blob: 57c6838dff373101c4d783a6e712c1ac5b6f6e87 [file] [log] [blame]
Greg Kroah-Hartmand809aa22017-11-24 15:00:33 +01001// SPDX-License-Identifier: GPL-2.0
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002/*
Christian Borntraegerbb64da92017-11-21 16:02:52 +01003 * hosting IBM Z kernel virtual machines (s390x)
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004 *
Christian Borntraegera37cb072018-01-23 13:28:40 +01005 * Copyright IBM Corp. 2008, 2018
Heiko Carstensb0c632d2008-03-25 18:47:20 +01006 *
7 * Author(s): Carsten Otte <cotte@de.ibm.com>
8 * Christian Borntraeger <borntraeger@de.ibm.com>
9 * Heiko Carstens <heiko.carstens@de.ibm.com>
Christian Ehrhardt628eb9b2009-05-25 13:40:51 +020010 * Christian Ehrhardt <ehrhardt@de.ibm.com>
Jason J. Herne15f36eb2012-08-02 10:10:17 -040011 * Jason J. Herne <jjherne@us.ibm.com>
Heiko Carstensb0c632d2008-03-25 18:47:20 +010012 */
13
Michael Mueller7aedd9d2018-12-03 10:20:22 +010014#define KMSG_COMPONENT "kvm-s390"
15#define pr_fmt(fmt) KMSG_COMPONENT ": " fmt
16
Heiko Carstensb0c632d2008-03-25 18:47:20 +010017#include <linux/compiler.h>
18#include <linux/err.h>
19#include <linux/fs.h>
Christian Borntraegerca872302009-05-12 17:21:49 +020020#include <linux/hrtimer.h>
Heiko Carstensb0c632d2008-03-25 18:47:20 +010021#include <linux/init.h>
22#include <linux/kvm.h>
23#include <linux/kvm_host.h>
Martin Schwidefskyb2d73b22016-03-08 11:54:42 +010024#include <linux/mman.h>
Heiko Carstensb0c632d2008-03-25 18:47:20 +010025#include <linux/module.h>
Paul Gortmakerd3217962017-02-09 15:20:25 -050026#include <linux/moduleparam.h>
Tony Krowiaka374e892014-09-03 10:13:53 +020027#include <linux/random.h>
Heiko Carstensb0c632d2008-03-25 18:47:20 +010028#include <linux/slab.h>
Carsten Otteba5c1e92008-03-25 18:47:26 +010029#include <linux/timer.h>
Thomas Huth41408c282015-02-06 15:01:21 +010030#include <linux/vmalloc.h>
David Hildenbrand15c97052015-03-19 17:36:43 +010031#include <linux/bitmap.h>
Ingo Molnar174cd4b2017-02-02 19:15:33 +010032#include <linux/sched/signal.h>
Claudio Imbrenda190df4a2016-08-04 17:54:42 +020033#include <linux/string.h>
Ingo Molnar174cd4b2017-02-02 19:15:33 +010034
Heiko Carstenscbb870c2010-02-26 22:37:43 +010035#include <asm/asm-offsets.h>
Heiko Carstensb0c632d2008-03-25 18:47:20 +010036#include <asm/lowcore.h>
Martin Schwidefskyfd5ada02016-05-31 15:06:51 +020037#include <asm/stp.h>
Heiko Carstensb0c632d2008-03-25 18:47:20 +010038#include <asm/pgtable.h>
Martin Schwidefsky1e133ab2016-03-08 11:49:57 +010039#include <asm/gmap.h>
Heiko Carstensf5daba12009-03-26 15:24:01 +010040#include <asm/nmi.h>
David Howellsa0616cd2012-03-28 18:30:02 +010041#include <asm/switch_to.h>
Jens Freimann6d3da242013-07-03 15:18:35 +020042#include <asm/isc.h>
Christian Borntraeger1526bf92012-05-15 14:15:25 +020043#include <asm/sclp.h>
David Hildenbrand0a763c72016-05-18 16:03:47 +020044#include <asm/cpacf.h>
Linus Torvalds221bb8a2016-08-02 16:11:27 -040045#include <asm/timex.h>
Tony Krowiake585b242018-09-25 19:16:18 -040046#include <asm/ap.h>
Christian Borntraeger8f2abe62008-03-25 18:47:23 +010047#include "kvm-s390.h"
Heiko Carstensb0c632d2008-03-25 18:47:20 +010048#include "gaccess.h"
49
Cornelia Huck5786fff2012-07-23 17:20:29 +020050#define CREATE_TRACE_POINTS
51#include "trace.h"
Cornelia Huckade38c32012-07-23 17:20:30 +020052#include "trace-s390.h"
Cornelia Huck5786fff2012-07-23 17:20:29 +020053
Thomas Huth41408c282015-02-06 15:01:21 +010054#define MEM_OP_MAX_SIZE 65536 /* Maximum transfer size for KVM_S390_MEM_OP */
Jens Freimann816c7662014-11-24 17:13:46 +010055#define LOCAL_IRQS 32
56#define VCPU_IRQS_MAX_BUF (sizeof(struct kvm_s390_irq) * \
57 (KVM_MAX_VCPUS + LOCAL_IRQS))
Thomas Huth41408c282015-02-06 15:01:21 +010058
Heiko Carstensb0c632d2008-03-25 18:47:20 +010059#define VCPU_STAT(x) offsetof(struct kvm_vcpu, stat.x), KVM_STAT_VCPU
Christian Borntraegerccc40c52018-03-08 12:48:05 +000060#define VM_STAT(x) offsetof(struct kvm, stat.x), KVM_STAT_VM
Heiko Carstensb0c632d2008-03-25 18:47:20 +010061
62struct kvm_stats_debugfs_item debugfs_entries[] = {
63 { "userspace_handled", VCPU_STAT(exit_userspace) },
Christian Borntraeger0eaeafa2008-05-07 09:22:53 +020064 { "exit_null", VCPU_STAT(exit_null) },
Christian Borntraeger8f2abe62008-03-25 18:47:23 +010065 { "exit_validity", VCPU_STAT(exit_validity) },
66 { "exit_stop_request", VCPU_STAT(exit_stop_request) },
67 { "exit_external_request", VCPU_STAT(exit_external_request) },
Christian Borntraegera5e0acea92018-02-23 07:57:33 +000068 { "exit_io_request", VCPU_STAT(exit_io_request) },
Christian Borntraeger8f2abe62008-03-25 18:47:23 +010069 { "exit_external_interrupt", VCPU_STAT(exit_external_interrupt) },
Carsten Otteba5c1e92008-03-25 18:47:26 +010070 { "exit_instruction", VCPU_STAT(exit_instruction) },
Alexander Yarygin9ec6de12016-05-06 16:33:06 +030071 { "exit_pei", VCPU_STAT(exit_pei) },
Carsten Otteba5c1e92008-03-25 18:47:26 +010072 { "exit_program_interruption", VCPU_STAT(exit_program_interruption) },
73 { "exit_instr_and_program_int", VCPU_STAT(exit_instr_and_program) },
Janosch Franka011eeb2016-05-09 14:14:01 +020074 { "exit_operation_exception", VCPU_STAT(exit_operation_exception) },
Paolo Bonzinif7819512015-02-04 18:20:58 +010075 { "halt_successful_poll", VCPU_STAT(halt_successful_poll) },
Paolo Bonzini62bea5b2015-09-15 18:27:57 +020076 { "halt_attempted_poll", VCPU_STAT(halt_attempted_poll) },
Christian Borntraeger3491caf2016-05-13 12:16:35 +020077 { "halt_poll_invalid", VCPU_STAT(halt_poll_invalid) },
Christian Borntraeger8b905d22019-03-05 05:30:02 -050078 { "halt_no_poll_steal", VCPU_STAT(halt_no_poll_steal) },
David Hildenbrandce2e4f02014-07-11 10:00:43 +020079 { "halt_wakeup", VCPU_STAT(halt_wakeup) },
Christian Borntraegerf5e10b02008-07-25 15:52:44 +020080 { "instruction_lctlg", VCPU_STAT(instruction_lctlg) },
Carsten Otteba5c1e92008-03-25 18:47:26 +010081 { "instruction_lctl", VCPU_STAT(instruction_lctl) },
David Hildenbrandaba07502014-01-23 10:47:13 +010082 { "instruction_stctl", VCPU_STAT(instruction_stctl) },
83 { "instruction_stctg", VCPU_STAT(instruction_stctg) },
Christian Borntraegerccc40c52018-03-08 12:48:05 +000084 { "deliver_ckc", VCPU_STAT(deliver_ckc) },
85 { "deliver_cputm", VCPU_STAT(deliver_cputm) },
Carsten Otteba5c1e92008-03-25 18:47:26 +010086 { "deliver_emergency_signal", VCPU_STAT(deliver_emergency_signal) },
Christian Ehrhardt7697e71f2011-10-18 12:27:15 +020087 { "deliver_external_call", VCPU_STAT(deliver_external_call) },
Carsten Otteba5c1e92008-03-25 18:47:26 +010088 { "deliver_service_signal", VCPU_STAT(deliver_service_signal) },
Christian Borntraegerccc40c52018-03-08 12:48:05 +000089 { "deliver_virtio", VCPU_STAT(deliver_virtio) },
Carsten Otteba5c1e92008-03-25 18:47:26 +010090 { "deliver_stop_signal", VCPU_STAT(deliver_stop_signal) },
91 { "deliver_prefix_signal", VCPU_STAT(deliver_prefix_signal) },
92 { "deliver_restart_signal", VCPU_STAT(deliver_restart_signal) },
Christian Borntraegerccc40c52018-03-08 12:48:05 +000093 { "deliver_program", VCPU_STAT(deliver_program) },
94 { "deliver_io", VCPU_STAT(deliver_io) },
QingFeng Hao32de0742018-03-02 11:56:47 +010095 { "deliver_machine_check", VCPU_STAT(deliver_machine_check) },
Carsten Otteba5c1e92008-03-25 18:47:26 +010096 { "exit_wait_state", VCPU_STAT(exit_wait_state) },
Christian Borntraegerccc40c52018-03-08 12:48:05 +000097 { "inject_ckc", VCPU_STAT(inject_ckc) },
98 { "inject_cputm", VCPU_STAT(inject_cputm) },
99 { "inject_external_call", VCPU_STAT(inject_external_call) },
100 { "inject_float_mchk", VM_STAT(inject_float_mchk) },
101 { "inject_emergency_signal", VCPU_STAT(inject_emergency_signal) },
102 { "inject_io", VM_STAT(inject_io) },
103 { "inject_mchk", VCPU_STAT(inject_mchk) },
104 { "inject_pfault_done", VM_STAT(inject_pfault_done) },
105 { "inject_program", VCPU_STAT(inject_program) },
106 { "inject_restart", VCPU_STAT(inject_restart) },
107 { "inject_service_signal", VM_STAT(inject_service_signal) },
108 { "inject_set_prefix", VCPU_STAT(inject_set_prefix) },
109 { "inject_stop_signal", VCPU_STAT(inject_stop_signal) },
110 { "inject_pfault_init", VCPU_STAT(inject_pfault_init) },
111 { "inject_virtio", VM_STAT(inject_virtio) },
Christian Borntraegera37cb072018-01-23 13:28:40 +0100112 { "instruction_epsw", VCPU_STAT(instruction_epsw) },
113 { "instruction_gs", VCPU_STAT(instruction_gs) },
114 { "instruction_io_other", VCPU_STAT(instruction_io_other) },
115 { "instruction_lpsw", VCPU_STAT(instruction_lpsw) },
116 { "instruction_lpswe", VCPU_STAT(instruction_lpswe) },
Christian Borntraeger69d0d3a2013-06-12 13:54:53 +0200117 { "instruction_pfmf", VCPU_STAT(instruction_pfmf) },
Christian Borntraegera37cb072018-01-23 13:28:40 +0100118 { "instruction_ptff", VCPU_STAT(instruction_ptff) },
Christian Borntraeger453423d2008-03-25 18:47:29 +0100119 { "instruction_stidp", VCPU_STAT(instruction_stidp) },
Christian Borntraegera37cb072018-01-23 13:28:40 +0100120 { "instruction_sck", VCPU_STAT(instruction_sck) },
121 { "instruction_sckpf", VCPU_STAT(instruction_sckpf) },
Christian Borntraeger453423d2008-03-25 18:47:29 +0100122 { "instruction_spx", VCPU_STAT(instruction_spx) },
123 { "instruction_stpx", VCPU_STAT(instruction_stpx) },
124 { "instruction_stap", VCPU_STAT(instruction_stap) },
Christian Borntraegera37cb072018-01-23 13:28:40 +0100125 { "instruction_iske", VCPU_STAT(instruction_iske) },
126 { "instruction_ri", VCPU_STAT(instruction_ri) },
127 { "instruction_rrbe", VCPU_STAT(instruction_rrbe) },
128 { "instruction_sske", VCPU_STAT(instruction_sske) },
Heiko Carstens8a2422342014-01-10 14:33:28 +0100129 { "instruction_ipte_interlock", VCPU_STAT(instruction_ipte_interlock) },
Konstantin Weitzb31288f2013-04-17 17:36:29 +0200130 { "instruction_essa", VCPU_STAT(instruction_essa) },
Christian Borntraeger453423d2008-03-25 18:47:29 +0100131 { "instruction_stsi", VCPU_STAT(instruction_stsi) },
132 { "instruction_stfl", VCPU_STAT(instruction_stfl) },
Christian Borntraegera37cb072018-01-23 13:28:40 +0100133 { "instruction_tb", VCPU_STAT(instruction_tb) },
134 { "instruction_tpi", VCPU_STAT(instruction_tpi) },
Christian Borntraegerbb25b9b2011-07-24 10:48:17 +0200135 { "instruction_tprot", VCPU_STAT(instruction_tprot) },
Christian Borntraegera37cb072018-01-23 13:28:40 +0100136 { "instruction_tsch", VCPU_STAT(instruction_tsch) },
Janosch Frank95ca2cb2016-05-23 15:11:58 +0200137 { "instruction_sthyi", VCPU_STAT(instruction_sthyi) },
David Hildenbranda3508fb2015-07-08 13:19:48 +0200138 { "instruction_sie", VCPU_STAT(instruction_sie) },
Christian Borntraeger5288fbf2008-03-25 18:47:31 +0100139 { "instruction_sigp_sense", VCPU_STAT(instruction_sigp_sense) },
Cornelia Huckbd59d3a2011-11-17 11:00:42 +0100140 { "instruction_sigp_sense_running", VCPU_STAT(instruction_sigp_sense_running) },
Christian Ehrhardt7697e71f2011-10-18 12:27:15 +0200141 { "instruction_sigp_external_call", VCPU_STAT(instruction_sigp_external_call) },
Christian Borntraeger5288fbf2008-03-25 18:47:31 +0100142 { "instruction_sigp_emergency", VCPU_STAT(instruction_sigp_emergency) },
David Hildenbrand42cb0c92014-05-23 12:25:11 +0200143 { "instruction_sigp_cond_emergency", VCPU_STAT(instruction_sigp_cond_emergency) },
144 { "instruction_sigp_start", VCPU_STAT(instruction_sigp_start) },
Christian Borntraeger5288fbf2008-03-25 18:47:31 +0100145 { "instruction_sigp_stop", VCPU_STAT(instruction_sigp_stop) },
David Hildenbrand42cb0c92014-05-23 12:25:11 +0200146 { "instruction_sigp_stop_store_status", VCPU_STAT(instruction_sigp_stop_store_status) },
147 { "instruction_sigp_store_status", VCPU_STAT(instruction_sigp_store_status) },
Eric Farmancd7b4b62015-02-12 09:06:34 -0500148 { "instruction_sigp_store_adtl_status", VCPU_STAT(instruction_sigp_store_adtl_status) },
Christian Borntraeger5288fbf2008-03-25 18:47:31 +0100149 { "instruction_sigp_set_arch", VCPU_STAT(instruction_sigp_arch) },
150 { "instruction_sigp_set_prefix", VCPU_STAT(instruction_sigp_prefix) },
151 { "instruction_sigp_restart", VCPU_STAT(instruction_sigp_restart) },
David Hildenbrand42cb0c92014-05-23 12:25:11 +0200152 { "instruction_sigp_cpu_reset", VCPU_STAT(instruction_sigp_cpu_reset) },
153 { "instruction_sigp_init_cpu_reset", VCPU_STAT(instruction_sigp_init_cpu_reset) },
154 { "instruction_sigp_unknown", VCPU_STAT(instruction_sigp_unknown) },
Christian Borntraeger866c1382018-01-24 12:27:01 +0100155 { "instruction_diag_10", VCPU_STAT(diagnose_10) },
156 { "instruction_diag_44", VCPU_STAT(diagnose_44) },
157 { "instruction_diag_9c", VCPU_STAT(diagnose_9c) },
Christian Borntraeger8474e5c2019-02-15 13:47:20 +0100158 { "diag_9c_ignored", VCPU_STAT(diagnose_9c_ignored) },
Christian Borntraeger866c1382018-01-24 12:27:01 +0100159 { "instruction_diag_258", VCPU_STAT(diagnose_258) },
160 { "instruction_diag_308", VCPU_STAT(diagnose_308) },
161 { "instruction_diag_500", VCPU_STAT(diagnose_500) },
Christian Borntraegera37cb072018-01-23 13:28:40 +0100162 { "instruction_diag_other", VCPU_STAT(diagnose_other) },
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100163 { NULL }
164};
165
Collin L. Walling8fa16962016-07-26 15:29:44 -0400166struct kvm_s390_tod_clock_ext {
167 __u8 epoch_idx;
168 __u64 tod;
169 __u8 reserved[7];
170} __packed;
171
David Hildenbranda411edf2016-02-02 15:41:22 +0100172/* allow nested virtualization in KVM (if enabled by user space) */
173static int nested;
174module_param(nested, int, S_IRUGO);
175MODULE_PARM_DESC(nested, "Nested virtualization support");
176
Janosch Franka4499382018-07-13 11:28:31 +0100177/* allow 1m huge page guest backing, if !nested */
178static int hpage;
179module_param(hpage, int, 0444);
180MODULE_PARM_DESC(hpage, "1m huge page backing support");
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100181
Christian Borntraeger8b905d22019-03-05 05:30:02 -0500182/* maximum percentage of steal time for polling. >100 is treated like 100 */
183static u8 halt_poll_max_steal = 10;
184module_param(halt_poll_max_steal, byte, 0644);
Wei Yongjunb41fb522019-05-04 06:51:45 +0000185MODULE_PARM_DESC(halt_poll_max_steal, "Maximum percentage of steal time to allow polling");
Christian Borntraeger8b905d22019-03-05 05:30:02 -0500186
Christian Borntraegerc3b9e3e2018-02-09 16:26:29 +0000187/*
188 * For now we handle at most 16 double words as this is what the s390 base
189 * kernel handles and stores in the prefix page. If we ever need to go beyond
190 * this, this requires changes to code, but the external uapi can stay.
191 */
192#define SIZE_INTERNAL 16
193
194/*
195 * Base feature mask that defines default mask for facilities. Consists of the
196 * defines in FACILITIES_KVM and the non-hypervisor managed bits.
197 */
198static unsigned long kvm_s390_fac_base[SIZE_INTERNAL] = { FACILITIES_KVM };
199/*
200 * Extended feature mask. Consists of the defines in FACILITIES_KVM_CPUMODEL
201 * and defines the facilities that can be enabled via a cpu model.
202 */
203static unsigned long kvm_s390_fac_ext[SIZE_INTERNAL] = { FACILITIES_KVM_CPUMODEL };
204
205static unsigned long kvm_s390_fac_size(void)
Michael Mueller78c4b592013-07-26 15:04:04 +0200206{
Christian Borntraegerc3b9e3e2018-02-09 16:26:29 +0000207 BUILD_BUG_ON(SIZE_INTERNAL > S390_ARCH_FAC_MASK_SIZE_U64);
208 BUILD_BUG_ON(SIZE_INTERNAL > S390_ARCH_FAC_LIST_SIZE_U64);
209 BUILD_BUG_ON(SIZE_INTERNAL * sizeof(unsigned long) >
210 sizeof(S390_lowcore.stfle_fac_list));
211
212 return SIZE_INTERNAL;
Michael Mueller78c4b592013-07-26 15:04:04 +0200213}
214
David Hildenbrand15c97052015-03-19 17:36:43 +0100215/* available cpu features supported by kvm */
216static DECLARE_BITMAP(kvm_s390_available_cpu_feat, KVM_S390_VM_CPU_FEAT_NR_BITS);
David Hildenbrand0a763c72016-05-18 16:03:47 +0200217/* available subfunctions indicated via query / "test bit" */
218static struct kvm_s390_vm_cpu_subfunc kvm_s390_available_subfunc;
David Hildenbrand15c97052015-03-19 17:36:43 +0100219
Michael Mueller9d8d5782015-02-02 15:42:51 +0100220static struct gmap_notifier gmap_notifier;
David Hildenbranda3508fb2015-07-08 13:19:48 +0200221static struct gmap_notifier vsie_gmap_notifier;
Christian Borntraeger78f26132015-07-22 15:50:58 +0200222debug_info_t *kvm_s390_dbf;
Michael Mueller9d8d5782015-02-02 15:42:51 +0100223
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100224/* Section: not file related */
Radim Krčmář13a34e02014-08-28 15:13:03 +0200225int kvm_arch_hardware_enable(void)
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100226{
227 /* every s390 is virtualization enabled ;-) */
Alexander Graf10474ae2009-09-15 11:37:46 +0200228 return 0;
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100229}
230
Sean Christophersonf257d6d2019-04-19 22:18:17 -0700231int kvm_arch_check_processor_compat(void)
232{
233 return 0;
234}
235
Martin Schwidefsky414d3b02016-03-08 11:52:54 +0100236static void kvm_gmap_notifier(struct gmap *gmap, unsigned long start,
237 unsigned long end);
Christian Borntraeger2c70fe42013-05-17 14:41:36 +0200238
David Hildenbrand15757672018-02-07 12:46:45 +0100239static void kvm_clock_sync_scb(struct kvm_s390_sie_block *scb, u64 delta)
240{
241 u8 delta_idx = 0;
242
243 /*
244 * The TOD jumps by delta, we have to compensate this by adding
245 * -delta to the epoch.
246 */
247 delta = -delta;
248
249 /* sign-extension - we're adding to signed values below */
250 if ((s64)delta < 0)
251 delta_idx = -1;
252
253 scb->epoch += delta;
254 if (scb->ecd & ECD_MEF) {
255 scb->epdx += delta_idx;
256 if (scb->epoch < delta)
257 scb->epdx += 1;
258 }
259}
260
Fan Zhangfdf03652015-05-13 10:58:41 +0200261/*
262 * This callback is executed during stop_machine(). All CPUs are therefore
263 * temporarily stopped. In order not to change guest behavior, we have to
264 * disable preemption whenever we touch the epoch of kvm and the VCPUs,
265 * so a CPU won't be stopped while calculating with the epoch.
266 */
267static int kvm_clock_sync(struct notifier_block *notifier, unsigned long val,
268 void *v)
269{
270 struct kvm *kvm;
271 struct kvm_vcpu *vcpu;
272 int i;
273 unsigned long long *delta = v;
274
275 list_for_each_entry(kvm, &vm_list, vm_list) {
Fan Zhangfdf03652015-05-13 10:58:41 +0200276 kvm_for_each_vcpu(i, vcpu, kvm) {
David Hildenbrand15757672018-02-07 12:46:45 +0100277 kvm_clock_sync_scb(vcpu->arch.sie_block, *delta);
278 if (i == 0) {
279 kvm->arch.epoch = vcpu->arch.sie_block->epoch;
280 kvm->arch.epdx = vcpu->arch.sie_block->epdx;
281 }
David Hildenbranddb0758b2016-02-15 09:42:25 +0100282 if (vcpu->arch.cputm_enabled)
283 vcpu->arch.cputm_start += *delta;
David Hildenbrand91473b42015-10-29 10:30:36 +0100284 if (vcpu->arch.vsie_block)
David Hildenbrand15757672018-02-07 12:46:45 +0100285 kvm_clock_sync_scb(vcpu->arch.vsie_block,
286 *delta);
Fan Zhangfdf03652015-05-13 10:58:41 +0200287 }
288 }
289 return NOTIFY_OK;
290}
291
292static struct notifier_block kvm_clock_notifier = {
293 .notifier_call = kvm_clock_sync,
294};
295
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100296int kvm_arch_hardware_setup(void)
297{
Christian Borntraeger2c70fe42013-05-17 14:41:36 +0200298 gmap_notifier.notifier_call = kvm_gmap_notifier;
Martin Schwidefskyb2d73b22016-03-08 11:54:42 +0100299 gmap_register_pte_notifier(&gmap_notifier);
David Hildenbranda3508fb2015-07-08 13:19:48 +0200300 vsie_gmap_notifier.notifier_call = kvm_s390_vsie_gmap_notifier;
301 gmap_register_pte_notifier(&vsie_gmap_notifier);
Fan Zhangfdf03652015-05-13 10:58:41 +0200302 atomic_notifier_chain_register(&s390_epoch_delta_notifier,
303 &kvm_clock_notifier);
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100304 return 0;
305}
306
307void kvm_arch_hardware_unsetup(void)
308{
Martin Schwidefskyb2d73b22016-03-08 11:54:42 +0100309 gmap_unregister_pte_notifier(&gmap_notifier);
David Hildenbranda3508fb2015-07-08 13:19:48 +0200310 gmap_unregister_pte_notifier(&vsie_gmap_notifier);
Fan Zhangfdf03652015-05-13 10:58:41 +0200311 atomic_notifier_chain_unregister(&s390_epoch_delta_notifier,
312 &kvm_clock_notifier);
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100313}
314
David Hildenbrand22be5a132016-01-21 13:22:54 +0100315static void allow_cpu_feat(unsigned long nr)
316{
317 set_bit_inv(nr, kvm_s390_available_cpu_feat);
318}
319
David Hildenbrand0a763c72016-05-18 16:03:47 +0200320static inline int plo_test_bit(unsigned char nr)
321{
322 register unsigned long r0 asm("0") = (unsigned long) nr | 0x100;
Heiko Carstensd051ae52016-12-13 14:25:32 +0100323 int cc;
David Hildenbrand0a763c72016-05-18 16:03:47 +0200324
325 asm volatile(
326 /* Parameter registers are ignored for "test bit" */
327 " plo 0,0,0,0(0)\n"
328 " ipm %0\n"
329 " srl %0,28\n"
330 : "=d" (cc)
331 : "d" (r0)
332 : "cc");
333 return cc == 0;
334}
335
Heiko Carstensd0dea732019-10-02 14:34:37 +0200336static __always_inline void __insn32_query(unsigned int opcode, u8 *query)
Christian Borntraegerd6681392019-02-20 03:04:07 -0500337{
338 register unsigned long r0 asm("0") = 0; /* query function */
339 register unsigned long r1 asm("1") = (unsigned long) query;
340
341 asm volatile(
342 /* Parameter regs are ignored */
343 " .insn rrf,%[opc] << 16,2,4,6,0\n"
Heiko Carstensb1c41ac2019-10-02 14:24:47 +0200344 :
Christian Borntraegerd6681392019-02-20 03:04:07 -0500345 : "d" (r0), "a" (r1), [opc] "i" (opcode)
Heiko Carstensb1c41ac2019-10-02 14:24:47 +0200346 : "cc", "memory");
Christian Borntraegerd6681392019-02-20 03:04:07 -0500347}
348
Christian Borntraeger173aec22018-12-28 10:59:06 +0100349#define INSN_SORTL 0xb938
Christian Borntraeger4f45b902018-12-28 10:46:04 +0100350#define INSN_DFLTCC 0xb939
Christian Borntraeger173aec22018-12-28 10:59:06 +0100351
David Hildenbrand22be5a132016-01-21 13:22:54 +0100352static void kvm_s390_cpu_feat_init(void)
353{
David Hildenbrand0a763c72016-05-18 16:03:47 +0200354 int i;
355
356 for (i = 0; i < 256; ++i) {
357 if (plo_test_bit(i))
358 kvm_s390_available_subfunc.plo[i >> 3] |= 0x80 >> (i & 7);
359 }
360
361 if (test_facility(28)) /* TOD-clock steering */
Linus Torvalds221bb8a2016-08-02 16:11:27 -0400362 ptff(kvm_s390_available_subfunc.ptff,
363 sizeof(kvm_s390_available_subfunc.ptff),
364 PTFF_QAF);
David Hildenbrand0a763c72016-05-18 16:03:47 +0200365
366 if (test_facility(17)) { /* MSA */
Martin Schwidefsky69c0e362016-08-18 12:59:46 +0200367 __cpacf_query(CPACF_KMAC, (cpacf_mask_t *)
368 kvm_s390_available_subfunc.kmac);
369 __cpacf_query(CPACF_KMC, (cpacf_mask_t *)
370 kvm_s390_available_subfunc.kmc);
371 __cpacf_query(CPACF_KM, (cpacf_mask_t *)
372 kvm_s390_available_subfunc.km);
373 __cpacf_query(CPACF_KIMD, (cpacf_mask_t *)
374 kvm_s390_available_subfunc.kimd);
375 __cpacf_query(CPACF_KLMD, (cpacf_mask_t *)
376 kvm_s390_available_subfunc.klmd);
David Hildenbrand0a763c72016-05-18 16:03:47 +0200377 }
378 if (test_facility(76)) /* MSA3 */
Martin Schwidefsky69c0e362016-08-18 12:59:46 +0200379 __cpacf_query(CPACF_PCKMO, (cpacf_mask_t *)
380 kvm_s390_available_subfunc.pckmo);
David Hildenbrand0a763c72016-05-18 16:03:47 +0200381 if (test_facility(77)) { /* MSA4 */
Martin Schwidefsky69c0e362016-08-18 12:59:46 +0200382 __cpacf_query(CPACF_KMCTR, (cpacf_mask_t *)
383 kvm_s390_available_subfunc.kmctr);
384 __cpacf_query(CPACF_KMF, (cpacf_mask_t *)
385 kvm_s390_available_subfunc.kmf);
386 __cpacf_query(CPACF_KMO, (cpacf_mask_t *)
387 kvm_s390_available_subfunc.kmo);
388 __cpacf_query(CPACF_PCC, (cpacf_mask_t *)
389 kvm_s390_available_subfunc.pcc);
David Hildenbrand0a763c72016-05-18 16:03:47 +0200390 }
391 if (test_facility(57)) /* MSA5 */
Harald Freudenberger985a9d22017-02-24 10:11:54 +0100392 __cpacf_query(CPACF_PRNO, (cpacf_mask_t *)
Martin Schwidefsky69c0e362016-08-18 12:59:46 +0200393 kvm_s390_available_subfunc.ppno);
David Hildenbrand0a763c72016-05-18 16:03:47 +0200394
Jason J. Hernee000b8e2017-03-20 09:57:42 -0400395 if (test_facility(146)) /* MSA8 */
396 __cpacf_query(CPACF_KMA, (cpacf_mask_t *)
397 kvm_s390_available_subfunc.kma);
398
Christian Borntraeger13209ad2018-12-28 09:33:35 +0100399 if (test_facility(155)) /* MSA9 */
400 __cpacf_query(CPACF_KDSA, (cpacf_mask_t *)
401 kvm_s390_available_subfunc.kdsa);
402
Christian Borntraeger173aec22018-12-28 10:59:06 +0100403 if (test_facility(150)) /* SORTL */
404 __insn32_query(INSN_SORTL, kvm_s390_available_subfunc.sortl);
405
Christian Borntraeger4f45b902018-12-28 10:46:04 +0100406 if (test_facility(151)) /* DFLTCC */
407 __insn32_query(INSN_DFLTCC, kvm_s390_available_subfunc.dfltcc);
408
David Hildenbrand22be5a132016-01-21 13:22:54 +0100409 if (MACHINE_HAS_ESOP)
410 allow_cpu_feat(KVM_S390_VM_CPU_FEAT_ESOP);
David Hildenbranda3508fb2015-07-08 13:19:48 +0200411 /*
412 * We need SIE support, ESOP (PROT_READ protection for gmap_shadow),
413 * 64bit SCAO (SCA passthrough) and IDTE (for gmap_shadow unshadowing).
414 */
415 if (!sclp.has_sief2 || !MACHINE_HAS_ESOP || !sclp.has_64bscao ||
David Hildenbranda411edf2016-02-02 15:41:22 +0100416 !test_facility(3) || !nested)
David Hildenbranda3508fb2015-07-08 13:19:48 +0200417 return;
418 allow_cpu_feat(KVM_S390_VM_CPU_FEAT_SIEF2);
David Hildenbrand19c439b2015-11-25 11:02:26 +0100419 if (sclp.has_64bscao)
420 allow_cpu_feat(KVM_S390_VM_CPU_FEAT_64BSCAO);
David Hildenbrand0615a322015-11-25 09:59:49 +0100421 if (sclp.has_siif)
422 allow_cpu_feat(KVM_S390_VM_CPU_FEAT_SIIF);
David Hildenbrand77d18f62015-11-24 16:32:35 +0100423 if (sclp.has_gpere)
424 allow_cpu_feat(KVM_S390_VM_CPU_FEAT_GPERE);
David Hildenbranda1b7b9b2015-11-24 16:41:33 +0100425 if (sclp.has_gsls)
426 allow_cpu_feat(KVM_S390_VM_CPU_FEAT_GSLS);
David Hildenbrand5630a8e2015-11-24 16:53:51 +0100427 if (sclp.has_ib)
428 allow_cpu_feat(KVM_S390_VM_CPU_FEAT_IB);
David Hildenbrand13ee3f62015-11-24 16:54:37 +0100429 if (sclp.has_cei)
430 allow_cpu_feat(KVM_S390_VM_CPU_FEAT_CEI);
David Hildenbrand7fd7f392015-11-24 16:56:23 +0100431 if (sclp.has_ibs)
432 allow_cpu_feat(KVM_S390_VM_CPU_FEAT_IBS);
Farhan Ali730cd632017-02-24 16:12:56 -0500433 if (sclp.has_kss)
434 allow_cpu_feat(KVM_S390_VM_CPU_FEAT_KSS);
David Hildenbrand5d3876a2016-04-13 17:06:50 +0200435 /*
436 * KVM_S390_VM_CPU_FEAT_SKEY: Wrong shadow of PTE.I bits will make
437 * all skey handling functions read/set the skey from the PGSTE
438 * instead of the real storage key.
439 *
440 * KVM_S390_VM_CPU_FEAT_CMMA: Wrong shadow of PTE.I bits will make
441 * pages being detected as preserved although they are resident.
442 *
443 * KVM_S390_VM_CPU_FEAT_PFMFI: Wrong shadow of PTE.I bits will
444 * have the same effect as for KVM_S390_VM_CPU_FEAT_SKEY.
445 *
446 * For KVM_S390_VM_CPU_FEAT_SKEY, KVM_S390_VM_CPU_FEAT_CMMA and
447 * KVM_S390_VM_CPU_FEAT_PFMFI, all PTE.I and PGSTE bits have to be
448 * correctly shadowed. We can do that for the PGSTE but not for PTE.I.
449 *
450 * KVM_S390_VM_CPU_FEAT_SIGPIF: Wrong SCB addresses in the SCA. We
451 * cannot easily shadow the SCA because of the ipte lock.
452 */
David Hildenbrand22be5a132016-01-21 13:22:54 +0100453}
454
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100455int kvm_arch_init(void *opaque)
456{
Janosch Frankf76f6372019-10-02 03:56:27 -0400457 int rc = -ENOMEM;
Michael Mueller308c3e62018-11-30 15:32:06 +0100458
Christian Borntraeger78f26132015-07-22 15:50:58 +0200459 kvm_s390_dbf = debug_register("kvm-trace", 32, 1, 7 * sizeof(long));
460 if (!kvm_s390_dbf)
461 return -ENOMEM;
462
Janosch Frankf76f6372019-10-02 03:56:27 -0400463 if (debug_register_view(kvm_s390_dbf, &debug_sprintf_view))
464 goto out;
Christian Borntraeger78f26132015-07-22 15:50:58 +0200465
David Hildenbrand22be5a132016-01-21 13:22:54 +0100466 kvm_s390_cpu_feat_init();
467
Cornelia Huck84877d92014-09-02 10:27:35 +0100468 /* Register floating interrupt controller interface. */
Michael Mueller308c3e62018-11-30 15:32:06 +0100469 rc = kvm_register_device_ops(&kvm_flic_ops, KVM_DEV_TYPE_FLIC);
470 if (rc) {
Michael Mueller8d43d572018-12-10 11:15:16 +0100471 pr_err("A FLIC registration call failed with rc=%d\n", rc);
Janosch Frankf76f6372019-10-02 03:56:27 -0400472 goto out;
Michael Mueller308c3e62018-11-30 15:32:06 +0100473 }
Michael Muellerb1d1e762019-01-31 09:52:45 +0100474
475 rc = kvm_s390_gib_init(GAL_ISC);
476 if (rc)
Janosch Frankf76f6372019-10-02 03:56:27 -0400477 goto out;
Michael Muellerb1d1e762019-01-31 09:52:45 +0100478
Michael Mueller308c3e62018-11-30 15:32:06 +0100479 return 0;
480
Janosch Frankf76f6372019-10-02 03:56:27 -0400481out:
482 kvm_arch_exit();
Michael Mueller308c3e62018-11-30 15:32:06 +0100483 return rc;
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100484}
485
Christian Borntraeger78f26132015-07-22 15:50:58 +0200486void kvm_arch_exit(void)
487{
Michael Mueller1282c212019-01-31 09:52:40 +0100488 kvm_s390_gib_destroy();
Christian Borntraeger78f26132015-07-22 15:50:58 +0200489 debug_unregister(kvm_s390_dbf);
490}
491
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100492/* Section: device related */
493long kvm_arch_dev_ioctl(struct file *filp,
494 unsigned int ioctl, unsigned long arg)
495{
496 if (ioctl == KVM_S390_ENABLE_SIE)
497 return s390_enable_sie();
498 return -EINVAL;
499}
500
Alexander Graf784aa3d2014-07-14 18:27:35 +0200501int kvm_vm_ioctl_check_extension(struct kvm *kvm, long ext)
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100502{
Carsten Otted7b0b5e2009-11-19 14:21:16 +0100503 int r;
504
Carsten Otte2bd0ac42008-07-25 15:49:13 +0200505 switch (ext) {
Carsten Otted7b0b5e2009-11-19 14:21:16 +0100506 case KVM_CAP_S390_PSW:
Christian Borntraegerb6cf8782011-09-20 17:07:29 +0200507 case KVM_CAP_S390_GMAP:
Christian Borntraeger52e16b12011-11-17 11:00:44 +0100508 case KVM_CAP_SYNC_MMU:
Carsten Otte1efd0f52012-01-04 10:25:29 +0100509#ifdef CONFIG_KVM_S390_UCONTROL
510 case KVM_CAP_S390_UCONTROL:
511#endif
Dominik Dingel3c038e62013-10-07 17:11:48 +0200512 case KVM_CAP_ASYNC_PF:
Christian Borntraeger60b413c2012-01-11 11:20:31 +0100513 case KVM_CAP_SYNC_REGS:
Carsten Otte14eebd92012-05-15 14:15:26 +0200514 case KVM_CAP_ONE_REG:
Cornelia Huckd6712df2012-12-20 15:32:11 +0100515 case KVM_CAP_ENABLE_CAP:
Cornelia Huckfa6b7fe2012-12-20 15:32:12 +0100516 case KVM_CAP_S390_CSS_SUPPORT:
Cornelia Huck10ccaa12013-02-28 12:33:21 +0100517 case KVM_CAP_IOEVENTFD:
Jens Freimannc05c4182013-10-07 16:13:45 +0200518 case KVM_CAP_DEVICE_CTRL:
Cornelia Huck78599d92014-07-15 09:54:39 +0200519 case KVM_CAP_S390_IRQCHIP:
Dominik Dingelf2061652014-04-09 13:13:00 +0200520 case KVM_CAP_VM_ATTRIBUTES:
David Hildenbrand6352e4d2014-04-10 17:35:00 +0200521 case KVM_CAP_MP_STATE:
Paolo Bonzini460df4c2017-02-08 11:50:15 +0100522 case KVM_CAP_IMMEDIATE_EXIT:
Jens Freimann47b43c52014-11-11 20:57:06 +0100523 case KVM_CAP_S390_INJECT_IRQ:
David Hildenbrand2444b352014-10-09 14:10:13 +0200524 case KVM_CAP_S390_USER_SIGP:
Ekaterina Tumanovae44fc8c2015-01-30 16:55:56 +0100525 case KVM_CAP_S390_USER_STSI:
Jason J. Herne30ee2a92014-09-23 09:23:01 -0400526 case KVM_CAP_S390_SKEYS:
Jens Freimann816c7662014-11-24 17:13:46 +0100527 case KVM_CAP_S390_IRQ_STATE:
David Hildenbrand6502a342016-06-21 14:19:51 +0200528 case KVM_CAP_S390_USER_INSTR0:
Claudio Imbrenda4036e382016-08-04 17:58:47 +0200529 case KVM_CAP_S390_CMMA_MIGRATION:
Yi Min Zhao47a46932017-03-10 09:29:38 +0100530 case KVM_CAP_S390_AIS:
Christian Borntraegerda9a1442017-11-09 10:00:45 +0100531 case KVM_CAP_S390_AIS_MIGRATION:
Carsten Otted7b0b5e2009-11-19 14:21:16 +0100532 r = 1;
533 break;
Janosch Franka4499382018-07-13 11:28:31 +0100534 case KVM_CAP_S390_HPAGE_1M:
535 r = 0;
Janosch Frank40ebdb82018-08-01 11:48:28 +0100536 if (hpage && !kvm_is_ucontrol(kvm))
Janosch Franka4499382018-07-13 11:28:31 +0100537 r = 1;
538 break;
Thomas Huth41408c282015-02-06 15:01:21 +0100539 case KVM_CAP_S390_MEM_OP:
540 r = MEM_OP_MAX_SIZE;
541 break;
Christian Borntraegere726b1b2012-05-02 10:50:38 +0200542 case KVM_CAP_NR_VCPUS:
543 case KVM_CAP_MAX_VCPUS:
Thomas Hutha86cb412019-05-23 18:43:08 +0200544 case KVM_CAP_MAX_VCPU_ID:
David Hildenbrand76a6dd72015-11-24 13:33:49 +0100545 r = KVM_S390_BSCA_CPU_SLOTS;
David Hildenbranda6940672016-08-08 22:39:32 +0200546 if (!kvm_s390_use_sca_entries())
547 r = KVM_MAX_VCPUS;
548 else if (sclp.has_esca && sclp.has_64bscao)
David Hildenbrand76a6dd72015-11-24 13:33:49 +0100549 r = KVM_S390_ESCA_CPU_SLOTS;
Christian Borntraegere726b1b2012-05-02 10:50:38 +0200550 break;
Christian Borntraeger1526bf92012-05-15 14:15:25 +0200551 case KVM_CAP_S390_COW:
Martin Schwidefskyabf09be2012-11-07 13:17:37 +0100552 r = MACHINE_HAS_ESOP;
Christian Borntraeger1526bf92012-05-15 14:15:25 +0200553 break;
Eric Farman68c55752014-06-09 10:57:26 -0400554 case KVM_CAP_S390_VECTOR_REGISTERS:
555 r = MACHINE_HAS_VX;
556 break;
Fan Zhangc6e5f162016-01-07 18:24:29 +0800557 case KVM_CAP_S390_RI:
558 r = test_facility(64);
559 break;
Fan Zhang4e0b1ab2016-11-29 07:17:55 +0100560 case KVM_CAP_S390_GS:
561 r = test_facility(133);
562 break;
Christian Borntraeger35b3fde2018-01-17 14:44:34 +0100563 case KVM_CAP_S390_BPB:
564 r = test_facility(82);
565 break;
Carsten Otte2bd0ac42008-07-25 15:49:13 +0200566 default:
Carsten Otted7b0b5e2009-11-19 14:21:16 +0100567 r = 0;
Carsten Otte2bd0ac42008-07-25 15:49:13 +0200568 }
Carsten Otted7b0b5e2009-11-19 14:21:16 +0100569 return r;
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100570}
571
Jason J. Herne15f36eb2012-08-02 10:10:17 -0400572static void kvm_s390_sync_dirty_log(struct kvm *kvm,
Janosch Frank0959e162018-07-17 13:21:22 +0100573 struct kvm_memory_slot *memslot)
Jason J. Herne15f36eb2012-08-02 10:10:17 -0400574{
Janosch Frank0959e162018-07-17 13:21:22 +0100575 int i;
Jason J. Herne15f36eb2012-08-02 10:10:17 -0400576 gfn_t cur_gfn, last_gfn;
Janosch Frank0959e162018-07-17 13:21:22 +0100577 unsigned long gaddr, vmaddr;
Jason J. Herne15f36eb2012-08-02 10:10:17 -0400578 struct gmap *gmap = kvm->arch.gmap;
Janosch Frank0959e162018-07-17 13:21:22 +0100579 DECLARE_BITMAP(bitmap, _PAGE_ENTRIES);
Jason J. Herne15f36eb2012-08-02 10:10:17 -0400580
Janosch Frank0959e162018-07-17 13:21:22 +0100581 /* Loop over all guest segments */
582 cur_gfn = memslot->base_gfn;
Jason J. Herne15f36eb2012-08-02 10:10:17 -0400583 last_gfn = memslot->base_gfn + memslot->npages;
Janosch Frank0959e162018-07-17 13:21:22 +0100584 for (; cur_gfn <= last_gfn; cur_gfn += _PAGE_ENTRIES) {
585 gaddr = gfn_to_gpa(cur_gfn);
586 vmaddr = gfn_to_hva_memslot(memslot, cur_gfn);
587 if (kvm_is_error_hva(vmaddr))
588 continue;
Jason J. Herne15f36eb2012-08-02 10:10:17 -0400589
Janosch Frank0959e162018-07-17 13:21:22 +0100590 bitmap_zero(bitmap, _PAGE_ENTRIES);
591 gmap_sync_dirty_log_pmd(gmap, bitmap, gaddr, vmaddr);
592 for (i = 0; i < _PAGE_ENTRIES; i++) {
593 if (test_bit(i, bitmap))
594 mark_page_dirty(kvm, cur_gfn + i);
595 }
596
Christian Borntraeger1763f8d2016-02-03 11:12:34 +0100597 if (fatal_signal_pending(current))
598 return;
Christian Borntraeger70c88a02016-02-02 15:15:56 +0100599 cond_resched();
Jason J. Herne15f36eb2012-08-02 10:10:17 -0400600 }
Jason J. Herne15f36eb2012-08-02 10:10:17 -0400601}
602
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100603/* Section: vm related */
Eugene (jno) Dvurechenskia6e2f682015-04-21 15:31:59 +0200604static void sca_del_vcpu(struct kvm_vcpu *vcpu);
605
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100606/*
607 * Get (and clear) the dirty memory log for a memory slot.
608 */
609int kvm_vm_ioctl_get_dirty_log(struct kvm *kvm,
610 struct kvm_dirty_log *log)
611{
Jason J. Herne15f36eb2012-08-02 10:10:17 -0400612 int r;
613 unsigned long n;
Paolo Bonzini9f6b8022015-05-17 16:20:07 +0200614 struct kvm_memslots *slots;
Jason J. Herne15f36eb2012-08-02 10:10:17 -0400615 struct kvm_memory_slot *memslot;
616 int is_dirty = 0;
617
Janosch Franke1e8a962017-02-02 16:39:31 +0100618 if (kvm_is_ucontrol(kvm))
619 return -EINVAL;
620
Jason J. Herne15f36eb2012-08-02 10:10:17 -0400621 mutex_lock(&kvm->slots_lock);
622
623 r = -EINVAL;
624 if (log->slot >= KVM_USER_MEM_SLOTS)
625 goto out;
626
Paolo Bonzini9f6b8022015-05-17 16:20:07 +0200627 slots = kvm_memslots(kvm);
628 memslot = id_to_memslot(slots, log->slot);
Jason J. Herne15f36eb2012-08-02 10:10:17 -0400629 r = -ENOENT;
630 if (!memslot->dirty_bitmap)
631 goto out;
632
633 kvm_s390_sync_dirty_log(kvm, memslot);
634 r = kvm_get_dirty_log(kvm, log, &is_dirty);
635 if (r)
636 goto out;
637
638 /* Clear the dirty log */
639 if (is_dirty) {
640 n = kvm_dirty_bitmap_bytes(memslot);
641 memset(memslot->dirty_bitmap, 0, n);
642 }
643 r = 0;
644out:
645 mutex_unlock(&kvm->slots_lock);
646 return r;
Heiko Carstensb0c632d2008-03-25 18:47:20 +0100647}
648
David Hildenbrand6502a342016-06-21 14:19:51 +0200649static void icpt_operexc_on_all_vcpus(struct kvm *kvm)
650{
651 unsigned int i;
652 struct kvm_vcpu *vcpu;
653
654 kvm_for_each_vcpu(i, vcpu, kvm) {
655 kvm_s390_sync_request(KVM_REQ_ICPT_OPEREXC, vcpu);
656 }
657}
658
Paolo Bonzinie5d83c72017-02-16 10:40:56 +0100659int kvm_vm_ioctl_enable_cap(struct kvm *kvm, struct kvm_enable_cap *cap)
Cornelia Huckd938dc52013-10-23 18:26:34 +0200660{
661 int r;
662
663 if (cap->flags)
664 return -EINVAL;
665
666 switch (cap->cap) {
Cornelia Huck84223592013-07-15 13:36:01 +0200667 case KVM_CAP_S390_IRQCHIP:
Christian Borntraegerc92ea7b2015-07-22 15:52:10 +0200668 VM_EVENT(kvm, 3, "%s", "ENABLE: CAP_S390_IRQCHIP");
Cornelia Huck84223592013-07-15 13:36:01 +0200669 kvm->arch.use_irqchip = 1;
670 r = 0;
671 break;
David Hildenbrand2444b352014-10-09 14:10:13 +0200672 case KVM_CAP_S390_USER_SIGP:
Christian Borntraegerc92ea7b2015-07-22 15:52:10 +0200673 VM_EVENT(kvm, 3, "%s", "ENABLE: CAP_S390_USER_SIGP");
David Hildenbrand2444b352014-10-09 14:10:13 +0200674 kvm->arch.user_sigp = 1;
675 r = 0;
676 break;
Eric Farman68c55752014-06-09 10:57:26 -0400677 case KVM_CAP_S390_VECTOR_REGISTERS:
David Hildenbrand5967c172015-11-06 12:08:48 +0100678 mutex_lock(&kvm->lock);
Paolo Bonzinia03825b2016-06-13 14:50:04 +0200679 if (kvm->created_vcpus) {
David Hildenbrand5967c172015-11-06 12:08:48 +0100680 r = -EBUSY;
681 } else if (MACHINE_HAS_VX) {
David Hildenbrandc54f0d62015-12-02 08:53:52 +0100682 set_kvm_facility(kvm->arch.model.fac_mask, 129);
683 set_kvm_facility(kvm->arch.model.fac_list, 129);
Guenther Hutzl2f87d942016-06-03 14:37:17 +0200684 if (test_facility(134)) {
685 set_kvm_facility(kvm->arch.model.fac_mask, 134);
686 set_kvm_facility(kvm->arch.model.fac_list, 134);
687 }
Maxim Samoylov53743aa2016-02-10 10:31:23 +0100688 if (test_facility(135)) {
689 set_kvm_facility(kvm->arch.model.fac_mask, 135);
690 set_kvm_facility(kvm->arch.model.fac_list, 135);
691 }
Christian Borntraeger7832e912018-12-28 09:43:37 +0100692 if (test_facility(148)) {
693 set_kvm_facility(kvm->arch.model.fac_mask, 148);
694 set_kvm_facility(kvm->arch.model.fac_list, 148);
695 }
Christian Borntraegerd5cb6ab2018-12-28 09:45:58 +0100696 if (test_facility(152)) {
697 set_kvm_facility(kvm->arch.model.fac_mask, 152);
698 set_kvm_facility(kvm->arch.model.fac_list, 152);
699 }
Michael Mueller18280d82015-03-16 16:05:41 +0100700 r = 0;
701 } else
702 r = -EINVAL;
David Hildenbrand5967c172015-11-06 12:08:48 +0100703 mutex_unlock(&kvm->lock);
Christian Borntraegerc92ea7b2015-07-22 15:52:10 +0200704 VM_EVENT(kvm, 3, "ENABLE: CAP_S390_VECTOR_REGISTERS %s",
705 r ? "(not available)" : "(success)");
Eric Farman68c55752014-06-09 10:57:26 -0400706 break;
Fan Zhangc6e5f162016-01-07 18:24:29 +0800707 case KVM_CAP_S390_RI:
708 r = -EINVAL;
709 mutex_lock(&kvm->lock);
Paolo Bonzinia03825b2016-06-13 14:50:04 +0200710 if (kvm->created_vcpus) {
Fan Zhangc6e5f162016-01-07 18:24:29 +0800711 r = -EBUSY;
712 } else if (test_facility(64)) {
David Hildenbrandc54f0d62015-12-02 08:53:52 +0100713 set_kvm_facility(kvm->arch.model.fac_mask, 64);
714 set_kvm_facility(kvm->arch.model.fac_list, 64);
Fan Zhangc6e5f162016-01-07 18:24:29 +0800715 r = 0;
716 }
717 mutex_unlock(&kvm->lock);
718 VM_EVENT(kvm, 3, "ENABLE: CAP_S390_RI %s",
719 r ? "(not available)" : "(success)");
720 break;
Yi Min Zhao47a46932017-03-10 09:29:38 +0100721 case KVM_CAP_S390_AIS:
722 mutex_lock(&kvm->lock);
723 if (kvm->created_vcpus) {
724 r = -EBUSY;
725 } else {
726 set_kvm_facility(kvm->arch.model.fac_mask, 72);
727 set_kvm_facility(kvm->arch.model.fac_list, 72);
Yi Min Zhao47a46932017-03-10 09:29:38 +0100728 r = 0;
729 }
730 mutex_unlock(&kvm->lock);
731 VM_EVENT(kvm, 3, "ENABLE: AIS %s",
732 r ? "(not available)" : "(success)");
733 break;
Fan Zhang4e0b1ab2016-11-29 07:17:55 +0100734 case KVM_CAP_S390_GS:
735 r = -EINVAL;
736 mutex_lock(&kvm->lock);
Christian Borntraeger241e3ec02017-11-16 15:12:52 +0100737 if (kvm->created_vcpus) {
Fan Zhang4e0b1ab2016-11-29 07:17:55 +0100738 r = -EBUSY;
739 } else if (test_facility(133)) {
740 set_kvm_facility(kvm->arch.model.fac_mask, 133);
741 set_kvm_facility(kvm->arch.model.fac_list, 133);
742 r = 0;
743 }
744 mutex_unlock(&kvm->lock);
745 VM_EVENT(kvm, 3, "ENABLE: CAP_S390_GS %s",
746 r ? "(not available)" : "(success)");
747 break;
Janosch Franka4499382018-07-13 11:28:31 +0100748 case KVM_CAP_S390_HPAGE_1M:
749 mutex_lock(&kvm->lock);
750 if (kvm->created_vcpus)
751 r = -EBUSY;
Janosch Frank40ebdb82018-08-01 11:48:28 +0100752 else if (!hpage || kvm->arch.use_cmma || kvm_is_ucontrol(kvm))
Janosch Franka4499382018-07-13 11:28:31 +0100753 r = -EINVAL;
754 else {
755 r = 0;
Janosch Frankdf88f312018-08-30 16:14:18 +0200756 down_write(&kvm->mm->mmap_sem);
Janosch Franka4499382018-07-13 11:28:31 +0100757 kvm->mm->context.allow_gmap_hpage_1m = 1;
Janosch Frankdf88f312018-08-30 16:14:18 +0200758 up_write(&kvm->mm->mmap_sem);
Janosch Franka4499382018-07-13 11:28:31 +0100759 /*
760 * We might have to create fake 4k page
761 * tables. To avoid that the hardware works on
762 * stale PGSTEs, we emulate these instructions.
763 */
764 kvm->arch.use_skf = 0;
765 kvm->arch.use_pfmfi = 0;
766 }
767 mutex_unlock(&kvm->lock);
768 VM_EVENT(kvm, 3, "ENABLE: CAP_S390_HPAGE %s",
769 r ? "(not available)" : "(success)");
770 break;
Ekaterina Tumanovae44fc8c2015-01-30 16:55:56 +0100771 case KVM_CAP_S390_USER_STSI:
Christian Borntraegerc92ea7b2015-07-22 15:52:10 +0200772 VM_EVENT(kvm, 3, "%s", "ENABLE: CAP_S390_USER_STSI");
Ekaterina Tumanovae44fc8c2015-01-30 16:55:56 +0100773 kvm->arch.user_stsi = 1;
774 r = 0;
775 break;
David Hildenbrand6502a342016-06-21 14:19:51 +0200776 case KVM_CAP_S390_USER_INSTR0:
777 VM_EVENT(kvm, 3, "%s", "ENABLE: CAP_S390_USER_INSTR0");
778 kvm->arch.user_instr0 = 1;
779 icpt_operexc_on_all_vcpus(kvm);
780 r = 0;
781 break;
Cornelia Huckd938dc52013-10-23 18:26:34 +0200782 default:
783 r = -EINVAL;
784 break;
785 }
786 return r;
787}
788
Dominik Dingel8c0a7ce2014-10-31 14:10:41 +0100789static int kvm_s390_get_mem_control(struct kvm *kvm, struct kvm_device_attr *attr)
790{
791 int ret;
792
793 switch (attr->attr) {
794 case KVM_S390_VM_MEM_LIMIT_SIZE:
795 ret = 0;
Christian Borntraegerc92ea7b2015-07-22 15:52:10 +0200796 VM_EVENT(kvm, 3, "QUERY: max guest memory: %lu bytes",
Dominik Dingela3a92c32014-12-01 17:24:42 +0100797 kvm->arch.mem_limit);
798 if (put_user(kvm->arch.mem_limit, (u64 __user *)attr->addr))
Dominik Dingel8c0a7ce2014-10-31 14:10:41 +0100799 ret = -EFAULT;
800 break;
801 default:
802 ret = -ENXIO;
803 break;
804 }
805 return ret;
806}
807
808static int kvm_s390_set_mem_control(struct kvm *kvm, struct kvm_device_attr *attr)
Dominik Dingel4f718ea2014-04-09 13:13:00 +0200809{
810 int ret;
811 unsigned int idx;
812 switch (attr->attr) {
813 case KVM_S390_VM_MEM_ENABLE_CMMA:
David Hildenbrandf9cbd9b2016-03-03 09:48:47 +0100814 ret = -ENXIO;
David Hildenbrandc24cc9c2015-11-24 13:53:04 +0100815 if (!sclp.has_cmma)
Dominik Dingele6db1d62015-05-07 15:41:57 +0200816 break;
817
Christian Borntraegerc92ea7b2015-07-22 15:52:10 +0200818 VM_EVENT(kvm, 3, "%s", "ENABLE: CMMA support");
Dominik Dingel4f718ea2014-04-09 13:13:00 +0200819 mutex_lock(&kvm->lock);
Janosch Franka4499382018-07-13 11:28:31 +0100820 if (kvm->created_vcpus)
821 ret = -EBUSY;
822 else if (kvm->mm->context.allow_gmap_hpage_1m)
823 ret = -EINVAL;
824 else {
Dominik Dingel4f718ea2014-04-09 13:13:00 +0200825 kvm->arch.use_cmma = 1;
Janosch Frankc9f0a2b2018-02-16 12:16:14 +0100826 /* Not compatible with cmma. */
827 kvm->arch.use_pfmfi = 0;
Dominik Dingel4f718ea2014-04-09 13:13:00 +0200828 ret = 0;
829 }
830 mutex_unlock(&kvm->lock);
831 break;
832 case KVM_S390_VM_MEM_CLR_CMMA:
David Hildenbrandf9cbd9b2016-03-03 09:48:47 +0100833 ret = -ENXIO;
834 if (!sclp.has_cmma)
835 break;
Dominik Dingelc3489152015-06-18 13:17:11 +0200836 ret = -EINVAL;
837 if (!kvm->arch.use_cmma)
838 break;
839
Christian Borntraegerc92ea7b2015-07-22 15:52:10 +0200840 VM_EVENT(kvm, 3, "%s", "RESET: CMMA states");
Dominik Dingel4f718ea2014-04-09 13:13:00 +0200841 mutex_lock(&kvm->lock);
842 idx = srcu_read_lock(&kvm->srcu);
Dominik Dingela13cff32014-10-23 12:07:14 +0200843 s390_reset_cmma(kvm->arch.gmap->mm);
Dominik Dingel4f718ea2014-04-09 13:13:00 +0200844 srcu_read_unlock(&kvm->srcu, idx);
845 mutex_unlock(&kvm->lock);
846 ret = 0;
847 break;
Dominik Dingel8c0a7ce2014-10-31 14:10:41 +0100848 case KVM_S390_VM_MEM_LIMIT_SIZE: {
849 unsigned long new_limit;
850
851 if (kvm_is_ucontrol(kvm))
852 return -EINVAL;
853
854 if (get_user(new_limit, (u64 __user *)attr->addr))
855 return -EFAULT;
856
Dominik Dingela3a92c32014-12-01 17:24:42 +0100857 if (kvm->arch.mem_limit != KVM_S390_NO_MEM_LIMIT &&
858 new_limit > kvm->arch.mem_limit)
Dominik Dingel8c0a7ce2014-10-31 14:10:41 +0100859 return -E2BIG;
860
Dominik Dingela3a92c32014-12-01 17:24:42 +0100861 if (!new_limit)
862 return -EINVAL;
863
Martin Schwidefsky6ea427b2016-03-08 11:55:04 +0100864 /* gmap_create takes last usable address */
Dominik Dingela3a92c32014-12-01 17:24:42 +0100865 if (new_limit != KVM_S390_NO_MEM_LIMIT)
866 new_limit -= 1;
867
Dominik Dingel8c0a7ce2014-10-31 14:10:41 +0100868 ret = -EBUSY;
869 mutex_lock(&kvm->lock);
Paolo Bonzinia03825b2016-06-13 14:50:04 +0200870 if (!kvm->created_vcpus) {
Martin Schwidefsky6ea427b2016-03-08 11:55:04 +0100871 /* gmap_create will round the limit up */
872 struct gmap *new = gmap_create(current->mm, new_limit);
Dominik Dingel8c0a7ce2014-10-31 14:10:41 +0100873
874 if (!new) {
875 ret = -ENOMEM;
876 } else {
Martin Schwidefsky6ea427b2016-03-08 11:55:04 +0100877 gmap_remove(kvm->arch.gmap);
Dominik Dingel8c0a7ce2014-10-31 14:10:41 +0100878 new->private = kvm;
879 kvm->arch.gmap = new;
880 ret = 0;
881 }
882 }
883 mutex_unlock(&kvm->lock);
Dominik Dingela3a92c32014-12-01 17:24:42 +0100884 VM_EVENT(kvm, 3, "SET: max guest address: %lu", new_limit);
885 VM_EVENT(kvm, 3, "New guest asce: 0x%pK",
886 (void *) kvm->arch.gmap->asce);
Dominik Dingel8c0a7ce2014-10-31 14:10:41 +0100887 break;
888 }
Dominik Dingel4f718ea2014-04-09 13:13:00 +0200889 default:
890 ret = -ENXIO;
891 break;
892 }
893 return ret;
894}
895
Tony Krowiaka374e892014-09-03 10:13:53 +0200896static void kvm_s390_vcpu_crypto_setup(struct kvm_vcpu *vcpu);
897
Tony Krowiak20c922f2018-04-22 11:37:03 -0400898void kvm_s390_vcpu_crypto_reset_all(struct kvm *kvm)
Tony Krowiaka374e892014-09-03 10:13:53 +0200899{
900 struct kvm_vcpu *vcpu;
901 int i;
902
Tony Krowiak20c922f2018-04-22 11:37:03 -0400903 kvm_s390_vcpu_block_all(kvm);
904
David Hildenbrand3194cdb2018-09-25 19:16:17 -0400905 kvm_for_each_vcpu(i, vcpu, kvm) {
Tony Krowiak20c922f2018-04-22 11:37:03 -0400906 kvm_s390_vcpu_crypto_setup(vcpu);
David Hildenbrand3194cdb2018-09-25 19:16:17 -0400907 /* recreate the shadow crycb by leaving the VSIE handler */
908 kvm_s390_sync_request(KVM_REQ_VSIE_RESTART, vcpu);
909 }
Tony Krowiak20c922f2018-04-22 11:37:03 -0400910
911 kvm_s390_vcpu_unblock_all(kvm);
912}
913
914static int kvm_s390_vm_set_crypto(struct kvm *kvm, struct kvm_device_attr *attr)
915{
Tony Krowiaka374e892014-09-03 10:13:53 +0200916 mutex_lock(&kvm->lock);
917 switch (attr->attr) {
918 case KVM_S390_VM_CRYPTO_ENABLE_AES_KW:
Christian Borntraeger8e41bd52018-10-04 14:42:43 +0200919 if (!test_kvm_facility(kvm, 76)) {
920 mutex_unlock(&kvm->lock);
Tony Krowiak37940fb2018-09-25 19:16:39 -0400921 return -EINVAL;
Christian Borntraeger8e41bd52018-10-04 14:42:43 +0200922 }
Tony Krowiaka374e892014-09-03 10:13:53 +0200923 get_random_bytes(
924 kvm->arch.crypto.crycb->aes_wrapping_key_mask,
925 sizeof(kvm->arch.crypto.crycb->aes_wrapping_key_mask));
926 kvm->arch.crypto.aes_kw = 1;
Christian Borntraegerc92ea7b2015-07-22 15:52:10 +0200927 VM_EVENT(kvm, 3, "%s", "ENABLE: AES keywrapping support");
Tony Krowiaka374e892014-09-03 10:13:53 +0200928 break;
929 case KVM_S390_VM_CRYPTO_ENABLE_DEA_KW:
Christian Borntraeger8e41bd52018-10-04 14:42:43 +0200930 if (!test_kvm_facility(kvm, 76)) {
931 mutex_unlock(&kvm->lock);
Tony Krowiak37940fb2018-09-25 19:16:39 -0400932 return -EINVAL;
Christian Borntraeger8e41bd52018-10-04 14:42:43 +0200933 }
Tony Krowiaka374e892014-09-03 10:13:53 +0200934 get_random_bytes(
935 kvm->arch.crypto.crycb->dea_wrapping_key_mask,
936 sizeof(kvm->arch.crypto.crycb->dea_wrapping_key_mask));
937 kvm->arch.crypto.dea_kw = 1;
Christian Borntraegerc92ea7b2015-07-22 15:52:10 +0200938 VM_EVENT(kvm, 3, "%s", "ENABLE: DEA keywrapping support");
Tony Krowiaka374e892014-09-03 10:13:53 +0200939 break;
940 case KVM_S390_VM_CRYPTO_DISABLE_AES_KW:
Christian Borntraeger8e41bd52018-10-04 14:42:43 +0200941 if (!test_kvm_facility(kvm, 76)) {
942 mutex_unlock(&kvm->lock);
Tony Krowiak37940fb2018-09-25 19:16:39 -0400943 return -EINVAL;
Christian Borntraeger8e41bd52018-10-04 14:42:43 +0200944 }
Tony Krowiaka374e892014-09-03 10:13:53 +0200945 kvm->arch.crypto.aes_kw = 0;
946 memset(kvm->arch.crypto.crycb->aes_wrapping_key_mask, 0,
947 sizeof(kvm->arch.crypto.crycb->aes_wrapping_key_mask));
Christian Borntraegerc92ea7b2015-07-22 15:52:10 +0200948 VM_EVENT(kvm, 3, "%s", "DISABLE: AES keywrapping support");
Tony Krowiaka374e892014-09-03 10:13:53 +0200949 break;
950 case KVM_S390_VM_CRYPTO_DISABLE_DEA_KW:
Christian Borntraeger8e41bd52018-10-04 14:42:43 +0200951 if (!test_kvm_facility(kvm, 76)) {
952 mutex_unlock(&kvm->lock);
Tony Krowiak37940fb2018-09-25 19:16:39 -0400953 return -EINVAL;
Christian Borntraeger8e41bd52018-10-04 14:42:43 +0200954 }
Tony Krowiaka374e892014-09-03 10:13:53 +0200955 kvm->arch.crypto.dea_kw = 0;
956 memset(kvm->arch.crypto.crycb->dea_wrapping_key_mask, 0,
957 sizeof(kvm->arch.crypto.crycb->dea_wrapping_key_mask));
Christian Borntraegerc92ea7b2015-07-22 15:52:10 +0200958 VM_EVENT(kvm, 3, "%s", "DISABLE: DEA keywrapping support");
Tony Krowiaka374e892014-09-03 10:13:53 +0200959 break;
Tony Krowiak37940fb2018-09-25 19:16:39 -0400960 case KVM_S390_VM_CRYPTO_ENABLE_APIE:
961 if (!ap_instructions_available()) {
962 mutex_unlock(&kvm->lock);
963 return -EOPNOTSUPP;
964 }
965 kvm->arch.crypto.apie = 1;
966 break;
967 case KVM_S390_VM_CRYPTO_DISABLE_APIE:
968 if (!ap_instructions_available()) {
969 mutex_unlock(&kvm->lock);
970 return -EOPNOTSUPP;
971 }
972 kvm->arch.crypto.apie = 0;
973 break;
Tony Krowiaka374e892014-09-03 10:13:53 +0200974 default:
975 mutex_unlock(&kvm->lock);
976 return -ENXIO;
977 }
978
Tony Krowiak20c922f2018-04-22 11:37:03 -0400979 kvm_s390_vcpu_crypto_reset_all(kvm);
Tony Krowiaka374e892014-09-03 10:13:53 +0200980 mutex_unlock(&kvm->lock);
981 return 0;
982}
983
Claudio Imbrenda190df4a2016-08-04 17:54:42 +0200984static void kvm_s390_sync_request_broadcast(struct kvm *kvm, int req)
985{
986 int cx;
987 struct kvm_vcpu *vcpu;
988
989 kvm_for_each_vcpu(cx, vcpu, kvm)
990 kvm_s390_sync_request(req, vcpu);
991}
992
993/*
994 * Must be called with kvm->srcu held to avoid races on memslots, and with
Christian Borntraeger1de1ea72017-12-22 10:54:20 +0100995 * kvm->slots_lock to avoid races with ourselves and kvm_s390_vm_stop_migration.
Claudio Imbrenda190df4a2016-08-04 17:54:42 +0200996 */
997static int kvm_s390_vm_start_migration(struct kvm *kvm)
998{
Claudio Imbrenda190df4a2016-08-04 17:54:42 +0200999 struct kvm_memory_slot *ms;
Claudio Imbrenda190df4a2016-08-04 17:54:42 +02001000 struct kvm_memslots *slots;
Claudio Imbrendaafdad612018-04-30 18:33:25 +02001001 unsigned long ram_pages = 0;
Claudio Imbrenda190df4a2016-08-04 17:54:42 +02001002 int slotnr;
1003
1004 /* migration mode already enabled */
Claudio Imbrendaafdad612018-04-30 18:33:25 +02001005 if (kvm->arch.migration_mode)
Claudio Imbrenda190df4a2016-08-04 17:54:42 +02001006 return 0;
Claudio Imbrenda190df4a2016-08-04 17:54:42 +02001007 slots = kvm_memslots(kvm);
1008 if (!slots || !slots->used_slots)
1009 return -EINVAL;
1010
Claudio Imbrendaafdad612018-04-30 18:33:25 +02001011 if (!kvm->arch.use_cmma) {
1012 kvm->arch.migration_mode = 1;
1013 return 0;
Claudio Imbrenda190df4a2016-08-04 17:54:42 +02001014 }
Claudio Imbrendaafdad612018-04-30 18:33:25 +02001015 /* mark all the pages in active slots as dirty */
1016 for (slotnr = 0; slotnr < slots->used_slots; slotnr++) {
1017 ms = slots->memslots + slotnr;
Igor Mammedov13a17cc2019-09-11 03:52:18 -04001018 if (!ms->dirty_bitmap)
1019 return -EINVAL;
Claudio Imbrendaafdad612018-04-30 18:33:25 +02001020 /*
1021 * The second half of the bitmap is only used on x86,
1022 * and would be wasted otherwise, so we put it to good
1023 * use here to keep track of the state of the storage
1024 * attributes.
1025 */
1026 memset(kvm_second_dirty_bitmap(ms), 0xff, kvm_dirty_bitmap_bytes(ms));
1027 ram_pages += ms->npages;
1028 }
1029 atomic64_set(&kvm->arch.cmma_dirty_pages, ram_pages);
1030 kvm->arch.migration_mode = 1;
1031 kvm_s390_sync_request_broadcast(kvm, KVM_REQ_START_MIGRATION);
Claudio Imbrenda190df4a2016-08-04 17:54:42 +02001032 return 0;
1033}
1034
1035/*
Christian Borntraeger1de1ea72017-12-22 10:54:20 +01001036 * Must be called with kvm->slots_lock to avoid races with ourselves and
Claudio Imbrenda190df4a2016-08-04 17:54:42 +02001037 * kvm_s390_vm_start_migration.
1038 */
1039static int kvm_s390_vm_stop_migration(struct kvm *kvm)
1040{
Claudio Imbrenda190df4a2016-08-04 17:54:42 +02001041 /* migration mode already disabled */
Claudio Imbrendaafdad612018-04-30 18:33:25 +02001042 if (!kvm->arch.migration_mode)
Claudio Imbrenda190df4a2016-08-04 17:54:42 +02001043 return 0;
Claudio Imbrendaafdad612018-04-30 18:33:25 +02001044 kvm->arch.migration_mode = 0;
1045 if (kvm->arch.use_cmma)
Claudio Imbrenda190df4a2016-08-04 17:54:42 +02001046 kvm_s390_sync_request_broadcast(kvm, KVM_REQ_STOP_MIGRATION);
Claudio Imbrenda190df4a2016-08-04 17:54:42 +02001047 return 0;
1048}
1049
1050static int kvm_s390_vm_set_migration(struct kvm *kvm,
1051 struct kvm_device_attr *attr)
1052{
Christian Borntraeger1de1ea72017-12-22 10:54:20 +01001053 int res = -ENXIO;
Claudio Imbrenda190df4a2016-08-04 17:54:42 +02001054
Christian Borntraeger1de1ea72017-12-22 10:54:20 +01001055 mutex_lock(&kvm->slots_lock);
Claudio Imbrenda190df4a2016-08-04 17:54:42 +02001056 switch (attr->attr) {
1057 case KVM_S390_VM_MIGRATION_START:
Claudio Imbrenda190df4a2016-08-04 17:54:42 +02001058 res = kvm_s390_vm_start_migration(kvm);
Claudio Imbrenda190df4a2016-08-04 17:54:42 +02001059 break;
1060 case KVM_S390_VM_MIGRATION_STOP:
1061 res = kvm_s390_vm_stop_migration(kvm);
1062 break;
1063 default:
1064 break;
1065 }
Christian Borntraeger1de1ea72017-12-22 10:54:20 +01001066 mutex_unlock(&kvm->slots_lock);
Claudio Imbrenda190df4a2016-08-04 17:54:42 +02001067
1068 return res;
1069}
1070
1071static int kvm_s390_vm_get_migration(struct kvm *kvm,
1072 struct kvm_device_attr *attr)
1073{
Claudio Imbrendaafdad612018-04-30 18:33:25 +02001074 u64 mig = kvm->arch.migration_mode;
Claudio Imbrenda190df4a2016-08-04 17:54:42 +02001075
1076 if (attr->attr != KVM_S390_VM_MIGRATION_STATUS)
1077 return -ENXIO;
1078
1079 if (copy_to_user((void __user *)attr->addr, &mig, sizeof(mig)))
1080 return -EFAULT;
1081 return 0;
1082}
1083
Collin L. Walling8fa16962016-07-26 15:29:44 -04001084static int kvm_s390_set_tod_ext(struct kvm *kvm, struct kvm_device_attr *attr)
1085{
1086 struct kvm_s390_vm_tod_clock gtod;
1087
1088 if (copy_from_user(&gtod, (void __user *)attr->addr, sizeof(gtod)))
1089 return -EFAULT;
1090
David Hildenbrand0e7def52018-02-07 12:46:43 +01001091 if (!test_kvm_facility(kvm, 139) && gtod.epoch_idx)
Collin L. Walling8fa16962016-07-26 15:29:44 -04001092 return -EINVAL;
David Hildenbrand0e7def52018-02-07 12:46:43 +01001093 kvm_s390_set_tod_clock(kvm, &gtod);
Collin L. Walling8fa16962016-07-26 15:29:44 -04001094
1095 VM_EVENT(kvm, 3, "SET: TOD extension: 0x%x, TOD base: 0x%llx",
1096 gtod.epoch_idx, gtod.tod);
1097
1098 return 0;
1099}
1100
Jason J. Herne72f25022014-11-25 09:46:02 -05001101static int kvm_s390_set_tod_high(struct kvm *kvm, struct kvm_device_attr *attr)
1102{
1103 u8 gtod_high;
1104
1105 if (copy_from_user(&gtod_high, (void __user *)attr->addr,
1106 sizeof(gtod_high)))
1107 return -EFAULT;
1108
1109 if (gtod_high != 0)
1110 return -EINVAL;
Christian Borntraeger58c383c2015-10-12 13:27:29 +02001111 VM_EVENT(kvm, 3, "SET: TOD extension: 0x%x", gtod_high);
Jason J. Herne72f25022014-11-25 09:46:02 -05001112
1113 return 0;
1114}
1115
1116static int kvm_s390_set_tod_low(struct kvm *kvm, struct kvm_device_attr *attr)
1117{
David Hildenbrand0e7def52018-02-07 12:46:43 +01001118 struct kvm_s390_vm_tod_clock gtod = { 0 };
Jason J. Herne72f25022014-11-25 09:46:02 -05001119
David Hildenbrand0e7def52018-02-07 12:46:43 +01001120 if (copy_from_user(&gtod.tod, (void __user *)attr->addr,
1121 sizeof(gtod.tod)))
Jason J. Herne72f25022014-11-25 09:46:02 -05001122 return -EFAULT;
1123
David Hildenbrand0e7def52018-02-07 12:46:43 +01001124 kvm_s390_set_tod_clock(kvm, &gtod);
1125 VM_EVENT(kvm, 3, "SET: TOD base: 0x%llx", gtod.tod);
Jason J. Herne72f25022014-11-25 09:46:02 -05001126 return 0;
1127}
1128
1129static int kvm_s390_set_tod(struct kvm *kvm, struct kvm_device_attr *attr)
1130{
1131 int ret;
1132
1133 if (attr->flags)
1134 return -EINVAL;
1135
1136 switch (attr->attr) {
Collin L. Walling8fa16962016-07-26 15:29:44 -04001137 case KVM_S390_VM_TOD_EXT:
1138 ret = kvm_s390_set_tod_ext(kvm, attr);
1139 break;
Jason J. Herne72f25022014-11-25 09:46:02 -05001140 case KVM_S390_VM_TOD_HIGH:
1141 ret = kvm_s390_set_tod_high(kvm, attr);
1142 break;
1143 case KVM_S390_VM_TOD_LOW:
1144 ret = kvm_s390_set_tod_low(kvm, attr);
1145 break;
1146 default:
1147 ret = -ENXIO;
1148 break;
1149 }
1150 return ret;
1151}
1152
David Hildenbrand33d1b272018-04-27 14:36:13 +02001153static void kvm_s390_get_tod_clock(struct kvm *kvm,
1154 struct kvm_s390_vm_tod_clock *gtod)
Collin L. Walling8fa16962016-07-26 15:29:44 -04001155{
1156 struct kvm_s390_tod_clock_ext htod;
1157
1158 preempt_disable();
1159
1160 get_tod_clock_ext((char *)&htod);
1161
1162 gtod->tod = htod.tod + kvm->arch.epoch;
David Hildenbrand33d1b272018-04-27 14:36:13 +02001163 gtod->epoch_idx = 0;
1164 if (test_kvm_facility(kvm, 139)) {
1165 gtod->epoch_idx = htod.epoch_idx + kvm->arch.epdx;
1166 if (gtod->tod < htod.tod)
1167 gtod->epoch_idx += 1;
1168 }
Collin L. Walling8fa16962016-07-26 15:29:44 -04001169
1170 preempt_enable();
1171}
1172
1173static int kvm_s390_get_tod_ext(struct kvm *kvm, struct kvm_device_attr *attr)
1174{
1175 struct kvm_s390_vm_tod_clock gtod;
1176
1177 memset(&gtod, 0, sizeof(gtod));
David Hildenbrand33d1b272018-04-27 14:36:13 +02001178 kvm_s390_get_tod_clock(kvm, &gtod);
Collin L. Walling8fa16962016-07-26 15:29:44 -04001179 if (copy_to_user((void __user *)attr->addr, &gtod, sizeof(gtod)))
1180 return -EFAULT;
1181
1182 VM_EVENT(kvm, 3, "QUERY: TOD extension: 0x%x, TOD base: 0x%llx",
1183 gtod.epoch_idx, gtod.tod);
1184 return 0;
1185}
1186
Jason J. Herne72f25022014-11-25 09:46:02 -05001187static int kvm_s390_get_tod_high(struct kvm *kvm, struct kvm_device_attr *attr)
1188{
1189 u8 gtod_high = 0;
1190
1191 if (copy_to_user((void __user *)attr->addr, &gtod_high,
1192 sizeof(gtod_high)))
1193 return -EFAULT;
Christian Borntraeger58c383c2015-10-12 13:27:29 +02001194 VM_EVENT(kvm, 3, "QUERY: TOD extension: 0x%x", gtod_high);
Jason J. Herne72f25022014-11-25 09:46:02 -05001195
1196 return 0;
1197}
1198
1199static int kvm_s390_get_tod_low(struct kvm *kvm, struct kvm_device_attr *attr)
1200{
David Hildenbrand5a3d8832015-09-29 16:27:24 +02001201 u64 gtod;
Jason J. Herne72f25022014-11-25 09:46:02 -05001202
David Hildenbrand60417fc2015-09-29 16:20:36 +02001203 gtod = kvm_s390_get_tod_clock_fast(kvm);
Jason J. Herne72f25022014-11-25 09:46:02 -05001204 if (copy_to_user((void __user *)attr->addr, &gtod, sizeof(gtod)))
1205 return -EFAULT;
Christian Borntraeger58c383c2015-10-12 13:27:29 +02001206 VM_EVENT(kvm, 3, "QUERY: TOD base: 0x%llx", gtod);
Jason J. Herne72f25022014-11-25 09:46:02 -05001207
1208 return 0;
1209}
1210
1211static int kvm_s390_get_tod(struct kvm *kvm, struct kvm_device_attr *attr)
1212{
1213 int ret;
1214
1215 if (attr->flags)
1216 return -EINVAL;
1217
1218 switch (attr->attr) {
Collin L. Walling8fa16962016-07-26 15:29:44 -04001219 case KVM_S390_VM_TOD_EXT:
1220 ret = kvm_s390_get_tod_ext(kvm, attr);
1221 break;
Jason J. Herne72f25022014-11-25 09:46:02 -05001222 case KVM_S390_VM_TOD_HIGH:
1223 ret = kvm_s390_get_tod_high(kvm, attr);
1224 break;
1225 case KVM_S390_VM_TOD_LOW:
1226 ret = kvm_s390_get_tod_low(kvm, attr);
1227 break;
1228 default:
1229 ret = -ENXIO;
1230 break;
1231 }
1232 return ret;
1233}
1234
Michael Mueller658b6ed2015-02-02 15:49:35 +01001235static int kvm_s390_set_processor(struct kvm *kvm, struct kvm_device_attr *attr)
1236{
1237 struct kvm_s390_vm_cpu_processor *proc;
David Hildenbrand053dd232016-04-04 13:59:42 +02001238 u16 lowest_ibc, unblocked_ibc;
Michael Mueller658b6ed2015-02-02 15:49:35 +01001239 int ret = 0;
1240
1241 mutex_lock(&kvm->lock);
Paolo Bonzinia03825b2016-06-13 14:50:04 +02001242 if (kvm->created_vcpus) {
Michael Mueller658b6ed2015-02-02 15:49:35 +01001243 ret = -EBUSY;
1244 goto out;
1245 }
1246 proc = kzalloc(sizeof(*proc), GFP_KERNEL);
1247 if (!proc) {
1248 ret = -ENOMEM;
1249 goto out;
1250 }
1251 if (!copy_from_user(proc, (void __user *)attr->addr,
1252 sizeof(*proc))) {
David Hildenbrand9bb0ec02016-04-04 14:27:51 +02001253 kvm->arch.model.cpuid = proc->cpuid;
David Hildenbrand053dd232016-04-04 13:59:42 +02001254 lowest_ibc = sclp.ibc >> 16 & 0xfff;
1255 unblocked_ibc = sclp.ibc & 0xfff;
David Hildenbrand0487c442016-06-10 09:22:31 +02001256 if (lowest_ibc && proc->ibc) {
David Hildenbrand053dd232016-04-04 13:59:42 +02001257 if (proc->ibc > unblocked_ibc)
1258 kvm->arch.model.ibc = unblocked_ibc;
1259 else if (proc->ibc < lowest_ibc)
1260 kvm->arch.model.ibc = lowest_ibc;
1261 else
1262 kvm->arch.model.ibc = proc->ibc;
1263 }
David Hildenbrandc54f0d62015-12-02 08:53:52 +01001264 memcpy(kvm->arch.model.fac_list, proc->fac_list,
Michael Mueller658b6ed2015-02-02 15:49:35 +01001265 S390_ARCH_FAC_LIST_SIZE_BYTE);
Christian Borntraegera8c39dd2017-01-18 16:01:02 +01001266 VM_EVENT(kvm, 3, "SET: guest ibc: 0x%4.4x, guest cpuid: 0x%16.16llx",
1267 kvm->arch.model.ibc,
1268 kvm->arch.model.cpuid);
1269 VM_EVENT(kvm, 3, "SET: guest faclist: 0x%16.16llx.%16.16llx.%16.16llx",
1270 kvm->arch.model.fac_list[0],
1271 kvm->arch.model.fac_list[1],
1272 kvm->arch.model.fac_list[2]);
Michael Mueller658b6ed2015-02-02 15:49:35 +01001273 } else
1274 ret = -EFAULT;
1275 kfree(proc);
1276out:
1277 mutex_unlock(&kvm->lock);
1278 return ret;
1279}
1280
David Hildenbrand15c97052015-03-19 17:36:43 +01001281static int kvm_s390_set_processor_feat(struct kvm *kvm,
1282 struct kvm_device_attr *attr)
1283{
1284 struct kvm_s390_vm_cpu_feat data;
David Hildenbrand15c97052015-03-19 17:36:43 +01001285
1286 if (copy_from_user(&data, (void __user *)attr->addr, sizeof(data)))
1287 return -EFAULT;
1288 if (!bitmap_subset((unsigned long *) data.feat,
1289 kvm_s390_available_cpu_feat,
1290 KVM_S390_VM_CPU_FEAT_NR_BITS))
1291 return -EINVAL;
1292
1293 mutex_lock(&kvm->lock);
Christian Borntraeger2f8311c2017-11-16 12:30:15 +01001294 if (kvm->created_vcpus) {
1295 mutex_unlock(&kvm->lock);
1296 return -EBUSY;
David Hildenbrand15c97052015-03-19 17:36:43 +01001297 }
Christian Borntraeger2f8311c2017-11-16 12:30:15 +01001298 bitmap_copy(kvm->arch.cpu_feat, (unsigned long *) data.feat,
1299 KVM_S390_VM_CPU_FEAT_NR_BITS);
David Hildenbrand15c97052015-03-19 17:36:43 +01001300 mutex_unlock(&kvm->lock);
Christian Borntraeger2f8311c2017-11-16 12:30:15 +01001301 VM_EVENT(kvm, 3, "SET: guest feat: 0x%16.16llx.0x%16.16llx.0x%16.16llx",
1302 data.feat[0],
1303 data.feat[1],
1304 data.feat[2]);
1305 return 0;
David Hildenbrand15c97052015-03-19 17:36:43 +01001306}
1307
David Hildenbrand0a763c72016-05-18 16:03:47 +02001308static int kvm_s390_set_processor_subfunc(struct kvm *kvm,
1309 struct kvm_device_attr *attr)
1310{
Christian Borntraeger346fa2f2019-02-18 07:48:25 -05001311 mutex_lock(&kvm->lock);
1312 if (kvm->created_vcpus) {
1313 mutex_unlock(&kvm->lock);
1314 return -EBUSY;
1315 }
1316
1317 if (copy_from_user(&kvm->arch.model.subfuncs, (void __user *)attr->addr,
1318 sizeof(struct kvm_s390_vm_cpu_subfunc))) {
1319 mutex_unlock(&kvm->lock);
1320 return -EFAULT;
1321 }
1322 mutex_unlock(&kvm->lock);
1323
Christian Borntraeger11ba5962019-02-20 11:38:42 -05001324 VM_EVENT(kvm, 3, "SET: guest PLO subfunc 0x%16.16lx.%16.16lx.%16.16lx.%16.16lx",
1325 ((unsigned long *) &kvm->arch.model.subfuncs.plo)[0],
1326 ((unsigned long *) &kvm->arch.model.subfuncs.plo)[1],
1327 ((unsigned long *) &kvm->arch.model.subfuncs.plo)[2],
1328 ((unsigned long *) &kvm->arch.model.subfuncs.plo)[3]);
1329 VM_EVENT(kvm, 3, "SET: guest PTFF subfunc 0x%16.16lx.%16.16lx",
1330 ((unsigned long *) &kvm->arch.model.subfuncs.ptff)[0],
1331 ((unsigned long *) &kvm->arch.model.subfuncs.ptff)[1]);
1332 VM_EVENT(kvm, 3, "SET: guest KMAC subfunc 0x%16.16lx.%16.16lx",
1333 ((unsigned long *) &kvm->arch.model.subfuncs.kmac)[0],
1334 ((unsigned long *) &kvm->arch.model.subfuncs.kmac)[1]);
1335 VM_EVENT(kvm, 3, "SET: guest KMC subfunc 0x%16.16lx.%16.16lx",
1336 ((unsigned long *) &kvm->arch.model.subfuncs.kmc)[0],
1337 ((unsigned long *) &kvm->arch.model.subfuncs.kmc)[1]);
1338 VM_EVENT(kvm, 3, "SET: guest KM subfunc 0x%16.16lx.%16.16lx",
1339 ((unsigned long *) &kvm->arch.model.subfuncs.km)[0],
1340 ((unsigned long *) &kvm->arch.model.subfuncs.km)[1]);
1341 VM_EVENT(kvm, 3, "SET: guest KIMD subfunc 0x%16.16lx.%16.16lx",
1342 ((unsigned long *) &kvm->arch.model.subfuncs.kimd)[0],
1343 ((unsigned long *) &kvm->arch.model.subfuncs.kimd)[1]);
1344 VM_EVENT(kvm, 3, "SET: guest KLMD subfunc 0x%16.16lx.%16.16lx",
1345 ((unsigned long *) &kvm->arch.model.subfuncs.klmd)[0],
1346 ((unsigned long *) &kvm->arch.model.subfuncs.klmd)[1]);
1347 VM_EVENT(kvm, 3, "SET: guest PCKMO subfunc 0x%16.16lx.%16.16lx",
1348 ((unsigned long *) &kvm->arch.model.subfuncs.pckmo)[0],
1349 ((unsigned long *) &kvm->arch.model.subfuncs.pckmo)[1]);
1350 VM_EVENT(kvm, 3, "SET: guest KMCTR subfunc 0x%16.16lx.%16.16lx",
1351 ((unsigned long *) &kvm->arch.model.subfuncs.kmctr)[0],
1352 ((unsigned long *) &kvm->arch.model.subfuncs.kmctr)[1]);
1353 VM_EVENT(kvm, 3, "SET: guest KMF subfunc 0x%16.16lx.%16.16lx",
1354 ((unsigned long *) &kvm->arch.model.subfuncs.kmf)[0],
1355 ((unsigned long *) &kvm->arch.model.subfuncs.kmf)[1]);
1356 VM_EVENT(kvm, 3, "SET: guest KMO subfunc 0x%16.16lx.%16.16lx",
1357 ((unsigned long *) &kvm->arch.model.subfuncs.kmo)[0],
1358 ((unsigned long *) &kvm->arch.model.subfuncs.kmo)[1]);
1359 VM_EVENT(kvm, 3, "SET: guest PCC subfunc 0x%16.16lx.%16.16lx",
1360 ((unsigned long *) &kvm->arch.model.subfuncs.pcc)[0],
1361 ((unsigned long *) &kvm->arch.model.subfuncs.pcc)[1]);
1362 VM_EVENT(kvm, 3, "SET: guest PPNO subfunc 0x%16.16lx.%16.16lx",
1363 ((unsigned long *) &kvm->arch.model.subfuncs.ppno)[0],
1364 ((unsigned long *) &kvm->arch.model.subfuncs.ppno)[1]);
1365 VM_EVENT(kvm, 3, "SET: guest KMA subfunc 0x%16.16lx.%16.16lx",
1366 ((unsigned long *) &kvm->arch.model.subfuncs.kma)[0],
1367 ((unsigned long *) &kvm->arch.model.subfuncs.kma)[1]);
Christian Borntraeger13209ad2018-12-28 09:33:35 +01001368 VM_EVENT(kvm, 3, "SET: guest KDSA subfunc 0x%16.16lx.%16.16lx",
1369 ((unsigned long *) &kvm->arch.model.subfuncs.kdsa)[0],
1370 ((unsigned long *) &kvm->arch.model.subfuncs.kdsa)[1]);
Christian Borntraeger173aec22018-12-28 10:59:06 +01001371 VM_EVENT(kvm, 3, "SET: guest SORTL subfunc 0x%16.16lx.%16.16lx.%16.16lx.%16.16lx",
1372 ((unsigned long *) &kvm->arch.model.subfuncs.sortl)[0],
1373 ((unsigned long *) &kvm->arch.model.subfuncs.sortl)[1],
1374 ((unsigned long *) &kvm->arch.model.subfuncs.sortl)[2],
1375 ((unsigned long *) &kvm->arch.model.subfuncs.sortl)[3]);
Christian Borntraeger4f45b902018-12-28 10:46:04 +01001376 VM_EVENT(kvm, 3, "SET: guest DFLTCC subfunc 0x%16.16lx.%16.16lx.%16.16lx.%16.16lx",
1377 ((unsigned long *) &kvm->arch.model.subfuncs.dfltcc)[0],
1378 ((unsigned long *) &kvm->arch.model.subfuncs.dfltcc)[1],
1379 ((unsigned long *) &kvm->arch.model.subfuncs.dfltcc)[2],
1380 ((unsigned long *) &kvm->arch.model.subfuncs.dfltcc)[3]);
Christian Borntraeger11ba5962019-02-20 11:38:42 -05001381
Christian Borntraeger346fa2f2019-02-18 07:48:25 -05001382 return 0;
David Hildenbrand0a763c72016-05-18 16:03:47 +02001383}
1384
Michael Mueller658b6ed2015-02-02 15:49:35 +01001385static int kvm_s390_set_cpu_model(struct kvm *kvm, struct kvm_device_attr *attr)
1386{
1387 int ret = -ENXIO;
1388
1389 switch (attr->attr) {
1390 case KVM_S390_VM_CPU_PROCESSOR:
1391 ret = kvm_s390_set_processor(kvm, attr);
1392 break;
David Hildenbrand15c97052015-03-19 17:36:43 +01001393 case KVM_S390_VM_CPU_PROCESSOR_FEAT:
1394 ret = kvm_s390_set_processor_feat(kvm, attr);
1395 break;
David Hildenbrand0a763c72016-05-18 16:03:47 +02001396 case KVM_S390_VM_CPU_PROCESSOR_SUBFUNC:
1397 ret = kvm_s390_set_processor_subfunc(kvm, attr);
1398 break;
Michael Mueller658b6ed2015-02-02 15:49:35 +01001399 }
1400 return ret;
1401}
1402
1403static int kvm_s390_get_processor(struct kvm *kvm, struct kvm_device_attr *attr)
1404{
1405 struct kvm_s390_vm_cpu_processor *proc;
1406 int ret = 0;
1407
1408 proc = kzalloc(sizeof(*proc), GFP_KERNEL);
1409 if (!proc) {
1410 ret = -ENOMEM;
1411 goto out;
1412 }
David Hildenbrand9bb0ec02016-04-04 14:27:51 +02001413 proc->cpuid = kvm->arch.model.cpuid;
Michael Mueller658b6ed2015-02-02 15:49:35 +01001414 proc->ibc = kvm->arch.model.ibc;
David Hildenbrandc54f0d62015-12-02 08:53:52 +01001415 memcpy(&proc->fac_list, kvm->arch.model.fac_list,
1416 S390_ARCH_FAC_LIST_SIZE_BYTE);
Christian Borntraegera8c39dd2017-01-18 16:01:02 +01001417 VM_EVENT(kvm, 3, "GET: guest ibc: 0x%4.4x, guest cpuid: 0x%16.16llx",
1418 kvm->arch.model.ibc,
1419 kvm->arch.model.cpuid);
1420 VM_EVENT(kvm, 3, "GET: guest faclist: 0x%16.16llx.%16.16llx.%16.16llx",
1421 kvm->arch.model.fac_list[0],
1422 kvm->arch.model.fac_list[1],
1423 kvm->arch.model.fac_list[2]);
Michael Mueller658b6ed2015-02-02 15:49:35 +01001424 if (copy_to_user((void __user *)attr->addr, proc, sizeof(*proc)))
1425 ret = -EFAULT;
1426 kfree(proc);
1427out:
1428 return ret;
1429}
1430
1431static int kvm_s390_get_machine(struct kvm *kvm, struct kvm_device_attr *attr)
1432{
1433 struct kvm_s390_vm_cpu_machine *mach;
1434 int ret = 0;
1435
1436 mach = kzalloc(sizeof(*mach), GFP_KERNEL);
1437 if (!mach) {
1438 ret = -ENOMEM;
1439 goto out;
1440 }
1441 get_cpu_id((struct cpuid *) &mach->cpuid);
David Hildenbrand37c5f6c2015-05-06 13:18:59 +02001442 mach->ibc = sclp.ibc;
David Hildenbrandc54f0d62015-12-02 08:53:52 +01001443 memcpy(&mach->fac_mask, kvm->arch.model.fac_mask,
Michael Mueller981467c2015-02-24 13:51:04 +01001444 S390_ARCH_FAC_LIST_SIZE_BYTE);
Michael Mueller658b6ed2015-02-02 15:49:35 +01001445 memcpy((unsigned long *)&mach->fac_list, S390_lowcore.stfle_fac_list,
Christian Borntraeger04478192017-01-12 16:25:15 +01001446 sizeof(S390_lowcore.stfle_fac_list));
Christian Borntraegera8c39dd2017-01-18 16:01:02 +01001447 VM_EVENT(kvm, 3, "GET: host ibc: 0x%4.4x, host cpuid: 0x%16.16llx",
1448 kvm->arch.model.ibc,
1449 kvm->arch.model.cpuid);
1450 VM_EVENT(kvm, 3, "GET: host facmask: 0x%16.16llx.%16.16llx.%16.16llx",
1451 mach->fac_mask[0],
1452 mach->fac_mask[1],
1453 mach->fac_mask[2]);
1454 VM_EVENT(kvm, 3, "GET: host faclist: 0x%16.16llx.%16.16llx.%16.16llx",
1455 mach->fac_list[0],
1456 mach->fac_list[1],
1457 mach->fac_list[2]);
Michael Mueller658b6ed2015-02-02 15:49:35 +01001458 if (copy_to_user((void __user *)attr->addr, mach, sizeof(*mach)))
1459 ret = -EFAULT;
1460 kfree(mach);
1461out:
1462 return ret;
1463}
1464
David Hildenbrand15c97052015-03-19 17:36:43 +01001465static int kvm_s390_get_processor_feat(struct kvm *kvm,
1466 struct kvm_device_attr *attr)
1467{
1468 struct kvm_s390_vm_cpu_feat data;
1469
1470 bitmap_copy((unsigned long *) data.feat, kvm->arch.cpu_feat,
1471 KVM_S390_VM_CPU_FEAT_NR_BITS);
1472 if (copy_to_user((void __user *)attr->addr, &data, sizeof(data)))
1473 return -EFAULT;
Christian Borntraeger2f8311c2017-11-16 12:30:15 +01001474 VM_EVENT(kvm, 3, "GET: guest feat: 0x%16.16llx.0x%16.16llx.0x%16.16llx",
1475 data.feat[0],
1476 data.feat[1],
1477 data.feat[2]);
David Hildenbrand15c97052015-03-19 17:36:43 +01001478 return 0;
1479}
1480
1481static int kvm_s390_get_machine_feat(struct kvm *kvm,
1482 struct kvm_device_attr *attr)
1483{
1484 struct kvm_s390_vm_cpu_feat data;
1485
1486 bitmap_copy((unsigned long *) data.feat,
1487 kvm_s390_available_cpu_feat,
1488 KVM_S390_VM_CPU_FEAT_NR_BITS);
1489 if (copy_to_user((void __user *)attr->addr, &data, sizeof(data)))
1490 return -EFAULT;
Christian Borntraeger2f8311c2017-11-16 12:30:15 +01001491 VM_EVENT(kvm, 3, "GET: host feat: 0x%16.16llx.0x%16.16llx.0x%16.16llx",
1492 data.feat[0],
1493 data.feat[1],
1494 data.feat[2]);
David Hildenbrand15c97052015-03-19 17:36:43 +01001495 return 0;
1496}
1497
David Hildenbrand0a763c72016-05-18 16:03:47 +02001498static int kvm_s390_get_processor_subfunc(struct kvm *kvm,
1499 struct kvm_device_attr *attr)
1500{
Christian Borntraeger346fa2f2019-02-18 07:48:25 -05001501 if (copy_to_user((void __user *)attr->addr, &kvm->arch.model.subfuncs,
1502 sizeof(struct kvm_s390_vm_cpu_subfunc)))
1503 return -EFAULT;
1504
Christian Borntraeger11ba5962019-02-20 11:38:42 -05001505 VM_EVENT(kvm, 3, "GET: guest PLO subfunc 0x%16.16lx.%16.16lx.%16.16lx.%16.16lx",
1506 ((unsigned long *) &kvm->arch.model.subfuncs.plo)[0],
1507 ((unsigned long *) &kvm->arch.model.subfuncs.plo)[1],
1508 ((unsigned long *) &kvm->arch.model.subfuncs.plo)[2],
1509 ((unsigned long *) &kvm->arch.model.subfuncs.plo)[3]);
1510 VM_EVENT(kvm, 3, "GET: guest PTFF subfunc 0x%16.16lx.%16.16lx",
1511 ((unsigned long *) &kvm->arch.model.subfuncs.ptff)[0],
1512 ((unsigned long *) &kvm->arch.model.subfuncs.ptff)[1]);
1513 VM_EVENT(kvm, 3, "GET: guest KMAC subfunc 0x%16.16lx.%16.16lx",
1514 ((unsigned long *) &kvm->arch.model.subfuncs.kmac)[0],
1515 ((unsigned long *) &kvm->arch.model.subfuncs.kmac)[1]);
1516 VM_EVENT(kvm, 3, "GET: guest KMC subfunc 0x%16.16lx.%16.16lx",
1517 ((unsigned long *) &kvm->arch.model.subfuncs.kmc)[0],
1518 ((unsigned long *) &kvm->arch.model.subfuncs.kmc)[1]);
1519 VM_EVENT(kvm, 3, "GET: guest KM subfunc 0x%16.16lx.%16.16lx",
1520 ((unsigned long *) &kvm->arch.model.subfuncs.km)[0],
1521 ((unsigned long *) &kvm->arch.model.subfuncs.km)[1]);
1522 VM_EVENT(kvm, 3, "GET: guest KIMD subfunc 0x%16.16lx.%16.16lx",
1523 ((unsigned long *) &kvm->arch.model.subfuncs.kimd)[0],
1524 ((unsigned long *) &kvm->arch.model.subfuncs.kimd)[1]);
1525 VM_EVENT(kvm, 3, "GET: guest KLMD subfunc 0x%16.16lx.%16.16lx",
1526 ((unsigned long *) &kvm->arch.model.subfuncs.klmd)[0],
1527 ((unsigned long *) &kvm->arch.model.subfuncs.klmd)[1]);
1528 VM_EVENT(kvm, 3, "GET: guest PCKMO subfunc 0x%16.16lx.%16.16lx",
1529 ((unsigned long *) &kvm->arch.model.subfuncs.pckmo)[0],
1530 ((unsigned long *) &kvm->arch.model.subfuncs.pckmo)[1]);
1531 VM_EVENT(kvm, 3, "GET: guest KMCTR subfunc 0x%16.16lx.%16.16lx",
1532 ((unsigned long *) &kvm->arch.model.subfuncs.kmctr)[0],
1533 ((unsigned long *) &kvm->arch.model.subfuncs.kmctr)[1]);
1534 VM_EVENT(kvm, 3, "GET: guest KMF subfunc 0x%16.16lx.%16.16lx",
1535 ((unsigned long *) &kvm->arch.model.subfuncs.kmf)[0],
1536 ((unsigned long *) &kvm->arch.model.subfuncs.kmf)[1]);
1537 VM_EVENT(kvm, 3, "GET: guest KMO subfunc 0x%16.16lx.%16.16lx",
1538 ((unsigned long *) &kvm->arch.model.subfuncs.kmo)[0],
1539 ((unsigned long *) &kvm->arch.model.subfuncs.kmo)[1]);
1540 VM_EVENT(kvm, 3, "GET: guest PCC subfunc 0x%16.16lx.%16.16lx",
1541 ((unsigned long *) &kvm->arch.model.subfuncs.pcc)[0],
1542 ((unsigned long *) &kvm->arch.model.subfuncs.pcc)[1]);
1543 VM_EVENT(kvm, 3, "GET: guest PPNO subfunc 0x%16.16lx.%16.16lx",
1544 ((unsigned long *) &kvm->arch.model.subfuncs.ppno)[0],
1545 ((unsigned long *) &kvm->arch.model.subfuncs.ppno)[1]);
1546 VM_EVENT(kvm, 3, "GET: guest KMA subfunc 0x%16.16lx.%16.16lx",
1547 ((unsigned long *) &kvm->arch.model.subfuncs.kma)[0],
1548 ((unsigned long *) &kvm->arch.model.subfuncs.kma)[1]);
Christian Borntraeger13209ad2018-12-28 09:33:35 +01001549 VM_EVENT(kvm, 3, "GET: guest KDSA subfunc 0x%16.16lx.%16.16lx",
1550 ((unsigned long *) &kvm->arch.model.subfuncs.kdsa)[0],
1551 ((unsigned long *) &kvm->arch.model.subfuncs.kdsa)[1]);
Christian Borntraeger173aec22018-12-28 10:59:06 +01001552 VM_EVENT(kvm, 3, "GET: guest SORTL subfunc 0x%16.16lx.%16.16lx.%16.16lx.%16.16lx",
1553 ((unsigned long *) &kvm->arch.model.subfuncs.sortl)[0],
1554 ((unsigned long *) &kvm->arch.model.subfuncs.sortl)[1],
1555 ((unsigned long *) &kvm->arch.model.subfuncs.sortl)[2],
1556 ((unsigned long *) &kvm->arch.model.subfuncs.sortl)[3]);
Christian Borntraeger4f45b902018-12-28 10:46:04 +01001557 VM_EVENT(kvm, 3, "GET: guest DFLTCC subfunc 0x%16.16lx.%16.16lx.%16.16lx.%16.16lx",
1558 ((unsigned long *) &kvm->arch.model.subfuncs.dfltcc)[0],
1559 ((unsigned long *) &kvm->arch.model.subfuncs.dfltcc)[1],
1560 ((unsigned long *) &kvm->arch.model.subfuncs.dfltcc)[2],
1561 ((unsigned long *) &kvm->arch.model.subfuncs.dfltcc)[3]);
Christian Borntraeger11ba5962019-02-20 11:38:42 -05001562
Christian Borntraeger346fa2f2019-02-18 07:48:25 -05001563 return 0;
David Hildenbrand0a763c72016-05-18 16:03:47 +02001564}
1565
1566static int kvm_s390_get_machine_subfunc(struct kvm *kvm,
1567 struct kvm_device_attr *attr)
1568{
1569 if (copy_to_user((void __user *)attr->addr, &kvm_s390_available_subfunc,
1570 sizeof(struct kvm_s390_vm_cpu_subfunc)))
1571 return -EFAULT;
Christian Borntraeger11ba5962019-02-20 11:38:42 -05001572
1573 VM_EVENT(kvm, 3, "GET: host PLO subfunc 0x%16.16lx.%16.16lx.%16.16lx.%16.16lx",
1574 ((unsigned long *) &kvm_s390_available_subfunc.plo)[0],
1575 ((unsigned long *) &kvm_s390_available_subfunc.plo)[1],
1576 ((unsigned long *) &kvm_s390_available_subfunc.plo)[2],
1577 ((unsigned long *) &kvm_s390_available_subfunc.plo)[3]);
1578 VM_EVENT(kvm, 3, "GET: host PTFF subfunc 0x%16.16lx.%16.16lx",
1579 ((unsigned long *) &kvm_s390_available_subfunc.ptff)[0],
1580 ((unsigned long *) &kvm_s390_available_subfunc.ptff)[1]);
1581 VM_EVENT(kvm, 3, "GET: host KMAC subfunc 0x%16.16lx.%16.16lx",
1582 ((unsigned long *) &kvm_s390_available_subfunc.kmac)[0],
1583 ((unsigned long *) &kvm_s390_available_subfunc.kmac)[1]);
1584 VM_EVENT(kvm, 3, "GET: host KMC subfunc 0x%16.16lx.%16.16lx",
1585 ((unsigned long *) &kvm_s390_available_subfunc.kmc)[0],
1586 ((unsigned long *) &kvm_s390_available_subfunc.kmc)[1]);
1587 VM_EVENT(kvm, 3, "GET: host KM subfunc 0x%16.16lx.%16.16lx",
1588 ((unsigned long *) &kvm_s390_available_subfunc.km)[0],
1589 ((unsigned long *) &kvm_s390_available_subfunc.km)[1]);
1590 VM_EVENT(kvm, 3, "GET: host KIMD subfunc 0x%16.16lx.%16.16lx",
1591 ((unsigned long *) &kvm_s390_available_subfunc.kimd)[0],
1592 ((unsigned long *) &kvm_s390_available_subfunc.kimd)[1]);
1593 VM_EVENT(kvm, 3, "GET: host KLMD subfunc 0x%16.16lx.%16.16lx",
1594 ((unsigned long *) &kvm_s390_available_subfunc.klmd)[0],
1595 ((unsigned long *) &kvm_s390_available_subfunc.klmd)[1]);
1596 VM_EVENT(kvm, 3, "GET: host PCKMO subfunc 0x%16.16lx.%16.16lx",
1597 ((unsigned long *) &kvm_s390_available_subfunc.pckmo)[0],
1598 ((unsigned long *) &kvm_s390_available_subfunc.pckmo)[1]);
1599 VM_EVENT(kvm, 3, "GET: host KMCTR subfunc 0x%16.16lx.%16.16lx",
1600 ((unsigned long *) &kvm_s390_available_subfunc.kmctr)[0],
1601 ((unsigned long *) &kvm_s390_available_subfunc.kmctr)[1]);
1602 VM_EVENT(kvm, 3, "GET: host KMF subfunc 0x%16.16lx.%16.16lx",
1603 ((unsigned long *) &kvm_s390_available_subfunc.kmf)[0],
1604 ((unsigned long *) &kvm_s390_available_subfunc.kmf)[1]);
1605 VM_EVENT(kvm, 3, "GET: host KMO subfunc 0x%16.16lx.%16.16lx",
1606 ((unsigned long *) &kvm_s390_available_subfunc.kmo)[0],
1607 ((unsigned long *) &kvm_s390_available_subfunc.kmo)[1]);
1608 VM_EVENT(kvm, 3, "GET: host PCC subfunc 0x%16.16lx.%16.16lx",
1609 ((unsigned long *) &kvm_s390_available_subfunc.pcc)[0],
1610 ((unsigned long *) &kvm_s390_available_subfunc.pcc)[1]);
1611 VM_EVENT(kvm, 3, "GET: host PPNO subfunc 0x%16.16lx.%16.16lx",
1612 ((unsigned long *) &kvm_s390_available_subfunc.ppno)[0],
1613 ((unsigned long *) &kvm_s390_available_subfunc.ppno)[1]);
1614 VM_EVENT(kvm, 3, "GET: host KMA subfunc 0x%16.16lx.%16.16lx",
1615 ((unsigned long *) &kvm_s390_available_subfunc.kma)[0],
1616 ((unsigned long *) &kvm_s390_available_subfunc.kma)[1]);
Christian Borntraeger13209ad2018-12-28 09:33:35 +01001617 VM_EVENT(kvm, 3, "GET: host KDSA subfunc 0x%16.16lx.%16.16lx",
1618 ((unsigned long *) &kvm_s390_available_subfunc.kdsa)[0],
1619 ((unsigned long *) &kvm_s390_available_subfunc.kdsa)[1]);
Christian Borntraeger173aec22018-12-28 10:59:06 +01001620 VM_EVENT(kvm, 3, "GET: host SORTL subfunc 0x%16.16lx.%16.16lx.%16.16lx.%16.16lx",
1621 ((unsigned long *) &kvm_s390_available_subfunc.sortl)[0],
1622 ((unsigned long *) &kvm_s390_available_subfunc.sortl)[1],
1623 ((unsigned long *) &kvm_s390_available_subfunc.sortl)[2],
1624 ((unsigned long *) &kvm_s390_available_subfunc.sortl)[3]);
Christian Borntraeger4f45b902018-12-28 10:46:04 +01001625 VM_EVENT(kvm, 3, "GET: host DFLTCC subfunc 0x%16.16lx.%16.16lx.%16.16lx.%16.16lx",
1626 ((unsigned long *) &kvm_s390_available_subfunc.dfltcc)[0],
1627 ((unsigned long *) &kvm_s390_available_subfunc.dfltcc)[1],
1628 ((unsigned long *) &kvm_s390_available_subfunc.dfltcc)[2],
1629 ((unsigned long *) &kvm_s390_available_subfunc.dfltcc)[3]);
Christian Borntraeger11ba5962019-02-20 11:38:42 -05001630
David Hildenbrand0a763c72016-05-18 16:03:47 +02001631 return 0;
1632}
Christian Borntraeger346fa2f2019-02-18 07:48:25 -05001633
Michael Mueller658b6ed2015-02-02 15:49:35 +01001634static int kvm_s390_get_cpu_model(struct kvm *kvm, struct kvm_device_attr *attr)
1635{
1636 int ret = -ENXIO;
1637
1638 switch (attr->attr) {
1639 case KVM_S390_VM_CPU_PROCESSOR:
1640 ret = kvm_s390_get_processor(kvm, attr);
1641 break;
1642 case KVM_S390_VM_CPU_MACHINE:
1643 ret = kvm_s390_get_machine(kvm, attr);
1644 break;
David Hildenbrand15c97052015-03-19 17:36:43 +01001645 case KVM_S390_VM_CPU_PROCESSOR_FEAT:
1646 ret = kvm_s390_get_processor_feat(kvm, attr);
1647 break;
1648 case KVM_S390_VM_CPU_MACHINE_FEAT:
1649 ret = kvm_s390_get_machine_feat(kvm, attr);
1650 break;
David Hildenbrand0a763c72016-05-18 16:03:47 +02001651 case KVM_S390_VM_CPU_PROCESSOR_SUBFUNC:
1652 ret = kvm_s390_get_processor_subfunc(kvm, attr);
1653 break;
1654 case KVM_S390_VM_CPU_MACHINE_SUBFUNC:
1655 ret = kvm_s390_get_machine_subfunc(kvm, attr);
1656 break;
Michael Mueller658b6ed2015-02-02 15:49:35 +01001657 }
1658 return ret;
1659}
1660
Dominik Dingelf2061652014-04-09 13:13:00 +02001661static int kvm_s390_vm_set_attr(struct kvm *kvm, struct kvm_device_attr *attr)
1662{
1663 int ret;
1664
1665 switch (attr->group) {
Dominik Dingel4f718ea2014-04-09 13:13:00 +02001666 case KVM_S390_VM_MEM_CTRL:
Dominik Dingel8c0a7ce2014-10-31 14:10:41 +01001667 ret = kvm_s390_set_mem_control(kvm, attr);
Dominik Dingel4f718ea2014-04-09 13:13:00 +02001668 break;
Jason J. Herne72f25022014-11-25 09:46:02 -05001669 case KVM_S390_VM_TOD:
1670 ret = kvm_s390_set_tod(kvm, attr);
1671 break;
Michael Mueller658b6ed2015-02-02 15:49:35 +01001672 case KVM_S390_VM_CPU_MODEL:
1673 ret = kvm_s390_set_cpu_model(kvm, attr);
1674 break;
Tony Krowiaka374e892014-09-03 10:13:53 +02001675 case KVM_S390_VM_CRYPTO:
1676 ret = kvm_s390_vm_set_crypto(kvm, attr);
1677 break;
Claudio Imbrenda190df4a2016-08-04 17:54:42 +02001678 case KVM_S390_VM_MIGRATION:
1679 ret = kvm_s390_vm_set_migration(kvm, attr);
1680 break;
Dominik Dingelf2061652014-04-09 13:13:00 +02001681 default:
1682 ret = -ENXIO;
1683 break;
1684 }
1685
1686 return ret;
1687}
1688
1689static int kvm_s390_vm_get_attr(struct kvm *kvm, struct kvm_device_attr *attr)
1690{
Dominik Dingel8c0a7ce2014-10-31 14:10:41 +01001691 int ret;
1692
1693 switch (attr->group) {
1694 case KVM_S390_VM_MEM_CTRL:
1695 ret = kvm_s390_get_mem_control(kvm, attr);
1696 break;
Jason J. Herne72f25022014-11-25 09:46:02 -05001697 case KVM_S390_VM_TOD:
1698 ret = kvm_s390_get_tod(kvm, attr);
1699 break;
Michael Mueller658b6ed2015-02-02 15:49:35 +01001700 case KVM_S390_VM_CPU_MODEL:
1701 ret = kvm_s390_get_cpu_model(kvm, attr);
1702 break;
Claudio Imbrenda190df4a2016-08-04 17:54:42 +02001703 case KVM_S390_VM_MIGRATION:
1704 ret = kvm_s390_vm_get_migration(kvm, attr);
1705 break;
Dominik Dingel8c0a7ce2014-10-31 14:10:41 +01001706 default:
1707 ret = -ENXIO;
1708 break;
1709 }
1710
1711 return ret;
Dominik Dingelf2061652014-04-09 13:13:00 +02001712}
1713
1714static int kvm_s390_vm_has_attr(struct kvm *kvm, struct kvm_device_attr *attr)
1715{
1716 int ret;
1717
1718 switch (attr->group) {
Dominik Dingel4f718ea2014-04-09 13:13:00 +02001719 case KVM_S390_VM_MEM_CTRL:
1720 switch (attr->attr) {
1721 case KVM_S390_VM_MEM_ENABLE_CMMA:
1722 case KVM_S390_VM_MEM_CLR_CMMA:
David Hildenbrandf9cbd9b2016-03-03 09:48:47 +01001723 ret = sclp.has_cmma ? 0 : -ENXIO;
1724 break;
Dominik Dingel8c0a7ce2014-10-31 14:10:41 +01001725 case KVM_S390_VM_MEM_LIMIT_SIZE:
Dominik Dingel4f718ea2014-04-09 13:13:00 +02001726 ret = 0;
1727 break;
1728 default:
1729 ret = -ENXIO;
1730 break;
1731 }
1732 break;
Jason J. Herne72f25022014-11-25 09:46:02 -05001733 case KVM_S390_VM_TOD:
1734 switch (attr->attr) {
1735 case KVM_S390_VM_TOD_LOW:
1736 case KVM_S390_VM_TOD_HIGH:
1737 ret = 0;
1738 break;
1739 default:
1740 ret = -ENXIO;
1741 break;
1742 }
1743 break;
Michael Mueller658b6ed2015-02-02 15:49:35 +01001744 case KVM_S390_VM_CPU_MODEL:
1745 switch (attr->attr) {
1746 case KVM_S390_VM_CPU_PROCESSOR:
1747 case KVM_S390_VM_CPU_MACHINE:
David Hildenbrand15c97052015-03-19 17:36:43 +01001748 case KVM_S390_VM_CPU_PROCESSOR_FEAT:
1749 case KVM_S390_VM_CPU_MACHINE_FEAT:
David Hildenbrand0a763c72016-05-18 16:03:47 +02001750 case KVM_S390_VM_CPU_MACHINE_SUBFUNC:
Christian Borntraeger346fa2f2019-02-18 07:48:25 -05001751 case KVM_S390_VM_CPU_PROCESSOR_SUBFUNC:
Michael Mueller658b6ed2015-02-02 15:49:35 +01001752 ret = 0;
1753 break;
1754 default:
1755 ret = -ENXIO;
1756 break;
1757 }
1758 break;
Tony Krowiaka374e892014-09-03 10:13:53 +02001759 case KVM_S390_VM_CRYPTO:
1760 switch (attr->attr) {
1761 case KVM_S390_VM_CRYPTO_ENABLE_AES_KW:
1762 case KVM_S390_VM_CRYPTO_ENABLE_DEA_KW:
1763 case KVM_S390_VM_CRYPTO_DISABLE_AES_KW:
1764 case KVM_S390_VM_CRYPTO_DISABLE_DEA_KW:
1765 ret = 0;
1766 break;
Tony Krowiak37940fb2018-09-25 19:16:39 -04001767 case KVM_S390_VM_CRYPTO_ENABLE_APIE:
1768 case KVM_S390_VM_CRYPTO_DISABLE_APIE:
1769 ret = ap_instructions_available() ? 0 : -ENXIO;
1770 break;
Tony Krowiaka374e892014-09-03 10:13:53 +02001771 default:
1772 ret = -ENXIO;
1773 break;
1774 }
1775 break;
Claudio Imbrenda190df4a2016-08-04 17:54:42 +02001776 case KVM_S390_VM_MIGRATION:
1777 ret = 0;
1778 break;
Dominik Dingelf2061652014-04-09 13:13:00 +02001779 default:
1780 ret = -ENXIO;
1781 break;
1782 }
1783
1784 return ret;
1785}
1786
Jason J. Herne30ee2a92014-09-23 09:23:01 -04001787static long kvm_s390_get_skeys(struct kvm *kvm, struct kvm_s390_skeys *args)
1788{
1789 uint8_t *keys;
1790 uint64_t hva;
Christian Borntraeger4f899142017-07-10 13:35:48 +02001791 int srcu_idx, i, r = 0;
Jason J. Herne30ee2a92014-09-23 09:23:01 -04001792
1793 if (args->flags != 0)
1794 return -EINVAL;
1795
1796 /* Is this guest using storage keys? */
Janosch Frank55531b72018-02-15 16:33:47 +01001797 if (!mm_uses_skeys(current->mm))
Jason J. Herne30ee2a92014-09-23 09:23:01 -04001798 return KVM_S390_GET_SKEYS_NONE;
1799
1800 /* Enforce sane limit on memory allocation */
1801 if (args->count < 1 || args->count > KVM_S390_SKEYS_MAX)
1802 return -EINVAL;
1803
Michal Hocko752ade62017-05-08 15:57:27 -07001804 keys = kvmalloc_array(args->count, sizeof(uint8_t), GFP_KERNEL);
Jason J. Herne30ee2a92014-09-23 09:23:01 -04001805 if (!keys)
1806 return -ENOMEM;
1807
Martin Schwidefskyd3ed1ce2016-03-08 11:53:35 +01001808 down_read(&current->mm->mmap_sem);
Christian Borntraeger4f899142017-07-10 13:35:48 +02001809 srcu_idx = srcu_read_lock(&kvm->srcu);
Jason J. Herne30ee2a92014-09-23 09:23:01 -04001810 for (i = 0; i < args->count; i++) {
1811 hva = gfn_to_hva(kvm, args->start_gfn + i);
1812 if (kvm_is_error_hva(hva)) {
1813 r = -EFAULT;
Martin Schwidefskyd3ed1ce2016-03-08 11:53:35 +01001814 break;
Jason J. Herne30ee2a92014-09-23 09:23:01 -04001815 }
1816
David Hildenbrand154c8c12016-05-09 11:22:34 +02001817 r = get_guest_storage_key(current->mm, hva, &keys[i]);
1818 if (r)
Martin Schwidefskyd3ed1ce2016-03-08 11:53:35 +01001819 break;
Jason J. Herne30ee2a92014-09-23 09:23:01 -04001820 }
Christian Borntraeger4f899142017-07-10 13:35:48 +02001821 srcu_read_unlock(&kvm->srcu, srcu_idx);
Martin Schwidefskyd3ed1ce2016-03-08 11:53:35 +01001822 up_read(&current->mm->mmap_sem);
Jason J. Herne30ee2a92014-09-23 09:23:01 -04001823
Martin Schwidefskyd3ed1ce2016-03-08 11:53:35 +01001824 if (!r) {
1825 r = copy_to_user((uint8_t __user *)args->skeydata_addr, keys,
1826 sizeof(uint8_t) * args->count);
1827 if (r)
1828 r = -EFAULT;
Jason J. Herne30ee2a92014-09-23 09:23:01 -04001829 }
1830
Jason J. Herne30ee2a92014-09-23 09:23:01 -04001831 kvfree(keys);
1832 return r;
1833}
1834
1835static long kvm_s390_set_skeys(struct kvm *kvm, struct kvm_s390_skeys *args)
1836{
1837 uint8_t *keys;
1838 uint64_t hva;
Christian Borntraeger4f899142017-07-10 13:35:48 +02001839 int srcu_idx, i, r = 0;
Janosch Frankbd096f62018-07-18 13:40:22 +01001840 bool unlocked;
Jason J. Herne30ee2a92014-09-23 09:23:01 -04001841
1842 if (args->flags != 0)
1843 return -EINVAL;
1844
1845 /* Enforce sane limit on memory allocation */
1846 if (args->count < 1 || args->count > KVM_S390_SKEYS_MAX)
1847 return -EINVAL;
1848
Michal Hocko752ade62017-05-08 15:57:27 -07001849 keys = kvmalloc_array(args->count, sizeof(uint8_t), GFP_KERNEL);
Jason J. Herne30ee2a92014-09-23 09:23:01 -04001850 if (!keys)
1851 return -ENOMEM;
1852
1853 r = copy_from_user(keys, (uint8_t __user *)args->skeydata_addr,
1854 sizeof(uint8_t) * args->count);
1855 if (r) {
1856 r = -EFAULT;
1857 goto out;
1858 }
1859
1860 /* Enable storage key handling for the guest */
Dominik Dingel14d4a422015-05-07 15:16:13 +02001861 r = s390_enable_skey();
1862 if (r)
1863 goto out;
Jason J. Herne30ee2a92014-09-23 09:23:01 -04001864
Janosch Frankbd096f62018-07-18 13:40:22 +01001865 i = 0;
Martin Schwidefskyd3ed1ce2016-03-08 11:53:35 +01001866 down_read(&current->mm->mmap_sem);
Christian Borntraeger4f899142017-07-10 13:35:48 +02001867 srcu_idx = srcu_read_lock(&kvm->srcu);
Janosch Frankbd096f62018-07-18 13:40:22 +01001868 while (i < args->count) {
1869 unlocked = false;
Jason J. Herne30ee2a92014-09-23 09:23:01 -04001870 hva = gfn_to_hva(kvm, args->start_gfn + i);
1871 if (kvm_is_error_hva(hva)) {
1872 r = -EFAULT;
Martin Schwidefskyd3ed1ce2016-03-08 11:53:35 +01001873 break;
Jason J. Herne30ee2a92014-09-23 09:23:01 -04001874 }
1875
1876 /* Lowest order bit is reserved */
1877 if (keys[i] & 0x01) {
1878 r = -EINVAL;
Martin Schwidefskyd3ed1ce2016-03-08 11:53:35 +01001879 break;
Jason J. Herne30ee2a92014-09-23 09:23:01 -04001880 }
1881
David Hildenbrandfe69eab2016-05-09 13:08:07 +02001882 r = set_guest_storage_key(current->mm, hva, keys[i], 0);
Janosch Frankbd096f62018-07-18 13:40:22 +01001883 if (r) {
1884 r = fixup_user_fault(current, current->mm, hva,
1885 FAULT_FLAG_WRITE, &unlocked);
1886 if (r)
1887 break;
1888 }
1889 if (!r)
1890 i++;
Jason J. Herne30ee2a92014-09-23 09:23:01 -04001891 }
Christian Borntraeger4f899142017-07-10 13:35:48 +02001892 srcu_read_unlock(&kvm->srcu, srcu_idx);
Martin Schwidefskyd3ed1ce2016-03-08 11:53:35 +01001893 up_read(&current->mm->mmap_sem);
Jason J. Herne30ee2a92014-09-23 09:23:01 -04001894out:
1895 kvfree(keys);
1896 return r;
1897}
1898
Claudio Imbrenda4036e382016-08-04 17:58:47 +02001899/*
1900 * Base address and length must be sent at the start of each block, therefore
1901 * it's cheaper to send some clean data, as long as it's less than the size of
1902 * two longs.
1903 */
1904#define KVM_S390_MAX_BIT_DISTANCE (2 * sizeof(void *))
1905/* for consistency */
1906#define KVM_S390_CMMA_SIZE_MAX ((u32)KVM_S390_SKEYS_MAX)
1907
1908/*
Claudio Imbrendaafdad612018-04-30 18:33:25 +02001909 * Similar to gfn_to_memslot, but returns the index of a memslot also when the
1910 * address falls in a hole. In that case the index of one of the memslots
1911 * bordering the hole is returned.
1912 */
1913static int gfn_to_memslot_approx(struct kvm_memslots *slots, gfn_t gfn)
1914{
1915 int start = 0, end = slots->used_slots;
1916 int slot = atomic_read(&slots->lru_slot);
1917 struct kvm_memory_slot *memslots = slots->memslots;
1918
1919 if (gfn >= memslots[slot].base_gfn &&
1920 gfn < memslots[slot].base_gfn + memslots[slot].npages)
1921 return slot;
1922
1923 while (start < end) {
1924 slot = start + (end - start) / 2;
1925
1926 if (gfn >= memslots[slot].base_gfn)
1927 end = slot;
1928 else
1929 start = slot + 1;
1930 }
1931
1932 if (gfn >= memslots[start].base_gfn &&
1933 gfn < memslots[start].base_gfn + memslots[start].npages) {
1934 atomic_set(&slots->lru_slot, start);
1935 }
1936
1937 return start;
1938}
1939
1940static int kvm_s390_peek_cmma(struct kvm *kvm, struct kvm_s390_cmma_log *args,
1941 u8 *res, unsigned long bufsize)
1942{
1943 unsigned long pgstev, hva, cur_gfn = args->start_gfn;
1944
1945 args->count = 0;
1946 while (args->count < bufsize) {
1947 hva = gfn_to_hva(kvm, cur_gfn);
1948 /*
1949 * We return an error if the first value was invalid, but we
1950 * return successfully if at least one value was copied.
1951 */
1952 if (kvm_is_error_hva(hva))
1953 return args->count ? 0 : -EFAULT;
1954 if (get_pgste(kvm->mm, hva, &pgstev) < 0)
1955 pgstev = 0;
1956 res[args->count++] = (pgstev >> 24) & 0x43;
1957 cur_gfn++;
1958 }
1959
1960 return 0;
1961}
1962
1963static unsigned long kvm_s390_next_dirty_cmma(struct kvm_memslots *slots,
1964 unsigned long cur_gfn)
1965{
1966 int slotidx = gfn_to_memslot_approx(slots, cur_gfn);
1967 struct kvm_memory_slot *ms = slots->memslots + slotidx;
1968 unsigned long ofs = cur_gfn - ms->base_gfn;
1969
1970 if (ms->base_gfn + ms->npages <= cur_gfn) {
1971 slotidx--;
1972 /* If we are above the highest slot, wrap around */
1973 if (slotidx < 0)
1974 slotidx = slots->used_slots - 1;
1975
1976 ms = slots->memslots + slotidx;
1977 ofs = 0;
1978 }
1979 ofs = find_next_bit(kvm_second_dirty_bitmap(ms), ms->npages, ofs);
1980 while ((slotidx > 0) && (ofs >= ms->npages)) {
1981 slotidx--;
1982 ms = slots->memslots + slotidx;
1983 ofs = find_next_bit(kvm_second_dirty_bitmap(ms), ms->npages, 0);
1984 }
1985 return ms->base_gfn + ofs;
1986}
1987
1988static int kvm_s390_get_cmma(struct kvm *kvm, struct kvm_s390_cmma_log *args,
1989 u8 *res, unsigned long bufsize)
1990{
1991 unsigned long mem_end, cur_gfn, next_gfn, hva, pgstev;
1992 struct kvm_memslots *slots = kvm_memslots(kvm);
1993 struct kvm_memory_slot *ms;
1994
1995 cur_gfn = kvm_s390_next_dirty_cmma(slots, args->start_gfn);
1996 ms = gfn_to_memslot(kvm, cur_gfn);
1997 args->count = 0;
1998 args->start_gfn = cur_gfn;
1999 if (!ms)
2000 return 0;
2001 next_gfn = kvm_s390_next_dirty_cmma(slots, cur_gfn + 1);
2002 mem_end = slots->memslots[0].base_gfn + slots->memslots[0].npages;
2003
2004 while (args->count < bufsize) {
2005 hva = gfn_to_hva(kvm, cur_gfn);
2006 if (kvm_is_error_hva(hva))
2007 return 0;
2008 /* Decrement only if we actually flipped the bit to 0 */
2009 if (test_and_clear_bit(cur_gfn - ms->base_gfn, kvm_second_dirty_bitmap(ms)))
2010 atomic64_dec(&kvm->arch.cmma_dirty_pages);
2011 if (get_pgste(kvm->mm, hva, &pgstev) < 0)
2012 pgstev = 0;
2013 /* Save the value */
2014 res[args->count++] = (pgstev >> 24) & 0x43;
2015 /* If the next bit is too far away, stop. */
2016 if (next_gfn > cur_gfn + KVM_S390_MAX_BIT_DISTANCE)
2017 return 0;
2018 /* If we reached the previous "next", find the next one */
2019 if (cur_gfn == next_gfn)
2020 next_gfn = kvm_s390_next_dirty_cmma(slots, cur_gfn + 1);
2021 /* Reached the end of memory or of the buffer, stop */
2022 if ((next_gfn >= mem_end) ||
2023 (next_gfn - args->start_gfn >= bufsize))
2024 return 0;
2025 cur_gfn++;
2026 /* Reached the end of the current memslot, take the next one. */
2027 if (cur_gfn - ms->base_gfn >= ms->npages) {
2028 ms = gfn_to_memslot(kvm, cur_gfn);
2029 if (!ms)
2030 return 0;
2031 }
2032 }
2033 return 0;
2034}
2035
2036/*
Claudio Imbrenda4036e382016-08-04 17:58:47 +02002037 * This function searches for the next page with dirty CMMA attributes, and
2038 * saves the attributes in the buffer up to either the end of the buffer or
2039 * until a block of at least KVM_S390_MAX_BIT_DISTANCE clean bits is found;
2040 * no trailing clean bytes are saved.
2041 * In case no dirty bits were found, or if CMMA was not enabled or used, the
2042 * output buffer will indicate 0 as length.
2043 */
2044static int kvm_s390_get_cmma_bits(struct kvm *kvm,
2045 struct kvm_s390_cmma_log *args)
2046{
Claudio Imbrendaafdad612018-04-30 18:33:25 +02002047 unsigned long bufsize;
2048 int srcu_idx, peek, ret;
2049 u8 *values;
Claudio Imbrenda4036e382016-08-04 17:58:47 +02002050
Claudio Imbrendaafdad612018-04-30 18:33:25 +02002051 if (!kvm->arch.use_cmma)
Claudio Imbrenda4036e382016-08-04 17:58:47 +02002052 return -ENXIO;
2053 /* Invalid/unsupported flags were specified */
2054 if (args->flags & ~KVM_S390_CMMA_PEEK)
2055 return -EINVAL;
2056 /* Migration mode query, and we are not doing a migration */
2057 peek = !!(args->flags & KVM_S390_CMMA_PEEK);
Claudio Imbrendaafdad612018-04-30 18:33:25 +02002058 if (!peek && !kvm->arch.migration_mode)
Claudio Imbrenda4036e382016-08-04 17:58:47 +02002059 return -EINVAL;
2060 /* CMMA is disabled or was not used, or the buffer has length zero */
2061 bufsize = min(args->count, KVM_S390_CMMA_SIZE_MAX);
Janosch Frankc9f0a2b2018-02-16 12:16:14 +01002062 if (!bufsize || !kvm->mm->context.uses_cmm) {
Claudio Imbrenda4036e382016-08-04 17:58:47 +02002063 memset(args, 0, sizeof(*args));
2064 return 0;
2065 }
Claudio Imbrendaafdad612018-04-30 18:33:25 +02002066 /* We are not peeking, and there are no dirty pages */
2067 if (!peek && !atomic64_read(&kvm->arch.cmma_dirty_pages)) {
2068 memset(args, 0, sizeof(*args));
2069 return 0;
Claudio Imbrenda4036e382016-08-04 17:58:47 +02002070 }
2071
Claudio Imbrendaafdad612018-04-30 18:33:25 +02002072 values = vmalloc(bufsize);
2073 if (!values)
Claudio Imbrenda4036e382016-08-04 17:58:47 +02002074 return -ENOMEM;
2075
Claudio Imbrenda4036e382016-08-04 17:58:47 +02002076 down_read(&kvm->mm->mmap_sem);
2077 srcu_idx = srcu_read_lock(&kvm->srcu);
Claudio Imbrendaafdad612018-04-30 18:33:25 +02002078 if (peek)
2079 ret = kvm_s390_peek_cmma(kvm, args, values, bufsize);
2080 else
2081 ret = kvm_s390_get_cmma(kvm, args, values, bufsize);
Claudio Imbrenda4036e382016-08-04 17:58:47 +02002082 srcu_read_unlock(&kvm->srcu, srcu_idx);
2083 up_read(&kvm->mm->mmap_sem);
Claudio Imbrenda4036e382016-08-04 17:58:47 +02002084
Claudio Imbrendaafdad612018-04-30 18:33:25 +02002085 if (kvm->arch.migration_mode)
2086 args->remaining = atomic64_read(&kvm->arch.cmma_dirty_pages);
2087 else
2088 args->remaining = 0;
Claudio Imbrenda4036e382016-08-04 17:58:47 +02002089
Claudio Imbrendaafdad612018-04-30 18:33:25 +02002090 if (copy_to_user((void __user *)args->values, values, args->count))
2091 ret = -EFAULT;
2092
2093 vfree(values);
2094 return ret;
Claudio Imbrenda4036e382016-08-04 17:58:47 +02002095}
2096
2097/*
2098 * This function sets the CMMA attributes for the given pages. If the input
2099 * buffer has zero length, no action is taken, otherwise the attributes are
Janosch Frankc9f0a2b2018-02-16 12:16:14 +01002100 * set and the mm->context.uses_cmm flag is set.
Claudio Imbrenda4036e382016-08-04 17:58:47 +02002101 */
2102static int kvm_s390_set_cmma_bits(struct kvm *kvm,
2103 const struct kvm_s390_cmma_log *args)
2104{
2105 unsigned long hva, mask, pgstev, i;
2106 uint8_t *bits;
2107 int srcu_idx, r = 0;
2108
2109 mask = args->mask;
2110
2111 if (!kvm->arch.use_cmma)
2112 return -ENXIO;
2113 /* invalid/unsupported flags */
2114 if (args->flags != 0)
2115 return -EINVAL;
2116 /* Enforce sane limit on memory allocation */
2117 if (args->count > KVM_S390_CMMA_SIZE_MAX)
2118 return -EINVAL;
2119 /* Nothing to do */
2120 if (args->count == 0)
2121 return 0;
2122
Kees Cook42bc47b2018-06-12 14:27:11 -07002123 bits = vmalloc(array_size(sizeof(*bits), args->count));
Claudio Imbrenda4036e382016-08-04 17:58:47 +02002124 if (!bits)
2125 return -ENOMEM;
2126
2127 r = copy_from_user(bits, (void __user *)args->values, args->count);
2128 if (r) {
2129 r = -EFAULT;
2130 goto out;
2131 }
2132
2133 down_read(&kvm->mm->mmap_sem);
2134 srcu_idx = srcu_read_lock(&kvm->srcu);
2135 for (i = 0; i < args->count; i++) {
2136 hva = gfn_to_hva(kvm, args->start_gfn + i);
2137 if (kvm_is_error_hva(hva)) {
2138 r = -EFAULT;
2139 break;
2140 }
2141
2142 pgstev = bits[i];
2143 pgstev = pgstev << 24;
Claudio Imbrenda1bab1c02016-08-29 15:56:55 +02002144 mask &= _PGSTE_GPS_USAGE_MASK | _PGSTE_GPS_NODAT;
Claudio Imbrenda4036e382016-08-04 17:58:47 +02002145 set_pgste_bits(kvm->mm, hva, mask, pgstev);
2146 }
2147 srcu_read_unlock(&kvm->srcu, srcu_idx);
2148 up_read(&kvm->mm->mmap_sem);
2149
Janosch Frankc9f0a2b2018-02-16 12:16:14 +01002150 if (!kvm->mm->context.uses_cmm) {
Claudio Imbrenda4036e382016-08-04 17:58:47 +02002151 down_write(&kvm->mm->mmap_sem);
Janosch Frankc9f0a2b2018-02-16 12:16:14 +01002152 kvm->mm->context.uses_cmm = 1;
Claudio Imbrenda4036e382016-08-04 17:58:47 +02002153 up_write(&kvm->mm->mmap_sem);
2154 }
2155out:
2156 vfree(bits);
2157 return r;
2158}
2159
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002160long kvm_arch_vm_ioctl(struct file *filp,
2161 unsigned int ioctl, unsigned long arg)
2162{
2163 struct kvm *kvm = filp->private_data;
2164 void __user *argp = (void __user *)arg;
Dominik Dingelf2061652014-04-09 13:13:00 +02002165 struct kvm_device_attr attr;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002166 int r;
2167
2168 switch (ioctl) {
Carsten Otteba5c1e92008-03-25 18:47:26 +01002169 case KVM_S390_INTERRUPT: {
2170 struct kvm_s390_interrupt s390int;
2171
2172 r = -EFAULT;
2173 if (copy_from_user(&s390int, argp, sizeof(s390int)))
2174 break;
2175 r = kvm_s390_inject_vm(kvm, &s390int);
2176 break;
2177 }
Cornelia Huck84223592013-07-15 13:36:01 +02002178 case KVM_CREATE_IRQCHIP: {
2179 struct kvm_irq_routing_entry routing;
2180
2181 r = -EINVAL;
2182 if (kvm->arch.use_irqchip) {
2183 /* Set up dummy routing. */
2184 memset(&routing, 0, sizeof(routing));
Nicholas Krause152b2832015-08-06 13:05:54 -04002185 r = kvm_set_irq_routing(kvm, &routing, 0, 0);
Cornelia Huck84223592013-07-15 13:36:01 +02002186 }
2187 break;
2188 }
Dominik Dingelf2061652014-04-09 13:13:00 +02002189 case KVM_SET_DEVICE_ATTR: {
2190 r = -EFAULT;
2191 if (copy_from_user(&attr, (void __user *)arg, sizeof(attr)))
2192 break;
2193 r = kvm_s390_vm_set_attr(kvm, &attr);
2194 break;
2195 }
2196 case KVM_GET_DEVICE_ATTR: {
2197 r = -EFAULT;
2198 if (copy_from_user(&attr, (void __user *)arg, sizeof(attr)))
2199 break;
2200 r = kvm_s390_vm_get_attr(kvm, &attr);
2201 break;
2202 }
2203 case KVM_HAS_DEVICE_ATTR: {
2204 r = -EFAULT;
2205 if (copy_from_user(&attr, (void __user *)arg, sizeof(attr)))
2206 break;
2207 r = kvm_s390_vm_has_attr(kvm, &attr);
2208 break;
2209 }
Jason J. Herne30ee2a92014-09-23 09:23:01 -04002210 case KVM_S390_GET_SKEYS: {
2211 struct kvm_s390_skeys args;
2212
2213 r = -EFAULT;
2214 if (copy_from_user(&args, argp,
2215 sizeof(struct kvm_s390_skeys)))
2216 break;
2217 r = kvm_s390_get_skeys(kvm, &args);
2218 break;
2219 }
2220 case KVM_S390_SET_SKEYS: {
2221 struct kvm_s390_skeys args;
2222
2223 r = -EFAULT;
2224 if (copy_from_user(&args, argp,
2225 sizeof(struct kvm_s390_skeys)))
2226 break;
2227 r = kvm_s390_set_skeys(kvm, &args);
2228 break;
2229 }
Claudio Imbrenda4036e382016-08-04 17:58:47 +02002230 case KVM_S390_GET_CMMA_BITS: {
2231 struct kvm_s390_cmma_log args;
2232
2233 r = -EFAULT;
2234 if (copy_from_user(&args, argp, sizeof(args)))
2235 break;
Christian Borntraeger1de1ea72017-12-22 10:54:20 +01002236 mutex_lock(&kvm->slots_lock);
Claudio Imbrenda4036e382016-08-04 17:58:47 +02002237 r = kvm_s390_get_cmma_bits(kvm, &args);
Christian Borntraeger1de1ea72017-12-22 10:54:20 +01002238 mutex_unlock(&kvm->slots_lock);
Claudio Imbrenda4036e382016-08-04 17:58:47 +02002239 if (!r) {
2240 r = copy_to_user(argp, &args, sizeof(args));
2241 if (r)
2242 r = -EFAULT;
2243 }
2244 break;
2245 }
2246 case KVM_S390_SET_CMMA_BITS: {
2247 struct kvm_s390_cmma_log args;
2248
2249 r = -EFAULT;
2250 if (copy_from_user(&args, argp, sizeof(args)))
2251 break;
Christian Borntraeger1de1ea72017-12-22 10:54:20 +01002252 mutex_lock(&kvm->slots_lock);
Claudio Imbrenda4036e382016-08-04 17:58:47 +02002253 r = kvm_s390_set_cmma_bits(kvm, &args);
Christian Borntraeger1de1ea72017-12-22 10:54:20 +01002254 mutex_unlock(&kvm->slots_lock);
Claudio Imbrenda4036e382016-08-04 17:58:47 +02002255 break;
2256 }
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002257 default:
Avi Kivity367e1312009-08-26 14:57:07 +03002258 r = -ENOTTY;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002259 }
2260
2261 return r;
2262}
2263
Tony Krowiak45c9b472015-01-13 11:33:26 -05002264static int kvm_s390_apxa_installed(void)
2265{
Tony Krowiake585b242018-09-25 19:16:18 -04002266 struct ap_config_info info;
Tony Krowiak45c9b472015-01-13 11:33:26 -05002267
Tony Krowiake585b242018-09-25 19:16:18 -04002268 if (ap_instructions_available()) {
2269 if (ap_qci(&info) == 0)
2270 return info.apxa;
Tony Krowiak45c9b472015-01-13 11:33:26 -05002271 }
2272
2273 return 0;
2274}
2275
Tony Krowiake585b242018-09-25 19:16:18 -04002276/*
2277 * The format of the crypto control block (CRYCB) is specified in the 3 low
2278 * order bits of the CRYCB designation (CRYCBD) field as follows:
2279 * Format 0: Neither the message security assist extension 3 (MSAX3) nor the
2280 * AP extended addressing (APXA) facility are installed.
2281 * Format 1: The APXA facility is not installed but the MSAX3 facility is.
2282 * Format 2: Both the APXA and MSAX3 facilities are installed
2283 */
Tony Krowiak45c9b472015-01-13 11:33:26 -05002284static void kvm_s390_set_crycb_format(struct kvm *kvm)
2285{
2286 kvm->arch.crypto.crycbd = (__u32)(unsigned long) kvm->arch.crypto.crycb;
2287
Tony Krowiake585b242018-09-25 19:16:18 -04002288 /* Clear the CRYCB format bits - i.e., set format 0 by default */
2289 kvm->arch.crypto.crycbd &= ~(CRYCB_FORMAT_MASK);
2290
2291 /* Check whether MSAX3 is installed */
2292 if (!test_kvm_facility(kvm, 76))
2293 return;
2294
Tony Krowiak45c9b472015-01-13 11:33:26 -05002295 if (kvm_s390_apxa_installed())
2296 kvm->arch.crypto.crycbd |= CRYCB_FORMAT2;
2297 else
2298 kvm->arch.crypto.crycbd |= CRYCB_FORMAT1;
2299}
2300
Pierre Morel0e237e42018-10-05 10:31:09 +02002301void kvm_arch_crypto_set_masks(struct kvm *kvm, unsigned long *apm,
2302 unsigned long *aqm, unsigned long *adm)
2303{
2304 struct kvm_s390_crypto_cb *crycb = kvm->arch.crypto.crycb;
2305
2306 mutex_lock(&kvm->lock);
2307 kvm_s390_vcpu_block_all(kvm);
2308
2309 switch (kvm->arch.crypto.crycbd & CRYCB_FORMAT_MASK) {
2310 case CRYCB_FORMAT2: /* APCB1 use 256 bits */
2311 memcpy(crycb->apcb1.apm, apm, 32);
2312 VM_EVENT(kvm, 3, "SET CRYCB: apm %016lx %016lx %016lx %016lx",
2313 apm[0], apm[1], apm[2], apm[3]);
2314 memcpy(crycb->apcb1.aqm, aqm, 32);
2315 VM_EVENT(kvm, 3, "SET CRYCB: aqm %016lx %016lx %016lx %016lx",
2316 aqm[0], aqm[1], aqm[2], aqm[3]);
2317 memcpy(crycb->apcb1.adm, adm, 32);
2318 VM_EVENT(kvm, 3, "SET CRYCB: adm %016lx %016lx %016lx %016lx",
2319 adm[0], adm[1], adm[2], adm[3]);
2320 break;
2321 case CRYCB_FORMAT1:
2322 case CRYCB_FORMAT0: /* Fall through both use APCB0 */
2323 memcpy(crycb->apcb0.apm, apm, 8);
2324 memcpy(crycb->apcb0.aqm, aqm, 2);
2325 memcpy(crycb->apcb0.adm, adm, 2);
2326 VM_EVENT(kvm, 3, "SET CRYCB: apm %016lx aqm %04x adm %04x",
2327 apm[0], *((unsigned short *)aqm),
2328 *((unsigned short *)adm));
2329 break;
2330 default: /* Can not happen */
2331 break;
2332 }
2333
2334 /* recreate the shadow crycb for each vcpu */
2335 kvm_s390_sync_request_broadcast(kvm, KVM_REQ_VSIE_RESTART);
2336 kvm_s390_vcpu_unblock_all(kvm);
2337 mutex_unlock(&kvm->lock);
2338}
2339EXPORT_SYMBOL_GPL(kvm_arch_crypto_set_masks);
2340
Tony Krowiak421045982018-09-25 19:16:25 -04002341void kvm_arch_crypto_clear_masks(struct kvm *kvm)
2342{
2343 mutex_lock(&kvm->lock);
2344 kvm_s390_vcpu_block_all(kvm);
2345
2346 memset(&kvm->arch.crypto.crycb->apcb0, 0,
2347 sizeof(kvm->arch.crypto.crycb->apcb0));
2348 memset(&kvm->arch.crypto.crycb->apcb1, 0,
2349 sizeof(kvm->arch.crypto.crycb->apcb1));
2350
Pierre Morel0e237e42018-10-05 10:31:09 +02002351 VM_EVENT(kvm, 3, "%s", "CLR CRYCB:");
Pierre Morel6cc571b2018-09-25 19:16:30 -04002352 /* recreate the shadow crycb for each vcpu */
2353 kvm_s390_sync_request_broadcast(kvm, KVM_REQ_VSIE_RESTART);
Tony Krowiak421045982018-09-25 19:16:25 -04002354 kvm_s390_vcpu_unblock_all(kvm);
2355 mutex_unlock(&kvm->lock);
2356}
2357EXPORT_SYMBOL_GPL(kvm_arch_crypto_clear_masks);
2358
David Hildenbrand9bb0ec02016-04-04 14:27:51 +02002359static u64 kvm_s390_get_initial_cpuid(void)
Michael Mueller9d8d5782015-02-02 15:42:51 +01002360{
David Hildenbrand9bb0ec02016-04-04 14:27:51 +02002361 struct cpuid cpuid;
2362
2363 get_cpu_id(&cpuid);
2364 cpuid.version = 0xff;
2365 return *((u64 *) &cpuid);
Michael Mueller9d8d5782015-02-02 15:42:51 +01002366}
2367
David Hildenbrandc54f0d62015-12-02 08:53:52 +01002368static void kvm_s390_crypto_init(struct kvm *kvm)
Tony Krowiak5102ee82014-06-27 14:46:01 -04002369{
David Hildenbrandc54f0d62015-12-02 08:53:52 +01002370 kvm->arch.crypto.crycb = &kvm->arch.sie_page2->crycb;
Tony Krowiak45c9b472015-01-13 11:33:26 -05002371 kvm_s390_set_crycb_format(kvm);
Tony Krowiak5102ee82014-06-27 14:46:01 -04002372
Tony Krowiake585b242018-09-25 19:16:18 -04002373 if (!test_kvm_facility(kvm, 76))
2374 return;
2375
Tony Krowiaked6f76b2015-02-24 14:06:57 -05002376 /* Enable AES/DEA protected key functions by default */
2377 kvm->arch.crypto.aes_kw = 1;
2378 kvm->arch.crypto.dea_kw = 1;
2379 get_random_bytes(kvm->arch.crypto.crycb->aes_wrapping_key_mask,
2380 sizeof(kvm->arch.crypto.crycb->aes_wrapping_key_mask));
2381 get_random_bytes(kvm->arch.crypto.crycb->dea_wrapping_key_mask,
2382 sizeof(kvm->arch.crypto.crycb->dea_wrapping_key_mask));
Tony Krowiak5102ee82014-06-27 14:46:01 -04002383}
2384
Eugene (jno) Dvurechenski7d43bafcf2015-04-22 17:09:44 +02002385static void sca_dispose(struct kvm *kvm)
2386{
2387 if (kvm->arch.use_esca)
Eugene (jno) Dvurechenski5e044312015-04-22 18:08:39 +02002388 free_pages_exact(kvm->arch.sca, sizeof(struct esca_block));
Eugene (jno) Dvurechenski7d43bafcf2015-04-22 17:09:44 +02002389 else
2390 free_page((unsigned long)(kvm->arch.sca));
2391 kvm->arch.sca = NULL;
2392}
2393
Carsten Ottee08b9632012-01-04 10:25:20 +01002394int kvm_arch_init_vm(struct kvm *kvm, unsigned long type)
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002395{
David Hildenbrand76a6dd72015-11-24 13:33:49 +01002396 gfp_t alloc_flags = GFP_KERNEL;
Michael Mueller9d8d5782015-02-02 15:42:51 +01002397 int i, rc;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002398 char debug_name[16];
Christian Borntraegerf6c137f2014-03-19 11:18:29 +01002399 static unsigned long sca_offset;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002400
Carsten Ottee08b9632012-01-04 10:25:20 +01002401 rc = -EINVAL;
2402#ifdef CONFIG_KVM_S390_UCONTROL
2403 if (type & ~KVM_VM_S390_UCONTROL)
2404 goto out_err;
2405 if ((type & KVM_VM_S390_UCONTROL) && (!capable(CAP_SYS_ADMIN)))
2406 goto out_err;
2407#else
2408 if (type)
2409 goto out_err;
2410#endif
2411
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002412 rc = s390_enable_sie();
2413 if (rc)
Jan Kiszkad89f5ef2010-11-09 17:02:49 +01002414 goto out_err;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002415
Carsten Otteb2904112011-10-18 12:27:13 +02002416 rc = -ENOMEM;
2417
David Hildenbrand76a6dd72015-11-24 13:33:49 +01002418 if (!sclp.has_64bscao)
2419 alloc_flags |= GFP_DMA;
Eugene (jno) Dvurechenski5e044312015-04-22 18:08:39 +02002420 rwlock_init(&kvm->arch.sca_lock);
David Hildenbrand9ac96d72018-04-27 14:36:12 +02002421 /* start with basic SCA */
David Hildenbrand76a6dd72015-11-24 13:33:49 +01002422 kvm->arch.sca = (struct bsca_block *) get_zeroed_page(alloc_flags);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002423 if (!kvm->arch.sca)
Jan Kiszkad89f5ef2010-11-09 17:02:49 +01002424 goto out_err;
Junaid Shahid0d9ce162019-01-03 17:14:28 -08002425 mutex_lock(&kvm_lock);
David Hildenbrandc5c2c392015-10-26 08:41:29 +01002426 sca_offset += 16;
Eugene (jno) Dvurechenskibc784cc2015-04-23 16:09:06 +02002427 if (sca_offset + sizeof(struct bsca_block) > PAGE_SIZE)
David Hildenbrandc5c2c392015-10-26 08:41:29 +01002428 sca_offset = 0;
Eugene (jno) Dvurechenskibc784cc2015-04-23 16:09:06 +02002429 kvm->arch.sca = (struct bsca_block *)
2430 ((char *) kvm->arch.sca + sca_offset);
Junaid Shahid0d9ce162019-01-03 17:14:28 -08002431 mutex_unlock(&kvm_lock);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002432
2433 sprintf(debug_name, "kvm-%u", current->pid);
2434
Christian Borntraeger1cb9cf72015-07-20 15:04:48 +02002435 kvm->arch.dbf = debug_register(debug_name, 32, 1, 7 * sizeof(long));
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002436 if (!kvm->arch.dbf)
Dominik Dingel40f5b732015-03-12 13:55:53 +01002437 goto out_err;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002438
Michael Mueller19114be2017-05-30 14:26:02 +02002439 BUILD_BUG_ON(sizeof(struct sie_page2) != 4096);
David Hildenbrandc54f0d62015-12-02 08:53:52 +01002440 kvm->arch.sie_page2 =
2441 (struct sie_page2 *) get_zeroed_page(GFP_KERNEL | GFP_DMA);
2442 if (!kvm->arch.sie_page2)
Dominik Dingel40f5b732015-03-12 13:55:53 +01002443 goto out_err;
Michael Mueller9d8d5782015-02-02 15:42:51 +01002444
Michael Mueller25c84db2019-01-31 09:52:41 +01002445 kvm->arch.sie_page2->kvm = kvm;
David Hildenbrandc54f0d62015-12-02 08:53:52 +01002446 kvm->arch.model.fac_list = kvm->arch.sie_page2->fac_list;
Christian Borntraegerc3b9e3e2018-02-09 16:26:29 +00002447
2448 for (i = 0; i < kvm_s390_fac_size(); i++) {
2449 kvm->arch.model.fac_mask[i] = S390_lowcore.stfle_fac_list[i] &
2450 (kvm_s390_fac_base[i] |
2451 kvm_s390_fac_ext[i]);
2452 kvm->arch.model.fac_list[i] = S390_lowcore.stfle_fac_list[i] &
2453 kvm_s390_fac_base[i];
2454 }
Christian Borntraeger346fa2f2019-02-18 07:48:25 -05002455 kvm->arch.model.subfuncs = kvm_s390_available_subfunc;
Michael Mueller981467c2015-02-24 13:51:04 +01002456
David Hildenbrand19352222017-08-29 16:31:08 +02002457 /* we are always in czam mode - even on pre z14 machines */
2458 set_kvm_facility(kvm->arch.model.fac_mask, 138);
2459 set_kvm_facility(kvm->arch.model.fac_list, 138);
2460 /* we emulate STHYI in kvm */
Janosch Frank95ca2cb2016-05-23 15:11:58 +02002461 set_kvm_facility(kvm->arch.model.fac_mask, 74);
2462 set_kvm_facility(kvm->arch.model.fac_list, 74);
Claudio Imbrenda1bab1c02016-08-29 15:56:55 +02002463 if (MACHINE_HAS_TLB_GUEST) {
2464 set_kvm_facility(kvm->arch.model.fac_mask, 147);
2465 set_kvm_facility(kvm->arch.model.fac_list, 147);
2466 }
Janosch Frank95ca2cb2016-05-23 15:11:58 +02002467
Pierre Morel05f31e32019-05-21 17:34:37 +02002468 if (css_general_characteristics.aiv && test_facility(65))
2469 set_kvm_facility(kvm->arch.model.fac_mask, 65);
2470
David Hildenbrand9bb0ec02016-04-04 14:27:51 +02002471 kvm->arch.model.cpuid = kvm_s390_get_initial_cpuid();
David Hildenbrand37c5f6c2015-05-06 13:18:59 +02002472 kvm->arch.model.ibc = sclp.ibc & 0x0fff;
Michael Mueller9d8d5782015-02-02 15:42:51 +01002473
David Hildenbrandc54f0d62015-12-02 08:53:52 +01002474 kvm_s390_crypto_init(kvm);
Tony Krowiak5102ee82014-06-27 14:46:01 -04002475
Fei Li51978392017-02-17 17:06:26 +08002476 mutex_init(&kvm->arch.float_int.ais_lock);
Carsten Otteba5c1e92008-03-25 18:47:26 +01002477 spin_lock_init(&kvm->arch.float_int.lock);
Jens Freimann6d3da242013-07-03 15:18:35 +02002478 for (i = 0; i < FIRQ_LIST_COUNT; i++)
2479 INIT_LIST_HEAD(&kvm->arch.float_int.lists[i]);
Heiko Carstens8a2422342014-01-10 14:33:28 +01002480 init_waitqueue_head(&kvm->arch.ipte_wq);
Thomas Hutha6b7e452014-10-01 14:48:42 +02002481 mutex_init(&kvm->arch.ipte_mutex);
Carsten Otteba5c1e92008-03-25 18:47:26 +01002482
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002483 debug_register_view(kvm->arch.dbf, &debug_sprintf_view);
Christian Borntraeger78f26132015-07-22 15:50:58 +02002484 VM_EVENT(kvm, 3, "vm created with type %lu", type);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002485
Carsten Ottee08b9632012-01-04 10:25:20 +01002486 if (type & KVM_VM_S390_UCONTROL) {
2487 kvm->arch.gmap = NULL;
Dominik Dingela3a92c32014-12-01 17:24:42 +01002488 kvm->arch.mem_limit = KVM_S390_NO_MEM_LIMIT;
Carsten Ottee08b9632012-01-04 10:25:20 +01002489 } else {
Guenther Hutzl32e6b232014-12-01 17:24:42 +01002490 if (sclp.hamax == U64_MAX)
Martin Schwidefskyee71d162017-04-20 14:43:51 +02002491 kvm->arch.mem_limit = TASK_SIZE_MAX;
Guenther Hutzl32e6b232014-12-01 17:24:42 +01002492 else
Martin Schwidefskyee71d162017-04-20 14:43:51 +02002493 kvm->arch.mem_limit = min_t(unsigned long, TASK_SIZE_MAX,
Guenther Hutzl32e6b232014-12-01 17:24:42 +01002494 sclp.hamax + 1);
Martin Schwidefsky6ea427b2016-03-08 11:55:04 +01002495 kvm->arch.gmap = gmap_create(current->mm, kvm->arch.mem_limit - 1);
Carsten Ottee08b9632012-01-04 10:25:20 +01002496 if (!kvm->arch.gmap)
Dominik Dingel40f5b732015-03-12 13:55:53 +01002497 goto out_err;
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02002498 kvm->arch.gmap->private = kvm;
Dominik Dingel24eb3a82013-06-17 16:25:18 +02002499 kvm->arch.gmap->pfault_enabled = 0;
Carsten Ottee08b9632012-01-04 10:25:20 +01002500 }
Cornelia Huckfa6b7fe2012-12-20 15:32:12 +01002501
Janosch Frankc9f0a2b2018-02-16 12:16:14 +01002502 kvm->arch.use_pfmfi = sclp.has_pfmfi;
Janosch Frank55531b72018-02-15 16:33:47 +01002503 kvm->arch.use_skf = sclp.has_skey;
David Hildenbrand8ad35752014-03-14 11:00:21 +01002504 spin_lock_init(&kvm->arch.start_stop_lock);
David Hildenbranda3508fb2015-07-08 13:19:48 +02002505 kvm_s390_vsie_init(kvm);
Michael Muellerd7c5cb02017-06-12 14:15:19 +02002506 kvm_s390_gisa_init(kvm);
Christian Borntraeger8335713a2015-12-08 16:55:27 +01002507 KVM_EVENT(3, "vm 0x%pK created by pid %u", kvm, current->pid);
David Hildenbrand8ad35752014-03-14 11:00:21 +01002508
Jan Kiszkad89f5ef2010-11-09 17:02:49 +01002509 return 0;
Jan Kiszkad89f5ef2010-11-09 17:02:49 +01002510out_err:
David Hildenbrandc54f0d62015-12-02 08:53:52 +01002511 free_page((unsigned long)kvm->arch.sie_page2);
Dominik Dingel40f5b732015-03-12 13:55:53 +01002512 debug_unregister(kvm->arch.dbf);
Eugene (jno) Dvurechenski7d43bafcf2015-04-22 17:09:44 +02002513 sca_dispose(kvm);
Christian Borntraeger78f26132015-07-22 15:50:58 +02002514 KVM_EVENT(3, "creation of vm failed: %d", rc);
Jan Kiszkad89f5ef2010-11-09 17:02:49 +01002515 return rc;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002516}
2517
Christian Borntraegerd329c032008-11-26 14:50:27 +01002518void kvm_arch_vcpu_destroy(struct kvm_vcpu *vcpu)
2519{
2520 VCPU_EVENT(vcpu, 3, "%s", "free cpu");
Cornelia Huckade38c32012-07-23 17:20:30 +02002521 trace_kvm_s390_destroy_vcpu(vcpu->vcpu_id);
Christian Borntraeger67335e62014-03-25 17:09:08 +01002522 kvm_s390_clear_local_irqs(vcpu);
Dominik Dingel3c038e62013-10-07 17:11:48 +02002523 kvm_clear_async_pf_completion_queue(vcpu);
Eugene (jno) Dvurechenskibc784cc2015-04-23 16:09:06 +02002524 if (!kvm_is_ucontrol(vcpu->kvm))
Eugene (jno) Dvurechenskia6e2f682015-04-21 15:31:59 +02002525 sca_del_vcpu(vcpu);
Carsten Otte27e03932012-01-04 10:25:21 +01002526
2527 if (kvm_is_ucontrol(vcpu->kvm))
Martin Schwidefsky6ea427b2016-03-08 11:55:04 +01002528 gmap_remove(vcpu->arch.gmap);
Carsten Otte27e03932012-01-04 10:25:21 +01002529
Dominik Dingele6db1d62015-05-07 15:41:57 +02002530 if (vcpu->kvm->arch.use_cmma)
Dominik Dingelb31605c2014-03-25 13:47:11 +01002531 kvm_s390_vcpu_unsetup_cmma(vcpu);
Christian Borntraegerd329c032008-11-26 14:50:27 +01002532 free_page((unsigned long)(vcpu->arch.sie_block));
Konstantin Weitzb31288f2013-04-17 17:36:29 +02002533
Christian Borntraeger6692cef2008-11-26 14:51:08 +01002534 kvm_vcpu_uninit(vcpu);
Michael Muellerb110fea2013-06-12 13:54:54 +02002535 kmem_cache_free(kvm_vcpu_cache, vcpu);
Christian Borntraegerd329c032008-11-26 14:50:27 +01002536}
2537
2538static void kvm_free_vcpus(struct kvm *kvm)
2539{
2540 unsigned int i;
Gleb Natapov988a2ca2009-06-09 15:56:29 +03002541 struct kvm_vcpu *vcpu;
Christian Borntraegerd329c032008-11-26 14:50:27 +01002542
Gleb Natapov988a2ca2009-06-09 15:56:29 +03002543 kvm_for_each_vcpu(i, vcpu, kvm)
2544 kvm_arch_vcpu_destroy(vcpu);
2545
2546 mutex_lock(&kvm->lock);
2547 for (i = 0; i < atomic_read(&kvm->online_vcpus); i++)
2548 kvm->vcpus[i] = NULL;
2549
2550 atomic_set(&kvm->online_vcpus, 0);
2551 mutex_unlock(&kvm->lock);
Christian Borntraegerd329c032008-11-26 14:50:27 +01002552}
2553
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002554void kvm_arch_destroy_vm(struct kvm *kvm)
2555{
Christian Borntraegerd329c032008-11-26 14:50:27 +01002556 kvm_free_vcpus(kvm);
Eugene (jno) Dvurechenski7d43bafcf2015-04-22 17:09:44 +02002557 sca_dispose(kvm);
Christian Borntraegerd329c032008-11-26 14:50:27 +01002558 debug_unregister(kvm->arch.dbf);
Michael Muellerd7c5cb02017-06-12 14:15:19 +02002559 kvm_s390_gisa_destroy(kvm);
David Hildenbrandc54f0d62015-12-02 08:53:52 +01002560 free_page((unsigned long)kvm->arch.sie_page2);
Carsten Otte27e03932012-01-04 10:25:21 +01002561 if (!kvm_is_ucontrol(kvm))
Martin Schwidefsky6ea427b2016-03-08 11:55:04 +01002562 gmap_remove(kvm->arch.gmap);
Cornelia Huck841b91c2013-07-15 13:36:01 +02002563 kvm_s390_destroy_adapters(kvm);
Christian Borntraeger67335e62014-03-25 17:09:08 +01002564 kvm_s390_clear_float_irqs(kvm);
David Hildenbranda3508fb2015-07-08 13:19:48 +02002565 kvm_s390_vsie_destroy(kvm);
Christian Borntraeger8335713a2015-12-08 16:55:27 +01002566 KVM_EVENT(3, "vm 0x%pK destroyed", kvm);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002567}
2568
2569/* Section: vcpu related */
Dominik Dingeldafd0322014-12-02 16:53:21 +01002570static int __kvm_ucontrol_vcpu_init(struct kvm_vcpu *vcpu)
2571{
Martin Schwidefsky6ea427b2016-03-08 11:55:04 +01002572 vcpu->arch.gmap = gmap_create(current->mm, -1UL);
Dominik Dingeldafd0322014-12-02 16:53:21 +01002573 if (!vcpu->arch.gmap)
2574 return -ENOMEM;
2575 vcpu->arch.gmap->private = vcpu->kvm;
2576
2577 return 0;
2578}
2579
Eugene (jno) Dvurechenskia6e2f682015-04-21 15:31:59 +02002580static void sca_del_vcpu(struct kvm_vcpu *vcpu)
2581{
David Hildenbranda6940672016-08-08 22:39:32 +02002582 if (!kvm_s390_use_sca_entries())
2583 return;
Eugene (jno) Dvurechenski5e044312015-04-22 18:08:39 +02002584 read_lock(&vcpu->kvm->arch.sca_lock);
Eugene (jno) Dvurechenski7d43bafcf2015-04-22 17:09:44 +02002585 if (vcpu->kvm->arch.use_esca) {
2586 struct esca_block *sca = vcpu->kvm->arch.sca;
Eugene (jno) Dvurechenskia6e2f682015-04-21 15:31:59 +02002587
Eugene (jno) Dvurechenski7d43bafcf2015-04-22 17:09:44 +02002588 clear_bit_inv(vcpu->vcpu_id, (unsigned long *) sca->mcn);
David Hildenbrand10ce32d2015-10-12 12:41:41 +02002589 sca->cpu[vcpu->vcpu_id].sda = 0;
Eugene (jno) Dvurechenski7d43bafcf2015-04-22 17:09:44 +02002590 } else {
2591 struct bsca_block *sca = vcpu->kvm->arch.sca;
2592
2593 clear_bit_inv(vcpu->vcpu_id, (unsigned long *) &sca->mcn);
David Hildenbrand10ce32d2015-10-12 12:41:41 +02002594 sca->cpu[vcpu->vcpu_id].sda = 0;
Eugene (jno) Dvurechenski7d43bafcf2015-04-22 17:09:44 +02002595 }
Eugene (jno) Dvurechenski5e044312015-04-22 18:08:39 +02002596 read_unlock(&vcpu->kvm->arch.sca_lock);
Eugene (jno) Dvurechenskia6e2f682015-04-21 15:31:59 +02002597}
2598
David Hildenbrandeaa78f32015-10-12 16:29:01 +02002599static void sca_add_vcpu(struct kvm_vcpu *vcpu)
Eugene (jno) Dvurechenskia6e2f682015-04-21 15:31:59 +02002600{
David Hildenbranda6940672016-08-08 22:39:32 +02002601 if (!kvm_s390_use_sca_entries()) {
2602 struct bsca_block *sca = vcpu->kvm->arch.sca;
2603
2604 /* we still need the basic sca for the ipte control */
2605 vcpu->arch.sie_block->scaoh = (__u32)(((__u64)sca) >> 32);
2606 vcpu->arch.sie_block->scaol = (__u32)(__u64)sca;
David Hildenbrandf07afa02018-03-06 14:27:58 +01002607 return;
David Hildenbranda6940672016-08-08 22:39:32 +02002608 }
David Hildenbrandeaa78f32015-10-12 16:29:01 +02002609 read_lock(&vcpu->kvm->arch.sca_lock);
2610 if (vcpu->kvm->arch.use_esca) {
2611 struct esca_block *sca = vcpu->kvm->arch.sca;
Eugene (jno) Dvurechenskia6e2f682015-04-21 15:31:59 +02002612
David Hildenbrandeaa78f32015-10-12 16:29:01 +02002613 sca->cpu[vcpu->vcpu_id].sda = (__u64) vcpu->arch.sie_block;
Eugene (jno) Dvurechenski7d43bafcf2015-04-22 17:09:44 +02002614 vcpu->arch.sie_block->scaoh = (__u32)(((__u64)sca) >> 32);
2615 vcpu->arch.sie_block->scaol = (__u32)(__u64)sca & ~0x3fU;
David Hildenbrand0c9d8682017-03-13 11:48:28 +01002616 vcpu->arch.sie_block->ecb2 |= ECB2_ESCA;
David Hildenbrandeaa78f32015-10-12 16:29:01 +02002617 set_bit_inv(vcpu->vcpu_id, (unsigned long *) sca->mcn);
Eugene (jno) Dvurechenski7d43bafcf2015-04-22 17:09:44 +02002618 } else {
David Hildenbrandeaa78f32015-10-12 16:29:01 +02002619 struct bsca_block *sca = vcpu->kvm->arch.sca;
Eugene (jno) Dvurechenski7d43bafcf2015-04-22 17:09:44 +02002620
David Hildenbrandeaa78f32015-10-12 16:29:01 +02002621 sca->cpu[vcpu->vcpu_id].sda = (__u64) vcpu->arch.sie_block;
Eugene (jno) Dvurechenski7d43bafcf2015-04-22 17:09:44 +02002622 vcpu->arch.sie_block->scaoh = (__u32)(((__u64)sca) >> 32);
2623 vcpu->arch.sie_block->scaol = (__u32)(__u64)sca;
David Hildenbrandeaa78f32015-10-12 16:29:01 +02002624 set_bit_inv(vcpu->vcpu_id, (unsigned long *) &sca->mcn);
Eugene (jno) Dvurechenski7d43bafcf2015-04-22 17:09:44 +02002625 }
David Hildenbrandeaa78f32015-10-12 16:29:01 +02002626 read_unlock(&vcpu->kvm->arch.sca_lock);
Eugene (jno) Dvurechenski5e044312015-04-22 18:08:39 +02002627}
2628
2629/* Basic SCA to Extended SCA data copy routines */
2630static inline void sca_copy_entry(struct esca_entry *d, struct bsca_entry *s)
2631{
2632 d->sda = s->sda;
2633 d->sigp_ctrl.c = s->sigp_ctrl.c;
2634 d->sigp_ctrl.scn = s->sigp_ctrl.scn;
2635}
2636
2637static void sca_copy_b_to_e(struct esca_block *d, struct bsca_block *s)
2638{
2639 int i;
2640
2641 d->ipte_control = s->ipte_control;
2642 d->mcn[0] = s->mcn;
2643 for (i = 0; i < KVM_S390_BSCA_CPU_SLOTS; i++)
2644 sca_copy_entry(&d->cpu[i], &s->cpu[i]);
2645}
2646
2647static int sca_switch_to_extended(struct kvm *kvm)
2648{
2649 struct bsca_block *old_sca = kvm->arch.sca;
2650 struct esca_block *new_sca;
2651 struct kvm_vcpu *vcpu;
2652 unsigned int vcpu_idx;
2653 u32 scaol, scaoh;
2654
2655 new_sca = alloc_pages_exact(sizeof(*new_sca), GFP_KERNEL|__GFP_ZERO);
2656 if (!new_sca)
2657 return -ENOMEM;
2658
2659 scaoh = (u32)((u64)(new_sca) >> 32);
2660 scaol = (u32)(u64)(new_sca) & ~0x3fU;
2661
2662 kvm_s390_vcpu_block_all(kvm);
2663 write_lock(&kvm->arch.sca_lock);
2664
2665 sca_copy_b_to_e(new_sca, old_sca);
2666
2667 kvm_for_each_vcpu(vcpu_idx, vcpu, kvm) {
2668 vcpu->arch.sie_block->scaoh = scaoh;
2669 vcpu->arch.sie_block->scaol = scaol;
David Hildenbrand0c9d8682017-03-13 11:48:28 +01002670 vcpu->arch.sie_block->ecb2 |= ECB2_ESCA;
Eugene (jno) Dvurechenski5e044312015-04-22 18:08:39 +02002671 }
2672 kvm->arch.sca = new_sca;
2673 kvm->arch.use_esca = 1;
2674
2675 write_unlock(&kvm->arch.sca_lock);
2676 kvm_s390_vcpu_unblock_all(kvm);
2677
2678 free_page((unsigned long)old_sca);
2679
Christian Borntraeger8335713a2015-12-08 16:55:27 +01002680 VM_EVENT(kvm, 2, "Switched to ESCA (0x%pK -> 0x%pK)",
2681 old_sca, kvm->arch.sca);
Eugene (jno) Dvurechenski5e044312015-04-22 18:08:39 +02002682 return 0;
Eugene (jno) Dvurechenskia6e2f682015-04-21 15:31:59 +02002683}
2684
2685static int sca_can_add_vcpu(struct kvm *kvm, unsigned int id)
2686{
Eugene (jno) Dvurechenski5e044312015-04-22 18:08:39 +02002687 int rc;
2688
David Hildenbranda6940672016-08-08 22:39:32 +02002689 if (!kvm_s390_use_sca_entries()) {
2690 if (id < KVM_MAX_VCPUS)
2691 return true;
2692 return false;
2693 }
Eugene (jno) Dvurechenski5e044312015-04-22 18:08:39 +02002694 if (id < KVM_S390_BSCA_CPU_SLOTS)
2695 return true;
David Hildenbrand76a6dd72015-11-24 13:33:49 +01002696 if (!sclp.has_esca || !sclp.has_64bscao)
Eugene (jno) Dvurechenski5e044312015-04-22 18:08:39 +02002697 return false;
2698
2699 mutex_lock(&kvm->lock);
2700 rc = kvm->arch.use_esca ? 0 : sca_switch_to_extended(kvm);
2701 mutex_unlock(&kvm->lock);
2702
2703 return rc == 0 && id < KVM_S390_ESCA_CPU_SLOTS;
Eugene (jno) Dvurechenskia6e2f682015-04-21 15:31:59 +02002704}
2705
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002706int kvm_arch_vcpu_init(struct kvm_vcpu *vcpu)
2707{
Dominik Dingel3c038e62013-10-07 17:11:48 +02002708 vcpu->arch.pfault_token = KVM_S390_PFAULT_TOKEN_INVALID;
2709 kvm_clear_async_pf_completion_queue(vcpu);
Christian Borntraeger59674c12012-01-11 11:20:33 +01002710 vcpu->run->kvm_valid_regs = KVM_SYNC_PREFIX |
2711 KVM_SYNC_GPRS |
Christian Borntraeger9eed07352012-02-06 10:59:07 +01002712 KVM_SYNC_ACRS |
David Hildenbrandb028ee32014-07-17 10:47:43 +02002713 KVM_SYNC_CRS |
2714 KVM_SYNC_ARCH0 |
2715 KVM_SYNC_PFAULT;
Julius Niedworok75a46152016-08-03 16:39:54 +02002716 kvm_s390_set_prefix(vcpu, 0);
Fan Zhangc6e5f162016-01-07 18:24:29 +08002717 if (test_kvm_facility(vcpu->kvm, 64))
2718 vcpu->run->kvm_valid_regs |= KVM_SYNC_RICCB;
Christian Borntraeger35b3fde2018-01-17 14:44:34 +01002719 if (test_kvm_facility(vcpu->kvm, 82))
2720 vcpu->run->kvm_valid_regs |= KVM_SYNC_BPBC;
Fan Zhang4e0b1ab2016-11-29 07:17:55 +01002721 if (test_kvm_facility(vcpu->kvm, 133))
2722 vcpu->run->kvm_valid_regs |= KVM_SYNC_GSCB;
Christian Borntraegera3da7b42018-03-08 16:08:49 +00002723 if (test_kvm_facility(vcpu->kvm, 156))
2724 vcpu->run->kvm_valid_regs |= KVM_SYNC_ETOKEN;
David Hildenbrandf6aa6dc2016-01-15 14:11:46 +01002725 /* fprs can be synchronized via vrs, even if the guest has no vx. With
2726 * MACHINE_HAS_VX, (load|store)_fpu_regs() will work with vrs format.
2727 */
2728 if (MACHINE_HAS_VX)
Eric Farman68c55752014-06-09 10:57:26 -04002729 vcpu->run->kvm_valid_regs |= KVM_SYNC_VRS;
David Hildenbrand6fd8e672016-01-18 14:46:34 +01002730 else
2731 vcpu->run->kvm_valid_regs |= KVM_SYNC_FPRS;
Dominik Dingeldafd0322014-12-02 16:53:21 +01002732
2733 if (kvm_is_ucontrol(vcpu->kvm))
2734 return __kvm_ucontrol_vcpu_init(vcpu);
2735
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002736 return 0;
2737}
2738
David Hildenbranddb0758b2016-02-15 09:42:25 +01002739/* needs disabled preemption to protect from TOD sync and vcpu_load/put */
2740static void __start_cpu_timer_accounting(struct kvm_vcpu *vcpu)
2741{
2742 WARN_ON_ONCE(vcpu->arch.cputm_start != 0);
David Hildenbrand9c23a132016-02-17 21:53:33 +01002743 raw_write_seqcount_begin(&vcpu->arch.cputm_seqcount);
David Hildenbranddb0758b2016-02-15 09:42:25 +01002744 vcpu->arch.cputm_start = get_tod_clock_fast();
David Hildenbrand9c23a132016-02-17 21:53:33 +01002745 raw_write_seqcount_end(&vcpu->arch.cputm_seqcount);
David Hildenbranddb0758b2016-02-15 09:42:25 +01002746}
2747
2748/* needs disabled preemption to protect from TOD sync and vcpu_load/put */
2749static void __stop_cpu_timer_accounting(struct kvm_vcpu *vcpu)
2750{
2751 WARN_ON_ONCE(vcpu->arch.cputm_start == 0);
David Hildenbrand9c23a132016-02-17 21:53:33 +01002752 raw_write_seqcount_begin(&vcpu->arch.cputm_seqcount);
David Hildenbranddb0758b2016-02-15 09:42:25 +01002753 vcpu->arch.sie_block->cputm -= get_tod_clock_fast() - vcpu->arch.cputm_start;
2754 vcpu->arch.cputm_start = 0;
David Hildenbrand9c23a132016-02-17 21:53:33 +01002755 raw_write_seqcount_end(&vcpu->arch.cputm_seqcount);
David Hildenbranddb0758b2016-02-15 09:42:25 +01002756}
2757
2758/* needs disabled preemption to protect from TOD sync and vcpu_load/put */
2759static void __enable_cpu_timer_accounting(struct kvm_vcpu *vcpu)
2760{
2761 WARN_ON_ONCE(vcpu->arch.cputm_enabled);
2762 vcpu->arch.cputm_enabled = true;
2763 __start_cpu_timer_accounting(vcpu);
2764}
2765
2766/* needs disabled preemption to protect from TOD sync and vcpu_load/put */
2767static void __disable_cpu_timer_accounting(struct kvm_vcpu *vcpu)
2768{
2769 WARN_ON_ONCE(!vcpu->arch.cputm_enabled);
2770 __stop_cpu_timer_accounting(vcpu);
2771 vcpu->arch.cputm_enabled = false;
2772}
2773
2774static void enable_cpu_timer_accounting(struct kvm_vcpu *vcpu)
2775{
2776 preempt_disable(); /* protect from TOD sync and vcpu_load/put */
2777 __enable_cpu_timer_accounting(vcpu);
2778 preempt_enable();
2779}
2780
2781static void disable_cpu_timer_accounting(struct kvm_vcpu *vcpu)
2782{
2783 preempt_disable(); /* protect from TOD sync and vcpu_load/put */
2784 __disable_cpu_timer_accounting(vcpu);
2785 preempt_enable();
2786}
2787
David Hildenbrand4287f242016-02-15 09:40:12 +01002788/* set the cpu timer - may only be called from the VCPU thread itself */
2789void kvm_s390_set_cpu_timer(struct kvm_vcpu *vcpu, __u64 cputm)
2790{
David Hildenbranddb0758b2016-02-15 09:42:25 +01002791 preempt_disable(); /* protect from TOD sync and vcpu_load/put */
David Hildenbrand9c23a132016-02-17 21:53:33 +01002792 raw_write_seqcount_begin(&vcpu->arch.cputm_seqcount);
David Hildenbranddb0758b2016-02-15 09:42:25 +01002793 if (vcpu->arch.cputm_enabled)
2794 vcpu->arch.cputm_start = get_tod_clock_fast();
David Hildenbrand4287f242016-02-15 09:40:12 +01002795 vcpu->arch.sie_block->cputm = cputm;
David Hildenbrand9c23a132016-02-17 21:53:33 +01002796 raw_write_seqcount_end(&vcpu->arch.cputm_seqcount);
David Hildenbranddb0758b2016-02-15 09:42:25 +01002797 preempt_enable();
David Hildenbrand4287f242016-02-15 09:40:12 +01002798}
2799
David Hildenbranddb0758b2016-02-15 09:42:25 +01002800/* update and get the cpu timer - can also be called from other VCPU threads */
David Hildenbrand4287f242016-02-15 09:40:12 +01002801__u64 kvm_s390_get_cpu_timer(struct kvm_vcpu *vcpu)
2802{
David Hildenbrand9c23a132016-02-17 21:53:33 +01002803 unsigned int seq;
David Hildenbranddb0758b2016-02-15 09:42:25 +01002804 __u64 value;
David Hildenbranddb0758b2016-02-15 09:42:25 +01002805
2806 if (unlikely(!vcpu->arch.cputm_enabled))
2807 return vcpu->arch.sie_block->cputm;
2808
David Hildenbrand9c23a132016-02-17 21:53:33 +01002809 preempt_disable(); /* protect from TOD sync and vcpu_load/put */
2810 do {
2811 seq = raw_read_seqcount(&vcpu->arch.cputm_seqcount);
2812 /*
2813 * If the writer would ever execute a read in the critical
2814 * section, e.g. in irq context, we have a deadlock.
2815 */
2816 WARN_ON_ONCE((seq & 1) && smp_processor_id() == vcpu->cpu);
2817 value = vcpu->arch.sie_block->cputm;
2818 /* if cputm_start is 0, accounting is being started/stopped */
2819 if (likely(vcpu->arch.cputm_start))
2820 value -= get_tod_clock_fast() - vcpu->arch.cputm_start;
2821 } while (read_seqcount_retry(&vcpu->arch.cputm_seqcount, seq & ~1));
2822 preempt_enable();
David Hildenbranddb0758b2016-02-15 09:42:25 +01002823 return value;
David Hildenbrand4287f242016-02-15 09:40:12 +01002824}
2825
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002826void kvm_arch_vcpu_load(struct kvm_vcpu *vcpu, int cpu)
2827{
Hendrik Brueckner9977e882015-06-10 12:53:42 +02002828
David Hildenbrand37d9df92015-03-11 16:47:33 +01002829 gmap_enable(vcpu->arch.enabled_gmap);
David Hildenbrandef8f4f42018-01-23 18:05:29 +01002830 kvm_s390_set_cpuflags(vcpu, CPUSTAT_RUNNING);
David Hildenbrand5ebda312016-02-22 13:52:27 +01002831 if (vcpu->arch.cputm_enabled && !is_vcpu_idle(vcpu))
David Hildenbranddb0758b2016-02-15 09:42:25 +01002832 __start_cpu_timer_accounting(vcpu);
David Hildenbrand01a745a2016-02-12 20:41:56 +01002833 vcpu->cpu = cpu;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002834}
2835
2836void kvm_arch_vcpu_put(struct kvm_vcpu *vcpu)
2837{
David Hildenbrand01a745a2016-02-12 20:41:56 +01002838 vcpu->cpu = -1;
David Hildenbrand5ebda312016-02-22 13:52:27 +01002839 if (vcpu->arch.cputm_enabled && !is_vcpu_idle(vcpu))
David Hildenbranddb0758b2016-02-15 09:42:25 +01002840 __stop_cpu_timer_accounting(vcpu);
David Hildenbrand9daecfc2018-01-23 18:05:30 +01002841 kvm_s390_clear_cpuflags(vcpu, CPUSTAT_RUNNING);
David Hildenbrand37d9df92015-03-11 16:47:33 +01002842 vcpu->arch.enabled_gmap = gmap_get_enabled();
2843 gmap_disable(vcpu->arch.enabled_gmap);
Hendrik Brueckner9977e882015-06-10 12:53:42 +02002844
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002845}
2846
2847static void kvm_s390_vcpu_initial_reset(struct kvm_vcpu *vcpu)
2848{
2849 /* this equals initial cpu reset in pop, but we don't switch to ESA */
2850 vcpu->arch.sie_block->gpsw.mask = 0UL;
2851 vcpu->arch.sie_block->gpsw.addr = 0UL;
Christian Borntraeger8d26cf72012-01-11 11:19:32 +01002852 kvm_s390_set_prefix(vcpu, 0);
David Hildenbrand4287f242016-02-15 09:40:12 +01002853 kvm_s390_set_cpu_timer(vcpu, 0);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002854 vcpu->arch.sie_block->ckc = 0UL;
2855 vcpu->arch.sie_block->todpr = 0;
2856 memset(vcpu->arch.sie_block->gcr, 0, 16 * sizeof(__u64));
David Hildenbrandb9224cd2018-04-30 17:55:24 +02002857 vcpu->arch.sie_block->gcr[0] = CR0_UNUSED_56 |
2858 CR0_INTERRUPT_KEY_SUBMASK |
2859 CR0_MEASUREMENT_ALERT_SUBMASK;
2860 vcpu->arch.sie_block->gcr[14] = CR14_UNUSED_32 |
2861 CR14_UNUSED_33 |
2862 CR14_EXTERNAL_DAMAGE_SUBMASK;
David Hildenbrand9abc2a02016-01-14 22:12:47 +01002863 /* make sure the new fpc will be lazily loaded */
2864 save_fpu_regs();
2865 current->thread.fpu.fpc = 0;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002866 vcpu->arch.sie_block->gbea = 1;
Christian Borntraeger672550f2014-02-10 15:32:19 +01002867 vcpu->arch.sie_block->pp = 0;
Christian Borntraeger35b3fde2018-01-17 14:44:34 +01002868 vcpu->arch.sie_block->fpf &= ~FPF_BPBC;
Dominik Dingel3c038e62013-10-07 17:11:48 +02002869 vcpu->arch.pfault_token = KVM_S390_PFAULT_TOKEN_INVALID;
2870 kvm_clear_async_pf_completion_queue(vcpu);
David Hildenbrand6352e4d2014-04-10 17:35:00 +02002871 if (!kvm_s390_user_cpu_state_ctrl(vcpu->kvm))
2872 kvm_s390_vcpu_stop(vcpu);
Jens Freimann2ed10cc2014-02-11 13:48:07 +01002873 kvm_s390_clear_local_irqs(vcpu);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002874}
2875
Dominik Dingel31928aa2014-12-04 15:47:07 +01002876void kvm_arch_vcpu_postcreate(struct kvm_vcpu *vcpu)
Marcelo Tosatti42897d82012-11-27 23:29:02 -02002877{
Jason J. Herne72f25022014-11-25 09:46:02 -05002878 mutex_lock(&vcpu->kvm->lock);
Fan Zhangfdf03652015-05-13 10:58:41 +02002879 preempt_disable();
Jason J. Herne72f25022014-11-25 09:46:02 -05002880 vcpu->arch.sie_block->epoch = vcpu->kvm->arch.epoch;
David Hildenbrandd16b52c2018-02-07 12:46:44 +01002881 vcpu->arch.sie_block->epdx = vcpu->kvm->arch.epdx;
Fan Zhangfdf03652015-05-13 10:58:41 +02002882 preempt_enable();
Jason J. Herne72f25022014-11-25 09:46:02 -05002883 mutex_unlock(&vcpu->kvm->lock);
David Hildenbrand25508822015-10-12 16:27:23 +02002884 if (!kvm_is_ucontrol(vcpu->kvm)) {
Dominik Dingeldafd0322014-12-02 16:53:21 +01002885 vcpu->arch.gmap = vcpu->kvm->arch.gmap;
David Hildenbrandeaa78f32015-10-12 16:29:01 +02002886 sca_add_vcpu(vcpu);
David Hildenbrand25508822015-10-12 16:27:23 +02002887 }
David Hildenbrand6502a342016-06-21 14:19:51 +02002888 if (test_kvm_facility(vcpu->kvm, 74) || vcpu->kvm->arch.user_instr0)
2889 vcpu->arch.sie_block->ictl |= ICTL_OPEREXC;
David Hildenbrand37d9df92015-03-11 16:47:33 +01002890 /* make vcpu_load load the right gmap on the first trigger */
2891 vcpu->arch.enabled_gmap = vcpu->arch.gmap;
Marcelo Tosatti42897d82012-11-27 23:29:02 -02002892}
2893
Christian Borntraeger8ec2fa52019-04-03 03:00:35 -04002894static bool kvm_has_pckmo_subfunc(struct kvm *kvm, unsigned long nr)
2895{
2896 if (test_bit_inv(nr, (unsigned long *)&kvm->arch.model.subfuncs.pckmo) &&
2897 test_bit_inv(nr, (unsigned long *)&kvm_s390_available_subfunc.pckmo))
2898 return true;
2899 return false;
2900}
2901
2902static bool kvm_has_pckmo_ecc(struct kvm *kvm)
2903{
2904 /* At least one ECC subfunction must be present */
2905 return kvm_has_pckmo_subfunc(kvm, 32) ||
2906 kvm_has_pckmo_subfunc(kvm, 33) ||
2907 kvm_has_pckmo_subfunc(kvm, 34) ||
2908 kvm_has_pckmo_subfunc(kvm, 40) ||
2909 kvm_has_pckmo_subfunc(kvm, 41);
2910
2911}
2912
Tony Krowiak5102ee82014-06-27 14:46:01 -04002913static void kvm_s390_vcpu_crypto_setup(struct kvm_vcpu *vcpu)
2914{
Tony Krowiake585b242018-09-25 19:16:18 -04002915 /*
2916 * If the AP instructions are not being interpreted and the MSAX3
2917 * facility is not configured for the guest, there is nothing to set up.
2918 */
2919 if (!vcpu->kvm->arch.crypto.apie && !test_kvm_facility(vcpu->kvm, 76))
Tony Krowiak5102ee82014-06-27 14:46:01 -04002920 return;
2921
Tony Krowiake585b242018-09-25 19:16:18 -04002922 vcpu->arch.sie_block->crycbd = vcpu->kvm->arch.crypto.crycbd;
Tony Krowiaka374e892014-09-03 10:13:53 +02002923 vcpu->arch.sie_block->ecb3 &= ~(ECB3_AES | ECB3_DEA);
Tony Krowiak37940fb2018-09-25 19:16:39 -04002924 vcpu->arch.sie_block->eca &= ~ECA_APIE;
Christian Borntraeger8ec2fa52019-04-03 03:00:35 -04002925 vcpu->arch.sie_block->ecd &= ~ECD_ECC;
Tony Krowiaka374e892014-09-03 10:13:53 +02002926
Tony Krowiake585b242018-09-25 19:16:18 -04002927 if (vcpu->kvm->arch.crypto.apie)
2928 vcpu->arch.sie_block->eca |= ECA_APIE;
2929
2930 /* Set up protected key support */
Christian Borntraeger8ec2fa52019-04-03 03:00:35 -04002931 if (vcpu->kvm->arch.crypto.aes_kw) {
Tony Krowiaka374e892014-09-03 10:13:53 +02002932 vcpu->arch.sie_block->ecb3 |= ECB3_AES;
Christian Borntraeger8ec2fa52019-04-03 03:00:35 -04002933 /* ecc is also wrapped with AES key */
2934 if (kvm_has_pckmo_ecc(vcpu->kvm))
2935 vcpu->arch.sie_block->ecd |= ECD_ECC;
2936 }
2937
Tony Krowiaka374e892014-09-03 10:13:53 +02002938 if (vcpu->kvm->arch.crypto.dea_kw)
2939 vcpu->arch.sie_block->ecb3 |= ECB3_DEA;
Tony Krowiak5102ee82014-06-27 14:46:01 -04002940}
2941
Dominik Dingelb31605c2014-03-25 13:47:11 +01002942void kvm_s390_vcpu_unsetup_cmma(struct kvm_vcpu *vcpu)
2943{
2944 free_page(vcpu->arch.sie_block->cbrlo);
2945 vcpu->arch.sie_block->cbrlo = 0;
2946}
2947
2948int kvm_s390_vcpu_setup_cmma(struct kvm_vcpu *vcpu)
2949{
2950 vcpu->arch.sie_block->cbrlo = get_zeroed_page(GFP_KERNEL);
2951 if (!vcpu->arch.sie_block->cbrlo)
2952 return -ENOMEM;
Dominik Dingelb31605c2014-03-25 13:47:11 +01002953 return 0;
2954}
2955
Michael Mueller91520f12015-02-27 14:32:11 +01002956static void kvm_s390_vcpu_setup_model(struct kvm_vcpu *vcpu)
2957{
2958 struct kvm_s390_cpu_model *model = &vcpu->kvm->arch.model;
2959
Michael Mueller91520f12015-02-27 14:32:11 +01002960 vcpu->arch.sie_block->ibc = model->ibc;
David Hildenbrand80bc79d2015-12-02 09:43:29 +01002961 if (test_kvm_facility(vcpu->kvm, 7))
David Hildenbrandc54f0d62015-12-02 08:53:52 +01002962 vcpu->arch.sie_block->fac = (u32)(u64) model->fac_list;
Michael Mueller91520f12015-02-27 14:32:11 +01002963}
2964
Heiko Carstensb0c632d2008-03-25 18:47:20 +01002965int kvm_arch_vcpu_setup(struct kvm_vcpu *vcpu)
2966{
Dominik Dingelb31605c2014-03-25 13:47:11 +01002967 int rc = 0;
Konstantin Weitzb31288f2013-04-17 17:36:29 +02002968
Cornelia Huck9e6dabe2011-11-17 11:00:41 +01002969 atomic_set(&vcpu->arch.sie_block->cpuflags, CPUSTAT_ZARCH |
2970 CPUSTAT_SM |
Guenther Hutzla4a4f192015-03-31 14:39:49 +02002971 CPUSTAT_STOPPED);
2972
Guenther Hutzl53df84f2015-02-18 11:13:03 +01002973 if (test_kvm_facility(vcpu->kvm, 78))
David Hildenbrandef8f4f42018-01-23 18:05:29 +01002974 kvm_s390_set_cpuflags(vcpu, CPUSTAT_GED2);
Guenther Hutzl53df84f2015-02-18 11:13:03 +01002975 else if (test_kvm_facility(vcpu->kvm, 8))
David Hildenbrandef8f4f42018-01-23 18:05:29 +01002976 kvm_s390_set_cpuflags(vcpu, CPUSTAT_GED);
Guenther Hutzla4a4f192015-03-31 14:39:49 +02002977
Michael Mueller91520f12015-02-27 14:32:11 +01002978 kvm_s390_vcpu_setup_model(vcpu);
2979
David Hildenbrandbdab09f2016-04-12 11:07:49 +02002980 /* pgste_set_pte has special handling for !MACHINE_HAS_ESOP */
2981 if (MACHINE_HAS_ESOP)
David Hildenbrand0c9d8682017-03-13 11:48:28 +01002982 vcpu->arch.sie_block->ecb |= ECB_HOSTPROTINT;
David Hildenbrandbd50e8e2016-03-04 12:23:55 +01002983 if (test_kvm_facility(vcpu->kvm, 9))
David Hildenbrand0c9d8682017-03-13 11:48:28 +01002984 vcpu->arch.sie_block->ecb |= ECB_SRSI;
David Hildenbrandf597d242016-04-22 16:26:49 +02002985 if (test_kvm_facility(vcpu->kvm, 73))
David Hildenbrand0c9d8682017-03-13 11:48:28 +01002986 vcpu->arch.sie_block->ecb |= ECB_TE;
Michael Mueller7feb6bb2013-06-28 13:30:24 +02002987
Janosch Frankc9f0a2b2018-02-16 12:16:14 +01002988 if (test_kvm_facility(vcpu->kvm, 8) && vcpu->kvm->arch.use_pfmfi)
David Hildenbrand0c9d8682017-03-13 11:48:28 +01002989 vcpu->arch.sie_block->ecb2 |= ECB2_PFMFI;
Janosch Frankcd1836f2016-08-04 09:57:36 +02002990 if (test_kvm_facility(vcpu->kvm, 130))
David Hildenbrand0c9d8682017-03-13 11:48:28 +01002991 vcpu->arch.sie_block->ecb2 |= ECB2_IEP;
2992 vcpu->arch.sie_block->eca = ECA_MVPGI | ECA_PROTEXCI;
David Hildenbrand48ee7d32016-04-04 15:49:34 +02002993 if (sclp.has_cei)
David Hildenbrand0c9d8682017-03-13 11:48:28 +01002994 vcpu->arch.sie_block->eca |= ECA_CEI;
David Hildenbrand11ad65b2016-04-04 15:46:26 +02002995 if (sclp.has_ib)
David Hildenbrand0c9d8682017-03-13 11:48:28 +01002996 vcpu->arch.sie_block->eca |= ECA_IB;
David Hildenbrand37c5f6c2015-05-06 13:18:59 +02002997 if (sclp.has_siif)
David Hildenbrand0c9d8682017-03-13 11:48:28 +01002998 vcpu->arch.sie_block->eca |= ECA_SII;
David Hildenbrand37c5f6c2015-05-06 13:18:59 +02002999 if (sclp.has_sigpif)
David Hildenbrand0c9d8682017-03-13 11:48:28 +01003000 vcpu->arch.sie_block->eca |= ECA_SIGPI;
Michael Mueller18280d82015-03-16 16:05:41 +01003001 if (test_kvm_facility(vcpu->kvm, 129)) {
David Hildenbrand0c9d8682017-03-13 11:48:28 +01003002 vcpu->arch.sie_block->eca |= ECA_VX;
3003 vcpu->arch.sie_block->ecd |= ECD_HOSTREGMGMT;
Eric Farman13211ea2014-04-30 13:39:46 -04003004 }
Collin L. Walling8fa16962016-07-26 15:29:44 -04003005 if (test_kvm_facility(vcpu->kvm, 139))
3006 vcpu->arch.sie_block->ecd |= ECD_MEF;
Christian Borntraegera3da7b42018-03-08 16:08:49 +00003007 if (test_kvm_facility(vcpu->kvm, 156))
3008 vcpu->arch.sie_block->ecd |= ECD_ETOKENF;
Michael Muellerd7c5cb02017-06-12 14:15:19 +02003009 if (vcpu->arch.sie_block->gd) {
3010 vcpu->arch.sie_block->eca |= ECA_AIV;
3011 VCPU_EVENT(vcpu, 3, "AIV gisa format-%u enabled for cpu %03u",
3012 vcpu->arch.sie_block->gd & 0x3, vcpu->vcpu_id);
3013 }
Fan Zhang4e0b1ab2016-11-29 07:17:55 +01003014 vcpu->arch.sie_block->sdnxo = ((unsigned long) &vcpu->run->s.regs.sdnx)
3015 | SDNXC;
Fan Zhangc6e5f162016-01-07 18:24:29 +08003016 vcpu->arch.sie_block->riccbd = (unsigned long) &vcpu->run->s.regs.riccb;
Farhan Ali730cd632017-02-24 16:12:56 -05003017
3018 if (sclp.has_kss)
David Hildenbrandef8f4f42018-01-23 18:05:29 +01003019 kvm_s390_set_cpuflags(vcpu, CPUSTAT_KSS);
Farhan Ali730cd632017-02-24 16:12:56 -05003020 else
3021 vcpu->arch.sie_block->ictl |= ICTL_ISKE | ICTL_SSKE | ICTL_RRBE;
Matthew Rosato5a5e6532013-01-29 11:48:20 -05003022
Dominik Dingele6db1d62015-05-07 15:41:57 +02003023 if (vcpu->kvm->arch.use_cmma) {
Dominik Dingelb31605c2014-03-25 13:47:11 +01003024 rc = kvm_s390_vcpu_setup_cmma(vcpu);
3025 if (rc)
3026 return rc;
Konstantin Weitzb31288f2013-04-17 17:36:29 +02003027 }
David Hildenbrand0ac96caf2014-12-12 15:17:31 +01003028 hrtimer_init(&vcpu->arch.ckc_timer, CLOCK_MONOTONIC, HRTIMER_MODE_REL);
Christian Borntraegerca872302009-05-12 17:21:49 +02003029 vcpu->arch.ckc_timer.function = kvm_s390_idle_wakeup;
Michael Mueller9d8d5782015-02-02 15:42:51 +01003030
Collin Walling67d49d52018-08-31 12:51:19 -04003031 vcpu->arch.sie_block->hpid = HPID_KVM;
3032
Tony Krowiak5102ee82014-06-27 14:46:01 -04003033 kvm_s390_vcpu_crypto_setup(vcpu);
3034
Dominik Dingelb31605c2014-03-25 13:47:11 +01003035 return rc;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003036}
3037
Sean Christopherson897cc382019-12-18 13:55:09 -08003038int kvm_arch_vcpu_precreate(struct kvm *kvm, unsigned int id)
3039{
3040 if (!kvm_is_ucontrol(kvm) && !sca_can_add_vcpu(kvm, id))
3041 return -EINVAL;
3042 return 0;
3043}
3044
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003045struct kvm_vcpu *kvm_arch_vcpu_create(struct kvm *kvm,
3046 unsigned int id)
3047{
Carsten Otte4d475552011-10-18 12:27:12 +02003048 struct kvm_vcpu *vcpu;
Michael Mueller7feb6bb2013-06-28 13:30:24 +02003049 struct sie_page *sie_page;
Sean Christopherson897cc382019-12-18 13:55:09 -08003050 int rc;
Carsten Otte4d475552011-10-18 12:27:12 +02003051
3052 rc = -ENOMEM;
3053
Michael Muellerb110fea2013-06-12 13:54:54 +02003054 vcpu = kmem_cache_zalloc(kvm_vcpu_cache, GFP_KERNEL);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003055 if (!vcpu)
Carsten Otte4d475552011-10-18 12:27:12 +02003056 goto out;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003057
QingFeng Haoda72ca42017-06-07 11:41:19 +02003058 BUILD_BUG_ON(sizeof(struct sie_page) != 4096);
Michael Mueller7feb6bb2013-06-28 13:30:24 +02003059 sie_page = (struct sie_page *) get_zeroed_page(GFP_KERNEL);
3060 if (!sie_page)
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003061 goto out_free_cpu;
3062
Michael Mueller7feb6bb2013-06-28 13:30:24 +02003063 vcpu->arch.sie_block = &sie_page->sie_block;
3064 vcpu->arch.sie_block->itdba = (unsigned long) &sie_page->itdb;
3065
David Hildenbrandefed1102015-04-16 12:32:41 +02003066 /* the real guest size will always be smaller than msl */
3067 vcpu->arch.sie_block->mso = 0;
3068 vcpu->arch.sie_block->msl = sclp.hamax;
3069
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003070 vcpu->arch.sie_block->icpua = id;
Carsten Otteba5c1e92008-03-25 18:47:26 +01003071 spin_lock_init(&vcpu->arch.local_int.lock);
Michael Mueller982cff42019-01-31 09:52:38 +01003072 vcpu->arch.sie_block->gd = (u32)(u64)kvm->arch.gisa_int.origin;
Michael Mueller4b9f9522017-06-23 13:51:25 +02003073 if (vcpu->arch.sie_block->gd && sclp.has_gisaf)
3074 vcpu->arch.sie_block->gd |= GISA_FORMAT1;
David Hildenbrand9c23a132016-02-17 21:53:33 +01003075 seqcount_init(&vcpu->arch.cputm_seqcount);
Carsten Otteba5c1e92008-03-25 18:47:26 +01003076
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003077 rc = kvm_vcpu_init(vcpu, kvm, id);
3078 if (rc)
David Hildenbrand9abc2a02016-01-14 22:12:47 +01003079 goto out_free_sie_block;
Christian Borntraeger8335713a2015-12-08 16:55:27 +01003080 VM_EVENT(kvm, 3, "create cpu %d at 0x%pK, sie block at 0x%pK", id, vcpu,
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003081 vcpu->arch.sie_block);
Cornelia Huckade38c32012-07-23 17:20:30 +02003082 trace_kvm_s390_create_vcpu(id, vcpu, vcpu->arch.sie_block);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003083
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003084 return vcpu;
Wei Yongjun7b06bf22010-03-09 14:37:53 +08003085out_free_sie_block:
3086 free_page((unsigned long)(vcpu->arch.sie_block));
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003087out_free_cpu:
Michael Muellerb110fea2013-06-12 13:54:54 +02003088 kmem_cache_free(kvm_vcpu_cache, vcpu);
Carsten Otte4d475552011-10-18 12:27:12 +02003089out:
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003090 return ERR_PTR(rc);
3091}
3092
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003093int kvm_arch_vcpu_runnable(struct kvm_vcpu *vcpu)
3094{
David Hildenbrand9a022062014-08-05 17:40:47 +02003095 return kvm_s390_vcpu_has_irq(vcpu, 0);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003096}
3097
Longpeng(Mike)199b5762017-08-08 12:05:32 +08003098bool kvm_arch_vcpu_in_kernel(struct kvm_vcpu *vcpu)
3099{
Longpeng(Mike)0546c632017-08-08 12:05:34 +08003100 return !(vcpu->arch.sie_block->gpsw.mask & PSW_MASK_PSTATE);
Longpeng(Mike)199b5762017-08-08 12:05:32 +08003101}
3102
Christian Borntraeger27406cd2015-04-14 12:17:34 +02003103void kvm_s390_vcpu_block(struct kvm_vcpu *vcpu)
Christian Borntraeger49b99e12013-05-17 14:41:35 +02003104{
Peter Zijlstra805de8f42015-04-24 01:12:32 +02003105 atomic_or(PROG_BLOCK_SIE, &vcpu->arch.sie_block->prog20);
David Hildenbrand61a6df52015-05-12 08:41:40 +02003106 exit_sie(vcpu);
Christian Borntraeger49b99e12013-05-17 14:41:35 +02003107}
3108
Christian Borntraeger27406cd2015-04-14 12:17:34 +02003109void kvm_s390_vcpu_unblock(struct kvm_vcpu *vcpu)
Christian Borntraeger49b99e12013-05-17 14:41:35 +02003110{
Peter Zijlstra805de8f42015-04-24 01:12:32 +02003111 atomic_andnot(PROG_BLOCK_SIE, &vcpu->arch.sie_block->prog20);
Christian Borntraeger49b99e12013-05-17 14:41:35 +02003112}
3113
Christian Borntraeger8e236542015-04-09 13:49:04 +02003114static void kvm_s390_vcpu_request(struct kvm_vcpu *vcpu)
3115{
Peter Zijlstra805de8f42015-04-24 01:12:32 +02003116 atomic_or(PROG_REQUEST, &vcpu->arch.sie_block->prog20);
David Hildenbrand61a6df52015-05-12 08:41:40 +02003117 exit_sie(vcpu);
Christian Borntraeger8e236542015-04-09 13:49:04 +02003118}
3119
David Hildenbrand9ea59722018-09-25 19:16:16 -04003120bool kvm_s390_vcpu_sie_inhibited(struct kvm_vcpu *vcpu)
3121{
3122 return atomic_read(&vcpu->arch.sie_block->prog20) &
3123 (PROG_BLOCK_SIE | PROG_REQUEST);
3124}
3125
Christian Borntraeger8e236542015-04-09 13:49:04 +02003126static void kvm_s390_vcpu_request_handled(struct kvm_vcpu *vcpu)
3127{
Jason J. Herne9bf9fde2015-09-16 09:13:50 -04003128 atomic_andnot(PROG_REQUEST, &vcpu->arch.sie_block->prog20);
Christian Borntraeger8e236542015-04-09 13:49:04 +02003129}
3130
Christian Borntraeger49b99e12013-05-17 14:41:35 +02003131/*
David Hildenbrand9ea59722018-09-25 19:16:16 -04003132 * Kick a guest cpu out of (v)SIE and wait until (v)SIE is not running.
Christian Borntraeger49b99e12013-05-17 14:41:35 +02003133 * If the CPU is not running (e.g. waiting as idle) the function will
3134 * return immediately. */
3135void exit_sie(struct kvm_vcpu *vcpu)
3136{
David Hildenbrandef8f4f42018-01-23 18:05:29 +01003137 kvm_s390_set_cpuflags(vcpu, CPUSTAT_STOP_INT);
David Hildenbrand9ea59722018-09-25 19:16:16 -04003138 kvm_s390_vsie_kick(vcpu);
Christian Borntraeger49b99e12013-05-17 14:41:35 +02003139 while (vcpu->arch.sie_block->prog0c & PROG_IN_SIE)
3140 cpu_relax();
3141}
3142
Christian Borntraeger8e236542015-04-09 13:49:04 +02003143/* Kick a guest cpu out of SIE to process a request synchronously */
3144void kvm_s390_sync_request(int req, struct kvm_vcpu *vcpu)
Christian Borntraeger49b99e12013-05-17 14:41:35 +02003145{
Christian Borntraeger8e236542015-04-09 13:49:04 +02003146 kvm_make_request(req, vcpu);
3147 kvm_s390_vcpu_request(vcpu);
Christian Borntraeger49b99e12013-05-17 14:41:35 +02003148}
3149
Martin Schwidefsky414d3b02016-03-08 11:52:54 +01003150static void kvm_gmap_notifier(struct gmap *gmap, unsigned long start,
3151 unsigned long end)
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02003152{
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02003153 struct kvm *kvm = gmap->private;
3154 struct kvm_vcpu *vcpu;
Martin Schwidefsky414d3b02016-03-08 11:52:54 +01003155 unsigned long prefix;
3156 int i;
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02003157
David Hildenbrand65d0b0d2015-04-27 16:29:34 +02003158 if (gmap_is_shadow(gmap))
3159 return;
Martin Schwidefsky414d3b02016-03-08 11:52:54 +01003160 if (start >= 1UL << 31)
3161 /* We are only interested in prefix pages */
3162 return;
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02003163 kvm_for_each_vcpu(i, vcpu, kvm) {
3164 /* match against both prefix pages */
Martin Schwidefsky414d3b02016-03-08 11:52:54 +01003165 prefix = kvm_s390_get_prefix(vcpu);
3166 if (prefix <= end && start <= prefix + 2*PAGE_SIZE - 1) {
3167 VCPU_EVENT(vcpu, 2, "gmap notifier for %lx-%lx",
3168 start, end);
Christian Borntraeger8e236542015-04-09 13:49:04 +02003169 kvm_s390_sync_request(KVM_REQ_MMU_RELOAD, vcpu);
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02003170 }
3171 }
3172}
3173
Christian Borntraeger8b905d22019-03-05 05:30:02 -05003174bool kvm_arch_no_poll(struct kvm_vcpu *vcpu)
3175{
3176 /* do not poll with more than halt_poll_max_steal percent of steal time */
3177 if (S390_lowcore.avg_steal_timer * 100 / (TICK_USEC << 12) >=
3178 halt_poll_max_steal) {
3179 vcpu->stat.halt_no_poll_steal++;
3180 return true;
3181 }
3182 return false;
3183}
3184
Christoffer Dallb6d33832012-03-08 16:44:24 -05003185int kvm_arch_vcpu_should_kick(struct kvm_vcpu *vcpu)
3186{
3187 /* kvm common code refers to this, but never calls it */
3188 BUG();
3189 return 0;
3190}
3191
Carsten Otte14eebd92012-05-15 14:15:26 +02003192static int kvm_arch_vcpu_ioctl_get_one_reg(struct kvm_vcpu *vcpu,
3193 struct kvm_one_reg *reg)
3194{
3195 int r = -EINVAL;
3196
3197 switch (reg->id) {
Carsten Otte29b7c712012-05-15 14:15:27 +02003198 case KVM_REG_S390_TODPR:
3199 r = put_user(vcpu->arch.sie_block->todpr,
3200 (u32 __user *)reg->addr);
3201 break;
3202 case KVM_REG_S390_EPOCHDIFF:
3203 r = put_user(vcpu->arch.sie_block->epoch,
3204 (u64 __user *)reg->addr);
3205 break;
Jason J. herne46a6dd12012-05-15 14:15:28 +02003206 case KVM_REG_S390_CPU_TIMER:
David Hildenbrand4287f242016-02-15 09:40:12 +01003207 r = put_user(kvm_s390_get_cpu_timer(vcpu),
Jason J. herne46a6dd12012-05-15 14:15:28 +02003208 (u64 __user *)reg->addr);
3209 break;
3210 case KVM_REG_S390_CLOCK_COMP:
3211 r = put_user(vcpu->arch.sie_block->ckc,
3212 (u64 __user *)reg->addr);
3213 break;
Dominik Dingel536336c2013-09-30 10:55:33 +02003214 case KVM_REG_S390_PFTOKEN:
3215 r = put_user(vcpu->arch.pfault_token,
3216 (u64 __user *)reg->addr);
3217 break;
3218 case KVM_REG_S390_PFCOMPARE:
3219 r = put_user(vcpu->arch.pfault_compare,
3220 (u64 __user *)reg->addr);
3221 break;
3222 case KVM_REG_S390_PFSELECT:
3223 r = put_user(vcpu->arch.pfault_select,
3224 (u64 __user *)reg->addr);
3225 break;
Christian Borntraeger672550f2014-02-10 15:32:19 +01003226 case KVM_REG_S390_PP:
3227 r = put_user(vcpu->arch.sie_block->pp,
3228 (u64 __user *)reg->addr);
3229 break;
Christian Borntraegerafa45ff2014-02-10 15:39:23 +01003230 case KVM_REG_S390_GBEA:
3231 r = put_user(vcpu->arch.sie_block->gbea,
3232 (u64 __user *)reg->addr);
3233 break;
Carsten Otte14eebd92012-05-15 14:15:26 +02003234 default:
3235 break;
3236 }
3237
3238 return r;
3239}
3240
3241static int kvm_arch_vcpu_ioctl_set_one_reg(struct kvm_vcpu *vcpu,
3242 struct kvm_one_reg *reg)
3243{
3244 int r = -EINVAL;
David Hildenbrand4287f242016-02-15 09:40:12 +01003245 __u64 val;
Carsten Otte14eebd92012-05-15 14:15:26 +02003246
3247 switch (reg->id) {
Carsten Otte29b7c712012-05-15 14:15:27 +02003248 case KVM_REG_S390_TODPR:
3249 r = get_user(vcpu->arch.sie_block->todpr,
3250 (u32 __user *)reg->addr);
3251 break;
3252 case KVM_REG_S390_EPOCHDIFF:
3253 r = get_user(vcpu->arch.sie_block->epoch,
3254 (u64 __user *)reg->addr);
3255 break;
Jason J. herne46a6dd12012-05-15 14:15:28 +02003256 case KVM_REG_S390_CPU_TIMER:
David Hildenbrand4287f242016-02-15 09:40:12 +01003257 r = get_user(val, (u64 __user *)reg->addr);
3258 if (!r)
3259 kvm_s390_set_cpu_timer(vcpu, val);
Jason J. herne46a6dd12012-05-15 14:15:28 +02003260 break;
3261 case KVM_REG_S390_CLOCK_COMP:
3262 r = get_user(vcpu->arch.sie_block->ckc,
3263 (u64 __user *)reg->addr);
3264 break;
Dominik Dingel536336c2013-09-30 10:55:33 +02003265 case KVM_REG_S390_PFTOKEN:
3266 r = get_user(vcpu->arch.pfault_token,
3267 (u64 __user *)reg->addr);
David Hildenbrand9fbd8082014-10-09 15:01:38 +02003268 if (vcpu->arch.pfault_token == KVM_S390_PFAULT_TOKEN_INVALID)
3269 kvm_clear_async_pf_completion_queue(vcpu);
Dominik Dingel536336c2013-09-30 10:55:33 +02003270 break;
3271 case KVM_REG_S390_PFCOMPARE:
3272 r = get_user(vcpu->arch.pfault_compare,
3273 (u64 __user *)reg->addr);
3274 break;
3275 case KVM_REG_S390_PFSELECT:
3276 r = get_user(vcpu->arch.pfault_select,
3277 (u64 __user *)reg->addr);
3278 break;
Christian Borntraeger672550f2014-02-10 15:32:19 +01003279 case KVM_REG_S390_PP:
3280 r = get_user(vcpu->arch.sie_block->pp,
3281 (u64 __user *)reg->addr);
3282 break;
Christian Borntraegerafa45ff2014-02-10 15:39:23 +01003283 case KVM_REG_S390_GBEA:
3284 r = get_user(vcpu->arch.sie_block->gbea,
3285 (u64 __user *)reg->addr);
3286 break;
Carsten Otte14eebd92012-05-15 14:15:26 +02003287 default:
3288 break;
3289 }
3290
3291 return r;
3292}
Christoffer Dallb6d33832012-03-08 16:44:24 -05003293
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003294static int kvm_arch_vcpu_ioctl_initial_reset(struct kvm_vcpu *vcpu)
3295{
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003296 kvm_s390_vcpu_initial_reset(vcpu);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003297 return 0;
3298}
3299
3300int kvm_arch_vcpu_ioctl_set_regs(struct kvm_vcpu *vcpu, struct kvm_regs *regs)
3301{
Christoffer Dall875656f2017-12-04 21:35:27 +01003302 vcpu_load(vcpu);
Christian Borntraeger5a32c1a2012-01-11 11:20:32 +01003303 memcpy(&vcpu->run->s.regs.gprs, &regs->gprs, sizeof(regs->gprs));
Christoffer Dall875656f2017-12-04 21:35:27 +01003304 vcpu_put(vcpu);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003305 return 0;
3306}
3307
3308int kvm_arch_vcpu_ioctl_get_regs(struct kvm_vcpu *vcpu, struct kvm_regs *regs)
3309{
Christoffer Dall1fc9b762017-12-04 21:35:26 +01003310 vcpu_load(vcpu);
Christian Borntraeger5a32c1a2012-01-11 11:20:32 +01003311 memcpy(&regs->gprs, &vcpu->run->s.regs.gprs, sizeof(regs->gprs));
Christoffer Dall1fc9b762017-12-04 21:35:26 +01003312 vcpu_put(vcpu);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003313 return 0;
3314}
3315
3316int kvm_arch_vcpu_ioctl_set_sregs(struct kvm_vcpu *vcpu,
3317 struct kvm_sregs *sregs)
3318{
Christoffer Dallb4ef9d42017-12-04 21:35:29 +01003319 vcpu_load(vcpu);
3320
Christian Borntraeger59674c12012-01-11 11:20:33 +01003321 memcpy(&vcpu->run->s.regs.acrs, &sregs->acrs, sizeof(sregs->acrs));
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003322 memcpy(&vcpu->arch.sie_block->gcr, &sregs->crs, sizeof(sregs->crs));
Christoffer Dallb4ef9d42017-12-04 21:35:29 +01003323
3324 vcpu_put(vcpu);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003325 return 0;
3326}
3327
3328int kvm_arch_vcpu_ioctl_get_sregs(struct kvm_vcpu *vcpu,
3329 struct kvm_sregs *sregs)
3330{
Christoffer Dallbcdec412017-12-04 21:35:28 +01003331 vcpu_load(vcpu);
3332
Christian Borntraeger59674c12012-01-11 11:20:33 +01003333 memcpy(&sregs->acrs, &vcpu->run->s.regs.acrs, sizeof(sregs->acrs));
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003334 memcpy(&sregs->crs, &vcpu->arch.sie_block->gcr, sizeof(sregs->crs));
Christoffer Dallbcdec412017-12-04 21:35:28 +01003335
3336 vcpu_put(vcpu);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003337 return 0;
3338}
3339
3340int kvm_arch_vcpu_ioctl_set_fpu(struct kvm_vcpu *vcpu, struct kvm_fpu *fpu)
3341{
Christoffer Dall6a96bc72017-12-04 21:35:35 +01003342 int ret = 0;
3343
3344 vcpu_load(vcpu);
3345
3346 if (test_fp_ctl(fpu->fpc)) {
3347 ret = -EINVAL;
3348 goto out;
3349 }
Christian Borntraegere1788bb2016-11-22 09:29:38 +01003350 vcpu->run->s.regs.fpc = fpu->fpc;
David Hildenbrand9abc2a02016-01-14 22:12:47 +01003351 if (MACHINE_HAS_VX)
David Hildenbranda7d4b8f2016-08-16 14:38:24 +02003352 convert_fp_to_vx((__vector128 *) vcpu->run->s.regs.vrs,
3353 (freg_t *) fpu->fprs);
David Hildenbrand9abc2a02016-01-14 22:12:47 +01003354 else
David Hildenbranda7d4b8f2016-08-16 14:38:24 +02003355 memcpy(vcpu->run->s.regs.fprs, &fpu->fprs, sizeof(fpu->fprs));
Christoffer Dall6a96bc72017-12-04 21:35:35 +01003356
3357out:
3358 vcpu_put(vcpu);
3359 return ret;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003360}
3361
3362int kvm_arch_vcpu_ioctl_get_fpu(struct kvm_vcpu *vcpu, struct kvm_fpu *fpu)
3363{
Christoffer Dall13931232017-12-04 21:35:34 +01003364 vcpu_load(vcpu);
3365
David Hildenbrand9abc2a02016-01-14 22:12:47 +01003366 /* make sure we have the latest values */
3367 save_fpu_regs();
3368 if (MACHINE_HAS_VX)
David Hildenbranda7d4b8f2016-08-16 14:38:24 +02003369 convert_vx_to_fp((freg_t *) fpu->fprs,
3370 (__vector128 *) vcpu->run->s.regs.vrs);
David Hildenbrand9abc2a02016-01-14 22:12:47 +01003371 else
David Hildenbranda7d4b8f2016-08-16 14:38:24 +02003372 memcpy(fpu->fprs, vcpu->run->s.regs.fprs, sizeof(fpu->fprs));
Christian Borntraegere1788bb2016-11-22 09:29:38 +01003373 fpu->fpc = vcpu->run->s.regs.fpc;
Christoffer Dall13931232017-12-04 21:35:34 +01003374
3375 vcpu_put(vcpu);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003376 return 0;
3377}
3378
3379static int kvm_arch_vcpu_ioctl_set_initial_psw(struct kvm_vcpu *vcpu, psw_t psw)
3380{
3381 int rc = 0;
3382
David Hildenbrand7a42fdc2014-05-05 16:26:19 +02003383 if (!is_vcpu_stopped(vcpu))
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003384 rc = -EBUSY;
Carsten Otted7b0b5e2009-11-19 14:21:16 +01003385 else {
3386 vcpu->run->psw_mask = psw.mask;
3387 vcpu->run->psw_addr = psw.addr;
3388 }
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003389 return rc;
3390}
3391
3392int kvm_arch_vcpu_ioctl_translate(struct kvm_vcpu *vcpu,
3393 struct kvm_translation *tr)
3394{
3395 return -EINVAL; /* not implemented yet */
3396}
3397
David Hildenbrand27291e22014-01-23 12:26:52 +01003398#define VALID_GUESTDBG_FLAGS (KVM_GUESTDBG_SINGLESTEP | \
3399 KVM_GUESTDBG_USE_HW_BP | \
3400 KVM_GUESTDBG_ENABLE)
3401
Jan Kiszkad0bfb942008-12-15 13:52:10 +01003402int kvm_arch_vcpu_ioctl_set_guest_debug(struct kvm_vcpu *vcpu,
3403 struct kvm_guest_debug *dbg)
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003404{
David Hildenbrand27291e22014-01-23 12:26:52 +01003405 int rc = 0;
3406
Christoffer Dall66b56562017-12-04 21:35:33 +01003407 vcpu_load(vcpu);
3408
David Hildenbrand27291e22014-01-23 12:26:52 +01003409 vcpu->guest_debug = 0;
3410 kvm_s390_clear_bp_data(vcpu);
3411
Christoffer Dall66b56562017-12-04 21:35:33 +01003412 if (dbg->control & ~VALID_GUESTDBG_FLAGS) {
3413 rc = -EINVAL;
3414 goto out;
3415 }
3416 if (!sclp.has_gpere) {
3417 rc = -EINVAL;
3418 goto out;
3419 }
David Hildenbrand27291e22014-01-23 12:26:52 +01003420
3421 if (dbg->control & KVM_GUESTDBG_ENABLE) {
3422 vcpu->guest_debug = dbg->control;
3423 /* enforce guest PER */
David Hildenbrandef8f4f42018-01-23 18:05:29 +01003424 kvm_s390_set_cpuflags(vcpu, CPUSTAT_P);
David Hildenbrand27291e22014-01-23 12:26:52 +01003425
3426 if (dbg->control & KVM_GUESTDBG_USE_HW_BP)
3427 rc = kvm_s390_import_bp_data(vcpu, dbg);
3428 } else {
David Hildenbrand9daecfc2018-01-23 18:05:30 +01003429 kvm_s390_clear_cpuflags(vcpu, CPUSTAT_P);
David Hildenbrand27291e22014-01-23 12:26:52 +01003430 vcpu->arch.guestdbg.last_bp = 0;
3431 }
3432
3433 if (rc) {
3434 vcpu->guest_debug = 0;
3435 kvm_s390_clear_bp_data(vcpu);
David Hildenbrand9daecfc2018-01-23 18:05:30 +01003436 kvm_s390_clear_cpuflags(vcpu, CPUSTAT_P);
David Hildenbrand27291e22014-01-23 12:26:52 +01003437 }
3438
Christoffer Dall66b56562017-12-04 21:35:33 +01003439out:
3440 vcpu_put(vcpu);
David Hildenbrand27291e22014-01-23 12:26:52 +01003441 return rc;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003442}
3443
Marcelo Tosatti62d9f0d2008-04-11 13:24:45 -03003444int kvm_arch_vcpu_ioctl_get_mpstate(struct kvm_vcpu *vcpu,
3445 struct kvm_mp_state *mp_state)
3446{
Christoffer Dallfd232562017-12-04 21:35:30 +01003447 int ret;
3448
3449 vcpu_load(vcpu);
3450
David Hildenbrand6352e4d2014-04-10 17:35:00 +02003451 /* CHECK_STOP and LOAD are not supported yet */
Christoffer Dallfd232562017-12-04 21:35:30 +01003452 ret = is_vcpu_stopped(vcpu) ? KVM_MP_STATE_STOPPED :
3453 KVM_MP_STATE_OPERATING;
3454
3455 vcpu_put(vcpu);
3456 return ret;
Marcelo Tosatti62d9f0d2008-04-11 13:24:45 -03003457}
3458
3459int kvm_arch_vcpu_ioctl_set_mpstate(struct kvm_vcpu *vcpu,
3460 struct kvm_mp_state *mp_state)
3461{
David Hildenbrand6352e4d2014-04-10 17:35:00 +02003462 int rc = 0;
3463
Christoffer Dalle83dff52017-12-04 21:35:31 +01003464 vcpu_load(vcpu);
3465
David Hildenbrand6352e4d2014-04-10 17:35:00 +02003466 /* user space knows about this interface - let it control the state */
3467 vcpu->kvm->arch.user_cpu_state_ctrl = 1;
3468
3469 switch (mp_state->mp_state) {
3470 case KVM_MP_STATE_STOPPED:
3471 kvm_s390_vcpu_stop(vcpu);
3472 break;
3473 case KVM_MP_STATE_OPERATING:
3474 kvm_s390_vcpu_start(vcpu);
3475 break;
3476 case KVM_MP_STATE_LOAD:
3477 case KVM_MP_STATE_CHECK_STOP:
3478 /* fall through - CHECK_STOP and LOAD are not supported yet */
3479 default:
3480 rc = -ENXIO;
3481 }
3482
Christoffer Dalle83dff52017-12-04 21:35:31 +01003483 vcpu_put(vcpu);
David Hildenbrand6352e4d2014-04-10 17:35:00 +02003484 return rc;
Marcelo Tosatti62d9f0d2008-04-11 13:24:45 -03003485}
3486
David Hildenbrand8ad35752014-03-14 11:00:21 +01003487static bool ibs_enabled(struct kvm_vcpu *vcpu)
3488{
David Hildenbrand8d5fb0d2018-01-23 18:05:31 +01003489 return kvm_s390_test_cpuflags(vcpu, CPUSTAT_IBS);
David Hildenbrand8ad35752014-03-14 11:00:21 +01003490}
3491
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02003492static int kvm_s390_handle_requests(struct kvm_vcpu *vcpu)
3493{
David Hildenbrand8ad35752014-03-14 11:00:21 +01003494retry:
Christian Borntraeger8e236542015-04-09 13:49:04 +02003495 kvm_s390_vcpu_request_handled(vcpu);
Radim Krčmář2fa6e1e2017-06-04 14:43:52 +02003496 if (!kvm_request_pending(vcpu))
Christian Borntraeger586b7cc2015-07-28 15:03:05 +02003497 return 0;
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02003498 /*
3499 * We use MMU_RELOAD just to re-arm the ipte notifier for the
Martin Schwidefskyb2d73b22016-03-08 11:54:42 +01003500 * guest prefix page. gmap_mprotect_notify will wait on the ptl lock.
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02003501 * This ensures that the ipte instruction for this request has
3502 * already finished. We might race against a second unmapper that
3503 * wants to set the blocking bit. Lets just retry the request loop.
3504 */
David Hildenbrand8ad35752014-03-14 11:00:21 +01003505 if (kvm_check_request(KVM_REQ_MMU_RELOAD, vcpu)) {
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02003506 int rc;
Martin Schwidefskyb2d73b22016-03-08 11:54:42 +01003507 rc = gmap_mprotect_notify(vcpu->arch.gmap,
3508 kvm_s390_get_prefix(vcpu),
3509 PAGE_SIZE * 2, PROT_WRITE);
Julius Niedworokaca411a2016-08-03 16:39:55 +02003510 if (rc) {
3511 kvm_make_request(KVM_REQ_MMU_RELOAD, vcpu);
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02003512 return rc;
Julius Niedworokaca411a2016-08-03 16:39:55 +02003513 }
David Hildenbrand8ad35752014-03-14 11:00:21 +01003514 goto retry;
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02003515 }
David Hildenbrand8ad35752014-03-14 11:00:21 +01003516
David Hildenbrandd3d692c2014-07-29 08:53:36 +02003517 if (kvm_check_request(KVM_REQ_TLB_FLUSH, vcpu)) {
3518 vcpu->arch.sie_block->ihcpu = 0xffff;
3519 goto retry;
3520 }
3521
David Hildenbrand8ad35752014-03-14 11:00:21 +01003522 if (kvm_check_request(KVM_REQ_ENABLE_IBS, vcpu)) {
3523 if (!ibs_enabled(vcpu)) {
3524 trace_kvm_s390_enable_disable_ibs(vcpu->vcpu_id, 1);
David Hildenbrandef8f4f42018-01-23 18:05:29 +01003525 kvm_s390_set_cpuflags(vcpu, CPUSTAT_IBS);
David Hildenbrand8ad35752014-03-14 11:00:21 +01003526 }
3527 goto retry;
3528 }
3529
3530 if (kvm_check_request(KVM_REQ_DISABLE_IBS, vcpu)) {
3531 if (ibs_enabled(vcpu)) {
3532 trace_kvm_s390_enable_disable_ibs(vcpu->vcpu_id, 0);
David Hildenbrand9daecfc2018-01-23 18:05:30 +01003533 kvm_s390_clear_cpuflags(vcpu, CPUSTAT_IBS);
David Hildenbrand8ad35752014-03-14 11:00:21 +01003534 }
3535 goto retry;
3536 }
3537
David Hildenbrand6502a342016-06-21 14:19:51 +02003538 if (kvm_check_request(KVM_REQ_ICPT_OPEREXC, vcpu)) {
3539 vcpu->arch.sie_block->ictl |= ICTL_OPEREXC;
3540 goto retry;
3541 }
3542
Claudio Imbrenda190df4a2016-08-04 17:54:42 +02003543 if (kvm_check_request(KVM_REQ_START_MIGRATION, vcpu)) {
3544 /*
Janosch Frankc9f0a2b2018-02-16 12:16:14 +01003545 * Disable CMM virtualization; we will emulate the ESSA
Claudio Imbrenda190df4a2016-08-04 17:54:42 +02003546 * instruction manually, in order to provide additional
3547 * functionalities needed for live migration.
3548 */
3549 vcpu->arch.sie_block->ecb2 &= ~ECB2_CMMA;
3550 goto retry;
3551 }
3552
3553 if (kvm_check_request(KVM_REQ_STOP_MIGRATION, vcpu)) {
3554 /*
Janosch Frankc9f0a2b2018-02-16 12:16:14 +01003555 * Re-enable CMM virtualization if CMMA is available and
3556 * CMM has been used.
Claudio Imbrenda190df4a2016-08-04 17:54:42 +02003557 */
3558 if ((vcpu->kvm->arch.use_cmma) &&
Janosch Frankc9f0a2b2018-02-16 12:16:14 +01003559 (vcpu->kvm->mm->context.uses_cmm))
Claudio Imbrenda190df4a2016-08-04 17:54:42 +02003560 vcpu->arch.sie_block->ecb2 |= ECB2_CMMA;
3561 goto retry;
3562 }
3563
David Hildenbrand0759d062014-05-13 16:54:32 +02003564 /* nothing to do, just clear the request */
Radim Krčmář72875d82017-04-26 22:32:19 +02003565 kvm_clear_request(KVM_REQ_UNHALT, vcpu);
David Hildenbrand3194cdb2018-09-25 19:16:17 -04003566 /* we left the vsie handler, nothing to do, just clear the request */
3567 kvm_clear_request(KVM_REQ_VSIE_RESTART, vcpu);
David Hildenbrand0759d062014-05-13 16:54:32 +02003568
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02003569 return 0;
3570}
3571
David Hildenbrand0e7def52018-02-07 12:46:43 +01003572void kvm_s390_set_tod_clock(struct kvm *kvm,
3573 const struct kvm_s390_vm_tod_clock *gtod)
Collin L. Walling8fa16962016-07-26 15:29:44 -04003574{
3575 struct kvm_vcpu *vcpu;
3576 struct kvm_s390_tod_clock_ext htod;
3577 int i;
3578
3579 mutex_lock(&kvm->lock);
3580 preempt_disable();
3581
3582 get_tod_clock_ext((char *)&htod);
3583
3584 kvm->arch.epoch = gtod->tod - htod.tod;
David Hildenbrand0e7def52018-02-07 12:46:43 +01003585 kvm->arch.epdx = 0;
3586 if (test_kvm_facility(kvm, 139)) {
3587 kvm->arch.epdx = gtod->epoch_idx - htod.epoch_idx;
3588 if (kvm->arch.epoch > gtod->tod)
3589 kvm->arch.epdx -= 1;
3590 }
Collin L. Walling8fa16962016-07-26 15:29:44 -04003591
3592 kvm_s390_vcpu_block_all(kvm);
3593 kvm_for_each_vcpu(i, vcpu, kvm) {
3594 vcpu->arch.sie_block->epoch = kvm->arch.epoch;
3595 vcpu->arch.sie_block->epdx = kvm->arch.epdx;
3596 }
3597
3598 kvm_s390_vcpu_unblock_all(kvm);
3599 preempt_enable();
3600 mutex_unlock(&kvm->lock);
3601}
3602
Thomas Huthfa576c52014-05-06 17:20:16 +02003603/**
3604 * kvm_arch_fault_in_page - fault-in guest page if necessary
3605 * @vcpu: The corresponding virtual cpu
3606 * @gpa: Guest physical address
3607 * @writable: Whether the page should be writable or not
3608 *
3609 * Make sure that a guest page has been faulted-in on the host.
3610 *
3611 * Return: Zero on success, negative error code otherwise.
3612 */
3613long kvm_arch_fault_in_page(struct kvm_vcpu *vcpu, gpa_t gpa, int writable)
Dominik Dingel24eb3a82013-06-17 16:25:18 +02003614{
Martin Schwidefsky527e30b2014-04-30 16:04:25 +02003615 return gmap_fault(vcpu->arch.gmap, gpa,
3616 writable ? FAULT_FLAG_WRITE : 0);
Dominik Dingel24eb3a82013-06-17 16:25:18 +02003617}
3618
Dominik Dingel3c038e62013-10-07 17:11:48 +02003619static void __kvm_inject_pfault_token(struct kvm_vcpu *vcpu, bool start_token,
3620 unsigned long token)
3621{
3622 struct kvm_s390_interrupt inti;
Jens Freimann383d0b02014-07-29 15:11:49 +02003623 struct kvm_s390_irq irq;
Dominik Dingel3c038e62013-10-07 17:11:48 +02003624
3625 if (start_token) {
Jens Freimann383d0b02014-07-29 15:11:49 +02003626 irq.u.ext.ext_params2 = token;
3627 irq.type = KVM_S390_INT_PFAULT_INIT;
3628 WARN_ON_ONCE(kvm_s390_inject_vcpu(vcpu, &irq));
Dominik Dingel3c038e62013-10-07 17:11:48 +02003629 } else {
3630 inti.type = KVM_S390_INT_PFAULT_DONE;
Jens Freimann383d0b02014-07-29 15:11:49 +02003631 inti.parm64 = token;
Dominik Dingel3c038e62013-10-07 17:11:48 +02003632 WARN_ON_ONCE(kvm_s390_inject_vm(vcpu->kvm, &inti));
3633 }
3634}
3635
3636void kvm_arch_async_page_not_present(struct kvm_vcpu *vcpu,
3637 struct kvm_async_pf *work)
3638{
3639 trace_kvm_s390_pfault_init(vcpu, work->arch.pfault_token);
3640 __kvm_inject_pfault_token(vcpu, true, work->arch.pfault_token);
3641}
3642
3643void kvm_arch_async_page_present(struct kvm_vcpu *vcpu,
3644 struct kvm_async_pf *work)
3645{
3646 trace_kvm_s390_pfault_done(vcpu, work->arch.pfault_token);
3647 __kvm_inject_pfault_token(vcpu, false, work->arch.pfault_token);
3648}
3649
3650void kvm_arch_async_page_ready(struct kvm_vcpu *vcpu,
3651 struct kvm_async_pf *work)
3652{
3653 /* s390 will always inject the page directly */
3654}
3655
3656bool kvm_arch_can_inject_async_page_present(struct kvm_vcpu *vcpu)
3657{
3658 /*
3659 * s390 will always inject the page directly,
3660 * but we still want check_async_completion to cleanup
3661 */
3662 return true;
3663}
3664
3665static int kvm_arch_setup_async_pf(struct kvm_vcpu *vcpu)
3666{
3667 hva_t hva;
3668 struct kvm_arch_async_pf arch;
3669 int rc;
3670
3671 if (vcpu->arch.pfault_token == KVM_S390_PFAULT_TOKEN_INVALID)
3672 return 0;
3673 if ((vcpu->arch.sie_block->gpsw.mask & vcpu->arch.pfault_select) !=
3674 vcpu->arch.pfault_compare)
3675 return 0;
3676 if (psw_extint_disabled(vcpu))
3677 return 0;
David Hildenbrand9a022062014-08-05 17:40:47 +02003678 if (kvm_s390_vcpu_has_irq(vcpu, 0))
Dominik Dingel3c038e62013-10-07 17:11:48 +02003679 return 0;
David Hildenbrandb9224cd2018-04-30 17:55:24 +02003680 if (!(vcpu->arch.sie_block->gcr[0] & CR0_SERVICE_SIGNAL_SUBMASK))
Dominik Dingel3c038e62013-10-07 17:11:48 +02003681 return 0;
3682 if (!vcpu->arch.gmap->pfault_enabled)
3683 return 0;
3684
Heiko Carstens81480cc2014-01-01 16:36:07 +01003685 hva = gfn_to_hva(vcpu->kvm, gpa_to_gfn(current->thread.gmap_addr));
3686 hva += current->thread.gmap_addr & ~PAGE_MASK;
3687 if (read_guest_real(vcpu, vcpu->arch.pfault_token, &arch.pfault_token, 8))
Dominik Dingel3c038e62013-10-07 17:11:48 +02003688 return 0;
3689
3690 rc = kvm_setup_async_pf(vcpu, current->thread.gmap_addr, hva, &arch);
3691 return rc;
3692}
3693
Thomas Huth3fb4c402013-09-12 10:33:43 +02003694static int vcpu_pre_run(struct kvm_vcpu *vcpu)
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003695{
Thomas Huth3fb4c402013-09-12 10:33:43 +02003696 int rc, cpuflags;
Carsten Ottee168bf82012-01-04 10:25:22 +01003697
Dominik Dingel3c038e62013-10-07 17:11:48 +02003698 /*
3699 * On s390 notifications for arriving pages will be delivered directly
3700 * to the guest but the house keeping for completed pfaults is
3701 * handled outside the worker.
3702 */
3703 kvm_check_async_pf_completion(vcpu);
3704
Christian Borntraeger7ec7c8c2015-12-02 14:27:03 +01003705 vcpu->arch.sie_block->gg14 = vcpu->run->s.regs.gprs[14];
3706 vcpu->arch.sie_block->gg15 = vcpu->run->s.regs.gprs[15];
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003707
3708 if (need_resched())
3709 schedule();
3710
Martin Schwidefskyd3a73ac2014-04-15 12:55:07 +02003711 if (test_cpu_flag(CIF_MCCK_PENDING))
Christian Borntraeger71cde582008-05-21 13:37:34 +02003712 s390_handle_mcck();
3713
Jens Freimann79395032014-04-17 10:10:30 +02003714 if (!kvm_is_ucontrol(vcpu->kvm)) {
3715 rc = kvm_s390_deliver_pending_interrupts(vcpu);
3716 if (rc)
3717 return rc;
3718 }
Carsten Otte0ff31862008-05-21 13:37:37 +02003719
Christian Borntraeger2c70fe42013-05-17 14:41:36 +02003720 rc = kvm_s390_handle_requests(vcpu);
3721 if (rc)
3722 return rc;
3723
David Hildenbrand27291e22014-01-23 12:26:52 +01003724 if (guestdbg_enabled(vcpu)) {
3725 kvm_s390_backup_guest_per_regs(vcpu);
3726 kvm_s390_patch_guest_per_regs(vcpu);
3727 }
3728
Michael Mueller9f30f622019-01-31 09:52:44 +01003729 clear_bit(vcpu->vcpu_id, vcpu->kvm->arch.gisa_int.kicked_mask);
3730
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003731 vcpu->arch.sie_block->icptcode = 0;
Thomas Huth3fb4c402013-09-12 10:33:43 +02003732 cpuflags = atomic_read(&vcpu->arch.sie_block->cpuflags);
3733 VCPU_EVENT(vcpu, 6, "entering sie flags %x", cpuflags);
3734 trace_kvm_s390_sie_enter(vcpu, cpuflags);
Dominik Dingel2b29a9f2013-07-26 15:04:00 +02003735
Thomas Huth3fb4c402013-09-12 10:33:43 +02003736 return 0;
3737}
3738
Thomas Huth492d8642015-02-10 16:11:01 +01003739static int vcpu_post_run_fault_in_sie(struct kvm_vcpu *vcpu)
3740{
David Hildenbrand56317922016-01-12 17:37:58 +01003741 struct kvm_s390_pgm_info pgm_info = {
3742 .code = PGM_ADDRESSING,
3743 };
3744 u8 opcode, ilen;
Thomas Huth492d8642015-02-10 16:11:01 +01003745 int rc;
3746
3747 VCPU_EVENT(vcpu, 3, "%s", "fault in sie instruction");
3748 trace_kvm_s390_sie_fault(vcpu);
3749
3750 /*
3751 * We want to inject an addressing exception, which is defined as a
3752 * suppressing or terminating exception. However, since we came here
3753 * by a DAT access exception, the PSW still points to the faulting
3754 * instruction since DAT exceptions are nullifying. So we've got
3755 * to look up the current opcode to get the length of the instruction
3756 * to be able to forward the PSW.
3757 */
David Hildenbrand3fa8cad72016-05-24 12:00:49 +02003758 rc = read_guest_instr(vcpu, vcpu->arch.sie_block->gpsw.addr, &opcode, 1);
David Hildenbrand56317922016-01-12 17:37:58 +01003759 ilen = insn_length(opcode);
David Hildenbrand9b0d7212016-01-12 17:40:54 +01003760 if (rc < 0) {
3761 return rc;
3762 } else if (rc) {
3763 /* Instruction-Fetching Exceptions - we can't detect the ilen.
3764 * Forward by arbitrary ilc, injection will take care of
3765 * nullification if necessary.
3766 */
3767 pgm_info = vcpu->arch.pgm;
3768 ilen = 4;
3769 }
David Hildenbrand56317922016-01-12 17:37:58 +01003770 pgm_info.flags = ilen | KVM_S390_PGM_FLAGS_ILC_VALID;
3771 kvm_s390_forward_psw(vcpu, ilen);
3772 return kvm_s390_inject_prog_irq(vcpu, &pgm_info);
Thomas Huth492d8642015-02-10 16:11:01 +01003773}
3774
Thomas Huth3fb4c402013-09-12 10:33:43 +02003775static int vcpu_post_run(struct kvm_vcpu *vcpu, int exit_reason)
3776{
QingFeng Hao4d62fcc2017-06-07 12:03:05 +02003777 struct mcck_volatile_info *mcck_info;
3778 struct sie_page *sie_page;
3779
Dominik Dingel2b29a9f2013-07-26 15:04:00 +02003780 VCPU_EVENT(vcpu, 6, "exit sie icptcode %d",
3781 vcpu->arch.sie_block->icptcode);
3782 trace_kvm_s390_sie_exit(vcpu, vcpu->arch.sie_block->icptcode);
3783
David Hildenbrand27291e22014-01-23 12:26:52 +01003784 if (guestdbg_enabled(vcpu))
3785 kvm_s390_restore_guest_per_regs(vcpu);
3786
Christian Borntraeger7ec7c8c2015-12-02 14:27:03 +01003787 vcpu->run->s.regs.gprs[14] = vcpu->arch.sie_block->gg14;
3788 vcpu->run->s.regs.gprs[15] = vcpu->arch.sie_block->gg15;
David Hildenbrand71f116b2015-10-19 16:24:28 +02003789
QingFeng Hao4d62fcc2017-06-07 12:03:05 +02003790 if (exit_reason == -EINTR) {
3791 VCPU_EVENT(vcpu, 3, "%s", "machine check");
3792 sie_page = container_of(vcpu->arch.sie_block,
3793 struct sie_page, sie_block);
3794 mcck_info = &sie_page->mcck_info;
3795 kvm_s390_reinject_machine_check(vcpu, mcck_info);
3796 return 0;
3797 }
3798
David Hildenbrand71f116b2015-10-19 16:24:28 +02003799 if (vcpu->arch.sie_block->icptcode > 0) {
3800 int rc = kvm_handle_sie_intercept(vcpu);
3801
3802 if (rc != -EOPNOTSUPP)
3803 return rc;
3804 vcpu->run->exit_reason = KVM_EXIT_S390_SIEIC;
3805 vcpu->run->s390_sieic.icptcode = vcpu->arch.sie_block->icptcode;
3806 vcpu->run->s390_sieic.ipa = vcpu->arch.sie_block->ipa;
3807 vcpu->run->s390_sieic.ipb = vcpu->arch.sie_block->ipb;
3808 return -EREMOTE;
3809 } else if (exit_reason != -EFAULT) {
3810 vcpu->stat.exit_null++;
3811 return 0;
Thomas Huth210b16072013-09-19 16:26:18 +02003812 } else if (kvm_is_ucontrol(vcpu->kvm)) {
3813 vcpu->run->exit_reason = KVM_EXIT_S390_UCONTROL;
3814 vcpu->run->s390_ucontrol.trans_exc_code =
3815 current->thread.gmap_addr;
3816 vcpu->run->s390_ucontrol.pgm_code = 0x10;
David Hildenbrand71f116b2015-10-19 16:24:28 +02003817 return -EREMOTE;
Dominik Dingel24eb3a82013-06-17 16:25:18 +02003818 } else if (current->thread.gmap_pfault) {
Dominik Dingel3c038e62013-10-07 17:11:48 +02003819 trace_kvm_s390_major_guest_pfault(vcpu);
Dominik Dingel24eb3a82013-06-17 16:25:18 +02003820 current->thread.gmap_pfault = 0;
David Hildenbrand71f116b2015-10-19 16:24:28 +02003821 if (kvm_arch_setup_async_pf(vcpu))
3822 return 0;
3823 return kvm_arch_fault_in_page(vcpu, current->thread.gmap_addr, 1);
Dominik Dingel24eb3a82013-06-17 16:25:18 +02003824 }
David Hildenbrand71f116b2015-10-19 16:24:28 +02003825 return vcpu_post_run_fault_in_sie(vcpu);
Thomas Huth3fb4c402013-09-12 10:33:43 +02003826}
3827
3828static int __vcpu_run(struct kvm_vcpu *vcpu)
3829{
3830 int rc, exit_reason;
3831
Thomas Huth800c1062013-09-12 10:33:45 +02003832 /*
3833 * We try to hold kvm->srcu during most of vcpu_run (except when run-
3834 * ning the guest), so that memslots (and other stuff) are protected
3835 */
3836 vcpu->srcu_idx = srcu_read_lock(&vcpu->kvm->srcu);
3837
Thomas Hutha76ccff2013-09-12 10:33:44 +02003838 do {
3839 rc = vcpu_pre_run(vcpu);
3840 if (rc)
3841 break;
Thomas Huth3fb4c402013-09-12 10:33:43 +02003842
Thomas Huth800c1062013-09-12 10:33:45 +02003843 srcu_read_unlock(&vcpu->kvm->srcu, vcpu->srcu_idx);
Thomas Hutha76ccff2013-09-12 10:33:44 +02003844 /*
3845 * As PF_VCPU will be used in fault handler, between
3846 * guest_enter and guest_exit should be no uaccess.
3847 */
Christian Borntraeger0097d122015-04-30 13:43:30 +02003848 local_irq_disable();
Paolo Bonzini6edaa532016-06-15 15:18:26 +02003849 guest_enter_irqoff();
David Hildenbranddb0758b2016-02-15 09:42:25 +01003850 __disable_cpu_timer_accounting(vcpu);
Christian Borntraeger0097d122015-04-30 13:43:30 +02003851 local_irq_enable();
Thomas Hutha76ccff2013-09-12 10:33:44 +02003852 exit_reason = sie64a(vcpu->arch.sie_block,
3853 vcpu->run->s.regs.gprs);
Christian Borntraeger0097d122015-04-30 13:43:30 +02003854 local_irq_disable();
David Hildenbranddb0758b2016-02-15 09:42:25 +01003855 __enable_cpu_timer_accounting(vcpu);
Paolo Bonzini6edaa532016-06-15 15:18:26 +02003856 guest_exit_irqoff();
Christian Borntraeger0097d122015-04-30 13:43:30 +02003857 local_irq_enable();
Thomas Huth800c1062013-09-12 10:33:45 +02003858 vcpu->srcu_idx = srcu_read_lock(&vcpu->kvm->srcu);
Thomas Huth3fb4c402013-09-12 10:33:43 +02003859
Thomas Hutha76ccff2013-09-12 10:33:44 +02003860 rc = vcpu_post_run(vcpu, exit_reason);
David Hildenbrand27291e22014-01-23 12:26:52 +01003861 } while (!signal_pending(current) && !guestdbg_exit_pending(vcpu) && !rc);
Thomas Huth3fb4c402013-09-12 10:33:43 +02003862
Thomas Huth800c1062013-09-12 10:33:45 +02003863 srcu_read_unlock(&vcpu->kvm->srcu, vcpu->srcu_idx);
Carsten Ottee168bf82012-01-04 10:25:22 +01003864 return rc;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003865}
3866
David Hildenbrandb028ee32014-07-17 10:47:43 +02003867static void sync_regs(struct kvm_vcpu *vcpu, struct kvm_run *kvm_run)
3868{
Christian Borntraeger4d5f2c02017-02-09 17:15:41 +01003869 struct runtime_instr_cb *riccb;
Fan Zhang4e0b1ab2016-11-29 07:17:55 +01003870 struct gs_cb *gscb;
Christian Borntraeger4d5f2c02017-02-09 17:15:41 +01003871
3872 riccb = (struct runtime_instr_cb *) &kvm_run->s.regs.riccb;
Fan Zhang4e0b1ab2016-11-29 07:17:55 +01003873 gscb = (struct gs_cb *) &kvm_run->s.regs.gscb;
David Hildenbrandb028ee32014-07-17 10:47:43 +02003874 vcpu->arch.sie_block->gpsw.mask = kvm_run->psw_mask;
3875 vcpu->arch.sie_block->gpsw.addr = kvm_run->psw_addr;
3876 if (kvm_run->kvm_dirty_regs & KVM_SYNC_PREFIX)
3877 kvm_s390_set_prefix(vcpu, kvm_run->s.regs.prefix);
3878 if (kvm_run->kvm_dirty_regs & KVM_SYNC_CRS) {
3879 memcpy(&vcpu->arch.sie_block->gcr, &kvm_run->s.regs.crs, 128);
David Hildenbrandd3d692c2014-07-29 08:53:36 +02003880 /* some control register changes require a tlb flush */
3881 kvm_make_request(KVM_REQ_TLB_FLUSH, vcpu);
David Hildenbrandb028ee32014-07-17 10:47:43 +02003882 }
3883 if (kvm_run->kvm_dirty_regs & KVM_SYNC_ARCH0) {
David Hildenbrand4287f242016-02-15 09:40:12 +01003884 kvm_s390_set_cpu_timer(vcpu, kvm_run->s.regs.cputm);
David Hildenbrandb028ee32014-07-17 10:47:43 +02003885 vcpu->arch.sie_block->ckc = kvm_run->s.regs.ckc;
3886 vcpu->arch.sie_block->todpr = kvm_run->s.regs.todpr;
3887 vcpu->arch.sie_block->pp = kvm_run->s.regs.pp;
3888 vcpu->arch.sie_block->gbea = kvm_run->s.regs.gbea;
3889 }
3890 if (kvm_run->kvm_dirty_regs & KVM_SYNC_PFAULT) {
3891 vcpu->arch.pfault_token = kvm_run->s.regs.pft;
3892 vcpu->arch.pfault_select = kvm_run->s.regs.pfs;
3893 vcpu->arch.pfault_compare = kvm_run->s.regs.pfc;
David Hildenbrand9fbd8082014-10-09 15:01:38 +02003894 if (vcpu->arch.pfault_token == KVM_S390_PFAULT_TOKEN_INVALID)
3895 kvm_clear_async_pf_completion_queue(vcpu);
David Hildenbrandb028ee32014-07-17 10:47:43 +02003896 }
Fan Zhang80cd8762016-08-15 04:53:22 +02003897 /*
3898 * If userspace sets the riccb (e.g. after migration) to a valid state,
3899 * we should enable RI here instead of doing the lazy enablement.
3900 */
3901 if ((kvm_run->kvm_dirty_regs & KVM_SYNC_RICCB) &&
Christian Borntraeger4d5f2c02017-02-09 17:15:41 +01003902 test_kvm_facility(vcpu->kvm, 64) &&
Alice Frosibb59c2d2017-09-14 12:35:45 +02003903 riccb->v &&
David Hildenbrand0c9d8682017-03-13 11:48:28 +01003904 !(vcpu->arch.sie_block->ecb3 & ECB3_RI)) {
Christian Borntraeger4d5f2c02017-02-09 17:15:41 +01003905 VCPU_EVENT(vcpu, 3, "%s", "ENABLE: RI (sync_regs)");
David Hildenbrand0c9d8682017-03-13 11:48:28 +01003906 vcpu->arch.sie_block->ecb3 |= ECB3_RI;
Fan Zhang80cd8762016-08-15 04:53:22 +02003907 }
Fan Zhang4e0b1ab2016-11-29 07:17:55 +01003908 /*
3909 * If userspace sets the gscb (e.g. after migration) to non-zero,
3910 * we should enable GS here instead of doing the lazy enablement.
3911 */
3912 if ((kvm_run->kvm_dirty_regs & KVM_SYNC_GSCB) &&
3913 test_kvm_facility(vcpu->kvm, 133) &&
3914 gscb->gssm &&
3915 !vcpu->arch.gs_enabled) {
3916 VCPU_EVENT(vcpu, 3, "%s", "ENABLE: GS (sync_regs)");
3917 vcpu->arch.sie_block->ecb |= ECB_GS;
3918 vcpu->arch.sie_block->ecd |= ECD_HOSTREGMGMT;
3919 vcpu->arch.gs_enabled = 1;
Fan Zhang80cd8762016-08-15 04:53:22 +02003920 }
Christian Borntraeger35b3fde2018-01-17 14:44:34 +01003921 if ((kvm_run->kvm_dirty_regs & KVM_SYNC_BPBC) &&
3922 test_kvm_facility(vcpu->kvm, 82)) {
3923 vcpu->arch.sie_block->fpf &= ~FPF_BPBC;
3924 vcpu->arch.sie_block->fpf |= kvm_run->s.regs.bpbc ? FPF_BPBC : 0;
3925 }
Christian Borntraeger31d8b8d2016-11-10 14:22:02 +01003926 save_access_regs(vcpu->arch.host_acrs);
3927 restore_access_regs(vcpu->run->s.regs.acrs);
Christian Borntraegere1788bb2016-11-22 09:29:38 +01003928 /* save host (userspace) fprs/vrs */
3929 save_fpu_regs();
3930 vcpu->arch.host_fpregs.fpc = current->thread.fpu.fpc;
3931 vcpu->arch.host_fpregs.regs = current->thread.fpu.regs;
3932 if (MACHINE_HAS_VX)
3933 current->thread.fpu.regs = vcpu->run->s.regs.vrs;
3934 else
3935 current->thread.fpu.regs = vcpu->run->s.regs.fprs;
3936 current->thread.fpu.fpc = vcpu->run->s.regs.fpc;
3937 if (test_fp_ctl(current->thread.fpu.fpc))
3938 /* User space provided an invalid FPC, let's clear it */
3939 current->thread.fpu.fpc = 0;
Fan Zhang4e0b1ab2016-11-29 07:17:55 +01003940 if (MACHINE_HAS_GS) {
3941 preempt_disable();
3942 __ctl_set_bit(2, 4);
3943 if (current->thread.gs_cb) {
3944 vcpu->arch.host_gscb = current->thread.gs_cb;
3945 save_gs_cb(vcpu->arch.host_gscb);
3946 }
3947 if (vcpu->arch.gs_enabled) {
3948 current->thread.gs_cb = (struct gs_cb *)
3949 &vcpu->run->s.regs.gscb;
3950 restore_gs_cb(current->thread.gs_cb);
3951 }
3952 preempt_enable();
3953 }
Christian Borntraegera3da7b42018-03-08 16:08:49 +00003954 /* SIE will load etoken directly from SDNX and therefore kvm_run */
Fan Zhang80cd8762016-08-15 04:53:22 +02003955
David Hildenbrandb028ee32014-07-17 10:47:43 +02003956 kvm_run->kvm_dirty_regs = 0;
3957}
3958
3959static void store_regs(struct kvm_vcpu *vcpu, struct kvm_run *kvm_run)
3960{
3961 kvm_run->psw_mask = vcpu->arch.sie_block->gpsw.mask;
3962 kvm_run->psw_addr = vcpu->arch.sie_block->gpsw.addr;
3963 kvm_run->s.regs.prefix = kvm_s390_get_prefix(vcpu);
3964 memcpy(&kvm_run->s.regs.crs, &vcpu->arch.sie_block->gcr, 128);
David Hildenbrand4287f242016-02-15 09:40:12 +01003965 kvm_run->s.regs.cputm = kvm_s390_get_cpu_timer(vcpu);
David Hildenbrandb028ee32014-07-17 10:47:43 +02003966 kvm_run->s.regs.ckc = vcpu->arch.sie_block->ckc;
3967 kvm_run->s.regs.todpr = vcpu->arch.sie_block->todpr;
3968 kvm_run->s.regs.pp = vcpu->arch.sie_block->pp;
3969 kvm_run->s.regs.gbea = vcpu->arch.sie_block->gbea;
3970 kvm_run->s.regs.pft = vcpu->arch.pfault_token;
3971 kvm_run->s.regs.pfs = vcpu->arch.pfault_select;
3972 kvm_run->s.regs.pfc = vcpu->arch.pfault_compare;
Christian Borntraeger35b3fde2018-01-17 14:44:34 +01003973 kvm_run->s.regs.bpbc = (vcpu->arch.sie_block->fpf & FPF_BPBC) == FPF_BPBC;
Christian Borntraeger31d8b8d2016-11-10 14:22:02 +01003974 save_access_regs(vcpu->run->s.regs.acrs);
3975 restore_access_regs(vcpu->arch.host_acrs);
Christian Borntraegere1788bb2016-11-22 09:29:38 +01003976 /* Save guest register state */
3977 save_fpu_regs();
3978 vcpu->run->s.regs.fpc = current->thread.fpu.fpc;
3979 /* Restore will be done lazily at return */
3980 current->thread.fpu.fpc = vcpu->arch.host_fpregs.fpc;
3981 current->thread.fpu.regs = vcpu->arch.host_fpregs.regs;
Fan Zhang4e0b1ab2016-11-29 07:17:55 +01003982 if (MACHINE_HAS_GS) {
3983 __ctl_set_bit(2, 4);
3984 if (vcpu->arch.gs_enabled)
3985 save_gs_cb(current->thread.gs_cb);
3986 preempt_disable();
3987 current->thread.gs_cb = vcpu->arch.host_gscb;
3988 restore_gs_cb(vcpu->arch.host_gscb);
3989 preempt_enable();
3990 if (!vcpu->arch.host_gscb)
3991 __ctl_clear_bit(2, 4);
3992 vcpu->arch.host_gscb = NULL;
3993 }
Christian Borntraegera3da7b42018-03-08 16:08:49 +00003994 /* SIE will save etoken directly into SDNX and therefore kvm_run */
David Hildenbrandb028ee32014-07-17 10:47:43 +02003995}
3996
Heiko Carstensb0c632d2008-03-25 18:47:20 +01003997int kvm_arch_vcpu_ioctl_run(struct kvm_vcpu *vcpu, struct kvm_run *kvm_run)
3998{
Christian Borntraeger8f2abe62008-03-25 18:47:23 +01003999 int rc;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004000
Paolo Bonzini460df4c2017-02-08 11:50:15 +01004001 if (kvm_run->immediate_exit)
4002 return -EINTR;
4003
Thomas Huth200824f2019-09-04 10:51:59 +02004004 if (kvm_run->kvm_valid_regs & ~KVM_SYNC_S390_VALID_FIELDS ||
4005 kvm_run->kvm_dirty_regs & ~KVM_SYNC_S390_VALID_FIELDS)
4006 return -EINVAL;
4007
Christoffer Dallaccb7572017-12-04 21:35:25 +01004008 vcpu_load(vcpu);
4009
David Hildenbrand27291e22014-01-23 12:26:52 +01004010 if (guestdbg_exit_pending(vcpu)) {
4011 kvm_s390_prepare_debug_exit(vcpu);
Christoffer Dallaccb7572017-12-04 21:35:25 +01004012 rc = 0;
4013 goto out;
David Hildenbrand27291e22014-01-23 12:26:52 +01004014 }
4015
Jan H. Schönherr20b70352017-11-24 22:39:01 +01004016 kvm_sigset_activate(vcpu);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004017
David Hildenbrand6352e4d2014-04-10 17:35:00 +02004018 if (!kvm_s390_user_cpu_state_ctrl(vcpu->kvm)) {
4019 kvm_s390_vcpu_start(vcpu);
4020 } else if (is_vcpu_stopped(vcpu)) {
David Hildenbrandea2cdd22015-05-20 13:24:02 +02004021 pr_err_ratelimited("can't run stopped vcpu %d\n",
David Hildenbrand6352e4d2014-04-10 17:35:00 +02004022 vcpu->vcpu_id);
Christoffer Dallaccb7572017-12-04 21:35:25 +01004023 rc = -EINVAL;
4024 goto out;
David Hildenbrand6352e4d2014-04-10 17:35:00 +02004025 }
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004026
David Hildenbrandb028ee32014-07-17 10:47:43 +02004027 sync_regs(vcpu, kvm_run);
David Hildenbranddb0758b2016-02-15 09:42:25 +01004028 enable_cpu_timer_accounting(vcpu);
Carsten Otted7b0b5e2009-11-19 14:21:16 +01004029
Heiko Carstensdab4079d2009-06-12 10:26:32 +02004030 might_fault();
Thomas Hutha76ccff2013-09-12 10:33:44 +02004031 rc = __vcpu_run(vcpu);
Christian Ehrhardt9ace9032009-05-20 15:34:55 +02004032
Christian Ehrhardtb1d16c42009-05-20 15:34:56 +02004033 if (signal_pending(current) && !rc) {
4034 kvm_run->exit_reason = KVM_EXIT_INTR;
Christian Borntraeger8f2abe62008-03-25 18:47:23 +01004035 rc = -EINTR;
Christian Ehrhardtb1d16c42009-05-20 15:34:56 +02004036 }
Christian Borntraeger8f2abe62008-03-25 18:47:23 +01004037
David Hildenbrand27291e22014-01-23 12:26:52 +01004038 if (guestdbg_exit_pending(vcpu) && !rc) {
4039 kvm_s390_prepare_debug_exit(vcpu);
4040 rc = 0;
4041 }
4042
Christian Borntraeger8f2abe62008-03-25 18:47:23 +01004043 if (rc == -EREMOTE) {
David Hildenbrand71f116b2015-10-19 16:24:28 +02004044 /* userspace support is needed, kvm_run has been prepared */
Christian Borntraeger8f2abe62008-03-25 18:47:23 +01004045 rc = 0;
4046 }
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004047
David Hildenbranddb0758b2016-02-15 09:42:25 +01004048 disable_cpu_timer_accounting(vcpu);
David Hildenbrandb028ee32014-07-17 10:47:43 +02004049 store_regs(vcpu, kvm_run);
Carsten Otted7b0b5e2009-11-19 14:21:16 +01004050
Jan H. Schönherr20b70352017-11-24 22:39:01 +01004051 kvm_sigset_deactivate(vcpu);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004052
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004053 vcpu->stat.exit_userspace++;
Christoffer Dallaccb7572017-12-04 21:35:25 +01004054out:
4055 vcpu_put(vcpu);
Heiko Carstens7e8e6ab2008-04-04 15:12:35 +02004056 return rc;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004057}
4058
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004059/*
4060 * store status at address
4061 * we use have two special cases:
4062 * KVM_S390_STORE_STATUS_NOADDR: -> 0x1200 on 64 bit
4063 * KVM_S390_STORE_STATUS_PREFIXED: -> prefix
4064 */
Heiko Carstensd0bce602014-01-01 16:45:58 +01004065int kvm_s390_store_status_unloaded(struct kvm_vcpu *vcpu, unsigned long gpa)
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004066{
Carsten Otte092670c2011-07-24 10:48:22 +02004067 unsigned char archmode = 1;
David Hildenbrand9abc2a02016-01-14 22:12:47 +01004068 freg_t fprs[NUM_FPRS];
Michael Muellerfda902c2014-05-13 16:58:30 +02004069 unsigned int px;
David Hildenbrand4287f242016-02-15 09:40:12 +01004070 u64 clkcomp, cputm;
Heiko Carstensd0bce602014-01-01 16:45:58 +01004071 int rc;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004072
Martin Schwidefskyd9a3a092015-10-23 09:02:32 +02004073 px = kvm_s390_get_prefix(vcpu);
Heiko Carstensd0bce602014-01-01 16:45:58 +01004074 if (gpa == KVM_S390_STORE_STATUS_NOADDR) {
4075 if (write_guest_abs(vcpu, 163, &archmode, 1))
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004076 return -EFAULT;
Martin Schwidefskyd9a3a092015-10-23 09:02:32 +02004077 gpa = 0;
Heiko Carstensd0bce602014-01-01 16:45:58 +01004078 } else if (gpa == KVM_S390_STORE_STATUS_PREFIXED) {
4079 if (write_guest_real(vcpu, 163, &archmode, 1))
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004080 return -EFAULT;
Martin Schwidefskyd9a3a092015-10-23 09:02:32 +02004081 gpa = px;
4082 } else
4083 gpa -= __LC_FPREGS_SAVE_AREA;
David Hildenbrand9abc2a02016-01-14 22:12:47 +01004084
4085 /* manually convert vector registers if necessary */
4086 if (MACHINE_HAS_VX) {
David Hildenbrand9522b372016-03-08 12:24:30 +01004087 convert_vx_to_fp(fprs, (__vector128 *) vcpu->run->s.regs.vrs);
David Hildenbrand9abc2a02016-01-14 22:12:47 +01004088 rc = write_guest_abs(vcpu, gpa + __LC_FPREGS_SAVE_AREA,
4089 fprs, 128);
4090 } else {
4091 rc = write_guest_abs(vcpu, gpa + __LC_FPREGS_SAVE_AREA,
David Hildenbrand6fd8e672016-01-18 14:46:34 +01004092 vcpu->run->s.regs.fprs, 128);
David Hildenbrand9abc2a02016-01-14 22:12:47 +01004093 }
Martin Schwidefskyd9a3a092015-10-23 09:02:32 +02004094 rc |= write_guest_abs(vcpu, gpa + __LC_GPREGS_SAVE_AREA,
Heiko Carstensd0bce602014-01-01 16:45:58 +01004095 vcpu->run->s.regs.gprs, 128);
Martin Schwidefskyd9a3a092015-10-23 09:02:32 +02004096 rc |= write_guest_abs(vcpu, gpa + __LC_PSW_SAVE_AREA,
Heiko Carstensd0bce602014-01-01 16:45:58 +01004097 &vcpu->arch.sie_block->gpsw, 16);
Martin Schwidefskyd9a3a092015-10-23 09:02:32 +02004098 rc |= write_guest_abs(vcpu, gpa + __LC_PREFIX_SAVE_AREA,
Michael Muellerfda902c2014-05-13 16:58:30 +02004099 &px, 4);
Martin Schwidefskyd9a3a092015-10-23 09:02:32 +02004100 rc |= write_guest_abs(vcpu, gpa + __LC_FP_CREG_SAVE_AREA,
David Hildenbrand9abc2a02016-01-14 22:12:47 +01004101 &vcpu->run->s.regs.fpc, 4);
Martin Schwidefskyd9a3a092015-10-23 09:02:32 +02004102 rc |= write_guest_abs(vcpu, gpa + __LC_TOD_PROGREG_SAVE_AREA,
Heiko Carstensd0bce602014-01-01 16:45:58 +01004103 &vcpu->arch.sie_block->todpr, 4);
David Hildenbrand4287f242016-02-15 09:40:12 +01004104 cputm = kvm_s390_get_cpu_timer(vcpu);
Martin Schwidefskyd9a3a092015-10-23 09:02:32 +02004105 rc |= write_guest_abs(vcpu, gpa + __LC_CPU_TIMER_SAVE_AREA,
David Hildenbrand4287f242016-02-15 09:40:12 +01004106 &cputm, 8);
Thomas Huth178bd782013-11-13 20:28:18 +01004107 clkcomp = vcpu->arch.sie_block->ckc >> 8;
Martin Schwidefskyd9a3a092015-10-23 09:02:32 +02004108 rc |= write_guest_abs(vcpu, gpa + __LC_CLOCK_COMP_SAVE_AREA,
Heiko Carstensd0bce602014-01-01 16:45:58 +01004109 &clkcomp, 8);
Martin Schwidefskyd9a3a092015-10-23 09:02:32 +02004110 rc |= write_guest_abs(vcpu, gpa + __LC_AREGS_SAVE_AREA,
Heiko Carstensd0bce602014-01-01 16:45:58 +01004111 &vcpu->run->s.regs.acrs, 64);
Martin Schwidefskyd9a3a092015-10-23 09:02:32 +02004112 rc |= write_guest_abs(vcpu, gpa + __LC_CREGS_SAVE_AREA,
Heiko Carstensd0bce602014-01-01 16:45:58 +01004113 &vcpu->arch.sie_block->gcr, 128);
4114 return rc ? -EFAULT : 0;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004115}
4116
Thomas Huthe8798922013-11-06 15:46:33 +01004117int kvm_s390_vcpu_store_status(struct kvm_vcpu *vcpu, unsigned long addr)
4118{
4119 /*
4120 * The guest FPRS and ACRS are in the host FPRS/ACRS due to the lazy
Christian Borntraeger31d8b8d2016-11-10 14:22:02 +01004121 * switch in the run ioctl. Let's update our copies before we save
Thomas Huthe8798922013-11-06 15:46:33 +01004122 * it into the save area
4123 */
Hendrik Bruecknerd0164ee2015-06-29 16:43:06 +02004124 save_fpu_regs();
David Hildenbrand9abc2a02016-01-14 22:12:47 +01004125 vcpu->run->s.regs.fpc = current->thread.fpu.fpc;
Thomas Huthe8798922013-11-06 15:46:33 +01004126 save_access_regs(vcpu->run->s.regs.acrs);
4127
4128 return kvm_s390_store_status_unloaded(vcpu, addr);
4129}
4130
David Hildenbrand8ad35752014-03-14 11:00:21 +01004131static void __disable_ibs_on_vcpu(struct kvm_vcpu *vcpu)
4132{
4133 kvm_check_request(KVM_REQ_ENABLE_IBS, vcpu);
Christian Borntraeger8e236542015-04-09 13:49:04 +02004134 kvm_s390_sync_request(KVM_REQ_DISABLE_IBS, vcpu);
David Hildenbrand8ad35752014-03-14 11:00:21 +01004135}
4136
4137static void __disable_ibs_on_all_vcpus(struct kvm *kvm)
4138{
4139 unsigned int i;
4140 struct kvm_vcpu *vcpu;
4141
4142 kvm_for_each_vcpu(i, vcpu, kvm) {
4143 __disable_ibs_on_vcpu(vcpu);
4144 }
4145}
4146
4147static void __enable_ibs_on_vcpu(struct kvm_vcpu *vcpu)
4148{
David Hildenbrand09a400e2016-04-04 15:57:08 +02004149 if (!sclp.has_ibs)
4150 return;
David Hildenbrand8ad35752014-03-14 11:00:21 +01004151 kvm_check_request(KVM_REQ_DISABLE_IBS, vcpu);
Christian Borntraeger8e236542015-04-09 13:49:04 +02004152 kvm_s390_sync_request(KVM_REQ_ENABLE_IBS, vcpu);
David Hildenbrand8ad35752014-03-14 11:00:21 +01004153}
4154
David Hildenbrand6852d7b2014-03-14 10:59:29 +01004155void kvm_s390_vcpu_start(struct kvm_vcpu *vcpu)
4156{
David Hildenbrand8ad35752014-03-14 11:00:21 +01004157 int i, online_vcpus, started_vcpus = 0;
4158
4159 if (!is_vcpu_stopped(vcpu))
4160 return;
4161
David Hildenbrand6852d7b2014-03-14 10:59:29 +01004162 trace_kvm_s390_vcpu_start_stop(vcpu->vcpu_id, 1);
David Hildenbrand8ad35752014-03-14 11:00:21 +01004163 /* Only one cpu at a time may enter/leave the STOPPED state. */
David Hildenbrand433b9ee2014-05-06 16:11:14 +02004164 spin_lock(&vcpu->kvm->arch.start_stop_lock);
David Hildenbrand8ad35752014-03-14 11:00:21 +01004165 online_vcpus = atomic_read(&vcpu->kvm->online_vcpus);
4166
4167 for (i = 0; i < online_vcpus; i++) {
4168 if (!is_vcpu_stopped(vcpu->kvm->vcpus[i]))
4169 started_vcpus++;
4170 }
4171
4172 if (started_vcpus == 0) {
4173 /* we're the only active VCPU -> speed it up */
4174 __enable_ibs_on_vcpu(vcpu);
4175 } else if (started_vcpus == 1) {
4176 /*
4177 * As we are starting a second VCPU, we have to disable
4178 * the IBS facility on all VCPUs to remove potentially
4179 * oustanding ENABLE requests.
4180 */
4181 __disable_ibs_on_all_vcpus(vcpu->kvm);
4182 }
4183
David Hildenbrand9daecfc2018-01-23 18:05:30 +01004184 kvm_s390_clear_cpuflags(vcpu, CPUSTAT_STOPPED);
David Hildenbrand8ad35752014-03-14 11:00:21 +01004185 /*
4186 * Another VCPU might have used IBS while we were offline.
4187 * Let's play safe and flush the VCPU at startup.
4188 */
David Hildenbrandd3d692c2014-07-29 08:53:36 +02004189 kvm_make_request(KVM_REQ_TLB_FLUSH, vcpu);
David Hildenbrand433b9ee2014-05-06 16:11:14 +02004190 spin_unlock(&vcpu->kvm->arch.start_stop_lock);
David Hildenbrand8ad35752014-03-14 11:00:21 +01004191 return;
David Hildenbrand6852d7b2014-03-14 10:59:29 +01004192}
4193
4194void kvm_s390_vcpu_stop(struct kvm_vcpu *vcpu)
4195{
David Hildenbrand8ad35752014-03-14 11:00:21 +01004196 int i, online_vcpus, started_vcpus = 0;
4197 struct kvm_vcpu *started_vcpu = NULL;
4198
4199 if (is_vcpu_stopped(vcpu))
4200 return;
4201
David Hildenbrand6852d7b2014-03-14 10:59:29 +01004202 trace_kvm_s390_vcpu_start_stop(vcpu->vcpu_id, 0);
David Hildenbrand8ad35752014-03-14 11:00:21 +01004203 /* Only one cpu at a time may enter/leave the STOPPED state. */
David Hildenbrand433b9ee2014-05-06 16:11:14 +02004204 spin_lock(&vcpu->kvm->arch.start_stop_lock);
David Hildenbrand8ad35752014-03-14 11:00:21 +01004205 online_vcpus = atomic_read(&vcpu->kvm->online_vcpus);
4206
David Hildenbrand32f5ff632014-04-14 12:40:03 +02004207 /* SIGP STOP and SIGP STOP AND STORE STATUS has been fully processed */
David Hildenbrand6cddd432014-10-15 16:48:53 +02004208 kvm_s390_clear_stop_irq(vcpu);
David Hildenbrand32f5ff632014-04-14 12:40:03 +02004209
David Hildenbrandef8f4f42018-01-23 18:05:29 +01004210 kvm_s390_set_cpuflags(vcpu, CPUSTAT_STOPPED);
David Hildenbrand8ad35752014-03-14 11:00:21 +01004211 __disable_ibs_on_vcpu(vcpu);
4212
4213 for (i = 0; i < online_vcpus; i++) {
4214 if (!is_vcpu_stopped(vcpu->kvm->vcpus[i])) {
4215 started_vcpus++;
4216 started_vcpu = vcpu->kvm->vcpus[i];
4217 }
4218 }
4219
4220 if (started_vcpus == 1) {
4221 /*
4222 * As we only have one VCPU left, we want to enable the
4223 * IBS facility for that VCPU to speed it up.
4224 */
4225 __enable_ibs_on_vcpu(started_vcpu);
4226 }
4227
David Hildenbrand433b9ee2014-05-06 16:11:14 +02004228 spin_unlock(&vcpu->kvm->arch.start_stop_lock);
David Hildenbrand8ad35752014-03-14 11:00:21 +01004229 return;
David Hildenbrand6852d7b2014-03-14 10:59:29 +01004230}
4231
Cornelia Huckd6712df2012-12-20 15:32:11 +01004232static int kvm_vcpu_ioctl_enable_cap(struct kvm_vcpu *vcpu,
4233 struct kvm_enable_cap *cap)
4234{
4235 int r;
4236
4237 if (cap->flags)
4238 return -EINVAL;
4239
4240 switch (cap->cap) {
Cornelia Huckfa6b7fe2012-12-20 15:32:12 +01004241 case KVM_CAP_S390_CSS_SUPPORT:
4242 if (!vcpu->kvm->arch.css_support) {
4243 vcpu->kvm->arch.css_support = 1;
Christian Borntraegerc92ea7b2015-07-22 15:52:10 +02004244 VM_EVENT(vcpu->kvm, 3, "%s", "ENABLE: CSS support");
Cornelia Huckfa6b7fe2012-12-20 15:32:12 +01004245 trace_kvm_s390_enable_css(vcpu->kvm);
4246 }
4247 r = 0;
4248 break;
Cornelia Huckd6712df2012-12-20 15:32:11 +01004249 default:
4250 r = -EINVAL;
4251 break;
4252 }
4253 return r;
4254}
4255
Thomas Huth41408c282015-02-06 15:01:21 +01004256static long kvm_s390_guest_mem_op(struct kvm_vcpu *vcpu,
4257 struct kvm_s390_mem_op *mop)
4258{
4259 void __user *uaddr = (void __user *)mop->buf;
4260 void *tmpbuf = NULL;
4261 int r, srcu_idx;
4262 const u64 supported_flags = KVM_S390_MEMOP_F_INJECT_EXCEPTION
4263 | KVM_S390_MEMOP_F_CHECK_ONLY;
4264
Thomas Hutha13b03b2019-08-29 14:25:17 +02004265 if (mop->flags & ~supported_flags || mop->ar >= NUM_ACRS || !mop->size)
Thomas Huth41408c282015-02-06 15:01:21 +01004266 return -EINVAL;
4267
4268 if (mop->size > MEM_OP_MAX_SIZE)
4269 return -E2BIG;
4270
4271 if (!(mop->flags & KVM_S390_MEMOP_F_CHECK_ONLY)) {
4272 tmpbuf = vmalloc(mop->size);
4273 if (!tmpbuf)
4274 return -ENOMEM;
4275 }
4276
4277 srcu_idx = srcu_read_lock(&vcpu->kvm->srcu);
4278
4279 switch (mop->op) {
4280 case KVM_S390_MEMOP_LOGICAL_READ:
4281 if (mop->flags & KVM_S390_MEMOP_F_CHECK_ONLY) {
David Hildenbrand92c96322015-11-16 15:42:11 +01004282 r = check_gva_range(vcpu, mop->gaddr, mop->ar,
4283 mop->size, GACC_FETCH);
Thomas Huth41408c282015-02-06 15:01:21 +01004284 break;
4285 }
4286 r = read_guest(vcpu, mop->gaddr, mop->ar, tmpbuf, mop->size);
4287 if (r == 0) {
4288 if (copy_to_user(uaddr, tmpbuf, mop->size))
4289 r = -EFAULT;
4290 }
4291 break;
4292 case KVM_S390_MEMOP_LOGICAL_WRITE:
4293 if (mop->flags & KVM_S390_MEMOP_F_CHECK_ONLY) {
David Hildenbrand92c96322015-11-16 15:42:11 +01004294 r = check_gva_range(vcpu, mop->gaddr, mop->ar,
4295 mop->size, GACC_STORE);
Thomas Huth41408c282015-02-06 15:01:21 +01004296 break;
4297 }
4298 if (copy_from_user(tmpbuf, uaddr, mop->size)) {
4299 r = -EFAULT;
4300 break;
4301 }
4302 r = write_guest(vcpu, mop->gaddr, mop->ar, tmpbuf, mop->size);
4303 break;
4304 default:
4305 r = -EINVAL;
4306 }
4307
4308 srcu_read_unlock(&vcpu->kvm->srcu, srcu_idx);
4309
4310 if (r > 0 && (mop->flags & KVM_S390_MEMOP_F_INJECT_EXCEPTION) != 0)
4311 kvm_s390_inject_prog_irq(vcpu, &vcpu->arch.pgm);
4312
4313 vfree(tmpbuf);
4314 return r;
4315}
4316
Paolo Bonzini5cb09442017-12-12 17:41:34 +01004317long kvm_arch_vcpu_async_ioctl(struct file *filp,
4318 unsigned int ioctl, unsigned long arg)
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004319{
4320 struct kvm_vcpu *vcpu = filp->private_data;
4321 void __user *argp = (void __user *)arg;
4322
Avi Kivity93736622010-05-13 12:35:17 +03004323 switch (ioctl) {
Jens Freimann47b43c52014-11-11 20:57:06 +01004324 case KVM_S390_IRQ: {
4325 struct kvm_s390_irq s390irq;
4326
Jens Freimann47b43c52014-11-11 20:57:06 +01004327 if (copy_from_user(&s390irq, argp, sizeof(s390irq)))
Christoffer Dall9b0624712017-12-04 21:35:36 +01004328 return -EFAULT;
4329 return kvm_s390_inject_vcpu(vcpu, &s390irq);
Jens Freimann47b43c52014-11-11 20:57:06 +01004330 }
Avi Kivity93736622010-05-13 12:35:17 +03004331 case KVM_S390_INTERRUPT: {
Carsten Otteba5c1e92008-03-25 18:47:26 +01004332 struct kvm_s390_interrupt s390int;
Thomas Huth53936b52019-09-12 13:54:38 +02004333 struct kvm_s390_irq s390irq = {};
Carsten Otteba5c1e92008-03-25 18:47:26 +01004334
4335 if (copy_from_user(&s390int, argp, sizeof(s390int)))
Christoffer Dall9b0624712017-12-04 21:35:36 +01004336 return -EFAULT;
Jens Freimann383d0b02014-07-29 15:11:49 +02004337 if (s390int_to_s390irq(&s390int, &s390irq))
4338 return -EINVAL;
Christoffer Dall9b0624712017-12-04 21:35:36 +01004339 return kvm_s390_inject_vcpu(vcpu, &s390irq);
Carsten Otteba5c1e92008-03-25 18:47:26 +01004340 }
Christoffer Dall9b0624712017-12-04 21:35:36 +01004341 }
Paolo Bonzini5cb09442017-12-12 17:41:34 +01004342 return -ENOIOCTLCMD;
4343}
4344
4345long kvm_arch_vcpu_ioctl(struct file *filp,
4346 unsigned int ioctl, unsigned long arg)
4347{
4348 struct kvm_vcpu *vcpu = filp->private_data;
4349 void __user *argp = (void __user *)arg;
4350 int idx;
4351 long r;
Christoffer Dall9b0624712017-12-04 21:35:36 +01004352
4353 vcpu_load(vcpu);
4354
4355 switch (ioctl) {
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004356 case KVM_S390_STORE_STATUS:
Thomas Huth800c1062013-09-12 10:33:45 +02004357 idx = srcu_read_lock(&vcpu->kvm->srcu);
Avi Kivitybc923cc2010-05-13 12:21:46 +03004358 r = kvm_s390_vcpu_store_status(vcpu, arg);
Thomas Huth800c1062013-09-12 10:33:45 +02004359 srcu_read_unlock(&vcpu->kvm->srcu, idx);
Avi Kivitybc923cc2010-05-13 12:21:46 +03004360 break;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004361 case KVM_S390_SET_INITIAL_PSW: {
4362 psw_t psw;
4363
Avi Kivitybc923cc2010-05-13 12:21:46 +03004364 r = -EFAULT;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004365 if (copy_from_user(&psw, argp, sizeof(psw)))
Avi Kivitybc923cc2010-05-13 12:21:46 +03004366 break;
4367 r = kvm_arch_vcpu_ioctl_set_initial_psw(vcpu, psw);
4368 break;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004369 }
4370 case KVM_S390_INITIAL_RESET:
Avi Kivitybc923cc2010-05-13 12:21:46 +03004371 r = kvm_arch_vcpu_ioctl_initial_reset(vcpu);
4372 break;
Carsten Otte14eebd92012-05-15 14:15:26 +02004373 case KVM_SET_ONE_REG:
4374 case KVM_GET_ONE_REG: {
4375 struct kvm_one_reg reg;
4376 r = -EFAULT;
4377 if (copy_from_user(&reg, argp, sizeof(reg)))
4378 break;
4379 if (ioctl == KVM_SET_ONE_REG)
4380 r = kvm_arch_vcpu_ioctl_set_one_reg(vcpu, &reg);
4381 else
4382 r = kvm_arch_vcpu_ioctl_get_one_reg(vcpu, &reg);
4383 break;
4384 }
Carsten Otte27e03932012-01-04 10:25:21 +01004385#ifdef CONFIG_KVM_S390_UCONTROL
4386 case KVM_S390_UCAS_MAP: {
4387 struct kvm_s390_ucas_mapping ucasmap;
4388
4389 if (copy_from_user(&ucasmap, argp, sizeof(ucasmap))) {
4390 r = -EFAULT;
4391 break;
4392 }
4393
4394 if (!kvm_is_ucontrol(vcpu->kvm)) {
4395 r = -EINVAL;
4396 break;
4397 }
4398
4399 r = gmap_map_segment(vcpu->arch.gmap, ucasmap.user_addr,
4400 ucasmap.vcpu_addr, ucasmap.length);
4401 break;
4402 }
4403 case KVM_S390_UCAS_UNMAP: {
4404 struct kvm_s390_ucas_mapping ucasmap;
4405
4406 if (copy_from_user(&ucasmap, argp, sizeof(ucasmap))) {
4407 r = -EFAULT;
4408 break;
4409 }
4410
4411 if (!kvm_is_ucontrol(vcpu->kvm)) {
4412 r = -EINVAL;
4413 break;
4414 }
4415
4416 r = gmap_unmap_segment(vcpu->arch.gmap, ucasmap.vcpu_addr,
4417 ucasmap.length);
4418 break;
4419 }
4420#endif
Carsten Otteccc79102012-01-04 10:25:26 +01004421 case KVM_S390_VCPU_FAULT: {
Martin Schwidefsky527e30b2014-04-30 16:04:25 +02004422 r = gmap_fault(vcpu->arch.gmap, arg, 0);
Carsten Otteccc79102012-01-04 10:25:26 +01004423 break;
4424 }
Cornelia Huckd6712df2012-12-20 15:32:11 +01004425 case KVM_ENABLE_CAP:
4426 {
4427 struct kvm_enable_cap cap;
4428 r = -EFAULT;
4429 if (copy_from_user(&cap, argp, sizeof(cap)))
4430 break;
4431 r = kvm_vcpu_ioctl_enable_cap(vcpu, &cap);
4432 break;
4433 }
Thomas Huth41408c282015-02-06 15:01:21 +01004434 case KVM_S390_MEM_OP: {
4435 struct kvm_s390_mem_op mem_op;
4436
4437 if (copy_from_user(&mem_op, argp, sizeof(mem_op)) == 0)
4438 r = kvm_s390_guest_mem_op(vcpu, &mem_op);
4439 else
4440 r = -EFAULT;
4441 break;
4442 }
Jens Freimann816c7662014-11-24 17:13:46 +01004443 case KVM_S390_SET_IRQ_STATE: {
4444 struct kvm_s390_irq_state irq_state;
4445
4446 r = -EFAULT;
4447 if (copy_from_user(&irq_state, argp, sizeof(irq_state)))
4448 break;
4449 if (irq_state.len > VCPU_IRQS_MAX_BUF ||
4450 irq_state.len == 0 ||
4451 irq_state.len % sizeof(struct kvm_s390_irq) > 0) {
4452 r = -EINVAL;
4453 break;
4454 }
Christian Borntraegerbb64da92017-11-21 16:02:52 +01004455 /* do not use irq_state.flags, it will break old QEMUs */
Jens Freimann816c7662014-11-24 17:13:46 +01004456 r = kvm_s390_set_irq_state(vcpu,
4457 (void __user *) irq_state.buf,
4458 irq_state.len);
4459 break;
4460 }
4461 case KVM_S390_GET_IRQ_STATE: {
4462 struct kvm_s390_irq_state irq_state;
4463
4464 r = -EFAULT;
4465 if (copy_from_user(&irq_state, argp, sizeof(irq_state)))
4466 break;
4467 if (irq_state.len == 0) {
4468 r = -EINVAL;
4469 break;
4470 }
Christian Borntraegerbb64da92017-11-21 16:02:52 +01004471 /* do not use irq_state.flags, it will break old QEMUs */
Jens Freimann816c7662014-11-24 17:13:46 +01004472 r = kvm_s390_get_irq_state(vcpu,
4473 (__u8 __user *) irq_state.buf,
4474 irq_state.len);
4475 break;
4476 }
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004477 default:
Carsten Otte3e6afcf2012-01-04 10:25:30 +01004478 r = -ENOTTY;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004479 }
Christoffer Dall9b0624712017-12-04 21:35:36 +01004480
4481 vcpu_put(vcpu);
Avi Kivitybc923cc2010-05-13 12:21:46 +03004482 return r;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004483}
4484
Souptick Joarder1499fa82018-04-19 00:49:58 +05304485vm_fault_t kvm_arch_vcpu_fault(struct kvm_vcpu *vcpu, struct vm_fault *vmf)
Carsten Otte5b1c1492012-01-04 10:25:23 +01004486{
4487#ifdef CONFIG_KVM_S390_UCONTROL
4488 if ((vmf->pgoff == KVM_S390_SIE_PAGE_OFFSET)
4489 && (kvm_is_ucontrol(vcpu->kvm))) {
4490 vmf->page = virt_to_page(vcpu->arch.sie_block);
4491 get_page(vmf->page);
4492 return 0;
4493 }
4494#endif
4495 return VM_FAULT_SIGBUS;
4496}
4497
Aneesh Kumar K.V55870272013-10-07 22:18:00 +05304498int kvm_arch_create_memslot(struct kvm *kvm, struct kvm_memory_slot *slot,
4499 unsigned long npages)
Takuya Yoshikawadb3fe4e2012-02-08 13:02:18 +09004500{
4501 return 0;
4502}
4503
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004504/* Section: memory related */
Marcelo Tosattif7784b82009-12-23 14:35:18 -02004505int kvm_arch_prepare_memory_region(struct kvm *kvm,
4506 struct kvm_memory_slot *memslot,
Paolo Bonzini09170a42015-05-18 13:59:39 +02004507 const struct kvm_userspace_memory_region *mem,
Takuya Yoshikawa7b6195a2013-02-27 19:44:34 +09004508 enum kvm_mr_change change)
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004509{
Nick Wangdd2887e2013-03-25 17:22:57 +01004510 /* A few sanity checks. We can have memory slots which have to be
4511 located/ended at a segment boundary (1MB). The memory in userland is
4512 ok to be fragmented into various different vmas. It is okay to mmap()
4513 and munmap() stuff in this slot after doing this call at any time */
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004514
Carsten Otte598841c2011-07-24 10:48:21 +02004515 if (mem->userspace_addr & 0xffffful)
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004516 return -EINVAL;
4517
Carsten Otte598841c2011-07-24 10:48:21 +02004518 if (mem->memory_size & 0xffffful)
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004519 return -EINVAL;
4520
Dominik Dingela3a92c32014-12-01 17:24:42 +01004521 if (mem->guest_phys_addr + mem->memory_size > kvm->arch.mem_limit)
4522 return -EINVAL;
4523
Marcelo Tosattif7784b82009-12-23 14:35:18 -02004524 return 0;
4525}
4526
4527void kvm_arch_commit_memory_region(struct kvm *kvm,
Paolo Bonzini09170a42015-05-18 13:59:39 +02004528 const struct kvm_userspace_memory_region *mem,
Takuya Yoshikawa84826442013-02-27 19:45:25 +09004529 const struct kvm_memory_slot *old,
Paolo Bonzinif36f3f22015-05-18 13:20:23 +02004530 const struct kvm_memory_slot *new,
Takuya Yoshikawa84826442013-02-27 19:45:25 +09004531 enum kvm_mr_change change)
Marcelo Tosattif7784b82009-12-23 14:35:18 -02004532{
Christian Borntraeger19ec1662019-05-24 16:06:23 +02004533 int rc = 0;
Marcelo Tosattif7784b82009-12-23 14:35:18 -02004534
Christian Borntraeger19ec1662019-05-24 16:06:23 +02004535 switch (change) {
4536 case KVM_MR_DELETE:
4537 rc = gmap_unmap_segment(kvm->arch.gmap, old->base_gfn * PAGE_SIZE,
4538 old->npages * PAGE_SIZE);
4539 break;
4540 case KVM_MR_MOVE:
4541 rc = gmap_unmap_segment(kvm->arch.gmap, old->base_gfn * PAGE_SIZE,
4542 old->npages * PAGE_SIZE);
4543 if (rc)
4544 break;
4545 /* FALLTHROUGH */
4546 case KVM_MR_CREATE:
4547 rc = gmap_map_segment(kvm->arch.gmap, mem->userspace_addr,
4548 mem->guest_phys_addr, mem->memory_size);
4549 break;
4550 case KVM_MR_FLAGS_ONLY:
4551 break;
4552 default:
4553 WARN(1, "Unknown KVM MR CHANGE: %d\n", change);
4554 }
Carsten Otte598841c2011-07-24 10:48:21 +02004555 if (rc)
David Hildenbrandea2cdd22015-05-20 13:24:02 +02004556 pr_warn("failed to commit memory region\n");
Carsten Otte598841c2011-07-24 10:48:21 +02004557 return;
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004558}
4559
Alexander Yarygin60a37702016-04-01 15:38:57 +03004560static inline unsigned long nonhyp_mask(int i)
4561{
4562 unsigned int nonhyp_fai = (sclp.hmfai << i * 2) >> 30;
4563
4564 return 0x0000ffffffffffffUL >> (nonhyp_fai << 4);
4565}
4566
Christian Borntraeger3491caf2016-05-13 12:16:35 +02004567void kvm_arch_vcpu_block_finish(struct kvm_vcpu *vcpu)
4568{
4569 vcpu->valid_wakeup = false;
4570}
4571
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004572static int __init kvm_s390_init(void)
4573{
Alexander Yarygin60a37702016-04-01 15:38:57 +03004574 int i;
4575
David Hildenbrand07197fd2015-01-30 16:01:38 +01004576 if (!sclp.has_sief2) {
Michael Mueller8d43d572018-12-10 11:15:16 +01004577 pr_info("SIE is not available\n");
David Hildenbrand07197fd2015-01-30 16:01:38 +01004578 return -ENODEV;
4579 }
4580
Janosch Franka4499382018-07-13 11:28:31 +01004581 if (nested && hpage) {
Michael Mueller8d43d572018-12-10 11:15:16 +01004582 pr_info("A KVM host that supports nesting cannot back its KVM guests with huge pages\n");
Janosch Franka4499382018-07-13 11:28:31 +01004583 return -EINVAL;
4584 }
4585
Alexander Yarygin60a37702016-04-01 15:38:57 +03004586 for (i = 0; i < 16; i++)
Christian Borntraegerc3b9e3e2018-02-09 16:26:29 +00004587 kvm_s390_fac_base[i] |=
Alexander Yarygin60a37702016-04-01 15:38:57 +03004588 S390_lowcore.stfle_fac_list[i] & nonhyp_mask(i);
4589
Michael Mueller9d8d5782015-02-02 15:42:51 +01004590 return kvm_init(NULL, sizeof(struct kvm_vcpu), 0, THIS_MODULE);
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004591}
4592
4593static void __exit kvm_s390_exit(void)
4594{
Heiko Carstensb0c632d2008-03-25 18:47:20 +01004595 kvm_exit();
4596}
4597
4598module_init(kvm_s390_init);
4599module_exit(kvm_s390_exit);
Cornelia Huck566af942013-05-27 18:42:33 +02004600
4601/*
4602 * Enable autoloading of the kvm module.
4603 * Note that we add the module alias here instead of virt/kvm/kvm_main.c
4604 * since x86 takes a different approach.
4605 */
4606#include <linux/miscdevice.h>
4607MODULE_ALIAS_MISCDEV(KVM_MINOR);
4608MODULE_ALIAS("devname:kvm");