;
David Hildenbrand71f116b2015-10-19 16:24:28 +02003473 if (kvm_arch_setup_async_pf(vcpu))
3474 return 0;
3475 return kvm_arch_fault_in_page(vcpu, current->thread.gmap_addr, 1);
Dominik Dingel24eb3a82013-06-17 16:25:18 +02003476 }
David Hildenbrand71f116b2015-10-19 16:24:28 +02003477 return vcpu_post_run_fault_in_sie(vcpu);
Thomas Huth3fb4c402013-09-12 10:33:43 +02003478}
3479
3480static int __vcpu_run(struct kvm_vcpu *vcpu)
3481{
3482 int rc, exit_reason;
3483
Thomas Huth800c1062013-09-12 10:33:45 +02003484 /*
3485 * We try to hold kvm->srcu during most of vcpu_run (except when run-
3486 * ning the guest), so that memslots (and other stuff) are protected
3487 */
3488 vcpu->srcu_idx = srcu_read_lock(&vcpu->kvm->srcu);
3489
Thomas Hutha76ccff2013-09-12 10:33:44 +02003490 do {
3491 rc = vcpu_pre_run(vcpu);
3492 if (rc)
3493 break;
Thomas Huth3fb4c402013-09-12 10:33:43 +02003494
Thomas Huth800c1062013-09-12 10:33:45 +02003495 srcu_read_unlock(&vcpu->kvm->srcu, vcpu->srcu_idx);
Thomas Hutha76ccff2013-09-12 10:33:44 +02003496 /*
3497 * As PF_VCPU will be used in fault handler, between
3498 * guest_enter and guest_exit should be no uaccess.
3499 */
Christian Borntraeger0097d122015-04-30 13:43:30 +02003500 local_irq_disable();
Paolo Bonzini6edaa532016-06-15 15:18:26 +02003501 guest_enter_irqoff();
David Hildenbranddb0758b2016-02-15 09:42:25 +01003502 __disable_cpu_timer_accounting(vcpu);
Christian Borntraeger0097d122015-04-30 13:43:30 +02003503 local_irq_enable();
Thomas Hutha76ccff2013-09-12 10:33:44 +02003504 exit_reason = sie64a(vcpu->arch.sie_block,
3505 vcpu->run->s.regs.gprs);
Christian Borntraeger0097d122015-04-30 13:43:30 +02003506 local_irq_disable();
David Hildenbranddb0758b2016-02-15 09:42:25 +01003507 __enable_cpu_timer_accounting(vcpu);
Paolo Bonzini6edaa532016-06-15 15:18:26 +02003508 guest_exit_irqoff();
Christian Borntraeger0097d122015-04-30 13:43:30 +02003509 local_irq_enable();
Thomas Huth800c1062013-09-12 10:33:45 +02003510 vcpu->srcu_idx = srcu_read_lock(&vcpu->kvm->srcu);
Thomas Huth3fb4c402013-09-12 10:33:43 +02003511
Thomas Hutha76ccff2013-09-12 10:33:44 +02003512 rc = vcpu_post_run(vcpu, exit_reason);
David Hildenbrand27291e22014-01-23 12:26:52 +01003513 } while (!signal_pending(current) && !guestdbg_exit_pending(vcpu) && !rc);
Thomas Huth3fb4c402013-09-12 10:33:43 +02003514
Thomas Huth800c1062013-09-12 10:33:45 +02003515 srcu_read_unlock(&vcpu->kvm->srcu, vcpu->srcu_idx);
Carsten Ottee168bf82012-01-04 10:25:22 +01003516 return rc;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003517}
3518
David Hildenbrandb028ee32014-07-17 10:47:43 +02003519static void sync_regs(struct kvm_vcpu *vcpu, struct kvm_run *kvm_run)
3520{
Christian Borntraeger4d5f2c02017-02-09 17:15:41 +01003521 struct runtime_instr_cb *riccb;
Fan Zhang4e0b1ab2016-11-29 07:17:55 +01003522 struct gs_cb *gscb;
Christian Borntraeger4d5f2c02017-02-09 17:15:41 +01003523
3524 riccb = (struct runtime_instr_cb *) &kvm_run->s.regs.riccb;
Fan Zhang4e0b1ab2016-11-29 07:17:55 +01003525 gscb = (struct gs_cb *) &kvm_run->s.regs.gscb;
David Hildenbrandb028ee32014-07-17 10:47:43 +02003526 vcpu->arch.sie_block->gpsw.mask = kvm_run->psw_mask;
3527 vcpu->arch.sie_block->gpsw.addr = kvm_run->psw_addr;
3528 if (kvm_run->kvm_dirty_regs & KVM_SYNC_PREFIX)
3529 kvm_s390_set_prefix(vcpu, kvm_run->s.regs.prefix);
3530 if (kvm_run->kvm_dirty_regs & KVM_SYNC_CRS) {
3531 memcpy(&vcpu->arch.sie_block->gcr, &kvm_run->s.regs.crs, 128);
David Hildenbrandd3d692c2014-07-29 08:53:36 +02003532 /* some control register changes require a tlb flush */
3533 kvm_make_request(KVM_REQ_TLB_FLUSH, vcpu);
David Hildenbrandb028ee32014-07-17 10:47:43 +02003534 }
3535 if (kvm_run->kvm_dirty_regs & KVM_SYNC_ARCH0) {
David Hildenbrand4287f242016-02-15 09:40:12 +01003536 kvm_s390_set_cpu_timer(vcpu, kvm_run->s.regs.cputm);
David Hildenbrandb028ee32014-07-17 10:47:43 +02003537 vcpu->arch.sie_block->ckc = kvm_run->s.regs.ckc;
3538 vcpu->arch.sie_block->todpr = kvm_run->s.regs.todpr;
3539 vcpu->arch.sie_block->pp = kvm_run->s.regs.pp;
3540 vcpu->arch.sie_block->gbea = kvm_run->s.regs.gbea;
3541 }
3542 if (kvm_run->kvm_dirty_regs & KVM_SYNC_PFAULT) {
3543 vcpu->arch.pfault_token = kvm_run->s.regs.pft;
3544 vcpu->arch.pfault_select = kvm_run->s.regs.pfs;
3545 vcpu->arch.pfault_compare = kvm_run->s.regs.pfc;
David Hildenbrand9fbd8082014-10-09 15:01:38 +02003546 if (vcpu->arch.pfault_token == KVM_S390_PFAULT_TOKEN_INVALID)
3547 kvm_clear_async_pf_completion_queue(vcpu);
David Hildenbrandb028ee32014-07-17 10:47:43 +02003548 }
Fan Zhang80cd8762016-08-15 04:53:22 +02003549 /*
3550 * If userspace sets the riccb (e.g. after migration) to a valid state,
3551 * we should enable RI here instead of doing the lazy enablement.
3552 */
3553 if ((kvm_run->kvm_dirty_regs & KVM_SYNC_RICCB) &&
Christian Borntraeger4d5f2c02017-02-09 17:15:41 +01003554 test_kvm_facility(vcpu->kvm, 64) &&
Alice Frosibb59c2d2017-09-14 12:35:45 +02003555 riccb->v &&
David Hildenbrand0c9d8682017-03-13 11:48:28 +01003556 !(vcpu->arch.sie_block->ecb3 & ECB3_RI)) {
Christian Borntraeger4d5f2c02017-02-09 17:15:41 +01003557 VCPU_EVENT(vcpu, 3, "%s", "ENABLE: RI (sync_regs)");
David Hildenbrand0c9d8682017-03-13 11:48:28 +01003558 vcpu->arch.sie_block->ecb3 |= ECB3_RI;
Fan Zhang80cd8762016-08-15 04:53:22 +02003559 }
Fan Zhang4e0b1ab2016-11-29 07:17:55 +01003560 /*
3561 * If userspace sets the gscb (e.g. after migration) to non-zero,
3562 * we should enable GS here instead of doing the lazy enablement.
3563 */
3564 if ((kvm_run->kvm_dirty_regs & KVM_SYNC_GSCB) &&
3565 test_kvm_facility(vcpu->kvm, 133) &&
3566 gscb->gssm &&
3567 !vcpu->arch.gs_enabled) {
3568 VCPU_EVENT(vcpu, 3, "%s", "ENABLE: GS (sync_regs)");
3569 vcpu->arch.sie_block->ecb |= ECB_GS;
3570 vcpu->arch.sie_block->ecd |= ECD_HOSTREGMGMT;
3571 vcpu->arch.gs_enabled = 1;
Fan Zhang80cd8762016-08-15 04:53:22 +02003572 }
Christian Borntraeger35b3fde2018-01-17 14:44:34 +01003573 if ((kvm_run->kvm_dirty_regs & KVM_SYNC_BPBC) &&
3574 test_kvm_facility(vcpu->kvm, 82)) {
3575 vcpu->arch.sie_block->fpf &= ~FPF_BPBC;
3576 vcpu->arch.sie_block->fpf |= kvm_run->s.regs.bpbc ? FPF_BPBC : 0;
3577 }
Christian Borntraeger31d8b8d2016-11-10 14:22:02 +01003578 save_access_regs(vcpu->arch.host_acrs);
3579 restore_access_regs(vcpu->run->s.regs.acrs);
Christian Borntraegere1788bb2016-11-22 09:29:38 +01003580 /* save host (userspace) fprs/vrs */
3581 save_fpu_regs();
3582 vcpu->arch.host_fpregs.fpc = current->thread.fpu.fpc;
3583 vcpu->arch.host_fpregs.regs = current->thread.fpu.regs;
3584 if (MACHINE_HAS_VX)
3585 current->thread.fpu.regs = vcpu->run->s.regs.vrs;
3586 else
3587 current->thread.fpu.regs = vcpu->run->s.regs.fprs;
3588 current->thread.fpu.fpc = vcpu->run->s.regs.fpc;
3589 if (test_fp_ctl(current->thread.fpu.fpc))
3590 /* User space provided an invalid FPC, let's clear it */
3591 current->thread.fpu.fpc = 0;
Fan Zhang4e0b1ab2016-11-29 07:17:55 +01003592 if (MACHINE_HAS_GS) {
3593 preempt_disable();
3594 __ctl_set_bit(2, 4);
3595 if (current->thread.gs_cb) {
3596 vcpu->arch.host_gscb = current->thread.gs_cb;
3597 save_gs_cb(vcpu->arch.host_gscb);
3598 }
3599 if (vcpu->arch.gs_enabled) {
3600 current->thread.gs_cb = (struct gs_cb *)
3601 &vcpu->run->s.regs.gscb;
3602 restore_gs_cb(current->thread.gs_cb);
3603 }
3604 preempt_enable();
3605 }
Christian Borntraegera3da7b42018-03-08 16:08:49 +00003606 /* SIE will load etoken directly from SDNX and therefore kvm_run */
Fan Zhang80cd8762016-08-15 04:53:22 +02003607
David Hildenbrandb028ee32014-07-17 10:47:43 +02003608 kvm_run->kvm_dirty_regs = 0;
3609}
3610
3611static void store_regs(struct kvm_vcpu *vcpu, struct kvm_run *kvm_run)
3612{
3613 kvm_run->psw_mask = vcpu->arch.sie_block->gpsw.mask;
3614 kvm_run->psw_addr = vcpu->arch.sie_block->gpsw.addr;
3615 kvm_run->s.regs.prefix = kvm_s390_get_prefix(vcpu);
3616 memcpy(&kvm_run->s.regs.crs, &vcpu->arch.sie_block->gcr, 128);
David Hildenbrand4287f242016-02-15 09:40:12 +01003617 kvm_run->s.regs.cputm = kvm_s390_get_cpu_timer(vcpu);
David Hildenbrandb028ee32014-07-17 10:47:43 +02003618 kvm_run->s.regs.ckc = vcpu->arch.sie_block->ckc;
3619 kvm_run->s.regs.todpr = vcpu->arch.sie_block->todpr;
3620 kvm_run->s.regs.pp = vcpu->arch.sie_block->pp;
3621 kvm_run->s.regs.gbea = vcpu->arch.sie_block->gbea;
3622 kvm_run->s.regs.pft = vcpu->arch.pfault_token;
3623 kvm_run->s.regs.pfs = vcpu->arch.pfault_select;
3624 kvm_run->s.regs.pfc = vcpu->arch.pfault_compare;
Christian Borntraeger35b3fde2018-01-17 14:44:34 +01003625 kvm_run->s.regs.bpbc = (vcpu->arch.sie_block->fpf & FPF_BPBC) == FPF_BPBC;
Christian Borntraeger31d8b8d2016-11-10 14:22:02 +01003626 save_access_regs(vcpu->run->s.regs.acrs);
3627 restore_access_regs(vcpu->arch.host_acrs);
Christian Borntraegere1788bb2016-11-22 09:29:38 +01003628 /* Save guest register state */
3629 save_fpu_regs();
3630 vcpu->run->s.regs.fpc = current->thread.fpu.fpc;
3631 /* Restore will be done lazily at return */
3632 current->thread.fpu.fpc = vcpu->arch.host_fpregs.fpc;
3633 current->thread.fpu.regs = vcpu->arch.host_fpregs.regs;
Fan Zhang4e0b1ab2016-11-29 07:17:55 +01003634 if (MACHINE_HAS_GS) {
3635 __ctl_set_bit(2, 4);
3636 if (vcpu->arch.gs_enabled)
3637 save_gs_cb(current->thread.gs_cb);
3638 preempt_disable();
3639 current->thread.gs_cb = vcpu->arch.host_gscb;
3640 restore_gs_cb(vcpu->arch.host_gscb);
3641 preempt_enable();
3642 if (!vcpu->arch.host_gscb)
3643 __ctl_clear_bit(2, 4);
3644 vcpu->arch.host_gscb = NULL;
3645 }
Christian Borntraegera3da7b42018-03-08 16:08:49 +00003646 /* SIE will save etoken directly into SDNX and therefore kvm_run */
David Hildenbrandb028ee32014-07-17 10:47:43 +02003647}
3648
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003649int kvm_arch_vcpu_ioctl_run(struct kvm_vcpu *vcpu, struct kvm_run *kvm_run)
3650{
Christian Borntraeger8f2abe62008-03-25 18:47:23 +01003651 int rc;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003652
Paolo Bonzini460df4c2017-02-08 11:50:15 +01003653 if (kvm_run->immediate_exit)
3654 return -EINTR;
3655
Christoffer Dallaccb7572017-12-04 21:35:25 +01003656 vcpu_load(vcpu);
3657
David Hildenbrand27291e22014-01-23 12:26:52 +01003658 if (guestdbg_exit_pending(vcpu)) {
3659 kvm_s390_prepare_debug_exit(vcpu);
Christoffer Dallaccb7572017-12-04 21:35:25 +01003660 rc = 0;
3661 goto out;
David Hildenbrand27291e22014-01-23 12:26:52 +01003662 }
3663
Jan H. Schönherr20b70352017-11-24 22:39:01 +01003664 kvm_sigset_activate(vcpu);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003665
David Hildenbrand6352e4d2014-04-10 17:35:00 +02003666 if (!kvm_s390_user_cpu_state_ctrl(vcpu->kvm)) {
3667 kvm_s390_vcpu_start(vcpu);
3668 } else if (is_vcpu_stopped(vcpu)) {
David Hildenbrandea2cdd22015-05-20 13:24:02 +02003669 pr_err_ratelimited("can't run stopped vcpu %d\n",
David Hildenbrand6352e4d2014-04-10 17:35:00 +02003670 vcpu->vcpu_id);
Christoffer Dallaccb7572017-12-04 21:35:25 +01003671 rc = -EINVAL;
3672 goto out;
David Hildenbrand6352e4d2014-04-10 17:35:00 +02003673 }
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003674
David Hildenbrandb028ee32014-07-17 10:47:43 +02003675 sync_regs(vcpu, kvm_run);
David Hildenbranddb0758b2016-02-15 09:42:25 +01003676 enable_cpu_timer_accounting(vcpu);
Carsten Otted7b0b5e2009-11-19 14:21:16 +01003677
Heiko Carstensdab4079d2009-06-12 10:26:32 +02003678 might_fault();
Thomas Hutha76ccff2013-09-12 10:33:44 +02003679 rc = __vcpu_run(vcpu);
Christian Ehrhardt9ace9032009-05-20 15:34:55 +02003680
Christian Ehrhardtb1d16c42009-05-20 15:34:56 +02003681 if (signal_pending(current) && !rc) {
3682 kvm_run->exit_reason = KVM_EXIT_INTR;
Christian Borntraeger8f2abe62008-03-25 18:47:23 +01003683 rc = -EINTR;
Christian Ehrhardtb1d16c42009-05-20 15:34:56 +02003684 }
Christian Borntraeger8f2abe62008-03-25 18:47:23 +01003685
David Hildenbrand27291e22014-01-23 12:26:52 +01003686 if (guestdbg_exit_pending(vcpu) && !rc) {
3687 kvm_s390_prepare_debug_exit(vcpu);
3688 rc = 0;
3689 }
3690
Christian Borntraeger8f2abe62008-03-25 18:47:23 +01003691 if (rc == -EREMOTE) {
David Hildenbrand71f116b2015-10-19 16:24:28 +02003692 /* userspace support is needed, kvm_run has been prepared */
Christian Borntraeger8f2abe62008-03-25 18:47:23 +01003693 rc = 0;
3694 }
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003695
David Hildenbranddb0758b2016-02-15 09:42:25 +01003696 disable_cpu_timer_accounting(vcpu);
David Hildenbrandb028ee32014-07-17 10:47:43 +02003697 store_regs(vcpu, kvm_run);
Carsten Otted7b0b5e2009-11-19 14:21:16 +01003698
Jan H. Schönherr20b70352017-11-24 22:39:01 +01003699 kvm_sigset_deactivate(vcpu);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003700
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003701 vcpu->stat.exit_userspace++;
Christoffer Dallaccb7572017-12-04 21:35:25 +01003702out:
3703 vcpu_put(vcpu);
Heiko Carstens7e8e6ab2008-04-04 15:12:35 +02003704 return rc;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003705}
3706
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003707/*
3708 * store status at address
3709 * we use have two special cases:
3710 * KVM_S390_STORE_STATUS_NOADDR: -> 0x1200 on 64 bit
3711 * KVM_S390_STORE_STATUS_PREFIXED: -> prefix
3712 */
Heiko Carstensd0bce602014-01-01 16:45:58 +01003713int kvm_s390_store_status_unloaded(struct kvm_vcpu *vcpu, unsigned long gpa)
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003714{
Carsten Otte092670c2011-07-24 10:48:22 +02003715 unsigned char archmode = 1;
David Hildenbrand9abc2a02016-01-14 22:12:47 +01003716 freg_t fprs[NUM_FPRS];
Michael Muellerfda902c2014-05-13 16:58:30 +02003717 unsigned int px;
David Hildenbrand4287f242016-02-15 09:40:12 +01003718 u64 clkcomp, cputm;
Heiko Carstensd0bce602014-01-01 16:45:58 +01003719 int rc;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003720
Martin Schwidefskyd9a3a092015-10-23 09:02:32 +02003721 px = kvm_s390_get_prefix(vcpu);
Heiko Carstensd0bce602014-01-01 16:45:58 +01003722 if (gpa == KVM_S390_STORE_STATUS_NOADDR) {
3723 if (write_guest_abs(vcpu, 163, &archmode, 1))
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003724 return -EFAULT;
Martin Schwidefskyd9a3a092015-10-23 09:02:32 +02003725 gpa = 0;
Heiko Carstensd0bce602014-01-01 16:45:58 +01003726 } else if (gpa == KVM_S390_STORE_STATUS_PREFIXED) {
3727 if (write_guest_real(vcpu, 163, &archmode, 1))
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003728 return -EFAULT;
Martin Schwidefskyd9a3a092015-10-23 09:02:32 +02003729 gpa = px;
3730 } else
3731 gpa -= __LC_FPREGS_SAVE_AREA;
David Hildenbrand9abc2a02016-01-14 22:12:47 +01003732
3733 /* manually convert vector registers if necessary */
3734 if (MACHINE_HAS_VX) {
David Hildenbrand9522b372016-03-08 12:24:30 +01003735 convert_vx_to_fp(fprs, (__vector128 *) vcpu->run->s.regs.vrs);
David Hildenbrand9abc2a02016-01-14 22:12:47 +01003736 rc = write_guest_abs(vcpu, gpa + __LC_FPREGS_SAVE_AREA,
3737 fprs, 128);
3738 } else {
3739 rc = write_guest_abs(vcpu, gpa + __LC_FPREGS_SAVE_AREA,
David Hildenbrand6fd8e672016-01-18 14:46:34 +01003740 vcpu->run->s.regs.fprs, 128);
David Hildenbrand9abc2a02016-01-14 22:12:47 +01003741 }
Martin Schwidefskyd9a3a092015-10-23 09:02:32 +02003742 rc |= write_guest_abs(vcpu, gpa + __LC_GPREGS_SAVE_AREA,
Heiko Carstensd0bce602014-01-01 16:45:58 +01003743 vcpu->run->s.regs.gprs, 128);
Martin Schwidefskyd9a3a092015-10-23 09:02:32 +02003744 rc |= write_guest_abs(vcpu, gpa + __LC_PSW_SAVE_AREA,
Heiko Carstensd0bce602014-01-01 16:45:58 +01003745 &vcpu->arch.sie_block->gpsw, 16);
Martin Schwidefskyd9a3a092015-10-23 09:02:32 +02003746 rc |= write_guest_abs(vcpu, gpa + __LC_PREFIX_SAVE_AREA,
Michael Muellerfda902c2014-05-13 16:58:30 +02003747 &px, 4);
Martin Schwidefskyd9a3a092015-10-23 09:02:32 +02003748 rc |= write_guest_abs(vcpu, gpa + __LC_FP_CREG_SAVE_AREA,
David Hildenbrand9abc2a02016-01-14 22:12:47 +01003749 &vcpu->run->s.regs.fpc, 4);
Martin Schwidefskyd9a3a092015-10-23 09:02:32 +02003750 rc |= write_guest_abs(vcpu, gpa + __LC_TOD_PROGREG_SAVE_AREA,
Heiko Carstensd0bce602014-01-01 16:45:58 +01003751 &vcpu->arch.sie_block->todpr, 4);
David Hildenbrand4287f242016-02-15 09:40:12 +01003752 cputm = kvm_s390_get_cpu_timer(vcpu);
Martin Schwidefskyd9a3a092015-10-23 09:02:32 +02003753 rc |= write_guest_abs(vcpu, gpa + __LC_CPU_TIMER_SAVE_AREA,
David Hildenbrand4287f242016-02-15 09:40:12 +01003754 &cputm, 8);
Thomas Huth178bd782013-11-13 20:28:18 +01003755 clkcomp = vcpu->arch.sie_block->ckc >> 8;
Martin Schwidefskyd9a3a092015-10-23 09:02:32 +02003756 rc |= write_guest_abs(vcpu, gpa + __LC_CLOCK_COMP_SAVE_AREA,
Heiko Carstensd0bce602014-01-01 16:45:58 +01003757 &clkcomp, 8);
Martin Schwidefskyd9a3a092015-10-23 09:02:32 +02003758 rc |= write_guest_abs(vcpu, gpa + __LC_AREGS_SAVE_AREA,
Heiko Carstensd0bce602014-01-01 16:45:58 +01003759 &vcpu->run->s.regs.acrs, 64);
Martin Schwidefskyd9a3a092015-10-23 09:02:32 +02003760 rc |= write_guest_abs(vcpu, gpa + __LC_CREGS_SAVE_AREA,
Heiko Carstensd0bce602014-01-01 16:45:58 +01003761 &vcpu->arch.sie_block->gcr, 128);
3762 return rc ? -EFAULT : 0;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003763}
3764
Thomas Huthe8798922013-11-06 15:46:33 +01003765int kvm_s390_vcpu_store_status(struct kvm_vcpu *vcpu, unsigned long addr)
3766{
3767 /*
3768 * The guest FPRS and ACRS are in the host FPRS/ACRS due to the lazy
Christian Borntraeger31d8b8d2016-11-10 14:22:02 +01003769 * switch in the run ioctl. Let's update our copies before we save
Thomas Huthe8798922013-11-06 15:46:33 +01003770 * it into the save area
3771 */
Hendrik Bruecknerd0164ee2015-06-29 16:43:06 +02003772 save_fpu_regs();
David Hildenbrand9abc2a02016-01-14 22:12:47 +01003773 vcpu->run->s.regs.fpc = current->thread.fpu.fpc;
Thomas Huthe8798922013-11-06 15:46:33 +01003774 save_access_regs(vcpu->run->s.regs.acrs);
3775
3776 return kvm_s390_store_status_unloaded(vcpu, addr);
3777}
3778
David Hildenbrand8ad35752014-03-14 11:00:21 +01003779static void __disable_ibs_on_vcpu(struct kvm_vcpu *vcpu)
3780{
3781 kvm_check_request(KVM_REQ_ENABLE_IBS, vcpu);
Christian Borntraeger8e236542015-04-09 13:49:04 +02003782 kvm_s390_sync_request(KVM_REQ_DISABLE_IBS, vcpu);
David Hildenbrand8ad35752014-03-14 11:00:21 +01003783}
3784
3785static void __disable_ibs_on_all_vcpus(struct kvm *kvm)
3786{
3787 unsigned int i;
3788 struct kvm_vcpu *vcpu;
3789
3790 kvm_for_each_vcpu(i, vcpu, kvm) {
3791 __disable_ibs_on_vcpu(vcpu);
3792 }
3793}
3794
3795static void __enable_ibs_on_vcpu(struct kvm_vcpu *vcpu)
3796{
David Hildenbrand09a400e2016-04-04 15:57:08 +02003797 if (!sclp.has_ibs)
3798 return;
David Hildenbrand8ad35752014-03-14 11:00:21 +01003799 kvm_check_request(KVM_REQ_DISABLE_IBS, vcpu);
Christian Borntraeger8e236542015-04-09 13:49:04 +02003800 kvm_s390_sync_request(KVM_REQ_ENABLE_IBS, vcpu);
David Hildenbrand8ad35752014-03-14 11:00:21 +01003801}
3802
David Hildenbrand6852d7b2014-03-14 10:59:29 +01003803void kvm_s390_vcpu_start(struct kvm_vcpu *vcpu)
3804{
David Hildenbrand8ad35752014-03-14 11:00:21 +01003805 int i, online_vcpus, started_vcpus = 0;
3806
3807 if (!is_vcpu_stopped(vcpu))
3808 return;
3809
David Hildenbrand6852d7b2014-03-14 10:59:29 +01003810 trace_kvm_s390_vcpu_start_stop(vcpu->vcpu_id, 1);
David Hildenbrand8ad35752014-03-14 11:00:21 +01003811 /* Only one cpu at a time may enter/leave the STOPPED state. */
David Hildenbrand433b9ee2014-05-06 16:11:14 +02003812 spin_lock(&vcpu->kvm->arch.start_stop_lock);
David Hildenbrand8ad35752014-03-14 11:00:21 +01003813 online_vcpus = atomic_read(&vcpu->kvm->online_vcpus);
3814
3815 for (i = 0; i < online_vcpus; i++) {
3816 if (!is_vcpu_stopped(vcpu->kvm->vcpus[i]))
3817 started_vcpus++;
3818 }
3819
3820 if (started_vcpus == 0) {
3821 /* we're the only active VCPU -> speed it up */
3822 __enable_ibs_on_vcpu(vcpu);
3823 } else if (started_vcpus == 1) {
3824 /*
3825 * As we are starting a second VCPU, we have to disable
3826 * the IBS facility on all VCPUs to remove potentially
3827 * oustanding ENABLE requests.
3828 */
3829 __disable_ibs_on_all_vcpus(vcpu->kvm);
3830 }
3831
David Hildenbrand9daecfc2018-01-23 18:05:30 +01003832 kvm_s390_clear_cpuflags(vcpu, CPUSTAT_STOPPED);
David Hildenbrand8ad35752014-03-14 11:00:21 +01003833 /*
3834 * Another VCPU might have used IBS while we were offline.
3835 * Let's play safe and flush the VCPU at startup.
3836 */
David Hildenbrandd3d692c2014-07-29 08:53:36 +02003837 kvm_make_request(KVM_REQ_TLB_FLUSH, vcpu);
David Hildenbrand433b9ee2014-05-06 16:11:14 +02003838 spin_unlock(&vcpu->kvm->arch.start_stop_lock);
David Hildenbrand8ad35752014-03-14 11:00:21 +01003839 return;
David Hildenbrand6852d7b2014-03-14 10:59:29 +01003840}
3841
3842void kvm_s390_vcpu_stop(struct kvm_vcpu *vcpu)
3843{
David Hildenbrand8ad35752014-03-14 11:00:21 +01003844 int i, online_vcpus, started_vcpus = 0;
3845 struct kvm_vcpu *started_vcpu = NULL;
3846
3847 if (is_vcpu_stopped(vcpu))
3848 return;
3849
David Hildenbrand6852d7b2014-03-14 10:59:29 +01003850 trace_kvm_s390_vcpu_start_stop(vcpu->vcpu_id, 0);
David Hildenbrand8ad35752014-03-14 11:00:21 +01003851 /* Only one cpu at a time may enter/leave the STOPPED state. */
David Hildenbrand433b9ee2014-05-06 16:11:14 +02003852 spin_lock(&vcpu->kvm->arch.start_stop_lock);
David Hildenbrand8ad35752014-03-14 11:00:21 +01003853 online_vcpus = atomic_read(&vcpu->kvm->online_vcpus);
3854
David Hildenbrand32f5ff632014-04-14 12:40:03 +02003855 /* SIGP STOP and SIGP STOP AND STORE STATUS has been fully processed */
David Hildenbrand6cddd432014-10-15 16:48:53 +02003856 kvm_s390_clear_stop_irq(vcpu);
David Hildenbrand32f5ff632014-04-14 12:40:03 +02003857
David Hildenbrandef8f4f42018-01-23 18:05:29 +01003858 kvm_s390_set_cpuflags(vcpu, CPUSTAT_STOPPED);
David Hildenbrand8ad35752014-03-14 11:00:21 +01003859 __disable_ibs_on_vcpu(vcpu);
3860
3861 for (i = 0; i < online_vcpus; i++) {
3862 if (!is_vcpu_stopped(vcpu->kvm->vcpus[i])) {
3863 started_vcpus++;
3864 started_vcpu = vcpu->kvm->vcpus[i];
3865 }
3866 }
3867
3868 if (started_vcpus == 1) {
3869 /*
3870 * As we only have one VCPU left, we want to enable the
3871 * IBS facility for that VCPU to speed it up.
3872 */
3873 __enable_ibs_on_vcpu(started_vcpu);
3874 }
3875
David Hildenbrand433b9ee2014-05-06 16:11:14 +02003876 spin_unlock(&vcpu->kvm->arch.start_stop_lock);
David Hildenbrand8ad35752014-03-14 11:00:21 +01003877 return;
David Hildenbrand6852d7b2014-03-14 10:59:29 +01003878}
3879
Cornelia Huckd6712df2012-12-20 15:32:11 +01003880static int kvm_vcpu_ioctl_enable_cap(struct kvm_vcpu *vcpu,
3881 struct kvm_enable_cap *cap)
3882{
3883 int r;
3884
3885 if (cap->flags)
3886 return -EINVAL;
3887
3888 switch (cap->cap) {
Cornelia Huckfa6b7fe2012-12-20 15:32:12 +01003889 case KVM_CAP_S390_CSS_SUPPORT:
3890 if (!vcpu->kvm->arch.css_support) {
3891 vcpu->kvm->arch.css_support = 1;
Christian Borntraegerc92ea7b2015-07-22 15:52:10 +02003892 VM_EVENT(vcpu->kvm, 3, "%s", "ENABLE: CSS support");
Cornelia Huckfa6b7fe2012-12-20 15:32:12 +01003893 trace_kvm_s390_enable_css(vcpu->kvm);
3894 }
3895 r = 0;
3896 break;
Cornelia Huckd6712df2012-12-20 15:32:11 +01003897 default:
3898 r = -EINVAL;
3899 break;
3900 }
3901 return r;
3902}
3903
Thomas Huth41408c282015-02-06 15:01:21 +01003904static long kvm_s390_guest_mem_op(struct kvm_vcpu *vcpu,
3905 struct kvm_s390_mem_op *mop)
3906{
3907 void __user *uaddr = (void __user *)mop->buf;
3908 void *tmpbuf = NULL;
3909 int r, srcu_idx;
3910 const u64 supported_flags = KVM_S390_MEMOP_F_INJECT_EXCEPTION
3911 | KVM_S390_MEMOP_F_CHECK_ONLY;
3912
3913 if (mop->flags & ~supported_flags)
3914 return -EINVAL;
3915
3916 if (mop->size > MEM_OP_MAX_SIZE)
3917 return -E2BIG;
3918
3919 if (!(mop->flags & KVM_S390_MEMOP_F_CHECK_ONLY)) {
3920 tmpbuf = vmalloc(mop->size);
3921 if (!tmpbuf)
3922 return -ENOMEM;
3923 }
3924
3925 srcu_idx = srcu_read_lock(&vcpu->kvm->srcu);
3926
3927 switch (mop->op) {
3928 case KVM_S390_MEMOP_LOGICAL_READ:
3929 if (mop->flags & KVM_S390_MEMOP_F_CHECK_ONLY) {
David Hildenbrand92c96322015-11-16 15:42:11 +01003930 r = check_gva_range(vcpu, mop->gaddr, mop->ar,
3931 mop->size, GACC_FETCH);
Thomas Huth41408c282015-02-06 15:01:21 +01003932 break;
3933 }
3934 r = read_guest(vcpu, mop->gaddr, mop->ar, tmpbuf, mop->size);
3935 if (r == 0) {
3936 if (copy_to_user(uaddr, tmpbuf, mop->size))
3937 r = -EFAULT;
3938 }
3939 break;
3940 case KVM_S390_MEMOP_LOGICAL_WRITE:
3941 if (mop->flags & KVM_S390_MEMOP_F_CHECK_ONLY) {
David Hildenbrand92c96322015-11-16 15:42:11 +01003942 r = check_gva_range(vcpu, mop->gaddr, mop->ar,
3943 mop->size, GACC_STORE);
Thomas Huth41408c282015-02-06 15:01:21 +01003944 break;
3945 }
3946 if (copy_from_user(tmpbuf, uaddr, mop->size)) {
3947 r = -EFAULT;
3948 break;
3949 }
3950 r = write_guest(vcpu, mop->gaddr, mop->ar, tmpbuf, mop->size);
3951 break;
3952 default:
3953 r = -EINVAL;
3954 }
3955
3956 srcu_read_unlock(&vcpu->kvm->srcu, srcu_idx);
3957
3958 if (r > 0 && (mop->flags & KVM_S390_MEMOP_F_INJECT_EXCEPTION) != 0)
3959 kvm_s390_inject_prog_irq(vcpu, &vcpu->arch.pgm);
3960
3961 vfree(tmpbuf);
3962 return r;
3963}
3964
Paolo Bonzini5cb09442017-12-12 17:41:34 +01003965long kvm_arch_vcpu_async_ioctl(struct file *filp,
3966 unsigned int ioctl, unsigned long arg)
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003967{
3968 struct kvm_vcpu *vcpu = filp->private_data;
3969 void __user *argp = (void __user *)arg;
3970
Avi Kivity93736622010-05-13 12:35:17 +03003971 switch (ioctl) {
Jens Freimann47b43c52014-11-11 20:57:06 +01003972 case KVM_S390_IRQ: {
3973 struct kvm_s390_irq s390irq;
3974
Jens Freimann47b43c52014-11-11 20:57:06 +01003975 if (copy_from_user(&s390irq, argp, sizeof(s390irq)))
Christoffer Dall9b0624712017-12-04 21:35:36 +01003976 return -EFAULT;
3977 return kvm_s390_inject_vcpu(vcpu, &s390irq);
Jens Freimann47b43c52014-11-11 20:57:06 +01003978 }
Avi Kivity93736622010-05-13 12:35:17 +03003979 case KVM_S390_INTERRUPT: {
Carsten Otteba5c1e92008-03-25 18:47:26 +01003980 struct kvm_s390_interrupt s390int;
Jens Freimann383d0b02014-07-29 15:11:49 +02003981 struct kvm_s390_irq s390irq;
Carsten Otteba5c1e92008-03-25 18:47:26 +01003982
3983 if (copy_from_user(&s390int, argp, sizeof(s390int)))
Christoffer Dall9b0624712017-12-04 21:35:36 +01003984 return -EFAULT;
Jens Freimann383d0b02014-07-29 15:11:49 +02003985 if (s390int_to_s390irq(&s390int, &s390irq))
3986 return -EINVAL;
Christoffer Dall9b0624712017-12-04 21:35:36 +01003987 return kvm_s390_inject_vcpu(vcpu, &s390irq);
Carsten Otteba5c1e92008-03-25 18:47:26 +01003988 }
Christoffer Dall9b0624712017-12-04 21:35:36 +01003989 }
Paolo Bonzini5cb09442017-12-12 17:41:34 +01003990 return -ENOIOCTLCMD;
3991}
3992
3993long kvm_arch_vcpu_ioctl(struct file *filp,
3994 unsigned int ioctl, unsigned long arg)
3995{
3996 struct kvm_vcpu *vcpu = filp->private_data;
3997 void __user *argp = (void __user *)arg;
3998 int idx;
3999 long r;
Christoffer Dall9b0624712017-12-04 21:35:36 +01004000
4001 vcpu_load(vcpu);
4002
4003 switch (ioctl) {
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004004 case KVM_S390_STORE_STATUS:
Thomas Huth800c1062013-09-12 10:33:45 +02004005 idx = srcu_read_lock(&vcpu->kvm->srcu);
Avi Kivitybc923cc2010-05-13 12:21:46 +03004006 r = kvm_s390_vcpu_store_status(vcpu, arg);
Thomas Huth800c1062013-09-12 10:33:45 +02004007 srcu_read_unlock(&vcpu->kvm->srcu, idx);
Avi Kivitybc923cc2010-05-13 12:21:46 +03004008 break;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004009 case KVM_S390_SET_INITIAL_PSW: {
4010 psw_t psw;
4011
Avi Kivitybc923cc2010-05-13 12:21:46 +03004012 r = -EFAULT;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004013 if (copy_from_user(&psw, argp, sizeof(psw)))
Avi Kivitybc923cc2010-05-13 12:21:46 +03004014 break;
4015 r = kvm_arch_vcpu_ioctl_set_initial_psw(vcpu, psw);
4016 break;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004017 }
4018 case KVM_S390_INITIAL_RESET:
Avi Kivitybc923cc2010-05-13 12:21:46 +03004019 r = kvm_arch_vcpu_ioctl_initial_reset(vcpu);
4020 break;
Carsten Otte14eebd92012-05-15 14:15:26 +02004021 case KVM_SET_ONE_REG:
4022 case KVM_GET_ONE_REG: {
4023 struct kvm_one_reg reg;
4024 r = -EFAULT;
4025 if (copy_from_user(&reg, argp, sizeof(reg)))
4026 break;
4027 if (ioctl == KVM_SET_ONE_REG)
4028 r = kvm_arch_vcpu_ioctl_set_one_reg(vcpu, &reg);
4029 else
4030 r = kvm_arch_vcpu_ioctl_get_one_reg(vcpu, &reg);
4031 break;
4032 }
Carsten Otte27e03932012-01-04 10:25:21 +01004033#ifdef CONFIG_KVM_S390_UCONTROL
4034 case KVM_S390_UCAS_MAP: {
4035 struct kvm_s390_ucas_mapping ucasmap;
4036
4037 if (copy_from_user(&ucasmap, argp, sizeof(ucasmap))) {
4038 r = -EFAULT;
4039 break;
4040 }
4041
4042 if (!kvm_is_ucontrol(vcpu->kvm)) {
4043 r = -EINVAL;
4044 break;
4045 }
4046
4047 r = gmap_map_segment(vcpu->arch.gmap, ucasmap.user_addr,
4048 ucasmap.vcpu_addr, ucasmap.length);
4049 break;
4050 }
4051 case KVM_S390_UCAS_UNMAP: {
4052 struct kvm_s390_ucas_mapping ucasmap;
4053
4054 if (copy_from_user(&ucasmap, argp, sizeof(ucasmap))) {
4055 r = -EFAULT;
4056 break;
4057 }
4058
4059 if (!kvm_is_ucontrol(vcpu->kvm)) {
4060 r = -EINVAL;
4061 break;
4062 }
4063
4064 r = gmap_unmap_segment(vcpu->arch.gmap, ucasmap.vcpu_addr,
4065 ucasmap.length);
4066 break;
4067 }
4068#endif
Carsten Otteccc79102012-01-04 10:25:26 +01004069 case KVM_S390_VCPU_FAULT: {
Martin Schwidefsky527e30b2014-04-30 16:04:25 +02004070 r = gmap_fault(vcpu->arch.gmap, arg, 0);
Carsten Otteccc79102012-01-04 10:25:26 +01004071 break;
4072 }
Cornelia Huckd6712df2012-12-20 15:32:11 +01004073 case KVM_ENABLE_CAP:
4074 {
4075 struct kvm_enable_cap cap;
4076 r = -EFAULT;
4077 if (copy_from_user(&cap, argp, sizeof(cap)))
4078 break;
4079 r = kvm_vcpu_ioctl_enable_cap(vcpu, &cap);
4080 break;
4081 }
Thomas Huth41408c282015-02-06 15:01:21 +01004082 case KVM_S390_MEM_OP: {
4083 struct kvm_s390_mem_op mem_op;
4084
4085 if (copy_from_user(&mem_op, argp, sizeof(mem_op)) == 0)
4086 r = kvm_s390_guest_mem_op(vcpu, &mem_op);
4087 else
4088 r = -EFAULT;
4089 break;
4090 }
Jens Freimann816c7662014-11-24 17:13:46 +01004091 case KVM_S390_SET_IRQ_STATE: {
4092 struct kvm_s390_irq_state irq_state;
4093
4094 r = -EFAULT;
4095 if (copy_from_user(&irq_state, argp, sizeof(irq_state)))
4096 break;
4097 if (irq_state.len > VCPU_IRQS_MAX_BUF ||
4098 irq_state.len == 0 ||
4099 irq_state.len % sizeof(struct kvm_s390_irq) > 0) {
4100 r = -EINVAL;
4101 break;
4102 }
Christian Borntraegerbb64da92017-11-21 16:02:52 +01004103 /* do not use irq_state.flags, it will break old QEMUs */
Jens Freimann816c7662014-11-24 17:13:46 +01004104 r = kvm_s390_set_irq_state(vcpu,
4105 (void __user *) irq_state.buf,
4106 irq_state.len);
4107 break;
4108 }
4109 case KVM_S390_GET_IRQ_STATE: {
4110 struct kvm_s390_irq_state irq_state;
4111
4112 r = -EFAULT;
4113 if (copy_from_user(&irq_state, argp, sizeof(irq_state)))
4114 break;
4115 if (irq_state.len == 0) {
4116 r = -EINVAL;
4117 break;
4118 }
Christian Borntraegerbb64da92017-11-21 16:02:52 +01004119 /* do not use irq_state.flags, it will break old QEMUs */
Jens Freimann816c7662014-11-24 17:13:46 +01004120 r = kvm_s390_get_irq_state(vcpu,
4121 (__u8 __user *) irq_state.buf,
4122 irq_state.len);
4123 break;
4124 }
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004125 default:
Carsten Otte3e6afcf2012-01-04 10:25:30 +01004126 r = -ENOTTY;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004127 }
Christoffer Dall9b0624712017-12-04 21:35:36 +01004128
4129 vcpu_put(vcpu);
Avi Kivitybc923cc2010-05-13 12:21:46 +03004130 return r;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004131}
4132
Souptick Joarder1499fa82018-04-19 00:49:58 +05304133vm_fault_t kvm_arch_vcpu_fault(struct kvm_vcpu *vcpu, struct vm_fault *vmf)
Carsten Otte5b1c1492012-01-04 10:25:23 +01004134{
4135#ifdef CONFIG_KVM_S390_UCONTROL
4136 if ((vmf->pgoff == KVM_S390_SIE_PAGE_OFFSET)
4137 && (kvm_is_ucontrol(vcpu->kvm))) {
4138 vmf->page = virt_to_page(vcpu->arch.sie_block);
4139 get_page(vmf->page);
4140 return 0;
4141 }
4142#endif
4143 return VM_FAULT_SIGBUS;
4144}
4145
Aneesh Kumar K.V55870272013-10-07 22:18:00 +05304146int kvm_arch_create_memslot(struct kvm *kvm, struct kvm_memory_slot *slot,
4147 unsigned long npages)
Takuya Yoshikawadb3fe4e2012-02-08 13:02:18 +09004148{
4149 return 0;
4150}
4151
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004152/* Section: memory related */
Marcelo Tosattif7784b82009-12-23 14:35:18 -02004153int kvm_arch_prepare_memory_region(struct kvm *kvm,
4154 struct kvm_memory_slot *memslot,
Paolo Bonzini09170a42015-05-18 13:59:39 +02004155 const struct kvm_userspace_memory_region *mem,
Takuya Yoshikawa7b6195a2013-02-27 19:44:34 +09004156 enum kvm_mr_change change)
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004157{
Nick Wangdd2887e2013-03-25 17:22:57 +01004158 /* A few sanity checks. We can have memory slots which have to be
4159 located/ended at a segment boundary (1MB). The memory in userland is
4160 ok to be fragmented into various different vmas. It is okay to mmap()
4161 and munmap() stuff in this slot after doing this call at any time */
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004162
Carsten Otte598841c2011-07-24 10:48:21 +02004163 if (mem->userspace_addr & 0xffffful)
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004164 return -EINVAL;
4165
Carsten Otte598841c2011-07-24 10:48:21 +02004166 if (mem->memory_size & 0xffffful)
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004167 return -EINVAL;
4168
Dominik Dingela3a92c32014-12-01 17:24:42 +01004169 if (mem->guest_phys_addr + mem->memory_size > kvm->arch.mem_limit)
4170 return -EINVAL;
4171
Marcelo Tosattif7784b82009-12-23 14:35:18 -02004172 return 0;
4173}
4174
4175void kvm_arch_commit_memory_region(struct kvm *kvm,
Paolo Bonzini09170a42015-05-18 13:59:39 +02004176 const struct kvm_userspace_memory_region *mem,
Takuya Yoshikawa84826442013-02-27 19:45:25 +09004177 const struct kvm_memory_slot *old,
Paolo Bonzinif36f3f22015-05-18 13:20:23 +02004178 const struct kvm_memory_slot *new,
Takuya Yoshikawa84826442013-02-27 19:45:25 +09004179 enum kvm_mr_change change)
Marcelo Tosattif7784b82009-12-23 14:35:18 -02004180{
Carsten Ottef7850c92011-07-24 10:48:23 +02004181 int rc;
Marcelo Tosattif7784b82009-12-23 14:35:18 -02004182
Christian Borntraeger2cef4de2013-03-25 17:22:48 +01004183 /* If the basics of the memslot do not change, we do not want
4184 * to update the gmap. Every update causes several unnecessary
4185 * segment translation exceptions. This is usually handled just
4186 * fine by the normal fault handler + gmap, but it will also
4187 * cause faults on the prefix page of running guest CPUs.
4188 */
4189 if (old->userspace_addr == mem->userspace_addr &&
4190 old->base_gfn * PAGE_SIZE == mem->guest_phys_addr &&
4191 old->npages * PAGE_SIZE == mem->memory_size)
4192 return;
Carsten Otte598841c2011-07-24 10:48:21 +02004193
4194 rc = gmap_map_segment(kvm->arch.gmap, mem->userspace_addr,
4195 mem->guest_phys_addr, mem->memory_size);
4196 if (rc)
David Hildenbrandea2cdd22015-05-20 13:24:02 +02004197 pr_warn("failed to commit memory region\n");
Carsten Otte598841c2011-07-24 10:48:21 +02004198 return;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004199}
4200
Alexander Yarygin60a37702016-04-01 15:38:57 +03004201static inline unsigned long nonhyp_mask(int i)
4202{
4203 unsigned int nonhyp_fai = (sclp.hmfai << i * 2) >> 30;
4204
4205 return 0x0000ffffffffffffUL >> (nonhyp_fai << 4);
4206}
4207
Christian Borntraeger3491caf2016-05-13 12:16:35 +02004208void kvm_arch_vcpu_block_finish(struct kvm_vcpu *vcpu)
4209{
4210 vcpu->valid_wakeup = false;
4211}
4212
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004213static int __init kvm_s390_init(void)
4214{
Alexander Yarygin60a37702016-04-01 15:38:57 +03004215 int i;
4216
David Hildenbrand07197fd2015-01-30 16:01:38 +01004217 if (!sclp.has_sief2) {
4218 pr_info("SIE not available\n");
4219 return -ENODEV;
4220 }
4221
Janosch Franka4499382018-07-13 11:28:31 +01004222 if (nested && hpage) {
4223 pr_info("nested (vSIE) and hpage (huge page backing) can currently not be activated concurrently");
4224 return -EINVAL;
4225 }
4226
Alexander Yarygin60a37702016-04-01 15:38:57 +03004227 for (i = 0; i < 16; i++)
Christian Borntraegerc3b9e3e2018-02-09 16:26:29 +00004228 kvm_s390_fac_base[i] |=
Alexander Yarygin60a37702016-04-01 15:38:57 +03004229 S390_lowcore.stfle_fac_list[i] & nonhyp_mask(i);
4230
Michael Mueller9d8d5782015-02-02 15:42:51 +01004231 return kvm_init(NULL, sizeof(struct kvm_vcpu), 0, THIS_MODULE);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004232}
4233
4234static void __exit kvm_s390_exit(void)
4235{
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004236 kvm_exit();
4237}
4238
4239module_init(kvm_s390_init);
4240module_exit(kvm_s390_exit);
Cornelia Huck566af942013-05-27 18:42:33 +02004241
4242/*
4243 * Enable autoloading of the kvm module.
4244 * Note that we add the module alias here instead of virt/kvm/kvm_main.c
4245 * since x86 takes a different approach.
4246 */
4247#include <linux/miscdevice.h>
4248MODULE_ALIAS_MISCDEV(KVM_MINOR);
4249MODULE_ALIAS("devname:kvm");