KVM: s390: adapt debug entries for instruction handling
[linux-2.6-block.git] / arch / s390 / kvm / kvm-s390.c
CommitLineData
b0c632db 1/*
a53c8fab 2 * hosting zSeries kernel virtual machines
b0c632db 3 *
a53c8fab 4 * Copyright IBM Corp. 2008, 2009
b0c632db
HC
5 *
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License (version 2 only)
8 * as published by the Free Software Foundation.
9 *
10 * Author(s): Carsten Otte <cotte@de.ibm.com>
11 * Christian Borntraeger <borntraeger@de.ibm.com>
12 * Heiko Carstens <heiko.carstens@de.ibm.com>
628eb9b8 13 * Christian Ehrhardt <ehrhardt@de.ibm.com>
15f36ebd 14 * Jason J. Herne <jjherne@us.ibm.com>
b0c632db
HC
15 */
16
17#include <linux/compiler.h>
18#include <linux/err.h>
19#include <linux/fs.h>
ca872302 20#include <linux/hrtimer.h>
b0c632db
HC
21#include <linux/init.h>
22#include <linux/kvm.h>
23#include <linux/kvm_host.h>
24#include <linux/module.h>
a374e892 25#include <linux/random.h>
b0c632db 26#include <linux/slab.h>
ba5c1e9b 27#include <linux/timer.h>
41408c28 28#include <linux/vmalloc.h>
cbb870c8 29#include <asm/asm-offsets.h>
b0c632db
HC
30#include <asm/lowcore.h>
31#include <asm/pgtable.h>
f5daba1d 32#include <asm/nmi.h>
a0616cde 33#include <asm/switch_to.h>
6d3da241 34#include <asm/isc.h>
1526bf9c 35#include <asm/sclp.h>
8f2abe6a 36#include "kvm-s390.h"
b0c632db
HC
37#include "gaccess.h"
38
ea2cdd27
DH
39#define KMSG_COMPONENT "kvm-s390"
40#undef pr_fmt
41#define pr_fmt(fmt) KMSG_COMPONENT ": " fmt
42
5786fffa
CH
43#define CREATE_TRACE_POINTS
44#include "trace.h"
ade38c31 45#include "trace-s390.h"
5786fffa 46
41408c28 47#define MEM_OP_MAX_SIZE 65536 /* Maximum transfer size for KVM_S390_MEM_OP */
816c7667
JF
48#define LOCAL_IRQS 32
49#define VCPU_IRQS_MAX_BUF (sizeof(struct kvm_s390_irq) * \
50 (KVM_MAX_VCPUS + LOCAL_IRQS))
41408c28 51
b0c632db
HC
52#define VCPU_STAT(x) offsetof(struct kvm_vcpu, stat.x), KVM_STAT_VCPU
53
54struct kvm_stats_debugfs_item debugfs_entries[] = {
55 { "userspace_handled", VCPU_STAT(exit_userspace) },
0eaeafa1 56 { "exit_null", VCPU_STAT(exit_null) },
8f2abe6a
CB
57 { "exit_validity", VCPU_STAT(exit_validity) },
58 { "exit_stop_request", VCPU_STAT(exit_stop_request) },
59 { "exit_external_request", VCPU_STAT(exit_external_request) },
60 { "exit_external_interrupt", VCPU_STAT(exit_external_interrupt) },
ba5c1e9b
CO
61 { "exit_instruction", VCPU_STAT(exit_instruction) },
62 { "exit_program_interruption", VCPU_STAT(exit_program_interruption) },
63 { "exit_instr_and_program_int", VCPU_STAT(exit_instr_and_program) },
f7819512 64 { "halt_successful_poll", VCPU_STAT(halt_successful_poll) },
ce2e4f0b 65 { "halt_wakeup", VCPU_STAT(halt_wakeup) },
f5e10b09 66 { "instruction_lctlg", VCPU_STAT(instruction_lctlg) },
ba5c1e9b 67 { "instruction_lctl", VCPU_STAT(instruction_lctl) },
aba07508
DH
68 { "instruction_stctl", VCPU_STAT(instruction_stctl) },
69 { "instruction_stctg", VCPU_STAT(instruction_stctg) },
ba5c1e9b 70 { "deliver_emergency_signal", VCPU_STAT(deliver_emergency_signal) },
7697e71f 71 { "deliver_external_call", VCPU_STAT(deliver_external_call) },
ba5c1e9b
CO
72 { "deliver_service_signal", VCPU_STAT(deliver_service_signal) },
73 { "deliver_virtio_interrupt", VCPU_STAT(deliver_virtio_interrupt) },
74 { "deliver_stop_signal", VCPU_STAT(deliver_stop_signal) },
75 { "deliver_prefix_signal", VCPU_STAT(deliver_prefix_signal) },
76 { "deliver_restart_signal", VCPU_STAT(deliver_restart_signal) },
77 { "deliver_program_interruption", VCPU_STAT(deliver_program_int) },
78 { "exit_wait_state", VCPU_STAT(exit_wait_state) },
69d0d3a3 79 { "instruction_pfmf", VCPU_STAT(instruction_pfmf) },
453423dc
CB
80 { "instruction_stidp", VCPU_STAT(instruction_stidp) },
81 { "instruction_spx", VCPU_STAT(instruction_spx) },
82 { "instruction_stpx", VCPU_STAT(instruction_stpx) },
83 { "instruction_stap", VCPU_STAT(instruction_stap) },
84 { "instruction_storage_key", VCPU_STAT(instruction_storage_key) },
8a242234 85 { "instruction_ipte_interlock", VCPU_STAT(instruction_ipte_interlock) },
453423dc
CB
86 { "instruction_stsch", VCPU_STAT(instruction_stsch) },
87 { "instruction_chsc", VCPU_STAT(instruction_chsc) },
b31288fa 88 { "instruction_essa", VCPU_STAT(instruction_essa) },
453423dc
CB
89 { "instruction_stsi", VCPU_STAT(instruction_stsi) },
90 { "instruction_stfl", VCPU_STAT(instruction_stfl) },
bb25b9ba 91 { "instruction_tprot", VCPU_STAT(instruction_tprot) },
5288fbf0 92 { "instruction_sigp_sense", VCPU_STAT(instruction_sigp_sense) },
bd59d3a4 93 { "instruction_sigp_sense_running", VCPU_STAT(instruction_sigp_sense_running) },
7697e71f 94 { "instruction_sigp_external_call", VCPU_STAT(instruction_sigp_external_call) },
5288fbf0 95 { "instruction_sigp_emergency", VCPU_STAT(instruction_sigp_emergency) },
42cb0c9f
DH
96 { "instruction_sigp_cond_emergency", VCPU_STAT(instruction_sigp_cond_emergency) },
97 { "instruction_sigp_start", VCPU_STAT(instruction_sigp_start) },
5288fbf0 98 { "instruction_sigp_stop", VCPU_STAT(instruction_sigp_stop) },
42cb0c9f
DH
99 { "instruction_sigp_stop_store_status", VCPU_STAT(instruction_sigp_stop_store_status) },
100 { "instruction_sigp_store_status", VCPU_STAT(instruction_sigp_store_status) },
cd7b4b61 101 { "instruction_sigp_store_adtl_status", VCPU_STAT(instruction_sigp_store_adtl_status) },
5288fbf0
CB
102 { "instruction_sigp_set_arch", VCPU_STAT(instruction_sigp_arch) },
103 { "instruction_sigp_set_prefix", VCPU_STAT(instruction_sigp_prefix) },
104 { "instruction_sigp_restart", VCPU_STAT(instruction_sigp_restart) },
42cb0c9f
DH
105 { "instruction_sigp_cpu_reset", VCPU_STAT(instruction_sigp_cpu_reset) },
106 { "instruction_sigp_init_cpu_reset", VCPU_STAT(instruction_sigp_init_cpu_reset) },
107 { "instruction_sigp_unknown", VCPU_STAT(instruction_sigp_unknown) },
388186bc 108 { "diagnose_10", VCPU_STAT(diagnose_10) },
e28acfea 109 { "diagnose_44", VCPU_STAT(diagnose_44) },
41628d33 110 { "diagnose_9c", VCPU_STAT(diagnose_9c) },
175a5c9e
CB
111 { "diagnose_258", VCPU_STAT(diagnose_258) },
112 { "diagnose_308", VCPU_STAT(diagnose_308) },
113 { "diagnose_500", VCPU_STAT(diagnose_500) },
b0c632db
HC
114 { NULL }
115};
116
9d8d5786
MM
117/* upper facilities limit for kvm */
118unsigned long kvm_s390_fac_list_mask[] = {
a3ed8dae 119 0xffe6fffbfcfdfc40UL,
53df84f8 120 0x005e800000000000UL,
9d8d5786 121};
b0c632db 122
9d8d5786 123unsigned long kvm_s390_fac_list_mask_size(void)
78c4b59f 124{
9d8d5786
MM
125 BUILD_BUG_ON(ARRAY_SIZE(kvm_s390_fac_list_mask) > S390_ARCH_FAC_MASK_SIZE_U64);
126 return ARRAY_SIZE(kvm_s390_fac_list_mask);
78c4b59f
MM
127}
128
9d8d5786
MM
129static struct gmap_notifier gmap_notifier;
130
b0c632db 131/* Section: not file related */
13a34e06 132int kvm_arch_hardware_enable(void)
b0c632db
HC
133{
134 /* every s390 is virtualization enabled ;-) */
10474ae8 135 return 0;
b0c632db
HC
136}
137
2c70fe44
CB
138static void kvm_gmap_notifier(struct gmap *gmap, unsigned long address);
139
b0c632db
HC
140int kvm_arch_hardware_setup(void)
141{
2c70fe44
CB
142 gmap_notifier.notifier_call = kvm_gmap_notifier;
143 gmap_register_ipte_notifier(&gmap_notifier);
b0c632db
HC
144 return 0;
145}
146
147void kvm_arch_hardware_unsetup(void)
148{
2c70fe44 149 gmap_unregister_ipte_notifier(&gmap_notifier);
b0c632db
HC
150}
151
b0c632db
HC
152int kvm_arch_init(void *opaque)
153{
84877d93
CH
154 /* Register floating interrupt controller interface. */
155 return kvm_register_device_ops(&kvm_flic_ops, KVM_DEV_TYPE_FLIC);
b0c632db
HC
156}
157
b0c632db
HC
158/* Section: device related */
159long kvm_arch_dev_ioctl(struct file *filp,
160 unsigned int ioctl, unsigned long arg)
161{
162 if (ioctl == KVM_S390_ENABLE_SIE)
163 return s390_enable_sie();
164 return -EINVAL;
165}
166
784aa3d7 167int kvm_vm_ioctl_check_extension(struct kvm *kvm, long ext)
b0c632db 168{
d7b0b5eb
CO
169 int r;
170
2bd0ac4e 171 switch (ext) {
d7b0b5eb 172 case KVM_CAP_S390_PSW:
b6cf8788 173 case KVM_CAP_S390_GMAP:
52e16b18 174 case KVM_CAP_SYNC_MMU:
1efd0f59
CO
175#ifdef CONFIG_KVM_S390_UCONTROL
176 case KVM_CAP_S390_UCONTROL:
177#endif
3c038e6b 178 case KVM_CAP_ASYNC_PF:
60b413c9 179 case KVM_CAP_SYNC_REGS:
14eebd91 180 case KVM_CAP_ONE_REG:
d6712df9 181 case KVM_CAP_ENABLE_CAP:
fa6b7fe9 182 case KVM_CAP_S390_CSS_SUPPORT:
10ccaa1e 183 case KVM_CAP_IOEVENTFD:
c05c4186 184 case KVM_CAP_DEVICE_CTRL:
d938dc55 185 case KVM_CAP_ENABLE_CAP_VM:
78599d90 186 case KVM_CAP_S390_IRQCHIP:
f2061656 187 case KVM_CAP_VM_ATTRIBUTES:
6352e4d2 188 case KVM_CAP_MP_STATE:
47b43c52 189 case KVM_CAP_S390_INJECT_IRQ:
2444b352 190 case KVM_CAP_S390_USER_SIGP:
e44fc8c9 191 case KVM_CAP_S390_USER_STSI:
30ee2a98 192 case KVM_CAP_S390_SKEYS:
816c7667 193 case KVM_CAP_S390_IRQ_STATE:
d7b0b5eb
CO
194 r = 1;
195 break;
41408c28
TH
196 case KVM_CAP_S390_MEM_OP:
197 r = MEM_OP_MAX_SIZE;
198 break;
e726b1bd
CB
199 case KVM_CAP_NR_VCPUS:
200 case KVM_CAP_MAX_VCPUS:
201 r = KVM_MAX_VCPUS;
202 break;
e1e2e605
NW
203 case KVM_CAP_NR_MEMSLOTS:
204 r = KVM_USER_MEM_SLOTS;
205 break;
1526bf9c 206 case KVM_CAP_S390_COW:
abf09bed 207 r = MACHINE_HAS_ESOP;
1526bf9c 208 break;
68c55750
EF
209 case KVM_CAP_S390_VECTOR_REGISTERS:
210 r = MACHINE_HAS_VX;
211 break;
2bd0ac4e 212 default:
d7b0b5eb 213 r = 0;
2bd0ac4e 214 }
d7b0b5eb 215 return r;
b0c632db
HC
216}
217
15f36ebd
JH
218static void kvm_s390_sync_dirty_log(struct kvm *kvm,
219 struct kvm_memory_slot *memslot)
220{
221 gfn_t cur_gfn, last_gfn;
222 unsigned long address;
223 struct gmap *gmap = kvm->arch.gmap;
224
225 down_read(&gmap->mm->mmap_sem);
226 /* Loop over all guest pages */
227 last_gfn = memslot->base_gfn + memslot->npages;
228 for (cur_gfn = memslot->base_gfn; cur_gfn <= last_gfn; cur_gfn++) {
229 address = gfn_to_hva_memslot(memslot, cur_gfn);
230
231 if (gmap_test_and_clear_dirty(address, gmap))
232 mark_page_dirty(kvm, cur_gfn);
233 }
234 up_read(&gmap->mm->mmap_sem);
235}
236
b0c632db
HC
237/* Section: vm related */
238/*
239 * Get (and clear) the dirty memory log for a memory slot.
240 */
241int kvm_vm_ioctl_get_dirty_log(struct kvm *kvm,
242 struct kvm_dirty_log *log)
243{
15f36ebd
JH
244 int r;
245 unsigned long n;
9f6b8029 246 struct kvm_memslots *slots;
15f36ebd
JH
247 struct kvm_memory_slot *memslot;
248 int is_dirty = 0;
249
250 mutex_lock(&kvm->slots_lock);
251
252 r = -EINVAL;
253 if (log->slot >= KVM_USER_MEM_SLOTS)
254 goto out;
255
9f6b8029
PB
256 slots = kvm_memslots(kvm);
257 memslot = id_to_memslot(slots, log->slot);
15f36ebd
JH
258 r = -ENOENT;
259 if (!memslot->dirty_bitmap)
260 goto out;
261
262 kvm_s390_sync_dirty_log(kvm, memslot);
263 r = kvm_get_dirty_log(kvm, log, &is_dirty);
264 if (r)
265 goto out;
266
267 /* Clear the dirty log */
268 if (is_dirty) {
269 n = kvm_dirty_bitmap_bytes(memslot);
270 memset(memslot->dirty_bitmap, 0, n);
271 }
272 r = 0;
273out:
274 mutex_unlock(&kvm->slots_lock);
275 return r;
b0c632db
HC
276}
277
d938dc55
CH
278static int kvm_vm_ioctl_enable_cap(struct kvm *kvm, struct kvm_enable_cap *cap)
279{
280 int r;
281
282 if (cap->flags)
283 return -EINVAL;
284
285 switch (cap->cap) {
84223598
CH
286 case KVM_CAP_S390_IRQCHIP:
287 kvm->arch.use_irqchip = 1;
288 r = 0;
289 break;
2444b352
DH
290 case KVM_CAP_S390_USER_SIGP:
291 kvm->arch.user_sigp = 1;
292 r = 0;
293 break;
68c55750 294 case KVM_CAP_S390_VECTOR_REGISTERS:
18280d8b
MM
295 if (MACHINE_HAS_VX) {
296 set_kvm_facility(kvm->arch.model.fac->mask, 129);
297 set_kvm_facility(kvm->arch.model.fac->list, 129);
298 r = 0;
299 } else
300 r = -EINVAL;
68c55750 301 break;
e44fc8c9
ET
302 case KVM_CAP_S390_USER_STSI:
303 kvm->arch.user_stsi = 1;
304 r = 0;
305 break;
d938dc55
CH
306 default:
307 r = -EINVAL;
308 break;
309 }
310 return r;
311}
312
8c0a7ce6
DD
313static int kvm_s390_get_mem_control(struct kvm *kvm, struct kvm_device_attr *attr)
314{
315 int ret;
316
317 switch (attr->attr) {
318 case KVM_S390_VM_MEM_LIMIT_SIZE:
319 ret = 0;
320 if (put_user(kvm->arch.gmap->asce_end, (u64 __user *)attr->addr))
321 ret = -EFAULT;
322 break;
323 default:
324 ret = -ENXIO;
325 break;
326 }
327 return ret;
328}
329
330static int kvm_s390_set_mem_control(struct kvm *kvm, struct kvm_device_attr *attr)
4f718eab
DD
331{
332 int ret;
333 unsigned int idx;
334 switch (attr->attr) {
335 case KVM_S390_VM_MEM_ENABLE_CMMA:
e6db1d61
DD
336 /* enable CMMA only for z10 and later (EDAT_1) */
337 ret = -EINVAL;
338 if (!MACHINE_IS_LPAR || !MACHINE_HAS_EDAT1)
339 break;
340
4f718eab
DD
341 ret = -EBUSY;
342 mutex_lock(&kvm->lock);
343 if (atomic_read(&kvm->online_vcpus) == 0) {
344 kvm->arch.use_cmma = 1;
345 ret = 0;
346 }
347 mutex_unlock(&kvm->lock);
348 break;
349 case KVM_S390_VM_MEM_CLR_CMMA:
c3489155
DD
350 ret = -EINVAL;
351 if (!kvm->arch.use_cmma)
352 break;
353
4f718eab
DD
354 mutex_lock(&kvm->lock);
355 idx = srcu_read_lock(&kvm->srcu);
a13cff31 356 s390_reset_cmma(kvm->arch.gmap->mm);
4f718eab
DD
357 srcu_read_unlock(&kvm->srcu, idx);
358 mutex_unlock(&kvm->lock);
359 ret = 0;
360 break;
8c0a7ce6
DD
361 case KVM_S390_VM_MEM_LIMIT_SIZE: {
362 unsigned long new_limit;
363
364 if (kvm_is_ucontrol(kvm))
365 return -EINVAL;
366
367 if (get_user(new_limit, (u64 __user *)attr->addr))
368 return -EFAULT;
369
370 if (new_limit > kvm->arch.gmap->asce_end)
371 return -E2BIG;
372
373 ret = -EBUSY;
374 mutex_lock(&kvm->lock);
375 if (atomic_read(&kvm->online_vcpus) == 0) {
376 /* gmap_alloc will round the limit up */
377 struct gmap *new = gmap_alloc(current->mm, new_limit);
378
379 if (!new) {
380 ret = -ENOMEM;
381 } else {
382 gmap_free(kvm->arch.gmap);
383 new->private = kvm;
384 kvm->arch.gmap = new;
385 ret = 0;
386 }
387 }
388 mutex_unlock(&kvm->lock);
389 break;
390 }
4f718eab
DD
391 default:
392 ret = -ENXIO;
393 break;
394 }
395 return ret;
396}
397
a374e892
TK
398static void kvm_s390_vcpu_crypto_setup(struct kvm_vcpu *vcpu);
399
400static int kvm_s390_vm_set_crypto(struct kvm *kvm, struct kvm_device_attr *attr)
401{
402 struct kvm_vcpu *vcpu;
403 int i;
404
9d8d5786 405 if (!test_kvm_facility(kvm, 76))
a374e892
TK
406 return -EINVAL;
407
408 mutex_lock(&kvm->lock);
409 switch (attr->attr) {
410 case KVM_S390_VM_CRYPTO_ENABLE_AES_KW:
411 get_random_bytes(
412 kvm->arch.crypto.crycb->aes_wrapping_key_mask,
413 sizeof(kvm->arch.crypto.crycb->aes_wrapping_key_mask));
414 kvm->arch.crypto.aes_kw = 1;
415 break;
416 case KVM_S390_VM_CRYPTO_ENABLE_DEA_KW:
417 get_random_bytes(
418 kvm->arch.crypto.crycb->dea_wrapping_key_mask,
419 sizeof(kvm->arch.crypto.crycb->dea_wrapping_key_mask));
420 kvm->arch.crypto.dea_kw = 1;
421 break;
422 case KVM_S390_VM_CRYPTO_DISABLE_AES_KW:
423 kvm->arch.crypto.aes_kw = 0;
424 memset(kvm->arch.crypto.crycb->aes_wrapping_key_mask, 0,
425 sizeof(kvm->arch.crypto.crycb->aes_wrapping_key_mask));
426 break;
427 case KVM_S390_VM_CRYPTO_DISABLE_DEA_KW:
428 kvm->arch.crypto.dea_kw = 0;
429 memset(kvm->arch.crypto.crycb->dea_wrapping_key_mask, 0,
430 sizeof(kvm->arch.crypto.crycb->dea_wrapping_key_mask));
431 break;
432 default:
433 mutex_unlock(&kvm->lock);
434 return -ENXIO;
435 }
436
437 kvm_for_each_vcpu(i, vcpu, kvm) {
438 kvm_s390_vcpu_crypto_setup(vcpu);
439 exit_sie(vcpu);
440 }
441 mutex_unlock(&kvm->lock);
442 return 0;
443}
444
72f25020
JH
445static int kvm_s390_set_tod_high(struct kvm *kvm, struct kvm_device_attr *attr)
446{
447 u8 gtod_high;
448
449 if (copy_from_user(&gtod_high, (void __user *)attr->addr,
450 sizeof(gtod_high)))
451 return -EFAULT;
452
453 if (gtod_high != 0)
454 return -EINVAL;
455
456 return 0;
457}
458
459static int kvm_s390_set_tod_low(struct kvm *kvm, struct kvm_device_attr *attr)
460{
461 struct kvm_vcpu *cur_vcpu;
462 unsigned int vcpu_idx;
463 u64 host_tod, gtod;
464 int r;
465
466 if (copy_from_user(&gtod, (void __user *)attr->addr, sizeof(gtod)))
467 return -EFAULT;
468
469 r = store_tod_clock(&host_tod);
470 if (r)
471 return r;
472
473 mutex_lock(&kvm->lock);
474 kvm->arch.epoch = gtod - host_tod;
27406cd5
CB
475 kvm_s390_vcpu_block_all(kvm);
476 kvm_for_each_vcpu(vcpu_idx, cur_vcpu, kvm)
72f25020 477 cur_vcpu->arch.sie_block->epoch = kvm->arch.epoch;
27406cd5 478 kvm_s390_vcpu_unblock_all(kvm);
72f25020
JH
479 mutex_unlock(&kvm->lock);
480 return 0;
481}
482
483static int kvm_s390_set_tod(struct kvm *kvm, struct kvm_device_attr *attr)
484{
485 int ret;
486
487 if (attr->flags)
488 return -EINVAL;
489
490 switch (attr->attr) {
491 case KVM_S390_VM_TOD_HIGH:
492 ret = kvm_s390_set_tod_high(kvm, attr);
493 break;
494 case KVM_S390_VM_TOD_LOW:
495 ret = kvm_s390_set_tod_low(kvm, attr);
496 break;
497 default:
498 ret = -ENXIO;
499 break;
500 }
501 return ret;
502}
503
504static int kvm_s390_get_tod_high(struct kvm *kvm, struct kvm_device_attr *attr)
505{
506 u8 gtod_high = 0;
507
508 if (copy_to_user((void __user *)attr->addr, &gtod_high,
509 sizeof(gtod_high)))
510 return -EFAULT;
511
512 return 0;
513}
514
515static int kvm_s390_get_tod_low(struct kvm *kvm, struct kvm_device_attr *attr)
516{
517 u64 host_tod, gtod;
518 int r;
519
520 r = store_tod_clock(&host_tod);
521 if (r)
522 return r;
523
524 gtod = host_tod + kvm->arch.epoch;
525 if (copy_to_user((void __user *)attr->addr, &gtod, sizeof(gtod)))
526 return -EFAULT;
527
528 return 0;
529}
530
531static int kvm_s390_get_tod(struct kvm *kvm, struct kvm_device_attr *attr)
532{
533 int ret;
534
535 if (attr->flags)
536 return -EINVAL;
537
538 switch (attr->attr) {
539 case KVM_S390_VM_TOD_HIGH:
540 ret = kvm_s390_get_tod_high(kvm, attr);
541 break;
542 case KVM_S390_VM_TOD_LOW:
543 ret = kvm_s390_get_tod_low(kvm, attr);
544 break;
545 default:
546 ret = -ENXIO;
547 break;
548 }
549 return ret;
550}
551
658b6eda
MM
552static int kvm_s390_set_processor(struct kvm *kvm, struct kvm_device_attr *attr)
553{
554 struct kvm_s390_vm_cpu_processor *proc;
555 int ret = 0;
556
557 mutex_lock(&kvm->lock);
558 if (atomic_read(&kvm->online_vcpus)) {
559 ret = -EBUSY;
560 goto out;
561 }
562 proc = kzalloc(sizeof(*proc), GFP_KERNEL);
563 if (!proc) {
564 ret = -ENOMEM;
565 goto out;
566 }
567 if (!copy_from_user(proc, (void __user *)attr->addr,
568 sizeof(*proc))) {
569 memcpy(&kvm->arch.model.cpu_id, &proc->cpuid,
570 sizeof(struct cpuid));
571 kvm->arch.model.ibc = proc->ibc;
981467c9 572 memcpy(kvm->arch.model.fac->list, proc->fac_list,
658b6eda
MM
573 S390_ARCH_FAC_LIST_SIZE_BYTE);
574 } else
575 ret = -EFAULT;
576 kfree(proc);
577out:
578 mutex_unlock(&kvm->lock);
579 return ret;
580}
581
582static int kvm_s390_set_cpu_model(struct kvm *kvm, struct kvm_device_attr *attr)
583{
584 int ret = -ENXIO;
585
586 switch (attr->attr) {
587 case KVM_S390_VM_CPU_PROCESSOR:
588 ret = kvm_s390_set_processor(kvm, attr);
589 break;
590 }
591 return ret;
592}
593
594static int kvm_s390_get_processor(struct kvm *kvm, struct kvm_device_attr *attr)
595{
596 struct kvm_s390_vm_cpu_processor *proc;
597 int ret = 0;
598
599 proc = kzalloc(sizeof(*proc), GFP_KERNEL);
600 if (!proc) {
601 ret = -ENOMEM;
602 goto out;
603 }
604 memcpy(&proc->cpuid, &kvm->arch.model.cpu_id, sizeof(struct cpuid));
605 proc->ibc = kvm->arch.model.ibc;
981467c9 606 memcpy(&proc->fac_list, kvm->arch.model.fac->list, S390_ARCH_FAC_LIST_SIZE_BYTE);
658b6eda
MM
607 if (copy_to_user((void __user *)attr->addr, proc, sizeof(*proc)))
608 ret = -EFAULT;
609 kfree(proc);
610out:
611 return ret;
612}
613
614static int kvm_s390_get_machine(struct kvm *kvm, struct kvm_device_attr *attr)
615{
616 struct kvm_s390_vm_cpu_machine *mach;
617 int ret = 0;
618
619 mach = kzalloc(sizeof(*mach), GFP_KERNEL);
620 if (!mach) {
621 ret = -ENOMEM;
622 goto out;
623 }
624 get_cpu_id((struct cpuid *) &mach->cpuid);
37c5f6c8 625 mach->ibc = sclp.ibc;
981467c9
MM
626 memcpy(&mach->fac_mask, kvm->arch.model.fac->mask,
627 S390_ARCH_FAC_LIST_SIZE_BYTE);
658b6eda 628 memcpy((unsigned long *)&mach->fac_list, S390_lowcore.stfle_fac_list,
94422ee8 629 S390_ARCH_FAC_LIST_SIZE_BYTE);
658b6eda
MM
630 if (copy_to_user((void __user *)attr->addr, mach, sizeof(*mach)))
631 ret = -EFAULT;
632 kfree(mach);
633out:
634 return ret;
635}
636
637static int kvm_s390_get_cpu_model(struct kvm *kvm, struct kvm_device_attr *attr)
638{
639 int ret = -ENXIO;
640
641 switch (attr->attr) {
642 case KVM_S390_VM_CPU_PROCESSOR:
643 ret = kvm_s390_get_processor(kvm, attr);
644 break;
645 case KVM_S390_VM_CPU_MACHINE:
646 ret = kvm_s390_get_machine(kvm, attr);
647 break;
648 }
649 return ret;
650}
651
f2061656
DD
652static int kvm_s390_vm_set_attr(struct kvm *kvm, struct kvm_device_attr *attr)
653{
654 int ret;
655
656 switch (attr->group) {
4f718eab 657 case KVM_S390_VM_MEM_CTRL:
8c0a7ce6 658 ret = kvm_s390_set_mem_control(kvm, attr);
4f718eab 659 break;
72f25020
JH
660 case KVM_S390_VM_TOD:
661 ret = kvm_s390_set_tod(kvm, attr);
662 break;
658b6eda
MM
663 case KVM_S390_VM_CPU_MODEL:
664 ret = kvm_s390_set_cpu_model(kvm, attr);
665 break;
a374e892
TK
666 case KVM_S390_VM_CRYPTO:
667 ret = kvm_s390_vm_set_crypto(kvm, attr);
668 break;
f2061656
DD
669 default:
670 ret = -ENXIO;
671 break;
672 }
673
674 return ret;
675}
676
677static int kvm_s390_vm_get_attr(struct kvm *kvm, struct kvm_device_attr *attr)
678{
8c0a7ce6
DD
679 int ret;
680
681 switch (attr->group) {
682 case KVM_S390_VM_MEM_CTRL:
683 ret = kvm_s390_get_mem_control(kvm, attr);
684 break;
72f25020
JH
685 case KVM_S390_VM_TOD:
686 ret = kvm_s390_get_tod(kvm, attr);
687 break;
658b6eda
MM
688 case KVM_S390_VM_CPU_MODEL:
689 ret = kvm_s390_get_cpu_model(kvm, attr);
690 break;
8c0a7ce6
DD
691 default:
692 ret = -ENXIO;
693 break;
694 }
695
696 return ret;
f2061656
DD
697}
698
699static int kvm_s390_vm_has_attr(struct kvm *kvm, struct kvm_device_attr *attr)
700{
701 int ret;
702
703 switch (attr->group) {
4f718eab
DD
704 case KVM_S390_VM_MEM_CTRL:
705 switch (attr->attr) {
706 case KVM_S390_VM_MEM_ENABLE_CMMA:
707 case KVM_S390_VM_MEM_CLR_CMMA:
8c0a7ce6 708 case KVM_S390_VM_MEM_LIMIT_SIZE:
4f718eab
DD
709 ret = 0;
710 break;
711 default:
712 ret = -ENXIO;
713 break;
714 }
715 break;
72f25020
JH
716 case KVM_S390_VM_TOD:
717 switch (attr->attr) {
718 case KVM_S390_VM_TOD_LOW:
719 case KVM_S390_VM_TOD_HIGH:
720 ret = 0;
721 break;
722 default:
723 ret = -ENXIO;
724 break;
725 }
726 break;
658b6eda
MM
727 case KVM_S390_VM_CPU_MODEL:
728 switch (attr->attr) {
729 case KVM_S390_VM_CPU_PROCESSOR:
730 case KVM_S390_VM_CPU_MACHINE:
731 ret = 0;
732 break;
733 default:
734 ret = -ENXIO;
735 break;
736 }
737 break;
a374e892
TK
738 case KVM_S390_VM_CRYPTO:
739 switch (attr->attr) {
740 case KVM_S390_VM_CRYPTO_ENABLE_AES_KW:
741 case KVM_S390_VM_CRYPTO_ENABLE_DEA_KW:
742 case KVM_S390_VM_CRYPTO_DISABLE_AES_KW:
743 case KVM_S390_VM_CRYPTO_DISABLE_DEA_KW:
744 ret = 0;
745 break;
746 default:
747 ret = -ENXIO;
748 break;
749 }
750 break;
f2061656
DD
751 default:
752 ret = -ENXIO;
753 break;
754 }
755
756 return ret;
757}
758
30ee2a98
JH
759static long kvm_s390_get_skeys(struct kvm *kvm, struct kvm_s390_skeys *args)
760{
761 uint8_t *keys;
762 uint64_t hva;
763 unsigned long curkey;
764 int i, r = 0;
765
766 if (args->flags != 0)
767 return -EINVAL;
768
769 /* Is this guest using storage keys? */
770 if (!mm_use_skey(current->mm))
771 return KVM_S390_GET_SKEYS_NONE;
772
773 /* Enforce sane limit on memory allocation */
774 if (args->count < 1 || args->count > KVM_S390_SKEYS_MAX)
775 return -EINVAL;
776
777 keys = kmalloc_array(args->count, sizeof(uint8_t),
778 GFP_KERNEL | __GFP_NOWARN);
779 if (!keys)
780 keys = vmalloc(sizeof(uint8_t) * args->count);
781 if (!keys)
782 return -ENOMEM;
783
784 for (i = 0; i < args->count; i++) {
785 hva = gfn_to_hva(kvm, args->start_gfn + i);
786 if (kvm_is_error_hva(hva)) {
787 r = -EFAULT;
788 goto out;
789 }
790
791 curkey = get_guest_storage_key(current->mm, hva);
792 if (IS_ERR_VALUE(curkey)) {
793 r = curkey;
794 goto out;
795 }
796 keys[i] = curkey;
797 }
798
799 r = copy_to_user((uint8_t __user *)args->skeydata_addr, keys,
800 sizeof(uint8_t) * args->count);
801 if (r)
802 r = -EFAULT;
803out:
804 kvfree(keys);
805 return r;
806}
807
808static long kvm_s390_set_skeys(struct kvm *kvm, struct kvm_s390_skeys *args)
809{
810 uint8_t *keys;
811 uint64_t hva;
812 int i, r = 0;
813
814 if (args->flags != 0)
815 return -EINVAL;
816
817 /* Enforce sane limit on memory allocation */
818 if (args->count < 1 || args->count > KVM_S390_SKEYS_MAX)
819 return -EINVAL;
820
821 keys = kmalloc_array(args->count, sizeof(uint8_t),
822 GFP_KERNEL | __GFP_NOWARN);
823 if (!keys)
824 keys = vmalloc(sizeof(uint8_t) * args->count);
825 if (!keys)
826 return -ENOMEM;
827
828 r = copy_from_user(keys, (uint8_t __user *)args->skeydata_addr,
829 sizeof(uint8_t) * args->count);
830 if (r) {
831 r = -EFAULT;
832 goto out;
833 }
834
835 /* Enable storage key handling for the guest */
14d4a425
DD
836 r = s390_enable_skey();
837 if (r)
838 goto out;
30ee2a98
JH
839
840 for (i = 0; i < args->count; i++) {
841 hva = gfn_to_hva(kvm, args->start_gfn + i);
842 if (kvm_is_error_hva(hva)) {
843 r = -EFAULT;
844 goto out;
845 }
846
847 /* Lowest order bit is reserved */
848 if (keys[i] & 0x01) {
849 r = -EINVAL;
850 goto out;
851 }
852
853 r = set_guest_storage_key(current->mm, hva,
854 (unsigned long)keys[i], 0);
855 if (r)
856 goto out;
857 }
858out:
859 kvfree(keys);
860 return r;
861}
862
b0c632db
HC
863long kvm_arch_vm_ioctl(struct file *filp,
864 unsigned int ioctl, unsigned long arg)
865{
866 struct kvm *kvm = filp->private_data;
867 void __user *argp = (void __user *)arg;
f2061656 868 struct kvm_device_attr attr;
b0c632db
HC
869 int r;
870
871 switch (ioctl) {
ba5c1e9b
CO
872 case KVM_S390_INTERRUPT: {
873 struct kvm_s390_interrupt s390int;
874
875 r = -EFAULT;
876 if (copy_from_user(&s390int, argp, sizeof(s390int)))
877 break;
878 r = kvm_s390_inject_vm(kvm, &s390int);
879 break;
880 }
d938dc55
CH
881 case KVM_ENABLE_CAP: {
882 struct kvm_enable_cap cap;
883 r = -EFAULT;
884 if (copy_from_user(&cap, argp, sizeof(cap)))
885 break;
886 r = kvm_vm_ioctl_enable_cap(kvm, &cap);
887 break;
888 }
84223598
CH
889 case KVM_CREATE_IRQCHIP: {
890 struct kvm_irq_routing_entry routing;
891
892 r = -EINVAL;
893 if (kvm->arch.use_irqchip) {
894 /* Set up dummy routing. */
895 memset(&routing, 0, sizeof(routing));
896 kvm_set_irq_routing(kvm, &routing, 0, 0);
897 r = 0;
898 }
899 break;
900 }
f2061656
DD
901 case KVM_SET_DEVICE_ATTR: {
902 r = -EFAULT;
903 if (copy_from_user(&attr, (void __user *)arg, sizeof(attr)))
904 break;
905 r = kvm_s390_vm_set_attr(kvm, &attr);
906 break;
907 }
908 case KVM_GET_DEVICE_ATTR: {
909 r = -EFAULT;
910 if (copy_from_user(&attr, (void __user *)arg, sizeof(attr)))
911 break;
912 r = kvm_s390_vm_get_attr(kvm, &attr);
913 break;
914 }
915 case KVM_HAS_DEVICE_ATTR: {
916 r = -EFAULT;
917 if (copy_from_user(&attr, (void __user *)arg, sizeof(attr)))
918 break;
919 r = kvm_s390_vm_has_attr(kvm, &attr);
920 break;
921 }
30ee2a98
JH
922 case KVM_S390_GET_SKEYS: {
923 struct kvm_s390_skeys args;
924
925 r = -EFAULT;
926 if (copy_from_user(&args, argp,
927 sizeof(struct kvm_s390_skeys)))
928 break;
929 r = kvm_s390_get_skeys(kvm, &args);
930 break;
931 }
932 case KVM_S390_SET_SKEYS: {
933 struct kvm_s390_skeys args;
934
935 r = -EFAULT;
936 if (copy_from_user(&args, argp,
937 sizeof(struct kvm_s390_skeys)))
938 break;
939 r = kvm_s390_set_skeys(kvm, &args);
940 break;
941 }
b0c632db 942 default:
367e1319 943 r = -ENOTTY;
b0c632db
HC
944 }
945
946 return r;
947}
948
45c9b47c
TK
949static int kvm_s390_query_ap_config(u8 *config)
950{
951 u32 fcn_code = 0x04000000UL;
86044c8c 952 u32 cc = 0;
45c9b47c 953
86044c8c 954 memset(config, 0, 128);
45c9b47c
TK
955 asm volatile(
956 "lgr 0,%1\n"
957 "lgr 2,%2\n"
958 ".long 0xb2af0000\n" /* PQAP(QCI) */
86044c8c 959 "0: ipm %0\n"
45c9b47c 960 "srl %0,28\n"
86044c8c
CB
961 "1:\n"
962 EX_TABLE(0b, 1b)
963 : "+r" (cc)
45c9b47c
TK
964 : "r" (fcn_code), "r" (config)
965 : "cc", "0", "2", "memory"
966 );
967
968 return cc;
969}
970
971static int kvm_s390_apxa_installed(void)
972{
973 u8 config[128];
974 int cc;
975
976 if (test_facility(2) && test_facility(12)) {
977 cc = kvm_s390_query_ap_config(config);
978
979 if (cc)
980 pr_err("PQAP(QCI) failed with cc=%d", cc);
981 else
982 return config[0] & 0x40;
983 }
984
985 return 0;
986}
987
988static void kvm_s390_set_crycb_format(struct kvm *kvm)
989{
990 kvm->arch.crypto.crycbd = (__u32)(unsigned long) kvm->arch.crypto.crycb;
991
992 if (kvm_s390_apxa_installed())
993 kvm->arch.crypto.crycbd |= CRYCB_FORMAT2;
994 else
995 kvm->arch.crypto.crycbd |= CRYCB_FORMAT1;
996}
997
9d8d5786
MM
998static void kvm_s390_get_cpu_id(struct cpuid *cpu_id)
999{
1000 get_cpu_id(cpu_id);
1001 cpu_id->version = 0xff;
1002}
1003
5102ee87
TK
1004static int kvm_s390_crypto_init(struct kvm *kvm)
1005{
9d8d5786 1006 if (!test_kvm_facility(kvm, 76))
5102ee87
TK
1007 return 0;
1008
1009 kvm->arch.crypto.crycb = kzalloc(sizeof(*kvm->arch.crypto.crycb),
1010 GFP_KERNEL | GFP_DMA);
1011 if (!kvm->arch.crypto.crycb)
1012 return -ENOMEM;
1013
45c9b47c 1014 kvm_s390_set_crycb_format(kvm);
5102ee87 1015
ed6f76b4
TK
1016 /* Enable AES/DEA protected key functions by default */
1017 kvm->arch.crypto.aes_kw = 1;
1018 kvm->arch.crypto.dea_kw = 1;
1019 get_random_bytes(kvm->arch.crypto.crycb->aes_wrapping_key_mask,
1020 sizeof(kvm->arch.crypto.crycb->aes_wrapping_key_mask));
1021 get_random_bytes(kvm->arch.crypto.crycb->dea_wrapping_key_mask,
1022 sizeof(kvm->arch.crypto.crycb->dea_wrapping_key_mask));
a374e892 1023
5102ee87
TK
1024 return 0;
1025}
1026
e08b9637 1027int kvm_arch_init_vm(struct kvm *kvm, unsigned long type)
b0c632db 1028{
9d8d5786 1029 int i, rc;
b0c632db 1030 char debug_name[16];
f6c137ff 1031 static unsigned long sca_offset;
b0c632db 1032
e08b9637
CO
1033 rc = -EINVAL;
1034#ifdef CONFIG_KVM_S390_UCONTROL
1035 if (type & ~KVM_VM_S390_UCONTROL)
1036 goto out_err;
1037 if ((type & KVM_VM_S390_UCONTROL) && (!capable(CAP_SYS_ADMIN)))
1038 goto out_err;
1039#else
1040 if (type)
1041 goto out_err;
1042#endif
1043
b0c632db
HC
1044 rc = s390_enable_sie();
1045 if (rc)
d89f5eff 1046 goto out_err;
b0c632db 1047
b290411a
CO
1048 rc = -ENOMEM;
1049
b0c632db
HC
1050 kvm->arch.sca = (struct sca_block *) get_zeroed_page(GFP_KERNEL);
1051 if (!kvm->arch.sca)
d89f5eff 1052 goto out_err;
f6c137ff
CB
1053 spin_lock(&kvm_lock);
1054 sca_offset = (sca_offset + 16) & 0x7f0;
1055 kvm->arch.sca = (struct sca_block *) ((char *) kvm->arch.sca + sca_offset);
1056 spin_unlock(&kvm_lock);
b0c632db
HC
1057
1058 sprintf(debug_name, "kvm-%u", current->pid);
1059
1cb9cf72 1060 kvm->arch.dbf = debug_register(debug_name, 32, 1, 7 * sizeof(long));
b0c632db 1061 if (!kvm->arch.dbf)
40f5b735 1062 goto out_err;
b0c632db 1063
9d8d5786
MM
1064 /*
1065 * The architectural maximum amount of facilities is 16 kbit. To store
1066 * this amount, 2 kbyte of memory is required. Thus we need a full
981467c9
MM
1067 * page to hold the guest facility list (arch.model.fac->list) and the
1068 * facility mask (arch.model.fac->mask). Its address size has to be
9d8d5786
MM
1069 * 31 bits and word aligned.
1070 */
1071 kvm->arch.model.fac =
981467c9 1072 (struct kvm_s390_fac *) get_zeroed_page(GFP_KERNEL | GFP_DMA);
9d8d5786 1073 if (!kvm->arch.model.fac)
40f5b735 1074 goto out_err;
9d8d5786 1075
fb5bf93f 1076 /* Populate the facility mask initially. */
981467c9 1077 memcpy(kvm->arch.model.fac->mask, S390_lowcore.stfle_fac_list,
94422ee8 1078 S390_ARCH_FAC_LIST_SIZE_BYTE);
9d8d5786
MM
1079 for (i = 0; i < S390_ARCH_FAC_LIST_SIZE_U64; i++) {
1080 if (i < kvm_s390_fac_list_mask_size())
981467c9 1081 kvm->arch.model.fac->mask[i] &= kvm_s390_fac_list_mask[i];
9d8d5786 1082 else
981467c9 1083 kvm->arch.model.fac->mask[i] = 0UL;
9d8d5786
MM
1084 }
1085
981467c9
MM
1086 /* Populate the facility list initially. */
1087 memcpy(kvm->arch.model.fac->list, kvm->arch.model.fac->mask,
1088 S390_ARCH_FAC_LIST_SIZE_BYTE);
1089
9d8d5786 1090 kvm_s390_get_cpu_id(&kvm->arch.model.cpu_id);
37c5f6c8 1091 kvm->arch.model.ibc = sclp.ibc & 0x0fff;
9d8d5786 1092
5102ee87 1093 if (kvm_s390_crypto_init(kvm) < 0)
40f5b735 1094 goto out_err;
5102ee87 1095
ba5c1e9b 1096 spin_lock_init(&kvm->arch.float_int.lock);
6d3da241
JF
1097 for (i = 0; i < FIRQ_LIST_COUNT; i++)
1098 INIT_LIST_HEAD(&kvm->arch.float_int.lists[i]);
8a242234 1099 init_waitqueue_head(&kvm->arch.ipte_wq);
a6b7e459 1100 mutex_init(&kvm->arch.ipte_mutex);
ba5c1e9b 1101
b0c632db
HC
1102 debug_register_view(kvm->arch.dbf, &debug_sprintf_view);
1103 VM_EVENT(kvm, 3, "%s", "vm created");
1104
e08b9637
CO
1105 if (type & KVM_VM_S390_UCONTROL) {
1106 kvm->arch.gmap = NULL;
1107 } else {
0349985a 1108 kvm->arch.gmap = gmap_alloc(current->mm, (1UL << 44) - 1);
e08b9637 1109 if (!kvm->arch.gmap)
40f5b735 1110 goto out_err;
2c70fe44 1111 kvm->arch.gmap->private = kvm;
24eb3a82 1112 kvm->arch.gmap->pfault_enabled = 0;
e08b9637 1113 }
fa6b7fe9
CH
1114
1115 kvm->arch.css_support = 0;
84223598 1116 kvm->arch.use_irqchip = 0;
72f25020 1117 kvm->arch.epoch = 0;
fa6b7fe9 1118
8ad35755
DH
1119 spin_lock_init(&kvm->arch.start_stop_lock);
1120
d89f5eff 1121 return 0;
40f5b735 1122out_err:
5102ee87 1123 kfree(kvm->arch.crypto.crycb);
9d8d5786 1124 free_page((unsigned long)kvm->arch.model.fac);
598841ca 1125 debug_unregister(kvm->arch.dbf);
b0c632db 1126 free_page((unsigned long)(kvm->arch.sca));
d89f5eff 1127 return rc;
b0c632db
HC
1128}
1129
d329c035
CB
1130void kvm_arch_vcpu_destroy(struct kvm_vcpu *vcpu)
1131{
1132 VCPU_EVENT(vcpu, 3, "%s", "free cpu");
ade38c31 1133 trace_kvm_s390_destroy_vcpu(vcpu->vcpu_id);
67335e63 1134 kvm_s390_clear_local_irqs(vcpu);
3c038e6b 1135 kvm_clear_async_pf_completion_queue(vcpu);
58f9460b
CO
1136 if (!kvm_is_ucontrol(vcpu->kvm)) {
1137 clear_bit(63 - vcpu->vcpu_id,
1138 (unsigned long *) &vcpu->kvm->arch.sca->mcn);
1139 if (vcpu->kvm->arch.sca->cpu[vcpu->vcpu_id].sda ==
1140 (__u64) vcpu->arch.sie_block)
1141 vcpu->kvm->arch.sca->cpu[vcpu->vcpu_id].sda = 0;
1142 }
abf4a71e 1143 smp_mb();
27e0393f
CO
1144
1145 if (kvm_is_ucontrol(vcpu->kvm))
1146 gmap_free(vcpu->arch.gmap);
1147
e6db1d61 1148 if (vcpu->kvm->arch.use_cmma)
b31605c1 1149 kvm_s390_vcpu_unsetup_cmma(vcpu);
d329c035 1150 free_page((unsigned long)(vcpu->arch.sie_block));
b31288fa 1151
6692cef3 1152 kvm_vcpu_uninit(vcpu);
b110feaf 1153 kmem_cache_free(kvm_vcpu_cache, vcpu);
d329c035
CB
1154}
1155
1156static void kvm_free_vcpus(struct kvm *kvm)
1157{
1158 unsigned int i;
988a2cae 1159 struct kvm_vcpu *vcpu;
d329c035 1160
988a2cae
GN
1161 kvm_for_each_vcpu(i, vcpu, kvm)
1162 kvm_arch_vcpu_destroy(vcpu);
1163
1164 mutex_lock(&kvm->lock);
1165 for (i = 0; i < atomic_read(&kvm->online_vcpus); i++)
1166 kvm->vcpus[i] = NULL;
1167
1168 atomic_set(&kvm->online_vcpus, 0);
1169 mutex_unlock(&kvm->lock);
d329c035
CB
1170}
1171
b0c632db
HC
1172void kvm_arch_destroy_vm(struct kvm *kvm)
1173{
d329c035 1174 kvm_free_vcpus(kvm);
9d8d5786 1175 free_page((unsigned long)kvm->arch.model.fac);
b0c632db 1176 free_page((unsigned long)(kvm->arch.sca));
d329c035 1177 debug_unregister(kvm->arch.dbf);
5102ee87 1178 kfree(kvm->arch.crypto.crycb);
27e0393f
CO
1179 if (!kvm_is_ucontrol(kvm))
1180 gmap_free(kvm->arch.gmap);
841b91c5 1181 kvm_s390_destroy_adapters(kvm);
67335e63 1182 kvm_s390_clear_float_irqs(kvm);
b0c632db
HC
1183}
1184
1185/* Section: vcpu related */
dafd032a
DD
1186static int __kvm_ucontrol_vcpu_init(struct kvm_vcpu *vcpu)
1187{
1188 vcpu->arch.gmap = gmap_alloc(current->mm, -1UL);
1189 if (!vcpu->arch.gmap)
1190 return -ENOMEM;
1191 vcpu->arch.gmap->private = vcpu->kvm;
1192
1193 return 0;
1194}
1195
b0c632db
HC
1196int kvm_arch_vcpu_init(struct kvm_vcpu *vcpu)
1197{
3c038e6b
DD
1198 vcpu->arch.pfault_token = KVM_S390_PFAULT_TOKEN_INVALID;
1199 kvm_clear_async_pf_completion_queue(vcpu);
59674c1a
CB
1200 vcpu->run->kvm_valid_regs = KVM_SYNC_PREFIX |
1201 KVM_SYNC_GPRS |
9eed0735 1202 KVM_SYNC_ACRS |
b028ee3e
DH
1203 KVM_SYNC_CRS |
1204 KVM_SYNC_ARCH0 |
1205 KVM_SYNC_PFAULT;
68c55750
EF
1206 if (test_kvm_facility(vcpu->kvm, 129))
1207 vcpu->run->kvm_valid_regs |= KVM_SYNC_VRS;
dafd032a
DD
1208
1209 if (kvm_is_ucontrol(vcpu->kvm))
1210 return __kvm_ucontrol_vcpu_init(vcpu);
1211
b0c632db
HC
1212 return 0;
1213}
1214
b0c632db
HC
1215void kvm_arch_vcpu_load(struct kvm_vcpu *vcpu, int cpu)
1216{
4725c860 1217 save_fp_ctl(&vcpu->arch.host_fpregs.fpc);
18280d8b 1218 if (test_kvm_facility(vcpu->kvm, 129))
68c55750
EF
1219 save_vx_regs((__vector128 *)&vcpu->arch.host_vregs->vrs);
1220 else
1221 save_fp_regs(vcpu->arch.host_fpregs.fprs);
b0c632db 1222 save_access_regs(vcpu->arch.host_acrs);
18280d8b 1223 if (test_kvm_facility(vcpu->kvm, 129)) {
68c55750
EF
1224 restore_fp_ctl(&vcpu->run->s.regs.fpc);
1225 restore_vx_regs((__vector128 *)&vcpu->run->s.regs.vrs);
1226 } else {
1227 restore_fp_ctl(&vcpu->arch.guest_fpregs.fpc);
1228 restore_fp_regs(vcpu->arch.guest_fpregs.fprs);
1229 }
59674c1a 1230 restore_access_regs(vcpu->run->s.regs.acrs);
480e5926 1231 gmap_enable(vcpu->arch.gmap);
9e6dabef 1232 atomic_set_mask(CPUSTAT_RUNNING, &vcpu->arch.sie_block->cpuflags);
b0c632db
HC
1233}
1234
1235void kvm_arch_vcpu_put(struct kvm_vcpu *vcpu)
1236{
9e6dabef 1237 atomic_clear_mask(CPUSTAT_RUNNING, &vcpu->arch.sie_block->cpuflags);
480e5926 1238 gmap_disable(vcpu->arch.gmap);
18280d8b 1239 if (test_kvm_facility(vcpu->kvm, 129)) {
68c55750
EF
1240 save_fp_ctl(&vcpu->run->s.regs.fpc);
1241 save_vx_regs((__vector128 *)&vcpu->run->s.regs.vrs);
1242 } else {
1243 save_fp_ctl(&vcpu->arch.guest_fpregs.fpc);
1244 save_fp_regs(vcpu->arch.guest_fpregs.fprs);
1245 }
59674c1a 1246 save_access_regs(vcpu->run->s.regs.acrs);
4725c860 1247 restore_fp_ctl(&vcpu->arch.host_fpregs.fpc);
18280d8b 1248 if (test_kvm_facility(vcpu->kvm, 129))
68c55750
EF
1249 restore_vx_regs((__vector128 *)&vcpu->arch.host_vregs->vrs);
1250 else
1251 restore_fp_regs(vcpu->arch.host_fpregs.fprs);
b0c632db
HC
1252 restore_access_regs(vcpu->arch.host_acrs);
1253}
1254
1255static void kvm_s390_vcpu_initial_reset(struct kvm_vcpu *vcpu)
1256{
1257 /* this equals initial cpu reset in pop, but we don't switch to ESA */
1258 vcpu->arch.sie_block->gpsw.mask = 0UL;
1259 vcpu->arch.sie_block->gpsw.addr = 0UL;
8d26cf7b 1260 kvm_s390_set_prefix(vcpu, 0);
b0c632db
HC
1261 vcpu->arch.sie_block->cputm = 0UL;
1262 vcpu->arch.sie_block->ckc = 0UL;
1263 vcpu->arch.sie_block->todpr = 0;
1264 memset(vcpu->arch.sie_block->gcr, 0, 16 * sizeof(__u64));
1265 vcpu->arch.sie_block->gcr[0] = 0xE0UL;
1266 vcpu->arch.sie_block->gcr[14] = 0xC2000000UL;
1267 vcpu->arch.guest_fpregs.fpc = 0;
1268 asm volatile("lfpc %0" : : "Q" (vcpu->arch.guest_fpregs.fpc));
1269 vcpu->arch.sie_block->gbea = 1;
672550fb 1270 vcpu->arch.sie_block->pp = 0;
3c038e6b
DD
1271 vcpu->arch.pfault_token = KVM_S390_PFAULT_TOKEN_INVALID;
1272 kvm_clear_async_pf_completion_queue(vcpu);
6352e4d2
DH
1273 if (!kvm_s390_user_cpu_state_ctrl(vcpu->kvm))
1274 kvm_s390_vcpu_stop(vcpu);
2ed10cc1 1275 kvm_s390_clear_local_irqs(vcpu);
b0c632db
HC
1276}
1277
31928aa5 1278void kvm_arch_vcpu_postcreate(struct kvm_vcpu *vcpu)
42897d86 1279{
72f25020
JH
1280 mutex_lock(&vcpu->kvm->lock);
1281 vcpu->arch.sie_block->epoch = vcpu->kvm->arch.epoch;
1282 mutex_unlock(&vcpu->kvm->lock);
dafd032a
DD
1283 if (!kvm_is_ucontrol(vcpu->kvm))
1284 vcpu->arch.gmap = vcpu->kvm->arch.gmap;
42897d86
MT
1285}
1286
5102ee87
TK
1287static void kvm_s390_vcpu_crypto_setup(struct kvm_vcpu *vcpu)
1288{
9d8d5786 1289 if (!test_kvm_facility(vcpu->kvm, 76))
5102ee87
TK
1290 return;
1291
a374e892
TK
1292 vcpu->arch.sie_block->ecb3 &= ~(ECB3_AES | ECB3_DEA);
1293
1294 if (vcpu->kvm->arch.crypto.aes_kw)
1295 vcpu->arch.sie_block->ecb3 |= ECB3_AES;
1296 if (vcpu->kvm->arch.crypto.dea_kw)
1297 vcpu->arch.sie_block->ecb3 |= ECB3_DEA;
1298
5102ee87
TK
1299 vcpu->arch.sie_block->crycbd = vcpu->kvm->arch.crypto.crycbd;
1300}
1301
b31605c1
DD
1302void kvm_s390_vcpu_unsetup_cmma(struct kvm_vcpu *vcpu)
1303{
1304 free_page(vcpu->arch.sie_block->cbrlo);
1305 vcpu->arch.sie_block->cbrlo = 0;
1306}
1307
1308int kvm_s390_vcpu_setup_cmma(struct kvm_vcpu *vcpu)
1309{
1310 vcpu->arch.sie_block->cbrlo = get_zeroed_page(GFP_KERNEL);
1311 if (!vcpu->arch.sie_block->cbrlo)
1312 return -ENOMEM;
1313
1314 vcpu->arch.sie_block->ecb2 |= 0x80;
1315 vcpu->arch.sie_block->ecb2 &= ~0x08;
1316 return 0;
1317}
1318
91520f1a
MM
1319static void kvm_s390_vcpu_setup_model(struct kvm_vcpu *vcpu)
1320{
1321 struct kvm_s390_cpu_model *model = &vcpu->kvm->arch.model;
1322
1323 vcpu->arch.cpu_id = model->cpu_id;
1324 vcpu->arch.sie_block->ibc = model->ibc;
1325 vcpu->arch.sie_block->fac = (int) (long) model->fac->list;
1326}
1327
b0c632db
HC
1328int kvm_arch_vcpu_setup(struct kvm_vcpu *vcpu)
1329{
b31605c1 1330 int rc = 0;
b31288fa 1331
9e6dabef
CH
1332 atomic_set(&vcpu->arch.sie_block->cpuflags, CPUSTAT_ZARCH |
1333 CPUSTAT_SM |
a4a4f191
GH
1334 CPUSTAT_STOPPED);
1335
53df84f8
GH
1336 if (test_kvm_facility(vcpu->kvm, 78))
1337 atomic_set_mask(CPUSTAT_GED2, &vcpu->arch.sie_block->cpuflags);
1338 else if (test_kvm_facility(vcpu->kvm, 8))
a4a4f191
GH
1339 atomic_set_mask(CPUSTAT_GED, &vcpu->arch.sie_block->cpuflags);
1340
91520f1a
MM
1341 kvm_s390_vcpu_setup_model(vcpu);
1342
fc34531d 1343 vcpu->arch.sie_block->ecb = 6;
9d8d5786 1344 if (test_kvm_facility(vcpu->kvm, 50) && test_kvm_facility(vcpu->kvm, 73))
7feb6bb8
MM
1345 vcpu->arch.sie_block->ecb |= 0x10;
1346
69d0d3a3 1347 vcpu->arch.sie_block->ecb2 = 8;
ea5f4969 1348 vcpu->arch.sie_block->eca = 0xC1002000U;
37c5f6c8 1349 if (sclp.has_siif)
217a4406 1350 vcpu->arch.sie_block->eca |= 1;
37c5f6c8 1351 if (sclp.has_sigpif)
ea5f4969 1352 vcpu->arch.sie_block->eca |= 0x10000000U;
18280d8b 1353 if (test_kvm_facility(vcpu->kvm, 129)) {
13211ea7
EF
1354 vcpu->arch.sie_block->eca |= 0x00020000;
1355 vcpu->arch.sie_block->ecd |= 0x20000000;
1356 }
492d8642 1357 vcpu->arch.sie_block->ictl |= ICTL_ISKE | ICTL_SSKE | ICTL_RRBE;
5a5e6536 1358
e6db1d61 1359 if (vcpu->kvm->arch.use_cmma) {
b31605c1
DD
1360 rc = kvm_s390_vcpu_setup_cmma(vcpu);
1361 if (rc)
1362 return rc;
b31288fa 1363 }
0ac96caf 1364 hrtimer_init(&vcpu->arch.ckc_timer, CLOCK_MONOTONIC, HRTIMER_MODE_REL);
ca872302 1365 vcpu->arch.ckc_timer.function = kvm_s390_idle_wakeup;
9d8d5786 1366
5102ee87
TK
1367 kvm_s390_vcpu_crypto_setup(vcpu);
1368
b31605c1 1369 return rc;
b0c632db
HC
1370}
1371
1372struct kvm_vcpu *kvm_arch_vcpu_create(struct kvm *kvm,
1373 unsigned int id)
1374{
4d47555a 1375 struct kvm_vcpu *vcpu;
7feb6bb8 1376 struct sie_page *sie_page;
4d47555a
CO
1377 int rc = -EINVAL;
1378
1379 if (id >= KVM_MAX_VCPUS)
1380 goto out;
1381
1382 rc = -ENOMEM;
b0c632db 1383
b110feaf 1384 vcpu = kmem_cache_zalloc(kvm_vcpu_cache, GFP_KERNEL);
b0c632db 1385 if (!vcpu)
4d47555a 1386 goto out;
b0c632db 1387
7feb6bb8
MM
1388 sie_page = (struct sie_page *) get_zeroed_page(GFP_KERNEL);
1389 if (!sie_page)
b0c632db
HC
1390 goto out_free_cpu;
1391
7feb6bb8
MM
1392 vcpu->arch.sie_block = &sie_page->sie_block;
1393 vcpu->arch.sie_block->itdba = (unsigned long) &sie_page->itdb;
68c55750 1394 vcpu->arch.host_vregs = &sie_page->vregs;
7feb6bb8 1395
b0c632db 1396 vcpu->arch.sie_block->icpua = id;
58f9460b
CO
1397 if (!kvm_is_ucontrol(kvm)) {
1398 if (!kvm->arch.sca) {
1399 WARN_ON_ONCE(1);
1400 goto out_free_cpu;
1401 }
1402 if (!kvm->arch.sca->cpu[id].sda)
1403 kvm->arch.sca->cpu[id].sda =
1404 (__u64) vcpu->arch.sie_block;
1405 vcpu->arch.sie_block->scaoh =
1406 (__u32)(((__u64)kvm->arch.sca) >> 32);
1407 vcpu->arch.sie_block->scaol = (__u32)(__u64)kvm->arch.sca;
1408 set_bit(63 - id, (unsigned long *) &kvm->arch.sca->mcn);
1409 }
b0c632db 1410
ba5c1e9b 1411 spin_lock_init(&vcpu->arch.local_int.lock);
ba5c1e9b 1412 vcpu->arch.local_int.float_int = &kvm->arch.float_int;
d0321a24 1413 vcpu->arch.local_int.wq = &vcpu->wq;
5288fbf0 1414 vcpu->arch.local_int.cpuflags = &vcpu->arch.sie_block->cpuflags;
ba5c1e9b 1415
b0c632db
HC
1416 rc = kvm_vcpu_init(vcpu, kvm, id);
1417 if (rc)
7b06bf2f 1418 goto out_free_sie_block;
b0c632db
HC
1419 VM_EVENT(kvm, 3, "create cpu %d at %p, sie block at %p", id, vcpu,
1420 vcpu->arch.sie_block);
ade38c31 1421 trace_kvm_s390_create_vcpu(id, vcpu, vcpu->arch.sie_block);
b0c632db 1422
b0c632db 1423 return vcpu;
7b06bf2f
WY
1424out_free_sie_block:
1425 free_page((unsigned long)(vcpu->arch.sie_block));
b0c632db 1426out_free_cpu:
b110feaf 1427 kmem_cache_free(kvm_vcpu_cache, vcpu);
4d47555a 1428out:
b0c632db
HC
1429 return ERR_PTR(rc);
1430}
1431
b0c632db
HC
1432int kvm_arch_vcpu_runnable(struct kvm_vcpu *vcpu)
1433{
9a022067 1434 return kvm_s390_vcpu_has_irq(vcpu, 0);
b0c632db
HC
1435}
1436
27406cd5 1437void kvm_s390_vcpu_block(struct kvm_vcpu *vcpu)
49b99e1e
CB
1438{
1439 atomic_set_mask(PROG_BLOCK_SIE, &vcpu->arch.sie_block->prog20);
61a6df54 1440 exit_sie(vcpu);
49b99e1e
CB
1441}
1442
27406cd5 1443void kvm_s390_vcpu_unblock(struct kvm_vcpu *vcpu)
49b99e1e
CB
1444{
1445 atomic_clear_mask(PROG_BLOCK_SIE, &vcpu->arch.sie_block->prog20);
1446}
1447
8e236546
CB
1448static void kvm_s390_vcpu_request(struct kvm_vcpu *vcpu)
1449{
1450 atomic_set_mask(PROG_REQUEST, &vcpu->arch.sie_block->prog20);
61a6df54 1451 exit_sie(vcpu);
8e236546
CB
1452}
1453
1454static void kvm_s390_vcpu_request_handled(struct kvm_vcpu *vcpu)
1455{
1456 atomic_clear_mask(PROG_REQUEST, &vcpu->arch.sie_block->prog20);
1457}
1458
49b99e1e
CB
1459/*
1460 * Kick a guest cpu out of SIE and wait until SIE is not running.
1461 * If the CPU is not running (e.g. waiting as idle) the function will
1462 * return immediately. */
1463void exit_sie(struct kvm_vcpu *vcpu)
1464{
1465 atomic_set_mask(CPUSTAT_STOP_INT, &vcpu->arch.sie_block->cpuflags);
1466 while (vcpu->arch.sie_block->prog0c & PROG_IN_SIE)
1467 cpu_relax();
1468}
1469
8e236546
CB
1470/* Kick a guest cpu out of SIE to process a request synchronously */
1471void kvm_s390_sync_request(int req, struct kvm_vcpu *vcpu)
49b99e1e 1472{
8e236546
CB
1473 kvm_make_request(req, vcpu);
1474 kvm_s390_vcpu_request(vcpu);
49b99e1e
CB
1475}
1476
2c70fe44
CB
1477static void kvm_gmap_notifier(struct gmap *gmap, unsigned long address)
1478{
1479 int i;
1480 struct kvm *kvm = gmap->private;
1481 struct kvm_vcpu *vcpu;
1482
1483 kvm_for_each_vcpu(i, vcpu, kvm) {
1484 /* match against both prefix pages */
fda902cb 1485 if (kvm_s390_get_prefix(vcpu) == (address & ~0x1000UL)) {
2c70fe44 1486 VCPU_EVENT(vcpu, 2, "gmap notifier for %lx", address);
8e236546 1487 kvm_s390_sync_request(KVM_REQ_MMU_RELOAD, vcpu);
2c70fe44
CB
1488 }
1489 }
1490}
1491
b6d33834
CD
1492int kvm_arch_vcpu_should_kick(struct kvm_vcpu *vcpu)
1493{
1494 /* kvm common code refers to this, but never calls it */
1495 BUG();
1496 return 0;
1497}
1498
14eebd91
CO
1499static int kvm_arch_vcpu_ioctl_get_one_reg(struct kvm_vcpu *vcpu,
1500 struct kvm_one_reg *reg)
1501{
1502 int r = -EINVAL;
1503
1504 switch (reg->id) {
29b7c71b
CO
1505 case KVM_REG_S390_TODPR:
1506 r = put_user(vcpu->arch.sie_block->todpr,
1507 (u32 __user *)reg->addr);
1508 break;
1509 case KVM_REG_S390_EPOCHDIFF:
1510 r = put_user(vcpu->arch.sie_block->epoch,
1511 (u64 __user *)reg->addr);
1512 break;
46a6dd1c
J
1513 case KVM_REG_S390_CPU_TIMER:
1514 r = put_user(vcpu->arch.sie_block->cputm,
1515 (u64 __user *)reg->addr);
1516 break;
1517 case KVM_REG_S390_CLOCK_COMP:
1518 r = put_user(vcpu->arch.sie_block->ckc,
1519 (u64 __user *)reg->addr);
1520 break;
536336c2
DD
1521 case KVM_REG_S390_PFTOKEN:
1522 r = put_user(vcpu->arch.pfault_token,
1523 (u64 __user *)reg->addr);
1524 break;
1525 case KVM_REG_S390_PFCOMPARE:
1526 r = put_user(vcpu->arch.pfault_compare,
1527 (u64 __user *)reg->addr);
1528 break;
1529 case KVM_REG_S390_PFSELECT:
1530 r = put_user(vcpu->arch.pfault_select,
1531 (u64 __user *)reg->addr);
1532 break;
672550fb
CB
1533 case KVM_REG_S390_PP:
1534 r = put_user(vcpu->arch.sie_block->pp,
1535 (u64 __user *)reg->addr);
1536 break;
afa45ff5
CB
1537 case KVM_REG_S390_GBEA:
1538 r = put_user(vcpu->arch.sie_block->gbea,
1539 (u64 __user *)reg->addr);
1540 break;
14eebd91
CO
1541 default:
1542 break;
1543 }
1544
1545 return r;
1546}
1547
1548static int kvm_arch_vcpu_ioctl_set_one_reg(struct kvm_vcpu *vcpu,
1549 struct kvm_one_reg *reg)
1550{
1551 int r = -EINVAL;
1552
1553 switch (reg->id) {
29b7c71b
CO
1554 case KVM_REG_S390_TODPR:
1555 r = get_user(vcpu->arch.sie_block->todpr,
1556 (u32 __user *)reg->addr);
1557 break;
1558 case KVM_REG_S390_EPOCHDIFF:
1559 r = get_user(vcpu->arch.sie_block->epoch,
1560 (u64 __user *)reg->addr);
1561 break;
46a6dd1c
J
1562 case KVM_REG_S390_CPU_TIMER:
1563 r = get_user(vcpu->arch.sie_block->cputm,
1564 (u64 __user *)reg->addr);
1565 break;
1566 case KVM_REG_S390_CLOCK_COMP:
1567 r = get_user(vcpu->arch.sie_block->ckc,
1568 (u64 __user *)reg->addr);
1569 break;
536336c2
DD
1570 case KVM_REG_S390_PFTOKEN:
1571 r = get_user(vcpu->arch.pfault_token,
1572 (u64 __user *)reg->addr);
9fbd8082
DH
1573 if (vcpu->arch.pfault_token == KVM_S390_PFAULT_TOKEN_INVALID)
1574 kvm_clear_async_pf_completion_queue(vcpu);
536336c2
DD
1575 break;
1576 case KVM_REG_S390_PFCOMPARE:
1577 r = get_user(vcpu->arch.pfault_compare,
1578 (u64 __user *)reg->addr);
1579 break;
1580 case KVM_REG_S390_PFSELECT:
1581 r = get_user(vcpu->arch.pfault_select,
1582 (u64 __user *)reg->addr);
1583 break;
672550fb
CB
1584 case KVM_REG_S390_PP:
1585 r = get_user(vcpu->arch.sie_block->pp,
1586 (u64 __user *)reg->addr);
1587 break;
afa45ff5
CB
1588 case KVM_REG_S390_GBEA:
1589 r = get_user(vcpu->arch.sie_block->gbea,
1590 (u64 __user *)reg->addr);
1591 break;
14eebd91
CO
1592 default:
1593 break;
1594 }
1595
1596 return r;
1597}
b6d33834 1598
b0c632db
HC
1599static int kvm_arch_vcpu_ioctl_initial_reset(struct kvm_vcpu *vcpu)
1600{
b0c632db 1601 kvm_s390_vcpu_initial_reset(vcpu);
b0c632db
HC
1602 return 0;
1603}
1604
1605int kvm_arch_vcpu_ioctl_set_regs(struct kvm_vcpu *vcpu, struct kvm_regs *regs)
1606{
5a32c1af 1607 memcpy(&vcpu->run->s.regs.gprs, &regs->gprs, sizeof(regs->gprs));
b0c632db
HC
1608 return 0;
1609}
1610
1611int kvm_arch_vcpu_ioctl_get_regs(struct kvm_vcpu *vcpu, struct kvm_regs *regs)
1612{
5a32c1af 1613 memcpy(&regs->gprs, &vcpu->run->s.regs.gprs, sizeof(regs->gprs));
b0c632db
HC
1614 return 0;
1615}
1616
1617int kvm_arch_vcpu_ioctl_set_sregs(struct kvm_vcpu *vcpu,
1618 struct kvm_sregs *sregs)
1619{
59674c1a 1620 memcpy(&vcpu->run->s.regs.acrs, &sregs->acrs, sizeof(sregs->acrs));
b0c632db 1621 memcpy(&vcpu->arch.sie_block->gcr, &sregs->crs, sizeof(sregs->crs));
59674c1a 1622 restore_access_regs(vcpu->run->s.regs.acrs);
b0c632db
HC
1623 return 0;
1624}
1625
1626int kvm_arch_vcpu_ioctl_get_sregs(struct kvm_vcpu *vcpu,
1627 struct kvm_sregs *sregs)
1628{
59674c1a 1629 memcpy(&sregs->acrs, &vcpu->run->s.regs.acrs, sizeof(sregs->acrs));
b0c632db 1630 memcpy(&sregs->crs, &vcpu->arch.sie_block->gcr, sizeof(sregs->crs));
b0c632db
HC
1631 return 0;
1632}
1633
1634int kvm_arch_vcpu_ioctl_set_fpu(struct kvm_vcpu *vcpu, struct kvm_fpu *fpu)
1635{
4725c860
MS
1636 if (test_fp_ctl(fpu->fpc))
1637 return -EINVAL;
b0c632db 1638 memcpy(&vcpu->arch.guest_fpregs.fprs, &fpu->fprs, sizeof(fpu->fprs));
4725c860
MS
1639 vcpu->arch.guest_fpregs.fpc = fpu->fpc;
1640 restore_fp_ctl(&vcpu->arch.guest_fpregs.fpc);
1641 restore_fp_regs(vcpu->arch.guest_fpregs.fprs);
b0c632db
HC
1642 return 0;
1643}
1644
1645int kvm_arch_vcpu_ioctl_get_fpu(struct kvm_vcpu *vcpu, struct kvm_fpu *fpu)
1646{
b0c632db
HC
1647 memcpy(&fpu->fprs, &vcpu->arch.guest_fpregs.fprs, sizeof(fpu->fprs));
1648 fpu->fpc = vcpu->arch.guest_fpregs.fpc;
b0c632db
HC
1649 return 0;
1650}
1651
1652static int kvm_arch_vcpu_ioctl_set_initial_psw(struct kvm_vcpu *vcpu, psw_t psw)
1653{
1654 int rc = 0;
1655
7a42fdc2 1656 if (!is_vcpu_stopped(vcpu))
b0c632db 1657 rc = -EBUSY;
d7b0b5eb
CO
1658 else {
1659 vcpu->run->psw_mask = psw.mask;
1660 vcpu->run->psw_addr = psw.addr;
1661 }
b0c632db
HC
1662 return rc;
1663}
1664
1665int kvm_arch_vcpu_ioctl_translate(struct kvm_vcpu *vcpu,
1666 struct kvm_translation *tr)
1667{
1668 return -EINVAL; /* not implemented yet */
1669}
1670
27291e21
DH
1671#define VALID_GUESTDBG_FLAGS (KVM_GUESTDBG_SINGLESTEP | \
1672 KVM_GUESTDBG_USE_HW_BP | \
1673 KVM_GUESTDBG_ENABLE)
1674
d0bfb940
JK
1675int kvm_arch_vcpu_ioctl_set_guest_debug(struct kvm_vcpu *vcpu,
1676 struct kvm_guest_debug *dbg)
b0c632db 1677{
27291e21
DH
1678 int rc = 0;
1679
1680 vcpu->guest_debug = 0;
1681 kvm_s390_clear_bp_data(vcpu);
1682
2de3bfc2 1683 if (dbg->control & ~VALID_GUESTDBG_FLAGS)
27291e21
DH
1684 return -EINVAL;
1685
1686 if (dbg->control & KVM_GUESTDBG_ENABLE) {
1687 vcpu->guest_debug = dbg->control;
1688 /* enforce guest PER */
1689 atomic_set_mask(CPUSTAT_P, &vcpu->arch.sie_block->cpuflags);
1690
1691 if (dbg->control & KVM_GUESTDBG_USE_HW_BP)
1692 rc = kvm_s390_import_bp_data(vcpu, dbg);
1693 } else {
1694 atomic_clear_mask(CPUSTAT_P, &vcpu->arch.sie_block->cpuflags);
1695 vcpu->arch.guestdbg.last_bp = 0;
1696 }
1697
1698 if (rc) {
1699 vcpu->guest_debug = 0;
1700 kvm_s390_clear_bp_data(vcpu);
1701 atomic_clear_mask(CPUSTAT_P, &vcpu->arch.sie_block->cpuflags);
1702 }
1703
1704 return rc;
b0c632db
HC
1705}
1706
62d9f0db
MT
1707int kvm_arch_vcpu_ioctl_get_mpstate(struct kvm_vcpu *vcpu,
1708 struct kvm_mp_state *mp_state)
1709{
6352e4d2
DH
1710 /* CHECK_STOP and LOAD are not supported yet */
1711 return is_vcpu_stopped(vcpu) ? KVM_MP_STATE_STOPPED :
1712 KVM_MP_STATE_OPERATING;
62d9f0db
MT
1713}
1714
1715int kvm_arch_vcpu_ioctl_set_mpstate(struct kvm_vcpu *vcpu,
1716 struct kvm_mp_state *mp_state)
1717{
6352e4d2
DH
1718 int rc = 0;
1719
1720 /* user space knows about this interface - let it control the state */
1721 vcpu->kvm->arch.user_cpu_state_ctrl = 1;
1722
1723 switch (mp_state->mp_state) {
1724 case KVM_MP_STATE_STOPPED:
1725 kvm_s390_vcpu_stop(vcpu);
1726 break;
1727 case KVM_MP_STATE_OPERATING:
1728 kvm_s390_vcpu_start(vcpu);
1729 break;
1730 case KVM_MP_STATE_LOAD:
1731 case KVM_MP_STATE_CHECK_STOP:
1732 /* fall through - CHECK_STOP and LOAD are not supported yet */
1733 default:
1734 rc = -ENXIO;
1735 }
1736
1737 return rc;
62d9f0db
MT
1738}
1739
8ad35755
DH
1740static bool ibs_enabled(struct kvm_vcpu *vcpu)
1741{
1742 return atomic_read(&vcpu->arch.sie_block->cpuflags) & CPUSTAT_IBS;
1743}
1744
2c70fe44
CB
1745static int kvm_s390_handle_requests(struct kvm_vcpu *vcpu)
1746{
785dbef4
CB
1747 if (!vcpu->requests)
1748 return 0;
8ad35755 1749retry:
8e236546 1750 kvm_s390_vcpu_request_handled(vcpu);
2c70fe44
CB
1751 /*
1752 * We use MMU_RELOAD just to re-arm the ipte notifier for the
1753 * guest prefix page. gmap_ipte_notify will wait on the ptl lock.
1754 * This ensures that the ipte instruction for this request has
1755 * already finished. We might race against a second unmapper that
1756 * wants to set the blocking bit. Lets just retry the request loop.
1757 */
8ad35755 1758 if (kvm_check_request(KVM_REQ_MMU_RELOAD, vcpu)) {
2c70fe44
CB
1759 int rc;
1760 rc = gmap_ipte_notify(vcpu->arch.gmap,
fda902cb 1761 kvm_s390_get_prefix(vcpu),
2c70fe44
CB
1762 PAGE_SIZE * 2);
1763 if (rc)
1764 return rc;
8ad35755 1765 goto retry;
2c70fe44 1766 }
8ad35755 1767
d3d692c8
DH
1768 if (kvm_check_request(KVM_REQ_TLB_FLUSH, vcpu)) {
1769 vcpu->arch.sie_block->ihcpu = 0xffff;
1770 goto retry;
1771 }
1772
8ad35755
DH
1773 if (kvm_check_request(KVM_REQ_ENABLE_IBS, vcpu)) {
1774 if (!ibs_enabled(vcpu)) {
1775 trace_kvm_s390_enable_disable_ibs(vcpu->vcpu_id, 1);
1776 atomic_set_mask(CPUSTAT_IBS,
1777 &vcpu->arch.sie_block->cpuflags);
1778 }
1779 goto retry;
2c70fe44 1780 }
8ad35755
DH
1781
1782 if (kvm_check_request(KVM_REQ_DISABLE_IBS, vcpu)) {
1783 if (ibs_enabled(vcpu)) {
1784 trace_kvm_s390_enable_disable_ibs(vcpu->vcpu_id, 0);
1785 atomic_clear_mask(CPUSTAT_IBS,
1786 &vcpu->arch.sie_block->cpuflags);
1787 }
1788 goto retry;
1789 }
1790
0759d068
DH
1791 /* nothing to do, just clear the request */
1792 clear_bit(KVM_REQ_UNHALT, &vcpu->requests);
1793
2c70fe44
CB
1794 return 0;
1795}
1796
fa576c58
TH
1797/**
1798 * kvm_arch_fault_in_page - fault-in guest page if necessary
1799 * @vcpu: The corresponding virtual cpu
1800 * @gpa: Guest physical address
1801 * @writable: Whether the page should be writable or not
1802 *
1803 * Make sure that a guest page has been faulted-in on the host.
1804 *
1805 * Return: Zero on success, negative error code otherwise.
1806 */
1807long kvm_arch_fault_in_page(struct kvm_vcpu *vcpu, gpa_t gpa, int writable)
24eb3a82 1808{
527e30b4
MS
1809 return gmap_fault(vcpu->arch.gmap, gpa,
1810 writable ? FAULT_FLAG_WRITE : 0);
24eb3a82
DD
1811}
1812
3c038e6b
DD
1813static void __kvm_inject_pfault_token(struct kvm_vcpu *vcpu, bool start_token,
1814 unsigned long token)
1815{
1816 struct kvm_s390_interrupt inti;
383d0b05 1817 struct kvm_s390_irq irq;
3c038e6b
DD
1818
1819 if (start_token) {
383d0b05
JF
1820 irq.u.ext.ext_params2 = token;
1821 irq.type = KVM_S390_INT_PFAULT_INIT;
1822 WARN_ON_ONCE(kvm_s390_inject_vcpu(vcpu, &irq));
3c038e6b
DD
1823 } else {
1824 inti.type = KVM_S390_INT_PFAULT_DONE;
383d0b05 1825 inti.parm64 = token;
3c038e6b
DD
1826 WARN_ON_ONCE(kvm_s390_inject_vm(vcpu->kvm, &inti));
1827 }
1828}
1829
1830void kvm_arch_async_page_not_present(struct kvm_vcpu *vcpu,
1831 struct kvm_async_pf *work)
1832{
1833 trace_kvm_s390_pfault_init(vcpu, work->arch.pfault_token);
1834 __kvm_inject_pfault_token(vcpu, true, work->arch.pfault_token);
1835}
1836
1837void kvm_arch_async_page_present(struct kvm_vcpu *vcpu,
1838 struct kvm_async_pf *work)
1839{
1840 trace_kvm_s390_pfault_done(vcpu, work->arch.pfault_token);
1841 __kvm_inject_pfault_token(vcpu, false, work->arch.pfault_token);
1842}
1843
1844void kvm_arch_async_page_ready(struct kvm_vcpu *vcpu,
1845 struct kvm_async_pf *work)
1846{
1847 /* s390 will always inject the page directly */
1848}
1849
1850bool kvm_arch_can_inject_async_page_present(struct kvm_vcpu *vcpu)
1851{
1852 /*
1853 * s390 will always inject the page directly,
1854 * but we still want check_async_completion to cleanup
1855 */
1856 return true;
1857}
1858
1859static int kvm_arch_setup_async_pf(struct kvm_vcpu *vcpu)
1860{
1861 hva_t hva;
1862 struct kvm_arch_async_pf arch;
1863 int rc;
1864
1865 if (vcpu->arch.pfault_token == KVM_S390_PFAULT_TOKEN_INVALID)
1866 return 0;
1867 if ((vcpu->arch.sie_block->gpsw.mask & vcpu->arch.pfault_select) !=
1868 vcpu->arch.pfault_compare)
1869 return 0;
1870 if (psw_extint_disabled(vcpu))
1871 return 0;
9a022067 1872 if (kvm_s390_vcpu_has_irq(vcpu, 0))
3c038e6b
DD
1873 return 0;
1874 if (!(vcpu->arch.sie_block->gcr[0] & 0x200ul))
1875 return 0;
1876 if (!vcpu->arch.gmap->pfault_enabled)
1877 return 0;
1878
81480cc1
HC
1879 hva = gfn_to_hva(vcpu->kvm, gpa_to_gfn(current->thread.gmap_addr));
1880 hva += current->thread.gmap_addr & ~PAGE_MASK;
1881 if (read_guest_real(vcpu, vcpu->arch.pfault_token, &arch.pfault_token, 8))
3c038e6b
DD
1882 return 0;
1883
1884 rc = kvm_setup_async_pf(vcpu, current->thread.gmap_addr, hva, &arch);
1885 return rc;
1886}
1887
3fb4c40f 1888static int vcpu_pre_run(struct kvm_vcpu *vcpu)
b0c632db 1889{
3fb4c40f 1890 int rc, cpuflags;
e168bf8d 1891
3c038e6b
DD
1892 /*
1893 * On s390 notifications for arriving pages will be delivered directly
1894 * to the guest but the house keeping for completed pfaults is
1895 * handled outside the worker.
1896 */
1897 kvm_check_async_pf_completion(vcpu);
1898
5a32c1af 1899 memcpy(&vcpu->arch.sie_block->gg14, &vcpu->run->s.regs.gprs[14], 16);
b0c632db
HC
1900
1901 if (need_resched())
1902 schedule();
1903
d3a73acb 1904 if (test_cpu_flag(CIF_MCCK_PENDING))
71cde587
CB
1905 s390_handle_mcck();
1906
79395031
JF
1907 if (!kvm_is_ucontrol(vcpu->kvm)) {
1908 rc = kvm_s390_deliver_pending_interrupts(vcpu);
1909 if (rc)
1910 return rc;
1911 }
0ff31867 1912
2c70fe44
CB
1913 rc = kvm_s390_handle_requests(vcpu);
1914 if (rc)
1915 return rc;
1916
27291e21
DH
1917 if (guestdbg_enabled(vcpu)) {
1918 kvm_s390_backup_guest_per_regs(vcpu);
1919 kvm_s390_patch_guest_per_regs(vcpu);
1920 }
1921
b0c632db 1922 vcpu->arch.sie_block->icptcode = 0;
3fb4c40f
TH
1923 cpuflags = atomic_read(&vcpu->arch.sie_block->cpuflags);
1924 VCPU_EVENT(vcpu, 6, "entering sie flags %x", cpuflags);
1925 trace_kvm_s390_sie_enter(vcpu, cpuflags);
2b29a9fd 1926
3fb4c40f
TH
1927 return 0;
1928}
1929
492d8642
TH
1930static int vcpu_post_run_fault_in_sie(struct kvm_vcpu *vcpu)
1931{
1932 psw_t *psw = &vcpu->arch.sie_block->gpsw;
1933 u8 opcode;
1934 int rc;
1935
1936 VCPU_EVENT(vcpu, 3, "%s", "fault in sie instruction");
1937 trace_kvm_s390_sie_fault(vcpu);
1938
1939 /*
1940 * We want to inject an addressing exception, which is defined as a
1941 * suppressing or terminating exception. However, since we came here
1942 * by a DAT access exception, the PSW still points to the faulting
1943 * instruction since DAT exceptions are nullifying. So we've got
1944 * to look up the current opcode to get the length of the instruction
1945 * to be able to forward the PSW.
1946 */
8ae04b8f 1947 rc = read_guest(vcpu, psw->addr, 0, &opcode, 1);
492d8642
TH
1948 if (rc)
1949 return kvm_s390_inject_prog_cond(vcpu, rc);
1950 psw->addr = __rewind_psw(*psw, -insn_length(opcode));
1951
1952 return kvm_s390_inject_program_int(vcpu, PGM_ADDRESSING);
1953}
1954
3fb4c40f
TH
1955static int vcpu_post_run(struct kvm_vcpu *vcpu, int exit_reason)
1956{
24eb3a82 1957 int rc = -1;
2b29a9fd
DD
1958
1959 VCPU_EVENT(vcpu, 6, "exit sie icptcode %d",
1960 vcpu->arch.sie_block->icptcode);
1961 trace_kvm_s390_sie_exit(vcpu, vcpu->arch.sie_block->icptcode);
1962
27291e21
DH
1963 if (guestdbg_enabled(vcpu))
1964 kvm_s390_restore_guest_per_regs(vcpu);
1965
3fb4c40f 1966 if (exit_reason >= 0) {
7c470539 1967 rc = 0;
210b1607
TH
1968 } else if (kvm_is_ucontrol(vcpu->kvm)) {
1969 vcpu->run->exit_reason = KVM_EXIT_S390_UCONTROL;
1970 vcpu->run->s390_ucontrol.trans_exc_code =
1971 current->thread.gmap_addr;
1972 vcpu->run->s390_ucontrol.pgm_code = 0x10;
1973 rc = -EREMOTE;
24eb3a82
DD
1974
1975 } else if (current->thread.gmap_pfault) {
3c038e6b 1976 trace_kvm_s390_major_guest_pfault(vcpu);
24eb3a82 1977 current->thread.gmap_pfault = 0;
fa576c58 1978 if (kvm_arch_setup_async_pf(vcpu)) {
24eb3a82 1979 rc = 0;
fa576c58
TH
1980 } else {
1981 gpa_t gpa = current->thread.gmap_addr;
1982 rc = kvm_arch_fault_in_page(vcpu, gpa, 1);
1983 }
24eb3a82
DD
1984 }
1985
492d8642
TH
1986 if (rc == -1)
1987 rc = vcpu_post_run_fault_in_sie(vcpu);
b0c632db 1988
5a32c1af 1989 memcpy(&vcpu->run->s.regs.gprs[14], &vcpu->arch.sie_block->gg14, 16);
3fb4c40f 1990
a76ccff6
TH
1991 if (rc == 0) {
1992 if (kvm_is_ucontrol(vcpu->kvm))
2955c83f
CB
1993 /* Don't exit for host interrupts. */
1994 rc = vcpu->arch.sie_block->icptcode ? -EOPNOTSUPP : 0;
a76ccff6
TH
1995 else
1996 rc = kvm_handle_sie_intercept(vcpu);
1997 }
1998
3fb4c40f
TH
1999 return rc;
2000}
2001
2002static int __vcpu_run(struct kvm_vcpu *vcpu)
2003{
2004 int rc, exit_reason;
2005
800c1065
TH
2006 /*
2007 * We try to hold kvm->srcu during most of vcpu_run (except when run-
2008 * ning the guest), so that memslots (and other stuff) are protected
2009 */
2010 vcpu->srcu_idx = srcu_read_lock(&vcpu->kvm->srcu);
2011
a76ccff6
TH
2012 do {
2013 rc = vcpu_pre_run(vcpu);
2014 if (rc)
2015 break;
3fb4c40f 2016
800c1065 2017 srcu_read_unlock(&vcpu->kvm->srcu, vcpu->srcu_idx);
a76ccff6
TH
2018 /*
2019 * As PF_VCPU will be used in fault handler, between
2020 * guest_enter and guest_exit should be no uaccess.
2021 */
0097d12e
CB
2022 local_irq_disable();
2023 __kvm_guest_enter();
2024 local_irq_enable();
a76ccff6
TH
2025 exit_reason = sie64a(vcpu->arch.sie_block,
2026 vcpu->run->s.regs.gprs);
0097d12e
CB
2027 local_irq_disable();
2028 __kvm_guest_exit();
2029 local_irq_enable();
800c1065 2030 vcpu->srcu_idx = srcu_read_lock(&vcpu->kvm->srcu);
a76ccff6
TH
2031
2032 rc = vcpu_post_run(vcpu, exit_reason);
27291e21 2033 } while (!signal_pending(current) && !guestdbg_exit_pending(vcpu) && !rc);
3fb4c40f 2034
800c1065 2035 srcu_read_unlock(&vcpu->kvm->srcu, vcpu->srcu_idx);
e168bf8d 2036 return rc;
b0c632db
HC
2037}
2038
b028ee3e
DH
2039static void sync_regs(struct kvm_vcpu *vcpu, struct kvm_run *kvm_run)
2040{
2041 vcpu->arch.sie_block->gpsw.mask = kvm_run->psw_mask;
2042 vcpu->arch.sie_block->gpsw.addr = kvm_run->psw_addr;
2043 if (kvm_run->kvm_dirty_regs & KVM_SYNC_PREFIX)
2044 kvm_s390_set_prefix(vcpu, kvm_run->s.regs.prefix);
2045 if (kvm_run->kvm_dirty_regs & KVM_SYNC_CRS) {
2046 memcpy(&vcpu->arch.sie_block->gcr, &kvm_run->s.regs.crs, 128);
d3d692c8
DH
2047 /* some control register changes require a tlb flush */
2048 kvm_make_request(KVM_REQ_TLB_FLUSH, vcpu);
b028ee3e
DH
2049 }
2050 if (kvm_run->kvm_dirty_regs & KVM_SYNC_ARCH0) {
2051 vcpu->arch.sie_block->cputm = kvm_run->s.regs.cputm;
2052 vcpu->arch.sie_block->ckc = kvm_run->s.regs.ckc;
2053 vcpu->arch.sie_block->todpr = kvm_run->s.regs.todpr;
2054 vcpu->arch.sie_block->pp = kvm_run->s.regs.pp;
2055 vcpu->arch.sie_block->gbea = kvm_run->s.regs.gbea;
2056 }
2057 if (kvm_run->kvm_dirty_regs & KVM_SYNC_PFAULT) {
2058 vcpu->arch.pfault_token = kvm_run->s.regs.pft;
2059 vcpu->arch.pfault_select = kvm_run->s.regs.pfs;
2060 vcpu->arch.pfault_compare = kvm_run->s.regs.pfc;
9fbd8082
DH
2061 if (vcpu->arch.pfault_token == KVM_S390_PFAULT_TOKEN_INVALID)
2062 kvm_clear_async_pf_completion_queue(vcpu);
b028ee3e
DH
2063 }
2064 kvm_run->kvm_dirty_regs = 0;
2065}
2066
2067static void store_regs(struct kvm_vcpu *vcpu, struct kvm_run *kvm_run)
2068{
2069 kvm_run->psw_mask = vcpu->arch.sie_block->gpsw.mask;
2070 kvm_run->psw_addr = vcpu->arch.sie_block->gpsw.addr;
2071 kvm_run->s.regs.prefix = kvm_s390_get_prefix(vcpu);
2072 memcpy(&kvm_run->s.regs.crs, &vcpu->arch.sie_block->gcr, 128);
2073 kvm_run->s.regs.cputm = vcpu->arch.sie_block->cputm;
2074 kvm_run->s.regs.ckc = vcpu->arch.sie_block->ckc;
2075 kvm_run->s.regs.todpr = vcpu->arch.sie_block->todpr;
2076 kvm_run->s.regs.pp = vcpu->arch.sie_block->pp;
2077 kvm_run->s.regs.gbea = vcpu->arch.sie_block->gbea;
2078 kvm_run->s.regs.pft = vcpu->arch.pfault_token;
2079 kvm_run->s.regs.pfs = vcpu->arch.pfault_select;
2080 kvm_run->s.regs.pfc = vcpu->arch.pfault_compare;
2081}
2082
b0c632db
HC
2083int kvm_arch_vcpu_ioctl_run(struct kvm_vcpu *vcpu, struct kvm_run *kvm_run)
2084{
8f2abe6a 2085 int rc;
b0c632db
HC
2086 sigset_t sigsaved;
2087
27291e21
DH
2088 if (guestdbg_exit_pending(vcpu)) {
2089 kvm_s390_prepare_debug_exit(vcpu);
2090 return 0;
2091 }
2092
b0c632db
HC
2093 if (vcpu->sigset_active)
2094 sigprocmask(SIG_SETMASK, &vcpu->sigset, &sigsaved);
2095
6352e4d2
DH
2096 if (!kvm_s390_user_cpu_state_ctrl(vcpu->kvm)) {
2097 kvm_s390_vcpu_start(vcpu);
2098 } else if (is_vcpu_stopped(vcpu)) {
ea2cdd27 2099 pr_err_ratelimited("can't run stopped vcpu %d\n",
6352e4d2
DH
2100 vcpu->vcpu_id);
2101 return -EINVAL;
2102 }
b0c632db 2103
b028ee3e 2104 sync_regs(vcpu, kvm_run);
d7b0b5eb 2105
dab4079d 2106 might_fault();
a76ccff6 2107 rc = __vcpu_run(vcpu);
9ace903d 2108
b1d16c49
CE
2109 if (signal_pending(current) && !rc) {
2110 kvm_run->exit_reason = KVM_EXIT_INTR;
8f2abe6a 2111 rc = -EINTR;
b1d16c49 2112 }
8f2abe6a 2113
27291e21
DH
2114 if (guestdbg_exit_pending(vcpu) && !rc) {
2115 kvm_s390_prepare_debug_exit(vcpu);
2116 rc = 0;
2117 }
2118
b8e660b8 2119 if (rc == -EOPNOTSUPP) {
8f2abe6a
CB
2120 /* intercept cannot be handled in-kernel, prepare kvm-run */
2121 kvm_run->exit_reason = KVM_EXIT_S390_SIEIC;
2122 kvm_run->s390_sieic.icptcode = vcpu->arch.sie_block->icptcode;
8f2abe6a
CB
2123 kvm_run->s390_sieic.ipa = vcpu->arch.sie_block->ipa;
2124 kvm_run->s390_sieic.ipb = vcpu->arch.sie_block->ipb;
2125 rc = 0;
2126 }
2127
2128 if (rc == -EREMOTE) {
2129 /* intercept was handled, but userspace support is needed
2130 * kvm_run has been prepared by the handler */
2131 rc = 0;
2132 }
b0c632db 2133
b028ee3e 2134 store_regs(vcpu, kvm_run);
d7b0b5eb 2135
b0c632db
HC
2136 if (vcpu->sigset_active)
2137 sigprocmask(SIG_SETMASK, &sigsaved, NULL);
2138
b0c632db 2139 vcpu->stat.exit_userspace++;
7e8e6ab4 2140 return rc;
b0c632db
HC
2141}
2142
b0c632db
HC
2143/*
2144 * store status at address
2145 * we use have two special cases:
2146 * KVM_S390_STORE_STATUS_NOADDR: -> 0x1200 on 64 bit
2147 * KVM_S390_STORE_STATUS_PREFIXED: -> prefix
2148 */
d0bce605 2149int kvm_s390_store_status_unloaded(struct kvm_vcpu *vcpu, unsigned long gpa)
b0c632db 2150{
092670cd 2151 unsigned char archmode = 1;
fda902cb 2152 unsigned int px;
178bd789 2153 u64 clkcomp;
d0bce605 2154 int rc;
b0c632db 2155
d0bce605
HC
2156 if (gpa == KVM_S390_STORE_STATUS_NOADDR) {
2157 if (write_guest_abs(vcpu, 163, &archmode, 1))
b0c632db 2158 return -EFAULT;
d0bce605
HC
2159 gpa = SAVE_AREA_BASE;
2160 } else if (gpa == KVM_S390_STORE_STATUS_PREFIXED) {
2161 if (write_guest_real(vcpu, 163, &archmode, 1))
b0c632db 2162 return -EFAULT;
d0bce605
HC
2163 gpa = kvm_s390_real_to_abs(vcpu, SAVE_AREA_BASE);
2164 }
2165 rc = write_guest_abs(vcpu, gpa + offsetof(struct save_area, fp_regs),
2166 vcpu->arch.guest_fpregs.fprs, 128);
2167 rc |= write_guest_abs(vcpu, gpa + offsetof(struct save_area, gp_regs),
2168 vcpu->run->s.regs.gprs, 128);
2169 rc |= write_guest_abs(vcpu, gpa + offsetof(struct save_area, psw),
2170 &vcpu->arch.sie_block->gpsw, 16);
fda902cb 2171 px = kvm_s390_get_prefix(vcpu);
d0bce605 2172 rc |= write_guest_abs(vcpu, gpa + offsetof(struct save_area, pref_reg),
fda902cb 2173 &px, 4);
d0bce605
HC
2174 rc |= write_guest_abs(vcpu,
2175 gpa + offsetof(struct save_area, fp_ctrl_reg),
2176 &vcpu->arch.guest_fpregs.fpc, 4);
2177 rc |= write_guest_abs(vcpu, gpa + offsetof(struct save_area, tod_reg),
2178 &vcpu->arch.sie_block->todpr, 4);
2179 rc |= write_guest_abs(vcpu, gpa + offsetof(struct save_area, timer),
2180 &vcpu->arch.sie_block->cputm, 8);
178bd789 2181 clkcomp = vcpu->arch.sie_block->ckc >> 8;
d0bce605
HC
2182 rc |= write_guest_abs(vcpu, gpa + offsetof(struct save_area, clk_cmp),
2183 &clkcomp, 8);
2184 rc |= write_guest_abs(vcpu, gpa + offsetof(struct save_area, acc_regs),
2185 &vcpu->run->s.regs.acrs, 64);
2186 rc |= write_guest_abs(vcpu, gpa + offsetof(struct save_area, ctrl_regs),
2187 &vcpu->arch.sie_block->gcr, 128);
2188 return rc ? -EFAULT : 0;
b0c632db
HC
2189}
2190
e879892c
TH
2191int kvm_s390_vcpu_store_status(struct kvm_vcpu *vcpu, unsigned long addr)
2192{
2193 /*
2194 * The guest FPRS and ACRS are in the host FPRS/ACRS due to the lazy
2195 * copying in vcpu load/put. Lets update our copies before we save
2196 * it into the save area
2197 */
2198 save_fp_ctl(&vcpu->arch.guest_fpregs.fpc);
2199 save_fp_regs(vcpu->arch.guest_fpregs.fprs);
2200 save_access_regs(vcpu->run->s.regs.acrs);
2201
2202 return kvm_s390_store_status_unloaded(vcpu, addr);
2203}
2204
bc17de7c
EF
2205/*
2206 * store additional status at address
2207 */
2208int kvm_s390_store_adtl_status_unloaded(struct kvm_vcpu *vcpu,
2209 unsigned long gpa)
2210{
2211 /* Only bits 0-53 are used for address formation */
2212 if (!(gpa & ~0x3ff))
2213 return 0;
2214
2215 return write_guest_abs(vcpu, gpa & ~0x3ff,
2216 (void *)&vcpu->run->s.regs.vrs, 512);
2217}
2218
2219int kvm_s390_vcpu_store_adtl_status(struct kvm_vcpu *vcpu, unsigned long addr)
2220{
2221 if (!test_kvm_facility(vcpu->kvm, 129))
2222 return 0;
2223
2224 /*
2225 * The guest VXRS are in the host VXRs due to the lazy
2226 * copying in vcpu load/put. Let's update our copies before we save
2227 * it into the save area.
2228 */
2229 save_vx_regs((__vector128 *)&vcpu->run->s.regs.vrs);
2230
2231 return kvm_s390_store_adtl_status_unloaded(vcpu, addr);
2232}
2233
8ad35755
DH
2234static void __disable_ibs_on_vcpu(struct kvm_vcpu *vcpu)
2235{
2236 kvm_check_request(KVM_REQ_ENABLE_IBS, vcpu);
8e236546 2237 kvm_s390_sync_request(KVM_REQ_DISABLE_IBS, vcpu);
8ad35755
DH
2238}
2239
2240static void __disable_ibs_on_all_vcpus(struct kvm *kvm)
2241{
2242 unsigned int i;
2243 struct kvm_vcpu *vcpu;
2244
2245 kvm_for_each_vcpu(i, vcpu, kvm) {
2246 __disable_ibs_on_vcpu(vcpu);
2247 }
2248}
2249
2250static void __enable_ibs_on_vcpu(struct kvm_vcpu *vcpu)
2251{
2252 kvm_check_request(KVM_REQ_DISABLE_IBS, vcpu);
8e236546 2253 kvm_s390_sync_request(KVM_REQ_ENABLE_IBS, vcpu);
8ad35755
DH
2254}
2255
6852d7b6
DH
2256void kvm_s390_vcpu_start(struct kvm_vcpu *vcpu)
2257{
8ad35755
DH
2258 int i, online_vcpus, started_vcpus = 0;
2259
2260 if (!is_vcpu_stopped(vcpu))
2261 return;
2262
6852d7b6 2263 trace_kvm_s390_vcpu_start_stop(vcpu->vcpu_id, 1);
8ad35755 2264 /* Only one cpu at a time may enter/leave the STOPPED state. */
433b9ee4 2265 spin_lock(&vcpu->kvm->arch.start_stop_lock);
8ad35755
DH
2266 online_vcpus = atomic_read(&vcpu->kvm->online_vcpus);
2267
2268 for (i = 0; i < online_vcpus; i++) {
2269 if (!is_vcpu_stopped(vcpu->kvm->vcpus[i]))
2270 started_vcpus++;
2271 }
2272
2273 if (started_vcpus == 0) {
2274 /* we're the only active VCPU -> speed it up */
2275 __enable_ibs_on_vcpu(vcpu);
2276 } else if (started_vcpus == 1) {
2277 /*
2278 * As we are starting a second VCPU, we have to disable
2279 * the IBS facility on all VCPUs to remove potentially
2280 * oustanding ENABLE requests.
2281 */
2282 __disable_ibs_on_all_vcpus(vcpu->kvm);
2283 }
2284
6852d7b6 2285 atomic_clear_mask(CPUSTAT_STOPPED, &vcpu->arch.sie_block->cpuflags);
8ad35755
DH
2286 /*
2287 * Another VCPU might have used IBS while we were offline.
2288 * Let's play safe and flush the VCPU at startup.
2289 */
d3d692c8 2290 kvm_make_request(KVM_REQ_TLB_FLUSH, vcpu);
433b9ee4 2291 spin_unlock(&vcpu->kvm->arch.start_stop_lock);
8ad35755 2292 return;
6852d7b6
DH
2293}
2294
2295void kvm_s390_vcpu_stop(struct kvm_vcpu *vcpu)
2296{
8ad35755
DH
2297 int i, online_vcpus, started_vcpus = 0;
2298 struct kvm_vcpu *started_vcpu = NULL;
2299
2300 if (is_vcpu_stopped(vcpu))
2301 return;
2302
6852d7b6 2303 trace_kvm_s390_vcpu_start_stop(vcpu->vcpu_id, 0);
8ad35755 2304 /* Only one cpu at a time may enter/leave the STOPPED state. */
433b9ee4 2305 spin_lock(&vcpu->kvm->arch.start_stop_lock);
8ad35755
DH
2306 online_vcpus = atomic_read(&vcpu->kvm->online_vcpus);
2307
32f5ff63 2308 /* SIGP STOP and SIGP STOP AND STORE STATUS has been fully processed */
6cddd432 2309 kvm_s390_clear_stop_irq(vcpu);
32f5ff63 2310
6cddd432 2311 atomic_set_mask(CPUSTAT_STOPPED, &vcpu->arch.sie_block->cpuflags);
8ad35755
DH
2312 __disable_ibs_on_vcpu(vcpu);
2313
2314 for (i = 0; i < online_vcpus; i++) {
2315 if (!is_vcpu_stopped(vcpu->kvm->vcpus[i])) {
2316 started_vcpus++;
2317 started_vcpu = vcpu->kvm->vcpus[i];
2318 }
2319 }
2320
2321 if (started_vcpus == 1) {
2322 /*
2323 * As we only have one VCPU left, we want to enable the
2324 * IBS facility for that VCPU to speed it up.
2325 */
2326 __enable_ibs_on_vcpu(started_vcpu);
2327 }
2328
433b9ee4 2329 spin_unlock(&vcpu->kvm->arch.start_stop_lock);
8ad35755 2330 return;
6852d7b6
DH
2331}
2332
d6712df9
CH
2333static int kvm_vcpu_ioctl_enable_cap(struct kvm_vcpu *vcpu,
2334 struct kvm_enable_cap *cap)
2335{
2336 int r;
2337
2338 if (cap->flags)
2339 return -EINVAL;
2340
2341 switch (cap->cap) {
fa6b7fe9
CH
2342 case KVM_CAP_S390_CSS_SUPPORT:
2343 if (!vcpu->kvm->arch.css_support) {
2344 vcpu->kvm->arch.css_support = 1;
2345 trace_kvm_s390_enable_css(vcpu->kvm);
2346 }
2347 r = 0;
2348 break;
d6712df9
CH
2349 default:
2350 r = -EINVAL;
2351 break;
2352 }
2353 return r;
2354}
2355
41408c28
TH
2356static long kvm_s390_guest_mem_op(struct kvm_vcpu *vcpu,
2357 struct kvm_s390_mem_op *mop)
2358{
2359 void __user *uaddr = (void __user *)mop->buf;
2360 void *tmpbuf = NULL;
2361 int r, srcu_idx;
2362 const u64 supported_flags = KVM_S390_MEMOP_F_INJECT_EXCEPTION
2363 | KVM_S390_MEMOP_F_CHECK_ONLY;
2364
2365 if (mop->flags & ~supported_flags)
2366 return -EINVAL;
2367
2368 if (mop->size > MEM_OP_MAX_SIZE)
2369 return -E2BIG;
2370
2371 if (!(mop->flags & KVM_S390_MEMOP_F_CHECK_ONLY)) {
2372 tmpbuf = vmalloc(mop->size);
2373 if (!tmpbuf)
2374 return -ENOMEM;
2375 }
2376
2377 srcu_idx = srcu_read_lock(&vcpu->kvm->srcu);
2378
2379 switch (mop->op) {
2380 case KVM_S390_MEMOP_LOGICAL_READ:
2381 if (mop->flags & KVM_S390_MEMOP_F_CHECK_ONLY) {
2382 r = check_gva_range(vcpu, mop->gaddr, mop->ar, mop->size, false);
2383 break;
2384 }
2385 r = read_guest(vcpu, mop->gaddr, mop->ar, tmpbuf, mop->size);
2386 if (r == 0) {
2387 if (copy_to_user(uaddr, tmpbuf, mop->size))
2388 r = -EFAULT;
2389 }
2390 break;
2391 case KVM_S390_MEMOP_LOGICAL_WRITE:
2392 if (mop->flags & KVM_S390_MEMOP_F_CHECK_ONLY) {
2393 r = check_gva_range(vcpu, mop->gaddr, mop->ar, mop->size, true);
2394 break;
2395 }
2396 if (copy_from_user(tmpbuf, uaddr, mop->size)) {
2397 r = -EFAULT;
2398 break;
2399 }
2400 r = write_guest(vcpu, mop->gaddr, mop->ar, tmpbuf, mop->size);
2401 break;
2402 default:
2403 r = -EINVAL;
2404 }
2405
2406 srcu_read_unlock(&vcpu->kvm->srcu, srcu_idx);
2407
2408 if (r > 0 && (mop->flags & KVM_S390_MEMOP_F_INJECT_EXCEPTION) != 0)
2409 kvm_s390_inject_prog_irq(vcpu, &vcpu->arch.pgm);
2410
2411 vfree(tmpbuf);
2412 return r;
2413}
2414
b0c632db
HC
2415long kvm_arch_vcpu_ioctl(struct file *filp,
2416 unsigned int ioctl, unsigned long arg)
2417{
2418 struct kvm_vcpu *vcpu = filp->private_data;
2419 void __user *argp = (void __user *)arg;
800c1065 2420 int idx;
bc923cc9 2421 long r;
b0c632db 2422
93736624 2423 switch (ioctl) {
47b43c52
JF
2424 case KVM_S390_IRQ: {
2425 struct kvm_s390_irq s390irq;
2426
2427 r = -EFAULT;
2428 if (copy_from_user(&s390irq, argp, sizeof(s390irq)))
2429 break;
2430 r = kvm_s390_inject_vcpu(vcpu, &s390irq);
2431 break;
2432 }
93736624 2433 case KVM_S390_INTERRUPT: {
ba5c1e9b 2434 struct kvm_s390_interrupt s390int;
383d0b05 2435 struct kvm_s390_irq s390irq;
ba5c1e9b 2436
93736624 2437 r = -EFAULT;
ba5c1e9b 2438 if (copy_from_user(&s390int, argp, sizeof(s390int)))
93736624 2439 break;
383d0b05
JF
2440 if (s390int_to_s390irq(&s390int, &s390irq))
2441 return -EINVAL;
2442 r = kvm_s390_inject_vcpu(vcpu, &s390irq);
93736624 2443 break;
ba5c1e9b 2444 }
b0c632db 2445 case KVM_S390_STORE_STATUS:
800c1065 2446 idx = srcu_read_lock(&vcpu->kvm->srcu);
bc923cc9 2447 r = kvm_s390_vcpu_store_status(vcpu, arg);
800c1065 2448 srcu_read_unlock(&vcpu->kvm->srcu, idx);
bc923cc9 2449 break;
b0c632db
HC
2450 case KVM_S390_SET_INITIAL_PSW: {
2451 psw_t psw;
2452
bc923cc9 2453 r = -EFAULT;
b0c632db 2454 if (copy_from_user(&psw, argp, sizeof(psw)))
bc923cc9
AK
2455 break;
2456 r = kvm_arch_vcpu_ioctl_set_initial_psw(vcpu, psw);
2457 break;
b0c632db
HC
2458 }
2459 case KVM_S390_INITIAL_RESET:
bc923cc9
AK
2460 r = kvm_arch_vcpu_ioctl_initial_reset(vcpu);
2461 break;
14eebd91
CO
2462 case KVM_SET_ONE_REG:
2463 case KVM_GET_ONE_REG: {
2464 struct kvm_one_reg reg;
2465 r = -EFAULT;
2466 if (copy_from_user(&reg, argp, sizeof(reg)))
2467 break;
2468 if (ioctl == KVM_SET_ONE_REG)
2469 r = kvm_arch_vcpu_ioctl_set_one_reg(vcpu, &reg);
2470 else
2471 r = kvm_arch_vcpu_ioctl_get_one_reg(vcpu, &reg);
2472 break;
2473 }
27e0393f
CO
2474#ifdef CONFIG_KVM_S390_UCONTROL
2475 case KVM_S390_UCAS_MAP: {
2476 struct kvm_s390_ucas_mapping ucasmap;
2477
2478 if (copy_from_user(&ucasmap, argp, sizeof(ucasmap))) {
2479 r = -EFAULT;
2480 break;
2481 }
2482
2483 if (!kvm_is_ucontrol(vcpu->kvm)) {
2484 r = -EINVAL;
2485 break;
2486 }
2487
2488 r = gmap_map_segment(vcpu->arch.gmap, ucasmap.user_addr,
2489 ucasmap.vcpu_addr, ucasmap.length);
2490 break;
2491 }
2492 case KVM_S390_UCAS_UNMAP: {
2493 struct kvm_s390_ucas_mapping ucasmap;
2494
2495 if (copy_from_user(&ucasmap, argp, sizeof(ucasmap))) {
2496 r = -EFAULT;
2497 break;
2498 }
2499
2500 if (!kvm_is_ucontrol(vcpu->kvm)) {
2501 r = -EINVAL;
2502 break;
2503 }
2504
2505 r = gmap_unmap_segment(vcpu->arch.gmap, ucasmap.vcpu_addr,
2506 ucasmap.length);
2507 break;
2508 }
2509#endif
ccc7910f 2510 case KVM_S390_VCPU_FAULT: {
527e30b4 2511 r = gmap_fault(vcpu->arch.gmap, arg, 0);
ccc7910f
CO
2512 break;
2513 }
d6712df9
CH
2514 case KVM_ENABLE_CAP:
2515 {
2516 struct kvm_enable_cap cap;
2517 r = -EFAULT;
2518 if (copy_from_user(&cap, argp, sizeof(cap)))
2519 break;
2520 r = kvm_vcpu_ioctl_enable_cap(vcpu, &cap);
2521 break;
2522 }
41408c28
TH
2523 case KVM_S390_MEM_OP: {
2524 struct kvm_s390_mem_op mem_op;
2525
2526 if (copy_from_user(&mem_op, argp, sizeof(mem_op)) == 0)
2527 r = kvm_s390_guest_mem_op(vcpu, &mem_op);
2528 else
2529 r = -EFAULT;
2530 break;
2531 }
816c7667
JF
2532 case KVM_S390_SET_IRQ_STATE: {
2533 struct kvm_s390_irq_state irq_state;
2534
2535 r = -EFAULT;
2536 if (copy_from_user(&irq_state, argp, sizeof(irq_state)))
2537 break;
2538 if (irq_state.len > VCPU_IRQS_MAX_BUF ||
2539 irq_state.len == 0 ||
2540 irq_state.len % sizeof(struct kvm_s390_irq) > 0) {
2541 r = -EINVAL;
2542 break;
2543 }
2544 r = kvm_s390_set_irq_state(vcpu,
2545 (void __user *) irq_state.buf,
2546 irq_state.len);
2547 break;
2548 }
2549 case KVM_S390_GET_IRQ_STATE: {
2550 struct kvm_s390_irq_state irq_state;
2551
2552 r = -EFAULT;
2553 if (copy_from_user(&irq_state, argp, sizeof(irq_state)))
2554 break;
2555 if (irq_state.len == 0) {
2556 r = -EINVAL;
2557 break;
2558 }
2559 r = kvm_s390_get_irq_state(vcpu,
2560 (__u8 __user *) irq_state.buf,
2561 irq_state.len);
2562 break;
2563 }
b0c632db 2564 default:
3e6afcf1 2565 r = -ENOTTY;
b0c632db 2566 }
bc923cc9 2567 return r;
b0c632db
HC
2568}
2569
5b1c1493
CO
2570int kvm_arch_vcpu_fault(struct kvm_vcpu *vcpu, struct vm_fault *vmf)
2571{
2572#ifdef CONFIG_KVM_S390_UCONTROL
2573 if ((vmf->pgoff == KVM_S390_SIE_PAGE_OFFSET)
2574 && (kvm_is_ucontrol(vcpu->kvm))) {
2575 vmf->page = virt_to_page(vcpu->arch.sie_block);
2576 get_page(vmf->page);
2577 return 0;
2578 }
2579#endif
2580 return VM_FAULT_SIGBUS;
2581}
2582
5587027c
AK
2583int kvm_arch_create_memslot(struct kvm *kvm, struct kvm_memory_slot *slot,
2584 unsigned long npages)
db3fe4eb
TY
2585{
2586 return 0;
2587}
2588
b0c632db 2589/* Section: memory related */
f7784b8e
MT
2590int kvm_arch_prepare_memory_region(struct kvm *kvm,
2591 struct kvm_memory_slot *memslot,
09170a49 2592 const struct kvm_userspace_memory_region *mem,
7b6195a9 2593 enum kvm_mr_change change)
b0c632db 2594{
dd2887e7
NW
2595 /* A few sanity checks. We can have memory slots which have to be
2596 located/ended at a segment boundary (1MB). The memory in userland is
2597 ok to be fragmented into various different vmas. It is okay to mmap()
2598 and munmap() stuff in this slot after doing this call at any time */
b0c632db 2599
598841ca 2600 if (mem->userspace_addr & 0xffffful)
b0c632db
HC
2601 return -EINVAL;
2602
598841ca 2603 if (mem->memory_size & 0xffffful)
b0c632db
HC
2604 return -EINVAL;
2605
f7784b8e
MT
2606 return 0;
2607}
2608
2609void kvm_arch_commit_memory_region(struct kvm *kvm,
09170a49 2610 const struct kvm_userspace_memory_region *mem,
8482644a 2611 const struct kvm_memory_slot *old,
f36f3f28 2612 const struct kvm_memory_slot *new,
8482644a 2613 enum kvm_mr_change change)
f7784b8e 2614{
f7850c92 2615 int rc;
f7784b8e 2616
2cef4deb
CB
2617 /* If the basics of the memslot do not change, we do not want
2618 * to update the gmap. Every update causes several unnecessary
2619 * segment translation exceptions. This is usually handled just
2620 * fine by the normal fault handler + gmap, but it will also
2621 * cause faults on the prefix page of running guest CPUs.
2622 */
2623 if (old->userspace_addr == mem->userspace_addr &&
2624 old->base_gfn * PAGE_SIZE == mem->guest_phys_addr &&
2625 old->npages * PAGE_SIZE == mem->memory_size)
2626 return;
598841ca
CO
2627
2628 rc = gmap_map_segment(kvm->arch.gmap, mem->userspace_addr,
2629 mem->guest_phys_addr, mem->memory_size);
2630 if (rc)
ea2cdd27 2631 pr_warn("failed to commit memory region\n");
598841ca 2632 return;
b0c632db
HC
2633}
2634
b0c632db
HC
2635static int __init kvm_s390_init(void)
2636{
9d8d5786 2637 return kvm_init(NULL, sizeof(struct kvm_vcpu), 0, THIS_MODULE);
b0c632db
HC
2638}
2639
2640static void __exit kvm_s390_exit(void)
2641{
2642 kvm_exit();
2643}
2644
2645module_init(kvm_s390_init);
2646module_exit(kvm_s390_exit);
566af940
CH
2647
2648/*
2649 * Enable autoloading of the kvm module.
2650 * Note that we add the module alias here instead of virt/kvm/kvm_main.c
2651 * since x86 takes a different approach.
2652 */
2653#include <linux/miscdevice.h>
2654MODULE_ALIAS_MISCDEV(KVM_MINOR);
2655MODULE_ALIAS("devname:kvm");