blob: c94ef2d0dbe4e1af0e6e476aeac248208b1ff42a [file] [log] [blame]
Greg Kroah-Hartmand809aa22017-11-24 15:00:33 +01001// SPDX-License-Identifier: GPL-2.0
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002/*
Christian Borntraegerbb64da92017-11-21 16:02:52 +01003 * hosting IBM Z kernel virtual machines (s390x)
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004 *
Christian Borntraegera37cb072018-01-23 13:28:40 +01005 * Copyright IBM Corp. 2008, 2018
Heiko Carstensb0c632d2008-03-25 18:47:20 +01006 *
7 * Author(s): Carsten Otte <cotte@de.ibm.com>
8 * Christian Borntraeger <borntraeger@de.ibm.com>
9 * Heiko Carstens <heiko.carstens@de.ibm.com>
Christian Ehrhardt628eb9b2009-05-25 13:40:51 +020010 * Christian Ehrhardt <ehrhardt@de.ibm.com>
Jason J. Herne15f36eb2012-08-02 10:10:17 -040011 * Jason J. Herne <jjherne@us.ibm.com>
Heiko Carstensb0c632d2008-03-25 18:47:20 +010012 */
13
14#include <linux/compiler.h>
15#include <linux/err.h>
16#include <linux/fs.h>
Christian Borntraegerca872302009-05-12 17:21:49 +020017#include <linux/hrtimer.h>
Heiko Carstensb0c632d2008-03-25 18:47:20 +010018#include <linux/init.h>
19#include <linux/kvm.h>
20#include <linux/kvm_host.h>
Martin Schwidefskyb2d73b22016-03-08 11:54:42 +010021#include <linux/mman.h>
Heiko Carstensb0c632d2008-03-25 18:47:20 +010022#include <linux/module.h>
Paul Gortmakerd3217962017-02-09 15:20:25 -050023#include <linux/moduleparam.h>
Tony Krowiaka374e892014-09-03 10:13:53 +020024#include <linux/random.h>
Heiko Carstensb0c632d2008-03-25 18:47:20 +010025#include <linux/slab.h>
Carsten Otteba5c1e92008-03-25 18:47:26 +010026#include <linux/timer.h>
Thomas Huth41408c282015-02-06 15:01:21 +010027#include <linux/vmalloc.h>
David Hildenbrand15c97052015-03-19 17:36:43 +010028#include <linux/bitmap.h>
Ingo Molnar174cd4b2017-02-02 19:15:33 +010029#include <linux/sched/signal.h>
Claudio Imbrenda190df4a2016-08-04 17:54:42 +020030#include <linux/string.h>
Ingo Molnar174cd4b2017-02-02 19:15:33 +010031
Heiko Carstenscbb870c2010-02-26 22:37:43 +010032#include <asm/asm-offsets.h>
Heiko Carstensb0c632d2008-03-25 18:47:20 +010033#include <asm/lowcore.h>
Martin Schwidefskyfd5ada02016-05-31 15:06:51 +020034#include <asm/stp.h>
Heiko Carstensb0c632d2008-03-25 18:47:20 +010035#include <asm/pgtable.h>
Martin Schwidefsky1e133ab2016-03-08 11:49:57 +010036#include <asm/gmap.h>
Heiko Carstensf5daba12009-03-26 15:24:01 +010037#include <asm/nmi.h>
David Howellsa0616cd2012-03-28 18:30:02 +010038#include <asm/switch_to.h>
Jens Freimann6d3da242013-07-03 15:18:35 +020039#include <asm/isc.h>
Christian Borntraeger1526bf92012-05-15 14:15:25 +020040#include <asm/sclp.h>
David Hildenbrand0a763c72016-05-18 16:03:47 +020041#include <asm/cpacf.h>
Linus Torvalds221bb8a2016-08-02 16:11:27 -040042#include <asm/timex.h>
Tony Krowiake585b242018-09-25 19:16:18 -040043#include <asm/ap.h>
Christian Borntraeger8f2abe62008-03-25 18:47:23 +010044#include "kvm-s390.h"
Heiko Carstensb0c632d2008-03-25 18:47:20 +010045#include "gaccess.h"
46
David Hildenbrandea2cdd22015-05-20 13:24:02 +020047#define KMSG_COMPONENT "kvm-s390"
48#undef pr_fmt
49#define pr_fmt(fmt) KMSG_COMPONENT ": " fmt
50
Cornelia Huck5786fff2012-07-23 17:20:29 +020051#define CREATE_TRACE_POINTS
52#include "trace.h"
Cornelia Huckade38c32012-07-23 17:20:30 +020053#include "trace-s390.h"
Cornelia Huck5786fff2012-07-23 17:20:29 +020054
Thomas Huth41408c282015-02-06 15:01:21 +010055#define MEM_OP_MAX_SIZE 65536 /* Maximum transfer size for KVM_S390_MEM_OP */
Jens Freimann816c7662014-11-24 17:13:46 +010056#define LOCAL_IRQS 32
57#define VCPU_IRQS_MAX_BUF (sizeof(struct kvm_s390_irq) * \
58 (KVM_MAX_VCPUS + LOCAL_IRQS))
Thomas Huth41408c282015-02-06 15:01:21 +010059
Heiko Carstensb0c632d2008-03-25 18:47:20 +010060#define VCPU_STAT(x) offsetof(struct kvm_vcpu, stat.x), KVM_STAT_VCPU
Christian Borntraegerccc40c52018-03-08 12:48:05 +000061#define VM_STAT(x) offsetof(struct kvm, stat.x), KVM_STAT_VM
Heiko Carstensb0c632d2008-03-25 18:47:20 +010062
63struct kvm_stats_debugfs_item debugfs_entries[] = {
64 { "userspace_handled", VCPU_STAT(exit_userspace) },
Christian Borntraeger0eaeafa2008-05-07 09:22:53 +020065 { "exit_null", VCPU_STAT(exit_null) },
Christian Borntraeger8f2abe62008-03-25 18:47:23 +010066 { "exit_validity", VCPU_STAT(exit_validity) },
67 { "exit_stop_request", VCPU_STAT(exit_stop_request) },
68 { "exit_external_request", VCPU_STAT(exit_external_request) },
Christian Borntraegera5e0acea92018-02-23 07:57:33 +000069 { "exit_io_request", VCPU_STAT(exit_io_request) },
Christian Borntraeger8f2abe62008-03-25 18:47:23 +010070 { "exit_external_interrupt", VCPU_STAT(exit_external_interrupt) },
Carsten Otteba5c1e92008-03-25 18:47:26 +010071 { "exit_instruction", VCPU_STAT(exit_instruction) },
Alexander Yarygin9ec6de12016-05-06 16:33:06 +030072 { "exit_pei", VCPU_STAT(exit_pei) },
Carsten Otteba5c1e92008-03-25 18:47:26 +010073 { "exit_program_interruption", VCPU_STAT(exit_program_interruption) },
74 { "exit_instr_and_program_int", VCPU_STAT(exit_instr_and_program) },
Janosch Franka011eeb2016-05-09 14:14:01 +020075 { "exit_operation_exception", VCPU_STAT(exit_operation_exception) },
Paolo Bonzinif7819512015-02-04 18:20:58 +010076 { "halt_successful_poll", VCPU_STAT(halt_successful_poll) },
Paolo Bonzini62bea5b2015-09-15 18:27:57 +020077 { "halt_attempted_poll", VCPU_STAT(halt_attempted_poll) },
Christian Borntraeger3491caf2016-05-13 12:16:35 +020078 { "halt_poll_invalid", VCPU_STAT(halt_poll_invalid) },
David Hildenbrandce2e4f02014-07-11 10:00:43 +020079 { "halt_wakeup", VCPU_STAT(halt_wakeup) },
Christian Borntraegerf5e10b02008-07-25 15:52:44 +020080 { "instruction_lctlg", VCPU_STAT(instruction_lctlg) },
Carsten Otteba5c1e92008-03-25 18:47:26 +010081 { "instruction_lctl", VCPU_STAT(instruction_lctl) },
David Hildenbrandaba07502014-01-23 10:47:13 +010082 { "instruction_stctl", VCPU_STAT(instruction_stctl) },
83 { "instruction_stctg", VCPU_STAT(instruction_stctg) },
Christian Borntraegerccc40c52018-03-08 12:48:05 +000084 { "deliver_ckc", VCPU_STAT(deliver_ckc) },
85 { "deliver_cputm", VCPU_STAT(deliver_cputm) },
Carsten Otteba5c1e92008-03-25 18:47:26 +010086 { "deliver_emergency_signal", VCPU_STAT(deliver_emergency_signal) },
Christian Ehrhardt7697e71f2011-10-18 12:27:15 +020087 { "deliver_external_call", VCPU_STAT(deliver_external_call) },
Carsten Otteba5c1e92008-03-25 18:47:26 +010088 { "deliver_service_signal", VCPU_STAT(deliver_service_signal) },
Christian Borntraegerccc40c52018-03-08 12:48:05 +000089 { "deliver_virtio", VCPU_STAT(deliver_virtio) },
Carsten Otteba5c1e92008-03-25 18:47:26 +010090 { "deliver_stop_signal", VCPU_STAT(deliver_stop_signal) },
91 { "deliver_prefix_signal", VCPU_STAT(deliver_prefix_signal) },
92 { "deliver_restart_signal", VCPU_STAT(deliver_restart_signal) },
Christian Borntraegerccc40c52018-03-08 12:48:05 +000093 { "deliver_program", VCPU_STAT(deliver_program) },
94 { "deliver_io", VCPU_STAT(deliver_io) },
QingFeng Hao32de0742018-03-02 11:56:47 +010095 { "deliver_machine_check", VCPU_STAT(deliver_machine_check) },
Carsten Otteba5c1e92008-03-25 18:47:26 +010096 { "exit_wait_state", VCPU_STAT(exit_wait_state) },
Christian Borntraegerccc40c52018-03-08 12:48:05 +000097 { "inject_ckc", VCPU_STAT(inject_ckc) },
98 { "inject_cputm", VCPU_STAT(inject_cputm) },
99 { "inject_external_call", VCPU_STAT(inject_external_call) },
100 { "inject_float_mchk", VM_STAT(inject_float_mchk) },
101 { "inject_emergency_signal", VCPU_STAT(inject_emergency_signal) },
102 { "inject_io", VM_STAT(inject_io) },
103 { "inject_mchk", VCPU_STAT(inject_mchk) },
104 { "inject_pfault_done", VM_STAT(inject_pfault_done) },
105 { "inject_program", VCPU_STAT(inject_program) },
106 { "inject_restart", VCPU_STAT(inject_restart) },
107 { "inject_service_signal", VM_STAT(inject_service_signal) },
108 { "inject_set_prefix", VCPU_STAT(inject_set_prefix) },
109 { "inject_stop_signal", VCPU_STAT(inject_stop_signal) },
110 { "inject_pfault_init", VCPU_STAT(inject_pfault_init) },
111 { "inject_virtio", VM_STAT(inject_virtio) },
Christian Borntraegera37cb072018-01-23 13:28:40 +0100112 { "instruction_epsw", VCPU_STAT(instruction_epsw) },
113 { "instruction_gs", VCPU_STAT(instruction_gs) },
114 { "instruction_io_other", VCPU_STAT(instruction_io_other) },
115 { "instruction_lpsw", VCPU_STAT(instruction_lpsw) },
116 { "instruction_lpswe", VCPU_STAT(instruction_lpswe) },
Christian Borntraeger69d0d3a2013-06-12 13:54:53 +0200117 { "instruction_pfmf", VCPU_STAT(instruction_pfmf) },
Christian Borntraegera37cb072018-01-23 13:28:40 +0100118 { "instruction_ptff", VCPU_STAT(instruction_ptff) },
Christian Borntraeger453423d2008-03-25 18:47:29 +0100119 { "instruction_stidp", VCPU_STAT(instruction_stidp) },
Christian Borntraegera37cb072018-01-23 13:28:40 +0100120 { "instruction_sck", VCPU_STAT(instruction_sck) },
121 { "instruction_sckpf", VCPU_STAT(instruction_sckpf) },
Christian Borntraeger453423d2008-03-25 18:47:29 +0100122 { "instruction_spx", VCPU_STAT(instruction_spx) },
123 { "instruction_stpx", VCPU_STAT(instruction_stpx) },
124 { "instruction_stap", VCPU_STAT(instruction_stap) },
Christian Borntraegera37cb072018-01-23 13:28:40 +0100125 { "instruction_iske", VCPU_STAT(instruction_iske) },
126 { "instruction_ri", VCPU_STAT(instruction_ri) },
127 { "instruction_rrbe", VCPU_STAT(instruction_rrbe) },
128 { "instruction_sske", VCPU_STAT(instruction_sske) },
Heiko Carstens8a2422342014-01-10 14:33:28 +0100129 { "instruction_ipte_interlock", VCPU_STAT(instruction_ipte_interlock) },
Konstantin Weitzb31288f2013-04-17 17:36:29 +0200130 { "instruction_essa", VCPU_STAT(instruction_essa) },
Christian Borntraeger453423d2008-03-25 18:47:29 +0100131 { "instruction_stsi", VCPU_STAT(instruction_stsi) },
132 { "instruction_stfl", VCPU_STAT(instruction_stfl) },
Christian Borntraegera37cb072018-01-23 13:28:40 +0100133 { "instruction_tb", VCPU_STAT(instruction_tb) },
134 { "instruction_tpi", VCPU_STAT(instruction_tpi) },
Christian Borntraegerbb25b9b2011-07-24 10:48:17 +0200135 { "instruction_tprot", VCPU_STAT(instruction_tprot) },
Christian Borntraegera37cb072018-01-23 13:28:40 +0100136 { "instruction_tsch", VCPU_STAT(instruction_tsch) },
Janosch Frank95ca2cb2016-05-23 15:11:58 +0200137 { "instruction_sthyi", VCPU_STAT(instruction_sthyi) },
David Hildenbranda3508fb2015-07-08 13:19:48 +0200138 { "instruction_sie", VCPU_STAT(instruction_sie) },
Christian Borntraeger5288fbf2008-03-25 18:47:31 +0100139 { "instruction_sigp_sense", VCPU_STAT(instruction_sigp_sense) },
Cornelia Huckbd59d3a2011-11-17 11:00:42 +0100140 { "instruction_sigp_sense_running", VCPU_STAT(instruction_sigp_sense_running) },
Christian Ehrhardt7697e71f2011-10-18 12:27:15 +0200141 { "instruction_sigp_external_call", VCPU_STAT(instruction_sigp_external_call) },
Christian Borntraeger5288fbf2008-03-25 18:47:31 +0100142 { "instruction_sigp_emergency", VCPU_STAT(instruction_sigp_emergency) },
David Hildenbrand42cb0c92014-05-23 12:25:11 +0200143 { "instruction_sigp_cond_emergency", VCPU_STAT(instruction_sigp_cond_emergency) },
144 { "instruction_sigp_start", VCPU_STAT(instruction_sigp_start) },
Christian Borntraeger5288fbf2008-03-25 18:47:31 +0100145 { "instruction_sigp_stop", VCPU_STAT(instruction_sigp_stop) },
David Hildenbrand42cb0c92014-05-23 12:25:11 +0200146 { "instruction_sigp_stop_store_status", VCPU_STAT(instruction_sigp_stop_store_status) },
147 { "instruction_sigp_store_status", VCPU_STAT(instruction_sigp_store_status) },
Eric Farmancd7b4b62015-02-12 09:06:34 -0500148 { "instruction_sigp_store_adtl_status", VCPU_STAT(instruction_sigp_store_adtl_status) },
Christian Borntraeger5288fbf2008-03-25 18:47:31 +0100149 { "instruction_sigp_set_arch", VCPU_STAT(instruction_sigp_arch) },
150 { "instruction_sigp_set_prefix", VCPU_STAT(instruction_sigp_prefix) },
151 { "instruction_sigp_restart", VCPU_STAT(instruction_sigp_restart) },
David Hildenbrand42cb0c92014-05-23 12:25:11 +0200152 { "instruction_sigp_cpu_reset", VCPU_STAT(instruction_sigp_cpu_reset) },
153 { "instruction_sigp_init_cpu_reset", VCPU_STAT(instruction_sigp_init_cpu_reset) },
154 { "instruction_sigp_unknown", VCPU_STAT(instruction_sigp_unknown) },
Christian Borntraeger866c1382018-01-24 12:27:01 +0100155 { "instruction_diag_10", VCPU_STAT(diagnose_10) },
156 { "instruction_diag_44", VCPU_STAT(diagnose_44) },
157 { "instruction_diag_9c", VCPU_STAT(diagnose_9c) },
158 { "instruction_diag_258", VCPU_STAT(diagnose_258) },
159 { "instruction_diag_308", VCPU_STAT(diagnose_308) },
160 { "instruction_diag_500", VCPU_STAT(diagnose_500) },
Christian Borntraegera37cb072018-01-23 13:28:40 +0100161 { "instruction_diag_other", VCPU_STAT(diagnose_other) },
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100162 { NULL }
163};
164
Collin L. Walling8fa16962016-07-26 15:29:44 -0400165struct kvm_s390_tod_clock_ext {
166 __u8 epoch_idx;
167 __u64 tod;
168 __u8 reserved[7];
169} __packed;
170
David Hildenbranda411edf2016-02-02 15:41:22 +0100171/* allow nested virtualization in KVM (if enabled by user space) */
172static int nested;
173module_param(nested, int, S_IRUGO);
174MODULE_PARM_DESC(nested, "Nested virtualization support");
175
Janosch Franka4499382018-07-13 11:28:31 +0100176/* allow 1m huge page guest backing, if !nested */
177static int hpage;
178module_param(hpage, int, 0444);
179MODULE_PARM_DESC(hpage, "1m huge page backing support");
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100180
Christian Borntraegerc3b9e3e2018-02-09 16:26:29 +0000181/*
182 * For now we handle at most 16 double words as this is what the s390 base
183 * kernel handles and stores in the prefix page. If we ever need to go beyond
184 * this, this requires changes to code, but the external uapi can stay.
185 */
186#define SIZE_INTERNAL 16
187
188/*
189 * Base feature mask that defines default mask for facilities. Consists of the
190 * defines in FACILITIES_KVM and the non-hypervisor managed bits.
191 */
192static unsigned long kvm_s390_fac_base[SIZE_INTERNAL] = { FACILITIES_KVM };
193/*
194 * Extended feature mask. Consists of the defines in FACILITIES_KVM_CPUMODEL
195 * and defines the facilities that can be enabled via a cpu model.
196 */
197static unsigned long kvm_s390_fac_ext[SIZE_INTERNAL] = { FACILITIES_KVM_CPUMODEL };
198
199static unsigned long kvm_s390_fac_size(void)
Michael Mueller78c4b592013-07-26 15:04:04 +0200200{
Christian Borntraegerc3b9e3e2018-02-09 16:26:29 +0000201 BUILD_BUG_ON(SIZE_INTERNAL > S390_ARCH_FAC_MASK_SIZE_U64);
202 BUILD_BUG_ON(SIZE_INTERNAL > S390_ARCH_FAC_LIST_SIZE_U64);
203 BUILD_BUG_ON(SIZE_INTERNAL * sizeof(unsigned long) >
204 sizeof(S390_lowcore.stfle_fac_list));
205
206 return SIZE_INTERNAL;
Michael Mueller78c4b592013-07-26 15:04:04 +0200207}
208
David Hildenbrand15c97052015-03-19 17:36:43 +0100209/* available cpu features supported by kvm */
210static DECLARE_BITMAP(kvm_s390_available_cpu_feat, KVM_S390_VM_CPU_FEAT_NR_BITS);
David Hildenbrand0a763c72016-05-18 16:03:47 +0200211/* available subfunctions indicated via query / "test bit" */
212static struct kvm_s390_vm_cpu_subfunc kvm_s390_available_subfunc;
David Hildenbrand15c97052015-03-19 17:36:43 +0100213
Michael Mueller9d8d5782015-02-02 15:42:51 +0100214static struct gmap_notifier gmap_notifier;
David Hildenbranda3508fb2015-07-08 13:19:48 +0200215static struct gmap_notifier vsie_gmap_notifier;
Christian Borntraeger78f26132015-07-22 15:50:58 +0200216debug_info_t *kvm_s390_dbf;
Michael Mueller9d8d5782015-02-02 15:42:51 +0100217
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100218/* Section: not file related */
Radim Krčmář13a34e02014-08-28 15:13:03 +0200219int kvm_arch_hardware_enable(void)
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100220{
221 /* every s390 is virtualization enabled ;-) */
Alexander Graf10474ae2009-09-15 11:37:46 +0200222 return 0;
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100223}
224
Martin Schwidefsky414d3b02016-03-08 11:52:54 +0100225static void kvm_gmap_notifier(struct gmap *gmap, unsigned long start,
226 unsigned long end);
Christian Borntraeger2c70fe42013-05-17 14:41:36 +0200227
David Hildenbrand15757672018-02-07 12:46:45 +0100228static void kvm_clock_sync_scb(struct kvm_s390_sie_block *scb, u64 delta)
229{
230 u8 delta_idx = 0;
231
232 /*
233 * The TOD jumps by delta, we have to compensate this by adding
234 * -delta to the epoch.
235 */
236 delta = -delta;
237
238 /* sign-extension - we're adding to signed values below */
239 if ((s64)delta < 0)
240 delta_idx = -1;
241
242 scb->epoch += delta;
243 if (scb->ecd & ECD_MEF) {
244 scb->epdx += delta_idx;
245 if (scb->epoch < delta)
246 scb->epdx += 1;
247 }
248}
249
Fan Zhangfdf03652015-05-13 10:58:41 +0200250/*
251 * This callback is executed during stop_machine(). All CPUs are therefore
252 * temporarily stopped. In order not to change guest behavior, we have to
253 * disable preemption whenever we touch the epoch of kvm and the VCPUs,
254 * so a CPU won't be stopped while calculating with the epoch.
255 */
256static int kvm_clock_sync(struct notifier_block *notifier, unsigned long val,
257 void *v)
258{
259 struct kvm *kvm;
260 struct kvm_vcpu *vcpu;
261 int i;
262 unsigned long long *delta = v;
263
264 list_for_each_entry(kvm, &vm_list, vm_list) {
Fan Zhangfdf03652015-05-13 10:58:41 +0200265 kvm_for_each_vcpu(i, vcpu, kvm) {
David Hildenbrand15757672018-02-07 12:46:45 +0100266 kvm_clock_sync_scb(vcpu->arch.sie_block, *delta);
267 if (i == 0) {
268 kvm->arch.epoch = vcpu->arch.sie_block->epoch;
269 kvm->arch.epdx = vcpu->arch.sie_block->epdx;
270 }
David Hildenbranddb0758b2016-02-15 09:42:25 +0100271 if (vcpu->arch.cputm_enabled)
272 vcpu->arch.cputm_start += *delta;
David Hildenbrand91473b42015-10-29 10:30:36 +0100273 if (vcpu->arch.vsie_block)
David Hildenbrand15757672018-02-07 12:46:45 +0100274 kvm_clock_sync_scb(vcpu->arch.vsie_block,
275 *delta);
Fan Zhangfdf03652015-05-13 10:58:41 +0200276 }
277 }
278 return NOTIFY_OK;
279}
280
281static struct notifier_block kvm_clock_notifier = {
282 .notifier_call = kvm_clock_sync,
283};
284
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100285int kvm_arch_hardware_setup(void)
286{
Christian Borntraeger2c70fe42013-05-17 14:41:36 +0200287 gmap_notifier.notifier_call = kvm_gmap_notifier;
Martin Schwidefskyb2d73b22016-03-08 11:54:42 +0100288 gmap_register_pte_notifier(&gmap_notifier);
David Hildenbranda3508fb2015-07-08 13:19:48 +0200289 vsie_gmap_notifier.notifier_call = kvm_s390_vsie_gmap_notifier;
290 gmap_register_pte_notifier(&vsie_gmap_notifier);
Fan Zhangfdf03652015-05-13 10:58:41 +0200291 atomic_notifier_chain_register(&s390_epoch_delta_notifier,
292 &kvm_clock_notifier);
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100293 return 0;
294}
295
296void kvm_arch_hardware_unsetup(void)
297{
Martin Schwidefskyb2d73b22016-03-08 11:54:42 +0100298 gmap_unregister_pte_notifier(&gmap_notifier);
David Hildenbranda3508fb2015-07-08 13:19:48 +0200299 gmap_unregister_pte_notifier(&vsie_gmap_notifier);
Fan Zhangfdf03652015-05-13 10:58:41 +0200300 atomic_notifier_chain_unregister(&s390_epoch_delta_notifier,
301 &kvm_clock_notifier);
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100302}
303
David Hildenbrand22be5a132016-01-21 13:22:54 +0100304static void allow_cpu_feat(unsigned long nr)
305{
306 set_bit_inv(nr, kvm_s390_available_cpu_feat);
307}
308
David Hildenbrand0a763c72016-05-18 16:03:47 +0200309static inline int plo_test_bit(unsigned char nr)
310{
311 register unsigned long r0 asm("0") = (unsigned long) nr | 0x100;
Heiko Carstensd051ae52016-12-13 14:25:32 +0100312 int cc;
David Hildenbrand0a763c72016-05-18 16:03:47 +0200313
314 asm volatile(
315 /* Parameter registers are ignored for "test bit" */
316 " plo 0,0,0,0(0)\n"
317 " ipm %0\n"
318 " srl %0,28\n"
319 : "=d" (cc)
320 : "d" (r0)
321 : "cc");
322 return cc == 0;
323}
324
David Hildenbrand22be5a132016-01-21 13:22:54 +0100325static void kvm_s390_cpu_feat_init(void)
326{
David Hildenbrand0a763c72016-05-18 16:03:47 +0200327 int i;
328
329 for (i = 0; i < 256; ++i) {
330 if (plo_test_bit(i))
331 kvm_s390_available_subfunc.plo[i >> 3] |= 0x80 >> (i & 7);
332 }
333
334 if (test_facility(28)) /* TOD-clock steering */
Linus Torvalds221bb8a2016-08-02 16:11:27 -0400335 ptff(kvm_s390_available_subfunc.ptff,
336 sizeof(kvm_s390_available_subfunc.ptff),
337 PTFF_QAF);
David Hildenbrand0a763c72016-05-18 16:03:47 +0200338
339 if (test_facility(17)) { /* MSA */
Martin Schwidefsky69c0e362016-08-18 12:59:46 +0200340 __cpacf_query(CPACF_KMAC, (cpacf_mask_t *)
341 kvm_s390_available_subfunc.kmac);
342 __cpacf_query(CPACF_KMC, (cpacf_mask_t *)
343 kvm_s390_available_subfunc.kmc);
344 __cpacf_query(CPACF_KM, (cpacf_mask_t *)
345 kvm_s390_available_subfunc.km);
346 __cpacf_query(CPACF_KIMD, (cpacf_mask_t *)
347 kvm_s390_available_subfunc.kimd);
348 __cpacf_query(CPACF_KLMD, (cpacf_mask_t *)
349 kvm_s390_available_subfunc.klmd);
David Hildenbrand0a763c72016-05-18 16:03:47 +0200350 }
351 if (test_facility(76)) /* MSA3 */
Martin Schwidefsky69c0e362016-08-18 12:59:46 +0200352 __cpacf_query(CPACF_PCKMO, (cpacf_mask_t *)
353 kvm_s390_available_subfunc.pckmo);
David Hildenbrand0a763c72016-05-18 16:03:47 +0200354 if (test_facility(77)) { /* MSA4 */
Martin Schwidefsky69c0e362016-08-18 12:59:46 +0200355 __cpacf_query(CPACF_KMCTR, (cpacf_mask_t *)
356 kvm_s390_available_subfunc.kmctr);
357 __cpacf_query(CPACF_KMF, (cpacf_mask_t *)
358 kvm_s390_available_subfunc.kmf);
359 __cpacf_query(CPACF_KMO, (cpacf_mask_t *)
360 kvm_s390_available_subfunc.kmo);
361 __cpacf_query(CPACF_PCC, (cpacf_mask_t *)
362 kvm_s390_available_subfunc.pcc);
David Hildenbrand0a763c72016-05-18 16:03:47 +0200363 }
364 if (test_facility(57)) /* MSA5 */
Harald Freudenberger985a9d22017-02-24 10:11:54 +0100365 __cpacf_query(CPACF_PRNO, (cpacf_mask_t *)
Martin Schwidefsky69c0e362016-08-18 12:59:46 +0200366 kvm_s390_available_subfunc.ppno);
David Hildenbrand0a763c72016-05-18 16:03:47 +0200367
Jason J. Hernee000b8e2017-03-20 09:57:42 -0400368 if (test_facility(146)) /* MSA8 */
369 __cpacf_query(CPACF_KMA, (cpacf_mask_t *)
370 kvm_s390_available_subfunc.kma);
371
David Hildenbrand22be5a132016-01-21 13:22:54 +0100372 if (MACHINE_HAS_ESOP)
373 allow_cpu_feat(KVM_S390_VM_CPU_FEAT_ESOP);
David Hildenbranda3508fb2015-07-08 13:19:48 +0200374 /*
375 * We need SIE support, ESOP (PROT_READ protection for gmap_shadow),
376 * 64bit SCAO (SCA passthrough) and IDTE (for gmap_shadow unshadowing).
377 */
378 if (!sclp.has_sief2 || !MACHINE_HAS_ESOP || !sclp.has_64bscao ||
David Hildenbranda411edf2016-02-02 15:41:22 +0100379 !test_facility(3) || !nested)
David Hildenbranda3508fb2015-07-08 13:19:48 +0200380 return;
381 allow_cpu_feat(KVM_S390_VM_CPU_FEAT_SIEF2);
David Hildenbrand19c439b2015-11-25 11:02:26 +0100382 if (sclp.has_64bscao)
383 allow_cpu_feat(KVM_S390_VM_CPU_FEAT_64BSCAO);
David Hildenbrand0615a322015-11-25 09:59:49 +0100384 if (sclp.has_siif)
385 allow_cpu_feat(KVM_S390_VM_CPU_FEAT_SIIF);
David Hildenbrand77d18f62015-11-24 16:32:35 +0100386 if (sclp.has_gpere)
387 allow_cpu_feat(KVM_S390_VM_CPU_FEAT_GPERE);
David Hildenbranda1b7b9b2015-11-24 16:41:33 +0100388 if (sclp.has_gsls)
389 allow_cpu_feat(KVM_S390_VM_CPU_FEAT_GSLS);
David Hildenbrand5630a8e2015-11-24 16:53:51 +0100390 if (sclp.has_ib)
391 allow_cpu_feat(KVM_S390_VM_CPU_FEAT_IB);
David Hildenbrand13ee3f62015-11-24 16:54:37 +0100392 if (sclp.has_cei)
393 allow_cpu_feat(KVM_S390_VM_CPU_FEAT_CEI);
David Hildenbrand7fd7f392015-11-24 16:56:23 +0100394 if (sclp.has_ibs)
395 allow_cpu_feat(KVM_S390_VM_CPU_FEAT_IBS);
Farhan Ali730cd632017-02-24 16:12:56 -0500396 if (sclp.has_kss)
397 allow_cpu_feat(KVM_S390_VM_CPU_FEAT_KSS);
David Hildenbrand5d3876a2016-04-13 17:06:50 +0200398 /*
399 * KVM_S390_VM_CPU_FEAT_SKEY: Wrong shadow of PTE.I bits will make
400 * all skey handling functions read/set the skey from the PGSTE
401 * instead of the real storage key.
402 *
403 * KVM_S390_VM_CPU_FEAT_CMMA: Wrong shadow of PTE.I bits will make
404 * pages being detected as preserved although they are resident.
405 *
406 * KVM_S390_VM_CPU_FEAT_PFMFI: Wrong shadow of PTE.I bits will
407 * have the same effect as for KVM_S390_VM_CPU_FEAT_SKEY.
408 *
409 * For KVM_S390_VM_CPU_FEAT_SKEY, KVM_S390_VM_CPU_FEAT_CMMA and
410 * KVM_S390_VM_CPU_FEAT_PFMFI, all PTE.I and PGSTE bits have to be
411 * correctly shadowed. We can do that for the PGSTE but not for PTE.I.
412 *
413 * KVM_S390_VM_CPU_FEAT_SIGPIF: Wrong SCB addresses in the SCA. We
414 * cannot easily shadow the SCA because of the ipte lock.
415 */
David Hildenbrand22be5a132016-01-21 13:22:54 +0100416}
417
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100418int kvm_arch_init(void *opaque)
419{
Christian Borntraeger78f26132015-07-22 15:50:58 +0200420 kvm_s390_dbf = debug_register("kvm-trace", 32, 1, 7 * sizeof(long));
421 if (!kvm_s390_dbf)
422 return -ENOMEM;
423
424 if (debug_register_view(kvm_s390_dbf, &debug_sprintf_view)) {
425 debug_unregister(kvm_s390_dbf);
426 return -ENOMEM;
427 }
428
David Hildenbrand22be5a132016-01-21 13:22:54 +0100429 kvm_s390_cpu_feat_init();
430
Cornelia Huck84877d92014-09-02 10:27:35 +0100431 /* Register floating interrupt controller interface. */
432 return kvm_register_device_ops(&kvm_flic_ops, KVM_DEV_TYPE_FLIC);
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100433}
434
Christian Borntraeger78f26132015-07-22 15:50:58 +0200435void kvm_arch_exit(void)
436{
437 debug_unregister(kvm_s390_dbf);
438}
439
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100440/* Section: device related */
441long kvm_arch_dev_ioctl(struct file *filp,
442 unsigned int ioctl, unsigned long arg)
443{
444 if (ioctl == KVM_S390_ENABLE_SIE)
445 return s390_enable_sie();
446 return -EINVAL;
447}
448
Alexander Graf784aa3d2014-07-14 18:27:35 +0200449int kvm_vm_ioctl_check_extension(struct kvm *kvm, long ext)
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100450{
Carsten Otted7b0b5e2009-11-19 14:21:16 +0100451 int r;
452
Carsten Otte2bd0ac42008-07-25 15:49:13 +0200453 switch (ext) {
Carsten Otted7b0b5e2009-11-19 14:21:16 +0100454 case KVM_CAP_S390_PSW:
Christian Borntraegerb6cf8782011-09-20 17:07:29 +0200455 case KVM_CAP_S390_GMAP:
Christian Borntraeger52e16b12011-11-17 11:00:44 +0100456 case KVM_CAP_SYNC_MMU:
Carsten Otte1efd0f52012-01-04 10:25:29 +0100457#ifdef CONFIG_KVM_S390_UCONTROL
458 case KVM_CAP_S390_UCONTROL:
459#endif
Dominik Dingel3c038e62013-10-07 17:11:48 +0200460 case KVM_CAP_ASYNC_PF:
Christian Borntraeger60b413c2012-01-11 11:20:31 +0100461 case KVM_CAP_SYNC_REGS:
Carsten Otte14eebd92012-05-15 14:15:26 +0200462 case KVM_CAP_ONE_REG:
Cornelia Huckd6712df2012-12-20 15:32:11 +0100463 case KVM_CAP_ENABLE_CAP:
Cornelia Huckfa6b7fe2012-12-20 15:32:12 +0100464 case KVM_CAP_S390_CSS_SUPPORT:
Cornelia Huck10ccaa12013-02-28 12:33:21 +0100465 case KVM_CAP_IOEVENTFD:
Jens Freimannc05c4182013-10-07 16:13:45 +0200466 case KVM_CAP_DEVICE_CTRL:
Cornelia Huckd938dc52013-10-23 18:26:34 +0200467 case KVM_CAP_ENABLE_CAP_VM:
Cornelia Huck78599d92014-07-15 09:54:39 +0200468 case KVM_CAP_S390_IRQCHIP:
Dominik Dingelf2061652014-04-09 13:13:00 +0200469 case KVM_CAP_VM_ATTRIBUTES:
David Hildenbrand6352e4d2014-04-10 17:35:00 +0200470 case KVM_CAP_MP_STATE:
Paolo Bonzini460df4c2017-02-08 11:50:15 +0100471 case KVM_CAP_IMMEDIATE_EXIT:
Jens Freimann47b43c52014-11-11 20:57:06 +0100472 case KVM_CAP_S390_INJECT_IRQ:
David Hildenbrand2444b352014-10-09 14:10:13 +0200473 case KVM_CAP_S390_USER_SIGP:
Ekaterina Tumanovae44fc8c2015-01-30 16:55:56 +0100474 case KVM_CAP_S390_USER_STSI:
Jason J. Herne30ee2a92014-09-23 09:23:01 -0400475 case KVM_CAP_S390_SKEYS:
Jens Freimann816c7662014-11-24 17:13:46 +0100476 case KVM_CAP_S390_IRQ_STATE:
David Hildenbrand6502a342016-06-21 14:19:51 +0200477 case KVM_CAP_S390_USER_INSTR0:
Claudio Imbrenda4036e382016-08-04 17:58:47 +0200478 case KVM_CAP_S390_CMMA_MIGRATION:
Yi Min Zhao47a46932017-03-10 09:29:38 +0100479 case KVM_CAP_S390_AIS:
Christian Borntraegerda9a1442017-11-09 10:00:45 +0100480 case KVM_CAP_S390_AIS_MIGRATION:
Carsten Otted7b0b5e2009-11-19 14:21:16 +0100481 r = 1;
482 break;
Janosch Franka4499382018-07-13 11:28:31 +0100483 case KVM_CAP_S390_HPAGE_1M:
484 r = 0;
485 if (hpage)
486 r = 1;
487 break;
Thomas Huth41408c282015-02-06 15:01:21 +0100488 case KVM_CAP_S390_MEM_OP:
489 r = MEM_OP_MAX_SIZE;
490 break;
Christian Borntraegere726b1b2012-05-02 10:50:38 +0200491 case KVM_CAP_NR_VCPUS:
492 case KVM_CAP_MAX_VCPUS:
David Hildenbrand76a6dd72015-11-24 13:33:49 +0100493 r = KVM_S390_BSCA_CPU_SLOTS;
David Hildenbranda6940672016-08-08 22:39:32 +0200494 if (!kvm_s390_use_sca_entries())
495 r = KVM_MAX_VCPUS;
496 else if (sclp.has_esca && sclp.has_64bscao)
David Hildenbrand76a6dd72015-11-24 13:33:49 +0100497 r = KVM_S390_ESCA_CPU_SLOTS;
Christian Borntraegere726b1b2012-05-02 10:50:38 +0200498 break;
Nick Wange1e2e602013-03-25 17:22:58 +0100499 case KVM_CAP_NR_MEMSLOTS:
500 r = KVM_USER_MEM_SLOTS;
501 break;
Christian Borntraeger1526bf92012-05-15 14:15:25 +0200502 case KVM_CAP_S390_COW:
Martin Schwidefskyabf09be2012-11-07 13:17:37 +0100503 r = MACHINE_HAS_ESOP;
Christian Borntraeger1526bf92012-05-15 14:15:25 +0200504 break;
Eric Farman68c55752014-06-09 10:57:26 -0400505 case KVM_CAP_S390_VECTOR_REGISTERS:
506 r = MACHINE_HAS_VX;
507 break;
Fan Zhangc6e5f162016-01-07 18:24:29 +0800508 case KVM_CAP_S390_RI:
509 r = test_facility(64);
510 break;
Fan Zhang4e0b1ab2016-11-29 07:17:55 +0100511 case KVM_CAP_S390_GS:
512 r = test_facility(133);
513 break;
Christian Borntraeger35b3fde2018-01-17 14:44:34 +0100514 case KVM_CAP_S390_BPB:
515 r = test_facility(82);
516 break;
Carsten Otte2bd0ac42008-07-25 15:49:13 +0200517 default:
Carsten Otted7b0b5e2009-11-19 14:21:16 +0100518 r = 0;
Carsten Otte2bd0ac42008-07-25 15:49:13 +0200519 }
Carsten Otted7b0b5e2009-11-19 14:21:16 +0100520 return r;
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100521}
522
Jason J. Herne15f36eb2012-08-02 10:10:17 -0400523static void kvm_s390_sync_dirty_log(struct kvm *kvm,
Janosch Frank0959e162018-07-17 13:21:22 +0100524 struct kvm_memory_slot *memslot)
Jason J. Herne15f36eb2012-08-02 10:10:17 -0400525{
Janosch Frank0959e162018-07-17 13:21:22 +0100526 int i;
Jason J. Herne15f36eb2012-08-02 10:10:17 -0400527 gfn_t cur_gfn, last_gfn;
Janosch Frank0959e162018-07-17 13:21:22 +0100528 unsigned long gaddr, vmaddr;
Jason J. Herne15f36eb2012-08-02 10:10:17 -0400529 struct gmap *gmap = kvm->arch.gmap;
Janosch Frank0959e162018-07-17 13:21:22 +0100530 DECLARE_BITMAP(bitmap, _PAGE_ENTRIES);
Jason J. Herne15f36eb2012-08-02 10:10:17 -0400531
Janosch Frank0959e162018-07-17 13:21:22 +0100532 /* Loop over all guest segments */
533 cur_gfn = memslot->base_gfn;
Jason J. Herne15f36eb2012-08-02 10:10:17 -0400534 last_gfn = memslot->base_gfn + memslot->npages;
Janosch Frank0959e162018-07-17 13:21:22 +0100535 for (; cur_gfn <= last_gfn; cur_gfn += _PAGE_ENTRIES) {
536 gaddr = gfn_to_gpa(cur_gfn);
537 vmaddr = gfn_to_hva_memslot(memslot, cur_gfn);
538 if (kvm_is_error_hva(vmaddr))
539 continue;
Jason J. Herne15f36eb2012-08-02 10:10:17 -0400540
Janosch Frank0959e162018-07-17 13:21:22 +0100541 bitmap_zero(bitmap, _PAGE_ENTRIES);
542 gmap_sync_dirty_log_pmd(gmap, bitmap, gaddr, vmaddr);
543 for (i = 0; i < _PAGE_ENTRIES; i++) {
544 if (test_bit(i, bitmap))
545 mark_page_dirty(kvm, cur_gfn + i);
546 }
547
Christian Borntraeger1763f8d2016-02-03 11:12:34 +0100548 if (fatal_signal_pending(current))
549 return;
Christian Borntraeger70c88a02016-02-02 15:15:56 +0100550 cond_resched();
Jason J. Herne15f36eb2012-08-02 10:10:17 -0400551 }
Jason J. Herne15f36eb2012-08-02 10:10:17 -0400552}
553
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100554/* Section: vm related */
Eugene (jno) Dvurechenskia6e2f682015-04-21 15:31:59 +0200555static void sca_del_vcpu(struct kvm_vcpu *vcpu);
556
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100557/*
558 * Get (and clear) the dirty memory log for a memory slot.
559 */
560int kvm_vm_ioctl_get_dirty_log(struct kvm *kvm,
561 struct kvm_dirty_log *log)
562{
Jason J. Herne15f36eb2012-08-02 10:10:17 -0400563 int r;
564 unsigned long n;
Paolo Bonzini9f6b8022015-05-17 16:20:07 +0200565 struct kvm_memslots *slots;
Jason J. Herne15f36eb2012-08-02 10:10:17 -0400566 struct kvm_memory_slot *memslot;
567 int is_dirty = 0;
568
Janosch Franke1e8a962017-02-02 16:39:31 +0100569 if (kvm_is_ucontrol(kvm))
570 return -EINVAL;
571
Jason J. Herne15f36eb2012-08-02 10:10:17 -0400572 mutex_lock(&kvm->slots_lock);
573
574 r = -EINVAL;
575 if (log->slot >= KVM_USER_MEM_SLOTS)
576 goto out;
577
Paolo Bonzini9f6b8022015-05-17 16:20:07 +0200578 slots = kvm_memslots(kvm);
579 memslot = id_to_memslot(slots, log->slot);
Jason J. Herne15f36eb2012-08-02 10:10:17 -0400580 r = -ENOENT;
581 if (!memslot->dirty_bitmap)
582 goto out;
583
584 kvm_s390_sync_dirty_log(kvm, memslot);
585 r = kvm_get_dirty_log(kvm, log, &is_dirty);
586 if (r)
587 goto out;
588
589 /* Clear the dirty log */
590 if (is_dirty) {
591 n = kvm_dirty_bitmap_bytes(memslot);
592 memset(memslot->dirty_bitmap, 0, n);
593 }
594 r = 0;
595out:
596 mutex_unlock(&kvm->slots_lock);
597 return r;
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100598}
599
David Hildenbrand6502a342016-06-21 14:19:51 +0200600static void icpt_operexc_on_all_vcpus(struct kvm *kvm)
601{
602 unsigned int i;
603 struct kvm_vcpu *vcpu;
604
605 kvm_for_each_vcpu(i, vcpu, kvm) {
606 kvm_s390_sync_request(KVM_REQ_ICPT_OPEREXC, vcpu);
607 }
608}
609
Cornelia Huckd938dc52013-10-23 18:26:34 +0200610static int kvm_vm_ioctl_enable_cap(struct kvm *kvm, struct kvm_enable_cap *cap)
611{
612 int r;
613
614 if (cap->flags)
615 return -EINVAL;
616
617 switch (cap->cap) {
Cornelia Huck84223592013-07-15 13:36:01 +0200618 case KVM_CAP_S390_IRQCHIP:
Christian Borntraegerc92ea7b2015-07-22 15:52:10 +0200619 VM_EVENT(kvm, 3, "%s", "ENABLE: CAP_S390_IRQCHIP");
Cornelia Huck84223592013-07-15 13:36:01 +0200620 kvm->arch.use_irqchip = 1;
621 r = 0;
622 break;
David Hildenbrand2444b352014-10-09 14:10:13 +0200623 case KVM_CAP_S390_USER_SIGP:
Christian Borntraegerc92ea7b2015-07-22 15:52:10 +0200624 VM_EVENT(kvm, 3, "%s", "ENABLE: CAP_S390_USER_SIGP");
David Hildenbrand2444b352014-10-09 14:10:13 +0200625 kvm->arch.user_sigp = 1;
626 r = 0;
627 break;
Eric Farman68c55752014-06-09 10:57:26 -0400628 case KVM_CAP_S390_VECTOR_REGISTERS:
David Hildenbrand5967c172015-11-06 12:08:48 +0100629 mutex_lock(&kvm->lock);
Paolo Bonzinia03825b2016-06-13 14:50:04 +0200630 if (kvm->created_vcpus) {
David Hildenbrand5967c172015-11-06 12:08:48 +0100631 r = -EBUSY;
632 } else if (MACHINE_HAS_VX) {
David Hildenbrandc54f0d62015-12-02 08:53:52 +0100633 set_kvm_facility(kvm->arch.model.fac_mask, 129);
634 set_kvm_facility(kvm->arch.model.fac_list, 129);
Guenther Hutzl2f87d942016-06-03 14:37:17 +0200635 if (test_facility(134)) {
636 set_kvm_facility(kvm->arch.model.fac_mask, 134);
637 set_kvm_facility(kvm->arch.model.fac_list, 134);
638 }
Maxim Samoylov53743aa2016-02-10 10:31:23 +0100639 if (test_facility(135)) {
640 set_kvm_facility(kvm->arch.model.fac_mask, 135);
641 set_kvm_facility(kvm->arch.model.fac_list, 135);
642 }
Michael Mueller18280d82015-03-16 16:05:41 +0100643 r = 0;
644 } else
645 r = -EINVAL;
David Hildenbrand5967c172015-11-06 12:08:48 +0100646 mutex_unlock(&kvm->lock);
Christian Borntraegerc92ea7b2015-07-22 15:52:10 +0200647 VM_EVENT(kvm, 3, "ENABLE: CAP_S390_VECTOR_REGISTERS %s",
648 r ? "(not available)" : "(success)");
Eric Farman68c55752014-06-09 10:57:26 -0400649 break;
Fan Zhangc6e5f162016-01-07 18:24:29 +0800650 case KVM_CAP_S390_RI:
651 r = -EINVAL;
652 mutex_lock(&kvm->lock);
Paolo Bonzinia03825b2016-06-13 14:50:04 +0200653 if (kvm->created_vcpus) {
Fan Zhangc6e5f162016-01-07 18:24:29 +0800654 r = -EBUSY;
655 } else if (test_facility(64)) {
David Hildenbrandc54f0d62015-12-02 08:53:52 +0100656 set_kvm_facility(kvm->arch.model.fac_mask, 64);
657 set_kvm_facility(kvm->arch.model.fac_list, 64);
Fan Zhangc6e5f162016-01-07 18:24:29 +0800658 r = 0;
659 }
660 mutex_unlock(&kvm->lock);
661 VM_EVENT(kvm, 3, "ENABLE: CAP_S390_RI %s",
662 r ? "(not available)" : "(success)");
663 break;
Yi Min Zhao47a46932017-03-10 09:29:38 +0100664 case KVM_CAP_S390_AIS:
665 mutex_lock(&kvm->lock);
666 if (kvm->created_vcpus) {
667 r = -EBUSY;
668 } else {
669 set_kvm_facility(kvm->arch.model.fac_mask, 72);
670 set_kvm_facility(kvm->arch.model.fac_list, 72);
Yi Min Zhao47a46932017-03-10 09:29:38 +0100671 r = 0;
672 }
673 mutex_unlock(&kvm->lock);
674 VM_EVENT(kvm, 3, "ENABLE: AIS %s",
675 r ? "(not available)" : "(success)");
676 break;
Fan Zhang4e0b1ab2016-11-29 07:17:55 +0100677 case KVM_CAP_S390_GS:
678 r = -EINVAL;
679 mutex_lock(&kvm->lock);
Christian Borntraeger241e3ec02017-11-16 15:12:52 +0100680 if (kvm->created_vcpus) {
Fan Zhang4e0b1ab2016-11-29 07:17:55 +0100681 r = -EBUSY;
682 } else if (test_facility(133)) {
683 set_kvm_facility(kvm->arch.model.fac_mask, 133);
684 set_kvm_facility(kvm->arch.model.fac_list, 133);
685 r = 0;
686 }
687 mutex_unlock(&kvm->lock);
688 VM_EVENT(kvm, 3, "ENABLE: CAP_S390_GS %s",
689 r ? "(not available)" : "(success)");
690 break;
Janosch Franka4499382018-07-13 11:28:31 +0100691 case KVM_CAP_S390_HPAGE_1M:
692 mutex_lock(&kvm->lock);
693 if (kvm->created_vcpus)
694 r = -EBUSY;
695 else if (!hpage || kvm->arch.use_cmma)
696 r = -EINVAL;
697 else {
698 r = 0;
Janosch Frankdf88f312018-08-30 16:14:18 +0200699 down_write(&kvm->mm->mmap_sem);
Janosch Franka4499382018-07-13 11:28:31 +0100700 kvm->mm->context.allow_gmap_hpage_1m = 1;
Janosch Frankdf88f312018-08-30 16:14:18 +0200701 up_write(&kvm->mm->mmap_sem);
Janosch Franka4499382018-07-13 11:28:31 +0100702 /*
703 * We might have to create fake 4k page
704 * tables. To avoid that the hardware works on
705 * stale PGSTEs, we emulate these instructions.
706 */
707 kvm->arch.use_skf = 0;
708 kvm->arch.use_pfmfi = 0;
709 }
710 mutex_unlock(&kvm->lock);
711 VM_EVENT(kvm, 3, "ENABLE: CAP_S390_HPAGE %s",
712 r ? "(not available)" : "(success)");
713 break;
Ekaterina Tumanovae44fc8c2015-01-30 16:55:56 +0100714 case KVM_CAP_S390_USER_STSI:
Christian Borntraegerc92ea7b2015-07-22 15:52:10 +0200715 VM_EVENT(kvm, 3, "%s", "ENABLE: CAP_S390_USER_STSI");
Ekaterina Tumanovae44fc8c2015-01-30 16:55:56 +0100716 kvm->arch.user_stsi = 1;
717 r = 0;
718 break;
David Hildenbrand6502a342016-06-21 14:19:51 +0200719 case KVM_CAP_S390_USER_INSTR0:
720 VM_EVENT(kvm, 3, "%s", "ENABLE: CAP_S390_USER_INSTR0");
721 kvm->arch.user_instr0 = 1;
722 icpt_operexc_on_all_vcpus(kvm);
723 r = 0;
724 break;
Cornelia Huckd938dc52013-10-23 18:26:34 +0200725 default:
726 r = -EINVAL;
727 break;
728 }
729 return r;
730}
731
Dominik Dingel8c0a7ce2014-10-31 14:10:41 +0100732static int kvm_s390_get_mem_control(struct kvm *kvm, struct kvm_device_attr *attr)
733{
734 int ret;
735
736 switch (attr->attr) {
737 case KVM_S390_VM_MEM_LIMIT_SIZE:
738 ret = 0;
Christian Borntraegerc92ea7b2015-07-22 15:52:10 +0200739 VM_EVENT(kvm, 3, "QUERY: max guest memory: %lu bytes",
Dominik Dingela3a92c32014-12-01 17:24:42 +0100740 kvm->arch.mem_limit);
741 if (put_user(kvm->arch.mem_limit, (u64 __user *)attr->addr))
Dominik Dingel8c0a7ce2014-10-31 14:10:41 +0100742 ret = -EFAULT;
743 break;
744 default:
745 ret = -ENXIO;
746 break;
747 }
748 return ret;
749}
750
751static int kvm_s390_set_mem_control(struct kvm *kvm, struct kvm_device_attr *attr)
Dominik Dingel4f718ea2014-04-09 13:13:00 +0200752{
753 int ret;
754 unsigned int idx;
755 switch (attr->attr) {
756 case KVM_S390_VM_MEM_ENABLE_CMMA:
David Hildenbrandf9cbd9b2016-03-03 09:48:47 +0100757 ret = -ENXIO;
David Hildenbrandc24cc9c2015-11-24 13:53:04 +0100758 if (!sclp.has_cmma)
Dominik Dingele6db1d62015-05-07 15:41:57 +0200759 break;
760
Christian Borntraegerc92ea7b2015-07-22 15:52:10 +0200761 VM_EVENT(kvm, 3, "%s", "ENABLE: CMMA support");
Dominik Dingel4f718ea2014-04-09 13:13:00 +0200762 mutex_lock(&kvm->lock);
Janosch Franka4499382018-07-13 11:28:31 +0100763 if (kvm->created_vcpus)
764 ret = -EBUSY;
765 else if (kvm->mm->context.allow_gmap_hpage_1m)
766 ret = -EINVAL;
767 else {
Dominik Dingel4f718ea2014-04-09 13:13:00 +0200768 kvm->arch.use_cmma = 1;
Janosch Frankc9f0a2b2018-02-16 12:16:14 +0100769 /* Not compatible with cmma. */
770 kvm->arch.use_pfmfi = 0;
Dominik Dingel4f718ea2014-04-09 13:13:00 +0200771 ret = 0;
772 }
773 mutex_unlock(&kvm->lock);
774 break;
775 case KVM_S390_VM_MEM_CLR_CMMA:
David Hildenbrandf9cbd9b2016-03-03 09:48:47 +0100776 ret = -ENXIO;
777 if (!sclp.has_cmma)
778 break;
Dominik Dingelc3489152015-06-18 13:17:11 +0200779 ret = -EINVAL;
780 if (!kvm->arch.use_cmma)
781 break;
782
Christian Borntraegerc92ea7b2015-07-22 15:52:10 +0200783 VM_EVENT(kvm, 3, "%s", "RESET: CMMA states");
Dominik Dingel4f718ea2014-04-09 13:13:00 +0200784 mutex_lock(&kvm->lock);
785 idx = srcu_read_lock(&kvm->srcu);
Dominik Dingela13cff32014-10-23 12:07:14 +0200786 s390_reset_cmma(kvm->arch.gmap->mm);
Dominik Dingel4f718ea2014-04-09 13:13:00 +0200787 srcu_read_unlock(&kvm->srcu, idx);
788 mutex_unlock(&kvm->lock);
789 ret = 0;
790 break;
Dominik Dingel8c0a7ce2014-10-31 14:10:41 +0100791 case KVM_S390_VM_MEM_LIMIT_SIZE: {
792 unsigned long new_limit;
793
794 if (kvm_is_ucontrol(kvm))
795 return -EINVAL;
796
797 if (get_user(new_limit, (u64 __user *)attr->addr))
798 return -EFAULT;
799
Dominik Dingela3a92c32014-12-01 17:24:42 +0100800 if (kvm->arch.mem_limit != KVM_S390_NO_MEM_LIMIT &&
801 new_limit > kvm->arch.mem_limit)
Dominik Dingel8c0a7ce2014-10-31 14:10:41 +0100802 return -E2BIG;
803
Dominik Dingela3a92c32014-12-01 17:24:42 +0100804 if (!new_limit)
805 return -EINVAL;
806
Martin Schwidefsky6ea427b2016-03-08 11:55:04 +0100807 /* gmap_create takes last usable address */
Dominik Dingela3a92c32014-12-01 17:24:42 +0100808 if (new_limit != KVM_S390_NO_MEM_LIMIT)
809 new_limit -= 1;
810
Dominik Dingel8c0a7ce2014-10-31 14:10:41 +0100811 ret = -EBUSY;
812 mutex_lock(&kvm->lock);
Paolo Bonzinia03825b2016-06-13 14:50:04 +0200813 if (!kvm->created_vcpus) {
Martin Schwidefsky6ea427b2016-03-08 11:55:04 +0100814 /* gmap_create will round the limit up */
815 struct gmap *new = gmap_create(current->mm, new_limit);
Dominik Dingel8c0a7ce2014-10-31 14:10:41 +0100816
817 if (!new) {
818 ret = -ENOMEM;
819 } else {
Martin Schwidefsky6ea427b2016-03-08 11:55:04 +0100820 gmap_remove(kvm->arch.gmap);
Dominik Dingel8c0a7ce2014-10-31 14:10:41 +0100821 new->private = kvm;
822 kvm->arch.gmap = new;
823 ret = 0;
824 }
825 }
826 mutex_unlock(&kvm->lock);
Dominik Dingela3a92c32014-12-01 17:24:42 +0100827 VM_EVENT(kvm, 3, "SET: max guest address: %lu", new_limit);
828 VM_EVENT(kvm, 3, "New guest asce: 0x%pK",
829 (void *) kvm->arch.gmap->asce);
Dominik Dingel8c0a7ce2014-10-31 14:10:41 +0100830 break;
831 }
Dominik Dingel4f718ea2014-04-09 13:13:00 +0200832 default:
833 ret = -ENXIO;
834 break;
835 }
836 return ret;
837}
838
Tony Krowiaka374e892014-09-03 10:13:53 +0200839static void kvm_s390_vcpu_crypto_setup(struct kvm_vcpu *vcpu);
840
Tony Krowiak20c922f2018-04-22 11:37:03 -0400841void kvm_s390_vcpu_crypto_reset_all(struct kvm *kvm)
Tony Krowiaka374e892014-09-03 10:13:53 +0200842{
843 struct kvm_vcpu *vcpu;
844 int i;
845
Tony Krowiak20c922f2018-04-22 11:37:03 -0400846 kvm_s390_vcpu_block_all(kvm);
847
David Hildenbrand3194cdb2018-09-25 19:16:17 -0400848 kvm_for_each_vcpu(i, vcpu, kvm) {
Tony Krowiak20c922f2018-04-22 11:37:03 -0400849 kvm_s390_vcpu_crypto_setup(vcpu);
David Hildenbrand3194cdb2018-09-25 19:16:17 -0400850 /* recreate the shadow crycb by leaving the VSIE handler */
851 kvm_s390_sync_request(KVM_REQ_VSIE_RESTART, vcpu);
852 }
Tony Krowiak20c922f2018-04-22 11:37:03 -0400853
854 kvm_s390_vcpu_unblock_all(kvm);
855}
856
857static int kvm_s390_vm_set_crypto(struct kvm *kvm, struct kvm_device_attr *attr)
858{
Michael Mueller9d8d5782015-02-02 15:42:51 +0100859 if (!test_kvm_facility(kvm, 76))
Tony Krowiaka374e892014-09-03 10:13:53 +0200860 return -EINVAL;
861
862 mutex_lock(&kvm->lock);
863 switch (attr->attr) {
864 case KVM_S390_VM_CRYPTO_ENABLE_AES_KW:
865 get_random_bytes(
866 kvm->arch.crypto.crycb->aes_wrapping_key_mask,
867 sizeof(kvm->arch.crypto.crycb->aes_wrapping_key_mask));
868 kvm->arch.crypto.aes_kw = 1;
Christian Borntraegerc92ea7b2015-07-22 15:52:10 +0200869 VM_EVENT(kvm, 3, "%s", "ENABLE: AES keywrapping support");
Tony Krowiaka374e892014-09-03 10:13:53 +0200870 break;
871 case KVM_S390_VM_CRYPTO_ENABLE_DEA_KW:
872 get_random_bytes(
873 kvm->arch.crypto.crycb->dea_wrapping_key_mask,
874 sizeof(kvm->arch.crypto.crycb->dea_wrapping_key_mask));
875 kvm->arch.crypto.dea_kw = 1;
Christian Borntraegerc92ea7b2015-07-22 15:52:10 +0200876 VM_EVENT(kvm, 3, "%s", "ENABLE: DEA keywrapping support");
Tony Krowiaka374e892014-09-03 10:13:53 +0200877 break;
878 case KVM_S390_VM_CRYPTO_DISABLE_AES_KW:
879 kvm->arch.crypto.aes_kw = 0;
880 memset(kvm->arch.crypto.crycb->aes_wrapping_key_mask, 0,
881 sizeof(kvm->arch.crypto.crycb->aes_wrapping_key_mask));
Christian Borntraegerc92ea7b2015-07-22 15:52:10 +0200882 VM_EVENT(kvm, 3, "%s", "DISABLE: AES keywrapping support");
Tony Krowiaka374e892014-09-03 10:13:53 +0200883 break;
884 case KVM_S390_VM_CRYPTO_DISABLE_DEA_KW:
885 kvm->arch.crypto.dea_kw = 0;
886 memset(kvm->arch.crypto.crycb->dea_wrapping_key_mask, 0,
887 sizeof(kvm->arch.crypto.crycb->dea_wrapping_key_mask));
Christian Borntraegerc92ea7b2015-07-22 15:52:10 +0200888 VM_EVENT(kvm, 3, "%s", "DISABLE: DEA keywrapping support");
Tony Krowiaka374e892014-09-03 10:13:53 +0200889 break;
890 default:
891 mutex_unlock(&kvm->lock);
892 return -ENXIO;
893 }
894
Tony Krowiak20c922f2018-04-22 11:37:03 -0400895 kvm_s390_vcpu_crypto_reset_all(kvm);
Tony Krowiaka374e892014-09-03 10:13:53 +0200896 mutex_unlock(&kvm->lock);
897 return 0;
898}
899
Claudio Imbrenda190df4a2016-08-04 17:54:42 +0200900static void kvm_s390_sync_request_broadcast(struct kvm *kvm, int req)
901{
902 int cx;
903 struct kvm_vcpu *vcpu;
904
905 kvm_for_each_vcpu(cx, vcpu, kvm)
906 kvm_s390_sync_request(req, vcpu);
907}
908
909/*
910 * Must be called with kvm->srcu held to avoid races on memslots, and with
Christian Borntraeger1de1ea72017-12-22 10:54:20 +0100911 * kvm->slots_lock to avoid races with ourselves and kvm_s390_vm_stop_migration.
Claudio Imbrenda190df4a2016-08-04 17:54:42 +0200912 */
913static int kvm_s390_vm_start_migration(struct kvm *kvm)
914{
Claudio Imbrenda190df4a2016-08-04 17:54:42 +0200915 struct kvm_memory_slot *ms;
Claudio Imbrenda190df4a2016-08-04 17:54:42 +0200916 struct kvm_memslots *slots;
Claudio Imbrendaafdad612018-04-30 18:33:25 +0200917 unsigned long ram_pages = 0;
Claudio Imbrenda190df4a2016-08-04 17:54:42 +0200918 int slotnr;
919
920 /* migration mode already enabled */
Claudio Imbrendaafdad612018-04-30 18:33:25 +0200921 if (kvm->arch.migration_mode)
Claudio Imbrenda190df4a2016-08-04 17:54:42 +0200922 return 0;
Claudio Imbrenda190df4a2016-08-04 17:54:42 +0200923 slots = kvm_memslots(kvm);
924 if (!slots || !slots->used_slots)
925 return -EINVAL;
926
Claudio Imbrendaafdad612018-04-30 18:33:25 +0200927 if (!kvm->arch.use_cmma) {
928 kvm->arch.migration_mode = 1;
929 return 0;
Claudio Imbrenda190df4a2016-08-04 17:54:42 +0200930 }
Claudio Imbrendaafdad612018-04-30 18:33:25 +0200931 /* mark all the pages in active slots as dirty */
932 for (slotnr = 0; slotnr < slots->used_slots; slotnr++) {
933 ms = slots->memslots + slotnr;
934 /*
935 * The second half of the bitmap is only used on x86,
936 * and would be wasted otherwise, so we put it to good
937 * use here to keep track of the state of the storage
938 * attributes.
939 */
940 memset(kvm_second_dirty_bitmap(ms), 0xff, kvm_dirty_bitmap_bytes(ms));
941 ram_pages += ms->npages;
942 }
943 atomic64_set(&kvm->arch.cmma_dirty_pages, ram_pages);
944 kvm->arch.migration_mode = 1;
945 kvm_s390_sync_request_broadcast(kvm, KVM_REQ_START_MIGRATION);
Claudio Imbrenda190df4a2016-08-04 17:54:42 +0200946 return 0;
947}
948
949/*
Christian Borntraeger1de1ea72017-12-22 10:54:20 +0100950 * Must be called with kvm->slots_lock to avoid races with ourselves and
Claudio Imbrenda190df4a2016-08-04 17:54:42 +0200951 * kvm_s390_vm_start_migration.
952 */
953static int kvm_s390_vm_stop_migration(struct kvm *kvm)
954{
Claudio Imbrenda190df4a2016-08-04 17:54:42 +0200955 /* migration mode already disabled */
Claudio Imbrendaafdad612018-04-30 18:33:25 +0200956 if (!kvm->arch.migration_mode)
Claudio Imbrenda190df4a2016-08-04 17:54:42 +0200957 return 0;
Claudio Imbrendaafdad612018-04-30 18:33:25 +0200958 kvm->arch.migration_mode = 0;
959 if (kvm->arch.use_cmma)
Claudio Imbrenda190df4a2016-08-04 17:54:42 +0200960 kvm_s390_sync_request_broadcast(kvm, KVM_REQ_STOP_MIGRATION);
Claudio Imbrenda190df4a2016-08-04 17:54:42 +0200961 return 0;
962}
963
964static int kvm_s390_vm_set_migration(struct kvm *kvm,
965 struct kvm_device_attr *attr)
966{
Christian Borntraeger1de1ea72017-12-22 10:54:20 +0100967 int res = -ENXIO;
Claudio Imbrenda190df4a2016-08-04 17:54:42 +0200968
Christian Borntraeger1de1ea72017-12-22 10:54:20 +0100969 mutex_lock(&kvm->slots_lock);
Claudio Imbrenda190df4a2016-08-04 17:54:42 +0200970 switch (attr->attr) {
971 case KVM_S390_VM_MIGRATION_START:
Claudio Imbrenda190df4a2016-08-04 17:54:42 +0200972 res = kvm_s390_vm_start_migration(kvm);
Claudio Imbrenda190df4a2016-08-04 17:54:42 +0200973 break;
974 case KVM_S390_VM_MIGRATION_STOP:
975 res = kvm_s390_vm_stop_migration(kvm);
976 break;
977 default:
978 break;
979 }
Christian Borntraeger1de1ea72017-12-22 10:54:20 +0100980 mutex_unlock(&kvm->slots_lock);
Claudio Imbrenda190df4a2016-08-04 17:54:42 +0200981
982 return res;
983}
984
985static int kvm_s390_vm_get_migration(struct kvm *kvm,
986 struct kvm_device_attr *attr)
987{
Claudio Imbrendaafdad612018-04-30 18:33:25 +0200988 u64 mig = kvm->arch.migration_mode;
Claudio Imbrenda190df4a2016-08-04 17:54:42 +0200989
990 if (attr->attr != KVM_S390_VM_MIGRATION_STATUS)
991 return -ENXIO;
992
993 if (copy_to_user((void __user *)attr->addr, &mig, sizeof(mig)))
994 return -EFAULT;
995 return 0;
996}
997
Collin L. Walling8fa16962016-07-26 15:29:44 -0400998static int kvm_s390_set_tod_ext(struct kvm *kvm, struct kvm_device_attr *attr)
999{
1000 struct kvm_s390_vm_tod_clock gtod;
1001
1002 if (copy_from_user(&gtod, (void __user *)attr->addr, sizeof(gtod)))
1003 return -EFAULT;
1004
David Hildenbrand0e7def52018-02-07 12:46:43 +01001005 if (!test_kvm_facility(kvm, 139) && gtod.epoch_idx)
Collin L. Walling8fa16962016-07-26 15:29:44 -04001006 return -EINVAL;
David Hildenbrand0e7def52018-02-07 12:46:43 +01001007 kvm_s390_set_tod_clock(kvm, &gtod);
Collin L. Walling8fa16962016-07-26 15:29:44 -04001008
1009 VM_EVENT(kvm, 3, "SET: TOD extension: 0x%x, TOD base: 0x%llx",
1010 gtod.epoch_idx, gtod.tod);
1011
1012 return 0;
1013}
1014
Jason J. Herne72f25022014-11-25 09:46:02 -05001015static int kvm_s390_set_tod_high(struct kvm *kvm, struct kvm_device_attr *attr)
1016{
1017 u8 gtod_high;
1018
1019 if (copy_from_user(&gtod_high, (void __user *)attr->addr,
1020 sizeof(gtod_high)))
1021 return -EFAULT;
1022
1023 if (gtod_high != 0)
1024 return -EINVAL;
Christian Borntraeger58c383c2015-10-12 13:27:29 +02001025 VM_EVENT(kvm, 3, "SET: TOD extension: 0x%x", gtod_high);
Jason J. Herne72f25022014-11-25 09:46:02 -05001026
1027 return 0;
1028}
1029
1030static int kvm_s390_set_tod_low(struct kvm *kvm, struct kvm_device_attr *attr)
1031{
David Hildenbrand0e7def52018-02-07 12:46:43 +01001032 struct kvm_s390_vm_tod_clock gtod = { 0 };
Jason J. Herne72f25022014-11-25 09:46:02 -05001033
David Hildenbrand0e7def52018-02-07 12:46:43 +01001034 if (copy_from_user(&gtod.tod, (void __user *)attr->addr,
1035 sizeof(gtod.tod)))
Jason J. Herne72f25022014-11-25 09:46:02 -05001036 return -EFAULT;
1037
David Hildenbrand0e7def52018-02-07 12:46:43 +01001038 kvm_s390_set_tod_clock(kvm, &gtod);
1039 VM_EVENT(kvm, 3, "SET: TOD base: 0x%llx", gtod.tod);
Jason J. Herne72f25022014-11-25 09:46:02 -05001040 return 0;
1041}
1042
1043static int kvm_s390_set_tod(struct kvm *kvm, struct kvm_device_attr *attr)
1044{
1045 int ret;
1046
1047 if (attr->flags)
1048 return -EINVAL;
1049
1050 switch (attr->attr) {
Collin L. Walling8fa16962016-07-26 15:29:44 -04001051 case KVM_S390_VM_TOD_EXT:
1052 ret = kvm_s390_set_tod_ext(kvm, attr);
1053 break;
Jason J. Herne72f25022014-11-25 09:46:02 -05001054 case KVM_S390_VM_TOD_HIGH:
1055 ret = kvm_s390_set_tod_high(kvm, attr);
1056 break;
1057 case KVM_S390_VM_TOD_LOW:
1058 ret = kvm_s390_set_tod_low(kvm, attr);
1059 break;
1060 default:
1061 ret = -ENXIO;
1062 break;
1063 }
1064 return ret;
1065}
1066
David Hildenbrand33d1b272018-04-27 14:36:13 +02001067static void kvm_s390_get_tod_clock(struct kvm *kvm,
1068 struct kvm_s390_vm_tod_clock *gtod)
Collin L. Walling8fa16962016-07-26 15:29:44 -04001069{
1070 struct kvm_s390_tod_clock_ext htod;
1071
1072 preempt_disable();
1073
1074 get_tod_clock_ext((char *)&htod);
1075
1076 gtod->tod = htod.tod + kvm->arch.epoch;
David Hildenbrand33d1b272018-04-27 14:36:13 +02001077 gtod->epoch_idx = 0;
1078 if (test_kvm_facility(kvm, 139)) {
1079 gtod->epoch_idx = htod.epoch_idx + kvm->arch.epdx;
1080 if (gtod->tod < htod.tod)
1081 gtod->epoch_idx += 1;
1082 }
Collin L. Walling8fa16962016-07-26 15:29:44 -04001083
1084 preempt_enable();
1085}
1086
1087static int kvm_s390_get_tod_ext(struct kvm *kvm, struct kvm_device_attr *attr)
1088{
1089 struct kvm_s390_vm_tod_clock gtod;
1090
1091 memset(&gtod, 0, sizeof(gtod));
David Hildenbrand33d1b272018-04-27 14:36:13 +02001092 kvm_s390_get_tod_clock(kvm, &gtod);
Collin L. Walling8fa16962016-07-26 15:29:44 -04001093 if (copy_to_user((void __user *)attr->addr, &gtod, sizeof(gtod)))
1094 return -EFAULT;
1095
1096 VM_EVENT(kvm, 3, "QUERY: TOD extension: 0x%x, TOD base: 0x%llx",
1097 gtod.epoch_idx, gtod.tod);
1098 return 0;
1099}
1100
Jason J. Herne72f25022014-11-25 09:46:02 -05001101static int kvm_s390_get_tod_high(struct kvm *kvm, struct kvm_device_attr *attr)
1102{
1103 u8 gtod_high = 0;
1104
1105 if (copy_to_user((void __user *)attr->addr, &gtod_high,
1106 sizeof(gtod_high)))
1107 return -EFAULT;
Christian Borntraeger58c383c2015-10-12 13:27:29 +02001108 VM_EVENT(kvm, 3, "QUERY: TOD extension: 0x%x", gtod_high);
Jason J. Herne72f25022014-11-25 09:46:02 -05001109
1110 return 0;
1111}
1112
1113static int kvm_s390_get_tod_low(struct kvm *kvm, struct kvm_device_attr *attr)
1114{
David Hildenbrand5a3d8832015-09-29 16:27:24 +02001115 u64 gtod;
Jason J. Herne72f25022014-11-25 09:46:02 -05001116
David Hildenbrand60417fc2015-09-29 16:20:36 +02001117 gtod = kvm_s390_get_tod_clock_fast(kvm);
Jason J. Herne72f25022014-11-25 09:46:02 -05001118 if (copy_to_user((void __user *)attr->addr, &gtod, sizeof(gtod)))
1119 return -EFAULT;
Christian Borntraeger58c383c2015-10-12 13:27:29 +02001120 VM_EVENT(kvm, 3, "QUERY: TOD base: 0x%llx", gtod);
Jason J. Herne72f25022014-11-25 09:46:02 -05001121
1122 return 0;
1123}
1124
1125static int kvm_s390_get_tod(struct kvm *kvm, struct kvm_device_attr *attr)
1126{
1127 int ret;
1128
1129 if (attr->flags)
1130 return -EINVAL;
1131
1132 switch (attr->attr) {
Collin L. Walling8fa16962016-07-26 15:29:44 -04001133 case KVM_S390_VM_TOD_EXT:
1134 ret = kvm_s390_get_tod_ext(kvm, attr);
1135 break;
Jason J. Herne72f25022014-11-25 09:46:02 -05001136 case KVM_S390_VM_TOD_HIGH:
1137 ret = kvm_s390_get_tod_high(kvm, attr);
1138 break;
1139 case KVM_S390_VM_TOD_LOW:
1140 ret = kvm_s390_get_tod_low(kvm, attr);
1141 break;
1142 default:
1143 ret = -ENXIO;
1144 break;
1145 }
1146 return ret;
1147}
1148
Michael Mueller658b6ed2015-02-02 15:49:35 +01001149static int kvm_s390_set_processor(struct kvm *kvm, struct kvm_device_attr *attr)
1150{
1151 struct kvm_s390_vm_cpu_processor *proc;
David Hildenbrand053dd232016-04-04 13:59:42 +02001152 u16 lowest_ibc, unblocked_ibc;
Michael Mueller658b6ed2015-02-02 15:49:35 +01001153 int ret = 0;
1154
1155 mutex_lock(&kvm->lock);
Paolo Bonzinia03825b2016-06-13 14:50:04 +02001156 if (kvm->created_vcpus) {
Michael Mueller658b6ed2015-02-02 15:49:35 +01001157 ret = -EBUSY;
1158 goto out;
1159 }
1160 proc = kzalloc(sizeof(*proc), GFP_KERNEL);
1161 if (!proc) {
1162 ret = -ENOMEM;
1163 goto out;
1164 }
1165 if (!copy_from_user(proc, (void __user *)attr->addr,
1166 sizeof(*proc))) {
David Hildenbrand9bb0ec02016-04-04 14:27:51 +02001167 kvm->arch.model.cpuid = proc->cpuid;
David Hildenbrand053dd232016-04-04 13:59:42 +02001168 lowest_ibc = sclp.ibc >> 16 & 0xfff;
1169 unblocked_ibc = sclp.ibc & 0xfff;
David Hildenbrand0487c442016-06-10 09:22:31 +02001170 if (lowest_ibc && proc->ibc) {
David Hildenbrand053dd232016-04-04 13:59:42 +02001171 if (proc->ibc > unblocked_ibc)
1172 kvm->arch.model.ibc = unblocked_ibc;
1173 else if (proc->ibc < lowest_ibc)
1174 kvm->arch.model.ibc = lowest_ibc;
1175 else
1176 kvm->arch.model.ibc = proc->ibc;
1177 }
David Hildenbrandc54f0d62015-12-02 08:53:52 +01001178 memcpy(kvm->arch.model.fac_list, proc->fac_list,
Michael Mueller658b6ed2015-02-02 15:49:35 +01001179 S390_ARCH_FAC_LIST_SIZE_BYTE);
Christian Borntraegera8c39dd2017-01-18 16:01:02 +01001180 VM_EVENT(kvm, 3, "SET: guest ibc: 0x%4.4x, guest cpuid: 0x%16.16llx",
1181 kvm->arch.model.ibc,
1182 kvm->arch.model.cpuid);
1183 VM_EVENT(kvm, 3, "SET: guest faclist: 0x%16.16llx.%16.16llx.%16.16llx",
1184 kvm->arch.model.fac_list[0],
1185 kvm->arch.model.fac_list[1],
1186 kvm->arch.model.fac_list[2]);
Michael Mueller658b6ed2015-02-02 15:49:35 +01001187 } else
1188 ret = -EFAULT;
1189 kfree(proc);
1190out:
1191 mutex_unlock(&kvm->lock);
1192 return ret;
1193}
1194
David Hildenbrand15c97052015-03-19 17:36:43 +01001195static int kvm_s390_set_processor_feat(struct kvm *kvm,
1196 struct kvm_device_attr *attr)
1197{
1198 struct kvm_s390_vm_cpu_feat data;
David Hildenbrand15c97052015-03-19 17:36:43 +01001199
1200 if (copy_from_user(&data, (void __user *)attr->addr, sizeof(data)))
1201 return -EFAULT;
1202 if (!bitmap_subset((unsigned long *) data.feat,
1203 kvm_s390_available_cpu_feat,
1204 KVM_S390_VM_CPU_FEAT_NR_BITS))
1205 return -EINVAL;
1206
1207 mutex_lock(&kvm->lock);
Christian Borntraeger2f8311c2017-11-16 12:30:15 +01001208 if (kvm->created_vcpus) {
1209 mutex_unlock(&kvm->lock);
1210 return -EBUSY;
David Hildenbrand15c97052015-03-19 17:36:43 +01001211 }
Christian Borntraeger2f8311c2017-11-16 12:30:15 +01001212 bitmap_copy(kvm->arch.cpu_feat, (unsigned long *) data.feat,
1213 KVM_S390_VM_CPU_FEAT_NR_BITS);
David Hildenbrand15c97052015-03-19 17:36:43 +01001214 mutex_unlock(&kvm->lock);
Christian Borntraeger2f8311c2017-11-16 12:30:15 +01001215 VM_EVENT(kvm, 3, "SET: guest feat: 0x%16.16llx.0x%16.16llx.0x%16.16llx",
1216 data.feat[0],
1217 data.feat[1],
1218 data.feat[2]);
1219 return 0;
David Hildenbrand15c97052015-03-19 17:36:43 +01001220}
1221
David Hildenbrand0a763c72016-05-18 16:03:47 +02001222static int kvm_s390_set_processor_subfunc(struct kvm *kvm,
1223 struct kvm_device_attr *attr)
1224{
1225 /*
1226 * Once supported by kernel + hw, we have to store the subfunctions
1227 * in kvm->arch and remember that user space configured them.
1228 */
1229 return -ENXIO;
1230}
1231
Michael Mueller658b6ed2015-02-02 15:49:35 +01001232static int kvm_s390_set_cpu_model(struct kvm *kvm, struct kvm_device_attr *attr)
1233{
1234 int ret = -ENXIO;
1235
1236 switch (attr->attr) {
1237 case KVM_S390_VM_CPU_PROCESSOR:
1238 ret = kvm_s390_set_processor(kvm, attr);
1239 break;
David Hildenbrand15c97052015-03-19 17:36:43 +01001240 case KVM_S390_VM_CPU_PROCESSOR_FEAT:
1241 ret = kvm_s390_set_processor_feat(kvm, attr);
1242 break;
David Hildenbrand0a763c72016-05-18 16:03:47 +02001243 case KVM_S390_VM_CPU_PROCESSOR_SUBFUNC:
1244 ret = kvm_s390_set_processor_subfunc(kvm, attr);
1245 break;
Michael Mueller658b6ed2015-02-02 15:49:35 +01001246 }
1247 return ret;
1248}
1249
1250static int kvm_s390_get_processor(struct kvm *kvm, struct kvm_device_attr *attr)
1251{
1252 struct kvm_s390_vm_cpu_processor *proc;
1253 int ret = 0;
1254
1255 proc = kzalloc(sizeof(*proc), GFP_KERNEL);
1256 if (!proc) {
1257 ret = -ENOMEM;
1258 goto out;
1259 }
David Hildenbrand9bb0ec02016-04-04 14:27:51 +02001260 proc->cpuid = kvm->arch.model.cpuid;
Michael Mueller658b6ed2015-02-02 15:49:35 +01001261 proc->ibc = kvm->arch.model.ibc;
David Hildenbrandc54f0d62015-12-02 08:53:52 +01001262 memcpy(&proc->fac_list, kvm->arch.model.fac_list,
1263 S390_ARCH_FAC_LIST_SIZE_BYTE);
Christian Borntraegera8c39dd2017-01-18 16:01:02 +01001264 VM_EVENT(kvm, 3, "GET: guest ibc: 0x%4.4x, guest cpuid: 0x%16.16llx",
1265 kvm->arch.model.ibc,
1266 kvm->arch.model.cpuid);
1267 VM_EVENT(kvm, 3, "GET: guest faclist: 0x%16.16llx.%16.16llx.%16.16llx",
1268 kvm->arch.model.fac_list[0],
1269 kvm->arch.model.fac_list[1],
1270 kvm->arch.model.fac_list[2]);
Michael Mueller658b6ed2015-02-02 15:49:35 +01001271 if (copy_to_user((void __user *)attr->addr, proc, sizeof(*proc)))
1272 ret = -EFAULT;
1273 kfree(proc);
1274out:
1275 return ret;
1276}
1277
1278static int kvm_s390_get_machine(struct kvm *kvm, struct kvm_device_attr *attr)
1279{
1280 struct kvm_s390_vm_cpu_machine *mach;
1281 int ret = 0;
1282
1283 mach = kzalloc(sizeof(*mach), GFP_KERNEL);
1284 if (!mach) {
1285 ret = -ENOMEM;
1286 goto out;
1287 }
1288 get_cpu_id((struct cpuid *) &mach->cpuid);
David Hildenbrand37c5f6c2015-05-06 13:18:59 +02001289 mach->ibc = sclp.ibc;
David Hildenbrandc54f0d62015-12-02 08:53:52 +01001290 memcpy(&mach->fac_mask, kvm->arch.model.fac_mask,
Michael Mueller981467c2015-02-24 13:51:04 +01001291 S390_ARCH_FAC_LIST_SIZE_BYTE);
Michael Mueller658b6ed2015-02-02 15:49:35 +01001292 memcpy((unsigned long *)&mach->fac_list, S390_lowcore.stfle_fac_list,
Christian Borntraeger04478192017-01-12 16:25:15 +01001293 sizeof(S390_lowcore.stfle_fac_list));
Christian Borntraegera8c39dd2017-01-18 16:01:02 +01001294 VM_EVENT(kvm, 3, "GET: host ibc: 0x%4.4x, host cpuid: 0x%16.16llx",
1295 kvm->arch.model.ibc,
1296 kvm->arch.model.cpuid);
1297 VM_EVENT(kvm, 3, "GET: host facmask: 0x%16.16llx.%16.16llx.%16.16llx",
1298 mach->fac_mask[0],
1299 mach->fac_mask[1],
1300 mach->fac_mask[2]);
1301 VM_EVENT(kvm, 3, "GET: host faclist: 0x%16.16llx.%16.16llx.%16.16llx",
1302 mach->fac_list[0],
1303 mach->fac_list[1],
1304 mach->fac_list[2]);
Michael Mueller658b6ed2015-02-02 15:49:35 +01001305 if (copy_to_user((void __user *)attr->addr, mach, sizeof(*mach)))
1306 ret = -EFAULT;
1307 kfree(mach);
1308out:
1309 return ret;
1310}
1311
David Hildenbrand15c97052015-03-19 17:36:43 +01001312static int kvm_s390_get_processor_feat(struct kvm *kvm,
1313 struct kvm_device_attr *attr)
1314{
1315 struct kvm_s390_vm_cpu_feat data;
1316
1317 bitmap_copy((unsigned long *) data.feat, kvm->arch.cpu_feat,
1318 KVM_S390_VM_CPU_FEAT_NR_BITS);
1319 if (copy_to_user((void __user *)attr->addr, &data, sizeof(data)))
1320 return -EFAULT;
Christian Borntraeger2f8311c2017-11-16 12:30:15 +01001321 VM_EVENT(kvm, 3, "GET: guest feat: 0x%16.16llx.0x%16.16llx.0x%16.16llx",
1322 data.feat[0],
1323 data.feat[1],
1324 data.feat[2]);
David Hildenbrand15c97052015-03-19 17:36:43 +01001325 return 0;
1326}
1327
1328static int kvm_s390_get_machine_feat(struct kvm *kvm,
1329 struct kvm_device_attr *attr)
1330{
1331 struct kvm_s390_vm_cpu_feat data;
1332
1333 bitmap_copy((unsigned long *) data.feat,
1334 kvm_s390_available_cpu_feat,
1335 KVM_S390_VM_CPU_FEAT_NR_BITS);
1336 if (copy_to_user((void __user *)attr->addr, &data, sizeof(data)))
1337 return -EFAULT;
Christian Borntraeger2f8311c2017-11-16 12:30:15 +01001338 VM_EVENT(kvm, 3, "GET: host feat: 0x%16.16llx.0x%16.16llx.0x%16.16llx",
1339 data.feat[0],
1340 data.feat[1],
1341 data.feat[2]);
David Hildenbrand15c97052015-03-19 17:36:43 +01001342 return 0;
1343}
1344
David Hildenbrand0a763c72016-05-18 16:03:47 +02001345static int kvm_s390_get_processor_subfunc(struct kvm *kvm,
1346 struct kvm_device_attr *attr)
1347{
1348 /*
1349 * Once we can actually configure subfunctions (kernel + hw support),
1350 * we have to check if they were already set by user space, if so copy
1351 * them from kvm->arch.
1352 */
1353 return -ENXIO;
1354}
1355
1356static int kvm_s390_get_machine_subfunc(struct kvm *kvm,
1357 struct kvm_device_attr *attr)
1358{
1359 if (copy_to_user((void __user *)attr->addr, &kvm_s390_available_subfunc,
1360 sizeof(struct kvm_s390_vm_cpu_subfunc)))
1361 return -EFAULT;
1362 return 0;
1363}
Michael Mueller658b6ed2015-02-02 15:49:35 +01001364static int kvm_s390_get_cpu_model(struct kvm *kvm, struct kvm_device_attr *attr)
1365{
1366 int ret = -ENXIO;
1367
1368 switch (attr->attr) {
1369 case KVM_S390_VM_CPU_PROCESSOR:
1370 ret = kvm_s390_get_processor(kvm, attr);
1371 break;
1372 case KVM_S390_VM_CPU_MACHINE:
1373 ret = kvm_s390_get_machine(kvm, attr);
1374 break;
David Hildenbrand15c97052015-03-19 17:36:43 +01001375 case KVM_S390_VM_CPU_PROCESSOR_FEAT:
1376 ret = kvm_s390_get_processor_feat(kvm, attr);
1377 break;
1378 case KVM_S390_VM_CPU_MACHINE_FEAT:
1379 ret = kvm_s390_get_machine_feat(kvm, attr);
1380 break;
David Hildenbrand0a763c72016-05-18 16:03:47 +02001381 case KVM_S390_VM_CPU_PROCESSOR_SUBFUNC:
1382 ret = kvm_s390_get_processor_subfunc(kvm, attr);
1383 break;
1384 case KVM_S390_VM_CPU_MACHINE_SUBFUNC:
1385 ret = kvm_s390_get_machine_subfunc(kvm, attr);
1386 break;
Michael Mueller658b6ed2015-02-02 15:49:35 +01001387 }
1388 return ret;
1389}
1390
Dominik Dingelf2061652014-04-09 13:13:00 +02001391static int kvm_s390_vm_set_attr(struct kvm *kvm, struct kvm_device_attr *attr)
1392{
1393 int ret;
1394
1395 switch (attr->group) {
Dominik Dingel4f718ea2014-04-09 13:13:00 +02001396 case KVM_S390_VM_MEM_CTRL:
Dominik Dingel8c0a7ce2014-10-31 14:10:41 +01001397 ret = kvm_s390_set_mem_control(kvm, attr);
Dominik Dingel4f718ea2014-04-09 13:13:00 +02001398 break;
Jason J. Herne72f25022014-11-25 09:46:02 -05001399 case KVM_S390_VM_TOD:
1400 ret = kvm_s390_set_tod(kvm, attr);
1401 break;
Michael Mueller658b6ed2015-02-02 15:49:35 +01001402 case KVM_S390_VM_CPU_MODEL:
1403 ret = kvm_s390_set_cpu_model(kvm, attr);
1404 break;
Tony Krowiaka374e892014-09-03 10:13:53 +02001405 case KVM_S390_VM_CRYPTO:
1406 ret = kvm_s390_vm_set_crypto(kvm, attr);
1407 break;
Claudio Imbrenda190df4a2016-08-04 17:54:42 +02001408 case KVM_S390_VM_MIGRATION:
1409 ret = kvm_s390_vm_set_migration(kvm, attr);
1410 break;
Dominik Dingelf2061652014-04-09 13:13:00 +02001411 default:
1412 ret = -ENXIO;
1413 break;
1414 }
1415
1416 return ret;
1417}
1418
1419static int kvm_s390_vm_get_attr(struct kvm *kvm, struct kvm_device_attr *attr)
1420{
Dominik Dingel8c0a7ce2014-10-31 14:10:41 +01001421 int ret;
1422
1423 switch (attr->group) {
1424 case KVM_S390_VM_MEM_CTRL:
1425 ret = kvm_s390_get_mem_control(kvm, attr);
1426 break;
Jason J. Herne72f25022014-11-25 09:46:02 -05001427 case KVM_S390_VM_TOD:
1428 ret = kvm_s390_get_tod(kvm, attr);
1429 break;
Michael Mueller658b6ed2015-02-02 15:49:35 +01001430 case KVM_S390_VM_CPU_MODEL:
1431 ret = kvm_s390_get_cpu_model(kvm, attr);
1432 break;
Claudio Imbrenda190df4a2016-08-04 17:54:42 +02001433 case KVM_S390_VM_MIGRATION:
1434 ret = kvm_s390_vm_get_migration(kvm, attr);
1435 break;
Dominik Dingel8c0a7ce2014-10-31 14:10:41 +01001436 default:
1437 ret = -ENXIO;
1438 break;
1439 }
1440
1441 return ret;
Dominik Dingelf2061652014-04-09 13:13:00 +02001442}
1443
1444static int kvm_s390_vm_has_attr(struct kvm *kvm, struct kvm_device_attr *attr)
1445{
1446 int ret;
1447
1448 switch (attr->group) {
Dominik Dingel4f718ea2014-04-09 13:13:00 +02001449 case KVM_S390_VM_MEM_CTRL:
1450 switch (attr->attr) {
1451 case KVM_S390_VM_MEM_ENABLE_CMMA:
1452 case KVM_S390_VM_MEM_CLR_CMMA:
David Hildenbrandf9cbd9b2016-03-03 09:48:47 +01001453 ret = sclp.has_cmma ? 0 : -ENXIO;
1454 break;
Dominik Dingel8c0a7ce2014-10-31 14:10:41 +01001455 case KVM_S390_VM_MEM_LIMIT_SIZE:
Dominik Dingel4f718ea2014-04-09 13:13:00 +02001456 ret = 0;
1457 break;
1458 default:
1459 ret = -ENXIO;
1460 break;
1461 }
1462 break;
Jason J. Herne72f25022014-11-25 09:46:02 -05001463 case KVM_S390_VM_TOD:
1464 switch (attr->attr) {
1465 case KVM_S390_VM_TOD_LOW:
1466 case KVM_S390_VM_TOD_HIGH:
1467 ret = 0;
1468 break;
1469 default:
1470 ret = -ENXIO;
1471 break;
1472 }
1473 break;
Michael Mueller658b6ed2015-02-02 15:49:35 +01001474 case KVM_S390_VM_CPU_MODEL:
1475 switch (attr->attr) {
1476 case KVM_S390_VM_CPU_PROCESSOR:
1477 case KVM_S390_VM_CPU_MACHINE:
David Hildenbrand15c97052015-03-19 17:36:43 +01001478 case KVM_S390_VM_CPU_PROCESSOR_FEAT:
1479 case KVM_S390_VM_CPU_MACHINE_FEAT:
David Hildenbrand0a763c72016-05-18 16:03:47 +02001480 case KVM_S390_VM_CPU_MACHINE_SUBFUNC:
Michael Mueller658b6ed2015-02-02 15:49:35 +01001481 ret = 0;
1482 break;
David Hildenbrand0a763c72016-05-18 16:03:47 +02001483 /* configuring subfunctions is not supported yet */
1484 case KVM_S390_VM_CPU_PROCESSOR_SUBFUNC:
Michael Mueller658b6ed2015-02-02 15:49:35 +01001485 default:
1486 ret = -ENXIO;
1487 break;
1488 }
1489 break;
Tony Krowiaka374e892014-09-03 10:13:53 +02001490 case KVM_S390_VM_CRYPTO:
1491 switch (attr->attr) {
1492 case KVM_S390_VM_CRYPTO_ENABLE_AES_KW:
1493 case KVM_S390_VM_CRYPTO_ENABLE_DEA_KW:
1494 case KVM_S390_VM_CRYPTO_DISABLE_AES_KW:
1495 case KVM_S390_VM_CRYPTO_DISABLE_DEA_KW:
1496 ret = 0;
1497 break;
1498 default:
1499 ret = -ENXIO;
1500 break;
1501 }
1502 break;
Claudio Imbrenda190df4a2016-08-04 17:54:42 +02001503 case KVM_S390_VM_MIGRATION:
1504 ret = 0;
1505 break;
Dominik Dingelf2061652014-04-09 13:13:00 +02001506 default:
1507 ret = -ENXIO;
1508 break;
1509 }
1510
1511 return ret;
1512}
1513
Jason J. Herne30ee2a92014-09-23 09:23:01 -04001514static long kvm_s390_get_skeys(struct kvm *kvm, struct kvm_s390_skeys *args)
1515{
1516 uint8_t *keys;
1517 uint64_t hva;
Christian Borntraeger4f899142017-07-10 13:35:48 +02001518 int srcu_idx, i, r = 0;
Jason J. Herne30ee2a92014-09-23 09:23:01 -04001519
1520 if (args->flags != 0)
1521 return -EINVAL;
1522
1523 /* Is this guest using storage keys? */
Janosch Frank55531b72018-02-15 16:33:47 +01001524 if (!mm_uses_skeys(current->mm))
Jason J. Herne30ee2a92014-09-23 09:23:01 -04001525 return KVM_S390_GET_SKEYS_NONE;
1526
1527 /* Enforce sane limit on memory allocation */
1528 if (args->count < 1 || args->count > KVM_S390_SKEYS_MAX)
1529 return -EINVAL;
1530
Michal Hocko752ade62017-05-08 15:57:27 -07001531 keys = kvmalloc_array(args->count, sizeof(uint8_t), GFP_KERNEL);
Jason J. Herne30ee2a92014-09-23 09:23:01 -04001532 if (!keys)
1533 return -ENOMEM;
1534
Martin Schwidefskyd3ed1ce2016-03-08 11:53:35 +01001535 down_read(&current->mm->mmap_sem);
Christian Borntraeger4f899142017-07-10 13:35:48 +02001536 srcu_idx = srcu_read_lock(&kvm->srcu);
Jason J. Herne30ee2a92014-09-23 09:23:01 -04001537 for (i = 0; i < args->count; i++) {
1538 hva = gfn_to_hva(kvm, args->start_gfn + i);
1539 if (kvm_is_error_hva(hva)) {
1540 r = -EFAULT;
Martin Schwidefskyd3ed1ce2016-03-08 11:53:35 +01001541 break;
Jason J. Herne30ee2a92014-09-23 09:23:01 -04001542 }
1543
David Hildenbrand154c8c12016-05-09 11:22:34 +02001544 r = get_guest_storage_key(current->mm, hva, &keys[i]);
1545 if (r)
Martin Schwidefskyd3ed1ce2016-03-08 11:53:35 +01001546 break;
Jason J. Herne30ee2a92014-09-23 09:23:01 -04001547 }
Christian Borntraeger4f899142017-07-10 13:35:48 +02001548 srcu_read_unlock(&kvm->srcu, srcu_idx);
Martin Schwidefskyd3ed1ce2016-03-08 11:53:35 +01001549 up_read(&current->mm->mmap_sem);
Jason J. Herne30ee2a92014-09-23 09:23:01 -04001550
Martin Schwidefskyd3ed1ce2016-03-08 11:53:35 +01001551 if (!r) {
1552 r = copy_to_user((uint8_t __user *)args->skeydata_addr, keys,
1553 sizeof(uint8_t) * args->count);
1554 if (r)
1555 r = -EFAULT;
Jason J. Herne30ee2a92014-09-23 09:23:01 -04001556 }
1557
Jason J. Herne30ee2a92014-09-23 09:23:01 -04001558 kvfree(keys);
1559 return r;
1560}
1561
1562static long kvm_s390_set_skeys(struct kvm *kvm, struct kvm_s390_skeys *args)
1563{
1564 uint8_t *keys;
1565 uint64_t hva;
Christian Borntraeger4f899142017-07-10 13:35:48 +02001566 int srcu_idx, i, r = 0;
Janosch Frankbd096f62018-07-18 13:40:22 +01001567 bool unlocked;
Jason J. Herne30ee2a92014-09-23 09:23:01 -04001568
1569 if (args->flags != 0)
1570 return -EINVAL;
1571
1572 /* Enforce sane limit on memory allocation */
1573 if (args->count < 1 || args->count > KVM_S390_SKEYS_MAX)
1574 return -EINVAL;
1575
Michal Hocko752ade62017-05-08 15:57:27 -07001576 keys = kvmalloc_array(args->count, sizeof(uint8_t), GFP_KERNEL);
Jason J. Herne30ee2a92014-09-23 09:23:01 -04001577 if (!keys)
1578 return -ENOMEM;
1579
1580 r = copy_from_user(keys, (uint8_t __user *)args->skeydata_addr,
1581 sizeof(uint8_t) * args->count);
1582 if (r) {
1583 r = -EFAULT;
1584 goto out;
1585 }
1586
1587 /* Enable storage key handling for the guest */
Dominik Dingel14d4a422015-05-07 15:16:13 +02001588 r = s390_enable_skey();
1589 if (r)
1590 goto out;
Jason J. Herne30ee2a92014-09-23 09:23:01 -04001591
Janosch Frankbd096f62018-07-18 13:40:22 +01001592 i = 0;
Martin Schwidefskyd3ed1ce2016-03-08 11:53:35 +01001593 down_read(&current->mm->mmap_sem);
Christian Borntraeger4f899142017-07-10 13:35:48 +02001594 srcu_idx = srcu_read_lock(&kvm->srcu);
Janosch Frankbd096f62018-07-18 13:40:22 +01001595 while (i < args->count) {
1596 unlocked = false;
Jason J. Herne30ee2a92014-09-23 09:23:01 -04001597 hva = gfn_to_hva(kvm, args->start_gfn + i);
1598 if (kvm_is_error_hva(hva)) {
1599 r = -EFAULT;
Martin Schwidefskyd3ed1ce2016-03-08 11:53:35 +01001600 break;
Jason J. Herne30ee2a92014-09-23 09:23:01 -04001601 }
1602
1603 /* Lowest order bit is reserved */
1604 if (keys[i] & 0x01) {
1605 r = -EINVAL;
Martin Schwidefskyd3ed1ce2016-03-08 11:53:35 +01001606 break;
Jason J. Herne30ee2a92014-09-23 09:23:01 -04001607 }
1608
David Hildenbrandfe69eab2016-05-09 13:08:07 +02001609 r = set_guest_storage_key(current->mm, hva, keys[i], 0);
Janosch Frankbd096f62018-07-18 13:40:22 +01001610 if (r) {
1611 r = fixup_user_fault(current, current->mm, hva,
1612 FAULT_FLAG_WRITE, &unlocked);
1613 if (r)
1614 break;
1615 }
1616 if (!r)
1617 i++;
Jason J. Herne30ee2a92014-09-23 09:23:01 -04001618 }
Christian Borntraeger4f899142017-07-10 13:35:48 +02001619 srcu_read_unlock(&kvm->srcu, srcu_idx);
Martin Schwidefskyd3ed1ce2016-03-08 11:53:35 +01001620 up_read(&current->mm->mmap_sem);
Jason J. Herne30ee2a92014-09-23 09:23:01 -04001621out:
1622 kvfree(keys);
1623 return r;
1624}
1625
Claudio Imbrenda4036e382016-08-04 17:58:47 +02001626/*
1627 * Base address and length must be sent at the start of each block, therefore
1628 * it's cheaper to send some clean data, as long as it's less than the size of
1629 * two longs.
1630 */
1631#define KVM_S390_MAX_BIT_DISTANCE (2 * sizeof(void *))
1632/* for consistency */
1633#define KVM_S390_CMMA_SIZE_MAX ((u32)KVM_S390_SKEYS_MAX)
1634
1635/*
Claudio Imbrendaafdad612018-04-30 18:33:25 +02001636 * Similar to gfn_to_memslot, but returns the index of a memslot also when the
1637 * address falls in a hole. In that case the index of one of the memslots
1638 * bordering the hole is returned.
1639 */
1640static int gfn_to_memslot_approx(struct kvm_memslots *slots, gfn_t gfn)
1641{
1642 int start = 0, end = slots->used_slots;
1643 int slot = atomic_read(&slots->lru_slot);
1644 struct kvm_memory_slot *memslots = slots->memslots;
1645
1646 if (gfn >= memslots[slot].base_gfn &&
1647 gfn < memslots[slot].base_gfn + memslots[slot].npages)
1648 return slot;
1649
1650 while (start < end) {
1651 slot = start + (end - start) / 2;
1652
1653 if (gfn >= memslots[slot].base_gfn)
1654 end = slot;
1655 else
1656 start = slot + 1;
1657 }
1658
1659 if (gfn >= memslots[start].base_gfn &&
1660 gfn < memslots[start].base_gfn + memslots[start].npages) {
1661 atomic_set(&slots->lru_slot, start);
1662 }
1663
1664 return start;
1665}
1666
1667static int kvm_s390_peek_cmma(struct kvm *kvm, struct kvm_s390_cmma_log *args,
1668 u8 *res, unsigned long bufsize)
1669{
1670 unsigned long pgstev, hva, cur_gfn = args->start_gfn;
1671
1672 args->count = 0;
1673 while (args->count < bufsize) {
1674 hva = gfn_to_hva(kvm, cur_gfn);
1675 /*
1676 * We return an error if the first value was invalid, but we
1677 * return successfully if at least one value was copied.
1678 */
1679 if (kvm_is_error_hva(hva))
1680 return args->count ? 0 : -EFAULT;
1681 if (get_pgste(kvm->mm, hva, &pgstev) < 0)
1682 pgstev = 0;
1683 res[args->count++] = (pgstev >> 24) & 0x43;
1684 cur_gfn++;
1685 }
1686
1687 return 0;
1688}
1689
1690static unsigned long kvm_s390_next_dirty_cmma(struct kvm_memslots *slots,
1691 unsigned long cur_gfn)
1692{
1693 int slotidx = gfn_to_memslot_approx(slots, cur_gfn);
1694 struct kvm_memory_slot *ms = slots->memslots + slotidx;
1695 unsigned long ofs = cur_gfn - ms->base_gfn;
1696
1697 if (ms->base_gfn + ms->npages <= cur_gfn) {
1698 slotidx--;
1699 /* If we are above the highest slot, wrap around */
1700 if (slotidx < 0)
1701 slotidx = slots->used_slots - 1;
1702
1703 ms = slots->memslots + slotidx;
1704 ofs = 0;
1705 }
1706 ofs = find_next_bit(kvm_second_dirty_bitmap(ms), ms->npages, ofs);
1707 while ((slotidx > 0) && (ofs >= ms->npages)) {
1708 slotidx--;
1709 ms = slots->memslots + slotidx;
1710 ofs = find_next_bit(kvm_second_dirty_bitmap(ms), ms->npages, 0);
1711 }
1712 return ms->base_gfn + ofs;
1713}
1714
1715static int kvm_s390_get_cmma(struct kvm *kvm, struct kvm_s390_cmma_log *args,
1716 u8 *res, unsigned long bufsize)
1717{
1718 unsigned long mem_end, cur_gfn, next_gfn, hva, pgstev;
1719 struct kvm_memslots *slots = kvm_memslots(kvm);
1720 struct kvm_memory_slot *ms;
1721
1722 cur_gfn = kvm_s390_next_dirty_cmma(slots, args->start_gfn);
1723 ms = gfn_to_memslot(kvm, cur_gfn);
1724 args->count = 0;
1725 args->start_gfn = cur_gfn;
1726 if (!ms)
1727 return 0;
1728 next_gfn = kvm_s390_next_dirty_cmma(slots, cur_gfn + 1);
1729 mem_end = slots->memslots[0].base_gfn + slots->memslots[0].npages;
1730
1731 while (args->count < bufsize) {
1732 hva = gfn_to_hva(kvm, cur_gfn);
1733 if (kvm_is_error_hva(hva))
1734 return 0;
1735 /* Decrement only if we actually flipped the bit to 0 */
1736 if (test_and_clear_bit(cur_gfn - ms->base_gfn, kvm_second_dirty_bitmap(ms)))
1737 atomic64_dec(&kvm->arch.cmma_dirty_pages);
1738 if (get_pgste(kvm->mm, hva, &pgstev) < 0)
1739 pgstev = 0;
1740 /* Save the value */
1741 res[args->count++] = (pgstev >> 24) & 0x43;
1742 /* If the next bit is too far away, stop. */
1743 if (next_gfn > cur_gfn + KVM_S390_MAX_BIT_DISTANCE)
1744 return 0;
1745 /* If we reached the previous "next", find the next one */
1746 if (cur_gfn == next_gfn)
1747 next_gfn = kvm_s390_next_dirty_cmma(slots, cur_gfn + 1);
1748 /* Reached the end of memory or of the buffer, stop */
1749 if ((next_gfn >= mem_end) ||
1750 (next_gfn - args->start_gfn >= bufsize))
1751 return 0;
1752 cur_gfn++;
1753 /* Reached the end of the current memslot, take the next one. */
1754 if (cur_gfn - ms->base_gfn >= ms->npages) {
1755 ms = gfn_to_memslot(kvm, cur_gfn);
1756 if (!ms)
1757 return 0;
1758 }
1759 }
1760 return 0;
1761}
1762
1763/*
Claudio Imbrenda4036e382016-08-04 17:58:47 +02001764 * This function searches for the next page with dirty CMMA attributes, and
1765 * saves the attributes in the buffer up to either the end of the buffer or
1766 * until a block of at least KVM_S390_MAX_BIT_DISTANCE clean bits is found;
1767 * no trailing clean bytes are saved.
1768 * In case no dirty bits were found, or if CMMA was not enabled or used, the
1769 * output buffer will indicate 0 as length.
1770 */
1771static int kvm_s390_get_cmma_bits(struct kvm *kvm,
1772 struct kvm_s390_cmma_log *args)
1773{
Claudio Imbrendaafdad612018-04-30 18:33:25 +02001774 unsigned long bufsize;
1775 int srcu_idx, peek, ret;
1776 u8 *values;
Claudio Imbrenda4036e382016-08-04 17:58:47 +02001777
Claudio Imbrendaafdad612018-04-30 18:33:25 +02001778 if (!kvm->arch.use_cmma)
Claudio Imbrenda4036e382016-08-04 17:58:47 +02001779 return -ENXIO;
1780 /* Invalid/unsupported flags were specified */
1781 if (args->flags & ~KVM_S390_CMMA_PEEK)
1782 return -EINVAL;
1783 /* Migration mode query, and we are not doing a migration */
1784 peek = !!(args->flags & KVM_S390_CMMA_PEEK);
Claudio Imbrendaafdad612018-04-30 18:33:25 +02001785 if (!peek && !kvm->arch.migration_mode)
Claudio Imbrenda4036e382016-08-04 17:58:47 +02001786 return -EINVAL;
1787 /* CMMA is disabled or was not used, or the buffer has length zero */
1788 bufsize = min(args->count, KVM_S390_CMMA_SIZE_MAX);
Janosch Frankc9f0a2b2018-02-16 12:16:14 +01001789 if (!bufsize || !kvm->mm->context.uses_cmm) {
Claudio Imbrenda4036e382016-08-04 17:58:47 +02001790 memset(args, 0, sizeof(*args));
1791 return 0;
1792 }
Claudio Imbrendaafdad612018-04-30 18:33:25 +02001793 /* We are not peeking, and there are no dirty pages */
1794 if (!peek && !atomic64_read(&kvm->arch.cmma_dirty_pages)) {
1795 memset(args, 0, sizeof(*args));
1796 return 0;
Claudio Imbrenda4036e382016-08-04 17:58:47 +02001797 }
1798
Claudio Imbrendaafdad612018-04-30 18:33:25 +02001799 values = vmalloc(bufsize);
1800 if (!values)
Claudio Imbrenda4036e382016-08-04 17:58:47 +02001801 return -ENOMEM;
1802
Claudio Imbrenda4036e382016-08-04 17:58:47 +02001803 down_read(&kvm->mm->mmap_sem);
1804 srcu_idx = srcu_read_lock(&kvm->srcu);
Claudio Imbrendaafdad612018-04-30 18:33:25 +02001805 if (peek)
1806 ret = kvm_s390_peek_cmma(kvm, args, values, bufsize);
1807 else
1808 ret = kvm_s390_get_cmma(kvm, args, values, bufsize);
Claudio Imbrenda4036e382016-08-04 17:58:47 +02001809 srcu_read_unlock(&kvm->srcu, srcu_idx);
1810 up_read(&kvm->mm->mmap_sem);
Claudio Imbrenda4036e382016-08-04 17:58:47 +02001811
Claudio Imbrendaafdad612018-04-30 18:33:25 +02001812 if (kvm->arch.migration_mode)
1813 args->remaining = atomic64_read(&kvm->arch.cmma_dirty_pages);
1814 else
1815 args->remaining = 0;
Claudio Imbrenda4036e382016-08-04 17:58:47 +02001816
Claudio Imbrendaafdad612018-04-30 18:33:25 +02001817 if (copy_to_user((void __user *)args->values, values, args->count))
1818 ret = -EFAULT;
1819
1820 vfree(values);
1821 return ret;
Claudio Imbrenda4036e382016-08-04 17:58:47 +02001822}
1823
1824/*
1825 * This function sets the CMMA attributes for the given pages. If the input
1826 * buffer has zero length, no action is taken, otherwise the attributes are
Janosch Frankc9f0a2b2018-02-16 12:16:14 +01001827 * set and the mm->context.uses_cmm flag is set.
Claudio Imbrenda4036e382016-08-04 17:58:47 +02001828 */
1829static int kvm_s390_set_cmma_bits(struct kvm *kvm,
1830 const struct kvm_s390_cmma_log *args)
1831{
1832 unsigned long hva, mask, pgstev, i;
1833 uint8_t *bits;
1834 int srcu_idx, r = 0;
1835
1836 mask = args->mask;
1837
1838 if (!kvm->arch.use_cmma)
1839 return -ENXIO;
1840 /* invalid/unsupported flags */
1841 if (args->flags != 0)
1842 return -EINVAL;
1843 /* Enforce sane limit on memory allocation */
1844 if (args->count > KVM_S390_CMMA_SIZE_MAX)
1845 return -EINVAL;
1846 /* Nothing to do */
1847 if (args->count == 0)
1848 return 0;
1849
Kees Cook42bc47b2018-06-12 14:27:11 -07001850 bits = vmalloc(array_size(sizeof(*bits), args->count));
Claudio Imbrenda4036e382016-08-04 17:58:47 +02001851 if (!bits)
1852 return -ENOMEM;
1853
1854 r = copy_from_user(bits, (void __user *)args->values, args->count);
1855 if (r) {
1856 r = -EFAULT;
1857 goto out;
1858 }
1859
1860 down_read(&kvm->mm->mmap_sem);
1861 srcu_idx = srcu_read_lock(&kvm->srcu);
1862 for (i = 0; i < args->count; i++) {
1863 hva = gfn_to_hva(kvm, args->start_gfn + i);
1864 if (kvm_is_error_hva(hva)) {
1865 r = -EFAULT;
1866 break;
1867 }
1868
1869 pgstev = bits[i];
1870 pgstev = pgstev << 24;
Claudio Imbrenda1bab1c02016-08-29 15:56:55 +02001871 mask &= _PGSTE_GPS_USAGE_MASK | _PGSTE_GPS_NODAT;
Claudio Imbrenda4036e382016-08-04 17:58:47 +02001872 set_pgste_bits(kvm->mm, hva, mask, pgstev);
1873 }
1874 srcu_read_unlock(&kvm->srcu, srcu_idx);
1875 up_read(&kvm->mm->mmap_sem);
1876
Janosch Frankc9f0a2b2018-02-16 12:16:14 +01001877 if (!kvm->mm->context.uses_cmm) {
Claudio Imbrenda4036e382016-08-04 17:58:47 +02001878 down_write(&kvm->mm->mmap_sem);
Janosch Frankc9f0a2b2018-02-16 12:16:14 +01001879 kvm->mm->context.uses_cmm = 1;
Claudio Imbrenda4036e382016-08-04 17:58:47 +02001880 up_write(&kvm->mm->mmap_sem);
1881 }
1882out:
1883 vfree(bits);
1884 return r;
1885}
1886
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001887long kvm_arch_vm_ioctl(struct file *filp,
1888 unsigned int ioctl, unsigned long arg)
1889{
1890 struct kvm *kvm = filp->private_data;
1891 void __user *argp = (void __user *)arg;
Dominik Dingelf2061652014-04-09 13:13:00 +02001892 struct kvm_device_attr attr;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001893 int r;
1894
1895 switch (ioctl) {
Carsten Otteba5c1e92008-03-25 18:47:26 +01001896 case KVM_S390_INTERRUPT: {
1897 struct kvm_s390_interrupt s390int;
1898
1899 r = -EFAULT;
1900 if (copy_from_user(&s390int, argp, sizeof(s390int)))
1901 break;
1902 r = kvm_s390_inject_vm(kvm, &s390int);
1903 break;
1904 }
Cornelia Huckd938dc52013-10-23 18:26:34 +02001905 case KVM_ENABLE_CAP: {
1906 struct kvm_enable_cap cap;
1907 r = -EFAULT;
1908 if (copy_from_user(&cap, argp, sizeof(cap)))
1909 break;
1910 r = kvm_vm_ioctl_enable_cap(kvm, &cap);
1911 break;
1912 }
Cornelia Huck84223592013-07-15 13:36:01 +02001913 case KVM_CREATE_IRQCHIP: {
1914 struct kvm_irq_routing_entry routing;
1915
1916 r = -EINVAL;
1917 if (kvm->arch.use_irqchip) {
1918 /* Set up dummy routing. */
1919 memset(&routing, 0, sizeof(routing));
Nicholas Krause152b2832015-08-06 13:05:54 -04001920 r = kvm_set_irq_routing(kvm, &routing, 0, 0);
Cornelia Huck84223592013-07-15 13:36:01 +02001921 }
1922 break;
1923 }
Dominik Dingelf2061652014-04-09 13:13:00 +02001924 case KVM_SET_DEVICE_ATTR: {
1925 r = -EFAULT;
1926 if (copy_from_user(&attr, (void __user *)arg, sizeof(attr)))
1927 break;
1928 r = kvm_s390_vm_set_attr(kvm, &attr);
1929 break;
1930 }
1931 case KVM_GET_DEVICE_ATTR: {
1932 r = -EFAULT;
1933 if (copy_from_user(&attr, (void __user *)arg, sizeof(attr)))
1934 break;
1935 r = kvm_s390_vm_get_attr(kvm, &attr);
1936 break;
1937 }
1938 case KVM_HAS_DEVICE_ATTR: {
1939 r = -EFAULT;
1940 if (copy_from_user(&attr, (void __user *)arg, sizeof(attr)))
1941 break;
1942 r = kvm_s390_vm_has_attr(kvm, &attr);
1943 break;
1944 }
Jason J. Herne30ee2a92014-09-23 09:23:01 -04001945 case KVM_S390_GET_SKEYS: {
1946 struct kvm_s390_skeys args;
1947
1948 r = -EFAULT;
1949 if (copy_from_user(&args, argp,
1950 sizeof(struct kvm_s390_skeys)))
1951 break;
1952 r = kvm_s390_get_skeys(kvm, &args);
1953 break;
1954 }
1955 case KVM_S390_SET_SKEYS: {
1956 struct kvm_s390_skeys args;
1957
1958 r = -EFAULT;
1959 if (copy_from_user(&args, argp,
1960 sizeof(struct kvm_s390_skeys)))
1961 break;
1962 r = kvm_s390_set_skeys(kvm, &args);
1963 break;
1964 }
Claudio Imbrenda4036e382016-08-04 17:58:47 +02001965 case KVM_S390_GET_CMMA_BITS: {
1966 struct kvm_s390_cmma_log args;
1967
1968 r = -EFAULT;
1969 if (copy_from_user(&args, argp, sizeof(args)))
1970 break;
Christian Borntraeger1de1ea72017-12-22 10:54:20 +01001971 mutex_lock(&kvm->slots_lock);
Claudio Imbrenda4036e382016-08-04 17:58:47 +02001972 r = kvm_s390_get_cmma_bits(kvm, &args);
Christian Borntraeger1de1ea72017-12-22 10:54:20 +01001973 mutex_unlock(&kvm->slots_lock);
Claudio Imbrenda4036e382016-08-04 17:58:47 +02001974 if (!r) {
1975 r = copy_to_user(argp, &args, sizeof(args));
1976 if (r)
1977 r = -EFAULT;
1978 }
1979 break;
1980 }
1981 case KVM_S390_SET_CMMA_BITS: {
1982 struct kvm_s390_cmma_log args;
1983
1984 r = -EFAULT;
1985 if (copy_from_user(&args, argp, sizeof(args)))
1986 break;
Christian Borntraeger1de1ea72017-12-22 10:54:20 +01001987 mutex_lock(&kvm->slots_lock);
Claudio Imbrenda4036e382016-08-04 17:58:47 +02001988 r = kvm_s390_set_cmma_bits(kvm, &args);
Christian Borntraeger1de1ea72017-12-22 10:54:20 +01001989 mutex_unlock(&kvm->slots_lock);
Claudio Imbrenda4036e382016-08-04 17:58:47 +02001990 break;
1991 }
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001992 default:
Avi Kivity367e1312009-08-26 14:57:07 +03001993 r = -ENOTTY;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01001994 }
1995
1996 return r;
1997}
1998
Tony Krowiak45c9b472015-01-13 11:33:26 -05001999static int kvm_s390_apxa_installed(void)
2000{
Tony Krowiake585b242018-09-25 19:16:18 -04002001 struct ap_config_info info;
Tony Krowiak45c9b472015-01-13 11:33:26 -05002002
Tony Krowiake585b242018-09-25 19:16:18 -04002003 if (ap_instructions_available()) {
2004 if (ap_qci(&info) == 0)
2005 return info.apxa;
Tony Krowiak45c9b472015-01-13 11:33:26 -05002006 }
2007
2008 return 0;
2009}
2010
Tony Krowiake585b242018-09-25 19:16:18 -04002011/*
2012 * The format of the crypto control block (CRYCB) is specified in the 3 low
2013 * order bits of the CRYCB designation (CRYCBD) field as follows:
2014 * Format 0: Neither the message security assist extension 3 (MSAX3) nor the
2015 * AP extended addressing (APXA) facility are installed.
2016 * Format 1: The APXA facility is not installed but the MSAX3 facility is.
2017 * Format 2: Both the APXA and MSAX3 facilities are installed
2018 */
Tony Krowiak45c9b472015-01-13 11:33:26 -05002019static void kvm_s390_set_crycb_format(struct kvm *kvm)
2020{
2021 kvm->arch.crypto.crycbd = (__u32)(unsigned long) kvm->arch.crypto.crycb;
2022
Tony Krowiake585b242018-09-25 19:16:18 -04002023 /* Clear the CRYCB format bits - i.e., set format 0 by default */
2024 kvm->arch.crypto.crycbd &= ~(CRYCB_FORMAT_MASK);
2025
2026 /* Check whether MSAX3 is installed */
2027 if (!test_kvm_facility(kvm, 76))
2028 return;
2029
Tony Krowiak45c9b472015-01-13 11:33:26 -05002030 if (kvm_s390_apxa_installed())
2031 kvm->arch.crypto.crycbd |= CRYCB_FORMAT2;
2032 else
2033 kvm->arch.crypto.crycbd |= CRYCB_FORMAT1;
2034}
2035
Tony Krowiak421045982018-09-25 19:16:25 -04002036void kvm_arch_crypto_clear_masks(struct kvm *kvm)
2037{
2038 mutex_lock(&kvm->lock);
2039 kvm_s390_vcpu_block_all(kvm);
2040
2041 memset(&kvm->arch.crypto.crycb->apcb0, 0,
2042 sizeof(kvm->arch.crypto.crycb->apcb0));
2043 memset(&kvm->arch.crypto.crycb->apcb1, 0,
2044 sizeof(kvm->arch.crypto.crycb->apcb1));
2045
Pierre Morel6cc571b2018-09-25 19:16:30 -04002046 /* recreate the shadow crycb for each vcpu */
2047 kvm_s390_sync_request_broadcast(kvm, KVM_REQ_VSIE_RESTART);
Tony Krowiak421045982018-09-25 19:16:25 -04002048 kvm_s390_vcpu_unblock_all(kvm);
2049 mutex_unlock(&kvm->lock);
2050}
2051EXPORT_SYMBOL_GPL(kvm_arch_crypto_clear_masks);
2052
David Hildenbrand9bb0ec02016-04-04 14:27:51 +02002053static u64 kvm_s390_get_initial_cpuid(void)
Michael Mueller9d8d5782015-02-02 15:42:51 +01002054{
David Hildenbrand9bb0ec02016-04-04 14:27:51 +02002055 struct cpuid cpuid;
2056
2057 get_cpu_id(&cpuid);
2058 cpuid.version = 0xff;
2059 return *((u64 *) &cpuid);
Michael Mueller9d8d5782015-02-02 15:42:51 +01002060}
2061
David Hildenbrandc54f0d62015-12-02 08:53:52 +01002062static void kvm_s390_crypto_init(struct kvm *kvm)
Tony Krowiak5102ee82014-06-27 14:46:01 -04002063{
David Hildenbrandc54f0d62015-12-02 08:53:52 +01002064 kvm->arch.crypto.crycb = &kvm->arch.sie_page2->crycb;
Tony Krowiak45c9b472015-01-13 11:33:26 -05002065 kvm_s390_set_crycb_format(kvm);
Tony Krowiak5102ee82014-06-27 14:46:01 -04002066
Tony Krowiake585b242018-09-25 19:16:18 -04002067 if (!test_kvm_facility(kvm, 76))
2068 return;
2069
Tony Krowiaked6f76b2015-02-24 14:06:57 -05002070 /* Enable AES/DEA protected key functions by default */
2071 kvm->arch.crypto.aes_kw = 1;
2072 kvm->arch.crypto.dea_kw = 1;
2073 get_random_bytes(kvm->arch.crypto.crycb->aes_wrapping_key_mask,
2074 sizeof(kvm->arch.crypto.crycb->aes_wrapping_key_mask));
2075 get_random_bytes(kvm->arch.crypto.crycb->dea_wrapping_key_mask,
2076 sizeof(kvm->arch.crypto.crycb->dea_wrapping_key_mask));
Tony Krowiak5102ee82014-06-27 14:46:01 -04002077}
2078
Eugene (jno) Dvurechenski7d43bafcf2015-04-22 17:09:44 +02002079static void sca_dispose(struct kvm *kvm)
2080{
2081 if (kvm->arch.use_esca)
Eugene (jno) Dvurechenski5e044312015-04-22 18:08:39 +02002082 free_pages_exact(kvm->arch.sca, sizeof(struct esca_block));
Eugene (jno) Dvurechenski7d43bafcf2015-04-22 17:09:44 +02002083 else
2084 free_page((unsigned long)(kvm->arch.sca));
2085 kvm->arch.sca = NULL;
2086}
2087
Carsten Ottee08b9632012-01-04 10:25:20 +01002088int kvm_arch_init_vm(struct kvm *kvm, unsigned long type)
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002089{
David Hildenbrand76a6dd72015-11-24 13:33:49 +01002090 gfp_t alloc_flags = GFP_KERNEL;
Michael Mueller9d8d5782015-02-02 15:42:51 +01002091 int i, rc;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002092 char debug_name[16];
Christian Borntraegerf6c137f2014-03-19 11:18:29 +01002093 static unsigned long sca_offset;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002094
Carsten Ottee08b9632012-01-04 10:25:20 +01002095 rc = -EINVAL;
2096#ifdef CONFIG_KVM_S390_UCONTROL
2097 if (type & ~KVM_VM_S390_UCONTROL)
2098 goto out_err;
2099 if ((type & KVM_VM_S390_UCONTROL) && (!capable(CAP_SYS_ADMIN)))
2100 goto out_err;
2101#else
2102 if (type)
2103 goto out_err;
2104#endif
2105
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002106 rc = s390_enable_sie();
2107 if (rc)
Jan Kiszkad89f5ef2010-11-09 17:02:49 +01002108 goto out_err;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002109
Carsten Otteb2904112011-10-18 12:27:13 +02002110 rc = -ENOMEM;
2111
David Hildenbrand76a6dd72015-11-24 13:33:49 +01002112 if (!sclp.has_64bscao)
2113 alloc_flags |= GFP_DMA;
Eugene (jno) Dvurechenski5e044312015-04-22 18:08:39 +02002114 rwlock_init(&kvm->arch.sca_lock);
David Hildenbrand9ac96d72018-04-27 14:36:12 +02002115 /* start with basic SCA */
David Hildenbrand76a6dd72015-11-24 13:33:49 +01002116 kvm->arch.sca = (struct bsca_block *) get_zeroed_page(alloc_flags);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002117 if (!kvm->arch.sca)
Jan Kiszkad89f5ef2010-11-09 17:02:49 +01002118 goto out_err;
Christian Borntraegerf6c137f2014-03-19 11:18:29 +01002119 spin_lock(&kvm_lock);
David Hildenbrandc5c2c392015-10-26 08:41:29 +01002120 sca_offset += 16;
Eugene (jno) Dvurechenskibc784cc2015-04-23 16:09:06 +02002121 if (sca_offset + sizeof(struct bsca_block) > PAGE_SIZE)
David Hildenbrandc5c2c392015-10-26 08:41:29 +01002122 sca_offset = 0;
Eugene (jno) Dvurechenskibc784cc2015-04-23 16:09:06 +02002123 kvm->arch.sca = (struct bsca_block *)
2124 ((char *) kvm->arch.sca + sca_offset);
Christian Borntraegerf6c137f2014-03-19 11:18:29 +01002125 spin_unlock(&kvm_lock);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002126
2127 sprintf(debug_name, "kvm-%u", current->pid);
2128
Christian Borntraeger1cb9cf72015-07-20 15:04:48 +02002129 kvm->arch.dbf = debug_register(debug_name, 32, 1, 7 * sizeof(long));
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002130 if (!kvm->arch.dbf)
Dominik Dingel40f5b732015-03-12 13:55:53 +01002131 goto out_err;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002132
Michael Mueller19114be2017-05-30 14:26:02 +02002133 BUILD_BUG_ON(sizeof(struct sie_page2) != 4096);
David Hildenbrandc54f0d62015-12-02 08:53:52 +01002134 kvm->arch.sie_page2 =
2135 (struct sie_page2 *) get_zeroed_page(GFP_KERNEL | GFP_DMA);
2136 if (!kvm->arch.sie_page2)
Dominik Dingel40f5b732015-03-12 13:55:53 +01002137 goto out_err;
Michael Mueller9d8d5782015-02-02 15:42:51 +01002138
David Hildenbrandc54f0d62015-12-02 08:53:52 +01002139 kvm->arch.model.fac_list = kvm->arch.sie_page2->fac_list;
Christian Borntraegerc3b9e3e2018-02-09 16:26:29 +00002140
2141 for (i = 0; i < kvm_s390_fac_size(); i++) {
2142 kvm->arch.model.fac_mask[i] = S390_lowcore.stfle_fac_list[i] &
2143 (kvm_s390_fac_base[i] |
2144 kvm_s390_fac_ext[i]);
2145 kvm->arch.model.fac_list[i] = S390_lowcore.stfle_fac_list[i] &
2146 kvm_s390_fac_base[i];
2147 }
Michael Mueller981467c2015-02-24 13:51:04 +01002148
David Hildenbrand19352222017-08-29 16:31:08 +02002149 /* we are always in czam mode - even on pre z14 machines */
2150 set_kvm_facility(kvm->arch.model.fac_mask, 138);
2151 set_kvm_facility(kvm->arch.model.fac_list, 138);
2152 /* we emulate STHYI in kvm */
Janosch Frank95ca2cb2016-05-23 15:11:58 +02002153 set_kvm_facility(kvm->arch.model.fac_mask, 74);
2154 set_kvm_facility(kvm->arch.model.fac_list, 74);
Claudio Imbrenda1bab1c02016-08-29 15:56:55 +02002155 if (MACHINE_HAS_TLB_GUEST) {
2156 set_kvm_facility(kvm->arch.model.fac_mask, 147);
2157 set_kvm_facility(kvm->arch.model.fac_list, 147);
2158 }
Janosch Frank95ca2cb2016-05-23 15:11:58 +02002159
David Hildenbrand9bb0ec02016-04-04 14:27:51 +02002160 kvm->arch.model.cpuid = kvm_s390_get_initial_cpuid();
David Hildenbrand37c5f6c2015-05-06 13:18:59 +02002161 kvm->arch.model.ibc = sclp.ibc & 0x0fff;
Michael Mueller9d8d5782015-02-02 15:42:51 +01002162
David Hildenbrandc54f0d62015-12-02 08:53:52 +01002163 kvm_s390_crypto_init(kvm);
Tony Krowiak5102ee82014-06-27 14:46:01 -04002164
Fei Li51978392017-02-17 17:06:26 +08002165 mutex_init(&kvm->arch.float_int.ais_lock);
Carsten Otteba5c1e92008-03-25 18:47:26 +01002166 spin_lock_init(&kvm->arch.float_int.lock);
Jens Freimann6d3da242013-07-03 15:18:35 +02002167 for (i = 0; i < FIRQ_LIST_COUNT; i++)
2168 INIT_LIST_HEAD(&kvm->arch.float_int.lists[i]);
Heiko Carstens8a2422342014-01-10 14:33:28 +01002169 init_waitqueue_head(&kvm->arch.ipte_wq);
Thomas Hutha6b7e452014-10-01 14:48:42 +02002170 mutex_init(&kvm->arch.ipte_mutex);
Carsten Otteba5c1e92008-03-25 18:47:26 +01002171
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002172 debug_register_view(kvm->arch.dbf, &debug_sprintf_view);
Christian Borntraeger78f26132015-07-22 15:50:58 +02002173 VM_EVENT(kvm, 3, "vm created with type %lu", type);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002174
Carsten Ottee08b9632012-01-04 10:25:20 +01002175 if (type & KVM_VM_S390_UCONTROL) {
2176 kvm->arch.gmap = NULL;
Dominik Dingela3a92c32014-12-01 17:24:42 +01002177 kvm->arch.mem_limit = KVM_S390_NO_MEM_LIMIT;
Carsten Ottee08b9632012-01-04 10:25:20 +01002178 } else {
Guenther Hutzl32e6b232014-12-01 17:24:42 +01002179 if (sclp.hamax == U64_MAX)
Martin Schwidefskyee71d162017-04-20 14:43:51 +02002180 kvm->arch.mem_limit = TASK_SIZE_MAX;
Guenther Hutzl32e6b232014-12-01 17:24:42 +01002181 else
Martin Schwidefskyee71d162017-04-20 14:43:51 +02002182 kvm->arch.mem_limit = min_t(unsigned long, TASK_SIZE_MAX,
Guenther Hutzl32e6b232014-12-01 17:24:42 +01002183 sclp.hamax + 1);
Martin Schwidefsky6ea427b2016-03-08 11:55:04 +01002184 kvm->arch.gmap = gmap_create(current->mm, kvm->arch.mem_limit - 1);
Carsten Ottee08b9632012-01-04 10:25:20 +01002185 if (!kvm->arch.gmap)
Dominik Dingel40f5b732015-03-12 13:55:53 +01002186 goto out_err;
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02002187 kvm->arch.gmap->private = kvm;
Dominik Dingel24eb3a82013-06-17 16:25:18 +02002188 kvm->arch.gmap->pfault_enabled = 0;
Carsten Ottee08b9632012-01-04 10:25:20 +01002189 }
Cornelia Huckfa6b7fe2012-12-20 15:32:12 +01002190
Janosch Frankc9f0a2b2018-02-16 12:16:14 +01002191 kvm->arch.use_pfmfi = sclp.has_pfmfi;
Janosch Frank55531b72018-02-15 16:33:47 +01002192 kvm->arch.use_skf = sclp.has_skey;
David Hildenbrand8ad35752014-03-14 11:00:21 +01002193 spin_lock_init(&kvm->arch.start_stop_lock);
David Hildenbranda3508fb2015-07-08 13:19:48 +02002194 kvm_s390_vsie_init(kvm);
Michael Muellerd7c5cb02017-06-12 14:15:19 +02002195 kvm_s390_gisa_init(kvm);
Christian Borntraeger8335713a2015-12-08 16:55:27 +01002196 KVM_EVENT(3, "vm 0x%pK created by pid %u", kvm, current->pid);
David Hildenbrand8ad35752014-03-14 11:00:21 +01002197
Jan Kiszkad89f5ef2010-11-09 17:02:49 +01002198 return 0;
Jan Kiszkad89f5ef2010-11-09 17:02:49 +01002199out_err:
David Hildenbrandc54f0d62015-12-02 08:53:52 +01002200 free_page((unsigned long)kvm->arch.sie_page2);
Dominik Dingel40f5b732015-03-12 13:55:53 +01002201 debug_unregister(kvm->arch.dbf);
Eugene (jno) Dvurechenski7d43bafcf2015-04-22 17:09:44 +02002202 sca_dispose(kvm);
Christian Borntraeger78f26132015-07-22 15:50:58 +02002203 KVM_EVENT(3, "creation of vm failed: %d", rc);
Jan Kiszkad89f5ef2010-11-09 17:02:49 +01002204 return rc;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002205}
2206
Luiz Capitulino235539b2016-09-07 14:47:23 -04002207bool kvm_arch_has_vcpu_debugfs(void)
2208{
2209 return false;
2210}
2211
2212int kvm_arch_create_vcpu_debugfs(struct kvm_vcpu *vcpu)
2213{
2214 return 0;
2215}
2216
Christian Borntraegerd329c032008-11-26 14:50:27 +01002217void kvm_arch_vcpu_destroy(struct kvm_vcpu *vcpu)
2218{
2219 VCPU_EVENT(vcpu, 3, "%s", "free cpu");
Cornelia Huckade38c32012-07-23 17:20:30 +02002220 trace_kvm_s390_destroy_vcpu(vcpu->vcpu_id);
Christian Borntraeger67335e62014-03-25 17:09:08 +01002221 kvm_s390_clear_local_irqs(vcpu);
Dominik Dingel3c038e62013-10-07 17:11:48 +02002222 kvm_clear_async_pf_completion_queue(vcpu);
Eugene (jno) Dvurechenskibc784cc2015-04-23 16:09:06 +02002223 if (!kvm_is_ucontrol(vcpu->kvm))
Eugene (jno) Dvurechenskia6e2f682015-04-21 15:31:59 +02002224 sca_del_vcpu(vcpu);
Carsten Otte27e03932012-01-04 10:25:21 +01002225
2226 if (kvm_is_ucontrol(vcpu->kvm))
Martin Schwidefsky6ea427b2016-03-08 11:55:04 +01002227 gmap_remove(vcpu->arch.gmap);
Carsten Otte27e03932012-01-04 10:25:21 +01002228
Dominik Dingele6db1d62015-05-07 15:41:57 +02002229 if (vcpu->kvm->arch.use_cmma)
Dominik Dingelb31605c2014-03-25 13:47:11 +01002230 kvm_s390_vcpu_unsetup_cmma(vcpu);
Christian Borntraegerd329c032008-11-26 14:50:27 +01002231 free_page((unsigned long)(vcpu->arch.sie_block));
Konstantin Weitzb31288f2013-04-17 17:36:29 +02002232
Christian Borntraeger6692cef2008-11-26 14:51:08 +01002233 kvm_vcpu_uninit(vcpu);
Michael Muellerb110fea2013-06-12 13:54:54 +02002234 kmem_cache_free(kvm_vcpu_cache, vcpu);
Christian Borntraegerd329c032008-11-26 14:50:27 +01002235}
2236
2237static void kvm_free_vcpus(struct kvm *kvm)
2238{
2239 unsigned int i;
Gleb Natapov988a2ca2009-06-09 15:56:29 +03002240 struct kvm_vcpu *vcpu;
Christian Borntraegerd329c032008-11-26 14:50:27 +01002241
Gleb Natapov988a2ca2009-06-09 15:56:29 +03002242 kvm_for_each_vcpu(i, vcpu, kvm)
2243 kvm_arch_vcpu_destroy(vcpu);
2244
2245 mutex_lock(&kvm->lock);
2246 for (i = 0; i < atomic_read(&kvm->online_vcpus); i++)
2247 kvm->vcpus[i] = NULL;
2248
2249 atomic_set(&kvm->online_vcpus, 0);
2250 mutex_unlock(&kvm->lock);
Christian Borntraegerd329c032008-11-26 14:50:27 +01002251}
2252
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002253void kvm_arch_destroy_vm(struct kvm *kvm)
2254{
Christian Borntraegerd329c032008-11-26 14:50:27 +01002255 kvm_free_vcpus(kvm);
Eugene (jno) Dvurechenski7d43bafcf2015-04-22 17:09:44 +02002256 sca_dispose(kvm);
Christian Borntraegerd329c032008-11-26 14:50:27 +01002257 debug_unregister(kvm->arch.dbf);
Michael Muellerd7c5cb02017-06-12 14:15:19 +02002258 kvm_s390_gisa_destroy(kvm);
David Hildenbrandc54f0d62015-12-02 08:53:52 +01002259 free_page((unsigned long)kvm->arch.sie_page2);
Carsten Otte27e03932012-01-04 10:25:21 +01002260 if (!kvm_is_ucontrol(kvm))
Martin Schwidefsky6ea427b2016-03-08 11:55:04 +01002261 gmap_remove(kvm->arch.gmap);
Cornelia Huck841b91c2013-07-15 13:36:01 +02002262 kvm_s390_destroy_adapters(kvm);
Christian Borntraeger67335e62014-03-25 17:09:08 +01002263 kvm_s390_clear_float_irqs(kvm);
David Hildenbranda3508fb2015-07-08 13:19:48 +02002264 kvm_s390_vsie_destroy(kvm);
Christian Borntraeger8335713a2015-12-08 16:55:27 +01002265 KVM_EVENT(3, "vm 0x%pK destroyed", kvm);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002266}
2267
2268/* Section: vcpu related */
Dominik Dingeldafd0322014-12-02 16:53:21 +01002269static int __kvm_ucontrol_vcpu_init(struct kvm_vcpu *vcpu)
2270{
Martin Schwidefsky6ea427b2016-03-08 11:55:04 +01002271 vcpu->arch.gmap = gmap_create(current->mm, -1UL);
Dominik Dingeldafd0322014-12-02 16:53:21 +01002272 if (!vcpu->arch.gmap)
2273 return -ENOMEM;
2274 vcpu->arch.gmap->private = vcpu->kvm;
2275
2276 return 0;
2277}
2278
Eugene (jno) Dvurechenskia6e2f682015-04-21 15:31:59 +02002279static void sca_del_vcpu(struct kvm_vcpu *vcpu)
2280{
David Hildenbranda6940672016-08-08 22:39:32 +02002281 if (!kvm_s390_use_sca_entries())
2282 return;
Eugene (jno) Dvurechenski5e044312015-04-22 18:08:39 +02002283 read_lock(&vcpu->kvm->arch.sca_lock);
Eugene (jno) Dvurechenski7d43bafcf2015-04-22 17:09:44 +02002284 if (vcpu->kvm->arch.use_esca) {
2285 struct esca_block *sca = vcpu->kvm->arch.sca;
Eugene (jno) Dvurechenskia6e2f682015-04-21 15:31:59 +02002286
Eugene (jno) Dvurechenski7d43bafcf2015-04-22 17:09:44 +02002287 clear_bit_inv(vcpu->vcpu_id, (unsigned long *) sca->mcn);
David Hildenbrand10ce32d2015-10-12 12:41:41 +02002288 sca->cpu[vcpu->vcpu_id].sda = 0;
Eugene (jno) Dvurechenski7d43bafcf2015-04-22 17:09:44 +02002289 } else {
2290 struct bsca_block *sca = vcpu->kvm->arch.sca;
2291
2292 clear_bit_inv(vcpu->vcpu_id, (unsigned long *) &sca->mcn);
David Hildenbrand10ce32d2015-10-12 12:41:41 +02002293 sca->cpu[vcpu->vcpu_id].sda = 0;
Eugene (jno) Dvurechenski7d43bafcf2015-04-22 17:09:44 +02002294 }
Eugene (jno) Dvurechenski5e044312015-04-22 18:08:39 +02002295 read_unlock(&vcpu->kvm->arch.sca_lock);
Eugene (jno) Dvurechenskia6e2f682015-04-21 15:31:59 +02002296}
2297
David Hildenbrandeaa78f32015-10-12 16:29:01 +02002298static void sca_add_vcpu(struct kvm_vcpu *vcpu)
Eugene (jno) Dvurechenskia6e2f682015-04-21 15:31:59 +02002299{
David Hildenbranda6940672016-08-08 22:39:32 +02002300 if (!kvm_s390_use_sca_entries()) {
2301 struct bsca_block *sca = vcpu->kvm->arch.sca;
2302
2303 /* we still need the basic sca for the ipte control */
2304 vcpu->arch.sie_block->scaoh = (__u32)(((__u64)sca) >> 32);
2305 vcpu->arch.sie_block->scaol = (__u32)(__u64)sca;
David Hildenbrandf07afa02018-03-06 14:27:58 +01002306 return;
David Hildenbranda6940672016-08-08 22:39:32 +02002307 }
David Hildenbrandeaa78f32015-10-12 16:29:01 +02002308 read_lock(&vcpu->kvm->arch.sca_lock);
2309 if (vcpu->kvm->arch.use_esca) {
2310 struct esca_block *sca = vcpu->kvm->arch.sca;
Eugene (jno) Dvurechenskia6e2f682015-04-21 15:31:59 +02002311
David Hildenbrandeaa78f32015-10-12 16:29:01 +02002312 sca->cpu[vcpu->vcpu_id].sda = (__u64) vcpu->arch.sie_block;
Eugene (jno) Dvurechenski7d43bafcf2015-04-22 17:09:44 +02002313 vcpu->arch.sie_block->scaoh = (__u32)(((__u64)sca) >> 32);
2314 vcpu->arch.sie_block->scaol = (__u32)(__u64)sca & ~0x3fU;
David Hildenbrand0c9d8682017-03-13 11:48:28 +01002315 vcpu->arch.sie_block->ecb2 |= ECB2_ESCA;
David Hildenbrandeaa78f32015-10-12 16:29:01 +02002316 set_bit_inv(vcpu->vcpu_id, (unsigned long *) sca->mcn);
Eugene (jno) Dvurechenski7d43bafcf2015-04-22 17:09:44 +02002317 } else {
David Hildenbrandeaa78f32015-10-12 16:29:01 +02002318 struct bsca_block *sca = vcpu->kvm->arch.sca;
Eugene (jno) Dvurechenski7d43bafcf2015-04-22 17:09:44 +02002319
David Hildenbrandeaa78f32015-10-12 16:29:01 +02002320 sca->cpu[vcpu->vcpu_id].sda = (__u64) vcpu->arch.sie_block;
Eugene (jno) Dvurechenski7d43bafcf2015-04-22 17:09:44 +02002321 vcpu->arch.sie_block->scaoh = (__u32)(((__u64)sca) >> 32);
2322 vcpu->arch.sie_block->scaol = (__u32)(__u64)sca;
David Hildenbrandeaa78f32015-10-12 16:29:01 +02002323 set_bit_inv(vcpu->vcpu_id, (unsigned long *) &sca->mcn);
Eugene (jno) Dvurechenski7d43bafcf2015-04-22 17:09:44 +02002324 }
David Hildenbrandeaa78f32015-10-12 16:29:01 +02002325 read_unlock(&vcpu->kvm->arch.sca_lock);
Eugene (jno) Dvurechenski5e044312015-04-22 18:08:39 +02002326}
2327
2328/* Basic SCA to Extended SCA data copy routines */
2329static inline void sca_copy_entry(struct esca_entry *d, struct bsca_entry *s)
2330{
2331 d->sda = s->sda;
2332 d->sigp_ctrl.c = s->sigp_ctrl.c;
2333 d->sigp_ctrl.scn = s->sigp_ctrl.scn;
2334}
2335
2336static void sca_copy_b_to_e(struct esca_block *d, struct bsca_block *s)
2337{
2338 int i;
2339
2340 d->ipte_control = s->ipte_control;
2341 d->mcn[0] = s->mcn;
2342 for (i = 0; i < KVM_S390_BSCA_CPU_SLOTS; i++)
2343 sca_copy_entry(&d->cpu[i], &s->cpu[i]);
2344}
2345
2346static int sca_switch_to_extended(struct kvm *kvm)
2347{
2348 struct bsca_block *old_sca = kvm->arch.sca;
2349 struct esca_block *new_sca;
2350 struct kvm_vcpu *vcpu;
2351 unsigned int vcpu_idx;
2352 u32 scaol, scaoh;
2353
2354 new_sca = alloc_pages_exact(sizeof(*new_sca), GFP_KERNEL|__GFP_ZERO);
2355 if (!new_sca)
2356 return -ENOMEM;
2357
2358 scaoh = (u32)((u64)(new_sca) >> 32);
2359 scaol = (u32)(u64)(new_sca) & ~0x3fU;
2360
2361 kvm_s390_vcpu_block_all(kvm);
2362 write_lock(&kvm->arch.sca_lock);
2363
2364 sca_copy_b_to_e(new_sca, old_sca);
2365
2366 kvm_for_each_vcpu(vcpu_idx, vcpu, kvm) {
2367 vcpu->arch.sie_block->scaoh = scaoh;
2368 vcpu->arch.sie_block->scaol = scaol;
David Hildenbrand0c9d8682017-03-13 11:48:28 +01002369 vcpu->arch.sie_block->ecb2 |= ECB2_ESCA;
Eugene (jno) Dvurechenski5e044312015-04-22 18:08:39 +02002370 }
2371 kvm->arch.sca = new_sca;
2372 kvm->arch.use_esca = 1;
2373
2374 write_unlock(&kvm->arch.sca_lock);
2375 kvm_s390_vcpu_unblock_all(kvm);
2376
2377 free_page((unsigned long)old_sca);
2378
Christian Borntraeger8335713a2015-12-08 16:55:27 +01002379 VM_EVENT(kvm, 2, "Switched to ESCA (0x%pK -> 0x%pK)",
2380 old_sca, kvm->arch.sca);
Eugene (jno) Dvurechenski5e044312015-04-22 18:08:39 +02002381 return 0;
Eugene (jno) Dvurechenskia6e2f682015-04-21 15:31:59 +02002382}
2383
2384static int sca_can_add_vcpu(struct kvm *kvm, unsigned int id)
2385{
Eugene (jno) Dvurechenski5e044312015-04-22 18:08:39 +02002386 int rc;
2387
David Hildenbranda6940672016-08-08 22:39:32 +02002388 if (!kvm_s390_use_sca_entries()) {
2389 if (id < KVM_MAX_VCPUS)
2390 return true;
2391 return false;
2392 }
Eugene (jno) Dvurechenski5e044312015-04-22 18:08:39 +02002393 if (id < KVM_S390_BSCA_CPU_SLOTS)
2394 return true;
David Hildenbrand76a6dd72015-11-24 13:33:49 +01002395 if (!sclp.has_esca || !sclp.has_64bscao)
Eugene (jno) Dvurechenski5e044312015-04-22 18:08:39 +02002396 return false;
2397
2398 mutex_lock(&kvm->lock);
2399 rc = kvm->arch.use_esca ? 0 : sca_switch_to_extended(kvm);
2400 mutex_unlock(&kvm->lock);
2401
2402 return rc == 0 && id < KVM_S390_ESCA_CPU_SLOTS;
Eugene (jno) Dvurechenskia6e2f682015-04-21 15:31:59 +02002403}
2404
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002405int kvm_arch_vcpu_init(struct kvm_vcpu *vcpu)
2406{
Dominik Dingel3c038e62013-10-07 17:11:48 +02002407 vcpu->arch.pfault_token = KVM_S390_PFAULT_TOKEN_INVALID;
2408 kvm_clear_async_pf_completion_queue(vcpu);
Christian Borntraeger59674c12012-01-11 11:20:33 +01002409 vcpu->run->kvm_valid_regs = KVM_SYNC_PREFIX |
2410 KVM_SYNC_GPRS |
Christian Borntraeger9eed07352012-02-06 10:59:07 +01002411 KVM_SYNC_ACRS |
David Hildenbrandb028ee32014-07-17 10:47:43 +02002412 KVM_SYNC_CRS |
2413 KVM_SYNC_ARCH0 |
2414 KVM_SYNC_PFAULT;
Julius Niedworok75a46152016-08-03 16:39:54 +02002415 kvm_s390_set_prefix(vcpu, 0);
Fan Zhangc6e5f162016-01-07 18:24:29 +08002416 if (test_kvm_facility(vcpu->kvm, 64))
2417 vcpu->run->kvm_valid_regs |= KVM_SYNC_RICCB;
Christian Borntraeger35b3fde2018-01-17 14:44:34 +01002418 if (test_kvm_facility(vcpu->kvm, 82))
2419 vcpu->run->kvm_valid_regs |= KVM_SYNC_BPBC;
Fan Zhang4e0b1ab2016-11-29 07:17:55 +01002420 if (test_kvm_facility(vcpu->kvm, 133))
2421 vcpu->run->kvm_valid_regs |= KVM_SYNC_GSCB;
Christian Borntraegera3da7b42018-03-08 16:08:49 +00002422 if (test_kvm_facility(vcpu->kvm, 156))
2423 vcpu->run->kvm_valid_regs |= KVM_SYNC_ETOKEN;
David Hildenbrandf6aa6dc2016-01-15 14:11:46 +01002424 /* fprs can be synchronized via vrs, even if the guest has no vx. With
2425 * MACHINE_HAS_VX, (load|store)_fpu_regs() will work with vrs format.
2426 */
2427 if (MACHINE_HAS_VX)
Eric Farman68c55752014-06-09 10:57:26 -04002428 vcpu->run->kvm_valid_regs |= KVM_SYNC_VRS;
David Hildenbrand6fd8e672016-01-18 14:46:34 +01002429 else
2430 vcpu->run->kvm_valid_regs |= KVM_SYNC_FPRS;
Dominik Dingeldafd0322014-12-02 16:53:21 +01002431
2432 if (kvm_is_ucontrol(vcpu->kvm))
2433 return __kvm_ucontrol_vcpu_init(vcpu);
2434
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002435 return 0;
2436}
2437
David Hildenbranddb0758b2016-02-15 09:42:25 +01002438/* needs disabled preemption to protect from TOD sync and vcpu_load/put */
2439static void __start_cpu_timer_accounting(struct kvm_vcpu *vcpu)
2440{
2441 WARN_ON_ONCE(vcpu->arch.cputm_start != 0);
David Hildenbrand9c23a132016-02-17 21:53:33 +01002442 raw_write_seqcount_begin(&vcpu->arch.cputm_seqcount);
David Hildenbranddb0758b2016-02-15 09:42:25 +01002443 vcpu->arch.cputm_start = get_tod_clock_fast();
David Hildenbrand9c23a132016-02-17 21:53:33 +01002444 raw_write_seqcount_end(&vcpu->arch.cputm_seqcount);
David Hildenbranddb0758b2016-02-15 09:42:25 +01002445}
2446
2447/* needs disabled preemption to protect from TOD sync and vcpu_load/put */
2448static void __stop_cpu_timer_accounting(struct kvm_vcpu *vcpu)
2449{
2450 WARN_ON_ONCE(vcpu->arch.cputm_start == 0);
David Hildenbrand9c23a132016-02-17 21:53:33 +01002451 raw_write_seqcount_begin(&vcpu->arch.cputm_seqcount);
David Hildenbranddb0758b2016-02-15 09:42:25 +01002452 vcpu->arch.sie_block->cputm -= get_tod_clock_fast() - vcpu->arch.cputm_start;
2453 vcpu->arch.cputm_start = 0;
David Hildenbrand9c23a132016-02-17 21:53:33 +01002454 raw_write_seqcount_end(&vcpu->arch.cputm_seqcount);
David Hildenbranddb0758b2016-02-15 09:42:25 +01002455}
2456
2457/* needs disabled preemption to protect from TOD sync and vcpu_load/put */
2458static void __enable_cpu_timer_accounting(struct kvm_vcpu *vcpu)
2459{
2460 WARN_ON_ONCE(vcpu->arch.cputm_enabled);
2461 vcpu->arch.cputm_enabled = true;
2462 __start_cpu_timer_accounting(vcpu);
2463}
2464
2465/* needs disabled preemption to protect from TOD sync and vcpu_load/put */
2466static void __disable_cpu_timer_accounting(struct kvm_vcpu *vcpu)
2467{
2468 WARN_ON_ONCE(!vcpu->arch.cputm_enabled);
2469 __stop_cpu_timer_accounting(vcpu);
2470 vcpu->arch.cputm_enabled = false;
2471}
2472
2473static void enable_cpu_timer_accounting(struct kvm_vcpu *vcpu)
2474{
2475 preempt_disable(); /* protect from TOD sync and vcpu_load/put */
2476 __enable_cpu_timer_accounting(vcpu);
2477 preempt_enable();
2478}
2479
2480static void disable_cpu_timer_accounting(struct kvm_vcpu *vcpu)
2481{
2482 preempt_disable(); /* protect from TOD sync and vcpu_load/put */
2483 __disable_cpu_timer_accounting(vcpu);
2484 preempt_enable();
2485}
2486
David Hildenbrand4287f242016-02-15 09:40:12 +01002487/* set the cpu timer - may only be called from the VCPU thread itself */
2488void kvm_s390_set_cpu_timer(struct kvm_vcpu *vcpu, __u64 cputm)
2489{
David Hildenbranddb0758b2016-02-15 09:42:25 +01002490 preempt_disable(); /* protect from TOD sync and vcpu_load/put */
David Hildenbrand9c23a132016-02-17 21:53:33 +01002491 raw_write_seqcount_begin(&vcpu->arch.cputm_seqcount);
David Hildenbranddb0758b2016-02-15 09:42:25 +01002492 if (vcpu->arch.cputm_enabled)
2493 vcpu->arch.cputm_start = get_tod_clock_fast();
David Hildenbrand4287f242016-02-15 09:40:12 +01002494 vcpu->arch.sie_block->cputm = cputm;
David Hildenbrand9c23a132016-02-17 21:53:33 +01002495 raw_write_seqcount_end(&vcpu->arch.cputm_seqcount);
David Hildenbranddb0758b2016-02-15 09:42:25 +01002496 preempt_enable();
David Hildenbrand4287f242016-02-15 09:40:12 +01002497}
2498
David Hildenbranddb0758b2016-02-15 09:42:25 +01002499/* update and get the cpu timer - can also be called from other VCPU threads */
David Hildenbrand4287f242016-02-15 09:40:12 +01002500__u64 kvm_s390_get_cpu_timer(struct kvm_vcpu *vcpu)
2501{
David Hildenbrand9c23a132016-02-17 21:53:33 +01002502 unsigned int seq;
David Hildenbranddb0758b2016-02-15 09:42:25 +01002503 __u64 value;
David Hildenbranddb0758b2016-02-15 09:42:25 +01002504
2505 if (unlikely(!vcpu->arch.cputm_enabled))
2506 return vcpu->arch.sie_block->cputm;
2507
David Hildenbrand9c23a132016-02-17 21:53:33 +01002508 preempt_disable(); /* protect from TOD sync and vcpu_load/put */
2509 do {
2510 seq = raw_read_seqcount(&vcpu->arch.cputm_seqcount);
2511 /*
2512 * If the writer would ever execute a read in the critical
2513 * section, e.g. in irq context, we have a deadlock.
2514 */
2515 WARN_ON_ONCE((seq & 1) && smp_processor_id() == vcpu->cpu);
2516 value = vcpu->arch.sie_block->cputm;
2517 /* if cputm_start is 0, accounting is being started/stopped */
2518 if (likely(vcpu->arch.cputm_start))
2519 value -= get_tod_clock_fast() - vcpu->arch.cputm_start;
2520 } while (read_seqcount_retry(&vcpu->arch.cputm_seqcount, seq & ~1));
2521 preempt_enable();
David Hildenbranddb0758b2016-02-15 09:42:25 +01002522 return value;
David Hildenbrand4287f242016-02-15 09:40:12 +01002523}
2524
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002525void kvm_arch_vcpu_load(struct kvm_vcpu *vcpu, int cpu)
2526{
Hendrik Brueckner9977e882015-06-10 12:53:42 +02002527
David Hildenbrand37d9df92015-03-11 16:47:33 +01002528 gmap_enable(vcpu->arch.enabled_gmap);
David Hildenbrandef8f4f42018-01-23 18:05:29 +01002529 kvm_s390_set_cpuflags(vcpu, CPUSTAT_RUNNING);
David Hildenbrand5ebda312016-02-22 13:52:27 +01002530 if (vcpu->arch.cputm_enabled && !is_vcpu_idle(vcpu))
David Hildenbranddb0758b2016-02-15 09:42:25 +01002531 __start_cpu_timer_accounting(vcpu);
David Hildenbrand01a745a2016-02-12 20:41:56 +01002532 vcpu->cpu = cpu;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002533}
2534
2535void kvm_arch_vcpu_put(struct kvm_vcpu *vcpu)
2536{
David Hildenbrand01a745a2016-02-12 20:41:56 +01002537 vcpu->cpu = -1;
David Hildenbrand5ebda312016-02-22 13:52:27 +01002538 if (vcpu->arch.cputm_enabled && !is_vcpu_idle(vcpu))
David Hildenbranddb0758b2016-02-15 09:42:25 +01002539 __stop_cpu_timer_accounting(vcpu);
David Hildenbrand9daecfc2018-01-23 18:05:30 +01002540 kvm_s390_clear_cpuflags(vcpu, CPUSTAT_RUNNING);
David Hildenbrand37d9df92015-03-11 16:47:33 +01002541 vcpu->arch.enabled_gmap = gmap_get_enabled();
2542 gmap_disable(vcpu->arch.enabled_gmap);
Hendrik Brueckner9977e882015-06-10 12:53:42 +02002543
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002544}
2545
2546static void kvm_s390_vcpu_initial_reset(struct kvm_vcpu *vcpu)
2547{
2548 /* this equals initial cpu reset in pop, but we don't switch to ESA */
2549 vcpu->arch.sie_block->gpsw.mask = 0UL;
2550 vcpu->arch.sie_block->gpsw.addr = 0UL;
Christian Borntraeger8d26cf72012-01-11 11:19:32 +01002551 kvm_s390_set_prefix(vcpu, 0);
David Hildenbrand4287f242016-02-15 09:40:12 +01002552 kvm_s390_set_cpu_timer(vcpu, 0);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002553 vcpu->arch.sie_block->ckc = 0UL;
2554 vcpu->arch.sie_block->todpr = 0;
2555 memset(vcpu->arch.sie_block->gcr, 0, 16 * sizeof(__u64));
David Hildenbrandb9224cd2018-04-30 17:55:24 +02002556 vcpu->arch.sie_block->gcr[0] = CR0_UNUSED_56 |
2557 CR0_INTERRUPT_KEY_SUBMASK |
2558 CR0_MEASUREMENT_ALERT_SUBMASK;
2559 vcpu->arch.sie_block->gcr[14] = CR14_UNUSED_32 |
2560 CR14_UNUSED_33 |
2561 CR14_EXTERNAL_DAMAGE_SUBMASK;
David Hildenbrand9abc2a02016-01-14 22:12:47 +01002562 /* make sure the new fpc will be lazily loaded */
2563 save_fpu_regs();
2564 current->thread.fpu.fpc = 0;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002565 vcpu->arch.sie_block->gbea = 1;
Christian Borntraeger672550f2014-02-10 15:32:19 +01002566 vcpu->arch.sie_block->pp = 0;
Christian Borntraeger35b3fde2018-01-17 14:44:34 +01002567 vcpu->arch.sie_block->fpf &= ~FPF_BPBC;
Dominik Dingel3c038e62013-10-07 17:11:48 +02002568 vcpu->arch.pfault_token = KVM_S390_PFAULT_TOKEN_INVALID;
2569 kvm_clear_async_pf_completion_queue(vcpu);
David Hildenbrand6352e4d2014-04-10 17:35:00 +02002570 if (!kvm_s390_user_cpu_state_ctrl(vcpu->kvm))
2571 kvm_s390_vcpu_stop(vcpu);
Jens Freimann2ed10cc2014-02-11 13:48:07 +01002572 kvm_s390_clear_local_irqs(vcpu);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002573}
2574
Dominik Dingel31928aa2014-12-04 15:47:07 +01002575void kvm_arch_vcpu_postcreate(struct kvm_vcpu *vcpu)
Marcelo Tosatti42897d82012-11-27 23:29:02 -02002576{
Jason J. Herne72f25022014-11-25 09:46:02 -05002577 mutex_lock(&vcpu->kvm->lock);
Fan Zhangfdf03652015-05-13 10:58:41 +02002578 preempt_disable();
Jason J. Herne72f25022014-11-25 09:46:02 -05002579 vcpu->arch.sie_block->epoch = vcpu->kvm->arch.epoch;
David Hildenbrandd16b52c2018-02-07 12:46:44 +01002580 vcpu->arch.sie_block->epdx = vcpu->kvm->arch.epdx;
Fan Zhangfdf03652015-05-13 10:58:41 +02002581 preempt_enable();
Jason J. Herne72f25022014-11-25 09:46:02 -05002582 mutex_unlock(&vcpu->kvm->lock);
David Hildenbrand25508822015-10-12 16:27:23 +02002583 if (!kvm_is_ucontrol(vcpu->kvm)) {
Dominik Dingeldafd0322014-12-02 16:53:21 +01002584 vcpu->arch.gmap = vcpu->kvm->arch.gmap;
David Hildenbrandeaa78f32015-10-12 16:29:01 +02002585 sca_add_vcpu(vcpu);
David Hildenbrand25508822015-10-12 16:27:23 +02002586 }
David Hildenbrand6502a342016-06-21 14:19:51 +02002587 if (test_kvm_facility(vcpu->kvm, 74) || vcpu->kvm->arch.user_instr0)
2588 vcpu->arch.sie_block->ictl |= ICTL_OPEREXC;
David Hildenbrand37d9df92015-03-11 16:47:33 +01002589 /* make vcpu_load load the right gmap on the first trigger */
2590 vcpu->arch.enabled_gmap = vcpu->arch.gmap;
Marcelo Tosatti42897d82012-11-27 23:29:02 -02002591}
2592
Tony Krowiak5102ee82014-06-27 14:46:01 -04002593static void kvm_s390_vcpu_crypto_setup(struct kvm_vcpu *vcpu)
2594{
Tony Krowiake585b242018-09-25 19:16:18 -04002595 /*
2596 * If the AP instructions are not being interpreted and the MSAX3
2597 * facility is not configured for the guest, there is nothing to set up.
2598 */
2599 if (!vcpu->kvm->arch.crypto.apie && !test_kvm_facility(vcpu->kvm, 76))
Tony Krowiak5102ee82014-06-27 14:46:01 -04002600 return;
2601
Tony Krowiake585b242018-09-25 19:16:18 -04002602 vcpu->arch.sie_block->crycbd = vcpu->kvm->arch.crypto.crycbd;
Tony Krowiaka374e892014-09-03 10:13:53 +02002603 vcpu->arch.sie_block->ecb3 &= ~(ECB3_AES | ECB3_DEA);
2604
Tony Krowiake585b242018-09-25 19:16:18 -04002605 if (vcpu->kvm->arch.crypto.apie)
2606 vcpu->arch.sie_block->eca |= ECA_APIE;
2607
2608 /* Set up protected key support */
Tony Krowiaka374e892014-09-03 10:13:53 +02002609 if (vcpu->kvm->arch.crypto.aes_kw)
2610 vcpu->arch.sie_block->ecb3 |= ECB3_AES;
2611 if (vcpu->kvm->arch.crypto.dea_kw)
2612 vcpu->arch.sie_block->ecb3 |= ECB3_DEA;
Tony Krowiak5102ee82014-06-27 14:46:01 -04002613}
2614
Dominik Dingelb31605c2014-03-25 13:47:11 +01002615void kvm_s390_vcpu_unsetup_cmma(struct kvm_vcpu *vcpu)
2616{
2617 free_page(vcpu->arch.sie_block->cbrlo);
2618 vcpu->arch.sie_block->cbrlo = 0;
2619}
2620
2621int kvm_s390_vcpu_setup_cmma(struct kvm_vcpu *vcpu)
2622{
2623 vcpu->arch.sie_block->cbrlo = get_zeroed_page(GFP_KERNEL);
2624 if (!vcpu->arch.sie_block->cbrlo)
2625 return -ENOMEM;
Dominik Dingelb31605c2014-03-25 13:47:11 +01002626 return 0;
2627}
2628
Michael Mueller91520f12015-02-27 14:32:11 +01002629static void kvm_s390_vcpu_setup_model(struct kvm_vcpu *vcpu)
2630{
2631 struct kvm_s390_cpu_model *model = &vcpu->kvm->arch.model;
2632
Michael Mueller91520f12015-02-27 14:32:11 +01002633 vcpu->arch.sie_block->ibc = model->ibc;
David Hildenbrand80bc79d2015-12-02 09:43:29 +01002634 if (test_kvm_facility(vcpu->kvm, 7))
David Hildenbrandc54f0d62015-12-02 08:53:52 +01002635 vcpu->arch.sie_block->fac = (u32)(u64) model->fac_list;
Michael Mueller91520f12015-02-27 14:32:11 +01002636}
2637
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002638int kvm_arch_vcpu_setup(struct kvm_vcpu *vcpu)
2639{
Dominik Dingelb31605c2014-03-25 13:47:11 +01002640 int rc = 0;
Konstantin Weitzb31288f2013-04-17 17:36:29 +02002641
Cornelia Huck9e6dabe2011-11-17 11:00:41 +01002642 atomic_set(&vcpu->arch.sie_block->cpuflags, CPUSTAT_ZARCH |
2643 CPUSTAT_SM |
Guenther Hutzla4a4f192015-03-31 14:39:49 +02002644 CPUSTAT_STOPPED);
2645
Guenther Hutzl53df84f2015-02-18 11:13:03 +01002646 if (test_kvm_facility(vcpu->kvm, 78))
David Hildenbrandef8f4f42018-01-23 18:05:29 +01002647 kvm_s390_set_cpuflags(vcpu, CPUSTAT_GED2);
Guenther Hutzl53df84f2015-02-18 11:13:03 +01002648 else if (test_kvm_facility(vcpu->kvm, 8))
David Hildenbrandef8f4f42018-01-23 18:05:29 +01002649 kvm_s390_set_cpuflags(vcpu, CPUSTAT_GED);
Guenther Hutzla4a4f192015-03-31 14:39:49 +02002650
Michael Mueller91520f12015-02-27 14:32:11 +01002651 kvm_s390_vcpu_setup_model(vcpu);
2652
David Hildenbrandbdab09f2016-04-12 11:07:49 +02002653 /* pgste_set_pte has special handling for !MACHINE_HAS_ESOP */
2654 if (MACHINE_HAS_ESOP)
David Hildenbrand0c9d8682017-03-13 11:48:28 +01002655 vcpu->arch.sie_block->ecb |= ECB_HOSTPROTINT;
David Hildenbrandbd50e8e2016-03-04 12:23:55 +01002656 if (test_kvm_facility(vcpu->kvm, 9))
David Hildenbrand0c9d8682017-03-13 11:48:28 +01002657 vcpu->arch.sie_block->ecb |= ECB_SRSI;
David Hildenbrandf597d242016-04-22 16:26:49 +02002658 if (test_kvm_facility(vcpu->kvm, 73))
David Hildenbrand0c9d8682017-03-13 11:48:28 +01002659 vcpu->arch.sie_block->ecb |= ECB_TE;
Michael Mueller7feb6bb2013-06-28 13:30:24 +02002660
Janosch Frankc9f0a2b2018-02-16 12:16:14 +01002661 if (test_kvm_facility(vcpu->kvm, 8) && vcpu->kvm->arch.use_pfmfi)
David Hildenbrand0c9d8682017-03-13 11:48:28 +01002662 vcpu->arch.sie_block->ecb2 |= ECB2_PFMFI;
Janosch Frankcd1836f2016-08-04 09:57:36 +02002663 if (test_kvm_facility(vcpu->kvm, 130))
David Hildenbrand0c9d8682017-03-13 11:48:28 +01002664 vcpu->arch.sie_block->ecb2 |= ECB2_IEP;
2665 vcpu->arch.sie_block->eca = ECA_MVPGI | ECA_PROTEXCI;
David Hildenbrand48ee7d32016-04-04 15:49:34 +02002666 if (sclp.has_cei)
David Hildenbrand0c9d8682017-03-13 11:48:28 +01002667 vcpu->arch.sie_block->eca |= ECA_CEI;
David Hildenbrand11ad65b2016-04-04 15:46:26 +02002668 if (sclp.has_ib)
David Hildenbrand0c9d8682017-03-13 11:48:28 +01002669 vcpu->arch.sie_block->eca |= ECA_IB;
David Hildenbrand37c5f6c2015-05-06 13:18:59 +02002670 if (sclp.has_siif)
David Hildenbrand0c9d8682017-03-13 11:48:28 +01002671 vcpu->arch.sie_block->eca |= ECA_SII;
David Hildenbrand37c5f6c2015-05-06 13:18:59 +02002672 if (sclp.has_sigpif)
David Hildenbrand0c9d8682017-03-13 11:48:28 +01002673 vcpu->arch.sie_block->eca |= ECA_SIGPI;
Michael Mueller18280d82015-03-16 16:05:41 +01002674 if (test_kvm_facility(vcpu->kvm, 129)) {
David Hildenbrand0c9d8682017-03-13 11:48:28 +01002675 vcpu->arch.sie_block->eca |= ECA_VX;
2676 vcpu->arch.sie_block->ecd |= ECD_HOSTREGMGMT;
Eric Farman13211ea2014-04-30 13:39:46 -04002677 }
Collin L. Walling8fa16962016-07-26 15:29:44 -04002678 if (test_kvm_facility(vcpu->kvm, 139))
2679 vcpu->arch.sie_block->ecd |= ECD_MEF;
Christian Borntraegera3da7b42018-03-08 16:08:49 +00002680 if (test_kvm_facility(vcpu->kvm, 156))
2681 vcpu->arch.sie_block->ecd |= ECD_ETOKENF;
Michael Muellerd7c5cb02017-06-12 14:15:19 +02002682 if (vcpu->arch.sie_block->gd) {
2683 vcpu->arch.sie_block->eca |= ECA_AIV;
2684 VCPU_EVENT(vcpu, 3, "AIV gisa format-%u enabled for cpu %03u",
2685 vcpu->arch.sie_block->gd & 0x3, vcpu->vcpu_id);
2686 }
Fan Zhang4e0b1ab2016-11-29 07:17:55 +01002687 vcpu->arch.sie_block->sdnxo = ((unsigned long) &vcpu->run->s.regs.sdnx)
2688 | SDNXC;
Fan Zhangc6e5f162016-01-07 18:24:29 +08002689 vcpu->arch.sie_block->riccbd = (unsigned long) &vcpu->run->s.regs.riccb;
Farhan Ali730cd632017-02-24 16:12:56 -05002690
2691 if (sclp.has_kss)
David Hildenbrandef8f4f42018-01-23 18:05:29 +01002692 kvm_s390_set_cpuflags(vcpu, CPUSTAT_KSS);
Farhan Ali730cd632017-02-24 16:12:56 -05002693 else
2694 vcpu->arch.sie_block->ictl |= ICTL_ISKE | ICTL_SSKE | ICTL_RRBE;
Matthew Rosato5a5e6532013-01-29 11:48:20 -05002695
Dominik Dingele6db1d62015-05-07 15:41:57 +02002696 if (vcpu->kvm->arch.use_cmma) {
Dominik Dingelb31605c2014-03-25 13:47:11 +01002697 rc = kvm_s390_vcpu_setup_cmma(vcpu);
2698 if (rc)
2699 return rc;
Konstantin Weitzb31288f2013-04-17 17:36:29 +02002700 }
David Hildenbrand0ac96caf2014-12-12 15:17:31 +01002701 hrtimer_init(&vcpu->arch.ckc_timer, CLOCK_MONOTONIC, HRTIMER_MODE_REL);
Christian Borntraegerca872302009-05-12 17:21:49 +02002702 vcpu->arch.ckc_timer.function = kvm_s390_idle_wakeup;
Michael Mueller9d8d5782015-02-02 15:42:51 +01002703
Tony Krowiak5102ee82014-06-27 14:46:01 -04002704 kvm_s390_vcpu_crypto_setup(vcpu);
2705
Dominik Dingelb31605c2014-03-25 13:47:11 +01002706 return rc;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002707}
2708
2709struct kvm_vcpu *kvm_arch_vcpu_create(struct kvm *kvm,
2710 unsigned int id)
2711{
Carsten Otte4d475552011-10-18 12:27:12 +02002712 struct kvm_vcpu *vcpu;
Michael Mueller7feb6bb2013-06-28 13:30:24 +02002713 struct sie_page *sie_page;
Carsten Otte4d475552011-10-18 12:27:12 +02002714 int rc = -EINVAL;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002715
David Hildenbrand42158252015-10-12 12:57:22 +02002716 if (!kvm_is_ucontrol(kvm) && !sca_can_add_vcpu(kvm, id))
Carsten Otte4d475552011-10-18 12:27:12 +02002717 goto out;
2718
2719 rc = -ENOMEM;
2720
Michael Muellerb110fea2013-06-12 13:54:54 +02002721 vcpu = kmem_cache_zalloc(kvm_vcpu_cache, GFP_KERNEL);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002722 if (!vcpu)
Carsten Otte4d475552011-10-18 12:27:12 +02002723 goto out;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002724
QingFeng Haoda72ca42017-06-07 11:41:19 +02002725 BUILD_BUG_ON(sizeof(struct sie_page) != 4096);
Michael Mueller7feb6bb2013-06-28 13:30:24 +02002726 sie_page = (struct sie_page *) get_zeroed_page(GFP_KERNEL);
2727 if (!sie_page)
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002728 goto out_free_cpu;
2729
Michael Mueller7feb6bb2013-06-28 13:30:24 +02002730 vcpu->arch.sie_block = &sie_page->sie_block;
2731 vcpu->arch.sie_block->itdba = (unsigned long) &sie_page->itdb;
2732
David Hildenbrandefed1102015-04-16 12:32:41 +02002733 /* the real guest size will always be smaller than msl */
2734 vcpu->arch.sie_block->mso = 0;
2735 vcpu->arch.sie_block->msl = sclp.hamax;
2736
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002737 vcpu->arch.sie_block->icpua = id;
Carsten Otteba5c1e92008-03-25 18:47:26 +01002738 spin_lock_init(&vcpu->arch.local_int.lock);
Michael Muellerd7c5cb02017-06-12 14:15:19 +02002739 vcpu->arch.sie_block->gd = (u32)(u64)kvm->arch.gisa;
Michael Mueller4b9f9522017-06-23 13:51:25 +02002740 if (vcpu->arch.sie_block->gd && sclp.has_gisaf)
2741 vcpu->arch.sie_block->gd |= GISA_FORMAT1;
David Hildenbrand9c23a132016-02-17 21:53:33 +01002742 seqcount_init(&vcpu->arch.cputm_seqcount);
Carsten Otteba5c1e92008-03-25 18:47:26 +01002743
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002744 rc = kvm_vcpu_init(vcpu, kvm, id);
2745 if (rc)
David Hildenbrand9abc2a02016-01-14 22:12:47 +01002746 goto out_free_sie_block;
Christian Borntraeger8335713a2015-12-08 16:55:27 +01002747 VM_EVENT(kvm, 3, "create cpu %d at 0x%pK, sie block at 0x%pK", id, vcpu,
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002748 vcpu->arch.sie_block);
Cornelia Huckade38c32012-07-23 17:20:30 +02002749 trace_kvm_s390_create_vcpu(id, vcpu, vcpu->arch.sie_block);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002750
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002751 return vcpu;
Wei Yongjun7b06bf22010-03-09 14:37:53 +08002752out_free_sie_block:
2753 free_page((unsigned long)(vcpu->arch.sie_block));
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002754out_free_cpu:
Michael Muellerb110fea2013-06-12 13:54:54 +02002755 kmem_cache_free(kvm_vcpu_cache, vcpu);
Carsten Otte4d475552011-10-18 12:27:12 +02002756out:
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002757 return ERR_PTR(rc);
2758}
2759
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002760int kvm_arch_vcpu_runnable(struct kvm_vcpu *vcpu)
2761{
David Hildenbrand9a022062014-08-05 17:40:47 +02002762 return kvm_s390_vcpu_has_irq(vcpu, 0);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002763}
2764
Longpeng(Mike)199b5762017-08-08 12:05:32 +08002765bool kvm_arch_vcpu_in_kernel(struct kvm_vcpu *vcpu)
2766{
Longpeng(Mike)0546c632017-08-08 12:05:34 +08002767 return !(vcpu->arch.sie_block->gpsw.mask & PSW_MASK_PSTATE);
Longpeng(Mike)199b5762017-08-08 12:05:32 +08002768}
2769
Christian Borntraeger27406cd2015-04-14 12:17:34 +02002770void kvm_s390_vcpu_block(struct kvm_vcpu *vcpu)
Christian Borntraeger49b99e12013-05-17 14:41:35 +02002771{
Peter Zijlstra805de8f42015-04-24 01:12:32 +02002772 atomic_or(PROG_BLOCK_SIE, &vcpu->arch.sie_block->prog20);
David Hildenbrand61a6df52015-05-12 08:41:40 +02002773 exit_sie(vcpu);
Christian Borntraeger49b99e12013-05-17 14:41:35 +02002774}
2775
Christian Borntraeger27406cd2015-04-14 12:17:34 +02002776void kvm_s390_vcpu_unblock(struct kvm_vcpu *vcpu)
Christian Borntraeger49b99e12013-05-17 14:41:35 +02002777{
Peter Zijlstra805de8f42015-04-24 01:12:32 +02002778 atomic_andnot(PROG_BLOCK_SIE, &vcpu->arch.sie_block->prog20);
Christian Borntraeger49b99e12013-05-17 14:41:35 +02002779}
2780
Christian Borntraeger8e236542015-04-09 13:49:04 +02002781static void kvm_s390_vcpu_request(struct kvm_vcpu *vcpu)
2782{
Peter Zijlstra805de8f42015-04-24 01:12:32 +02002783 atomic_or(PROG_REQUEST, &vcpu->arch.sie_block->prog20);
David Hildenbrand61a6df52015-05-12 08:41:40 +02002784 exit_sie(vcpu);
Christian Borntraeger8e236542015-04-09 13:49:04 +02002785}
2786
David Hildenbrand9ea59722018-09-25 19:16:16 -04002787bool kvm_s390_vcpu_sie_inhibited(struct kvm_vcpu *vcpu)
2788{
2789 return atomic_read(&vcpu->arch.sie_block->prog20) &
2790 (PROG_BLOCK_SIE | PROG_REQUEST);
2791}
2792
Christian Borntraeger8e236542015-04-09 13:49:04 +02002793static void kvm_s390_vcpu_request_handled(struct kvm_vcpu *vcpu)
2794{
Jason J. Herne9bf9fde2015-09-16 09:13:50 -04002795 atomic_andnot(PROG_REQUEST, &vcpu->arch.sie_block->prog20);
Christian Borntraeger8e236542015-04-09 13:49:04 +02002796}
2797
Christian Borntraeger49b99e12013-05-17 14:41:35 +02002798/*
David Hildenbrand9ea59722018-09-25 19:16:16 -04002799 * Kick a guest cpu out of (v)SIE and wait until (v)SIE is not running.
Christian Borntraeger49b99e12013-05-17 14:41:35 +02002800 * If the CPU is not running (e.g. waiting as idle) the function will
2801 * return immediately. */
2802void exit_sie(struct kvm_vcpu *vcpu)
2803{
David Hildenbrandef8f4f42018-01-23 18:05:29 +01002804 kvm_s390_set_cpuflags(vcpu, CPUSTAT_STOP_INT);
David Hildenbrand9ea59722018-09-25 19:16:16 -04002805 kvm_s390_vsie_kick(vcpu);
Christian Borntraeger49b99e12013-05-17 14:41:35 +02002806 while (vcpu->arch.sie_block->prog0c & PROG_IN_SIE)
2807 cpu_relax();
2808}
2809
Christian Borntraeger8e236542015-04-09 13:49:04 +02002810/* Kick a guest cpu out of SIE to process a request synchronously */
2811void kvm_s390_sync_request(int req, struct kvm_vcpu *vcpu)
Christian Borntraeger49b99e12013-05-17 14:41:35 +02002812{
Christian Borntraeger8e236542015-04-09 13:49:04 +02002813 kvm_make_request(req, vcpu);
2814 kvm_s390_vcpu_request(vcpu);
Christian Borntraeger49b99e12013-05-17 14:41:35 +02002815}
2816
Martin Schwidefsky414d3b02016-03-08 11:52:54 +01002817static void kvm_gmap_notifier(struct gmap *gmap, unsigned long start,
2818 unsigned long end)
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02002819{
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02002820 struct kvm *kvm = gmap->private;
2821 struct kvm_vcpu *vcpu;
Martin Schwidefsky414d3b02016-03-08 11:52:54 +01002822 unsigned long prefix;
2823 int i;
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02002824
David Hildenbrand65d0b0d2015-04-27 16:29:34 +02002825 if (gmap_is_shadow(gmap))
2826 return;
Martin Schwidefsky414d3b02016-03-08 11:52:54 +01002827 if (start >= 1UL << 31)
2828 /* We are only interested in prefix pages */
2829 return;
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02002830 kvm_for_each_vcpu(i, vcpu, kvm) {
2831 /* match against both prefix pages */
Martin Schwidefsky414d3b02016-03-08 11:52:54 +01002832 prefix = kvm_s390_get_prefix(vcpu);
2833 if (prefix <= end && start <= prefix + 2*PAGE_SIZE - 1) {
2834 VCPU_EVENT(vcpu, 2, "gmap notifier for %lx-%lx",
2835 start, end);
Christian Borntraeger8e236542015-04-09 13:49:04 +02002836 kvm_s390_sync_request(KVM_REQ_MMU_RELOAD, vcpu);
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02002837 }
2838 }
2839}
2840
Christoffer Dallb6d33832012-03-08 16:44:24 -05002841int kvm_arch_vcpu_should_kick(struct kvm_vcpu *vcpu)
2842{
2843 /* kvm common code refers to this, but never calls it */
2844 BUG();
2845 return 0;
2846}
2847
Carsten Otte14eebd92012-05-15 14:15:26 +02002848static int kvm_arch_vcpu_ioctl_get_one_reg(struct kvm_vcpu *vcpu,
2849 struct kvm_one_reg *reg)
2850{
2851 int r = -EINVAL;
2852
2853 switch (reg->id) {
Carsten Otte29b7c712012-05-15 14:15:27 +02002854 case KVM_REG_S390_TODPR:
2855 r = put_user(vcpu->arch.sie_block->todpr,
2856 (u32 __user *)reg->addr);
2857 break;
2858 case KVM_REG_S390_EPOCHDIFF:
2859 r = put_user(vcpu->arch.sie_block->epoch,
2860 (u64 __user *)reg->addr);
2861 break;
Jason J. herne46a6dd12012-05-15 14:15:28 +02002862 case KVM_REG_S390_CPU_TIMER:
David Hildenbrand4287f242016-02-15 09:40:12 +01002863 r = put_user(kvm_s390_get_cpu_timer(vcpu),
Jason J. herne46a6dd12012-05-15 14:15:28 +02002864 (u64 __user *)reg->addr);
2865 break;
2866 case KVM_REG_S390_CLOCK_COMP:
2867 r = put_user(vcpu->arch.sie_block->ckc,
2868 (u64 __user *)reg->addr);
2869 break;
Dominik Dingel536336c2013-09-30 10:55:33 +02002870 case KVM_REG_S390_PFTOKEN:
2871 r = put_user(vcpu->arch.pfault_token,
2872 (u64 __user *)reg->addr);
2873 break;
2874 case KVM_REG_S390_PFCOMPARE:
2875 r = put_user(vcpu->arch.pfault_compare,
2876 (u64 __user *)reg->addr);
2877 break;
2878 case KVM_REG_S390_PFSELECT:
2879 r = put_user(vcpu->arch.pfault_select,
2880 (u64 __user *)reg->addr);
2881 break;
Christian Borntraeger672550f2014-02-10 15:32:19 +01002882 case KVM_REG_S390_PP:
2883 r = put_user(vcpu->arch.sie_block->pp,
2884 (u64 __user *)reg->addr);
2885 break;
Christian Borntraegerafa45ff2014-02-10 15:39:23 +01002886 case KVM_REG_S390_GBEA:
2887 r = put_user(vcpu->arch.sie_block->gbea,
2888 (u64 __user *)reg->addr);
2889 break;
Carsten Otte14eebd92012-05-15 14:15:26 +02002890 default:
2891 break;
2892 }
2893
2894 return r;
2895}
2896
2897static int kvm_arch_vcpu_ioctl_set_one_reg(struct kvm_vcpu *vcpu,
2898 struct kvm_one_reg *reg)
2899{
2900 int r = -EINVAL;
David Hildenbrand4287f242016-02-15 09:40:12 +01002901 __u64 val;
Carsten Otte14eebd92012-05-15 14:15:26 +02002902
2903 switch (reg->id) {
Carsten Otte29b7c712012-05-15 14:15:27 +02002904 case KVM_REG_S390_TODPR:
2905 r = get_user(vcpu->arch.sie_block->todpr,
2906 (u32 __user *)reg->addr);
2907 break;
2908 case KVM_REG_S390_EPOCHDIFF:
2909 r = get_user(vcpu->arch.sie_block->epoch,
2910 (u64 __user *)reg->addr);
2911 break;
Jason J. herne46a6dd12012-05-15 14:15:28 +02002912 case KVM_REG_S390_CPU_TIMER:
David Hildenbrand4287f242016-02-15 09:40:12 +01002913 r = get_user(val, (u64 __user *)reg->addr);
2914 if (!r)
2915 kvm_s390_set_cpu_timer(vcpu, val);
Jason J. herne46a6dd12012-05-15 14:15:28 +02002916 break;
2917 case KVM_REG_S390_CLOCK_COMP:
2918 r = get_user(vcpu->arch.sie_block->ckc,
2919 (u64 __user *)reg->addr);
2920 break;
Dominik Dingel536336c2013-09-30 10:55:33 +02002921 case KVM_REG_S390_PFTOKEN:
2922 r = get_user(vcpu->arch.pfault_token,
2923 (u64 __user *)reg->addr);
David Hildenbrand9fbd8082014-10-09 15:01:38 +02002924 if (vcpu->arch.pfault_token == KVM_S390_PFAULT_TOKEN_INVALID)
2925 kvm_clear_async_pf_completion_queue(vcpu);
Dominik Dingel536336c2013-09-30 10:55:33 +02002926 break;
2927 case KVM_REG_S390_PFCOMPARE:
2928 r = get_user(vcpu->arch.pfault_compare,
2929 (u64 __user *)reg->addr);
2930 break;
2931 case KVM_REG_S390_PFSELECT:
2932 r = get_user(vcpu->arch.pfault_select,
2933 (u64 __user *)reg->addr);
2934 break;
Christian Borntraeger672550f2014-02-10 15:32:19 +01002935 case KVM_REG_S390_PP:
2936 r = get_user(vcpu->arch.sie_block->pp,
2937 (u64 __user *)reg->addr);
2938 break;
Christian Borntraegerafa45ff2014-02-10 15:39:23 +01002939 case KVM_REG_S390_GBEA:
2940 r = get_user(vcpu->arch.sie_block->gbea,
2941 (u64 __user *)reg->addr);
2942 break;
Carsten Otte14eebd92012-05-15 14:15:26 +02002943 default:
2944 break;
2945 }
2946
2947 return r;
2948}
Christoffer Dallb6d33832012-03-08 16:44:24 -05002949
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002950static int kvm_arch_vcpu_ioctl_initial_reset(struct kvm_vcpu *vcpu)
2951{
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002952 kvm_s390_vcpu_initial_reset(vcpu);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002953 return 0;
2954}
2955
2956int kvm_arch_vcpu_ioctl_set_regs(struct kvm_vcpu *vcpu, struct kvm_regs *regs)
2957{
Christoffer Dall875656f2017-12-04 21:35:27 +01002958 vcpu_load(vcpu);
Christian Borntraeger5a32c1a2012-01-11 11:20:32 +01002959 memcpy(&vcpu->run->s.regs.gprs, &regs->gprs, sizeof(regs->gprs));
Christoffer Dall875656f2017-12-04 21:35:27 +01002960 vcpu_put(vcpu);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002961 return 0;
2962}
2963
2964int kvm_arch_vcpu_ioctl_get_regs(struct kvm_vcpu *vcpu, struct kvm_regs *regs)
2965{
Christoffer Dall1fc9b762017-12-04 21:35:26 +01002966 vcpu_load(vcpu);
Christian Borntraeger5a32c1a2012-01-11 11:20:32 +01002967 memcpy(&regs->gprs, &vcpu->run->s.regs.gprs, sizeof(regs->gprs));
Christoffer Dall1fc9b762017-12-04 21:35:26 +01002968 vcpu_put(vcpu);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002969 return 0;
2970}
2971
2972int kvm_arch_vcpu_ioctl_set_sregs(struct kvm_vcpu *vcpu,
2973 struct kvm_sregs *sregs)
2974{
Christoffer Dallb4ef9d42017-12-04 21:35:29 +01002975 vcpu_load(vcpu);
2976
Christian Borntraeger59674c12012-01-11 11:20:33 +01002977 memcpy(&vcpu->run->s.regs.acrs, &sregs->acrs, sizeof(sregs->acrs));
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002978 memcpy(&vcpu->arch.sie_block->gcr, &sregs->crs, sizeof(sregs->crs));
Christoffer Dallb4ef9d42017-12-04 21:35:29 +01002979
2980 vcpu_put(vcpu);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002981 return 0;
2982}
2983
2984int kvm_arch_vcpu_ioctl_get_sregs(struct kvm_vcpu *vcpu,
2985 struct kvm_sregs *sregs)
2986{
Christoffer Dallbcdec412017-12-04 21:35:28 +01002987 vcpu_load(vcpu);
2988
Christian Borntraeger59674c12012-01-11 11:20:33 +01002989 memcpy(&sregs->acrs, &vcpu->run->s.regs.acrs, sizeof(sregs->acrs));
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002990 memcpy(&sregs->crs, &vcpu->arch.sie_block->gcr, sizeof(sregs->crs));
Christoffer Dallbcdec412017-12-04 21:35:28 +01002991
2992 vcpu_put(vcpu);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002993 return 0;
2994}
2995
2996int kvm_arch_vcpu_ioctl_set_fpu(struct kvm_vcpu *vcpu, struct kvm_fpu *fpu)
2997{
Christoffer Dall6a96bc72017-12-04 21:35:35 +01002998 int ret = 0;
2999
3000 vcpu_load(vcpu);
3001
3002 if (test_fp_ctl(fpu->fpc)) {
3003 ret = -EINVAL;
3004 goto out;
3005 }
Christian Borntraegere1788bb2016-11-22 09:29:38 +01003006 vcpu->run->s.regs.fpc = fpu->fpc;
David Hildenbrand9abc2a02016-01-14 22:12:47 +01003007 if (MACHINE_HAS_VX)
David Hildenbranda7d4b8f2016-08-16 14:38:24 +02003008 convert_fp_to_vx((__vector128 *) vcpu->run->s.regs.vrs,
3009 (freg_t *) fpu->fprs);
David Hildenbrand9abc2a02016-01-14 22:12:47 +01003010 else
David Hildenbranda7d4b8f2016-08-16 14:38:24 +02003011 memcpy(vcpu->run->s.regs.fprs, &fpu->fprs, sizeof(fpu->fprs));
Christoffer Dall6a96bc72017-12-04 21:35:35 +01003012
3013out:
3014 vcpu_put(vcpu);
3015 return ret;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003016}
3017
3018int kvm_arch_vcpu_ioctl_get_fpu(struct kvm_vcpu *vcpu, struct kvm_fpu *fpu)
3019{
Christoffer Dall13931232017-12-04 21:35:34 +01003020 vcpu_load(vcpu);
3021
David Hildenbrand9abc2a02016-01-14 22:12:47 +01003022 /* make sure we have the latest values */
3023 save_fpu_regs();
3024 if (MACHINE_HAS_VX)
David Hildenbranda7d4b8f2016-08-16 14:38:24 +02003025 convert_vx_to_fp((freg_t *) fpu->fprs,
3026 (__vector128 *) vcpu->run->s.regs.vrs);
David Hildenbrand9abc2a02016-01-14 22:12:47 +01003027 else
David Hildenbranda7d4b8f2016-08-16 14:38:24 +02003028 memcpy(fpu->fprs, vcpu->run->s.regs.fprs, sizeof(fpu->fprs));
Christian Borntraegere1788bb2016-11-22 09:29:38 +01003029 fpu->fpc = vcpu->run->s.regs.fpc;
Christoffer Dall13931232017-12-04 21:35:34 +01003030
3031 vcpu_put(vcpu);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003032 return 0;
3033}
3034
3035static int kvm_arch_vcpu_ioctl_set_initial_psw(struct kvm_vcpu *vcpu, psw_t psw)
3036{
3037 int rc = 0;
3038
David Hildenbrand7a42fdc2014-05-05 16:26:19 +02003039 if (!is_vcpu_stopped(vcpu))
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003040 rc = -EBUSY;
Carsten Otted7b0b5e2009-11-19 14:21:16 +01003041 else {
3042 vcpu->run->psw_mask = psw.mask;
3043 vcpu->run->psw_addr = psw.addr;
3044 }
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003045 return rc;
3046}
3047
3048int kvm_arch_vcpu_ioctl_translate(struct kvm_vcpu *vcpu,
3049 struct kvm_translation *tr)
3050{
3051 return -EINVAL; /* not implemented yet */
3052}
3053
David Hildenbrand27291e22014-01-23 12:26:52 +01003054#define VALID_GUESTDBG_FLAGS (KVM_GUESTDBG_SINGLESTEP | \
3055 KVM_GUESTDBG_USE_HW_BP | \
3056 KVM_GUESTDBG_ENABLE)
3057
Jan Kiszkad0bfb942008-12-15 13:52:10 +01003058int kvm_arch_vcpu_ioctl_set_guest_debug(struct kvm_vcpu *vcpu,
3059 struct kvm_guest_debug *dbg)
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003060{
David Hildenbrand27291e22014-01-23 12:26:52 +01003061 int rc = 0;
3062
Christoffer Dall66b56562017-12-04 21:35:33 +01003063 vcpu_load(vcpu);
3064
David Hildenbrand27291e22014-01-23 12:26:52 +01003065 vcpu->guest_debug = 0;
3066 kvm_s390_clear_bp_data(vcpu);
3067
Christoffer Dall66b56562017-12-04 21:35:33 +01003068 if (dbg->control & ~VALID_GUESTDBG_FLAGS) {
3069 rc = -EINVAL;
3070 goto out;
3071 }
3072 if (!sclp.has_gpere) {
3073 rc = -EINVAL;
3074 goto out;
3075 }
David Hildenbrand27291e22014-01-23 12:26:52 +01003076
3077 if (dbg->control & KVM_GUESTDBG_ENABLE) {
3078 vcpu->guest_debug = dbg->control;
3079 /* enforce guest PER */
David Hildenbrandef8f4f42018-01-23 18:05:29 +01003080 kvm_s390_set_cpuflags(vcpu, CPUSTAT_P);
David Hildenbrand27291e22014-01-23 12:26:52 +01003081
3082 if (dbg->control & KVM_GUESTDBG_USE_HW_BP)
3083 rc = kvm_s390_import_bp_data(vcpu, dbg);
3084 } else {
David Hildenbrand9daecfc2018-01-23 18:05:30 +01003085 kvm_s390_clear_cpuflags(vcpu, CPUSTAT_P);
David Hildenbrand27291e22014-01-23 12:26:52 +01003086 vcpu->arch.guestdbg.last_bp = 0;
3087 }
3088
3089 if (rc) {
3090 vcpu->guest_debug = 0;
3091 kvm_s390_clear_bp_data(vcpu);
David Hildenbrand9daecfc2018-01-23 18:05:30 +01003092 kvm_s390_clear_cpuflags(vcpu, CPUSTAT_P);
David Hildenbrand27291e22014-01-23 12:26:52 +01003093 }
3094
Christoffer Dall66b56562017-12-04 21:35:33 +01003095out:
3096 vcpu_put(vcpu);
David Hildenbrand27291e22014-01-23 12:26:52 +01003097 return rc;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003098}
3099
Marcelo Tosatti62d9f0d2008-04-11 13:24:45 -03003100int kvm_arch_vcpu_ioctl_get_mpstate(struct kvm_vcpu *vcpu,
3101 struct kvm_mp_state *mp_state)
3102{
Christoffer Dallfd232562017-12-04 21:35:30 +01003103 int ret;
3104
3105 vcpu_load(vcpu);
3106
David Hildenbrand6352e4d2014-04-10 17:35:00 +02003107 /* CHECK_STOP and LOAD are not supported yet */
Christoffer Dallfd232562017-12-04 21:35:30 +01003108 ret = is_vcpu_stopped(vcpu) ? KVM_MP_STATE_STOPPED :
3109 KVM_MP_STATE_OPERATING;
3110
3111 vcpu_put(vcpu);
3112 return ret;
Marcelo Tosatti62d9f0d2008-04-11 13:24:45 -03003113}
3114
3115int kvm_arch_vcpu_ioctl_set_mpstate(struct kvm_vcpu *vcpu,
3116 struct kvm_mp_state *mp_state)
3117{
David Hildenbrand6352e4d2014-04-10 17:35:00 +02003118 int rc = 0;
3119
Christoffer Dalle83dff52017-12-04 21:35:31 +01003120 vcpu_load(vcpu);
3121
David Hildenbrand6352e4d2014-04-10 17:35:00 +02003122 /* user space knows about this interface - let it control the state */
3123 vcpu->kvm->arch.user_cpu_state_ctrl = 1;
3124
3125 switch (mp_state->mp_state) {
3126 case KVM_MP_STATE_STOPPED:
3127 kvm_s390_vcpu_stop(vcpu);
3128 break;
3129 case KVM_MP_STATE_OPERATING:
3130 kvm_s390_vcpu_start(vcpu);
3131 break;
3132 case KVM_MP_STATE_LOAD:
3133 case KVM_MP_STATE_CHECK_STOP:
3134 /* fall through - CHECK_STOP and LOAD are not supported yet */
3135 default:
3136 rc = -ENXIO;
3137 }
3138
Christoffer Dalle83dff52017-12-04 21:35:31 +01003139 vcpu_put(vcpu);
David Hildenbrand6352e4d2014-04-10 17:35:00 +02003140 return rc;
Marcelo Tosatti62d9f0d2008-04-11 13:24:45 -03003141}
3142
David Hildenbrand8ad35752014-03-14 11:00:21 +01003143static bool ibs_enabled(struct kvm_vcpu *vcpu)
3144{
David Hildenbrand8d5fb0d2018-01-23 18:05:31 +01003145 return kvm_s390_test_cpuflags(vcpu, CPUSTAT_IBS);
David Hildenbrand8ad35752014-03-14 11:00:21 +01003146}
3147
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02003148static int kvm_s390_handle_requests(struct kvm_vcpu *vcpu)
3149{
David Hildenbrand8ad35752014-03-14 11:00:21 +01003150retry:
Christian Borntraeger8e236542015-04-09 13:49:04 +02003151 kvm_s390_vcpu_request_handled(vcpu);
Radim Krčmář2fa6e1e2017-06-04 14:43:52 +02003152 if (!kvm_request_pending(vcpu))
Christian Borntraeger586b7cc2015-07-28 15:03:05 +02003153 return 0;
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02003154 /*
3155 * We use MMU_RELOAD just to re-arm the ipte notifier for the
Martin Schwidefskyb2d73b22016-03-08 11:54:42 +01003156 * guest prefix page. gmap_mprotect_notify will wait on the ptl lock.
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02003157 * This ensures that the ipte instruction for this request has
3158 * already finished. We might race against a second unmapper that
3159 * wants to set the blocking bit. Lets just retry the request loop.
3160 */
David Hildenbrand8ad35752014-03-14 11:00:21 +01003161 if (kvm_check_request(KVM_REQ_MMU_RELOAD, vcpu)) {
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02003162 int rc;
Martin Schwidefskyb2d73b22016-03-08 11:54:42 +01003163 rc = gmap_mprotect_notify(vcpu->arch.gmap,
3164 kvm_s390_get_prefix(vcpu),
3165 PAGE_SIZE * 2, PROT_WRITE);
Julius Niedworokaca411a2016-08-03 16:39:55 +02003166 if (rc) {
3167 kvm_make_request(KVM_REQ_MMU_RELOAD, vcpu);
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02003168 return rc;
Julius Niedworokaca411a2016-08-03 16:39:55 +02003169 }
David Hildenbrand8ad35752014-03-14 11:00:21 +01003170 goto retry;
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02003171 }
David Hildenbrand8ad35752014-03-14 11:00:21 +01003172
David Hildenbrandd3d692c2014-07-29 08:53:36 +02003173 if (kvm_check_request(KVM_REQ_TLB_FLUSH, vcpu)) {
3174 vcpu->arch.sie_block->ihcpu = 0xffff;
3175 goto retry;
3176 }
3177
David Hildenbrand8ad35752014-03-14 11:00:21 +01003178 if (kvm_check_request(KVM_REQ_ENABLE_IBS, vcpu)) {
3179 if (!ibs_enabled(vcpu)) {
3180 trace_kvm_s390_enable_disable_ibs(vcpu->vcpu_id, 1);
David Hildenbrandef8f4f42018-01-23 18:05:29 +01003181 kvm_s390_set_cpuflags(vcpu, CPUSTAT_IBS);
David Hildenbrand8ad35752014-03-14 11:00:21 +01003182 }
3183 goto retry;
3184 }
3185
3186 if (kvm_check_request(KVM_REQ_DISABLE_IBS, vcpu)) {
3187 if (ibs_enabled(vcpu)) {
3188 trace_kvm_s390_enable_disable_ibs(vcpu->vcpu_id, 0);
David Hildenbrand9daecfc2018-01-23 18:05:30 +01003189 kvm_s390_clear_cpuflags(vcpu, CPUSTAT_IBS);
David Hildenbrand8ad35752014-03-14 11:00:21 +01003190 }
3191 goto retry;
3192 }
3193
David Hildenbrand6502a342016-06-21 14:19:51 +02003194 if (kvm_check_request(KVM_REQ_ICPT_OPEREXC, vcpu)) {
3195 vcpu->arch.sie_block->ictl |= ICTL_OPEREXC;
3196 goto retry;
3197 }
3198
Claudio Imbrenda190df4a2016-08-04 17:54:42 +02003199 if (kvm_check_request(KVM_REQ_START_MIGRATION, vcpu)) {
3200 /*
Janosch Frankc9f0a2b2018-02-16 12:16:14 +01003201 * Disable CMM virtualization; we will emulate the ESSA
Claudio Imbrenda190df4a2016-08-04 17:54:42 +02003202 * instruction manually, in order to provide additional
3203 * functionalities needed for live migration.
3204 */
3205 vcpu->arch.sie_block->ecb2 &= ~ECB2_CMMA;
3206 goto retry;
3207 }
3208
3209 if (kvm_check_request(KVM_REQ_STOP_MIGRATION, vcpu)) {
3210 /*
Janosch Frankc9f0a2b2018-02-16 12:16:14 +01003211 * Re-enable CMM virtualization if CMMA is available and
3212 * CMM has been used.
Claudio Imbrenda190df4a2016-08-04 17:54:42 +02003213 */
3214 if ((vcpu->kvm->arch.use_cmma) &&
Janosch Frankc9f0a2b2018-02-16 12:16:14 +01003215 (vcpu->kvm->mm->context.uses_cmm))
Claudio Imbrenda190df4a2016-08-04 17:54:42 +02003216 vcpu->arch.sie_block->ecb2 |= ECB2_CMMA;
3217 goto retry;
3218 }
3219
David Hildenbrand0759d062014-05-13 16:54:32 +02003220 /* nothing to do, just clear the request */
Radim Krčmář72875d82017-04-26 22:32:19 +02003221 kvm_clear_request(KVM_REQ_UNHALT, vcpu);
David Hildenbrand3194cdb2018-09-25 19:16:17 -04003222 /* we left the vsie handler, nothing to do, just clear the request */
3223 kvm_clear_request(KVM_REQ_VSIE_RESTART, vcpu);
David Hildenbrand0759d062014-05-13 16:54:32 +02003224
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02003225 return 0;
3226}
3227
David Hildenbrand0e7def52018-02-07 12:46:43 +01003228void kvm_s390_set_tod_clock(struct kvm *kvm,
3229 const struct kvm_s390_vm_tod_clock *gtod)
Collin L. Walling8fa16962016-07-26 15:29:44 -04003230{
3231 struct kvm_vcpu *vcpu;
3232 struct kvm_s390_tod_clock_ext htod;
3233 int i;
3234
3235 mutex_lock(&kvm->lock);
3236 preempt_disable();
3237
3238 get_tod_clock_ext((char *)&htod);
3239
3240 kvm->arch.epoch = gtod->tod - htod.tod;
David Hildenbrand0e7def52018-02-07 12:46:43 +01003241 kvm->arch.epdx = 0;
3242 if (test_kvm_facility(kvm, 139)) {
3243 kvm->arch.epdx = gtod->epoch_idx - htod.epoch_idx;
3244 if (kvm->arch.epoch > gtod->tod)
3245 kvm->arch.epdx -= 1;
3246 }
Collin L. Walling8fa16962016-07-26 15:29:44 -04003247
3248 kvm_s390_vcpu_block_all(kvm);
3249 kvm_for_each_vcpu(i, vcpu, kvm) {
3250 vcpu->arch.sie_block->epoch = kvm->arch.epoch;
3251 vcpu->arch.sie_block->epdx = kvm->arch.epdx;
3252 }
3253
3254 kvm_s390_vcpu_unblock_all(kvm);
3255 preempt_enable();
3256 mutex_unlock(&kvm->lock);
3257}
3258
Thomas Huthfa576c52014-05-06 17:20:16 +02003259/**
3260 * kvm_arch_fault_in_page - fault-in guest page if necessary
3261 * @vcpu: The corresponding virtual cpu
3262 * @gpa: Guest physical address
3263 * @writable: Whether the page should be writable or not
3264 *
3265 * Make sure that a guest page has been faulted-in on the host.
3266 *
3267 * Return: Zero on success, negative error code otherwise.
3268 */
3269long kvm_arch_fault_in_page(struct kvm_vcpu *vcpu, gpa_t gpa, int writable)
Dominik Dingel24eb3a82013-06-17 16:25:18 +02003270{
Martin Schwidefsky527e30b2014-04-30 16:04:25 +02003271 return gmap_fault(vcpu->arch.gmap, gpa,
3272 writable ? FAULT_FLAG_WRITE : 0);
Dominik Dingel24eb3a82013-06-17 16:25:18 +02003273}
3274
Dominik Dingel3c038e62013-10-07 17:11:48 +02003275static void __kvm_inject_pfault_token(struct kvm_vcpu *vcpu, bool start_token,
3276 unsigned long token)
3277{
3278 struct kvm_s390_interrupt inti;
Jens Freimann383d0b02014-07-29 15:11:49 +02003279 struct kvm_s390_irq irq;
Dominik Dingel3c038e62013-10-07 17:11:48 +02003280
3281 if (start_token) {
Jens Freimann383d0b02014-07-29 15:11:49 +02003282 irq.u.ext.ext_params2 = token;
3283 irq.type = KVM_S390_INT_PFAULT_INIT;
3284 WARN_ON_ONCE(kvm_s390_inject_vcpu(vcpu, &irq));
Dominik Dingel3c038e62013-10-07 17:11:48 +02003285 } else {
3286 inti.type = KVM_S390_INT_PFAULT_DONE;
Jens Freimann383d0b02014-07-29 15:11:49 +02003287 inti.parm64 = token;
Dominik Dingel3c038e62013-10-07 17:11:48 +02003288 WARN_ON_ONCE(kvm_s390_inject_vm(vcpu->kvm, &inti));
3289 }
3290}
3291
3292void kvm_arch_async_page_not_present(struct kvm_vcpu *vcpu,
3293 struct kvm_async_pf *work)
3294{
3295 trace_kvm_s390_pfault_init(vcpu, work->arch.pfault_token);
3296 __kvm_inject_pfault_token(vcpu, true, work->arch.pfault_token);
3297}
3298
3299void kvm_arch_async_page_present(struct kvm_vcpu *vcpu,
3300 struct kvm_async_pf *work)
3301{
3302 trace_kvm_s390_pfault_done(vcpu, work->arch.pfault_token);
3303 __kvm_inject_pfault_token(vcpu, false, work->arch.pfault_token);
3304}
3305
3306void kvm_arch_async_page_ready(struct kvm_vcpu *vcpu,
3307 struct kvm_async_pf *work)
3308{
3309 /* s390 will always inject the page directly */
3310}
3311
3312bool kvm_arch_can_inject_async_page_present(struct kvm_vcpu *vcpu)
3313{
3314 /*
3315 * s390 will always inject the page directly,
3316 * but we still want check_async_completion to cleanup
3317 */
3318 return true;
3319}
3320
3321static int kvm_arch_setup_async_pf(struct kvm_vcpu *vcpu)
3322{
3323 hva_t hva;
3324 struct kvm_arch_async_pf arch;
3325 int rc;
3326
3327 if (vcpu->arch.pfault_token == KVM_S390_PFAULT_TOKEN_INVALID)
3328 return 0;
3329 if ((vcpu->arch.sie_block->gpsw.mask & vcpu->arch.pfault_select) !=
3330 vcpu->arch.pfault_compare)
3331 return 0;
3332 if (psw_extint_disabled(vcpu))
3333 return 0;
David Hildenbrand9a022062014-08-05 17:40:47 +02003334 if (kvm_s390_vcpu_has_irq(vcpu, 0))
Dominik Dingel3c038e62013-10-07 17:11:48 +02003335 return 0;
David Hildenbrandb9224cd2018-04-30 17:55:24 +02003336 if (!(vcpu->arch.sie_block->gcr[0] & CR0_SERVICE_SIGNAL_SUBMASK))
Dominik Dingel3c038e62013-10-07 17:11:48 +02003337 return 0;
3338 if (!vcpu->arch.gmap->pfault_enabled)
3339 return 0;
3340
Heiko Carstens81480cc2014-01-01 16:36:07 +01003341 hva = gfn_to_hva(vcpu->kvm, gpa_to_gfn(current->thread.gmap_addr));
3342 hva += current->thread.gmap_addr & ~PAGE_MASK;
3343 if (read_guest_real(vcpu, vcpu->arch.pfault_token, &arch.pfault_token, 8))
Dominik Dingel3c038e62013-10-07 17:11:48 +02003344 return 0;
3345
3346 rc = kvm_setup_async_pf(vcpu, current->thread.gmap_addr, hva, &arch);
3347 return rc;
3348}
3349
Thomas Huth3fb4c402013-09-12 10:33:43 +02003350static int vcpu_pre_run(struct kvm_vcpu *vcpu)
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003351{
Thomas Huth3fb4c402013-09-12 10:33:43 +02003352 int rc, cpuflags;
Carsten Ottee168bf82012-01-04 10:25:22 +01003353
Dominik Dingel3c038e62013-10-07 17:11:48 +02003354 /*
3355 * On s390 notifications for arriving pages will be delivered directly
3356 * to the guest but the house keeping for completed pfaults is
3357 * handled outside the worker.
3358 */
3359 kvm_check_async_pf_completion(vcpu);
3360
Christian Borntraeger7ec7c8c2015-12-02 14:27:03 +01003361 vcpu->arch.sie_block->gg14 = vcpu->run->s.regs.gprs[14];
3362 vcpu->arch.sie_block->gg15 = vcpu->run->s.regs.gprs[15];
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003363
3364 if (need_resched())
3365 schedule();
3366
Martin Schwidefskyd3a73ac2014-04-15 12:55:07 +02003367 if (test_cpu_flag(CIF_MCCK_PENDING))
Christian Borntraeger71cde582008-05-21 13:37:34 +02003368 s390_handle_mcck();
3369
Jens Freimann79395032014-04-17 10:10:30 +02003370 if (!kvm_is_ucontrol(vcpu->kvm)) {
3371 rc = kvm_s390_deliver_pending_interrupts(vcpu);
3372 if (rc)
3373 return rc;
3374 }
Carsten Otte0ff31862008-05-21 13:37:37 +02003375
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02003376 rc = kvm_s390_handle_requests(vcpu);
3377 if (rc)
3378 return rc;
3379
David Hildenbrand27291e22014-01-23 12:26:52 +01003380 if (guestdbg_enabled(vcpu)) {
3381 kvm_s390_backup_guest_per_regs(vcpu);
3382 kvm_s390_patch_guest_per_regs(vcpu);
3383 }
3384
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003385 vcpu->arch.sie_block->icptcode = 0;
Thomas Huth3fb4c402013-09-12 10:33:43 +02003386 cpuflags = atomic_read(&vcpu->arch.sie_block->cpuflags);
3387 VCPU_EVENT(vcpu, 6, "entering sie flags %x", cpuflags);
3388 trace_kvm_s390_sie_enter(vcpu, cpuflags);
Dominik Dingel2b29a9f2013-07-26 15:04:00 +02003389
Thomas Huth3fb4c402013-09-12 10:33:43 +02003390 return 0;
3391}
3392
Thomas Huth492d8642015-02-10 16:11:01 +01003393static int vcpu_post_run_fault_in_sie(struct kvm_vcpu *vcpu)
3394{
David Hildenbrand56317922016-01-12 17:37:58 +01003395 struct kvm_s390_pgm_info pgm_info = {
3396 .code = PGM_ADDRESSING,
3397 };
3398 u8 opcode, ilen;
Thomas Huth492d8642015-02-10 16:11:01 +01003399 int rc;
3400
3401 VCPU_EVENT(vcpu, 3, "%s", "fault in sie instruction");
3402 trace_kvm_s390_sie_fault(vcpu);
3403
3404 /*
3405 * We want to inject an addressing exception, which is defined as a
3406 * suppressing or terminating exception. However, since we came here
3407 * by a DAT access exception, the PSW still points to the faulting
3408 * instruction since DAT exceptions are nullifying. So we've got
3409 * to look up the current opcode to get the length of the instruction
3410 * to be able to forward the PSW.
3411 */
David Hildenbrand3fa8cad72016-05-24 12:00:49 +02003412 rc = read_guest_instr(vcpu, vcpu->arch.sie_block->gpsw.addr, &opcode, 1);
David Hildenbrand56317922016-01-12 17:37:58 +01003413 ilen = insn_length(opcode);
David Hildenbrand9b0d7212016-01-12 17:40:54 +01003414 if (rc < 0) {
3415 return rc;
3416 } else if (rc) {
3417 /* Instruction-Fetching Exceptions - we can't detect the ilen.
3418 * Forward by arbitrary ilc, injection will take care of
3419 * nullification if necessary.
3420 */
3421 pgm_info = vcpu->arch.pgm;
3422 ilen = 4;
3423 }
David Hildenbrand56317922016-01-12 17:37:58 +01003424 pgm_info.flags = ilen | KVM_S390_PGM_FLAGS_ILC_VALID;
3425 kvm_s390_forward_psw(vcpu, ilen);
3426 return kvm_s390_inject_prog_irq(vcpu, &pgm_info);
Thomas Huth492d8642015-02-10 16:11:01 +01003427}
3428
Thomas Huth3fb4c402013-09-12 10:33:43 +02003429static int vcpu_post_run(struct kvm_vcpu *vcpu, int exit_reason)
3430{
QingFeng Hao4d62fcc2017-06-07 12:03:05 +02003431 struct mcck_volatile_info *mcck_info;
3432 struct sie_page *sie_page;
3433
Dominik Dingel2b29a9f2013-07-26 15:04:00 +02003434 VCPU_EVENT(vcpu, 6, "exit sie icptcode %d",
3435 vcpu->arch.sie_block->icptcode);
3436 trace_kvm_s390_sie_exit(vcpu, vcpu->arch.sie_block->icptcode);
3437
David Hildenbrand27291e22014-01-23 12:26:52 +01003438 if (guestdbg_enabled(vcpu))
3439 kvm_s390_restore_guest_per_regs(vcpu);
3440
Christian Borntraeger7ec7c8c2015-12-02 14:27:03 +01003441 vcpu->run->s.regs.gprs[14] = vcpu->arch.sie_block->gg14;
3442 vcpu->run->s.regs.gprs[15] = vcpu->arch.sie_block->gg15;
David Hildenbrand71f116b2015-10-19 16:24:28 +02003443
QingFeng Hao4d62fcc2017-06-07 12:03:05 +02003444 if (exit_reason == -EINTR) {
3445 VCPU_EVENT(vcpu, 3, "%s", "machine check");
3446 sie_page = container_of(vcpu->arch.sie_block,
3447 struct sie_page, sie_block);
3448 mcck_info = &sie_page->mcck_info;
3449 kvm_s390_reinject_machine_check(vcpu, mcck_info);
3450 return 0;
3451 }
3452
David Hildenbrand71f116b2015-10-19 16:24:28 +02003453 if (vcpu->arch.sie_block->icptcode > 0) {
3454 int rc = kvm_handle_sie_intercept(vcpu);
3455
3456 if (rc != -EOPNOTSUPP)
3457 return rc;
3458 vcpu->run->exit_reason = KVM_EXIT_S390_SIEIC;
3459 vcpu->run->s390_sieic.icptcode = vcpu->arch.sie_block->icptcode;
3460 vcpu->run->s390_sieic.ipa = vcpu->arch.sie_block->ipa;
3461 vcpu->run->s390_sieic.ipb = vcpu->arch.sie_block->ipb;
3462 return -EREMOTE;
3463 } else if (exit_reason != -EFAULT) {
3464 vcpu->stat.exit_null++;
3465 return 0;
Thomas Huth210b16072013-09-19 16:26:18 +02003466 } else if (kvm_is_ucontrol(vcpu->kvm)) {
3467 vcpu->run->exit_reason = KVM_EXIT_S390_UCONTROL;
3468 vcpu->run->s390_ucontrol.trans_exc_code =
3469 current->thread.gmap_addr;
3470 vcpu->run->s390_ucontrol.pgm_code = 0x10;
David Hildenbrand71f116b2015-10-19 16:24:28 +02003471 return -EREMOTE;
Dominik Dingel24eb3a82013-06-17 16:25:18 +02003472 } else if (current->thread.gmap_pfault) {
Dominik Dingel3c038e62013-10-07 17:11:48 +02003473 trace_kvm_s390_major_guest_pfault(vcpu);
Dominik Dingel24eb3a82013-06-17 16:25:18 +02003474 current->thread.gmap_pfault = 0;
David Hildenbrand71f116b2015-10-19 16:24:28 +02003475 if (kvm_arch_setup_async_pf(vcpu))
3476 return 0;
3477 return kvm_arch_fault_in_page(vcpu, current->thread.gmap_addr, 1);
Dominik Dingel24eb3a82013-06-17 16:25:18 +02003478 }
David Hildenbrand71f116b2015-10-19 16:24:28 +02003479 return vcpu_post_run_fault_in_sie(vcpu);
Thomas Huth3fb4c402013-09-12 10:33:43 +02003480}
3481
3482static int __vcpu_run(struct kvm_vcpu *vcpu)
3483{
3484 int rc, exit_reason;
3485
Thomas Huth800c1062013-09-12 10:33:45 +02003486 /*
3487 * We try to hold kvm->srcu during most of vcpu_run (except when run-
3488 * ning the guest), so that memslots (and other stuff) are protected
3489 */
3490 vcpu->srcu_idx = srcu_read_lock(&vcpu->kvm->srcu);
3491
Thomas Hutha76ccff2013-09-12 10:33:44 +02003492 do {
3493 rc = vcpu_pre_run(vcpu);
3494 if (rc)
3495 break;
Thomas Huth3fb4c402013-09-12 10:33:43 +02003496
Thomas Huth800c1062013-09-12 10:33:45 +02003497 srcu_read_unlock(&vcpu->kvm->srcu, vcpu->srcu_idx);
Thomas Hutha76ccff2013-09-12 10:33:44 +02003498 /*
3499 * As PF_VCPU will be used in fault handler, between
3500 * guest_enter and guest_exit should be no uaccess.
3501 */
Christian Borntraeger0097d122015-04-30 13:43:30 +02003502 local_irq_disable();
Paolo Bonzini6edaa532016-06-15 15:18:26 +02003503 guest_enter_irqoff();
David Hildenbranddb0758b2016-02-15 09:42:25 +01003504 __disable_cpu_timer_accounting(vcpu);
Christian Borntraeger0097d122015-04-30 13:43:30 +02003505 local_irq_enable();
Thomas Hutha76ccff2013-09-12 10:33:44 +02003506 exit_reason = sie64a(vcpu->arch.sie_block,
3507 vcpu->run->s.regs.gprs);
Christian Borntraeger0097d122015-04-30 13:43:30 +02003508 local_irq_disable();
David Hildenbranddb0758b2016-02-15 09:42:25 +01003509 __enable_cpu_timer_accounting(vcpu);
Paolo Bonzini6edaa532016-06-15 15:18:26 +02003510 guest_exit_irqoff();
Christian Borntraeger0097d122015-04-30 13:43:30 +02003511 local_irq_enable();
Thomas Huth800c1062013-09-12 10:33:45 +02003512 vcpu->srcu_idx = srcu_read_lock(&vcpu->kvm->srcu);
Thomas Huth3fb4c402013-09-12 10:33:43 +02003513
Thomas Hutha76ccff2013-09-12 10:33:44 +02003514 rc = vcpu_post_run(vcpu, exit_reason);
David Hildenbrand27291e22014-01-23 12:26:52 +01003515 } while (!signal_pending(current) && !guestdbg_exit_pending(vcpu) && !rc);
Thomas Huth3fb4c402013-09-12 10:33:43 +02003516
Thomas Huth800c1062013-09-12 10:33:45 +02003517 srcu_read_unlock(&vcpu->kvm->srcu, vcpu->srcu_idx);
Carsten Ottee168bf82012-01-04 10:25:22 +01003518 return rc;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003519}
3520
David Hildenbrandb028ee32014-07-17 10:47:43 +02003521static void sync_regs(struct kvm_vcpu *vcpu, struct kvm_run *kvm_run)
3522{
Christian Borntraeger4d5f2c02017-02-09 17:15:41 +01003523 struct runtime_instr_cb *riccb;
Fan Zhang4e0b1ab2016-11-29 07:17:55 +01003524 struct gs_cb *gscb;
Christian Borntraeger4d5f2c02017-02-09 17:15:41 +01003525
3526 riccb = (struct runtime_instr_cb *) &kvm_run->s.regs.riccb;
Fan Zhang4e0b1ab2016-11-29 07:17:55 +01003527 gscb = (struct gs_cb *) &kvm_run->s.regs.gscb;
David Hildenbrandb028ee32014-07-17 10:47:43 +02003528 vcpu->arch.sie_block->gpsw.mask = kvm_run->psw_mask;
3529 vcpu->arch.sie_block->gpsw.addr = kvm_run->psw_addr;
3530 if (kvm_run->kvm_dirty_regs & KVM_SYNC_PREFIX)
3531 kvm_s390_set_prefix(vcpu, kvm_run->s.regs.prefix);
3532 if (kvm_run->kvm_dirty_regs & KVM_SYNC_CRS) {
3533 memcpy(&vcpu->arch.sie_block->gcr, &kvm_run->s.regs.crs, 128);
David Hildenbrandd3d692c2014-07-29 08:53:36 +02003534 /* some control register changes require a tlb flush */
3535 kvm_make_request(KVM_REQ_TLB_FLUSH, vcpu);
David Hildenbrandb028ee32014-07-17 10:47:43 +02003536 }
3537 if (kvm_run->kvm_dirty_regs & KVM_SYNC_ARCH0) {
David Hildenbrand4287f242016-02-15 09:40:12 +01003538 kvm_s390_set_cpu_timer(vcpu, kvm_run->s.regs.cputm);
David Hildenbrandb028ee32014-07-17 10:47:43 +02003539 vcpu->arch.sie_block->ckc = kvm_run->s.regs.ckc;
3540 vcpu->arch.sie_block->todpr = kvm_run->s.regs.todpr;
3541 vcpu->arch.sie_block->pp = kvm_run->s.regs.pp;
3542 vcpu->arch.sie_block->gbea = kvm_run->s.regs.gbea;
3543 }
3544 if (kvm_run->kvm_dirty_regs & KVM_SYNC_PFAULT) {
3545 vcpu->arch.pfault_token = kvm_run->s.regs.pft;
3546 vcpu->arch.pfault_select = kvm_run->s.regs.pfs;
3547 vcpu->arch.pfault_compare = kvm_run->s.regs.pfc;
David Hildenbrand9fbd8082014-10-09 15:01:38 +02003548 if (vcpu->arch.pfault_token == KVM_S390_PFAULT_TOKEN_INVALID)
3549 kvm_clear_async_pf_completion_queue(vcpu);
David Hildenbrandb028ee32014-07-17 10:47:43 +02003550 }
Fan Zhang80cd8762016-08-15 04:53:22 +02003551 /*
3552 * If userspace sets the riccb (e.g. after migration) to a valid state,
3553 * we should enable RI here instead of doing the lazy enablement.
3554 */
3555 if ((kvm_run->kvm_dirty_regs & KVM_SYNC_RICCB) &&
Christian Borntraeger4d5f2c02017-02-09 17:15:41 +01003556 test_kvm_facility(vcpu->kvm, 64) &&
Alice Frosibb59c2d2017-09-14 12:35:45 +02003557 riccb->v &&
David Hildenbrand0c9d8682017-03-13 11:48:28 +01003558 !(vcpu->arch.sie_block->ecb3 & ECB3_RI)) {
Christian Borntraeger4d5f2c02017-02-09 17:15:41 +01003559 VCPU_EVENT(vcpu, 3, "%s", "ENABLE: RI (sync_regs)");
David Hildenbrand0c9d8682017-03-13 11:48:28 +01003560 vcpu->arch.sie_block->ecb3 |= ECB3_RI;
Fan Zhang80cd8762016-08-15 04:53:22 +02003561 }
Fan Zhang4e0b1ab2016-11-29 07:17:55 +01003562 /*
3563 * If userspace sets the gscb (e.g. after migration) to non-zero,
3564 * we should enable GS here instead of doing the lazy enablement.
3565 */
3566 if ((kvm_run->kvm_dirty_regs & KVM_SYNC_GSCB) &&
3567 test_kvm_facility(vcpu->kvm, 133) &&
3568 gscb->gssm &&
3569 !vcpu->arch.gs_enabled) {
3570 VCPU_EVENT(vcpu, 3, "%s", "ENABLE: GS (sync_regs)");
3571 vcpu->arch.sie_block->ecb |= ECB_GS;
3572 vcpu->arch.sie_block->ecd |= ECD_HOSTREGMGMT;
3573 vcpu->arch.gs_enabled = 1;
Fan Zhang80cd8762016-08-15 04:53:22 +02003574 }
Christian Borntraeger35b3fde2018-01-17 14:44:34 +01003575 if ((kvm_run->kvm_dirty_regs & KVM_SYNC_BPBC) &&
3576 test_kvm_facility(vcpu->kvm, 82)) {
3577 vcpu->arch.sie_block->fpf &= ~FPF_BPBC;
3578 vcpu->arch.sie_block->fpf |= kvm_run->s.regs.bpbc ? FPF_BPBC : 0;
3579 }
Christian Borntraeger31d8b8d2016-11-10 14:22:02 +01003580 save_access_regs(vcpu->arch.host_acrs);
3581 restore_access_regs(vcpu->run->s.regs.acrs);
Christian Borntraegere1788bb2016-11-22 09:29:38 +01003582 /* save host (userspace) fprs/vrs */
3583 save_fpu_regs();
3584 vcpu->arch.host_fpregs.fpc = current->thread.fpu.fpc;
3585 vcpu->arch.host_fpregs.regs = current->thread.fpu.regs;
3586 if (MACHINE_HAS_VX)
3587 current->thread.fpu.regs = vcpu->run->s.regs.vrs;
3588 else
3589 current->thread.fpu.regs = vcpu->run->s.regs.fprs;
3590 current->thread.fpu.fpc = vcpu->run->s.regs.fpc;
3591 if (test_fp_ctl(current->thread.fpu.fpc))
3592 /* User space provided an invalid FPC, let's clear it */
3593 current->thread.fpu.fpc = 0;
Fan Zhang4e0b1ab2016-11-29 07:17:55 +01003594 if (MACHINE_HAS_GS) {
3595 preempt_disable();
3596 __ctl_set_bit(2, 4);
3597 if (current->thread.gs_cb) {
3598 vcpu->arch.host_gscb = current->thread.gs_cb;
3599 save_gs_cb(vcpu->arch.host_gscb);
3600 }
3601 if (vcpu->arch.gs_enabled) {
3602 current->thread.gs_cb = (struct gs_cb *)
3603 &vcpu->run->s.regs.gscb;
3604 restore_gs_cb(current->thread.gs_cb);
3605 }
3606 preempt_enable();
3607 }
Christian Borntraegera3da7b42018-03-08 16:08:49 +00003608 /* SIE will load etoken directly from SDNX and therefore kvm_run */
Fan Zhang80cd8762016-08-15 04:53:22 +02003609
David Hildenbrandb028ee32014-07-17 10:47:43 +02003610 kvm_run->kvm_dirty_regs = 0;
3611}
3612
3613static void store_regs(struct kvm_vcpu *vcpu, struct kvm_run *kvm_run)
3614{
3615 kvm_run->psw_mask = vcpu->arch.sie_block->gpsw.mask;
3616 kvm_run->psw_addr = vcpu->arch.sie_block->gpsw.addr;
3617 kvm_run->s.regs.prefix = kvm_s390_get_prefix(vcpu);
3618 memcpy(&kvm_run->s.regs.crs, &vcpu->arch.sie_block->gcr, 128);
David Hildenbrand4287f242016-02-15 09:40:12 +01003619 kvm_run->s.regs.cputm = kvm_s390_get_cpu_timer(vcpu);
David Hildenbrandb028ee32014-07-17 10:47:43 +02003620 kvm_run->s.regs.ckc = vcpu->arch.sie_block->ckc;
3621 kvm_run->s.regs.todpr = vcpu->arch.sie_block->todpr;
3622 kvm_run->s.regs.pp = vcpu->arch.sie_block->pp;
3623 kvm_run->s.regs.gbea = vcpu->arch.sie_block->gbea;
3624 kvm_run->s.regs.pft = vcpu->arch.pfault_token;
3625 kvm_run->s.regs.pfs = vcpu->arch.pfault_select;
3626 kvm_run->s.regs.pfc = vcpu->arch.pfault_compare;
Christian Borntraeger35b3fde2018-01-17 14:44:34 +01003627 kvm_run->s.regs.bpbc = (vcpu->arch.sie_block->fpf & FPF_BPBC) == FPF_BPBC;
Christian Borntraeger31d8b8d2016-11-10 14:22:02 +01003628 save_access_regs(vcpu->run->s.regs.acrs);
3629 restore_access_regs(vcpu->arch.host_acrs);
Christian Borntraegere1788bb2016-11-22 09:29:38 +01003630 /* Save guest register state */
3631 save_fpu_regs();
3632 vcpu->run->s.regs.fpc = current->thread.fpu.fpc;
3633 /* Restore will be done lazily at return */
3634 current->thread.fpu.fpc = vcpu->arch.host_fpregs.fpc;
3635 current->thread.fpu.regs = vcpu->arch.host_fpregs.regs;
Fan Zhang4e0b1ab2016-11-29 07:17:55 +01003636 if (MACHINE_HAS_GS) {
3637 __ctl_set_bit(2, 4);
3638 if (vcpu->arch.gs_enabled)
3639 save_gs_cb(current->thread.gs_cb);
3640 preempt_disable();
3641 current->thread.gs_cb = vcpu->arch.host_gscb;
3642 restore_gs_cb(vcpu->arch.host_gscb);
3643 preempt_enable();
3644 if (!vcpu->arch.host_gscb)
3645 __ctl_clear_bit(2, 4);
3646 vcpu->arch.host_gscb = NULL;
3647 }
Christian Borntraegera3da7b42018-03-08 16:08:49 +00003648 /* SIE will save etoken directly into SDNX and therefore kvm_run */
David Hildenbrandb028ee32014-07-17 10:47:43 +02003649}
3650
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003651int kvm_arch_vcpu_ioctl_run(struct kvm_vcpu *vcpu, struct kvm_run *kvm_run)
3652{
Christian Borntraeger8f2abe62008-03-25 18:47:23 +01003653 int rc;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003654
Paolo Bonzini460df4c2017-02-08 11:50:15 +01003655 if (kvm_run->immediate_exit)
3656 return -EINTR;
3657
Christoffer Dallaccb7572017-12-04 21:35:25 +01003658 vcpu_load(vcpu);
3659
David Hildenbrand27291e22014-01-23 12:26:52 +01003660 if (guestdbg_exit_pending(vcpu)) {
3661 kvm_s390_prepare_debug_exit(vcpu);
Christoffer Dallaccb7572017-12-04 21:35:25 +01003662 rc = 0;
3663 goto out;
David Hildenbrand27291e22014-01-23 12:26:52 +01003664 }
3665
Jan H. Schönherr20b70352017-11-24 22:39:01 +01003666 kvm_sigset_activate(vcpu);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003667
David Hildenbrand6352e4d2014-04-10 17:35:00 +02003668 if (!kvm_s390_user_cpu_state_ctrl(vcpu->kvm)) {
3669 kvm_s390_vcpu_start(vcpu);
3670 } else if (is_vcpu_stopped(vcpu)) {
David Hildenbrandea2cdd22015-05-20 13:24:02 +02003671 pr_err_ratelimited("can't run stopped vcpu %d\n",
David Hildenbrand6352e4d2014-04-10 17:35:00 +02003672 vcpu->vcpu_id);
Christoffer Dallaccb7572017-12-04 21:35:25 +01003673 rc = -EINVAL;
3674 goto out;
David Hildenbrand6352e4d2014-04-10 17:35:00 +02003675 }
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003676
David Hildenbrandb028ee32014-07-17 10:47:43 +02003677 sync_regs(vcpu, kvm_run);
David Hildenbranddb0758b2016-02-15 09:42:25 +01003678 enable_cpu_timer_accounting(vcpu);
Carsten Otted7b0b5e2009-11-19 14:21:16 +01003679
Heiko Carstensdab4079d2009-06-12 10:26:32 +02003680 might_fault();
Thomas Hutha76ccff2013-09-12 10:33:44 +02003681 rc = __vcpu_run(vcpu);
Christian Ehrhardt9ace9032009-05-20 15:34:55 +02003682
Christian Ehrhardtb1d16c42009-05-20 15:34:56 +02003683 if (signal_pending(current) && !rc) {
3684 kvm_run->exit_reason = KVM_EXIT_INTR;
Christian Borntraeger8f2abe62008-03-25 18:47:23 +01003685 rc = -EINTR;
Christian Ehrhardtb1d16c42009-05-20 15:34:56 +02003686 }
Christian Borntraeger8f2abe62008-03-25 18:47:23 +01003687
David Hildenbrand27291e22014-01-23 12:26:52 +01003688 if (guestdbg_exit_pending(vcpu) && !rc) {
3689 kvm_s390_prepare_debug_exit(vcpu);
3690 rc = 0;
3691 }
3692
Christian Borntraeger8f2abe62008-03-25 18:47:23 +01003693 if (rc == -EREMOTE) {
David Hildenbrand71f116b2015-10-19 16:24:28 +02003694 /* userspace support is needed, kvm_run has been prepared */
Christian Borntraeger8f2abe62008-03-25 18:47:23 +01003695 rc = 0;
3696 }
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003697
David Hildenbranddb0758b2016-02-15 09:42:25 +01003698 disable_cpu_timer_accounting(vcpu);
David Hildenbrandb028ee32014-07-17 10:47:43 +02003699 store_regs(vcpu, kvm_run);
Carsten Otted7b0b5e2009-11-19 14:21:16 +01003700
Jan H. Schönherr20b70352017-11-24 22:39:01 +01003701 kvm_sigset_deactivate(vcpu);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003702
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003703 vcpu->stat.exit_userspace++;
Christoffer Dallaccb7572017-12-04 21:35:25 +01003704out:
3705 vcpu_put(vcpu);
Heiko Carstens7e8e6ab2008-04-04 15:12:35 +02003706 return rc;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003707}
3708
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003709/*
3710 * store status at address
3711 * we use have two special cases:
3712 * KVM_S390_STORE_STATUS_NOADDR: -> 0x1200 on 64 bit
3713 * KVM_S390_STORE_STATUS_PREFIXED: -> prefix
3714 */
Heiko Carstensd0bce602014-01-01 16:45:58 +01003715int kvm_s390_store_status_unloaded(struct kvm_vcpu *vcpu, unsigned long gpa)
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003716{
Carsten Otte092670c2011-07-24 10:48:22 +02003717 unsigned char archmode = 1;
David Hildenbrand9abc2a02016-01-14 22:12:47 +01003718 freg_t fprs[NUM_FPRS];
Michael Muellerfda902c2014-05-13 16:58:30 +02003719 unsigned int px;
David Hildenbrand4287f242016-02-15 09:40:12 +01003720 u64 clkcomp, cputm;
Heiko Carstensd0bce602014-01-01 16:45:58 +01003721 int rc;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003722
Martin Schwidefskyd9a3a092015-10-23 09:02:32 +02003723 px = kvm_s390_get_prefix(vcpu);
Heiko Carstensd0bce602014-01-01 16:45:58 +01003724 if (gpa == KVM_S390_STORE_STATUS_NOADDR) {
3725 if (write_guest_abs(vcpu, 163, &archmode, 1))
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003726 return -EFAULT;
Martin Schwidefskyd9a3a092015-10-23 09:02:32 +02003727 gpa = 0;
Heiko Carstensd0bce602014-01-01 16:45:58 +01003728 } else if (gpa == KVM_S390_STORE_STATUS_PREFIXED) {
3729 if (write_guest_real(vcpu, 163, &archmode, 1))
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003730 return -EFAULT;
Martin Schwidefskyd9a3a092015-10-23 09:02:32 +02003731 gpa = px;
3732 } else
3733 gpa -= __LC_FPREGS_SAVE_AREA;
David Hildenbrand9abc2a02016-01-14 22:12:47 +01003734
3735 /* manually convert vector registers if necessary */
3736 if (MACHINE_HAS_VX) {
David Hildenbrand9522b372016-03-08 12:24:30 +01003737 convert_vx_to_fp(fprs, (__vector128 *) vcpu->run->s.regs.vrs);
David Hildenbrand9abc2a02016-01-14 22:12:47 +01003738 rc = write_guest_abs(vcpu, gpa + __LC_FPREGS_SAVE_AREA,
3739 fprs, 128);
3740 } else {
3741 rc = write_guest_abs(vcpu, gpa + __LC_FPREGS_SAVE_AREA,
David Hildenbrand6fd8e672016-01-18 14:46:34 +01003742 vcpu->run->s.regs.fprs, 128);
David Hildenbrand9abc2a02016-01-14 22:12:47 +01003743 }
Martin Schwidefskyd9a3a092015-10-23 09:02:32 +02003744 rc |= write_guest_abs(vcpu, gpa + __LC_GPREGS_SAVE_AREA,
Heiko Carstensd0bce602014-01-01 16:45:58 +01003745 vcpu->run->s.regs.gprs, 128);
Martin Schwidefskyd9a3a092015-10-23 09:02:32 +02003746 rc |= write_guest_abs(vcpu, gpa + __LC_PSW_SAVE_AREA,
Heiko Carstensd0bce602014-01-01 16:45:58 +01003747 &vcpu->arch.sie_block->gpsw, 16);
Martin Schwidefskyd9a3a092015-10-23 09:02:32 +02003748 rc |= write_guest_abs(vcpu, gpa + __LC_PREFIX_SAVE_AREA,
Michael Muellerfda902c2014-05-13 16:58:30 +02003749 &px, 4);
Martin Schwidefskyd9a3a092015-10-23 09:02:32 +02003750 rc |= write_guest_abs(vcpu, gpa + __LC_FP_CREG_SAVE_AREA,
David Hildenbrand9abc2a02016-01-14 22:12:47 +01003751 &vcpu->run->s.regs.fpc, 4);
Martin Schwidefskyd9a3a092015-10-23 09:02:32 +02003752 rc |= write_guest_abs(vcpu, gpa + __LC_TOD_PROGREG_SAVE_AREA,
Heiko Carstensd0bce602014-01-01 16:45:58 +01003753 &vcpu->arch.sie_block->todpr, 4);
David Hildenbrand4287f242016-02-15 09:40:12 +01003754 cputm = kvm_s390_get_cpu_timer(vcpu);
Martin Schwidefskyd9a3a092015-10-23 09:02:32 +02003755 rc |= write_guest_abs(vcpu, gpa + __LC_CPU_TIMER_SAVE_AREA,
David Hildenbrand4287f242016-02-15 09:40:12 +01003756 &cputm, 8);
Thomas Huth178bd782013-11-13 20:28:18 +01003757 clkcomp = vcpu->arch.sie_block->ckc >> 8;
Martin Schwidefskyd9a3a092015-10-23 09:02:32 +02003758 rc |= write_guest_abs(vcpu, gpa + __LC_CLOCK_COMP_SAVE_AREA,
Heiko Carstensd0bce602014-01-01 16:45:58 +01003759 &clkcomp, 8);
Martin Schwidefskyd9a3a092015-10-23 09:02:32 +02003760 rc |= write_guest_abs(vcpu, gpa + __LC_AREGS_SAVE_AREA,
Heiko Carstensd0bce602014-01-01 16:45:58 +01003761 &vcpu->run->s.regs.acrs, 64);
Martin Schwidefskyd9a3a092015-10-23 09:02:32 +02003762 rc |= write_guest_abs(vcpu, gpa + __LC_CREGS_SAVE_AREA,
Heiko Carstensd0bce602014-01-01 16:45:58 +01003763 &vcpu->arch.sie_block->gcr, 128);
3764 return rc ? -EFAULT : 0;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003765}
3766
Thomas Huthe8798922013-11-06 15:46:33 +01003767int kvm_s390_vcpu_store_status(struct kvm_vcpu *vcpu, unsigned long addr)
3768{
3769 /*
3770 * The guest FPRS and ACRS are in the host FPRS/ACRS due to the lazy
Christian Borntraeger31d8b8d2016-11-10 14:22:02 +01003771 * switch in the run ioctl. Let's update our copies before we save
Thomas Huthe8798922013-11-06 15:46:33 +01003772 * it into the save area
3773 */
Hendrik Bruecknerd0164ee2015-06-29 16:43:06 +02003774 save_fpu_regs();
David Hildenbrand9abc2a02016-01-14 22:12:47 +01003775 vcpu->run->s.regs.fpc = current->thread.fpu.fpc;
Thomas Huthe8798922013-11-06 15:46:33 +01003776 save_access_regs(vcpu->run->s.regs.acrs);
3777
3778 return kvm_s390_store_status_unloaded(vcpu, addr);
3779}
3780
David Hildenbrand8ad35752014-03-14 11:00:21 +01003781static void __disable_ibs_on_vcpu(struct kvm_vcpu *vcpu)
3782{
3783 kvm_check_request(KVM_REQ_ENABLE_IBS, vcpu);
Christian Borntraeger8e236542015-04-09 13:49:04 +02003784 kvm_s390_sync_request(KVM_REQ_DISABLE_IBS, vcpu);
David Hildenbrand8ad35752014-03-14 11:00:21 +01003785}
3786
3787static void __disable_ibs_on_all_vcpus(struct kvm *kvm)
3788{
3789 unsigned int i;
3790 struct kvm_vcpu *vcpu;
3791
3792 kvm_for_each_vcpu(i, vcpu, kvm) {
3793 __disable_ibs_on_vcpu(vcpu);
3794 }
3795}
3796
3797static void __enable_ibs_on_vcpu(struct kvm_vcpu *vcpu)
3798{
David Hildenbrand09a400e2016-04-04 15:57:08 +02003799 if (!sclp.has_ibs)
3800 return;
David Hildenbrand8ad35752014-03-14 11:00:21 +01003801 kvm_check_request(KVM_REQ_DISABLE_IBS, vcpu);
Christian Borntraeger8e236542015-04-09 13:49:04 +02003802 kvm_s390_sync_request(KVM_REQ_ENABLE_IBS, vcpu);
David Hildenbrand8ad35752014-03-14 11:00:21 +01003803}
3804
David Hildenbrand6852d7b2014-03-14 10:59:29 +01003805void kvm_s390_vcpu_start(struct kvm_vcpu *vcpu)
3806{
David Hildenbrand8ad35752014-03-14 11:00:21 +01003807 int i, online_vcpus, started_vcpus = 0;
3808
3809 if (!is_vcpu_stopped(vcpu))
3810 return;
3811
David Hildenbrand6852d7b2014-03-14 10:59:29 +01003812 trace_kvm_s390_vcpu_start_stop(vcpu->vcpu_id, 1);
David Hildenbrand8ad35752014-03-14 11:00:21 +01003813 /* Only one cpu at a time may enter/leave the STOPPED state. */
David Hildenbrand433b9ee2014-05-06 16:11:14 +02003814 spin_lock(&vcpu->kvm->arch.start_stop_lock);
David Hildenbrand8ad35752014-03-14 11:00:21 +01003815 online_vcpus = atomic_read(&vcpu->kvm->online_vcpus);
3816
3817 for (i = 0; i < online_vcpus; i++) {
3818 if (!is_vcpu_stopped(vcpu->kvm->vcpus[i]))
3819 started_vcpus++;
3820 }
3821
3822 if (started_vcpus == 0) {
3823 /* we're the only active VCPU -> speed it up */
3824 __enable_ibs_on_vcpu(vcpu);
3825 } else if (started_vcpus == 1) {
3826 /*
3827 * As we are starting a second VCPU, we have to disable
3828 * the IBS facility on all VCPUs to remove potentially
3829 * oustanding ENABLE requests.
3830 */
3831 __disable_ibs_on_all_vcpus(vcpu->kvm);
3832 }
3833
David Hildenbrand9daecfc2018-01-23 18:05:30 +01003834 kvm_s390_clear_cpuflags(vcpu, CPUSTAT_STOPPED);
David Hildenbrand8ad35752014-03-14 11:00:21 +01003835 /*
3836 * Another VCPU might have used IBS while we were offline.
3837 * Let's play safe and flush the VCPU at startup.
3838 */
David Hildenbrandd3d692c2014-07-29 08:53:36 +02003839 kvm_make_request(KVM_REQ_TLB_FLUSH, vcpu);
David Hildenbrand433b9ee2014-05-06 16:11:14 +02003840 spin_unlock(&vcpu->kvm->arch.start_stop_lock);
David Hildenbrand8ad35752014-03-14 11:00:21 +01003841 return;
David Hildenbrand6852d7b2014-03-14 10:59:29 +01003842}
3843
3844void kvm_s390_vcpu_stop(struct kvm_vcpu *vcpu)
3845{
David Hildenbrand8ad35752014-03-14 11:00:21 +01003846 int i, online_vcpus, started_vcpus = 0;
3847 struct kvm_vcpu *started_vcpu = NULL;
3848
3849 if (is_vcpu_stopped(vcpu))
3850 return;
3851
David Hildenbrand6852d7b2014-03-14 10:59:29 +01003852 trace_kvm_s390_vcpu_start_stop(vcpu->vcpu_id, 0);
David Hildenbrand8ad35752014-03-14 11:00:21 +01003853 /* Only one cpu at a time may enter/leave the STOPPED state. */
David Hildenbrand433b9ee2014-05-06 16:11:14 +02003854 spin_lock(&vcpu->kvm->arch.start_stop_lock);
David Hildenbrand8ad35752014-03-14 11:00:21 +01003855 online_vcpus = atomic_read(&vcpu->kvm->online_vcpus);
3856
David Hildenbrand32f5ff632014-04-14 12:40:03 +02003857 /* SIGP STOP and SIGP STOP AND STORE STATUS has been fully processed */
David Hildenbrand6cddd432014-10-15 16:48:53 +02003858 kvm_s390_clear_stop_irq(vcpu);
David Hildenbrand32f5ff632014-04-14 12:40:03 +02003859
David Hildenbrandef8f4f42018-01-23 18:05:29 +01003860 kvm_s390_set_cpuflags(vcpu, CPUSTAT_STOPPED);
David Hildenbrand8ad35752014-03-14 11:00:21 +01003861 __disable_ibs_on_vcpu(vcpu);
3862
3863 for (i = 0; i < online_vcpus; i++) {
3864 if (!is_vcpu_stopped(vcpu->kvm->vcpus[i])) {
3865 started_vcpus++;
3866 started_vcpu = vcpu->kvm->vcpus[i];
3867 }
3868 }
3869
3870 if (started_vcpus == 1) {
3871 /*
3872 * As we only have one VCPU left, we want to enable the
3873 * IBS facility for that VCPU to speed it up.
3874 */
3875 __enable_ibs_on_vcpu(started_vcpu);
3876 }
3877
David Hildenbrand433b9ee2014-05-06 16:11:14 +02003878 spin_unlock(&vcpu->kvm->arch.start_stop_lock);
David Hildenbrand8ad35752014-03-14 11:00:21 +01003879 return;
David Hildenbrand6852d7b2014-03-14 10:59:29 +01003880}
3881
Cornelia Huckd6712df2012-12-20 15:32:11 +01003882static int kvm_vcpu_ioctl_enable_cap(struct kvm_vcpu *vcpu,
3883 struct kvm_enable_cap *cap)
3884{
3885 int r;
3886
3887 if (cap->flags)
3888 return -EINVAL;
3889
3890 switch (cap->cap) {
Cornelia Huckfa6b7fe2012-12-20 15:32:12 +01003891 case KVM_CAP_S390_CSS_SUPPORT:
3892 if (!vcpu->kvm->arch.css_support) {
3893 vcpu->kvm->arch.css_support = 1;
Christian Borntraegerc92ea7b2015-07-22 15:52:10 +02003894 VM_EVENT(vcpu->kvm, 3, "%s", "ENABLE: CSS support");
Cornelia Huckfa6b7fe2012-12-20 15:32:12 +01003895 trace_kvm_s390_enable_css(vcpu->kvm);
3896 }
3897 r = 0;
3898 break;
Cornelia Huckd6712df2012-12-20 15:32:11 +01003899 default:
3900 r = -EINVAL;
3901 break;
3902 }
3903 return r;
3904}
3905
Thomas Huth41408c282015-02-06 15:01:21 +01003906static long kvm_s390_guest_mem_op(struct kvm_vcpu *vcpu,
3907 struct kvm_s390_mem_op *mop)
3908{
3909 void __user *uaddr = (void __user *)mop->buf;
3910 void *tmpbuf = NULL;
3911 int r, srcu_idx;
3912 const u64 supported_flags = KVM_S390_MEMOP_F_INJECT_EXCEPTION
3913 | KVM_S390_MEMOP_F_CHECK_ONLY;
3914
3915 if (mop->flags & ~supported_flags)
3916 return -EINVAL;
3917
3918 if (mop->size > MEM_OP_MAX_SIZE)
3919 return -E2BIG;
3920
3921 if (!(mop->flags & KVM_S390_MEMOP_F_CHECK_ONLY)) {
3922 tmpbuf = vmalloc(mop->size);
3923 if (!tmpbuf)
3924 return -ENOMEM;
3925 }
3926
3927 srcu_idx = srcu_read_lock(&vcpu->kvm->srcu);
3928
3929 switch (mop->op) {
3930 case KVM_S390_MEMOP_LOGICAL_READ:
3931 if (mop->flags & KVM_S390_MEMOP_F_CHECK_ONLY) {
David Hildenbrand92c96322015-11-16 15:42:11 +01003932 r = check_gva_range(vcpu, mop->gaddr, mop->ar,
3933 mop->size, GACC_FETCH);
Thomas Huth41408c282015-02-06 15:01:21 +01003934 break;
3935 }
3936 r = read_guest(vcpu, mop->gaddr, mop->ar, tmpbuf, mop->size);
3937 if (r == 0) {
3938 if (copy_to_user(uaddr, tmpbuf, mop->size))
3939 r = -EFAULT;
3940 }
3941 break;
3942 case KVM_S390_MEMOP_LOGICAL_WRITE:
3943 if (mop->flags & KVM_S390_MEMOP_F_CHECK_ONLY) {
David Hildenbrand92c96322015-11-16 15:42:11 +01003944 r = check_gva_range(vcpu, mop->gaddr, mop->ar,
3945 mop->size, GACC_STORE);
Thomas Huth41408c282015-02-06 15:01:21 +01003946 break;
3947 }
3948 if (copy_from_user(tmpbuf, uaddr, mop->size)) {
3949 r = -EFAULT;
3950 break;
3951 }
3952 r = write_guest(vcpu, mop->gaddr, mop->ar, tmpbuf, mop->size);
3953 break;
3954 default:
3955 r = -EINVAL;
3956 }
3957
3958 srcu_read_unlock(&vcpu->kvm->srcu, srcu_idx);
3959
3960 if (r > 0 && (mop->flags & KVM_S390_MEMOP_F_INJECT_EXCEPTION) != 0)
3961 kvm_s390_inject_prog_irq(vcpu, &vcpu->arch.pgm);
3962
3963 vfree(tmpbuf);
3964 return r;
3965}
3966
Paolo Bonzini5cb09442017-12-12 17:41:34 +01003967long kvm_arch_vcpu_async_ioctl(struct file *filp,
3968 unsigned int ioctl, unsigned long arg)
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003969{
3970 struct kvm_vcpu *vcpu = filp->private_data;
3971 void __user *argp = (void __user *)arg;
3972
Avi Kivity93736622010-05-13 12:35:17 +03003973 switch (ioctl) {
Jens Freimann47b43c52014-11-11 20:57:06 +01003974 case KVM_S390_IRQ: {
3975 struct kvm_s390_irq s390irq;
3976
Jens Freimann47b43c52014-11-11 20:57:06 +01003977 if (copy_from_user(&s390irq, argp, sizeof(s390irq)))
Christoffer Dall9b0624712017-12-04 21:35:36 +01003978 return -EFAULT;
3979 return kvm_s390_inject_vcpu(vcpu, &s390irq);
Jens Freimann47b43c52014-11-11 20:57:06 +01003980 }
Avi Kivity93736622010-05-13 12:35:17 +03003981 case KVM_S390_INTERRUPT: {
Carsten Otteba5c1e92008-03-25 18:47:26 +01003982 struct kvm_s390_interrupt s390int;
Jens Freimann383d0b02014-07-29 15:11:49 +02003983 struct kvm_s390_irq s390irq;
Carsten Otteba5c1e92008-03-25 18:47:26 +01003984
3985 if (copy_from_user(&s390int, argp, sizeof(s390int)))
Christoffer Dall9b0624712017-12-04 21:35:36 +01003986 return -EFAULT;
Jens Freimann383d0b02014-07-29 15:11:49 +02003987 if (s390int_to_s390irq(&s390int, &s390irq))
3988 return -EINVAL;
Christoffer Dall9b0624712017-12-04 21:35:36 +01003989 return kvm_s390_inject_vcpu(vcpu, &s390irq);
Carsten Otteba5c1e92008-03-25 18:47:26 +01003990 }
Christoffer Dall9b0624712017-12-04 21:35:36 +01003991 }
Paolo Bonzini5cb09442017-12-12 17:41:34 +01003992 return -ENOIOCTLCMD;
3993}
3994
3995long kvm_arch_vcpu_ioctl(struct file *filp,
3996 unsigned int ioctl, unsigned long arg)
3997{
3998 struct kvm_vcpu *vcpu = filp->private_data;
3999 void __user *argp = (void __user *)arg;
4000 int idx;
4001 long r;
Christoffer Dall9b0624712017-12-04 21:35:36 +01004002
4003 vcpu_load(vcpu);
4004
4005 switch (ioctl) {
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004006 case KVM_S390_STORE_STATUS:
Thomas Huth800c1062013-09-12 10:33:45 +02004007 idx = srcu_read_lock(&vcpu->kvm->srcu);
Avi Kivitybc923cc2010-05-13 12:21:46 +03004008 r = kvm_s390_vcpu_store_status(vcpu, arg);
Thomas Huth800c1062013-09-12 10:33:45 +02004009 srcu_read_unlock(&vcpu->kvm->srcu, idx);
Avi Kivitybc923cc2010-05-13 12:21:46 +03004010 break;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004011 case KVM_S390_SET_INITIAL_PSW: {
4012 psw_t psw;
4013
Avi Kivitybc923cc2010-05-13 12:21:46 +03004014 r = -EFAULT;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004015 if (copy_from_user(&psw, argp, sizeof(psw)))
Avi Kivitybc923cc2010-05-13 12:21:46 +03004016 break;
4017 r = kvm_arch_vcpu_ioctl_set_initial_psw(vcpu, psw);
4018 break;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004019 }
4020 case KVM_S390_INITIAL_RESET:
Avi Kivitybc923cc2010-05-13 12:21:46 +03004021 r = kvm_arch_vcpu_ioctl_initial_reset(vcpu);
4022 break;
Carsten Otte14eebd92012-05-15 14:15:26 +02004023 case KVM_SET_ONE_REG:
4024 case KVM_GET_ONE_REG: {
4025 struct kvm_one_reg reg;
4026 r = -EFAULT;
4027 if (copy_from_user(&reg, argp, sizeof(reg)))
4028 break;
4029 if (ioctl == KVM_SET_ONE_REG)
4030 r = kvm_arch_vcpu_ioctl_set_one_reg(vcpu, &reg);
4031 else
4032 r = kvm_arch_vcpu_ioctl_get_one_reg(vcpu, &reg);
4033 break;
4034 }
Carsten Otte27e03932012-01-04 10:25:21 +01004035#ifdef CONFIG_KVM_S390_UCONTROL
4036 case KVM_S390_UCAS_MAP: {
4037 struct kvm_s390_ucas_mapping ucasmap;
4038
4039 if (copy_from_user(&ucasmap, argp, sizeof(ucasmap))) {
4040 r = -EFAULT;
4041 break;
4042 }
4043
4044 if (!kvm_is_ucontrol(vcpu->kvm)) {
4045 r = -EINVAL;
4046 break;
4047 }
4048
4049 r = gmap_map_segment(vcpu->arch.gmap, ucasmap.user_addr,
4050 ucasmap.vcpu_addr, ucasmap.length);
4051 break;
4052 }
4053 case KVM_S390_UCAS_UNMAP: {
4054 struct kvm_s390_ucas_mapping ucasmap;
4055
4056 if (copy_from_user(&ucasmap, argp, sizeof(ucasmap))) {
4057 r = -EFAULT;
4058 break;
4059 }
4060
4061 if (!kvm_is_ucontrol(vcpu->kvm)) {
4062 r = -EINVAL;
4063 break;
4064 }
4065
4066 r = gmap_unmap_segment(vcpu->arch.gmap, ucasmap.vcpu_addr,
4067 ucasmap.length);
4068 break;
4069 }
4070#endif
Carsten Otteccc79102012-01-04 10:25:26 +01004071 case KVM_S390_VCPU_FAULT: {
Martin Schwidefsky527e30b2014-04-30 16:04:25 +02004072 r = gmap_fault(vcpu->arch.gmap, arg, 0);
Carsten Otteccc79102012-01-04 10:25:26 +01004073 break;
4074 }
Cornelia Huckd6712df2012-12-20 15:32:11 +01004075 case KVM_ENABLE_CAP:
4076 {
4077 struct kvm_enable_cap cap;
4078 r = -EFAULT;
4079 if (copy_from_user(&cap, argp, sizeof(cap)))
4080 break;
4081 r = kvm_vcpu_ioctl_enable_cap(vcpu, &cap);
4082 break;
4083 }
Thomas Huth41408c282015-02-06 15:01:21 +01004084 case KVM_S390_MEM_OP: {
4085 struct kvm_s390_mem_op mem_op;
4086
4087 if (copy_from_user(&mem_op, argp, sizeof(mem_op)) == 0)
4088 r = kvm_s390_guest_mem_op(vcpu, &mem_op);
4089 else
4090 r = -EFAULT;
4091 break;
4092 }
Jens Freimann816c7662014-11-24 17:13:46 +01004093 case KVM_S390_SET_IRQ_STATE: {
4094 struct kvm_s390_irq_state irq_state;
4095
4096 r = -EFAULT;
4097 if (copy_from_user(&irq_state, argp, sizeof(irq_state)))
4098 break;
4099 if (irq_state.len > VCPU_IRQS_MAX_BUF ||
4100 irq_state.len == 0 ||
4101 irq_state.len % sizeof(struct kvm_s390_irq) > 0) {
4102 r = -EINVAL;
4103 break;
4104 }
Christian Borntraegerbb64da92017-11-21 16:02:52 +01004105 /* do not use irq_state.flags, it will break old QEMUs */
Jens Freimann816c7662014-11-24 17:13:46 +01004106 r = kvm_s390_set_irq_state(vcpu,
4107 (void __user *) irq_state.buf,
4108 irq_state.len);
4109 break;
4110 }
4111 case KVM_S390_GET_IRQ_STATE: {
4112 struct kvm_s390_irq_state irq_state;
4113
4114 r = -EFAULT;
4115 if (copy_from_user(&irq_state, argp, sizeof(irq_state)))
4116 break;
4117 if (irq_state.len == 0) {
4118 r = -EINVAL;
4119 break;
4120 }
Christian Borntraegerbb64da92017-11-21 16:02:52 +01004121 /* do not use irq_state.flags, it will break old QEMUs */
Jens Freimann816c7662014-11-24 17:13:46 +01004122 r = kvm_s390_get_irq_state(vcpu,
4123 (__u8 __user *) irq_state.buf,
4124 irq_state.len);
4125 break;
4126 }
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004127 default:
Carsten Otte3e6afcf2012-01-04 10:25:30 +01004128 r = -ENOTTY;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004129 }
Christoffer Dall9b0624712017-12-04 21:35:36 +01004130
4131 vcpu_put(vcpu);
Avi Kivitybc923cc2010-05-13 12:21:46 +03004132 return r;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004133}
4134
Souptick Joarder1499fa82018-04-19 00:49:58 +05304135vm_fault_t kvm_arch_vcpu_fault(struct kvm_vcpu *vcpu, struct vm_fault *vmf)
Carsten Otte5b1c1492012-01-04 10:25:23 +01004136{
4137#ifdef CONFIG_KVM_S390_UCONTROL
4138 if ((vmf->pgoff == KVM_S390_SIE_PAGE_OFFSET)
4139 && (kvm_is_ucontrol(vcpu->kvm))) {
4140 vmf->page = virt_to_page(vcpu->arch.sie_block);
4141 get_page(vmf->page);
4142 return 0;
4143 }
4144#endif
4145 return VM_FAULT_SIGBUS;
4146}
4147
Aneesh Kumar K.V55870272013-10-07 22:18:00 +05304148int kvm_arch_create_memslot(struct kvm *kvm, struct kvm_memory_slot *slot,
4149 unsigned long npages)
Takuya Yoshikawadb3fe4e2012-02-08 13:02:18 +09004150{
4151 return 0;
4152}
4153
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004154/* Section: memory related */
Marcelo Tosattif7784b82009-12-23 14:35:18 -02004155int kvm_arch_prepare_memory_region(struct kvm *kvm,
4156 struct kvm_memory_slot *memslot,
Paolo Bonzini09170a42015-05-18 13:59:39 +02004157 const struct kvm_userspace_memory_region *mem,
Takuya Yoshikawa7b6195a2013-02-27 19:44:34 +09004158 enum kvm_mr_change change)
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004159{
Nick Wangdd2887e2013-03-25 17:22:57 +01004160 /* A few sanity checks. We can have memory slots which have to be
4161 located/ended at a segment boundary (1MB). The memory in userland is
4162 ok to be fragmented into various different vmas. It is okay to mmap()
4163 and munmap() stuff in this slot after doing this call at any time */
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004164
Carsten Otte598841c2011-07-24 10:48:21 +02004165 if (mem->userspace_addr & 0xffffful)
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004166 return -EINVAL;
4167
Carsten Otte598841c2011-07-24 10:48:21 +02004168 if (mem->memory_size & 0xffffful)
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004169 return -EINVAL;
4170
Dominik Dingela3a92c32014-12-01 17:24:42 +01004171 if (mem->guest_phys_addr + mem->memory_size > kvm->arch.mem_limit)
4172 return -EINVAL;
4173
Marcelo Tosattif7784b82009-12-23 14:35:18 -02004174 return 0;
4175}
4176
4177void kvm_arch_commit_memory_region(struct kvm *kvm,
Paolo Bonzini09170a42015-05-18 13:59:39 +02004178 const struct kvm_userspace_memory_region *mem,
Takuya Yoshikawa84826442013-02-27 19:45:25 +09004179 const struct kvm_memory_slot *old,
Paolo Bonzinif36f3f22015-05-18 13:20:23 +02004180 const struct kvm_memory_slot *new,
Takuya Yoshikawa84826442013-02-27 19:45:25 +09004181 enum kvm_mr_change change)
Marcelo Tosattif7784b82009-12-23 14:35:18 -02004182{
Carsten Ottef7850c92011-07-24 10:48:23 +02004183 int rc;
Marcelo Tosattif7784b82009-12-23 14:35:18 -02004184
Christian Borntraeger2cef4de2013-03-25 17:22:48 +01004185 /* If the basics of the memslot do not change, we do not want
4186 * to update the gmap. Every update causes several unnecessary
4187 * segment translation exceptions. This is usually handled just
4188 * fine by the normal fault handler + gmap, but it will also
4189 * cause faults on the prefix page of running guest CPUs.
4190 */
4191 if (old->userspace_addr == mem->userspace_addr &&
4192 old->base_gfn * PAGE_SIZE == mem->guest_phys_addr &&
4193 old->npages * PAGE_SIZE == mem->memory_size)
4194 return;
Carsten Otte598841c2011-07-24 10:48:21 +02004195
4196 rc = gmap_map_segment(kvm->arch.gmap, mem->userspace_addr,
4197 mem->guest_phys_addr, mem->memory_size);
4198 if (rc)
David Hildenbrandea2cdd22015-05-20 13:24:02 +02004199 pr_warn("failed to commit memory region\n");
Carsten Otte598841c2011-07-24 10:48:21 +02004200 return;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004201}
4202
Alexander Yarygin60a37702016-04-01 15:38:57 +03004203static inline unsigned long nonhyp_mask(int i)
4204{
4205 unsigned int nonhyp_fai = (sclp.hmfai << i * 2) >> 30;
4206
4207 return 0x0000ffffffffffffUL >> (nonhyp_fai << 4);
4208}
4209
Christian Borntraeger3491caf2016-05-13 12:16:35 +02004210void kvm_arch_vcpu_block_finish(struct kvm_vcpu *vcpu)
4211{
4212 vcpu->valid_wakeup = false;
4213}
4214
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004215static int __init kvm_s390_init(void)
4216{
Alexander Yarygin60a37702016-04-01 15:38:57 +03004217 int i;
4218
David Hildenbrand07197fd2015-01-30 16:01:38 +01004219 if (!sclp.has_sief2) {
4220 pr_info("SIE not available\n");
4221 return -ENODEV;
4222 }
4223
Janosch Franka4499382018-07-13 11:28:31 +01004224 if (nested && hpage) {
4225 pr_info("nested (vSIE) and hpage (huge page backing) can currently not be activated concurrently");
4226 return -EINVAL;
4227 }
4228
Alexander Yarygin60a37702016-04-01 15:38:57 +03004229 for (i = 0; i < 16; i++)
Christian Borntraegerc3b9e3e2018-02-09 16:26:29 +00004230 kvm_s390_fac_base[i] |=
Alexander Yarygin60a37702016-04-01 15:38:57 +03004231 S390_lowcore.stfle_fac_list[i] & nonhyp_mask(i);
4232
Michael Mueller9d8d5782015-02-02 15:42:51 +01004233 return kvm_init(NULL, sizeof(struct kvm_vcpu), 0, THIS_MODULE);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004234}
4235
4236static void __exit kvm_s390_exit(void)
4237{
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004238 kvm_exit();
4239}
4240
4241module_init(kvm_s390_init);
4242module_exit(kvm_s390_exit);
Cornelia Huck566af942013-05-27 18:42:33 +02004243
4244/*
4245 * Enable autoloading of the kvm module.
4246 * Note that we add the module alias here instead of virt/kvm/kvm_main.c
4247 * since x86 takes a different approach.
4248 */
4249#include <linux/miscdevice.h>
4250MODULE_ALIAS_MISCDEV(KVM_MINOR);
4251MODULE_ALIAS("devname:kvm");