blob: 38ca8324a91adf5cde4b4f594eafed01dee9b147 [file] [log] [blame]
Greg Kroah-Hartmand809aa22017-11-24 15:00:33 +01001// SPDX-License-Identifier: GPL-2.0
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002/*
Christian Borntraegerbb64da92017-11-21 16:02:52 +01003 * hosting IBM Z kernel virtual machines (s390x)
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004 *
Christian Borntraegera37cb072018-01-23 13:28:40 +01005 * Copyright IBM Corp. 2008, 2018
Heiko Carstensb0c632d2008-03-25 18:47:20 +01006 *
7 * Author(s): Carsten Otte <cotte@de.ibm.com>
8 * Christian Borntraeger <borntraeger@de.ibm.com>
9 * Heiko Carstens <heiko.carstens@de.ibm.com>
Christian Ehrhardt628eb9b2009-05-25 13:40:51 +020010 * Christian Ehrhardt <ehrhardt@de.ibm.com>
Jason J. Herne15f36eb2012-08-02 10:10:17 -040011 * Jason J. Herne <jjherne@us.ibm.com>
Heiko Carstensb0c632d2008-03-25 18:47:20 +010012 */
13
Michael Mueller7aedd9d2018-12-03 10:20:22 +010014#define KMSG_COMPONENT "kvm-s390"
15#define pr_fmt(fmt) KMSG_COMPONENT ": " fmt
16
Heiko Carstensb0c632d2008-03-25 18:47:20 +010017#include <linux/compiler.h>
18#include <linux/err.h>
19#include <linux/fs.h>
Christian Borntraegerca872302009-05-12 17:21:49 +020020#include <linux/hrtimer.h>
Heiko Carstensb0c632d2008-03-25 18:47:20 +010021#include <linux/init.h>
22#include <linux/kvm.h>
23#include <linux/kvm_host.h>
Martin Schwidefskyb2d73b22016-03-08 11:54:42 +010024#include <linux/mman.h>
Heiko Carstensb0c632d2008-03-25 18:47:20 +010025#include <linux/module.h>
Paul Gortmakerd3217962017-02-09 15:20:25 -050026#include <linux/moduleparam.h>
Tony Krowiaka374e892014-09-03 10:13:53 +020027#include <linux/random.h>
Heiko Carstensb0c632d2008-03-25 18:47:20 +010028#include <linux/slab.h>
Carsten Otteba5c1e92008-03-25 18:47:26 +010029#include <linux/timer.h>
Thomas Huth41408c282015-02-06 15:01:21 +010030#include <linux/vmalloc.h>
David Hildenbrand15c97052015-03-19 17:36:43 +010031#include <linux/bitmap.h>
Ingo Molnar174cd4b2017-02-02 19:15:33 +010032#include <linux/sched/signal.h>
Claudio Imbrenda190df4a2016-08-04 17:54:42 +020033#include <linux/string.h>
Ingo Molnar174cd4b2017-02-02 19:15:33 +010034
Heiko Carstenscbb870c2010-02-26 22:37:43 +010035#include <asm/asm-offsets.h>
Heiko Carstensb0c632d2008-03-25 18:47:20 +010036#include <asm/lowcore.h>
Martin Schwidefskyfd5ada02016-05-31 15:06:51 +020037#include <asm/stp.h>
Heiko Carstensb0c632d2008-03-25 18:47:20 +010038#include <asm/pgtable.h>
Martin Schwidefsky1e133ab2016-03-08 11:49:57 +010039#include <asm/gmap.h>
Heiko Carstensf5daba12009-03-26 15:24:01 +010040#include <asm/nmi.h>
David Howellsa0616cd2012-03-28 18:30:02 +010041#include <asm/switch_to.h>
Jens Freimann6d3da242013-07-03 15:18:35 +020042#include <asm/isc.h>
Christian Borntraeger1526bf92012-05-15 14:15:25 +020043#include <asm/sclp.h>
David Hildenbrand0a763c72016-05-18 16:03:47 +020044#include <asm/cpacf.h>
Linus Torvalds221bb8a2016-08-02 16:11:27 -040045#include <asm/timex.h>
Tony Krowiake585b242018-09-25 19:16:18 -040046#include <asm/ap.h>
Christian Borntraeger8f2abe62008-03-25 18:47:23 +010047#include "kvm-s390.h"
Heiko Carstensb0c632d2008-03-25 18:47:20 +010048#include "gaccess.h"
49
Cornelia Huck5786fff2012-07-23 17:20:29 +020050#define CREATE_TRACE_POINTS
51#include "trace.h"
Cornelia Huckade38c32012-07-23 17:20:30 +020052#include "trace-s390.h"
Cornelia Huck5786fff2012-07-23 17:20:29 +020053
Thomas Huth41408c282015-02-06 15:01:21 +010054#define MEM_OP_MAX_SIZE 65536 /* Maximum transfer size for KVM_S390_MEM_OP */
Jens Freimann816c7662014-11-24 17:13:46 +010055#define LOCAL_IRQS 32
56#define VCPU_IRQS_MAX_BUF (sizeof(struct kvm_s390_irq) * \
57 (KVM_MAX_VCPUS + LOCAL_IRQS))
Thomas Huth41408c282015-02-06 15:01:21 +010058
Heiko Carstensb0c632d2008-03-25 18:47:20 +010059#define VCPU_STAT(x) offsetof(struct kvm_vcpu, stat.x), KVM_STAT_VCPU
Christian Borntraegerccc40c52018-03-08 12:48:05 +000060#define VM_STAT(x) offsetof(struct kvm, stat.x), KVM_STAT_VM
Heiko Carstensb0c632d2008-03-25 18:47:20 +010061
62struct kvm_stats_debugfs_item debugfs_entries[] = {
63 { "userspace_handled", VCPU_STAT(exit_userspace) },
Christian Borntraeger0eaeafa2008-05-07 09:22:53 +020064 { "exit_null", VCPU_STAT(exit_null) },
Christian Borntraeger8f2abe62008-03-25 18:47:23 +010065 { "exit_validity", VCPU_STAT(exit_validity) },
66 { "exit_stop_request", VCPU_STAT(exit_stop_request) },
67 { "exit_external_request", VCPU_STAT(exit_external_request) },
Christian Borntraegera5e0acea92018-02-23 07:57:33 +000068 { "exit_io_request", VCPU_STAT(exit_io_request) },
Christian Borntraeger8f2abe62008-03-25 18:47:23 +010069 { "exit_external_interrupt", VCPU_STAT(exit_external_interrupt) },
Carsten Otteba5c1e92008-03-25 18:47:26 +010070 { "exit_instruction", VCPU_STAT(exit_instruction) },
Alexander Yarygin9ec6de12016-05-06 16:33:06 +030071 { "exit_pei", VCPU_STAT(exit_pei) },
Carsten Otteba5c1e92008-03-25 18:47:26 +010072 { "exit_program_interruption", VCPU_STAT(exit_program_interruption) },
73 { "exit_instr_and_program_int", VCPU_STAT(exit_instr_and_program) },
Janosch Franka011eeb2016-05-09 14:14:01 +020074 { "exit_operation_exception", VCPU_STAT(exit_operation_exception) },
Paolo Bonzinif7819512015-02-04 18:20:58 +010075 { "halt_successful_poll", VCPU_STAT(halt_successful_poll) },
Paolo Bonzini62bea5b2015-09-15 18:27:57 +020076 { "halt_attempted_poll", VCPU_STAT(halt_attempted_poll) },
Christian Borntraeger3491caf2016-05-13 12:16:35 +020077 { "halt_poll_invalid", VCPU_STAT(halt_poll_invalid) },
David Hildenbrandce2e4f02014-07-11 10:00:43 +020078 { "halt_wakeup", VCPU_STAT(halt_wakeup) },
Christian Borntraegerf5e10b02008-07-25 15:52:44 +020079 { "instruction_lctlg", VCPU_STAT(instruction_lctlg) },
Carsten Otteba5c1e92008-03-25 18:47:26 +010080 { "instruction_lctl", VCPU_STAT(instruction_lctl) },
David Hildenbrandaba07502014-01-23 10:47:13 +010081 { "instruction_stctl", VCPU_STAT(instruction_stctl) },
82 { "instruction_stctg", VCPU_STAT(instruction_stctg) },
Christian Borntraegerccc40c52018-03-08 12:48:05 +000083 { "deliver_ckc", VCPU_STAT(deliver_ckc) },
84 { "deliver_cputm", VCPU_STAT(deliver_cputm) },
Carsten Otteba5c1e92008-03-25 18:47:26 +010085 { "deliver_emergency_signal", VCPU_STAT(deliver_emergency_signal) },
Christian Ehrhardt7697e71f2011-10-18 12:27:15 +020086 { "deliver_external_call", VCPU_STAT(deliver_external_call) },
Carsten Otteba5c1e92008-03-25 18:47:26 +010087 { "deliver_service_signal", VCPU_STAT(deliver_service_signal) },
Christian Borntraegerccc40c52018-03-08 12:48:05 +000088 { "deliver_virtio", VCPU_STAT(deliver_virtio) },
Carsten Otteba5c1e92008-03-25 18:47:26 +010089 { "deliver_stop_signal", VCPU_STAT(deliver_stop_signal) },
90 { "deliver_prefix_signal", VCPU_STAT(deliver_prefix_signal) },
91 { "deliver_restart_signal", VCPU_STAT(deliver_restart_signal) },
Christian Borntraegerccc40c52018-03-08 12:48:05 +000092 { "deliver_program", VCPU_STAT(deliver_program) },
93 { "deliver_io", VCPU_STAT(deliver_io) },
QingFeng Hao32de0742018-03-02 11:56:47 +010094 { "deliver_machine_check", VCPU_STAT(deliver_machine_check) },
Carsten Otteba5c1e92008-03-25 18:47:26 +010095 { "exit_wait_state", VCPU_STAT(exit_wait_state) },
Christian Borntraegerccc40c52018-03-08 12:48:05 +000096 { "inject_ckc", VCPU_STAT(inject_ckc) },
97 { "inject_cputm", VCPU_STAT(inject_cputm) },
98 { "inject_external_call", VCPU_STAT(inject_external_call) },
99 { "inject_float_mchk", VM_STAT(inject_float_mchk) },
100 { "inject_emergency_signal", VCPU_STAT(inject_emergency_signal) },
101 { "inject_io", VM_STAT(inject_io) },
102 { "inject_mchk", VCPU_STAT(inject_mchk) },
103 { "inject_pfault_done", VM_STAT(inject_pfault_done) },
104 { "inject_program", VCPU_STAT(inject_program) },
105 { "inject_restart", VCPU_STAT(inject_restart) },
106 { "inject_service_signal", VM_STAT(inject_service_signal) },
107 { "inject_set_prefix", VCPU_STAT(inject_set_prefix) },
108 { "inject_stop_signal", VCPU_STAT(inject_stop_signal) },
109 { "inject_pfault_init", VCPU_STAT(inject_pfault_init) },
110 { "inject_virtio", VM_STAT(inject_virtio) },
Christian Borntraegera37cb072018-01-23 13:28:40 +0100111 { "instruction_epsw", VCPU_STAT(instruction_epsw) },
112 { "instruction_gs", VCPU_STAT(instruction_gs) },
113 { "instruction_io_other", VCPU_STAT(instruction_io_other) },
114 { "instruction_lpsw", VCPU_STAT(instruction_lpsw) },
115 { "instruction_lpswe", VCPU_STAT(instruction_lpswe) },
Christian Borntraeger69d0d3a2013-06-12 13:54:53 +0200116 { "instruction_pfmf", VCPU_STAT(instruction_pfmf) },
Christian Borntraegera37cb072018-01-23 13:28:40 +0100117 { "instruction_ptff", VCPU_STAT(instruction_ptff) },
Christian Borntraeger453423d2008-03-25 18:47:29 +0100118 { "instruction_stidp", VCPU_STAT(instruction_stidp) },
Christian Borntraegera37cb072018-01-23 13:28:40 +0100119 { "instruction_sck", VCPU_STAT(instruction_sck) },
120 { "instruction_sckpf", VCPU_STAT(instruction_sckpf) },
Christian Borntraeger453423d2008-03-25 18:47:29 +0100121 { "instruction_spx", VCPU_STAT(instruction_spx) },
122 { "instruction_stpx", VCPU_STAT(instruction_stpx) },
123 { "instruction_stap", VCPU_STAT(instruction_stap) },
Christian Borntraegera37cb072018-01-23 13:28:40 +0100124 { "instruction_iske", VCPU_STAT(instruction_iske) },
125 { "instruction_ri", VCPU_STAT(instruction_ri) },
126 { "instruction_rrbe", VCPU_STAT(instruction_rrbe) },
127 { "instruction_sske", VCPU_STAT(instruction_sske) },
Heiko Carstens8a2422342014-01-10 14:33:28 +0100128 { "instruction_ipte_interlock", VCPU_STAT(instruction_ipte_interlock) },
Konstantin Weitzb31288f2013-04-17 17:36:29 +0200129 { "instruction_essa", VCPU_STAT(instruction_essa) },
Christian Borntraeger453423d2008-03-25 18:47:29 +0100130 { "instruction_stsi", VCPU_STAT(instruction_stsi) },
131 { "instruction_stfl", VCPU_STAT(instruction_stfl) },
Christian Borntraegera37cb072018-01-23 13:28:40 +0100132 { "instruction_tb", VCPU_STAT(instruction_tb) },
133 { "instruction_tpi", VCPU_STAT(instruction_tpi) },
Christian Borntraegerbb25b9b2011-07-24 10:48:17 +0200134 { "instruction_tprot", VCPU_STAT(instruction_tprot) },
Christian Borntraegera37cb072018-01-23 13:28:40 +0100135 { "instruction_tsch", VCPU_STAT(instruction_tsch) },
Janosch Frank95ca2cb2016-05-23 15:11:58 +0200136 { "instruction_sthyi", VCPU_STAT(instruction_sthyi) },
David Hildenbranda3508fb2015-07-08 13:19:48 +0200137 { "instruction_sie", VCPU_STAT(instruction_sie) },
Christian Borntraeger5288fbf2008-03-25 18:47:31 +0100138 { "instruction_sigp_sense", VCPU_STAT(instruction_sigp_sense) },
Cornelia Huckbd59d3a2011-11-17 11:00:42 +0100139 { "instruction_sigp_sense_running", VCPU_STAT(instruction_sigp_sense_running) },
Christian Ehrhardt7697e71f2011-10-18 12:27:15 +0200140 { "instruction_sigp_external_call", VCPU_STAT(instruction_sigp_external_call) },
Christian Borntraeger5288fbf2008-03-25 18:47:31 +0100141 { "instruction_sigp_emergency", VCPU_STAT(instruction_sigp_emergency) },
David Hildenbrand42cb0c92014-05-23 12:25:11 +0200142 { "instruction_sigp_cond_emergency", VCPU_STAT(instruction_sigp_cond_emergency) },
143 { "instruction_sigp_start", VCPU_STAT(instruction_sigp_start) },
Christian Borntraeger5288fbf2008-03-25 18:47:31 +0100144 { "instruction_sigp_stop", VCPU_STAT(instruction_sigp_stop) },
David Hildenbrand42cb0c92014-05-23 12:25:11 +0200145 { "instruction_sigp_stop_store_status", VCPU_STAT(instruction_sigp_stop_store_status) },
146 { "instruction_sigp_store_status", VCPU_STAT(instruction_sigp_store_status) },
Eric Farmancd7b4b62015-02-12 09:06:34 -0500147 { "instruction_sigp_store_adtl_status", VCPU_STAT(instruction_sigp_store_adtl_status) },
Christian Borntraeger5288fbf2008-03-25 18:47:31 +0100148 { "instruction_sigp_set_arch", VCPU_STAT(instruction_sigp_arch) },
149 { "instruction_sigp_set_prefix", VCPU_STAT(instruction_sigp_prefix) },
150 { "instruction_sigp_restart", VCPU_STAT(instruction_sigp_restart) },
David Hildenbrand42cb0c92014-05-23 12:25:11 +0200151 { "instruction_sigp_cpu_reset", VCPU_STAT(instruction_sigp_cpu_reset) },
152 { "instruction_sigp_init_cpu_reset", VCPU_STAT(instruction_sigp_init_cpu_reset) },
153 { "instruction_sigp_unknown", VCPU_STAT(instruction_sigp_unknown) },
Christian Borntraeger866c1382018-01-24 12:27:01 +0100154 { "instruction_diag_10", VCPU_STAT(diagnose_10) },
155 { "instruction_diag_44", VCPU_STAT(diagnose_44) },
156 { "instruction_diag_9c", VCPU_STAT(diagnose_9c) },
157 { "instruction_diag_258", VCPU_STAT(diagnose_258) },
158 { "instruction_diag_308", VCPU_STAT(diagnose_308) },
159 { "instruction_diag_500", VCPU_STAT(diagnose_500) },
Christian Borntraegera37cb072018-01-23 13:28:40 +0100160 { "instruction_diag_other", VCPU_STAT(diagnose_other) },
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100161 { NULL }
162};
163
Collin L. Walling8fa16962016-07-26 15:29:44 -0400164struct kvm_s390_tod_clock_ext {
165 __u8 epoch_idx;
166 __u64 tod;
167 __u8 reserved[7];
168} __packed;
169
David Hildenbranda411edf2016-02-02 15:41:22 +0100170/* allow nested virtualization in KVM (if enabled by user space) */
171static int nested;
172module_param(nested, int, S_IRUGO);
173MODULE_PARM_DESC(nested, "Nested virtualization support");
174
Janosch Franka4499382018-07-13 11:28:31 +0100175/* allow 1m huge page guest backing, if !nested */
176static int hpage;
177module_param(hpage, int, 0444);
178MODULE_PARM_DESC(hpage, "1m huge page backing support");
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100179
Christian Borntraegerc3b9e3e2018-02-09 16:26:29 +0000180/*
181 * For now we handle at most 16 double words as this is what the s390 base
182 * kernel handles and stores in the prefix page. If we ever need to go beyond
183 * this, this requires changes to code, but the external uapi can stay.
184 */
185#define SIZE_INTERNAL 16
186
187/*
188 * Base feature mask that defines default mask for facilities. Consists of the
189 * defines in FACILITIES_KVM and the non-hypervisor managed bits.
190 */
191static unsigned long kvm_s390_fac_base[SIZE_INTERNAL] = { FACILITIES_KVM };
192/*
193 * Extended feature mask. Consists of the defines in FACILITIES_KVM_CPUMODEL
194 * and defines the facilities that can be enabled via a cpu model.
195 */
196static unsigned long kvm_s390_fac_ext[SIZE_INTERNAL] = { FACILITIES_KVM_CPUMODEL };
197
198static unsigned long kvm_s390_fac_size(void)
Michael Mueller78c4b592013-07-26 15:04:04 +0200199{
Christian Borntraegerc3b9e3e2018-02-09 16:26:29 +0000200 BUILD_BUG_ON(SIZE_INTERNAL > S390_ARCH_FAC_MASK_SIZE_U64);
201 BUILD_BUG_ON(SIZE_INTERNAL > S390_ARCH_FAC_LIST_SIZE_U64);
202 BUILD_BUG_ON(SIZE_INTERNAL * sizeof(unsigned long) >
203 sizeof(S390_lowcore.stfle_fac_list));
204
205 return SIZE_INTERNAL;
Michael Mueller78c4b592013-07-26 15:04:04 +0200206}
207
David Hildenbrand15c97052015-03-19 17:36:43 +0100208/* available cpu features supported by kvm */
209static DECLARE_BITMAP(kvm_s390_available_cpu_feat, KVM_S390_VM_CPU_FEAT_NR_BITS);
David Hildenbrand0a763c72016-05-18 16:03:47 +0200210/* available subfunctions indicated via query / "test bit" */
211static struct kvm_s390_vm_cpu_subfunc kvm_s390_available_subfunc;
David Hildenbrand15c97052015-03-19 17:36:43 +0100212
Michael Mueller9d8d5782015-02-02 15:42:51 +0100213static struct gmap_notifier gmap_notifier;
David Hildenbranda3508fb2015-07-08 13:19:48 +0200214static struct gmap_notifier vsie_gmap_notifier;
Christian Borntraeger78f26132015-07-22 15:50:58 +0200215debug_info_t *kvm_s390_dbf;
Michael Mueller9d8d5782015-02-02 15:42:51 +0100216
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100217/* Section: not file related */
Radim Krčmář13a34e02014-08-28 15:13:03 +0200218int kvm_arch_hardware_enable(void)
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100219{
220 /* every s390 is virtualization enabled ;-) */
Alexander Graf10474ae2009-09-15 11:37:46 +0200221 return 0;
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100222}
223
Martin Schwidefsky414d3b02016-03-08 11:52:54 +0100224static void kvm_gmap_notifier(struct gmap *gmap, unsigned long start,
225 unsigned long end);
Christian Borntraeger2c70fe42013-05-17 14:41:36 +0200226
David Hildenbrand15757672018-02-07 12:46:45 +0100227static void kvm_clock_sync_scb(struct kvm_s390_sie_block *scb, u64 delta)
228{
229 u8 delta_idx = 0;
230
231 /*
232 * The TOD jumps by delta, we have to compensate this by adding
233 * -delta to the epoch.
234 */
235 delta = -delta;
236
237 /* sign-extension - we're adding to signed values below */
238 if ((s64)delta < 0)
239 delta_idx = -1;
240
241 scb->epoch += delta;
242 if (scb->ecd & ECD_MEF) {
243 scb->epdx += delta_idx;
244 if (scb->epoch < delta)
245 scb->epdx += 1;
246 }
247}
248
Fan Zhangfdf03652015-05-13 10:58:41 +0200249/*
250 * This callback is executed during stop_machine(). All CPUs are therefore
251 * temporarily stopped. In order not to change guest behavior, we have to
252 * disable preemption whenever we touch the epoch of kvm and the VCPUs,
253 * so a CPU won't be stopped while calculating with the epoch.
254 */
255static int kvm_clock_sync(struct notifier_block *notifier, unsigned long val,
256 void *v)
257{
258 struct kvm *kvm;
259 struct kvm_vcpu *vcpu;
260 int i;
261 unsigned long long *delta = v;
262
263 list_for_each_entry(kvm, &vm_list, vm_list) {
Fan Zhangfdf03652015-05-13 10:58:41 +0200264 kvm_for_each_vcpu(i, vcpu, kvm) {
David Hildenbrand15757672018-02-07 12:46:45 +0100265 kvm_clock_sync_scb(vcpu->arch.sie_block, *delta);
266 if (i == 0) {
267 kvm->arch.epoch = vcpu->arch.sie_block->epoch;
268 kvm->arch.epdx = vcpu->arch.sie_block->epdx;
269 }
David Hildenbranddb0758b2016-02-15 09:42:25 +0100270 if (vcpu->arch.cputm_enabled)
271 vcpu->arch.cputm_start += *delta;
David Hildenbrand91473b42015-10-29 10:30:36 +0100272 if (vcpu->arch.vsie_block)
David Hildenbrand15757672018-02-07 12:46:45 +0100273 kvm_clock_sync_scb(vcpu->arch.vsie_block,
274 *delta);
Fan Zhangfdf03652015-05-13 10:58:41 +0200275 }
276 }
277 return NOTIFY_OK;
278}
279
280static struct notifier_block kvm_clock_notifier = {
281 .notifier_call = kvm_clock_sync,
282};
283
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100284int kvm_arch_hardware_setup(void)
285{
Christian Borntraeger2c70fe42013-05-17 14:41:36 +0200286 gmap_notifier.notifier_call = kvm_gmap_notifier;
Martin Schwidefskyb2d73b22016-03-08 11:54:42 +0100287 gmap_register_pte_notifier(&gmap_notifier);
David Hildenbranda3508fb2015-07-08 13:19:48 +0200288 vsie_gmap_notifier.notifier_call = kvm_s390_vsie_gmap_notifier;
289 gmap_register_pte_notifier(&vsie_gmap_notifier);
Fan Zhangfdf03652015-05-13 10:58:41 +0200290 atomic_notifier_chain_register(&s390_epoch_delta_notifier,
291 &kvm_clock_notifier);
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100292 return 0;
293}
294
295void kvm_arch_hardware_unsetup(void)
296{
Martin Schwidefskyb2d73b22016-03-08 11:54:42 +0100297 gmap_unregister_pte_notifier(&gmap_notifier);
David Hildenbranda3508fb2015-07-08 13:19:48 +0200298 gmap_unregister_pte_notifier(&vsie_gmap_notifier);
Fan Zhangfdf03652015-05-13 10:58:41 +0200299 atomic_notifier_chain_unregister(&s390_epoch_delta_notifier,
300 &kvm_clock_notifier);
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100301}
302
David Hildenbrand22be5a132016-01-21 13:22:54 +0100303static void allow_cpu_feat(unsigned long nr)
304{
305 set_bit_inv(nr, kvm_s390_available_cpu_feat);
306}
307
David Hildenbrand0a763c72016-05-18 16:03:47 +0200308static inline int plo_test_bit(unsigned char nr)
309{
310 register unsigned long r0 asm("0") = (unsigned long) nr | 0x100;
Heiko Carstensd051ae52016-12-13 14:25:32 +0100311 int cc;
David Hildenbrand0a763c72016-05-18 16:03:47 +0200312
313 asm volatile(
314 /* Parameter registers are ignored for "test bit" */
315 " plo 0,0,0,0(0)\n"
316 " ipm %0\n"
317 " srl %0,28\n"
318 : "=d" (cc)
319 : "d" (r0)
320 : "cc");
321 return cc == 0;
322}
323
Christian Borntraegerd6681392019-02-20 03:04:07 -0500324static inline void __insn32_query(unsigned int opcode, u8 query[32])
325{
326 register unsigned long r0 asm("0") = 0; /* query function */
327 register unsigned long r1 asm("1") = (unsigned long) query;
328
329 asm volatile(
330 /* Parameter regs are ignored */
331 " .insn rrf,%[opc] << 16,2,4,6,0\n"
332 : "=m" (*query)
333 : "d" (r0), "a" (r1), [opc] "i" (opcode)
334 : "cc");
335}
336
Christian Borntraeger173aec22018-12-28 10:59:06 +0100337#define INSN_SORTL 0xb938
Christian Borntraeger4f45b902018-12-28 10:46:04 +0100338#define INSN_DFLTCC 0xb939
Christian Borntraeger173aec22018-12-28 10:59:06 +0100339
David Hildenbrand22be5a132016-01-21 13:22:54 +0100340static void kvm_s390_cpu_feat_init(void)
341{
David Hildenbrand0a763c72016-05-18 16:03:47 +0200342 int i;
343
344 for (i = 0; i < 256; ++i) {
345 if (plo_test_bit(i))
346 kvm_s390_available_subfunc.plo[i >> 3] |= 0x80 >> (i & 7);
347 }
348
349 if (test_facility(28)) /* TOD-clock steering */
Linus Torvalds221bb8a2016-08-02 16:11:27 -0400350 ptff(kvm_s390_available_subfunc.ptff,
351 sizeof(kvm_s390_available_subfunc.ptff),
352 PTFF_QAF);
David Hildenbrand0a763c72016-05-18 16:03:47 +0200353
354 if (test_facility(17)) { /* MSA */
Martin Schwidefsky69c0e362016-08-18 12:59:46 +0200355 __cpacf_query(CPACF_KMAC, (cpacf_mask_t *)
356 kvm_s390_available_subfunc.kmac);
357 __cpacf_query(CPACF_KMC, (cpacf_mask_t *)
358 kvm_s390_available_subfunc.kmc);
359 __cpacf_query(CPACF_KM, (cpacf_mask_t *)
360 kvm_s390_available_subfunc.km);
361 __cpacf_query(CPACF_KIMD, (cpacf_mask_t *)
362 kvm_s390_available_subfunc.kimd);
363 __cpacf_query(CPACF_KLMD, (cpacf_mask_t *)
364 kvm_s390_available_subfunc.klmd);
David Hildenbrand0a763c72016-05-18 16:03:47 +0200365 }
366 if (test_facility(76)) /* MSA3 */
Martin Schwidefsky69c0e362016-08-18 12:59:46 +0200367 __cpacf_query(CPACF_PCKMO, (cpacf_mask_t *)
368 kvm_s390_available_subfunc.pckmo);
David Hildenbrand0a763c72016-05-18 16:03:47 +0200369 if (test_facility(77)) { /* MSA4 */
Martin Schwidefsky69c0e362016-08-18 12:59:46 +0200370 __cpacf_query(CPACF_KMCTR, (cpacf_mask_t *)
371 kvm_s390_available_subfunc.kmctr);
372 __cpacf_query(CPACF_KMF, (cpacf_mask_t *)
373 kvm_s390_available_subfunc.kmf);
374 __cpacf_query(CPACF_KMO, (cpacf_mask_t *)
375 kvm_s390_available_subfunc.kmo);
376 __cpacf_query(CPACF_PCC, (cpacf_mask_t *)
377 kvm_s390_available_subfunc.pcc);
David Hildenbrand0a763c72016-05-18 16:03:47 +0200378 }
379 if (test_facility(57)) /* MSA5 */
Harald Freudenberger985a9d22017-02-24 10:11:54 +0100380 __cpacf_query(CPACF_PRNO, (cpacf_mask_t *)
Martin Schwidefsky69c0e362016-08-18 12:59:46 +0200381 kvm_s390_available_subfunc.ppno);
David Hildenbrand0a763c72016-05-18 16:03:47 +0200382
Jason J. Hernee000b8e2017-03-20 09:57:42 -0400383 if (test_facility(146)) /* MSA8 */
384 __cpacf_query(CPACF_KMA, (cpacf_mask_t *)
385 kvm_s390_available_subfunc.kma);
386
Christian Borntraeger13209ad2018-12-28 09:33:35 +0100387 if (test_facility(155)) /* MSA9 */
388 __cpacf_query(CPACF_KDSA, (cpacf_mask_t *)
389 kvm_s390_available_subfunc.kdsa);
390
Christian Borntraeger173aec22018-12-28 10:59:06 +0100391 if (test_facility(150)) /* SORTL */
392 __insn32_query(INSN_SORTL, kvm_s390_available_subfunc.sortl);
393
Christian Borntraeger4f45b902018-12-28 10:46:04 +0100394 if (test_facility(151)) /* DFLTCC */
395 __insn32_query(INSN_DFLTCC, kvm_s390_available_subfunc.dfltcc);
396
David Hildenbrand22be5a132016-01-21 13:22:54 +0100397 if (MACHINE_HAS_ESOP)
398 allow_cpu_feat(KVM_S390_VM_CPU_FEAT_ESOP);
David Hildenbranda3508fb2015-07-08 13:19:48 +0200399 /*
400 * We need SIE support, ESOP (PROT_READ protection for gmap_shadow),
401 * 64bit SCAO (SCA passthrough) and IDTE (for gmap_shadow unshadowing).
402 */
403 if (!sclp.has_sief2 || !MACHINE_HAS_ESOP || !sclp.has_64bscao ||
David Hildenbranda411edf2016-02-02 15:41:22 +0100404 !test_facility(3) || !nested)
David Hildenbranda3508fb2015-07-08 13:19:48 +0200405 return;
406 allow_cpu_feat(KVM_S390_VM_CPU_FEAT_SIEF2);
David Hildenbrand19c439b2015-11-25 11:02:26 +0100407 if (sclp.has_64bscao)
408 allow_cpu_feat(KVM_S390_VM_CPU_FEAT_64BSCAO);
David Hildenbrand0615a322015-11-25 09:59:49 +0100409 if (sclp.has_siif)
410 allow_cpu_feat(KVM_S390_VM_CPU_FEAT_SIIF);
David Hildenbrand77d18f62015-11-24 16:32:35 +0100411 if (sclp.has_gpere)
412 allow_cpu_feat(KVM_S390_VM_CPU_FEAT_GPERE);
David Hildenbranda1b7b9b2015-11-24 16:41:33 +0100413 if (sclp.has_gsls)
414 allow_cpu_feat(KVM_S390_VM_CPU_FEAT_GSLS);
David Hildenbrand5630a8e2015-11-24 16:53:51 +0100415 if (sclp.has_ib)
416 allow_cpu_feat(KVM_S390_VM_CPU_FEAT_IB);
David Hildenbrand13ee3f62015-11-24 16:54:37 +0100417 if (sclp.has_cei)
418 allow_cpu_feat(KVM_S390_VM_CPU_FEAT_CEI);
David Hildenbrand7fd7f392015-11-24 16:56:23 +0100419 if (sclp.has_ibs)
420 allow_cpu_feat(KVM_S390_VM_CPU_FEAT_IBS);
Farhan Ali730cd632017-02-24 16:12:56 -0500421 if (sclp.has_kss)
422 allow_cpu_feat(KVM_S390_VM_CPU_FEAT_KSS);
David Hildenbrand5d3876a2016-04-13 17:06:50 +0200423 /*
424 * KVM_S390_VM_CPU_FEAT_SKEY: Wrong shadow of PTE.I bits will make
425 * all skey handling functions read/set the skey from the PGSTE
426 * instead of the real storage key.
427 *
428 * KVM_S390_VM_CPU_FEAT_CMMA: Wrong shadow of PTE.I bits will make
429 * pages being detected as preserved although they are resident.
430 *
431 * KVM_S390_VM_CPU_FEAT_PFMFI: Wrong shadow of PTE.I bits will
432 * have the same effect as for KVM_S390_VM_CPU_FEAT_SKEY.
433 *
434 * For KVM_S390_VM_CPU_FEAT_SKEY, KVM_S390_VM_CPU_FEAT_CMMA and
435 * KVM_S390_VM_CPU_FEAT_PFMFI, all PTE.I and PGSTE bits have to be
436 * correctly shadowed. We can do that for the PGSTE but not for PTE.I.
437 *
438 * KVM_S390_VM_CPU_FEAT_SIGPIF: Wrong SCB addresses in the SCA. We
439 * cannot easily shadow the SCA because of the ipte lock.
440 */
David Hildenbrand22be5a132016-01-21 13:22:54 +0100441}
442
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100443int kvm_arch_init(void *opaque)
444{
Michael Mueller308c3e62018-11-30 15:32:06 +0100445 int rc;
446
Christian Borntraeger78f26132015-07-22 15:50:58 +0200447 kvm_s390_dbf = debug_register("kvm-trace", 32, 1, 7 * sizeof(long));
448 if (!kvm_s390_dbf)
449 return -ENOMEM;
450
451 if (debug_register_view(kvm_s390_dbf, &debug_sprintf_view)) {
Michael Mueller308c3e62018-11-30 15:32:06 +0100452 rc = -ENOMEM;
453 goto out_debug_unreg;
Christian Borntraeger78f26132015-07-22 15:50:58 +0200454 }
455
David Hildenbrand22be5a132016-01-21 13:22:54 +0100456 kvm_s390_cpu_feat_init();
457
Cornelia Huck84877d92014-09-02 10:27:35 +0100458 /* Register floating interrupt controller interface. */
Michael Mueller308c3e62018-11-30 15:32:06 +0100459 rc = kvm_register_device_ops(&kvm_flic_ops, KVM_DEV_TYPE_FLIC);
460 if (rc) {
Michael Mueller8d43d572018-12-10 11:15:16 +0100461 pr_err("A FLIC registration call failed with rc=%d\n", rc);
Michael Mueller308c3e62018-11-30 15:32:06 +0100462 goto out_debug_unreg;
463 }
Michael Muellerb1d1e762019-01-31 09:52:45 +0100464
465 rc = kvm_s390_gib_init(GAL_ISC);
466 if (rc)
467 goto out_gib_destroy;
468
Michael Mueller308c3e62018-11-30 15:32:06 +0100469 return 0;
470
Michael Muellerb1d1e762019-01-31 09:52:45 +0100471out_gib_destroy:
472 kvm_s390_gib_destroy();
Michael Mueller308c3e62018-11-30 15:32:06 +0100473out_debug_unreg:
474 debug_unregister(kvm_s390_dbf);
475 return rc;
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100476}
477
Christian Borntraeger78f26132015-07-22 15:50:58 +0200478void kvm_arch_exit(void)
479{
Michael Mueller1282c212019-01-31 09:52:40 +0100480 kvm_s390_gib_destroy();
Christian Borntraeger78f26132015-07-22 15:50:58 +0200481 debug_unregister(kvm_s390_dbf);
482}
483
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100484/* Section: device related */
485long kvm_arch_dev_ioctl(struct file *filp,
486 unsigned int ioctl, unsigned long arg)
487{
488 if (ioctl == KVM_S390_ENABLE_SIE)
489 return s390_enable_sie();
490 return -EINVAL;
491}
492
Alexander Graf784aa3d2014-07-14 18:27:35 +0200493int kvm_vm_ioctl_check_extension(struct kvm *kvm, long ext)
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100494{
Carsten Otted7b0b5e2009-11-19 14:21:16 +0100495 int r;
496
Carsten Otte2bd0ac42008-07-25 15:49:13 +0200497 switch (ext) {
Carsten Otted7b0b5e2009-11-19 14:21:16 +0100498 case KVM_CAP_S390_PSW:
Christian Borntraegerb6cf8782011-09-20 17:07:29 +0200499 case KVM_CAP_S390_GMAP:
Christian Borntraeger52e16b12011-11-17 11:00:44 +0100500 case KVM_CAP_SYNC_MMU:
Carsten Otte1efd0f52012-01-04 10:25:29 +0100501#ifdef CONFIG_KVM_S390_UCONTROL
502 case KVM_CAP_S390_UCONTROL:
503#endif
Dominik Dingel3c038e62013-10-07 17:11:48 +0200504 case KVM_CAP_ASYNC_PF:
Christian Borntraeger60b413c2012-01-11 11:20:31 +0100505 case KVM_CAP_SYNC_REGS:
Carsten Otte14eebd92012-05-15 14:15:26 +0200506 case KVM_CAP_ONE_REG:
Cornelia Huckd6712df2012-12-20 15:32:11 +0100507 case KVM_CAP_ENABLE_CAP:
Cornelia Huckfa6b7fe2012-12-20 15:32:12 +0100508 case KVM_CAP_S390_CSS_SUPPORT:
Cornelia Huck10ccaa12013-02-28 12:33:21 +0100509 case KVM_CAP_IOEVENTFD:
Jens Freimannc05c4182013-10-07 16:13:45 +0200510 case KVM_CAP_DEVICE_CTRL:
Cornelia Huck78599d92014-07-15 09:54:39 +0200511 case KVM_CAP_S390_IRQCHIP:
Dominik Dingelf2061652014-04-09 13:13:00 +0200512 case KVM_CAP_VM_ATTRIBUTES:
David Hildenbrand6352e4d2014-04-10 17:35:00 +0200513 case KVM_CAP_MP_STATE:
Paolo Bonzini460df4c2017-02-08 11:50:15 +0100514 case KVM_CAP_IMMEDIATE_EXIT:
Jens Freimann47b43c52014-11-11 20:57:06 +0100515 case KVM_CAP_S390_INJECT_IRQ:
David Hildenbrand2444b352014-10-09 14:10:13 +0200516 case KVM_CAP_S390_USER_SIGP:
Ekaterina Tumanovae44fc8c2015-01-30 16:55:56 +0100517 case KVM_CAP_S390_USER_STSI:
Jason J. Herne30ee2a92014-09-23 09:23:01 -0400518 case KVM_CAP_S390_SKEYS:
Jens Freimann816c7662014-11-24 17:13:46 +0100519 case KVM_CAP_S390_IRQ_STATE:
David Hildenbrand6502a342016-06-21 14:19:51 +0200520 case KVM_CAP_S390_USER_INSTR0:
Claudio Imbrenda4036e382016-08-04 17:58:47 +0200521 case KVM_CAP_S390_CMMA_MIGRATION:
Yi Min Zhao47a46932017-03-10 09:29:38 +0100522 case KVM_CAP_S390_AIS:
Christian Borntraegerda9a1442017-11-09 10:00:45 +0100523 case KVM_CAP_S390_AIS_MIGRATION:
Carsten Otted7b0b5e2009-11-19 14:21:16 +0100524 r = 1;
525 break;
Janosch Franka4499382018-07-13 11:28:31 +0100526 case KVM_CAP_S390_HPAGE_1M:
527 r = 0;
Janosch Frank40ebdb82018-08-01 11:48:28 +0100528 if (hpage && !kvm_is_ucontrol(kvm))
Janosch Franka4499382018-07-13 11:28:31 +0100529 r = 1;
530 break;
Thomas Huth41408c282015-02-06 15:01:21 +0100531 case KVM_CAP_S390_MEM_OP:
532 r = MEM_OP_MAX_SIZE;
533 break;
Christian Borntraegere726b1b2012-05-02 10:50:38 +0200534 case KVM_CAP_NR_VCPUS:
535 case KVM_CAP_MAX_VCPUS:
David Hildenbrand76a6dd72015-11-24 13:33:49 +0100536 r = KVM_S390_BSCA_CPU_SLOTS;
David Hildenbranda6940672016-08-08 22:39:32 +0200537 if (!kvm_s390_use_sca_entries())
538 r = KVM_MAX_VCPUS;
539 else if (sclp.has_esca && sclp.has_64bscao)
David Hildenbrand76a6dd72015-11-24 13:33:49 +0100540 r = KVM_S390_ESCA_CPU_SLOTS;
Christian Borntraegere726b1b2012-05-02 10:50:38 +0200541 break;
Nick Wange1e2e602013-03-25 17:22:58 +0100542 case KVM_CAP_NR_MEMSLOTS:
543 r = KVM_USER_MEM_SLOTS;
544 break;
Christian Borntraeger1526bf92012-05-15 14:15:25 +0200545 case KVM_CAP_S390_COW:
Martin Schwidefskyabf09be2012-11-07 13:17:37 +0100546 r = MACHINE_HAS_ESOP;
Christian Borntraeger1526bf92012-05-15 14:15:25 +0200547 break;
Eric Farman68c55752014-06-09 10:57:26 -0400548 case KVM_CAP_S390_VECTOR_REGISTERS:
549 r = MACHINE_HAS_VX;
550 break;
Fan Zhangc6e5f162016-01-07 18:24:29 +0800551 case KVM_CAP_S390_RI:
552 r = test_facility(64);
553 break;
Fan Zhang4e0b1ab2016-11-29 07:17:55 +0100554 case KVM_CAP_S390_GS:
555 r = test_facility(133);
556 break;
Christian Borntraeger35b3fde2018-01-17 14:44:34 +0100557 case KVM_CAP_S390_BPB:
558 r = test_facility(82);
559 break;
Carsten Otte2bd0ac42008-07-25 15:49:13 +0200560 default:
Carsten Otted7b0b5e2009-11-19 14:21:16 +0100561 r = 0;
Carsten Otte2bd0ac42008-07-25 15:49:13 +0200562 }
Carsten Otted7b0b5e2009-11-19 14:21:16 +0100563 return r;
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100564}
565
Jason J. Herne15f36eb2012-08-02 10:10:17 -0400566static void kvm_s390_sync_dirty_log(struct kvm *kvm,
Janosch Frank0959e162018-07-17 13:21:22 +0100567 struct kvm_memory_slot *memslot)
Jason J. Herne15f36eb2012-08-02 10:10:17 -0400568{
Janosch Frank0959e162018-07-17 13:21:22 +0100569 int i;
Jason J. Herne15f36eb2012-08-02 10:10:17 -0400570 gfn_t cur_gfn, last_gfn;
Janosch Frank0959e162018-07-17 13:21:22 +0100571 unsigned long gaddr, vmaddr;
Jason J. Herne15f36eb2012-08-02 10:10:17 -0400572 struct gmap *gmap = kvm->arch.gmap;
Janosch Frank0959e162018-07-17 13:21:22 +0100573 DECLARE_BITMAP(bitmap, _PAGE_ENTRIES);
Jason J. Herne15f36eb2012-08-02 10:10:17 -0400574
Janosch Frank0959e162018-07-17 13:21:22 +0100575 /* Loop over all guest segments */
576 cur_gfn = memslot->base_gfn;
Jason J. Herne15f36eb2012-08-02 10:10:17 -0400577 last_gfn = memslot->base_gfn + memslot->npages;
Janosch Frank0959e162018-07-17 13:21:22 +0100578 for (; cur_gfn <= last_gfn; cur_gfn += _PAGE_ENTRIES) {
579 gaddr = gfn_to_gpa(cur_gfn);
580 vmaddr = gfn_to_hva_memslot(memslot, cur_gfn);
581 if (kvm_is_error_hva(vmaddr))
582 continue;
Jason J. Herne15f36eb2012-08-02 10:10:17 -0400583
Janosch Frank0959e162018-07-17 13:21:22 +0100584 bitmap_zero(bitmap, _PAGE_ENTRIES);
585 gmap_sync_dirty_log_pmd(gmap, bitmap, gaddr, vmaddr);
586 for (i = 0; i < _PAGE_ENTRIES; i++) {
587 if (test_bit(i, bitmap))
588 mark_page_dirty(kvm, cur_gfn + i);
589 }
590
Christian Borntraeger1763f8d2016-02-03 11:12:34 +0100591 if (fatal_signal_pending(current))
592 return;
Christian Borntraeger70c88a02016-02-02 15:15:56 +0100593 cond_resched();
Jason J. Herne15f36eb2012-08-02 10:10:17 -0400594 }
Jason J. Herne15f36eb2012-08-02 10:10:17 -0400595}
596
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100597/* Section: vm related */
Eugene (jno) Dvurechenskia6e2f682015-04-21 15:31:59 +0200598static void sca_del_vcpu(struct kvm_vcpu *vcpu);
599
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100600/*
601 * Get (and clear) the dirty memory log for a memory slot.
602 */
603int kvm_vm_ioctl_get_dirty_log(struct kvm *kvm,
604 struct kvm_dirty_log *log)
605{
Jason J. Herne15f36eb2012-08-02 10:10:17 -0400606 int r;
607 unsigned long n;
Paolo Bonzini9f6b8022015-05-17 16:20:07 +0200608 struct kvm_memslots *slots;
Jason J. Herne15f36eb2012-08-02 10:10:17 -0400609 struct kvm_memory_slot *memslot;
610 int is_dirty = 0;
611
Janosch Franke1e8a962017-02-02 16:39:31 +0100612 if (kvm_is_ucontrol(kvm))
613 return -EINVAL;
614
Jason J. Herne15f36eb2012-08-02 10:10:17 -0400615 mutex_lock(&kvm->slots_lock);
616
617 r = -EINVAL;
618 if (log->slot >= KVM_USER_MEM_SLOTS)
619 goto out;
620
Paolo Bonzini9f6b8022015-05-17 16:20:07 +0200621 slots = kvm_memslots(kvm);
622 memslot = id_to_memslot(slots, log->slot);
Jason J. Herne15f36eb2012-08-02 10:10:17 -0400623 r = -ENOENT;
624 if (!memslot->dirty_bitmap)
625 goto out;
626
627 kvm_s390_sync_dirty_log(kvm, memslot);
628 r = kvm_get_dirty_log(kvm, log, &is_dirty);
629 if (r)
630 goto out;
631
632 /* Clear the dirty log */
633 if (is_dirty) {
634 n = kvm_dirty_bitmap_bytes(memslot);
635 memset(memslot->dirty_bitmap, 0, n);
636 }
637 r = 0;
638out:
639 mutex_unlock(&kvm->slots_lock);
640 return r;
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100641}
642
David Hildenbrand6502a342016-06-21 14:19:51 +0200643static void icpt_operexc_on_all_vcpus(struct kvm *kvm)
644{
645 unsigned int i;
646 struct kvm_vcpu *vcpu;
647
648 kvm_for_each_vcpu(i, vcpu, kvm) {
649 kvm_s390_sync_request(KVM_REQ_ICPT_OPEREXC, vcpu);
650 }
651}
652
Paolo Bonzinie5d83c72017-02-16 10:40:56 +0100653int kvm_vm_ioctl_enable_cap(struct kvm *kvm, struct kvm_enable_cap *cap)
Cornelia Huckd938dc52013-10-23 18:26:34 +0200654{
655 int r;
656
657 if (cap->flags)
658 return -EINVAL;
659
660 switch (cap->cap) {
Cornelia Huck84223592013-07-15 13:36:01 +0200661 case KVM_CAP_S390_IRQCHIP:
Christian Borntraegerc92ea7b2015-07-22 15:52:10 +0200662 VM_EVENT(kvm, 3, "%s", "ENABLE: CAP_S390_IRQCHIP");
Cornelia Huck84223592013-07-15 13:36:01 +0200663 kvm->arch.use_irqchip = 1;
664 r = 0;
665 break;
David Hildenbrand2444b352014-10-09 14:10:13 +0200666 case KVM_CAP_S390_USER_SIGP:
Christian Borntraegerc92ea7b2015-07-22 15:52:10 +0200667 VM_EVENT(kvm, 3, "%s", "ENABLE: CAP_S390_USER_SIGP");
David Hildenbrand2444b352014-10-09 14:10:13 +0200668 kvm->arch.user_sigp = 1;
669 r = 0;
670 break;
Eric Farman68c55752014-06-09 10:57:26 -0400671 case KVM_CAP_S390_VECTOR_REGISTERS:
David Hildenbrand5967c172015-11-06 12:08:48 +0100672 mutex_lock(&kvm->lock);
Paolo Bonzinia03825b2016-06-13 14:50:04 +0200673 if (kvm->created_vcpus) {
David Hildenbrand5967c172015-11-06 12:08:48 +0100674 r = -EBUSY;
675 } else if (MACHINE_HAS_VX) {
David Hildenbrandc54f0d62015-12-02 08:53:52 +0100676 set_kvm_facility(kvm->arch.model.fac_mask, 129);
677 set_kvm_facility(kvm->arch.model.fac_list, 129);
Guenther Hutzl2f87d942016-06-03 14:37:17 +0200678 if (test_facility(134)) {
679 set_kvm_facility(kvm->arch.model.fac_mask, 134);
680 set_kvm_facility(kvm->arch.model.fac_list, 134);
681 }
Maxim Samoylov53743aa2016-02-10 10:31:23 +0100682 if (test_facility(135)) {
683 set_kvm_facility(kvm->arch.model.fac_mask, 135);
684 set_kvm_facility(kvm->arch.model.fac_list, 135);
685 }
Christian Borntraeger7832e912018-12-28 09:43:37 +0100686 if (test_facility(148)) {
687 set_kvm_facility(kvm->arch.model.fac_mask, 148);
688 set_kvm_facility(kvm->arch.model.fac_list, 148);
689 }
Christian Borntraegerd5cb6ab2018-12-28 09:45:58 +0100690 if (test_facility(152)) {
691 set_kvm_facility(kvm->arch.model.fac_mask, 152);
692 set_kvm_facility(kvm->arch.model.fac_list, 152);
693 }
Michael Mueller18280d82015-03-16 16:05:41 +0100694 r = 0;
695 } else
696 r = -EINVAL;
David Hildenbrand5967c172015-11-06 12:08:48 +0100697 mutex_unlock(&kvm->lock);
Christian Borntraegerc92ea7b2015-07-22 15:52:10 +0200698 VM_EVENT(kvm, 3, "ENABLE: CAP_S390_VECTOR_REGISTERS %s",
699 r ? "(not available)" : "(success)");
Eric Farman68c55752014-06-09 10:57:26 -0400700 break;
Fan Zhangc6e5f162016-01-07 18:24:29 +0800701 case KVM_CAP_S390_RI:
702 r = -EINVAL;
703 mutex_lock(&kvm->lock);
Paolo Bonzinia03825b2016-06-13 14:50:04 +0200704 if (kvm->created_vcpus) {
Fan Zhangc6e5f162016-01-07 18:24:29 +0800705 r = -EBUSY;
706 } else if (test_facility(64)) {
David Hildenbrandc54f0d62015-12-02 08:53:52 +0100707 set_kvm_facility(kvm->arch.model.fac_mask, 64);
708 set_kvm_facility(kvm->arch.model.fac_list, 64);
Fan Zhangc6e5f162016-01-07 18:24:29 +0800709 r = 0;
710 }
711 mutex_unlock(&kvm->lock);
712 VM_EVENT(kvm, 3, "ENABLE: CAP_S390_RI %s",
713 r ? "(not available)" : "(success)");
714 break;
Yi Min Zhao47a46932017-03-10 09:29:38 +0100715 case KVM_CAP_S390_AIS:
716 mutex_lock(&kvm->lock);
717 if (kvm->created_vcpus) {
718 r = -EBUSY;
719 } else {
720 set_kvm_facility(kvm->arch.model.fac_mask, 72);
721 set_kvm_facility(kvm->arch.model.fac_list, 72);
Yi Min Zhao47a46932017-03-10 09:29:38 +0100722 r = 0;
723 }
724 mutex_unlock(&kvm->lock);
725 VM_EVENT(kvm, 3, "ENABLE: AIS %s",
726 r ? "(not available)" : "(success)");
727 break;
Fan Zhang4e0b1ab2016-11-29 07:17:55 +0100728 case KVM_CAP_S390_GS:
729 r = -EINVAL;
730 mutex_lock(&kvm->lock);
Christian Borntraeger241e3ec02017-11-16 15:12:52 +0100731 if (kvm->created_vcpus) {
Fan Zhang4e0b1ab2016-11-29 07:17:55 +0100732 r = -EBUSY;
733 } else if (test_facility(133)) {
734 set_kvm_facility(kvm->arch.model.fac_mask, 133);
735 set_kvm_facility(kvm->arch.model.fac_list, 133);
736 r = 0;
737 }
738 mutex_unlock(&kvm->lock);
739 VM_EVENT(kvm, 3, "ENABLE: CAP_S390_GS %s",
740 r ? "(not available)" : "(success)");
741 break;
Janosch Franka4499382018-07-13 11:28:31 +0100742 case KVM_CAP_S390_HPAGE_1M:
743 mutex_lock(&kvm->lock);
744 if (kvm->created_vcpus)
745 r = -EBUSY;
Janosch Frank40ebdb82018-08-01 11:48:28 +0100746 else if (!hpage || kvm->arch.use_cmma || kvm_is_ucontrol(kvm))
Janosch Franka4499382018-07-13 11:28:31 +0100747 r = -EINVAL;
748 else {
749 r = 0;
Janosch Frankdf88f312018-08-30 16:14:18 +0200750 down_write(&kvm->mm->mmap_sem);
Janosch Franka4499382018-07-13 11:28:31 +0100751 kvm->mm->context.allow_gmap_hpage_1m = 1;
Janosch Frankdf88f312018-08-30 16:14:18 +0200752 up_write(&kvm->mm->mmap_sem);
Janosch Franka4499382018-07-13 11:28:31 +0100753 /*
754 * We might have to create fake 4k page
755 * tables. To avoid that the hardware works on
756 * stale PGSTEs, we emulate these instructions.
757 */
758 kvm->arch.use_skf = 0;
759 kvm->arch.use_pfmfi = 0;
760 }
761 mutex_unlock(&kvm->lock);
762 VM_EVENT(kvm, 3, "ENABLE: CAP_S390_HPAGE %s",
763 r ? "(not available)" : "(success)");
764 break;
Ekaterina Tumanovae44fc8c2015-01-30 16:55:56 +0100765 case KVM_CAP_S390_USER_STSI:
Christian Borntraegerc92ea7b2015-07-22 15:52:10 +0200766 VM_EVENT(kvm, 3, "%s", "ENABLE: CAP_S390_USER_STSI");
Ekaterina Tumanovae44fc8c2015-01-30 16:55:56 +0100767 kvm->arch.user_stsi = 1;
768 r = 0;
769 break;
David Hildenbrand6502a342016-06-21 14:19:51 +0200770 case KVM_CAP_S390_USER_INSTR0:
771 VM_EVENT(kvm, 3, "%s", "ENABLE: CAP_S390_USER_INSTR0");
772 kvm->arch.user_instr0 = 1;
773 icpt_operexc_on_all_vcpus(kvm);
774 r = 0;
775 break;
Cornelia Huckd938dc52013-10-23 18:26:34 +0200776 default:
777 r = -EINVAL;
778 break;
779 }
780 return r;
781}
782
Dominik Dingel8c0a7ce2014-10-31 14:10:41 +0100783static int kvm_s390_get_mem_control(struct kvm *kvm, struct kvm_device_attr *attr)
784{
785 int ret;
786
787 switch (attr->attr) {
788 case KVM_S390_VM_MEM_LIMIT_SIZE:
789 ret = 0;
Christian Borntraegerc92ea7b2015-07-22 15:52:10 +0200790 VM_EVENT(kvm, 3, "QUERY: max guest memory: %lu bytes",
Dominik Dingela3a92c32014-12-01 17:24:42 +0100791 kvm->arch.mem_limit);
792 if (put_user(kvm->arch.mem_limit, (u64 __user *)attr->addr))
Dominik Dingel8c0a7ce2014-10-31 14:10:41 +0100793 ret = -EFAULT;
794 break;
795 default:
796 ret = -ENXIO;
797 break;
798 }
799 return ret;
800}
801
802static int kvm_s390_set_mem_control(struct kvm *kvm, struct kvm_device_attr *attr)
Dominik Dingel4f718ea2014-04-09 13:13:00 +0200803{
804 int ret;
805 unsigned int idx;
806 switch (attr->attr) {
807 case KVM_S390_VM_MEM_ENABLE_CMMA:
David Hildenbrandf9cbd9b2016-03-03 09:48:47 +0100808 ret = -ENXIO;
David Hildenbrandc24cc9c2015-11-24 13:53:04 +0100809 if (!sclp.has_cmma)
Dominik Dingele6db1d62015-05-07 15:41:57 +0200810 break;
811
Christian Borntraegerc92ea7b2015-07-22 15:52:10 +0200812 VM_EVENT(kvm, 3, "%s", "ENABLE: CMMA support");
Dominik Dingel4f718ea2014-04-09 13:13:00 +0200813 mutex_lock(&kvm->lock);
Janosch Franka4499382018-07-13 11:28:31 +0100814 if (kvm->created_vcpus)
815 ret = -EBUSY;
816 else if (kvm->mm->context.allow_gmap_hpage_1m)
817 ret = -EINVAL;
818 else {
Dominik Dingel4f718ea2014-04-09 13:13:00 +0200819 kvm->arch.use_cmma = 1;
Janosch Frankc9f0a2b2018-02-16 12:16:14 +0100820 /* Not compatible with cmma. */
821 kvm->arch.use_pfmfi = 0;
Dominik Dingel4f718ea2014-04-09 13:13:00 +0200822 ret = 0;
823 }
824 mutex_unlock(&kvm->lock);
825 break;
826 case KVM_S390_VM_MEM_CLR_CMMA:
David Hildenbrandf9cbd9b2016-03-03 09:48:47 +0100827 ret = -ENXIO;
828 if (!sclp.has_cmma)
829 break;
Dominik Dingelc3489152015-06-18 13:17:11 +0200830 ret = -EINVAL;
831 if (!kvm->arch.use_cmma)
832 break;
833
Christian Borntraegerc92ea7b2015-07-22 15:52:10 +0200834 VM_EVENT(kvm, 3, "%s", "RESET: CMMA states");
Dominik Dingel4f718ea2014-04-09 13:13:00 +0200835 mutex_lock(&kvm->lock);
836 idx = srcu_read_lock(&kvm->srcu);
Dominik Dingela13cff32014-10-23 12:07:14 +0200837 s390_reset_cmma(kvm->arch.gmap->mm);
Dominik Dingel4f718ea2014-04-09 13:13:00 +0200838 srcu_read_unlock(&kvm->srcu, idx);
839 mutex_unlock(&kvm->lock);
840 ret = 0;
841 break;
Dominik Dingel8c0a7ce2014-10-31 14:10:41 +0100842 case KVM_S390_VM_MEM_LIMIT_SIZE: {
843 unsigned long new_limit;
844
845 if (kvm_is_ucontrol(kvm))
846 return -EINVAL;
847
848 if (get_user(new_limit, (u64 __user *)attr->addr))
849 return -EFAULT;
850
Dominik Dingela3a92c32014-12-01 17:24:42 +0100851 if (kvm->arch.mem_limit != KVM_S390_NO_MEM_LIMIT &&
852 new_limit > kvm->arch.mem_limit)
Dominik Dingel8c0a7ce2014-10-31 14:10:41 +0100853 return -E2BIG;
854
Dominik Dingela3a92c32014-12-01 17:24:42 +0100855 if (!new_limit)
856 return -EINVAL;
857
Martin Schwidefsky6ea427b2016-03-08 11:55:04 +0100858 /* gmap_create takes last usable address */
Dominik Dingela3a92c32014-12-01 17:24:42 +0100859 if (new_limit != KVM_S390_NO_MEM_LIMIT)
860 new_limit -= 1;
861
Dominik Dingel8c0a7ce2014-10-31 14:10:41 +0100862 ret = -EBUSY;
863 mutex_lock(&kvm->lock);
Paolo Bonzinia03825b2016-06-13 14:50:04 +0200864 if (!kvm->created_vcpus) {
Martin Schwidefsky6ea427b2016-03-08 11:55:04 +0100865 /* gmap_create will round the limit up */
866 struct gmap *new = gmap_create(current->mm, new_limit);
Dominik Dingel8c0a7ce2014-10-31 14:10:41 +0100867
868 if (!new) {
869 ret = -ENOMEM;
870 } else {
Martin Schwidefsky6ea427b2016-03-08 11:55:04 +0100871 gmap_remove(kvm->arch.gmap);
Dominik Dingel8c0a7ce2014-10-31 14:10:41 +0100872 new->private = kvm;
873 kvm->arch.gmap = new;
874 ret = 0;
875 }
876 }
877 mutex_unlock(&kvm->lock);
Dominik Dingela3a92c32014-12-01 17:24:42 +0100878 VM_EVENT(kvm, 3, "SET: max guest address: %lu", new_limit);
879 VM_EVENT(kvm, 3, "New guest asce: 0x%pK",
880 (void *) kvm->arch.gmap->asce);
Dominik Dingel8c0a7ce2014-10-31 14:10:41 +0100881 break;
882 }
Dominik Dingel4f718ea2014-04-09 13:13:00 +0200883 default:
884 ret = -ENXIO;
885 break;
886 }
887 return ret;
888}
889
Tony Krowiaka374e892014-09-03 10:13:53 +0200890static void kvm_s390_vcpu_crypto_setup(struct kvm_vcpu *vcpu);
891
Tony Krowiak20c922f2018-04-22 11:37:03 -0400892void kvm_s390_vcpu_crypto_reset_all(struct kvm *kvm)
Tony Krowiaka374e892014-09-03 10:13:53 +0200893{
894 struct kvm_vcpu *vcpu;
895 int i;
896
Tony Krowiak20c922f2018-04-22 11:37:03 -0400897 kvm_s390_vcpu_block_all(kvm);
898
David Hildenbrand3194cdb2018-09-25 19:16:17 -0400899 kvm_for_each_vcpu(i, vcpu, kvm) {
Tony Krowiak20c922f2018-04-22 11:37:03 -0400900 kvm_s390_vcpu_crypto_setup(vcpu);
David Hildenbrand3194cdb2018-09-25 19:16:17 -0400901 /* recreate the shadow crycb by leaving the VSIE handler */
902 kvm_s390_sync_request(KVM_REQ_VSIE_RESTART, vcpu);
903 }
Tony Krowiak20c922f2018-04-22 11:37:03 -0400904
905 kvm_s390_vcpu_unblock_all(kvm);
906}
907
908static int kvm_s390_vm_set_crypto(struct kvm *kvm, struct kvm_device_attr *attr)
909{
Tony Krowiaka374e892014-09-03 10:13:53 +0200910 mutex_lock(&kvm->lock);
911 switch (attr->attr) {
912 case KVM_S390_VM_CRYPTO_ENABLE_AES_KW:
Christian Borntraeger8e41bd52018-10-04 14:42:43 +0200913 if (!test_kvm_facility(kvm, 76)) {
914 mutex_unlock(&kvm->lock);
Tony Krowiak37940fb2018-09-25 19:16:39 -0400915 return -EINVAL;
Christian Borntraeger8e41bd52018-10-04 14:42:43 +0200916 }
Tony Krowiaka374e892014-09-03 10:13:53 +0200917 get_random_bytes(
918 kvm->arch.crypto.crycb->aes_wrapping_key_mask,
919 sizeof(kvm->arch.crypto.crycb->aes_wrapping_key_mask));
920 kvm->arch.crypto.aes_kw = 1;
Christian Borntraegerc92ea7b2015-07-22 15:52:10 +0200921 VM_EVENT(kvm, 3, "%s", "ENABLE: AES keywrapping support");
Tony Krowiaka374e892014-09-03 10:13:53 +0200922 break;
923 case KVM_S390_VM_CRYPTO_ENABLE_DEA_KW:
Christian Borntraeger8e41bd52018-10-04 14:42:43 +0200924 if (!test_kvm_facility(kvm, 76)) {
925 mutex_unlock(&kvm->lock);
Tony Krowiak37940fb2018-09-25 19:16:39 -0400926 return -EINVAL;
Christian Borntraeger8e41bd52018-10-04 14:42:43 +0200927 }
Tony Krowiaka374e892014-09-03 10:13:53 +0200928 get_random_bytes(
929 kvm->arch.crypto.crycb->dea_wrapping_key_mask,
930 sizeof(kvm->arch.crypto.crycb->dea_wrapping_key_mask));
931 kvm->arch.crypto.dea_kw = 1;
Christian Borntraegerc92ea7b2015-07-22 15:52:10 +0200932 VM_EVENT(kvm, 3, "%s", "ENABLE: DEA keywrapping support");
Tony Krowiaka374e892014-09-03 10:13:53 +0200933 break;
934 case KVM_S390_VM_CRYPTO_DISABLE_AES_KW:
Christian Borntraeger8e41bd52018-10-04 14:42:43 +0200935 if (!test_kvm_facility(kvm, 76)) {
936 mutex_unlock(&kvm->lock);
Tony Krowiak37940fb2018-09-25 19:16:39 -0400937 return -EINVAL;
Christian Borntraeger8e41bd52018-10-04 14:42:43 +0200938 }
Tony Krowiaka374e892014-09-03 10:13:53 +0200939 kvm->arch.crypto.aes_kw = 0;
940 memset(kvm->arch.crypto.crycb->aes_wrapping_key_mask, 0,
941 sizeof(kvm->arch.crypto.crycb->aes_wrapping_key_mask));
Christian Borntraegerc92ea7b2015-07-22 15:52:10 +0200942 VM_EVENT(kvm, 3, "%s", "DISABLE: AES keywrapping support");
Tony Krowiaka374e892014-09-03 10:13:53 +0200943 break;
944 case KVM_S390_VM_CRYPTO_DISABLE_DEA_KW:
Christian Borntraeger8e41bd52018-10-04 14:42:43 +0200945 if (!test_kvm_facility(kvm, 76)) {
946 mutex_unlock(&kvm->lock);
Tony Krowiak37940fb2018-09-25 19:16:39 -0400947 return -EINVAL;
Christian Borntraeger8e41bd52018-10-04 14:42:43 +0200948 }
Tony Krowiaka374e892014-09-03 10:13:53 +0200949 kvm->arch.crypto.dea_kw = 0;
950 memset(kvm->arch.crypto.crycb->dea_wrapping_key_mask, 0,
951 sizeof(kvm->arch.crypto.crycb->dea_wrapping_key_mask));
Christian Borntraegerc92ea7b2015-07-22 15:52:10 +0200952 VM_EVENT(kvm, 3, "%s", "DISABLE: DEA keywrapping support");
Tony Krowiaka374e892014-09-03 10:13:53 +0200953 break;
Tony Krowiak37940fb2018-09-25 19:16:39 -0400954 case KVM_S390_VM_CRYPTO_ENABLE_APIE:
955 if (!ap_instructions_available()) {
956 mutex_unlock(&kvm->lock);
957 return -EOPNOTSUPP;
958 }
959 kvm->arch.crypto.apie = 1;
960 break;
961 case KVM_S390_VM_CRYPTO_DISABLE_APIE:
962 if (!ap_instructions_available()) {
963 mutex_unlock(&kvm->lock);
964 return -EOPNOTSUPP;
965 }
966 kvm->arch.crypto.apie = 0;
967 break;
Tony Krowiaka374e892014-09-03 10:13:53 +0200968 default:
969 mutex_unlock(&kvm->lock);
970 return -ENXIO;
971 }
972
Tony Krowiak20c922f2018-04-22 11:37:03 -0400973 kvm_s390_vcpu_crypto_reset_all(kvm);
Tony Krowiaka374e892014-09-03 10:13:53 +0200974 mutex_unlock(&kvm->lock);
975 return 0;
976}
977
Claudio Imbrenda190df4a2016-08-04 17:54:42 +0200978static void kvm_s390_sync_request_broadcast(struct kvm *kvm, int req)
979{
980 int cx;
981 struct kvm_vcpu *vcpu;
982
983 kvm_for_each_vcpu(cx, vcpu, kvm)
984 kvm_s390_sync_request(req, vcpu);
985}
986
987/*
988 * Must be called with kvm->srcu held to avoid races on memslots, and with
Christian Borntraeger1de1ea72017-12-22 10:54:20 +0100989 * kvm->slots_lock to avoid races with ourselves and kvm_s390_vm_stop_migration.
Claudio Imbrenda190df4a2016-08-04 17:54:42 +0200990 */
991static int kvm_s390_vm_start_migration(struct kvm *kvm)
992{
Claudio Imbrenda190df4a2016-08-04 17:54:42 +0200993 struct kvm_memory_slot *ms;
Claudio Imbrenda190df4a2016-08-04 17:54:42 +0200994 struct kvm_memslots *slots;
Claudio Imbrendaafdad612018-04-30 18:33:25 +0200995 unsigned long ram_pages = 0;
Claudio Imbrenda190df4a2016-08-04 17:54:42 +0200996 int slotnr;
997
998 /* migration mode already enabled */
Claudio Imbrendaafdad612018-04-30 18:33:25 +0200999 if (kvm->arch.migration_mode)
Claudio Imbrenda190df4a2016-08-04 17:54:42 +02001000 return 0;
Claudio Imbrenda190df4a2016-08-04 17:54:42 +02001001 slots = kvm_memslots(kvm);
1002 if (!slots || !slots->used_slots)
1003 return -EINVAL;
1004
Claudio Imbrendaafdad612018-04-30 18:33:25 +02001005 if (!kvm->arch.use_cmma) {
1006 kvm->arch.migration_mode = 1;
1007 return 0;
Claudio Imbrenda190df4a2016-08-04 17:54:42 +02001008 }
Claudio Imbrendaafdad612018-04-30 18:33:25 +02001009 /* mark all the pages in active slots as dirty */
1010 for (slotnr = 0; slotnr < slots->used_slots; slotnr++) {
1011 ms = slots->memslots + slotnr;
1012 /*
1013 * The second half of the bitmap is only used on x86,
1014 * and would be wasted otherwise, so we put it to good
1015 * use here to keep track of the state of the storage
1016 * attributes.
1017 */
1018 memset(kvm_second_dirty_bitmap(ms), 0xff, kvm_dirty_bitmap_bytes(ms));
1019 ram_pages += ms->npages;
1020 }
1021 atomic64_set(&kvm->arch.cmma_dirty_pages, ram_pages);
1022 kvm->arch.migration_mode = 1;
1023 kvm_s390_sync_request_broadcast(kvm, KVM_REQ_START_MIGRATION);
Claudio Imbrenda190df4a2016-08-04 17:54:42 +02001024 return 0;
1025}
1026
1027/*
Christian Borntraeger1de1ea72017-12-22 10:54:20 +01001028 * Must be called with kvm->slots_lock to avoid races with ourselves and
Claudio Imbrenda190df4a2016-08-04 17:54:42 +02001029 * kvm_s390_vm_start_migration.
1030 */
1031static int kvm_s390_vm_stop_migration(struct kvm *kvm)
1032{
Claudio Imbrenda190df4a2016-08-04 17:54:42 +02001033 /* migration mode already disabled */
Claudio Imbrendaafdad612018-04-30 18:33:25 +02001034 if (!kvm->arch.migration_mode)
Claudio Imbrenda190df4a2016-08-04 17:54:42 +02001035 return 0;
Claudio Imbrendaafdad612018-04-30 18:33:25 +02001036 kvm->arch.migration_mode = 0;
1037 if (kvm->arch.use_cmma)
Claudio Imbrenda190df4a2016-08-04 17:54:42 +02001038 kvm_s390_sync_request_broadcast(kvm, KVM_REQ_STOP_MIGRATION);
Claudio Imbrenda190df4a2016-08-04 17:54:42 +02001039 return 0;
1040}
1041
1042static int kvm_s390_vm_set_migration(struct kvm *kvm,
1043 struct kvm_device_attr *attr)
1044{
Christian Borntraeger1de1ea72017-12-22 10:54:20 +01001045 int res = -ENXIO;
Claudio Imbrenda190df4a2016-08-04 17:54:42 +02001046
Christian Borntraeger1de1ea72017-12-22 10:54:20 +01001047 mutex_lock(&kvm->slots_lock);
Claudio Imbrenda190df4a2016-08-04 17:54:42 +02001048 switch (attr->attr) {
1049 case KVM_S390_VM_MIGRATION_START:
Claudio Imbrenda190df4a2016-08-04 17:54:42 +02001050 res = kvm_s390_vm_start_migration(kvm);
Claudio Imbrenda190df4a2016-08-04 17:54:42 +02001051 break;
1052 case KVM_S390_VM_MIGRATION_STOP:
1053 res = kvm_s390_vm_stop_migration(kvm);
1054 break;
1055 default:
1056 break;
1057 }
Christian Borntraeger1de1ea72017-12-22 10:54:20 +01001058 mutex_unlock(&kvm->slots_lock);
Claudio Imbrenda190df4a2016-08-04 17:54:42 +02001059
1060 return res;
1061}
1062
1063static int kvm_s390_vm_get_migration(struct kvm *kvm,
1064 struct kvm_device_attr *attr)
1065{
Claudio Imbrendaafdad612018-04-30 18:33:25 +02001066 u64 mig = kvm->arch.migration_mode;
Claudio Imbrenda190df4a2016-08-04 17:54:42 +02001067
1068 if (attr->attr != KVM_S390_VM_MIGRATION_STATUS)
1069 return -ENXIO;
1070
1071 if (copy_to_user((void __user *)attr->addr, &mig, sizeof(mig)))
1072 return -EFAULT;
1073 return 0;
1074}
1075
Collin L. Walling8fa16962016-07-26 15:29:44 -04001076static int kvm_s390_set_tod_ext(struct kvm *kvm, struct kvm_device_attr *attr)
1077{
1078 struct kvm_s390_vm_tod_clock gtod;
1079
1080 if (copy_from_user(&gtod, (void __user *)attr->addr, sizeof(gtod)))
1081 return -EFAULT;
1082
David Hildenbrand0e7def52018-02-07 12:46:43 +01001083 if (!test_kvm_facility(kvm, 139) && gtod.epoch_idx)
Collin L. Walling8fa16962016-07-26 15:29:44 -04001084 return -EINVAL;
David Hildenbrand0e7def52018-02-07 12:46:43 +01001085 kvm_s390_set_tod_clock(kvm, &gtod);
Collin L. Walling8fa16962016-07-26 15:29:44 -04001086
1087 VM_EVENT(kvm, 3, "SET: TOD extension: 0x%x, TOD base: 0x%llx",
1088 gtod.epoch_idx, gtod.tod);
1089
1090 return 0;
1091}
1092
Jason J. Herne72f25022014-11-25 09:46:02 -05001093static int kvm_s390_set_tod_high(struct kvm *kvm, struct kvm_device_attr *attr)
1094{
1095 u8 gtod_high;
1096
1097 if (copy_from_user(&gtod_high, (void __user *)attr->addr,
1098 sizeof(gtod_high)))
1099 return -EFAULT;
1100
1101 if (gtod_high != 0)
1102 return -EINVAL;
Christian Borntraeger58c383c2015-10-12 13:27:29 +02001103 VM_EVENT(kvm, 3, "SET: TOD extension: 0x%x", gtod_high);
Jason J. Herne72f25022014-11-25 09:46:02 -05001104
1105 return 0;
1106}
1107
1108static int kvm_s390_set_tod_low(struct kvm *kvm, struct kvm_device_attr *attr)
1109{
David Hildenbrand0e7def52018-02-07 12:46:43 +01001110 struct kvm_s390_vm_tod_clock gtod = { 0 };
Jason J. Herne72f25022014-11-25 09:46:02 -05001111
David Hildenbrand0e7def52018-02-07 12:46:43 +01001112 if (copy_from_user(&gtod.tod, (void __user *)attr->addr,
1113 sizeof(gtod.tod)))
Jason J. Herne72f25022014-11-25 09:46:02 -05001114 return -EFAULT;
1115
David Hildenbrand0e7def52018-02-07 12:46:43 +01001116 kvm_s390_set_tod_clock(kvm, &gtod);
1117 VM_EVENT(kvm, 3, "SET: TOD base: 0x%llx", gtod.tod);
Jason J. Herne72f25022014-11-25 09:46:02 -05001118 return 0;
1119}
1120
1121static int kvm_s390_set_tod(struct kvm *kvm, struct kvm_device_attr *attr)
1122{
1123 int ret;
1124
1125 if (attr->flags)
1126 return -EINVAL;
1127
1128 switch (attr->attr) {
Collin L. Walling8fa16962016-07-26 15:29:44 -04001129 case KVM_S390_VM_TOD_EXT:
1130 ret = kvm_s390_set_tod_ext(kvm, attr);
1131 break;
Jason J. Herne72f25022014-11-25 09:46:02 -05001132 case KVM_S390_VM_TOD_HIGH:
1133 ret = kvm_s390_set_tod_high(kvm, attr);
1134 break;
1135 case KVM_S390_VM_TOD_LOW:
1136 ret = kvm_s390_set_tod_low(kvm, attr);
1137 break;
1138 default:
1139 ret = -ENXIO;
1140 break;
1141 }
1142 return ret;
1143}
1144
David Hildenbrand33d1b272018-04-27 14:36:13 +02001145static void kvm_s390_get_tod_clock(struct kvm *kvm,
1146 struct kvm_s390_vm_tod_clock *gtod)
Collin L. Walling8fa16962016-07-26 15:29:44 -04001147{
1148 struct kvm_s390_tod_clock_ext htod;
1149
1150 preempt_disable();
1151
1152 get_tod_clock_ext((char *)&htod);
1153
1154 gtod->tod = htod.tod + kvm->arch.epoch;
David Hildenbrand33d1b272018-04-27 14:36:13 +02001155 gtod->epoch_idx = 0;
1156 if (test_kvm_facility(kvm, 139)) {
1157 gtod->epoch_idx = htod.epoch_idx + kvm->arch.epdx;
1158 if (gtod->tod < htod.tod)
1159 gtod->epoch_idx += 1;
1160 }
Collin L. Walling8fa16962016-07-26 15:29:44 -04001161
1162 preempt_enable();
1163}
1164
1165static int kvm_s390_get_tod_ext(struct kvm *kvm, struct kvm_device_attr *attr)
1166{
1167 struct kvm_s390_vm_tod_clock gtod;
1168
1169 memset(&gtod, 0, sizeof(gtod));
David Hildenbrand33d1b272018-04-27 14:36:13 +02001170 kvm_s390_get_tod_clock(kvm, &gtod);
Collin L. Walling8fa16962016-07-26 15:29:44 -04001171 if (copy_to_user((void __user *)attr->addr, &gtod, sizeof(gtod)))
1172 return -EFAULT;
1173
1174 VM_EVENT(kvm, 3, "QUERY: TOD extension: 0x%x, TOD base: 0x%llx",
1175 gtod.epoch_idx, gtod.tod);
1176 return 0;
1177}
1178
Jason J. Herne72f25022014-11-25 09:46:02 -05001179static int kvm_s390_get_tod_high(struct kvm *kvm, struct kvm_device_attr *attr)
1180{
1181 u8 gtod_high = 0;
1182
1183 if (copy_to_user((void __user *)attr->addr, &gtod_high,
1184 sizeof(gtod_high)))
1185 return -EFAULT;
Christian Borntraeger58c383c2015-10-12 13:27:29 +02001186 VM_EVENT(kvm, 3, "QUERY: TOD extension: 0x%x", gtod_high);
Jason J. Herne72f25022014-11-25 09:46:02 -05001187
1188 return 0;
1189}
1190
1191static int kvm_s390_get_tod_low(struct kvm *kvm, struct kvm_device_attr *attr)
1192{
David Hildenbrand5a3d8832015-09-29 16:27:24 +02001193 u64 gtod;
Jason J. Herne72f25022014-11-25 09:46:02 -05001194
David Hildenbrand60417fc2015-09-29 16:20:36 +02001195 gtod = kvm_s390_get_tod_clock_fast(kvm);
Jason J. Herne72f25022014-11-25 09:46:02 -05001196 if (copy_to_user((void __user *)attr->addr, &gtod, sizeof(gtod)))
1197 return -EFAULT;
Christian Borntraeger58c383c2015-10-12 13:27:29 +02001198 VM_EVENT(kvm, 3, "QUERY: TOD base: 0x%llx", gtod);
Jason J. Herne72f25022014-11-25 09:46:02 -05001199
1200 return 0;
1201}
1202
1203static int kvm_s390_get_tod(struct kvm *kvm, struct kvm_device_attr *attr)
1204{
1205 int ret;
1206
1207 if (attr->flags)
1208 return -EINVAL;
1209
1210 switch (attr->attr) {
Collin L. Walling8fa16962016-07-26 15:29:44 -04001211 case KVM_S390_VM_TOD_EXT:
1212 ret = kvm_s390_get_tod_ext(kvm, attr);
1213 break;
Jason J. Herne72f25022014-11-25 09:46:02 -05001214 case KVM_S390_VM_TOD_HIGH:
1215 ret = kvm_s390_get_tod_high(kvm, attr);
1216 break;
1217 case KVM_S390_VM_TOD_LOW:
1218 ret = kvm_s390_get_tod_low(kvm, attr);
1219 break;
1220 default:
1221 ret = -ENXIO;
1222 break;
1223 }
1224 return ret;
1225}
1226
Michael Mueller658b6ed2015-02-02 15:49:35 +01001227static int kvm_s390_set_processor(struct kvm *kvm, struct kvm_device_attr *attr)
1228{
1229 struct kvm_s390_vm_cpu_processor *proc;
David Hildenbrand053dd232016-04-04 13:59:42 +02001230 u16 lowest_ibc, unblocked_ibc;
Michael Mueller658b6ed2015-02-02 15:49:35 +01001231 int ret = 0;
1232
1233 mutex_lock(&kvm->lock);
Paolo Bonzinia03825b2016-06-13 14:50:04 +02001234 if (kvm->created_vcpus) {
Michael Mueller658b6ed2015-02-02 15:49:35 +01001235 ret = -EBUSY;
1236 goto out;
1237 }
1238 proc = kzalloc(sizeof(*proc), GFP_KERNEL);
1239 if (!proc) {
1240 ret = -ENOMEM;
1241 goto out;
1242 }
1243 if (!copy_from_user(proc, (void __user *)attr->addr,
1244 sizeof(*proc))) {
David Hildenbrand9bb0ec02016-04-04 14:27:51 +02001245 kvm->arch.model.cpuid = proc->cpuid;
David Hildenbrand053dd232016-04-04 13:59:42 +02001246 lowest_ibc = sclp.ibc >> 16 & 0xfff;
1247 unblocked_ibc = sclp.ibc & 0xfff;
David Hildenbrand0487c442016-06-10 09:22:31 +02001248 if (lowest_ibc && proc->ibc) {
David Hildenbrand053dd232016-04-04 13:59:42 +02001249 if (proc->ibc > unblocked_ibc)
1250 kvm->arch.model.ibc = unblocked_ibc;
1251 else if (proc->ibc < lowest_ibc)
1252 kvm->arch.model.ibc = lowest_ibc;
1253 else
1254 kvm->arch.model.ibc = proc->ibc;
1255 }
David Hildenbrandc54f0d62015-12-02 08:53:52 +01001256 memcpy(kvm->arch.model.fac_list, proc->fac_list,
Michael Mueller658b6ed2015-02-02 15:49:35 +01001257 S390_ARCH_FAC_LIST_SIZE_BYTE);
Christian Borntraegera8c39dd2017-01-18 16:01:02 +01001258 VM_EVENT(kvm, 3, "SET: guest ibc: 0x%4.4x, guest cpuid: 0x%16.16llx",
1259 kvm->arch.model.ibc,
1260 kvm->arch.model.cpuid);
1261 VM_EVENT(kvm, 3, "SET: guest faclist: 0x%16.16llx.%16.16llx.%16.16llx",
1262 kvm->arch.model.fac_list[0],
1263 kvm->arch.model.fac_list[1],
1264 kvm->arch.model.fac_list[2]);
Michael Mueller658b6ed2015-02-02 15:49:35 +01001265 } else
1266 ret = -EFAULT;
1267 kfree(proc);
1268out:
1269 mutex_unlock(&kvm->lock);
1270 return ret;
1271}
1272
David Hildenbrand15c97052015-03-19 17:36:43 +01001273static int kvm_s390_set_processor_feat(struct kvm *kvm,
1274 struct kvm_device_attr *attr)
1275{
1276 struct kvm_s390_vm_cpu_feat data;
David Hildenbrand15c97052015-03-19 17:36:43 +01001277
1278 if (copy_from_user(&data, (void __user *)attr->addr, sizeof(data)))
1279 return -EFAULT;
1280 if (!bitmap_subset((unsigned long *) data.feat,
1281 kvm_s390_available_cpu_feat,
1282 KVM_S390_VM_CPU_FEAT_NR_BITS))
1283 return -EINVAL;
1284
1285 mutex_lock(&kvm->lock);
Christian Borntraeger2f8311c2017-11-16 12:30:15 +01001286 if (kvm->created_vcpus) {
1287 mutex_unlock(&kvm->lock);
1288 return -EBUSY;
David Hildenbrand15c97052015-03-19 17:36:43 +01001289 }
Christian Borntraeger2f8311c2017-11-16 12:30:15 +01001290 bitmap_copy(kvm->arch.cpu_feat, (unsigned long *) data.feat,
1291 KVM_S390_VM_CPU_FEAT_NR_BITS);
David Hildenbrand15c97052015-03-19 17:36:43 +01001292 mutex_unlock(&kvm->lock);
Christian Borntraeger2f8311c2017-11-16 12:30:15 +01001293 VM_EVENT(kvm, 3, "SET: guest feat: 0x%16.16llx.0x%16.16llx.0x%16.16llx",
1294 data.feat[0],
1295 data.feat[1],
1296 data.feat[2]);
1297 return 0;
David Hildenbrand15c97052015-03-19 17:36:43 +01001298}
1299
David Hildenbrand0a763c72016-05-18 16:03:47 +02001300static int kvm_s390_set_processor_subfunc(struct kvm *kvm,
1301 struct kvm_device_attr *attr)
1302{
Christian Borntraeger346fa2f2019-02-18 07:48:25 -05001303 mutex_lock(&kvm->lock);
1304 if (kvm->created_vcpus) {
1305 mutex_unlock(&kvm->lock);
1306 return -EBUSY;
1307 }
1308
1309 if (copy_from_user(&kvm->arch.model.subfuncs, (void __user *)attr->addr,
1310 sizeof(struct kvm_s390_vm_cpu_subfunc))) {
1311 mutex_unlock(&kvm->lock);
1312 return -EFAULT;
1313 }
1314 mutex_unlock(&kvm->lock);
1315
Christian Borntraeger11ba5962019-02-20 11:38:42 -05001316 VM_EVENT(kvm, 3, "SET: guest PLO subfunc 0x%16.16lx.%16.16lx.%16.16lx.%16.16lx",
1317 ((unsigned long *) &kvm->arch.model.subfuncs.plo)[0],
1318 ((unsigned long *) &kvm->arch.model.subfuncs.plo)[1],
1319 ((unsigned long *) &kvm->arch.model.subfuncs.plo)[2],
1320 ((unsigned long *) &kvm->arch.model.subfuncs.plo)[3]);
1321 VM_EVENT(kvm, 3, "SET: guest PTFF subfunc 0x%16.16lx.%16.16lx",
1322 ((unsigned long *) &kvm->arch.model.subfuncs.ptff)[0],
1323 ((unsigned long *) &kvm->arch.model.subfuncs.ptff)[1]);
1324 VM_EVENT(kvm, 3, "SET: guest KMAC subfunc 0x%16.16lx.%16.16lx",
1325 ((unsigned long *) &kvm->arch.model.subfuncs.kmac)[0],
1326 ((unsigned long *) &kvm->arch.model.subfuncs.kmac)[1]);
1327 VM_EVENT(kvm, 3, "SET: guest KMC subfunc 0x%16.16lx.%16.16lx",
1328 ((unsigned long *) &kvm->arch.model.subfuncs.kmc)[0],
1329 ((unsigned long *) &kvm->arch.model.subfuncs.kmc)[1]);
1330 VM_EVENT(kvm, 3, "SET: guest KM subfunc 0x%16.16lx.%16.16lx",
1331 ((unsigned long *) &kvm->arch.model.subfuncs.km)[0],
1332 ((unsigned long *) &kvm->arch.model.subfuncs.km)[1]);
1333 VM_EVENT(kvm, 3, "SET: guest KIMD subfunc 0x%16.16lx.%16.16lx",
1334 ((unsigned long *) &kvm->arch.model.subfuncs.kimd)[0],
1335 ((unsigned long *) &kvm->arch.model.subfuncs.kimd)[1]);
1336 VM_EVENT(kvm, 3, "SET: guest KLMD subfunc 0x%16.16lx.%16.16lx",
1337 ((unsigned long *) &kvm->arch.model.subfuncs.klmd)[0],
1338 ((unsigned long *) &kvm->arch.model.subfuncs.klmd)[1]);
1339 VM_EVENT(kvm, 3, "SET: guest PCKMO subfunc 0x%16.16lx.%16.16lx",
1340 ((unsigned long *) &kvm->arch.model.subfuncs.pckmo)[0],
1341 ((unsigned long *) &kvm->arch.model.subfuncs.pckmo)[1]);
1342 VM_EVENT(kvm, 3, "SET: guest KMCTR subfunc 0x%16.16lx.%16.16lx",
1343 ((unsigned long *) &kvm->arch.model.subfuncs.kmctr)[0],
1344 ((unsigned long *) &kvm->arch.model.subfuncs.kmctr)[1]);
1345 VM_EVENT(kvm, 3, "SET: guest KMF subfunc 0x%16.16lx.%16.16lx",
1346 ((unsigned long *) &kvm->arch.model.subfuncs.kmf)[0],
1347 ((unsigned long *) &kvm->arch.model.subfuncs.kmf)[1]);
1348 VM_EVENT(kvm, 3, "SET: guest KMO subfunc 0x%16.16lx.%16.16lx",
1349 ((unsigned long *) &kvm->arch.model.subfuncs.kmo)[0],
1350 ((unsigned long *) &kvm->arch.model.subfuncs.kmo)[1]);
1351 VM_EVENT(kvm, 3, "SET: guest PCC subfunc 0x%16.16lx.%16.16lx",
1352 ((unsigned long *) &kvm->arch.model.subfuncs.pcc)[0],
1353 ((unsigned long *) &kvm->arch.model.subfuncs.pcc)[1]);
1354 VM_EVENT(kvm, 3, "SET: guest PPNO subfunc 0x%16.16lx.%16.16lx",
1355 ((unsigned long *) &kvm->arch.model.subfuncs.ppno)[0],
1356 ((unsigned long *) &kvm->arch.model.subfuncs.ppno)[1]);
1357 VM_EVENT(kvm, 3, "SET: guest KMA subfunc 0x%16.16lx.%16.16lx",
1358 ((unsigned long *) &kvm->arch.model.subfuncs.kma)[0],
1359 ((unsigned long *) &kvm->arch.model.subfuncs.kma)[1]);
Christian Borntraeger13209ad2018-12-28 09:33:35 +01001360 VM_EVENT(kvm, 3, "SET: guest KDSA subfunc 0x%16.16lx.%16.16lx",
1361 ((unsigned long *) &kvm->arch.model.subfuncs.kdsa)[0],
1362 ((unsigned long *) &kvm->arch.model.subfuncs.kdsa)[1]);
Christian Borntraeger173aec22018-12-28 10:59:06 +01001363 VM_EVENT(kvm, 3, "SET: guest SORTL subfunc 0x%16.16lx.%16.16lx.%16.16lx.%16.16lx",
1364 ((unsigned long *) &kvm->arch.model.subfuncs.sortl)[0],
1365 ((unsigned long *) &kvm->arch.model.subfuncs.sortl)[1],
1366 ((unsigned long *) &kvm->arch.model.subfuncs.sortl)[2],
1367 ((unsigned long *) &kvm->arch.model.subfuncs.sortl)[3]);
Christian Borntraeger4f45b902018-12-28 10:46:04 +01001368 VM_EVENT(kvm, 3, "SET: guest DFLTCC subfunc 0x%16.16lx.%16.16lx.%16.16lx.%16.16lx",
1369 ((unsigned long *) &kvm->arch.model.subfuncs.dfltcc)[0],
1370 ((unsigned long *) &kvm->arch.model.subfuncs.dfltcc)[1],
1371 ((unsigned long *) &kvm->arch.model.subfuncs.dfltcc)[2],
1372 ((unsigned long *) &kvm->arch.model.subfuncs.dfltcc)[3]);
Christian Borntraeger11ba5962019-02-20 11:38:42 -05001373
Christian Borntraeger346fa2f2019-02-18 07:48:25 -05001374 return 0;
David Hildenbrand0a763c72016-05-18 16:03:47 +02001375}
1376
Michael Mueller658b6ed2015-02-02 15:49:35 +01001377static int kvm_s390_set_cpu_model(struct kvm *kvm, struct kvm_device_attr *attr)
1378{
1379 int ret = -ENXIO;
1380
1381 switch (attr->attr) {
1382 case KVM_S390_VM_CPU_PROCESSOR:
1383 ret = kvm_s390_set_processor(kvm, attr);
1384 break;
David Hildenbrand15c97052015-03-19 17:36:43 +01001385 case KVM_S390_VM_CPU_PROCESSOR_FEAT:
1386 ret = kvm_s390_set_processor_feat(kvm, attr);
1387 break;
David Hildenbrand0a763c72016-05-18 16:03:47 +02001388 case KVM_S390_VM_CPU_PROCESSOR_SUBFUNC:
1389 ret = kvm_s390_set_processor_subfunc(kvm, attr);
1390 break;
Michael Mueller658b6ed2015-02-02 15:49:35 +01001391 }
1392 return ret;
1393}
1394
1395static int kvm_s390_get_processor(struct kvm *kvm, struct kvm_device_attr *attr)
1396{
1397 struct kvm_s390_vm_cpu_processor *proc;
1398 int ret = 0;
1399
1400 proc = kzalloc(sizeof(*proc), GFP_KERNEL);
1401 if (!proc) {
1402 ret = -ENOMEM;
1403 goto out;
1404 }
David Hildenbrand9bb0ec02016-04-04 14:27:51 +02001405 proc->cpuid = kvm->arch.model.cpuid;
Michael Mueller658b6ed2015-02-02 15:49:35 +01001406 proc->ibc = kvm->arch.model.ibc;
David Hildenbrandc54f0d62015-12-02 08:53:52 +01001407 memcpy(&proc->fac_list, kvm->arch.model.fac_list,
1408 S390_ARCH_FAC_LIST_SIZE_BYTE);
Christian Borntraegera8c39dd2017-01-18 16:01:02 +01001409 VM_EVENT(kvm, 3, "GET: guest ibc: 0x%4.4x, guest cpuid: 0x%16.16llx",
1410 kvm->arch.model.ibc,
1411 kvm->arch.model.cpuid);
1412 VM_EVENT(kvm, 3, "GET: guest faclist: 0x%16.16llx.%16.16llx.%16.16llx",
1413 kvm->arch.model.fac_list[0],
1414 kvm->arch.model.fac_list[1],
1415 kvm->arch.model.fac_list[2]);
Michael Mueller658b6ed2015-02-02 15:49:35 +01001416 if (copy_to_user((void __user *)attr->addr, proc, sizeof(*proc)))
1417 ret = -EFAULT;
1418 kfree(proc);
1419out:
1420 return ret;
1421}
1422
1423static int kvm_s390_get_machine(struct kvm *kvm, struct kvm_device_attr *attr)
1424{
1425 struct kvm_s390_vm_cpu_machine *mach;
1426 int ret = 0;
1427
1428 mach = kzalloc(sizeof(*mach), GFP_KERNEL);
1429 if (!mach) {
1430 ret = -ENOMEM;
1431 goto out;
1432 }
1433 get_cpu_id((struct cpuid *) &mach->cpuid);
David Hildenbrand37c5f6c2015-05-06 13:18:59 +02001434 mach->ibc = sclp.ibc;
David Hildenbrandc54f0d62015-12-02 08:53:52 +01001435 memcpy(&mach->fac_mask, kvm->arch.model.fac_mask,
Michael Mueller981467c2015-02-24 13:51:04 +01001436 S390_ARCH_FAC_LIST_SIZE_BYTE);
Michael Mueller658b6ed2015-02-02 15:49:35 +01001437 memcpy((unsigned long *)&mach->fac_list, S390_lowcore.stfle_fac_list,
Christian Borntraeger04478192017-01-12 16:25:15 +01001438 sizeof(S390_lowcore.stfle_fac_list));
Christian Borntraegera8c39dd2017-01-18 16:01:02 +01001439 VM_EVENT(kvm, 3, "GET: host ibc: 0x%4.4x, host cpuid: 0x%16.16llx",
1440 kvm->arch.model.ibc,
1441 kvm->arch.model.cpuid);
1442 VM_EVENT(kvm, 3, "GET: host facmask: 0x%16.16llx.%16.16llx.%16.16llx",
1443 mach->fac_mask[0],
1444 mach->fac_mask[1],
1445 mach->fac_mask[2]);
1446 VM_EVENT(kvm, 3, "GET: host faclist: 0x%16.16llx.%16.16llx.%16.16llx",
1447 mach->fac_list[0],
1448 mach->fac_list[1],
1449 mach->fac_list[2]);
Michael Mueller658b6ed2015-02-02 15:49:35 +01001450 if (copy_to_user((void __user *)attr->addr, mach, sizeof(*mach)))
1451 ret = -EFAULT;
1452 kfree(mach);
1453out:
1454 return ret;
1455}
1456
David Hildenbrand15c97052015-03-19 17:36:43 +01001457static int kvm_s390_get_processor_feat(struct kvm *kvm,
1458 struct kvm_device_attr *attr)
1459{
1460 struct kvm_s390_vm_cpu_feat data;
1461
1462 bitmap_copy((unsigned long *) data.feat, kvm->arch.cpu_feat,
1463 KVM_S390_VM_CPU_FEAT_NR_BITS);
1464 if (copy_to_user((void __user *)attr->addr, &data, sizeof(data)))
1465 return -EFAULT;
Christian Borntraeger2f8311c2017-11-16 12:30:15 +01001466 VM_EVENT(kvm, 3, "GET: guest feat: 0x%16.16llx.0x%16.16llx.0x%16.16llx",
1467 data.feat[0],
1468 data.feat[1],
1469 data.feat[2]);
David Hildenbrand15c97052015-03-19 17:36:43 +01001470 return 0;
1471}
1472
1473static int kvm_s390_get_machine_feat(struct kvm *kvm,
1474 struct kvm_device_attr *attr)
1475{
1476 struct kvm_s390_vm_cpu_feat data;
1477
1478 bitmap_copy((unsigned long *) data.feat,
1479 kvm_s390_available_cpu_feat,
1480 KVM_S390_VM_CPU_FEAT_NR_BITS);
1481 if (copy_to_user((void __user *)attr->addr, &data, sizeof(data)))
1482 return -EFAULT;
Christian Borntraeger2f8311c2017-11-16 12:30:15 +01001483 VM_EVENT(kvm, 3, "GET: host feat: 0x%16.16llx.0x%16.16llx.0x%16.16llx",
1484 data.feat[0],
1485 data.feat[1],
1486 data.feat[2]);
David Hildenbrand15c97052015-03-19 17:36:43 +01001487 return 0;
1488}
1489
David Hildenbrand0a763c72016-05-18 16:03:47 +02001490static int kvm_s390_get_processor_subfunc(struct kvm *kvm,
1491 struct kvm_device_attr *attr)
1492{
Christian Borntraeger346fa2f2019-02-18 07:48:25 -05001493 if (copy_to_user((void __user *)attr->addr, &kvm->arch.model.subfuncs,
1494 sizeof(struct kvm_s390_vm_cpu_subfunc)))
1495 return -EFAULT;
1496
Christian Borntraeger11ba5962019-02-20 11:38:42 -05001497 VM_EVENT(kvm, 3, "GET: guest PLO subfunc 0x%16.16lx.%16.16lx.%16.16lx.%16.16lx",
1498 ((unsigned long *) &kvm->arch.model.subfuncs.plo)[0],
1499 ((unsigned long *) &kvm->arch.model.subfuncs.plo)[1],
1500 ((unsigned long *) &kvm->arch.model.subfuncs.plo)[2],
1501 ((unsigned long *) &kvm->arch.model.subfuncs.plo)[3]);
1502 VM_EVENT(kvm, 3, "GET: guest PTFF subfunc 0x%16.16lx.%16.16lx",
1503 ((unsigned long *) &kvm->arch.model.subfuncs.ptff)[0],
1504 ((unsigned long *) &kvm->arch.model.subfuncs.ptff)[1]);
1505 VM_EVENT(kvm, 3, "GET: guest KMAC subfunc 0x%16.16lx.%16.16lx",
1506 ((unsigned long *) &kvm->arch.model.subfuncs.kmac)[0],
1507 ((unsigned long *) &kvm->arch.model.subfuncs.kmac)[1]);
1508 VM_EVENT(kvm, 3, "GET: guest KMC subfunc 0x%16.16lx.%16.16lx",
1509 ((unsigned long *) &kvm->arch.model.subfuncs.kmc)[0],
1510 ((unsigned long *) &kvm->arch.model.subfuncs.kmc)[1]);
1511 VM_EVENT(kvm, 3, "GET: guest KM subfunc 0x%16.16lx.%16.16lx",
1512 ((unsigned long *) &kvm->arch.model.subfuncs.km)[0],
1513 ((unsigned long *) &kvm->arch.model.subfuncs.km)[1]);
1514 VM_EVENT(kvm, 3, "GET: guest KIMD subfunc 0x%16.16lx.%16.16lx",
1515 ((unsigned long *) &kvm->arch.model.subfuncs.kimd)[0],
1516 ((unsigned long *) &kvm->arch.model.subfuncs.kimd)[1]);
1517 VM_EVENT(kvm, 3, "GET: guest KLMD subfunc 0x%16.16lx.%16.16lx",
1518 ((unsigned long *) &kvm->arch.model.subfuncs.klmd)[0],
1519 ((unsigned long *) &kvm->arch.model.subfuncs.klmd)[1]);
1520 VM_EVENT(kvm, 3, "GET: guest PCKMO subfunc 0x%16.16lx.%16.16lx",
1521 ((unsigned long *) &kvm->arch.model.subfuncs.pckmo)[0],
1522 ((unsigned long *) &kvm->arch.model.subfuncs.pckmo)[1]);
1523 VM_EVENT(kvm, 3, "GET: guest KMCTR subfunc 0x%16.16lx.%16.16lx",
1524 ((unsigned long *) &kvm->arch.model.subfuncs.kmctr)[0],
1525 ((unsigned long *) &kvm->arch.model.subfuncs.kmctr)[1]);
1526 VM_EVENT(kvm, 3, "GET: guest KMF subfunc 0x%16.16lx.%16.16lx",
1527 ((unsigned long *) &kvm->arch.model.subfuncs.kmf)[0],
1528 ((unsigned long *) &kvm->arch.model.subfuncs.kmf)[1]);
1529 VM_EVENT(kvm, 3, "GET: guest KMO subfunc 0x%16.16lx.%16.16lx",
1530 ((unsigned long *) &kvm->arch.model.subfuncs.kmo)[0],
1531 ((unsigned long *) &kvm->arch.model.subfuncs.kmo)[1]);
1532 VM_EVENT(kvm, 3, "GET: guest PCC subfunc 0x%16.16lx.%16.16lx",
1533 ((unsigned long *) &kvm->arch.model.subfuncs.pcc)[0],
1534 ((unsigned long *) &kvm->arch.model.subfuncs.pcc)[1]);
1535 VM_EVENT(kvm, 3, "GET: guest PPNO subfunc 0x%16.16lx.%16.16lx",
1536 ((unsigned long *) &kvm->arch.model.subfuncs.ppno)[0],
1537 ((unsigned long *) &kvm->arch.model.subfuncs.ppno)[1]);
1538 VM_EVENT(kvm, 3, "GET: guest KMA subfunc 0x%16.16lx.%16.16lx",
1539 ((unsigned long *) &kvm->arch.model.subfuncs.kma)[0],
1540 ((unsigned long *) &kvm->arch.model.subfuncs.kma)[1]);
Christian Borntraeger13209ad2018-12-28 09:33:35 +01001541 VM_EVENT(kvm, 3, "GET: guest KDSA subfunc 0x%16.16lx.%16.16lx",
1542 ((unsigned long *) &kvm->arch.model.subfuncs.kdsa)[0],
1543 ((unsigned long *) &kvm->arch.model.subfuncs.kdsa)[1]);
Christian Borntraeger173aec22018-12-28 10:59:06 +01001544 VM_EVENT(kvm, 3, "GET: guest SORTL subfunc 0x%16.16lx.%16.16lx.%16.16lx.%16.16lx",
1545 ((unsigned long *) &kvm->arch.model.subfuncs.sortl)[0],
1546 ((unsigned long *) &kvm->arch.model.subfuncs.sortl)[1],
1547 ((unsigned long *) &kvm->arch.model.subfuncs.sortl)[2],
1548 ((unsigned long *) &kvm->arch.model.subfuncs.sortl)[3]);
Christian Borntraeger4f45b902018-12-28 10:46:04 +01001549 VM_EVENT(kvm, 3, "GET: guest DFLTCC subfunc 0x%16.16lx.%16.16lx.%16.16lx.%16.16lx",
1550 ((unsigned long *) &kvm->arch.model.subfuncs.dfltcc)[0],
1551 ((unsigned long *) &kvm->arch.model.subfuncs.dfltcc)[1],
1552 ((unsigned long *) &kvm->arch.model.subfuncs.dfltcc)[2],
1553 ((unsigned long *) &kvm->arch.model.subfuncs.dfltcc)[3]);
Christian Borntraeger11ba5962019-02-20 11:38:42 -05001554
Christian Borntraeger346fa2f2019-02-18 07:48:25 -05001555 return 0;
David Hildenbrand0a763c72016-05-18 16:03:47 +02001556}
1557
1558static int kvm_s390_get_machine_subfunc(struct kvm *kvm,
1559 struct kvm_device_attr *attr)
1560{
1561 if (copy_to_user((void __user *)attr->addr, &kvm_s390_available_subfunc,
1562 sizeof(struct kvm_s390_vm_cpu_subfunc)))
1563 return -EFAULT;
Christian Borntraeger11ba5962019-02-20 11:38:42 -05001564
1565 VM_EVENT(kvm, 3, "GET: host PLO subfunc 0x%16.16lx.%16.16lx.%16.16lx.%16.16lx",
1566 ((unsigned long *) &kvm_s390_available_subfunc.plo)[0],
1567 ((unsigned long *) &kvm_s390_available_subfunc.plo)[1],
1568 ((unsigned long *) &kvm_s390_available_subfunc.plo)[2],
1569 ((unsigned long *) &kvm_s390_available_subfunc.plo)[3]);
1570 VM_EVENT(kvm, 3, "GET: host PTFF subfunc 0x%16.16lx.%16.16lx",
1571 ((unsigned long *) &kvm_s390_available_subfunc.ptff)[0],
1572 ((unsigned long *) &kvm_s390_available_subfunc.ptff)[1]);
1573 VM_EVENT(kvm, 3, "GET: host KMAC subfunc 0x%16.16lx.%16.16lx",
1574 ((unsigned long *) &kvm_s390_available_subfunc.kmac)[0],
1575 ((unsigned long *) &kvm_s390_available_subfunc.kmac)[1]);
1576 VM_EVENT(kvm, 3, "GET: host KMC subfunc 0x%16.16lx.%16.16lx",
1577 ((unsigned long *) &kvm_s390_available_subfunc.kmc)[0],
1578 ((unsigned long *) &kvm_s390_available_subfunc.kmc)[1]);
1579 VM_EVENT(kvm, 3, "GET: host KM subfunc 0x%16.16lx.%16.16lx",
1580 ((unsigned long *) &kvm_s390_available_subfunc.km)[0],
1581 ((unsigned long *) &kvm_s390_available_subfunc.km)[1]);
1582 VM_EVENT(kvm, 3, "GET: host KIMD subfunc 0x%16.16lx.%16.16lx",
1583 ((unsigned long *) &kvm_s390_available_subfunc.kimd)[0],
1584 ((unsigned long *) &kvm_s390_available_subfunc.kimd)[1]);
1585 VM_EVENT(kvm, 3, "GET: host KLMD subfunc 0x%16.16lx.%16.16lx",
1586 ((unsigned long *) &kvm_s390_available_subfunc.klmd)[0],
1587 ((unsigned long *) &kvm_s390_available_subfunc.klmd)[1]);
1588 VM_EVENT(kvm, 3, "GET: host PCKMO subfunc 0x%16.16lx.%16.16lx",
1589 ((unsigned long *) &kvm_s390_available_subfunc.pckmo)[0],
1590 ((unsigned long *) &kvm_s390_available_subfunc.pckmo)[1]);
1591 VM_EVENT(kvm, 3, "GET: host KMCTR subfunc 0x%16.16lx.%16.16lx",
1592 ((unsigned long *) &kvm_s390_available_subfunc.kmctr)[0],
1593 ((unsigned long *) &kvm_s390_available_subfunc.kmctr)[1]);
1594 VM_EVENT(kvm, 3, "GET: host KMF subfunc 0x%16.16lx.%16.16lx",
1595 ((unsigned long *) &kvm_s390_available_subfunc.kmf)[0],
1596 ((unsigned long *) &kvm_s390_available_subfunc.kmf)[1]);
1597 VM_EVENT(kvm, 3, "GET: host KMO subfunc 0x%16.16lx.%16.16lx",
1598 ((unsigned long *) &kvm_s390_available_subfunc.kmo)[0],
1599 ((unsigned long *) &kvm_s390_available_subfunc.kmo)[1]);
1600 VM_EVENT(kvm, 3, "GET: host PCC subfunc 0x%16.16lx.%16.16lx",
1601 ((unsigned long *) &kvm_s390_available_subfunc.pcc)[0],
1602 ((unsigned long *) &kvm_s390_available_subfunc.pcc)[1]);
1603 VM_EVENT(kvm, 3, "GET: host PPNO subfunc 0x%16.16lx.%16.16lx",
1604 ((unsigned long *) &kvm_s390_available_subfunc.ppno)[0],
1605 ((unsigned long *) &kvm_s390_available_subfunc.ppno)[1]);
1606 VM_EVENT(kvm, 3, "GET: host KMA subfunc 0x%16.16lx.%16.16lx",
1607 ((unsigned long *) &kvm_s390_available_subfunc.kma)[0],
1608 ((unsigned long *) &kvm_s390_available_subfunc.kma)[1]);
Christian Borntraeger13209ad2018-12-28 09:33:35 +01001609 VM_EVENT(kvm, 3, "GET: host KDSA subfunc 0x%16.16lx.%16.16lx",
1610 ((unsigned long *) &kvm_s390_available_subfunc.kdsa)[0],
1611 ((unsigned long *) &kvm_s390_available_subfunc.kdsa)[1]);
Christian Borntraeger173aec22018-12-28 10:59:06 +01001612 VM_EVENT(kvm, 3, "GET: host SORTL subfunc 0x%16.16lx.%16.16lx.%16.16lx.%16.16lx",
1613 ((unsigned long *) &kvm_s390_available_subfunc.sortl)[0],
1614 ((unsigned long *) &kvm_s390_available_subfunc.sortl)[1],
1615 ((unsigned long *) &kvm_s390_available_subfunc.sortl)[2],
1616 ((unsigned long *) &kvm_s390_available_subfunc.sortl)[3]);
Christian Borntraeger4f45b902018-12-28 10:46:04 +01001617 VM_EVENT(kvm, 3, "GET: host DFLTCC subfunc 0x%16.16lx.%16.16lx.%16.16lx.%16.16lx",
1618 ((unsigned long *) &kvm_s390_available_subfunc.dfltcc)[0],
1619 ((unsigned long *) &kvm_s390_available_subfunc.dfltcc)[1],
1620 ((unsigned long *) &kvm_s390_available_subfunc.dfltcc)[2],
1621 ((unsigned long *) &kvm_s390_available_subfunc.dfltcc)[3]);
Christian Borntraeger11ba5962019-02-20 11:38:42 -05001622
David Hildenbrand0a763c72016-05-18 16:03:47 +02001623 return 0;
1624}
Christian Borntraeger346fa2f2019-02-18 07:48:25 -05001625
Michael Mueller658b6ed2015-02-02 15:49:35 +01001626static int kvm_s390_get_cpu_model(struct kvm *kvm, struct kvm_device_attr *attr)
1627{
1628 int ret = -ENXIO;
1629
1630 switch (attr->attr) {
1631 case KVM_S390_VM_CPU_PROCESSOR:
1632 ret = kvm_s390_get_processor(kvm, attr);
1633 break;
1634 case KVM_S390_VM_CPU_MACHINE:
1635 ret = kvm_s390_get_machine(kvm, attr);
1636 break;
David Hildenbrand15c97052015-03-19 17:36:43 +01001637 case KVM_S390_VM_CPU_PROCESSOR_FEAT:
1638 ret = kvm_s390_get_processor_feat(kvm, attr);
1639 break;
1640 case KVM_S390_VM_CPU_MACHINE_FEAT:
1641 ret = kvm_s390_get_machine_feat(kvm, attr);
1642 break;
David Hildenbrand0a763c72016-05-18 16:03:47 +02001643 case KVM_S390_VM_CPU_PROCESSOR_SUBFUNC:
1644 ret = kvm_s390_get_processor_subfunc(kvm, attr);
1645 break;
1646 case KVM_S390_VM_CPU_MACHINE_SUBFUNC:
1647 ret = kvm_s390_get_machine_subfunc(kvm, attr);
1648 break;
Michael Mueller658b6ed2015-02-02 15:49:35 +01001649 }
1650 return ret;
1651}
1652
Dominik Dingelf2061652014-04-09 13:13:00 +02001653static int kvm_s390_vm_set_attr(struct kvm *kvm, struct kvm_device_attr *attr)
1654{
1655 int ret;
1656
1657 switch (attr->group) {
Dominik Dingel4f718ea2014-04-09 13:13:00 +02001658 case KVM_S390_VM_MEM_CTRL:
Dominik Dingel8c0a7ce2014-10-31 14:10:41 +01001659 ret = kvm_s390_set_mem_control(kvm, attr);
Dominik Dingel4f718ea2014-04-09 13:13:00 +02001660 break;
Jason J. Herne72f25022014-11-25 09:46:02 -05001661 case KVM_S390_VM_TOD:
1662 ret = kvm_s390_set_tod(kvm, attr);
1663 break;
Michael Mueller658b6ed2015-02-02 15:49:35 +01001664 case KVM_S390_VM_CPU_MODEL:
1665 ret = kvm_s390_set_cpu_model(kvm, attr);
1666 break;
Tony Krowiaka374e892014-09-03 10:13:53 +02001667 case KVM_S390_VM_CRYPTO:
1668 ret = kvm_s390_vm_set_crypto(kvm, attr);
1669 break;
Claudio Imbrenda190df4a2016-08-04 17:54:42 +02001670 case KVM_S390_VM_MIGRATION:
1671 ret = kvm_s390_vm_set_migration(kvm, attr);
1672 break;
Dominik Dingelf2061652014-04-09 13:13:00 +02001673 default:
1674 ret = -ENXIO;
1675 break;
1676 }
1677
1678 return ret;
1679}
1680
1681static int kvm_s390_vm_get_attr(struct kvm *kvm, struct kvm_device_attr *attr)
1682{
Dominik Dingel8c0a7ce2014-10-31 14:10:41 +01001683 int ret;
1684
1685 switch (attr->group) {
1686 case KVM_S390_VM_MEM_CTRL:
1687 ret = kvm_s390_get_mem_control(kvm, attr);
1688 break;
Jason J. Herne72f25022014-11-25 09:46:02 -05001689 case KVM_S390_VM_TOD:
1690 ret = kvm_s390_get_tod(kvm, attr);
1691 break;
Michael Mueller658b6ed2015-02-02 15:49:35 +01001692 case KVM_S390_VM_CPU_MODEL:
1693 ret = kvm_s390_get_cpu_model(kvm, attr);
1694 break;
Claudio Imbrenda190df4a2016-08-04 17:54:42 +02001695 case KVM_S390_VM_MIGRATION:
1696 ret = kvm_s390_vm_get_migration(kvm, attr);
1697 break;
Dominik Dingel8c0a7ce2014-10-31 14:10:41 +01001698 default:
1699 ret = -ENXIO;
1700 break;
1701 }
1702
1703 return ret;
Dominik Dingelf2061652014-04-09 13:13:00 +02001704}
1705
1706static int kvm_s390_vm_has_attr(struct kvm *kvm, struct kvm_device_attr *attr)
1707{
1708 int ret;
1709
1710 switch (attr->group) {
Dominik Dingel4f718ea2014-04-09 13:13:00 +02001711 case KVM_S390_VM_MEM_CTRL:
1712 switch (attr->attr) {
1713 case KVM_S390_VM_MEM_ENABLE_CMMA:
1714 case KVM_S390_VM_MEM_CLR_CMMA:
David Hildenbrandf9cbd9b2016-03-03 09:48:47 +01001715 ret = sclp.has_cmma ? 0 : -ENXIO;
1716 break;
Dominik Dingel8c0a7ce2014-10-31 14:10:41 +01001717 case KVM_S390_VM_MEM_LIMIT_SIZE:
Dominik Dingel4f718ea2014-04-09 13:13:00 +02001718 ret = 0;
1719 break;
1720 default:
1721 ret = -ENXIO;
1722 break;
1723 }
1724 break;
Jason J. Herne72f25022014-11-25 09:46:02 -05001725 case KVM_S390_VM_TOD:
1726 switch (attr->attr) {
1727 case KVM_S390_VM_TOD_LOW:
1728 case KVM_S390_VM_TOD_HIGH:
1729 ret = 0;
1730 break;
1731 default:
1732 ret = -ENXIO;
1733 break;
1734 }
1735 break;
Michael Mueller658b6ed2015-02-02 15:49:35 +01001736 case KVM_S390_VM_CPU_MODEL:
1737 switch (attr->attr) {
1738 case KVM_S390_VM_CPU_PROCESSOR:
1739 case KVM_S390_VM_CPU_MACHINE:
David Hildenbrand15c97052015-03-19 17:36:43 +01001740 case KVM_S390_VM_CPU_PROCESSOR_FEAT:
1741 case KVM_S390_VM_CPU_MACHINE_FEAT:
David Hildenbrand0a763c72016-05-18 16:03:47 +02001742 case KVM_S390_VM_CPU_MACHINE_SUBFUNC:
Christian Borntraeger346fa2f2019-02-18 07:48:25 -05001743 case KVM_S390_VM_CPU_PROCESSOR_SUBFUNC:
Michael Mueller658b6ed2015-02-02 15:49:35 +01001744 ret = 0;
1745 break;
1746 default:
1747 ret = -ENXIO;
1748 break;
1749 }
1750 break;
Tony Krowiaka374e892014-09-03 10:13:53 +02001751 case KVM_S390_VM_CRYPTO:
1752 switch (attr->attr) {
1753 case KVM_S390_VM_CRYPTO_ENABLE_AES_KW:
1754 case KVM_S390_VM_CRYPTO_ENABLE_DEA_KW:
1755 case KVM_S390_VM_CRYPTO_DISABLE_AES_KW:
1756 case KVM_S390_VM_CRYPTO_DISABLE_DEA_KW:
1757 ret = 0;
1758 break;
Tony Krowiak37940fb2018-09-25 19:16:39 -04001759 case KVM_S390_VM_CRYPTO_ENABLE_APIE:
1760 case KVM_S390_VM_CRYPTO_DISABLE_APIE:
1761 ret = ap_instructions_available() ? 0 : -ENXIO;
1762 break;
Tony Krowiaka374e892014-09-03 10:13:53 +02001763 default:
1764 ret = -ENXIO;
1765 break;
1766 }
1767 break;
Claudio Imbrenda190df4a2016-08-04 17:54:42 +02001768 case KVM_S390_VM_MIGRATION:
1769 ret = 0;
1770 break;
Dominik Dingelf2061652014-04-09 13:13:00 +02001771 default:
1772 ret = -ENXIO;
1773 break;
1774 }
1775
1776 return ret;
1777}
1778
Jason J. Herne30ee2a92014-09-23 09:23:01 -04001779static long kvm_s390_get_skeys(struct kvm *kvm, struct kvm_s390_skeys *args)
1780{
1781 uint8_t *keys;
1782 uint64_t hva;
Christian Borntraeger4f899142017-07-10 13:35:48 +02001783 int srcu_idx, i, r = 0;
Jason J. Herne30ee2a92014-09-23 09:23:01 -04001784
1785 if (args->flags != 0)
1786 return -EINVAL;
1787
1788 /* Is this guest using storage keys? */
Janosch Frank55531b72018-02-15 16:33:47 +01001789 if (!mm_uses_skeys(current->mm))
Jason J. Herne30ee2a92014-09-23 09:23:01 -04001790 return KVM_S390_GET_SKEYS_NONE;
1791
1792 /* Enforce sane limit on memory allocation */
1793 if (args->count < 1 || args->count > KVM_S390_SKEYS_MAX)
1794 return -EINVAL;
1795
Michal Hocko752ade62017-05-08 15:57:27 -07001796 keys = kvmalloc_array(args->count, sizeof(uint8_t), GFP_KERNEL);
Jason J. Herne30ee2a92014-09-23 09:23:01 -04001797 if (!keys)
1798 return -ENOMEM;
1799
Martin Schwidefskyd3ed1ce2016-03-08 11:53:35 +01001800 down_read(&current->mm->mmap_sem);
Christian Borntraeger4f899142017-07-10 13:35:48 +02001801 srcu_idx = srcu_read_lock(&kvm->srcu);
Jason J. Herne30ee2a92014-09-23 09:23:01 -04001802 for (i = 0; i < args->count; i++) {
1803 hva = gfn_to_hva(kvm, args->start_gfn + i);
1804 if (kvm_is_error_hva(hva)) {
1805 r = -EFAULT;
Martin Schwidefskyd3ed1ce2016-03-08 11:53:35 +01001806 break;
Jason J. Herne30ee2a92014-09-23 09:23:01 -04001807 }
1808
David Hildenbrand154c8c12016-05-09 11:22:34 +02001809 r = get_guest_storage_key(current->mm, hva, &keys[i]);
1810 if (r)
Martin Schwidefskyd3ed1ce2016-03-08 11:53:35 +01001811 break;
Jason J. Herne30ee2a92014-09-23 09:23:01 -04001812 }
Christian Borntraeger4f899142017-07-10 13:35:48 +02001813 srcu_read_unlock(&kvm->srcu, srcu_idx);
Martin Schwidefskyd3ed1ce2016-03-08 11:53:35 +01001814 up_read(&current->mm->mmap_sem);
Jason J. Herne30ee2a92014-09-23 09:23:01 -04001815
Martin Schwidefskyd3ed1ce2016-03-08 11:53:35 +01001816 if (!r) {
1817 r = copy_to_user((uint8_t __user *)args->skeydata_addr, keys,
1818 sizeof(uint8_t) * args->count);
1819 if (r)
1820 r = -EFAULT;
Jason J. Herne30ee2a92014-09-23 09:23:01 -04001821 }
1822
Jason J. Herne30ee2a92014-09-23 09:23:01 -04001823 kvfree(keys);
1824 return r;
1825}
1826
1827static long kvm_s390_set_skeys(struct kvm *kvm, struct kvm_s390_skeys *args)
1828{
1829 uint8_t *keys;
1830 uint64_t hva;
Christian Borntraeger4f899142017-07-10 13:35:48 +02001831 int srcu_idx, i, r = 0;
Janosch Frankbd096f62018-07-18 13:40:22 +01001832 bool unlocked;
Jason J. Herne30ee2a92014-09-23 09:23:01 -04001833
1834 if (args->flags != 0)
1835 return -EINVAL;
1836
1837 /* Enforce sane limit on memory allocation */
1838 if (args->count < 1 || args->count > KVM_S390_SKEYS_MAX)
1839 return -EINVAL;
1840
Michal Hocko752ade62017-05-08 15:57:27 -07001841 keys = kvmalloc_array(args->count, sizeof(uint8_t), GFP_KERNEL);
Jason J. Herne30ee2a92014-09-23 09:23:01 -04001842 if (!keys)
1843 return -ENOMEM;
1844
1845 r = copy_from_user(keys, (uint8_t __user *)args->skeydata_addr,
1846 sizeof(uint8_t) * args->count);
1847 if (r) {
1848 r = -EFAULT;
1849 goto out;
1850 }
1851
1852 /* Enable storage key handling for the guest */
Dominik Dingel14d4a422015-05-07 15:16:13 +02001853 r = s390_enable_skey();
1854 if (r)
1855 goto out;
Jason J. Herne30ee2a92014-09-23 09:23:01 -04001856
Janosch Frankbd096f62018-07-18 13:40:22 +01001857 i = 0;
Martin Schwidefskyd3ed1ce2016-03-08 11:53:35 +01001858 down_read(&current->mm->mmap_sem);
Christian Borntraeger4f899142017-07-10 13:35:48 +02001859 srcu_idx = srcu_read_lock(&kvm->srcu);
Janosch Frankbd096f62018-07-18 13:40:22 +01001860 while (i < args->count) {
1861 unlocked = false;
Jason J. Herne30ee2a92014-09-23 09:23:01 -04001862 hva = gfn_to_hva(kvm, args->start_gfn + i);
1863 if (kvm_is_error_hva(hva)) {
1864 r = -EFAULT;
Martin Schwidefskyd3ed1ce2016-03-08 11:53:35 +01001865 break;
Jason J. Herne30ee2a92014-09-23 09:23:01 -04001866 }
1867
1868 /* Lowest order bit is reserved */
1869 if (keys[i] & 0x01) {
1870 r = -EINVAL;
Martin Schwidefskyd3ed1ce2016-03-08 11:53:35 +01001871 break;
Jason J. Herne30ee2a92014-09-23 09:23:01 -04001872 }
1873
David Hildenbrandfe69eab2016-05-09 13:08:07 +02001874 r = set_guest_storage_key(current->mm, hva, keys[i], 0);
Janosch Frankbd096f62018-07-18 13:40:22 +01001875 if (r) {
1876 r = fixup_user_fault(current, current->mm, hva,
1877 FAULT_FLAG_WRITE, &unlocked);
1878 if (r)
1879 break;
1880 }
1881 if (!r)
1882 i++;
Jason J. Herne30ee2a92014-09-23 09:23:01 -04001883 }
Christian Borntraeger4f899142017-07-10 13:35:48 +02001884 srcu_read_unlock(&kvm->srcu, srcu_idx);
Martin Schwidefskyd3ed1ce2016-03-08 11:53:35 +01001885 up_read(&current->mm->mmap_sem);
Jason J. Herne30ee2a92014-09-23 09:23:01 -04001886out:
1887 kvfree(keys);
1888 return r;
1889}
1890
Claudio Imbrenda4036e382016-08-04 17:58:47 +02001891/*
1892 * Base address and length must be sent at the start of each block, therefore
1893 * it's cheaper to send some clean data, as long as it's less than the size of
1894 * two longs.
1895 */
1896#define KVM_S390_MAX_BIT_DISTANCE (2 * sizeof(void *))
1897/* for consistency */
1898#define KVM_S390_CMMA_SIZE_MAX ((u32)KVM_S390_SKEYS_MAX)
1899
1900/*
Claudio Imbrendaafdad612018-04-30 18:33:25 +02001901 * Similar to gfn_to_memslot, but returns the index of a memslot also when the
1902 * address falls in a hole. In that case the index of one of the memslots
1903 * bordering the hole is returned.
1904 */
1905static int gfn_to_memslot_approx(struct kvm_memslots *slots, gfn_t gfn)
1906{
1907 int start = 0, end = slots->used_slots;
1908 int slot = atomic_read(&slots->lru_slot);
1909 struct kvm_memory_slot *memslots = slots->memslots;
1910
1911 if (gfn >= memslots[slot].base_gfn &&
1912 gfn < memslots[slot].base_gfn + memslots[slot].npages)
1913 return slot;
1914
1915 while (start < end) {
1916 slot = start + (end - start) / 2;
1917
1918 if (gfn >= memslots[slot].base_gfn)
1919 end = slot;
1920 else
1921 start = slot + 1;
1922 }
1923
1924 if (gfn >= memslots[start].base_gfn &&
1925 gfn < memslots[start].base_gfn + memslots[start].npages) {
1926 atomic_set(&slots->lru_slot, start);
1927 }
1928
1929 return start;
1930}
1931
1932static int kvm_s390_peek_cmma(struct kvm *kvm, struct kvm_s390_cmma_log *args,
1933 u8 *res, unsigned long bufsize)
1934{
1935 unsigned long pgstev, hva, cur_gfn = args->start_gfn;
1936
1937 args->count = 0;
1938 while (args->count < bufsize) {
1939 hva = gfn_to_hva(kvm, cur_gfn);
1940 /*
1941 * We return an error if the first value was invalid, but we
1942 * return successfully if at least one value was copied.
1943 */
1944 if (kvm_is_error_hva(hva))
1945 return args->count ? 0 : -EFAULT;
1946 if (get_pgste(kvm->mm, hva, &pgstev) < 0)
1947 pgstev = 0;
1948 res[args->count++] = (pgstev >> 24) & 0x43;
1949 cur_gfn++;
1950 }
1951
1952 return 0;
1953}
1954
1955static unsigned long kvm_s390_next_dirty_cmma(struct kvm_memslots *slots,
1956 unsigned long cur_gfn)
1957{
1958 int slotidx = gfn_to_memslot_approx(slots, cur_gfn);
1959 struct kvm_memory_slot *ms = slots->memslots + slotidx;
1960 unsigned long ofs = cur_gfn - ms->base_gfn;
1961
1962 if (ms->base_gfn + ms->npages <= cur_gfn) {
1963 slotidx--;
1964 /* If we are above the highest slot, wrap around */
1965 if (slotidx < 0)
1966 slotidx = slots->used_slots - 1;
1967
1968 ms = slots->memslots + slotidx;
1969 ofs = 0;
1970 }
1971 ofs = find_next_bit(kvm_second_dirty_bitmap(ms), ms->npages, ofs);
1972 while ((slotidx > 0) && (ofs >= ms->npages)) {
1973 slotidx--;
1974 ms = slots->memslots + slotidx;
1975 ofs = find_next_bit(kvm_second_dirty_bitmap(ms), ms->npages, 0);
1976 }
1977 return ms->base_gfn + ofs;
1978}
1979
1980static int kvm_s390_get_cmma(struct kvm *kvm, struct kvm_s390_cmma_log *args,
1981 u8 *res, unsigned long bufsize)
1982{
1983 unsigned long mem_end, cur_gfn, next_gfn, hva, pgstev;
1984 struct kvm_memslots *slots = kvm_memslots(kvm);
1985 struct kvm_memory_slot *ms;
1986
1987 cur_gfn = kvm_s390_next_dirty_cmma(slots, args->start_gfn);
1988 ms = gfn_to_memslot(kvm, cur_gfn);
1989 args->count = 0;
1990 args->start_gfn = cur_gfn;
1991 if (!ms)
1992 return 0;
1993 next_gfn = kvm_s390_next_dirty_cmma(slots, cur_gfn + 1);
1994 mem_end = slots->memslots[0].base_gfn + slots->memslots[0].npages;
1995
1996 while (args->count < bufsize) {
1997 hva = gfn_to_hva(kvm, cur_gfn);
1998 if (kvm_is_error_hva(hva))
1999 return 0;
2000 /* Decrement only if we actually flipped the bit to 0 */
2001 if (test_and_clear_bit(cur_gfn - ms->base_gfn, kvm_second_dirty_bitmap(ms)))
2002 atomic64_dec(&kvm->arch.cmma_dirty_pages);
2003 if (get_pgste(kvm->mm, hva, &pgstev) < 0)
2004 pgstev = 0;
2005 /* Save the value */
2006 res[args->count++] = (pgstev >> 24) & 0x43;
2007 /* If the next bit is too far away, stop. */
2008 if (next_gfn > cur_gfn + KVM_S390_MAX_BIT_DISTANCE)
2009 return 0;
2010 /* If we reached the previous "next", find the next one */
2011 if (cur_gfn == next_gfn)
2012 next_gfn = kvm_s390_next_dirty_cmma(slots, cur_gfn + 1);
2013 /* Reached the end of memory or of the buffer, stop */
2014 if ((next_gfn >= mem_end) ||
2015 (next_gfn - args->start_gfn >= bufsize))
2016 return 0;
2017 cur_gfn++;
2018 /* Reached the end of the current memslot, take the next one. */
2019 if (cur_gfn - ms->base_gfn >= ms->npages) {
2020 ms = gfn_to_memslot(kvm, cur_gfn);
2021 if (!ms)
2022 return 0;
2023 }
2024 }
2025 return 0;
2026}
2027
2028/*
Claudio Imbrenda4036e382016-08-04 17:58:47 +02002029 * This function searches for the next page with dirty CMMA attributes, and
2030 * saves the attributes in the buffer up to either the end of the buffer or
2031 * until a block of at least KVM_S390_MAX_BIT_DISTANCE clean bits is found;
2032 * no trailing clean bytes are saved.
2033 * In case no dirty bits were found, or if CMMA was not enabled or used, the
2034 * output buffer will indicate 0 as length.
2035 */
2036static int kvm_s390_get_cmma_bits(struct kvm *kvm,
2037 struct kvm_s390_cmma_log *args)
2038{
Claudio Imbrendaafdad612018-04-30 18:33:25 +02002039 unsigned long bufsize;
2040 int srcu_idx, peek, ret;
2041 u8 *values;
Claudio Imbrenda4036e382016-08-04 17:58:47 +02002042
Claudio Imbrendaafdad612018-04-30 18:33:25 +02002043 if (!kvm->arch.use_cmma)
Claudio Imbrenda4036e382016-08-04 17:58:47 +02002044 return -ENXIO;
2045 /* Invalid/unsupported flags were specified */
2046 if (args->flags & ~KVM_S390_CMMA_PEEK)
2047 return -EINVAL;
2048 /* Migration mode query, and we are not doing a migration */
2049 peek = !!(args->flags & KVM_S390_CMMA_PEEK);
Claudio Imbrendaafdad612018-04-30 18:33:25 +02002050 if (!peek && !kvm->arch.migration_mode)
Claudio Imbrenda4036e382016-08-04 17:58:47 +02002051 return -EINVAL;
2052 /* CMMA is disabled or was not used, or the buffer has length zero */
2053 bufsize = min(args->count, KVM_S390_CMMA_SIZE_MAX);
Janosch Frankc9f0a2b2018-02-16 12:16:14 +01002054 if (!bufsize || !kvm->mm->context.uses_cmm) {
Claudio Imbrenda4036e382016-08-04 17:58:47 +02002055 memset(args, 0, sizeof(*args));
2056 return 0;
2057 }
Claudio Imbrendaafdad612018-04-30 18:33:25 +02002058 /* We are not peeking, and there are no dirty pages */
2059 if (!peek && !atomic64_read(&kvm->arch.cmma_dirty_pages)) {
2060 memset(args, 0, sizeof(*args));
2061 return 0;
Claudio Imbrenda4036e382016-08-04 17:58:47 +02002062 }
2063
Claudio Imbrendaafdad612018-04-30 18:33:25 +02002064 values = vmalloc(bufsize);
2065 if (!values)
Claudio Imbrenda4036e382016-08-04 17:58:47 +02002066 return -ENOMEM;
2067
Claudio Imbrenda4036e382016-08-04 17:58:47 +02002068 down_read(&kvm->mm->mmap_sem);
2069 srcu_idx = srcu_read_lock(&kvm->srcu);
Claudio Imbrendaafdad612018-04-30 18:33:25 +02002070 if (peek)
2071 ret = kvm_s390_peek_cmma(kvm, args, values, bufsize);
2072 else
2073 ret = kvm_s390_get_cmma(kvm, args, values, bufsize);
Claudio Imbrenda4036e382016-08-04 17:58:47 +02002074 srcu_read_unlock(&kvm->srcu, srcu_idx);
2075 up_read(&kvm->mm->mmap_sem);
Claudio Imbrenda4036e382016-08-04 17:58:47 +02002076
Claudio Imbrendaafdad612018-04-30 18:33:25 +02002077 if (kvm->arch.migration_mode)
2078 args->remaining = atomic64_read(&kvm->arch.cmma_dirty_pages);
2079 else
2080 args->remaining = 0;
Claudio Imbrenda4036e382016-08-04 17:58:47 +02002081
Claudio Imbrendaafdad612018-04-30 18:33:25 +02002082 if (copy_to_user((void __user *)args->values, values, args->count))
2083 ret = -EFAULT;
2084
2085 vfree(values);
2086 return ret;
Claudio Imbrenda4036e382016-08-04 17:58:47 +02002087}
2088
2089/*
2090 * This function sets the CMMA attributes for the given pages. If the input
2091 * buffer has zero length, no action is taken, otherwise the attributes are
Janosch Frankc9f0a2b2018-02-16 12:16:14 +01002092 * set and the mm->context.uses_cmm flag is set.
Claudio Imbrenda4036e382016-08-04 17:58:47 +02002093 */
2094static int kvm_s390_set_cmma_bits(struct kvm *kvm,
2095 const struct kvm_s390_cmma_log *args)
2096{
2097 unsigned long hva, mask, pgstev, i;
2098 uint8_t *bits;
2099 int srcu_idx, r = 0;
2100
2101 mask = args->mask;
2102
2103 if (!kvm->arch.use_cmma)
2104 return -ENXIO;
2105 /* invalid/unsupported flags */
2106 if (args->flags != 0)
2107 return -EINVAL;
2108 /* Enforce sane limit on memory allocation */
2109 if (args->count > KVM_S390_CMMA_SIZE_MAX)
2110 return -EINVAL;
2111 /* Nothing to do */
2112 if (args->count == 0)
2113 return 0;
2114
Kees Cook42bc47b2018-06-12 14:27:11 -07002115 bits = vmalloc(array_size(sizeof(*bits), args->count));
Claudio Imbrenda4036e382016-08-04 17:58:47 +02002116 if (!bits)
2117 return -ENOMEM;
2118
2119 r = copy_from_user(bits, (void __user *)args->values, args->count);
2120 if (r) {
2121 r = -EFAULT;
2122 goto out;
2123 }
2124
2125 down_read(&kvm->mm->mmap_sem);
2126 srcu_idx = srcu_read_lock(&kvm->srcu);
2127 for (i = 0; i < args->count; i++) {
2128 hva = gfn_to_hva(kvm, args->start_gfn + i);
2129 if (kvm_is_error_hva(hva)) {
2130 r = -EFAULT;
2131 break;
2132 }
2133
2134 pgstev = bits[i];
2135 pgstev = pgstev << 24;
Claudio Imbrenda1bab1c02016-08-29 15:56:55 +02002136 mask &= _PGSTE_GPS_USAGE_MASK | _PGSTE_GPS_NODAT;
Claudio Imbrenda4036e382016-08-04 17:58:47 +02002137 set_pgste_bits(kvm->mm, hva, mask, pgstev);
2138 }
2139 srcu_read_unlock(&kvm->srcu, srcu_idx);
2140 up_read(&kvm->mm->mmap_sem);
2141
Janosch Frankc9f0a2b2018-02-16 12:16:14 +01002142 if (!kvm->mm->context.uses_cmm) {
Claudio Imbrenda4036e382016-08-04 17:58:47 +02002143 down_write(&kvm->mm->mmap_sem);
Janosch Frankc9f0a2b2018-02-16 12:16:14 +01002144 kvm->mm->context.uses_cmm = 1;
Claudio Imbrenda4036e382016-08-04 17:58:47 +02002145 up_write(&kvm->mm->mmap_sem);
2146 }
2147out:
2148 vfree(bits);
2149 return r;
2150}
2151
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002152long kvm_arch_vm_ioctl(struct file *filp,
2153 unsigned int ioctl, unsigned long arg)
2154{
2155 struct kvm *kvm = filp->private_data;
2156 void __user *argp = (void __user *)arg;
Dominik Dingelf2061652014-04-09 13:13:00 +02002157 struct kvm_device_attr attr;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002158 int r;
2159
2160 switch (ioctl) {
Carsten Otteba5c1e92008-03-25 18:47:26 +01002161 case KVM_S390_INTERRUPT: {
2162 struct kvm_s390_interrupt s390int;
2163
2164 r = -EFAULT;
2165 if (copy_from_user(&s390int, argp, sizeof(s390int)))
2166 break;
2167 r = kvm_s390_inject_vm(kvm, &s390int);
2168 break;
2169 }
Cornelia Huck84223592013-07-15 13:36:01 +02002170 case KVM_CREATE_IRQCHIP: {
2171 struct kvm_irq_routing_entry routing;
2172
2173 r = -EINVAL;
2174 if (kvm->arch.use_irqchip) {
2175 /* Set up dummy routing. */
2176 memset(&routing, 0, sizeof(routing));
Nicholas Krause152b2832015-08-06 13:05:54 -04002177 r = kvm_set_irq_routing(kvm, &routing, 0, 0);
Cornelia Huck84223592013-07-15 13:36:01 +02002178 }
2179 break;
2180 }
Dominik Dingelf2061652014-04-09 13:13:00 +02002181 case KVM_SET_DEVICE_ATTR: {
2182 r = -EFAULT;
2183 if (copy_from_user(&attr, (void __user *)arg, sizeof(attr)))
2184 break;
2185 r = kvm_s390_vm_set_attr(kvm, &attr);
2186 break;
2187 }
2188 case KVM_GET_DEVICE_ATTR: {
2189 r = -EFAULT;
2190 if (copy_from_user(&attr, (void __user *)arg, sizeof(attr)))
2191 break;
2192 r = kvm_s390_vm_get_attr(kvm, &attr);
2193 break;
2194 }
2195 case KVM_HAS_DEVICE_ATTR: {
2196 r = -EFAULT;
2197 if (copy_from_user(&attr, (void __user *)arg, sizeof(attr)))
2198 break;
2199 r = kvm_s390_vm_has_attr(kvm, &attr);
2200 break;
2201 }
Jason J. Herne30ee2a92014-09-23 09:23:01 -04002202 case KVM_S390_GET_SKEYS: {
2203 struct kvm_s390_skeys args;
2204
2205 r = -EFAULT;
2206 if (copy_from_user(&args, argp,
2207 sizeof(struct kvm_s390_skeys)))
2208 break;
2209 r = kvm_s390_get_skeys(kvm, &args);
2210 break;
2211 }
2212 case KVM_S390_SET_SKEYS: {
2213 struct kvm_s390_skeys args;
2214
2215 r = -EFAULT;
2216 if (copy_from_user(&args, argp,
2217 sizeof(struct kvm_s390_skeys)))
2218 break;
2219 r = kvm_s390_set_skeys(kvm, &args);
2220 break;
2221 }
Claudio Imbrenda4036e382016-08-04 17:58:47 +02002222 case KVM_S390_GET_CMMA_BITS: {
2223 struct kvm_s390_cmma_log args;
2224
2225 r = -EFAULT;
2226 if (copy_from_user(&args, argp, sizeof(args)))
2227 break;
Christian Borntraeger1de1ea72017-12-22 10:54:20 +01002228 mutex_lock(&kvm->slots_lock);
Claudio Imbrenda4036e382016-08-04 17:58:47 +02002229 r = kvm_s390_get_cmma_bits(kvm, &args);
Christian Borntraeger1de1ea72017-12-22 10:54:20 +01002230 mutex_unlock(&kvm->slots_lock);
Claudio Imbrenda4036e382016-08-04 17:58:47 +02002231 if (!r) {
2232 r = copy_to_user(argp, &args, sizeof(args));
2233 if (r)
2234 r = -EFAULT;
2235 }
2236 break;
2237 }
2238 case KVM_S390_SET_CMMA_BITS: {
2239 struct kvm_s390_cmma_log args;
2240
2241 r = -EFAULT;
2242 if (copy_from_user(&args, argp, sizeof(args)))
2243 break;
Christian Borntraeger1de1ea72017-12-22 10:54:20 +01002244 mutex_lock(&kvm->slots_lock);
Claudio Imbrenda4036e382016-08-04 17:58:47 +02002245 r = kvm_s390_set_cmma_bits(kvm, &args);
Christian Borntraeger1de1ea72017-12-22 10:54:20 +01002246 mutex_unlock(&kvm->slots_lock);
Claudio Imbrenda4036e382016-08-04 17:58:47 +02002247 break;
2248 }
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002249 default:
Avi Kivity367e1312009-08-26 14:57:07 +03002250 r = -ENOTTY;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002251 }
2252
2253 return r;
2254}
2255
Tony Krowiak45c9b472015-01-13 11:33:26 -05002256static int kvm_s390_apxa_installed(void)
2257{
Tony Krowiake585b242018-09-25 19:16:18 -04002258 struct ap_config_info info;
Tony Krowiak45c9b472015-01-13 11:33:26 -05002259
Tony Krowiake585b242018-09-25 19:16:18 -04002260 if (ap_instructions_available()) {
2261 if (ap_qci(&info) == 0)
2262 return info.apxa;
Tony Krowiak45c9b472015-01-13 11:33:26 -05002263 }
2264
2265 return 0;
2266}
2267
Tony Krowiake585b242018-09-25 19:16:18 -04002268/*
2269 * The format of the crypto control block (CRYCB) is specified in the 3 low
2270 * order bits of the CRYCB designation (CRYCBD) field as follows:
2271 * Format 0: Neither the message security assist extension 3 (MSAX3) nor the
2272 * AP extended addressing (APXA) facility are installed.
2273 * Format 1: The APXA facility is not installed but the MSAX3 facility is.
2274 * Format 2: Both the APXA and MSAX3 facilities are installed
2275 */
Tony Krowiak45c9b472015-01-13 11:33:26 -05002276static void kvm_s390_set_crycb_format(struct kvm *kvm)
2277{
2278 kvm->arch.crypto.crycbd = (__u32)(unsigned long) kvm->arch.crypto.crycb;
2279
Tony Krowiake585b242018-09-25 19:16:18 -04002280 /* Clear the CRYCB format bits - i.e., set format 0 by default */
2281 kvm->arch.crypto.crycbd &= ~(CRYCB_FORMAT_MASK);
2282
2283 /* Check whether MSAX3 is installed */
2284 if (!test_kvm_facility(kvm, 76))
2285 return;
2286
Tony Krowiak45c9b472015-01-13 11:33:26 -05002287 if (kvm_s390_apxa_installed())
2288 kvm->arch.crypto.crycbd |= CRYCB_FORMAT2;
2289 else
2290 kvm->arch.crypto.crycbd |= CRYCB_FORMAT1;
2291}
2292
Pierre Morel0e237e42018-10-05 10:31:09 +02002293void kvm_arch_crypto_set_masks(struct kvm *kvm, unsigned long *apm,
2294 unsigned long *aqm, unsigned long *adm)
2295{
2296 struct kvm_s390_crypto_cb *crycb = kvm->arch.crypto.crycb;
2297
2298 mutex_lock(&kvm->lock);
2299 kvm_s390_vcpu_block_all(kvm);
2300
2301 switch (kvm->arch.crypto.crycbd & CRYCB_FORMAT_MASK) {
2302 case CRYCB_FORMAT2: /* APCB1 use 256 bits */
2303 memcpy(crycb->apcb1.apm, apm, 32);
2304 VM_EVENT(kvm, 3, "SET CRYCB: apm %016lx %016lx %016lx %016lx",
2305 apm[0], apm[1], apm[2], apm[3]);
2306 memcpy(crycb->apcb1.aqm, aqm, 32);
2307 VM_EVENT(kvm, 3, "SET CRYCB: aqm %016lx %016lx %016lx %016lx",
2308 aqm[0], aqm[1], aqm[2], aqm[3]);
2309 memcpy(crycb->apcb1.adm, adm, 32);
2310 VM_EVENT(kvm, 3, "SET CRYCB: adm %016lx %016lx %016lx %016lx",
2311 adm[0], adm[1], adm[2], adm[3]);
2312 break;
2313 case CRYCB_FORMAT1:
2314 case CRYCB_FORMAT0: /* Fall through both use APCB0 */
2315 memcpy(crycb->apcb0.apm, apm, 8);
2316 memcpy(crycb->apcb0.aqm, aqm, 2);
2317 memcpy(crycb->apcb0.adm, adm, 2);
2318 VM_EVENT(kvm, 3, "SET CRYCB: apm %016lx aqm %04x adm %04x",
2319 apm[0], *((unsigned short *)aqm),
2320 *((unsigned short *)adm));
2321 break;
2322 default: /* Can not happen */
2323 break;
2324 }
2325
2326 /* recreate the shadow crycb for each vcpu */
2327 kvm_s390_sync_request_broadcast(kvm, KVM_REQ_VSIE_RESTART);
2328 kvm_s390_vcpu_unblock_all(kvm);
2329 mutex_unlock(&kvm->lock);
2330}
2331EXPORT_SYMBOL_GPL(kvm_arch_crypto_set_masks);
2332
Tony Krowiak421045982018-09-25 19:16:25 -04002333void kvm_arch_crypto_clear_masks(struct kvm *kvm)
2334{
2335 mutex_lock(&kvm->lock);
2336 kvm_s390_vcpu_block_all(kvm);
2337
2338 memset(&kvm->arch.crypto.crycb->apcb0, 0,
2339 sizeof(kvm->arch.crypto.crycb->apcb0));
2340 memset(&kvm->arch.crypto.crycb->apcb1, 0,
2341 sizeof(kvm->arch.crypto.crycb->apcb1));
2342
Pierre Morel0e237e42018-10-05 10:31:09 +02002343 VM_EVENT(kvm, 3, "%s", "CLR CRYCB:");
Pierre Morel6cc571b2018-09-25 19:16:30 -04002344 /* recreate the shadow crycb for each vcpu */
2345 kvm_s390_sync_request_broadcast(kvm, KVM_REQ_VSIE_RESTART);
Tony Krowiak421045982018-09-25 19:16:25 -04002346 kvm_s390_vcpu_unblock_all(kvm);
2347 mutex_unlock(&kvm->lock);
2348}
2349EXPORT_SYMBOL_GPL(kvm_arch_crypto_clear_masks);
2350
David Hildenbrand9bb0ec02016-04-04 14:27:51 +02002351static u64 kvm_s390_get_initial_cpuid(void)
Michael Mueller9d8d5782015-02-02 15:42:51 +01002352{
David Hildenbrand9bb0ec02016-04-04 14:27:51 +02002353 struct cpuid cpuid;
2354
2355 get_cpu_id(&cpuid);
2356 cpuid.version = 0xff;
2357 return *((u64 *) &cpuid);
Michael Mueller9d8d5782015-02-02 15:42:51 +01002358}
2359
David Hildenbrandc54f0d62015-12-02 08:53:52 +01002360static void kvm_s390_crypto_init(struct kvm *kvm)
Tony Krowiak5102ee82014-06-27 14:46:01 -04002361{
David Hildenbrandc54f0d62015-12-02 08:53:52 +01002362 kvm->arch.crypto.crycb = &kvm->arch.sie_page2->crycb;
Tony Krowiak45c9b472015-01-13 11:33:26 -05002363 kvm_s390_set_crycb_format(kvm);
Tony Krowiak5102ee82014-06-27 14:46:01 -04002364
Tony Krowiake585b242018-09-25 19:16:18 -04002365 if (!test_kvm_facility(kvm, 76))
2366 return;
2367
Tony Krowiaked6f76b2015-02-24 14:06:57 -05002368 /* Enable AES/DEA protected key functions by default */
2369 kvm->arch.crypto.aes_kw = 1;
2370 kvm->arch.crypto.dea_kw = 1;
2371 get_random_bytes(kvm->arch.crypto.crycb->aes_wrapping_key_mask,
2372 sizeof(kvm->arch.crypto.crycb->aes_wrapping_key_mask));
2373 get_random_bytes(kvm->arch.crypto.crycb->dea_wrapping_key_mask,
2374 sizeof(kvm->arch.crypto.crycb->dea_wrapping_key_mask));
Tony Krowiak5102ee82014-06-27 14:46:01 -04002375}
2376
Eugene (jno) Dvurechenski7d43bafcf2015-04-22 17:09:44 +02002377static void sca_dispose(struct kvm *kvm)
2378{
2379 if (kvm->arch.use_esca)
Eugene (jno) Dvurechenski5e044312015-04-22 18:08:39 +02002380 free_pages_exact(kvm->arch.sca, sizeof(struct esca_block));
Eugene (jno) Dvurechenski7d43bafcf2015-04-22 17:09:44 +02002381 else
2382 free_page((unsigned long)(kvm->arch.sca));
2383 kvm->arch.sca = NULL;
2384}
2385
Carsten Ottee08b9632012-01-04 10:25:20 +01002386int kvm_arch_init_vm(struct kvm *kvm, unsigned long type)
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002387{
David Hildenbrand76a6dd72015-11-24 13:33:49 +01002388 gfp_t alloc_flags = GFP_KERNEL;
Michael Mueller9d8d5782015-02-02 15:42:51 +01002389 int i, rc;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002390 char debug_name[16];
Christian Borntraegerf6c137f2014-03-19 11:18:29 +01002391 static unsigned long sca_offset;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002392
Carsten Ottee08b9632012-01-04 10:25:20 +01002393 rc = -EINVAL;
2394#ifdef CONFIG_KVM_S390_UCONTROL
2395 if (type & ~KVM_VM_S390_UCONTROL)
2396 goto out_err;
2397 if ((type & KVM_VM_S390_UCONTROL) && (!capable(CAP_SYS_ADMIN)))
2398 goto out_err;
2399#else
2400 if (type)
2401 goto out_err;
2402#endif
2403
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002404 rc = s390_enable_sie();
2405 if (rc)
Jan Kiszkad89f5ef2010-11-09 17:02:49 +01002406 goto out_err;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002407
Carsten Otteb2904112011-10-18 12:27:13 +02002408 rc = -ENOMEM;
2409
David Hildenbrand76a6dd72015-11-24 13:33:49 +01002410 if (!sclp.has_64bscao)
2411 alloc_flags |= GFP_DMA;
Eugene (jno) Dvurechenski5e044312015-04-22 18:08:39 +02002412 rwlock_init(&kvm->arch.sca_lock);
David Hildenbrand9ac96d72018-04-27 14:36:12 +02002413 /* start with basic SCA */
David Hildenbrand76a6dd72015-11-24 13:33:49 +01002414 kvm->arch.sca = (struct bsca_block *) get_zeroed_page(alloc_flags);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002415 if (!kvm->arch.sca)
Jan Kiszkad89f5ef2010-11-09 17:02:49 +01002416 goto out_err;
Christian Borntraegerf6c137f2014-03-19 11:18:29 +01002417 spin_lock(&kvm_lock);
David Hildenbrandc5c2c392015-10-26 08:41:29 +01002418 sca_offset += 16;
Eugene (jno) Dvurechenskibc784cc2015-04-23 16:09:06 +02002419 if (sca_offset + sizeof(struct bsca_block) > PAGE_SIZE)
David Hildenbrandc5c2c392015-10-26 08:41:29 +01002420 sca_offset = 0;
Eugene (jno) Dvurechenskibc784cc2015-04-23 16:09:06 +02002421 kvm->arch.sca = (struct bsca_block *)
2422 ((char *) kvm->arch.sca + sca_offset);
Christian Borntraegerf6c137f2014-03-19 11:18:29 +01002423 spin_unlock(&kvm_lock);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002424
2425 sprintf(debug_name, "kvm-%u", current->pid);
2426
Christian Borntraeger1cb9cf72015-07-20 15:04:48 +02002427 kvm->arch.dbf = debug_register(debug_name, 32, 1, 7 * sizeof(long));
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002428 if (!kvm->arch.dbf)
Dominik Dingel40f5b732015-03-12 13:55:53 +01002429 goto out_err;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002430
Michael Mueller19114be2017-05-30 14:26:02 +02002431 BUILD_BUG_ON(sizeof(struct sie_page2) != 4096);
David Hildenbrandc54f0d62015-12-02 08:53:52 +01002432 kvm->arch.sie_page2 =
2433 (struct sie_page2 *) get_zeroed_page(GFP_KERNEL | GFP_DMA);
2434 if (!kvm->arch.sie_page2)
Dominik Dingel40f5b732015-03-12 13:55:53 +01002435 goto out_err;
Michael Mueller9d8d5782015-02-02 15:42:51 +01002436
Michael Mueller25c84db2019-01-31 09:52:41 +01002437 kvm->arch.sie_page2->kvm = kvm;
David Hildenbrandc54f0d62015-12-02 08:53:52 +01002438 kvm->arch.model.fac_list = kvm->arch.sie_page2->fac_list;
Christian Borntraegerc3b9e3e2018-02-09 16:26:29 +00002439
2440 for (i = 0; i < kvm_s390_fac_size(); i++) {
2441 kvm->arch.model.fac_mask[i] = S390_lowcore.stfle_fac_list[i] &
2442 (kvm_s390_fac_base[i] |
2443 kvm_s390_fac_ext[i]);
2444 kvm->arch.model.fac_list[i] = S390_lowcore.stfle_fac_list[i] &
2445 kvm_s390_fac_base[i];
2446 }
Christian Borntraeger346fa2f2019-02-18 07:48:25 -05002447 kvm->arch.model.subfuncs = kvm_s390_available_subfunc;
Michael Mueller981467c2015-02-24 13:51:04 +01002448
David Hildenbrand19352222017-08-29 16:31:08 +02002449 /* we are always in czam mode - even on pre z14 machines */
2450 set_kvm_facility(kvm->arch.model.fac_mask, 138);
2451 set_kvm_facility(kvm->arch.model.fac_list, 138);
2452 /* we emulate STHYI in kvm */
Janosch Frank95ca2cb2016-05-23 15:11:58 +02002453 set_kvm_facility(kvm->arch.model.fac_mask, 74);
2454 set_kvm_facility(kvm->arch.model.fac_list, 74);
Claudio Imbrenda1bab1c02016-08-29 15:56:55 +02002455 if (MACHINE_HAS_TLB_GUEST) {
2456 set_kvm_facility(kvm->arch.model.fac_mask, 147);
2457 set_kvm_facility(kvm->arch.model.fac_list, 147);
2458 }
Janosch Frank95ca2cb2016-05-23 15:11:58 +02002459
David Hildenbrand9bb0ec02016-04-04 14:27:51 +02002460 kvm->arch.model.cpuid = kvm_s390_get_initial_cpuid();
David Hildenbrand37c5f6c2015-05-06 13:18:59 +02002461 kvm->arch.model.ibc = sclp.ibc & 0x0fff;
Michael Mueller9d8d5782015-02-02 15:42:51 +01002462
David Hildenbrandc54f0d62015-12-02 08:53:52 +01002463 kvm_s390_crypto_init(kvm);
Tony Krowiak5102ee82014-06-27 14:46:01 -04002464
Fei Li51978392017-02-17 17:06:26 +08002465 mutex_init(&kvm->arch.float_int.ais_lock);
Carsten Otteba5c1e92008-03-25 18:47:26 +01002466 spin_lock_init(&kvm->arch.float_int.lock);
Jens Freimann6d3da242013-07-03 15:18:35 +02002467 for (i = 0; i < FIRQ_LIST_COUNT; i++)
2468 INIT_LIST_HEAD(&kvm->arch.float_int.lists[i]);
Heiko Carstens8a2422342014-01-10 14:33:28 +01002469 init_waitqueue_head(&kvm->arch.ipte_wq);
Thomas Hutha6b7e452014-10-01 14:48:42 +02002470 mutex_init(&kvm->arch.ipte_mutex);
Carsten Otteba5c1e92008-03-25 18:47:26 +01002471
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002472 debug_register_view(kvm->arch.dbf, &debug_sprintf_view);
Christian Borntraeger78f26132015-07-22 15:50:58 +02002473 VM_EVENT(kvm, 3, "vm created with type %lu", type);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002474
Carsten Ottee08b9632012-01-04 10:25:20 +01002475 if (type & KVM_VM_S390_UCONTROL) {
2476 kvm->arch.gmap = NULL;
Dominik Dingela3a92c32014-12-01 17:24:42 +01002477 kvm->arch.mem_limit = KVM_S390_NO_MEM_LIMIT;
Carsten Ottee08b9632012-01-04 10:25:20 +01002478 } else {
Guenther Hutzl32e6b232014-12-01 17:24:42 +01002479 if (sclp.hamax == U64_MAX)
Martin Schwidefskyee71d162017-04-20 14:43:51 +02002480 kvm->arch.mem_limit = TASK_SIZE_MAX;
Guenther Hutzl32e6b232014-12-01 17:24:42 +01002481 else
Martin Schwidefskyee71d162017-04-20 14:43:51 +02002482 kvm->arch.mem_limit = min_t(unsigned long, TASK_SIZE_MAX,
Guenther Hutzl32e6b232014-12-01 17:24:42 +01002483 sclp.hamax + 1);
Martin Schwidefsky6ea427b2016-03-08 11:55:04 +01002484 kvm->arch.gmap = gmap_create(current->mm, kvm->arch.mem_limit - 1);
Carsten Ottee08b9632012-01-04 10:25:20 +01002485 if (!kvm->arch.gmap)
Dominik Dingel40f5b732015-03-12 13:55:53 +01002486 goto out_err;
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02002487 kvm->arch.gmap->private = kvm;
Dominik Dingel24eb3a82013-06-17 16:25:18 +02002488 kvm->arch.gmap->pfault_enabled = 0;
Carsten Ottee08b9632012-01-04 10:25:20 +01002489 }
Cornelia Huckfa6b7fe2012-12-20 15:32:12 +01002490
Janosch Frankc9f0a2b2018-02-16 12:16:14 +01002491 kvm->arch.use_pfmfi = sclp.has_pfmfi;
Janosch Frank55531b72018-02-15 16:33:47 +01002492 kvm->arch.use_skf = sclp.has_skey;
David Hildenbrand8ad35752014-03-14 11:00:21 +01002493 spin_lock_init(&kvm->arch.start_stop_lock);
David Hildenbranda3508fb2015-07-08 13:19:48 +02002494 kvm_s390_vsie_init(kvm);
Michael Muellerd7c5cb02017-06-12 14:15:19 +02002495 kvm_s390_gisa_init(kvm);
Christian Borntraeger8335713a2015-12-08 16:55:27 +01002496 KVM_EVENT(3, "vm 0x%pK created by pid %u", kvm, current->pid);
David Hildenbrand8ad35752014-03-14 11:00:21 +01002497
Jan Kiszkad89f5ef2010-11-09 17:02:49 +01002498 return 0;
Jan Kiszkad89f5ef2010-11-09 17:02:49 +01002499out_err:
David Hildenbrandc54f0d62015-12-02 08:53:52 +01002500 free_page((unsigned long)kvm->arch.sie_page2);
Dominik Dingel40f5b732015-03-12 13:55:53 +01002501 debug_unregister(kvm->arch.dbf);
Eugene (jno) Dvurechenski7d43bafcf2015-04-22 17:09:44 +02002502 sca_dispose(kvm);
Christian Borntraeger78f26132015-07-22 15:50:58 +02002503 KVM_EVENT(3, "creation of vm failed: %d", rc);
Jan Kiszkad89f5ef2010-11-09 17:02:49 +01002504 return rc;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002505}
2506
Luiz Capitulino235539b2016-09-07 14:47:23 -04002507bool kvm_arch_has_vcpu_debugfs(void)
2508{
2509 return false;
2510}
2511
2512int kvm_arch_create_vcpu_debugfs(struct kvm_vcpu *vcpu)
2513{
2514 return 0;
2515}
2516
Christian Borntraegerd329c032008-11-26 14:50:27 +01002517void kvm_arch_vcpu_destroy(struct kvm_vcpu *vcpu)
2518{
2519 VCPU_EVENT(vcpu, 3, "%s", "free cpu");
Cornelia Huckade38c32012-07-23 17:20:30 +02002520 trace_kvm_s390_destroy_vcpu(vcpu->vcpu_id);
Christian Borntraeger67335e62014-03-25 17:09:08 +01002521 kvm_s390_clear_local_irqs(vcpu);
Dominik Dingel3c038e62013-10-07 17:11:48 +02002522 kvm_clear_async_pf_completion_queue(vcpu);
Eugene (jno) Dvurechenskibc784cc2015-04-23 16:09:06 +02002523 if (!kvm_is_ucontrol(vcpu->kvm))
Eugene (jno) Dvurechenskia6e2f682015-04-21 15:31:59 +02002524 sca_del_vcpu(vcpu);
Carsten Otte27e03932012-01-04 10:25:21 +01002525
2526 if (kvm_is_ucontrol(vcpu->kvm))
Martin Schwidefsky6ea427b2016-03-08 11:55:04 +01002527 gmap_remove(vcpu->arch.gmap);
Carsten Otte27e03932012-01-04 10:25:21 +01002528
Dominik Dingele6db1d62015-05-07 15:41:57 +02002529 if (vcpu->kvm->arch.use_cmma)
Dominik Dingelb31605c2014-03-25 13:47:11 +01002530 kvm_s390_vcpu_unsetup_cmma(vcpu);
Christian Borntraegerd329c032008-11-26 14:50:27 +01002531 free_page((unsigned long)(vcpu->arch.sie_block));
Konstantin Weitzb31288f2013-04-17 17:36:29 +02002532
Christian Borntraeger6692cef2008-11-26 14:51:08 +01002533 kvm_vcpu_uninit(vcpu);
Michael Muellerb110fea2013-06-12 13:54:54 +02002534 kmem_cache_free(kvm_vcpu_cache, vcpu);
Christian Borntraegerd329c032008-11-26 14:50:27 +01002535}
2536
2537static void kvm_free_vcpus(struct kvm *kvm)
2538{
2539 unsigned int i;
Gleb Natapov988a2ca2009-06-09 15:56:29 +03002540 struct kvm_vcpu *vcpu;
Christian Borntraegerd329c032008-11-26 14:50:27 +01002541
Gleb Natapov988a2ca2009-06-09 15:56:29 +03002542 kvm_for_each_vcpu(i, vcpu, kvm)
2543 kvm_arch_vcpu_destroy(vcpu);
2544
2545 mutex_lock(&kvm->lock);
2546 for (i = 0; i < atomic_read(&kvm->online_vcpus); i++)
2547 kvm->vcpus[i] = NULL;
2548
2549 atomic_set(&kvm->online_vcpus, 0);
2550 mutex_unlock(&kvm->lock);
Christian Borntraegerd329c032008-11-26 14:50:27 +01002551}
2552
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002553void kvm_arch_destroy_vm(struct kvm *kvm)
2554{
Christian Borntraegerd329c032008-11-26 14:50:27 +01002555 kvm_free_vcpus(kvm);
Eugene (jno) Dvurechenski7d43bafcf2015-04-22 17:09:44 +02002556 sca_dispose(kvm);
Christian Borntraegerd329c032008-11-26 14:50:27 +01002557 debug_unregister(kvm->arch.dbf);
Michael Muellerd7c5cb02017-06-12 14:15:19 +02002558 kvm_s390_gisa_destroy(kvm);
David Hildenbrandc54f0d62015-12-02 08:53:52 +01002559 free_page((unsigned long)kvm->arch.sie_page2);
Carsten Otte27e03932012-01-04 10:25:21 +01002560 if (!kvm_is_ucontrol(kvm))
Martin Schwidefsky6ea427b2016-03-08 11:55:04 +01002561 gmap_remove(kvm->arch.gmap);
Cornelia Huck841b91c2013-07-15 13:36:01 +02002562 kvm_s390_destroy_adapters(kvm);
Christian Borntraeger67335e62014-03-25 17:09:08 +01002563 kvm_s390_clear_float_irqs(kvm);
David Hildenbranda3508fb2015-07-08 13:19:48 +02002564 kvm_s390_vsie_destroy(kvm);
Christian Borntraeger8335713a2015-12-08 16:55:27 +01002565 KVM_EVENT(3, "vm 0x%pK destroyed", kvm);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002566}
2567
2568/* Section: vcpu related */
Dominik Dingeldafd0322014-12-02 16:53:21 +01002569static int __kvm_ucontrol_vcpu_init(struct kvm_vcpu *vcpu)
2570{
Martin Schwidefsky6ea427b2016-03-08 11:55:04 +01002571 vcpu->arch.gmap = gmap_create(current->mm, -1UL);
Dominik Dingeldafd0322014-12-02 16:53:21 +01002572 if (!vcpu->arch.gmap)
2573 return -ENOMEM;
2574 vcpu->arch.gmap->private = vcpu->kvm;
2575
2576 return 0;
2577}
2578
Eugene (jno) Dvurechenskia6e2f682015-04-21 15:31:59 +02002579static void sca_del_vcpu(struct kvm_vcpu *vcpu)
2580{
David Hildenbranda6940672016-08-08 22:39:32 +02002581 if (!kvm_s390_use_sca_entries())
2582 return;
Eugene (jno) Dvurechenski5e044312015-04-22 18:08:39 +02002583 read_lock(&vcpu->kvm->arch.sca_lock);
Eugene (jno) Dvurechenski7d43bafcf2015-04-22 17:09:44 +02002584 if (vcpu->kvm->arch.use_esca) {
2585 struct esca_block *sca = vcpu->kvm->arch.sca;
Eugene (jno) Dvurechenskia6e2f682015-04-21 15:31:59 +02002586
Eugene (jno) Dvurechenski7d43bafcf2015-04-22 17:09:44 +02002587 clear_bit_inv(vcpu->vcpu_id, (unsigned long *) sca->mcn);
David Hildenbrand10ce32d2015-10-12 12:41:41 +02002588 sca->cpu[vcpu->vcpu_id].sda = 0;
Eugene (jno) Dvurechenski7d43bafcf2015-04-22 17:09:44 +02002589 } else {
2590 struct bsca_block *sca = vcpu->kvm->arch.sca;
2591
2592 clear_bit_inv(vcpu->vcpu_id, (unsigned long *) &sca->mcn);
David Hildenbrand10ce32d2015-10-12 12:41:41 +02002593 sca->cpu[vcpu->vcpu_id].sda = 0;
Eugene (jno) Dvurechenski7d43bafcf2015-04-22 17:09:44 +02002594 }
Eugene (jno) Dvurechenski5e044312015-04-22 18:08:39 +02002595 read_unlock(&vcpu->kvm->arch.sca_lock);
Eugene (jno) Dvurechenskia6e2f682015-04-21 15:31:59 +02002596}
2597
David Hildenbrandeaa78f32015-10-12 16:29:01 +02002598static void sca_add_vcpu(struct kvm_vcpu *vcpu)
Eugene (jno) Dvurechenskia6e2f682015-04-21 15:31:59 +02002599{
David Hildenbranda6940672016-08-08 22:39:32 +02002600 if (!kvm_s390_use_sca_entries()) {
2601 struct bsca_block *sca = vcpu->kvm->arch.sca;
2602
2603 /* we still need the basic sca for the ipte control */
2604 vcpu->arch.sie_block->scaoh = (__u32)(((__u64)sca) >> 32);
2605 vcpu->arch.sie_block->scaol = (__u32)(__u64)sca;
David Hildenbrandf07afa02018-03-06 14:27:58 +01002606 return;
David Hildenbranda6940672016-08-08 22:39:32 +02002607 }
David Hildenbrandeaa78f32015-10-12 16:29:01 +02002608 read_lock(&vcpu->kvm->arch.sca_lock);
2609 if (vcpu->kvm->arch.use_esca) {
2610 struct esca_block *sca = vcpu->kvm->arch.sca;
Eugene (jno) Dvurechenskia6e2f682015-04-21 15:31:59 +02002611
David Hildenbrandeaa78f32015-10-12 16:29:01 +02002612 sca->cpu[vcpu->vcpu_id].sda = (__u64) vcpu->arch.sie_block;
Eugene (jno) Dvurechenski7d43bafcf2015-04-22 17:09:44 +02002613 vcpu->arch.sie_block->scaoh = (__u32)(((__u64)sca) >> 32);
2614 vcpu->arch.sie_block->scaol = (__u32)(__u64)sca & ~0x3fU;
David Hildenbrand0c9d8682017-03-13 11:48:28 +01002615 vcpu->arch.sie_block->ecb2 |= ECB2_ESCA;
David Hildenbrandeaa78f32015-10-12 16:29:01 +02002616 set_bit_inv(vcpu->vcpu_id, (unsigned long *) sca->mcn);
Eugene (jno) Dvurechenski7d43bafcf2015-04-22 17:09:44 +02002617 } else {
David Hildenbrandeaa78f32015-10-12 16:29:01 +02002618 struct bsca_block *sca = vcpu->kvm->arch.sca;
Eugene (jno) Dvurechenski7d43bafcf2015-04-22 17:09:44 +02002619
David Hildenbrandeaa78f32015-10-12 16:29:01 +02002620 sca->cpu[vcpu->vcpu_id].sda = (__u64) vcpu->arch.sie_block;
Eugene (jno) Dvurechenski7d43bafcf2015-04-22 17:09:44 +02002621 vcpu->arch.sie_block->scaoh = (__u32)(((__u64)sca) >> 32);
2622 vcpu->arch.sie_block->scaol = (__u32)(__u64)sca;
David Hildenbrandeaa78f32015-10-12 16:29:01 +02002623 set_bit_inv(vcpu->vcpu_id, (unsigned long *) &sca->mcn);
Eugene (jno) Dvurechenski7d43bafcf2015-04-22 17:09:44 +02002624 }
David Hildenbrandeaa78f32015-10-12 16:29:01 +02002625 read_unlock(&vcpu->kvm->arch.sca_lock);
Eugene (jno) Dvurechenski5e044312015-04-22 18:08:39 +02002626}
2627
2628/* Basic SCA to Extended SCA data copy routines */
2629static inline void sca_copy_entry(struct esca_entry *d, struct bsca_entry *s)
2630{
2631 d->sda = s->sda;
2632 d->sigp_ctrl.c = s->sigp_ctrl.c;
2633 d->sigp_ctrl.scn = s->sigp_ctrl.scn;
2634}
2635
2636static void sca_copy_b_to_e(struct esca_block *d, struct bsca_block *s)
2637{
2638 int i;
2639
2640 d->ipte_control = s->ipte_control;
2641 d->mcn[0] = s->mcn;
2642 for (i = 0; i < KVM_S390_BSCA_CPU_SLOTS; i++)
2643 sca_copy_entry(&d->cpu[i], &s->cpu[i]);
2644}
2645
2646static int sca_switch_to_extended(struct kvm *kvm)
2647{
2648 struct bsca_block *old_sca = kvm->arch.sca;
2649 struct esca_block *new_sca;
2650 struct kvm_vcpu *vcpu;
2651 unsigned int vcpu_idx;
2652 u32 scaol, scaoh;
2653
2654 new_sca = alloc_pages_exact(sizeof(*new_sca), GFP_KERNEL|__GFP_ZERO);
2655 if (!new_sca)
2656 return -ENOMEM;
2657
2658 scaoh = (u32)((u64)(new_sca) >> 32);
2659 scaol = (u32)(u64)(new_sca) & ~0x3fU;
2660
2661 kvm_s390_vcpu_block_all(kvm);
2662 write_lock(&kvm->arch.sca_lock);
2663
2664 sca_copy_b_to_e(new_sca, old_sca);
2665
2666 kvm_for_each_vcpu(vcpu_idx, vcpu, kvm) {
2667 vcpu->arch.sie_block->scaoh = scaoh;
2668 vcpu->arch.sie_block->scaol = scaol;
David Hildenbrand0c9d8682017-03-13 11:48:28 +01002669 vcpu->arch.sie_block->ecb2 |= ECB2_ESCA;
Eugene (jno) Dvurechenski5e044312015-04-22 18:08:39 +02002670 }
2671 kvm->arch.sca = new_sca;
2672 kvm->arch.use_esca = 1;
2673
2674 write_unlock(&kvm->arch.sca_lock);
2675 kvm_s390_vcpu_unblock_all(kvm);
2676
2677 free_page((unsigned long)old_sca);
2678
Christian Borntraeger8335713a2015-12-08 16:55:27 +01002679 VM_EVENT(kvm, 2, "Switched to ESCA (0x%pK -> 0x%pK)",
2680 old_sca, kvm->arch.sca);
Eugene (jno) Dvurechenski5e044312015-04-22 18:08:39 +02002681 return 0;
Eugene (jno) Dvurechenskia6e2f682015-04-21 15:31:59 +02002682}
2683
2684static int sca_can_add_vcpu(struct kvm *kvm, unsigned int id)
2685{
Eugene (jno) Dvurechenski5e044312015-04-22 18:08:39 +02002686 int rc;
2687
David Hildenbranda6940672016-08-08 22:39:32 +02002688 if (!kvm_s390_use_sca_entries()) {
2689 if (id < KVM_MAX_VCPUS)
2690 return true;
2691 return false;
2692 }
Eugene (jno) Dvurechenski5e044312015-04-22 18:08:39 +02002693 if (id < KVM_S390_BSCA_CPU_SLOTS)
2694 return true;
David Hildenbrand76a6dd72015-11-24 13:33:49 +01002695 if (!sclp.has_esca || !sclp.has_64bscao)
Eugene (jno) Dvurechenski5e044312015-04-22 18:08:39 +02002696 return false;
2697
2698 mutex_lock(&kvm->lock);
2699 rc = kvm->arch.use_esca ? 0 : sca_switch_to_extended(kvm);
2700 mutex_unlock(&kvm->lock);
2701
2702 return rc == 0 && id < KVM_S390_ESCA_CPU_SLOTS;
Eugene (jno) Dvurechenskia6e2f682015-04-21 15:31:59 +02002703}
2704
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002705int kvm_arch_vcpu_init(struct kvm_vcpu *vcpu)
2706{
Dominik Dingel3c038e62013-10-07 17:11:48 +02002707 vcpu->arch.pfault_token = KVM_S390_PFAULT_TOKEN_INVALID;
2708 kvm_clear_async_pf_completion_queue(vcpu);
Christian Borntraeger59674c12012-01-11 11:20:33 +01002709 vcpu->run->kvm_valid_regs = KVM_SYNC_PREFIX |
2710 KVM_SYNC_GPRS |
Christian Borntraeger9eed07352012-02-06 10:59:07 +01002711 KVM_SYNC_ACRS |
David Hildenbrandb028ee32014-07-17 10:47:43 +02002712 KVM_SYNC_CRS |
2713 KVM_SYNC_ARCH0 |
2714 KVM_SYNC_PFAULT;
Julius Niedworok75a46152016-08-03 16:39:54 +02002715 kvm_s390_set_prefix(vcpu, 0);
Fan Zhangc6e5f162016-01-07 18:24:29 +08002716 if (test_kvm_facility(vcpu->kvm, 64))
2717 vcpu->run->kvm_valid_regs |= KVM_SYNC_RICCB;
Christian Borntraeger35b3fde2018-01-17 14:44:34 +01002718 if (test_kvm_facility(vcpu->kvm, 82))
2719 vcpu->run->kvm_valid_regs |= KVM_SYNC_BPBC;
Fan Zhang4e0b1ab2016-11-29 07:17:55 +01002720 if (test_kvm_facility(vcpu->kvm, 133))
2721 vcpu->run->kvm_valid_regs |= KVM_SYNC_GSCB;
Christian Borntraegera3da7b42018-03-08 16:08:49 +00002722 if (test_kvm_facility(vcpu->kvm, 156))
2723 vcpu->run->kvm_valid_regs |= KVM_SYNC_ETOKEN;
David Hildenbrandf6aa6dc2016-01-15 14:11:46 +01002724 /* fprs can be synchronized via vrs, even if the guest has no vx. With
2725 * MACHINE_HAS_VX, (load|store)_fpu_regs() will work with vrs format.
2726 */
2727 if (MACHINE_HAS_VX)
Eric Farman68c55752014-06-09 10:57:26 -04002728 vcpu->run->kvm_valid_regs |= KVM_SYNC_VRS;
David Hildenbrand6fd8e672016-01-18 14:46:34 +01002729 else
2730 vcpu->run->kvm_valid_regs |= KVM_SYNC_FPRS;
Dominik Dingeldafd0322014-12-02 16:53:21 +01002731
2732 if (kvm_is_ucontrol(vcpu->kvm))
2733 return __kvm_ucontrol_vcpu_init(vcpu);
2734
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002735 return 0;
2736}
2737
David Hildenbranddb0758b2016-02-15 09:42:25 +01002738/* needs disabled preemption to protect from TOD sync and vcpu_load/put */
2739static void __start_cpu_timer_accounting(struct kvm_vcpu *vcpu)
2740{
2741 WARN_ON_ONCE(vcpu->arch.cputm_start != 0);
David Hildenbrand9c23a132016-02-17 21:53:33 +01002742 raw_write_seqcount_begin(&vcpu->arch.cputm_seqcount);
David Hildenbranddb0758b2016-02-15 09:42:25 +01002743 vcpu->arch.cputm_start = get_tod_clock_fast();
David Hildenbrand9c23a132016-02-17 21:53:33 +01002744 raw_write_seqcount_end(&vcpu->arch.cputm_seqcount);
David Hildenbranddb0758b2016-02-15 09:42:25 +01002745}
2746
2747/* needs disabled preemption to protect from TOD sync and vcpu_load/put */
2748static void __stop_cpu_timer_accounting(struct kvm_vcpu *vcpu)
2749{
2750 WARN_ON_ONCE(vcpu->arch.cputm_start == 0);
David Hildenbrand9c23a132016-02-17 21:53:33 +01002751 raw_write_seqcount_begin(&vcpu->arch.cputm_seqcount);
David Hildenbranddb0758b2016-02-15 09:42:25 +01002752 vcpu->arch.sie_block->cputm -= get_tod_clock_fast() - vcpu->arch.cputm_start;
2753 vcpu->arch.cputm_start = 0;
David Hildenbrand9c23a132016-02-17 21:53:33 +01002754 raw_write_seqcount_end(&vcpu->arch.cputm_seqcount);
David Hildenbranddb0758b2016-02-15 09:42:25 +01002755}
2756
2757/* needs disabled preemption to protect from TOD sync and vcpu_load/put */
2758static void __enable_cpu_timer_accounting(struct kvm_vcpu *vcpu)
2759{
2760 WARN_ON_ONCE(vcpu->arch.cputm_enabled);
2761 vcpu->arch.cputm_enabled = true;
2762 __start_cpu_timer_accounting(vcpu);
2763}
2764
2765/* needs disabled preemption to protect from TOD sync and vcpu_load/put */
2766static void __disable_cpu_timer_accounting(struct kvm_vcpu *vcpu)
2767{
2768 WARN_ON_ONCE(!vcpu->arch.cputm_enabled);
2769 __stop_cpu_timer_accounting(vcpu);
2770 vcpu->arch.cputm_enabled = false;
2771}
2772
2773static void enable_cpu_timer_accounting(struct kvm_vcpu *vcpu)
2774{
2775 preempt_disable(); /* protect from TOD sync and vcpu_load/put */
2776 __enable_cpu_timer_accounting(vcpu);
2777 preempt_enable();
2778}
2779
2780static void disable_cpu_timer_accounting(struct kvm_vcpu *vcpu)
2781{
2782 preempt_disable(); /* protect from TOD sync and vcpu_load/put */
2783 __disable_cpu_timer_accounting(vcpu);
2784 preempt_enable();
2785}
2786
David Hildenbrand4287f242016-02-15 09:40:12 +01002787/* set the cpu timer - may only be called from the VCPU thread itself */
2788void kvm_s390_set_cpu_timer(struct kvm_vcpu *vcpu, __u64 cputm)
2789{
David Hildenbranddb0758b2016-02-15 09:42:25 +01002790 preempt_disable(); /* protect from TOD sync and vcpu_load/put */
David Hildenbrand9c23a132016-02-17 21:53:33 +01002791 raw_write_seqcount_begin(&vcpu->arch.cputm_seqcount);
David Hildenbranddb0758b2016-02-15 09:42:25 +01002792 if (vcpu->arch.cputm_enabled)
2793 vcpu->arch.cputm_start = get_tod_clock_fast();
David Hildenbrand4287f242016-02-15 09:40:12 +01002794 vcpu->arch.sie_block->cputm = cputm;
David Hildenbrand9c23a132016-02-17 21:53:33 +01002795 raw_write_seqcount_end(&vcpu->arch.cputm_seqcount);
David Hildenbranddb0758b2016-02-15 09:42:25 +01002796 preempt_enable();
David Hildenbrand4287f242016-02-15 09:40:12 +01002797}
2798
David Hildenbranddb0758b2016-02-15 09:42:25 +01002799/* update and get the cpu timer - can also be called from other VCPU threads */
David Hildenbrand4287f242016-02-15 09:40:12 +01002800__u64 kvm_s390_get_cpu_timer(struct kvm_vcpu *vcpu)
2801{
David Hildenbrand9c23a132016-02-17 21:53:33 +01002802 unsigned int seq;
David Hildenbranddb0758b2016-02-15 09:42:25 +01002803 __u64 value;
David Hildenbranddb0758b2016-02-15 09:42:25 +01002804
2805 if (unlikely(!vcpu->arch.cputm_enabled))
2806 return vcpu->arch.sie_block->cputm;
2807
David Hildenbrand9c23a132016-02-17 21:53:33 +01002808 preempt_disable(); /* protect from TOD sync and vcpu_load/put */
2809 do {
2810 seq = raw_read_seqcount(&vcpu->arch.cputm_seqcount);
2811 /*
2812 * If the writer would ever execute a read in the critical
2813 * section, e.g. in irq context, we have a deadlock.
2814 */
2815 WARN_ON_ONCE((seq & 1) && smp_processor_id() == vcpu->cpu);
2816 value = vcpu->arch.sie_block->cputm;
2817 /* if cputm_start is 0, accounting is being started/stopped */
2818 if (likely(vcpu->arch.cputm_start))
2819 value -= get_tod_clock_fast() - vcpu->arch.cputm_start;
2820 } while (read_seqcount_retry(&vcpu->arch.cputm_seqcount, seq & ~1));
2821 preempt_enable();
David Hildenbranddb0758b2016-02-15 09:42:25 +01002822 return value;
David Hildenbrand4287f242016-02-15 09:40:12 +01002823}
2824
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002825void kvm_arch_vcpu_load(struct kvm_vcpu *vcpu, int cpu)
2826{
Hendrik Brueckner9977e882015-06-10 12:53:42 +02002827
David Hildenbrand37d9df92015-03-11 16:47:33 +01002828 gmap_enable(vcpu->arch.enabled_gmap);
David Hildenbrandef8f4f42018-01-23 18:05:29 +01002829 kvm_s390_set_cpuflags(vcpu, CPUSTAT_RUNNING);
David Hildenbrand5ebda312016-02-22 13:52:27 +01002830 if (vcpu->arch.cputm_enabled && !is_vcpu_idle(vcpu))
David Hildenbranddb0758b2016-02-15 09:42:25 +01002831 __start_cpu_timer_accounting(vcpu);
David Hildenbrand01a745a2016-02-12 20:41:56 +01002832 vcpu->cpu = cpu;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002833}
2834
2835void kvm_arch_vcpu_put(struct kvm_vcpu *vcpu)
2836{
David Hildenbrand01a745a2016-02-12 20:41:56 +01002837 vcpu->cpu = -1;
David Hildenbrand5ebda312016-02-22 13:52:27 +01002838 if (vcpu->arch.cputm_enabled && !is_vcpu_idle(vcpu))
David Hildenbranddb0758b2016-02-15 09:42:25 +01002839 __stop_cpu_timer_accounting(vcpu);
David Hildenbrand9daecfc2018-01-23 18:05:30 +01002840 kvm_s390_clear_cpuflags(vcpu, CPUSTAT_RUNNING);
David Hildenbrand37d9df92015-03-11 16:47:33 +01002841 vcpu->arch.enabled_gmap = gmap_get_enabled();
2842 gmap_disable(vcpu->arch.enabled_gmap);
Hendrik Brueckner9977e882015-06-10 12:53:42 +02002843
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002844}
2845
2846static void kvm_s390_vcpu_initial_reset(struct kvm_vcpu *vcpu)
2847{
2848 /* this equals initial cpu reset in pop, but we don't switch to ESA */
2849 vcpu->arch.sie_block->gpsw.mask = 0UL;
2850 vcpu->arch.sie_block->gpsw.addr = 0UL;
Christian Borntraeger8d26cf72012-01-11 11:19:32 +01002851 kvm_s390_set_prefix(vcpu, 0);
David Hildenbrand4287f242016-02-15 09:40:12 +01002852 kvm_s390_set_cpu_timer(vcpu, 0);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002853 vcpu->arch.sie_block->ckc = 0UL;
2854 vcpu->arch.sie_block->todpr = 0;
2855 memset(vcpu->arch.sie_block->gcr, 0, 16 * sizeof(__u64));
David Hildenbrandb9224cd2018-04-30 17:55:24 +02002856 vcpu->arch.sie_block->gcr[0] = CR0_UNUSED_56 |
2857 CR0_INTERRUPT_KEY_SUBMASK |
2858 CR0_MEASUREMENT_ALERT_SUBMASK;
2859 vcpu->arch.sie_block->gcr[14] = CR14_UNUSED_32 |
2860 CR14_UNUSED_33 |
2861 CR14_EXTERNAL_DAMAGE_SUBMASK;
David Hildenbrand9abc2a02016-01-14 22:12:47 +01002862 /* make sure the new fpc will be lazily loaded */
2863 save_fpu_regs();
2864 current->thread.fpu.fpc = 0;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002865 vcpu->arch.sie_block->gbea = 1;
Christian Borntraeger672550f2014-02-10 15:32:19 +01002866 vcpu->arch.sie_block->pp = 0;
Christian Borntraeger35b3fde2018-01-17 14:44:34 +01002867 vcpu->arch.sie_block->fpf &= ~FPF_BPBC;
Dominik Dingel3c038e62013-10-07 17:11:48 +02002868 vcpu->arch.pfault_token = KVM_S390_PFAULT_TOKEN_INVALID;
2869 kvm_clear_async_pf_completion_queue(vcpu);
David Hildenbrand6352e4d2014-04-10 17:35:00 +02002870 if (!kvm_s390_user_cpu_state_ctrl(vcpu->kvm))
2871 kvm_s390_vcpu_stop(vcpu);
Jens Freimann2ed10cc2014-02-11 13:48:07 +01002872 kvm_s390_clear_local_irqs(vcpu);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002873}
2874
Dominik Dingel31928aa2014-12-04 15:47:07 +01002875void kvm_arch_vcpu_postcreate(struct kvm_vcpu *vcpu)
Marcelo Tosatti42897d82012-11-27 23:29:02 -02002876{
Jason J. Herne72f25022014-11-25 09:46:02 -05002877 mutex_lock(&vcpu->kvm->lock);
Fan Zhangfdf03652015-05-13 10:58:41 +02002878 preempt_disable();
Jason J. Herne72f25022014-11-25 09:46:02 -05002879 vcpu->arch.sie_block->epoch = vcpu->kvm->arch.epoch;
David Hildenbrandd16b52c2018-02-07 12:46:44 +01002880 vcpu->arch.sie_block->epdx = vcpu->kvm->arch.epdx;
Fan Zhangfdf03652015-05-13 10:58:41 +02002881 preempt_enable();
Jason J. Herne72f25022014-11-25 09:46:02 -05002882 mutex_unlock(&vcpu->kvm->lock);
David Hildenbrand25508822015-10-12 16:27:23 +02002883 if (!kvm_is_ucontrol(vcpu->kvm)) {
Dominik Dingeldafd0322014-12-02 16:53:21 +01002884 vcpu->arch.gmap = vcpu->kvm->arch.gmap;
David Hildenbrandeaa78f32015-10-12 16:29:01 +02002885 sca_add_vcpu(vcpu);
David Hildenbrand25508822015-10-12 16:27:23 +02002886 }
David Hildenbrand6502a342016-06-21 14:19:51 +02002887 if (test_kvm_facility(vcpu->kvm, 74) || vcpu->kvm->arch.user_instr0)
2888 vcpu->arch.sie_block->ictl |= ICTL_OPEREXC;
David Hildenbrand37d9df92015-03-11 16:47:33 +01002889 /* make vcpu_load load the right gmap on the first trigger */
2890 vcpu->arch.enabled_gmap = vcpu->arch.gmap;
Marcelo Tosatti42897d82012-11-27 23:29:02 -02002891}
2892
Tony Krowiak5102ee82014-06-27 14:46:01 -04002893static void kvm_s390_vcpu_crypto_setup(struct kvm_vcpu *vcpu)
2894{
Tony Krowiake585b242018-09-25 19:16:18 -04002895 /*
2896 * If the AP instructions are not being interpreted and the MSAX3
2897 * facility is not configured for the guest, there is nothing to set up.
2898 */
2899 if (!vcpu->kvm->arch.crypto.apie && !test_kvm_facility(vcpu->kvm, 76))
Tony Krowiak5102ee82014-06-27 14:46:01 -04002900 return;
2901
Tony Krowiake585b242018-09-25 19:16:18 -04002902 vcpu->arch.sie_block->crycbd = vcpu->kvm->arch.crypto.crycbd;
Tony Krowiaka374e892014-09-03 10:13:53 +02002903 vcpu->arch.sie_block->ecb3 &= ~(ECB3_AES | ECB3_DEA);
Tony Krowiak37940fb2018-09-25 19:16:39 -04002904 vcpu->arch.sie_block->eca &= ~ECA_APIE;
Tony Krowiaka374e892014-09-03 10:13:53 +02002905
Tony Krowiake585b242018-09-25 19:16:18 -04002906 if (vcpu->kvm->arch.crypto.apie)
2907 vcpu->arch.sie_block->eca |= ECA_APIE;
2908
2909 /* Set up protected key support */
Tony Krowiaka374e892014-09-03 10:13:53 +02002910 if (vcpu->kvm->arch.crypto.aes_kw)
2911 vcpu->arch.sie_block->ecb3 |= ECB3_AES;
2912 if (vcpu->kvm->arch.crypto.dea_kw)
2913 vcpu->arch.sie_block->ecb3 |= ECB3_DEA;
Tony Krowiak5102ee82014-06-27 14:46:01 -04002914}
2915
Dominik Dingelb31605c2014-03-25 13:47:11 +01002916void kvm_s390_vcpu_unsetup_cmma(struct kvm_vcpu *vcpu)
2917{
2918 free_page(vcpu->arch.sie_block->cbrlo);
2919 vcpu->arch.sie_block->cbrlo = 0;
2920}
2921
2922int kvm_s390_vcpu_setup_cmma(struct kvm_vcpu *vcpu)
2923{
2924 vcpu->arch.sie_block->cbrlo = get_zeroed_page(GFP_KERNEL);
2925 if (!vcpu->arch.sie_block->cbrlo)
2926 return -ENOMEM;
Dominik Dingelb31605c2014-03-25 13:47:11 +01002927 return 0;
2928}
2929
Michael Mueller91520f12015-02-27 14:32:11 +01002930static void kvm_s390_vcpu_setup_model(struct kvm_vcpu *vcpu)
2931{
2932 struct kvm_s390_cpu_model *model = &vcpu->kvm->arch.model;
2933
Michael Mueller91520f12015-02-27 14:32:11 +01002934 vcpu->arch.sie_block->ibc = model->ibc;
David Hildenbrand80bc79d2015-12-02 09:43:29 +01002935 if (test_kvm_facility(vcpu->kvm, 7))
David Hildenbrandc54f0d62015-12-02 08:53:52 +01002936 vcpu->arch.sie_block->fac = (u32)(u64) model->fac_list;
Michael Mueller91520f12015-02-27 14:32:11 +01002937}
2938
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002939int kvm_arch_vcpu_setup(struct kvm_vcpu *vcpu)
2940{
Dominik Dingelb31605c2014-03-25 13:47:11 +01002941 int rc = 0;
Konstantin Weitzb31288f2013-04-17 17:36:29 +02002942
Cornelia Huck9e6dabe2011-11-17 11:00:41 +01002943 atomic_set(&vcpu->arch.sie_block->cpuflags, CPUSTAT_ZARCH |
2944 CPUSTAT_SM |
Guenther Hutzla4a4f192015-03-31 14:39:49 +02002945 CPUSTAT_STOPPED);
2946
Guenther Hutzl53df84f2015-02-18 11:13:03 +01002947 if (test_kvm_facility(vcpu->kvm, 78))
David Hildenbrandef8f4f42018-01-23 18:05:29 +01002948 kvm_s390_set_cpuflags(vcpu, CPUSTAT_GED2);
Guenther Hutzl53df84f2015-02-18 11:13:03 +01002949 else if (test_kvm_facility(vcpu->kvm, 8))
David Hildenbrandef8f4f42018-01-23 18:05:29 +01002950 kvm_s390_set_cpuflags(vcpu, CPUSTAT_GED);
Guenther Hutzla4a4f192015-03-31 14:39:49 +02002951
Michael Mueller91520f12015-02-27 14:32:11 +01002952 kvm_s390_vcpu_setup_model(vcpu);
2953
David Hildenbrandbdab09f2016-04-12 11:07:49 +02002954 /* pgste_set_pte has special handling for !MACHINE_HAS_ESOP */
2955 if (MACHINE_HAS_ESOP)
David Hildenbrand0c9d8682017-03-13 11:48:28 +01002956 vcpu->arch.sie_block->ecb |= ECB_HOSTPROTINT;
David Hildenbrandbd50e8e2016-03-04 12:23:55 +01002957 if (test_kvm_facility(vcpu->kvm, 9))
David Hildenbrand0c9d8682017-03-13 11:48:28 +01002958 vcpu->arch.sie_block->ecb |= ECB_SRSI;
David Hildenbrandf597d242016-04-22 16:26:49 +02002959 if (test_kvm_facility(vcpu->kvm, 73))
David Hildenbrand0c9d8682017-03-13 11:48:28 +01002960 vcpu->arch.sie_block->ecb |= ECB_TE;
Michael Mueller7feb6bb2013-06-28 13:30:24 +02002961
Janosch Frankc9f0a2b2018-02-16 12:16:14 +01002962 if (test_kvm_facility(vcpu->kvm, 8) && vcpu->kvm->arch.use_pfmfi)
David Hildenbrand0c9d8682017-03-13 11:48:28 +01002963 vcpu->arch.sie_block->ecb2 |= ECB2_PFMFI;
Janosch Frankcd1836f2016-08-04 09:57:36 +02002964 if (test_kvm_facility(vcpu->kvm, 130))
David Hildenbrand0c9d8682017-03-13 11:48:28 +01002965 vcpu->arch.sie_block->ecb2 |= ECB2_IEP;
2966 vcpu->arch.sie_block->eca = ECA_MVPGI | ECA_PROTEXCI;
David Hildenbrand48ee7d32016-04-04 15:49:34 +02002967 if (sclp.has_cei)
David Hildenbrand0c9d8682017-03-13 11:48:28 +01002968 vcpu->arch.sie_block->eca |= ECA_CEI;
David Hildenbrand11ad65b2016-04-04 15:46:26 +02002969 if (sclp.has_ib)
David Hildenbrand0c9d8682017-03-13 11:48:28 +01002970 vcpu->arch.sie_block->eca |= ECA_IB;
David Hildenbrand37c5f6c2015-05-06 13:18:59 +02002971 if (sclp.has_siif)
David Hildenbrand0c9d8682017-03-13 11:48:28 +01002972 vcpu->arch.sie_block->eca |= ECA_SII;
David Hildenbrand37c5f6c2015-05-06 13:18:59 +02002973 if (sclp.has_sigpif)
David Hildenbrand0c9d8682017-03-13 11:48:28 +01002974 vcpu->arch.sie_block->eca |= ECA_SIGPI;
Michael Mueller18280d82015-03-16 16:05:41 +01002975 if (test_kvm_facility(vcpu->kvm, 129)) {
David Hildenbrand0c9d8682017-03-13 11:48:28 +01002976 vcpu->arch.sie_block->eca |= ECA_VX;
2977 vcpu->arch.sie_block->ecd |= ECD_HOSTREGMGMT;
Eric Farman13211ea2014-04-30 13:39:46 -04002978 }
Collin L. Walling8fa16962016-07-26 15:29:44 -04002979 if (test_kvm_facility(vcpu->kvm, 139))
2980 vcpu->arch.sie_block->ecd |= ECD_MEF;
Christian Borntraegera3da7b42018-03-08 16:08:49 +00002981 if (test_kvm_facility(vcpu->kvm, 156))
2982 vcpu->arch.sie_block->ecd |= ECD_ETOKENF;
Michael Muellerd7c5cb02017-06-12 14:15:19 +02002983 if (vcpu->arch.sie_block->gd) {
2984 vcpu->arch.sie_block->eca |= ECA_AIV;
2985 VCPU_EVENT(vcpu, 3, "AIV gisa format-%u enabled for cpu %03u",
2986 vcpu->arch.sie_block->gd & 0x3, vcpu->vcpu_id);
2987 }
Fan Zhang4e0b1ab2016-11-29 07:17:55 +01002988 vcpu->arch.sie_block->sdnxo = ((unsigned long) &vcpu->run->s.regs.sdnx)
2989 | SDNXC;
Fan Zhangc6e5f162016-01-07 18:24:29 +08002990 vcpu->arch.sie_block->riccbd = (unsigned long) &vcpu->run->s.regs.riccb;
Farhan Ali730cd632017-02-24 16:12:56 -05002991
2992 if (sclp.has_kss)
David Hildenbrandef8f4f42018-01-23 18:05:29 +01002993 kvm_s390_set_cpuflags(vcpu, CPUSTAT_KSS);
Farhan Ali730cd632017-02-24 16:12:56 -05002994 else
2995 vcpu->arch.sie_block->ictl |= ICTL_ISKE | ICTL_SSKE | ICTL_RRBE;
Matthew Rosato5a5e6532013-01-29 11:48:20 -05002996
Dominik Dingele6db1d62015-05-07 15:41:57 +02002997 if (vcpu->kvm->arch.use_cmma) {
Dominik Dingelb31605c2014-03-25 13:47:11 +01002998 rc = kvm_s390_vcpu_setup_cmma(vcpu);
2999 if (rc)
3000 return rc;
Konstantin Weitzb31288f2013-04-17 17:36:29 +02003001 }
David Hildenbrand0ac96caf2014-12-12 15:17:31 +01003002 hrtimer_init(&vcpu->arch.ckc_timer, CLOCK_MONOTONIC, HRTIMER_MODE_REL);
Christian Borntraegerca872302009-05-12 17:21:49 +02003003 vcpu->arch.ckc_timer.function = kvm_s390_idle_wakeup;
Michael Mueller9d8d5782015-02-02 15:42:51 +01003004
Collin Walling67d49d52018-08-31 12:51:19 -04003005 vcpu->arch.sie_block->hpid = HPID_KVM;
3006
Tony Krowiak5102ee82014-06-27 14:46:01 -04003007 kvm_s390_vcpu_crypto_setup(vcpu);
3008
Dominik Dingelb31605c2014-03-25 13:47:11 +01003009 return rc;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003010}
3011
3012struct kvm_vcpu *kvm_arch_vcpu_create(struct kvm *kvm,
3013 unsigned int id)
3014{
Carsten Otte4d475552011-10-18 12:27:12 +02003015 struct kvm_vcpu *vcpu;
Michael Mueller7feb6bb2013-06-28 13:30:24 +02003016 struct sie_page *sie_page;
Carsten Otte4d475552011-10-18 12:27:12 +02003017 int rc = -EINVAL;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003018
David Hildenbrand42158252015-10-12 12:57:22 +02003019 if (!kvm_is_ucontrol(kvm) && !sca_can_add_vcpu(kvm, id))
Carsten Otte4d475552011-10-18 12:27:12 +02003020 goto out;
3021
3022 rc = -ENOMEM;
3023
Michael Muellerb110fea2013-06-12 13:54:54 +02003024 vcpu = kmem_cache_zalloc(kvm_vcpu_cache, GFP_KERNEL);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003025 if (!vcpu)
Carsten Otte4d475552011-10-18 12:27:12 +02003026 goto out;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003027
QingFeng Haoda72ca42017-06-07 11:41:19 +02003028 BUILD_BUG_ON(sizeof(struct sie_page) != 4096);
Michael Mueller7feb6bb2013-06-28 13:30:24 +02003029 sie_page = (struct sie_page *) get_zeroed_page(GFP_KERNEL);
3030 if (!sie_page)
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003031 goto out_free_cpu;
3032
Michael Mueller7feb6bb2013-06-28 13:30:24 +02003033 vcpu->arch.sie_block = &sie_page->sie_block;
3034 vcpu->arch.sie_block->itdba = (unsigned long) &sie_page->itdb;
3035
David Hildenbrandefed1102015-04-16 12:32:41 +02003036 /* the real guest size will always be smaller than msl */
3037 vcpu->arch.sie_block->mso = 0;
3038 vcpu->arch.sie_block->msl = sclp.hamax;
3039
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003040 vcpu->arch.sie_block->icpua = id;
Carsten Otteba5c1e92008-03-25 18:47:26 +01003041 spin_lock_init(&vcpu->arch.local_int.lock);
Michael Mueller982cff42019-01-31 09:52:38 +01003042 vcpu->arch.sie_block->gd = (u32)(u64)kvm->arch.gisa_int.origin;
Michael Mueller4b9f9522017-06-23 13:51:25 +02003043 if (vcpu->arch.sie_block->gd && sclp.has_gisaf)
3044 vcpu->arch.sie_block->gd |= GISA_FORMAT1;
David Hildenbrand9c23a132016-02-17 21:53:33 +01003045 seqcount_init(&vcpu->arch.cputm_seqcount);
Carsten Otteba5c1e92008-03-25 18:47:26 +01003046
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003047 rc = kvm_vcpu_init(vcpu, kvm, id);
3048 if (rc)
David Hildenbrand9abc2a02016-01-14 22:12:47 +01003049 goto out_free_sie_block;
Christian Borntraeger8335713a2015-12-08 16:55:27 +01003050 VM_EVENT(kvm, 3, "create cpu %d at 0x%pK, sie block at 0x%pK", id, vcpu,
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003051 vcpu->arch.sie_block);
Cornelia Huckade38c32012-07-23 17:20:30 +02003052 trace_kvm_s390_create_vcpu(id, vcpu, vcpu->arch.sie_block);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003053
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003054 return vcpu;
Wei Yongjun7b06bf22010-03-09 14:37:53 +08003055out_free_sie_block:
3056 free_page((unsigned long)(vcpu->arch.sie_block));
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003057out_free_cpu:
Michael Muellerb110fea2013-06-12 13:54:54 +02003058 kmem_cache_free(kvm_vcpu_cache, vcpu);
Carsten Otte4d475552011-10-18 12:27:12 +02003059out:
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003060 return ERR_PTR(rc);
3061}
3062
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003063int kvm_arch_vcpu_runnable(struct kvm_vcpu *vcpu)
3064{
David Hildenbrand9a022062014-08-05 17:40:47 +02003065 return kvm_s390_vcpu_has_irq(vcpu, 0);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003066}
3067
Longpeng(Mike)199b5762017-08-08 12:05:32 +08003068bool kvm_arch_vcpu_in_kernel(struct kvm_vcpu *vcpu)
3069{
Longpeng(Mike)0546c632017-08-08 12:05:34 +08003070 return !(vcpu->arch.sie_block->gpsw.mask & PSW_MASK_PSTATE);
Longpeng(Mike)199b5762017-08-08 12:05:32 +08003071}
3072
Christian Borntraeger27406cd2015-04-14 12:17:34 +02003073void kvm_s390_vcpu_block(struct kvm_vcpu *vcpu)
Christian Borntraeger49b99e12013-05-17 14:41:35 +02003074{
Peter Zijlstra805de8f42015-04-24 01:12:32 +02003075 atomic_or(PROG_BLOCK_SIE, &vcpu->arch.sie_block->prog20);
David Hildenbrand61a6df52015-05-12 08:41:40 +02003076 exit_sie(vcpu);
Christian Borntraeger49b99e12013-05-17 14:41:35 +02003077}
3078
Christian Borntraeger27406cd2015-04-14 12:17:34 +02003079void kvm_s390_vcpu_unblock(struct kvm_vcpu *vcpu)
Christian Borntraeger49b99e12013-05-17 14:41:35 +02003080{
Peter Zijlstra805de8f42015-04-24 01:12:32 +02003081 atomic_andnot(PROG_BLOCK_SIE, &vcpu->arch.sie_block->prog20);
Christian Borntraeger49b99e12013-05-17 14:41:35 +02003082}
3083
Christian Borntraeger8e236542015-04-09 13:49:04 +02003084static void kvm_s390_vcpu_request(struct kvm_vcpu *vcpu)
3085{
Peter Zijlstra805de8f42015-04-24 01:12:32 +02003086 atomic_or(PROG_REQUEST, &vcpu->arch.sie_block->prog20);
David Hildenbrand61a6df52015-05-12 08:41:40 +02003087 exit_sie(vcpu);
Christian Borntraeger8e236542015-04-09 13:49:04 +02003088}
3089
David Hildenbrand9ea59722018-09-25 19:16:16 -04003090bool kvm_s390_vcpu_sie_inhibited(struct kvm_vcpu *vcpu)
3091{
3092 return atomic_read(&vcpu->arch.sie_block->prog20) &
3093 (PROG_BLOCK_SIE | PROG_REQUEST);
3094}
3095
Christian Borntraeger8e236542015-04-09 13:49:04 +02003096static void kvm_s390_vcpu_request_handled(struct kvm_vcpu *vcpu)
3097{
Jason J. Herne9bf9fde2015-09-16 09:13:50 -04003098 atomic_andnot(PROG_REQUEST, &vcpu->arch.sie_block->prog20);
Christian Borntraeger8e236542015-04-09 13:49:04 +02003099}
3100
Christian Borntraeger49b99e12013-05-17 14:41:35 +02003101/*
David Hildenbrand9ea59722018-09-25 19:16:16 -04003102 * Kick a guest cpu out of (v)SIE and wait until (v)SIE is not running.
Christian Borntraeger49b99e12013-05-17 14:41:35 +02003103 * If the CPU is not running (e.g. waiting as idle) the function will
3104 * return immediately. */
3105void exit_sie(struct kvm_vcpu *vcpu)
3106{
David Hildenbrandef8f4f42018-01-23 18:05:29 +01003107 kvm_s390_set_cpuflags(vcpu, CPUSTAT_STOP_INT);
David Hildenbrand9ea59722018-09-25 19:16:16 -04003108 kvm_s390_vsie_kick(vcpu);
Christian Borntraeger49b99e12013-05-17 14:41:35 +02003109 while (vcpu->arch.sie_block->prog0c & PROG_IN_SIE)
3110 cpu_relax();
3111}
3112
Christian Borntraeger8e236542015-04-09 13:49:04 +02003113/* Kick a guest cpu out of SIE to process a request synchronously */
3114void kvm_s390_sync_request(int req, struct kvm_vcpu *vcpu)
Christian Borntraeger49b99e12013-05-17 14:41:35 +02003115{
Christian Borntraeger8e236542015-04-09 13:49:04 +02003116 kvm_make_request(req, vcpu);
3117 kvm_s390_vcpu_request(vcpu);
Christian Borntraeger49b99e12013-05-17 14:41:35 +02003118}
3119
Martin Schwidefsky414d3b02016-03-08 11:52:54 +01003120static void kvm_gmap_notifier(struct gmap *gmap, unsigned long start,
3121 unsigned long end)
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02003122{
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02003123 struct kvm *kvm = gmap->private;
3124 struct kvm_vcpu *vcpu;
Martin Schwidefsky414d3b02016-03-08 11:52:54 +01003125 unsigned long prefix;
3126 int i;
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02003127
David Hildenbrand65d0b0d2015-04-27 16:29:34 +02003128 if (gmap_is_shadow(gmap))
3129 return;
Martin Schwidefsky414d3b02016-03-08 11:52:54 +01003130 if (start >= 1UL << 31)
3131 /* We are only interested in prefix pages */
3132 return;
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02003133 kvm_for_each_vcpu(i, vcpu, kvm) {
3134 /* match against both prefix pages */
Martin Schwidefsky414d3b02016-03-08 11:52:54 +01003135 prefix = kvm_s390_get_prefix(vcpu);
3136 if (prefix <= end && start <= prefix + 2*PAGE_SIZE - 1) {
3137 VCPU_EVENT(vcpu, 2, "gmap notifier for %lx-%lx",
3138 start, end);
Christian Borntraeger8e236542015-04-09 13:49:04 +02003139 kvm_s390_sync_request(KVM_REQ_MMU_RELOAD, vcpu);
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02003140 }
3141 }
3142}
3143
Christoffer Dallb6d33832012-03-08 16:44:24 -05003144int kvm_arch_vcpu_should_kick(struct kvm_vcpu *vcpu)
3145{
3146 /* kvm common code refers to this, but never calls it */
3147 BUG();
3148 return 0;
3149}
3150
Carsten Otte14eebd92012-05-15 14:15:26 +02003151static int kvm_arch_vcpu_ioctl_get_one_reg(struct kvm_vcpu *vcpu,
3152 struct kvm_one_reg *reg)
3153{
3154 int r = -EINVAL;
3155
3156 switch (reg->id) {
Carsten Otte29b7c712012-05-15 14:15:27 +02003157 case KVM_REG_S390_TODPR:
3158 r = put_user(vcpu->arch.sie_block->todpr,
3159 (u32 __user *)reg->addr);
3160 break;
3161 case KVM_REG_S390_EPOCHDIFF:
3162 r = put_user(vcpu->arch.sie_block->epoch,
3163 (u64 __user *)reg->addr);
3164 break;
Jason J. herne46a6dd12012-05-15 14:15:28 +02003165 case KVM_REG_S390_CPU_TIMER:
David Hildenbrand4287f242016-02-15 09:40:12 +01003166 r = put_user(kvm_s390_get_cpu_timer(vcpu),
Jason J. herne46a6dd12012-05-15 14:15:28 +02003167 (u64 __user *)reg->addr);
3168 break;
3169 case KVM_REG_S390_CLOCK_COMP:
3170 r = put_user(vcpu->arch.sie_block->ckc,
3171 (u64 __user *)reg->addr);
3172 break;
Dominik Dingel536336c2013-09-30 10:55:33 +02003173 case KVM_REG_S390_PFTOKEN:
3174 r = put_user(vcpu->arch.pfault_token,
3175 (u64 __user *)reg->addr);
3176 break;
3177 case KVM_REG_S390_PFCOMPARE:
3178 r = put_user(vcpu->arch.pfault_compare,
3179 (u64 __user *)reg->addr);
3180 break;
3181 case KVM_REG_S390_PFSELECT:
3182 r = put_user(vcpu->arch.pfault_select,
3183 (u64 __user *)reg->addr);
3184 break;
Christian Borntraeger672550f2014-02-10 15:32:19 +01003185 case KVM_REG_S390_PP:
3186 r = put_user(vcpu->arch.sie_block->pp,
3187 (u64 __user *)reg->addr);
3188 break;
Christian Borntraegerafa45ff2014-02-10 15:39:23 +01003189 case KVM_REG_S390_GBEA:
3190 r = put_user(vcpu->arch.sie_block->gbea,
3191 (u64 __user *)reg->addr);
3192 break;
Carsten Otte14eebd92012-05-15 14:15:26 +02003193 default:
3194 break;
3195 }
3196
3197 return r;
3198}
3199
3200static int kvm_arch_vcpu_ioctl_set_one_reg(struct kvm_vcpu *vcpu,
3201 struct kvm_one_reg *reg)
3202{
3203 int r = -EINVAL;
David Hildenbrand4287f242016-02-15 09:40:12 +01003204 __u64 val;
Carsten Otte14eebd92012-05-15 14:15:26 +02003205
3206 switch (reg->id) {
Carsten Otte29b7c712012-05-15 14:15:27 +02003207 case KVM_REG_S390_TODPR:
3208 r = get_user(vcpu->arch.sie_block->todpr,
3209 (u32 __user *)reg->addr);
3210 break;
3211 case KVM_REG_S390_EPOCHDIFF:
3212 r = get_user(vcpu->arch.sie_block->epoch,
3213 (u64 __user *)reg->addr);
3214 break;
Jason J. herne46a6dd12012-05-15 14:15:28 +02003215 case KVM_REG_S390_CPU_TIMER:
David Hildenbrand4287f242016-02-15 09:40:12 +01003216 r = get_user(val, (u64 __user *)reg->addr);
3217 if (!r)
3218 kvm_s390_set_cpu_timer(vcpu, val);
Jason J. herne46a6dd12012-05-15 14:15:28 +02003219 break;
3220 case KVM_REG_S390_CLOCK_COMP:
3221 r = get_user(vcpu->arch.sie_block->ckc,
3222 (u64 __user *)reg->addr);
3223 break;
Dominik Dingel536336c2013-09-30 10:55:33 +02003224 case KVM_REG_S390_PFTOKEN:
3225 r = get_user(vcpu->arch.pfault_token,
3226 (u64 __user *)reg->addr);
David Hildenbrand9fbd8082014-10-09 15:01:38 +02003227 if (vcpu->arch.pfault_token == KVM_S390_PFAULT_TOKEN_INVALID)
3228 kvm_clear_async_pf_completion_queue(vcpu);
Dominik Dingel536336c2013-09-30 10:55:33 +02003229 break;
3230 case KVM_REG_S390_PFCOMPARE:
3231 r = get_user(vcpu->arch.pfault_compare,
3232 (u64 __user *)reg->addr);
3233 break;
3234 case KVM_REG_S390_PFSELECT:
3235 r = get_user(vcpu->arch.pfault_select,
3236 (u64 __user *)reg->addr);
3237 break;
Christian Borntraeger672550f2014-02-10 15:32:19 +01003238 case KVM_REG_S390_PP:
3239 r = get_user(vcpu->arch.sie_block->pp,
3240 (u64 __user *)reg->addr);
3241 break;
Christian Borntraegerafa45ff2014-02-10 15:39:23 +01003242 case KVM_REG_S390_GBEA:
3243 r = get_user(vcpu->arch.sie_block->gbea,
3244 (u64 __user *)reg->addr);
3245 break;
Carsten Otte14eebd92012-05-15 14:15:26 +02003246 default:
3247 break;
3248 }
3249
3250 return r;
3251}
Christoffer Dallb6d33832012-03-08 16:44:24 -05003252
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003253static int kvm_arch_vcpu_ioctl_initial_reset(struct kvm_vcpu *vcpu)
3254{
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003255 kvm_s390_vcpu_initial_reset(vcpu);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003256 return 0;
3257}
3258
3259int kvm_arch_vcpu_ioctl_set_regs(struct kvm_vcpu *vcpu, struct kvm_regs *regs)
3260{
Christoffer Dall875656f2017-12-04 21:35:27 +01003261 vcpu_load(vcpu);
Christian Borntraeger5a32c1a2012-01-11 11:20:32 +01003262 memcpy(&vcpu->run->s.regs.gprs, &regs->gprs, sizeof(regs->gprs));
Christoffer Dall875656f2017-12-04 21:35:27 +01003263 vcpu_put(vcpu);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003264 return 0;
3265}
3266
3267int kvm_arch_vcpu_ioctl_get_regs(struct kvm_vcpu *vcpu, struct kvm_regs *regs)
3268{
Christoffer Dall1fc9b762017-12-04 21:35:26 +01003269 vcpu_load(vcpu);
Christian Borntraeger5a32c1a2012-01-11 11:20:32 +01003270 memcpy(&regs->gprs, &vcpu->run->s.regs.gprs, sizeof(regs->gprs));
Christoffer Dall1fc9b762017-12-04 21:35:26 +01003271 vcpu_put(vcpu);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003272 return 0;
3273}
3274
3275int kvm_arch_vcpu_ioctl_set_sregs(struct kvm_vcpu *vcpu,
3276 struct kvm_sregs *sregs)
3277{
Christoffer Dallb4ef9d42017-12-04 21:35:29 +01003278 vcpu_load(vcpu);
3279
Christian Borntraeger59674c12012-01-11 11:20:33 +01003280 memcpy(&vcpu->run->s.regs.acrs, &sregs->acrs, sizeof(sregs->acrs));
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003281 memcpy(&vcpu->arch.sie_block->gcr, &sregs->crs, sizeof(sregs->crs));
Christoffer Dallb4ef9d42017-12-04 21:35:29 +01003282
3283 vcpu_put(vcpu);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003284 return 0;
3285}
3286
3287int kvm_arch_vcpu_ioctl_get_sregs(struct kvm_vcpu *vcpu,
3288 struct kvm_sregs *sregs)
3289{
Christoffer Dallbcdec412017-12-04 21:35:28 +01003290 vcpu_load(vcpu);
3291
Christian Borntraeger59674c12012-01-11 11:20:33 +01003292 memcpy(&sregs->acrs, &vcpu->run->s.regs.acrs, sizeof(sregs->acrs));
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003293 memcpy(&sregs->crs, &vcpu->arch.sie_block->gcr, sizeof(sregs->crs));
Christoffer Dallbcdec412017-12-04 21:35:28 +01003294
3295 vcpu_put(vcpu);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003296 return 0;
3297}
3298
3299int kvm_arch_vcpu_ioctl_set_fpu(struct kvm_vcpu *vcpu, struct kvm_fpu *fpu)
3300{
Christoffer Dall6a96bc72017-12-04 21:35:35 +01003301 int ret = 0;
3302
3303 vcpu_load(vcpu);
3304
3305 if (test_fp_ctl(fpu->fpc)) {
3306 ret = -EINVAL;
3307 goto out;
3308 }
Christian Borntraegere1788bb2016-11-22 09:29:38 +01003309 vcpu->run->s.regs.fpc = fpu->fpc;
David Hildenbrand9abc2a02016-01-14 22:12:47 +01003310 if (MACHINE_HAS_VX)
David Hildenbranda7d4b8f2016-08-16 14:38:24 +02003311 convert_fp_to_vx((__vector128 *) vcpu->run->s.regs.vrs,
3312 (freg_t *) fpu->fprs);
David Hildenbrand9abc2a02016-01-14 22:12:47 +01003313 else
David Hildenbranda7d4b8f2016-08-16 14:38:24 +02003314 memcpy(vcpu->run->s.regs.fprs, &fpu->fprs, sizeof(fpu->fprs));
Christoffer Dall6a96bc72017-12-04 21:35:35 +01003315
3316out:
3317 vcpu_put(vcpu);
3318 return ret;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003319}
3320
3321int kvm_arch_vcpu_ioctl_get_fpu(struct kvm_vcpu *vcpu, struct kvm_fpu *fpu)
3322{
Christoffer Dall13931232017-12-04 21:35:34 +01003323 vcpu_load(vcpu);
3324
David Hildenbrand9abc2a02016-01-14 22:12:47 +01003325 /* make sure we have the latest values */
3326 save_fpu_regs();
3327 if (MACHINE_HAS_VX)
David Hildenbranda7d4b8f2016-08-16 14:38:24 +02003328 convert_vx_to_fp((freg_t *) fpu->fprs,
3329 (__vector128 *) vcpu->run->s.regs.vrs);
David Hildenbrand9abc2a02016-01-14 22:12:47 +01003330 else
David Hildenbranda7d4b8f2016-08-16 14:38:24 +02003331 memcpy(fpu->fprs, vcpu->run->s.regs.fprs, sizeof(fpu->fprs));
Christian Borntraegere1788bb2016-11-22 09:29:38 +01003332 fpu->fpc = vcpu->run->s.regs.fpc;
Christoffer Dall13931232017-12-04 21:35:34 +01003333
3334 vcpu_put(vcpu);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003335 return 0;
3336}
3337
3338static int kvm_arch_vcpu_ioctl_set_initial_psw(struct kvm_vcpu *vcpu, psw_t psw)
3339{
3340 int rc = 0;
3341
David Hildenbrand7a42fdc2014-05-05 16:26:19 +02003342 if (!is_vcpu_stopped(vcpu))
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003343 rc = -EBUSY;
Carsten Otted7b0b5e2009-11-19 14:21:16 +01003344 else {
3345 vcpu->run->psw_mask = psw.mask;
3346 vcpu->run->psw_addr = psw.addr;
3347 }
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003348 return rc;
3349}
3350
3351int kvm_arch_vcpu_ioctl_translate(struct kvm_vcpu *vcpu,
3352 struct kvm_translation *tr)
3353{
3354 return -EINVAL; /* not implemented yet */
3355}
3356
David Hildenbrand27291e22014-01-23 12:26:52 +01003357#define VALID_GUESTDBG_FLAGS (KVM_GUESTDBG_SINGLESTEP | \
3358 KVM_GUESTDBG_USE_HW_BP | \
3359 KVM_GUESTDBG_ENABLE)
3360
Jan Kiszkad0bfb942008-12-15 13:52:10 +01003361int kvm_arch_vcpu_ioctl_set_guest_debug(struct kvm_vcpu *vcpu,
3362 struct kvm_guest_debug *dbg)
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003363{
David Hildenbrand27291e22014-01-23 12:26:52 +01003364 int rc = 0;
3365
Christoffer Dall66b56562017-12-04 21:35:33 +01003366 vcpu_load(vcpu);
3367
David Hildenbrand27291e22014-01-23 12:26:52 +01003368 vcpu->guest_debug = 0;
3369 kvm_s390_clear_bp_data(vcpu);
3370
Christoffer Dall66b56562017-12-04 21:35:33 +01003371 if (dbg->control & ~VALID_GUESTDBG_FLAGS) {
3372 rc = -EINVAL;
3373 goto out;
3374 }
3375 if (!sclp.has_gpere) {
3376 rc = -EINVAL;
3377 goto out;
3378 }
David Hildenbrand27291e22014-01-23 12:26:52 +01003379
3380 if (dbg->control & KVM_GUESTDBG_ENABLE) {
3381 vcpu->guest_debug = dbg->control;
3382 /* enforce guest PER */
David Hildenbrandef8f4f42018-01-23 18:05:29 +01003383 kvm_s390_set_cpuflags(vcpu, CPUSTAT_P);
David Hildenbrand27291e22014-01-23 12:26:52 +01003384
3385 if (dbg->control & KVM_GUESTDBG_USE_HW_BP)
3386 rc = kvm_s390_import_bp_data(vcpu, dbg);
3387 } else {
David Hildenbrand9daecfc2018-01-23 18:05:30 +01003388 kvm_s390_clear_cpuflags(vcpu, CPUSTAT_P);
David Hildenbrand27291e22014-01-23 12:26:52 +01003389 vcpu->arch.guestdbg.last_bp = 0;
3390 }
3391
3392 if (rc) {
3393 vcpu->guest_debug = 0;
3394 kvm_s390_clear_bp_data(vcpu);
David Hildenbrand9daecfc2018-01-23 18:05:30 +01003395 kvm_s390_clear_cpuflags(vcpu, CPUSTAT_P);
David Hildenbrand27291e22014-01-23 12:26:52 +01003396 }
3397
Christoffer Dall66b56562017-12-04 21:35:33 +01003398out:
3399 vcpu_put(vcpu);
David Hildenbrand27291e22014-01-23 12:26:52 +01003400 return rc;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003401}
3402
Marcelo Tosatti62d9f0d2008-04-11 13:24:45 -03003403int kvm_arch_vcpu_ioctl_get_mpstate(struct kvm_vcpu *vcpu,
3404 struct kvm_mp_state *mp_state)
3405{
Christoffer Dallfd232562017-12-04 21:35:30 +01003406 int ret;
3407
3408 vcpu_load(vcpu);
3409
David Hildenbrand6352e4d2014-04-10 17:35:00 +02003410 /* CHECK_STOP and LOAD are not supported yet */
Christoffer Dallfd232562017-12-04 21:35:30 +01003411 ret = is_vcpu_stopped(vcpu) ? KVM_MP_STATE_STOPPED :
3412 KVM_MP_STATE_OPERATING;
3413
3414 vcpu_put(vcpu);
3415 return ret;
Marcelo Tosatti62d9f0d2008-04-11 13:24:45 -03003416}
3417
3418int kvm_arch_vcpu_ioctl_set_mpstate(struct kvm_vcpu *vcpu,
3419 struct kvm_mp_state *mp_state)
3420{
David Hildenbrand6352e4d2014-04-10 17:35:00 +02003421 int rc = 0;
3422
Christoffer Dalle83dff52017-12-04 21:35:31 +01003423 vcpu_load(vcpu);
3424
David Hildenbrand6352e4d2014-04-10 17:35:00 +02003425 /* user space knows about this interface - let it control the state */
3426 vcpu->kvm->arch.user_cpu_state_ctrl = 1;
3427
3428 switch (mp_state->mp_state) {
3429 case KVM_MP_STATE_STOPPED:
3430 kvm_s390_vcpu_stop(vcpu);
3431 break;
3432 case KVM_MP_STATE_OPERATING:
3433 kvm_s390_vcpu_start(vcpu);
3434 break;
3435 case KVM_MP_STATE_LOAD:
3436 case KVM_MP_STATE_CHECK_STOP:
3437 /* fall through - CHECK_STOP and LOAD are not supported yet */
3438 default:
3439 rc = -ENXIO;
3440 }
3441
Christoffer Dalle83dff52017-12-04 21:35:31 +01003442 vcpu_put(vcpu);
David Hildenbrand6352e4d2014-04-10 17:35:00 +02003443 return rc;
Marcelo Tosatti62d9f0d2008-04-11 13:24:45 -03003444}
3445
David Hildenbrand8ad35752014-03-14 11:00:21 +01003446static bool ibs_enabled(struct kvm_vcpu *vcpu)
3447{
David Hildenbrand8d5fb0d2018-01-23 18:05:31 +01003448 return kvm_s390_test_cpuflags(vcpu, CPUSTAT_IBS);
David Hildenbrand8ad35752014-03-14 11:00:21 +01003449}
3450
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02003451static int kvm_s390_handle_requests(struct kvm_vcpu *vcpu)
3452{
David Hildenbrand8ad35752014-03-14 11:00:21 +01003453retry:
Christian Borntraeger8e236542015-04-09 13:49:04 +02003454 kvm_s390_vcpu_request_handled(vcpu);
Radim Krčmář2fa6e1e2017-06-04 14:43:52 +02003455 if (!kvm_request_pending(vcpu))
Christian Borntraeger586b7cc2015-07-28 15:03:05 +02003456 return 0;
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02003457 /*
3458 * We use MMU_RELOAD just to re-arm the ipte notifier for the
Martin Schwidefskyb2d73b22016-03-08 11:54:42 +01003459 * guest prefix page. gmap_mprotect_notify will wait on the ptl lock.
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02003460 * This ensures that the ipte instruction for this request has
3461 * already finished. We might race against a second unmapper that
3462 * wants to set the blocking bit. Lets just retry the request loop.
3463 */
David Hildenbrand8ad35752014-03-14 11:00:21 +01003464 if (kvm_check_request(KVM_REQ_MMU_RELOAD, vcpu)) {
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02003465 int rc;
Martin Schwidefskyb2d73b22016-03-08 11:54:42 +01003466 rc = gmap_mprotect_notify(vcpu->arch.gmap,
3467 kvm_s390_get_prefix(vcpu),
3468 PAGE_SIZE * 2, PROT_WRITE);
Julius Niedworokaca411a2016-08-03 16:39:55 +02003469 if (rc) {
3470 kvm_make_request(KVM_REQ_MMU_RELOAD, vcpu);
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02003471 return rc;
Julius Niedworokaca411a2016-08-03 16:39:55 +02003472 }
David Hildenbrand8ad35752014-03-14 11:00:21 +01003473 goto retry;
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02003474 }
David Hildenbrand8ad35752014-03-14 11:00:21 +01003475
David Hildenbrandd3d692c2014-07-29 08:53:36 +02003476 if (kvm_check_request(KVM_REQ_TLB_FLUSH, vcpu)) {
3477 vcpu->arch.sie_block->ihcpu = 0xffff;
3478 goto retry;
3479 }
3480
David Hildenbrand8ad35752014-03-14 11:00:21 +01003481 if (kvm_check_request(KVM_REQ_ENABLE_IBS, vcpu)) {
3482 if (!ibs_enabled(vcpu)) {
3483 trace_kvm_s390_enable_disable_ibs(vcpu->vcpu_id, 1);
David Hildenbrandef8f4f42018-01-23 18:05:29 +01003484 kvm_s390_set_cpuflags(vcpu, CPUSTAT_IBS);
David Hildenbrand8ad35752014-03-14 11:00:21 +01003485 }
3486 goto retry;
3487 }
3488
3489 if (kvm_check_request(KVM_REQ_DISABLE_IBS, vcpu)) {
3490 if (ibs_enabled(vcpu)) {
3491 trace_kvm_s390_enable_disable_ibs(vcpu->vcpu_id, 0);
David Hildenbrand9daecfc2018-01-23 18:05:30 +01003492 kvm_s390_clear_cpuflags(vcpu, CPUSTAT_IBS);
David Hildenbrand8ad35752014-03-14 11:00:21 +01003493 }
3494 goto retry;
3495 }
3496
David Hildenbrand6502a342016-06-21 14:19:51 +02003497 if (kvm_check_request(KVM_REQ_ICPT_OPEREXC, vcpu)) {
3498 vcpu->arch.sie_block->ictl |= ICTL_OPEREXC;
3499 goto retry;
3500 }
3501
Claudio Imbrenda190df4a2016-08-04 17:54:42 +02003502 if (kvm_check_request(KVM_REQ_START_MIGRATION, vcpu)) {
3503 /*
Janosch Frankc9f0a2b2018-02-16 12:16:14 +01003504 * Disable CMM virtualization; we will emulate the ESSA
Claudio Imbrenda190df4a2016-08-04 17:54:42 +02003505 * instruction manually, in order to provide additional
3506 * functionalities needed for live migration.
3507 */
3508 vcpu->arch.sie_block->ecb2 &= ~ECB2_CMMA;
3509 goto retry;
3510 }
3511
3512 if (kvm_check_request(KVM_REQ_STOP_MIGRATION, vcpu)) {
3513 /*
Janosch Frankc9f0a2b2018-02-16 12:16:14 +01003514 * Re-enable CMM virtualization if CMMA is available and
3515 * CMM has been used.
Claudio Imbrenda190df4a2016-08-04 17:54:42 +02003516 */
3517 if ((vcpu->kvm->arch.use_cmma) &&
Janosch Frankc9f0a2b2018-02-16 12:16:14 +01003518 (vcpu->kvm->mm->context.uses_cmm))
Claudio Imbrenda190df4a2016-08-04 17:54:42 +02003519 vcpu->arch.sie_block->ecb2 |= ECB2_CMMA;
3520 goto retry;
3521 }
3522
David Hildenbrand0759d062014-05-13 16:54:32 +02003523 /* nothing to do, just clear the request */
Radim Krčmář72875d82017-04-26 22:32:19 +02003524 kvm_clear_request(KVM_REQ_UNHALT, vcpu);
David Hildenbrand3194cdb2018-09-25 19:16:17 -04003525 /* we left the vsie handler, nothing to do, just clear the request */
3526 kvm_clear_request(KVM_REQ_VSIE_RESTART, vcpu);
David Hildenbrand0759d062014-05-13 16:54:32 +02003527
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02003528 return 0;
3529}
3530
David Hildenbrand0e7def52018-02-07 12:46:43 +01003531void kvm_s390_set_tod_clock(struct kvm *kvm,
3532 const struct kvm_s390_vm_tod_clock *gtod)
Collin L. Walling8fa16962016-07-26 15:29:44 -04003533{
3534 struct kvm_vcpu *vcpu;
3535 struct kvm_s390_tod_clock_ext htod;
3536 int i;
3537
3538 mutex_lock(&kvm->lock);
3539 preempt_disable();
3540
3541 get_tod_clock_ext((char *)&htod);
3542
3543 kvm->arch.epoch = gtod->tod - htod.tod;
David Hildenbrand0e7def52018-02-07 12:46:43 +01003544 kvm->arch.epdx = 0;
3545 if (test_kvm_facility(kvm, 139)) {
3546 kvm->arch.epdx = gtod->epoch_idx - htod.epoch_idx;
3547 if (kvm->arch.epoch > gtod->tod)
3548 kvm->arch.epdx -= 1;
3549 }
Collin L. Walling8fa16962016-07-26 15:29:44 -04003550
3551 kvm_s390_vcpu_block_all(kvm);
3552 kvm_for_each_vcpu(i, vcpu, kvm) {
3553 vcpu->arch.sie_block->epoch = kvm->arch.epoch;
3554 vcpu->arch.sie_block->epdx = kvm->arch.epdx;
3555 }
3556
3557 kvm_s390_vcpu_unblock_all(kvm);
3558 preempt_enable();
3559 mutex_unlock(&kvm->lock);
3560}
3561
Thomas Huthfa576c52014-05-06 17:20:16 +02003562/**
3563 * kvm_arch_fault_in_page - fault-in guest page if necessary
3564 * @vcpu: The corresponding virtual cpu
3565 * @gpa: Guest physical address
3566 * @writable: Whether the page should be writable or not
3567 *
3568 * Make sure that a guest page has been faulted-in on the host.
3569 *
3570 * Return: Zero on success, negative error code otherwise.
3571 */
3572long kvm_arch_fault_in_page(struct kvm_vcpu *vcpu, gpa_t gpa, int writable)
Dominik Dingel24eb3a82013-06-17 16:25:18 +02003573{
Martin Schwidefsky527e30b2014-04-30 16:04:25 +02003574 return gmap_fault(vcpu->arch.gmap, gpa,
3575 writable ? FAULT_FLAG_WRITE : 0);
Dominik Dingel24eb3a82013-06-17 16:25:18 +02003576}
3577
Dominik Dingel3c038e62013-10-07 17:11:48 +02003578static void __kvm_inject_pfault_token(struct kvm_vcpu *vcpu, bool start_token,
3579 unsigned long token)
3580{
3581 struct kvm_s390_interrupt inti;
Jens Freimann383d0b02014-07-29 15:11:49 +02003582 struct kvm_s390_irq irq;
Dominik Dingel3c038e62013-10-07 17:11:48 +02003583
3584 if (start_token) {
Jens Freimann383d0b02014-07-29 15:11:49 +02003585 irq.u.ext.ext_params2 = token;
3586 irq.type = KVM_S390_INT_PFAULT_INIT;
3587 WARN_ON_ONCE(kvm_s390_inject_vcpu(vcpu, &irq));
Dominik Dingel3c038e62013-10-07 17:11:48 +02003588 } else {
3589 inti.type = KVM_S390_INT_PFAULT_DONE;
Jens Freimann383d0b02014-07-29 15:11:49 +02003590 inti.parm64 = token;
Dominik Dingel3c038e62013-10-07 17:11:48 +02003591 WARN_ON_ONCE(kvm_s390_inject_vm(vcpu->kvm, &inti));
3592 }
3593}
3594
3595void kvm_arch_async_page_not_present(struct kvm_vcpu *vcpu,
3596 struct kvm_async_pf *work)
3597{
3598 trace_kvm_s390_pfault_init(vcpu, work->arch.pfault_token);
3599 __kvm_inject_pfault_token(vcpu, true, work->arch.pfault_token);
3600}
3601
3602void kvm_arch_async_page_present(struct kvm_vcpu *vcpu,
3603 struct kvm_async_pf *work)
3604{
3605 trace_kvm_s390_pfault_done(vcpu, work->arch.pfault_token);
3606 __kvm_inject_pfault_token(vcpu, false, work->arch.pfault_token);
3607}
3608
3609void kvm_arch_async_page_ready(struct kvm_vcpu *vcpu,
3610 struct kvm_async_pf *work)
3611{
3612 /* s390 will always inject the page directly */
3613}
3614
3615bool kvm_arch_can_inject_async_page_present(struct kvm_vcpu *vcpu)
3616{
3617 /*
3618 * s390 will always inject the page directly,
3619 * but we still want check_async_completion to cleanup
3620 */
3621 return true;
3622}
3623
3624static int kvm_arch_setup_async_pf(struct kvm_vcpu *vcpu)
3625{
3626 hva_t hva;
3627 struct kvm_arch_async_pf arch;
3628 int rc;
3629
3630 if (vcpu->arch.pfault_token == KVM_S390_PFAULT_TOKEN_INVALID)
3631 return 0;
3632 if ((vcpu->arch.sie_block->gpsw.mask & vcpu->arch.pfault_select) !=
3633 vcpu->arch.pfault_compare)
3634 return 0;
3635 if (psw_extint_disabled(vcpu))
3636 return 0;
David Hildenbrand9a022062014-08-05 17:40:47 +02003637 if (kvm_s390_vcpu_has_irq(vcpu, 0))
Dominik Dingel3c038e62013-10-07 17:11:48 +02003638 return 0;
David Hildenbrandb9224cd2018-04-30 17:55:24 +02003639 if (!(vcpu->arch.sie_block->gcr[0] & CR0_SERVICE_SIGNAL_SUBMASK))
Dominik Dingel3c038e62013-10-07 17:11:48 +02003640 return 0;
3641 if (!vcpu->arch.gmap->pfault_enabled)
3642 return 0;
3643
Heiko Carstens81480cc2014-01-01 16:36:07 +01003644 hva = gfn_to_hva(vcpu->kvm, gpa_to_gfn(current->thread.gmap_addr));
3645 hva += current->thread.gmap_addr & ~PAGE_MASK;
3646 if (read_guest_real(vcpu, vcpu->arch.pfault_token, &arch.pfault_token, 8))
Dominik Dingel3c038e62013-10-07 17:11:48 +02003647 return 0;
3648
3649 rc = kvm_setup_async_pf(vcpu, current->thread.gmap_addr, hva, &arch);
3650 return rc;
3651}
3652
Thomas Huth3fb4c402013-09-12 10:33:43 +02003653static int vcpu_pre_run(struct kvm_vcpu *vcpu)
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003654{
Thomas Huth3fb4c402013-09-12 10:33:43 +02003655 int rc, cpuflags;
Carsten Ottee168bf82012-01-04 10:25:22 +01003656
Dominik Dingel3c038e62013-10-07 17:11:48 +02003657 /*
3658 * On s390 notifications for arriving pages will be delivered directly
3659 * to the guest but the house keeping for completed pfaults is
3660 * handled outside the worker.
3661 */
3662 kvm_check_async_pf_completion(vcpu);
3663
Christian Borntraeger7ec7c8c2015-12-02 14:27:03 +01003664 vcpu->arch.sie_block->gg14 = vcpu->run->s.regs.gprs[14];
3665 vcpu->arch.sie_block->gg15 = vcpu->run->s.regs.gprs[15];
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003666
3667 if (need_resched())
3668 schedule();
3669
Martin Schwidefskyd3a73ac2014-04-15 12:55:07 +02003670 if (test_cpu_flag(CIF_MCCK_PENDING))
Christian Borntraeger71cde582008-05-21 13:37:34 +02003671 s390_handle_mcck();
3672
Jens Freimann79395032014-04-17 10:10:30 +02003673 if (!kvm_is_ucontrol(vcpu->kvm)) {
3674 rc = kvm_s390_deliver_pending_interrupts(vcpu);
3675 if (rc)
3676 return rc;
3677 }
Carsten Otte0ff31862008-05-21 13:37:37 +02003678
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02003679 rc = kvm_s390_handle_requests(vcpu);
3680 if (rc)
3681 return rc;
3682
David Hildenbrand27291e22014-01-23 12:26:52 +01003683 if (guestdbg_enabled(vcpu)) {
3684 kvm_s390_backup_guest_per_regs(vcpu);
3685 kvm_s390_patch_guest_per_regs(vcpu);
3686 }
3687
Michael Mueller9f30f622019-01-31 09:52:44 +01003688 clear_bit(vcpu->vcpu_id, vcpu->kvm->arch.gisa_int.kicked_mask);
3689
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003690 vcpu->arch.sie_block->icptcode = 0;
Thomas Huth3fb4c402013-09-12 10:33:43 +02003691 cpuflags = atomic_read(&vcpu->arch.sie_block->cpuflags);
3692 VCPU_EVENT(vcpu, 6, "entering sie flags %x", cpuflags);
3693 trace_kvm_s390_sie_enter(vcpu, cpuflags);
Dominik Dingel2b29a9f2013-07-26 15:04:00 +02003694
Thomas Huth3fb4c402013-09-12 10:33:43 +02003695 return 0;
3696}
3697
Thomas Huth492d8642015-02-10 16:11:01 +01003698static int vcpu_post_run_fault_in_sie(struct kvm_vcpu *vcpu)
3699{
David Hildenbrand56317922016-01-12 17:37:58 +01003700 struct kvm_s390_pgm_info pgm_info = {
3701 .code = PGM_ADDRESSING,
3702 };
3703 u8 opcode, ilen;
Thomas Huth492d8642015-02-10 16:11:01 +01003704 int rc;
3705
3706 VCPU_EVENT(vcpu, 3, "%s", "fault in sie instruction");
3707 trace_kvm_s390_sie_fault(vcpu);
3708
3709 /*
3710 * We want to inject an addressing exception, which is defined as a
3711 * suppressing or terminating exception. However, since we came here
3712 * by a DAT access exception, the PSW still points to the faulting
3713 * instruction since DAT exceptions are nullifying. So we've got
3714 * to look up the current opcode to get the length of the instruction
3715 * to be able to forward the PSW.
3716 */
David Hildenbrand3fa8cad72016-05-24 12:00:49 +02003717 rc = read_guest_instr(vcpu, vcpu->arch.sie_block->gpsw.addr, &opcode, 1);
David Hildenbrand56317922016-01-12 17:37:58 +01003718 ilen = insn_length(opcode);
David Hildenbrand9b0d7212016-01-12 17:40:54 +01003719 if (rc < 0) {
3720 return rc;
3721 } else if (rc) {
3722 /* Instruction-Fetching Exceptions - we can't detect the ilen.
3723 * Forward by arbitrary ilc, injection will take care of
3724 * nullification if necessary.
3725 */
3726 pgm_info = vcpu->arch.pgm;
3727 ilen = 4;
3728 }
David Hildenbrand56317922016-01-12 17:37:58 +01003729 pgm_info.flags = ilen | KVM_S390_PGM_FLAGS_ILC_VALID;
3730 kvm_s390_forward_psw(vcpu, ilen);
3731 return kvm_s390_inject_prog_irq(vcpu, &pgm_info);
Thomas Huth492d8642015-02-10 16:11:01 +01003732}
3733
Thomas Huth3fb4c402013-09-12 10:33:43 +02003734static int vcpu_post_run(struct kvm_vcpu *vcpu, int exit_reason)
3735{
QingFeng Hao4d62fcc2017-06-07 12:03:05 +02003736 struct mcck_volatile_info *mcck_info;
3737 struct sie_page *sie_page;
3738
Dominik Dingel2b29a9f2013-07-26 15:04:00 +02003739 VCPU_EVENT(vcpu, 6, "exit sie icptcode %d",
3740 vcpu->arch.sie_block->icptcode);
3741 trace_kvm_s390_sie_exit(vcpu, vcpu->arch.sie_block->icptcode);
3742
David Hildenbrand27291e22014-01-23 12:26:52 +01003743 if (guestdbg_enabled(vcpu))
3744 kvm_s390_restore_guest_per_regs(vcpu);
3745
Christian Borntraeger7ec7c8c2015-12-02 14:27:03 +01003746 vcpu->run->s.regs.gprs[14] = vcpu->arch.sie_block->gg14;
3747 vcpu->run->s.regs.gprs[15] = vcpu->arch.sie_block->gg15;
David Hildenbrand71f116b2015-10-19 16:24:28 +02003748
QingFeng Hao4d62fcc2017-06-07 12:03:05 +02003749 if (exit_reason == -EINTR) {
3750 VCPU_EVENT(vcpu, 3, "%s", "machine check");
3751 sie_page = container_of(vcpu->arch.sie_block,
3752 struct sie_page, sie_block);
3753 mcck_info = &sie_page->mcck_info;
3754 kvm_s390_reinject_machine_check(vcpu, mcck_info);
3755 return 0;
3756 }
3757
David Hildenbrand71f116b2015-10-19 16:24:28 +02003758 if (vcpu->arch.sie_block->icptcode > 0) {
3759 int rc = kvm_handle_sie_intercept(vcpu);
3760
3761 if (rc != -EOPNOTSUPP)
3762 return rc;
3763 vcpu->run->exit_reason = KVM_EXIT_S390_SIEIC;
3764 vcpu->run->s390_sieic.icptcode = vcpu->arch.sie_block->icptcode;
3765 vcpu->run->s390_sieic.ipa = vcpu->arch.sie_block->ipa;
3766 vcpu->run->s390_sieic.ipb = vcpu->arch.sie_block->ipb;
3767 return -EREMOTE;
3768 } else if (exit_reason != -EFAULT) {
3769 vcpu->stat.exit_null++;
3770 return 0;
Thomas Huth210b16072013-09-19 16:26:18 +02003771 } else if (kvm_is_ucontrol(vcpu->kvm)) {
3772 vcpu->run->exit_reason = KVM_EXIT_S390_UCONTROL;
3773 vcpu->run->s390_ucontrol.trans_exc_code =
3774 current->thread.gmap_addr;
3775 vcpu->run->s390_ucontrol.pgm_code = 0x10;
David Hildenbrand71f116b2015-10-19 16:24:28 +02003776 return -EREMOTE;
Dominik Dingel24eb3a82013-06-17 16:25:18 +02003777 } else if (current->thread.gmap_pfault) {
Dominik Dingel3c038e62013-10-07 17:11:48 +02003778 trace_kvm_s390_major_guest_pfault(vcpu);
Dominik Dingel24eb3a82013-06-17 16:25:18 +02003779 current->thread.gmap_pfault = 0;
David Hildenbrand71f116b2015-10-19 16:24:28 +02003780 if (kvm_arch_setup_async_pf(vcpu))
3781 return 0;
3782 return kvm_arch_fault_in_page(vcpu, current->thread.gmap_addr, 1);
Dominik Dingel24eb3a82013-06-17 16:25:18 +02003783 }
David Hildenbrand71f116b2015-10-19 16:24:28 +02003784 return vcpu_post_run_fault_in_sie(vcpu);
Thomas Huth3fb4c402013-09-12 10:33:43 +02003785}
3786
3787static int __vcpu_run(struct kvm_vcpu *vcpu)
3788{
3789 int rc, exit_reason;
3790
Thomas Huth800c1062013-09-12 10:33:45 +02003791 /*
3792 * We try to hold kvm->srcu during most of vcpu_run (except when run-
3793 * ning the guest), so that memslots (and other stuff) are protected
3794 */
3795 vcpu->srcu_idx = srcu_read_lock(&vcpu->kvm->srcu);
3796
Thomas Hutha76ccff2013-09-12 10:33:44 +02003797 do {
3798 rc = vcpu_pre_run(vcpu);
3799 if (rc)
3800 break;
Thomas Huth3fb4c402013-09-12 10:33:43 +02003801
Thomas Huth800c1062013-09-12 10:33:45 +02003802 srcu_read_unlock(&vcpu->kvm->srcu, vcpu->srcu_idx);
Thomas Hutha76ccff2013-09-12 10:33:44 +02003803 /*
3804 * As PF_VCPU will be used in fault handler, between
3805 * guest_enter and guest_exit should be no uaccess.
3806 */
Christian Borntraeger0097d122015-04-30 13:43:30 +02003807 local_irq_disable();
Paolo Bonzini6edaa532016-06-15 15:18:26 +02003808 guest_enter_irqoff();
David Hildenbranddb0758b2016-02-15 09:42:25 +01003809 __disable_cpu_timer_accounting(vcpu);
Christian Borntraeger0097d122015-04-30 13:43:30 +02003810 local_irq_enable();
Thomas Hutha76ccff2013-09-12 10:33:44 +02003811 exit_reason = sie64a(vcpu->arch.sie_block,
3812 vcpu->run->s.regs.gprs);
Christian Borntraeger0097d122015-04-30 13:43:30 +02003813 local_irq_disable();
David Hildenbranddb0758b2016-02-15 09:42:25 +01003814 __enable_cpu_timer_accounting(vcpu);
Paolo Bonzini6edaa532016-06-15 15:18:26 +02003815 guest_exit_irqoff();
Christian Borntraeger0097d122015-04-30 13:43:30 +02003816 local_irq_enable();
Thomas Huth800c1062013-09-12 10:33:45 +02003817 vcpu->srcu_idx = srcu_read_lock(&vcpu->kvm->srcu);
Thomas Huth3fb4c402013-09-12 10:33:43 +02003818
Thomas Hutha76ccff2013-09-12 10:33:44 +02003819 rc = vcpu_post_run(vcpu, exit_reason);
David Hildenbrand27291e22014-01-23 12:26:52 +01003820 } while (!signal_pending(current) && !guestdbg_exit_pending(vcpu) && !rc);
Thomas Huth3fb4c402013-09-12 10:33:43 +02003821
Thomas Huth800c1062013-09-12 10:33:45 +02003822 srcu_read_unlock(&vcpu->kvm->srcu, vcpu->srcu_idx);
Carsten Ottee168bf82012-01-04 10:25:22 +01003823 return rc;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003824}
3825
David Hildenbrandb028ee32014-07-17 10:47:43 +02003826static void sync_regs(struct kvm_vcpu *vcpu, struct kvm_run *kvm_run)
3827{
Christian Borntraeger4d5f2c02017-02-09 17:15:41 +01003828 struct runtime_instr_cb *riccb;
Fan Zhang4e0b1ab2016-11-29 07:17:55 +01003829 struct gs_cb *gscb;
Christian Borntraeger4d5f2c02017-02-09 17:15:41 +01003830
3831 riccb = (struct runtime_instr_cb *) &kvm_run->s.regs.riccb;
Fan Zhang4e0b1ab2016-11-29 07:17:55 +01003832 gscb = (struct gs_cb *) &kvm_run->s.regs.gscb;
David Hildenbrandb028ee32014-07-17 10:47:43 +02003833 vcpu->arch.sie_block->gpsw.mask = kvm_run->psw_mask;
3834 vcpu->arch.sie_block->gpsw.addr = kvm_run->psw_addr;
3835 if (kvm_run->kvm_dirty_regs & KVM_SYNC_PREFIX)
3836 kvm_s390_set_prefix(vcpu, kvm_run->s.regs.prefix);
3837 if (kvm_run->kvm_dirty_regs & KVM_SYNC_CRS) {
3838 memcpy(&vcpu->arch.sie_block->gcr, &kvm_run->s.regs.crs, 128);
David Hildenbrandd3d692c2014-07-29 08:53:36 +02003839 /* some control register changes require a tlb flush */
3840 kvm_make_request(KVM_REQ_TLB_FLUSH, vcpu);
David Hildenbrandb028ee32014-07-17 10:47:43 +02003841 }
3842 if (kvm_run->kvm_dirty_regs & KVM_SYNC_ARCH0) {
David Hildenbrand4287f242016-02-15 09:40:12 +01003843 kvm_s390_set_cpu_timer(vcpu, kvm_run->s.regs.cputm);
David Hildenbrandb028ee32014-07-17 10:47:43 +02003844 vcpu->arch.sie_block->ckc = kvm_run->s.regs.ckc;
3845 vcpu->arch.sie_block->todpr = kvm_run->s.regs.todpr;
3846 vcpu->arch.sie_block->pp = kvm_run->s.regs.pp;
3847 vcpu->arch.sie_block->gbea = kvm_run->s.regs.gbea;
3848 }
3849 if (kvm_run->kvm_dirty_regs & KVM_SYNC_PFAULT) {
3850 vcpu->arch.pfault_token = kvm_run->s.regs.pft;
3851 vcpu->arch.pfault_select = kvm_run->s.regs.pfs;
3852 vcpu->arch.pfault_compare = kvm_run->s.regs.pfc;
David Hildenbrand9fbd8082014-10-09 15:01:38 +02003853 if (vcpu->arch.pfault_token == KVM_S390_PFAULT_TOKEN_INVALID)
3854 kvm_clear_async_pf_completion_queue(vcpu);
David Hildenbrandb028ee32014-07-17 10:47:43 +02003855 }
Fan Zhang80cd8762016-08-15 04:53:22 +02003856 /*
3857 * If userspace sets the riccb (e.g. after migration) to a valid state,
3858 * we should enable RI here instead of doing the lazy enablement.
3859 */
3860 if ((kvm_run->kvm_dirty_regs & KVM_SYNC_RICCB) &&
Christian Borntraeger4d5f2c02017-02-09 17:15:41 +01003861 test_kvm_facility(vcpu->kvm, 64) &&
Alice Frosibb59c2d2017-09-14 12:35:45 +02003862 riccb->v &&
David Hildenbrand0c9d8682017-03-13 11:48:28 +01003863 !(vcpu->arch.sie_block->ecb3 & ECB3_RI)) {
Christian Borntraeger4d5f2c02017-02-09 17:15:41 +01003864 VCPU_EVENT(vcpu, 3, "%s", "ENABLE: RI (sync_regs)");
David Hildenbrand0c9d8682017-03-13 11:48:28 +01003865 vcpu->arch.sie_block->ecb3 |= ECB3_RI;
Fan Zhang80cd8762016-08-15 04:53:22 +02003866 }
Fan Zhang4e0b1ab2016-11-29 07:17:55 +01003867 /*
3868 * If userspace sets the gscb (e.g. after migration) to non-zero,
3869 * we should enable GS here instead of doing the lazy enablement.
3870 */
3871 if ((kvm_run->kvm_dirty_regs & KVM_SYNC_GSCB) &&
3872 test_kvm_facility(vcpu->kvm, 133) &&
3873 gscb->gssm &&
3874 !vcpu->arch.gs_enabled) {
3875 VCPU_EVENT(vcpu, 3, "%s", "ENABLE: GS (sync_regs)");
3876 vcpu->arch.sie_block->ecb |= ECB_GS;
3877 vcpu->arch.sie_block->ecd |= ECD_HOSTREGMGMT;
3878 vcpu->arch.gs_enabled = 1;
Fan Zhang80cd8762016-08-15 04:53:22 +02003879 }
Christian Borntraeger35b3fde2018-01-17 14:44:34 +01003880 if ((kvm_run->kvm_dirty_regs & KVM_SYNC_BPBC) &&
3881 test_kvm_facility(vcpu->kvm, 82)) {
3882 vcpu->arch.sie_block->fpf &= ~FPF_BPBC;
3883 vcpu->arch.sie_block->fpf |= kvm_run->s.regs.bpbc ? FPF_BPBC : 0;
3884 }
Christian Borntraeger31d8b8d2016-11-10 14:22:02 +01003885 save_access_regs(vcpu->arch.host_acrs);
3886 restore_access_regs(vcpu->run->s.regs.acrs);
Christian Borntraegere1788bb2016-11-22 09:29:38 +01003887 /* save host (userspace) fprs/vrs */
3888 save_fpu_regs();
3889 vcpu->arch.host_fpregs.fpc = current->thread.fpu.fpc;
3890 vcpu->arch.host_fpregs.regs = current->thread.fpu.regs;
3891 if (MACHINE_HAS_VX)
3892 current->thread.fpu.regs = vcpu->run->s.regs.vrs;
3893 else
3894 current->thread.fpu.regs = vcpu->run->s.regs.fprs;
3895 current->thread.fpu.fpc = vcpu->run->s.regs.fpc;
3896 if (test_fp_ctl(current->thread.fpu.fpc))
3897 /* User space provided an invalid FPC, let's clear it */
3898 current->thread.fpu.fpc = 0;
Fan Zhang4e0b1ab2016-11-29 07:17:55 +01003899 if (MACHINE_HAS_GS) {
3900 preempt_disable();
3901 __ctl_set_bit(2, 4);
3902 if (current->thread.gs_cb) {
3903 vcpu->arch.host_gscb = current->thread.gs_cb;
3904 save_gs_cb(vcpu->arch.host_gscb);
3905 }
3906 if (vcpu->arch.gs_enabled) {
3907 current->thread.gs_cb = (struct gs_cb *)
3908 &vcpu->run->s.regs.gscb;
3909 restore_gs_cb(current->thread.gs_cb);
3910 }
3911 preempt_enable();
3912 }
Christian Borntraegera3da7b42018-03-08 16:08:49 +00003913 /* SIE will load etoken directly from SDNX and therefore kvm_run */
Fan Zhang80cd8762016-08-15 04:53:22 +02003914
David Hildenbrandb028ee32014-07-17 10:47:43 +02003915 kvm_run->kvm_dirty_regs = 0;
3916}
3917
3918static void store_regs(struct kvm_vcpu *vcpu, struct kvm_run *kvm_run)
3919{
3920 kvm_run->psw_mask = vcpu->arch.sie_block->gpsw.mask;
3921 kvm_run->psw_addr = vcpu->arch.sie_block->gpsw.addr;
3922 kvm_run->s.regs.prefix = kvm_s390_get_prefix(vcpu);
3923 memcpy(&kvm_run->s.regs.crs, &vcpu->arch.sie_block->gcr, 128);
David Hildenbrand4287f242016-02-15 09:40:12 +01003924 kvm_run->s.regs.cputm = kvm_s390_get_cpu_timer(vcpu);
David Hildenbrandb028ee32014-07-17 10:47:43 +02003925 kvm_run->s.regs.ckc = vcpu->arch.sie_block->ckc;
3926 kvm_run->s.regs.todpr = vcpu->arch.sie_block->todpr;
3927 kvm_run->s.regs.pp = vcpu->arch.sie_block->pp;
3928 kvm_run->s.regs.gbea = vcpu->arch.sie_block->gbea;
3929 kvm_run->s.regs.pft = vcpu->arch.pfault_token;
3930 kvm_run->s.regs.pfs = vcpu->arch.pfault_select;
3931 kvm_run->s.regs.pfc = vcpu->arch.pfault_compare;
Christian Borntraeger35b3fde2018-01-17 14:44:34 +01003932 kvm_run->s.regs.bpbc = (vcpu->arch.sie_block->fpf & FPF_BPBC) == FPF_BPBC;
Christian Borntraeger31d8b8d2016-11-10 14:22:02 +01003933 save_access_regs(vcpu->run->s.regs.acrs);
3934 restore_access_regs(vcpu->arch.host_acrs);
Christian Borntraegere1788bb2016-11-22 09:29:38 +01003935 /* Save guest register state */
3936 save_fpu_regs();
3937 vcpu->run->s.regs.fpc = current->thread.fpu.fpc;
3938 /* Restore will be done lazily at return */
3939 current->thread.fpu.fpc = vcpu->arch.host_fpregs.fpc;
3940 current->thread.fpu.regs = vcpu->arch.host_fpregs.regs;
Fan Zhang4e0b1ab2016-11-29 07:17:55 +01003941 if (MACHINE_HAS_GS) {
3942 __ctl_set_bit(2, 4);
3943 if (vcpu->arch.gs_enabled)
3944 save_gs_cb(current->thread.gs_cb);
3945 preempt_disable();
3946 current->thread.gs_cb = vcpu->arch.host_gscb;
3947 restore_gs_cb(vcpu->arch.host_gscb);
3948 preempt_enable();
3949 if (!vcpu->arch.host_gscb)
3950 __ctl_clear_bit(2, 4);
3951 vcpu->arch.host_gscb = NULL;
3952 }
Christian Borntraegera3da7b42018-03-08 16:08:49 +00003953 /* SIE will save etoken directly into SDNX and therefore kvm_run */
David Hildenbrandb028ee32014-07-17 10:47:43 +02003954}
3955
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003956int kvm_arch_vcpu_ioctl_run(struct kvm_vcpu *vcpu, struct kvm_run *kvm_run)
3957{
Christian Borntraeger8f2abe62008-03-25 18:47:23 +01003958 int rc;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003959
Paolo Bonzini460df4c2017-02-08 11:50:15 +01003960 if (kvm_run->immediate_exit)
3961 return -EINTR;
3962
Christoffer Dallaccb7572017-12-04 21:35:25 +01003963 vcpu_load(vcpu);
3964
David Hildenbrand27291e22014-01-23 12:26:52 +01003965 if (guestdbg_exit_pending(vcpu)) {
3966 kvm_s390_prepare_debug_exit(vcpu);
Christoffer Dallaccb7572017-12-04 21:35:25 +01003967 rc = 0;
3968 goto out;
David Hildenbrand27291e22014-01-23 12:26:52 +01003969 }
3970
Jan H. Schönherr20b70352017-11-24 22:39:01 +01003971 kvm_sigset_activate(vcpu);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003972
David Hildenbrand6352e4d2014-04-10 17:35:00 +02003973 if (!kvm_s390_user_cpu_state_ctrl(vcpu->kvm)) {
3974 kvm_s390_vcpu_start(vcpu);
3975 } else if (is_vcpu_stopped(vcpu)) {
David Hildenbrandea2cdd22015-05-20 13:24:02 +02003976 pr_err_ratelimited("can't run stopped vcpu %d\n",
David Hildenbrand6352e4d2014-04-10 17:35:00 +02003977 vcpu->vcpu_id);
Christoffer Dallaccb7572017-12-04 21:35:25 +01003978 rc = -EINVAL;
3979 goto out;
David Hildenbrand6352e4d2014-04-10 17:35:00 +02003980 }
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003981
David Hildenbrandb028ee32014-07-17 10:47:43 +02003982 sync_regs(vcpu, kvm_run);
David Hildenbranddb0758b2016-02-15 09:42:25 +01003983 enable_cpu_timer_accounting(vcpu);
Carsten Otted7b0b5e2009-11-19 14:21:16 +01003984
Heiko Carstensdab4079d2009-06-12 10:26:32 +02003985 might_fault();
Thomas Hutha76ccff2013-09-12 10:33:44 +02003986 rc = __vcpu_run(vcpu);
Christian Ehrhardt9ace9032009-05-20 15:34:55 +02003987
Christian Ehrhardtb1d16c42009-05-20 15:34:56 +02003988 if (signal_pending(current) && !rc) {
3989 kvm_run->exit_reason = KVM_EXIT_INTR;
Christian Borntraeger8f2abe62008-03-25 18:47:23 +01003990 rc = -EINTR;
Christian Ehrhardtb1d16c42009-05-20 15:34:56 +02003991 }
Christian Borntraeger8f2abe62008-03-25 18:47:23 +01003992
David Hildenbrand27291e22014-01-23 12:26:52 +01003993 if (guestdbg_exit_pending(vcpu) && !rc) {
3994 kvm_s390_prepare_debug_exit(vcpu);
3995 rc = 0;
3996 }
3997
Christian Borntraeger8f2abe62008-03-25 18:47:23 +01003998 if (rc == -EREMOTE) {
David Hildenbrand71f116b2015-10-19 16:24:28 +02003999 /* userspace support is needed, kvm_run has been prepared */
Christian Borntraeger8f2abe62008-03-25 18:47:23 +01004000 rc = 0;
4001 }
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004002
David Hildenbranddb0758b2016-02-15 09:42:25 +01004003 disable_cpu_timer_accounting(vcpu);
David Hildenbrandb028ee32014-07-17 10:47:43 +02004004 store_regs(vcpu, kvm_run);
Carsten Otted7b0b5e2009-11-19 14:21:16 +01004005
Jan H. Schönherr20b70352017-11-24 22:39:01 +01004006 kvm_sigset_deactivate(vcpu);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004007
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004008 vcpu->stat.exit_userspace++;
Christoffer Dallaccb7572017-12-04 21:35:25 +01004009out:
4010 vcpu_put(vcpu);
Heiko Carstens7e8e6ab2008-04-04 15:12:35 +02004011 return rc;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004012}
4013
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004014/*
4015 * store status at address
4016 * we use have two special cases:
4017 * KVM_S390_STORE_STATUS_NOADDR: -> 0x1200 on 64 bit
4018 * KVM_S390_STORE_STATUS_PREFIXED: -> prefix
4019 */
Heiko Carstensd0bce602014-01-01 16:45:58 +01004020int kvm_s390_store_status_unloaded(struct kvm_vcpu *vcpu, unsigned long gpa)
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004021{
Carsten Otte092670c2011-07-24 10:48:22 +02004022 unsigned char archmode = 1;
David Hildenbrand9abc2a02016-01-14 22:12:47 +01004023 freg_t fprs[NUM_FPRS];
Michael Muellerfda902c2014-05-13 16:58:30 +02004024 unsigned int px;
David Hildenbrand4287f242016-02-15 09:40:12 +01004025 u64 clkcomp, cputm;
Heiko Carstensd0bce602014-01-01 16:45:58 +01004026 int rc;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004027
Martin Schwidefskyd9a3a092015-10-23 09:02:32 +02004028 px = kvm_s390_get_prefix(vcpu);
Heiko Carstensd0bce602014-01-01 16:45:58 +01004029 if (gpa == KVM_S390_STORE_STATUS_NOADDR) {
4030 if (write_guest_abs(vcpu, 163, &archmode, 1))
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004031 return -EFAULT;
Martin Schwidefskyd9a3a092015-10-23 09:02:32 +02004032 gpa = 0;
Heiko Carstensd0bce602014-01-01 16:45:58 +01004033 } else if (gpa == KVM_S390_STORE_STATUS_PREFIXED) {
4034 if (write_guest_real(vcpu, 163, &archmode, 1))
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004035 return -EFAULT;
Martin Schwidefskyd9a3a092015-10-23 09:02:32 +02004036 gpa = px;
4037 } else
4038 gpa -= __LC_FPREGS_SAVE_AREA;
David Hildenbrand9abc2a02016-01-14 22:12:47 +01004039
4040 /* manually convert vector registers if necessary */
4041 if (MACHINE_HAS_VX) {
David Hildenbrand9522b372016-03-08 12:24:30 +01004042 convert_vx_to_fp(fprs, (__vector128 *) vcpu->run->s.regs.vrs);
David Hildenbrand9abc2a02016-01-14 22:12:47 +01004043 rc = write_guest_abs(vcpu, gpa + __LC_FPREGS_SAVE_AREA,
4044 fprs, 128);
4045 } else {
4046 rc = write_guest_abs(vcpu, gpa + __LC_FPREGS_SAVE_AREA,
David Hildenbrand6fd8e672016-01-18 14:46:34 +01004047 vcpu->run->s.regs.fprs, 128);
David Hildenbrand9abc2a02016-01-14 22:12:47 +01004048 }
Martin Schwidefskyd9a3a092015-10-23 09:02:32 +02004049 rc |= write_guest_abs(vcpu, gpa + __LC_GPREGS_SAVE_AREA,
Heiko Carstensd0bce602014-01-01 16:45:58 +01004050 vcpu->run->s.regs.gprs, 128);
Martin Schwidefskyd9a3a092015-10-23 09:02:32 +02004051 rc |= write_guest_abs(vcpu, gpa + __LC_PSW_SAVE_AREA,
Heiko Carstensd0bce602014-01-01 16:45:58 +01004052 &vcpu->arch.sie_block->gpsw, 16);
Martin Schwidefskyd9a3a092015-10-23 09:02:32 +02004053 rc |= write_guest_abs(vcpu, gpa + __LC_PREFIX_SAVE_AREA,
Michael Muellerfda902c2014-05-13 16:58:30 +02004054 &px, 4);
Martin Schwidefskyd9a3a092015-10-23 09:02:32 +02004055 rc |= write_guest_abs(vcpu, gpa + __LC_FP_CREG_SAVE_AREA,
David Hildenbrand9abc2a02016-01-14 22:12:47 +01004056 &vcpu->run->s.regs.fpc, 4);
Martin Schwidefskyd9a3a092015-10-23 09:02:32 +02004057 rc |= write_guest_abs(vcpu, gpa + __LC_TOD_PROGREG_SAVE_AREA,
Heiko Carstensd0bce602014-01-01 16:45:58 +01004058 &vcpu->arch.sie_block->todpr, 4);
David Hildenbrand4287f242016-02-15 09:40:12 +01004059 cputm = kvm_s390_get_cpu_timer(vcpu);
Martin Schwidefskyd9a3a092015-10-23 09:02:32 +02004060 rc |= write_guest_abs(vcpu, gpa + __LC_CPU_TIMER_SAVE_AREA,
David Hildenbrand4287f242016-02-15 09:40:12 +01004061 &cputm, 8);
Thomas Huth178bd782013-11-13 20:28:18 +01004062 clkcomp = vcpu->arch.sie_block->ckc >> 8;
Martin Schwidefskyd9a3a092015-10-23 09:02:32 +02004063 rc |= write_guest_abs(vcpu, gpa + __LC_CLOCK_COMP_SAVE_AREA,
Heiko Carstensd0bce602014-01-01 16:45:58 +01004064 &clkcomp, 8);
Martin Schwidefskyd9a3a092015-10-23 09:02:32 +02004065 rc |= write_guest_abs(vcpu, gpa + __LC_AREGS_SAVE_AREA,
Heiko Carstensd0bce602014-01-01 16:45:58 +01004066 &vcpu->run->s.regs.acrs, 64);
Martin Schwidefskyd9a3a092015-10-23 09:02:32 +02004067 rc |= write_guest_abs(vcpu, gpa + __LC_CREGS_SAVE_AREA,
Heiko Carstensd0bce602014-01-01 16:45:58 +01004068 &vcpu->arch.sie_block->gcr, 128);
4069 return rc ? -EFAULT : 0;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004070}
4071
Thomas Huthe8798922013-11-06 15:46:33 +01004072int kvm_s390_vcpu_store_status(struct kvm_vcpu *vcpu, unsigned long addr)
4073{
4074 /*
4075 * The guest FPRS and ACRS are in the host FPRS/ACRS due to the lazy
Christian Borntraeger31d8b8d2016-11-10 14:22:02 +01004076 * switch in the run ioctl. Let's update our copies before we save
Thomas Huthe8798922013-11-06 15:46:33 +01004077 * it into the save area
4078 */
Hendrik Bruecknerd0164ee2015-06-29 16:43:06 +02004079 save_fpu_regs();
David Hildenbrand9abc2a02016-01-14 22:12:47 +01004080 vcpu->run->s.regs.fpc = current->thread.fpu.fpc;
Thomas Huthe8798922013-11-06 15:46:33 +01004081 save_access_regs(vcpu->run->s.regs.acrs);
4082
4083 return kvm_s390_store_status_unloaded(vcpu, addr);
4084}
4085
David Hildenbrand8ad35752014-03-14 11:00:21 +01004086static void __disable_ibs_on_vcpu(struct kvm_vcpu *vcpu)
4087{
4088 kvm_check_request(KVM_REQ_ENABLE_IBS, vcpu);
Christian Borntraeger8e236542015-04-09 13:49:04 +02004089 kvm_s390_sync_request(KVM_REQ_DISABLE_IBS, vcpu);
David Hildenbrand8ad35752014-03-14 11:00:21 +01004090}
4091
4092static void __disable_ibs_on_all_vcpus(struct kvm *kvm)
4093{
4094 unsigned int i;
4095 struct kvm_vcpu *vcpu;
4096
4097 kvm_for_each_vcpu(i, vcpu, kvm) {
4098 __disable_ibs_on_vcpu(vcpu);
4099 }
4100}
4101
4102static void __enable_ibs_on_vcpu(struct kvm_vcpu *vcpu)
4103{
David Hildenbrand09a400e2016-04-04 15:57:08 +02004104 if (!sclp.has_ibs)
4105 return;
David Hildenbrand8ad35752014-03-14 11:00:21 +01004106 kvm_check_request(KVM_REQ_DISABLE_IBS, vcpu);
Christian Borntraeger8e236542015-04-09 13:49:04 +02004107 kvm_s390_sync_request(KVM_REQ_ENABLE_IBS, vcpu);
David Hildenbrand8ad35752014-03-14 11:00:21 +01004108}
4109
David Hildenbrand6852d7b2014-03-14 10:59:29 +01004110void kvm_s390_vcpu_start(struct kvm_vcpu *vcpu)
4111{
David Hildenbrand8ad35752014-03-14 11:00:21 +01004112 int i, online_vcpus, started_vcpus = 0;
4113
4114 if (!is_vcpu_stopped(vcpu))
4115 return;
4116
David Hildenbrand6852d7b2014-03-14 10:59:29 +01004117 trace_kvm_s390_vcpu_start_stop(vcpu->vcpu_id, 1);
David Hildenbrand8ad35752014-03-14 11:00:21 +01004118 /* Only one cpu at a time may enter/leave the STOPPED state. */
David Hildenbrand433b9ee2014-05-06 16:11:14 +02004119 spin_lock(&vcpu->kvm->arch.start_stop_lock);
David Hildenbrand8ad35752014-03-14 11:00:21 +01004120 online_vcpus = atomic_read(&vcpu->kvm->online_vcpus);
4121
4122 for (i = 0; i < online_vcpus; i++) {
4123 if (!is_vcpu_stopped(vcpu->kvm->vcpus[i]))
4124 started_vcpus++;
4125 }
4126
4127 if (started_vcpus == 0) {
4128 /* we're the only active VCPU -> speed it up */
4129 __enable_ibs_on_vcpu(vcpu);
4130 } else if (started_vcpus == 1) {
4131 /*
4132 * As we are starting a second VCPU, we have to disable
4133 * the IBS facility on all VCPUs to remove potentially
4134 * oustanding ENABLE requests.
4135 */
4136 __disable_ibs_on_all_vcpus(vcpu->kvm);
4137 }
4138
David Hildenbrand9daecfc2018-01-23 18:05:30 +01004139 kvm_s390_clear_cpuflags(vcpu, CPUSTAT_STOPPED);
David Hildenbrand8ad35752014-03-14 11:00:21 +01004140 /*
4141 * Another VCPU might have used IBS while we were offline.
4142 * Let's play safe and flush the VCPU at startup.
4143 */
David Hildenbrandd3d692c2014-07-29 08:53:36 +02004144 kvm_make_request(KVM_REQ_TLB_FLUSH, vcpu);
David Hildenbrand433b9ee2014-05-06 16:11:14 +02004145 spin_unlock(&vcpu->kvm->arch.start_stop_lock);
David Hildenbrand8ad35752014-03-14 11:00:21 +01004146 return;
David Hildenbrand6852d7b2014-03-14 10:59:29 +01004147}
4148
4149void kvm_s390_vcpu_stop(struct kvm_vcpu *vcpu)
4150{
David Hildenbrand8ad35752014-03-14 11:00:21 +01004151 int i, online_vcpus, started_vcpus = 0;
4152 struct kvm_vcpu *started_vcpu = NULL;
4153
4154 if (is_vcpu_stopped(vcpu))
4155 return;
4156
David Hildenbrand6852d7b2014-03-14 10:59:29 +01004157 trace_kvm_s390_vcpu_start_stop(vcpu->vcpu_id, 0);
David Hildenbrand8ad35752014-03-14 11:00:21 +01004158 /* Only one cpu at a time may enter/leave the STOPPED state. */
David Hildenbrand433b9ee2014-05-06 16:11:14 +02004159 spin_lock(&vcpu->kvm->arch.start_stop_lock);
David Hildenbrand8ad35752014-03-14 11:00:21 +01004160 online_vcpus = atomic_read(&vcpu->kvm->online_vcpus);
4161
David Hildenbrand32f5ff632014-04-14 12:40:03 +02004162 /* SIGP STOP and SIGP STOP AND STORE STATUS has been fully processed */
David Hildenbrand6cddd432014-10-15 16:48:53 +02004163 kvm_s390_clear_stop_irq(vcpu);
David Hildenbrand32f5ff632014-04-14 12:40:03 +02004164
David Hildenbrandef8f4f42018-01-23 18:05:29 +01004165 kvm_s390_set_cpuflags(vcpu, CPUSTAT_STOPPED);
David Hildenbrand8ad35752014-03-14 11:00:21 +01004166 __disable_ibs_on_vcpu(vcpu);
4167
4168 for (i = 0; i < online_vcpus; i++) {
4169 if (!is_vcpu_stopped(vcpu->kvm->vcpus[i])) {
4170 started_vcpus++;
4171 started_vcpu = vcpu->kvm->vcpus[i];
4172 }
4173 }
4174
4175 if (started_vcpus == 1) {
4176 /*
4177 * As we only have one VCPU left, we want to enable the
4178 * IBS facility for that VCPU to speed it up.
4179 */
4180 __enable_ibs_on_vcpu(started_vcpu);
4181 }
4182
David Hildenbrand433b9ee2014-05-06 16:11:14 +02004183 spin_unlock(&vcpu->kvm->arch.start_stop_lock);
David Hildenbrand8ad35752014-03-14 11:00:21 +01004184 return;
David Hildenbrand6852d7b2014-03-14 10:59:29 +01004185}
4186
Cornelia Huckd6712df2012-12-20 15:32:11 +01004187static int kvm_vcpu_ioctl_enable_cap(struct kvm_vcpu *vcpu,
4188 struct kvm_enable_cap *cap)
4189{
4190 int r;
4191
4192 if (cap->flags)
4193 return -EINVAL;
4194
4195 switch (cap->cap) {
Cornelia Huckfa6b7fe2012-12-20 15:32:12 +01004196 case KVM_CAP_S390_CSS_SUPPORT:
4197 if (!vcpu->kvm->arch.css_support) {
4198 vcpu->kvm->arch.css_support = 1;
Christian Borntraegerc92ea7b2015-07-22 15:52:10 +02004199 VM_EVENT(vcpu->kvm, 3, "%s", "ENABLE: CSS support");
Cornelia Huckfa6b7fe2012-12-20 15:32:12 +01004200 trace_kvm_s390_enable_css(vcpu->kvm);
4201 }
4202 r = 0;
4203 break;
Cornelia Huckd6712df2012-12-20 15:32:11 +01004204 default:
4205 r = -EINVAL;
4206 break;
4207 }
4208 return r;
4209}
4210
Thomas Huth41408c282015-02-06 15:01:21 +01004211static long kvm_s390_guest_mem_op(struct kvm_vcpu *vcpu,
4212 struct kvm_s390_mem_op *mop)
4213{
4214 void __user *uaddr = (void __user *)mop->buf;
4215 void *tmpbuf = NULL;
4216 int r, srcu_idx;
4217 const u64 supported_flags = KVM_S390_MEMOP_F_INJECT_EXCEPTION
4218 | KVM_S390_MEMOP_F_CHECK_ONLY;
4219
4220 if (mop->flags & ~supported_flags)
4221 return -EINVAL;
4222
4223 if (mop->size > MEM_OP_MAX_SIZE)
4224 return -E2BIG;
4225
4226 if (!(mop->flags & KVM_S390_MEMOP_F_CHECK_ONLY)) {
4227 tmpbuf = vmalloc(mop->size);
4228 if (!tmpbuf)
4229 return -ENOMEM;
4230 }
4231
4232 srcu_idx = srcu_read_lock(&vcpu->kvm->srcu);
4233
4234 switch (mop->op) {
4235 case KVM_S390_MEMOP_LOGICAL_READ:
4236 if (mop->flags & KVM_S390_MEMOP_F_CHECK_ONLY) {
David Hildenbrand92c96322015-11-16 15:42:11 +01004237 r = check_gva_range(vcpu, mop->gaddr, mop->ar,
4238 mop->size, GACC_FETCH);
Thomas Huth41408c282015-02-06 15:01:21 +01004239 break;
4240 }
4241 r = read_guest(vcpu, mop->gaddr, mop->ar, tmpbuf, mop->size);
4242 if (r == 0) {
4243 if (copy_to_user(uaddr, tmpbuf, mop->size))
4244 r = -EFAULT;
4245 }
4246 break;
4247 case KVM_S390_MEMOP_LOGICAL_WRITE:
4248 if (mop->flags & KVM_S390_MEMOP_F_CHECK_ONLY) {
David Hildenbrand92c96322015-11-16 15:42:11 +01004249 r = check_gva_range(vcpu, mop->gaddr, mop->ar,
4250 mop->size, GACC_STORE);
Thomas Huth41408c282015-02-06 15:01:21 +01004251 break;
4252 }
4253 if (copy_from_user(tmpbuf, uaddr, mop->size)) {
4254 r = -EFAULT;
4255 break;
4256 }
4257 r = write_guest(vcpu, mop->gaddr, mop->ar, tmpbuf, mop->size);
4258 break;
4259 default:
4260 r = -EINVAL;
4261 }
4262
4263 srcu_read_unlock(&vcpu->kvm->srcu, srcu_idx);
4264
4265 if (r > 0 && (mop->flags & KVM_S390_MEMOP_F_INJECT_EXCEPTION) != 0)
4266 kvm_s390_inject_prog_irq(vcpu, &vcpu->arch.pgm);
4267
4268 vfree(tmpbuf);
4269 return r;
4270}
4271
Paolo Bonzini5cb09442017-12-12 17:41:34 +01004272long kvm_arch_vcpu_async_ioctl(struct file *filp,
4273 unsigned int ioctl, unsigned long arg)
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004274{
4275 struct kvm_vcpu *vcpu = filp->private_data;
4276 void __user *argp = (void __user *)arg;
4277
Avi Kivity93736622010-05-13 12:35:17 +03004278 switch (ioctl) {
Jens Freimann47b43c52014-11-11 20:57:06 +01004279 case KVM_S390_IRQ: {
4280 struct kvm_s390_irq s390irq;
4281
Jens Freimann47b43c52014-11-11 20:57:06 +01004282 if (copy_from_user(&s390irq, argp, sizeof(s390irq)))
Christoffer Dall9b0624712017-12-04 21:35:36 +01004283 return -EFAULT;
4284 return kvm_s390_inject_vcpu(vcpu, &s390irq);
Jens Freimann47b43c52014-11-11 20:57:06 +01004285 }
Avi Kivity93736622010-05-13 12:35:17 +03004286 case KVM_S390_INTERRUPT: {
Carsten Otteba5c1e92008-03-25 18:47:26 +01004287 struct kvm_s390_interrupt s390int;
Jens Freimann383d0b02014-07-29 15:11:49 +02004288 struct kvm_s390_irq s390irq;
Carsten Otteba5c1e92008-03-25 18:47:26 +01004289
4290 if (copy_from_user(&s390int, argp, sizeof(s390int)))
Christoffer Dall9b0624712017-12-04 21:35:36 +01004291 return -EFAULT;
Jens Freimann383d0b02014-07-29 15:11:49 +02004292 if (s390int_to_s390irq(&s390int, &s390irq))
4293 return -EINVAL;
Christoffer Dall9b0624712017-12-04 21:35:36 +01004294 return kvm_s390_inject_vcpu(vcpu, &s390irq);
Carsten Otteba5c1e92008-03-25 18:47:26 +01004295 }
Christoffer Dall9b0624712017-12-04 21:35:36 +01004296 }
Paolo Bonzini5cb09442017-12-12 17:41:34 +01004297 return -ENOIOCTLCMD;
4298}
4299
4300long kvm_arch_vcpu_ioctl(struct file *filp,
4301 unsigned int ioctl, unsigned long arg)
4302{
4303 struct kvm_vcpu *vcpu = filp->private_data;
4304 void __user *argp = (void __user *)arg;
4305 int idx;
4306 long r;
Christoffer Dall9b0624712017-12-04 21:35:36 +01004307
4308 vcpu_load(vcpu);
4309
4310 switch (ioctl) {
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004311 case KVM_S390_STORE_STATUS:
Thomas Huth800c1062013-09-12 10:33:45 +02004312 idx = srcu_read_lock(&vcpu->kvm->srcu);
Avi Kivitybc923cc2010-05-13 12:21:46 +03004313 r = kvm_s390_vcpu_store_status(vcpu, arg);
Thomas Huth800c1062013-09-12 10:33:45 +02004314 srcu_read_unlock(&vcpu->kvm->srcu, idx);
Avi Kivitybc923cc2010-05-13 12:21:46 +03004315 break;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004316 case KVM_S390_SET_INITIAL_PSW: {
4317 psw_t psw;
4318
Avi Kivitybc923cc2010-05-13 12:21:46 +03004319 r = -EFAULT;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004320 if (copy_from_user(&psw, argp, sizeof(psw)))
Avi Kivitybc923cc2010-05-13 12:21:46 +03004321 break;
4322 r = kvm_arch_vcpu_ioctl_set_initial_psw(vcpu, psw);
4323 break;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004324 }
4325 case KVM_S390_INITIAL_RESET:
Avi Kivitybc923cc2010-05-13 12:21:46 +03004326 r = kvm_arch_vcpu_ioctl_initial_reset(vcpu);
4327 break;
Carsten Otte14eebd92012-05-15 14:15:26 +02004328 case KVM_SET_ONE_REG:
4329 case KVM_GET_ONE_REG: {
4330 struct kvm_one_reg reg;
4331 r = -EFAULT;
4332 if (copy_from_user(&reg, argp, sizeof(reg)))
4333 break;
4334 if (ioctl == KVM_SET_ONE_REG)
4335 r = kvm_arch_vcpu_ioctl_set_one_reg(vcpu, &reg);
4336 else
4337 r = kvm_arch_vcpu_ioctl_get_one_reg(vcpu, &reg);
4338 break;
4339 }
Carsten Otte27e03932012-01-04 10:25:21 +01004340#ifdef CONFIG_KVM_S390_UCONTROL
4341 case KVM_S390_UCAS_MAP: {
4342 struct kvm_s390_ucas_mapping ucasmap;
4343
4344 if (copy_from_user(&ucasmap, argp, sizeof(ucasmap))) {
4345 r = -EFAULT;
4346 break;
4347 }
4348
4349 if (!kvm_is_ucontrol(vcpu->kvm)) {
4350 r = -EINVAL;
4351 break;
4352 }
4353
4354 r = gmap_map_segment(vcpu->arch.gmap, ucasmap.user_addr,
4355 ucasmap.vcpu_addr, ucasmap.length);
4356 break;
4357 }
4358 case KVM_S390_UCAS_UNMAP: {
4359 struct kvm_s390_ucas_mapping ucasmap;
4360
4361 if (copy_from_user(&ucasmap, argp, sizeof(ucasmap))) {
4362 r = -EFAULT;
4363 break;
4364 }
4365
4366 if (!kvm_is_ucontrol(vcpu->kvm)) {
4367 r = -EINVAL;
4368 break;
4369 }
4370
4371 r = gmap_unmap_segment(vcpu->arch.gmap, ucasmap.vcpu_addr,
4372 ucasmap.length);
4373 break;
4374 }
4375#endif
Carsten Otteccc79102012-01-04 10:25:26 +01004376 case KVM_S390_VCPU_FAULT: {
Martin Schwidefsky527e30b2014-04-30 16:04:25 +02004377 r = gmap_fault(vcpu->arch.gmap, arg, 0);
Carsten Otteccc79102012-01-04 10:25:26 +01004378 break;
4379 }
Cornelia Huckd6712df2012-12-20 15:32:11 +01004380 case KVM_ENABLE_CAP:
4381 {
4382 struct kvm_enable_cap cap;
4383 r = -EFAULT;
4384 if (copy_from_user(&cap, argp, sizeof(cap)))
4385 break;
4386 r = kvm_vcpu_ioctl_enable_cap(vcpu, &cap);
4387 break;
4388 }
Thomas Huth41408c282015-02-06 15:01:21 +01004389 case KVM_S390_MEM_OP: {
4390 struct kvm_s390_mem_op mem_op;
4391
4392 if (copy_from_user(&mem_op, argp, sizeof(mem_op)) == 0)
4393 r = kvm_s390_guest_mem_op(vcpu, &mem_op);
4394 else
4395 r = -EFAULT;
4396 break;
4397 }
Jens Freimann816c7662014-11-24 17:13:46 +01004398 case KVM_S390_SET_IRQ_STATE: {
4399 struct kvm_s390_irq_state irq_state;
4400
4401 r = -EFAULT;
4402 if (copy_from_user(&irq_state, argp, sizeof(irq_state)))
4403 break;
4404 if (irq_state.len > VCPU_IRQS_MAX_BUF ||
4405 irq_state.len == 0 ||
4406 irq_state.len % sizeof(struct kvm_s390_irq) > 0) {
4407 r = -EINVAL;
4408 break;
4409 }
Christian Borntraegerbb64da92017-11-21 16:02:52 +01004410 /* do not use irq_state.flags, it will break old QEMUs */
Jens Freimann816c7662014-11-24 17:13:46 +01004411 r = kvm_s390_set_irq_state(vcpu,
4412 (void __user *) irq_state.buf,
4413 irq_state.len);
4414 break;
4415 }
4416 case KVM_S390_GET_IRQ_STATE: {
4417 struct kvm_s390_irq_state irq_state;
4418
4419 r = -EFAULT;
4420 if (copy_from_user(&irq_state, argp, sizeof(irq_state)))
4421 break;
4422 if (irq_state.len == 0) {
4423 r = -EINVAL;
4424 break;
4425 }
Christian Borntraegerbb64da92017-11-21 16:02:52 +01004426 /* do not use irq_state.flags, it will break old QEMUs */
Jens Freimann816c7662014-11-24 17:13:46 +01004427 r = kvm_s390_get_irq_state(vcpu,
4428 (__u8 __user *) irq_state.buf,
4429 irq_state.len);
4430 break;
4431 }
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004432 default:
Carsten Otte3e6afcf2012-01-04 10:25:30 +01004433 r = -ENOTTY;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004434 }
Christoffer Dall9b0624712017-12-04 21:35:36 +01004435
4436 vcpu_put(vcpu);
Avi Kivitybc923cc2010-05-13 12:21:46 +03004437 return r;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004438}
4439
Souptick Joarder1499fa82018-04-19 00:49:58 +05304440vm_fault_t kvm_arch_vcpu_fault(struct kvm_vcpu *vcpu, struct vm_fault *vmf)
Carsten Otte5b1c1492012-01-04 10:25:23 +01004441{
4442#ifdef CONFIG_KVM_S390_UCONTROL
4443 if ((vmf->pgoff == KVM_S390_SIE_PAGE_OFFSET)
4444 && (kvm_is_ucontrol(vcpu->kvm))) {
4445 vmf->page = virt_to_page(vcpu->arch.sie_block);
4446 get_page(vmf->page);
4447 return 0;
4448 }
4449#endif
4450 return VM_FAULT_SIGBUS;
4451}
4452
Aneesh Kumar K.V55870272013-10-07 22:18:00 +05304453int kvm_arch_create_memslot(struct kvm *kvm, struct kvm_memory_slot *slot,
4454 unsigned long npages)
Takuya Yoshikawadb3fe4e2012-02-08 13:02:18 +09004455{
4456 return 0;
4457}
4458
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004459/* Section: memory related */
Marcelo Tosattif7784b82009-12-23 14:35:18 -02004460int kvm_arch_prepare_memory_region(struct kvm *kvm,
4461 struct kvm_memory_slot *memslot,
Paolo Bonzini09170a42015-05-18 13:59:39 +02004462 const struct kvm_userspace_memory_region *mem,
Takuya Yoshikawa7b6195a2013-02-27 19:44:34 +09004463 enum kvm_mr_change change)
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004464{
Nick Wangdd2887e2013-03-25 17:22:57 +01004465 /* A few sanity checks. We can have memory slots which have to be
4466 located/ended at a segment boundary (1MB). The memory in userland is
4467 ok to be fragmented into various different vmas. It is okay to mmap()
4468 and munmap() stuff in this slot after doing this call at any time */
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004469
Carsten Otte598841c2011-07-24 10:48:21 +02004470 if (mem->userspace_addr & 0xffffful)
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004471 return -EINVAL;
4472
Carsten Otte598841c2011-07-24 10:48:21 +02004473 if (mem->memory_size & 0xffffful)
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004474 return -EINVAL;
4475
Dominik Dingela3a92c32014-12-01 17:24:42 +01004476 if (mem->guest_phys_addr + mem->memory_size > kvm->arch.mem_limit)
4477 return -EINVAL;
4478
Marcelo Tosattif7784b82009-12-23 14:35:18 -02004479 return 0;
4480}
4481
4482void kvm_arch_commit_memory_region(struct kvm *kvm,
Paolo Bonzini09170a42015-05-18 13:59:39 +02004483 const struct kvm_userspace_memory_region *mem,
Takuya Yoshikawa84826442013-02-27 19:45:25 +09004484 const struct kvm_memory_slot *old,
Paolo Bonzinif36f3f22015-05-18 13:20:23 +02004485 const struct kvm_memory_slot *new,
Takuya Yoshikawa84826442013-02-27 19:45:25 +09004486 enum kvm_mr_change change)
Marcelo Tosattif7784b82009-12-23 14:35:18 -02004487{
Carsten Ottef7850c92011-07-24 10:48:23 +02004488 int rc;
Marcelo Tosattif7784b82009-12-23 14:35:18 -02004489
Christian Borntraeger2cef4de2013-03-25 17:22:48 +01004490 /* If the basics of the memslot do not change, we do not want
4491 * to update the gmap. Every update causes several unnecessary
4492 * segment translation exceptions. This is usually handled just
4493 * fine by the normal fault handler + gmap, but it will also
4494 * cause faults on the prefix page of running guest CPUs.
4495 */
4496 if (old->userspace_addr == mem->userspace_addr &&
4497 old->base_gfn * PAGE_SIZE == mem->guest_phys_addr &&
4498 old->npages * PAGE_SIZE == mem->memory_size)
4499 return;
Carsten Otte598841c2011-07-24 10:48:21 +02004500
4501 rc = gmap_map_segment(kvm->arch.gmap, mem->userspace_addr,
4502 mem->guest_phys_addr, mem->memory_size);
4503 if (rc)
David Hildenbrandea2cdd22015-05-20 13:24:02 +02004504 pr_warn("failed to commit memory region\n");
Carsten Otte598841c2011-07-24 10:48:21 +02004505 return;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004506}
4507
Alexander Yarygin60a37702016-04-01 15:38:57 +03004508static inline unsigned long nonhyp_mask(int i)
4509{
4510 unsigned int nonhyp_fai = (sclp.hmfai << i * 2) >> 30;
4511
4512 return 0x0000ffffffffffffUL >> (nonhyp_fai << 4);
4513}
4514
Christian Borntraeger3491caf2016-05-13 12:16:35 +02004515void kvm_arch_vcpu_block_finish(struct kvm_vcpu *vcpu)
4516{
4517 vcpu->valid_wakeup = false;
4518}
4519
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004520static int __init kvm_s390_init(void)
4521{
Alexander Yarygin60a37702016-04-01 15:38:57 +03004522 int i;
4523
David Hildenbrand07197fd2015-01-30 16:01:38 +01004524 if (!sclp.has_sief2) {
Michael Mueller8d43d572018-12-10 11:15:16 +01004525 pr_info("SIE is not available\n");
David Hildenbrand07197fd2015-01-30 16:01:38 +01004526 return -ENODEV;
4527 }
4528
Janosch Franka4499382018-07-13 11:28:31 +01004529 if (nested && hpage) {
Michael Mueller8d43d572018-12-10 11:15:16 +01004530 pr_info("A KVM host that supports nesting cannot back its KVM guests with huge pages\n");
Janosch Franka4499382018-07-13 11:28:31 +01004531 return -EINVAL;
4532 }
4533
Alexander Yarygin60a37702016-04-01 15:38:57 +03004534 for (i = 0; i < 16; i++)
Christian Borntraegerc3b9e3e2018-02-09 16:26:29 +00004535 kvm_s390_fac_base[i] |=
Alexander Yarygin60a37702016-04-01 15:38:57 +03004536 S390_lowcore.stfle_fac_list[i] & nonhyp_mask(i);
4537
Michael Mueller9d8d5782015-02-02 15:42:51 +01004538 return kvm_init(NULL, sizeof(struct kvm_vcpu), 0, THIS_MODULE);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004539}
4540
4541static void __exit kvm_s390_exit(void)
4542{
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004543 kvm_exit();
4544}
4545
4546module_init(kvm_s390_init);
4547module_exit(kvm_s390_exit);
Cornelia Huck566af942013-05-27 18:42:33 +02004548
4549/*
4550 * Enable autoloading of the kvm module.
4551 * Note that we add the module alias here instead of virt/kvm/kvm_main.c
4552 * since x86 takes a different approach.
4553 */
4554#include <linux/miscdevice.h>
4555MODULE_ALIAS_MISCDEV(KVM_MINOR);
4556MODULE_ALIAS("devname:kvm");